Parent directory/ | - | - |
DEFCON-27-Workshop-Hugo-Trovao-and-Rushikesh-Nandedkar-scapyDojo-v1-live-image-amd64.scapy-workshop-v0.3.rar | 946.3 MiB | 2020 Sep 01 00:46 |
DEFCON-27-Workshops-Elad-Shamir-and-Matt-Bush-Constructing-Kerberos-Attacks-with-Delegation-Primitives.pdf | 19.0 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Guillaume-Ross-Defending-environments-and-hunting-malware-with-osquery-Updated.pdf | 15.2 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Yacin-Nadji-Hands-On-Adverserial-Machine-Learning.pdf | 14.2 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Guillaume-Ross-Defending-environments-and-hunting-malware-with-osquery.pdf | 10.7 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Ryan-Chapman-Understanding-and-Analyzing-Weaponized-Carrier-Files-Updated.pdf | 9.0 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Isaac-Evans-Discover-Exploit-and-Eradicate-Entire-Vulnerability-Classes-at-Scale-Slides-Updated.pdf | 6.2 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Dino-Covotsos-Hack-to-basics.pdf | 5.7 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Anthony-Rose-Introduction-to-AMSI-Bypasses-and-Sandbox-Evasion.pdf | 4.6 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Kristy-Westphal-Analysis-101.pdf | 4.3 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-eigentourist-Hacking-with-Monads.pdf | 4.0 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Ryan-Chapman-Understanding-and-Analyzing-Weaponized-Carrier-Files.pdf | 3.9 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Mauricio-Velazco-Writing-Custom-Paylods.pdf | 3.9 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Richard-Gold-Mind-The-Gap.pdf | 3.6 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Isaac-Evans-Discover-Exploit-and-Eradicate-Entire-Vulnerability-Classes-at-Scale-Slides.pdf | 3.1 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Hugo-Trovao-and-Rushikesh-Nandedkar-scapyDojo-v1.pdf | 2.4 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Josh-Reynolds-FROM-EK-to-Dek-Slides.pdf | 2.4 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Anthony-Rose-Introduction-to-AMSI-Bypasses-and-Sandbox-Evasion-Notes.pdf | 2.0 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Polito-Hacking-the-Android-APK.pdf | 1.9 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf | 1.8 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Josh-Reynolds-FROM-EK-to-Dek-Manual.pdf | 1.3 MiB | 2020 May 16 04:14 |
DEFCON-27-Workshop-Isaac-Evans-Discover-Exploit-and-Eradicate-Entire-Vulnerability-Classes-at-Scale-Handout.pdf | 651.1 KiB | 2020 May 16 04:14 |