neuroky.me file explorer

neu·ro·kyme

public share-first archive

See also:
  1. neuroky.me - home
  2. /public - files that anyone can download
  3. sftp ftp.neuroky.me - this archive is accessible over sftp

Index of /youtube.com/Black Hat - Videos/2015


Upload to /youtube.com/Black Hat - Videos/2015

0%
Name ▲ Modified Size
↑ Parent Directory
'Nobody is Listening to Your Phone Calls.' Really A Debate and Discussion on the NSA's Activities - 2015.description 2022-04-22 10:25 1.1 KB
'Nobody is Listening to Your Phone Calls.' Really A Debate and Discussion on the NSA's Activities - 2015.info.json 2022-04-22 10:25 263.4 KB
'Nobody is Listening to Your Phone Calls.' Really A Debate and Discussion on the NSA's Activities - 2015.mp4 2016-08-27 17:34 306.1 MB
48 Dirty Little Secrets Cryptographers Don’t Want You To Know - 2015.description 2022-04-22 11:53 1011 B
48 Dirty Little Secrets Cryptographers Don’t Want You To Know - 2015.info.json 2022-04-22 11:53 263.2 KB
48 Dirty Little Secrets Cryptographers Don’t Want You To Know - 2015.mp4 2018-09-08 18:31 104.3 MB
802.1x and Beyond! - 2015.description 2022-04-22 10:36 612 B
802.1x and Beyond! - 2015.info.json 2022-04-22 10:36 261.4 KB
802.1x and Beyond! - 2015.mp4 2016-08-16 15:34 170.8 MB
A Journey to Protect Points-of-Sale - 2015.description 2022-04-22 11:11 682 B
A Journey to Protect Points-of-Sale - 2015.info.json 2022-04-22 11:11 263.5 KB
A Journey to Protect Points-of-Sale - 2015.mp4 2016-08-16 14:15 508.6 MB
A Practical Attack Against VDI Solutions - 2015.description 2022-04-22 10:48 861 B
A Practical Attack Against VDI Solutions - 2015.info.json 2022-04-22 10:48 662.6 KB
A Practical Attack Against VDI Solutions - 2015.mp4 2015-04-03 12:20 226.5 MB
A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks - 2015.description 2022-04-22 10:25 2.7 KB
A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks - 2015.info.json 2022-04-22 10:25 456.6 KB
A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks - 2015.mp4 2021-01-27 22:52 158.6 MB
A Survey of Remote Automotive Attack Surfaces - 2015.description 2022-04-22 11:50 1.0 KB
A Survey of Remote Automotive Attack Surfaces - 2015.info.json 2022-04-22 11:50 265.6 KB
A Survey of Remote Automotive Attack Surfaces - 2015.mp4 2016-08-26 15:44 399.6 MB
Abuse of CPE Devices and Recommended Fixes - 2015.description 2022-04-28 20:06 1.1 KB
Abuse of CPE Devices and Recommended Fixes - 2015.info.json 2022-04-28 20:06 454.5 KB
Abuse of CPE Devices and Recommended Fixes - 2015.mp4 2020-07-05 02:49 177.2 MB
Abusing Microsoft Kerberos - Sorry You Guys Don't Get It - 2015.description 2022-04-22 10:06 628 B
Abusing Microsoft Kerberos - Sorry You Guys Don't Get It - 2015.info.json 2022-04-22 10:06 271.2 KB
Abusing Microsoft Kerberos - Sorry You Guys Don't Get It - 2015.mp4 2016-08-16 18:09 327.7 MB
Abusing Performance Optimization Weaknesses to Bypass ASLR - 2015.description 2022-04-22 11:26 1.8 KB
Abusing Performance Optimization Weaknesses to Bypass ASLR - 2015.info.json 2022-04-22 11:26 265.0 KB
Abusing Performance Optimization Weaknesses to Bypass ASLR - 2015.mp4 2016-08-13 13:43 260.7 MB
Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorer - 2015.description 2022-04-22 07:36 1.1 KB
Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorer - 2015.info.json 2022-04-22 07:36 263.2 KB
Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorer - 2015.mp4 2016-08-11 07:44 211.6 MB
Abusing Software Defined Networks - 2015.description 2022-04-22 09:23 1.2 KB
Abusing Software Defined Networks - 2015.info.json 2022-04-22 09:23 262.8 KB
Abusing Software Defined Networks - 2015.mp4 2016-08-25 13:54 217.4 MB
Abusing Windows Management Instrumentation (WMI) - 2015.description 2022-04-22 08:16 1.1 KB
Abusing Windows Management Instrumentation (WMI) - 2015.info.json 2022-04-22 08:16 263.1 KB
Abusing Windows Management Instrumentation (WMI) - 2015.mp4 2016-08-21 14:19 467.1 MB
Abusing XSLT For Practical Attacks - 2015.description 2022-04-22 08:33 1011 B
Abusing XSLT For Practical Attacks - 2015.info.json 2022-04-22 08:33 264.6 KB
Abusing XSLT For Practical Attacks - 2015.mp4 2016-08-16 23:25 257.8 MB
Advanced IC Reverse Engineering Techniques - In Depth Analysis Of A Modern Smart Card - 2015.description 2022-04-22 08:08 1.2 KB
Advanced IC Reverse Engineering Techniques - In Depth Analysis Of A Modern Smart Card - 2015.info.json 2022-04-22 08:08 264.7 KB
Advanced IC Reverse Engineering Techniques - In Depth Analysis Of A Modern Smart Card - 2015.mp4 2016-08-11 20:14 473.7 MB
Adventures In Femtoland - 350 Yuan For Invaluable Fun - 2015.description 2022-04-22 08:31 2.2 KB
Adventures In Femtoland - 350 Yuan For Invaluable Fun - 2015.info.json 2022-04-22 08:31 264.0 KB
Adventures In Femtoland - 350 Yuan For Invaluable Fun - 2015.mp4 2016-08-14 01:13 143.2 MB
Ah! Universal Android Rooting Is Back - 2015.description 2022-04-22 07:53 1.5 KB
Ah! Universal Android Rooting Is Back - 2015.info.json 2022-04-22 07:53 264.6 KB
Ah! Universal Android Rooting Is Back - 2015.mp4 2016-08-23 03:04 326.0 MB
Analyzing UEFI BIOSes from Attacker & Defender Viewpoints - 2015.description 2022-04-22 09:37 1.4 KB
Analyzing UEFI BIOSes from Attacker & Defender Viewpoints - 2015.info.json 2022-04-22 09:37 265.8 KB
Analyzing UEFI BIOSes from Attacker & Defender Viewpoints - 2015.mp4 2016-08-13 01:30 357.4 MB
Android FakeID Vulnerability Walkthrough - 2015.description 2022-04-22 10:49 1.0 KB
Android FakeID Vulnerability Walkthrough - 2015.info.json 2022-04-22 10:49 526.7 KB
Android FakeID Vulnerability Walkthrough - 2015.mp4 2015-03-19 13:35 259.5 MB
Android Kernel and OS Security Assessment with Iron Crow - 2015.description 2022-04-22 09:27 935 B
Android Kernel and OS Security Assessment with Iron Crow - 2015.info.json 2022-04-22 09:27 261.1 KB
Android Kernel and OS Security Assessment with Iron Crow - 2015.mp4 2016-08-26 05:43 101.2 MB
Android Security State Of The Union - 2015.description 2022-04-28 18:16 385 B
Android Security State Of The Union - 2015.info.json 2022-04-28 18:16 262.2 KB
Android Security State Of The Union - 2015.mp4 2016-08-21 23:11 453.7 MB
API Deobfuscator - Resolving Obfuscated API Functions In Modern Packers - 2015.description 2022-04-22 07:19 3.1 KB
API Deobfuscator - Resolving Obfuscated API Functions In Modern Packers - 2015.info.json 2022-04-22 07:19 263.2 KB
API Deobfuscator - Resolving Obfuscated API Functions In Modern Packers - 2015.mp4 2016-08-11 13:40 162.4 MB
APT Attribution and DNS Profiling - 2015.description 2022-04-22 11:17 1.4 KB
APT Attribution and DNS Profiling - 2015.info.json 2022-04-22 11:17 261.9 KB
APT Attribution and DNS Profiling - 2015.mp4 2016-08-28 07:08 205.3 MB
APTs Way - Evading Your EBNIDS - 2015.description 2022-04-22 09:58 822 B
APTs Way - Evading Your EBNIDS - 2015.info.json 2022-04-22 09:58 264.4 KB
APTs Way - Evading Your EBNIDS - 2015.mp4 2016-08-12 18:43 222.2 MB
Assessing And Exploiting BigNum Vulnerabilities - 2015.description 2022-04-22 07:30 596 B
Assessing And Exploiting BigNum Vulnerabilities - 2015.info.json 2022-04-22 07:30 263.7 KB
Assessing And Exploiting BigNum Vulnerabilities - 2015.mp4 2016-09-02 00:11 171.3 MB
Attacking ECMAScript Engines With Redefinition - 2015.description 2022-04-22 07:34 590 B
Attacking ECMAScript Engines With Redefinition - 2015.info.json 2022-04-22 07:34 261.2 KB
Attacking ECMAScript Engines With Redefinition - 2015.mp4 2016-08-28 02:22 102.2 MB
Attacking Hypervisors Using Firmware And Hardware - 2015.description 2022-04-22 07:57 972 B
Attacking Hypervisors Using Firmware And Hardware - 2015.info.json 2022-04-22 07:57 263.2 KB
Attacking Hypervisors Using Firmware And Hardware - 2015.mp4 2016-08-11 21:50 480.5 MB
Attacking Mobile Broadband Modems Like a Criminal Would - 2015.description 2022-04-22 12:11 1.1 KB
Attacking Mobile Broadband Modems Like a Criminal Would - 2015.info.json 2022-04-22 12:11 261.8 KB
Attacking Mobile Broadband Modems Like a Criminal Would - 2015.mp4 2016-08-19 03:16 154.3 MB
Attacking the Linux PRNG on Android - 2015.description 2022-04-22 09:15 1.1 KB
Attacking the Linux PRNG on Android - 2015.info.json 2022-04-22 09:15 263.4 KB
Attacking the Linux PRNG on Android - 2015.mp4 2016-08-22 04:39 297.3 MB
Automated Human Vulnerability Scanning With AVA - 2015.description 2022-04-22 08:10 1.3 KB
Automated Human Vulnerability Scanning With AVA - 2015.info.json 2022-04-22 08:10 263.1 KB
Automated Human Vulnerability Scanning With AVA - 2015.mp4 2016-08-11 14:21 454.1 MB
Babar-ians at the Gate - Data Protection at Massive Scale - 2015.description 2022-04-22 11:45 1.0 KB
Babar-ians at the Gate - Data Protection at Massive Scale - 2015.info.json 2022-04-22 11:45 617.9 KB
Babar-ians at the Gate - Data Protection at Massive Scale - 2015.mp4 2021-11-03 18:52 387.9 MB
Back Doors And Front Doors Breaking The Unbreakable System - 2015.description 2022-04-22 07:45 1.2 KB
Back Doors And Front Doors Breaking The Unbreakable System - 2015.info.json 2022-04-22 07:45 263.3 KB
Back Doors And Front Doors Breaking The Unbreakable System - 2015.mp4 2016-08-24 19:32 263.4 MB
Badger - The Networked Security State Estimation Toolkit - 2015.description 2022-04-22 10:33 734 B
