From BruCON 2015
The following pages are not linked from or transcluded into other pages in BruCON 2015.
Showing below up to 20 results in range #61 to #80.
View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)
- Philip Polstra
- Ryan Dewhurst
- Ryan Kazanciyan
- Rzn
- Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software
- Snare
- Solomon Sonya
- Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
- Spring Training 2015 - Red Team Testing
- Stealing a Mobile Identity Using Wormholes
- The Bug Bash
- The Projects Of Prototype This
- The dirty secrets of client-side exploitation and protection
- Thunderbolts and Lightning / Very, Very Frightening
- Training 2015 - Cyber Breach Management
- Training Advanced Wi-Fi Pentesting
- Training Corelan
- Training Digital Forensics with Open Source Tools
- Training Historical and Modern Cryptography for Security Professionals
- Training Injection