Likes
(89)
See all
Dynamic binary analysis using angr siddharth muralee
Cysinfo Cyber Security Community
•
5 years ago
Smart irrigation - IoT 2019 Sapienza University
LeonardoSarra
•
3 years ago
Bo0oM - Deanonymization and total espionage (ZeroNights, 2014)
Дмитрий Бумов
•
8 years ago
Dmitry Schelkunov, Vasily Bukasov - About practical deobfuscation
DefconRussia
•
11 years ago
On deobfuscation in practice
Dmitry Schelkunov
•
11 years ago
台科逆向簡報
耀德 蔡
•
7 years ago
SNIFFING ROUTES TO PWNAGE: AN INTRO TO BLOODHOUND
Andrew Gill
•
3 years ago
Bsides Leeds - hacker of all master of none.pptx (1)
Andrew Gill
•
5 years ago
SteelCon 2018 Breaking Into Information Security by Andy Gill
Andrew Gill
•
4 years ago
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Cysinfo Cyber Security Community
•
3 years ago
Top Ten Web Hacking Techniques of 2012
Jeremiah Grossman
•
9 years ago
Top 10 Web Hacks 2013
Matt Johansen
•
8 years ago
Zero Day Malware Detection/Prevention Using Open Source Software
MyNOG
•
7 years ago
I Know Your P4$$w0rd (And If I Don't, I Will Guess It...)
Jaime Sánchez
•
3 years ago
How i cracked millions of “pt br” hashed passwords
Nullbyte Security Conference
•
6 years ago
Advanced mainframe hacking
Philip Young
•
6 years ago
Little book of big motivational quotes sidsavara
Professor JRuiz
•
9 years ago
Do The IMPOSSIBLE
David Crandall
•
11 years ago
Cours de Gestion du temps
Echecs et Stratégie
•
4 years ago
Adversarial machine learning for av software
junseok seo
•
5 years ago
What Can Reverse Engineering Do For You?
Amanda Rousseau
•
5 years ago
「Tsurugi Linux」プレゼンテーションAVTOKYO2018
unixfreaxjp
•
4 years ago
nullcon 2011 - Automatic Program Analysis using Dynamic Binary Instrumentation
n|u - The Open Security Community
•
11 years ago
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
Tobias Koprowski
•
7 years ago
SANS Holiday Hack 2017 (非公式ガイド)
Isaac Mathis
•
5 years ago
Recon-ng
Nutan Kumar Panda
•
7 years ago
Escalating Privileges in Linux using Voltage Fault Injection
Riscure
•
5 years ago
Client side attacks using PowerShell
Nikhil Mittal
•
8 years ago
Cleartext and PtH still alive
camsec
•
5 years ago
Custom Rules & Broken Tools (Password Cracking)
camsec
•
5 years ago
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
•
6 years ago
objection - runtime mobile exploration
SensePost
•
5 years ago
A Threat Hunter Himself
Teymur Kheirkhabarov
•
6 years ago
Help Doctor, my application is an onion!
Sebastián Guerrero Selma
•
7 years ago
I Have the Power(View)
Will Schroeder
•
6 years ago
How to Become an InfoSec Autodidact
Kelly Shortridge
•
6 years ago
DIY Education in Cyber Security
Kelly Shortridge
•
7 years ago
Cyber Education: Your Options & Resources Mapped Out
Kelly Shortridge
•
8 years ago
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
Francesco Faenzi
•
5 years ago
Email keeps getting us pwned v1.1
Michael Gough
•
5 years ago
Windows Privilege Escalation
Riyaz Walikar
•
7 years ago
Windows Kernel Debugging
Thomas Roccia
•
6 years ago
Ln monitoring repositories
snyff
•
9 years ago
Secret of Intel Management Engine by Igor Skochinsky
CODE BLUE
•
8 years ago
Study on Android Emulator
Samael Wang
•
7 years ago
A Child Like Approach to Grid Cybersecurity
Robert M. Lee
•
6 years ago
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) - Defcon 25
Chris Thompson
•
5 years ago
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
Gal Bitensky
•
6 years ago
Malware Evasion Techniques
Thomas Roccia
•
5 years ago
Exploiting the Recruitment Process
jasonjfrank
•
6 years ago
DefCamp 2013 - Peering in the Soul of Hackers: HPP V2.0 reloaded
DefCamp
•
9 years ago
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
n|u - The Open Security Community
•
11 years ago
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov
•
6 years ago
Lie to Me: Bypassing Modern Web Application Firewalls
Ivan Novikov
•
9 years ago
SANS @Night Talk: SQL Injection Exploited
Micah Hoffman
•
8 years ago
Staying Safe - Overview of FREE Encryption Tools