Badger - The Networked Security State Estimation Toolkit - 2015.info.json 2022-04-22 10:33 261.2 KB
Badger - The Networked Security State Estimation Toolkit - 2015.mp4 2016-08-17 22:41 178.5 MB
Battle Of The SKM And IUM - How Windows 10 Rewrites OS Architecture - 2015.description 2022-04-22 08:49 1.7 KB
Battle Of The SKM And IUM - How Windows 10 Rewrites OS Architecture - 2015.info.json 2022-04-22 08:49 267.6 KB
Battle Of The SKM And IUM - How Windows 10 Rewrites OS Architecture - 2015.mp4 2016-08-27 00:24 241.0 MB
Behind The Mask - The Agenda, Tricks, And Tactics Of The Federal Trade Commission... - 2015.description 2022-04-22 07:14 1.4 KB
Behind The Mask - The Agenda, Tricks, And Tactics Of The Federal Trade Commission... - 2015.info.json 2022-04-22 07:14 263.7 KB
Behind The Mask - The Agenda, Tricks, And Tactics Of The Federal Trade Commission... - 2015.mp4 2020-06-23 06:48 136.4 MB
BGP Stream - 2015.description 2022-04-22 07:09 1.1 KB
BGP Stream - 2015.info.json 2022-04-22 07:09 263.3 KB
BGP Stream - 2015.mp4 2016-08-16 21:31 259.6 MB
Big Game Hunting - The Peculiarities of Nation-State Malware Research - 2015.description 2022-04-22 09:00 1.6 KB
Big Game Hunting - The Peculiarities of Nation-State Malware Research - 2015.info.json 2022-04-22 09:00 661.1 KB
Big Game Hunting - The Peculiarities of Nation-State Malware Research - 2015.mp4 2016-09-05 08:51 365.6 MB
Bitcoin Transaction Malleability Theory in Practice - 2015.description 2022-04-22 11:18 324 B
Bitcoin Transaction Malleability Theory in Practice - 2015.info.json 2022-04-22 11:18 41.8 KB
Bitcoin Transaction Malleability Theory in Practice - 2015.mp4 2016-08-26 08:29 335.9 MB
Blended Web and Database Attacks on Real-Time, In-Memory Platforms - 2015.description 2022-04-22 09:39 2.5 KB
Blended Web and Database Attacks on Real-Time, In-Memory Platforms - 2015.info.json 2022-04-22 09:39 260.2 KB
Blended Web and Database Attacks on Real-Time, In-Memory Platforms - 2015.mp4 2018-03-06 22:43 324.1 MB
Breaking Access Controls With BLEKey - 2015.description 2022-04-22 08:37 1.1 KB
Breaking Access Controls With BLEKey - 2015.info.json 2022-04-22 08:37 262.7 KB
Breaking Access Controls With BLEKey - 2015.mp4 2016-08-20 05:04 274.3 MB
Breaking Honeypots For Fun And Profit - 2015.description 2022-04-22 07:21 830 B
Breaking Honeypots For Fun And Profit - 2015.info.json 2022-04-22 07:21 263.0 KB
Breaking Honeypots For Fun And Profit - 2015.mp4 2016-08-17 01:40 151.5 MB
Breaking HTTPS With BGP Hijacking - 2015.description 2022-04-22 08:43 988 B
Breaking HTTPS With BGP Hijacking - 2015.info.json 2022-04-22 08:43 262.4 KB
Breaking HTTPS With BGP Hijacking - 2015.mp4 2016-08-13 20:04 210.2 MB
Breaking Payloads With Runtime Code Stripping And Image Freezing - 2015.description 2022-04-22 07:07 1.1 KB
Breaking Payloads With Runtime Code Stripping And Image Freezing - 2015.info.json 2022-04-22 07:07 265.5 KB
Breaking Payloads With Runtime Code Stripping And Image Freezing - 2015.mp4 2016-08-20 20:55 328.3 MB
Bring Back the Honeypots - 2015.description 2022-04-22 08:58 1.4 KB
Bring Back the Honeypots - 2015.info.json 2022-04-22 08:58 43.0 KB
Bring Back the Honeypots - 2015.mp4 2016-08-14 01:21 232.8 MB
Bringing A Cannon To A Knife Fight - 2015.description 2022-04-22 07:42 1.7 KB
Bringing A Cannon To A Knife Fight - 2015.info.json 2022-04-22 07:42 263.9 KB
Bringing A Cannon To A Knife Fight - 2015.mp4 2016-08-14 20:15 207.2 MB
Bringing a Machete to the Amazon - 2015.description 2022-04-22 09:06 1.0 KB
Bringing a Machete to the Amazon - 2015.info.json 2022-04-22 09:06 262.8 KB
Bringing a Machete to the Amazon - 2015.mp4 2016-08-25 20:41 239.6 MB
Broadcasting Your Attack - Security Testing DAB Radio In Cars - 2015.description 2022-04-22 07:39 1000 B
Broadcasting Your Attack - Security Testing DAB Radio In Cars - 2015.info.json 2022-04-22 07:39 263.2 KB
Broadcasting Your Attack - Security Testing DAB Radio In Cars - 2015.mp4 2016-08-18 03:46 363.6 MB
Building Safe Systems at Scale - Lessons from Six Months at Yahoo - 2015.description 2022-04-22 12:08 1.2 KB
Building Safe Systems at Scale - Lessons from Six Months at Yahoo - 2015.info.json 2022-04-22 12:08 43.3 KB
Building Safe Systems at Scale - Lessons from Six Months at Yahoo - 2015.mp4 2016-08-11 07:32 443.9 MB
Bypass Control Flow Guard Comprehensively - 2015.description 2022-04-22 07:31 612 B
Bypass Control Flow Guard Comprehensively - 2015.info.json 2022-04-22 07:31 41.4 KB
Bypass Control Flow Guard Comprehensively - 2015.mp4 2016-09-07 06:43 130.1 MB
Bypass Surgery Abusing Content Delivery Networks With... - 2015.description 2022-04-22 07:22 949 B
Bypass Surgery Abusing Content Delivery Networks With... - 2015.info.json 2022-04-22 07:22 264.4 KB
Bypass Surgery Abusing Content Delivery Networks With... - 2015.mp4 2016-08-12 17:15 183.4 MB
Bypassing HTTP Strict Transport Security - 2015.description 2022-04-22 09:57 877 B
Bypassing HTTP Strict Transport Security - 2015.info.json 2022-04-22 09:57 262.8 KB
Bypassing HTTP Strict Transport Security - 2015.mp4 2016-09-04 12:04 246.0 MB
C++11 Metaprogramming Applied to Software Obfuscation - 2015.description 2022-04-22 09:09 1.0 KB
C++11 Metaprogramming Applied to Software Obfuscation - 2015.info.json 2022-04-22 09:09 264.2 KB
C++11 Metaprogramming Applied to Software Obfuscation - 2015.mp4 2016-08-22 18:59 165.2 MB
Call To Arms - A Tale of the Weaknesses of Current Client-Side XSS Filtering - 2015.description 2022-04-22 12:02 1.6 KB
Call To Arms - A Tale of the Weaknesses of Current Client-Side XSS Filtering - 2015.info.json 2022-04-22 12:02 259.2 KB
Call To Arms - A Tale of the Weaknesses of Current Client-Side XSS Filtering - 2015.mp4 2018-03-03 22:36 380.0 MB
Capstone - Next Generation Disassembly Framework - 2015.description 2022-04-22 10:21 2.3 KB
Capstone - Next Generation Disassembly Framework - 2015.info.json 2022-04-22 10:21 45.3 KB
Capstone - Next Generation Disassembly Framework - 2015.mp4 2016-09-07 02:17 320.5 MB
Catching Malware En Masse - DNS and IP Style - 2015.description 2022-04-22 10:52 3.5 KB
Catching Malware En Masse - DNS and IP Style - 2015.info.json 2022-04-22 10:52 266.0 KB
Catching Malware En Masse - DNS and IP Style - 2015.mp4 2016-08-28 13:33 401.2 MB
Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol - 2015.description 2022-04-22 09:59 1.8 KB
Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol - 2015.info.json 2022-04-22 09:59 267.1 KB
Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol - 2015.mp4 2016-08-25 21:44 295.0 MB
Certifi-gate - Front-Door Access To Pwning Millions Of Androids - 2015.description 2022-04-22 07:33 1.1 KB
Certifi-gate - Front-Door Access To Pwning Millions Of Androids - 2015.info.json 2022-04-22 07:33 42.0 KB
Certifi-gate - Front-Door Access To Pwning Millions Of Androids - 2015.mp4 2016-08-12 14:26 125.8 MB
Charge Your Device with the Latest Malware - 2015.description 2022-04-22 09:47 391 B
Charge Your Device with the Latest Malware - 2015.info.json 2022-04-22 09:47 40.4 KB
Charge Your Device with the Latest Malware - 2015.mp4 2016-08-28 06:23 124.2 MB
Cloning 3G_4G SIM Cards With A PC And An Oscilloscope - Lessons Learned In Physical Security - 2015.description 2022-04-22 08:15 1.4 KB
Cloning 3G_4G SIM Cards With A PC And An Oscilloscope - Lessons Learned In Physical Security - 2015.info.json 2022-04-22 08:15 262.3 KB
Cloning 3G_4G SIM Cards With A PC And An Oscilloscope - Lessons Learned In Physical Security - 2015.mp4 2016-08-12 12:51 230.1 MB
CloudBots - Harvesting Crypto Coins Like a Botnet Farmer - 2015.description 2022-04-22 12:13 1.3 KB
CloudBots - Harvesting Crypto Coins Like a Botnet Farmer - 2015.info.json 2022-04-22 12:13 258.7 KB
CloudBots - Harvesting Crypto Coins Like a Botnet Farmer - 2015.mp4 2018-03-03 06:50 357.0 MB
Commercial Mobile Spyware - Detecting The Undetectable - 2015.description 2022-04-22 07:56 357 B
Commercial Mobile Spyware - Detecting The Undetectable - 2015.info.json 2022-04-22 07:56 260.9 KB
Commercial Mobile Spyware - Detecting The Undetectable - 2015.mp4 2016-08-25 00:00 232.1 MB
Computrace Backdoor Revisited - 2015.description 2022-04-22 10:09 1.0 KB
Computrace Backdoor Revisited - 2015.info.json 2022-04-22 10:09 265.2 KB
Computrace Backdoor Revisited - 2015.mp4 2016-08-21 02:15 597.3 MB
Contemporary Automatic Program Analysis - 2015.description 2022-04-22 11:59 1.2 KB
Contemporary Automatic Program Analysis - 2015.info.json 2022-04-22 11:59 621.0 KB
Contemporary Automatic Program Analysis - 2015.mp4 2015-03-17 13:33 363.0 MB
Counterfeiting the Pipes with FakeNet 2.0 (Part 1_2) - 2015.description 2022-04-22 09:30 1.2 KB
Counterfeiting the Pipes with FakeNet 2.0 (Part 1_2) - 2015.info.json 2022-04-22 09:30 263.4 KB
Counterfeiting the Pipes with FakeNet 2.0 (Part 1_2) - 2015.mp4 2016-08-11 18:41 243.9 MB
Counterfeiting the Pipes with FakeNet 2.0 (Part 2_2) - 2015.description 2022-04-22 09:29 1.2 KB
Counterfeiting the Pipes with FakeNet 2.0 (Part 2_2) - 2015.info.json 2022-04-22 09:29 395.8 KB
Counterfeiting the Pipes with FakeNet 2.0 (Part 2_2) - 2015.mp4 2016-08-24 14:43 102.5 MB
CrackLord - Maximizing Password Cracking Boxes - 2015.description 2022-04-22 08:38 2.4 KB
CrackLord - Maximizing Password Cracking Boxes - 2015.info.json 2022-04-22 08:38 262.9 KB
