From BruCON 2015
Jump to: navigation, search

Showing below up to 136 results in range #1 to #136.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. "The audit log was cleared" won’t stop me: Advanced Windows Event Log Forensics
  2. A distributed approach to mobile malware scanning
  3. Aaron Lemasters
  4. Adam Schoeman
  5. Adam Shostack
  6. Alaeddine Mesbahi
  7. Alessandro Fanio González
  8. Anti harassment
  9. Antonios Atlasis
  10. Arne Swinnen
  11. Autonomous Remote Hacking Drones
  12. Beer brewing workshop
  13. Bharadwaj Machiraju
  14. Biting into the forbidden fruit. Lessons from trusting JavaScript crypto
  15. Chiron - An All-In-One Penetration-Testing Framework for IPv6
  16. Chris Lytle
  17. Coming soon...
  18. Conpot
  19. Contact
  20. Counterfeiting the Pipes with FakeNet 2.0
  21. Cyber Necromancy: Resurrecting the Dead (Game Servers)
  22. DJ Jackalope
  23. DJ Jackalope (Las Vegas)
  24. DJ workshop
  25. Daan Raman
  26. Daniel Haslinger
  27. Daniela Zapata
  28. Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber
  29. Didier Stevens
  30. Events
  31. Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android
  32. Frequently Asked Questions
  33. Hacker Run
  34. Hacking Driverless Vehicles
  35. Hal Pomeranz
  36. Hendrik Adrian
  37. How to use SCHED.org
  38. Information Desk
  39. Investigating PowerShell Attacks
  40. Jake Valletta
  41. Javascript for Pentesters with over 20 Challenges
  42. Jennifer Minella
  43. Joe Grand
  44. Johnny Vestergaard
  45. Joseph Tartaro
  46. Krzysztof Kotowicz
  47. Leigh Lytle
  48. Let's help law enforcement more to drag malware actors into the law
  49. Lightning Talks
  50. Linux Forensics Workshop
  51. Lukas Rist
  52. Machtelt Garrels
  53. Main Page
  54. Marios Kourtesis
  55. Markus Vervier
  56. Matt Hastings
  57. Matthew Halchyshak
  58. Michael Sikorski
  59. Network
  60. Network device forensics
  61. Noel Dunne
  62. OWASP: OWTF
  63. OWTF Botnet mode
  64. OWTF re-architecture
  65. Ocean Lam
  66. Ocean Lam (Hong Kong)
  67. Old School Crypto
  68. One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques
  69. Paco Hope
  70. Participate
  71. Party
  72. Pentesting Smart Grid and SCADA with SamuraiSTFU
  73. Philip Polstra
  74. Philip Polstra - Autonomous Remote Hacking Drones
  75. Photo Documentation
  76. Places to see
  77. Podcast meetup
  78. Podcasts
  79. Presentations
  80. Press
  81. Press Review
  82. Propaganda
  83. Ryan Dewhurst
  84. Ryan Kazanciyan
  85. Rzn
  86. Schedule
  87. Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software
  88. Snare
  89. Solomon Sonya
  90. Speaker's room
  91. Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
  92. Spring Training 2015 - Red Team Testing
  93. Stealing a Mobile Identity Using Wormholes
  94. The Bug Bash
  95. The Projects Of Prototype This
  96. The dirty secrets of client-side exploitation and protection
  97. Thunderbolts and Lightning / Very, Very Frightening
  98. Tickets
  99. Training
  100. Training 2015 - Assessing and Exploiting Control Systems
  101. Training 2015 - Cyber Breach Management
  102. Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more
  103. Training 2015 - Offensive IoT Exploitation
  104. Training 2015 - Practical Malware Analysis - Rapid Introduction
  105. Training 2015 - Tactical Exploitation and Response
  106. Training 2015 - Wireshark WiFi and Lua-Packet Class
  107. Training Advanced Wi-Fi Pentesting
  108. Training Corelan
  109. Training Digital Forensics with Open Source Tools
  110. Training Historical and Modern Cryptography for Security Professionals
  111. Training Injection
  112. Training Malware
  113. Training Mobile
  114. Training Offensive
  115. Training PDF
  116. Training Reversing
  117. Training SCADA
  118. Training Telco Security: Hacking Core Network Protocols and Beyond
  119. Training Web
  120. Travel
  121. Twitter
  122. Using Superpowers for Hardware Reverse Engineering
  123. Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft.
  124. Video
  125. Vivek Ramachandran
  126. Volunteers
  127. WPScan Vulnerability Database
  128. Weblogs
  129. Willi Ballenthin
  130. Wim Remes
  131. Windows Crash Dump Exploration
  132. Workshop Registration
  133. Workshops
  134. Xavier Mertens
  135. Xme
  136. Zoz

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)