Micky Metts
•
7 years ago
Machine Learning Model Bakeoff
mrphilroth
•
5 years ago
OPSEC - Amanece que no es poco
David Barroso
•
7 years ago
Rob "Mubix" Fuller: Attacker Ghost Stories
Area41
•
8 years ago
[Confidence 2016] Red Team - najlepszy przyjaciel Blue Teamu
Piotr Kaźmierczak
•
6 years ago
amrapali builders @@hacking printers.pdf
amrapalibuildersreviews
•
8 years ago
NIC 2017 - Attack and detection in Windows Environments
Oddvar Moe
•
5 years ago
HTTP For the Good or the Bad
Xavier Mertens
•
5 years ago
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Sam Bowne
•
6 years ago
Exploitation and State Machines
Michael Scovetta
•
11 years ago
Moving Anti-Malware Research Forward (Fraser)
Michael Scovetta
•
11 years ago
Anomaly Detection at Multiple Scales (Waltzman)
Michael Scovetta
•
11 years ago
Secure Computer Systems (Shrobe)
Michael Scovetta
•
11 years ago
Modern Kernel Pool Exploitation: Attacks and Techniques
Michael Scovetta
•
11 years ago
MELJUN CORTES ICT security communication_security_cryptography
MELJUN CORTES
•
6 years ago
Bezprzewodowe niebezpieczeństwo (TAPT 2016)
Adam Ziaja
•
6 years ago
Windows Operating System Archaeology
enigma0x3
•
5 years ago
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
•
7 years ago
Application Layer DDoS-A Practical Approach & Mitigation Techniques
Fakrul Alam
•
8 years ago
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Priyanka Aash
•
8 years ago
Defcon 22-gregory-pickett-abusing-software-defined-networks
Priyanka Aash
•
8 years ago
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
Priyanka Aash
•
8 years ago
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Priyanka Aash
•
8 years ago
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Priyanka Aash
•
8 years ago
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Priyanka Aash
•
8 years ago
Security Ninjas: An Open Source Application Security Training Program
OpenDNS
•
7 years ago
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Description
bugcrowd
•
7 years ago
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci
•
7 years ago
IDA ユーザなら知っておくべきマントノン侯爵夫人にモテる 7つの法則
勇 中津留
•
8 years ago
Malwat4 20130223 analyzing_android_malware
Ayase
•
9 years ago
Introducing Intelligence Into Your Malware Analysis
Brian Baskin
•
9 years ago
OWASP San Diego Training Presentation
owaspsd
•
8 years ago
Windows sysinternals administrators reference
jonbonachon
•
9 years ago
Likes
(89)
See all
Dynamic binary analysis using angr siddharth muralee
Cysinfo Cyber Security Community
•
5 years ago
Smart irrigation - IoT 2019 Sapienza University
LeonardoSarra
•
3 years ago
Bo0oM - Deanonymization and total espionage (ZeroNights, 2014)
Дмитрий Бумов
•
8 years ago
Dmitry Schelkunov, Vasily Bukasov - About practical deobfuscation
DefconRussia
•
11 years ago
On deobfuscation in practice
Dmitry Schelkunov
•
11 years ago
台科逆向簡報
耀德 蔡
•
7 years ago
SNIFFING ROUTES TO PWNAGE: AN INTRO TO BLOODHOUND
Andrew Gill
•
3 years ago
Bsides Leeds - hacker of all master of none.pptx (1)
Andrew Gill
•
5 years ago
SteelCon 2018 Breaking Into Information Security by Andy Gill
Andrew Gill
•
4 years ago
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Cysinfo Cyber Security Community
•
3 years ago
Top Ten Web Hacking Techniques of 2012
Jeremiah Grossman
•
9 years ago
Top 10 Web Hacks 2013
Matt Johansen
•
8 years ago
Zero Day Malware Detection/Prevention Using Open Source Software
MyNOG
•
7 years ago
I Know Your P4$$w0rd (And If I Don't, I Will Guess It...)
Jaime Sánchez
•
3 years ago
How i cracked millions of “pt br” hashed passwords
Nullbyte Security Conference
•
6 years ago
Advanced mainframe hacking
Philip Young
•
6 years ago
Little book of big motivational quotes sidsavara
Professor JRuiz
•
9 years ago
Do The IMPOSSIBLE
David Crandall
•
11 years ago
Cours de Gestion du temps
Echecs et Stratégie
•
4 years ago
Adversarial machine learning for av software
junseok seo
•
5 years ago
What Can Reverse Engineering Do For You?
