SteelCon 2018 featured talks on various cybersecurity topics including COM And The PowerThIEf, EternalBlue exploit analysis, GDPR for hackers, social engineering basics, and more, presented by industry experts.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A security oriented, feedback-driven, evolutionary, easy-to-use fuzzer with interesting analysis options.
Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.
PLC-side fuzzing tool for uncovering vulnerabilities in ICS control applications.
Personal website of Collin R. Mulliner with a focus on security research and mobile platforms.
A security framework for process isolation and sandboxing based on capability-based security principles.
Top 15 recommendations to protect your business from email-borne threats with Security Gateway.
A microservice for string padding to prevent global issues like the left-pad incident.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.