From BruCON 2015
Jump to: navigation, search

The following pages are not linked from or transcluded into other pages in BruCON 2015.

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. "The audit log was cleared" won’t stop me: Advanced Windows Event Log Forensics
  2. A distributed approach to mobile malware scanning
  3. Aaron Lemasters
  4. Adam Schoeman
  5. Adam Shostack
  6. Alaeddine Mesbahi
  7. Alessandro Fanio González
  8. Antonios Atlasis
  9. Arne Swinnen
  10. Autonomous Remote Hacking Drones
  11. Beer brewing workshop
  12. Bharadwaj Machiraju
  13. Biting into the forbidden fruit. Lessons from trusting JavaScript crypto
  14. Chiron - An All-In-One Penetration-Testing Framework for IPv6
  15. Chris Lytle
  16. Coming soon...
  17. Conpot
  18. Counterfeiting the Pipes with FakeNet 2.0
  19. Cyber Necromancy: Resurrecting the Dead (Game Servers)
  20. DJ Jackalope
  21. DJ Jackalope (Las Vegas)
  22. DJ workshop
  23. Daan Raman
  24. Daniel Haslinger
  25. Daniela Zapata
  26. Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber
  27. Didier Stevens
  28. Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android
  29. Hacking Driverless Vehicles
  30. Hal Pomeranz
  31. Hendrik Adrian
  32. Investigating PowerShell Attacks
  33. Jake Valletta
  34. Javascript for Pentesters with over 20 Challenges
  35. Jennifer Minella
  36. Joe Grand
  37. Johnny Vestergaard
  38. Joseph Tartaro
  39. Krzysztof Kotowicz
  40. Leigh Lytle
  41. Let's help law enforcement more to drag malware actors into the law
  42. Linux Forensics Workshop
  43. Lukas Rist
  44. Machtelt Garrels
  45. Main Page
  46. Marios Kourtesis
  47. Markus Vervier
  48. Matt Hastings
  49. Matthew Halchyshak
  50. Michael Sikorski

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)