Parent directory/ | - | - |
Automating Threat Hunting on the Dark Web and ot..> | 14.0 MiB | 2020-Oct-15 23:29 |
2 wires and 2 wheels- Bikes can do CAN too.pdf | 61.3 MiB | 2020-Oct-15 23:31 |
Blockchain Based OT Monitoring Solution (BBOTMS)..> | 4.1 MiB | 2020-Oct-15 23:33 |
Discover vulnerabilities with CodeQL.pdf | 9.7 MiB | 2020-Oct-15 23:34 |
How I Pwned The ICS Data During my Internship.pdf | 6.7 MiB | 2020-Oct-15 23:43 |
High Value Adversary Emulation through Purple Te..> | 7.3 MiB | 2020-Oct-15 23:43 |
I've Injected a DLL - You Won't Believe What Hap..> | 5.8 MiB | 2020-Oct-15 23:44 |
Inside The Mind of a Threat Actor.pdf | 9.1 MiB | 2020-Oct-15 23:45 |
Payload delivery for initial access in Adversary..> | 1.7 MiB | 2020-Oct-15 23:49 |
Pursuing Evasive Custom Command & Control (C3).pdf | 44.3 MiB | 2020-Oct-15 23:50 |
Offensive Embedded Exploitation.pdf | 32.9 MiB | 2020-Oct-15 23:55 |
Zero Trust in the Era of Cloud.pdf | 21.3 MiB | 2020-Oct-15 23:56 |
A deeper diving on shellcode.pdf | 4.2 MiB | 2020-Oct-19 22:13 |