From BruCON 2015
Jump to: navigation, search

The following pages are not linked from or transcluded into other pages in BruCON 2015.

Showing below up to 79 results in range #21 to #99.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. DJ Jackalope (Las Vegas)
  2. DJ workshop
  3. Daan Raman
  4. Daniel Haslinger
  5. Daniela Zapata
  6. Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber
  7. Didier Stevens
  8. Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android
  9. Hacking Driverless Vehicles
  10. Hal Pomeranz
  11. Hendrik Adrian
  12. Investigating PowerShell Attacks
  13. Jake Valletta
  14. Javascript for Pentesters with over 20 Challenges
  15. Jennifer Minella
  16. Joe Grand
  17. Johnny Vestergaard
  18. Joseph Tartaro
  19. Krzysztof Kotowicz
  20. Leigh Lytle
  21. Let's help law enforcement more to drag malware actors into the law
  22. Linux Forensics Workshop
  23. Lukas Rist
  24. Machtelt Garrels
  25. Main Page
  26. Marios Kourtesis
  27. Markus Vervier
  28. Matt Hastings
  29. Matthew Halchyshak
  30. Michael Sikorski
  31. Network device forensics
  32. Noel Dunne
  33. OWASP: OWTF
  34. OWTF Botnet mode
  35. OWTF re-architecture
  36. Ocean Lam
  37. Ocean Lam (Hong Kong)
  38. Old School Crypto
  39. One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques
  40. Paco Hope
  41. Philip Polstra
  42. Ryan Dewhurst
  43. Ryan Kazanciyan
  44. Rzn
  45. Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software
  46. Snare
  47. Solomon Sonya
  48. Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
  49. Spring Training 2015 - Red Team Testing
  50. Stealing a Mobile Identity Using Wormholes
  51. The Bug Bash
  52. The Projects Of Prototype This
  53. The dirty secrets of client-side exploitation and protection
  54. Thunderbolts and Lightning / Very, Very Frightening
  55. Training 2015 - Cyber Breach Management
  56. Training Advanced Wi-Fi Pentesting
  57. Training Corelan
  58. Training Digital Forensics with Open Source Tools
  59. Training Historical and Modern Cryptography for Security Professionals
  60. Training Injection
  61. Training Malware
  62. Training Mobile
  63. Training Offensive
  64. Training PDF
  65. Training Reversing
  66. Training SCADA
  67. Training Telco Security: Hacking Core Network Protocols and Beyond
  68. Training Web
  69. Using Superpowers for Hardware Reverse Engineering
  70. Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft.
  71. Vivek Ramachandran
  72. WPScan Vulnerability Database
  73. Willi Ballenthin
  74. Wim Remes
  75. Windows Crash Dump Exploration
  76. Workshops
  77. Xavier Mertens
  78. Xme
  79. Zoz

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)