- Presentations
- Documents
- Infographics
Exploring the Portable Executable format
Ange Albertini
•
10 years ago
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
Katie Nickels
•
5 years ago
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat Security Conference
•
6 years ago
.Net Hijacking to Defend PowerShell BSidesSF2017
Amanda Rousseau
•
7 years ago
2018 Student360 - Beyond xp_cmdshell - Owning the Empire Through SQL Server
Scott Sutherland
•
6 years ago
FPC for the Masses - CoRIIN 2018
Xavier Mertens
•
6 years ago
Delivering Security Insights with Data Analytics and Visualization
Raffael Marty
•
6 years ago
We Don't Always Go Lights and Sirens - Circle City Con 2017
Kendra Cooley
•
6 years ago
Taking Hunting to the Next Level: Hunting in Memory
Joe Desimone
•
6 years ago
Building next gen malware behavioural analysis environment
isc2-hellenic
•
7 years ago
Setting up CSIRT
APNIC
•
9 years ago
Dfrws eu 2014 rekall workshop
Tamas K Lengyel
•
9 years ago
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
Nikhil Mittal
•
7 years ago
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Trend Micro
•
6 years ago
Billions & Billions of Logs
Jack Crook
•
7 years ago
No Easy Breach DerbyCon 2016
Matthew Dunwoody
•
7 years ago
Volatile Memory: Behavioral Game Theory in Defensive Security
Kelly Shortridge
•
7 years ago
EyePyramid and other .NET malware. How to analyze them?
Antonio Parata
•
7 years ago
Culture
Reed Hastings
•
14 years ago
Threat Hunting with Splunk
Splunk
•
7 years ago