anne-tall-national-cyber-range
anthony-critelli-implementing-voice-over-ip-in-competitive-security-competitions
anthony-critelli-implementing-voice-over-ip-in-security-competitions
christa-pusateri-brainstorming-your-brand-influencing-others
christopher-martinez-executive-order-private-sector-cybersecurity-information-sharing
danny-chrastil-know-company-hacking-linkedin-business-processes
danny-chrastil-what-i-know-about-your-company-hacking-linkedin-business-processes
ean-meyer-hiding-plain-sight-building-hidden-remotely-accessible-pen-testing-platform
glen-roberts-take-charge-infosec-career
grecs-and-pupstrr-project-kidhack-teaching-the-next-next-generation-security-through-gaming
hal-pomeranz-linux-forensics
james-davis-owasp-top-10-via-mvc4-and-greater
james-shank-the-state-of-mobile-malware
jeremy-epstein-scope-cybersecurity-view-forward
johannes-ullrich-ph-d-judgement-day-2015-04-12
jonathan-echavarria-hiding-your-attacks-with-misdirection-like
jonathan-singer-quadcopter-workshop-of-doom
josh-ruppe-breaking-speed-limit
michael-brown-nist-cybersecurity-framework-coming-ready
moses-hernandez-yo-dog-got-regs-regs
rob-bird-intro-to-data-science-for-security
roberto-dos-santos-soares-software-defined-exploits-arent-controlled
ryan-buenaventura-defense-in-depth-a-mile-wide-a-mile-deep
scott-arciszewski-application-security-beyond-compliance
scott-sattler-threat-intelligence
tim-krabec-getting-involved-to-better-the-future
tim-medin-attacking-kerberos-kicking-the-guard-dog-of-hades
vikram-dhillon-blockchain-service
vincent-moscatello-destover-inside-the-malware-at-sony-entertainment
Folders and files Name Name Last commit message
Last commit date
parent directory
View all files
You can’t perform that action at this time.