| Parent directory/ | - | - |
| Automating Threat Hunting on the Dark Web and ot..> | 14.0 MiB | 2020-Oct-15 23:29 |
| 2 wires and 2 wheels- Bikes can do CAN too.pdf | 61.3 MiB | 2020-Oct-15 23:31 |
| Blockchain Based OT Monitoring Solution (BBOTMS)..> | 4.1 MiB | 2020-Oct-15 23:33 |
| Discover vulnerabilities with CodeQL.pdf | 9.7 MiB | 2020-Oct-15 23:34 |
| How I Pwned The ICS Data During my Internship.pdf | 6.7 MiB | 2020-Oct-15 23:43 |
| High Value Adversary Emulation through Purple Te..> | 7.3 MiB | 2020-Oct-15 23:43 |
| I've Injected a DLL - You Won't Believe What Hap..> | 5.8 MiB | 2020-Oct-15 23:44 |
| Inside The Mind of a Threat Actor.pdf | 9.1 MiB | 2020-Oct-15 23:45 |
| Payload delivery for initial access in Adversary..> | 1.7 MiB | 2020-Oct-15 23:49 |
| Pursuing Evasive Custom Command & Control (C3).pdf | 44.3 MiB | 2020-Oct-15 23:50 |
| Offensive Embedded Exploitation.pdf | 32.9 MiB | 2020-Oct-15 23:55 |
| Zero Trust in the Era of Cloud.pdf | 21.3 MiB | 2020-Oct-15 23:56 |
| A deeper diving on shellcode.pdf | 4.2 MiB | 2020-Oct-19 22:13 |