DefCamp 2015 - Official Overview
DefCamp 2015 - IDS Evasion Techniques
DefCamp 2015 - ELK stack for Hackers
DefCamp 2015 - Building a Cyber Security Operations Center
DefCamp 2015 - Game of Hacks: Play, Hack & Track
DefCamp 2015 - Cryptography – our weapon in the 21st century
DefCamp 2015 - Building a Weaponized Honeybot ( part I )
DefCamp 2015 -From Hype Hangover to Happy Hacking: Shaping the World through Shaping Actions
DefCamp 2015 - A new Hope - CTF stories & IoT Hacking
DefCamp 2015 - When Steganography Stops Being Cool
DefCamp 2015 - Hacking and Securing Network Monitoring Systems
DefCamp 2015 - How to mess with Android Intents
DefCamp 2015 - Challenges on Reversing Layered Malware
DefCamp 2015 - Pentesting Android Applications
DefCamp 2015
DefCamp 2015 - Integrating Mobile Devices into Your Penetration Testing Program
DefCamp 2015 - Orange about Bug Bounty & Innovation Labs 2016
DefCamp 2015 - Toward large-scale vulnerability discovery using Machine Learning
DefCamp 2015 - Uncommon methods of attack and monitoring them for detection
DefCamp 2015 - Abstract Apoc@lypse Technique