| ↑ Parent Directory |
| 'Man-in-the-SCADA -' Anatomy of Data Integrity Attacks in Industrial Control Systems - 2020.description
|
2022-04-22 01:24 |
567 B |
| 'Man-in-the-SCADA -' Anatomy of Data Integrity Attacks in Industrial Control Systems - 2020.info.json
|
2022-04-22 01:24 |
469.3 KB |
| 'Man-in-the-SCADA -' Anatomy of Data Integrity Attacks in Industrial Control Systems - 2020.mp4
|
2020-02-28 13:05 |
107.4 MB |
| (Pen)Testing Vehicles with CANToolz - 2020.description
|
2022-04-22 01:23 |
447 B |
| (Pen)Testing Vehicles with CANToolz - 2020.info.json
|
2022-04-22 01:23 |
663.7 KB |
| (Pen)Testing Vehicles with CANToolz - 2020.mp4
|
2021-09-08 07:03 |
354.1 MB |
| 0-days & Mitigations - Roadways to Exploit and Secure Connected BMW Cars - 2020.description
|
2022-04-21 18:54 |
541 B |
| 0-days & Mitigations - Roadways to Exploit and Secure Connected BMW Cars - 2020.info.json
|
2022-04-21 18:54 |
266.0 KB |
| 0-days & Mitigations - Roadways to Exploit and Secure Connected BMW Cars - 2020.mp4
|
2019-12-11 17:49 |
102.6 MB |
| 2017 USA BHB 108 - 2020.description
|
2022-04-22 00:38 |
570 B |
| 2017 USA BHB 108 - 2020.info.json
|
2022-04-22 00:38 |
577.2 KB |
| 2017 USA BHB 108 - 2020.mp4
|
2021-06-26 19:14 |
307.2 MB |
| 24 Techniques to Gather Threat Intel and Track Actors - 2020.description
|
2022-04-22 01:09 |
573 B |
| 24 Techniques to Gather Threat Intel and Track Actors - 2020.info.json
|
2022-04-22 01:09 |
612.2 KB |
| 24 Techniques to Gather Threat Intel and Track Actors - 2020.mp4
|
2021-07-14 11:40 |
405.5 MB |
| 50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks - 2020.description
|
2022-04-22 01:45 |
594 B |
| 50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks - 2020.info.json
|
2022-04-22 01:45 |
640.4 KB |
| 50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks - 2020.mp4
|
2018-03-03 15:27 |
346.0 MB |
| A Brief History of Mitigation - The Path to EL1 in iOS 11 - 2020.description
|
2022-04-21 22:33 |
346 B |
| A Brief History of Mitigation - The Path to EL1 in iOS 11 - 2020.info.json
|
2022-04-21 22:33 |
262.3 KB |
| A Brief History of Mitigation - The Path to EL1 in iOS 11 - 2020.mp4
|
2020-12-10 14:23 |
125.7 MB |
| A Compendium of Container Escapes - 2020.description
|
2022-04-21 19:21 |
572 B |
| A Compendium of Container Escapes - 2020.info.json
|
2022-04-21 19:21 |
265.5 KB |
| A Compendium of Container Escapes - 2020.mp4
|
2019-12-11 18:59 |
106.9 MB |
| A Deal with the Devil - Breaking Smart Contracts - 2020.description
|
2022-04-21 23:37 |
387 B |
| A Deal with the Devil - Breaking Smart Contracts - 2020.info.json
|
2022-04-21 23:37 |
656.4 KB |
| A Deal with the Devil - Breaking Smart Contracts - 2020.mp4
|
2018-08-21 16:09 |
58.6 MB |
| A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works - 2020.description
|
2022-04-21 20:15 |
647 B |
| A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works - 2020.info.json
|
2022-04-21 20:15 |
265.8 KB |
| A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works - 2020.mp4
|
2019-11-27 14:29 |
56.7 MB |
| A Deep Dive into macOS MDM (and How it can be Compromised) - 2020.description
|
2022-04-21 21:36 |
607 B |
| A Deep Dive into macOS MDM (and How it can be Compromised) - 2020.info.json
|
2022-04-21 21:36 |
599.1 KB |
| A Deep Dive into macOS MDM (and How it can be Compromised) - 2020.mp4
|
2020-02-25 15:05 |
177.0 MB |
| A Dive in to Hyper-V Architecture & Vulnerabilities - 2020.description
|
2022-04-21 22:49 |
456 B |
| A Dive in to Hyper-V Architecture & Vulnerabilities - 2020.info.json
|
2022-04-21 22:49 |
595.2 KB |
| A Dive in to Hyper-V Architecture & Vulnerabilities - 2020.mp4
|
2020-04-06 03:10 |
154.3 MB |
| A Hacker’s Guide to Career Progression - 2020.description
|
2022-04-21 22:54 |
227 B |
| A Hacker’s Guide to Career Progression - 2020.info.json
|
2022-04-21 22:54 |
266.4 KB |
| A Hacker’s Guide to Career Progression - 2020.mp4
|
2018-09-17 20:25 |
123.8 MB |
| A Measured Response to a Grain of Rice - 2020.description
|
2022-04-21 20:40 |
383 B |
| A Measured Response to a Grain of Rice - 2020.info.json
|
2022-04-21 20:40 |
266.0 KB |
| A Measured Response to a Grain of Rice - 2020.mp4
|
2019-03-04 16:01 |
373.4 MB |
| A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - 2020.description
|
2022-04-22 00:37 |
654 B |
| A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - 2020.info.json
|
2022-04-22 00:37 |
262.9 KB |
| A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - 2020.mp4
|
2018-08-22 18:27 |
55.5 MB |
| A Process is No One - Hunting for Token Manipulation - 2020.description
|
2022-04-21 23:49 |
537 B |
| A Process is No One - Hunting for Token Manipulation - 2020.info.json
|
2022-04-21 23:49 |
675.1 KB |
| A Process is No One - Hunting for Token Manipulation - 2020.mp4
|
2018-04-06 13:03 |
106.9 MB |
| A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities - 2020.description
|
2022-04-21 23:44 |
360 B |
| A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities - 2020.info.json
|
2022-04-21 23:44 |
694.9 KB |
| A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities - 2020.mp4
|
2018-04-06 13:22 |
91.8 MB |
| A Universal Controller to Take Over a Z-Wave Network - 2020.description
|
2022-04-21 23:39 |
412 B |
| A Universal Controller to Take Over a Z-Wave Network - 2020.info.json
|
2022-04-21 23:39 |
417.6 KB |
| A Universal Controller to Take Over a Z-Wave Network - 2020.mp4
|
2018-04-06 13:54 |
30.3 MB |
| ACSploit - Exploit Algorithmic Complexity Vulnerabilities - 2020.description
|
2022-04-21 19:59 |
482 B |
| ACSploit - Exploit Algorithmic Complexity Vulnerabilities - 2020.info.json
|
2022-04-21 19:59 |
264.6 KB |
| ACSploit - Exploit Algorithmic Complexity Vulnerabilities - 2020.mp4
|
2019-12-04 14:41 |
52.5 MB |
| Advanced Pre-Breach Planning - Utilizing a Purple Team to Measure Effectiveness vs. Maturity - 2020.description
|
2022-04-22 00:34 |
411 B |
| Advanced Pre-Breach Planning - Utilizing a Purple Team to Measure Effectiveness vs. Maturity - 2020.info.json
|
2022-04-22 00:34 |
578.4 KB |
| Advanced Pre-Breach Planning - Utilizing a Purple Team to Measure Effectiveness vs. Maturity - 2020.mp4
|
2021-09-13 11:56 |
345.1 MB |
| Advanced VBA Macros Attack & Defence - 2020.description
|
2022-04-21 18:38 |
675 B |
| Advanced VBA Macros Attack & Defence - 2020.info.json
|
2022-04-21 18:38 |
685.8 KB |
| Advanced VBA Macros Attack & Defence - 2020.mp4
|
2020-03-17 17:32 |
156.3 MB |
| Adventures in the Underland - The CQForensic Toolkit as a Unique Weapon Against Hackers - 2020.description
|
2022-04-21 19:02 |
558 B |
| Adventures in the Underland - The CQForensic Toolkit as a Unique Weapon Against Hackers - 2020.info.json
|
2022-04-21 19:02 |
266.3 KB |
| Adventures in the Underland - The CQForensic Toolkit as a Unique Weapon Against Hackers - 2020.mp4
|
2019-12-11 18:51 |
140.5 MB |
| AES Wireless Keyboard – Template Attack for Eavesdropping - 2020.description
|
2022-04-21 23:23 |
412 B |
| AES Wireless Keyboard – Template Attack for Eavesdropping - 2020.info.json
|
2022-04-21 23:23 |
554.7 KB |
| AES Wireless Keyboard – Template Attack for Eavesdropping - 2020.mp4
|
2018-08-22 18:23 |
52.6 MB |
| AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries - 2020.description
|
2022-04-21 21:44 |
404 B |
| AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries - 2020.info.json
|
2022-04-21 21:44 |
473.9 KB |
| AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries - 2020.mp4
|
2020-11-12 03:40 |
111.3 MB |
| AI & ML in Cyber Security - Why Algorithms are Dangerous - 2020.description
|
2022-04-21 22:15 |
438 B |
| AI & ML in Cyber Security - Why Algorithms are Dangerous - 2020.info.json
|
2022-04-21 22:15 |
579.8 KB |
| AI & ML in Cyber Security - Why Algorithms are Dangerous - 2020.mp4
|
2020-04-04 19:05 |
233.0 MB |
| AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed - 2020.description
|
2022-04-22 01:31 |
451 B |
| AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed - 2020.info.json
|
2022-04-22 01:31 |
497.4 KB |
| AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed - 2020.mp4
|
2018-03-04 00:54 |
155.9 MB |
| AI Gone Rogue - Exterminating Deep Fakes Before They Cause Menace - 2020.description
|
2022-04-21 20:58 |
427 B |
| AI Gone Rogue - Exterminating Deep Fakes Before They Cause Menace - 2020.info.json
|
2022-04-21 20:58 |
261.5 KB |
| AI Gone Rogue - Exterminating Deep Fakes Before They Cause Menace - 2020.mp4
|
2019-03-04 17:28 |
94.1 MB |
| Alexa, Hack My Server(less) Please - 2020.description
|
2022-04-21 18:07 |
631 B |
| Alexa, Hack My Server(less) Please - 2020.info.json
|
2022-04-21 18:07 |
265.8 KB |
| Alexa, Hack My Server(less) Please - 2020.mp4
|
2020-03-19 17:49 |
168.6 MB |
| All the 4G Modules Could be Hacked - 2020.description
|
2022-04-21 19:37 |
508 B |
| All the 4G Modules Could be Hacked - 2020.info.json
|
2022-04-21 19:37 |
264.4 KB |
| All the 4G Modules Could be Hacked - 2020.mp4
|
2019-12-02 14:51 |
91.2 MB |
| All Your Apple are Belong to Us - Unique Identification and Cross-Device Tracking of Apple Devices - 2020.description
|
2022-04-21 19:19 |
517 B |
| All Your Apple are Belong to Us - Unique Identification and Cross-Device Tracking of Apple Devices - 2020.info.json
|
2022-04-21 19:19 |
265.4 KB |
| All Your Apple are Belong to Us - Unique Identification and Cross-Device Tracking of Apple Devices - 2020.mp4
|
2019-12-11 15:55 |
125.3 MB |
| All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision - 2020.description
|
2022-04-22 01:03 |
556 B |
| All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision - 2020.info.json
|
2022-04-22 01:03 |
473.4 KB |
| All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision - 2020.mp4
|
2021-07-11 13:55 |
226.5 MB |
| All Your Payment Tokens Are Mine - Vulnerabilities of Mobile Payment Systems - 2020.description
|
2022-04-21 23:18 |
562 B |
| All Your Payment Tokens Are Mine - Vulnerabilities of Mobile Payment Systems - 2020.info.json
|
2022-04-21 23:18 |
454.1 KB |
| All Your Payment Tokens Are Mine - Vulnerabilities of Mobile Payment Systems - 2020.mp4
|
2018-08-22 18:21 |
27.5 MB |
| All Your SMS & Contacts Belong to ADUPS & Others - 2020.description
|
2022-04-22 00:48 |
457 B |
| All Your SMS & Contacts Belong to ADUPS & Others - 2020.info.json
|
2022-04-22 00:48 |
261.0 KB |
| All Your SMS & Contacts Belong to ADUPS & Others - 2020.mp4
|
2017-10-27 18:14 |
53.8 MB |
| An Attacker Looks at Docker - Approaching Multi-Container Applications - 2020.description
|
2022-04-21 21:24 |
450 B |
| An Attacker Looks at Docker - Approaching Multi-Container Applications - 2020.info.json
|
2022-04-21 21:24 |
541.2 KB |
| An Attacker Looks at Docker - Approaching Multi-Container Applications - 2020.mp4
|
2020-02-22 19:15 |
112.5 MB |
| An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities - 2020.description
|
2022-04-21 21:15 |
573 B |
| An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities - 2020.info.json
|
2022-04-21 21:15 |
261.8 KB |
| An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities - 2020.mp4
|
2019-07-11 11:41 |
70.2 MB |
| Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems - 2020.description
|
2022-04-21 23:20 |
436 B |
| Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems - 2020.info.json
|
2022-04-21 23:20 |
680.5 KB |
| Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems - 2020.mp4
|
2018-08-22 18:23 |
73.5 MB |
| Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning - 2020.description
|
2022-04-22 01:38 |
638 B |
| Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning - 2020.info.json
|
2022-04-22 01:38 |
385.0 KB |
| Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning - 2020.mp4
|
2018-03-14 08:54 |
172.1 MB |
| Another Flip in the Row - 2020.description
|
2022-04-28 14:46 |
459 B |
| Another Flip in the Row - 2020.info.json
|
2022-04-28 14:46 |
615.4 KB |
| Another Flip in the Row - 2020.mp4
|
2020-03-10 14:57 |
98.8 MB |
| Anti-Plugin - Don't Let Your App Play as an Android Plugin - 2020.description
|
2022-04-22 01:35 |
702 B |
| Anti-Plugin - Don't Let Your App Play as an Android Plugin - 2020.info.json
|
2022-04-22 01:35 |
620.8 KB |
| Anti-Plugin - Don't Let Your App Play as an Android Plugin - 2020.mp4
|
2020-03-04 02:23 |
104.6 MB |
| API-Induced SSRF - How Apple Pay Scattered Vulnerabilities Across the Web - 2020.description
|
2022-04-21 19:18 |
437 B |
| API-Induced SSRF - How Apple Pay Scattered Vulnerabilities Across the Web - 2020.info.json
|
2022-04-21 19:18 |
264.5 KB |
| API-Induced SSRF - How Apple Pay Scattered Vulnerabilities Across the Web - 2020.mp4
|
2019-12-11 16:19 |
56.1 MB |
| Applied Self-Driving Car Security - 2020.description
|
2022-05-06 21:24 |
363 B |
| Applied Self-Driving Car Security - 2020.info.json
|
2022-05-06 21:24 |
394.9 KB |
| Applied Self-Driving Car Security - 2020.mp4
|
2020-11-21 06:53 |
224.2 MB |
| Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors - 2020.description
|
2022-04-22 00:35 |
662 B |
| Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors - 2020.info.json
|
2022-04-22 00:35 |
614.2 KB |
| Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors - 2020.mp4
|
2017-10-31 14:47 |
103.0 MB |
| Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies - 2020.description
|
2022-04-21 22:09 |
554 B |
| Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies - 2020.info.json
|
2022-04-21 22:09 |
622.0 KB |
| Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies - 2020.mp4
|
2020-03-25 16:03 |
239.2 MB |
| Arm IDA and Cross Check - Reversing the Boeing 787's Core Network - 2020.description
|
2022-04-21 20:03 |
487 B |
| Arm IDA and Cross Check - Reversing the Boeing 787's Core Network - 2020.info.json
|
2022-04-21 20:03 |
266.1 KB |
| Arm IDA and Cross Check - Reversing the Boeing 787's Core Network - 2020.mp4
|
2019-12-03 13:23 |
129.9 MB |
| ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware - 2020.description
|
2022-04-21 22:11 |
581 B |
| ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware - 2020.info.json
|
2022-04-21 22:11 |
419.7 KB |
| ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware - 2020.mp4
|
2020-02-16 07:58 |
58.3 MB |
| Attacking and Defending Blockchains - From Horror Stories to Secure Wallets - 2020.description
|
2022-04-21 20:32 |
620 B |
| Attacking and Defending Blockchains - From Horror Stories to Secure Wallets - 2020.info.json
|
2022-04-21 20:32 |
262.6 KB |
| Attacking and Defending Blockchains - From Horror Stories to Secure Wallets - 2020.mp4
|
2019-03-01 18:37 |
96.8 MB |
| Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD) - 2020.description
|
2022-04-21 20:18 |
541 B |
| Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD) - 2020.info.json
|
2022-04-21 20:18 |
264.6 KB |
| Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD) - 2020.mp4
|
2019-11-27 14:49 |
101.6 MB |
| Attacking Client-Side JIT Compilers - 2020.description
|
2022-04-21 22:53 |
444 B |
| Attacking Client-Side JIT Compilers - 2020.info.json
|
2022-04-21 22:53 |
262.3 KB |
| Attacking Client-Side JIT Compilers - 2020.mp4
|
2020-12-06 13:57 |
205.6 MB |
| Attacking Electric Motors for Fun and Profit - 2020.description
