- Presentations
- Documents
- Infographics
Internal penetration test_hitchhackers_guide
Darin Fredde
•
4 years ago
Rapid Threat Modeling Techniques
Priyanka Aash
•
9 years ago
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
North Texas Chapter of the ISSA
•
7 years ago
Chaos Engineering with Gremlin Platform
Anshul Patel
•
4 years ago
Visualization for Security
Raffael Marty
•
9 years ago
Purple teaming Cyber Kill Chain
Haydn Johnson
•
7 years ago
The Golden Rules - Detecting more with RSA Security Analytics
Demetrio Milea
•
7 years ago
Rule Engine Evaluation for Complex Event Processing
Chandra Divi
•
8 years ago
Getting Started With #Drools 6 Slides - JBUG Denmark
Mauricio (Salaboy) Salatino
•
8 years ago
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
Security Bootcamp
•
11 years ago
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
Security Bootcamp
•
11 years ago
Hardware hacking 101
Tiago Henriques
•
10 years ago
Simplified Security Code Review Process
Sherif Koussa
•
10 years ago
Simplified Security Code Review Process
Sherif Koussa
•
10 years ago
Linux kernel debugging
libfetion
•
12 years ago
Troubleshooting Linux Kernel Modules And Device Drivers
Satpal Parmar
•
15 years ago
Code Signing with CPK
Zhi Guan
•
15 years ago
How to Setup A Pen test Lab and How to Play CTF
n|u - The Open Security Community
•
12 years ago
Android Tamer (Anant Shrivastava)
ClubHack
•
12 years ago
Delivering IaaS with Open Source Software
Mark Hinkle
•
12 years ago