/DEF CON 25/DEF CON 25 workshops/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
Stryngs Jack64 and zero x - Build your Stack with Scapy/-2018-Feb-10 05:27
Jack Mott and Jason Williams - Practical Network Signature Development For Open Source IDS/-2018-Feb-10 05:27
Carlos Perez - Principals on Leveraging PowerShell for Red Teams-UPDATED/-2018-Feb-10 05:27
DEFCON-25-Workshop-Craig-Young-Brainwashing-Embedded-Systems-UPDATED.pdf57.5 MiB2017-Aug-10 01:15
DEFCON-25-Workshop-Alan-Orlikoski-and-Dan-Moor-Free-and-Easy-DFIR-Triage-for-Everyone-UPDATED.pdf12.2 MiB2017-Aug-10 01:14
DEFCON-25-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Client-and-Tester-Security.pdf11.8 MiB2017-Jul-14 09:41
DEFCON-25-Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf7.4 MiB2017-Jul-14 08:38
DEFCON-25-Workshop-Ruben-Boobeb-UAC-0day-All-Day.pdf7.3 MiB2017-Jul-16 11:19
DEFCON-25-Workshop-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation.pdf5.5 MiB2017-Jul-14 08:38
DEFCON-25-Workshop-Adam-Steed-Attacking-Active-Directory-and-Advanced-Methods-of-Defense.pdf4.9 MiB2017-Jul-16 04:02
DEFCON-25-Carlos-Perez-Leveraging-PowerShell.pdf4.6 MiB2017-Jul-08 04:16
DEFCON-25-Workshop-stryngs-Jack64-and-zero-x-Build-your-stack-with-Scapy.pdf4.2 MiB2017-Jul-14 09:02
DEFCON-25-Workshop-Sean-Dillion-and-Zachary-Harding-Exploitation-Malware-Forward-Engineering.pdf3.6 MiB2017-Jul-16 03:47
DEFCON-25-Workshop-Sergei-Frankoff-and-Sean-Wilson-Malware-Triage-Workshop-Malscripts-Are-The-New-EK.pdf3.5 MiB2017-Jul-16 11:19
DEFCON-25-Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country.pdf3.3 MiB2017-Jul-16 06:14
DEFCON-25-Workshop-Alan-Orlikoski-and-Dan-M-Free-and-Easy-DFIR-Triage-for-Everyone.pdf3.0 MiB2017-Jul-14 09:48
DEFCON-25-Workshop-DazzleCat-Duo-Intro-To-Disassembly.pdf2.0 MiB2017-Jul-14 08:43
DEFCON-25-Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf2.0 MiB2017-Jul-14 08:38
DEFCON-25-Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf1.7 MiB2017-Jul-14 08:38
DEFCON-25-Workshop-Bryan-Passifiume-and-Richard-Henderson-Scanning-The-Airwaves.pdf1.6 MiB2017-Jul-16 11:19
DEFCON-25-Workshop-Aditya-Gupta-BLE-Exploitation-for-IoT-devices.pdf1.4 MiB2017-Jul-15 00:27
DEFCON-25-Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country-UPDATED.pdf1.4 MiB2017-Aug-10 01:14
DEFCON-25-Workshop-Clarence-Chio-and-Anto-Joseph-Pwning-Machine-Learning-Systems.pdf1.3 MiB2017-Jul-14 09:32
DEFCON-25-Workshop-Eijah-Subverting-Privacy-Exploitation-Using-HTTP-UPDATED.PDF1.1 MiB2017-Aug-10 01:17
DEFCON-25-Carlos-Perez-Leveraging-PowerShell-Basics.pdf1.1 MiB2017-Jul-08 04:31
DEFCON-25-Workshop-Abhay-Bhargav-Building-AppSec-Automation-With-Python.pdf1.0 MiB2017-Jul-16 11:18
DEFCON-25-Carlos-Perez-Leveraging-Powershell-Lab-Manual-Basics.pdf869.4 KiB2017-Jul-08 04:08
DEFCON-25-Carlos-Perez-Leveraging-Powershell-Lab-Manual.pdf458.5 KiB2017-Jul-08 04:13
DEFCON-25-Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf441.4 KiB2017-Jul-16 11:11
DEFCON-25-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Client-and-Tester-Security-WP.pdf241.2 KiB2017-Jul-14 09:40
DEFCON-25-Workshop-Anshuman-Bhartiya-Harnessing-the-Power-of-Docker-and-Kubernetes-Handout.pdf170.4 KiB2017-Jul-14 08:44
DEFCON-25-Workshop-Anshuman-Bhartiya-Harnessing-the-Power-of-Docker-and-Kubernetes.pdf73.7 KiB2017-Jul-14 08:44