|
2022-04-21 20:04 |
669 B |
| Attacking Electric Motors for Fun and Profit - 2020.info.json
|
2022-04-21 20:04 |
264.2 KB |
| Attacking Electric Motors for Fun and Profit - 2020.mp4
|
2019-11-27 14:46 |
59.9 MB |
| Attacking Hardware Systems Using Resonance and the Laws of Physics - 2020.description
|
2022-04-21 20:49 |
424 B |
| Attacking Hardware Systems Using Resonance and the Laws of Physics - 2020.info.json
|
2022-04-21 20:49 |
262.5 KB |
| Attacking Hardware Systems Using Resonance and the Laws of Physics - 2020.mp4
|
2019-03-05 13:44 |
158.5 MB |
| Attacking iPhone XS Max - 2020.description
|
2022-04-21 18:54 |
424 B |
| Attacking iPhone XS Max - 2020.info.json
|
2022-04-21 18:54 |
266.0 KB |
| Attacking iPhone XS Max - 2020.mp4
|
2019-12-11 18:42 |
87.1 MB |
| Attacking NextGen Roaming Networks - 2020.description
|
2022-04-21 23:52 |
436 B |
| Attacking NextGen Roaming Networks - 2020.info.json
|
2022-04-21 23:52 |
678.6 KB |
| Attacking NextGen Roaming Networks - 2020.mp4
|
2021-02-05 23:04 |
271.9 MB |
| Attacking Windows by Windows - 2020.description
|
2022-04-22 01:51 |
451 B |
| Attacking Windows by Windows - 2020.info.json
|
2022-04-22 01:51 |
495.0 KB |
| Attacking Windows by Windows - 2020.mp4
|
2021-07-08 16:35 |
235.9 MB |
| Attacks Against GSMA's M2M Remote Provisioning - 2020.description
|
2022-04-21 23:46 |
567 B |
| Attacks Against GSMA's M2M Remote Provisioning - 2020.info.json
|
2022-04-21 23:46 |
481.3 KB |
| Attacks Against GSMA's M2M Remote Provisioning - 2020.mp4
|
2018-04-06 12:58 |
46.7 MB |
| Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme - 2020.description
|
2022-04-21 22:36 |
580 B |
| Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme - 2020.info.json
|
2022-04-21 22:37 |
444.6 KB |
| Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme - 2020.mp4
|
2020-03-01 15:47 |
74.4 MB |
| Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices) - 2020.description
|
2022-04-22 00:36 |
700 B |
| Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices) - 2020.info.json
|
2022-04-22 00:36 |
602.9 KB |
| Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices) - 2020.mp4
|
2017-10-31 14:31 |
78.2 MB |
| Automated Discovery of Deserialization Gadget Chains - 2020.description
|
2022-04-21 21:32 |
633 B |
| Automated Discovery of Deserialization Gadget Chains - 2020.info.json
|
2022-04-21 21:32 |
546.1 KB |
| Automated Discovery of Deserialization Gadget Chains - 2020.mp4
|
2020-04-01 14:29 |
124.7 MB |
| Automated Testing of Crypto Software Using Differential Fuzzing - 2020.description
|
2022-04-22 00:53 |
494 B |
| Automated Testing of Crypto Software Using Differential Fuzzing - 2020.info.json
|
2022-04-22 00:53 |
510.4 KB |
| Automated Testing of Crypto Software Using Differential Fuzzing - 2020.mp4
|
2021-09-07 20:50 |
237.6 MB |
| Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing - 2020.description
|
2022-04-21 23:50 |
433 B |
| Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing - 2020.info.json
|
2022-04-21 23:50 |
609.0 KB |
| Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing - 2020.mp4
|
2018-04-06 12:24 |
103.8 MB |
| Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities - 2020.description
|
2022-04-21 21:09 |
432 B |
| Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities - 2020.info.json
|
2022-04-21 21:09 |
352.3 KB |
| Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities - 2020.mp4
|
2020-02-14 06:13 |
222.2 MB |
| Automating Incident Response - 2020.description
|
2022-04-22 01:47 |
564 B |
| Automating Incident Response - 2020.info.json
|
2022-04-22 01:47 |
632.5 KB |
| Automating Incident Response - 2020.mp4
|
2018-03-03 13:43 |
381.3 MB |
| Automation Techniques in C++ Reverse Engineering - 2020.description
|
2022-04-21 19:18 |
486 B |
| Automation Techniques in C++ Reverse Engineering - 2020.info.json
|
2022-04-21 19:18 |
266.0 KB |
| Automation Techniques in C++ Reverse Engineering - 2020.mp4
|
2019-12-11 18:16 |
93.2 MB |
| AVPASS - Leaking and Bypassing Antivirus Detection Model Automatically - 2020.description
|
2022-04-22 00:39 |
509 B |
| AVPASS - Leaking and Bypassing Antivirus Detection Model Automatically - 2020.info.json
|
2022-04-22 00:39 |
596.2 KB |
| AVPASS - Leaking and Bypassing Antivirus Detection Model Automatically - 2020.mp4
|
2021-06-16 06:01 |
290.0 MB |
| Back To The Epilogue - How to Evade Windows' Control Flow Guard with Less than 16 Bytes - 2020.description
|
2022-04-21 23:35 |
517 B |
| Back To The Epilogue - How to Evade Windows' Control Flow Guard with Less than 16 Bytes - 2020.info.json
|
2022-04-21 23:35 |
556.6 KB |
| Back To The Epilogue - How to Evade Windows' Control Flow Guard with Less than 16 Bytes - 2020.mp4
|
2018-08-21 15:45 |
51.0 MB |
| Back to the Future - A Radical Insecure Design of KVM on ARM - 2020.description
|
2022-04-21 21:42 |
449 B |
| Back to the Future - A Radical Insecure Design of KVM on ARM - 2020.info.json
|
2022-04-21 21:42 |
434.8 KB |
| Back to the Future - A Radical Insecure Design of KVM on ARM - 2020.mp4
|
2020-02-19 20:02 |
83.0 MB |
| Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers - 2020.description
|
2022-04-21 18:47 |
590 B |
| Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers - 2020.info.json
|
2022-04-21 18:47 |
265.4 KB |
| Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers - 2020.mp4
|
2019-12-18 16:15 |
146.7 MB |
| Backslash Powered Scanning - Hunting Unknown Vulnerability Classes - 2020.description
|
2022-04-22 01:42 |
538 B |
| Backslash Powered Scanning - Hunting Unknown Vulnerability Classes - 2020.info.json
|
2022-04-22 01:42 |
619.5 KB |
| Backslash Powered Scanning - Hunting Unknown Vulnerability Classes - 2020.mp4
|
2017-08-18 13:18 |
79.8 MB |
| Battle of Windows Service - A Silver Bullet to Discover File Privilege Escalation Bugs Automatically - 2020.description
|
2022-04-21 20:19 |
773 B |
| Battle of Windows Service - A Silver Bullet to Discover File Privilege Escalation Bugs Automatically - 2020.info.json
|
2022-04-21 20:19 |
264.5 KB |
| Battle of Windows Service - A Silver Bullet to Discover File Privilege Escalation Bugs Automatically - 2020.mp4
|
2019-11-27 14:36 |
58.3 MB |
| Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure - 2020.description
|
2022-04-21 21:39 |
592 B |
| Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure - 2020.info.json
|
2022-04-21 21:39 |
443.4 KB |
| Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure - 2020.mp4
|
2020-03-15 16:00 |
67.4 MB |
| Becoming You - A Glimpse Into Credential Abuse - 2020.description
|
2022-04-28 16:27 |
402 B |
| Becoming You - A Glimpse Into Credential Abuse - 2020.info.json
|
2022-04-28 16:27 |
493.5 KB |
| Becoming You - A Glimpse Into Credential Abuse - 2020.mp4
|
2018-04-06 13:57 |
88.5 MB |
| Behind the Scenes - The Industry of Social Media Manipulation Driven by Malware - 2020.description
|
2022-04-28 11:25 |
527 B |
| Behind the Scenes - The Industry of Social Media Manipulation Driven by Malware - 2020.info.json
|
2022-04-28 11:25 |
265.8 KB |
| Behind the Scenes - The Industry of Social Media Manipulation Driven by Malware - 2020.mp4
|
2019-12-02 12:38 |
117.1 MB |
| Behind the Scenes of Intel Security and Manageability Engine - 2020.description
|
2022-04-21 19:38 |
480 B |
| Behind the Scenes of Intel Security and Manageability Engine - 2020.info.json
|
2022-04-21 19:38 |
261.2 KB |
| Behind the Scenes of Intel Security and Manageability Engine - 2020.mp4
|
2019-12-02 12:47 |
73.0 MB |
| Behind the scenes of iOS and Mac Security - 2020.description
|
2022-04-28 11:24 |
595 B |
| Behind the scenes of iOS and Mac Security - 2020.info.json
|
2022-04-28 11:24 |
268.2 KB |
| Behind the scenes of iOS and Mac Security - 2020.mp4
|
2019-12-21 12:04 |
49.6 MB |
| Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre - 2020.description
|
2022-04-21 22:35 |
588 B |
| Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre - 2020.info.json
|
2022-04-21 22:35 |
599.4 KB |
| Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre - 2020.mp4
|
2020-03-26 09:06 |
448.6 MB |
| Betting Against the House - Security and Stability When the Odds are Against You - 2020.description
|
2022-04-22 01:10 |
646 B |
| Betting Against the House - Security and Stability When the Odds are Against You - 2020.info.json
|
2022-04-22 01:10 |
505.6 KB |
| Betting Against the House - Security and Stability When the Odds are Against You - 2020.mp4
|
2020-02-20 19:40 |
79.7 MB |
| Beyond the Blacklists - Detecting Malicious URL Through Machine Learning - 2020.description
|
2022-04-22 01:26 |
590 B |
| Beyond the Blacklists - Detecting Malicious URL Through Machine Learning - 2020.info.json
|
2022-04-22 01:26 |
659.5 KB |
| Beyond the Blacklists - Detecting Malicious URL Through Machine Learning - 2020.mp4
|
2018-03-02 18:47 |
306.4 MB |
| BHASIA Training Preview - Intrusion Analysis & Threat Hunting with Open Source Tools - 2020.description
|
2022-04-22 01:57 |
1.1 KB |
| BHASIA Training Preview - Intrusion Analysis & Threat Hunting with Open Source Tools - 2020.info.json
|
2022-04-22 01:57 |
264.9 KB |
| BHASIA Training Preview - Intrusion Analysis & Threat Hunting with Open Source Tools - 2020.mp4
|
2020-01-06 13:35 |
11.9 MB |
| Biometric Authentication Under Threat - Liveness Detection Hacking - 2020.description
|
2022-04-21 20:18 |
661 B |
| Biometric Authentication Under Threat - Liveness Detection Hacking - 2020.info.json
|
2022-04-21 20:18 |
264.6 KB |
| Biometric Authentication Under Threat - Liveness Detection Hacking - 2020.mp4
|
2019-11-28 14:02 |
69.8 MB |
| Black Box is Dead. Long Live Black Box! - 2020.description
|
2022-04-21 21:40 |
504 B |
| Black Box is Dead. Long Live Black Box! - 2020.info.json
|
2022-04-21 21:40 |
502.1 KB |
| Black Box is Dead. Long Live Black Box! - 2020.mp4
|
2020-11-08 10:46 |
197.9 MB |
| Black Hat Arsenal - 2020.description
|
2022-04-21 20:17 |
586 B |
| Black Hat Arsenal - 2020.info.json
|
2022-04-21 20:17 |
263.6 KB |
| Black Hat Arsenal - 2020.mp4
|
2019-09-23 16:16 |
42.7 MB |
| Black Hat Europe 2019 Highlights - 2020.description
|
2022-04-21 18:49 |
0 B |
| Black Hat Europe 2019 Highlights - 2020.info.json
|
2022-04-21 18:49 |
43.2 KB |
| Black Hat Europe 2019 Highlights - 2020.mp4
|
2019-12-16 17:24 |
28.4 MB |
| Black Hat Fast Chat - Daniel Cuthbert - 2020.description
|
2022-04-21 17:43 |
414 B |
| Black Hat Fast Chat - Daniel Cuthbert - 2020.info.json
|
2022-04-21 17:43 |
468.0 KB |
| Black Hat Fast Chat - Daniel Cuthbert - 2020.mp4
|
2020-06-24 09:20 |
167.1 MB |
| Black Hat Fast Chat - Matt Devost - 2020.description
|
2022-04-21 17:44 |
284 B |
| Black Hat Fast Chat - Matt Devost - 2020.info.json
|
2022-04-21 17:44 |
359.9 KB |
| Black Hat Fast Chat - Matt Devost - 2020.mp4
|
2020-06-22 22:14 |
34.1 MB |
| Black Hat Fast Chat - Matt Suiche - 2020.description
|
2022-04-21 17:42 |
357 B |
| Black Hat Fast Chat - Matt Suiche - 2020.info.json
|
2022-04-21 17:42 |
507.8 KB |
| Black Hat Fast Chat - Matt Suiche - 2020.mp4
|
2020-06-25 12:17 |
217.9 MB |
| Black Hat USA 2019 - 2020.description
|
2022-04-21 20:20 |
713 B |
| Black Hat USA 2019 - 2020.info.json
|
2022-04-21 20:20 |
83.9 KB |
| Black Hat USA 2019 - 2020.mp4
|
2019-12-14 05:16 |
25.6 MB |
| BLEEDINGBIT - Your APs Belong to Us - 2020.description
|
2022-04-21 20:54 |
415 B |
| BLEEDINGBIT - Your APs Belong to Us - 2020.info.json
|
2022-04-21 20:54 |
262.2 KB |
| BLEEDINGBIT - Your APs Belong to Us - 2020.mp4
|
2019-03-05 14:10 |
129.5 MB |
| Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths - 2020.description
|
2022-04-21 22:40 |
537 B |
| Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths - 2020.info.json
|
2022-04-21 22:40 |
545.6 KB |
| Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths - 2020.mp4
|
2020-03-28 01:46 |
76.9 MB |
| Blue Pill for Your Phone - 2020.description
|
2022-04-22 00:05 |
485 B |
| Blue Pill for Your Phone - 2020.info.json
|
2022-04-22 00:05 |
612.5 KB |
| Blue Pill for Your Phone - 2020.mp4
|
2017-10-31 14:41 |
97.7 MB |
| BlueMaster - Bypassing and Fixing Bluetooth-based Proximity Authentication - 2020.description
|
2022-04-21 18:07 |
561 B |
| BlueMaster - Bypassing and Fixing Bluetooth-based Proximity Authentication - 2020.info.json
|
2022-04-21 18:07 |
650.8 KB |
| BlueMaster - Bypassing and Fixing Bluetooth-based Proximity Authentication - 2020.mp4
|
2020-03-19 16:26 |
154.9 MB |
| BluePill - Neutralizing Anti-Analysis Behavior in Malware Dissection - 2020.description
|
2022-04-21 18:45 |
628 B |
| BluePill - Neutralizing Anti-Analysis Behavior in Malware Dissection - 2020.info.json
|
2022-04-21 18:45 |
264.3 KB |
| BluePill - Neutralizing Anti-Analysis Behavior in Malware Dissection - 2020.mp4
|
2021-08-03 16:46 |
157.0 MB |
| Booting the iOS Kernel to an Interactive Bash Shell on QEMU - 2020.description
|
2022-04-21 18:37 |
439 B |
| Booting the iOS Kernel to an Interactive Bash Shell on QEMU - 2020.info.json
|
2022-04-21 18:37 |
265.1 KB |
| Booting the iOS Kernel to an Interactive Bash Shell on QEMU - 2020.mp4
|
2021-07-28 15:22 |
224.7 MB |
| Bot vs. Bot for Evading Machine Learning Malware Detection - 2020.description
|
2022-04-22 00:03 |
461 B |
| Bot vs. Bot for Evading Machine Learning Malware Detection - 2020.info.json
|
2022-04-22 00:03 |
436.2 KB |
| Bot vs. Bot for Evading Machine Learning Malware Detection - 2020.mp4
|
2021-07-01 06:15 |
141.7 MB |
| Bounty Operations - Best Practices and Common Pitfalls to Avoid in the First 6-12 Months - 2020.description
|
2022-04-21 19:01 |
823 B |
| Bounty Operations - Best Practices and Common Pitfalls to Avoid in the First 6-12 Months - 2020.info.json
|
2022-04-21 19:01 |
266.4 KB |
| Bounty Operations - Best Practices and Common Pitfalls to Avoid in the First 6-12 Months - 2020.mp4
|
2019-12-11 16:43 |
189.1 MB |
| Breach Detection At Scale With AWS Honey Tokens - 2020.description
|
2022-04-21 23:23 |
441 B |
| Breach Detection At Scale With AWS Honey Tokens - 2020.info.json
|
2022-04-21 23:23 |
471.2 KB |
| Breach Detection At Scale With AWS Honey Tokens - 2020.mp4
|
2018-08-22 18:19 |
32.4 MB |
| Breaking Bad - Stealing Patient Data Through Medical Devices - 2020.description
|
2022-04-21 23:51 |
421 B |
| Breaking Bad - Stealing Patient Data Through Medical Devices - 2020.info.json
|
2022-04-21 23:51 |
658.6 KB |
| Breaking Bad - Stealing Patient Data Through Medical Devices - 2020.mp4
|
2020-11-22 05:25 |
455.0 MB |
| Breaking Big Data - Evading Analysis of the Metadata of Your Life - 2020.description
|
2022-04-22 01:50 |
701 B |
| Breaking Big Data - Evading Analysis of the Metadata of Your Life - 2020.info.json
|
2022-04-22 01:50 |
262.8 KB |
| Breaking Big Data - Evading Analysis of the Metadata of Your Life - 2020.mp4
|
2017-10-01 00:09 |
70.2 MB |
| Breaking Bootloaders on the Cheap - 2020.description
|
2022-04-21 18:01 |
567 B |
| Breaking Bootloaders on the Cheap - 2020.info.json
|
2022-04-21 18:01 |
482.8 KB |
| Breaking Bootloaders on the Cheap - 2020.mp4
|
2020-03-20 12:19 |
76.4 MB |
| Breaking Electronic Door Locks Like You're on CSI - Cyber - 2020.description
|
2022-04-22 01:01 |
397 B |
