From BruCON 2015
The following pages do not link to other pages in BruCON 2015.
Showing below up to 50 results in range #1 to #50.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- "The audit log was cleared" won’t stop me: Advanced Windows Event Log Forensics
- A distributed approach to mobile malware scanning
- Aaron Lemasters
- Adam Schoeman
- Adam Shostack
- Alaeddine Mesbahi
- Alessandro Fanio González
- Anti harassment
- Antonios Atlasis
- Arne Swinnen
- Autonomous Remote Hacking Drones
- Beer brewing workshop
- Bharadwaj Machiraju
- Biting into the forbidden fruit. Lessons from trusting JavaScript crypto
- Chiron - An All-In-One Penetration-Testing Framework for IPv6
- Chris Lytle
- Coming soon...
- Conpot
- Contact
- Counterfeiting the Pipes with FakeNet 2.0
- Cyber Necromancy: Resurrecting the Dead (Game Servers)
- DJ Jackalope
- DJ Jackalope (Las Vegas)
- DJ workshop
- Daan Raman
- Daniel Haslinger
- Daniela Zapata
- Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber
- Didier Stevens
- Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android
- Hacker Run
- Hacking Driverless Vehicles
- Hal Pomeranz
- Hendrik Adrian
- How to use SCHED.org
- Information Desk
- Investigating PowerShell Attacks
- Jake Valletta
- Javascript for Pentesters with over 20 Challenges
- Jennifer Minella
- Joe Grand
- Johnny Vestergaard
- Joseph Tartaro
- Krzysztof Kotowicz
- Leigh Lytle
- Let's help law enforcement more to drag malware actors into the law
- Lightning Talks
- Linux Forensics Workshop
- Lukas Rist
- Machtelt Garrels