Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Process Control Through Counterfeit Comms: Using and Abusing Built-In Functionality to Own a PLC ShmooCon 2019
Where 2 Worlds Collide: Bringing Mimikatz et al to UNIX Black Hat Europe 2018
Playback: a TLS 1.3 story DEF CON 26
You can run, but you can't hide. Reverse engineering using X-Ray. DEF CON 26
Playback: A TLS 1.3 Story Black Hat USA 2018
Spymaster Challenge BSidesSF2018
Spymaster Challenge BSidesSF2018
Skype & Type: Keystroke Leakage over VoIP Black Hat USA 2017
What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection Black Hat Asia 2017
FIRST: Changing How You Reverse Engineer Zeronights Moscow 2016