From BruCON 2015
Jump to: navigation, search

Showing below up to 50 results in range #51 to #100.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Philip Polstra‏‎ (00:27, 27 August 2014)
  2. Autonomous Remote Hacking Drones‏‎ (00:27, 27 August 2014)
  3. Linux Forensics Workshop‏‎ (00:29, 27 August 2014)
  4. Hal Pomeranz‏‎ (00:29, 27 August 2014)
  5. Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber‏‎ (00:31, 27 August 2014)
  6. Adam Schoeman‏‎ (00:31, 27 August 2014)
  7. Counterfeiting the Pipes with FakeNet 2.0‏‎ (00:34, 27 August 2014)
  8. Michael Sikorski‏‎ (00:35, 27 August 2014)
  9. Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network‏‎ (00:36, 27 August 2014)
  10. Solomon Sonya‏‎ (00:36, 27 August 2014)
  11. Training Digital Forensics with Open Source Tools‏‎ (10:59, 8 September 2014)
  12. Hendrik Adrian‏‎ (21:10, 9 September 2014)
  13. Let's help law enforcement more to drag malware actors into the law‏‎ (21:11, 9 September 2014)
  14. Markus Vervier‏‎ (21:29, 9 September 2014)
  15. Stealing a Mobile Identity Using Wormholes‏‎ (21:31, 9 September 2014)
  16. Jake Valletta‏‎ (21:33, 9 September 2014)
  17. Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android‏‎ (21:33, 9 September 2014)
  18. Didier Stevens‏‎ (21:34, 9 September 2014)
  19. Network device forensics‏‎ (21:35, 9 September 2014)
  20. Xavier Mertens‏‎ (21:36, 9 September 2014)
  21. Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft.‏‎ (21:37, 9 September 2014)
  22. Thunderbolts and Lightning / Very, Very Frightening‏‎ (21:39, 9 September 2014)
  23. Snare‏‎ (21:40, 9 September 2014)
  24. Wim Remes‏‎ (21:42, 9 September 2014)
  25. Daniela Zapata‏‎ (21:42, 9 September 2014)
  26. The dirty secrets of client-side exploitation and protection‏‎ (21:43, 9 September 2014)
  27. Daan Raman‏‎ (21:44, 9 September 2014)
  28. A distributed approach to mobile malware scanning‏‎ (21:45, 9 September 2014)
  29. Vivek Ramachandran‏‎ (21:46, 9 September 2014)
  30. Javascript for Pentesters with over 20 Challenges‏‎ (21:46, 9 September 2014)
  31. Chris Lytle‏‎ (21:49, 9 September 2014)
  32. Leigh Lytle‏‎ (21:52, 9 September 2014)
  33. Old School Crypto‏‎ (21:53, 9 September 2014)
  34. OWASP: OWTF‏‎ (21:54, 9 September 2014)
  35. Bharadwaj Machiraju‏‎ (21:55, 9 September 2014)
  36. OWTF Botnet mode‏‎ (21:57, 9 September 2014)
  37. Marios Kourtesis‏‎ (21:58, 9 September 2014)
  38. Conpot‏‎ (21:59, 9 September 2014)
  39. Daniel Haslinger‏‎ (22:00, 9 September 2014)
  40. Lukas Rist‏‎ (22:00, 9 September 2014)
  41. Johnny Vestergaard‏‎ (22:01, 9 September 2014)
  42. Beer brewing workshop‏‎ (22:04, 9 September 2014)
  43. Machtelt Garrels‏‎ (22:05, 9 September 2014)
  44. OWTF re-architecture‏‎ (22:06, 9 September 2014)
  45. Alessandro Fanio González‏‎ (22:06, 9 September 2014)
  46. Paco Hope‏‎ (22:12, 9 September 2014)
  47. Noel Dunne‏‎ (22:12, 9 September 2014)
  48. Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software‏‎ (22:13, 9 September 2014)
  49. WPScan Vulnerability Database‏‎ (22:14, 9 September 2014)
  50. Ryan Dewhurst‏‎ (22:14, 9 September 2014)

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)