CrackLord - Maximizing Password Cracking Boxes - 2015.mp4 2016-08-20 05:06 93.8 MB
Crash & Pay - How To Own And Clone Contactless Payment Devices - 2015.description 2022-04-22 07:44 741 B
Crash & Pay - How To Own And Clone Contactless Payment Devices - 2015.info.json 2022-04-22 07:44 262.0 KB
Crash & Pay - How To Own And Clone Contactless Payment Devices - 2015.mp4 2016-08-27 03:11 213.4 MB
Creating a Spider Goat - Security with Intel CPU Transactional Memory Support - 2015.description 2022-04-22 11:00 2.1 KB
Creating a Spider Goat - Security with Intel CPU Transactional Memory Support - 2015.info.json 2022-04-22 11:00 731.4 KB
Creating a Spider Goat - Security with Intel CPU Transactional Memory Support - 2015.mp4 2020-10-27 21:12 564.8 MB
Dance Like Nobodys Watching Encrypt Like Everyone Is - A Peek Inside the Black Hat Network - 2015.description 2022-04-22 09:02 832 B
Dance Like Nobodys Watching Encrypt Like Everyone Is - A Peek Inside the Black Hat Network - 2015.info.json 2022-04-22 09:02 714.8 KB
Dance Like Nobodys Watching Encrypt Like Everyone Is - A Peek Inside the Black Hat Network - 2015.mp4 2017-06-18 20:27 301.1 MB
Data-Driven Threat Intelligence - Metrics On Indicator Dissemination And Sharing - 2015.description 2022-04-22 08:41 1.3 KB
Data-Driven Threat Intelligence - Metrics On Indicator Dissemination And Sharing - 2015.info.json 2022-04-22 08:41 263.9 KB
Data-Driven Threat Intelligence - Metrics On Indicator Dissemination And Sharing - 2015.mp4 2016-08-15 17:54 276.0 MB
Data-Only Pwning Microsoft Windows Kernel - 2015.description 2022-04-22 11:38 1.1 KB
Data-Only Pwning Microsoft Windows Kernel - 2015.info.json 2022-04-22 11:38 261.8 KB
Data-Only Pwning Microsoft Windows Kernel - 2015.mp4 2016-08-21 09:32 188.5 MB
Deep Learning On Disassembly - 2015.description 2022-04-22 07:39 1.0 KB
Deep Learning On Disassembly - 2015.info.json 2022-04-22 07:39 262.3 KB
Deep Learning On Disassembly - 2015.mp4 2016-08-16 12:37 157.7 MB
Defeating Machine Learning - What Your Security Vendor Is Not Telling You - 2015.description 2022-04-22 08:11 768 B
Defeating Machine Learning - What Your Security Vendor Is Not Telling You - 2015.info.json 2022-04-22 08:11 262.9 KB
Defeating Machine Learning - What Your Security Vendor Is Not Telling You - 2015.mp4 2016-08-13 14:59 463.0 MB
Defeating Pass-the-Hash - Separation Of Powers - 2015.description 2022-04-22 08:13 1.1 KB
Defeating Pass-the-Hash - Separation Of Powers - 2015.info.json 2022-04-22 08:13 262.9 KB
Defeating Pass-the-Hash - Separation Of Powers - 2015.mp4 2016-09-04 05:35 452.6 MB
Defeating the Transparency Feature of DBI - 2015.description 2022-04-22 10:32 1.0 KB
Defeating the Transparency Feature of DBI - 2015.info.json 2022-04-22 10:32 430.5 KB
Defeating the Transparency Feature of DBI - 2015.mp4 2021-02-12 13:19 173.1 MB
Digging for IE11 Sandbox Escapes Part 1 - 2015.description 2022-04-22 11:41 1.2 KB
Digging for IE11 Sandbox Escapes Part 1 - 2015.info.json 2022-04-22 11:41 43.2 KB
Digging for IE11 Sandbox Escapes Part 1 - 2015.mp4 2016-09-07 00:16 359.6 MB
Digging for IE11 Sandbox Escapes Part 2 - 2015.description 2022-04-22 11:47 1.2 KB
Digging for IE11 Sandbox Escapes Part 2 - 2015.info.json 2022-04-22 11:47 365.9 KB
Digging for IE11 Sandbox Escapes Part 2 - 2015.mp4 2021-02-11 03:31 346.4 MB
Distributing The Reconstruction Of High-Level Intermediate Representation... - 2015.description 2022-04-22 07:24 2.2 KB
Distributing The Reconstruction Of High-Level Intermediate Representation... - 2015.info.json 2022-04-22 07:24 263.9 KB
Distributing The Reconstruction Of High-Level Intermediate Representation... - 2015.mp4 2016-08-27 19:51 151.7 MB
Dom Flow - Untangling The DOM For More Easy-Juicy Bugs - 2015.description 2022-04-22 07:06 1.8 KB
Dom Flow - Untangling The DOM For More Easy-Juicy Bugs - 2015.info.json 2022-04-22 07:06 264.7 KB
Dom Flow - Untangling The DOM For More Easy-Juicy Bugs - 2015.mp4 2016-08-21 09:43 260.7 MB
Don't Trust Your USB! How to Find Bugs in USB Device Drivers - 2015.description 2022-04-22 09:52 2.9 KB
Don't Trust Your USB! How to Find Bugs in USB Device Drivers - 2015.info.json 2022-04-22 09:52 263.5 KB
Don't Trust Your USB! How to Find Bugs in USB Device Drivers - 2015.mp4 2016-08-28 22:28 172.8 MB
DTM Components - Shadow Keys to the ICS Kingdom - 2015.description 2022-04-22 09:42 1.1 KB
DTM Components - Shadow Keys to the ICS Kingdom - 2015.info.json 2022-04-22 09:42 262.8 KB
DTM Components - Shadow Keys to the ICS Kingdom - 2015.mp4 2016-08-24 09:57 332.8 MB
Dynamic Flash Instrumentation for Fun and Profit - 2015.description 2022-04-22 11:32 1.0 KB
Dynamic Flash Instrumentation for Fun and Profit - 2015.info.json 2022-04-22 11:32 595.9 KB
Dynamic Flash Instrumentation for Fun and Profit - 2015.mp4 2021-02-13 04:13 340.2 MB
Emanate Like A Boss - Generalized Covert Data Exfiltration With Funtenna - 2015.description 2022-04-22 08:54 1.4 KB
Emanate Like A Boss - Generalized Covert Data Exfiltration With Funtenna - 2015.info.json 2022-04-22 08:54 263.8 KB
Emanate Like A Boss - Generalized Covert Data Exfiltration With Funtenna - 2015.mp4 2016-08-20 06:21 260.4 MB
Endrun - Secure Digital Communications for Our Modern Dystopia - 2015.description 2022-04-22 09:53 799 B
Endrun - Secure Digital Communications for Our Modern Dystopia - 2015.info.json 2022-04-22 09:53 598.0 KB
Endrun - Secure Digital Communications for Our Modern Dystopia - 2015.mp4 2016-09-07 22:31 383.0 MB
Epidemiology of Software Vulnerabilities - A Study of Attack Surface Spread - 2015.description 2022-04-22 12:05 1.0 KB
Epidemiology of Software Vulnerabilities - A Study of Attack Surface Spread - 2015.info.json 2022-04-22 12:05 41.3 KB
Epidemiology of Software Vulnerabilities - A Study of Attack Surface Spread - 2015.mp4 2016-08-15 02:38 187.9 MB
Evasion of High-End IDPS Devices at the IPv6 Era - 2015.description 2022-04-22 09:12 2.0 KB
Evasion of High-End IDPS Devices at the IPv6 Era - 2015.info.json 2022-04-22 09:12 264.4 KB
Evasion of High-End IDPS Devices at the IPv6 Era - 2015.mp4 2016-08-14 00:42 374.7 MB
Evasion of High-End IPS Devices in the Age of IPv6 - 2015.description 2022-04-22 10:41 1.7 KB
Evasion of High-End IPS Devices in the Age of IPv6 - 2015.info.json 2022-04-22 10:41 493.7 KB
Evasion of High-End IPS Devices in the Age of IPv6 - 2015.mp4 2015-04-02 11:57 210.9 MB
Exploiting Out-of-Order Execution For Covert Cross-VM Communication - 2015.description 2022-04-22 07:38 466 B
Exploiting Out-of-Order Execution For Covert Cross-VM Communication - 2015.info.json 2022-04-22 07:38 261.2 KB
Exploiting Out-of-Order Execution For Covert Cross-VM Communication - 2015.mp4 2016-08-13 08:41 89.7 MB
Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges - 2015.description 2022-04-22 08:55 1.3 KB
Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges - 2015.info.json 2022-04-22 08:55 265.0 KB
Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges - 2015.mp4 2016-08-12 19:43 287.4 MB
Exploiting Unpatched iOS Vulnerabilities for Fun and Profit - 2015.description 2022-04-22 11:19 1.1 KB
Exploiting Unpatched iOS Vulnerabilities for Fun and Profit - 2015.info.json 2022-04-22 11:19 262.7 KB
Exploiting Unpatched iOS Vulnerabilities for Fun and Profit - 2015.mp4 2016-08-11 18:20 287.6 MB
Exploiting XXE Vulnerabilities In File Parsing Functionality - 2015.description 2022-04-22 07:23 601 B
Exploiting XXE Vulnerabilities In File Parsing Functionality - 2015.info.json 2022-04-22 07:23 261.1 KB
Exploiting XXE Vulnerabilities In File Parsing Functionality - 2015.mp4 2016-08-27 12:06 92.2 MB
Exploring Yosemite - Abusing Mac OS X 10.10 - 2015.description 2022-04-22 09:08 1.2 KB
Exploring Yosemite - Abusing Mac OS X 10.10 - 2015.info.json 2022-04-22 09:08 263.5 KB
Exploring Yosemite - Abusing Mac OS X 10.10 - 2015.mp4 2016-08-12 03:01 351.6 MB
Exposing Bootkits with BIOS Emulation - 2015.description 2022-04-22 11:07 1.5 KB
Exposing Bootkits with BIOS Emulation - 2015.info.json 2022-04-22 11:07 42.8 KB
Exposing Bootkits with BIOS Emulation - 2015.mp4 2016-08-26 06:31 277.9 MB
Extreme Privilege Escalation on Windows 8_UEFI Systems - 2015.description 2022-04-22 11:24 1.0 KB
Extreme Privilege Escalation on Windows 8_UEFI Systems - 2015.info.json 2022-04-22 11:24 263.4 KB
Extreme Privilege Escalation on Windows 8_UEFI Systems - 2015.mp4 2016-08-28 01:12 480.9 MB
Faux Disk Encryption - Realities Of Secure Storage On Mobile Devices - 2015.description 2022-04-22 08:39 2.0 KB
Faux Disk Encryption - Realities Of Secure Storage On Mobile Devices - 2015.info.json 2022-04-22 08:39 263.7 KB
Faux Disk Encryption - Realities Of Secure Storage On Mobile Devices - 2015.mp4 2016-08-25 04:26 238.9 MB
FileCry - The New Age Of XXE - 2015.description 2022-04-22 07:28 1.0 KB
FileCry - The New Age Of XXE - 2015.info.json 2022-04-22 07:28 262.1 KB
FileCry - The New Age Of XXE - 2015.mp4 2016-09-02 19:44 307.9 MB
Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces - 2015.description 2022-04-22 12:07 1.4 KB
Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces - 2015.info.json 2022-04-22 12:07 263.8 KB
Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces - 2015.mp4 2016-08-20 12:25 438.1 MB
