×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of shakacon
State of Cyber Security - Dave DeWalt, Chairman & CEO - FireEye, Inc
220 views
Researching Android Device Security with the Help of a Droid Army
246 views
20 Ways Past Secure Boot - Jasper Van Woudenberg, Riscure
269 views
Jason Shirk "Privacy for Security Geeks - Dancing with Lawyers"
115 views
Autonomous Remote Hacking Drones - Dr. Phil Polstra
1.396 views
111 Years of Vulnerabilities - Brian Martin
472 views
Methods of Malware Persistence on OSX - Patrick Wardle, SynAck
607 views
Just What the Doctor Ordered Part II - Scott Erven,
463 views
Windows Kernel Fuzzing for Intermediate Learners - Ben Nagy, COSEINC
1.731 views
Trapping Hacks with Ensnare - Scott Behrens & Andy Hoernecke, Netflix
332 views
Netizen Death Star - L0rd V
500 views
So You Want to be the CSO by Daniel Blander
418 views
Suns Out Guns Out: Hacking without a Vehicle by Charlie Miller & Chris Valasek
550 views
Exploiting Elevator Security Weaknesses by Deviant Ollam
1.059 views
Medical Devices Passwords to Pwnage by Scott Erven
201 views
Social Engineering the Windows Kernel by James Forshaw
2.013 views
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean Metcalf
216 views
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
170 views
There's Waldo by Patrick Wardle & Colby Moore
160 views
Project Zero- Making 0day hard(er) by Chris Evans
118 views
Next >