Rezultati pretraživanja
  1. prije 5 sati

    Not only is our Hacking Enterprises training running in Singapore at in March But... we're pleased to announce that we also have weekend & weekday slots for our 2-day training in Vegas at in August!

  2. Come to Arsenal and see how this Personal Security Assistant tool aims to help facilitate and enhance proper communication for all stakeholders, increased efficiency and effectiveness, and 24 hours availability

  3. prije 7 sati

    demos tool MalViz.ia at Arsenal. Check out how this helps in detecting, classifying and visualizing the features of malware

  4. prije 9 sati

    & outline challenges for future research on Meltdown attacks and mitigations and will discuss the short-term and long-term implications of Meltdown for hardware vendors, software vendors, and users at this Briefing

  5. prije 11 sati

    The Executive Summit happens on April 1 and applications are open! Cybersecurity executives can apply to attend and hear from a variety of industry experts who are helping to shape this next generation of information security strategy

  6. 2. velj

    Invoke-AntiVM is a Powershell module for VM Evasion developed to increase awareness of recent techniques for reversers that can be used with Invoke-Obfuscation, Invoke-Cradle and the MaliciousMacroGenerator. More at w/

  7. 1. velj

    AttackSurfaceMapper v2.0 encompasses multiple tools for performing reconnaissance and extracting intel. New features have been added, including Active Port Scanning and “SuperFast” mode. See & demo it at

  8. 1. velj

    In 25-minute Briefing, researchers detail vulnerabilities of Wi-Fi drivers before password authentication as well as the security issues caused by Wi-Fi layer vulnerabilities. Read the full abstract to learn more about the research

  9. 1. velj

    Step by step, takes you through the attacker lifecycle and captures best practices that you can follow to protect your access 4-day Training “Intrusion Operations” at

  10. 1. velj

    presents a demo of EventList at - an open-source tool that helps match Windows Event Log IDs with the MITRE ATT&CK framework (and vice-versa) and offers methods to simplify the detection in corporate environments worldwide.

  11. 1. velj

    After researching more than 30+ spy cameras, presents the structure and work principle of spy cameras and several effective ways to find all the hidden cameras in this Briefing

  12. 31. sij

    Learn hacking techniques to compromise web applications, APIs, cloud components and other associated end-points and practice some neat, new, and ridiculous hacks which affected real life products, in this Training “Web Hacking – Black Belt Edition”

  13. 31. sij

    Want to see how an attacker can change the physical status of ICS (without accessing the ICS network) through an attack against AI? Check on this Demo Tool Kit for “Industry 4.0” using AI and Cloud Arsenal

  14. 31. sij

    Briefing “Redback: Advanced Static Binary Injection” will provide a comprehensive overview on how static code injection is done on all platforms (Windows, MacOS, Linux, BSD), w/ the tools & full source code to be released after the presentation.

  15. 30. sij

    Join me at 2020! Back at the Marina Bay Sands in Singapore, March 31-April 3. Register here:

  16. 29. sij

    By the end of this 4-day Training course, students will have the knowledge and skills to seek out indicators of anomalous or malicious activity in your network traffic and discover threats you have been missing!

  17. 29. sij
  18. 29. sij

    shares a framework you can use to build and nurture communities through the example of InfoSecGirls community, an initiative started in India to bring more women into the cyber security workforce Briefing

  19. 29. sij

    presents Cloud Security Suite (CS Suite) – a one stop tool for auditing the security posture of the AWS/GCP/Azure/DigitalOcean infrastructures at Arsenal on April 2 & 3

  20. 29. sij

    Check out Android Application Vulnerability Hunting System ‘SAST’ at Arsenal on April 2 to learn about its highly customizable features for supporting apk analysis and vulnerability scanning w/ , &

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.