neuroky.me file explorer

neu·ro·kyme

public share-first archive

See also:
  1. neuroky.me - home
  2. /public - files that anyone can download
  3. sftp ftp.neuroky.me - this archive is accessible over sftp

Index of /youtube.com/Black Hat - Videos/2020


Upload to /youtube.com/Black Hat - Videos/2020

0%
Name ▲ Modified Size
↑ Parent Directory
'Man-in-the-SCADA -' Anatomy of Data Integrity Attacks in Industrial Control Systems - 2020.description 2022-04-22 01:24 567 B
'Man-in-the-SCADA -' Anatomy of Data Integrity Attacks in Industrial Control Systems - 2020.info.json 2022-04-22 01:24 469.3 KB
'Man-in-the-SCADA -' Anatomy of Data Integrity Attacks in Industrial Control Systems - 2020.mp4 2020-02-28 13:05 107.4 MB
(Pen)Testing Vehicles with CANToolz - 2020.description 2022-04-22 01:23 447 B
(Pen)Testing Vehicles with CANToolz - 2020.info.json 2022-04-22 01:23 663.7 KB
(Pen)Testing Vehicles with CANToolz - 2020.mp4 2021-09-08 07:03 354.1 MB
0-days & Mitigations - Roadways to Exploit and Secure Connected BMW Cars - 2020.description 2022-04-21 18:54 541 B
0-days & Mitigations - Roadways to Exploit and Secure Connected BMW Cars - 2020.info.json 2022-04-21 18:54 266.0 KB
0-days & Mitigations - Roadways to Exploit and Secure Connected BMW Cars - 2020.mp4 2019-12-11 17:49 102.6 MB
2017 USA BHB 108 - 2020.description 2022-04-22 00:38 570 B
2017 USA BHB 108 - 2020.info.json 2022-04-22 00:38 577.2 KB
2017 USA BHB 108 - 2020.mp4 2021-06-26 19:14 307.2 MB
24 Techniques to Gather Threat Intel and Track Actors - 2020.description 2022-04-22 01:09 573 B
24 Techniques to Gather Threat Intel and Track Actors - 2020.info.json 2022-04-22 01:09 612.2 KB
24 Techniques to Gather Threat Intel and Track Actors - 2020.mp4 2021-07-14 11:40 405.5 MB
50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks - 2020.description 2022-04-22 01:45 594 B
50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks - 2020.info.json 2022-04-22 01:45 640.4 KB
50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks - 2020.mp4 2018-03-03 15:27 346.0 MB
A Brief History of Mitigation - The Path to EL1 in iOS 11 - 2020.description 2022-04-21 22:33 346 B
A Brief History of Mitigation - The Path to EL1 in iOS 11 - 2020.info.json 2022-04-21 22:33 262.3 KB
A Brief History of Mitigation - The Path to EL1 in iOS 11 - 2020.mp4 2020-12-10 14:23 125.7 MB
A Compendium of Container Escapes - 2020.description 2022-04-21 19:21 572 B
A Compendium of Container Escapes - 2020.info.json 2022-04-21 19:21 265.5 KB
A Compendium of Container Escapes - 2020.mp4 2019-12-11 18:59 106.9 MB
A Deal with the Devil - Breaking Smart Contracts - 2020.description 2022-04-21 23:37 387 B
A Deal with the Devil - Breaking Smart Contracts - 2020.info.json 2022-04-21 23:37 656.4 KB
A Deal with the Devil - Breaking Smart Contracts - 2020.mp4 2018-08-21 16:09 58.6 MB
A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works - 2020.description 2022-04-21 20:15 647 B
A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works - 2020.info.json 2022-04-21 20:15 265.8 KB
A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works - 2020.mp4 2019-11-27 14:29 56.7 MB
A Deep Dive into macOS MDM (and How it can be Compromised) - 2020.description 2022-04-21 21:36 607 B
A Deep Dive into macOS MDM (and How it can be Compromised) - 2020.info.json 2022-04-21 21:36 599.1 KB
A Deep Dive into macOS MDM (and How it can be Compromised) - 2020.mp4 2020-02-25 15:05 177.0 MB
A Dive in to Hyper-V Architecture & Vulnerabilities - 2020.description 2022-04-21 22:49 456 B
A Dive in to Hyper-V Architecture & Vulnerabilities - 2020.info.json 2022-04-21 22:49 595.2 KB
A Dive in to Hyper-V Architecture & Vulnerabilities - 2020.mp4 2020-04-06 03:10 154.3 MB
A Hacker’s Guide to Career Progression - 2020.description 2022-04-21 22:54 227 B
A Hacker’s Guide to Career Progression - 2020.info.json 2022-04-21 22:54 266.4 KB
A Hacker’s Guide to Career Progression - 2020.mp4 2018-09-17 20:25 123.8 MB
A Measured Response to a Grain of Rice - 2020.description 2022-04-21 20:40 383 B
A Measured Response to a Grain of Rice - 2020.info.json 2022-04-21 20:40 266.0 KB
A Measured Response to a Grain of Rice - 2020.mp4 2019-03-04 16:01 373.4 MB
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - 2020.description 2022-04-22 00:37 654 B
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - 2020.info.json 2022-04-22 00:37 262.9 KB
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - 2020.mp4 2018-08-22 18:27 55.5 MB
A Process is No One - Hunting for Token Manipulation - 2020.description 2022-04-21 23:49 537 B
A Process is No One - Hunting for Token Manipulation - 2020.info.json 2022-04-21 23:49 675.1 KB
A Process is No One - Hunting for Token Manipulation - 2020.mp4 2018-04-06 13:03 106.9 MB
A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities - 2020.description 2022-04-21 23:44 360 B
A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities - 2020.info.json 2022-04-21 23:44 694.9 KB
A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities - 2020.mp4 2018-04-06 13:22 91.8 MB
A Universal Controller to Take Over a Z-Wave Network - 2020.description 2022-04-21 23:39 412 B
A Universal Controller to Take Over a Z-Wave Network - 2020.info.json 2022-04-21 23:39 417.6 KB
A Universal Controller to Take Over a Z-Wave Network - 2020.mp4 2018-04-06 13:54 30.3 MB
ACSploit - Exploit Algorithmic Complexity Vulnerabilities - 2020.description 2022-04-21 19:59 482 B
ACSploit - Exploit Algorithmic Complexity Vulnerabilities - 2020.info.json 2022-04-21 19:59 264.6 KB
ACSploit - Exploit Algorithmic Complexity Vulnerabilities - 2020.mp4 2019-12-04 14:41 52.5 MB
Advanced Pre-Breach Planning - Utilizing a Purple Team to Measure Effectiveness vs. Maturity - 2020.description 2022-04-22 00:34 411 B
Advanced Pre-Breach Planning - Utilizing a Purple Team to Measure Effectiveness vs. Maturity - 2020.info.json 2022-04-22 00:34 578.4 KB
Advanced Pre-Breach Planning - Utilizing a Purple Team to Measure Effectiveness vs. Maturity - 2020.mp4 2021-09-13 11:56 345.1 MB
Advanced VBA Macros Attack & Defence - 2020.description 2022-04-21 18:38 675 B
Advanced VBA Macros Attack & Defence - 2020.info.json 2022-04-21 18:38 685.8 KB
Advanced VBA Macros Attack & Defence - 2020.mp4 2020-03-17 17:32 156.3 MB
Adventures in the Underland - The CQForensic Toolkit as a Unique Weapon Against Hackers - 2020.description 2022-04-21 19:02 558 B
Adventures in the Underland - The CQForensic Toolkit as a Unique Weapon Against Hackers - 2020.info.json 2022-04-21 19:02 266.3 KB
Adventures in the Underland - The CQForensic Toolkit as a Unique Weapon Against Hackers - 2020.mp4 2019-12-11 18:51 140.5 MB
AES Wireless Keyboard – Template Attack for Eavesdropping - 2020.description 2022-04-21 23:23 412 B
AES Wireless Keyboard – Template Attack for Eavesdropping - 2020.info.json 2022-04-21 23:23 554.7 KB
AES Wireless Keyboard – Template Attack for Eavesdropping - 2020.mp4 2018-08-22 18:23 52.6 MB
AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries - 2020.description 2022-04-21 21:44 404 B
AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries - 2020.info.json 2022-04-21 21:44 473.9 KB
AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries - 2020.mp4 2020-11-12 03:40 111.3 MB
AI & ML in Cyber Security - Why Algorithms are Dangerous - 2020.description 2022-04-21 22:15 438 B
AI & ML in Cyber Security - Why Algorithms are Dangerous - 2020.info.json 2022-04-21 22:15 579.8 KB
AI & ML in Cyber Security - Why Algorithms are Dangerous - 2020.mp4 2020-04-04 19:05 233.0 MB
AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed - 2020.description 2022-04-22 01:31 451 B
AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed - 2020.info.json 2022-04-22 01:31 497.4 KB
AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed - 2020.mp4 2018-03-04 00:54 155.9 MB
AI Gone Rogue - Exterminating Deep Fakes Before They Cause Menace - 2020.description 2022-04-21 20:58 427 B
AI Gone Rogue - Exterminating Deep Fakes Before They Cause Menace - 2020.info.json 2022-04-21 20:58 261.5 KB
AI Gone Rogue - Exterminating Deep Fakes Before They Cause Menace - 2020.mp4 2019-03-04 17:28 94.1 MB
Alexa, Hack My Server(less) Please - 2020.description 2022-04-21 18:07 631 B
Alexa, Hack My Server(less) Please - 2020.info.json 2022-04-21 18:07 265.8 KB
Alexa, Hack My Server(less) Please - 2020.mp4 2020-03-19 17:49 168.6 MB
All the 4G Modules Could be Hacked - 2020.description 2022-04-21 19:37 508 B
All the 4G Modules Could be Hacked - 2020.info.json 2022-04-21 19:37 264.4 KB
All the 4G Modules Could be Hacked - 2020.mp4 2019-12-02 14:51 91.2 MB
All Your Apple are Belong to Us - Unique Identification and Cross-Device Tracking of Apple Devices - 2020.description 2022-04-21 19:19 517 B
All Your Apple are Belong to Us - Unique Identification and Cross-Device Tracking of Apple Devices - 2020.info.json 2022-04-21 19:19 265.4 KB
All Your Apple are Belong to Us - Unique Identification and Cross-Device Tracking of Apple Devices - 2020.mp4 2019-12-11 15:55 125.3 MB
All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision - 2020.description 2022-04-22 01:03 556 B
All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision - 2020.info.json 2022-04-22 01:03 473.4 KB
All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision - 2020.mp4 2021-07-11 13:55 226.5 MB
All Your Payment Tokens Are Mine - Vulnerabilities of Mobile Payment Systems - 2020.description 2022-04-21 23:18 562 B
All Your Payment Tokens Are Mine - Vulnerabilities of Mobile Payment Systems - 2020.info.json 2022-04-21 23:18 454.1 KB
All Your Payment Tokens Are Mine - Vulnerabilities of Mobile Payment Systems - 2020.mp4 2018-08-22 18:21 27.5 MB
All Your SMS & Contacts Belong to ADUPS & Others - 2020.description 2022-04-22 00:48 457 B
All Your SMS & Contacts Belong to ADUPS & Others - 2020.info.json 2022-04-22 00:48 261.0 KB
All Your SMS & Contacts Belong to ADUPS & Others - 2020.mp4 2017-10-27 18:14 53.8 MB
An Attacker Looks at Docker - Approaching Multi-Container Applications - 2020.description 2022-04-21 21:24 450 B
An Attacker Looks at Docker - Approaching Multi-Container Applications - 2020.info.json 2022-04-21 21:24 541.2 KB
An Attacker Looks at Docker - Approaching Multi-Container Applications - 2020.mp4 2020-02-22 19:15 112.5 MB
An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities - 2020.description 2022-04-21 21:15 573 B
An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities - 2020.info.json 2022-04-21 21:15 261.8 KB
An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities - 2020.mp4 2019-07-11 11:41 70.2 MB
Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems - 2020.description 2022-04-21 23:20 436 B
Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems - 2020.info.json 2022-04-21 23:20 680.5 KB
Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems - 2020.mp4 2018-08-22 18:23 73.5 MB
Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning - 2020.description 2022-04-22 01:38 638 B
Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning - 2020.info.json 2022-04-22 01:38 385.0 KB
Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning - 2020.mp4 2018-03-14 08:54 172.1 MB
Another Flip in the Row - 2020.description 2022-04-28 14:46 459 B
Another Flip in the Row - 2020.info.json 2022-04-28 14:46 615.4 KB
Another Flip in the Row - 2020.mp4 2020-03-10 14:57 98.8 MB
Anti-Plugin - Don't Let Your App Play as an Android Plugin - 2020.description 2022-04-22 01:35 702 B
Anti-Plugin - Don't Let Your App Play as an Android Plugin - 2020.info.json 2022-04-22 01:35 620.8 KB
Anti-Plugin - Don't Let Your App Play as an Android Plugin - 2020.mp4 2020-03-04 02:23 104.6 MB
API-Induced SSRF - How Apple Pay Scattered Vulnerabilities Across the Web - 2020.description 2022-04-21 19:18 437 B
API-Induced SSRF - How Apple Pay Scattered Vulnerabilities Across the Web - 2020.info.json 2022-04-21 19:18 264.5 KB
API-Induced SSRF - How Apple Pay Scattered Vulnerabilities Across the Web - 2020.mp4 2019-12-11 16:19 56.1 MB
Applied Self-Driving Car Security - 2020.description 2022-05-06 21:24 363 B
Applied Self-Driving Car Security - 2020.info.json 2022-05-06 21:24 394.9 KB
Applied Self-Driving Car Security - 2020.mp4 2020-11-21 06:53 224.2 MB
Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors - 2020.description 2022-04-22 00:35 662 B
Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors - 2020.info.json 2022-04-22 00:35 614.2 KB
Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors - 2020.mp4 2017-10-31 14:47 103.0 MB
Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies - 2020.description 2022-04-21 22:09 554 B
Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies - 2020.info.json 2022-04-21 22:09 622.0 KB
Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies - 2020.mp4 2020-03-25 16:03 239.2 MB
Arm IDA and Cross Check - Reversing the Boeing 787's Core Network - 2020.description 2022-04-21 20:03 487 B
Arm IDA and Cross Check - Reversing the Boeing 787's Core Network - 2020.info.json 2022-04-21 20:03 266.1 KB
Arm IDA and Cross Check - Reversing the Boeing 787's Core Network - 2020.mp4 2019-12-03 13:23 129.9 MB
ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware - 2020.description 2022-04-21 22:11 581 B
ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware - 2020.info.json 2022-04-21 22:11 419.7 KB
ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware - 2020.mp4 2020-02-16 07:58 58.3 MB
Attacking and Defending Blockchains - From Horror Stories to Secure Wallets - 2020.description 2022-04-21 20:32 620 B
Attacking and Defending Blockchains - From Horror Stories to Secure Wallets - 2020.info.json 2022-04-21 20:32 262.6 KB
Attacking and Defending Blockchains - From Horror Stories to Secure Wallets - 2020.mp4 2019-03-01 18:37 96.8 MB
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD) - 2020.description 2022-04-21 20:18 541 B
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD) - 2020.info.json 2022-04-21 20:18 264.6 KB
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD) - 2020.mp4 2019-11-27 14:49 101.6 MB
Attacking Client-Side JIT Compilers - 2020.description 2022-04-21 22:53 444 B
Attacking Client-Side JIT Compilers - 2020.info.json 2022-04-21 22:53 262.3 KB
Attacking Client-Side JIT Compilers - 2020.mp4 2020-12-06 13:57 205.6 MB
Attacking Electric Motors for Fun and Profit - 2020.description 2022-04-21 20:04 669 B
Attacking Electric Motors for Fun and Profit - 2020.info.json 2022-04-21 20:04 264.2 KB
Attacking Electric Motors for Fun and Profit - 2020.mp4 2019-11-27 14:46 59.9 MB
Attacking Hardware Systems Using Resonance and the Laws of Physics - 2020.description 2022-04-21 20:49 424 B
Attacking Hardware Systems Using Resonance and the Laws of Physics - 2020.info.json 2022-04-21 20:49 262.5 KB
Attacking Hardware Systems Using Resonance and the Laws of Physics - 2020.mp4 2019-03-05 13:44 158.5 MB
Attacking iPhone XS Max - 2020.description 2022-04-21 18:54 424 B
Attacking iPhone XS Max - 2020.info.json 2022-04-21 18:54 266.0 KB
Attacking iPhone XS Max - 2020.mp4 2019-12-11 18:42 87.1 MB
Attacking NextGen Roaming Networks - 2020.description 2022-04-21 23:52 436 B
Attacking NextGen Roaming Networks - 2020.info.json 2022-04-21 23:52 678.6 KB
Attacking NextGen Roaming Networks - 2020.mp4 2021-02-05 23:04 271.9 MB
Attacking Windows by Windows - 2020.description 2022-04-22 01:51 451 B
Attacking Windows by Windows - 2020.info.json 2022-04-22 01:51 495.0 KB
Attacking Windows by Windows - 2020.mp4 2021-07-08 16:35 235.9 MB
Attacks Against GSMA's M2M Remote Provisioning - 2020.description 2022-04-21 23:46 567 B
Attacks Against GSMA's M2M Remote Provisioning - 2020.info.json 2022-04-21 23:46 481.3 KB
Attacks Against GSMA's M2M Remote Provisioning - 2020.mp4 2018-04-06 12:58 46.7 MB
Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme - 2020.description 2022-04-21 22:36 580 B
Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme - 2020.info.json 2022-04-21 22:37 444.6 KB
Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme - 2020.mp4 2020-03-01 15:47 74.4 MB
Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices) - 2020.description 2022-04-22 00:36 700 B
Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices) - 2020.info.json 2022-04-22 00:36 602.9 KB
Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices) - 2020.mp4 2017-10-31 14:31 78.2 MB
Automated Discovery of Deserialization Gadget Chains - 2020.description 2022-04-21 21:32 633 B
Automated Discovery of Deserialization Gadget Chains - 2020.info.json 2022-04-21 21:32 546.1 KB
Automated Discovery of Deserialization Gadget Chains - 2020.mp4 2020-04-01 14:29 124.7 MB
Automated Testing of Crypto Software Using Differential Fuzzing - 2020.description 2022-04-22 00:53 494 B
Automated Testing of Crypto Software Using Differential Fuzzing - 2020.info.json 2022-04-22 00:53 510.4 KB
Automated Testing of Crypto Software Using Differential Fuzzing - 2020.mp4 2021-09-07 20:50 237.6 MB
Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing - 2020.description 2022-04-21 23:50 433 B
Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing - 2020.info.json 2022-04-21 23:50 609.0 KB
Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing - 2020.mp4 2018-04-06 12:24 103.8 MB
Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities - 2020.description 2022-04-21 21:09 432 B
Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities - 2020.info.json 2022-04-21 21:09 352.3 KB
Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities - 2020.mp4 2020-02-14 06:13 222.2 MB
Automating Incident Response - 2020.description 2022-04-22 01:47 564 B
Automating Incident Response - 2020.info.json 2022-04-22 01:47 632.5 KB
Automating Incident Response - 2020.mp4 2018-03-03 13:43 381.3 MB
Automation Techniques in C++ Reverse Engineering - 2020.description 2022-04-21 19:18 486 B
Automation Techniques in C++ Reverse Engineering - 2020.info.json 2022-04-21 19:18 266.0 KB
Automation Techniques in C++ Reverse Engineering - 2020.mp4 2019-12-11 18:16 93.2 MB
AVPASS - Leaking and Bypassing Antivirus Detection Model Automatically - 2020.description 2022-04-22 00:39 509 B
AVPASS - Leaking and Bypassing Antivirus Detection Model Automatically - 2020.info.json 2022-04-22 00:39 596.2 KB
AVPASS - Leaking and Bypassing Antivirus Detection Model Automatically - 2020.mp4 2021-06-16 06:01 290.0 MB
Back To The Epilogue - How to Evade Windows' Control Flow Guard with Less than 16 Bytes - 2020.description 2022-04-21 23:35 517 B
Back To The Epilogue - How to Evade Windows' Control Flow Guard with Less than 16 Bytes - 2020.info.json 2022-04-21 23:35 556.6 KB
Back To The Epilogue - How to Evade Windows' Control Flow Guard with Less than 16 Bytes - 2020.mp4 2018-08-21 15:45 51.0 MB
Back to the Future - A Radical Insecure Design of KVM on ARM - 2020.description 2022-04-21 21:42 449 B
