- Presentations
- Documents
- Infographics
History & Evolution of GMP Regulations
GMP EDUCATION : Not for Profit Organization
•
8 years ago
Invoke-Obfuscation nullcon 2017
Daniel Bohannon
•
7 years ago
Beyond xp_cmdshell: Owning the Empire through SQL Server
Scott Sutherland
•
6 years ago
Jurczyk windows metafile_pacsec_v2
PacSecJP
•
7 years ago
SHA-1 backdooring & exploitation
Ange Albertini
•
9 years ago
Обход файрволов веб-приложений
Positive Hack Days
•
7 years ago
PSConfEU - Offensive Active Directory (With PowerShell!)
Will Schroeder
•
8 years ago
SREcon 2016 Performance Checklists for SREs
Brendan Gregg
•
8 years ago
Psychology explains the power of Storytelling
Sebastien Juras
•
10 years ago
[FR] C'est quoi une API ?
OVHcloud
•
8 years ago
Practical reverse engineering and exploit development for AVR-based Embedded Devices (s4x16)
Alexander Bolshev
•
8 years ago
SCADA Software or Swiss Cheese Software? by Celil UNUVER
CODE BLUE
•
10 years ago
Secret of Intel Management Engine by Igor Skochinsky
CODE BLUE
•
10 years ago
The Future of Wearables... EXPLAINED!
Paul Brown
•
8 years ago
PDF secrets - hiding & revealing secrets in PDF documents
Ange Albertini
•
10 years ago
Visualization of big time series data
Rob Hyndman
•
9 years ago
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Jakub Kałużny
•
8 years ago
Hide Android applications in images
Ange Albertini
•
9 years ago
On Cyber
grugq
•
8 years ago
Hyperchem Ma, badbarcode en_1109_nocomment-final
PacSecJP
•
8 years ago