forked from FeeiCN/Security-PPT
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
100 changed files
with
0 additions
and
0 deletions.
There are no files selected for viewing
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file added
BIN
+2.3 MB
... Training/ATT&CKing the Status Quo Threat-Based Adversary Emulation with MITRE ATT&CK.pdf
Binary file not shown.
Binary file added
BIN
+845 KB
...Hunting & Incident Response Summit & Training/Cyber Threat Hunting in the Middle East.pdf
Binary file not shown.
Binary file added
BIN
+1.87 MB
...& Training/Differentiating Evil from Benign in the Normally Abnormal World of InfoSec.pdf
Binary file not shown.
Binary file added
BIN
+2.7 MB
...Incident Response Summit & Training/Forecast- Sunny, Clear Skies, and 100% Detection .pdf
Binary file not shown.
Binary file added
BIN
+1.58 MB
... & Incident Response Summit & Training/How to Submit a Threat Profile to MITRE ATT&CK.pdf
Binary file not shown.
Binary file added
BIN
+4.98 MB
...eat Hunting & Incident Response Summit & Training/Hunting Webshells- Tracking TwoFace.pdf
Binary file not shown.
Binary file added
BIN
+809 KB
...ident Response Summit & Training/Hunting for Lateral Movement Using Windows Event Log.pdf
Binary file not shown.
Binary file added
BIN
+3.24 MB
...ng & Incident Response Summit & Training/Launching Threat Hunting From Almost Nothing.pdf
Binary file not shown.
Binary file added
BIN
+12.9 MB
2018 Threat Hunting & Incident Response Summit & Training/Lean Hunting.pdf
Binary file not shown.
Binary file added
BIN
+333 KB
...ident Response Summit & Training/Lunch & Learn Panel- The Future of Incident Response.pdf
Binary file not shown.
Binary file added
BIN
+4.63 MB
...& Incident Response Summit & Training/Quantify Your Hunt-- Not Your Parents' Red Team.pdf
Binary file not shown.
Binary file added
BIN
+769 KB
2018 Threat Hunting & Incident Response Summit & Training/Summit Agenda.pdf
Binary file not shown.
Binary file added
BIN
+2.04 MB
...nting & Incident Response Summit & Training/The Fastest Way to Hunt Windows Endpoints.pdf
Binary file not shown.
Binary file added
BIN
+1.26 MB
...Hunting & Incident Response Summit & Training/Threat Hunting Using Live Box Forensics.pdf
Binary file not shown.
Binary file added
BIN
+1.48 MB
...eat Hunting & Incident Response Summit & Training/Threat Hunting in Your Supply Chain.pdf
Binary file not shown.
Binary file added
BIN
+2.12 MB
...Training/Threat Hunting or Threat Farming- Finding the Balance in Security Automation.pdf
Binary file not shown.
Binary file added
BIN
+23.9 MB
...cident Response Summit & Training/Uncovering and Visualizing Malicious Infrastructure.pdf
Binary file not shown.
Binary file added
BIN
+1.78 MB
...Viewing the Nodes in the Noise- Leveraging Data Science to Discover Persistent Threat.pdf
Binary file not shown.
Binary file added
BIN
+6.2 MB
...se Summit & Training/Who Done It-- Gaining Visibility and Accountability in the Cloud.pdf
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file added
BIN
+12.8 MB
2018 京东HITB安全峰会/D1 COMMSEC - AI Powered Security and Securing AI - Jimmy Su (1).pdf
Binary file not shown.
Binary file added
BIN
+16.4 MB
...会/D1 COMMSEC - Application and Practice of Machine Learning in Anti-Malware - Chao Ye.pdf
Binary file not shown.
Binary file added
BIN
+6.99 MB
...全峰会/D1 COMMSEC - Applications of Open Source Hardware in Security Research - Ma Liang.pdf
Binary file not shown.
Binary file added
BIN
+15.2 MB
...- Challenges and Practices of Local Differential Privacy in Real-World - Pingchuan Ma.pdf
Binary file not shown.
Binary file added
BIN
+9.39 MB
...loitability Assessment Through an Exploitation Facilitation Framework - Dr Xinyu Xing.pdf
Binary file not shown.
Binary file added
BIN
+16.2 MB
...TB安全峰会/D1 COMMSEC - Smart Nation Meets Privacy-Preserving Analytics - Sanjeev Solanki.pdf
Binary file not shown.
Binary file added
BIN
+10.1 MB
...MMSEC - Unconventional Vulnerabilities in Google Cloud Platform - Venkatesh Sivakumar.pdf
Binary file not shown.
Binary file added
BIN
+19.9 MB
2018 京东HITB安全峰会/D1 COMMSEC - Who Hijacked My Smart Home - Han Zi Dong.pdf
Binary file not shown.