Fingerprinting Web Application Platforms by Variations in PNG Implementations - 2015.description 2022-04-22 11:58 859 B
Fingerprinting Web Application Platforms by Variations in PNG Implementations - 2015.info.json 2022-04-22 11:58 437.8 KB
Fingerprinting Web Application Platforms by Variations in PNG Implementations - 2015.mp4 2015-03-17 13:34 156.0 MB
Fingerprints On Mobile Devices - Abusing And Leaking - 2015.description 2022-04-22 07:52 1.1 KB
Fingerprints On Mobile Devices - Abusing And Leaking - 2015.info.json 2022-04-22 07:52 262.9 KB
Fingerprints On Mobile Devices - Abusing And Leaking - 2015.mp4 2016-09-08 13:23 303.9 MB
Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service - 2015.description 2022-04-22 09:40 1.6 KB
Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service - 2015.info.json 2022-04-22 09:40 263.4 KB
Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service - 2015.mp4 2016-08-22 21:05 248.5 MB
Forging The USB Armory, An Open Source Secure Flash-Drive-Sized Computer - 2015.description 2022-04-22 08:36 37 B
Forging The USB Armory, An Open Source Secure Flash-Drive-Sized Computer - 2015.info.json 2022-04-22 08:36 261.9 KB
Forging The USB Armory, An Open Source Secure Flash-Drive-Sized Computer - 2015.mp4 2016-08-13 22:58 185.9 MB
Freeze Drying for Capturing Environment-Sensitive Malware Alive - 2015.description 2022-04-22 09:22 996 B
Freeze Drying for Capturing Environment-Sensitive Malware Alive - 2015.info.json 2022-04-22 09:22 610.6 KB
Freeze Drying for Capturing Environment-Sensitive Malware Alive - 2015.mp4 2015-04-03 12:44 317.3 MB
From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices - 2015.description 2022-04-22 11:34 1.7 KB
From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices - 2015.info.json 2022-04-22 11:34 507.5 KB
From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices - 2015.mp4 2015-03-18 12:22 223.6 MB
From False Positives To Actionable Analysis - 2015.description 2022-04-22 08:05 1.6 KB
From False Positives To Actionable Analysis - 2015.info.json 2022-04-22 08:05 263.2 KB
From False Positives To Actionable Analysis - 2015.mp4 2016-08-28 05:09 417.6 MB
Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware - 2015.description 2022-04-28 20:09 2.7 KB
Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware - 2015.info.json 2022-04-28 20:09 381.3 KB
Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware - 2015.mp4 2016-08-20 16:19 293.5 MB
GameOver Zeus - Badguys And Backends - 2015.description 2022-04-22 07:59 810 B
GameOver Zeus - Badguys And Backends - 2015.info.json 2022-04-22 07:59 263.0 KB
GameOver Zeus - Badguys And Backends - 2015.mp4 2016-08-20 21:28 391.8 MB
Governments As Malware Authors - The Next Generation - 2015.description 2022-04-22 10:30 442 B
Governments As Malware Authors - The Next Generation - 2015.info.json 2022-04-22 10:30 262.9 KB
Governments As Malware Authors - The Next Generation - 2015.mp4 2016-08-25 02:57 416.8 MB
Graphic Content Ahead - Towards Automated Scalable Analysis Of Graphical Images Embedded In Malware - 2015.description 2022-04-22 08:30 3.3 KB
Graphic Content Ahead - Towards Automated Scalable Analysis Of Graphical Images Embedded In Malware - 2015.info.json 2022-04-22 08:30 263.9 KB
Graphic Content Ahead - Towards Automated Scalable Analysis Of Graphical Images Embedded In Malware - 2015.mp4 2016-08-15 08:53 99.1 MB
GRR - Find All the Badness, Collect All the Things - 2015.description 2022-04-22 11:09 1.3 KB
GRR - Find All the Badness, Collect All the Things - 2015.info.json 2022-04-22 11:09 43.7 KB
GRR - Find All the Badness, Collect All the Things - 2015.mp4 2016-08-27 15:10 394.0 MB
Gyrophone - Eavesdropping Using a Gyroscope - 2015.description 2022-04-22 09:19 536 B
Gyrophone - Eavesdropping Using a Gyroscope - 2015.info.json 2022-04-22 09:19 370.7 KB
Gyrophone - Eavesdropping Using a Gyroscope - 2015.mp4 2016-08-21 06:58 255.2 MB
Hack Your ATM with Friend's Raspberry.Py - 2015.description 2022-04-22 09:43 1.8 KB
Hack Your ATM with Friend's Raspberry.Py - 2015.info.json 2022-04-22 09:43 263.3 KB
Hack Your ATM with Friend's Raspberry.Py - 2015.mp4 2016-08-16 14:32 176.4 MB
Hacking the Wireless World with Software Defined Radio - 2.0 - 2015.description 2022-04-22 11:31 1.6 KB
Hacking the Wireless World with Software Defined Radio - 2.0 - 2015.info.json 2022-04-22 11:31 266.3 KB
Hacking the Wireless World with Software Defined Radio - 2.0 - 2015.mp4 2020-12-20 06:54 435.1 MB
Hadoop Security - Seven Ways to Kill an Elephant - 2015.description 2022-04-22 09:23 892 B
Hadoop Security - Seven Ways to Kill an Elephant - 2015.info.json 2022-04-22 09:23 264.0 KB
Hadoop Security - Seven Ways to Kill an Elephant - 2015.mp4 2016-08-28 15:11 272.7 MB
Harnessing Intelligence From Malware Repositories - 2015.description 2022-04-22 08:22 1.9 KB
Harnessing Intelligence From Malware Repositories - 2015.info.json 2022-04-22 08:22 264.6 KB
Harnessing Intelligence From Malware Repositories - 2015.mp4 2016-08-27 13:30 356.4 MB
HI THIS IS URGENT PLZ FIX ASAP - Critical Vulnerabilities And Bug Bounty Programs - 2015.description 2022-04-22 07:29 991 B
HI THIS IS URGENT PLZ FIX ASAP - Critical Vulnerabilities And Bug Bounty Programs - 2015.info.json 2022-04-22 07:29 262.7 KB
HI THIS IS URGENT PLZ FIX ASAP - Critical Vulnerabilities And Bug Bounty Programs - 2015.mp4 2016-08-11 02:25 238.8 MB
Hidden Risks Of Biometric Identifiers And How To Avoid Them - 2015.description 2022-04-22 08:45 1.5 KB
Hidden Risks Of Biometric Identifiers And How To Avoid Them - 2015.info.json 2022-04-22 08:45 263.9 KB
Hidden Risks Of Biometric Identifiers And How To Avoid Them - 2015.mp4 2016-08-27 10:24 177.8 MB
Hide Android Applications in Images - 2015.description 2022-04-22 09:51 880 B
Hide Android Applications in Images - 2015.info.json 2022-04-22 09:51 261.4 KB
Hide Android Applications in Images - 2015.mp4 2016-08-10 23:31 132.0 MB
How Smartcard Payment Systems Fail - 2015.description 2022-04-22 11:55 2.4 KB
How Smartcard Payment Systems Fail - 2015.info.json 2022-04-22 11:55 266.3 KB
How Smartcard Payment Systems Fail - 2015.mp4 2018-10-10 19:31 165.0 MB
How To Hack Government - Technologists As Policy Makers - 2015.description 2022-04-22 08:44 731 B
How To Hack Government - Technologists As Policy Makers - 2015.info.json 2022-04-22 08:44 263.0 KB
How To Hack Government - Technologists As Policy Makers - 2015.mp4 2016-08-24 19:58 229.3 MB
How To Implement IT Security After A Cyber Meltdown - 2015.description 2022-04-22 07:42 574 B
How To Implement IT Security After A Cyber Meltdown - 2015.info.json 2022-04-22 07:42 262.8 KB
How To Implement IT Security After A Cyber Meltdown - 2015.mp4 2016-08-11 03:33 186.8 MB
How to Leak a 100-Million-Node Social Graph in Just One Week - 2015.description 2022-04-22 12:04 2.3 KB
How to Leak a 100-Million-Node Social Graph in Just One Week - 2015.info.json 2022-04-22 12:04 263.1 KB
How to Leak a 100-Million-Node Social Graph in Just One Week - 2015.mp4 2016-08-27 11:56 188.6 MB
How to Wear Your Password - 2015.description 2022-04-22 11:16 1.8 KB
How to Wear Your Password - 2015.info.json 2022-04-22 11:16 263.2 KB
How to Wear Your Password - 2015.mp4 2016-08-22 09:24 189.7 MB
How Vulnerable Are We To Scams - 2015.description 2022-04-22 07:44 1.0 KB
How Vulnerable Are We To Scams - 2015.info.json 2022-04-22 07:44 261.7 KB
How Vulnerable Are We To Scams - 2015.mp4 2016-09-03 03:21 178.3 MB
I Know Your Filtering Policy Better than You Do - 2015.description 2022-04-22 11:57 1.6 KB
I Know Your Filtering Policy Better than You Do - 2015.info.json 2022-04-22 11:57 263.4 KB
I Know Your Filtering Policy Better than You Do - 2015.mp4 2016-08-15 07:54 439.3 MB
ICSCorsair - How I Will PWN Your ERP Through 4-20 mA Current Loop - 2015.description 2022-04-22 10:27 1.3 KB
ICSCorsair - How I Will PWN Your ERP Through 4-20 mA Current Loop - 2015.info.json 2022-04-22 10:27 262.9 KB
ICSCorsair - How I Will PWN Your ERP Through 4-20 mA Current Loop - 2015.mp4 2016-08-28 05:32 350.8 MB
Industrial Control Systems - Pentesting PLCs 101 (Part 1_2) - 2015.description 2022-04-22 09:25 885 B
Industrial Control Systems - Pentesting PLCs 101 (Part 1_2) - 2015.info.json 2022-04-22 09:25 263.3 KB
Industrial Control Systems - Pentesting PLCs 101 (Part 1_2) - 2015.mp4 2016-08-21 11:59 319.7 MB
Industrial Control Systems - Pentesting PLCs 101 (Part 2_2) - 2015.description 2022-04-22 09:26 885 B
Industrial Control Systems - Pentesting PLCs 101 (Part 2_2) - 2015.info.json 2022-04-22 09:26 263.1 KB
Industrial Control Systems - Pentesting PLCs 101 (Part 2_2) - 2015.mp4 2016-08-23 03:18 295.2 MB
Information Access And Information Sharing - Where We Are And Where We Are Going - 2015.description 2022-04-22 07:05 919 B
Information Access And Information Sharing - Where We Are And Where We Are Going - 2015.info.json 2022-04-22 07:05 262.6 KB
Information Access And Information Sharing - Where We Are And Where We Are Going - 2015.mp4 2016-08-11 14:02 198.0 MB
Internet Plumbing for Security Professionals - The State Of BGP Security - 2015.description 2022-04-22 08:32 870 B
Internet Plumbing for Security Professionals - The State Of BGP Security - 2015.info.json 2022-04-22 08:32 262.7 KB
