SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
bolzano1989

bolzano1989

7 Followers
0 SlideShares 1 Clipboard 7 Followers 496 Followings
  • Unblock User Block User
0 SlideShares 1 Clipboard 7 Followers 496 Followings

Personal Information
Organization / Workplace
New York United States
Likes (89)
See all
Dynamic binary analysis using angr siddharth muralee
Cysinfo Cyber Security Community • 5 years ago
Smart irrigation - IoT 2019 Sapienza University
LeonardoSarra • 3 years ago
Bo0oM - Deanonymization and total espionage (ZeroNights, 2014)
Дмитрий Бумов • 8 years ago
Dmitry Schelkunov, Vasily Bukasov - About practical deobfuscation
DefconRussia • 11 years ago
On deobfuscation in practice
Dmitry Schelkunov • 11 years ago
台科逆向簡報
耀德 蔡 • 7 years ago
SNIFFING ROUTES TO PWNAGE: AN INTRO TO BLOODHOUND
Andrew Gill • 3 years ago
Bsides Leeds - hacker of all master of none.pptx (1)
Andrew Gill • 5 years ago
SteelCon 2018 Breaking Into Information Security by Andy Gill
Andrew Gill • 4 years ago
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Cysinfo Cyber Security Community • 3 years ago
Top Ten Web Hacking Techniques of 2012
Jeremiah Grossman • 9 years ago
Top 10 Web Hacks 2013
Matt Johansen • 8 years ago
Zero Day Malware Detection/Prevention Using Open Source Software
MyNOG • 7 years ago
I Know Your P4$$w0rd (And If I Don't, I Will Guess It...)
Jaime Sánchez • 3 years ago
How i cracked millions of “pt br” hashed passwords
Nullbyte Security Conference • 6 years ago
Advanced mainframe hacking
Philip Young • 6 years ago
Little book of big motivational quotes sidsavara
Professor JRuiz • 9 years ago
Do The IMPOSSIBLE
David Crandall • 11 years ago
Cours de Gestion du temps
Echecs et Stratégie • 4 years ago
Adversarial machine learning for av software
junseok seo • 5 years ago
What Can Reverse Engineering Do For You?
Amanda Rousseau • 5 years ago
「Tsurugi Linux」プレゼンテーションAVTOKYO2018
unixfreaxjp • 4 years ago
nullcon 2011 - Automatic Program Analysis using Dynamic Binary Instrumentation
n|u - The Open Security Community • 11 years ago
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
Tobias Koprowski • 7 years ago
SANS Holiday Hack 2017 (非公式ガイド)
Isaac Mathis • 5 years ago
Jake Williams - Navigating the FDA Recommendations on Medical Device Security - and how they will shape the future of all IoT
centralohioissa • 6 years ago
Recon-ng
Nutan Kumar Panda • 7 years ago
Escalating Privileges in Linux using Voltage Fault Injection
Riscure • 5 years ago
Client side attacks using PowerShell
Nikhil Mittal • 8 years ago
Cleartext and PtH still alive
camsec • 5 years ago
Custom Rules & Broken Tools (Password Cracking)
camsec • 5 years ago
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon • 6 years ago
objection - runtime mobile exploration
SensePost • 5 years ago
A Threat Hunter Himself
Teymur Kheirkhabarov • 6 years ago
Help Doctor, my application is an onion!
Sebastián Guerrero Selma • 7 years ago
I Have the Power(View)
Will Schroeder • 6 years ago
How to Become an InfoSec Autodidact
Kelly Shortridge • 6 years ago
DIY Education in Cyber Security
Kelly Shortridge • 7 years ago
Cyber Education: Your Options & Resources Mapped Out
Kelly Shortridge • 8 years ago
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
Francesco Faenzi • 5 years ago
Email keeps getting us pwned v1.1
Michael Gough • 5 years ago
Windows Privilege Escalation
Riyaz Walikar • 7 years ago
Windows Kernel Debugging
Thomas Roccia • 6 years ago