| Breaking Electronic Door Locks Like You're on CSI - Cyber - 2020.info.json
|
2022-04-22 01:01 |
261.0 KB |
| Breaking Electronic Door Locks Like You're on CSI - Cyber - 2020.mp4
|
2017-10-27 18:06 |
69.8 MB |
| Breaking Encrypted Databases - Generic Attacks on Range Queries - 2020.description
|
2022-04-21 19:35 |
540 B |
| Breaking Encrypted Databases - Generic Attacks on Range Queries - 2020.info.json
|
2022-04-21 19:35 |
265.9 KB |
| Breaking Encrypted Databases - Generic Attacks on Range Queries - 2020.mp4
|
2019-12-11 16:32 |
86.3 MB |
| Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging - 2020.description
|
2022-04-22 01:29 |
647 B |
| Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging - 2020.info.json
|
2022-04-22 01:29 |
403.1 KB |
| Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging - 2020.mp4
|
2021-06-22 09:11 |
141.0 MB |
| Breaking Out HSTS (and HPKP) On Firefox, IE_Edge and (Possibly) Chrome - 2020.description
|
2022-04-21 23:42 |
622 B |
| Breaking Out HSTS (and HPKP) On Firefox, IE_Edge and (Possibly) Chrome - 2020.info.json
|
2022-04-21 23:42 |
613.1 KB |
| Breaking Out HSTS (and HPKP) On Firefox, IE_Edge and (Possibly) Chrome - 2020.mp4
|
2018-04-06 13:12 |
108.6 MB |
| Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out! - 2020.description
|
2022-04-21 22:25 |
530 B |
| Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out! - 2020.info.json
|
2022-04-21 22:25 |
566.9 KB |
| Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out! - 2020.mp4
|
2020-03-07 23:05 |
70.0 MB |
| Breaking Samsung's ARM TrustZone - 2020.description
|
2022-04-21 18:46 |
596 B |
| Breaking Samsung's ARM TrustZone - 2020.info.json
|
2022-04-21 18:46 |
265.5 KB |
| Breaking Samsung's ARM TrustZone - 2020.mp4
|
2019-12-11 19:40 |
76.4 MB |
| Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis - 2020.description
|
2022-04-21 23:18 |
564 B |
| Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis - 2020.info.json
|
2022-04-21 23:18 |
638.6 KB |
| Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis - 2020.mp4
|
2018-08-22 18:28 |
64.8 MB |
| Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment - 2020.description
|
2022-04-21 23:36 |
733 B |
| Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment - 2020.info.json
|
2022-04-21 23:36 |
478.1 KB |
| Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment - 2020.mp4
|
2018-08-21 15:36 |
34.9 MB |
| Breaking the IIoT - Hacking industrial Control Gateways - 2020.description
|
2022-04-21 22:17 |
568 B |
| Breaking the IIoT - Hacking industrial Control Gateways - 2020.info.json
|
2022-04-21 22:17 |
523.9 KB |
| Breaking the IIoT - Hacking industrial Control Gateways - 2020.mp4
|
2020-02-20 10:22 |
150.8 MB |
| Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller - 2020.description
|
2022-04-21 19:04 |
510 B |
| Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller - 2020.info.json
|
2022-04-21 19:04 |
267.3 KB |
| Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller - 2020.mp4
|
2019-12-11 16:03 |
156.8 MB |
| Breaking XSS Mitigations Via Script Gadgets - 2020.description
|
2022-04-22 00:04 |
557 B |
| Breaking XSS Mitigations Via Script Gadgets - 2020.info.json
|
2022-04-22 00:04 |
633.9 KB |
| Breaking XSS Mitigations Via Script Gadgets - 2020.mp4
|
2017-10-31 14:13 |
85.2 MB |
| Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing - 2020.description
|
2022-04-21 18:33 |
762 B |
| Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing - 2020.info.json
|
2022-04-21 18:33 |
470.4 KB |
| Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing - 2020.mp4
|
2020-03-18 15:53 |
207.4 MB |
| Broken Links - Emergence and Future of Software-Supply Chain Compromises - 2020.description
|
2022-04-21 20:33 |
725 B |
| Broken Links - Emergence and Future of Software-Supply Chain Compromises - 2020.info.json
|
2022-04-21 20:33 |
262.1 KB |
| Broken Links - Emergence and Future of Software-Supply Chain Compromises - 2020.mp4
|
2019-03-04 17:35 |
56.5 MB |
| By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms - 2020.description
|
2022-04-21 23:58 |
763 B |
| By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms - 2020.info.json
|
2022-04-21 23:58 |
648.3 KB |
| By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms - 2020.mp4
|
2018-04-06 12:09 |
177.8 MB |
| Bypassing Clang's SafeStack for Fun and Profit - 2020.description
|
2022-04-22 01:34 |
837 B |
| Bypassing Clang's SafeStack for Fun and Profit - 2020.info.json
|
2022-04-22 01:34 |
551.5 KB |
| Bypassing Clang's SafeStack for Fun and Profit - 2020.mp4
|
2021-07-12 20:43 |
204.0 MB |
| Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction - 2020.description
|
2022-04-21 18:05 |
658 B |
| Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction - 2020.info.json
|
2022-04-21 18:05 |
676.1 KB |
| Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction - 2020.mp4
|
2020-03-19 17:22 |
120.7 MB |
| Bypassing Secure Boot Using Fault Injection - 2020.description
|
2022-04-22 01:29 |
638 B |
| Bypassing Secure Boot Using Fault Injection - 2020.info.json
|
2022-04-22 01:29 |
611.1 KB |
| Bypassing Secure Boot Using Fault Injection - 2020.mp4
|
2020-03-28 10:34 |
63.7 MB |
| Bypassing the Maginot Line - Remotely Exploit the Hardware Decoder on Smartphone - 2020.description
|
2022-04-21 20:19 |
641 B |
| Bypassing the Maginot Line - Remotely Exploit the Hardware Decoder on Smartphone - 2020.info.json
|
2022-04-21 20:19 |
44.2 KB |
| Bypassing the Maginot Line - Remotely Exploit the Hardware Decoder on Smartphone - 2020.mp4
|
2019-11-27 14:00 |
51.0 MB |
| Cache Side Channel Attack - Exploitability and Countermeasures - 2020.description
|
2022-04-28 16:46 |
691 B |
| Cache Side Channel Attack - Exploitability and Countermeasures - 2020.info.json
|
2022-04-28 16:46 |
700.4 KB |
| Cache Side Channel Attack - Exploitability and Countermeasures - 2020.mp4
|
2020-03-28 22:46 |
150.8 MB |
| CALDERA - Automating Adversary Emulation - 2020.description
|
2022-04-21 23:46 |
523 B |
| CALDERA - Automating Adversary Emulation - 2020.info.json
|
2022-04-21 23:46 |
661.7 KB |
| CALDERA - Automating Adversary Emulation - 2020.mp4
|
2018-04-06 13:08 |
87.4 MB |
| Catch me, Yes we can! - Pwning Social Engineers - 2020.description
|
2022-04-21 21:29 |
600 B |
| Catch me, Yes we can! - Pwning Social Engineers - 2020.info.json
|
2022-04-21 21:29 |
615.6 KB |
| Catch me, Yes we can! - Pwning Social Engineers - 2020.mp4
|
2020-02-18 01:18 |
193.0 MB |
| Chain of Fools - An Exploration of Certificate Chain Validation Mishaps - 2020.description
|
2022-04-21 18:51 |
657 B |
| Chain of Fools - An Exploration of Certificate Chain Validation Mishaps - 2020.info.json
|
2022-04-21 18:51 |
265.7 KB |
| Chain of Fools - An Exploration of Certificate Chain Validation Mishaps - 2020.mp4
|
2019-12-19 10:24 |
92.4 MB |
| Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums - 2020.description
|
2022-04-22 01:48 |
437 B |
| Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums - 2020.info.json
|
2022-04-22 01:48 |
469.3 KB |
| Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums - 2020.mp4
|
2018-03-13 01:25 |
150.9 MB |
| Chip.Fail - Glitching the Silicon of the Connected World - 2020.description
|
2022-04-21 19:49 |
381 B |
| Chip.Fail - Glitching the Silicon of the Connected World - 2020.info.json
|
2022-04-21 19:49 |
267.8 KB |
| Chip.Fail - Glitching the Silicon of the Connected World - 2020.mp4
|
2019-12-02 15:12 |
128.7 MB |
| ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended - 2020.description
|
2022-04-21 20:20 |
587 B |
| ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended - 2020.info.json
|
2022-04-21 20:20 |
265.3 KB |
| ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended - 2020.mp4
|
2019-11-27 14:26 |
73.5 MB |
| CLKscrew - Exposing The Perils of Security-Oblivious Energy Management - 2020.description
|
2022-04-21 23:55 |
592 B |
| CLKscrew - Exposing The Perils of Security-Oblivious Energy Management - 2020.info.json
|
2022-04-21 23:55 |
677.9 KB |
| CLKscrew - Exposing The Perils of Security-Oblivious Energy Management - 2020.mp4
|
2018-04-06 12:30 |
86.1 MB |
| Cloud-Native Sandboxes for Microservices - Understanding New Threats and Attacks - 2020.description
|
2022-04-21 20:59 |
501 B |
| Cloud-Native Sandboxes for Microservices - Understanding New Threats and Attacks - 2020.info.json
|
2022-04-21 20:59 |
261.4 KB |
| Cloud-Native Sandboxes for Microservices - Understanding New Threats and Attacks - 2020.mp4
|
2019-03-05 17:59 |
36.7 MB |
| ClusterFuzz - Fuzzing at Google Scale - 2020.description
|
2022-04-21 18:34 |
465 B |
| ClusterFuzz - Fuzzing at Google Scale - 2020.info.json
|
2022-04-21 18:34 |
266.3 KB |
| ClusterFuzz - Fuzzing at Google Scale - 2020.mp4
|
2022-02-04 02:34 |
310.4 MB |
| Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches - 2020.description
|
2022-04-22 01:54 |
478 B |
| Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches - 2020.info.json
|
2022-04-22 01:54 |
649.1 KB |
| Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches - 2020.mp4
|
2020-03-08 06:27 |
77.6 MB |
| Come Join the CAFSA - Continuous Automated Firmware Security Analysis - 2020.description
|
2022-04-21 19:40 |
546 B |
| Come Join the CAFSA - Continuous Automated Firmware Security Analysis - 2020.info.json
|
2022-04-21 19:40 |
265.4 KB |
| Come Join the CAFSA - Continuous Automated Firmware Security Analysis - 2020.mp4
|
2019-12-02 17:59 |
112.5 MB |
| Comparing Security Curricula and Accreditations to Industry Needs - 2020.description
|
2022-04-22 00:52 |
460 B |
| Comparing Security Curricula and Accreditations to Industry Needs - 2020.info.json
|
2022-04-22 00:52 |
629.6 KB |
| Comparing Security Curricula and Accreditations to Industry Needs - 2020.mp4
|
2017-10-31 13:21 |
116.3 MB |
| Compression Oracle Attacks on VPN Networks - 2020.description
|
2022-04-21 22:42 |
408 B |
| Compression Oracle Attacks on VPN Networks - 2020.info.json
|
2022-04-21 22:42 |
565.1 KB |
| Compression Oracle Attacks on VPN Networks - 2020.mp4
|
2020-04-02 09:17 |
87.2 MB |
| Conducting a Successful False Flag Cyber Operation (Blame it on China) - 2020.description
|
2022-04-21 18:49 |
496 B |
| Conducting a Successful False Flag Cyber Operation (Blame it on China) - 2020.info.json
|
2022-04-21 18:49 |
265.6 KB |
| Conducting a Successful False Flag Cyber Operation (Blame it on China) - 2020.mp4
|
2019-12-19 14:39 |
274.3 MB |
| Container Attack Surface Reduction Beyond Name Space Isolation - 2020.description
|
2022-04-21 20:23 |
613 B |
| Container Attack Surface Reduction Beyond Name Space Isolation - 2020.info.json
|
2022-04-21 20:23 |
262.6 KB |
| Container Attack Surface Reduction Beyond Name Space Isolation - 2020.mp4
|
2019-03-04 15:43 |
123.3 MB |
| Controlled Chaos - The Inevitable Marriage of DevOps & Security - 2020.description
|
2022-04-21 19:43 |
549 B |
| Controlled Chaos - The Inevitable Marriage of DevOps & Security - 2020.info.json
|
2022-04-21 19:43 |
265.1 KB |
| Controlled Chaos - The Inevitable Marriage of DevOps & Security - 2020.mp4
|
2019-12-03 12:04 |
157.5 MB |
| Counter-Infiltration - Future-Proof Counter Attacks Against Exploit Kit Infrastructure - 2020.description
|
2022-04-21 23:21 |
643 B |
| Counter-Infiltration - Future-Proof Counter Attacks Against Exploit Kit Infrastructure - 2020.info.json
|
2022-04-21 23:21 |
716.8 KB |
| Counter-Infiltration - Future-Proof Counter Attacks Against Exploit Kit Infrastructure - 2020.mp4
|
2018-08-21 17:32 |
78.1 MB |
| Critical Zero Days Remotely Compromise the Most Popular Real-Time OS - 2020.description
|
2022-04-28 11:20 |
614 B |
| Critical Zero Days Remotely Compromise the Most Popular Real-Time OS - 2020.info.json
|
2022-04-28 11:20 |
265.7 KB |
| Critical Zero Days Remotely Compromise the Most Popular Real-Time OS - 2020.mp4
|
2019-12-11 18:30 |
100.0 MB |
| Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge - 2020.description
|
2022-04-22 01:36 |
549 B |
| Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge - 2020.info.json
|
2022-04-22 01:36 |
502.9 KB |
| Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge - 2020.mp4
|
2021-07-04 19:39 |
263.1 MB |
| CTX - Eliminating BREACH with Context Hiding - 2020.description
|
2022-04-22 01:15 |
538 B |
| CTX - Eliminating BREACH with Context Hiding - 2020.info.json
|
2022-04-22 01:15 |
617.9 KB |
| CTX - Eliminating BREACH with Context Hiding - 2020.mp4
|
2020-02-11 20:56 |
76.0 MB |
| Cutting Edge - Microsoft Browser Security — From People Who Owned It - 2020.description
|
2022-04-21 20:51 |
421 B |
| Cutting Edge - Microsoft Browser Security — From People Who Owned It - 2020.info.json
|
2022-04-21 20:51 |
264.5 KB |
| Cutting Edge - Microsoft Browser Security — From People Who Owned It - 2020.mp4
|
2019-03-05 14:51 |
102.5 MB |
| Cyber Comrades - Alliance-Building in Cyberspace - 2020.description
|
2022-04-21 23:46 |
546 B |
| Cyber Comrades - Alliance-Building in Cyberspace - 2020.info.json
|
2022-04-21 23:46 |
471.2 KB |
| Cyber Comrades - Alliance-Building in Cyberspace - 2020.mp4
|
2018-04-09 11:48 |
44.3 MB |
| Cyber Insurance 101 for CISO’s - 2020.description
|
2022-04-21 19:46 |
389 B |
| Cyber Insurance 101 for CISO’s - 2020.info.json
|
2022-04-21 19:46 |
265.2 KB |
| Cyber Insurance 101 for CISO’s - 2020.mp4
|
2019-12-02 14:32 |
182.2 MB |
| Cyber Judo - Offensive Cyber Defense - 2020.description
|
2022-04-22 01:38 |
307 B |
| Cyber Judo - Offensive Cyber Defense - 2020.info.json
|
2022-04-22 01:38 |
564.0 KB |
| Cyber Judo - Offensive Cyber Defense - 2020.mp4
|
2021-06-30 19:29 |
222.9 MB |
| Cybersecurity Risk Assessment for Safety-Critical Systems - 2020.description
|
2022-04-21 19:47 |
488 B |
| Cybersecurity Risk Assessment for Safety-Critical Systems - 2020.info.json
|
2022-04-21 19:47 |
263.0 KB |
| Cybersecurity Risk Assessment for Safety-Critical Systems - 2020.mp4
|
2019-12-03 16:04 |
47.9 MB |
| Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT - 2020.description
|
2022-04-22 01:34 |
524 B |
| Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT - 2020.info.json
|
2022-04-22 01:34 |
685.9 KB |
| Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT - 2020.mp4
|
2020-03-28 08:34 |
104.1 MB |
| Dealing The Perfect Hand - Shuffling Memory Blocks On z_OS - 2020.description
|
2022-04-21 23:50 |
345 B |
| Dealing The Perfect Hand - Shuffling Memory Blocks On z_OS - 2020.info.json
|
2022-04-21 23:50 |
612.8 KB |
| Dealing The Perfect Hand - Shuffling Memory Blocks On z_OS - 2020.mp4
|
2018-04-06 12:19 |
76.8 MB |
| Death by a Thousand Abstracts - How (Not) to Get Your Research into Black Hat - 2020.description
|
2022-04-22 01:14 |
591 B |
| Death by a Thousand Abstracts - How (Not) to Get Your Research into Black Hat - 2020.info.json
|
2022-04-22 01:14 |
426.3 KB |
| Death by a Thousand Abstracts - How (Not) to Get Your Research into Black Hat - 2020.mp4
|
2020-03-14 23:14 |
51.4 MB |
| Death Profile - Now iOS Has Been Compromised to Suspected Ransomware - 2020.description
|
2022-04-28 16:19 |
460 B |
| Death Profile - Now iOS Has Been Compromised to Suspected Ransomware - 2020.info.json
|
2022-04-28 16:19 |
506.2 KB |