Internet Plumbing for Security Professionals - The State Of BGP Security - 2015.mp4 2016-08-11 13:58 132.5 MB
Internet Scanning - Current State and Lessons Learned - 2015.description 2022-04-22 10:32 1.2 KB
Internet Scanning - Current State and Lessons Learned - 2015.info.json 2022-04-22 10:32 504.1 KB
Internet Scanning - Current State and Lessons Learned - 2015.mp4 2016-08-27 19:11 153.8 MB
Internet-Scale File Analysis - 2015.description 2022-04-22 08:47 1.9 KB
Internet-Scale File Analysis - 2015.info.json 2022-04-22 08:47 263.7 KB
Internet-Scale File Analysis - 2015.mp4 2016-08-25 04:15 169.4 MB
Investigating PowerShell Attacks - 2015.description 2022-04-22 11:14 1.1 KB
Investigating PowerShell Attacks - 2015.info.json 2022-04-22 11:14 261.8 KB
Investigating PowerShell Attacks - 2015.mp4 2016-08-22 01:18 184.1 MB
Is The NSA Still Listening To Your Phone Calls A Surveillance Debate - 2015.description 2022-04-22 08:25 979 B
Is The NSA Still Listening To Your Phone Calls A Surveillance Debate - 2015.info.json 2022-04-22 08:25 263.0 KB
Is The NSA Still Listening To Your Phone Calls A Surveillance Debate - 2015.mp4 2016-08-28 15:14 491.0 MB
It Just (Net)works - The Truth About iOS 7's Multipeer Connectivity Framework - 2015.description 2022-04-22 10:48 1.4 KB
It Just (Net)works - The Truth About iOS 7's Multipeer Connectivity Framework - 2015.info.json 2022-04-22 10:48 263.0 KB
It Just (Net)works - The Truth About iOS 7's Multipeer Connectivity Framework - 2015.mp4 2016-08-25 14:27 280.0 MB
Learn How to Control Every Room at a Luxury Hotel Remotely - 2015.description 2022-04-22 11:49 2.1 KB
Learn How to Control Every Room at a Luxury Hotel Remotely - 2015.info.json 2022-04-22 11:49 262.6 KB
Learn How to Control Every Room at a Luxury Hotel Remotely - 2015.mp4 2016-08-22 13:57 126.9 MB
Lessons Learned from Eight Years of Breaking Hypervisors - 2015.description 2022-04-22 09:36 1.5 KB
Lessons Learned from Eight Years of Breaking Hypervisors - 2015.info.json 2022-04-22 09:36 43.6 KB
Lessons Learned from Eight Years of Breaking Hypervisors - 2015.mp4 2016-09-02 02:25 291.6 MB
Leviathan - Command and Control Communications on Planet Earth - 2015.description 2022-04-22 10:37 1.7 KB
Leviathan - Command and Control Communications on Planet Earth - 2015.info.json 2022-04-22 10:37 264.5 KB
Leviathan - Command and Control Communications on Planet Earth - 2015.mp4 2016-08-27 11:18 228.1 MB
Lifecycle of a Phone Fraudster - Exposing Fraud Activity - 2015.description 2022-04-22 11:27 1.2 KB
Lifecycle of a Phone Fraudster - Exposing Fraud Activity - 2015.info.json 2022-04-22 11:27 263.6 KB
Lifecycle of a Phone Fraudster - Exposing Fraud Activity - 2015.mp4 2016-08-11 10:02 379.8 MB
Lights Off! The Darkness of the Smart Meters - 2015.description 2022-04-22 09:07 997 B
Lights Off! The Darkness of the Smart Meters - 2015.info.json 2022-04-22 09:07 263.3 KB
Lights Off! The Darkness of the Smart Meters - 2015.mp4 2016-08-27 04:21 311.5 MB
Man in the Binder - He Who Controls IPC, Controls the Droid - 2015.description 2022-04-22 09:55 1.4 KB
Man in the Binder - He Who Controls IPC, Controls the Droid - 2015.info.json 2022-04-22 09:55 262.6 KB
Man in the Binder - He Who Controls IPC, Controls the Droid - 2015.mp4 2016-08-28 01:13 216.7 MB
Miniaturization - 2015.description 2022-04-22 10:26 2.0 KB
Miniaturization - 2015.info.json 2022-04-22 10:26 258.8 KB
Miniaturization - 2015.mp4 2018-03-04 06:09 239.6 MB
Mobile Device Mismanagement - 2015.description 2022-04-22 10:42 1.1 KB
Mobile Device Mismanagement - 2015.info.json 2022-04-22 10:42 666.7 KB
Mobile Device Mismanagement - 2015.mp4 2015-03-23 01:32 376.1 MB
Mobile Point Of Scam - Attacking The Square Reader - 2015.description 2022-04-22 07:24 1.1 KB
Mobile Point Of Scam - Attacking The Square Reader - 2015.info.json 2022-04-22 07:24 456.7 KB
Mobile Point Of Scam - Attacking The Square Reader - 2015.mp4 2020-06-22 22:48 57.3 MB
MoRE Shadow Walker - The Progression of TLB-Splitting on x86 - 2015.description 2022-04-22 10:07 1.2 KB
MoRE Shadow Walker - The Progression of TLB-Splitting on x86 - 2015.info.json 2022-04-22 10:07 262.7 KB
MoRE Shadow Walker - The Progression of TLB-Splitting on x86 - 2015.mp4 2016-08-19 05:49 266.8 MB
Most Ransomware Isn't As Complex As You Might Think - 2015.description 2022-04-22 08:07 3.0 KB
Most Ransomware Isn't As Complex As You Might Think - 2015.info.json 2022-04-22 08:07 264.6 KB
Most Ransomware Isn't As Complex As You Might Think - 2015.mp4 2018-10-14 21:00 96.8 MB
Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols - 2015.description 2022-04-22 10:40 808 B
Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols - 2015.info.json 2022-04-22 10:40 262.6 KB
Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols - 2015.mp4 2016-08-15 01:29 269.3 MB
My Bro The ELK - Obtaining Context From Security Events - 2015.description 2022-04-22 07:33 1.1 KB
My Bro The ELK - Obtaining Context From Security Events - 2015.info.json 2022-04-22 07:33 261.5 KB
My Bro The ELK - Obtaining Context From Security Events - 2015.mp4 2016-08-21 13:21 103.0 MB
My Google Glass Sees Your Passwords! - 2015.description 2022-04-22 11:48 1.6 KB
My Google Glass Sees Your Passwords! - 2015.info.json 2022-04-22 11:48 44.2 KB
My Google Glass Sees Your Passwords! - 2015.mp4 2016-08-27 19:09 143.5 MB
Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells - 2015.description 2022-04-22 10:34 1.8 KB
Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells - 2015.info.json 2022-04-22 10:34 263.9 KB
Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells - 2015.mp4 2015-04-03 12:35 459.0 MB
Next Level Cheating and Leveling Up Mitigations - 2015.description 2022-04-22 09:21 600 B
Next Level Cheating and Leveling Up Mitigations - 2015.info.json 2022-04-22 09:21 263.7 KB
Next Level Cheating and Leveling Up Mitigations - 2015.mp4 2016-08-23 07:10 181.2 MB
One Packer to Rule Them All - 2015.description 2022-04-22 11:11 1.3 KB
One Packer to Rule Them All - 2015.info.json 2022-04-22 11:11 261.8 KB
One Packer to Rule Them All - 2015.mp4 2016-08-17 01:03 156.5 MB
OpenStack Cloud at Yahoo Scale - How to Avoid Disaster - 2015.description 2022-04-22 10:18 1020 B
OpenStack Cloud at Yahoo Scale - How to Avoid Disaster - 2015.info.json 2022-04-22 10:18 256.5 KB
OpenStack Cloud at Yahoo Scale - How to Avoid Disaster - 2015.mp4 2018-03-03 16:14 208.7 MB
Optimized Fuzzing IOKit In iOS - 2015.description 2022-04-22 08:31 1.4 KB
Optimized Fuzzing IOKit In iOS - 2015.info.json 2022-04-22 08:31 263.9 KB
Optimized Fuzzing IOKit In iOS - 2015.mp4 2016-08-21 18:04 106.7 MB
Panel - How The Wassenaar Arrangement's Export Control Of 'Intrusion Software' Affects Industry - 2015.description 2022-04-22 08:27 902 B
Panel - How The Wassenaar Arrangement's Export Control Of 'Intrusion Software' Affects Industry - 2015.info.json 2022-04-22 08:27 263.2 KB
Panel - How The Wassenaar Arrangement's Export Control Of 'Intrusion Software' Affects Industry - 2015.mp4 2016-08-14 09:30 481.9 MB
PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1_2) - 2015.description 2022-04-22 09:45 947 B
PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1_2) - 2015.info.json 2022-04-22 09:45 262.8 KB
PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1_2) - 2015.mp4 2016-08-27 15:45 208.5 MB
PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2_2) - 2015.description 2022-04-22 09:11 947 B
PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2_2) - 2015.info.json 2022-04-22 09:11 43.3 KB
PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2_2) - 2015.mp4 2016-08-13 01:30 261.3 MB
Pen Testing A City - 2015.description 2022-04-22 07:50 2.5 KB
Pen Testing A City - 2015.info.json 2022-04-22 07:50 264.6 KB
Pen Testing A City - 2015.mp4 2016-08-27 16:06 387.6 MB
Pivoting in Amazon Clouds - 2015.description 2022-04-22 12:15 1.2 KB
Pivoting in Amazon Clouds - 2015.info.json 2022-04-22 12:15 263.7 KB
Pivoting in Amazon Clouds - 2015.mp4 2016-08-22 01:21 295.1 MB
Poacher Turned Gamekeeper - Lessons Learned from Eight Years of Breaking Hypervisors - 2015.description 2022-04-22 10:14 1.5 KB
Poacher Turned Gamekeeper - Lessons Learned from Eight Years of Breaking Hypervisors - 2015.info.json 2022-04-22 10:14 489.1 KB
Poacher Turned Gamekeeper - Lessons Learned from Eight Years of Breaking Hypervisors - 2015.mp4 2015-04-02 12:38 466.4 MB
Point of Sale System Architecture and Security - 2015.description 2022-04-22 11:35 1.1 KB
Point of Sale System Architecture and Security - 2015.info.json 2022-04-22 11:35 261.7 KB
Point of Sale System Architecture and Security - 2015.mp4 2016-08-27 17:16 132.1 MB
Prevalent Characteristics in Modern Malware - 2015.description 2022-04-22 10:59 2.1 KB
Prevalent Characteristics in Modern Malware - 2015.info.json 2022-04-22 10:59 263.8 KB
Prevalent Characteristics in Modern Malware - 2015.mp4 2016-08-23 04:07 292.0 MB
Probabilistic Spying on Encrypted Tunnels - 2015.description 2022-04-22 11:56 517 B
Probabilistic Spying on Encrypted Tunnels - 2015.info.json 2022-04-22 11:56 260.8 KB
Probabilistic Spying on Encrypted Tunnels - 2015.mp4 2016-09-02 02:45 190.2 MB
Protecting Data In-Use from Firmware and Physical Attacks - 2015.description 2022-04-22 11:54 767 B
