From BruCON 2015
Jump to: navigation, search

The following pages do not link to other pages in BruCON 2015.

Showing below up to 100 results in range #1 to #100.

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)

  1. "The audit log was cleared" won’t stop me: Advanced Windows Event Log Forensics
  2. A distributed approach to mobile malware scanning
  3. Aaron Lemasters
  4. Adam Schoeman
  5. Adam Shostack
  6. Alaeddine Mesbahi
  7. Alessandro Fanio González
  8. Anti harassment
  9. Antonios Atlasis
  10. Arne Swinnen
  11. Autonomous Remote Hacking Drones
  12. Beer brewing workshop
  13. Bharadwaj Machiraju
  14. Biting into the forbidden fruit. Lessons from trusting JavaScript crypto
  15. Chiron - An All-In-One Penetration-Testing Framework for IPv6
  16. Chris Lytle
  17. Coming soon...
  18. Conpot
  19. Contact
  20. Counterfeiting the Pipes with FakeNet 2.0
  21. Cyber Necromancy: Resurrecting the Dead (Game Servers)
  22. DJ Jackalope
  23. DJ Jackalope (Las Vegas)
  24. DJ workshop
  25. Daan Raman
  26. Daniel Haslinger
  27. Daniela Zapata
  28. Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber
  29. Didier Stevens
  30. Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android
  31. Hacker Run
  32. Hacking Driverless Vehicles
  33. Hal Pomeranz
  34. Hendrik Adrian
  35. How to use SCHED.org
  36. Information Desk
  37. Investigating PowerShell Attacks
  38. Jake Valletta
  39. Javascript for Pentesters with over 20 Challenges
  40. Jennifer Minella
  41. Joe Grand
  42. Johnny Vestergaard
  43. Joseph Tartaro
  44. Krzysztof Kotowicz
  45. Leigh Lytle
  46. Let's help law enforcement more to drag malware actors into the law
  47. Lightning Talks
  48. Linux Forensics Workshop
  49. Lukas Rist
  50. Machtelt Garrels
  51. Marios Kourtesis
  52. Markus Vervier
  53. Matt Hastings
  54. Matthew Halchyshak
  55. Michael Sikorski
  56. Network
  57. Network device forensics
  58. Noel Dunne
  59. OWASP: OWTF
  60. OWTF Botnet mode
  61. OWTF re-architecture
  62. Ocean Lam
  63. Ocean Lam (Hong Kong)
  64. Old School Crypto
  65. One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques
  66. Paco Hope
  67. Party
  68. Philip Polstra
  69. Philip Polstra - Autonomous Remote Hacking Drones
  70. Photo Documentation
  71. Places to see
  72. Podcast meetup
  73. Podcasts
  74. Press
  75. Press Review
  76. Propaganda
  77. Ryan Dewhurst
  78. Ryan Kazanciyan
  79. Rzn
  80. Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software
  81. Snare
  82. Solomon Sonya
  83. Speaker's room
  84. Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
  85. Stealing a Mobile Identity Using Wormholes
  86. The Bug Bash
  87. The Projects Of Prototype This
  88. The dirty secrets of client-side exploitation and protection
  89. Thunderbolts and Lightning / Very, Very Frightening
  90. Travel
  91. Twitter
  92. Using Superpowers for Hardware Reverse Engineering
  93. Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft.
  94. Video
  95. Vivek Ramachandran
  96. WPScan Vulnerability Database
  97. Weblogs
  98. Willi Ballenthin
  99. Wim Remes
  100. Windows Crash Dump Exploration

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)