FILIPI PIRES
Security Researcher and Security Advocate, Speaker and Technical Trainer of the Course Malware Attack Types with Kill Chain Methodology.
HOME
ABOUT
PRESENTATIONS TALKS
PUBLISHED ARTICLES
CATEGORIES
TAGS
ARCHIVES
Home
Presentations Talks
Presentations Talks
Cancel
Presentations Talks
ENGLISH TALKS
LeHack 2022 - Dissecting and Comparing different Binaries to Malware Analysis
HackInBo® Security Conference 2022 - Discovering C&C in Malicious PDF with obfuscation, encoding and other techniques
DEFCON 30 Blue Team Village - Malware Hunting Discovering techniques in PDF
DEFCON 30 Blue Team Village - Horusec Brazilian SAST help World
Texas Cyber Summit 2022 - Exploitation with Reverse Shell and Infection with PS VBS
Python Web Conf 2022 - Malware Hunting-Using Python as Attack Weapon
Conf42 Python 2022 - Malware Hunting - Using python as attack weapon
Hack in Paris 2021 - Dissecting PDF Files to Malware Analysis
BSidesNoVA 2021 - Discovering C&C in Malicious PDF
BSides Vancouver 2021 - Discovering C&C in Malicious PDF
NahamCon’s on RTV 2021 - Discovering C&C in Malicious PDF
HITB 2021 AMS COMMSEC - Exploitation With Reverse Shell & Infection With PowerShell
BSIDES Athens-2021 - Workshop - Discovering C&C in Malicious PDF
Conf42 SRE 2021 - Keep your code safe during the development path using OS tools
Conf42 DevSecOps 2021 - Improve the identification of vulnerabilities in your project
RTV 2021 - Mayhem 2021 - Python as attack weapon
RTV 2021 - Learning Thrusday - Keep Your Code Safe During the Development Path Using Open Source Tools
BSidesBUD2021:Discovering C&C in Malicious PDF with Obfuscation, Encoding & other Techniques
BSidesBUD2021:Keep Your Code Safe During the Development Path Using Opensource Tools
Webinar senhasegura 2021 - Dissecting Ransomware Attacks
EuropeClouds Summit 2021 - Keep your code safe during the development path using Opensource tools.
GrayHat - Red Team Village - 2020- US - Malware Analysis
GrayHat - Red Team Village - 2020 - US - Pivoting
BSIDES DFW - 2020 - US - Malware Analysis
Hacktivity - Budapest 2020 - Malware Analisys
HITB - 2020 - Hack In The Box Security Conference-Europe
D.C. Cybersecurity Professionals-2020 - US | Dissecting PDF Files to Malware Analysis
D.C. Cybersecurity Professionals-2020 - US | Cyber Threat Hunting
HoneyCON 2020 - Spain - Pivoting
Trust or Not Trust? Is there a New Mindset about CyberSecurity using Zero Trust?
#WhoIs: An Emerging Class of Incident Response Platforms Using Open Source Tools
BSidesBUD2020: Dissecting & Comparing Different Binaries to Malware Analysis
CIA Conference 2020 - India - Malware Analysis
SPANISH TALKS
8.8 Security Conference Sur(Chile)- Discovering C&C in Malicious PDF with obfuscation
EkoParty 2020 DevSecOps Space - Pivoting
8.8 Security Conference Andina - Malware
Securidad Cero - 2020 - Malware
PORTUGUESES TALKS
2º Hacker Summit 2022 - Malware Hunting - Practical Offensive Approach
OWASP-SP | Desenvolvimento usando ferramenta Open Source
OWASP-POA | Como e Por que fazemos desenvolvimento seguro com OpenSource
OWASP-Belem | Mantenha seu Código “safe” durante seu desenvolvimento usando ferramenta OpenSource
OWASP-BH | Caso prático de uso de ferramenta SAST
Cyber Security Summit Talks - Desenvolvimento Seguro com OpenSource
Cyber Security Summit - Privilege Access Management (PAM): é cultura?
LatinoWare - 2020
ROADSEC HOME - 2020
ZUP OfficeHours - Desenvolvimento seguro com Horusec
ZUP OfficeHours - Primeiros Passos em Desenvolvimento Seguro com Horusec
UNICIV - Análise de malware - 1º Ethical Hacking Summit
StarsCTF - Descobrindo C&C em PDF Malicioso
Trending Tags
PDFMalicious
MalwareAnalysis
Maldoc
Trending Tags
PDFMalicious
MalwareAnalysis
Maldoc