HoneySAP: Who really wants your money
Troopers
05/19/16
Deep Boot
Ekoparty
05/19/16
Anécdotas de seguridad
Congreso Nacional de Estudiantes de Ingenieria en Sistemas de Informacion (CNEISI) 2012
05/19/16
Pass-the-Hash Toolkit for Windows
HITB SECONF 2008 and Buenos Aires Conference (Ba-Con '08)
05/19/16
About Exploits Writing, Gerardo Richarte
G-CON 1, ITESM Campus Estado de Mexico, Mexico
05/19/16
Four different tricks to bypass StackShield and StackGuard protection
Corelabs Technical Report
05/19/16
Using AI Techniques to improve Pen Testing Automation
Hackito Ergo Sum (HES), Paris, France
05/19/16
MD5 to be considered harmful today
PacSec'05 Conference, Tokyo, Japan.
05/19/16
Abusing the Windows WiFi native API to create a Covert Channel
Hack.lu 2011
05/19/16
SAP’s Network Protocols Revisited
Troopers 2014 Conference
05/19/16
HTML5 Heap Sprays, Pwn All The Things
EuSecWest 2012
05/19/16
Syscall Proxying - Simulating remote execution
Black Hat USA '03
05/19/16
Power Save Denial of Service in 802.11 Networks
Ekoparty 2009
05/19/16
Windows SMEP bypass: U=S
Ekoparty
05/19/16
Pentesting en AWS
AWS User Group Argentina
05/19/16
802.11 Massive Monitoring
DEF CON 23
05/19/16
Attack Planning in the Real World
AAAI 2010
05/19/16
Core Impact: Penetration Test Automation
White paper
05/19/16
Deactivate the Rootkit
Black Hat USA 2009
05/19/16
Modifying Windows NT Logon Credential
Corelabs Technical Report
05/19/16
Breaking Out of VirtualBox through 3D Acceleration
REcon 2014
05/19/16
Uncovering SAP vulnerabilities: reversing and breaking the Diag protocol
Defcon 20 Conference
05/19/16
Automating Penetration Tests, Iván Arce - Presentation at the SANS I/O Wargames 2001 conference
SANS I/O Wargames conference, September 2001, Washington D.C. USA
05/19/16
An Algorithm to Find Optimal Attack Paths in Nondeterministic Scenarios
ACM CCS Conference 2011
05/19/16
Vulnerability Management at the Crossroads, part I
Network Security
05/19/16