SOCrate 5/6 - Vol de clés
|
forensics |
214 |
|
SOCrate 6/6 - Outil utilisé
|
forensics |
194 |
|
SOCrate 4/6 - Latéralisation
|
forensics |
186 |
|
SOCrate 3/6 - Outil téléchargé
|
forensics |
148 |
|
SOCrate 2/6 - Reverse shell
|
forensics |
147 |
|
Long Prime Shellcode
|
pwn |
348 |
|
Analyse mémoire 2/5 - Origine de la menace
|
forensics |
100 |
|
babyfuscation
|
reverse |
100 |
|
Analyse mémoire 1/5 - Exfiltration
|
forensics |
113 |
|
Analyse mémoire - Pour commencer (2/2)
|
intro |
25 |
|
XORTP
|
pwn |
285 |
|
SOCrate 1/6 - Technologie
|
intro |
25 |
|
iForensics - iNvisible
|
forensics |
115 |
|
iForensics - iCrash
|
intro |
25 |
|
iForensics - iWiFi
|
forensics |
100 |
|
iForensics - iDevice
|
forensics |
100 |
|