Pod |
Pod 1 |
Pod 2 |
Pod 3 |
Pod 4 |
Pod 5 |
Pod 6 |
Pod 7 |
10:15 |
peepdf
Jose Miguel Esparza |
HTExploit Bypassing htaccess Restrictions
Maximiliano Soler |
ThreadFix
Dan Cornell |
Oyedata for OData Assessments
Gursev Singh Kalra |
ice-hole 0.3 (beta)
Darren Manners |
Registry Decoder
Lodovico Marziale |
phpmap
Matt Bergin |
Pod |
Pod 1 |
Pod 2 |
Pod 3 |
Pod 4 |
Pod 5 |
Pod 6 |
Pod 7 |
1145 |
Armitage
Raphael Mudge |
OWASP Broken Web Applications Project
Chuck Willis |
FakeNet
Andrew Honig |
SAP Proxy
Ian De Villiers |
ARPwner
Nicolas Trippar |
Smartphone Pentesting Framework
Georgia Weidman |
Generic Metasploit NTLM Relayer
Rich Lundeen |
Pod |
Pod 1 |
Pod 2 |
Pod 3 |
Pod 4 |
Pod 5 |
Pod 6 |
Pod 7 |
1415 |
zCore IPS
Itzhak Avraham |
Tenacious Diggity - New Google Hacking Diggity Suite Tools
Francis Brown |
..cantor.dust..
Christopher Domas |
AWS Scout by Jonathan Chittenden
Jonathan Chittenden |
iSniff GPS
Hubert Seiwert |
CrowdRE
Georg Wicherski & Aaron Putnam |
Pod |
Pod 1 |
Pod 2 |
Pod 3 |
Pod 4 |
Pod 5 |
Pod 6 |
Pod 7 |
1530 |
WATOBO - Web Application Toolbox
Andreas Schmidt |
ModSecurity Open Source WAF
Ryan Barnett |
LiME Forensics 1.1
Joe Sylve |
Semi-Automated iOS Rapid Assessment
Justin Engler |
Vega
David Mirza Ahmad |
Burp Extensibility Suite
James Lester |