際際滷shows by User: egypt / http://www.slideshare.net/images/logo.gif 際際滷shows by User: egypt / Tue, 30 Aug 2022 04:00:18 GMT 際際滷Share feed for 際際滷shows by User: egypt Privilege Escalation with Metasploit /slideshow/privilege-escalation-with-metasploit/252754774 privilege-escalation-220830040018-3cbcda19
Presented at Derbycon, 2012]]>

Presented at Derbycon, 2012]]>
Tue, 30 Aug 2022 04:00:18 GMT /slideshow/privilege-escalation-with-metasploit/252754774 egypt@slideshare.net(egypt) Privilege Escalation with Metasploit egypt Presented at Derbycon, 2012 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/privilege-escalation-220830040018-3cbcda19-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at Derbycon, 2012
Privilege Escalation with Metasploit from egypt
]]>
62 0 https://cdn.slidesharecdn.com/ss_thumbnails/privilege-escalation-220830040018-3cbcda19-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The State of the Metasploit Framework.pdf /slideshow/the-state-of-the-metasploit-frameworkpdf/252754674 thestateofthemetasploitframework-220830035414-474ccd5e
Presented at Derbycon, 2016]]>

Presented at Derbycon, 2016]]>
Tue, 30 Aug 2022 03:54:14 GMT /slideshow/the-state-of-the-metasploit-frameworkpdf/252754674 egypt@slideshare.net(egypt) The State of the Metasploit Framework.pdf egypt Presented at Derbycon, 2016 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thestateofthemetasploitframework-220830035414-474ccd5e-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at Derbycon, 2016
The State of the Metasploit Framework.pdf from egypt
]]>
20 0 https://cdn.slidesharecdn.com/ss_thumbnails/thestateofthemetasploitframework-220830035414-474ccd5e-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
New Shiny in the Metasploit Framework /slideshow/new-shiny-in-the-metasploit-framework/252754490 newshiny-220830034447-4e815b96
Presented at Derbycon, 2013]]>

Presented at Derbycon, 2013]]>
Tue, 30 Aug 2022 03:44:46 GMT /slideshow/new-shiny-in-the-metasploit-framework/252754490 egypt@slideshare.net(egypt) New Shiny in the Metasploit Framework egypt Presented at Derbycon, 2013 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/newshiny-220830034447-4e815b96-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at Derbycon, 2013
New Shiny in the Metasploit Framework from egypt
]]>
5 0 https://cdn.slidesharecdn.com/ss_thumbnails/newshiny-220830034447-4e815b96-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Open Source, Security, and Open Source Security.pdf /slideshow/open-source-security-and-open-source-securitypdf/252750583 opensourcesecurityandopensourcesecurity-220829213951-11d1a5f9
Presented at: LASCON, 2016; Dakotacon, 2017]]>

Presented at: LASCON, 2016; Dakotacon, 2017]]>
Mon, 29 Aug 2022 21:39:51 GMT /slideshow/open-source-security-and-open-source-securitypdf/252750583 egypt@slideshare.net(egypt) Open Source, Security, and Open Source Security.pdf egypt Presented at: LASCON, 2016; Dakotacon, 2017 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/opensourcesecurityandopensourcesecurity-220829213951-11d1a5f9-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at: LASCON, 2016; Dakotacon, 2017
Open Source, Security, and Open Source Security.pdf from egypt
]]>
9 0 https://cdn.slidesharecdn.com/ss_thumbnails/opensourcesecurityandopensourcesecurity-220829213951-11d1a5f9-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Authenticated Code Execution by Design.pptx /slideshow/authenticated-code-execution-by-designpptx/252750531 authenticatedcodeexecutionbydesign-220829212923-d7e572e9
Hacking without exploits]]>

Hacking without exploits]]>
Mon, 29 Aug 2022 21:29:23 GMT /slideshow/authenticated-code-execution-by-designpptx/252750531 egypt@slideshare.net(egypt) Authenticated Code Execution by Design.pptx egypt Hacking without exploits <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/authenticatedcodeexecutionbydesign-220829212923-d7e572e9-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Hacking without exploits
Authenticated Code Execution by Design.pptx from egypt
]]>
8 0 https://cdn.slidesharecdn.com/ss_thumbnails/authenticatedcodeexecutionbydesign-220829212923-d7e572e9-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
One-Liners to Rule Them All /slideshow/oneliners-to-rule-them-all/252750182 one-linerstorulethemall-220829203939-f55c9e86
Presented at DEF CON 26]]>

Presented at DEF CON 26]]>
Mon, 29 Aug 2022 20:39:39 GMT /slideshow/oneliners-to-rule-them-all/252750182 egypt@slideshare.net(egypt) One-Liners to Rule Them All egypt Presented at DEF CON 26 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/one-linerstorulethemall-220829203939-f55c9e86-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at DEF CON 26
One-Liners to Rule Them All from egypt
]]>
48 0 https://cdn.slidesharecdn.com/ss_thumbnails/one-linerstorulethemall-220829203939-f55c9e86-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Offensive Security with Metasploit /slideshow/offensive-security-with-metasploit/63349958 9c9d18a0-676a-4900-b3cb-24d928a0e71a-160622192046
]]>

