From BruCON 2015
- "The audit log was cleared" won’t stop me: Advanced Windows Event Log Forensics
- A distributed approach to mobile malware scanning
- Aaron Lemasters
- Adam Schoeman
- Adam Shostack
- Alaeddine Mesbahi
- Alessandro Fanio González
- Anti harassment
- Antonios Atlasis
- Arne Swinnen
- Autonomous Remote Hacking Drones
- Beer brewing workshop
- Bharadwaj Machiraju
- Biting into the forbidden fruit. Lessons from trusting JavaScript crypto
- Chiron - An All-In-One Penetration-Testing Framework for IPv6
- Chris Lytle
- Coming soon...
- Conpot
- Contact
- Counterfeiting the Pipes with FakeNet 2.0
- Cyber Necromancy: Resurrecting the Dead (Game Servers)
- DJ Jackalope
- DJ Jackalope (Las Vegas)
- DJ workshop
- Daan Raman
- Daniel Haslinger
- Daniela Zapata
- Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber
- Didier Stevens
- Events
- Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android
- Frequently Asked Questions
- Hacker Run
- Hacking Driverless Vehicles
- Hal Pomeranz
- Hendrik Adrian
- How to use SCHED.org
- Information Desk
- Investigating PowerShell Attacks
- Jake Valletta
- Javascript for Pentesters with over 20 Challenges
- Jennifer Minella
- Joe Grand
- Johnny Vestergaard
- Joseph Tartaro
- Krzysztof Kotowicz
- Leigh Lytle
- Let's help law enforcement more to drag malware actors into the law
- Lightning Talks
- Linux Forensics Workshop
- Lukas Rist
- Machtelt Garrels
- Main Page
- Marios Kourtesis
- Markus Vervier
- Matt Hastings
- Matthew Halchyshak
- Michael Sikorski
- Network
- Network device forensics
- Noel Dunne
- OWASP: OWTF
- OWTF Botnet mode
- OWTF re-architecture
- Ocean Lam
- Ocean Lam (Hong Kong)
- Old School Crypto
- One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques
- Paco Hope
- Participate
- Party
- Pentesting Smart Grid and SCADA with SamuraiSTFU
- Philip Polstra
- Philip Polstra - Autonomous Remote Hacking Drones
- Photo Documentation
- Places to see
- Podcast meetup
- Podcasts
- Presentations
- Press
- Press Review
- Propaganda
- Ryan Dewhurst
- Ryan Kazanciyan
- Rzn
- Schedule
- Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software
- Snare
- Solomon Sonya
- Speaker's room
- Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
- Spring Training 2015 - Red Team Testing
- Stealing a Mobile Identity Using Wormholes
- The Bug Bash
- The Projects Of Prototype This
- The dirty secrets of client-side exploitation and protection
- Thunderbolts and Lightning / Very, Very Frightening
- Tickets
- Training
- Training 2015 - Assessing and Exploiting Control Systems
- Training 2015 - Cyber Breach Management
- Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more
- Training 2015 - Offensive IoT Exploitation
- Training 2015 - Practical Malware Analysis - Rapid Introduction
- Training 2015 - Tactical Exploitation and Response
- Training 2015 - Wireshark WiFi and Lua-Packet Class
- Training Advanced Wi-Fi Pentesting
- Training Corelan
- Training Digital Forensics with Open Source Tools
- Training Historical and Modern Cryptography for Security Professionals
- Training Injection
- Training Malware
- Training Mobile
- Training Offensive
- Training PDF
- Training Reversing
- Training SCADA
- Training Telco Security: Hacking Core Network Protocols and Beyond
- Training Web
- Travel
- Using Superpowers for Hardware Reverse Engineering
- Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft.
- Video
- Vivek Ramachandran
- Volunteers
- WPScan Vulnerability Database
- Weblogs
- Willi Ballenthin
- Wim Remes
- Windows Crash Dump Exploration
- Workshop Registration
- Workshops
- Xavier Mertens
- Xme
- Zoz