Protecting Data In-Use from Firmware and Physical Attacks - 2015.info.json 2022-04-22 11:54 261.5 KB
Protecting Data In-Use from Firmware and Physical Attacks - 2015.mp4 2016-08-13 01:30 254.9 MB
Pulling Back the Curtain on Airport Security - Can a Weapon Get Past TSA - 2015.description 2022-04-22 11:59 824 B
Pulling Back the Curtain on Airport Security - Can a Weapon Get Past TSA - 2015.info.json 2022-04-22 11:59 262.0 KB
Pulling Back the Curtain on Airport Security - Can a Weapon Get Past TSA - 2015.mp4 2021-01-08 08:29 52.3 MB
PWNIE Awards - 2015.description 2022-04-22 07:03 0 B
PWNIE Awards - 2015.info.json 2022-04-22 07:03 262.4 KB
PWNIE Awards - 2015.mp4 2016-08-14 21:12 265.5 MB
PWNIE Awards at Black Hat USA 2014 - 2015.description 2022-04-22 10:57 0 B
PWNIE Awards at Black Hat USA 2014 - 2015.info.json 2022-04-22 10:57 261.6 KB
PWNIE Awards at Black Hat USA 2014 - 2015.mp4 2016-08-25 06:54 191.4 MB
Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare - 2015.description 2022-04-22 09:49 2.0 KB
Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare - 2015.info.json 2022-04-22 09:49 652.5 KB
Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare - 2015.mp4 2016-08-20 11:59 289.7 MB
Quantum Key Distribution and the Future of Encryption - 2015.description 2022-04-22 09:51 751 B
Quantum Key Distribution and the Future of Encryption - 2015.info.json 2022-04-22 09:51 261.8 KB
Quantum Key Distribution and the Future of Encryption - 2015.mp4 2016-08-19 07:01 154.6 MB
RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits - 2015.description 2022-04-22 12:16 1.1 KB
RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits - 2015.info.json 2022-04-22 12:16 262.9 KB
RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits - 2015.mp4 2016-08-27 16:53 333.4 MB
Red Vs. Blue - Modern Active Directory Attacks, Detection, And Protection - 2015.description 2022-04-22 08:19 2.1 KB
Red Vs. Blue - Modern Active Directory Attacks, Detection, And Protection - 2015.info.json 2022-04-22 08:19 263.9 KB
Red Vs. Blue - Modern Active Directory Attacks, Detection, And Protection - 2015.mp4 2016-08-16 12:53 458.3 MB
Reflected File Download - A New Web Attack Vector - 2015.description 2022-04-22 09:17 979 B
Reflected File Download - A New Web Attack Vector - 2015.info.json 2022-04-22 09:17 263.1 KB
Reflected File Download - A New Web Attack Vector - 2015.mp4 2016-08-22 16:02 281.3 MB
Reflections on Trusting TrustZone - 2015.description 2022-04-22 10:50 1.1 KB
Reflections on Trusting TrustZone - 2015.info.json 2022-04-22 10:50 264.2 KB
Reflections on Trusting TrustZone - 2015.mp4 2016-08-25 12:09 204.5 MB
Remote Exploitation Of An Unaltered Passenger Vehicle - 2015.description 2022-04-22 08:17 890 B
Remote Exploitation Of An Unaltered Passenger Vehicle - 2015.info.json 2022-04-22 08:17 264.4 KB
Remote Exploitation Of An Unaltered Passenger Vehicle - 2015.mp4 2016-08-27 09:24 405.6 MB
Remote Physical Damage 101 - Bread And Butter Attacks - 2015.description 2022-04-22 08:29 1.6 KB
Remote Physical Damage 101 - Bread And Butter Attacks - 2015.info.json 2022-04-22 08:29 263.4 KB
Remote Physical Damage 101 - Bread And Butter Attacks - 2015.mp4 2016-08-27 18:54 158.3 MB
Repurposing OnionDuke - A Single Case Study Around Reusing Nation State Malware - 2015.description 2022-04-22 08:57 444 B
Repurposing OnionDuke - A Single Case Study Around Reusing Nation State Malware - 2015.info.json 2022-04-22 08:57 261.4 KB
Repurposing OnionDuke - A Single Case Study Around Reusing Nation State Malware - 2015.mp4 2016-08-21 06:36 180.6 MB
Researching Android Device Security with the Help of a Droid Army - 2015.description 2022-04-22 10:45 1.2 KB
Researching Android Device Security with the Help of a Droid Army - 2015.info.json 2022-04-22 10:45 519.1 KB
Researching Android Device Security with the Help of a Droid Army - 2015.mp4 2015-03-19 14:00 479.4 MB
ret2dir - Deconstructing Kernel Isolation - 2015.description 2022-04-22 09:18 1.8 KB
ret2dir - Deconstructing Kernel Isolation - 2015.info.json 2022-04-22 09:18 264.5 KB
ret2dir - Deconstructing Kernel Isolation - 2015.mp4 2016-08-29 03:46 362.8 MB
Return To Where You Can't Exploit What You Can't Find - 2015.description 2022-04-22 07:32 2.3 KB
Return To Where You Can't Exploit What You Can't Find - 2015.info.json 2022-04-22 07:32 265.7 KB
Return To Where You Can't Exploit What You Can't Find - 2015.mp4 2016-08-29 01:54 177.1 MB
Reverse Engineering Flash Memory for Fun and Benefit - 2015.description 2022-04-22 10:29 1.6 KB
Reverse Engineering Flash Memory for Fun and Benefit - 2015.info.json 2022-04-22 10:29 265.0 KB
Reverse Engineering Flash Memory for Fun and Benefit - 2015.mp4 2016-08-16 09:56 179.6 MB
Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device - 2015.description 2022-04-22 11:03 1.5 KB
Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device - 2015.info.json 2022-04-22 11:03 265.7 KB
Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device - 2015.mp4 2016-09-03 15:01 278.9 MB
Review And Exploit Neglected Attack Surfaces In iOS 8 - 2015.description 2022-04-22 07:08 980 B
Review And Exploit Neglected Attack Surfaces In iOS 8 - 2015.info.json 2022-04-22 07:08 263.2 KB
Review And Exploit Neglected Attack Surfaces In iOS 8 - 2015.mp4 2016-09-01 23:30 165.7 MB
Revisiting XSS Sanitization - 2015.description 2022-04-22 09:28 993 B
Revisiting XSS Sanitization - 2015.info.json 2022-04-22 09:28 263.6 KB
Revisiting XSS Sanitization - 2015.mp4 2016-08-18 12:23 414.4 MB
Rocking The Pocket Book - Hacking Chemical Plant For Competition And Extortion - 2015.description 2022-04-22 08:24 2.6 KB
Rocking The Pocket Book - Hacking Chemical Plant For Competition And Extortion - 2015.info.json 2022-04-22 08:24 43.9 KB
Rocking The Pocket Book - Hacking Chemical Plant For Competition And Extortion - 2015.mp4 2016-08-27 03:51 274.9 MB
ROPInjector - Using Return Oriented Programming For Polymorphism And Antivirus Evasion - 2015.description 2022-04-22 07:43 1.2 KB
ROPInjector - Using Return Oriented Programming For Polymorphism And Antivirus Evasion - 2015.info.json 2022-04-22 07:43 261.8 KB
ROPInjector - Using Return Oriented Programming For Polymorphism And Antivirus Evasion - 2015.mp4 2016-09-01 21:26 75.6 MB
Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass - 2015.description 2022-04-22 09:56 729 B
Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass - 2015.info.json 2022-04-22 09:56 262.4 KB
Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass - 2015.mp4 2016-08-14 20:37 266.5 MB
SAP, Credit Cards, and the Bird that Talks Too Much - 2015.description 2022-04-22 11:37 346 B
SAP, Credit Cards, and the Bird that Talks Too Much - 2015.info.json 2022-04-22 11:37 449.8 KB
SAP, Credit Cards, and the Bird that Talks Too Much - 2015.mp4 2015-03-18 12:24 380.7 MB
Scala Security - Examining the Play and LiftWeb Frameworks - 2015.description 2022-04-22 09:14 628 B
Scala Security - Examining the Play and LiftWeb Frameworks - 2015.info.json 2022-04-22 09:14 262.8 KB
Scala Security - Examining the Play and LiftWeb Frameworks - 2015.mp4 2016-08-27 17:58 307.1 MB
SecSi Product Development - 2015.description 2022-04-22 11:15 799 B
SecSi Product Development - 2015.info.json 2022-04-22 11:15 542.0 KB
SecSi Product Development - 2015.mp4 2015-03-19 13:17 263.8 MB
Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring - 2015.description 2022-04-22 10:54 1.6 KB
Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring - 2015.info.json 2022-04-22 10:54 45.7 KB
Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring - 2015.mp4 2016-08-11 14:34 418.1 MB
Securing Your Big Data Environment - 2015.description 2022-04-22 07:34 1.1 KB
Securing Your Big Data Environment - 2015.info.json 2022-04-22 07:34 262.8 KB
Securing Your Big Data Environment - 2015.mp4 2016-08-28 23:24 170.9 MB
Server-Side Template Injection - RCE For The Modern Web App - 2015.description 2022-04-22 08:54 857 B
Server-Side Template Injection - RCE For The Modern Web App - 2015.info.json 2022-04-22 08:54 262.4 KB
Server-Side Template Injection - RCE For The Modern Web App - 2015.mp4 2016-08-26 20:42 168.7 MB
Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers - 2015.description 2022-04-22 09:32 2.0 KB
Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers - 2015.info.json 2022-04-22 09:32 266.5 KB
Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers - 2015.mp4 2016-08-28 21:41 351.0 MB
Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs - 2015.description 2022-04-22 10:56 1.6 KB
Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs - 2015.info.json 2022-04-22 10:56 427.5 KB
Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs - 2015.mp4 2015-03-19 13:35 143.1 MB
Smart Nest Thermostat - A Smart Spy in Your Home - 2015.description 2022-04-22 11:54 2.1 KB
Smart Nest Thermostat - A Smart Spy in Your Home - 2015.info.json 2022-04-22 11:54 264.3 KB
Smart Nest Thermostat - A Smart Spy in Your Home - 2015.mp4 2016-08-21 20:09 313.6 MB
SMBv2 - Sharing More Than Just Your Files - 2015.description 2022-04-22 07:46 517 B
SMBv2 - Sharing More Than Just Your Files - 2015.info.json 2022-04-22 07:46 262.0 KB
SMBv2 - Sharing More Than Just Your Files - 2015.mp4 2016-08-20 06:08 223.8 MB
