Handler on Duty: Jan Kopriva
Threat Level: green
Date | Author | Title |
---|---|---|
BUILDING GRAPH | ||
2015-10-12 | Guy Bruneau | Data Visualization,What is your Tool of Choice? |
BUILDING | ||
2015-10-12/a> | Guy Bruneau | Data Visualization,What is your Tool of Choice? |
GRAPH | ||
2024-08-16/a> | Jesse La Grew | [Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools |
2023-07-28/a> | Xavier Mertens | ShellCode Hidden with Steganography |
2019-04-05/a> | Russ McRee | Beagle: Graph transforms for DFIR data & logs |
2016-12-11/a> | Russ McRee | Steganography in Action: Image Steganography & StegExpose |
2015-10-12/a> | Guy Bruneau | Data Visualization,What is your Tool of Choice? |
2014-05-18/a> | Russ McRee | sed and awk will always rock |
2012-04-02/a> | Johannes Ullrich | SHA 1-2-3 |
2010-01-06/a> | Guy Bruneau | Secure USB Flaw Exposed |
2009-05-28/a> | Jim Clausing | Stego in TCP retransmissions |