Back to the Future - A Radical Insecure Design of KVM on ARM - 2020.info.json 2022-04-21 21:42 434.8 KB
Back to the Future - A Radical Insecure Design of KVM on ARM - 2020.mp4 2020-02-19 20:02 83.0 MB
Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers - 2020.description 2022-04-21 18:47 590 B
Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers - 2020.info.json 2022-04-21 18:47 265.4 KB
Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers - 2020.mp4 2019-12-18 16:15 146.7 MB
Backslash Powered Scanning - Hunting Unknown Vulnerability Classes - 2020.description 2022-04-22 01:42 538 B
Backslash Powered Scanning - Hunting Unknown Vulnerability Classes - 2020.info.json 2022-04-22 01:42 619.5 KB
Backslash Powered Scanning - Hunting Unknown Vulnerability Classes - 2020.mp4 2017-08-18 13:18 79.8 MB
Battle of Windows Service - A Silver Bullet to Discover File Privilege Escalation Bugs Automatically - 2020.description 2022-04-21 20:19 773 B
Battle of Windows Service - A Silver Bullet to Discover File Privilege Escalation Bugs Automatically - 2020.info.json 2022-04-21 20:19 264.5 KB
Battle of Windows Service - A Silver Bullet to Discover File Privilege Escalation Bugs Automatically - 2020.mp4 2019-11-27 14:36 58.3 MB
Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure - 2020.description 2022-04-21 21:39 592 B
Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure - 2020.info.json 2022-04-21 21:39 443.4 KB
Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure - 2020.mp4 2020-03-15 16:00 67.4 MB
Becoming You - A Glimpse Into Credential Abuse - 2020.description 2022-04-28 16:27 402 B
Becoming You - A Glimpse Into Credential Abuse - 2020.info.json 2022-04-28 16:27 493.5 KB
Becoming You - A Glimpse Into Credential Abuse - 2020.mp4 2018-04-06 13:57 88.5 MB
Behind the Scenes - The Industry of Social Media Manipulation Driven by Malware - 2020.description 2022-04-28 11:25 527 B
Behind the Scenes - The Industry of Social Media Manipulation Driven by Malware - 2020.info.json 2022-04-28 11:25 265.8 KB
Behind the Scenes - The Industry of Social Media Manipulation Driven by Malware - 2020.mp4 2019-12-02 12:38 117.1 MB
Behind the Scenes of Intel Security and Manageability Engine - 2020.description 2022-04-21 19:38 480 B
Behind the Scenes of Intel Security and Manageability Engine - 2020.info.json 2022-04-21 19:38 261.2 KB
Behind the Scenes of Intel Security and Manageability Engine - 2020.mp4 2019-12-02 12:47 73.0 MB
Behind the scenes of iOS and Mac Security - 2020.description 2022-04-28 11:24 595 B
Behind the scenes of iOS and Mac Security - 2020.info.json 2022-04-28 11:24 268.2 KB
Behind the scenes of iOS and Mac Security - 2020.mp4 2019-12-21 12:04 49.6 MB
Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre - 2020.description 2022-04-21 22:35 588 B
Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre - 2020.info.json 2022-04-21 22:35 599.4 KB
Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre - 2020.mp4 2020-03-26 09:06 448.6 MB
Betting Against the House - Security and Stability When the Odds are Against You - 2020.description 2022-04-22 01:10 646 B
Betting Against the House - Security and Stability When the Odds are Against You - 2020.info.json 2022-04-22 01:10 505.6 KB
Betting Against the House - Security and Stability When the Odds are Against You - 2020.mp4 2020-02-20 19:40 79.7 MB
Beyond the Blacklists - Detecting Malicious URL Through Machine Learning - 2020.description 2022-04-22 01:26 590 B
Beyond the Blacklists - Detecting Malicious URL Through Machine Learning - 2020.info.json 2022-04-22 01:26 659.5 KB
Beyond the Blacklists - Detecting Malicious URL Through Machine Learning - 2020.mp4 2018-03-02 18:47 306.4 MB
BHASIA Training Preview - Intrusion Analysis & Threat Hunting with Open Source Tools - 2020.description 2022-04-22 01:57 1.1 KB
BHASIA Training Preview - Intrusion Analysis & Threat Hunting with Open Source Tools - 2020.info.json 2022-04-22 01:57 264.9 KB
BHASIA Training Preview - Intrusion Analysis & Threat Hunting with Open Source Tools - 2020.mp4 2020-01-06 13:35 11.9 MB
Biometric Authentication Under Threat - Liveness Detection Hacking - 2020.description 2022-04-21 20:18 661 B
Biometric Authentication Under Threat - Liveness Detection Hacking - 2020.info.json 2022-04-21 20:18 264.6 KB
Biometric Authentication Under Threat - Liveness Detection Hacking - 2020.mp4 2019-11-28 14:02 69.8 MB
Black Box is Dead. Long Live Black Box! - 2020.description 2022-04-21 21:40 504 B
Black Box is Dead. Long Live Black Box! - 2020.info.json 2022-04-21 21:40 502.1 KB
Black Box is Dead. Long Live Black Box! - 2020.mp4 2020-11-08 10:46 197.9 MB
Black Hat Arsenal - 2020.description 2022-04-21 20:17 586 B
Black Hat Arsenal - 2020.info.json 2022-04-21 20:17 263.6 KB
Black Hat Arsenal - 2020.mp4 2019-09-23 16:16 42.7 MB
Black Hat Europe 2019 Highlights - 2020.description 2022-04-21 18:49 0 B
Black Hat Europe 2019 Highlights - 2020.info.json 2022-04-21 18:49 43.2 KB
Black Hat Europe 2019 Highlights - 2020.mp4 2019-12-16 17:24 28.4 MB
Black Hat Fast Chat - Daniel Cuthbert - 2020.description 2022-04-21 17:43 414 B
Black Hat Fast Chat - Daniel Cuthbert - 2020.info.json 2022-04-21 17:43 468.0 KB
Black Hat Fast Chat - Daniel Cuthbert - 2020.mp4 2020-06-24 09:20 167.1 MB
Black Hat Fast Chat - Matt Devost - 2020.description 2022-04-21 17:44 284 B
Black Hat Fast Chat - Matt Devost - 2020.info.json 2022-04-21 17:44 359.9 KB
Black Hat Fast Chat - Matt Devost - 2020.mp4 2020-06-22 22:14 34.1 MB
Black Hat Fast Chat - Matt Suiche - 2020.description 2022-04-21 17:42 357 B
Black Hat Fast Chat - Matt Suiche - 2020.info.json 2022-04-21 17:42 507.8 KB
Black Hat Fast Chat - Matt Suiche - 2020.mp4 2020-06-25 12:17 217.9 MB
Black Hat USA 2019 - 2020.description 2022-04-21 20:20 713 B
Black Hat USA 2019 - 2020.info.json 2022-04-21 20:20 83.9 KB
Black Hat USA 2019 - 2020.mp4 2019-12-14 05:16 25.6 MB
BLEEDINGBIT - Your APs Belong to Us - 2020.description 2022-04-21 20:54 415 B
BLEEDINGBIT - Your APs Belong to Us - 2020.info.json 2022-04-21 20:54 262.2 KB
BLEEDINGBIT - Your APs Belong to Us - 2020.mp4 2019-03-05 14:10 129.5 MB
Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths - 2020.description 2022-04-21 22:40 537 B
Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths - 2020.info.json 2022-04-21 22:40 545.6 KB
Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths - 2020.mp4 2020-03-28 01:46 76.9 MB
Blue Pill for Your Phone - 2020.description 2022-04-22 00:05 485 B
Blue Pill for Your Phone - 2020.info.json 2022-04-22 00:05 612.5 KB
Blue Pill for Your Phone - 2020.mp4 2017-10-31 14:41 97.7 MB
BlueMaster - Bypassing and Fixing Bluetooth-based Proximity Authentication - 2020.description 2022-04-21 18:07 561 B
BlueMaster - Bypassing and Fixing Bluetooth-based Proximity Authentication - 2020.info.json 2022-04-21 18:07 650.8 KB
BlueMaster - Bypassing and Fixing Bluetooth-based Proximity Authentication - 2020.mp4 2020-03-19 16:26 154.9 MB
BluePill - Neutralizing Anti-Analysis Behavior in Malware Dissection - 2020.description 2022-04-21 18:45 628 B
BluePill - Neutralizing Anti-Analysis Behavior in Malware Dissection - 2020.info.json 2022-04-21 18:45 264.3 KB
BluePill - Neutralizing Anti-Analysis Behavior in Malware Dissection - 2020.mp4 2021-08-03 16:46 157.0 MB
Booting the iOS Kernel to an Interactive Bash Shell on QEMU - 2020.description 2022-04-21 18:37 439 B
Booting the iOS Kernel to an Interactive Bash Shell on QEMU - 2020.info.json 2022-04-21 18:37 265.1 KB
Booting the iOS Kernel to an Interactive Bash Shell on QEMU - 2020.mp4 2021-07-28 15:22 224.7 MB
Bot vs. Bot for Evading Machine Learning Malware Detection - 2020.description 2022-04-22 00:03 461 B
Bot vs. Bot for Evading Machine Learning Malware Detection - 2020.info.json 2022-04-22 00:03 436.2 KB
Bot vs. Bot for Evading Machine Learning Malware Detection - 2020.mp4 2021-07-01 06:15 141.7 MB
Bounty Operations - Best Practices and Common Pitfalls to Avoid in the First 6-12 Months - 2020.description 2022-04-21 19:01 823 B
Bounty Operations - Best Practices and Common Pitfalls to Avoid in the First 6-12 Months - 2020.info.json 2022-04-21 19:01 266.4 KB
Bounty Operations - Best Practices and Common Pitfalls to Avoid in the First 6-12 Months - 2020.mp4 2019-12-11 16:43 189.1 MB
Breach Detection At Scale With AWS Honey Tokens - 2020.description 2022-04-21 23:23 441 B
Breach Detection At Scale With AWS Honey Tokens - 2020.info.json 2022-04-21 23:23 471.2 KB
Breach Detection At Scale With AWS Honey Tokens - 2020.mp4 2018-08-22 18:19 32.4 MB
Breaking Bad - Stealing Patient Data Through Medical Devices - 2020.description 2022-04-21 23:51 421 B
Breaking Bad - Stealing Patient Data Through Medical Devices - 2020.info.json 2022-04-21 23:51 658.6 KB
Breaking Bad - Stealing Patient Data Through Medical Devices - 2020.mp4 2020-11-22 05:25 455.0 MB
Breaking Big Data - Evading Analysis of the Metadata of Your Life - 2020.description 2022-04-22 01:50 701 B
Breaking Big Data - Evading Analysis of the Metadata of Your Life - 2020.info.json 2022-04-22 01:50 262.8 KB
Breaking Big Data - Evading Analysis of the Metadata of Your Life - 2020.mp4 2017-10-01 00:09 70.2 MB
Breaking Bootloaders on the Cheap - 2020.description 2022-04-21 18:01 567 B
Breaking Bootloaders on the Cheap - 2020.info.json 2022-04-21 18:01 482.8 KB
Breaking Bootloaders on the Cheap - 2020.mp4 2020-03-20 12:19 76.4 MB
Breaking Electronic Door Locks Like You're on CSI - Cyber - 2020.description 2022-04-22 01:01 397 B
Breaking Electronic Door Locks Like You're on CSI - Cyber - 2020.info.json 2022-04-22 01:01 261.0 KB
Breaking Electronic Door Locks Like You're on CSI - Cyber - 2020.mp4 2017-10-27 18:06 69.8 MB
Breaking Encrypted Databases - Generic Attacks on Range Queries - 2020.description 2022-04-21 19:35 540 B
Breaking Encrypted Databases - Generic Attacks on Range Queries - 2020.info.json 2022-04-21 19:35 265.9 KB
Breaking Encrypted Databases - Generic Attacks on Range Queries - 2020.mp4 2019-12-11 16:32 86.3 MB
Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging - 2020.description 2022-04-22 01:29 647 B
Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging - 2020.info.json 2022-04-22 01:29 403.1 KB
Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging - 2020.mp4 2021-06-22 09:11 141.0 MB
Breaking Out HSTS (and HPKP) On Firefox, IE_Edge and (Possibly) Chrome - 2020.description 2022-04-21 23:42 622 B
Breaking Out HSTS (and HPKP) On Firefox, IE_Edge and (Possibly) Chrome - 2020.info.json 2022-04-21 23:42 613.1 KB
Breaking Out HSTS (and HPKP) On Firefox, IE_Edge and (Possibly) Chrome - 2020.mp4 2018-04-06 13:12 108.6 MB
Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out! - 2020.description 2022-04-21 22:25 530 B
Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out! - 2020.info.json 2022-04-21 22:25 566.9 KB
Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out! - 2020.mp4 2020-03-07 23:05 70.0 MB
Breaking Samsung's ARM TrustZone - 2020.description 2022-04-21 18:46 596 B
Breaking Samsung's ARM TrustZone - 2020.info.json 2022-04-21 18:46 265.5 KB
Breaking Samsung's ARM TrustZone - 2020.mp4 2019-12-11 19:40 76.4 MB
Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis - 2020.description 2022-04-21 23:18 564 B
Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis - 2020.info.json 2022-04-21 23:18 638.6 KB
Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis - 2020.mp4 2018-08-22 18:28 64.8 MB
Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment - 2020.description 2022-04-21 23:36 733 B
Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment - 2020.info.json 2022-04-21 23:36 478.1 KB
Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment - 2020.mp4 2018-08-21 15:36 34.9 MB
Breaking the IIoT - Hacking industrial Control Gateways - 2020.description 2022-04-21 22:17 568 B
Breaking the IIoT - Hacking industrial Control Gateways - 2020.info.json 2022-04-21 22:17 523.9 KB
Breaking the IIoT - Hacking industrial Control Gateways - 2020.mp4 2020-02-20 10:22 150.8 MB
Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller - 2020.description 2022-04-21 19:04 510 B
Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller - 2020.info.json 2022-04-21 19:04 267.3 KB
Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller - 2020.mp4 2019-12-11 16:03 156.8 MB
Breaking XSS Mitigations Via Script Gadgets - 2020.description 2022-04-22 00:04 557 B
Breaking XSS Mitigations Via Script Gadgets - 2020.info.json 2022-04-22 00:04 633.9 KB
Breaking XSS Mitigations Via Script Gadgets - 2020.mp4 2017-10-31 14:13 85.2 MB
Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing - 2020.description 2022-04-21 18:33 762 B
Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing - 2020.info.json 2022-04-21 18:33 470.4 KB
Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing - 2020.mp4 2020-03-18 15:53 207.4 MB
Broken Links - Emergence and Future of Software-Supply Chain Compromises - 2020.description 2022-04-21 20:33 725 B
Broken Links - Emergence and Future of Software-Supply Chain Compromises - 2020.info.json 2022-04-21 20:33 262.1 KB
Broken Links - Emergence and Future of Software-Supply Chain Compromises - 2020.mp4 2019-03-04 17:35 56.5 MB
By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms - 2020.description 2022-04-21 23:58 763 B
By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms - 2020.info.json 2022-04-21 23:58 648.3 KB
By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms - 2020.mp4 2018-04-06 12:09 177.8 MB
Bypassing Clang's SafeStack for Fun and Profit - 2020.description 2022-04-22 01:34 837 B
Bypassing Clang's SafeStack for Fun and Profit - 2020.info.json 2022-04-22 01:34 551.5 KB
Bypassing Clang's SafeStack for Fun and Profit - 2020.mp4 2021-07-12 20:43 204.0 MB
Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction - 2020.description 2022-04-21 18:05 658 B
Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction - 2020.info.json 2022-04-21 18:05 676.1 KB
Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction - 2020.mp4 2020-03-19 17:22 120.7 MB
Bypassing Secure Boot Using Fault Injection - 2020.description 2022-04-22 01:29 638 B
Bypassing Secure Boot Using Fault Injection - 2020.info.json 2022-04-22 01:29 611.1 KB
Bypassing Secure Boot Using Fault Injection - 2020.mp4 2020-03-28 10:34 63.7 MB
Bypassing the Maginot Line - Remotely Exploit the Hardware Decoder on Smartphone - 2020.description 2022-04-21 20:19 641 B
Bypassing the Maginot Line - Remotely Exploit the Hardware Decoder on Smartphone - 2020.info.json 2022-04-21 20:19 44.2 KB
Bypassing the Maginot Line - Remotely Exploit the Hardware Decoder on Smartphone - 2020.mp4 2019-11-27 14:00 51.0 MB
Cache Side Channel Attack - Exploitability and Countermeasures - 2020.description 2022-04-28 16:46 691 B
Cache Side Channel Attack - Exploitability and Countermeasures - 2020.info.json 2022-04-28 16:46 700.4 KB
Cache Side Channel Attack - Exploitability and Countermeasures - 2020.mp4 2020-03-28 22:46 150.8 MB
CALDERA - Automating Adversary Emulation - 2020.description 2022-04-21 23:46 523 B
CALDERA - Automating Adversary Emulation - 2020.info.json 2022-04-21 23:46 661.7 KB
CALDERA - Automating Adversary Emulation - 2020.mp4 2018-04-06 13:08 87.4 MB
Catch me, Yes we can! - Pwning Social Engineers - 2020.description 2022-04-21 21:29 600 B
Catch me, Yes we can! - Pwning Social Engineers - 2020.info.json 2022-04-21 21:29 615.6 KB
Catch me, Yes we can! - Pwning Social Engineers - 2020.mp4 2020-02-18 01:18 193.0 MB
Chain of Fools - An Exploration of Certificate Chain Validation Mishaps - 2020.description 2022-04-21 18:51 657 B
Chain of Fools - An Exploration of Certificate Chain Validation Mishaps - 2020.info.json 2022-04-21 18:51 265.7 KB
Chain of Fools - An Exploration of Certificate Chain Validation Mishaps - 2020.mp4 2019-12-19 10:24 92.4 MB
Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums - 2020.description 2022-04-22 01:48 437 B
Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums - 2020.info.json 2022-04-22 01:48 469.3 KB
Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums - 2020.mp4 2018-03-13 01:25 150.9 MB
Chip.Fail - Glitching the Silicon of the Connected World - 2020.description 2022-04-21 19:49 381 B
Chip.Fail - Glitching the Silicon of the Connected World - 2020.info.json 2022-04-21 19:49 267.8 KB
Chip.Fail - Glitching the Silicon of the Connected World - 2020.mp4 2019-12-02 15:12 128.7 MB
ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended - 2020.description 2022-04-21 20:20 587 B
ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended - 2020.info.json 2022-04-21 20:20 265.3 KB
ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended - 2020.mp4 2019-11-27 14:26 73.5 MB
CLKscrew - Exposing The Perils of Security-Oblivious Energy Management - 2020.description 2022-04-21 23:55 592 B
CLKscrew - Exposing The Perils of Security-Oblivious Energy Management - 2020.info.json 2022-04-21 23:55 677.9 KB
CLKscrew - Exposing The Perils of Security-Oblivious Energy Management - 2020.mp4 2018-04-06 12:30 86.1 MB
Cloud-Native Sandboxes for Microservices - Understanding New Threats and Attacks - 2020.description 2022-04-21 20:59 501 B
Cloud-Native Sandboxes for Microservices - Understanding New Threats and Attacks - 2020.info.json 2022-04-21 20:59 261.4 KB
Cloud-Native Sandboxes for Microservices - Understanding New Threats and Attacks - 2020.mp4 2019-03-05 17:59 36.7 MB
ClusterFuzz - Fuzzing at Google Scale - 2020.description 2022-04-21 18:34 465 B
ClusterFuzz - Fuzzing at Google Scale - 2020.info.json 2022-04-21 18:34 266.3 KB
ClusterFuzz - Fuzzing at Google Scale - 2020.mp4 2022-02-04 02:34 310.4 MB
Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches - 2020.description 2022-04-22 01:54 478 B
Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches - 2020.info.json 2022-04-22 01:54 649.1 KB
Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches - 2020.mp4 2020-03-08 06:27 77.6 MB
Come Join the CAFSA - Continuous Automated Firmware Security Analysis - 2020.description 2022-04-21 19:40 546 B
Come Join the CAFSA - Continuous Automated Firmware Security Analysis - 2020.info.json 2022-04-21 19:40 265.4 KB
Come Join the CAFSA - Continuous Automated Firmware Security Analysis - 2020.mp4 2019-12-02 17:59 112.5 MB
Comparing Security Curricula and Accreditations to Industry Needs - 2020.description 2022-04-22 00:52 460 B
Comparing Security Curricula and Accreditations to Industry Needs - 2020.info.json 2022-04-22 00:52 629.6 KB
Comparing Security Curricula and Accreditations to Industry Needs - 2020.mp4 2017-10-31 13:21 116.3 MB
Compression Oracle Attacks on VPN Networks - 2020.description 2022-04-21 22:42 408 B
Compression Oracle Attacks on VPN Networks - 2020.info.json 2022-04-21 22:42 565.1 KB