Binary file added
BIN
+3.37 MB
...Attack Trees - Methodology and Application in Red Teaming Operations - Matteo Beccaro.pdf
Binary file not shown.
Binary file added
BIN
+2.92 MB
...T1 - Finding Vulnerabilities in a Closed Source Video Decoder Driver - Adam Donenfeld.pdf
Binary file not shown.
Binary file not shown.
Binary file added
BIN
+16.2 MB
...T1 - Security 2020 - The Threats and Opportunities for Cyber Leaders - Eddie Schwartz.pdf
Binary file not shown.
Binary file added
BIN
+2.71 MB
2018 京东HITB安全峰会/D1T1 - Stop Laughing - Cyber Security Is Cool Now - Adam Laurie.pdf
Binary file not shown.
Binary file added
BIN
+0 Bytes
2018 京东HITB安全峰会/D1T1 - Tools of the Trade - Evan Booth - NO SLIDES.pdf
Binary file not shown.
Binary file added
BIN
+13.3 MB
...东HITB安全峰会/D1T2 - Apple iOS UI Access Permission Vulnerabilities - Benjamin Kunz Mejri.pdf
Binary file not shown.
Binary file not shown.
Binary file added
BIN
+1.16 MB
2018 京东HITB安全峰会/D1T2 - Some Experiments with Code Similarity - Halvar Flake.pdf
Binary file not shown.
Binary file added
BIN
+6.88 MB
...ITB安全峰会/D1T2 - Telecoms - Generational Evolution of Attack Surfaces - Emmanuel Gadaix.pdf
Binary file not shown.
Binary file added
BIN
+4.46 MB
2018 京东HITB安全峰会/D1T2 - The Inner Workings of the Windows Runtime - James Forshaw.pdf
Binary file not shown.
Binary file added
BIN
+2.9 MB
2018 京东HITB安全峰会/D1T2 - Travel Hacking - Hotel Edition - Hendrik Scholz.pdf
Binary file not shown.
Binary file added
BIN
+2.43 MB
...ulnerability Research - What It Takes to Keep Going and Going and Going - Fred Raynal.pdf
Binary file not shown.
Binary file added
BIN
+25.3 MB
... COMMSEC - Gentlemen Start Your AIs - Self-Racing Cars - Dhillon L33tdawg Kannabhiran.pdf
Binary file not shown.
Binary file added
BIN
+4.26 MB
2018 京东HITB安全峰会/D2 COMMSEC - Hacking The 0day Market - Andrea Zapparoli Manzoni.pdf
Binary file not shown.
Binary file added
BIN
+17.2 MB
...roblem Between Machine Learning and Security Operations - Xiangyu Liu and Xinyue Shen.pdf
Binary file not shown.
Binary file added
BIN
+5.87 MB
2018 京东HITB安全峰会/D2T1 - Dissecting a Cloud-Connected E-Scooter - Nikias Bassen.pdf
Binary file not shown.
Binary file added
BIN
+648 KB
...ays in Embedded Systems with Code Coverage Guided Fuzzing - Dr Quynh and Kai Jern Lau.pdf
Binary file not shown.
Binary file added
BIN
+29.3 MB
2018 京东HITB安全峰会/D2T1 - Make ARM Shellcode Great Again - Saumil Shah.pdf
Binary file not shown.
Binary file not shown.
Binary file added
BIN
+4.63 MB
2018 京东HITB安全峰会/D2T1 - Multi ARCH Firmware Emulation - Kaijern Lau.pdf
Binary file not shown.
Binary file added
BIN
+10.6 MB
2018 京东HITB安全峰会/D2T1 - Social Media Mining for Threat Intelligence - Fyodor Yarochkin.pdf
Binary file not shown.
Binary file added
BIN
+4.65 MB
...T1 - Using Machine Learning to Investigate Web Campaigns at Large - Dr Marco Balduzzi.pdf
Binary file not shown.
Binary file added
BIN
+1.47 MB
2018 京东HITB安全峰会/D2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdf
Binary file not shown.
Binary file not shown.
Binary file added
BIN
+5.34 MB
2018 京东HITB安全峰会/D2T2 - How Your Smartphone Tracks Your Entire Life - Vladimir Katalov.pdf
Binary file not shown.
Binary file added
BIN
+3.94 MB
.../D2T2 - Monitoring Massive Network Traffic using Bayesian Inference - David Rodriguez.pdf
Binary file not shown.
Binary file added
BIN
+3.15 MB
2018 京东HITB安全峰会/D2T2 - Taint Driven Crash Analysis - Richard Johnson.pdf
Binary file not shown.
Binary file added
BIN
+3.62 MB
2018 京东HITB安全峰会/D2T2 - USB Armory - Past Present and Future - Andrea Barisani.pdf
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.