- Presentations
- Documents
- Infographics
PowerShell for Practical Purple Teaming
Nikhil Mittal
•
7 years ago
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk
Beau Bullock
•
8 years ago
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
Alex Pinto
•
8 years ago
Lateral Movement with PowerShell
kieranjacobsen
•
9 years ago
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
Fatih Ozavci
•
8 years ago
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Rob Fuller
•
12 years ago
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
jasonjfrank
•
8 years ago
Security Onion Conference - 2015
DefensiveDepth
•
8 years ago
Black Hat 2015 Arsenal: Noriben Malware Analysis
Brian Baskin
•
8 years ago
Windows 10 Forensics: OS Evidentiary Artefacts
Brent Muir
•
8 years ago
Dark Fairytales from a Phisherman
Michele Orru
•
8 years ago
Riding the Overflow - Then and Now
Miroslav Stampar
•
9 years ago
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Panels !
Aditya K Sood
•
9 years ago
Lares from LOW to PWNED
Chris Gates
•
12 years ago
Painting a Company Red and Blue
Iftach Ian Amit
•
9 years ago
Windows attacks - AT is the new black
Chris Gates
•
10 years ago
[ENG] IPv6 shipworm + My little Windows domain pwnie
Zoltan Balazs
•
11 years ago
The Web Application Hackers Toolchain
jasonhaddix
•
11 years ago
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
qqlan
•
11 years ago
Multiprocessing with python
Patrick Vergain
•
15 years ago