Ln monitoring repositories
snyff • 9 years ago
Secret of Intel Management Engine by Igor Skochinsky
CODE BLUE • 8 years ago
Study on Android Emulator
Samael Wang • 7 years ago
A Child Like Approach to Grid Cybersecurity
Robert M. Lee • 6 years ago
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) - Defcon 25
Chris Thompson • 5 years ago
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
Gal Bitensky • 6 years ago
Malware Evasion Techniques
Thomas Roccia • 5 years ago
Exploiting the Recruitment Process
jasonjfrank • 6 years ago
DefCamp 2013 - Peering in the Soul of Hackers: HPP V2.0 reloaded
DefCamp • 9 years ago
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
n|u - The Open Security Community • 11 years ago
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov • 6 years ago
Lie to Me: Bypassing Modern Web Application Firewalls
Ivan Novikov • 9 years ago
SANS @Night Talk: SQL Injection Exploited
Micah Hoffman • 8 years ago
Staying Safe - Overview of FREE Encryption Tools
Micky Metts • 7 years ago
Machine Learning Model Bakeoff
mrphilroth • 5 years ago
OPSEC - Amanece que no es poco
David Barroso • 7 years ago
Rob "Mubix" Fuller: Attacker Ghost Stories
Area41 • 8 years ago
[Confidence 2016] Red Team - najlepszy przyjaciel Blue Teamu
Piotr Kaźmierczak • 6 years ago
amrapali builders @@hacking printers.pdf
amrapalibuildersreviews • 8 years ago
NIC 2017 - Attack and detection in Windows Environments
Oddvar Moe • 5 years ago
HTTP For the Good or the Bad
Xavier Mertens • 5 years ago
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Sam Bowne • 6 years ago
Exploitation and State Machines
Michael Scovetta • 11 years ago
Moving Anti-Malware Research Forward (Fraser)
Michael Scovetta • 11 years ago
Anomaly Detection at Multiple Scales (Waltzman)
Michael Scovetta • 11 years ago
Secure Computer Systems (Shrobe)
Michael Scovetta • 11 years ago
Modern Kernel Pool Exploitation: Attacks and Techniques
Michael Scovetta • 11 years ago
MELJUN CORTES ICT security communication_security_cryptography
MELJUN CORTES • 6 years ago
Bezprzewodowe niebezpieczeństwo (TAPT 2016)
Adam Ziaja • 6 years ago
Windows Operating System Archaeology
enigma0x3 • 5 years ago
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi • 7 years ago
Application Layer DDoS-A Practical Approach & Mitigation Techniques
Fakrul Alam • 8 years ago
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Priyanka Aash • 8 years ago
Defcon 22-gregory-pickett-abusing-software-defined-networks
Priyanka Aash • 8 years ago
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
Priyanka Aash • 8 years ago
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Priyanka Aash • 8 years ago
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Priyanka Aash • 8 years ago
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Priyanka Aash • 8 years ago
Security Ninjas: An Open Source Application Security Training Program
OpenDNS • 7 years ago
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Description
bugcrowd • 7 years ago
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci • 7 years ago
IDA ユーザなら知っておくべきマントノン侯爵夫人にモテる 7つの法則
勇 中津留 • 8 years ago
Malwat4 20130223 analyzing_android_malware
Ayase • 9 years ago
Introducing Intelligence Into Your Malware Analysis
Brian Baskin • 9 years ago
OWASP San Diego Training Presentation
owaspsd • 8 years ago
Windows sysinternals administrators reference
jonbonachon • 9 years ago
  • Activity
  • About

