Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Sulthantt (@sulthantth)
2 Follows
View profile
Heirhabarov
heirhabarov
4 followers
8 decks
Hunting For The Most Unusual Attack Techniques Relevant For The GCC Region
1
200
Hunting for macOS attack techniques. Part 1 – Initial Access, Execution, Credential Access, Persistence
2
2.8k
hasherezade
hshrzd
5 followers
10 decks
Rhadamanthys and the 40 thieves - the nuts, bolts, and lineage of a multimodular stealer
0
130
Funky Malware Formats
3
22k