HOME
ABOUT
TRAINING
CXO BRIEF
CONFERENCE
TICKETS
MERCHANDISE
POSTS
CONTACT US
More
0
All Posts
Talks
Workshops
Training
Kampung (Village)
CTF
Electronic Badge
Today I Learned
Search
Phishing Made Easy — SniperPhish: A Web-Email Spear Phishing Toolkit — by Gem George & Joseph Nygil
From Zero to Hero(-ish): Your Journey to Car Hacking Begins — by Car Security Quarter (CSQ)
Hunting Malicious Using DNS — by Irena Damsky
Web Application Bug Hunting: Fundamentals and Learning Path — by Denis Makrushin
Defending Docker Implementations — by Joshua Jebaraj
Malware Hexorcism with IDA Pro — by Nico Brulez
Writing Wireshark Plugins for Security Analysis — by Nishant Sharma & Jeswin Mathai
Treasure Maps: The Hidden Paths to Finding Information — by Terrence Tan
Qiling Framework: Learn How to Build & Optimize a Fuzzer Based on an Actual IoT Firmware
Business OSINT & OPSEC/Privacy Crash Course — Joe Gray
An Introduction to SAP Forensics — by Jordan Santarsieri
Catch Me If You Can — Seeing the Red Through the Blue — by Owen Shearing & Will Hunt
Linux-Kernel Research For Kernel-Newcomers: Where To Start From? — by Ron Munitz
Attacks On GSM — Alarms, Smart Homes & Smartwatches For Kids — by Aleksandr Kolchanov
Making & Breaking Machine Learning — by Clarence Chio
Real Hardware Hacking For S$30 Or Less (Hands-On) — by Joe FitzPatrick
Advanced WiFi Penetration Test — by Chai Kunzhe & Yang Yunfei
Building a Better SDLC Using Threat Modelling — by Stephen Kapp
Contemporary ARM Security Research Surface — by Ron Munitz
Introduction to YARA — by Matt Brooks
1
2