]]>
Wed, 22 Jun 2016 19:20:45 GMT /slideshow/offensive-security-with-metasploit/63349958 egypt@slideshare.net(egypt) Offensive Security with Metasploit egypt <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/9c9d18a0-676a-4900-b3cb-24d928a0e71a-160622192046-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Offensive Security with Metasploit from egypt
]]>
1070 9 https://cdn.slidesharecdn.com/ss_thumbnails/9c9d18a0-676a-4900-b3cb-24d928a0e71a-160622192046-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Shiny /slideshow/shiny-63349683/63349683 47f12288-7ae5-4a6a-a1e8-4ffddc98ff56-160622191303
]]>

]]>
Wed, 22 Jun 2016 19:13:03 GMT /slideshow/shiny-63349683/63349683 egypt@slideshare.net(egypt) Shiny egypt <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/47f12288-7ae5-4a6a-a1e8-4ffddc98ff56-160622191303-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Shiny from egypt
]]>
220 4 https://cdn.slidesharecdn.com/ss_thumbnails/47f12288-7ae5-4a6a-a1e8-4ffddc98ff56-160622191303-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
already-0wned /slideshow/already0wned/63349527 1f76ddaf-b9b6-4238-b2c9-7542a8fb485e-160622190753
Presented at Innotech San Antonio, 2014]]>

Presented at Innotech San Antonio, 2014]]>
Wed, 22 Jun 2016 19:07:52 GMT /slideshow/already0wned/63349527 egypt@slideshare.net(egypt) already-0wned egypt Presented at Innotech San Antonio, 2014 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1f76ddaf-b9b6-4238-b2c9-7542a8fb485e-160622190753-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at Innotech San Antonio, 2014
already-0wned from egypt
]]>
174 4 https://cdn.slidesharecdn.com/ss_thumbnails/1f76ddaf-b9b6-4238-b2c9-7542a8fb485e-160622190753-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Post Metasploitation /slideshow/post-metasploitation/13831005 post-metasploitation-120801164255-phpapp01
Presented at Defcon 20]]>

Presented at Defcon 20]]>
Wed, 01 Aug 2012 16:42:52 GMT /slideshow/post-metasploitation/13831005 egypt@slideshare.net(egypt) Post Metasploitation egypt Presented at Defcon 20 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/post-metasploitation-120801164255-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at Defcon 20
Post Metasploitation from egypt
]]>
2371 6 https://cdn.slidesharecdn.com/ss_thumbnails/post-metasploitation-120801164255-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
State of the Framework Address: Recent Developments in the Metasploit Framework /slideshow/state-oftheframeworkaddress/9563343 state-of-the-framework-address-111005145229-phpapp01
Presented at DerbyCon, 2011]]>

Presented at DerbyCon, 2011]]>
Wed, 05 Oct 2011 14:52:26 GMT /slideshow/state-oftheframeworkaddress/9563343 egypt@slideshare.net(egypt) State of the Framework Address: Recent Developments in the Metasploit Framework egypt Presented at DerbyCon, 2011 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/state-of-the-framework-address-111005145229-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at DerbyCon, 2011
State of the Framework Address: Recent Developments in the Metasploit Framework from egypt
]]>
611 2 https://cdn.slidesharecdn.com/ss_thumbnails/state-of-the-framework-address-111005145229-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework /slideshow/unmanned-aerial-vehicles/3083764 unmannedaerialvehicles-100205163714-phpapp01
Presented at Black Hat DC, February 2010. Automation and other ways to speed up your usage of the Metasploit Framework.]]>

Presented at Black Hat DC, February 2010. Automation and other ways to speed up your usage of the Metasploit Framework.]]>
Fri, 05 Feb 2010 16:37:08 GMT /slideshow/unmanned-aerial-vehicles/3083764 egypt@slideshare.net(egypt) Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework egypt Presented at Black Hat DC, February 2010. Automation and other ways to speed up your usage of the Metasploit Framework. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/unmannedaerialvehicles-100205163714-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at Black Hat DC, February 2010. Automation and other ways to speed up your usage of the Metasploit Framework.
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework from egypt
]]>
1642 6 https://cdn.slidesharecdn.com/ss_thumbnails/unmannedaerialvehicles-100205163714-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Exploitation with the Metasploit Framework's Browser Autopwn /slideshow/using-guided-missiles-in-drivebys-automatic-browser-fingerprinting-and-exploitation-with-the-metasploit-frameworks-browser-autopwn/1833147 guided-missiles-090809134641-phpapp02
Presented at Defcon 17]]>

Presented at Defcon 17]]>
Sun, 09 Aug 2009 13:45:57 GMT /slideshow/using-guided-missiles-in-drivebys-automatic-browser-fingerprinting-and-exploitation-with-the-metasploit-frameworks-browser-autopwn/1833147 egypt@slideshare.net(egypt) Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Exploitation with the Metasploit Framework's Browser Autopwn egypt Presented at Defcon 17 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/guided-missiles-090809134641-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at Defcon 17
Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Exploitation with the Metasploit Framework's Browser Autopwn from egypt
]]>
1237 5 https://cdn.slidesharecdn.com/ss_thumbnails/guided-missiles-090809134641-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-egypt-48x48.jpg?cb=1661807580 https://cdn.slidesharecdn.com/ss_thumbnails/privilege-escalation-220830040018-3cbcda19-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/privilege-escalation-with-metasploit/252754774 Privilege Escalation w... https://cdn.slidesharecdn.com/ss_thumbnails/thestateofthemetasploitframework-220830035414-474ccd5e-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/the-state-of-the-metasploit-frameworkpdf/252754674 The State of the Metas... https://cdn.slidesharecdn.com/ss_thumbnails/newshiny-220830034447-4e815b96-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/new-shiny-in-the-metasploit-framework/252754490 New Shiny in the Metas...