From BruCON 2015
Showing below up to 50 results in range #61 to #110.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- Noel Dunne
- OWASP: OWTF
- OWTF Botnet mode
- OWTF re-architecture
- Ocean Lam
- Ocean Lam (Hong Kong)
- Old School Crypto
- One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques
- Paco Hope
- Participate
- Party
- Pentesting Smart Grid and SCADA with SamuraiSTFU
- Philip Polstra
- Philip Polstra - Autonomous Remote Hacking Drones
- Photo Documentation
- Places to see
- Podcast meetup
- Podcasts
- Presentations
- Press
- Press Review
- Propaganda
- Ryan Dewhurst
- Ryan Kazanciyan
- Rzn
- Schedule
- Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software
- Snare
- Solomon Sonya
- Speaker's room
- Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
- Spring Training 2015 - Red Team Testing
- Stealing a Mobile Identity Using Wormholes
- The Bug Bash
- The Projects Of Prototype This
- The dirty secrets of client-side exploitation and protection
- Thunderbolts and Lightning / Very, Very Frightening
- Tickets
- Training
- Training 2015 - Assessing and Exploiting Control Systems
- Training 2015 - Cyber Breach Management
- Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more
- Training 2015 - Offensive IoT Exploitation
- Training 2015 - Practical Malware Analysis - Rapid Introduction
- Training 2015 - Tactical Exploitation and Response
- Training 2015 - Wireshark WiFi and Lua-Packet Class
- Training Advanced Wi-Fi Pentesting
- Training Corelan
- Training Digital Forensics with Open Source Tools
- Training Historical and Modern Cryptography for Security Professionals