| Death Profile - Now iOS Has Been Compromised to Suspected Ransomware - 2020.mp4
|
2018-08-21 15:21 |
69.6 MB |
| Death to the IOC - What's Next in Threat Intelligence - 2020.description
|
2022-04-21 19:01 |
542 B |
| Death to the IOC - What's Next in Threat Intelligence - 2020.info.json
|
2022-04-21 19:01 |
264.3 KB |
| Death to the IOC - What's Next in Threat Intelligence - 2020.mp4
|
2019-12-11 15:42 |
67.2 MB |
| Debug for Bug - Crack and Hack Apple Core by Itself - 2020.description
|
2022-04-21 19:20 |
503 B |
| Debug for Bug - Crack and Hack Apple Core by Itself - 2020.info.json
|
2022-04-21 19:20 |
265.4 KB |
| Debug for Bug - Crack and Hack Apple Core by Itself - 2020.mp4
|
2019-12-11 19:25 |
100.6 MB |
| Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC - 2020.description
|
2022-04-21 20:50 |
404 B |
| Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC - 2020.info.json
|
2022-04-21 20:50 |
262.2 KB |
| Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC - 2020.mp4
|
2020-03-19 17:53 |
222.9 MB |
| Decompiler Internals - Microcode - 2020.description
|
2022-04-21 22:20 |
311 B |
| Decompiler Internals - Microcode - 2020.info.json
|
2022-04-21 22:20 |
615.0 KB |
| Decompiler Internals - Microcode - 2020.mp4
|
2020-04-04 16:04 |
264.8 MB |
| Deep Dive into an ICS Firewall, Looking for the Fire Hole - 2020.description
|
2022-04-21 22:55 |
503 B |
| Deep Dive into an ICS Firewall, Looking for the Fire Hole - 2020.info.json
|
2022-04-21 22:55 |
575.9 KB |
| Deep Dive into an ICS Firewall, Looking for the Fire Hole - 2020.mp4
|
2020-03-24 23:38 |
135.2 MB |
| Deep Impact - Recognizing Unknown Malicious Activities from Zero Knowledge - 2020.description
|
2022-04-21 20:45 |
591 B |
| Deep Impact - Recognizing Unknown Malicious Activities from Zero Knowledge - 2020.info.json
|
2022-04-21 20:45 |
263.0 KB |
| Deep Impact - Recognizing Unknown Malicious Activities from Zero Knowledge - 2020.mp4
|
2019-03-04 18:01 |
137.3 MB |
| Deep Neural Networks for Hackers - Methods, Applications, and Open Source Tools - 2020.description
|
2022-04-28 15:59 |
449 B |
| Deep Neural Networks for Hackers - Methods, Applications, and Open Source Tools - 2020.info.json
|
2022-04-28 15:59 |
573.2 KB |
| Deep Neural Networks for Hackers - Methods, Applications, and Open Source Tools - 2020.mp4
|
2020-03-30 01:20 |
168.9 MB |
| DeepLocker - Concealing Targeted Attacks with AI Locksmithing - 2020.description
|
2022-04-21 21:33 |
542 B |
| DeepLocker - Concealing Targeted Attacks with AI Locksmithing - 2020.info.json
|
2022-04-21 21:33 |
632.8 KB |
| DeepLocker - Concealing Targeted Attacks with AI Locksmithing - 2020.mp4
|
2020-02-19 04:04 |
214.2 MB |
| DeepPhish - Simulating Malicious AI - 2020.description
|
2022-04-28 11:34 |
573 B |
| DeepPhish - Simulating Malicious AI - 2020.info.json
|
2022-04-28 11:34 |
262.9 KB |
| DeepPhish - Simulating Malicious AI - 2020.mp4
|
2019-03-01 17:56 |
183.0 MB |
| Defense Against Rapidly Morphing DDOS - 2020.description
|
2022-04-21 19:53 |
559 B |
| Defense Against Rapidly Morphing DDOS - 2020.info.json
|
2022-04-21 19:53 |
265.2 KB |
| Defense Against Rapidly Morphing DDOS - 2020.mp4
|
2019-12-11 14:26 |
106.7 MB |
| Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE - 2020.description
|
2022-04-22 01:16 |
605 B |
| Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE - 2020.info.json
|
2022-04-22 01:16 |
572.4 KB |
| Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE - 2020.mp4
|
2018-03-07 19:13 |
267.1 MB |
| Delivering Javascript to World+Dog - 2020.description
|
2022-04-22 00:43 |
392 B |
| Delivering Javascript to World+Dog - 2020.info.json
|
2022-04-22 00:43 |
558.4 KB |
| Delivering Javascript to World+Dog - 2020.mp4
|
2021-06-23 17:43 |
228.5 MB |
| Demystifying PTSD in the Cybersecurity Environment - 2020.description
|
2022-04-21 21:49 |
701 B |
| Demystifying PTSD in the Cybersecurity Environment - 2020.info.json
|
2022-04-21 21:49 |
261.3 KB |
| Demystifying PTSD in the Cybersecurity Environment - 2020.mp4
|
2019-04-03 22:11 |
29.1 MB |
| Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk - 2020.description
|
2022-04-22 01:19 |
637 B |
| Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk - 2020.info.json
|
2022-04-22 01:19 |
610.7 KB |
| Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk - 2020.mp4
|
2021-07-03 23:27 |
399.1 MB |
| Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries - 2020.description
|
2022-04-21 18:35 |
570 B |
| Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries - 2020.info.json
|
2022-04-21 18:35 |
504.1 KB |
| Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries - 2020.mp4
|
2020-03-18 15:35 |
89.4 MB |
| Detecting Credential Compromise in AWS - 2020.description
|
2022-04-21 23:03 |
435 B |
| Detecting Credential Compromise in AWS - 2020.info.json
|
2022-04-21 23:03 |
440.2 KB |
| Detecting Credential Compromise in AWS - 2020.mp4
|
2020-02-11 21:03 |
76.4 MB |
| Detecting Deep Fakes with Mice - 2020.description
|
2022-04-21 20:17 |
497 B |
| Detecting Deep Fakes with Mice - 2020.info.json
|
2022-04-21 20:17 |
264.6 KB |
| Detecting Deep Fakes with Mice - 2020.mp4
|
2019-11-27 14:25 |
94.9 MB |
| Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities - 2020.description
|
2022-04-21 22:32 |
533 B |
| Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities - 2020.info.json
|
2022-04-21 22:32 |
607.0 KB |
| Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities - 2020.mp4
|
2020-02-19 15:48 |
191.4 MB |
| Detecting Malicious Files with YARA Rules as They Traverse the Network - 2020.description
|
2022-04-21 19:40 |
639 B |
| Detecting Malicious Files with YARA Rules as They Traverse the Network - 2020.info.json
|
2022-04-21 19:40 |
264.3 KB |
| Detecting Malicious Files with YARA Rules as They Traverse the Network - 2020.mp4
|
2019-12-03 15:57 |
51.9 MB |
| Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised ML - 2020.description
|
2022-04-21 23:22 |
588 B |
| Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised ML - 2020.info.json
|
2022-04-21 23:22 |
619.6 KB |
| Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised ML - 2020.mp4
|
2018-08-21 17:38 |
60.8 MB |
| DevSecOps - What, Why and How - 2020.description
|
2022-04-21 19:26 |
510 B |
| DevSecOps - What, Why and How - 2020.info.json
|
2022-04-21 19:26 |
45.5 KB |
| DevSecOps - What, Why and How - 2020.mp4
|
2019-12-11 16:31 |
215.4 MB |
| DevSecOps - What, Why and How - 2020.description
|
2022-04-21 19:41 |
404 B |
| DevSecOps - What, Why and How - 2020.info.json
|
2022-04-21 19:41 |
43.2 KB |
| DevSecOps - What, Why and How - 2020.mp4
|
2019-12-05 12:35 |
77.5 MB |
| DIFUZE - Android Kernel Driver Fuzzing - 2020.description
|
2022-04-21 23:55 |
575 B |
| DIFUZE - Android Kernel Driver Fuzzing - 2020.info.json
|
2022-04-21 23:55 |
667.5 KB |
| DIFUZE - Android Kernel Driver Fuzzing - 2020.mp4
|
2018-04-06 12:55 |
70.2 MB |
| Dig Into the Attack Surface of PDF and Gain 100+ CVEs in 1 Year - 2020.description
|
2022-04-22 01:33 |
518 B |
| Dig Into the Attack Surface of PDF and Gain 100+ CVEs in 1 Year - 2020.info.json
|
2022-04-22 01:33 |
422.0 KB |
| Dig Into the Attack Surface of PDF and Gain 100+ CVEs in 1 Year - 2020.mp4
|
2021-06-22 02:00 |
138.1 MB |
| Dissecting Non-Malicious Artifacts - One IP at a Time - 2020.description
|
2022-04-21 23:03 |
321 B |
| Dissecting Non-Malicious Artifacts - One IP at a Time - 2020.info.json
|
2022-04-21 23:03 |
424.9 KB |
| Dissecting Non-Malicious Artifacts - One IP at a Time - 2020.mp4
|
2020-11-19 08:16 |
101.3 MB |
| Divide et Impera - MemoryRanger Runs Drivers in Isolated Kernel Spaces - 2020.description
|
2022-04-21 21:03 |
610 B |
| Divide et Impera - MemoryRanger Runs Drivers in Isolated Kernel Spaces - 2020.info.json
|
2022-04-21 21:03 |
266.3 KB |
| Divide et Impera - MemoryRanger Runs Drivers in Isolated Kernel Spaces - 2020.mp4
|
2019-03-01 18:25 |
193.1 MB |
| Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing - 2020.description
|
2022-04-22 01:17 |
413 B |
| Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing - 2020.info.json
|
2022-04-22 01:17 |
718.3 KB |
| Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing - 2020.mp4
|
2020-03-09 01:29 |
193.9 MB |
| Don't @ Me - Hunting Twitter Bots at Scale - 2020.description
|
2022-04-21 22:36 |
442 B |
| Don't @ Me - Hunting Twitter Bots at Scale - 2020.info.json
|
2022-04-21 22:36 |
594.4 KB |
| Don't @ Me - Hunting Twitter Bots at Scale - 2020.mp4
|
2020-11-21 18:18 |
155.6 MB |
| Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence - 2020.description
|
2022-04-21 21:02 |
673 B |
| Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence - 2020.info.json
|
2022-04-21 21:02 |
262.5 KB |
| Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence - 2020.mp4
|
2019-03-04 18:17 |
101.5 MB |
| Doors of Durin - The Veiled Gate to Siemens S7 Silicon - 2020.description
|
2022-04-21 18:42 |
543 B |
| Doors of Durin - The Veiled Gate to Siemens S7 Silicon - 2020.info.json
|
2022-04-21 18:42 |
267.5 KB |
| Doors of Durin - The Veiled Gate to Siemens S7 Silicon - 2020.mp4
|
2021-07-30 14:00 |
403.7 MB |
| Dragonblood - Attacking the Dragonfly Handshake of WPA3 - 2020.description
|
2022-04-21 19:41 |
500 B |
| Dragonblood - Attacking the Dragonfly Handshake of WPA3 - 2020.info.json
|
2022-04-21 19:41 |
265.9 KB |
| Dragonblood - Attacking the Dragonfly Handshake of WPA3 - 2020.mp4
|
2019-12-02 12:15 |
68.6 MB |
| Drill Apple Core - Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit - 2020.description
|
2022-04-21 21:11 |
693 B |
| Drill Apple Core - Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit - 2020.info.json
|
2022-04-21 21:11 |
262.6 KB |
| Drill Apple Core - Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit - 2020.mp4
|
2019-03-01 16:49 |
110.9 MB |
| Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel - 2020.description
|
2022-04-22 01:37 |
962 B |
| Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel - 2020.info.json
|
2022-04-22 01:37 |
644.3 KB |
| Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel - 2020.mp4
|
2020-03-02 10:18 |
93.8 MB |
| Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking - 2020.description
|
2022-04-21 22:49 |
615 B |
| Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking - 2020.info.json
|
2022-04-21 22:49 |
430.4 KB |
| Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking - 2020.mp4
|
2021-02-06 13:47 |
85.4 MB |
| EdTech - The Ultimate APT - 2020.description
|
2022-04-21 17:36 |
402 B |
| EdTech - The Ultimate APT - 2020.info.json
|
2022-04-21 17:36 |
513.9 KB |
| EdTech - The Ultimate APT - 2020.mp4
|
2020-10-13 13:46 |
43.1 MB |
| Efail - Breaking S_MIME and OpenPGP Email Encryption using Exfiltration Channels - 2020.description
|
2022-04-21 21:47 |
470 B |
| Efail - Breaking S_MIME and OpenPGP Email Encryption using Exfiltration Channels - 2020.info.json
|
2022-04-21 21:47 |
590.6 KB |
| Efail - Breaking S_MIME and OpenPGP Email Encryption using Exfiltration Channels - 2020.mp4
|
2020-03-09 06:50 |
136.2 MB |
| Effective File Format Fuzzing – Thoughts, Techniques and Results - 2020.description
|
2022-04-22 01:51 |
571 B |
| Effective File Format Fuzzing – Thoughts, Techniques and Results - 2020.info.json
|
2022-04-22 01:51 |
623.4 KB |
| Effective File Format Fuzzing – Thoughts, Techniques and Results - 2020.mp4
|
2020-03-30 11:46 |
102.8 MB |
| Election Security - Securing America's Future - 2020.description
|
2022-04-21 17:36 |
637 B |
| Election Security - Securing America's Future - 2020.info.json
|
2022-04-21 17:36 |
447.7 KB |
| Election Security - Securing America's Future - 2020.mp4
|
2020-10-13 13:55 |
155.9 MB |
| Enhancing Cybersecurity Through Differentiated Access to Domain Name Registration Data - 2020.description
|
2022-04-28 15:17 |
315 B |
| Enhancing Cybersecurity Through Differentiated Access to Domain Name Registration Data - 2020.info.json
|
2022-04-28 15:17 |
265.5 KB |
| Enhancing Cybersecurity Through Differentiated Access to Domain Name Registration Data - 2020.mp4
|
2018-09-17 21:12 |
105.1 MB |
| Enraptured Minds - Strategic Gaming of Cognitive Mindhacks - 2020.description
|
2022-04-21 23:43 |
569 B |
| Enraptured Minds - Strategic Gaming of Cognitive Mindhacks - 2020.info.json
|
2022-04-21 23:43 |
684.3 KB |
| Enraptured Minds - Strategic Gaming of Cognitive Mindhacks - 2020.mp4
|
2018-04-06 13:39 |
152.7 MB |
| Eternal War in XNU Kernel Objects - 2020.description
|
2022-04-21 20:24 |
583 B |
| Eternal War in XNU Kernel Objects - 2020.info.json
|
2022-04-21 20:24 |
263.9 KB |
| Eternal War in XNU Kernel Objects - 2020.mp4
|
2019-03-01 18:53 |
104.6 MB |
| Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering - 2020.description
|
2022-04-21 21:49 |
612 B |
| Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering - 2020.info.json
|
2022-04-21 21:49 |
592.0 KB |
| Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering - 2020.mp4
|
2020-04-06 09:03 |
129.7 MB |
| Everybody be Cool, This is a Robbery! - 2020.description
|
2022-04-21 18:56 |
462 B |
| Everybody be Cool, This is a Robbery! - 2020.info.json
|
2022-04-21 18:56 |
265.9 KB |
| Everybody be Cool, This is a Robbery! - 2020.mp4
|
2019-12-11 18:35 |
91.9 MB |
| Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process - 2020.description
|
2022-04-22 00:33 |
368 B |
| Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process - 2020.info.json
|
2022-04-22 00:33 |
578.6 KB |
| Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process - 2020.mp4
|
2021-07-04 17:08 |
285.4 MB |
| Evilsploit - A Universal Hardware Hacking Toolkit - 2020.description
|
2022-04-22 00:57 |
446 B |
| Evilsploit - A Universal Hardware Hacking Toolkit - 2020.info.json
|
2022-04-22 00:57 |
589.6 KB |
| Evilsploit - A Universal Hardware Hacking Toolkit - 2020.mp4
|
2021-06-27 01:11 |
310.8 MB |
| Evolving Security Experts Among Teenagers - 2020.description
|
2022-04-21 20:24 |
584 B |
| Evolving Security Experts Among Teenagers - 2020.info.json
|
2022-04-21 20:24 |
262.5 KB |
| Evolving Security Experts Among Teenagers - 2020.mp4
|
2019-03-05 13:49 |
146.1 MB |
| Exfiltrating Reconnaissance Data from Air-Gapped ICS_SCADA Networks - 2020.description
|
2022-04-21 23:38 |
590 B |
| Exfiltrating Reconnaissance Data from Air-Gapped ICS_SCADA Networks - 2020.info.json
|
2022-04-21 23:38 |
625.1 KB |
| Exfiltrating Reconnaissance Data from Air-Gapped ICS_SCADA Networks - 2020.mp4
|
2018-04-06 13:09 |
84.4 MB |
| Exploitation of a Modern Smartphone Baseband - 2020.description
|
2022-04-21 21:11 |
405 B |
| Exploitation of a Modern Smartphone Baseband - 2020.info.json
|
2022-04-21 21:11 |
262.7 KB |
| Exploitation of a Modern Smartphone Baseband - 2020.mp4
|
2021-01-09 01:27 |
80.0 MB |
| Exploiting a Single SQLite Vulnerability Across Multiple Software - 2020.description
|
2022-04-22 00:56 |
732 B |
| Exploiting a Single SQLite Vulnerability Across Multiple Software - 2020.info.json
|
2022-04-22 00:56 |
583.7 KB |
| Exploiting a Single SQLite Vulnerability Across Multiple Software - 2020.mp4
|
2017-10-27 18:33 |
72.6 MB |
| Exploiting Qualcomm WLAN and Modem Over The Air - 2020.description
|
2022-04-21 19:23 |
510 B |
