×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
shakacon documents
Technology
State of Cyber Security - Dave DeWalt, Chairman & CEO - FireEye, Inc
Technology
Researching Android Device Security with the Help of a Droid Army
Technology
20 Ways Past Secure Boot - Jasper Van Woudenberg, Riscure
Technology
Jason Shirk "Privacy for Security Geeks - Dancing with Lawyers"
Technology
Autonomous Remote Hacking Drones - Dr. Phil Polstra
Technology
111 Years of Vulnerabilities - Brian Martin
Technology
Methods of Malware Persistence on OSX - Patrick Wardle, SynAck
Technology
Just What the Doctor Ordered Part II - Scott Erven,
Technology
Windows Kernel Fuzzing for Intermediate Learners - Ben Nagy, COSEINC
Technology
Trapping Hacks with Ensnare - Scott Behrens & Andy Hoernecke, Netflix
Technology
Netizen Death Star - L0rd V
Business
So You Want to be the CSO by Daniel Blander
Automotive
Suns Out Guns Out: Hacking without a Vehicle by Charlie Miller & Chris Valasek
Devices & Hardware
Exploiting Elevator Security Weaknesses by Deviant Ollam
Healthcare
Medical Devices Passwords to Pwnage by Scott Erven
Technology
Social Engineering the Windows Kernel by James Forshaw
Technology
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean Metcalf
Technology
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Mobile
How to Make Android's Bootable Recovery Work For You by Drew Suarez
Technology
I am the 100% [*] by Chris Evans & Natalie Silvanovich
Mobile
There's Waldo by Patrick Wardle & Colby Moore
Next >