- Presentations
- Documents
- Infographics
SpecterOps Webinar Week - Kerberoasting Revisisted
Will Schroeder
•
4 years ago
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Cody Thomas
•
4 years ago
Охота на уязвимости Hadoop
Positive Hack Days
•
6 years ago
Security Analyst Workshop - 20200212
Florian Roth
•
4 years ago
Hunting for Privilege Escalation in Windows Environment
Teymur Kheirkhabarov
•
5 years ago
Level Up! - Practical Windows Privilege Escalation
jakx_
•
7 years ago
An ACE in the Hole - Stealthy Host Persistence via Security Descriptors
Will Schroeder
•
6 years ago
Windows Operating System Archaeology
enigma0x3
•
7 years ago
Malware analysis, threat intelligence and reverse engineering
bartblaze
•
6 years ago
Adversarial Post-Ex: Lessons From The Pros
Justin Warner
•
7 years ago
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Andy Robbins
•
7 years ago
External to DA, the OS X Way
Stephan Borosh
•
7 years ago
Protecting browsers’ secrets in a domain environment
Itai Grady
•
7 years ago
From zero to SYSTEM on full disk encrypted windows system
Nabeel Ahmed
•
7 years ago
Bridging the Gap: Lessons in Adversarial Tradecraft
enigma0x3
•
7 years ago
The Art of AV Evasion - Or Lack Thereof
CTruncer
•
7 years ago
Windows Privilege Escalation
Riyaz Walikar
•
8 years ago
When you don't have 0days: client-side exploitation for the masses
Michele Orru
•
10 years ago
Dark Fairytales from a Phisherman (Vol. II)
Michele Orru
•
8 years ago
Dark Fairytales from a Phisherman
Michele Orru
•
8 years ago