| Exploiting Qualcomm WLAN and Modem Over The Air - 2020.info.json
|
2022-04-21 19:23 |
267.9 KB |
| Exploiting Qualcomm WLAN and Modem Over The Air - 2020.mp4
|
2019-12-11 17:11 |
77.4 MB |
| Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine - 2020.description
|
2022-04-21 19:42 |
379 B |
| Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine - 2020.info.json
|
2022-04-21 19:42 |
266.0 KB |
| Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine - 2020.mp4
|
2019-12-02 12:26 |
99.3 MB |
| Exploiting USB_IP in Linux - 2020.description
|
2022-04-22 01:37 |
472 B |
| Exploiting USB_IP in Linux - 2020.info.json
|
2022-04-22 01:37 |
627.9 KB |
| Exploiting USB_IP in Linux - 2020.mp4
|
2020-02-21 20:32 |
100.8 MB |
| Exploiting Windows Hello for Business - 2020.description
|
2022-04-21 18:48 |
442 B |
| Exploiting Windows Hello for Business - 2020.info.json
|
2022-04-21 18:48 |
265.2 KB |
| Exploiting Windows Hello for Business - 2020.mp4
|
2019-12-19 14:43 |
134.5 MB |
| Exploring the New World - Remote Exploitation of SQLite and Curl - 2020.description
|
2022-04-21 19:22 |
648 B |
| Exploring the New World - Remote Exploitation of SQLite and Curl - 2020.info.json
|
2022-04-21 19:22 |
265.6 KB |
| Exploring the New World - Remote Exploitation of SQLite and Curl - 2020.mp4
|
2019-12-11 19:26 |
106.4 MB |
| Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing - 2020.description
|
2022-04-21 23:48 |
618 B |
| Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing - 2020.info.json
|
2022-04-21 23:48 |
475.8 KB |
| Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing - 2020.mp4
|
2018-04-06 12:59 |
45.2 MB |
| Fantastic Red-Team Attacks and How to Find Them - 2020.description
|
2022-04-21 19:19 |
513 B |
| Fantastic Red-Team Attacks and How to Find Them - 2020.info.json
|
2022-04-21 19:19 |
267.9 KB |
| Fantastic Red-Team Attacks and How to Find Them - 2020.mp4
|
2019-12-11 18:25 |
78.2 MB |
| Far Sides of Java Remote Protocols - 2020.description
|
2022-04-21 18:44 |
507 B |
| Far Sides of Java Remote Protocols - 2020.info.json
|
2022-04-21 18:44 |
646.2 KB |
| Far Sides of Java Remote Protocols - 2020.mp4
|
2020-03-17 15:30 |
96.0 MB |
| Fatal Fury on ESP32 - Time to Release Hardware Exploits - 2020.description
|
2022-04-21 18:06 |
442 B |
| Fatal Fury on ESP32 - Time to Release Hardware Exploits - 2020.info.json
|
2022-04-21 18:06 |
667.8 KB |
| Fatal Fury on ESP32 - Time to Release Hardware Exploits - 2020.mp4
|
2020-03-19 17:02 |
105.5 MB |
| Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming - 2020.description
|
2022-04-21 23:43 |
565 B |
| Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming - 2020.info.json
|
2022-04-21 23:43 |
651.8 KB |
| Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming - 2020.mp4
|
2018-04-06 13:48 |
80.8 MB |
| Fighting the Previous War (aka - Attacking and Defending in the Era of the Cloud) - 2020.description
|
2022-04-22 01:00 |
483 B |
| Fighting the Previous War (aka - Attacking and Defending in the Era of the Cloud) - 2020.info.json
|
2022-04-22 01:00 |
647.5 KB |
| Fighting the Previous War (aka - Attacking and Defending in the Era of the Cloud) - 2020.mp4
|
2017-10-31 13:06 |
123.6 MB |
| Finding a Needle in an Encrypted Haystack - 2020.description
|
2022-04-21 19:54 |
576 B |
| Finding a Needle in an Encrypted Haystack - 2020.info.json
|
2022-04-21 19:54 |
263.9 KB |
| Finding a Needle in an Encrypted Haystack - 2020.mp4
|
2019-12-02 18:56 |
169.5 MB |
| Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares - 2020.description
|
2022-04-21 17:37 |
625 B |
| Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares - 2020.info.json
|
2022-04-21 17:37 |
585.7 KB |
| Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares - 2020.mp4
|
2020-10-13 14:10 |
112.0 MB |
| Finding Our Path - How We're Trying to Improve Active Directory Security - 2020.description
|
2022-04-21 19:37 |
650 B |
| Finding Our Path - How We're Trying to Improve Active Directory Security - 2020.info.json
|
2022-04-21 19:37 |
265.6 KB |
| Finding Our Path - How We're Trying to Improve Active Directory Security - 2020.mp4
|
2019-12-11 16:49 |
171.0 MB |
| Finding Xori - Malware Analysis Triage with Automated Disassembly - 2020.description
|
2022-04-21 23:03 |
473 B |
| Finding Xori - Malware Analysis Triage with Automated Disassembly - 2020.info.json
|
2022-04-21 23:03 |
420.6 KB |
| Finding Xori - Malware Analysis Triage with Automated Disassembly - 2020.mp4
|
2020-02-11 22:49 |
82.8 MB |
| Fire & Ice - Making and Breaking macOS Firewalls - 2020.description
|
2022-04-21 22:37 |
506 B |
| Fire & Ice - Making and Breaking macOS Firewalls - 2020.info.json
|
2022-04-21 22:37 |
452.7 KB |
| Fire & Ice - Making and Breaking macOS Firewalls - 2020.mp4
|
2020-02-12 12:07 |
134.5 MB |
| Firmware Cartography - Charting the Course for Modern Server Compromise - 2020.description
|
2022-04-21 19:29 |
664 B |
| Firmware Cartography - Charting the Course for Modern Server Compromise - 2020.info.json
|
2022-04-21 19:29 |
266.2 KB |
| Firmware Cartography - Charting the Course for Modern Server Compromise - 2020.mp4
|
2019-12-11 17:27 |
130.2 MB |
| Firmware is the New Black - Analyzing Past Three Years of BIOS_UEFI Security Vulnerabilities - 2020.description
|
2022-04-28 16:35 |
430 B |
| Firmware is the New Black - Analyzing Past Three Years of BIOS_UEFI Security Vulnerabilities - 2020.info.json
|
2022-04-28 16:35 |
605.6 KB |
| Firmware is the New Black - Analyzing Past Three Years of BIOS_UEFI Security Vulnerabilities - 2020.mp4
|
2021-06-29 09:58 |
349.6 MB |
| Flip Feng Shui - Rowhammering the VM's Isolation - 2020.description
|
2022-04-22 01:43 |
426 B |
| Flip Feng Shui - Rowhammering the VM's Isolation - 2020.info.json
|
2022-04-22 01:43 |
649.2 KB |
| Flip Feng Shui - Rowhammering the VM's Isolation - 2020.mp4
|
2020-03-16 14:58 |
104.4 MB |
| FlowFuzz - A Framework for Fuzzing OpenFlow-Enabled Software and Hardware Switches - 2020.description
|
2022-04-22 00:55 |
514 B |
| FlowFuzz - A Framework for Fuzzing OpenFlow-Enabled Software and Hardware Switches - 2020.info.json
|
2022-04-22 00:55 |
262.4 KB |
| FlowFuzz - A Framework for Fuzzing OpenFlow-Enabled Software and Hardware Switches - 2020.mp4
|
2017-10-27 21:02 |
73.3 MB |
| Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina - 2020.description
|
2022-04-28 14:32 |
439 B |
| Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina - 2020.info.json
|
2022-04-28 14:32 |
564.0 KB |
| Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina - 2020.mp4
|
2020-02-11 06:04 |
226.9 MB |
| For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems - 2020.description
|
2022-04-21 21:21 |
632 B |
| For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems - 2020.info.json
|
2022-04-21 21:21 |
553.2 KB |
| For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems - 2020.mp4
|
2020-02-21 04:47 |
157.2 MB |
| Fractured Backbone - Breaking Modern OS Defenses with Firmware Attacks - 2020.description
|
2022-04-22 00:46 |
562 B |
| Fractured Backbone - Breaking Modern OS Defenses with Firmware Attacks - 2020.info.json
|
2022-04-22 00:46 |
597.3 KB |
| Fractured Backbone - Breaking Modern OS Defenses with Firmware Attacks - 2020.mp4
|
2021-07-08 14:05 |
318.2 MB |
| Free-Fall - Hacking Tesla from Wireless to CAN Bus - 2020.description
|
2022-04-22 00:37 |
499 B |
| Free-Fall - Hacking Tesla from Wireless to CAN Bus - 2020.info.json
|
2022-04-22 00:37 |
635.6 KB |
| Free-Fall - Hacking Tesla from Wireless to CAN Bus - 2020.mp4
|
2017-10-31 14:22 |
99.3 MB |
| From Bot to Robot - How Abilities and Law Change with Physicality - 2020.description
|
2022-04-21 22:39 |
489 B |
| From Bot to Robot - How Abilities and Law Change with Physicality - 2020.info.json
|
2022-04-21 22:39 |
603.6 KB |
| From Bot to Robot - How Abilities and Law Change with Physicality - 2020.mp4
|
2020-02-20 18:17 |
149.6 MB |
| From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it - 2020.description
|
2022-04-21 21:38 |
493 B |
| From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it - 2020.info.json
|
2022-04-21 21:38 |
608.0 KB |
| From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it - 2020.mp4
|
2020-02-24 16:12 |
174.3 MB |
| Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit - 2020.description
|
2022-04-21 18:35 |
723 B |
| Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit - 2020.info.json
|
2022-04-21 18:35 |
597.7 KB |
| Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit - 2020.mp4
|
2020-03-17 18:35 |
156.2 MB |
| Garbage In, Garbage Out - How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data - 2020.description
|
2022-04-22 00:04 |
665 B |
| Garbage In, Garbage Out - How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data - 2020.info.json
|
2022-04-22 00:04 |
487.9 KB |
| Garbage In, Garbage Out - How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data - 2020.mp4
|
2017-10-31 13:28 |
54.5 MB |
| GDPR and Third Party JS - Can It Be Done - 2020.description
|
2022-04-21 23:52 |
539 B |
| GDPR and Third Party JS - Can It Be Done - 2020.info.json
|
2022-04-21 23:52 |
498.2 KB |
| GDPR and Third Party JS - Can It Be Done - 2020.mp4
|
2018-04-06 12:57 |
44.2 MB |
| Ghidra - Journey from Classified NSA Tool to Open Source - 2020.description
|
2022-04-21 18:59 |
776 B |
| Ghidra - Journey from Classified NSA Tool to Open Source - 2020.info.json
|
2022-04-21 18:59 |
266.1 KB |
| Ghidra - Journey from Classified NSA Tool to Open Source - 2020.mp4
|
2019-12-11 16:55 |
101.5 MB |
| Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit - 2020.description
|
2022-04-22 01:55 |
31 B |
| Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit - 2020.info.json
|
2022-04-22 01:55 |
600.0 KB |
| Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit - 2020.mp4
|
2021-09-08 02:59 |
320.9 MB |
| Go Get My_Vulnerabilities - 2020.description
|
2022-04-22 01:08 |
687 B |
| Go Get My_Vulnerabilities - 2020.info.json
|
2022-04-22 01:08 |
685.8 KB |
| Go Get My_Vulnerabilities - 2020.mp4
|
2020-03-31 12:50 |
129.7 MB |
| Go Nuclear - Breaking Radiation Monitoring Devices - 2020.description
|
2022-04-22 00:56 |
435 B |
| Go Nuclear - Breaking Radiation Monitoring Devices - 2020.info.json
|
2022-04-22 00:56 |
639.5 KB |
| Go Nuclear - Breaking Radiation Monitoring Devices - 2020.mp4
|
2017-10-31 13:18 |
143.6 MB |
| Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing - 2020.description
|
2022-04-28 11:33 |
639 B |
| Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing - 2020.info.json
|
2022-04-28 11:33 |
264.5 KB |
| Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing - 2020.mp4
|
2019-12-03 16:20 |
51.4 MB |
| GPU Security Exposed - 2020.description
|
2022-04-22 01:25 |
582 B |
| GPU Security Exposed - 2020.info.json
|
2022-04-22 01:25 |
421.6 KB |
| GPU Security Exposed - 2020.mp4
|
2021-06-24 04:59 |
150.6 MB |
| Great Algorithms Do Not Always Make Great Products - 2020.description
|
2022-04-21 22:47 |
476 B |
| Great Algorithms Do Not Always Make Great Products - 2020.info.json
|
2022-04-21 22:47 |
265.2 KB |
| Great Algorithms Do Not Always Make Great Products - 2020.mp4
|
2018-09-17 16:21 |
93.8 MB |
| Hack Microsoft Using Microsoft Signed Binaries - 2020.description
|
2022-04-22 01:07 |
483 B |
| Hack Microsoft Using Microsoft Signed Binaries - 2020.info.json
|
2022-04-22 01:07 |
717.9 KB |
| Hack Microsoft Using Microsoft Signed Binaries - 2020.mp4
|
2018-03-04 04:38 |
311.4 MB |
| Hackers, Journalists and the Ethical Swamp - 2020.description
|
2022-04-21 18:39 |
448 B |
| Hackers, Journalists and the Ethical Swamp - 2020.info.json
|
2022-04-21 18:39 |
266.3 KB |
| Hackers, Journalists and the Ethical Swamp - 2020.mp4
|
2021-06-29 02:43 |
403.6 MB |
| Hacking HTTP_2 - New Attacks on the Internet's Next Generation Foundation - 2020.description
|
2022-04-22 01:35 |
608 B |
| Hacking HTTP_2 - New Attacks on the Internet's Next Generation Foundation - 2020.info.json
|
2022-04-22 01:35 |
418.2 KB |
| Hacking HTTP_2 - New Attacks on the Internet's Next Generation Foundation - 2020.mp4
|
2021-07-07 22:00 |
126.8 MB |
| Hacking Public Opinion - 2020.description
|
2022-04-21 17:37 |
603 B |
| Hacking Public Opinion - 2020.info.json
|
2022-04-21 17:37 |
266.2 KB |
| Hacking Public Opinion - 2020.mp4
|
2020-11-13 21:29 |
268.7 MB |
| Hacking Your Non-Compete - 2020.description
|
2022-04-21 19:57 |
592 B |
| Hacking Your Non-Compete - 2020.info.json
|
2022-04-21 19:57 |
266.2 KB |
| Hacking Your Non-Compete - 2020.mp4
|
2019-12-02 19:22 |
128.6 MB |
| Hands Off and Putting SLAB_SLUB Feng Shui in a Blackbox - 2020.description
|
2022-04-21 18:38 |
585 B |
| Hands Off and Putting SLAB_SLUB Feng Shui in a Blackbox - 2020.info.json
|
2022-04-21 18:38 |
636.7 KB |
| Hands Off and Putting SLAB_SLUB Feng Shui in a Blackbox - 2020.mp4
|
2020-03-17 17:32 |
167.3 MB |
| Hardening Hyper-V through Offensive Security Research - 2020.description
|
2022-04-21 21:04 |
443 B |
| Hardening Hyper-V through Offensive Security Research - 2020.info.json
|
2022-04-21 21:04 |
262.9 KB |
| Hardening Hyper-V through Offensive Security Research - 2020.mp4
|
2020-12-03 15:22 |
140.6 MB |
| He Said, She Said – Poisoned RDP Offense and Defense - 2020.description
|
2022-04-21 20:01 |
575 B |
| He Said, She Said – Poisoned RDP Offense and Defense - 2020.info.json
|
2022-04-21 20:01 |
266.4 KB |
| He Said, She Said – Poisoned RDP Offense and Defense - 2020.mp4
|
2019-12-03 15:33 |
111.8 MB |
| Heap Layout Optimisation for Exploitation - 2020.description
|
2022-04-21 23:38 |
370 B |
| Heap Layout Optimisation for Exploitation - 2020.info.json
|
2022-04-21 23:38 |
551.4 KB |
| Heap Layout Optimisation for Exploitation - 2020.mp4
|
2018-04-06 13:11 |
48.2 MB |
| Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud - 2020.description
|
2022-04-22 01:15 |
503 B |
| Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud - 2020.info.json
|
2022-04-22 01:15 |
707.8 KB |
| Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud - 2020.mp4
|
2018-01-06 00:54 |
142.3 MB |
| Hiding PIN's Artifacts to Defeat Evasive Malware - 2020.description
|
2022-04-21 23:58 |
462 B |
| Hiding PIN's Artifacts to Defeat Evasive Malware - 2020.info.json
|
2022-04-21 23:58 |
682.8 KB |
| Hiding PIN's Artifacts to Defeat Evasive Malware - 2020.mp4
|
2018-04-06 12:46 |
84.1 MB |
| Holding on for Tonight - Addiction in InfoSec - 2020.description
|
2022-04-21 22:46 |
506 B |
| Holding on for Tonight - Addiction in InfoSec - 2020.info.json
|
2022-04-21 22:46 |
442.9 KB |
| Holding on for Tonight - Addiction in InfoSec - 2020.mp4
|
2020-03-28 13:38 |
77.8 MB |
| HostSplit - Exploitable Antipatterns in Unicode Normalization - 2020.description
|
2022-04-21 18:57 |
590 B |
| HostSplit - Exploitable Antipatterns in Unicode Normalization - 2020.info.json
|
2022-04-21 18:57 |
265.2 KB |
| HostSplit - Exploitable Antipatterns in Unicode Normalization - 2020.mp4
|
2019-12-11 18:42 |
83.7 MB |
| How Automating Incident Response Secures Your Security Posture - 2020.description
|
2022-04-21 17:42 |
220 B |
| How Automating Incident Response Secures Your Security Posture - 2020.info.json
|
2022-04-21 17:42 |
