Announcement

Collapse
No announcement yet.
Sub-Forums Topics Posts Last Post
Advanced Wireless Attacks Against Enterprise Networks
Learn how to carry out sophisticated wireless attacks against corporate infrastructure.
Topics: 1 Posts: 1
1 1
Analysis 101 and 102 for the Incident Responder
You have a theory about something you have found while roaming the network or conducting your own hackfest, but how do you go about proving it?
Topics: 1 Posts: 1
1 1
Bug bounty Hunting Workshop
I will show you a path to be a bug bounty hunter, from my experience starting by chance and from scratch.
Topics: 1 Posts: 1
1 1
Digital Forensics & IR Against the Dark Arts
Using forensic and malware analysis fundamentals, learn how to analyze malicious downloaders, phishing emails, and malicious spam.
Topics: 1 Posts: 4
1 4
Evading Detection a Beginner's Guide to Obfuscation
Our mission is to identify how they plan on securing their systems and avoid being identified as a threat.
Topics: 1 Posts: 1
1 1
Finding security Vulnerabilities through Fuzzing
How to use different types of fuzzers to find software vulnerabilities.
Topics: 1 Posts: 6
1 6
From ZERO To HERO In Web Security Research
How to find vulnerabilities in web security according to the latest methods and techniques.
Topics: 1 Posts: 3
1 3
Hacking the Metal: An Introduction to Assembly Language Programming
Learn about assembly language programming, write some real-world code, play the role of reverse engineer and try your hand at some guided malware analysis.
Topics: 1 Posts: 1
1 1
House of Heap Exploitation
Heap exploitation is a subject that has evaded many people for years for one reason: they focus on the techniques instead of the allocator.
Topics: 1 Posts: 1
1 1
Inspecting Signals from Satellites to Shock Collars
By examining several topics that are rarely presented together, this workshop provides the introduction to wireless hacking that we both wish we had when starting out.
Topics: 1 Posts: 1
1 1
Learning to Hack Bluetooth Low Energy with BLE CTF
Learn the fundamentals of interacting with and hacking Bluetooth Low Energy services through a series of Bluetooth low energy challenges in a capture the flag format.
Topics: 1 Posts: 3
1 3
Modern Malware Analysis for Threat Hunters
You will learn to analyze malicious office documents, identify signs of packing, defeat obfuscation and other anti-analysis techniques and use traffic analysis.
Topics: 1 Posts: 1
1 1
Network Analysis with Wireshark
Learn to understand packet activity, abnormalities and anomalies to detect attacks, troubleshoot network problems, and perform network forensics.
Topics: 1 Posts: 1
1 1
Secure Messaging Over Unsecured Transports
Many specialized secure messaging apps have sprung up to address the challenge of end-to-end secured messaging. We will build our own.
Topics: 1 Posts: 1
1 1
The Joy of Reverse Engineering
Introduction to software reverse engineering using static and dynamic techniques with the Ghidra disassembler and WinDbg debugger.
Topics: 1 Posts: 1
1 1
Windows Internals
Explore the structure of Windows executable files and the operating system itself to better understand programs, services, malware, and defenses.
Topics: 1 Posts: 1
1 1
Writing Golang Malware
Learn how to design and build their own multi-platform Golang-based implants and c2 frameworks by building on samples provided.
Topics: 1 Posts: 1
1 1
  •  
  • Filter
  • Time
  • Show
  • New Topics
Clear All
new posts
There are no conversations in this channel.
 
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.
  •  
  • Filter
  • Time
  • Show
  • Sort By
  • Order
Clear All
new posts
No topics found.
  • Filter
  • Time
Clear All
Working...
X