Likes (89)
See all
Dynamic binary analysis using angr siddharth muralee
Cysinfo Cyber Security Community • 5 years ago
Smart irrigation - IoT 2019 Sapienza University
LeonardoSarra • 3 years ago
Bo0oM - Deanonymization and total espionage (ZeroNights, 2014)
Дмитрий Бумов • 8 years ago
Dmitry Schelkunov, Vasily Bukasov - About practical deobfuscation
DefconRussia • 11 years ago
On deobfuscation in practice
Dmitry Schelkunov • 11 years ago
台科逆向簡報
耀德 蔡 • 7 years ago
SNIFFING ROUTES TO PWNAGE: AN INTRO TO BLOODHOUND
Andrew Gill • 3 years ago
Bsides Leeds - hacker of all master of none.pptx (1)
Andrew Gill • 5 years ago
SteelCon 2018 Breaking Into Information Security by Andy Gill
Andrew Gill • 4 years ago
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Cysinfo Cyber Security Community • 3 years ago
Top Ten Web Hacking Techniques of 2012
Jeremiah Grossman • 9 years ago
Top 10 Web Hacks 2013
Matt Johansen • 8 years ago
Zero Day Malware Detection/Prevention Using Open Source Software
MyNOG • 7 years ago
I Know Your P4$$w0rd (And If I Don't, I Will Guess It...)
Jaime Sánchez • 3 years ago
How i cracked millions of “pt br” hashed passwords
Nullbyte Security Conference • 6 years ago
Advanced mainframe hacking
Philip Young • 6 years ago
Little book of big motivational quotes sidsavara
Professor JRuiz • 9 years ago
Do The IMPOSSIBLE
David Crandall • 11 years ago
Cours de Gestion du temps
Echecs et Stratégie • 4 years ago
Adversarial machine learning for av software
junseok seo • 5 years ago
What Can Reverse Engineering Do For You?
Amanda Rousseau • 5 years ago
「Tsurugi Linux」プレゼンテーションAVTOKYO2018
unixfreaxjp • 4 years ago
nullcon 2011 - Automatic Program Analysis using Dynamic Binary Instrumentation
n|u - The Open Security Community • 11 years ago
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
Tobias Koprowski • 7 years ago
SANS Holiday Hack 2017 (非公式ガイド)
Isaac Mathis • 5 years ago
Jake Williams - Navigating the FDA Recommendations on Medical Device Security - and how they will shape the future of all IoT
centralohioissa • 6 years ago
Recon-ng
Nutan Kumar Panda • 7 years ago
Escalating Privileges in Linux using Voltage Fault Injection
Riscure • 5 years ago
Client side attacks using PowerShell
Nikhil Mittal • 8 years ago
Cleartext and PtH still alive
camsec • 5 years ago
Custom Rules & Broken Tools (Password Cracking)
camsec • 5 years ago
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon • 6 years ago
objection - runtime mobile exploration
SensePost • 5 years ago
A Threat Hunter Himself
Teymur Kheirkhabarov • 6 years ago
Help Doctor, my application is an onion!
Sebastián Guerrero Selma • 7 years ago
I Have the Power(View)
Will Schroeder • 6 years ago
How to Become an InfoSec Autodidact
Kelly Shortridge • 6 years ago
DIY Education in Cyber Security
Kelly Shortridge • 7 years ago
Cyber Education: Your Options & Resources Mapped Out
Kelly Shortridge • 8 years ago
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
Francesco Faenzi • 5 years ago
Email keeps getting us pwned v1.1
Michael Gough • 5 years ago
Windows Privilege Escalation
Riyaz Walikar • 7 years ago
Windows Kernel Debugging
Thomas Roccia • 6 years ago
Ln monitoring repositories
snyff • 9 years ago
Secret of Intel Management Engine by Igor Skochinsky
CODE BLUE • 8 years ago
Study on Android Emulator
Samael Wang • 7 years ago
A Child Like Approach to Grid Cybersecurity
Robert M. Lee • 6 years ago
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) - Defcon 25
Chris Thompson • 5 years ago
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
Gal Bitensky • 6 years ago
Malware Evasion Techniques
Thomas Roccia • 5 years ago
Exploiting the Recruitment Process
jasonjfrank • 6 years ago
DefCamp 2013 - Peering in the Soul of Hackers: HPP V2.0 reloaded
DefCamp • 9 years ago
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
n|u - The Open Security Community • 11 years ago
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov • 6 years ago
Lie to Me: Bypassing Modern Web Application Firewalls
Ivan Novikov • 9 years ago
SANS @Night Talk: SQL Injection Exploited
Micah Hoffman • 8 years ago
Staying Safe - Overview of FREE Encryption Tools
Micky Metts • 7 years ago
Machine Learning Model Bakeoff
mrphilroth • 5 years ago
OPSEC - Amanece que no es poco
David Barroso • 7 years ago
Rob "Mubix" Fuller: Attacker Ghost Stories
Area41 • 8 years ago
[Confidence 2016] Red Team - najlepszy przyjaciel Blue Teamu
Piotr Kaźmierczak • 6 years ago
amrapali builders @@hacking printers.pdf
amrapalibuildersreviews • 8 years ago
NIC 2017 - Attack and detection in Windows Environments
Oddvar Moe • 5 years ago
HTTP For the Good or the Bad
Xavier Mertens • 5 years ago
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Sam Bowne • 6 years ago
Exploitation and State Machines
Michael Scovetta • 11 years ago
Moving Anti-Malware Research Forward (Fraser)
Michael Scovetta • 11 years ago
Anomaly Detection at Multiple Scales (Waltzman)
Michael Scovetta • 11 years ago
Secure Computer Systems (Shrobe)
Michael Scovetta • 11 years ago
Modern Kernel Pool Exploitation: Attacks and Techniques
Michael Scovetta • 11 years ago
MELJUN CORTES ICT security communication_security_cryptography
MELJUN CORTES • 6 years ago
Bezprzewodowe niebezpieczeństwo (TAPT 2016)
Adam Ziaja • 6 years ago
Windows Operating System Archaeology
enigma0x3 • 5 years ago
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi • 7 years ago
Application Layer DDoS-A Practical Approach & Mitigation Techniques
Fakrul Alam • 8 years ago
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Priyanka Aash • 8 years ago
Defcon 22-gregory-pickett-abusing-software-defined-networks
Priyanka Aash • 8 years ago
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
Priyanka Aash • 8 years ago
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Priyanka Aash • 8 years ago
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Priyanka Aash • 8 years ago
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Priyanka Aash • 8 years ago
Security Ninjas: An Open Source Application Security Training Program
OpenDNS • 7 years ago
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Description
bugcrowd • 7 years ago
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci • 7 years ago
IDA ユーザなら知っておくべきマントノン侯爵夫人にモテる 7つの法則
勇 中津留 • 8 years ago
Malwat4 20130223 analyzing_android_malware
Ayase • 9 years ago
Introducing Intelligence Into Your Malware Analysis
Brian Baskin • 9 years ago
OWASP San Diego Training Presentation
owaspsd • 8 years ago
Windows sysinternals administrators reference
jonbonachon • 9 years ago
Personal Information
Organization / Workplace
New York United States

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.