- Présentations
- Documents
- Infographies
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
•
il y a 7 ans
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Peter Hlavaty
•
il y a 7 ans
You're Off the Hook: Blinding Security Software
Cylance
•
il y a 7 ans
Moony li pacsec-1.8
PacSecJP
•
il y a 7 ans
Behavioral Models of Information Security: Industry irrationality & what to do about it
Kelly Shortridge
•
il y a 7 ans
Higher Level Malware
CTruncer
•
il y a 8 ans
External to DA, the OS X Way
Stephan Borosh
•
il y a 8 ans
SREcon 2016 Performance Checklists for SREs
Brendan Gregg
•
il y a 8 ans
Docker, Linux Containers, and Security: Does It Add Up?
Jérôme Petazzoni
•
il y a 9 ans
Java Deserialization Vulnerabilities - The Forgotten Bug Class
CODE WHITE GmbH
•
il y a 8 ans
SyScan360 - Stefan Esser - OS X El Capitan sinking the S\H/IP
Stefan Esser
•
il y a 8 ans
The Joy of Sandbox Mitigations
James Forshaw
•
il y a 8 ans
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
CTruncer
•
il y a 8 ans
I Have the Power(View)
Will Schroeder
•
il y a 8 ans
Exploitation and State Machines
Michael Scovetta
•
il y a 12 ans
A XSSmas carol
cgvwzq
•
il y a 8 ans
Handling of compromised Linux systems
Michael Boelen
•
il y a 8 ans
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
•
il y a 8 ans
Velocity 2015 linux perf tools
Brendan Gregg
•
il y a 8 ans
"The Great Train Cyber Robbery" SCADAStrangeLove
Aleksandr Timorin
•
il y a 8 ans