Internal penetration test_hitchhackers_guide

Darin Fredde 4 years ago

Rapid Threat Modeling Techniques

Priyanka Aash 9 years ago

NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception

North Texas Chapter of the ISSA 7 years ago

Chaos Engineering with Gremlin Platform

Anshul Patel 4 years ago

Visualization for Security

Raffael Marty 9 years ago

Purple teaming Cyber Kill Chain

Haydn Johnson 7 years ago

Getting Started With #Drools 6 Slides - JBUG Denmark

Mauricio (Salaboy) Salatino 8 years ago

Hardware hacking 101

Tiago Henriques 10 years ago

Simplified Security Code Review Process

Sherif Koussa 10 years ago

Simplified Security Code Review Process

Sherif Koussa 10 years ago

Linux kernel debugging

libfetion 12 years ago

Code Signing with CPK

Zhi Guan 15 years ago

How to Setup A Pen test Lab and How to Play CTF

n|u - The Open Security Community 12 years ago

Android Tamer (Anant Shrivastava)

ClubHack 12 years ago

Delivering IaaS with Open Source Software

Mark Hinkle 12 years ago