Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Sulthantt (@sulthantth)
2 Follows
View profile
Heirhabarov
heirhabarov
3 followers
8 decks
Hunting For The Most Unusual Attack Techniques Relevant For The GCC Region
0
120
Hunting for macOS attack techniques. Part 1 – Initial Access, Execution, Credential Access, Persistence
1
2.6k
hasherezade
hshrzd
5 followers
10 decks
Rhadamanthys and the 40 thieves - the nuts, bolts, and lineage of a multimodular stealer
0
78
Funky Malware Formats
3
22k