- Presentations
- Documents
- Infographics
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
•
7 years ago
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Peter Hlavaty
•
7 years ago
You're Off the Hook: Blinding Security Software
Cylance
•
7 years ago
Moony li pacsec-1.8
PacSecJP
•
7 years ago
Behavioral Models of Information Security: Industry irrationality & what to do about it
Kelly Shortridge
•
7 years ago
Higher Level Malware
CTruncer
•
7 years ago
External to DA, the OS X Way
Stephan Borosh
•
7 years ago
SREcon 2016 Performance Checklists for SREs
Brendan Gregg
•
8 years ago
Docker, Linux Containers, and Security: Does It Add Up?
Jérôme Petazzoni
•
9 years ago
Java Deserialization Vulnerabilities - The Forgotten Bug Class
CODE WHITE GmbH
•
8 years ago
SyScan360 - Stefan Esser - OS X El Capitan sinking the S\H/IP
Stefan Esser
•
8 years ago
The Joy of Sandbox Mitigations
James Forshaw
•
8 years ago
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
CTruncer
•
8 years ago
I Have the Power(View)
Will Schroeder
•
8 years ago
Exploitation and State Machines
Michael Scovetta
•
12 years ago
A XSSmas carol
cgvwzq
•
8 years ago
Handling of compromised Linux systems
Michael Boelen
•
8 years ago
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
•
8 years ago
Velocity 2015 linux perf tools
Brendan Gregg
•
8 years ago
"The Great Train Cyber Robbery" SCADAStrangeLove
Aleksandr Timorin
•
8 years ago