390.5 KB |
| How Automating Incident Response Secures Your Security Posture - 2020.mp4
|
2020-06-22 14:32 |
102.6 MB |
| How can Communities Move Forward After Incidents of Sexual Harassment or Assault - 2020.description
|
2022-04-21 21:49 |
585 B |
| How can Communities Move Forward After Incidents of Sexual Harassment or Assault - 2020.info.json
|
2022-04-21 21:49 |
450.4 KB |
| How can Communities Move Forward After Incidents of Sexual Harassment or Assault - 2020.mp4
|
2020-03-27 01:40 |
103.3 MB |
| How can Someone with Autism Specifically Enhance the Cyber Security Workforce - 2020.description
|
2022-04-21 21:25 |
365 B |
| How can Someone with Autism Specifically Enhance the Cyber Security Workforce - 2020.info.json
|
2022-04-21 21:25 |
605.6 KB |
| How can Someone with Autism Specifically Enhance the Cyber Security Workforce - 2020.mp4
|
2020-03-24 09:06 |
363.8 MB |
| How I Learned to Stop Worrying and Love the SBOM - 2020.description
|
2022-04-21 22:46 |
442 B |
| How I Learned to Stop Worrying and Love the SBOM - 2020.info.json
|
2022-04-21 22:46 |
454.0 KB |
| How I Learned to Stop Worrying and Love the SBOM - 2020.mp4
|
2020-02-22 07:46 |
109.1 MB |
| How Samsung Secures Your Wallet and How To Break It - 2020.description
|
2022-04-21 23:42 |
448 B |
| How Samsung Secures Your Wallet and How To Break It - 2020.info.json
|
2022-04-21 23:42 |
734.1 KB |
| How Samsung Secures Your Wallet and How To Break It - 2020.mp4
|
2018-04-06 13:55 |
86.5 MB |
| How to Break PDF Encryption - 2020.description
|
2022-04-21 18:10 |
410 B |
| How to Break PDF Encryption - 2020.info.json
|
2022-04-21 18:10 |
265.4 KB |
| How to Break PDF Encryption - 2020.mp4
|
2020-03-18 19:49 |
104.1 MB |
| How to Build Synthetic Persons in Cyberspace - 2020.description
|
2022-04-21 20:43 |
496 B |
| How to Build Synthetic Persons in Cyberspace - 2020.info.json
|
2022-04-21 20:43 |
265.7 KB |
| How to Build Synthetic Persons in Cyberspace - 2020.mp4
|
2019-03-05 17:53 |
113.0 MB |
| How to Detect that Your Domains are Being Abused for Phishing by Using DNS - 2020.description
|
2022-04-28 11:16 |
544 B |
| How to Detect that Your Domains are Being Abused for Phishing by Using DNS - 2020.info.json
|
2022-04-28 11:16 |
265.8 KB |
| How to Detect that Your Domains are Being Abused for Phishing by Using DNS - 2020.mp4
|
2019-12-11 19:17 |
182.1 MB |
| How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing - 2020.description
|
2022-04-22 01:49 |
750 B |
| How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing - 2020.info.json
|
2022-04-22 01:49 |
652.8 KB |
| How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing - 2020.mp4
|
2020-02-16 06:27 |
128.0 MB |
| How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine - 2020.description
|
2022-04-21 23:54 |
393 B |
| How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine - 2020.info.json
|
2022-04-21 23:54 |
623.3 KB |
| How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine - 2020.mp4
|
2018-04-06 12:53 |
117.1 MB |
| How to Make Nation-State and Intelligence Attackers' Lives Much Harder on Mobile Networks - 2020.description
|
2022-04-22 00:55 |
747 B |
| How to Make Nation-State and Intelligence Attackers' Lives Much Harder on Mobile Networks - 2020.info.json
|
2022-04-22 00:55 |
428.9 KB |
| How to Make Nation-State and Intelligence Attackers' Lives Much Harder on Mobile Networks - 2020.mp4
|
2017-10-31 12:35 |
91.2 MB |
| How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement - 2020.description
|
2022-04-21 23:56 |
458 B |
| How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement - 2020.info.json
|
2022-04-21 23:56 |
628.8 KB |
| How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement - 2020.mp4
|
2018-04-06 12:45 |
169.8 MB |
| How to Survive the Hardware Assisted Control-Flow Integrity Enforcement - 2020.description
|
2022-04-21 19:42 |
509 B |
| How to Survive the Hardware Assisted Control-Flow Integrity Enforcement - 2020.info.json
|
2022-04-21 19:42 |
268.4 KB |
| How to Survive the Hardware Assisted Control-Flow Integrity Enforcement - 2020.mp4
|
2019-12-04 16:18 |
155.7 MB |
| How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems - 2020.description
|
2022-04-21 22:41 |
671 B |
| How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems - 2020.info.json
|
2022-04-21 22:41 |
604.3 KB |
| How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems - 2020.mp4
|
2020-03-26 13:34 |
216.0 MB |
| HTTP Desync Attacks - Request Smuggling Reborn - 2020.description
|
2022-04-21 18:41 |
573 B |
| HTTP Desync Attacks - Request Smuggling Reborn - 2020.info.json
|
2022-04-21 18:41 |
267.6 KB |
| HTTP Desync Attacks - Request Smuggling Reborn - 2020.mp4
|
2021-03-25 20:07 |
179.0 MB |
| HTTP Desync Attacks - Smashing into the Cell Next Door - 2020.description
|
2022-04-21 19:44 |
580 B |
| HTTP Desync Attacks - Smashing into the Cell Next Door - 2020.info.json
|
2022-04-21 19:44 |
266.0 KB |
| HTTP Desync Attacks - Smashing into the Cell Next Door - 2020.mp4
|
2019-12-02 13:01 |
93.6 MB |
| Hunting for Bugs, Catching Dragons - 2020.description
|
2022-04-21 19:50 |
552 B |
| Hunting for Bugs, Catching Dragons - 2020.info.json
|
2022-04-21 19:50 |
264.0 KB |
| Hunting for Bugs, Catching Dragons - 2020.mp4
|
2019-12-03 15:43 |
51.3 MB |
| I Block You Because I Love You - Social Account Identification Attack Against a Website Visitor - 2020.description
|
2022-04-21 20:22 |
545 B |
| I Block You Because I Love You - Social Account Identification Attack Against a Website Visitor - 2020.info.json
|
2022-04-21 20:22 |
262.1 KB |
| I Block You Because I Love You - Social Account Identification Attack Against a Website Visitor - 2020.mp4
|
2019-03-05 13:53 |
85.3 MB |
| I Know What You Saw Last Minute - The Chrome Browser Case - 2020.description
|
2022-04-22 01:44 |
480 B |
| I Know What You Saw Last Minute - The Chrome Browser Case - 2020.info.json
|
2022-04-22 01:44 |
455.3 KB |
| I Know What You Saw Last Minute - The Chrome Browser Case - 2020.mp4
|
2021-07-03 04:57 |
135.5 MB |
| I Trust My Zombies - A Trust-Enabled Botnet - 2020.description
|
2022-04-21 23:47 |
415 B |
| I Trust My Zombies - A Trust-Enabled Botnet - 2020.info.json
|
2022-04-21 23:47 |
286.9 KB |
| I Trust My Zombies - A Trust-Enabled Botnet - 2020.mp4
|
2018-04-06 12:57 |
68.7 MB |
| I'm Unique, Just Like You - Human Side-Channels and Their Implications for Security and Privacy - 2020.description
|
2022-04-21 19:56 |
630 B |
| I'm Unique, Just Like You - Human Side-Channels and Their Implications for Security and Privacy - 2020.info.json
|
2022-04-21 19:56 |
264.3 KB |
| I'm Unique, Just Like You - Human Side-Channels and Their Implications for Security and Privacy - 2020.mp4
|
2019-12-02 13:46 |
94.6 MB |
| I, for One, Welcome Our New Power Analysis Overlords - 2020.description
|
2022-04-21 22:18 |
410 B |
| I, for One, Welcome Our New Power Analysis Overlords - 2020.info.json
|
2022-04-21 22:18 |
452.9 KB |
| I, for One, Welcome Our New Power Analysis Overlords - 2020.mp4
|
2020-04-05 09:21 |
114.2 MB |
| Identity Theft - Attacks on SSO Systems - 2020.description
|
2022-04-21 22:02 |
554 B |
| Identity Theft - Attacks on SSO Systems - 2020.info.json
|
2022-04-21 22:02 |
555.5 KB |
| Identity Theft - Attacks on SSO Systems - 2020.mp4
|
2020-04-02 10:43 |
126.6 MB |
| Implementing the Lessons Learned From a Major Cyber Attack - 2020.description
|
2022-04-28 11:08 |
296 B |
| Implementing the Lessons Learned From a Major Cyber Attack - 2020.info.json
|
2022-04-28 11:08 |
265.7 KB |
| Implementing the Lessons Learned From a Major Cyber Attack - 2020.mp4
|
2021-08-09 07:01 |
359.3 MB |
| In Search of CurveSwap - Measuring Elliptic Curve Implementations in the Wild - 2020.description
|
2022-04-21 20:42 |
506 B |
| In Search of CurveSwap - Measuring Elliptic Curve Implementations in the Wild - 2020.info.json
|
2022-04-21 20:42 |
261.4 KB |
| In Search of CurveSwap - Measuring Elliptic Curve Implementations in the Wild - 2020.mp4
|
2019-03-04 17:37 |
50.0 MB |
| Industroyer_Crashoverride - Zero Things Cool About a Threat Group Targeting the Power Grid - 2020.description
|
2022-04-22 00:58 |
665 B |
| Industroyer_Crashoverride - Zero Things Cool About a Threat Group Targeting the Power Grid - 2020.info.json
|
2022-04-22 00:58 |
262.8 KB |
| Industroyer_Crashoverride - Zero Things Cool About a Threat Group Targeting the Power Grid - 2020.mp4
|
2017-10-27 18:25 |
125.3 MB |
| Infighting Among Russian Security Services in the Cyber Sphere - 2020.description
|
2022-04-21 19:20 |
732 B |
| Infighting Among Russian Security Services in the Cyber Sphere - 2020.info.json
|
2022-04-21 19:20 |
265.9 KB |
| Infighting Among Russian Security Services in the Cyber Sphere - 2020.mp4
|
2019-12-11 17:22 |
131.1 MB |
| InfoSec Philosophies for the Corrupt Economy - 2020.description
|
2022-04-21 21:46 |
541 B |
| InfoSec Philosophies for the Corrupt Economy - 2020.info.json
|
2022-04-21 21:46 |
444.3 KB |
| InfoSec Philosophies for the Corrupt Economy - 2020.mp4
|
2020-02-15 23:09 |
109.2 MB |
| Inside Android's SafetyNet Attestation - 2020.description
|
2022-04-21 23:47 |
493 B |
| Inside Android's SafetyNet Attestation - 2020.info.json
|
2022-04-21 23:47 |
504.8 KB |
| Inside Android's SafetyNet Attestation - 2020.mp4
|
2018-04-06 13:33 |
97.8 MB |
| Inside Out - The Cloud has Never been so Close - 2020.description
|
2022-04-28 11:07 |
529 B |
| Inside Out - The Cloud has Never been so Close - 2020.info.json
|
2022-04-28 11:07 |
465.9 KB |
| Inside Out - The Cloud has Never been so Close - 2020.mp4
|
2020-03-20 12:32 |
79.2 MB |
| Inside the Apple T2 - 2020.description
|
2022-04-21 19:32 |
593 B |
| Inside the Apple T2 - 2020.info.json
|
2022-04-21 19:32 |
265.6 KB |
| Inside the Apple T2 - 2020.mp4
|
2019-12-11 18:17 |
88.0 MB |
| Inside Web Attacks - The Real Payloads - 2020.description
|
2022-04-22 01:37 |
555 B |
| Inside Web Attacks - The Real Payloads - 2020.info.json
|
2022-04-22 01:37 |
398.9 KB |
| Inside Web Attacks - The Real Payloads - 2020.mp4
|
2021-06-12 08:28 |
63.3 MB |
| Integration of Cyber Insurance Into A Risk Management Program - 2020.description
|
2022-04-21 19:40 |
576 B |
| Integration of Cyber Insurance Into A Risk Management Program - 2020.info.json
|
2022-04-21 19:40 |
266.3 KB |
| Integration of Cyber Insurance Into A Risk Management Program - 2020.mp4
|
2019-12-03 18:27 |
185.2 MB |
| Intel ME - Flash File System Explained - 2020.description
|
2022-04-21 23:57 |
411 B |
| Intel ME - Flash File System Explained - 2020.info.json
|
2022-04-21 23:57 |
670.2 KB |
| Intel ME - Flash File System Explained - 2020.mp4
|
2018-04-06 12:39 |
77.6 MB |
| Intel SGX Remote Attestation is Not Sufficient - 2020.description
|
2022-04-22 00:03 |
328 B |
| Intel SGX Remote Attestation is Not Sufficient - 2020.info.json
|
2022-04-22 00:03 |
647.4 KB |
| Intel SGX Remote Attestation is Not Sufficient - 2020.mp4
|
2017-10-31 14:05 |
122.8 MB |
| Intel VISA - Through the Rabbit Hole - 2020.description
|
2022-04-21 19:55 |
584 B |
| Intel VISA - Through the Rabbit Hole - 2020.info.json
|
2022-04-21 19:55 |
48.2 KB |
| Intel VISA - Through the Rabbit Hole - 2020.mp4
|
2019-12-04 20:16 |
208.2 MB |
| International Problems - Serialized Fuzzing for ICU Vulnerabilities - 2020.description
|
2022-04-21 23:32 |
457 B |
| International Problems - Serialized Fuzzing for ICU Vulnerabilities - 2020.info.json
|
2022-04-21 23:32 |
546.1 KB |
| International Problems - Serialized Fuzzing for ICU Vulnerabilities - 2020.mp4
|
2018-08-21 18:01 |
46.6 MB |
| Internet-Scale Analysis of AWS Cognito Security - 2020.description
|
2022-04-21 19:39 |
462 B |
| Internet-Scale Analysis of AWS Cognito Security - 2020.info.json
|
2022-04-21 19:39 |
265.4 KB |
| Internet-Scale Analysis of AWS Cognito Security - 2020.mp4
|
2019-12-03 13:30 |
92.6 MB |
| Investigating Malware Using Memory Forensics - A Practical Approach - 2020.description
|
2022-04-21 20:53 |
587 B |
| Investigating Malware Using Memory Forensics - A Practical Approach - 2020.info.json
|
2022-04-21 20:53 |
57.3 KB |
| Investigating Malware Using Memory Forensics - A Practical Approach - 2020.mp4
|
2019-04-24 11:27 |
223.4 MB |
| iOS Dual Booting Demystified - 2020.description
|
2022-04-21 19:55 |
462 B |
| iOS Dual Booting Demystified - 2020.info.json
|
2022-04-21 19:55 |
264.5 KB |
| iOS Dual Booting Demystified - 2020.mp4
|
2019-12-04 19:39 |
102.6 MB |
| IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies - 2020.description
|
2022-04-21 21:23 |
571 B |
| IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies - 2020.info.json
|
2022-04-21 21:23 |
593.1 KB |
| IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies - 2020.mp4
|
2020-02-23 02:09 |
186.5 MB |
| Is the Mafia Taking Over Cybercrime - 2020.description
|
2022-04-21 21:40 |
683 B |
| Is the Mafia Taking Over Cybercrime - 2020.info.json
|
2022-04-21 21:40 |
452.9 KB |
| Is the Mafia Taking Over Cybercrime - 2020.mp4
|
2020-02-23 02:54 |
155.9 MB |
| Is Your Mental Health for Sale - 2020.description
|
2022-04-21 18:36 |
557 B |
| Is Your Mental Health for Sale - 2020.info.json
|
2022-04-21 18:36 |
266.0 KB |
| Is Your Mental Health for Sale - 2020.mp4
|
2021-08-02 05:20 |
295.4 MB |
| It's a PHP Unserialization Vulnerability Jim, but Not as We Know It - 2020.description
|
2022-04-21 21:24 |
347 B |
| It's a PHP Unserialization Vulnerability Jim, but Not as We Know It - 2020.info.json
|
2022-04-21 21:24 |
263.7 KB |
| It's a PHP Unserialization Vulnerability Jim, but Not as We Know It - 2020.mp4
|
2020-12-05 00:27 |
177.8 MB |
| Jailbreaking Apple Watch - 2020.description
|
2022-04-21 23:48 |
392 B |
| Jailbreaking Apple Watch - 2020.info.json
|
2022-04-21 23:48 |
497.7 KB |
| Jailbreaking Apple Watch - 2020.mp4
|
2018-04-06 14:03 |
48.9 MB |
| KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous - 2020.description
|
2022-04-21 22:54 |
654 B |
| KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous - 2020.info.json
|
2022-04-21 22:54 |
265.4 KB |
| KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous - 2020.mp4
|
2018-11-21 12:19 |
71.8 MB |
| Keep Everyone In Sync - Effective Approaches Borrowed from Open Source Communities - 2020.description
|
2022-04-21 19:49 |
573 B |
| Keep Everyone In Sync - Effective Approaches Borrowed from Open Source Communities - 2020.info.json
|
2022-04-21 19:49 |
264.3 KB |
| Keep Everyone In Sync - Effective Approaches Borrowed from Open Source Communities - 2020.mp4
|
2019-12-04 17:14 |
99.9 MB |
| KEEP PRIVATE - Two-Factor Authentication, Usable or Not - 2020.description
|
2022-04-21 22:19 |
98 B |
| KEEP PRIVATE - Two-Factor Authentication, Usable or Not - 2020.info.json
|
2022-04-21 22:19 |
427.6 KB |
| KEEP PRIVATE - Two-Factor Authentication, Usable or Not - 2020.mp4
|
2020-03-09 22:44 |
123.0 MB |
| Keeping Secrets - Emerging Practice in Database Encryption - 2020.description
|
2022-04-21 20:21 |
524 B |
| Keeping Secrets - Emerging Practice in Database Encryption - 2020.info.json
|
2022-04-21 20:21 |
262.0 KB |
| Keeping Secrets - Emerging Practice in Database Encryption - 2020.mp4
|
2019-03-04 15:44 |
60.4 MB |
