From BruCON 2015
Jump to: navigation, search

Showing below up to 100 results in range #1 to #100.

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)

  1. "The audit log was cleared" won’t stop me: Advanced Windows Event Log Forensics
  2. A distributed approach to mobile malware scanning
  3. Aaron Lemasters
  4. Adam Schoeman
  5. Adam Shostack
  6. Alaeddine Mesbahi
  7. Alessandro Fanio González
  8. Anti harassment
  9. Antonios Atlasis
  10. Arne Swinnen
  11. Autonomous Remote Hacking Drones
  12. Beer brewing workshop
  13. Bharadwaj Machiraju
  14. Biting into the forbidden fruit. Lessons from trusting JavaScript crypto
  15. Chiron - An All-In-One Penetration-Testing Framework for IPv6
  16. Chris Lytle
  17. Coming soon...
  18. Conpot
  19. Contact
  20. Counterfeiting the Pipes with FakeNet 2.0
  21. Cyber Necromancy: Resurrecting the Dead (Game Servers)
  22. DJ Jackalope
  23. DJ Jackalope (Las Vegas)
  24. DJ workshop
  25. Daan Raman
  26. Daniel Haslinger
  27. Daniela Zapata
  28. Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber
  29. Didier Stevens
  30. Events
  31. Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android
  32. Frequently Asked Questions
  33. Hacker Run
  34. Hacking Driverless Vehicles
  35. Hal Pomeranz
  36. Hendrik Adrian
  37. How to use SCHED.org
  38. Information Desk
  39. Investigating PowerShell Attacks
  40. Jake Valletta
  41. Javascript for Pentesters with over 20 Challenges
  42. Jennifer Minella
  43. Joe Grand
  44. Johnny Vestergaard
  45. Joseph Tartaro
  46. Krzysztof Kotowicz
  47. Leigh Lytle
  48. Let's help law enforcement more to drag malware actors into the law
  49. Lightning Talks
  50. Linux Forensics Workshop
  51. Lukas Rist
  52. Machtelt Garrels
  53. Main Page
  54. Marios Kourtesis
  55. Markus Vervier
  56. Matt Hastings
  57. Matthew Halchyshak
  58. Michael Sikorski
  59. Network
  60. Network device forensics
  61. Noel Dunne
  62. OWASP: OWTF
  63. OWTF Botnet mode
  64. OWTF re-architecture
  65. Ocean Lam
  66. Ocean Lam (Hong Kong)
  67. Old School Crypto
  68. One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques
  69. Paco Hope
  70. Participate
  71. Party
  72. Pentesting Smart Grid and SCADA with SamuraiSTFU
  73. Philip Polstra
  74. Philip Polstra - Autonomous Remote Hacking Drones
  75. Photo Documentation
  76. Places to see
  77. Podcast meetup
  78. Podcasts
  79. Presentations
  80. Press
  81. Press Review
  82. Propaganda
  83. Ryan Dewhurst
  84. Ryan Kazanciyan
  85. Rzn
  86. Schedule
  87. Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software
  88. Snare
  89. Solomon Sonya
  90. Speaker's room
  91. Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
  92. Spring Training 2015 - Red Team Testing
  93. Stealing a Mobile Identity Using Wormholes
  94. The Bug Bash
  95. The Projects Of Prototype This
  96. The dirty secrets of client-side exploitation and protection
  97. Thunderbolts and Lightning / Very, Very Frightening
  98. Tickets
  99. Training
  100. Training 2015 - Assessing and Exploiting Control Systems

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)