Compression Oracle Attacks on VPN Networks - 2020.mp4 2020-04-02 09:17 87.2 MB
Conducting a Successful False Flag Cyber Operation (Blame it on China) - 2020.description 2022-04-21 18:49 496 B
Conducting a Successful False Flag Cyber Operation (Blame it on China) - 2020.info.json 2022-04-21 18:49 265.6 KB
Conducting a Successful False Flag Cyber Operation (Blame it on China) - 2020.mp4 2019-12-19 14:39 274.3 MB
Container Attack Surface Reduction Beyond Name Space Isolation - 2020.description 2022-04-21 20:23 613 B
Container Attack Surface Reduction Beyond Name Space Isolation - 2020.info.json 2022-04-21 20:23 262.6 KB
Container Attack Surface Reduction Beyond Name Space Isolation - 2020.mp4 2019-03-04 15:43 123.3 MB
Controlled Chaos - The Inevitable Marriage of DevOps & Security - 2020.description 2022-04-21 19:43 549 B
Controlled Chaos - The Inevitable Marriage of DevOps & Security - 2020.info.json 2022-04-21 19:43 265.1 KB
Controlled Chaos - The Inevitable Marriage of DevOps & Security - 2020.mp4 2019-12-03 12:04 157.5 MB
Counter-Infiltration - Future-Proof Counter Attacks Against Exploit Kit Infrastructure - 2020.description 2022-04-21 23:21 643 B
Counter-Infiltration - Future-Proof Counter Attacks Against Exploit Kit Infrastructure - 2020.info.json 2022-04-21 23:21 716.8 KB
Counter-Infiltration - Future-Proof Counter Attacks Against Exploit Kit Infrastructure - 2020.mp4 2018-08-21 17:32 78.1 MB
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS - 2020.description 2022-04-28 11:20 614 B
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS - 2020.info.json 2022-04-28 11:20 265.7 KB
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS - 2020.mp4 2019-12-11 18:30 100.0 MB
Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge - 2020.description 2022-04-22 01:36 549 B
Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge - 2020.info.json 2022-04-22 01:36 502.9 KB
Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge - 2020.mp4 2021-07-04 19:39 263.1 MB
CTX - Eliminating BREACH with Context Hiding - 2020.description 2022-04-22 01:15 538 B
CTX - Eliminating BREACH with Context Hiding - 2020.info.json 2022-04-22 01:15 617.9 KB
CTX - Eliminating BREACH with Context Hiding - 2020.mp4 2020-02-11 20:56 76.0 MB
Cutting Edge - Microsoft Browser Security — From People Who Owned It - 2020.description 2022-04-21 20:51 421 B
Cutting Edge - Microsoft Browser Security — From People Who Owned It - 2020.info.json 2022-04-21 20:51 264.5 KB
Cutting Edge - Microsoft Browser Security — From People Who Owned It - 2020.mp4 2019-03-05 14:51 102.5 MB
Cyber Comrades - Alliance-Building in Cyberspace - 2020.description 2022-04-21 23:46 546 B
Cyber Comrades - Alliance-Building in Cyberspace - 2020.info.json 2022-04-21 23:46 471.2 KB
Cyber Comrades - Alliance-Building in Cyberspace - 2020.mp4 2018-04-09 11:48 44.3 MB
Cyber Insurance 101 for CISO’s - 2020.description 2022-04-21 19:46 389 B
Cyber Insurance 101 for CISO’s - 2020.info.json 2022-04-21 19:46 265.2 KB
Cyber Insurance 101 for CISO’s - 2020.mp4 2019-12-02 14:32 182.2 MB
Cyber Judo - Offensive Cyber Defense - 2020.description 2022-04-22 01:38 307 B
Cyber Judo - Offensive Cyber Defense - 2020.info.json 2022-04-22 01:38 564.0 KB
Cyber Judo - Offensive Cyber Defense - 2020.mp4 2021-06-30 19:29 222.9 MB
Cybersecurity Risk Assessment for Safety-Critical Systems - 2020.description 2022-04-21 19:47 488 B
Cybersecurity Risk Assessment for Safety-Critical Systems - 2020.info.json 2022-04-21 19:47 263.0 KB
Cybersecurity Risk Assessment for Safety-Critical Systems - 2020.mp4 2019-12-03 16:04 47.9 MB
Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT - 2020.description 2022-04-22 01:34 524 B
Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT - 2020.info.json 2022-04-22 01:34 685.9 KB
Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT - 2020.mp4 2020-03-28 08:34 104.1 MB
Dealing The Perfect Hand - Shuffling Memory Blocks On z_OS - 2020.description 2022-04-21 23:50 345 B
Dealing The Perfect Hand - Shuffling Memory Blocks On z_OS - 2020.info.json 2022-04-21 23:50 612.8 KB
Dealing The Perfect Hand - Shuffling Memory Blocks On z_OS - 2020.mp4 2018-04-06 12:19 76.8 MB
Death by a Thousand Abstracts - How (Not) to Get Your Research into Black Hat - 2020.description 2022-04-22 01:14 591 B
Death by a Thousand Abstracts - How (Not) to Get Your Research into Black Hat - 2020.info.json 2022-04-22 01:14 426.3 KB
Death by a Thousand Abstracts - How (Not) to Get Your Research into Black Hat - 2020.mp4 2020-03-14 23:14 51.4 MB
Death Profile - Now iOS Has Been Compromised to Suspected Ransomware - 2020.description 2022-04-28 16:19 460 B
Death Profile - Now iOS Has Been Compromised to Suspected Ransomware - 2020.info.json 2022-04-28 16:19 506.2 KB
Death Profile - Now iOS Has Been Compromised to Suspected Ransomware - 2020.mp4 2018-08-21 15:21 69.6 MB
Death to the IOC - What's Next in Threat Intelligence - 2020.description 2022-04-21 19:01 542 B
Death to the IOC - What's Next in Threat Intelligence - 2020.info.json 2022-04-21 19:01 264.3 KB
Death to the IOC - What's Next in Threat Intelligence - 2020.mp4 2019-12-11 15:42 67.2 MB
Debug for Bug - Crack and Hack Apple Core by Itself - 2020.description 2022-04-21 19:20 503 B
Debug for Bug - Crack and Hack Apple Core by Itself - 2020.info.json 2022-04-21 19:20 265.4 KB
Debug for Bug - Crack and Hack Apple Core by Itself - 2020.mp4 2019-12-11 19:25 100.6 MB
Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC - 2020.description 2022-04-21 20:50 404 B
Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC - 2020.info.json 2022-04-21 20:50 262.2 KB
Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC - 2020.mp4 2020-03-19 17:53 222.9 MB
Decompiler Internals - Microcode - 2020.description 2022-04-21 22:20 311 B
Decompiler Internals - Microcode - 2020.info.json 2022-04-21 22:20 615.0 KB
Decompiler Internals - Microcode - 2020.mp4 2020-04-04 16:04 264.8 MB
Deep Dive into an ICS Firewall, Looking for the Fire Hole - 2020.description 2022-04-21 22:55 503 B
Deep Dive into an ICS Firewall, Looking for the Fire Hole - 2020.info.json 2022-04-21 22:55 575.9 KB
Deep Dive into an ICS Firewall, Looking for the Fire Hole - 2020.mp4 2020-03-24 23:38 135.2 MB
Deep Impact - Recognizing Unknown Malicious Activities from Zero Knowledge - 2020.description 2022-04-21 20:45 591 B
Deep Impact - Recognizing Unknown Malicious Activities from Zero Knowledge - 2020.info.json 2022-04-21 20:45 263.0 KB
Deep Impact - Recognizing Unknown Malicious Activities from Zero Knowledge - 2020.mp4 2019-03-04 18:01 137.3 MB
Deep Neural Networks for Hackers - Methods, Applications, and Open Source Tools - 2020.description 2022-04-28 15:59 449 B
Deep Neural Networks for Hackers - Methods, Applications, and Open Source Tools - 2020.info.json 2022-04-28 15:59 573.2 KB
Deep Neural Networks for Hackers - Methods, Applications, and Open Source Tools - 2020.mp4 2020-03-30 01:20 168.9 MB
DeepLocker - Concealing Targeted Attacks with AI Locksmithing - 2020.description 2022-04-21 21:33 542 B
DeepLocker - Concealing Targeted Attacks with AI Locksmithing - 2020.info.json 2022-04-21 21:33 632.8 KB
DeepLocker - Concealing Targeted Attacks with AI Locksmithing - 2020.mp4 2020-02-19 04:04 214.2 MB
DeepPhish - Simulating Malicious AI - 2020.description 2022-04-28 11:34 573 B
DeepPhish - Simulating Malicious AI - 2020.info.json 2022-04-28 11:34 262.9 KB
DeepPhish - Simulating Malicious AI - 2020.mp4 2019-03-01 17:56 183.0 MB
Defense Against Rapidly Morphing DDOS - 2020.description 2022-04-21 19:53 559 B
Defense Against Rapidly Morphing DDOS - 2020.info.json 2022-04-21 19:53 265.2 KB
Defense Against Rapidly Morphing DDOS - 2020.mp4 2019-12-11 14:26 106.7 MB
Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE - 2020.description 2022-04-22 01:16 605 B
Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE - 2020.info.json 2022-04-22 01:16 572.4 KB
Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE - 2020.mp4 2018-03-07 19:13 267.1 MB
Delivering Javascript to World+Dog - 2020.description 2022-04-22 00:43 392 B
Delivering Javascript to World+Dog - 2020.info.json 2022-04-22 00:43 558.4 KB
Delivering Javascript to World+Dog - 2020.mp4 2021-06-23 17:43 228.5 MB
Demystifying PTSD in the Cybersecurity Environment - 2020.description 2022-04-21 21:49 701 B
Demystifying PTSD in the Cybersecurity Environment - 2020.info.json 2022-04-21 21:49 261.3 KB
Demystifying PTSD in the Cybersecurity Environment - 2020.mp4 2019-04-03 22:11 29.1 MB
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk - 2020.description 2022-04-22 01:19 637 B
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk - 2020.info.json 2022-04-22 01:19 610.7 KB
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk - 2020.mp4 2021-07-03 23:27 399.1 MB
Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries - 2020.description 2022-04-21 18:35 570 B
Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries - 2020.info.json 2022-04-21 18:35 504.1 KB
Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries - 2020.mp4 2020-03-18 15:35 89.4 MB
Detecting Credential Compromise in AWS - 2020.description 2022-04-21 23:03 435 B
Detecting Credential Compromise in AWS - 2020.info.json 2022-04-21 23:03 440.2 KB
Detecting Credential Compromise in AWS - 2020.mp4 2020-02-11 21:03 76.4 MB
Detecting Deep Fakes with Mice - 2020.description 2022-04-21 20:17 497 B
Detecting Deep Fakes with Mice - 2020.info.json 2022-04-21 20:17 264.6 KB
Detecting Deep Fakes with Mice - 2020.mp4 2019-11-27 14:25 94.9 MB
Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities - 2020.description 2022-04-21 22:32 533 B
Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities - 2020.info.json 2022-04-21 22:32 607.0 KB
Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities - 2020.mp4 2020-02-19 15:48 191.4 MB
Detecting Malicious Files with YARA Rules as They Traverse the Network - 2020.description 2022-04-21 19:40 639 B
Detecting Malicious Files with YARA Rules as They Traverse the Network - 2020.info.json 2022-04-21 19:40 264.3 KB
Detecting Malicious Files with YARA Rules as They Traverse the Network - 2020.mp4 2019-12-03 15:57 51.9 MB
Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised ML - 2020.description 2022-04-21 23:22 588 B
Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised ML - 2020.info.json 2022-04-21 23:22 619.6 KB
Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised ML - 2020.mp4 2018-08-21 17:38 60.8 MB
DevSecOps - What, Why and How - 2020.description 2022-04-21 19:26 510 B
DevSecOps - What, Why and How - 2020.info.json 2022-04-21 19:26 45.5 KB
DevSecOps - What, Why and How - 2020.mp4 2019-12-11 16:31 215.4 MB
DevSecOps - What, Why and How - 2020.description 2022-04-21 19:41 404 B
DevSecOps - What, Why and How - 2020.info.json 2022-04-21 19:41 43.2 KB
DevSecOps - What, Why and How - 2020.mp4 2019-12-05 12:35 77.5 MB
DIFUZE - Android Kernel Driver Fuzzing - 2020.description 2022-04-21 23:55 575 B
DIFUZE - Android Kernel Driver Fuzzing - 2020.info.json 2022-04-21 23:55 667.5 KB
DIFUZE - Android Kernel Driver Fuzzing - 2020.mp4 2018-04-06 12:55 70.2 MB
Dig Into the Attack Surface of PDF and Gain 100+ CVEs in 1 Year - 2020.description 2022-04-22 01:33 518 B
Dig Into the Attack Surface of PDF and Gain 100+ CVEs in 1 Year - 2020.info.json 2022-04-22 01:33 422.0 KB
Dig Into the Attack Surface of PDF and Gain 100+ CVEs in 1 Year - 2020.mp4 2021-06-22 02:00 138.1 MB
Dissecting Non-Malicious Artifacts - One IP at a Time - 2020.description 2022-04-21 23:03 321 B
Dissecting Non-Malicious Artifacts - One IP at a Time - 2020.info.json 2022-04-21 23:03 424.9 KB
Dissecting Non-Malicious Artifacts - One IP at a Time - 2020.mp4 2020-11-19 08:16 101.3 MB
Divide et Impera - MemoryRanger Runs Drivers in Isolated Kernel Spaces - 2020.description 2022-04-21 21:03 610 B
Divide et Impera - MemoryRanger Runs Drivers in Isolated Kernel Spaces - 2020.info.json 2022-04-21 21:03 266.3 KB
Divide et Impera - MemoryRanger Runs Drivers in Isolated Kernel Spaces - 2020.mp4 2019-03-01 18:25 193.1 MB
Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing - 2020.description 2022-04-22 01:17 413 B
Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing - 2020.info.json 2022-04-22 01:17 718.3 KB
Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing - 2020.mp4 2020-03-09 01:29 193.9 MB
Don't @ Me - Hunting Twitter Bots at Scale - 2020.description 2022-04-21 22:36 442 B
Don't @ Me - Hunting Twitter Bots at Scale - 2020.info.json 2022-04-21 22:36 594.4 KB
Don't @ Me - Hunting Twitter Bots at Scale - 2020.mp4 2020-11-21 18:18 155.6 MB
Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence - 2020.description 2022-04-21 21:02 673 B
Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence - 2020.info.json 2022-04-21 21:02 262.5 KB
Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence - 2020.mp4 2019-03-04 18:17 101.5 MB
Doors of Durin - The Veiled Gate to Siemens S7 Silicon - 2020.description 2022-04-21 18:42 543 B
Doors of Durin - The Veiled Gate to Siemens S7 Silicon - 2020.info.json 2022-04-21 18:42 267.5 KB
Doors of Durin - The Veiled Gate to Siemens S7 Silicon - 2020.mp4 2021-07-30 14:00 403.7 MB
Dragonblood - Attacking the Dragonfly Handshake of WPA3 - 2020.description 2022-04-21 19:41 500 B
Dragonblood - Attacking the Dragonfly Handshake of WPA3 - 2020.info.json 2022-04-21 19:41 265.9 KB
Dragonblood - Attacking the Dragonfly Handshake of WPA3 - 2020.mp4 2019-12-02 12:15 68.6 MB
Drill Apple Core - Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit - 2020.description 2022-04-21 21:11 693 B
Drill Apple Core - Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit - 2020.info.json 2022-04-21 21:11 262.6 KB
Drill Apple Core - Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit - 2020.mp4 2019-03-01 16:49 110.9 MB
Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel - 2020.description 2022-04-22 01:37 962 B
Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel - 2020.info.json 2022-04-22 01:37 644.3 KB
Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel - 2020.mp4 2020-03-02 10:18 93.8 MB
Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking - 2020.description 2022-04-21 22:49 615 B
Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking - 2020.info.json 2022-04-21 22:49 430.4 KB
Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking - 2020.mp4 2021-02-06 13:47 85.4 MB
EdTech - The Ultimate APT - 2020.description 2022-04-21 17:36 402 B
EdTech - The Ultimate APT - 2020.info.json 2022-04-21 17:36 513.9 KB
EdTech - The Ultimate APT - 2020.mp4 2020-10-13 13:46 43.1 MB
Efail - Breaking S_MIME and OpenPGP Email Encryption using Exfiltration Channels - 2020.description 2022-04-21 21:47 470 B
Efail - Breaking S_MIME and OpenPGP Email Encryption using Exfiltration Channels - 2020.info.json 2022-04-21 21:47 590.6 KB
Efail - Breaking S_MIME and OpenPGP Email Encryption using Exfiltration Channels - 2020.mp4 2020-03-09 06:50 136.2 MB
Effective File Format Fuzzing – Thoughts, Techniques and Results - 2020.description 2022-04-22 01:51 571 B
Effective File Format Fuzzing – Thoughts, Techniques and Results - 2020.info.json 2022-04-22 01:51 623.4 KB
Effective File Format Fuzzing – Thoughts, Techniques and Results - 2020.mp4 2020-03-30 11:46 102.8 MB
Election Security - Securing America's Future - 2020.description 2022-04-21 17:36 637 B
Election Security - Securing America's Future - 2020.info.json 2022-04-21 17:36 447.7 KB
Election Security - Securing America's Future - 2020.mp4 2020-10-13 13:55 155.9 MB
Enhancing Cybersecurity Through Differentiated Access to Domain Name Registration Data - 2020.description 2022-04-28 15:17 315 B
Enhancing Cybersecurity Through Differentiated Access to Domain Name Registration Data - 2020.info.json 2022-04-28 15:17 265.5 KB
Enhancing Cybersecurity Through Differentiated Access to Domain Name Registration Data - 2020.mp4 2018-09-17 21:12 105.1 MB
Enraptured Minds - Strategic Gaming of Cognitive Mindhacks - 2020.description 2022-04-21 23:43 569 B
Enraptured Minds - Strategic Gaming of Cognitive Mindhacks - 2020.info.json 2022-04-21 23:43 684.3 KB
Enraptured Minds - Strategic Gaming of Cognitive Mindhacks - 2020.mp4 2018-04-06 13:39 152.7 MB
Eternal War in XNU Kernel Objects - 2020.description 2022-04-21 20:24 583 B
Eternal War in XNU Kernel Objects - 2020.info.json 2022-04-21 20:24 263.9 KB
Eternal War in XNU Kernel Objects - 2020.mp4 2019-03-01 18:53 104.6 MB
Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering - 2020.description 2022-04-21 21:49 612 B
Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering - 2020.info.json 2022-04-21 21:49 592.0 KB
Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering - 2020.mp4 2020-04-06 09:03 129.7 MB
Everybody be Cool, This is a Robbery! - 2020.description 2022-04-21 18:56 462 B
Everybody be Cool, This is a Robbery! - 2020.info.json 2022-04-21 18:56 265.9 KB
Everybody be Cool, This is a Robbery! - 2020.mp4 2019-12-11 18:35 91.9 MB
Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process - 2020.description 2022-04-22 00:33 368 B
Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process - 2020.info.json 2022-04-22 00:33 578.6 KB
Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process - 2020.mp4 2021-07-04 17:08 285.4 MB
Evilsploit - A Universal Hardware Hacking Toolkit - 2020.description 2022-04-22 00:57 446 B
Evilsploit - A Universal Hardware Hacking Toolkit - 2020.info.json 2022-04-22 00:57 589.6 KB
Evilsploit - A Universal Hardware Hacking Toolkit - 2020.mp4 2021-06-27 01:11 310.8 MB
Evolving Security Experts Among Teenagers - 2020.description 2022-04-21 20:24 584 B
Evolving Security Experts Among Teenagers - 2020.info.json 2022-04-21 20:24 262.5 KB
Evolving Security Experts Among Teenagers - 2020.mp4 2019-03-05 13:49 146.1 MB
Exfiltrating Reconnaissance Data from Air-Gapped ICS_SCADA Networks - 2020.description 2022-04-21 23:38 590 B
Exfiltrating Reconnaissance Data from Air-Gapped ICS_SCADA Networks - 2020.info.json 2022-04-21 23:38 625.1 KB
Exfiltrating Reconnaissance Data from Air-Gapped ICS_SCADA Networks - 2020.mp4 2018-04-06 13:09 84.4 MB
Exploitation of a Modern Smartphone Baseband - 2020.description 2022-04-21 21:11 405 B
Exploitation of a Modern Smartphone Baseband - 2020.info.json 2022-04-21 21:11 262.7 KB
Exploitation of a Modern Smartphone Baseband - 2020.mp4 2021-01-09 01:27 80.0 MB
Exploiting a Single SQLite Vulnerability Across Multiple Software - 2020.description 2022-04-22 00:56 732 B
Exploiting a Single SQLite Vulnerability Across Multiple Software - 2020.info.json 2022-04-22 00:56 583.7 KB
Exploiting a Single SQLite Vulnerability Across Multiple Software - 2020.mp4 2017-10-27 18:33 72.6 MB
Exploiting Qualcomm WLAN and Modem Over The Air - 2020.description 2022-04-21 19:23 510 B
