From BruCON 2015
Jump to: navigation, search

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. "The audit log was cleared" won’t stop me: Advanced Windows Event Log Forensics
  2. A distributed approach to mobile malware scanning
  3. Aaron Lemasters
  4. Adam Schoeman
  5. Adam Shostack
  6. Alaeddine Mesbahi
  7. Alessandro Fanio González
  8. Anti harassment
  9. Antonios Atlasis
  10. Arne Swinnen
  11. Autonomous Remote Hacking Drones
  12. Beer brewing workshop
  13. Bharadwaj Machiraju
  14. Biting into the forbidden fruit. Lessons from trusting JavaScript crypto
  15. Chiron - An All-In-One Penetration-Testing Framework for IPv6
  16. Chris Lytle
  17. Coming soon...
  18. Conpot
  19. Contact
  20. Counterfeiting the Pipes with FakeNet 2.0
  21. Cyber Necromancy: Resurrecting the Dead (Game Servers)
  22. DJ Jackalope
  23. DJ Jackalope (Las Vegas)
  24. DJ workshop
  25. Daan Raman
  26. Daniel Haslinger
  27. Daniela Zapata
  28. Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber
  29. Didier Stevens
  30. Events
  31. Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android
  32. Frequently Asked Questions
  33. Hacker Run
  34. Hacking Driverless Vehicles
  35. Hal Pomeranz
  36. Hendrik Adrian
  37. How to use SCHED.org
  38. Information Desk
  39. Investigating PowerShell Attacks
  40. Jake Valletta
  41. Javascript for Pentesters with over 20 Challenges
  42. Jennifer Minella
  43. Joe Grand
  44. Johnny Vestergaard
  45. Joseph Tartaro
  46. Krzysztof Kotowicz
  47. Leigh Lytle
  48. Let's help law enforcement more to drag malware actors into the law
  49. Lightning Talks
  50. Linux Forensics Workshop

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)