ºÝºÝߣ
Submit Search
Felipe Prado
392
ºÝºÝߣShares
141
Followers
10
Followings
Block User
392
ºÝºÝߣShares
141
Followers
10
Followings
Personal Information
Organization / Workplace
São Paulo, Brazil
Occupation
Ethical Hacker - CSM SaaS Security
Industry
Technology / Software / Internet
Website
About
Evangelista de Cybersecurity, Ethical Hacker, Palestrante, Skatista... Apaixonado pelo que eu faço....
Presentations
(210)Ìý
See all
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
Ìý
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismological networks remotely
Ìý
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
Ìý
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
Ìý
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
Ìý
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
Ìý
Documents
(182)Ìý
See all
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
Ìý
DEF CON 23 - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET App Control Flow
DEF CON 23 - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET App Control Flow
Ìý
DEF CON 23 - Topher Timzen - acquiring net objects from the managed Heap
DEF CON 23 - Topher Timzen - acquiring net objects from the managed Heap
Ìý
DEF CON 23 - Ronny Bull and Jeanna Matthews - exploring layer 2 - DOCUMENT
DEF CON 23 - Ronny Bull and Jeanna Matthews - exploring layer 2 - DOCUMENT
Ìý
Rodrigo Almeida - Microkernel development from project to implementation
Rodrigo Almeida - Microkernel development from project to implementation
Ìý
DEFCON 23 - Patrick mcneil - guidelines for securing your voip PBX
DEFCON 23 - Patrick mcneil - guidelines for securing your voip PBX
Ìý