Exploiting Qualcomm WLAN and Modem Over The Air - 2020.info.json 2022-04-21 19:23 267.9 KB
Exploiting Qualcomm WLAN and Modem Over The Air - 2020.mp4 2019-12-11 17:11 77.4 MB
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine - 2020.description 2022-04-21 19:42 379 B
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine - 2020.info.json 2022-04-21 19:42 266.0 KB
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine - 2020.mp4 2019-12-02 12:26 99.3 MB
Exploiting USB_IP in Linux - 2020.description 2022-04-22 01:37 472 B
Exploiting USB_IP in Linux - 2020.info.json 2022-04-22 01:37 627.9 KB
Exploiting USB_IP in Linux - 2020.mp4 2020-02-21 20:32 100.8 MB
Exploiting Windows Hello for Business - 2020.description 2022-04-21 18:48 442 B
Exploiting Windows Hello for Business - 2020.info.json 2022-04-21 18:48 265.2 KB
Exploiting Windows Hello for Business - 2020.mp4 2019-12-19 14:43 134.5 MB
Exploring the New World - Remote Exploitation of SQLite and Curl - 2020.description 2022-04-21 19:22 648 B
Exploring the New World - Remote Exploitation of SQLite and Curl - 2020.info.json 2022-04-21 19:22 265.6 KB
Exploring the New World - Remote Exploitation of SQLite and Curl - 2020.mp4 2019-12-11 19:26 106.4 MB
Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing - 2020.description 2022-04-21 23:48 618 B
Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing - 2020.info.json 2022-04-21 23:48 475.8 KB
Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing - 2020.mp4 2018-04-06 12:59 45.2 MB
Fantastic Red-Team Attacks and How to Find Them - 2020.description 2022-04-21 19:19 513 B
Fantastic Red-Team Attacks and How to Find Them - 2020.info.json 2022-04-21 19:19 267.9 KB
Fantastic Red-Team Attacks and How to Find Them - 2020.mp4 2019-12-11 18:25 78.2 MB
Far Sides of Java Remote Protocols - 2020.description 2022-04-21 18:44 507 B
Far Sides of Java Remote Protocols - 2020.info.json 2022-04-21 18:44 646.2 KB
Far Sides of Java Remote Protocols - 2020.mp4 2020-03-17 15:30 96.0 MB
Fatal Fury on ESP32 - Time to Release Hardware Exploits - 2020.description 2022-04-21 18:06 442 B
Fatal Fury on ESP32 - Time to Release Hardware Exploits - 2020.info.json 2022-04-21 18:06 667.8 KB
Fatal Fury on ESP32 - Time to Release Hardware Exploits - 2020.mp4 2020-03-19 17:02 105.5 MB
Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming - 2020.description 2022-04-21 23:43 565 B
Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming - 2020.info.json 2022-04-21 23:43 651.8 KB
Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming - 2020.mp4 2018-04-06 13:48 80.8 MB
Fighting the Previous War (aka - Attacking and Defending in the Era of the Cloud) - 2020.description 2022-04-22 01:00 483 B
Fighting the Previous War (aka - Attacking and Defending in the Era of the Cloud) - 2020.info.json 2022-04-22 01:00 647.5 KB
Fighting the Previous War (aka - Attacking and Defending in the Era of the Cloud) - 2020.mp4 2017-10-31 13:06 123.6 MB
Finding a Needle in an Encrypted Haystack - 2020.description 2022-04-21 19:54 576 B
Finding a Needle in an Encrypted Haystack - 2020.info.json 2022-04-21 19:54 263.9 KB
Finding a Needle in an Encrypted Haystack - 2020.mp4 2019-12-02 18:56 169.5 MB
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares - 2020.description 2022-04-21 17:37 625 B
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares - 2020.info.json 2022-04-21 17:37 585.7 KB
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares - 2020.mp4 2020-10-13 14:10 112.0 MB
Finding Our Path - How We're Trying to Improve Active Directory Security - 2020.description 2022-04-21 19:37 650 B
Finding Our Path - How We're Trying to Improve Active Directory Security - 2020.info.json 2022-04-21 19:37 265.6 KB
Finding Our Path - How We're Trying to Improve Active Directory Security - 2020.mp4 2019-12-11 16:49 171.0 MB
Finding Xori - Malware Analysis Triage with Automated Disassembly - 2020.description 2022-04-21 23:03 473 B
Finding Xori - Malware Analysis Triage with Automated Disassembly - 2020.info.json 2022-04-21 23:03 420.6 KB
Finding Xori - Malware Analysis Triage with Automated Disassembly - 2020.mp4 2020-02-11 22:49 82.8 MB
Fire & Ice - Making and Breaking macOS Firewalls - 2020.description 2022-04-21 22:37 506 B
Fire & Ice - Making and Breaking macOS Firewalls - 2020.info.json 2022-04-21 22:37 452.7 KB
Fire & Ice - Making and Breaking macOS Firewalls - 2020.mp4 2020-02-12 12:07 134.5 MB
Firmware Cartography - Charting the Course for Modern Server Compromise - 2020.description 2022-04-21 19:29 664 B
Firmware Cartography - Charting the Course for Modern Server Compromise - 2020.info.json 2022-04-21 19:29 266.2 KB
Firmware Cartography - Charting the Course for Modern Server Compromise - 2020.mp4 2019-12-11 17:27 130.2 MB
Firmware is the New Black - Analyzing Past Three Years of BIOS_UEFI Security Vulnerabilities - 2020.description 2022-04-28 16:35 430 B
Firmware is the New Black - Analyzing Past Three Years of BIOS_UEFI Security Vulnerabilities - 2020.info.json 2022-04-28 16:35 605.6 KB
Firmware is the New Black - Analyzing Past Three Years of BIOS_UEFI Security Vulnerabilities - 2020.mp4 2021-06-29 09:58 349.6 MB
Flip Feng Shui - Rowhammering the VM's Isolation - 2020.description 2022-04-22 01:43 426 B
Flip Feng Shui - Rowhammering the VM's Isolation - 2020.info.json 2022-04-22 01:43 649.2 KB
Flip Feng Shui - Rowhammering the VM's Isolation - 2020.mp4 2020-03-16 14:58 104.4 MB
FlowFuzz - A Framework for Fuzzing OpenFlow-Enabled Software and Hardware Switches - 2020.description 2022-04-22 00:55 514 B
FlowFuzz - A Framework for Fuzzing OpenFlow-Enabled Software and Hardware Switches - 2020.info.json 2022-04-22 00:55 262.4 KB
FlowFuzz - A Framework for Fuzzing OpenFlow-Enabled Software and Hardware Switches - 2020.mp4 2017-10-27 21:02 73.3 MB
Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina - 2020.description 2022-04-28 14:32 439 B
Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina - 2020.info.json 2022-04-28 14:32 564.0 KB
Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina - 2020.mp4 2020-02-11 06:04 226.9 MB
For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems - 2020.description 2022-04-21 21:21 632 B
For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems - 2020.info.json 2022-04-21 21:21 553.2 KB
For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems - 2020.mp4 2020-02-21 04:47 157.2 MB
Fractured Backbone - Breaking Modern OS Defenses with Firmware Attacks - 2020.description 2022-04-22 00:46 562 B
Fractured Backbone - Breaking Modern OS Defenses with Firmware Attacks - 2020.info.json 2022-04-22 00:46 597.3 KB
Fractured Backbone - Breaking Modern OS Defenses with Firmware Attacks - 2020.mp4 2021-07-08 14:05 318.2 MB
Free-Fall - Hacking Tesla from Wireless to CAN Bus - 2020.description 2022-04-22 00:37 499 B
Free-Fall - Hacking Tesla from Wireless to CAN Bus - 2020.info.json 2022-04-22 00:37 635.6 KB
Free-Fall - Hacking Tesla from Wireless to CAN Bus - 2020.mp4 2017-10-31 14:22 99.3 MB
From Bot to Robot - How Abilities and Law Change with Physicality - 2020.description 2022-04-21 22:39 489 B
From Bot to Robot - How Abilities and Law Change with Physicality - 2020.info.json 2022-04-21 22:39 603.6 KB
From Bot to Robot - How Abilities and Law Change with Physicality - 2020.mp4 2020-02-20 18:17 149.6 MB
From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it - 2020.description 2022-04-21 21:38 493 B
From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it - 2020.info.json 2022-04-21 21:38 608.0 KB
From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it - 2020.mp4 2020-02-24 16:12 174.3 MB
Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit - 2020.description 2022-04-21 18:35 723 B
Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit - 2020.info.json 2022-04-21 18:35 597.7 KB
Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit - 2020.mp4 2020-03-17 18:35 156.2 MB
Garbage In, Garbage Out - How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data - 2020.description 2022-04-22 00:04 665 B
Garbage In, Garbage Out - How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data - 2020.info.json 2022-04-22 00:04 487.9 KB
Garbage In, Garbage Out - How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data - 2020.mp4 2017-10-31 13:28 54.5 MB
GDPR and Third Party JS - Can It Be Done - 2020.description 2022-04-21 23:52 539 B
GDPR and Third Party JS - Can It Be Done - 2020.info.json 2022-04-21 23:52 498.2 KB
GDPR and Third Party JS - Can It Be Done - 2020.mp4 2018-04-06 12:57 44.2 MB
Ghidra - Journey from Classified NSA Tool to Open Source - 2020.description 2022-04-21 18:59 776 B
Ghidra - Journey from Classified NSA Tool to Open Source - 2020.info.json 2022-04-21 18:59 266.1 KB
Ghidra - Journey from Classified NSA Tool to Open Source - 2020.mp4 2019-12-11 16:55 101.5 MB
Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit - 2020.description 2022-04-22 01:55 31 B
Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit - 2020.info.json 2022-04-22 01:55 600.0 KB
Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit - 2020.mp4 2021-09-08 02:59 320.9 MB
Go Get My_Vulnerabilities - 2020.description 2022-04-22 01:08 687 B
Go Get My_Vulnerabilities - 2020.info.json 2022-04-22 01:08 685.8 KB
Go Get My_Vulnerabilities - 2020.mp4 2020-03-31 12:50 129.7 MB
Go Nuclear - Breaking Radiation Monitoring Devices - 2020.description 2022-04-22 00:56 435 B
Go Nuclear - Breaking Radiation Monitoring Devices - 2020.info.json 2022-04-22 00:56 639.5 KB
Go Nuclear - Breaking Radiation Monitoring Devices - 2020.mp4 2017-10-31 13:18 143.6 MB
Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing - 2020.description 2022-04-28 11:33 639 B
Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing - 2020.info.json 2022-04-28 11:33 264.5 KB
Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing - 2020.mp4 2019-12-03 16:20 51.4 MB
GPU Security Exposed - 2020.description 2022-04-22 01:25 582 B
GPU Security Exposed - 2020.info.json 2022-04-22 01:25 421.6 KB
GPU Security Exposed - 2020.mp4 2021-06-24 04:59 150.6 MB
Great Algorithms Do Not Always Make Great Products - 2020.description 2022-04-21 22:47 476 B
Great Algorithms Do Not Always Make Great Products - 2020.info.json 2022-04-21 22:47 265.2 KB
Great Algorithms Do Not Always Make Great Products - 2020.mp4 2018-09-17 16:21 93.8 MB
Hack Microsoft Using Microsoft Signed Binaries - 2020.description 2022-04-22 01:07 483 B
Hack Microsoft Using Microsoft Signed Binaries - 2020.info.json 2022-04-22 01:07 717.9 KB
Hack Microsoft Using Microsoft Signed Binaries - 2020.mp4 2018-03-04 04:38 311.4 MB
Hackers, Journalists and the Ethical Swamp - 2020.description 2022-04-21 18:39 448 B
Hackers, Journalists and the Ethical Swamp - 2020.info.json 2022-04-21 18:39 266.3 KB
Hackers, Journalists and the Ethical Swamp - 2020.mp4 2021-06-29 02:43 403.6 MB
Hacking HTTP_2 - New Attacks on the Internet's Next Generation Foundation - 2020.description 2022-04-22 01:35 608 B
Hacking HTTP_2 - New Attacks on the Internet's Next Generation Foundation - 2020.info.json 2022-04-22 01:35 418.2 KB
Hacking HTTP_2 - New Attacks on the Internet's Next Generation Foundation - 2020.mp4 2021-07-07 22:00 126.8 MB
Hacking Public Opinion - 2020.description 2022-04-21 17:37 603 B
Hacking Public Opinion - 2020.info.json 2022-04-21 17:37 266.2 KB
Hacking Public Opinion - 2020.mp4 2020-11-13 21:29 268.7 MB
Hacking Your Non-Compete - 2020.description 2022-04-21 19:57 592 B
Hacking Your Non-Compete - 2020.info.json 2022-04-21 19:57 266.2 KB
Hacking Your Non-Compete - 2020.mp4 2019-12-02 19:22 128.6 MB
Hands Off and Putting SLAB_SLUB Feng Shui in a Blackbox - 2020.description 2022-04-21 18:38 585 B
Hands Off and Putting SLAB_SLUB Feng Shui in a Blackbox - 2020.info.json 2022-04-21 18:38 636.7 KB
Hands Off and Putting SLAB_SLUB Feng Shui in a Blackbox - 2020.mp4 2020-03-17 17:32 167.3 MB
Hardening Hyper-V through Offensive Security Research - 2020.description 2022-04-21 21:04 443 B
Hardening Hyper-V through Offensive Security Research - 2020.info.json 2022-04-21 21:04 262.9 KB
Hardening Hyper-V through Offensive Security Research - 2020.mp4 2020-12-03 15:22 140.6 MB
He Said, She Said – Poisoned RDP Offense and Defense - 2020.description 2022-04-21 20:01 575 B
He Said, She Said – Poisoned RDP Offense and Defense - 2020.info.json 2022-04-21 20:01 266.4 KB
He Said, She Said – Poisoned RDP Offense and Defense - 2020.mp4 2019-12-03 15:33 111.8 MB
Heap Layout Optimisation for Exploitation - 2020.description 2022-04-21 23:38 370 B
Heap Layout Optimisation for Exploitation - 2020.info.json 2022-04-21 23:38 551.4 KB
Heap Layout Optimisation for Exploitation - 2020.mp4 2018-04-06 13:11 48.2 MB
Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud - 2020.description 2022-04-22 01:15 503 B
Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud - 2020.info.json 2022-04-22 01:15 707.8 KB
Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud - 2020.mp4 2018-01-06 00:54 142.3 MB
Hiding PIN's Artifacts to Defeat Evasive Malware - 2020.description 2022-04-21 23:58 462 B
Hiding PIN's Artifacts to Defeat Evasive Malware - 2020.info.json 2022-04-21 23:58 682.8 KB
Hiding PIN's Artifacts to Defeat Evasive Malware - 2020.mp4 2018-04-06 12:46 84.1 MB
Holding on for Tonight - Addiction in InfoSec - 2020.description 2022-04-21 22:46 506 B
Holding on for Tonight - Addiction in InfoSec - 2020.info.json 2022-04-21 22:46 442.9 KB
Holding on for Tonight - Addiction in InfoSec - 2020.mp4 2020-03-28 13:38 77.8 MB
HostSplit - Exploitable Antipatterns in Unicode Normalization - 2020.description 2022-04-21 18:57 590 B
HostSplit - Exploitable Antipatterns in Unicode Normalization - 2020.info.json 2022-04-21 18:57 265.2 KB
HostSplit - Exploitable Antipatterns in Unicode Normalization - 2020.mp4 2019-12-11 18:42 83.7 MB
How Automating Incident Response Secures Your Security Posture - 2020.description 2022-04-21 17:42 220 B
How Automating Incident Response Secures Your Security Posture - 2020.info.json 2022-04-21 17:42 390.5 KB
How Automating Incident Response Secures Your Security Posture - 2020.mp4 2020-06-22 14:32 102.6 MB
How can Communities Move Forward After Incidents of Sexual Harassment or Assault - 2020.description 2022-04-21 21:49 585 B
How can Communities Move Forward After Incidents of Sexual Harassment or Assault - 2020.info.json 2022-04-21 21:49 450.4 KB
How can Communities Move Forward After Incidents of Sexual Harassment or Assault - 2020.mp4 2020-03-27 01:40 103.3 MB
How can Someone with Autism Specifically Enhance the Cyber Security Workforce - 2020.description 2022-04-21 21:25 365 B
How can Someone with Autism Specifically Enhance the Cyber Security Workforce - 2020.info.json 2022-04-21 21:25 605.6 KB
How can Someone with Autism Specifically Enhance the Cyber Security Workforce - 2020.mp4 2020-03-24 09:06 363.8 MB
How I Learned to Stop Worrying and Love the SBOM - 2020.description 2022-04-21 22:46 442 B
How I Learned to Stop Worrying and Love the SBOM - 2020.info.json 2022-04-21 22:46 454.0 KB
How I Learned to Stop Worrying and Love the SBOM - 2020.mp4 2020-02-22 07:46 109.1 MB
How Samsung Secures Your Wallet and How To Break It - 2020.description 2022-04-21 23:42 448 B
How Samsung Secures Your Wallet and How To Break It - 2020.info.json 2022-04-21 23:42 734.1 KB
How Samsung Secures Your Wallet and How To Break It - 2020.mp4 2018-04-06 13:55 86.5 MB
How to Break PDF Encryption - 2020.description 2022-04-21 18:10 410 B
How to Break PDF Encryption - 2020.info.json 2022-04-21 18:10 265.4 KB
How to Break PDF Encryption - 2020.mp4 2020-03-18 19:49 104.1 MB
How to Build Synthetic Persons in Cyberspace - 2020.description 2022-04-21 20:43 496 B
How to Build Synthetic Persons in Cyberspace - 2020.info.json 2022-04-21 20:43 265.7 KB
How to Build Synthetic Persons in Cyberspace - 2020.mp4 2019-03-05 17:53 113.0 MB
How to Detect that Your Domains are Being Abused for Phishing by Using DNS - 2020.description 2022-04-28 11:16 544 B
How to Detect that Your Domains are Being Abused for Phishing by Using DNS - 2020.info.json 2022-04-28 11:16 265.8 KB
How to Detect that Your Domains are Being Abused for Phishing by Using DNS - 2020.mp4 2019-12-11 19:17 182.1 MB
How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing - 2020.description 2022-04-22 01:49 750 B
How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing - 2020.info.json 2022-04-22 01:49 652.8 KB
How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing - 2020.mp4 2020-02-16 06:27 128.0 MB
How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine - 2020.description 2022-04-21 23:54 393 B
How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine - 2020.info.json 2022-04-21 23:54 623.3 KB
How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine - 2020.mp4 2018-04-06 12:53 117.1 MB
How to Make Nation-State and Intelligence Attackers' Lives Much Harder on Mobile Networks - 2020.description 2022-04-22 00:55 747 B
How to Make Nation-State and Intelligence Attackers' Lives Much Harder on Mobile Networks - 2020.info.json 2022-04-22 00:55 428.9 KB
How to Make Nation-State and Intelligence Attackers' Lives Much Harder on Mobile Networks - 2020.mp4 2017-10-31 12:35 91.2 MB
How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement - 2020.description 2022-04-21 23:56 458 B
How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement - 2020.info.json 2022-04-21 23:56 628.8 KB
How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement - 2020.mp4 2018-04-06 12:45 169.8 MB
How to Survive the Hardware Assisted Control-Flow Integrity Enforcement - 2020.description 2022-04-21 19:42 509 B
How to Survive the Hardware Assisted Control-Flow Integrity Enforcement - 2020.info.json 2022-04-21 19:42 268.4 KB
How to Survive the Hardware Assisted Control-Flow Integrity Enforcement - 2020.mp4 2019-12-04 16:18 155.7 MB
How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems - 2020.description 2022-04-21 22:41 671 B
How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems - 2020.info.json 2022-04-21 22:41 604.3 KB
How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems - 2020.mp4 2020-03-26 13:34 216.0 MB
HTTP Desync Attacks - Request Smuggling Reborn - 2020.description 2022-04-21 18:41 573 B
HTTP Desync Attacks - Request Smuggling Reborn - 2020.info.json 2022-04-21 18:41 267.6 KB
HTTP Desync Attacks - Request Smuggling Reborn - 2020.mp4 2021-03-25 20:07 179.0 MB
HTTP Desync Attacks - Smashing into the Cell Next Door - 2020.description 2022-04-21 19:44 580 B
HTTP Desync Attacks - Smashing into the Cell Next Door - 2020.info.json 2022-04-21 19:44 266.0 KB
HTTP Desync Attacks - Smashing into the Cell Next Door - 2020.mp4 2019-12-02 13:01 93.6 MB
Hunting for Bugs, Catching Dragons - 2020.description 2022-04-21 19:50 552 B
