- Présentations
- Documents
- Infographies
PowerShell for Practical Purple Teaming
Nikhil Mittal
•
il y a 6 ans
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk
Beau Bullock
•
il y a 8 ans
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
Alex Pinto
•
il y a 8 ans
Lateral Movement with PowerShell
kieranjacobsen
•
il y a 9 ans
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
Fatih Ozavci
•
il y a 8 ans
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Rob Fuller
•
il y a 12 ans
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
jasonjfrank
•
il y a 8 ans
Security Onion Conference - 2015
DefensiveDepth
•
il y a 8 ans
Black Hat 2015 Arsenal: Noriben Malware Analysis
Brian Baskin
•
il y a 8 ans
Windows 10 Forensics: OS Evidentiary Artefacts
Brent Muir
•
il y a 8 ans
Dark Fairytales from a Phisherman
Michele Orru
•
il y a 8 ans
Riding the Overflow - Then and Now
Miroslav Stampar
•
il y a 9 ans
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Panels !
Aditya K Sood
•
il y a 9 ans
Lares from LOW to PWNED
Chris Gates
•
il y a 12 ans
Painting a Company Red and Blue
Iftach Ian Amit
•
il y a 9 ans
Windows attacks - AT is the new black
Chris Gates
•
il y a 10 ans
[ENG] IPv6 shipworm + My little Windows domain pwnie
Zoltan Balazs
•
il y a 11 ans
The Web Application Hackers Toolchain
jasonhaddix
•
il y a 11 ans
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
qqlan
•
il y a 11 ans
Multiprocessing with python
Patrick Vergain
•
il y a 15 ans