From BruCON 2015
Jump to: navigation, search

Showing below up to 96 results in range #41 to #136.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. Javascript for Pentesters with over 20 Challenges
  2. Jennifer Minella
  3. Joe Grand
  4. Johnny Vestergaard
  5. Joseph Tartaro
  6. Krzysztof Kotowicz
  7. Leigh Lytle
  8. Let's help law enforcement more to drag malware actors into the law
  9. Lightning Talks
  10. Linux Forensics Workshop
  11. Lukas Rist
  12. Machtelt Garrels
  13. Main Page
  14. Marios Kourtesis
  15. Markus Vervier
  16. Matt Hastings
  17. Matthew Halchyshak
  18. Michael Sikorski
  19. Network
  20. Network device forensics
  21. Noel Dunne
  22. OWASP: OWTF
  23. OWTF Botnet mode
  24. OWTF re-architecture
  25. Ocean Lam
  26. Ocean Lam (Hong Kong)
  27. Old School Crypto
  28. One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques
  29. Paco Hope
  30. Participate
  31. Party
  32. Pentesting Smart Grid and SCADA with SamuraiSTFU
  33. Philip Polstra
  34. Philip Polstra - Autonomous Remote Hacking Drones
  35. Photo Documentation
  36. Places to see
  37. Podcast meetup
  38. Podcasts
  39. Presentations
  40. Press
  41. Press Review
  42. Propaganda
  43. Ryan Dewhurst
  44. Ryan Kazanciyan
  45. Rzn
  46. Schedule
  47. Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software
  48. Snare
  49. Solomon Sonya
  50. Speaker's room
  51. Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
  52. Spring Training 2015 - Red Team Testing
  53. Stealing a Mobile Identity Using Wormholes
  54. The Bug Bash
  55. The Projects Of Prototype This
  56. The dirty secrets of client-side exploitation and protection
  57. Thunderbolts and Lightning / Very, Very Frightening
  58. Tickets
  59. Training
  60. Training 2015 - Assessing and Exploiting Control Systems
  61. Training 2015 - Cyber Breach Management
  62. Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more
  63. Training 2015 - Offensive IoT Exploitation
  64. Training 2015 - Practical Malware Analysis - Rapid Introduction
  65. Training 2015 - Tactical Exploitation and Response
  66. Training 2015 - Wireshark WiFi and Lua-Packet Class
  67. Training Advanced Wi-Fi Pentesting
  68. Training Corelan
  69. Training Digital Forensics with Open Source Tools
  70. Training Historical and Modern Cryptography for Security Professionals
  71. Training Injection
  72. Training Malware
  73. Training Mobile
  74. Training Offensive
  75. Training PDF
  76. Training Reversing
  77. Training SCADA
  78. Training Telco Security: Hacking Core Network Protocols and Beyond
  79. Training Web
  80. Travel
  81. Twitter
  82. Using Superpowers for Hardware Reverse Engineering
  83. Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft.
  84. Video
  85. Vivek Ramachandran
  86. Volunteers
  87. WPScan Vulnerability Database
  88. Weblogs
  89. Willi Ballenthin
  90. Wim Remes
  91. Windows Crash Dump Exploration
  92. Workshop Registration
  93. Workshops
  94. Xavier Mertens
  95. Xme
  96. Zoz

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)