Hunting for Bugs, Catching Dragons - 2020.info.json 2022-04-21 19:50 264.0 KB
Hunting for Bugs, Catching Dragons - 2020.mp4 2019-12-03 15:43 51.3 MB
I Block You Because I Love You - Social Account Identification Attack Against a Website Visitor - 2020.description 2022-04-21 20:22 545 B
I Block You Because I Love You - Social Account Identification Attack Against a Website Visitor - 2020.info.json 2022-04-21 20:22 262.1 KB
I Block You Because I Love You - Social Account Identification Attack Against a Website Visitor - 2020.mp4 2019-03-05 13:53 85.3 MB
I Know What You Saw Last Minute - The Chrome Browser Case - 2020.description 2022-04-22 01:44 480 B
I Know What You Saw Last Minute - The Chrome Browser Case - 2020.info.json 2022-04-22 01:44 455.3 KB
I Know What You Saw Last Minute - The Chrome Browser Case - 2020.mp4 2021-07-03 04:57 135.5 MB
I Trust My Zombies - A Trust-Enabled Botnet - 2020.description 2022-04-21 23:47 415 B
I Trust My Zombies - A Trust-Enabled Botnet - 2020.info.json 2022-04-21 23:47 286.9 KB
I Trust My Zombies - A Trust-Enabled Botnet - 2020.mp4 2018-04-06 12:57 68.7 MB
I'm Unique, Just Like You - Human Side-Channels and Their Implications for Security and Privacy - 2020.description 2022-04-21 19:56 630 B
I'm Unique, Just Like You - Human Side-Channels and Their Implications for Security and Privacy - 2020.info.json 2022-04-21 19:56 264.3 KB
I'm Unique, Just Like You - Human Side-Channels and Their Implications for Security and Privacy - 2020.mp4 2019-12-02 13:46 94.6 MB
I, for One, Welcome Our New Power Analysis Overlords - 2020.description 2022-04-21 22:18 410 B
I, for One, Welcome Our New Power Analysis Overlords - 2020.info.json 2022-04-21 22:18 452.9 KB
I, for One, Welcome Our New Power Analysis Overlords - 2020.mp4 2020-04-05 09:21 114.2 MB
Identity Theft - Attacks on SSO Systems - 2020.description 2022-04-21 22:02 554 B
Identity Theft - Attacks on SSO Systems - 2020.info.json 2022-04-21 22:02 555.5 KB
Identity Theft - Attacks on SSO Systems - 2020.mp4 2020-04-02 10:43 126.6 MB
Implementing the Lessons Learned From a Major Cyber Attack - 2020.description 2022-04-28 11:08 296 B
Implementing the Lessons Learned From a Major Cyber Attack - 2020.info.json 2022-04-28 11:08 265.7 KB
Implementing the Lessons Learned From a Major Cyber Attack - 2020.mp4 2021-08-09 07:01 359.3 MB
In Search of CurveSwap - Measuring Elliptic Curve Implementations in the Wild - 2020.description 2022-04-21 20:42 506 B
In Search of CurveSwap - Measuring Elliptic Curve Implementations in the Wild - 2020.info.json 2022-04-21 20:42 261.4 KB
In Search of CurveSwap - Measuring Elliptic Curve Implementations in the Wild - 2020.mp4 2019-03-04 17:37 50.0 MB
Industroyer_Crashoverride - Zero Things Cool About a Threat Group Targeting the Power Grid - 2020.description 2022-04-22 00:58 665 B
Industroyer_Crashoverride - Zero Things Cool About a Threat Group Targeting the Power Grid - 2020.info.json 2022-04-22 00:58 262.8 KB
Industroyer_Crashoverride - Zero Things Cool About a Threat Group Targeting the Power Grid - 2020.mp4 2017-10-27 18:25 125.3 MB
Infighting Among Russian Security Services in the Cyber Sphere - 2020.description 2022-04-21 19:20 732 B
Infighting Among Russian Security Services in the Cyber Sphere - 2020.info.json 2022-04-21 19:20 265.9 KB
Infighting Among Russian Security Services in the Cyber Sphere - 2020.mp4 2019-12-11 17:22 131.1 MB
InfoSec Philosophies for the Corrupt Economy - 2020.description 2022-04-21 21:46 541 B
InfoSec Philosophies for the Corrupt Economy - 2020.info.json 2022-04-21 21:46 444.3 KB
InfoSec Philosophies for the Corrupt Economy - 2020.mp4 2020-02-15 23:09 109.2 MB
Inside Android's SafetyNet Attestation - 2020.description 2022-04-21 23:47 493 B
Inside Android's SafetyNet Attestation - 2020.info.json 2022-04-21 23:47 504.8 KB
Inside Android's SafetyNet Attestation - 2020.mp4 2018-04-06 13:33 97.8 MB
Inside Out - The Cloud has Never been so Close - 2020.description 2022-04-28 11:07 529 B
Inside Out - The Cloud has Never been so Close - 2020.info.json 2022-04-28 11:07 465.9 KB
Inside Out - The Cloud has Never been so Close - 2020.mp4 2020-03-20 12:32 79.2 MB
Inside the Apple T2 - 2020.description 2022-04-21 19:32 593 B
Inside the Apple T2 - 2020.info.json 2022-04-21 19:32 265.6 KB
Inside the Apple T2 - 2020.mp4 2019-12-11 18:17 88.0 MB
Inside Web Attacks - The Real Payloads - 2020.description 2022-04-22 01:37 555 B
Inside Web Attacks - The Real Payloads - 2020.info.json 2022-04-22 01:37 398.9 KB
Inside Web Attacks - The Real Payloads - 2020.mp4 2021-06-12 08:28 63.3 MB
Integration of Cyber Insurance Into A Risk Management Program - 2020.description 2022-04-21 19:40 576 B
Integration of Cyber Insurance Into A Risk Management Program - 2020.info.json 2022-04-21 19:40 266.3 KB
Integration of Cyber Insurance Into A Risk Management Program - 2020.mp4 2019-12-03 18:27 185.2 MB
Intel ME - Flash File System Explained - 2020.description 2022-04-21 23:57 411 B
Intel ME - Flash File System Explained - 2020.info.json 2022-04-21 23:57 670.2 KB
Intel ME - Flash File System Explained - 2020.mp4 2018-04-06 12:39 77.6 MB
Intel SGX Remote Attestation is Not Sufficient - 2020.description 2022-04-22 00:03 328 B
Intel SGX Remote Attestation is Not Sufficient - 2020.info.json 2022-04-22 00:03 647.4 KB
Intel SGX Remote Attestation is Not Sufficient - 2020.mp4 2017-10-31 14:05 122.8 MB
Intel VISA - Through the Rabbit Hole - 2020.description 2022-04-21 19:55 584 B
Intel VISA - Through the Rabbit Hole - 2020.info.json 2022-04-21 19:55 48.2 KB
Intel VISA - Through the Rabbit Hole - 2020.mp4 2019-12-04 20:16 208.2 MB
International Problems - Serialized Fuzzing for ICU Vulnerabilities - 2020.description 2022-04-21 23:32 457 B
International Problems - Serialized Fuzzing for ICU Vulnerabilities - 2020.info.json 2022-04-21 23:32 546.1 KB
International Problems - Serialized Fuzzing for ICU Vulnerabilities - 2020.mp4 2018-08-21 18:01 46.6 MB
Internet-Scale Analysis of AWS Cognito Security - 2020.description 2022-04-21 19:39 462 B
Internet-Scale Analysis of AWS Cognito Security - 2020.info.json 2022-04-21 19:39 265.4 KB
Internet-Scale Analysis of AWS Cognito Security - 2020.mp4 2019-12-03 13:30 92.6 MB
Investigating Malware Using Memory Forensics - A Practical Approach - 2020.description 2022-04-21 20:53 587 B
Investigating Malware Using Memory Forensics - A Practical Approach - 2020.info.json 2022-04-21 20:53 57.3 KB
Investigating Malware Using Memory Forensics - A Practical Approach - 2020.mp4 2019-04-24 11:27 223.4 MB
iOS Dual Booting Demystified - 2020.description 2022-04-21 19:55 462 B
iOS Dual Booting Demystified - 2020.info.json 2022-04-21 19:55 264.5 KB
iOS Dual Booting Demystified - 2020.mp4 2019-12-04 19:39 102.6 MB
IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies - 2020.description 2022-04-21 21:23 571 B
IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies - 2020.info.json 2022-04-21 21:23 593.1 KB
IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies - 2020.mp4 2020-02-23 02:09 186.5 MB
Is the Mafia Taking Over Cybercrime - 2020.description 2022-04-21 21:40 683 B
Is the Mafia Taking Over Cybercrime - 2020.info.json 2022-04-21 21:40 452.9 KB
Is the Mafia Taking Over Cybercrime - 2020.mp4 2020-02-23 02:54 155.9 MB
Is Your Mental Health for Sale - 2020.description 2022-04-21 18:36 557 B
Is Your Mental Health for Sale - 2020.info.json 2022-04-21 18:36 266.0 KB
Is Your Mental Health for Sale - 2020.mp4 2021-08-02 05:20 295.4 MB
It's a PHP Unserialization Vulnerability Jim, but Not as We Know It - 2020.description 2022-04-21 21:24 347 B
It's a PHP Unserialization Vulnerability Jim, but Not as We Know It - 2020.info.json 2022-04-21 21:24 263.7 KB
It's a PHP Unserialization Vulnerability Jim, but Not as We Know It - 2020.mp4 2020-12-05 00:27 177.8 MB
Jailbreaking Apple Watch - 2020.description 2022-04-21 23:48 392 B
Jailbreaking Apple Watch - 2020.info.json 2022-04-21 23:48 497.7 KB
Jailbreaking Apple Watch - 2020.mp4 2018-04-06 14:03 48.9 MB
KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous - 2020.description 2022-04-21 22:54 654 B
KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous - 2020.info.json 2022-04-21 22:54 265.4 KB
KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous - 2020.mp4 2018-11-21 12:19 71.8 MB
Keep Everyone In Sync - Effective Approaches Borrowed from Open Source Communities - 2020.description 2022-04-21 19:49 573 B
Keep Everyone In Sync - Effective Approaches Borrowed from Open Source Communities - 2020.info.json 2022-04-21 19:49 264.3 KB
Keep Everyone In Sync - Effective Approaches Borrowed from Open Source Communities - 2020.mp4 2019-12-04 17:14 99.9 MB
KEEP PRIVATE - Two-Factor Authentication, Usable or Not - 2020.description 2022-04-21 22:19 98 B
KEEP PRIVATE - Two-Factor Authentication, Usable or Not - 2020.info.json 2022-04-21 22:19 427.6 KB
KEEP PRIVATE - Two-Factor Authentication, Usable or Not - 2020.mp4 2020-03-09 22:44 123.0 MB
Keeping Secrets - Emerging Practice in Database Encryption - 2020.description 2022-04-21 20:21 524 B
Keeping Secrets - Emerging Practice in Database Encryption - 2020.info.json 2022-04-21 20:21 262.0 KB
Keeping Secrets - Emerging Practice in Database Encryption - 2020.mp4 2019-03-04 15:44 60.4 MB
Kernel Mode Threats and Practical Defenses - 2020.description 2022-04-21 21:48 532 B
Kernel Mode Threats and Practical Defenses - 2020.info.json 2022-04-21 21:48 596.3 KB
Kernel Mode Threats and Practical Defenses - 2020.mp4 2020-02-16 17:49 117.1 MB
KSMA - Breaking Android Kernel Isolation and Rooting with ARM MMU Features - 2020.description 2022-04-21 23:36 476 B
KSMA - Breaking Android Kernel Isolation and Rooting with ARM MMU Features - 2020.info.json 2022-04-21 23:36 543.7 KB
KSMA - Breaking Android Kernel Isolation and Rooting with ARM MMU Features - 2020.mp4 2018-08-21 15:09 54.0 MB
Last Call for SATCOM Security - 2020.description 2022-04-28 14:54 444 B
Last Call for SATCOM Security - 2020.info.json 2022-04-28 14:54 558.4 KB
Last Call for SATCOM Security - 2020.mp4 2020-03-16 22:28 238.2 MB
Legal GNSS Spoofing and its Effects on Autonomous Vehicles - 2020.description 2022-04-21 20:14 547 B
Legal GNSS Spoofing and its Effects on Autonomous Vehicles - 2020.info.json 2022-04-21 20:14 264.7 KB
Legal GNSS Spoofing and its Effects on Autonomous Vehicles - 2020.mp4 2019-11-27 14:10 75.1 MB
Legal Landmines - How Law and Policy are Rapidly Shaping Information Security - 2020.description 2022-04-21 23:15 384 B
Legal Landmines - How Law and Policy are Rapidly Shaping Information Security - 2020.info.json 2022-04-21 23:15 613.4 KB
Legal Landmines - How Law and Policy are Rapidly Shaping Information Security - 2020.mp4 2020-03-09 00:05 477.6 MB
Legal Liability for IOT Cybersecurity Vulnerabilities - 2020.description 2022-04-21 21:06 454 B
Legal Liability for IOT Cybersecurity Vulnerabilities - 2020.info.json 2022-04-21 21:06 609.1 KB
Legal Liability for IOT Cybersecurity Vulnerabilities - 2020.mp4 2020-04-06 17:35 167.5 MB
Lessons and Lulz - The 4th Annual Black Hat USA NOC Report - 2020.description 2022-04-21 21:27 519 B
Lessons and Lulz - The 4th Annual Black Hat USA NOC Report - 2020.info.json 2022-04-21 21:27 520.7 KB
Lessons and Lulz - The 4th Annual Black Hat USA NOC Report - 2020.mp4 2020-03-28 04:36 204.0 MB
Lessons and Lulz - The 5th Annual Black Hat USA NOC Report - 2020.description 2022-04-21 18:51 782 B
Lessons and Lulz - The 5th Annual Black Hat USA NOC Report - 2020.info.json 2022-04-21 18:51 265.0 KB
Lessons and Lulz - The 5th Annual Black Hat USA NOC Report - 2020.mp4 2019-12-11 19:43 134.8 MB
Lessons From Two Years of Crypto Audits - 2020.description 2022-04-21 19:44 415 B
Lessons From Two Years of Crypto Audits - 2020.info.json 2022-04-21 19:44 265.6 KB
Lessons From Two Years of Crypto Audits - 2020.mp4 2019-12-02 18:31 81.7 MB
Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines - 2020.description 2022-04-21 22:16 428 B
Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines - 2020.info.json 2022-04-21 22:16 449.3 KB
Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines - 2020.mp4 2020-04-03 01:44 151.7 MB
Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization - 2020.description 2022-04-22 00:41 539 B
Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization - 2020.info.json 2022-04-22 00:41 655.1 KB
Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization - 2020.mp4 2017-10-31 14:23 132.7 MB
Level Up Your Security Mindset - 2020.description 2022-04-21 20:41 614 B
Level Up Your Security Mindset - 2020.info.json 2022-04-21 20:41 265.0 KB
Level Up Your Security Mindset - 2020.mp4 2019-03-04 15:58 137.4 MB
Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017 - 2020.description 2022-04-22 01:29 22 B
Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017 - 2020.info.json 2022-04-22 01:30 627.1 KB
Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017 - 2020.mp4 2020-02-22 03:40 423.0 MB
Locknote - Conclusions and Key Takeaways from Black Hat Asia 2018 - 2020.description 2022-04-21 23:34 66 B
Locknote - Conclusions and Key Takeaways from Black Hat Asia 2018 - 2020.info.json 2022-04-21 23:34 631.7 KB
Locknote - Conclusions and Key Takeaways from Black Hat Asia 2018 - 2020.mp4 2018-08-21 15:20 276.3 MB
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016 - 2020.description 2022-04-22 01:26 388 B
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016 - 2020.info.json 2022-04-22 01:26 566.6 KB
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016 - 2020.mp4 2021-06-27 05:49 358.3 MB
Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017 - 2020.description 2022-04-21 23:39 440 B
Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017 - 2020.info.json 2022-04-21 23:39 604.2 KB
Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017 - 2020.mp4 2018-04-06 14:11 213.5 MB
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2018 - 2020.description 2022-04-21 20:47 506 B
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2018 - 2020.info.json 2022-04-21 20:47 261.4 KB
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2018 - 2020.mp4 2019-03-06 13:17 351.1 MB
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2019 - 2020.description 2022-04-21 17:46 579 B
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2019 - 2020.info.json 2022-04-21 17:46 695.3 KB
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2019 - 2020.mp4 2020-03-20 12:45 533.0 MB
Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone - 2020.description 2022-04-21 19:48 513 B
Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone - 2020.info.json 2022-04-21 19:48 265.6 KB
Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone - 2020.mp4 2019-12-02 15:45 132.7 MB
Lost in Transaction - Process Doppelgänging - 2020.description 2022-04-21 23:46 541 B
Lost in Transaction - Process Doppelgänging - 2020.info.json 2022-04-21 23:46 637.1 KB
Lost in Transaction - Process Doppelgänging - 2020.mp4 2018-04-06 13:06 86.0 MB
Lowering the Bar - Deep Learning for Side Channel Analysis - 2020.description 2022-04-21 21:34 384 B
Lowering the Bar - Deep Learning for Side Channel Analysis - 2020.info.json 2022-04-21 21:34 605.4 KB
Lowering the Bar - Deep Learning for Side Channel Analysis - 2020.mp4 2021-02-25 12:42 188.6 MB
LTE Network Automation Under Threat - 2020.description 2022-04-21 22:13 393 B
LTE Network Automation Under Threat - 2020.info.json 2022-04-21 22:13 608.9 KB
LTE Network Automation Under Threat - 2020.mp4 2020-04-03 13:57 107.2 MB
Mac-A-Mal - An Automated Platform for Mac Malware Hunting - 2020.description 2022-04-21 23:36 652 B
Mac-A-Mal - An Automated Platform for Mac Malware Hunting - 2020.info.json 2022-04-21 23:36 414.9 KB
Mac-A-Mal - An Automated Platform for Mac Malware Hunting - 2020.mp4 2018-08-21 15:18 23.6 MB
Mainframe [z_OS] Reverse Engineering and Exploit Development - 2020.description 2022-04-21 21:33 537 B
Mainframe [z_OS] Reverse Engineering and Exploit Development - 2020.info.json 2022-04-21 21:33 610.1 KB
Mainframe [z_OS] Reverse Engineering and Exploit Development - 2020.mp4 2020-02-28 20:00 148.2 MB
Making Big Things Better The Dead Cow Way - 2020.description 2022-04-21 19:28 670 B
Making Big Things Better The Dead Cow Way - 2020.info.json 2022-04-21 19:28 266.2 KB
Making Big Things Better The Dead Cow Way - 2020.mp4 2019-12-11 18:01 310.4 MB
Malware Buried Deep Down the SPI Flash - Sednit's First UEFI Rootkit Found in the Wild - 2020.description 2022-04-21 21:28 681 B
Malware Buried Deep Down the SPI Flash - Sednit's First UEFI Rootkit Found in the Wild - 2020.info.json 2022-04-21 21:28 261.8 KB
Malware Buried Deep Down the SPI Flash - Sednit's First UEFI Rootkit Found in the Wild - 2020.mp4 2019-03-01 17:04 123.7 MB
Managing for Success - Maintaining a Healthy Bug Bounty Program Long Term - 2020.description 2022-04-21 18:55 570 B
Managing for Success - Maintaining a Healthy Bug Bounty Program Long Term - 2020.info.json 2022-04-21 18:55 265.4 KB
Managing for Success - Maintaining a Healthy Bug Bounty Program Long Term - 2020.mp4 2019-12-11 17:20 85.1 MB
MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE - 2020.description 2022-04-22 01:12 509 B
MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE - 2020.info.json 2022-04-22 01:12 491.8 KB
MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE - 2020.mp4 2021-06-30 18:55 247.4 MB
Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware - 2020.description 2022-04-21 22:51 577 B
Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware - 2020.info.json 2022-04-21 22:51 454.7 KB
Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware - 2020.mp4 2021-02-10 23:39 109.1 MB
Meltdown - Basics, Details, Consequences - 2020.description 2022-04-21 22:50 404 B
Meltdown - Basics, Details, Consequences - 2020.info.json 2022-04-21 22:50 596.3 KB
Meltdown - Basics, Details, Consequences - 2020.mp4 2020-02-17 11:43 93.6 MB
Messaging Layer Security - Towards a New Era of Secure Group Messaging - 2020.description 2022-04-21 19:50 592 B
Messaging Layer Security - Towards a New Era of Secure Group Messaging - 2020.info.json 2022-04-21 19:50 266.2 KB
Messaging Layer Security - Towards a New Era of Secure Group Messaging - 2020.mp4 2019-12-03 13:08 74.3 MB
Miasm - Reverse Engineering Framework - 2020.description 2022-04-21 22:50 409 B
Miasm - Reverse Engineering Framework - 2020.info.json 2022-04-21 22:50 613.0 KB
Miasm - Reverse Engineering Framework - 2020.mp4 2020-03-27 23:49 140.3 MB
Mind Games - Using Data to Solve for the Human Element - 2020.description 2022-04-21 17:39 646 B
Mind Games - Using Data to Solve for the Human Element - 2020.info.json 2022-04-21 17:39 567.7 KB
Mind Games - Using Data to Solve for the Human Element - 2020.mp4 2020-10-13 14:34 96.2 MB
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection - 2020.description 2022-04-21 19:58 745 B
