Home
Welcome to Gamzatti's page
Links
NEC Active Directory security risk analysis service
Cyber risk of Active Directory though attack methods
Detection of Malicious Tools by Monitoring DLL Using Deep Learning
BlackHat ASIA 2020(arsenal):Attack Demonstration Tool Kits for Industry 4.0 Using AI and Cloud
Japan - US Industrial Control Systems Cybersecurity Training for Indo-Pacific Region Held
Digital Practice: Defending attacks from attacks leveraging Struts 2 using deep learning
FIRST ANNUAL CONFERENCE: Real-time Log Analysis Tool with STIX 2.0
HITCON Community 2017 DAY 2 (8/26): Tracking mimikatz by Sysmon and Elasticsearch
Recent trends of attacks against Web Application
APT workshop and Log analysis training in Jakarta
About vulnerability of Apache Commons Collections
Contact
gamzatti@reverse-edge.com
No TrackBacks
TrackBack URL: http://www.reverse-edge.com/cgi-bin/mt/mt-tb.cgi/6
http://www.reverse-edge.com/mt/know-how/
This is know-how sharing page about IT technology such as configurations, implementations for systems.