Amanda Rousseau
•
5 years ago
「Tsurugi Linux」プレゼンテーションAVTOKYO2018
unixfreaxjp
•
4 years ago
nullcon 2011 - Automatic Program Analysis using Dynamic Binary Instrumentation
n|u - The Open Security Community
•
11 years ago
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
Tobias Koprowski
•
7 years ago
SANS Holiday Hack 2017 (非公式ガイド)
Isaac Mathis
•
5 years ago
Recon-ng
Nutan Kumar Panda
•
7 years ago
Escalating Privileges in Linux using Voltage Fault Injection
Riscure
•
5 years ago
Client side attacks using PowerShell
Nikhil Mittal
•
8 years ago
Cleartext and PtH still alive
camsec
•
5 years ago
Custom Rules & Broken Tools (Password Cracking)
camsec
•
5 years ago
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
•
6 years ago
objection - runtime mobile exploration
SensePost
•
5 years ago
A Threat Hunter Himself
Teymur Kheirkhabarov
•
6 years ago
Help Doctor, my application is an onion!
Sebastián Guerrero Selma
•
7 years ago
I Have the Power(View)
Will Schroeder
•
6 years ago
How to Become an InfoSec Autodidact
Kelly Shortridge
•
6 years ago
DIY Education in Cyber Security
Kelly Shortridge
•
7 years ago
Cyber Education: Your Options & Resources Mapped Out
Kelly Shortridge
•
8 years ago
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
Francesco Faenzi
•
5 years ago
Email keeps getting us pwned v1.1
Michael Gough
•
5 years ago
Windows Privilege Escalation
Riyaz Walikar
•
7 years ago
Windows Kernel Debugging
Thomas Roccia
•
6 years ago
Ln monitoring repositories
snyff
•
9 years ago
Secret of Intel Management Engine by Igor Skochinsky
CODE BLUE
•
8 years ago
Study on Android Emulator
Samael Wang
•
7 years ago
A Child Like Approach to Grid Cybersecurity
Robert M. Lee
•
6 years ago
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) - Defcon 25
Chris Thompson
•
5 years ago
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
Gal Bitensky
•
6 years ago
Malware Evasion Techniques
Thomas Roccia
•
5 years ago
Exploiting the Recruitment Process
jasonjfrank
•
6 years ago
DefCamp 2013 - Peering in the Soul of Hackers: HPP V2.0 reloaded
DefCamp
•
9 years ago
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
n|u - The Open Security Community
•
11 years ago
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov
•
6 years ago
Lie to Me: Bypassing Modern Web Application Firewalls
Ivan Novikov
•
9 years ago
SANS @Night Talk: SQL Injection Exploited
Micah Hoffman
•
8 years ago
Staying Safe - Overview of FREE Encryption Tools
Micky Metts
•
7 years ago
Machine Learning Model Bakeoff
mrphilroth
•
5 years ago
OPSEC - Amanece que no es poco
David Barroso
•
7 years ago
Rob "Mubix" Fuller: Attacker Ghost Stories
Area41
•
8 years ago
[Confidence 2016] Red Team - najlepszy przyjaciel Blue Teamu
Piotr Kaźmierczak
•
6 years ago
amrapali builders @@hacking printers.pdf
amrapalibuildersreviews
•
8 years ago
NIC 2017 - Attack and detection in Windows Environments
Oddvar Moe
•
5 years ago
HTTP For the Good or the Bad
Xavier Mertens
•
5 years ago
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Sam Bowne
•
6 years ago
Exploitation and State Machines
Michael Scovetta
•
11 years ago
Moving Anti-Malware Research Forward (Fraser)
Michael Scovetta
•
11 years ago
Anomaly Detection at Multiple Scales (Waltzman)
Michael Scovetta
•
11 years ago
Secure Computer Systems (Shrobe)
Michael Scovetta
•
11 years ago
Modern Kernel Pool Exploitation: Attacks and Techniques
Michael Scovetta
•
11 years ago
MELJUN CORTES ICT security communication_security_cryptography
MELJUN CORTES
•
6 years ago
Bezprzewodowe niebezpieczeństwo (TAPT 2016)
Adam Ziaja
•
6 years ago
Windows Operating System Archaeology
enigma0x3
•
5 years ago
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
•
7 years ago
Application Layer DDoS-A Practical Approach & Mitigation Techniques
Fakrul Alam
•
8 years ago
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Priyanka Aash
•
8 years ago
Defcon 22-gregory-pickett-abusing-software-defined-networks
Priyanka Aash
•
8 years ago
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
Priyanka Aash
•
8 years ago
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Priyanka Aash
•
8 years ago
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Priyanka Aash
•
8 years ago
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Priyanka Aash
•
8 years ago
Security Ninjas: An Open Source Application Security Training Program
OpenDNS
•
7 years ago
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Description
bugcrowd
•
7 years ago
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci
•
7 years ago
IDA ユーザなら知っておくべきマントノン侯爵夫人にモテる 7つの法則
勇 中津留
•
8 years ago
Malwat4 20130223 analyzing_android_malware
Ayase
•
9 years ago
Introducing Intelligence Into Your Malware Analysis
Brian Baskin
•
9 years ago
OWASP San Diego Training Presentation
owaspsd
•
8 years ago
Windows sysinternals administrators reference
jonbonachon
•
9 years ago
Personal Information
Organization / Workplace
New York United States