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection - 2020.info.json 2022-04-21 19:58 263.2 KB
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection - 2020.mp4 2019-12-11 14:19 78.2 MB
MITRE ATT&CK - The Play at Home Edition - 2020.description 2022-04-21 19:57 520 B
MITRE ATT&CK - The Play at Home Edition - 2020.info.json 2022-04-21 19:57 265.8 KB
MITRE ATT&CK - The Play at Home Edition - 2020.mp4 2019-12-02 15:26 170.2 MB
MMFML - Exploring How Memory-Mapped Files Hide From AV and Execute Malicious Code - 2020.description 2022-04-21 22:45 428 B
MMFML - Exploring How Memory-Mapped Files Hide From AV and Execute Malicious Code - 2020.info.json 2022-04-21 22:45 264.8 KB
MMFML - Exploring How Memory-Mapped Files Hide From AV and Execute Malicious Code - 2020.mp4 2018-09-17 17:46 69.7 MB
Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks - 2020.description 2022-04-22 01:46 656 B
Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks - 2020.info.json 2022-04-22 01:46 270.7 KB
Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks - 2020.mp4 2021-07-19 11:32 145.0 MB
Mobile Interconnect Threats - How Next-Gen Products May be Already Outdated - 2020.description 2022-04-21 19:31 471 B
Mobile Interconnect Threats - How Next-Gen Products May be Already Outdated - 2020.info.json 2022-04-21 19:31 264.4 KB
Mobile Interconnect Threats - How Next-Gen Products May be Already Outdated - 2020.mp4 2019-12-11 14:50 59.7 MB
Mobile Network Hacking, IP Edition - 2020.description 2022-04-21 18:49 354 B
Mobile Network Hacking, IP Edition - 2020.info.json 2022-04-21 18:49 265.4 KB
Mobile Network Hacking, IP Edition - 2020.mp4 2019-12-19 14:51 133.3 MB
Mobile-Telephony Threats in Asia - 2020.description 2022-04-22 01:04 706 B
Mobile-Telephony Threats in Asia - 2020.info.json 2022-04-22 01:04 709.3 KB
Mobile-Telephony Threats in Asia - 2020.mp4 2020-04-06 17:22 135.3 MB
Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet - 2020.description 2022-04-21 18:45 567 B
Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet - 2020.info.json 2022-04-21 18:45 266.2 KB
Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet - 2020.mp4 2021-08-03 13:40 268.3 MB
Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims - 2020.description 2022-04-21 21:50 476 B
Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims - 2020.info.json 2022-04-21 21:50 439.6 KB
Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims - 2020.mp4 2020-02-24 05:15 124.7 MB
Monsters in the Middleboxes - Building Tools for Detecting HTTPS Interception - 2020.description 2022-04-21 20:19 450 B
Monsters in the Middleboxes - Building Tools for Detecting HTTPS Interception - 2020.info.json 2022-04-21 20:19 264.7 KB
Monsters in the Middleboxes - Building Tools for Detecting HTTPS Interception - 2020.mp4 2019-11-27 14:42 56.6 MB
Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites - 2020.description 2022-04-21 19:34 501 B
Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites - 2020.info.json 2022-04-21 19:34 265.7 KB
Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites - 2020.mp4 2019-12-11 19:12 126.8 MB
Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box - 2020.description 2022-04-22 01:11 748 B
Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box - 2020.info.json 2022-04-22 01:11 556.1 KB
Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box - 2020.mp4 2020-03-08 17:26 82.0 MB
Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets - 2020.description 2022-04-22 01:42 616 B
Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets - 2020.info.json 2022-04-22 01:42 552.6 KB
Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets - 2020.mp4 2020-04-05 14:47 58.3 MB
Nation-State Moneymule's Hunting Season – APT Attacks Targeting Financial Institutions - 2020.description 2022-04-21 23:57 458 B
Nation-State Moneymule's Hunting Season – APT Attacks Targeting Financial Institutions - 2020.info.json 2022-04-21 23:57 731.2 KB
Nation-State Moneymule's Hunting Season – APT Attacks Targeting Financial Institutions - 2020.mp4 2018-04-06 12:44 89.8 MB
Network Defender Archeology - An NSM Case Study in Lateral Movement with DCOM - 2020.description 2022-04-21 20:51 403 B
Network Defender Archeology - An NSM Case Study in Lateral Movement with DCOM - 2020.info.json 2022-04-21 20:51 265.9 KB
Network Defender Archeology - An NSM Case Study in Lateral Movement with DCOM - 2020.mp4 2019-03-05 14:43 152.2 MB
Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data - 2020.description 2022-04-22 01:11 676 B
Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data - 2020.info.json 2022-04-22 01:11 582.9 KB
Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data - 2020.mp4 2018-03-06 17:56 220.6 MB
New Adventures in Spying 3G and 4G Users - Locate Track & Monitor - 2020.description 2022-04-22 00:49 581 B
New Adventures in Spying 3G and 4G Users - Locate Track & Monitor - 2020.info.json 2022-04-22 00:49 262.4 KB
New Adventures in Spying 3G and 4G Users - Locate Track & Monitor - 2020.mp4 2017-10-27 20:37 108.6 MB
New Compat Vulnerabilities in Linux Device Drivers - 2020.description 2022-04-21 23:35 531 B
New Compat Vulnerabilities in Linux Device Drivers - 2020.info.json 2022-04-21 23:35 459.3 KB
New Compat Vulnerabilities in Linux Device Drivers - 2020.mp4 2018-08-21 15:57 34.6 MB
New Exploit Technique In Java Deserialization Attack - 2020.description 2022-04-21 18:08 735 B
New Exploit Technique In Java Deserialization Attack - 2020.info.json 2022-04-21 18:08 266.3 KB
New Exploit Technique In Java Deserialization Attack - 2020.mp4 2021-12-29 05:48 320.3 MB
New Norms and Policies in Cyber-Diplomacy - 2020.description 2022-04-21 22:12 453 B
New Norms and Policies in Cyber-Diplomacy - 2020.info.json 2022-04-21 22:12 628.2 KB
New Norms and Policies in Cyber-Diplomacy - 2020.mp4 2021-02-25 12:09 411.6 MB
New Vulnerabilities in 5G Networks - 2020.description 2022-04-21 19:45 464 B
New Vulnerabilities in 5G Networks - 2020.info.json 2022-04-21 19:45 265.5 KB
New Vulnerabilities in 5G Networks - 2020.mp4 2019-12-02 13:15 137.0 MB
No Free Charge Theorem 2.0 - How to Steal Private Information from a Mobile Device Using a Powerbank - 2020.description 2022-04-21 20:21 940 B
No Free Charge Theorem 2.0 - How to Steal Private Information from a Mobile Device Using a Powerbank - 2020.info.json 2022-04-21 20:21 262.5 KB
No Free Charge Theorem 2.0 - How to Steal Private Information from a Mobile Device Using a Powerbank - 2020.mp4 2019-03-01 17:19 112.1 MB
No Royal Road … Notes on Dangerous Game - 2020.description 2022-04-21 22:44 516 B
No Royal Road … Notes on Dangerous Game - 2020.info.json 2022-04-21 22:44 606.7 KB
No Royal Road … Notes on Dangerous Game - 2020.mp4 2020-07-08 10:03 198.0 MB
None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service - 2020.description 2022-04-21 21:05 553 B
None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service - 2020.info.json 2022-04-21 21:05 507.9 KB
None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service - 2020.mp4 2020-02-16 14:52 118.8 MB
OEM Finder - Hunting Vulnerable OEM IoT Devices at Scale - 2020.description 2022-04-21 18:08 633 B
OEM Finder - Hunting Vulnerable OEM IoT Devices at Scale - 2020.info.json 2022-04-21 18:08 448.2 KB
OEM Finder - Hunting Vulnerable OEM IoT Devices at Scale - 2020.mp4 2020-03-19 15:48 83.1 MB
Off-Path Attacks Against PKI - 2020.description 2022-04-21 21:02 466 B
Off-Path Attacks Against PKI - 2020.info.json 2022-04-21 21:02 260.9 KB
Off-Path Attacks Against PKI - 2020.mp4 2019-03-05 18:05 63.3 MB
Offensive Malware Analysis - Dissecting OSX_FruitFly via a Custom C&C Server - 2020.description 2022-04-22 00:57 521 B
Offensive Malware Analysis - Dissecting OSX_FruitFly via a Custom C&C Server - 2020.info.json 2022-04-22 00:57 472.7 KB
Offensive Malware Analysis - Dissecting OSX_FruitFly via a Custom C&C Server - 2020.mp4 2017-10-31 13:23 46.2 MB
Office in Wonderland - 2020.description 2022-04-21 19:53 544 B
Office in Wonderland - 2020.info.json 2022-04-21 19:53 266.1 KB
Office in Wonderland - 2020.mp4 2019-12-04 13:59 161.8 MB
On Trust - Stories from the Front Lines - 2020.description 2022-04-21 18:55 550 B
On Trust - Stories from the Front Lines - 2020.info.json 2022-04-21 18:55 264.4 KB
On Trust - Stories from the Front Lines - 2020.mp4 2019-12-11 14:43 81.6 MB
Open Sourcing Automotive Diagnostics - 2020.description 2022-04-22 01:21 487 B
Open Sourcing Automotive Diagnostics - 2020.info.json 2022-04-22 01:21 713.7 KB
Open Sourcing Automotive Diagnostics - 2020.mp4 2018-03-03 14:32 373.9 MB
Operational Templates for State-Level Attack and Collective Defense of Countries - 2020.description 2022-04-21 19:22 662 B
Operational Templates for State-Level Attack and Collective Defense of Countries - 2020.info.json 2022-04-21 19:22 266.2 KB
Operational Templates for State-Level Attack and Collective Defense of Countries - 2020.mp4 2019-12-11 16:46 129.0 MB
Orange is the New Purple - 2020.description 2022-04-22 01:13 690 B
Orange is the New Purple - 2020.info.json 2022-04-22 01:13 262.2 KB
Orange is the New Purple - 2020.mp4 2017-10-27 18:02 71.9 MB
Outsmarting the Smart City - 2020.description 2022-04-21 21:28 569 B
Outsmarting the Smart City - 2020.info.json 2022-04-21 21:28 540.0 KB
Outsmarting the Smart City - 2020.mp4 2021-01-16 05:17 193.8 MB
Over-the-Air - How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars - 2020.description 2022-04-21 21:32 470 B
Over-the-Air - How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars - 2020.info.json 2022-04-21 21:32 611.4 KB
Over-the-Air - How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars - 2020.mp4 2020-02-18 20:12 118.3 MB
Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory - 2020.description 2022-04-21 19:23 513 B
Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory - 2020.info.json 2022-04-21 19:23 45.1 KB
Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory - 2020.mp4 2019-12-11 19:28 124.9 MB
Passive Fingerprinting of HTTP_2 Clients - 2020.description 2022-04-21 23:56 331 B
Passive Fingerprinting of HTTP_2 Clients - 2020.info.json 2022-04-21 23:56 633.4 KB
Passive Fingerprinting of HTTP_2 Clients - 2020.mp4 2018-04-06 12:50 70.4 MB
PASTA - Portable Automotive Security Testbed with Adaptability - 2020.description 2022-04-21 20:49 515 B
PASTA - Portable Automotive Security Testbed with Adaptability - 2020.info.json 2022-04-21 20:49 265.7 KB
PASTA - Portable Automotive Security Testbed with Adaptability - 2020.mp4 2019-12-04 15:08 101.3 MB
Perception Deception - Physical Adversarial Attack Challenges - 2020.description 2022-04-21 21:00 686 B
Perception Deception - Physical Adversarial Attack Challenges - 2020.info.json 2022-04-21 21:00 268.3 KB
Perception Deception - Physical Adversarial Attack Challenges - 2020.mp4 2019-03-05 14:57 186.1 MB
Perfectly Deniable Steganographic Disk Encryption - 2020.description 2022-04-21 20:53 373 B
Perfectly Deniable Steganographic Disk Encryption - 2020.info.json 2022-04-21 20:53 265.3 KB
Perfectly Deniable Steganographic Disk Encryption - 2020.mp4 2019-03-05 14:18 153.2 MB
PeriScope - An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary - 2020.description 2022-04-21 19:51 637 B
PeriScope - An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary - 2020.info.json 2022-04-21 19:51 264.8 KB
PeriScope - An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary - 2020.mp4 2019-12-11 14:21 84.4 MB
Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives - 2020.description 2022-04-21 21:45 515 B
Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives - 2020.info.json 2022-04-21 21:45 622.6 KB
Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives - 2020.mp4 2020-03-26 02:22 292.1 MB
Phishing for Funds - Understanding Business Email Compromise - 2020.description 2022-04-22 01:16 519 B
Phishing for Funds - Understanding Business Email Compromise - 2020.info.json 2022-04-22 01:16 742.2 KB
Phishing for Funds - Understanding Business Email Compromise - 2020.mp4 2021-10-01 19:04 177.8 MB
PicoDMA - DMA Attacks at Your Fingertips - 2020.description 2022-04-21 20:14 548 B
PicoDMA - DMA Attacks at Your Fingertips - 2020.info.json 2022-04-21 20:14 265.9 KB
PicoDMA - DMA Attacks at Your Fingertips - 2020.mp4 2019-11-27 14:56 89.8 MB
Playback - A TLS 1.3 Story - 2020.description 2022-04-21 21:19 549 B
Playback - A TLS 1.3 Story - 2020.info.json 2022-04-21 21:19 519.8 KB
Playback - A TLS 1.3 Story - 2020.mp4 2020-03-15 16:00 75.3 MB
Playing Offense and Defense with Deepfakes - 2020.description 2022-04-21 19:20 459 B
Playing Offense and Defense with Deepfakes - 2020.info.json 2022-04-21 19:20 265.9 KB
Playing Offense and Defense with Deepfakes - 2020.mp4 2019-12-11 16:08 129.7 MB
Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game - 2020.description 2022-04-22 01:53 593 B
Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game - 2020.info.json 2022-04-22 01:53 455.6 KB
Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game - 2020.mp4 2021-08-12 04:33 195.4 MB
Practical Approach to Automate the Discovery & Eradication of Open-Source Software Vulnerabilities - 2020.description 2022-04-22 00:42 651 B
Practical Approach to Automate the Discovery & Eradication of Open-Source Software Vulnerabilities - 2020.info.json 2022-04-22 00:42 268.6 KB
Practical Approach to Automate the Discovery & Eradication of Open-Source Software Vulnerabilities - 2020.mp4 2020-01-08 14:11 121.2 MB
Practical Side-Channel Attacks Against WPA-TKIP - 2020.description 2022-04-21 18:06 882 B
Practical Side-Channel Attacks Against WPA-TKIP - 2020.info.json 2022-04-21 18:06 559.7 KB
Practical Side-Channel Attacks Against WPA-TKIP - 2020.mp4 2020-03-19 17:09 142.0 MB
Practical Web Cache Poisoning - Redefining 'Unexploitable' - 2020.description 2022-04-21 21:07 469 B
Practical Web Cache Poisoning - Redefining 'Unexploitable' - 2020.info.json 2022-04-21 21:07 575.4 KB
Practical Web Cache Poisoning - Redefining 'Unexploitable' - 2020.mp4 2020-03-10 10:14 98.2 MB
Preloading Insecurity In Your Electron - 2020.description 2022-04-21 20:03 467 B
Preloading Insecurity In Your Electron - 2020.info.json 2022-04-21 20:03 268.0 KB
Preloading Insecurity In Your Electron - 2020.mp4 2019-12-05 12:15 103.2 MB
Preventing Authentication Bypass - A Tale of Two Researchers - 2020.description 2022-04-21 18:52 499 B
Preventing Authentication Bypass - A Tale of Two Researchers - 2020.info.json 2022-04-21 18:52 265.3 KB
Preventing Authentication Bypass - A Tale of Two Researchers - 2020.mp4 2019-12-11 17:56 74.5 MB
Prison Break Season 6 - Defeating the Mitigations Adopted by Android OEMs - 2020.description 2022-04-28 16:18 427 B
Prison Break Season 6 - Defeating the Mitigations Adopted by Android OEMs - 2020.info.json 2022-04-28 16:18 585.2 KB
Prison Break Season 6 - Defeating the Mitigations Adopted by Android OEMs - 2020.mp4 2018-08-22 18:23 55.4 MB
Process Injection Techniques - Gotta Catch Them All - 2020.description 2022-04-21 19:27 582 B
Process Injection Techniques - Gotta Catch Them All - 2020.info.json 2022-04-21 19:27 265.7 KB
Process Injection Techniques - Gotta Catch Them All - 2020.mp4 2019-12-11 16:53 104.3 MB
Project Zero - Five Years of 'Make 0Day Hard' - 2020.description 2022-04-21 18:59 427 B
Project Zero - Five Years of 'Make 0Day Hard' - 2020.info.json 2022-04-21 18:59 265.8 KB
Project Zero - Five Years of 'Make 0Day Hard' - 2020.mp4 2019-12-11 16:13 99.2 MB
Protecting Pentests - Recommendations for Performing More Secure Tests - 2020.description 2022-04-22 00:51 456 B
Protecting Pentests - Recommendations for Performing More Secure Tests - 2020.info.json 2022-04-22 00:51 472.2 KB
Protecting Pentests - Recommendations for Performing More Secure Tests - 2020.mp4 2017-10-31 13:25 39.2 MB
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks - 2020.description 2022-04-21 21:08 401 B
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks - 2020.info.json 2022-04-21 21:08 264.8 KB
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks - 2020.mp4 2019-06-18 14:10 66.3 MB
Protecting Visual Assets - Digital Image Counter-Forensics - 2020.description 2022-04-22 00:59 387 B
Protecting Visual Assets - Digital Image Counter-Forensics - 2020.info.json 2022-04-22 00:59 436.6 KB
Protecting Visual Assets - Digital Image Counter-Forensics - 2020.mp4 2021-07-10 15:52 187.4 MB
Qualitative Look at Autonomous Peer Communication's Impact on Organizational Phishing Detection - 2020.description 2022-04-21 23:02 669 B
Qualitative Look at Autonomous Peer Communication's Impact on Organizational Phishing Detection - 2020.info.json 2022-04-21 23:02 443.9 KB
Qualitative Look at Autonomous Peer Communication's Impact on Organizational Phishing Detection - 2020.mp4 2021-01-31 05:20 71.7 MB
Quantifying Risk in Consumer Software at Scale - Consumer Reports' Digital Standard - 2020.description 2022-04-22 00:40 559 B
Quantifying Risk in Consumer Software at Scale - Consumer Reports' Digital Standard - 2020.info.json 2022-04-22 00:40 528.9 KB
Quantifying Risk in Consumer Software at Scale - Consumer Reports' Digital Standard - 2020.mp4 2021-07-07 16:52 209.1 MB
Randomization Can't Stop BPF JIT Spray - 2020.description 2022-04-22 01:14 512 B
Randomization Can't Stop BPF JIT Spray - 2020.info.json 2022-04-22 01:14 432.3 KB
Randomization Can't Stop BPF JIT Spray - 2020.mp4 2021-09-13 14:18 178.5 MB
RBN Reloaded - Amplifying Signals from the Underground - 2020.description 2022-04-22 00:03 676 B
RBN Reloaded - Amplifying Signals from the Underground - 2020.info.json 2022-04-22 00:03 262.0 KB
RBN Reloaded - Amplifying Signals from the Underground - 2020.mp4 2018-02-20 16:19 53.6 MB
Real Eyes, Realize, Real Lies - Beating Deception Technologies - 2020.description 2022-04-28 15:12 523 B
Real Eyes, Realize, Real Lies - Beating Deception Technologies - 2020.info.json 2022-04-28 15:12 413.2 KB
Real Eyes, Realize, Real Lies - Beating Deception Technologies - 2020.mp4 2020-02-13 18:53 69.6 MB
Real Humans Simulated Attacks - Usability Testing with Attack Scenarios - 2020.description 2022-04-22 00:50 488 B
Real Humans Simulated Attacks - Usability Testing with Attack Scenarios - 2020.info.json 2022-04-22 00:50 262.8 KB
Real Humans Simulated Attacks - Usability Testing with Attack Scenarios - 2020.mp4 2017-10-27 18:31 115.0 MB
Real-Time Detection of Attacks Leveraging Domain Administrator Privilege - 2020.description 2022-04-21 20:52 514 B
Real-Time Detection of Attacks Leveraging Domain Administrator Privilege - 2020.info.json 2022-04-21 20:52 261.3 KB
Real-Time Detection of Attacks Leveraging Domain Administrator Privilege - 2020.mp4 2019-03-01 18:18 79.9 MB
Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project - 2020.description 2022-04-22 01:18 482 B
Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project - 2020.info.json 2022-04-22 01:18 599.1 KB
Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project - 2020.mp4 2020-03-16 02:43 112.7 MB
Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots - 2020.description 2022-04-21 22:10 535 B
Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots - 2020.info.json 2022-04-21 22:10 600.6 KB
Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots - 2020.mp4 2020-02-17 08:29 197.0 MB
Remotely Attacking System Firmware - 2020.description 2022-04-21 22:43 511 B
Remotely Attacking System Firmware - 2020.info.json 2022-04-21 22:43 602.3 KB
Remotely Attacking System Firmware - 2020.mp4 2021-02-03 22:32 227.3 MB
Responding to a Cyber Attack with Missiles - 2020.description 2022-04-21 19:46 487 B
Responding to a Cyber Attack with Missiles - 2020.info.json 2022-04-21 19:46 264.4 KB
Responding to a Cyber Attack with Missiles - 2020.mp4 2019-12-02 18:42 184.0 MB
Return of Bleichenbacher's Oracle Threat (ROBOT) - 2020.description 2022-04-21 21:12 491 B
Return of Bleichenbacher's Oracle Threat (ROBOT) - 2020.info.json 2022-04-21 21:12 498.4 KB
Return of Bleichenbacher's Oracle Threat (ROBOT) - 2020.mp4 2021-02-03 12:43 100.1 MB
Return of the Insecure Brazilian Voting Machines - 2020.description 2022-04-21 20:55 491 B
Return of the Insecure Brazilian Voting Machines - 2020.info.json 2022-04-21 20:55 266.3 KB
Return of the Insecure Brazilian Voting Machines - 2020.mp4 2019-04-22 13:07 103.2 MB
return-to-csu - A New Method to Bypass 64-bit Linux ASLR - 2020.description 2022-04-21 23:19 509 B
return-to-csu - A New Method to Bypass 64-bit Linux ASLR - 2020.info.json 2022-04-21 23:19 677.3 KB
return-to-csu - A New Method to Bypass 64-bit Linux ASLR - 2020.mp4 2018-08-22 18:29 87.2 MB
Reverse Engineering and Exploiting Builds in the Cloud - 2020.description 2022-04-28 11:13 719 B
Reverse Engineering and Exploiting Builds in the Cloud - 2020.info.json 2022-04-28 11:13 661.4 KB
Reverse Engineering and Exploiting Builds in the Cloud - 2020.mp4 2020-03-17 17:40 127.0 MB
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More - 2020.description 2022-04-21 19:45 498 B
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More - 2020.info.json 2022-04-21 19:45 262.9 KB
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More - 2020.mp4 2019-12-03 15:49 45.8 MB
Reversing a Japanese Wireless SD Card - From Zero to Code Execution - 2020.description 2022-04-21 22:48 522 B
Reversing a Japanese Wireless SD Card - From Zero to Code Execution - 2020.info.json 2022-04-21 22:48 600.2 KB
Reversing a Japanese Wireless SD Card - From Zero to Code Execution - 2020.mp4 2020-03-16 07:17 131.7 MB
Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox - 2020.description 2022-04-21 23:48 602 B
Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox - 2020.info.json 2022-04-21 23:48 647.5 KB
Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox - 2020.mp4 2018-04-06 13:17 138.2 MB
Rooting EVERY Android - From Extension to Exploitation - 2020.description 2022-04-22 01:41 517 B
Rooting EVERY Android - From Extension to Exploitation - 2020.info.json 2022-04-22 01:41 532.2 KB
Rooting EVERY Android - From Extension to Exploitation - 2020.mp4 2021-07-03 10:25 207.5 MB
Rough and Ready - Frameworks to Measure Persistent Engagement and Deterrence - 2020.description 2022-04-21 18:53 373 B
Rough and Ready - Frameworks to Measure Persistent Engagement and Deterrence - 2020.info.json 2022-04-21 18:53 265.6 KB
Rough and Ready - Frameworks to Measure Persistent Engagement and Deterrence - 2020.mp4 2019-12-11 15:58 101.4 MB
Running a Security Operations Center – Challenges, Solutions and Key Learnings - 2020.description 2022-04-21 22:38 623 B
Running a Security Operations Center – Challenges, Solutions and Key Learnings - 2020.info.json 2022-04-21 22:38 265.7 KB
Running a Security Operations Center – Challenges, Solutions and Key Learnings - 2020.mp4 2018-09-17 16:49 121.0 MB
RustZone - Writing Trusted Applications in Rust - 2020.description 2022-04-21 23:36 449 B
RustZone - Writing Trusted Applications in Rust - 2020.info.json 2022-04-21 23:36 632.0 KB
RustZone - Writing Trusted Applications in Rust - 2020.mp4 2019-03-04 19:01 104.6 MB
rVMI - A New Paradigm for Full System Analysis - 2020.description 2022-04-22 00:40 426 B
rVMI - A New Paradigm for Full System Analysis - 2020.info.json 2022-04-22 00:40 581.9 KB
rVMI - A New Paradigm for Full System Analysis - 2020.mp4 2017-10-31 13:47 92.0 MB
Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers - 2020.description 2022-04-21 23:04 511 B
Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers - 2020.info.json 2022-04-21 23:04 589.9 KB
Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers - 2020.mp4 2020-02-14 14:32 147.6 MB
SDL at Scale - Growing Security Champions - 2020.description 2022-04-21 20:46 643 B
SDL at Scale - Growing Security Champions - 2020.info.json 2022-04-21 20:46 266.6 KB
SDL at Scale - Growing Security Champions - 2020.mp4 2019-03-01 18:01 146.9 MB
SDL the Wont Break the Bank - 2020.description 2022-04-28 15:06 460 B
SDL the Wont Break the Bank - 2020.info.json 2022-04-28 15:06 625.9 KB
SDL the Wont Break the Bank - 2020.mp4 2020-02-11 23:22 245.1 MB
Secure Boot Under Attack - Simulation to Enhance Fault Attacks & Defenses - 2020.description 2022-04-21 20:22 656 B
Secure Boot Under Attack - Simulation to Enhance Fault Attacks & Defenses - 2020.info.json 2022-04-21 20:22 262.9 KB
Secure Boot Under Attack - Simulation to Enhance Fault Attacks & Defenses - 2020.mp4 2019-03-05 14:55 120.7 MB
Securely Implementing Network Protocols - Detecting and Preventing Logical Flaws - 2020.description 2022-04-22 01:06 332 B
Securely Implementing Network Protocols - Detecting and Preventing Logical Flaws - 2020.info.json 2022-04-22 01:06 792.6 KB
Securely Implementing Network Protocols - Detecting and Preventing Logical Flaws - 2020.mp4 2017-10-18 14:45 137.0 MB
Securing Apps in the Open-By-Default Cloud - 2020.description 2022-04-21 19:36 537 B
Securing Apps in the Open-By-Default Cloud - 2020.info.json 2022-04-21 19:36 265.4 KB
Securing Apps in the Open-By-Default Cloud - 2020.mp4 2019-12-11 18:46 83.7 MB
Securing the System - A Deep Dive into Reversing Android Pre-Installed Apps - 2020.description 2022-04-21 19:32 748 B
Securing the System - A Deep Dive into Reversing Android Pre-Installed Apps - 2020.info.json 2022-04-21 19:32 266.0 KB
Securing the System - A Deep Dive into Reversing Android Pre-Installed Apps - 2020.mp4 2019-12-11 18:10 126.2 MB
Securing Your In-Ear-Fitness Coach - Challenges in Hardening Next Generation Wearables - 2020.description 2022-04-28 16:11 583 B
Securing Your In-Ear-Fitness Coach - Challenges in Hardening Next Generation Wearables - 2020.info.json 2022-04-28 16:11 681.6 KB
Securing Your In-Ear-Fitness Coach - Challenges in Hardening Next Generation Wearables - 2020.mp4 2018-08-22 18:28 132.6 MB
Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds - 2020.description 2022-04-21 18:39 902 B
Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds - 2020.info.json 2022-04-21 18:39 357.0 KB
Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds - 2020.mp4 2020-03-17 16:54 167.6 MB
See Like a Bat - Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs - 2020.description 2022-04-21 19:55 566 B
See Like a Bat - Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs - 2020.info.json 2022-04-21 19:55 262.9 KB
See Like a Bat - Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs - 2020.mp4 2019-12-05 12:32 46.0 MB
Self-Verifying Authentication – A Framework For Safer Integrations of Single-Sign-On Services - 2020.description 2022-04-21 23:54 681 B
Self-Verifying Authentication – A Framework For Safer Integrations of Single-Sign-On Services - 2020.info.json 2022-04-21 23:54 699.2 KB
Self-Verifying Authentication – A Framework For Safer Integrations of Single-Sign-On Services - 2020.mp4 2018-04-06 12:57 113.8 MB
Selling 0-Days to Governments and Offensive Security Companies - 2020.description 2022-04-21 19:58 382 B
Selling 0-Days to Governments and Offensive Security Companies - 2020.info.json 2022-04-21 19:58 264.4 KB
Selling 0-Days to Governments and Offensive Security Companies - 2020.mp4 2019-12-11 16:18 79.3 MB
Sensor and Process Fingerprinting in Industrial Control Systems - 2020.description 2022-04-21 19:51 642 B
Sensor and Process Fingerprinting in Industrial Control Systems - 2020.info.json 2022-04-21 19:51 266.3 KB
Sensor and Process Fingerprinting in Industrial Control Systems - 2020.mp4 2019-12-02 13:31 133.8 MB
Shadow-Box v2 - The Practical and Omnipotent Sandbox for ARM - 2020.description 2022-04-21 23:20 619 B
Shadow-Box v2 - The Practical and Omnipotent Sandbox for ARM - 2020.info.json 2022-04-21 23:20 568.3 KB
Shadow-Box v2 - The Practical and Omnipotent Sandbox for ARM - 2020.mp4 2018-08-22 18:24 82.6 MB
Shifting Knowledge Left - Keeping up with Modern Application Security - 2020.description 2022-04-21 18:52 589 B
Shifting Knowledge Left - Keeping up with Modern Application Security - 2020.info.json 2022-04-21 18:52 266.1 KB
Shifting Knowledge Left - Keeping up with Modern Application Security - 2020.mp4 2019-12-11 19:36 114.1 MB
Side Channel Attacks in 4G and 5G Cellular Networks - 2020.description 2022-04-21 18:33 709 B
Side Channel Attacks in 4G and 5G Cellular Networks - 2020.info.json 2022-04-21 18:33 269.1 KB
Side Channel Attacks in 4G and 5G Cellular Networks - 2020.mp4 2020-03-18 16:02 65.0 MB
Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0 - 2020.description 2022-04-22 01:28 499 B
Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0 - 2020.info.json 2022-04-22 01:28 210.5 KB
Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0 - 2020.mp4 2021-07-01 09:33 142.5 MB
Simple Spyware - Androids Invisible Foreground Services and How to (Ab)use Them - 2020.description 2022-04-21 17:48 858 B
Simple Spyware - Androids Invisible Foreground Services and How to (Ab)use Them - 2020.info.json 2022-04-21 17:48 489.8 KB
Simple Spyware - Androids Invisible Foreground Services and How to (Ab)use Them - 2020.mp4 2020-03-20 12:30 107.2 MB
SirenJack - Cracking a 'Secure' Emergency Warning Siren System - 2020.description 2022-04-21 21:35 373 B
SirenJack - Cracking a 'Secure' Emergency Warning Siren System - 2020.info.json 2022-04-21 21:35 623.4 KB
SirenJack - Cracking a 'Secure' Emergency Warning Siren System - 2020.mp4 2020-03-31 08:45 228.2 MB
Skype & Type - Keystroke Leakage over VoIP - 2020.description 2022-04-28 16:31 557 B
Skype & Type - Keystroke Leakage over VoIP - 2020.info.json 2022-04-28 16:31 445.3 KB
Skype & Type - Keystroke Leakage over VoIP - 2020.mp4 2021-06-09 15:53 131.7 MB
Snooping on Cellular Gateways and Their Critical Role in ICS - 2020.description 2022-04-29 23:49 561 B
Snooping on Cellular Gateways and Their Critical Role in ICS - 2020.info.json 2022-04-29 23:49 583.7 KB
Snooping on Cellular Gateways and Their Critical Role in ICS - 2020.mp4 2020-02-19 06:56 223.6 MB
So I became a Domain Controller - 2020.description 2022-04-21 21:18 502 B
So I became a Domain Controller - 2020.info.json 2022-04-21 21:18 561.3 KB
So I became a Domain Controller - 2020.mp4 2020-03-28 23:36 278.6 MB
So You Want to Market Your Security Product... - 2020.description 2022-04-22 00:47 492 B
So You Want to Market Your Security Product... - 2020.info.json 2022-04-22 00:47 670.0 KB
So You Want to Market Your Security Product... - 2020.mp4 2017-10-31 12:53 90.3 MB
Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization - 2020.description 2022-04-22 00:59 410 B
Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization - 2020.info.json 2022-04-22 00:59 538.0 KB
Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization - 2020.mp4 2017-10-27 19:59 107.7 MB
Squeezing a Key through a Carry Bit - 2020.description 2022-04-28 15:12 417 B
Squeezing a Key through a Carry Bit - 2020.info.json 2022-04-28 15:12 585.8 KB
Squeezing a Key through a Carry Bit - 2020.mp4 2020-04-05 23:15 113.0 MB
SSO Wars - The Token Menace - 2020.description 2022-04-21 20:17 669 B
SSO Wars - The Token Menace - 2020.info.json 2022-04-21 20:17 264.5 KB
SSO Wars - The Token Menace - 2020.mp4 2019-11-27 14:10 91.5 MB
Stealth Mango and the Prevalence of Mobile Surveillanceware - 2020.description 2022-04-21 22:34 581 B
Stealth Mango and the Prevalence of Mobile Surveillanceware - 2020.info.json 2022-04-21 22:34 593.8 KB
Stealth Mango and the Prevalence of Mobile Surveillanceware - 2020.mp4 2020-02-19 12:50 225.2 MB
Stop that Release, There's a Vulnerability! - 2020.description 2022-04-21 21:42 487 B
Stop that Release, There's a Vulnerability! - 2020.info.json 2022-04-21 21:43 438.0 KB
Stop that Release, There's a Vulnerability! - 2020.mp4 2020-02-18 18:40 148.2 MB
Straight Outta VMware - Modern Exploitation of the SVGA Device for Guest-to-Host Escapes - 2020.description 2022-04-21 21:04 512 B
Straight Outta VMware - Modern Exploitation of the SVGA Device for Guest-to-Host Escapes - 2020.info.json 2022-04-21 21:04 262.5 KB
Straight Outta VMware - Modern Exploitation of the SVGA Device for Guest-to-Host Escapes - 2020.mp4 2019-03-05 13:29 142.9 MB
Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops - 2020.description 2022-04-28 15:24 386 B
Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops - 2020.info.json 2022-04-28 15:24 262.7 KB
Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops - 2020.mp4 2022-01-07 17:53 225.3 MB
Stress Testing Democracy Election Integrity During A Global Pandemic - 2020.description 2022-04-21 17:39 653 B
Stress Testing Democracy Election Integrity During A Global Pandemic - 2020.info.json 2022-04-21 17:39 267.0 KB
Stress Testing Democracy Election Integrity During A Global Pandemic - 2020.mp4 2020-11-05 13:00 276.5 MB
Stumping the Mobile Chipset - 2020.description 2022-04-22 01:52 456 B
Stumping the Mobile Chipset - 2020.info.json 2022-04-22 01:52 520.4 KB
Stumping the Mobile Chipset - 2020.mp4 2021-06-13 23:49 311.9 MB
Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology - 2020.description 2022-04-21 22:16 607 B
Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology - 2020.info.json 2022-04-21 22:16 263.9 KB
Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology - 2020.mp4 2021-01-08 23:04 171.1 MB
Tackling Privilege Escalation with Offense and Defense - 2020.description 2022-04-21 18:09 521 B
Tackling Privilege Escalation with Offense and Defense - 2020.info.json 2022-04-21 18:09 669.4 KB
Tackling Privilege Escalation with Offense and Defense - 2020.mp4 2020-03-18 18:52 169.9 MB
Taking DMA Attacks to the Next Level - 2020.description 2022-04-22 00:54 852 B
Taking DMA Attacks to the Next Level - 2020.info.json 2022-04-22 00:54 549.7 KB
Taking DMA Attacks to the Next Level - 2020.mp4 2017-10-27 19:14 70.1 MB
Taking Over the World Through MQTT - Aftermath - 2020.description 2022-04-22 00:44 539 B
Taking Over the World Through MQTT - Aftermath - 2020.info.json 2022-04-22 00:44 356.0 KB
Taking Over the World Through MQTT - Aftermath - 2020.mp4 2017-10-31 12:56 88.6 MB
Tales from the NOC - Going Public in Asia - 2020.description 2022-04-21 23:33 620 B
Tales from the NOC - Going Public in Asia - 2020.info.json 2022-04-21 23:33 631.0 KB
Tales from the NOC - Going Public in Asia - 2020.mp4 2018-08-22 18:25 99.8 MB
Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking - 2020.description 2022-04-22 01:56 751 B
Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking - 2020.info.json 2022-04-22 01:56 700.9 KB
Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking - 2020.mp4 2021-07-02 22:10 335.2 MB
Testing Your Organization's Social Media Awareness - 2020.description 2022-04-21 19:38 499 B
Testing Your Organization's Social Media Awareness - 2020.info.json 2022-04-21 19:38 264.6 KB
Testing Your Organization's Social Media Awareness - 2020.mp4 2019-12-11 14:40 47.1 MB
The Active Directory Botnet - 2020.description 2022-04-22 00:44 600 B
The Active Directory Botnet - 2020.info.json 2022-04-22 00:44 262.4 KB
The Active Directory Botnet - 2020.mp4 2020-01-08 14:32 94.0 MB
The Air-Gap Jumpers - 2020.description 2022-04-21 22:21 488 B
The Air-Gap Jumpers - 2020.info.json 2022-04-21 22:21 442.6 KB
The Air-Gap Jumpers - 2020.mp4 2020-03-24 16:50 108.5 MB
The Apple of Your EFI - An Updated Study of EFI Security - 2020.description 2022-04-21 23:50 742 B
The Apple of Your EFI - An Updated Study of EFI Security - 2020.info.json 2022-04-21 23:50 725.5 KB
The Apple of Your EFI - An Updated Study of EFI Security - 2020.mp4 2018-04-06 12:49 86.4 MB
The Art of Securing 100 Products - 2020.description 2022-04-22 00:51 514 B
The Art of Securing 100 Products - 2020.info.json 2022-04-22 00:51 624.6 KB
The Art of Securing 100 Products - 2020.mp4 2017-10-31 12:54 111.4 MB
The Avalanche Takedown - Landslide for Law Enforcement - 2020.description 2022-04-22 00:47 540 B
The Avalanche Takedown - Landslide for Law Enforcement - 2020.info.json 2022-04-22 00:47 585.0 KB
The Avalanche Takedown - Landslide for Law Enforcement - 2020.mp4 2021-11-13 06:31 266.5 MB
The Cost of Learning from the Best - How Prior Knowledge Weakens the Security of Deep Neural Networks - 2020.description 2022-04-21 19:47 551 B
The Cost of Learning from the Best - How Prior Knowledge Weakens the Security of Deep Neural Networks - 2020.info.json 2022-04-21 19:47 264.9 KB
The Cost of Learning from the Best - How Prior Knowledge Weakens the Security of Deep Neural Networks - 2020.mp4 2019-12-05 12:37 54.9 MB
The Cyber Shell Game – War, Information Warfare, and the Darkening Web - 2020.description 2022-04-21 19:50 621 B
The Cyber Shell Game – War, Information Warfare, and the Darkening Web - 2020.info.json 2022-04-21 19:50 264.6 KB
The Cyber Shell Game – War, Information Warfare, and the Darkening Web - 2020.mp4 2019-12-02 19:05 70.5 MB
The Devils in the Dependency Data Driven Software Composition Analysis - 2020.description 2022-04-21 17:40 706 B
The Devils in the Dependency Data Driven Software Composition Analysis - 2020.info.json 2022-04-21 17:40 267.4 KB
The Devils in the Dependency Data Driven Software Composition Analysis - 2020.mp4 2020-11-13 17:30 67.5 MB
The Discovery of a Government Malware and an Unexpected Spy Scandal - 2020.description 2022-04-21 19:33 626 B
The Discovery of a Government Malware and an Unexpected Spy Scandal - 2020.info.json 2022-04-21 19:33 265.7 KB
The Discovery of a Government Malware and an Unexpected Spy Scandal - 2020.mp4 2019-12-11 18:37 98.3 MB
The Enemy Within - Modern Supply Chain Attacks - 2020.description 2022-04-21 18:56 549 B
The Enemy Within - Modern Supply Chain Attacks - 2020.info.json 2022-04-21 18:56 266.0 KB
The Enemy Within - Modern Supply Chain Attacks - 2020.mp4 2019-12-11 15:50 122.4 MB
