BUILD IT
BUILD IT!
ADD – Complicating Memory Forensics Through Memory Disarray
Jake Williams
Alissa Torres
An Open and Affordable USB Man in the Middle Device
Dominic Spill
AV Evasion with the Veil Framework
Christopher Truncer
TheGrayhound
Michael Wright
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms
Jaime Sanchez
Pablo San Emeterio
Last updated