Talk & Training Content from Security Conferences
- Adversarial Tradecraft Development in a Nutshell
- A Journey from TI to Adversary Simulations
- Malware Traffic Simulations in Distributed Networks (Slides + Whitepaper)
- Tradecraft Development: Growing Implants in Memory (Slides + Whitepaper)
- Tradecraft Development in Adversary Simulations
- Malware Traffic Generation to Improve Security Incident Detections
- Weaponising C# - Fundamentals
- Projecting TA505 Tradecraft to Cutting Edge Systems
- Converting Threat Actor Campaigns to Purple Team Exercises
- Designing, Developing and Running Purple Team Exercises
- BSides Canberra 2017 - Departed Communications: Learn The Ways to Smash Them!
- Black Hat USA 2016 - VoIP Wars: The Phreakers Awaken
- AusCERT 2016 - Hardware Hacking Chronicles - IoT Hacking for Offence and Defence
- Black Hat Europe 2015 & Ruxcon 2015 & HITB 2015 - VoIP Wars: Destroying Jar Jar Lync
- DEF CON 24 - VoIP Wars: The Live Workshop
- DEF CON 23 - The Art of VoIP Hacking
- Black Hat 2014 & DEF CON 22 - VoIP Wars: Attack of the Cisco Phones
- DEF CON 21 - VoIP Wars: Return of the SIP
- Athcon 2013 - Hacking SIP Services Like a Boss
- Paper, 2013 - Hacking Trust Relationships of SIP Gateways
- Check the repository