The Excellent Adventure of XDR – Where is it Going - 2020.description 2022-04-21 17:41 223 B
The Excellent Adventure of XDR – Where is it Going - 2020.info.json 2022-04-21 17:41 264.0 KB
The Excellent Adventure of XDR – Where is it Going - 2020.mp4 2020-10-21 15:04 90.0 MB
The Finest Penetration Testing Framework for Software-Defined Networks - 2020.description 2022-04-21 21:20 371 B
The Finest Penetration Testing Framework for Software-Defined Networks - 2020.info.json 2022-04-21 21:20 581.1 KB
The Finest Penetration Testing Framework for Software-Defined Networks - 2020.mp4 2020-04-08 07:55 181.2 MB
The Future of ApplePwn - How to Save Your Money - 2020.description 2022-04-22 00:35 352 B
The Future of ApplePwn - How to Save Your Money - 2020.info.json 2022-04-22 00:35 415.5 KB
The Future of ApplePwn - How to Save Your Money - 2020.mp4 2017-10-31 13:38 50.4 MB
The Future of ATO - 2020.description 2022-04-21 19:03 492 B
The Future of ATO - 2020.info.json 2022-04-21 19:03 265.9 KB
The Future of ATO - 2020.mp4 2019-12-11 18:55 91.3 MB
The Last Line of Defense - Understanding and Attacking Apple File System on iOS - 2020.description 2022-04-21 21:02 608 B
The Last Line of Defense - Understanding and Attacking Apple File System on iOS - 2020.info.json 2022-04-21 21:02 261.4 KB
The Last Line of Defense - Understanding and Attacking Apple File System on iOS - 2020.mp4 2019-03-04 17:48 64.4 MB
The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data - 2020.description 2022-04-22 00:45 501 B
The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data - 2020.info.json 2022-04-22 00:45 592.9 KB
The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data - 2020.mp4 2021-07-07 07:08 288.4 MB
The Most Secure Browser Pwning Chrome from 2016 to 2019 - 2020.description 2022-04-21 20:20 593 B
The Most Secure Browser Pwning Chrome from 2016 to 2019 - 2020.info.json 2022-04-21 20:20 265.6 KB
The Most Secure Browser Pwning Chrome from 2016 to 2019 - 2020.mp4 2019-11-27 14:42 74.7 MB
The Mummy 2018 – Microsoft Accidentally Summons Back Ugly Attacks from the Past - 2020.description 2022-04-21 20:47 437 B
The Mummy 2018 – Microsoft Accidentally Summons Back Ugly Attacks from the Past - 2020.info.json 2022-04-21 20:47 261.1 KB
The Mummy 2018 – Microsoft Accidentally Summons Back Ugly Attacks from the Past - 2020.mp4 2019-03-06 12:41 49.6 MB
The Origin of Array [@@species] - How Standards Drive Bugs in Script Engines - 2020.description 2022-04-22 00:36 573 B
The Origin of Array [@@species] - How Standards Drive Bugs in Script Engines - 2020.info.json 2022-04-22 00:36 559.0 KB
The Origin of Array [@@species] - How Standards Drive Bugs in Script Engines - 2020.mp4 2021-11-11 21:37 233.3 MB
The Power of Data-Oriented Attacks - 2020.description 2022-04-22 01:00 828 B
The Power of Data-Oriented Attacks - 2020.info.json 2022-04-22 01:00 780.7 KB
The Power of Data-Oriented Attacks - 2020.mp4 2020-03-01 20:40 188.4 MB
The Problems and Promise of WebAssembly - 2020.description 2022-04-21 22:34 374 B
The Problems and Promise of WebAssembly - 2020.info.json 2022-04-21 22:34 425.9 KB
The Problems and Promise of WebAssembly - 2020.mp4 2020-10-30 09:30 57.8 MB
The Science of Hiring and Retaining Female Cybersecurity Engineers - 2020.description 2022-04-21 21:37 459 B
The Science of Hiring and Retaining Female Cybersecurity Engineers - 2020.info.json 2022-04-21 21:37 615.3 KB
The Science of Hiring and Retaining Female Cybersecurity Engineers - 2020.mp4 2020-02-23 01:53 337.2 MB
The Shadow Brokers - Cyber Fear Game-Changers - 2020.description 2022-04-22 00:06 571 B
The Shadow Brokers - Cyber Fear Game-Changers - 2020.info.json 2022-04-22 00:06 465.6 KB
The Shadow Brokers - Cyber Fear Game-Changers - 2020.mp4 2017-10-31 13:36 57.5 MB
The UEFI Firmware Rootkits - Myths and Reality - 2020.description 2022-04-22 01:05 821 B
The UEFI Firmware Rootkits - Myths and Reality - 2020.info.json 2022-04-22 01:05 652.0 KB
The UEFI Firmware Rootkits - Myths and Reality - 2020.mp4 2021-06-28 08:45 436.6 MB
The Unbearable Lightness of BMC's - 2020.description 2022-04-21 22:40 357 B
The Unbearable Lightness of BMC's - 2020.info.json 2022-04-21 22:40 626.4 KB
The Unbearable Lightness of BMC's - 2020.mp4 2020-04-02 23:47 213.5 MB
The Undeniable Truth - 2020.description 2022-04-21 20:55 559 B
The Undeniable Truth - 2020.info.json 2022-04-21 20:55 264.9 KB
The Undeniable Truth - 2020.mp4 2019-03-04 15:53 83.8 MB
There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently - 2020.description 2022-04-21 22:42 536 B
There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently - 2020.info.json 2022-04-21 22:42 611.6 KB
There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently - 2020.mp4 2020-02-21 11:24 103.0 MB
Thermanator and the Thermal Residue Attack - 2020.description 2022-04-21 20:46 550 B
Thermanator and the Thermal Residue Attack - 2020.info.json 2022-04-21 20:46 261.2 KB
Thermanator and the Thermal Residue Attack - 2020.mp4 2019-03-06 12:45 78.3 MB
They're Coming for Your Tools - Exploiting Design Flaws for Active Intrusion Prevention - 2020.description 2022-04-22 00:51 544 B
They're Coming for Your Tools - Exploiting Design Flaws for Active Intrusion Prevention - 2020.info.json 2022-04-22 00:51 261.2 KB
They're Coming for Your Tools - Exploiting Design Flaws for Active Intrusion Prevention - 2020.mp4 2017-10-27 18:15 35.8 MB
Thinking Outside the JIT Compiler - 2020.description 2022-04-21 18:05 711 B
Thinking Outside the JIT Compiler - 2020.info.json 2022-04-21 18:05 459.3 KB
Thinking Outside the JIT Compiler - 2020.mp4 2020-03-19 17:33 46.4 MB
Those Don't Matter! Effective Prioritization Through Exploit Prediction - 2020.description 2022-04-21 22:52 562 B
Those Don't Matter! Effective Prioritization Through Exploit Prediction - 2020.info.json 2022-04-21 22:52 267.8 KB
Those Don't Matter! Effective Prioritization Through Exploit Prediction - 2020.mp4 2018-09-17 17:37 113.9 MB
Threat Modeling in 2018 - Attacks, Impacts and Other Updates - 2020.description 2022-04-21 22:47 380 B
Threat Modeling in 2018 - Attacks, Impacts and Other Updates - 2020.info.json 2022-04-21 22:47 262.3 KB
Threat Modeling in 2018 - Attacks, Impacts and Other Updates - 2020.mp4 2018-11-13 18:43 69.0 MB
TLBleed - When Protecting Your CPU Caches is Not Enough - 2020.description 2022-04-21 21:10 362 B
TLBleed - When Protecting Your CPU Caches is Not Enough - 2020.info.json 2022-04-21 21:10 632.3 KB
TLBleed - When Protecting Your CPU Caches is Not Enough - 2020.mp4 2020-04-07 09:28 157.8 MB
Towards a Policy-Agnostic Control-Flow Integrity Implementation - 2020.description 2022-04-22 01:43 531 B
Towards a Policy-Agnostic Control-Flow Integrity Implementation - 2020.info.json 2022-04-22 01:43 627.9 KB
Towards a Policy-Agnostic Control-Flow Integrity Implementation - 2020.mp4 2020-02-21 13:37 151.8 MB
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime - 2020.description 2022-04-21 18:53 472 B
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime - 2020.info.json 2022-04-21 18:53 265.1 KB
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime - 2020.mp4 2019-12-11 18:05 59.5 MB
Transparency in the Software Supply Chain - Making SBOM a Reality - 2020.description 2022-04-21 19:58 518 B
Transparency in the Software Supply Chain - Making SBOM a Reality - 2020.info.json 2022-04-21 19:58 263.2 KB
Transparency in the Software Supply Chain - Making SBOM a Reality - 2020.mp4 2019-12-03 16:14 43.9 MB
Trust in Apple's Secret Garden - Exploring & Reversing Apple's Continuity Protocol - 2020.description 2022-04-21 18:02 605 B
Trust in Apple's Secret Garden - Exploring & Reversing Apple's Continuity Protocol - 2020.info.json 2022-04-21 18:02 604.2 KB
Trust in Apple's Secret Garden - Exploring & Reversing Apple's Continuity Protocol - 2020.mp4 2020-03-19 17:51 120.5 MB
UbootKit - A Worm Attack for the Bootloader of IoT Devices - 2020.description 2022-04-21 23:22 456 B
UbootKit - A Worm Attack for the Bootloader of IoT Devices - 2020.info.json 2022-04-21 23:22 667.4 KB
UbootKit - A Worm Attack for the Bootloader of IoT Devices - 2020.mp4 2018-08-22 18:23 70.4 MB
Understanding and Exploiting Implanted Medical Devices - 2020.description 2022-04-21 21:05 553 B
Understanding and Exploiting Implanted Medical Devices - 2020.info.json 2022-04-21 21:05 611.2 KB
Understanding and Exploiting Implanted Medical Devices - 2020.mp4 2020-03-27 19:09 186.6 MB
Understanding the IoT Threat Landscape - 2020.description 2022-04-21 18:32 568 B
Understanding the IoT Threat Landscape - 2020.info.json 2022-04-21 18:32 514.9 KB
Understanding the IoT Threat Landscape - 2020.mp4 2020-03-18 16:06 151.0 MB
Unleashing the Power of My 20+ Years Old Car - 2020.description 2022-04-21 18:32 480 B
Unleashing the Power of My 20+ Years Old Car - 2020.info.json 2022-04-21 18:32 263.9 KB
Unleashing the Power of My 20+ Years Old Car - 2020.mp4 2020-03-18 19:15 90.2 MB
Unpacking the Packed Unpacker - Reverse Engineering an Android Anti-Analysis Native Library - 2020.description 2022-04-21 21:08 307 B
Unpacking the Packed Unpacker - Reverse Engineering an Android Anti-Analysis Native Library - 2020.info.json 2022-04-21 21:08 545.3 KB
Unpacking the Packed Unpacker - Reverse Engineering an Android Anti-Analysis Native Library - 2020.mp4 2020-03-28 01:22 135.8 MB
Unveiling the Underground World of Anti-Cheats - 2020.description 2022-04-21 18:46 462 B
Unveiling the Underground World of Anti-Cheats - 2020.info.json 2022-04-21 18:46 265.1 KB
Unveiling the Underground World of Anti-Cheats - 2020.mp4 2019-12-19 11:13 137.4 MB
Use-After-Use-After-Free - Exploit UAF by Generating Your Own - 2020.description 2022-04-22 01:54 501 B
Use-After-Use-After-Free - Exploit UAF by Generating Your Own - 2020.info.json 2022-04-22 01:54 517.8 KB
Use-After-Use-After-Free - Exploit UAF by Generating Your Own - 2020.mp4 2021-06-18 22:10 192.1 MB
Video Killed the Text Star - OSINT Approach - 2020.description 2022-04-21 20:58 648 B
Video Killed the Text Star - OSINT Approach - 2020.info.json 2022-04-21 20:58 262.1 KB
Video Killed the Text Star - OSINT Approach - 2020.mp4 2019-03-04 17:07 168.7 MB
We Went to Iowa and All We Got were These Felony Arrest Records - 2020.description 2022-04-21 17:40 448 B
We Went to Iowa and All We Got were These Felony Arrest Records - 2020.info.json 2022-04-21 17:40 265.0 KB
We Went to Iowa and All We Got were These Felony Arrest Records - 2020.mp4 2020-11-13 17:11 172.2 MB
WebAssembly - A New World of Native Exploits on the Browser - 2020.description 2022-04-21 21:22 487 B
WebAssembly - A New World of Native Exploits on the Browser - 2020.info.json 2022-04-21 21:22 583.8 KB
WebAssembly - A New World of Native Exploits on the Browser - 2020.mp4 2020-03-23 21:16 252.3 MB
WebAuthn 101 - Demystifying WebAuthn - 2020.description 2022-04-21 19:23 460 B
WebAuthn 101 - Demystifying WebAuthn - 2020.info.json 2022-04-21 19:23 264.6 KB
WebAuthn 101 - Demystifying WebAuthn - 2020.mp4 2019-12-11 15:44 64.9 MB
Webcast - A Surprise Trip to Zero-Trust Land - 2020.description 2022-04-21 17:45 402 B
Webcast - A Surprise Trip to Zero-Trust Land - 2020.info.json 2022-04-21 17:45 263.1 KB
Webcast - A Surprise Trip to Zero-Trust Land - 2020.mp4 2020-06-19 13:57 104.1 MB
Welcome & Introduction to Black Hat Asia 2017 - 2020.description 2022-04-22 01:20 12 B
Welcome & Introduction to Black Hat Asia 2017 - 2020.info.json 2022-04-22 01:20 427.5 KB
Welcome & Introduction to Black Hat Asia 2017 - 2020.mp4 2018-03-03 09:15 197.2 MB
What the Fuzz - 2020.description 2022-04-21 18:31 404 B
What the Fuzz - 2020.info.json 2022-04-21 18:31 464.8 KB
What the Fuzz - 2020.mp4 2020-03-18 16:51 130.7 MB
When Everyone's Dog is Named Fluffy - 2020.description 2022-04-21 20:44 525 B
When Everyone's Dog is Named Fluffy - 2020.info.json 2022-04-21 20:44 262.3 KB
When Everyone's Dog is Named Fluffy - 2020.mp4 2019-03-04 17:15 51.2 MB
When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins - 2020.description 2022-04-21 23:18 567 B
When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins - 2020.info.json 2022-04-21 23:18 676.6 KB
When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins - 2020.mp4 2018-08-21 16:19 67.4 MB
When IoT Attacks - Understanding the Safety Risks Associated with Connected Devices - 2020.description 2022-04-22 00:49 586 B
When IoT Attacks - Understanding the Safety Risks Associated with Connected Devices - 2020.info.json 2022-04-22 00:49 571.6 KB
When IoT Attacks - Understanding the Safety Risks Associated with Connected Devices - 2020.mp4 2021-06-24 15:17 340.7 MB
When Machines Can't Talk - 2020.description 2022-04-21 20:44 478 B
When Machines Can't Talk - 2020.info.json 2022-04-21 20:44 262.5 KB
When Machines Can't Talk - 2020.mp4 2019-03-05 18:02 169.5 MB
When Minutes Count - Speed and Accuracy During Incident Response - 2020.description 2022-04-21 17:41 253 B
When Minutes Count - Speed and Accuracy During Incident Response - 2020.info.json 2022-04-21 17:41 344.8 KB
When Minutes Count - Speed and Accuracy During Incident Response - 2020.mp4 2020-07-16 22:42 57.5 MB
When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL - 2020.description 2022-04-22 01:25 733 B
When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL - 2020.info.json 2022-04-22 01:25 484.1 KB
When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL - 2020.mp4 2020-03-28 07:06 52.6 MB
Where 2 Worlds Collide - Bringing Mimikatz et al to UNIX - 2020.description 2022-04-21 20:23 590 B
Where 2 Worlds Collide - Bringing Mimikatz et al to UNIX - 2020.info.json 2022-04-21 20:23 262.3 KB
Where 2 Worlds Collide - Bringing Mimikatz et al to UNIX - 2020.mp4 2019-03-04 15:31 91.2 MB
Why so Spurious Achieving Local Privilege Escalation on Operating Systems - 2020.description 2022-04-21 22:22 679 B
Why so Spurious Achieving Local Privilege Escalation on Operating Systems - 2020.info.json 2022-04-21 22:22 604.8 KB
Why so Spurious Achieving Local Privilege Escalation on Operating Systems - 2020.mp4 2020-02-20 17:16 170.5 MB
Why the World Must Take Notice of the Rising Asian Dark Web - 2020.description 2022-04-21 22:55 486 B
Why the World Must Take Notice of the Rising Asian Dark Web - 2020.info.json 2022-04-21 22:55 265.6 KB
Why the World Must Take Notice of the Rising Asian Dark Web - 2020.mp4 2018-09-17 17:12 101.8 MB
Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations - 2020.description 2022-04-21 23:42 681 B
Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations - 2020.info.json 2022-04-21 23:42 688.8 KB
Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations - 2020.mp4 2018-04-06 13:43 80.7 MB
WiFi-Based IMSI Catcher - 2020.description 2022-04-22 01:50 456 B
WiFi-Based IMSI Catcher - 2020.info.json 2022-04-22 01:50 745.3 KB
WiFi-Based IMSI Catcher - 2020.mp4 2020-03-09 10:58 123.6 MB
Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet - 2020.description 2022-04-21 22:21 557 B
Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet - 2020.info.json 2022-04-21 22:21 265.6 KB
Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet - 2020.mp4 2018-11-13 05:50 84.1 MB
Windows Offender - Reverse Engineering Windows Defender's Antivirus Emulator - 2020.description 2022-04-28 14:12 470 B
Windows Offender - Reverse Engineering Windows Defender's Antivirus Emulator - 2020.info.json 2022-04-28 14:12 606.8 KB
Windows Offender - Reverse Engineering Windows Defender's Antivirus Emulator - 2020.mp4 2020-03-28 05:31 371.6 MB
Winter is Coming Back - 2020.description 2022-04-21 19:59 566 B
Winter is Coming Back - 2020.info.json 2022-04-21 19:59 265.3 KB
Winter is Coming Back - 2020.mp4 2019-12-05 12:27 89.2 MB
Wire Me Through Machine Learning - 2020.description 2022-04-22 01:06 479 B
Wire Me Through Machine Learning - 2020.info.json 2022-04-22 01:06 261.0 KB
Wire Me Through Machine Learning - 2020.mp4 2017-10-27 17:54 42.2 MB
WireGuard - Next Generation Secure Network Tunnel - 2020.description 2022-04-21 21:43 513 B
WireGuard - Next Generation Secure Network Tunnel - 2020.info.json 2022-04-21 21:43 619.1 KB
WireGuard - Next Generation Secure Network Tunnel - 2020.mp4 2020-02-16 15:02 191.9 MB
Women in Security - Building a Female InfoSec Community in Korea, Japan, and Taiwan - 2020.description 2022-04-21 19:33 634 B
Women in Security - Building a Female InfoSec Community in Korea, Japan, and Taiwan - 2020.info.json 2022-04-21 19:33 267.1 KB
Women in Security - Building a Female InfoSec Community in Korea, Japan, and Taiwan - 2020.mp4 2019-12-11 16:36 124.6 MB
Worm Charming - Harvesting Malware Lures for Fun and Profit - 2020.description 2022-04-21 19:56 576 B
Worm Charming - Harvesting Malware Lures for Fun and Profit - 2020.info.json 2022-04-21 19:56 266.1 KB
Worm Charming - Harvesting Malware Lures for Fun and Profit - 2020.mp4 2019-12-02 15:35 106.2 MB
WSUSpendu - How to Hang WSUS Clients - 2020.description 2022-04-22 00:52 395 B
WSUSpendu - How to Hang WSUS Clients - 2020.info.json 2022-04-22 00:52 625.0 KB
WSUSpendu - How to Hang WSUS Clients - 2020.mp4 2017-10-31 13:10 86.4 MB
XOM-switch - Hiding Your Code from Advanced Code Reuse Attacks In One Shot - 2020.description 2022-04-21 23:34 529 B
XOM-switch - Hiding Your Code from Advanced Code Reuse Attacks In One Shot - 2020.info.json 2022-04-21 23:34 648.0 KB
XOM-switch - Hiding Your Code from Advanced Code Reuse Attacks In One Shot - 2020.mp4 2018-08-22 18:16 44.7 MB
Your Voice is My Passport - 2020.description 2022-04-21 22:02 458 B
Your Voice is My Passport - 2020.info.json 2022-04-21 22:02 522.7 KB
Your Voice is My Passport - 2020.mp4 2020-04-07 15:29 271.5 MB
Zero Trust Starts with Identity - 2020.description 2022-04-21 17:45 212 B
Zero Trust Starts with Identity - 2020.info.json 2022-04-21 17:45 263.9 KB
Zero Trust Starts with Identity - 2020.mp4 2020-06-19 13:28 33.1 MB
ZEROing Trust - Do Zero Trust Approaches Deliver Real Security - 2020.description 2022-04-21 21:47 471 B
ZEROing Trust - Do Zero Trust Approaches Deliver Real Security - 2020.info.json 2022-04-21 21:47 638.1 KB
ZEROing Trust - Do Zero Trust Approaches Deliver Real Security - 2020.mp4 2020-03-28 08:33 139.0 MB
Zombie Ant Farming - Practical Tips for Playing Hide and Seek with Linux EDRs - 2020.description 2022-04-21 19:18 645 B
Zombie Ant Farming - Practical Tips for Playing Hide and Seek with Linux EDRs - 2020.info.json 2022-04-21 19:18 265.8 KB
Zombie Ant Farming - Practical Tips for Playing Hide and Seek with Linux EDRs - 2020.mp4 2019-12-11 17:08 102.2 MB
Zombie POODLE, GOLDENDOODLE, and How TLSv1.3 Can Save Us All - 2020.description 2022-04-21 20:50 645 B
Zombie POODLE, GOLDENDOODLE, and How TLSv1.3 Can Save Us All - 2020.info.json 2022-04-21 20:50 265.4 KB
Zombie POODLE, GOLDENDOODLE, and How TLSv1.3 Can Save Us All - 2020.mp4 2019-04-22 13:05 125.2 MB

[return to top]