Parent directory/ | - | - |
Jack Mott and Jason Williams - Practical Network Signature Development For Open Source IDS/ | - | 2020 May 21 07:28 |
Stryngs Jack64 and zero x - Build your Stack with Scapy/ | - | 2020 May 21 07:30 |
Carlos Perez - Principals on Leveraging PowerShell for Red Teams-UPDATED/ | - | 2020 May 21 07:28 |
DEF CON 25 - Workshop-Craig-Young-Brainwashing-Embedded-Systems-UPDATED.pdf | 57.5 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Alan-Orlikoski-and-Dan-Moor-Free-and-Easy-DFIR-Triage-for-Everyone-UPDATED.pdf | 12.2 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Client-and-Tester-Security.pdf | 11.8 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf | 7.4 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Ruben-Boobeb-UAC-0day-All-Day.pdf | 7.3 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation.pdf | 5.5 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Adam-Steed-Attacking-Active-Directory-and-Advanced-Methods-of-Defense.pdf | 4.9 MiB | 2020 May 16 05:12 |
DEF CON 25 - Carlos-Perez-Leveraging-PowerShell.pdf | 4.6 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-stryngs-Jack64-and-zero-x-Build-your-stack-with-Scapy.pdf | 4.2 MiB | 2020 May 16 05:13 |
DEF CON 25 - Workshop-Sean-Dillion-and-Zachary-Harding-Exploitation-Malware-Forward-Engineering.pdf | 3.6 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Sergei-Frankoff-and-Sean-Wilson-Malware-Triage-Workshop-Malscripts-Are-The-New-EK.pdf | 3.5 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country.pdf | 3.3 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Alan-Orlikoski-and-Dan-M-Free-and-Easy-DFIR-Triage-for-Everyone.pdf | 3.0 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-DazzleCat-Duo-Intro-To-Disassembly.pdf | 2.0 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf | 2.0 MiB | 2020 May 16 05:13 |
DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf | 1.7 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Bryan-Passifiume-and-Richard-Henderson-Scanning-The-Airwaves.pdf | 1.6 MiB | 2020 May 16 05:13 |
DEF CON 25 - Workshop-Aditya-Gupta-BLE-Exploitation-for-IoT-devices.pdf | 1.4 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country-UPDATED.pdf | 1.4 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Clarence-Chio-and-Anto-Joseph-Pwning-Machine-Learning-Systems.pdf | 1.3 MiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Eijah-Subverting-Privacy-Exploitation-Using-HTTP-UPDATED.PDF | 1.1 MiB | 2020 May 16 05:12 |
DEF CON 25 - Carlos-Perez-Leveraging-PowerShell-Basics.pdf | 1.1 MiB | 2020 May 16 05:13 |
DEF CON 25 - Workshop-Abhay-Bhargav-Building-AppSec-Automation-With-Python.pdf | 1.0 MiB | 2020 May 16 05:12 |
DEF CON 25 - Carlos-Perez-Leveraging-Powershell-Lab-Manual-Basics.pdf | 869.4 KiB | 2020 May 16 05:13 |
DEF CON 25 - Carlos-Perez-Leveraging-Powershell-Lab-Manual.pdf | 458.5 KiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf | 441.4 KiB | 2020 May 16 05:12 |
DEF CON 25 - Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Client-and-Tester-Security-WP.pdf | 241.2 KiB | 2020 May 16 05:13 |
DEF CON 25 - Workshop-Anshuman-Bhartiya-Harnessing-the-Power-of-Docker-and-Kubernetes-Handout.pdf | 170.4 KiB | 2020 May 16 05:13 |
DEF CON 25 - Workshop-Anshuman-Bhartiya-Harnessing-the-Power-of-Docker-and-Kubernetes.pdf | 73.7 KiB | 2020 May 16 05:13 |