Social Engineering The Windows Kernel - Finding And Exploiting Token Handling Vulnerabilities - 2015.description 2022-04-22 07:49 1.3 KB
Social Engineering The Windows Kernel - Finding And Exploiting Token Handling Vulnerabilities - 2015.info.json 2022-04-22 07:49 264.5 KB
Social Engineering The Windows Kernel - Finding And Exploiting Token Handling Vulnerabilities - 2015.mp4 2020-06-23 05:43 229.3 MB
Spread Spectrum Satcom Hacking - Attacking The Globalstar Simplex Data Service - 2015.description 2022-04-22 07:27 1.2 KB
Spread Spectrum Satcom Hacking - Attacking The Globalstar Simplex Data Service - 2015.info.json 2022-04-22 07:27 266.5 KB
Spread Spectrum Satcom Hacking - Attacking The Globalstar Simplex Data Service - 2015.mp4 2016-08-22 18:23 146.7 MB
SSL Validation Checking vs. Go(ing) to Fail - 2015.description 2022-04-28 19:48 2.3 KB
SSL Validation Checking vs. Go(ing) to Fail - 2015.info.json 2022-04-28 19:48 499.6 KB
SSL Validation Checking vs. Go(ing) to Fail - 2015.mp4 2015-04-03 12:50 207.9 MB
Stagefright - Scary Code in the Heart of Android - 2015.description 2022-04-22 09:01 1.4 KB
Stagefright - Scary Code in the Heart of Android - 2015.info.json 2022-04-22 09:01 266.6 KB
Stagefright - Scary Code in the Heart of Android - 2015.mp4 2016-08-28 04:56 191.3 MB
Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android - 2015.description 2022-04-22 10:53 805 B
Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android - 2015.info.json 2022-04-22 10:53 261.2 KB
Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android - 2015.mp4 2016-08-25 10:26 126.4 MB
Stay Out of the Kitchen - A DLP Security Bake-Off - 2015.description 2022-04-22 11:23 797 B
Stay Out of the Kitchen - A DLP Security Bake-Off - 2015.info.json 2022-04-22 11:23 710.1 KB
Stay Out of the Kitchen - A DLP Security Bake-Off - 2015.mp4 2015-03-18 12:28 439.2 MB
Staying Persistent In Software Defined Networks - 2015.description 2022-04-22 07:21 1.7 KB
Staying Persistent In Software Defined Networks - 2015.info.json 2022-04-22 07:21 263.6 KB
Staying Persistent In Software Defined Networks - 2015.mp4 2016-08-25 14:14 119.4 MB
Stranger Danger! What Is The Risk From 3rd Party Libraries - 2015.description 2022-04-22 07:14 1.1 KB
Stranger Danger! What Is The Risk From 3rd Party Libraries - 2015.info.json 2022-04-22 07:14 262.7 KB
Stranger Danger! What Is The Risk From 3rd Party Libraries - 2015.mp4 2016-08-18 01:17 210.3 MB
Subverting Satellite Receivers For Botnet And Profit - 2015.description 2022-04-22 08:39 1.2 KB
Subverting Satellite Receivers For Botnet And Profit - 2015.info.json 2022-04-22 08:39 263.4 KB
Subverting Satellite Receivers For Botnet And Profit - 2015.mp4 2016-08-21 05:04 90.1 MB
SVG - Exploiting Browsers without Image Parsing Bugs - 2015.description 2022-04-22 12:18 421 B
SVG - Exploiting Browsers without Image Parsing Bugs - 2015.info.json 2022-04-22 12:18 483.4 KB
SVG - Exploiting Browsers without Image Parsing Bugs - 2015.mp4 2015-03-13 13:32 201.0 MB
Switches Get Stitches - 2015.description 2022-04-22 07:35 1.4 KB
Switches Get Stitches - 2015.info.json 2022-04-22 07:35 263.2 KB
Switches Get Stitches - 2015.mp4 2016-08-23 05:52 277.9 MB
Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA - 2015.description 2022-04-22 07:47 1.1 KB
Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA - 2015.info.json 2022-04-22 07:47 264.2 KB
Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA - 2015.mp4 2016-08-15 11:54 275.5 MB
Taking Event Correlation With You - 2015.description 2022-04-22 08:47 1.1 KB
Taking Event Correlation With You - 2015.info.json 2022-04-22 08:47 262.9 KB
Taking Event Correlation With You - 2015.mp4 2016-08-21 02:34 262.1 MB
Targeted Takedowns - Minimizing Collateral Damage Using Passive DNS - 2015.description 2022-04-22 08:53 686 B
Targeted Takedowns - Minimizing Collateral Damage Using Passive DNS - 2015.info.json 2022-04-22 08:53 262.5 KB
Targeted Takedowns - Minimizing Collateral Damage Using Passive DNS - 2015.mp4 2016-08-11 00:48 225.8 MB
Taxonomic Modeling Of Security Threats In Software Defined Networking - 2015.description 2022-04-22 07:12 1.8 KB
Taxonomic Modeling Of Security Threats In Software Defined Networking - 2015.info.json 2022-04-22 07:12 262.5 KB
Taxonomic Modeling Of Security Threats In Software Defined Networking - 2015.mp4 2016-08-21 23:14 200.6 MB
The Applications Of Deep Learning On Traffic Identification - 2015.description 2022-04-22 08:52 648 B
The Applications Of Deep Learning On Traffic Identification - 2015.info.json 2022-04-22 08:52 261.4 KB
The Applications Of Deep Learning On Traffic Identification - 2015.mp4 2016-08-26 23:04 92.9 MB
The Battle For Free Speech On The Internet - 2015.description 2022-04-22 07:26 1.3 KB
The Battle For Free Speech On The Internet - 2015.info.json 2022-04-22 07:26 263.6 KB
The Battle For Free Speech On The Internet - 2015.mp4 2016-10-12 21:05 135.3 MB
The Beast is in Your Memory - 2015.description 2022-04-22 11:43 1.8 KB
The Beast is in Your Memory - 2015.info.json 2022-04-22 11:43 266.2 KB
The Beast is in Your Memory - 2015.mp4 2016-08-26 19:51 371.3 MB
The BEAST Wins Again - Why TLS Keeps Failing to Protect HTTP - 2015.description 2022-04-22 11:51 1.7 KB
The BEAST Wins Again - Why TLS Keeps Failing to Protect HTTP - 2015.info.json 2022-04-22 11:51 263.9 KB
The BEAST Wins Again - Why TLS Keeps Failing to Protect HTTP - 2015.mp4 2016-08-16 20:35 426.9 MB
The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them - 2015.description 2022-04-22 10:23 1.4 KB
The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them - 2015.info.json 2022-04-22 10:23 263.6 KB
The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them - 2015.mp4 2016-08-14 22:14 365.7 MB
The Devil Does Not Exist - The Role of Deception in Cyber - 2015.description 2022-04-22 11:39 527 B
The Devil Does Not Exist - The Role of Deception in Cyber - 2015.info.json 2022-04-22 11:39 637.9 KB
The Devil Does Not Exist - The Role of Deception in Cyber - 2015.mp4 2015-03-18 12:19 368.8 MB
The Kali Linux Dojo Workshop #1 - Rolling Your Own - Generating Custom Kali Linux 2.0 ISOs - 2015.description 2022-04-22 07:11 15 B
The Kali Linux Dojo Workshop #1 - Rolling Your Own - Generating Custom Kali Linux 2.0 ISOs - 2015.info.json 2022-04-22 07:11 262.3 KB
The Kali Linux Dojo Workshop #1 - Rolling Your Own - Generating Custom Kali Linux 2.0 ISOs - 2015.mp4 2016-08-25 12:42 219.9 MB
The Kali Linux Dojo Workshop #2 - Kali USB Setups With Persistent Stores And LUKS Nuke Support - 2015.description 2022-04-22 07:10 15 B
The Kali Linux Dojo Workshop #2 - Kali USB Setups With Persistent Stores And LUKS Nuke Support - 2015.info.json 2022-04-22 07:10 262.0 KB
The Kali Linux Dojo Workshop #2 - Kali USB Setups With Persistent Stores And LUKS Nuke Support - 2015.mp4 2016-08-25 07:36 178.0 MB
The Library of Sparta - 2015.description 2022-04-22 11:40 2.5 KB
The Library of Sparta - 2015.info.json 2022-04-22 11:40 264.6 KB
The Library of Sparta - 2015.mp4 2016-08-23 11:46 306.8 MB
The Lifecycle of a Revolution (Keynote) - 2015.description 2022-04-28 18:30 2.2 KB
The Lifecycle of a Revolution (Keynote) - 2015.info.json 2022-04-28 18:30 45.1 KB
The Lifecycle of a Revolution (Keynote) - 2015.mp4 2016-08-26 22:46 1.1 GB
The Little Pump Gauge That Could - Attacks Against Gas Pump Monitoring Systems - 2015.description 2022-04-22 08:51 643 B
The Little Pump Gauge That Could - Attacks Against Gas Pump Monitoring Systems - 2015.info.json 2022-04-22 08:51 262.9 KB
The Little Pump Gauge That Could - Attacks Against Gas Pump Monitoring Systems - 2015.mp4 2016-08-21 02:42 301.1 MB
The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation - 2015.description 2022-04-22 07:55 1008 B
The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation - 2015.info.json 2022-04-22 07:55 272.6 KB
The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation - 2015.mp4 2021-01-08 12:34 295.6 MB
The New Page of Injections Book - Memcached Injections - 2015.description 2022-04-22 12:00 921 B
The New Page of Injections Book - Memcached Injections - 2015.info.json 2022-04-22 12:00 264.0 KB
The New Page of Injections Book - Memcached Injections - 2015.mp4 2016-08-27 20:06 261.1 MB
The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends - 2015.description 2022-04-22 11:08 1.0 KB
The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends - 2015.info.json 2022-04-22 11:08 263.1 KB
The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends - 2015.mp4 2016-08-16 21:11 340.5 MB
The Node.js Highway - Attacks Are At Full Throttle - 2015.description 2022-04-22 08:50 985 B
The Node.js Highway - Attacks Are At Full Throttle - 2015.info.json 2022-04-22 08:50 261.9 KB
The Node.js Highway - Attacks Are At Full Throttle - 2015.mp4 2016-08-20 11:23 115.1 MB
The NSA Playset - A Year Of Toys And Tools - 2015.description 2022-04-22 08:12 457 B
The NSA Playset - A Year Of Toys And Tools - 2015.info.json 2022-04-22 08:12 262.6 KB
The NSA Playset - A Year Of Toys And Tools - 2015.mp4 2016-08-12 05:49 391.6 MB
The Power of Pair - One Template that Reveals 100+ UAF IE Vulnerabilities - 2015.description 2022-04-22 09:50 799 B
