From BruCON 2015
Jump to: navigation, search

The following pages are not linked from or transcluded into other pages in BruCON 2015.

Showing below up to 49 results in range #51 to #99.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. Network device forensics
  2. Noel Dunne
  3. OWASP: OWTF
  4. OWTF Botnet mode
  5. OWTF re-architecture
  6. Ocean Lam
  7. Ocean Lam (Hong Kong)
  8. Old School Crypto
  9. One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques
  10. Paco Hope
  11. Philip Polstra
  12. Ryan Dewhurst
  13. Ryan Kazanciyan
  14. Rzn
  15. Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software
  16. Snare
  17. Solomon Sonya
  18. Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
  19. Spring Training 2015 - Red Team Testing
  20. Stealing a Mobile Identity Using Wormholes
  21. The Bug Bash
  22. The Projects Of Prototype This
  23. The dirty secrets of client-side exploitation and protection
  24. Thunderbolts and Lightning / Very, Very Frightening
  25. Training 2015 - Cyber Breach Management
  26. Training Advanced Wi-Fi Pentesting
  27. Training Corelan
  28. Training Digital Forensics with Open Source Tools
  29. Training Historical and Modern Cryptography for Security Professionals
  30. Training Injection
  31. Training Malware
  32. Training Mobile
  33. Training Offensive
  34. Training PDF
  35. Training Reversing
  36. Training SCADA
  37. Training Telco Security: Hacking Core Network Protocols and Beyond
  38. Training Web
  39. Using Superpowers for Hardware Reverse Engineering
  40. Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft.
  41. Vivek Ramachandran
  42. WPScan Vulnerability Database
  43. Willi Ballenthin
  44. Wim Remes
  45. Windows Crash Dump Exploration
  46. Workshops
  47. Xavier Mertens
  48. Xme
  49. Zoz

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)