From BruCON 2015
Jump to: navigation, search

The following pages are not linked from or transcluded into other pages in BruCON 2015.

Showing below up to 99 results in range #1 to #99.

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)

  1. "The audit log was cleared" won’t stop me: Advanced Windows Event Log Forensics
  2. A distributed approach to mobile malware scanning
  3. Aaron Lemasters
  4. Adam Schoeman
  5. Adam Shostack
  6. Alaeddine Mesbahi
  7. Alessandro Fanio González
  8. Antonios Atlasis
  9. Arne Swinnen
  10. Autonomous Remote Hacking Drones
  11. Beer brewing workshop
  12. Bharadwaj Machiraju
  13. Biting into the forbidden fruit. Lessons from trusting JavaScript crypto
  14. Chiron - An All-In-One Penetration-Testing Framework for IPv6
  15. Chris Lytle
  16. Coming soon...
  17. Conpot
  18. Counterfeiting the Pipes with FakeNet 2.0
  19. Cyber Necromancy: Resurrecting the Dead (Game Servers)
  20. DJ Jackalope
  21. DJ Jackalope (Las Vegas)
  22. DJ workshop
  23. Daan Raman
  24. Daniel Haslinger
  25. Daniela Zapata
  26. Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber
  27. Didier Stevens
  28. Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android
  29. Hacking Driverless Vehicles
  30. Hal Pomeranz
  31. Hendrik Adrian
  32. Investigating PowerShell Attacks
  33. Jake Valletta
  34. Javascript for Pentesters with over 20 Challenges
  35. Jennifer Minella
  36. Joe Grand
  37. Johnny Vestergaard
  38. Joseph Tartaro
  39. Krzysztof Kotowicz
  40. Leigh Lytle
  41. Let's help law enforcement more to drag malware actors into the law
  42. Linux Forensics Workshop
  43. Lukas Rist
  44. Machtelt Garrels
  45. Main Page
  46. Marios Kourtesis
  47. Markus Vervier
  48. Matt Hastings
  49. Matthew Halchyshak
  50. Michael Sikorski
  51. Network device forensics
  52. Noel Dunne
  53. OWASP: OWTF
  54. OWTF Botnet mode
  55. OWTF re-architecture
  56. Ocean Lam
  57. Ocean Lam (Hong Kong)
  58. Old School Crypto
  59. One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques
  60. Paco Hope
  61. Philip Polstra
  62. Ryan Dewhurst
  63. Ryan Kazanciyan
  64. Rzn
  65. Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software
  66. Snare
  67. Solomon Sonya
  68. Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
  69. Spring Training 2015 - Red Team Testing
  70. Stealing a Mobile Identity Using Wormholes
  71. The Bug Bash
  72. The Projects Of Prototype This
  73. The dirty secrets of client-side exploitation and protection
  74. Thunderbolts and Lightning / Very, Very Frightening
  75. Training 2015 - Cyber Breach Management
  76. Training Advanced Wi-Fi Pentesting
  77. Training Corelan
  78. Training Digital Forensics with Open Source Tools
  79. Training Historical and Modern Cryptography for Security Professionals
  80. Training Injection
  81. Training Malware
  82. Training Mobile
  83. Training Offensive
  84. Training PDF
  85. Training Reversing
  86. Training SCADA
  87. Training Telco Security: Hacking Core Network Protocols and Beyond
  88. Training Web
  89. Using Superpowers for Hardware Reverse Engineering
  90. Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft.
  91. Vivek Ramachandran
  92. WPScan Vulnerability Database
  93. Willi Ballenthin
  94. Wim Remes
  95. Windows Crash Dump Exploration
  96. Workshops
  97. Xavier Mertens
  98. Xme
  99. Zoz

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)