- Presentations
- Documents
- Infographics
Windows 10 Forensics: OS Evidentiary Artefacts
Brent Muir
•
8 years ago
Multiprocessing with python
Patrick Vergain
•
15 years ago
DNS exfiltration using sqlmap
Miroslav Stampar
•
11 years ago
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Rob Fuller
•
12 years ago
How to Setup A Pen test Lab and How to Play CTF
n|u - The Open Security Community
•
12 years ago
SQL injection: Not only AND 1=1
Bernardo Damele A. G.
•
15 years ago
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
jasonjfrank
•
8 years ago
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
qqlan
•
11 years ago
Black Hat 2015 Arsenal: Noriben Malware Analysis
Brian Baskin
•
8 years ago
Javascript Security
jgrahamc
•
14 years ago
Introduction à la sécurité des WebServices
ConFoo
•
13 years ago
Windows attacks - AT is the new black
Chris Gates
•
10 years ago
Pentesting web applications
Satish b
•
12 years ago
Security Onion Conference - 2015
DefensiveDepth
•
8 years ago
Data Retrieval over DNS in SQL Injection Attacks
Miroslav Stampar
•
11 years ago
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk
Beau Bullock
•
8 years ago
Blind SQL Injection - Optimization Techniques
amiable_indian
•
16 years ago
Lares from LOW to PWNED
Chris Gates
•
12 years ago
Cryptography for Penetration Testers (PDF version)
ceng
•
15 years ago
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
qqlan
•
11 years ago