The Power of Pair - One Template that Reveals 100+ UAF IE Vulnerabilities - 2015.info.json 2022-04-22 09:50 494.7 KB
The Power of Pair - One Template that Reveals 100+ UAF IE Vulnerabilities - 2015.mp4 2016-08-13 17:19 206.3 MB
The Tactical Application Security Program - Getting Stuff Done - 2015.description 2022-04-22 07:25 1.1 KB
The Tactical Application Security Program - Getting Stuff Done - 2015.info.json 2022-04-22 07:25 690.3 KB
The Tactical Application Security Program - Getting Stuff Done - 2015.mp4 2016-08-25 12:24 224.0 MB
These Are Not Your Grand Daddy's CPU Performance Counters - CPU Hardware Performance Counters... - 2015.description 2022-04-22 07:15 1.7 KB
These Are Not Your Grand Daddy's CPU Performance Counters - CPU Hardware Performance Counters... - 2015.info.json 2022-04-22 07:15 264.0 KB
These Are Not Your Grand Daddy's CPU Performance Counters - CPU Hardware Performance Counters... - 2015.mp4 2016-08-19 10:34 285.9 MB
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways - 2015.description 2022-04-22 11:22 1.5 KB
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways - 2015.info.json 2022-04-22 11:22 612.8 KB
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways - 2015.mp4 2015-03-26 07:57 294.4 MB
THIS IS DeepERENT - Tracking App Behaviors With (Nothing Changed) Phone... - 2015.description 2022-04-22 07:13 1.9 KB
THIS IS DeepERENT - Tracking App Behaviors With (Nothing Changed) Phone... - 2015.info.json 2022-04-22 07:13 263.4 KB
THIS IS DeepERENT - Tracking App Behaviors With (Nothing Changed) Phone... - 2015.mp4 2016-08-25 23:31 98.0 MB
Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm! - 2015.description 2022-04-22 10:56 1.2 KB
Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm! - 2015.info.json 2022-04-22 10:56 262.6 KB
Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm! - 2015.mp4 2016-08-19 19:58 314.3 MB
ThunderStrike 2 - Sith Strike - 2015.description 2022-04-22 08:46 823 B
ThunderStrike 2 - Sith Strike - 2015.info.json 2022-04-22 08:46 263.7 KB
ThunderStrike 2 - Sith Strike - 2015.mp4 2016-08-26 21:13 170.3 MB
Time Trial - Racing Towards Practical Timing Attacks - 2015.description 2022-04-22 12:11 2.2 KB
Time Trial - Racing Towards Practical Timing Attacks - 2015.info.json 2022-04-22 12:11 265.6 KB
Time Trial - Racing Towards Practical Timing Attacks - 2015.mp4 2016-08-16 22:28 345.1 MB
TrustKit - Code Injection on iOS 8 for the Greater Good - 2015.description 2022-04-22 08:58 1.6 KB
TrustKit - Code Injection on iOS 8 for the Greater Good - 2015.info.json 2022-04-22 08:58 484.1 KB
TrustKit - Code Injection on iOS 8 for the Greater Good - 2015.mp4 2016-08-15 15:29 186.0 MB
Two Factor Failure - 2015.description 2022-04-22 09:10 617 B
Two Factor Failure - 2015.info.json 2022-04-22 09:10 260.9 KB
Two Factor Failure - 2015.mp4 2016-08-27 15:55 64.0 MB
Understanding And Managing Entropy Usage - 2015.description 2022-04-22 07:17 2.3 KB
Understanding And Managing Entropy Usage - 2015.info.json 2022-04-22 07:17 264.8 KB
Understanding And Managing Entropy Usage - 2015.mp4 2016-08-27 03:06 279.2 MB
Understanding IMSI Privacy - 2015.description 2022-04-22 10:46 1.3 KB
Understanding IMSI Privacy - 2015.info.json 2022-04-22 10:46 264.4 KB
Understanding IMSI Privacy - 2015.mp4 2016-08-28 12:28 262.4 MB
Understanding The Attack Surface And Attack Resilience Of Project Spartan's New EdgeHTML... - 2015.description 2022-04-22 07:20 991 B
Understanding The Attack Surface And Attack Resilience Of Project Spartan's New EdgeHTML... - 2015.info.json 2022-04-22 07:20 42.0 KB
Understanding The Attack Surface And Attack Resilience Of Project Spartan's New EdgeHTML... - 2015.mp4 2016-08-12 17:13 123.1 MB
Understanding TOCTTOU in the Windows Kernel Font Scaler Engine - 2015.description 2022-04-22 10:16 1.2 KB
Understanding TOCTTOU in the Windows Kernel Font Scaler Engine - 2015.info.json 2022-04-22 10:16 263.6 KB
Understanding TOCTTOU in the Windows Kernel Font Scaler Engine - 2015.mp4 2016-08-22 15:32 292.2 MB
Unicorn - Next Generation CPU Emulator Framework - 2015.description 2022-04-22 07:16 2.7 KB
Unicorn - Next Generation CPU Emulator Framework - 2015.info.json 2022-04-22 07:16 264.9 KB
Unicorn - Next Generation CPU Emulator Framework - 2015.mp4 2016-08-11 10:44 228.6 MB
Unveiling the Open Source Visualization Engine for Busy Hackers - 2015.description 2022-04-28 20:19 2.6 KB
Unveiling the Open Source Visualization Engine for Busy Hackers - 2015.info.json 2022-04-28 20:19 260.3 KB
Unveiling the Open Source Visualization Engine for Busy Hackers - 2015.mp4 2018-03-04 10:57 402.6 MB
Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions - 2015.description 2022-04-22 10:43 1.2 KB
Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions - 2015.info.json 2022-04-22 10:43 263.4 KB
Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions - 2015.mp4 2016-08-20 10:12 326.0 MB
Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware - 2015.description 2022-04-22 07:19 4.7 KB
Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware - 2015.info.json 2022-04-22 07:19 266.5 KB
Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware - 2015.mp4 2016-08-27 02:48 202.5 MB
VoIP Wars - Attack of the Cisco Phones - 2015.description 2022-04-22 10:38 1.9 KB
VoIP Wars - Attack of the Cisco Phones - 2015.info.json 2022-04-22 10:38 264.4 KB
VoIP Wars - Attack of the Cisco Phones - 2015.mp4 2016-08-20 17:37 359.9 MB
Web Timing Attacks Made Practical - 2015.description 2022-04-22 08:38 997 B
Web Timing Attacks Made Practical - 2015.info.json 2022-04-22 08:38 262.5 KB
Web Timing Attacks Made Practical - 2015.mp4 2016-08-27 18:21 169.8 MB
WebKit Everywhere - Secure or Not - 2015.description 2022-04-22 09:31 1.6 KB
WebKit Everywhere - Secure or Not - 2015.info.json 2022-04-22 09:31 263.9 KB
WebKit Everywhere - Secure or Not - 2015.mp4 2016-08-20 23:56 159.3 MB
Welcome & Introduction to Black Hat Europe 2014 - 2015.description 2022-04-22 10:01 0 B
Welcome & Introduction to Black Hat Europe 2014 - 2015.info.json 2022-04-22 10:01 824.6 KB
Welcome & Introduction to Black Hat Europe 2014 - 2015.mp4 2015-04-03 15:52 555.8 MB
What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels! - 2015.description 2022-04-22 10:58 1.1 KB
What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels! - 2015.info.json 2022-04-22 10:58 263.4 KB
What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels! - 2015.mp4 2016-08-21 17:06 148.1 MB
When IoT Attacks - Hacking A Linux-Powered Rifle - 2015.description 2022-04-28 18:21 879 B
When IoT Attacks - Hacking A Linux-Powered Rifle - 2015.info.json 2022-04-28 18:21 272.1 KB
When IoT Attacks - Hacking A Linux-Powered Rifle - 2015.mp4 2016-08-27 06:30 164.7 MB
When the Lights Go Out - Hacking Cisco EnergyWise - 2015.description 2022-04-22 11:29 1.2 KB
When the Lights Go Out - Hacking Cisco EnergyWise - 2015.info.json 2022-04-22 11:29 263.7 KB
When the Lights Go Out - Hacking Cisco EnergyWise - 2015.mp4 2016-08-28 12:20 533.8 MB
Why Control System Cyber-Security Sucks… - 2015.description 2022-04-22 10:19 1.1 KB
Why Control System Cyber-Security Sucks… - 2015.info.json 2022-04-22 10:19 263.4 KB
Why Control System Cyber-Security Sucks… - 2015.mp4 2016-08-15 02:18 406.0 MB
Why Security Data Science Matters And How It's Different - 2015.description 2022-04-22 07:37 2.9 KB
Why Security Data Science Matters And How It's Different - 2015.info.json 2022-04-22 07:37 266.1 KB
Why Security Data Science Matters And How It's Different - 2015.mp4 2016-08-26 21:33 225.4 MB
Why You Need to Detect More Than PtH - 2015.description 2022-04-22 11:13 490 B
Why You Need to Detect More Than PtH - 2015.info.json 2022-04-22 11:13 521.7 KB
Why You Need to Detect More Than PtH - 2015.mp4 2015-03-19 13:31 254.8 MB
Windows Kernel Graphics Driver Attack Surface - 2015.description 2022-04-28 19:57 521 B
Windows Kernel Graphics Driver Attack Surface - 2015.info.json 2022-04-28 19:57 262.9 KB
Windows Kernel Graphics Driver Attack Surface - 2015.mp4 2016-08-11 14:53 537.0 MB
Winning The Online Banking War - 2015.description 2022-04-22 08:00 824 B
Winning The Online Banking War - 2015.info.json 2022-04-22 08:00 262.5 KB
Winning The Online Banking War - 2015.mp4 2016-09-04 18:22 424.8 MB
Write Once, Pwn Anywhere - 2015.description 2022-04-22 11:20 764 B
Write Once, Pwn Anywhere - 2015.info.json 2022-04-22 11:20 677.3 KB
Write Once, Pwn Anywhere - 2015.mp4 2015-03-18 12:26 409.4 MB
Writing Bad @$$ Malware For OS X - 2015.description 2022-04-22 08:21 1.2 KB
Writing Bad @$$ Malware For OS X - 2015.info.json 2022-04-22 08:21 263.4 KB
Writing Bad @$$ Malware For OS X - 2015.mp4 2021-01-05 20:07 402.8 MB
WSUSpect - Compromising The Windows Enterprise Via Windows Update - 2015.description 2022-04-22 08:40 1.2 KB
WSUSpect - Compromising The Windows Enterprise Via Windows Update - 2015.info.json 2022-04-22 08:40 263.1 KB
WSUSpect - Compromising The Windows Enterprise Via Windows Update - 2015.mp4 2016-08-24 16:33 224.0 MB
ZigBee Exploited The Good, The Bad, And The Ugly - 2015.description 2022-04-22 07:41 1.9 KB
ZigBee Exploited The Good, The Bad, And The Ugly - 2015.info.json 2022-04-22 07:41 263.4 KB
ZigBee Exploited The Good, The Bad, And The Ugly - 2015.mp4 2016-11-05 22:35 181.6 MB

[return to top]