| Kernel Mode Threats and Practical Defenses - 2020.description
|
2022-04-21 21:48 |
532 B |
| Kernel Mode Threats and Practical Defenses - 2020.info.json
|
2022-04-21 21:48 |
596.3 KB |
| Kernel Mode Threats and Practical Defenses - 2020.mp4
|
2020-02-16 17:49 |
117.1 MB |
| KSMA - Breaking Android Kernel Isolation and Rooting with ARM MMU Features - 2020.description
|
2022-04-21 23:36 |
476 B |
| KSMA - Breaking Android Kernel Isolation and Rooting with ARM MMU Features - 2020.info.json
|
2022-04-21 23:36 |
543.7 KB |
| KSMA - Breaking Android Kernel Isolation and Rooting with ARM MMU Features - 2020.mp4
|
2018-08-21 15:09 |
54.0 MB |
| Last Call for SATCOM Security - 2020.description
|
2022-04-28 14:54 |
444 B |
| Last Call for SATCOM Security - 2020.info.json
|
2022-04-28 14:54 |
558.4 KB |
| Last Call for SATCOM Security - 2020.mp4
|
2020-03-16 22:28 |
238.2 MB |
| Legal GNSS Spoofing and its Effects on Autonomous Vehicles - 2020.description
|
2022-04-21 20:14 |
547 B |
| Legal GNSS Spoofing and its Effects on Autonomous Vehicles - 2020.info.json
|
2022-04-21 20:14 |
264.7 KB |
| Legal GNSS Spoofing and its Effects on Autonomous Vehicles - 2020.mp4
|
2019-11-27 14:10 |
75.1 MB |
| Legal Landmines - How Law and Policy are Rapidly Shaping Information Security - 2020.description
|
2022-04-21 23:15 |
384 B |
| Legal Landmines - How Law and Policy are Rapidly Shaping Information Security - 2020.info.json
|
2022-04-21 23:15 |
613.4 KB |
| Legal Landmines - How Law and Policy are Rapidly Shaping Information Security - 2020.mp4
|
2020-03-09 00:05 |
477.6 MB |
| Legal Liability for IOT Cybersecurity Vulnerabilities - 2020.description
|
2022-04-21 21:06 |
454 B |
| Legal Liability for IOT Cybersecurity Vulnerabilities - 2020.info.json
|
2022-04-21 21:06 |
609.1 KB |
| Legal Liability for IOT Cybersecurity Vulnerabilities - 2020.mp4
|
2020-04-06 17:35 |
167.5 MB |
| Lessons and Lulz - The 4th Annual Black Hat USA NOC Report - 2020.description
|
2022-04-21 21:27 |
519 B |
| Lessons and Lulz - The 4th Annual Black Hat USA NOC Report - 2020.info.json
|
2022-04-21 21:27 |
520.7 KB |
| Lessons and Lulz - The 4th Annual Black Hat USA NOC Report - 2020.mp4
|
2020-03-28 04:36 |
204.0 MB |
| Lessons and Lulz - The 5th Annual Black Hat USA NOC Report - 2020.description
|
2022-04-21 18:51 |
782 B |
| Lessons and Lulz - The 5th Annual Black Hat USA NOC Report - 2020.info.json
|
2022-04-21 18:51 |
265.0 KB |
| Lessons and Lulz - The 5th Annual Black Hat USA NOC Report - 2020.mp4
|
2019-12-11 19:43 |
134.8 MB |
| Lessons From Two Years of Crypto Audits - 2020.description
|
2022-04-21 19:44 |
415 B |
| Lessons From Two Years of Crypto Audits - 2020.info.json
|
2022-04-21 19:44 |
265.6 KB |
| Lessons From Two Years of Crypto Audits - 2020.mp4
|
2019-12-02 18:31 |
81.7 MB |
| Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines - 2020.description
|
2022-04-21 22:16 |
428 B |
| Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines - 2020.info.json
|
2022-04-21 22:16 |
449.3 KB |
| Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines - 2020.mp4
|
2020-04-03 01:44 |
151.7 MB |
| Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization - 2020.description
|
2022-04-22 00:41 |
539 B |
| Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization - 2020.info.json
|
2022-04-22 00:41 |
655.1 KB |
| Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization - 2020.mp4
|
2017-10-31 14:23 |
132.7 MB |
| Level Up Your Security Mindset - 2020.description
|
2022-04-21 20:41 |
614 B |
| Level Up Your Security Mindset - 2020.info.json
|
2022-04-21 20:41 |
265.0 KB |
| Level Up Your Security Mindset - 2020.mp4
|
2019-03-04 15:58 |
137.4 MB |
| Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017 - 2020.description
|
2022-04-22 01:29 |
22 B |
| Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017 - 2020.info.json
|
2022-04-22 01:30 |
627.1 KB |
| Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017 - 2020.mp4
|
2020-02-22 03:40 |
423.0 MB |
| Locknote - Conclusions and Key Takeaways from Black Hat Asia 2018 - 2020.description
|
2022-04-21 23:34 |
66 B |
| Locknote - Conclusions and Key Takeaways from Black Hat Asia 2018 - 2020.info.json
|
2022-04-21 23:34 |
631.7 KB |
| Locknote - Conclusions and Key Takeaways from Black Hat Asia 2018 - 2020.mp4
|
2018-08-21 15:20 |
276.3 MB |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016 - 2020.description
|
2022-04-22 01:26 |
388 B |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016 - 2020.info.json
|
2022-04-22 01:26 |
566.6 KB |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016 - 2020.mp4
|
2021-06-27 05:49 |
358.3 MB |
| Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017 - 2020.description
|
2022-04-21 23:39 |
440 B |
| Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017 - 2020.info.json
|
2022-04-21 23:39 |
604.2 KB |
| Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017 - 2020.mp4
|
2018-04-06 14:11 |
213.5 MB |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2018 - 2020.description
|
2022-04-21 20:47 |
506 B |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2018 - 2020.info.json
|
2022-04-21 20:47 |
261.4 KB |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2018 - 2020.mp4
|
2019-03-06 13:17 |
351.1 MB |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2019 - 2020.description
|
2022-04-21 17:46 |
579 B |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2019 - 2020.info.json
|
2022-04-21 17:46 |
695.3 KB |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2019 - 2020.mp4
|
2020-03-20 12:45 |
533.0 MB |
| Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone - 2020.description
|
2022-04-21 19:48 |
513 B |
| Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone - 2020.info.json
|
2022-04-21 19:48 |
265.6 KB |
| Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone - 2020.mp4
|
2019-12-02 15:45 |
132.7 MB |
| Lost in Transaction - Process Doppelgänging - 2020.description
|
2022-04-21 23:46 |
541 B |
| Lost in Transaction - Process Doppelgänging - 2020.info.json
|
2022-04-21 23:46 |
637.1 KB |
| Lost in Transaction - Process Doppelgänging - 2020.mp4
|
2018-04-06 13:06 |
86.0 MB |
| Lowering the Bar - Deep Learning for Side Channel Analysis - 2020.description
|
2022-04-21 21:34 |
384 B |
| Lowering the Bar - Deep Learning for Side Channel Analysis - 2020.info.json
|
2022-04-21 21:34 |
605.4 KB |
| Lowering the Bar - Deep Learning for Side Channel Analysis - 2020.mp4
|
2021-02-25 12:42 |
188.6 MB |
| LTE Network Automation Under Threat - 2020.description
|
2022-04-21 22:13 |
393 B |
| LTE Network Automation Under Threat - 2020.info.json
|
2022-04-21 22:13 |
608.9 KB |
| LTE Network Automation Under Threat - 2020.mp4
|
2020-04-03 13:57 |
107.2 MB |
| Mac-A-Mal - An Automated Platform for Mac Malware Hunting - 2020.description
|
2022-04-21 23:36 |
652 B |
| Mac-A-Mal - An Automated Platform for Mac Malware Hunting - 2020.info.json
|
2022-04-21 23:36 |
414.9 KB |
| Mac-A-Mal - An Automated Platform for Mac Malware Hunting - 2020.mp4
|
2018-08-21 15:18 |
23.6 MB |
| Mainframe [z_OS] Reverse Engineering and Exploit Development - 2020.description
|
2022-04-21 21:33 |
537 B |
| Mainframe [z_OS] Reverse Engineering and Exploit Development - 2020.info.json
|
2022-04-21 21:33 |
610.1 KB |
| Mainframe [z_OS] Reverse Engineering and Exploit Development - 2020.mp4
|
2020-02-28 20:00 |
148.2 MB |
| Making Big Things Better The Dead Cow Way - 2020.description
|
2022-04-21 19:28 |
670 B |
| Making Big Things Better The Dead Cow Way - 2020.info.json
|
2022-04-21 19:28 |
266.2 KB |
| Making Big Things Better The Dead Cow Way - 2020.mp4
|
2019-12-11 18:01 |
310.4 MB |
| Malware Buried Deep Down the SPI Flash - Sednit's First UEFI Rootkit Found in the Wild - 2020.description
|
2022-04-21 21:28 |
681 B |
| Malware Buried Deep Down the SPI Flash - Sednit's First UEFI Rootkit Found in the Wild - 2020.info.json
|
2022-04-21 21:28 |
261.8 KB |
| Malware Buried Deep Down the SPI Flash - Sednit's First UEFI Rootkit Found in the Wild - 2020.mp4
|
2019-03-01 17:04 |
123.7 MB |
| Managing for Success - Maintaining a Healthy Bug Bounty Program Long Term - 2020.description
|
2022-04-21 18:55 |
570 B |
| Managing for Success - Maintaining a Healthy Bug Bounty Program Long Term - 2020.info.json
|
2022-04-21 18:55 |
265.4 KB |
| Managing for Success - Maintaining a Healthy Bug Bounty Program Long Term - 2020.mp4
|
2019-12-11 17:20 |
85.1 MB |
| MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE - 2020.description
|
2022-04-22 01:12 |
509 B |
| MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE - 2020.info.json
|
2022-04-22 01:12 |
491.8 KB |
| MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE - 2020.mp4
|
2021-06-30 18:55 |
247.4 MB |
| Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware - 2020.description
|
2022-04-21 22:51 |
577 B |
| Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware - 2020.info.json
|
2022-04-21 22:51 |
454.7 KB |
| Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware - 2020.mp4
|
2021-02-10 23:39 |
109.1 MB |
| Meltdown - Basics, Details, Consequences - 2020.description
|
2022-04-21 22:50 |
404 B |
| Meltdown - Basics, Details, Consequences - 2020.info.json
|
2022-04-21 22:50 |
596.3 KB |
| Meltdown - Basics, Details, Consequences - 2020.mp4
|
2020-02-17 11:43 |
93.6 MB |
| Messaging Layer Security - Towards a New Era of Secure Group Messaging - 2020.description
|
2022-04-21 19:50 |
592 B |
| Messaging Layer Security - Towards a New Era of Secure Group Messaging - 2020.info.json
|
2022-04-21 19:50 |
266.2 KB |
| Messaging Layer Security - Towards a New Era of Secure Group Messaging - 2020.mp4
|
2019-12-03 13:08 |
74.3 MB |
| Miasm - Reverse Engineering Framework - 2020.description
|
2022-04-21 22:50 |
409 B |
| Miasm - Reverse Engineering Framework - 2020.info.json
|
2022-04-21 22:50 |
613.0 KB |
| Miasm - Reverse Engineering Framework - 2020.mp4
|
2020-03-27 23:49 |
140.3 MB |
| Mind Games - Using Data to Solve for the Human Element - 2020.description
|
2022-04-21 17:39 |
646 B |
| Mind Games - Using Data to Solve for the Human Element - 2020.info.json
|
2022-04-21 17:39 |
567.7 KB |
| Mind Games - Using Data to Solve for the Human Element - 2020.mp4
|
2020-10-13 14:34 |
96.2 MB |
| MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection - 2020.description
|
2022-04-21 19:58 |
745 B |
| MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection - 2020.info.json
|
2022-04-21 19:58 |
263.2 KB |
| MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection - 2020.mp4
|
2019-12-11 14:19 |
78.2 MB |
| MITRE ATT&CK - The Play at Home Edition - 2020.description
|
2022-04-21 19:57 |
520 B |
| MITRE ATT&CK - The Play at Home Edition - 2020.info.json
|
2022-04-21 19:57 |
265.8 KB |
| MITRE ATT&CK - The Play at Home Edition - 2020.mp4
|
2019-12-02 15:26 |
170.2 MB |
| MMFML - Exploring How Memory-Mapped Files Hide From AV and Execute Malicious Code - 2020.description
|
2022-04-21 22:45 |
428 B |
| MMFML - Exploring How Memory-Mapped Files Hide From AV and Execute Malicious Code - 2020.info.json
|
2022-04-21 22:45 |
264.8 KB |
| MMFML - Exploring How Memory-Mapped Files Hide From AV and Execute Malicious Code - 2020.mp4
|
2018-09-17 17:46 |
69.7 MB |
| Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks - 2020.description
|
2022-04-22 01:46 |
656 B |
| Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks - 2020.info.json
|
2022-04-22 01:46 |
270.7 KB |
| Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks - 2020.mp4
|
2021-07-19 11:32 |
145.0 MB |
| Mobile Interconnect Threats - How Next-Gen Products May be Already Outdated - 2020.description
|
2022-04-21 19:31 |
471 B |
| Mobile Interconnect Threats - How Next-Gen Products May be Already Outdated - 2020.info.json
|
2022-04-21 19:31 |
264.4 KB |
| Mobile Interconnect Threats - How Next-Gen Products May be Already Outdated - 2020.mp4
|
2019-12-11 14:50 |
59.7 MB |
| Mobile Network Hacking, IP Edition - 2020.description
|
2022-04-21 18:49 |
354 B |
| Mobile Network Hacking, IP Edition - 2020.info.json
|
2022-04-21 18:49 |
265.4 KB |
| Mobile Network Hacking, IP Edition - 2020.mp4
|
2019-12-19 14:51 |
133.3 MB |
| Mobile-Telephony Threats in Asia - 2020.description
|
2022-04-22 01:04 |
706 B |
| Mobile-Telephony Threats in Asia - 2020.info.json
|
2022-04-22 01:04 |
709.3 KB |
| Mobile-Telephony Threats in Asia - 2020.mp4
|
2020-04-06 17:22 |
135.3 MB |
| Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet - 2020.description
|
2022-04-21 18:45 |
567 B |
| Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet - 2020.info.json
|
2022-04-21 18:45 |
266.2 KB |
| Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet - 2020.mp4
|
2021-08-03 13:40 |
268.3 MB |
| Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims - 2020.description
|
2022-04-21 21:50 |
476 B |
| Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims - 2020.info.json
|
2022-04-21 21:50 |
439.6 KB |
| Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims - 2020.mp4
|
2020-02-24 05:15 |
124.7 MB |
| Monsters in the Middleboxes - Building Tools for Detecting HTTPS Interception - 2020.description
|
2022-04-21 20:19 |
450 B |
| Monsters in the Middleboxes - Building Tools for Detecting HTTPS Interception - 2020.info.json
|
2022-04-21 20:19 |
264.7 KB |
| Monsters in the Middleboxes - Building Tools for Detecting HTTPS Interception - 2020.mp4
|
2019-11-27 14:42 |
56.6 MB |
| Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites - 2020.description
|
2022-04-21 19:34 |
501 B |
| Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites - 2020.info.json
|
2022-04-21 19:34 |
265.7 KB |
| Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites - 2020.mp4
|
2019-12-11 19:12 |
126.8 MB |
| Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box - 2020.description
|
2022-04-22 01:11 |
748 B |
| Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box - 2020.info.json
|
2022-04-22 01:11 |
556.1 KB |
| Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box - 2020.mp4
|
2020-03-08 17:26 |
82.0 MB |
| Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets - 2020.description
|
2022-04-22 01:42 |
616 B |
| Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets - 2020.info.json
|
2022-04-22 01:42 |
552.6 KB |
| Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets - 2020.mp4
|
2020-04-05 14:47 |
58.3 MB |
| Nation-State Moneymule's Hunting Season – APT Attacks Targeting Financial Institutions - 2020.description
|
2022-04-21 23:57 |
458 B |
| Nation-State Moneymule's Hunting Season – APT Attacks Targeting Financial Institutions - 2020.info.json
|
2022-04-21 23:57 |
731.2 KB |
| Nation-State Moneymule's Hunting Season – APT Attacks Targeting Financial Institutions - 2020.mp4
|
2018-04-06 12:44 |
89.8 MB |
| Network Defender Archeology - An NSM Case Study in Lateral Movement with DCOM - 2020.description
|
2022-04-21 20:51 |
403 B |
| Network Defender Archeology - An NSM Case Study in Lateral Movement with DCOM - 2020.info.json
|
2022-04-21 20:51 |
265.9 KB |
| Network Defender Archeology - An NSM Case Study in Lateral Movement with DCOM - 2020.mp4
|
2019-03-05 14:43 |
152.2 MB |
| Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data - 2020.description
|
2022-04-22 01:11 |
676 B |
| Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data - 2020.info.json
|
2022-04-22 01:11 |
582.9 KB |
| Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data - 2020.mp4
|
2018-03-06 17:56 |
220.6 MB |
| New Adventures in Spying 3G and 4G Users - Locate Track & Monitor - 2020.description
|
2022-04-22 00:49 |
581 B |
| New Adventures in Spying 3G and 4G Users - Locate Track & Monitor - 2020.info.json
|
2022-04-22 00:49 |
262.4 KB |
| New Adventures in Spying 3G and 4G Users - Locate Track & Monitor - 2020.mp4
|
2017-10-27 20:37 |
108.6 MB |
| New Compat Vulnerabilities in Linux Device Drivers - 2020.description
|
2022-04-21 23:35 |
531 B |
| New Compat Vulnerabilities in Linux Device Drivers - 2020.info.json
|
2022-04-21 23:35 |
459.3 KB |
| New Compat Vulnerabilities in Linux Device Drivers - 2020.mp4
|
2018-08-21 15:57 |
34.6 MB |
| New Exploit Technique In Java Deserialization Attack - 2020.description
|
2022-04-21 18:08 |
735 B |
| New Exploit Technique In Java Deserialization Attack - 2020.info.json
|
2022-04-21 18:08 |
266.3 KB |
| New Exploit Technique In Java Deserialization Attack - 2020.mp4
|
2021-12-29 05:48 |
320.3 MB |
| New Norms and Policies in Cyber-Diplomacy - 2020.description
|
2022-04-21 22:12 |
453 B |
| New Norms and Policies in Cyber-Diplomacy - 2020.info.json
|
2022-04-21 22:12 |
628.2 KB |
| New Norms and Policies in Cyber-Diplomacy - 2020.mp4
|
2021-02-25 12:09 |
411.6 MB |
| New Vulnerabilities in 5G Networks - 2020.description
|
2022-04-21 19:45 |
464 B |
| New Vulnerabilities in 5G Networks - 2020.info.json
|
2022-04-21 19:45 |
265.5 KB |
| New Vulnerabilities in 5G Networks - 2020.mp4
|
2019-12-02 13:15 |
137.0 MB |
| No Free Charge Theorem 2.0 - How to Steal Private Information from a Mobile Device Using a Powerbank - 2020.description
|
2022-04-21 20:21 |
940 B |
| No Free Charge Theorem 2.0 - How to Steal Private Information from a Mobile Device Using a Powerbank - 2020.info.json
|
2022-04-21 20:21 |
262.5 KB |
| No Free Charge Theorem 2.0 - How to Steal Private Information from a Mobile Device Using a Powerbank - 2020.mp4
|
2019-03-01 17:19 |
112.1 MB |
| No Royal Road … Notes on Dangerous Game - 2020.description
|
2022-04-21 22:44 |
516 B |
| No Royal Road … Notes on Dangerous Game - 2020.info.json
|
2022-04-21 22:44 |
606.7 KB |
| No Royal Road … Notes on Dangerous Game - 2020.mp4
|
2020-07-08 10:03 |
198.0 MB |
| None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service - 2020.description
|
2022-04-21 21:05 |
553 B |
| None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service - 2020.info.json
|
2022-04-21 21:05 |
507.9 KB |
| None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service - 2020.mp4
|
2020-02-16 14:52 |
118.8 MB |
| OEM Finder - Hunting Vulnerable OEM IoT Devices at Scale - 2020.description
|
2022-04-21 18:08 |
633 B |
| OEM Finder - Hunting Vulnerable OEM IoT Devices at Scale - 2020.info.json
|
2022-04-21 18:08 |
448.2 KB |
| OEM Finder - Hunting Vulnerable OEM IoT Devices at Scale - 2020.mp4
|
2020-03-19 15:48 |
83.1 MB |
| Off-Path Attacks Against PKI - 2020.description
|
2022-04-21 21:02 |
466 B |
| Off-Path Attacks Against PKI - 2020.info.json
|
2022-04-21 21:02 |
260.9 KB |
| Off-Path Attacks Against PKI - 2020.mp4
|
2019-03-05 18:05 |
63.3 MB |
| Offensive Malware Analysis - Dissecting OSX_FruitFly via a Custom C&C Server - 2020.description
|
2022-04-22 00:57 |
521 B |
| Offensive Malware Analysis - Dissecting OSX_FruitFly via a Custom C&C Server - 2020.info.json
|
2022-04-22 00:57 |
472.7 KB |
| Offensive Malware Analysis - Dissecting OSX_FruitFly via a Custom C&C Server - 2020.mp4
|
2017-10-31 13:23 |
46.2 MB |
| Office in Wonderland - 2020.description
|
2022-04-21 19:53 |
544 B |
| Office in Wonderland - 2020.info.json
|
2022-04-21 19:53 |
266.1 KB |
| Office in Wonderland - 2020.mp4
|
2019-12-04 13:59 |
161.8 MB |
| On Trust - Stories from the Front Lines - 2020.description
|
2022-04-21 18:55 |
550 B |
| On Trust - Stories from the Front Lines - 2020.info.json
|
2022-04-21 18:55 |
264.4 KB |
| On Trust - Stories from the Front Lines - 2020.mp4
|
2019-12-11 14:43 |
81.6 MB |
| Open Sourcing Automotive Diagnostics - 2020.description
|
2022-04-22 01:21 |
487 B |
| Open Sourcing Automotive Diagnostics - 2020.info.json
|
2022-04-22 01:21 |
713.7 KB |
| Open Sourcing Automotive Diagnostics - 2020.mp4
|
2018-03-03 14:32 |
373.9 MB |
| Operational Templates for State-Level Attack and Collective Defense of Countries - 2020.description
|
2022-04-21 19:22 |
662 B |
| Operational Templates for State-Level Attack and Collective Defense of Countries - 2020.info.json
|
2022-04-21 19:22 |
266.2 KB |
| Operational Templates for State-Level Attack and Collective Defense of Countries - 2020.mp4
|
2019-12-11 16:46 |
129.0 MB |
| Orange is the New Purple - 2020.description
|
2022-04-22 01:13 |
690 B |
| Orange is the New Purple - 2020.info.json
|
2022-04-22 01:13 |
262.2 KB |
| Orange is the New Purple - 2020.mp4
|
2017-10-27 18:02 |
71.9 MB |
| Outsmarting the Smart City - 2020.description
|
2022-04-21 21:28 |
569 B |
| Outsmarting the Smart City - 2020.info.json
|
2022-04-21 21:28 |
540.0 KB |
| Outsmarting the Smart City - 2020.mp4
|
2021-01-16 05:17 |
193.8 MB |
| Over-the-Air - How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars - 2020.description
|
2022-04-21 21:32 |
470 B |
| Over-the-Air - How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars - 2020.info.json
|
2022-04-21 21:32 |
611.4 KB |
| Over-the-Air - How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars - 2020.mp4
|
2020-02-18 20:12 |
118.3 MB |
| Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory - 2020.description
|
2022-04-21 19:23 |
513 B |
| Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory - 2020.info.json
|
2022-04-21 19:23 |
45.1 KB |
| Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory - 2020.mp4
|
2019-12-11 19:28 |
124.9 MB |
| Passive Fingerprinting of HTTP_2 Clients - 2020.description
|
2022-04-21 23:56 |
331 B |
| Passive Fingerprinting of HTTP_2 Clients - 2020.info.json
|
2022-04-21 23:56 |
633.4 KB |
| Passive Fingerprinting of HTTP_2 Clients - 2020.mp4
|
2018-04-06 12:50 |
70.4 MB |
| PASTA - Portable Automotive Security Testbed with Adaptability - 2020.description
|
2022-04-21 20:49 |
515 B |
| PASTA - Portable Automotive Security Testbed with Adaptability - 2020.info.json
|
2022-04-21 20:49 |
265.7 KB |
| PASTA - Portable Automotive Security Testbed with Adaptability - 2020.mp4
|
2019-12-04 15:08 |
101.3 MB |
| Perception Deception - Physical Adversarial Attack Challenges - 2020.description
|
2022-04-21 21:00 |
686 B |
| Perception Deception - Physical Adversarial Attack Challenges - 2020.info.json
|
2022-04-21 21:00 |
268.3 KB |
| Perception Deception - Physical Adversarial Attack Challenges - 2020.mp4
|
2019-03-05 14:57 |
186.1 MB |
| Perfectly Deniable Steganographic Disk Encryption - 2020.description
|
2022-04-21 20:53 |
373 B |
| Perfectly Deniable Steganographic Disk Encryption - 2020.info.json
|
2022-04-21 20:53 |
265.3 KB |
| Perfectly Deniable Steganographic Disk Encryption - 2020.mp4
|
2019-03-05 14:18 |
153.2 MB |
| PeriScope - An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary - 2020.description
|
2022-04-21 19:51 |
637 B |
| PeriScope - An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary - 2020.info.json
|
2022-04-21 19:51 |
264.8 KB |
| PeriScope - An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary - 2020.mp4
|
2019-12-11 14:21 |
84.4 MB |
| Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives - 2020.description
|
2022-04-21 21:45 |
515 B |
| Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives - 2020.info.json
|
2022-04-21 21:45 |
622.6 KB |
| Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives - 2020.mp4
|
2020-03-26 02:22 |
292.1 MB |
| Phishing for Funds - Understanding Business Email Compromise - 2020.description
|
2022-04-22 01:16 |
519 B |
| Phishing for Funds - Understanding Business Email Compromise - 2020.info.json
|
2022-04-22 01:16 |
742.2 KB |
| Phishing for Funds - Understanding Business Email Compromise - 2020.mp4
|
2021-10-01 19:04 |
177.8 MB |
| PicoDMA - DMA Attacks at Your Fingertips - 2020.description
|
2022-04-21 20:14 |
548 B |
| PicoDMA - DMA Attacks at Your Fingertips - 2020.info.json
|
2022-04-21 20:14 |
265.9 KB |
| PicoDMA - DMA Attacks at Your Fingertips - 2020.mp4
|
2019-11-27 14:56 |
89.8 MB |
| Playback - A TLS 1.3 Story - 2020.description
|
2022-04-21 21:19 |
549 B |
| Playback - A TLS 1.3 Story - 2020.info.json
|
2022-04-21 21:19 |
519.8 KB |
| Playback - A TLS 1.3 Story - 2020.mp4
|
2020-03-15 16:00 |
75.3 MB |
| Playing Offense and Defense with Deepfakes - 2020.description
|
2022-04-21 19:20 |
459 B |
| Playing Offense and Defense with Deepfakes - 2020.info.json
|
2022-04-21 19:20 |
265.9 KB |
| Playing Offense and Defense with Deepfakes - 2020.mp4
|
2019-12-11 16:08 |
129.7 MB |
| Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game - 2020.description
|
2022-04-22 01:53 |
593 B |
| Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game - 2020.info.json
|
2022-04-22 01:53 |
455.6 KB |
| Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game - 2020.mp4
|
2021-08-12 04:33 |
195.4 MB |
| Practical Approach to Automate the Discovery & Eradication of Open-Source Software Vulnerabilities - 2020.description
|
2022-04-22 00:42 |
651 B |
| Practical Approach to Automate the Discovery & Eradication of Open-Source Software Vulnerabilities - 2020.info.json
|
2022-04-22 00:42 |
268.6 KB |
| Practical Approach to Automate the Discovery & Eradication of Open-Source Software Vulnerabilities - 2020.mp4
|
2020-01-08 14:11 |
121.2 MB |
| Practical Side-Channel Attacks Against WPA-TKIP - 2020.description
|
2022-04-21 18:06 |
882 B |
| Practical Side-Channel Attacks Against WPA-TKIP - 2020.info.json
|
2022-04-21 18:06 |
559.7 KB |
| Practical Side-Channel Attacks Against WPA-TKIP - 2020.mp4
|
2020-03-19 17:09 |
142.0 MB |
| Practical Web Cache Poisoning - Redefining 'Unexploitable' - 2020.description
|
2022-04-21 21:07 |
469 B |
| Practical Web Cache Poisoning - Redefining 'Unexploitable' - 2020.info.json
|
2022-04-21 21:07 |
575.4 KB |
| Practical Web Cache Poisoning - Redefining 'Unexploitable' - 2020.mp4
|
2020-03-10 10:14 |
98.2 MB |
| Preloading Insecurity In Your Electron - 2020.description
|
2022-04-21 20:03 |
467 B |
| Preloading Insecurity In Your Electron - 2020.info.json
|
2022-04-21 20:03 |
268.0 KB |
| Preloading Insecurity In Your Electron - 2020.mp4
|
2019-12-05 12:15 |
103.2 MB |
| Preventing Authentication Bypass - A Tale of Two Researchers - 2020.description
|
2022-04-21 18:52 |
499 B |
| Preventing Authentication Bypass - A Tale of Two Researchers - 2020.info.json
|
2022-04-21 18:52 |
265.3 KB |
| Preventing Authentication Bypass - A Tale of Two Researchers - 2020.mp4
|
2019-12-11 17:56 |
74.5 MB |
| Prison Break Season 6 - Defeating the Mitigations Adopted by Android OEMs - 2020.description
|
2022-04-28 16:18 |
427 B |
| Prison Break Season 6 - Defeating the Mitigations Adopted by Android OEMs - 2020.info.json
|
2022-04-28 16:18 |
585.2 KB |
| Prison Break Season 6 - Defeating the Mitigations Adopted by Android OEMs - 2020.mp4
|
2018-08-22 18:23 |
55.4 MB |
| Process Injection Techniques - Gotta Catch Them All - 2020.description
|
2022-04-21 19:27 |
582 B |
| Process Injection Techniques - Gotta Catch Them All - 2020.info.json
|
2022-04-21 19:27 |
265.7 KB |
| Process Injection Techniques - Gotta Catch Them All - 2020.mp4
|
2019-12-11 16:53 |
104.3 MB |
| Project Zero - Five Years of 'Make 0Day Hard' - 2020.description
|
2022-04-21 18:59 |
427 B |
| Project Zero - Five Years of 'Make 0Day Hard' - 2020.info.json
|
2022-04-21 18:59 |
265.8 KB |
| Project Zero - Five Years of 'Make 0Day Hard' - 2020.mp4
|
2019-12-11 16:13 |
99.2 MB |
| Protecting Pentests - Recommendations for Performing More Secure Tests - 2020.description
|
2022-04-22 00:51 |
456 B |
| Protecting Pentests - Recommendations for Performing More Secure Tests - 2020.info.json
|
2022-04-22 00:51 |
472.2 KB |
| Protecting Pentests - Recommendations for Performing More Secure Tests - 2020.mp4
|
2017-10-31 13:25 |
39.2 MB |
| Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks - 2020.description
|
2022-04-21 21:08 |
401 B |
| Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks - 2020.info.json
|
2022-04-21 21:08 |
264.8 KB |
| Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks - 2020.mp4
|
2019-06-18 14:10 |
66.3 MB |
| Protecting Visual Assets - Digital Image Counter-Forensics - 2020.description
|
2022-04-22 00:59 |
387 B |
| Protecting Visual Assets - Digital Image Counter-Forensics - 2020.info.json
|
2022-04-22 00:59 |
436.6 KB |
| Protecting Visual Assets - Digital Image Counter-Forensics - 2020.mp4
|
2021-07-10 15:52 |
187.4 MB |
| Qualitative Look at Autonomous Peer Communication's Impact on Organizational Phishing Detection - 2020.description
|
2022-04-21 23:02 |
669 B |
| Qualitative Look at Autonomous Peer Communication's Impact on Organizational Phishing Detection - 2020.info.json
|
2022-04-21 23:02 |
443.9 KB |
| Qualitative Look at Autonomous Peer Communication's Impact on Organizational Phishing Detection - 2020.mp4
|
2021-01-31 05:20 |
71.7 MB |
| Quantifying Risk in Consumer Software at Scale - Consumer Reports' Digital Standard - 2020.description
|
2022-04-22 00:40 |
559 B |
| Quantifying Risk in Consumer Software at Scale - Consumer Reports' Digital Standard - 2020.info.json
|
2022-04-22 00:40 |
528.9 KB |
| Quantifying Risk in Consumer Software at Scale - Consumer Reports' Digital Standard - 2020.mp4
|
2021-07-07 16:52 |
209.1 MB |
| Randomization Can't Stop BPF JIT Spray - 2020.description
|
2022-04-22 01:14 |
512 B |
| Randomization Can't Stop BPF JIT Spray - 2020.info.json
|
2022-04-22 01:14 |
432.3 KB |
| Randomization Can't Stop BPF JIT Spray - 2020.mp4
|
2021-09-13 14:18 |
178.5 MB |
| RBN Reloaded - Amplifying Signals from the Underground - 2020.description
|
2022-04-22 00:03 |
676 B |
| RBN Reloaded - Amplifying Signals from the Underground - 2020.info.json
|
2022-04-22 00:03 |
262.0 KB |
| RBN Reloaded - Amplifying Signals from the Underground - 2020.mp4
|
2018-02-20 16:19 |
53.6 MB |
| Real Eyes, Realize, Real Lies - Beating Deception Technologies - 2020.description
|
2022-04-28 15:12 |
523 B |
| Real Eyes, Realize, Real Lies - Beating Deception Technologies - 2020.info.json
|
2022-04-28 15:12 |
413.2 KB |
| Real Eyes, Realize, Real Lies - Beating Deception Technologies - 2020.mp4
|
2020-02-13 18:53 |
69.6 MB |
| Real Humans Simulated Attacks - Usability Testing with Attack Scenarios - 2020.description
|
2022-04-22 00:50 |
488 B |
| Real Humans Simulated Attacks - Usability Testing with Attack Scenarios - 2020.info.json
|
2022-04-22 00:50 |
262.8 KB |
| Real Humans Simulated Attacks - Usability Testing with Attack Scenarios - 2020.mp4
|
2017-10-27 18:31 |
115.0 MB |
| Real-Time Detection of Attacks Leveraging Domain Administrator Privilege - 2020.description
|
2022-04-21 20:52 |
514 B |
| Real-Time Detection of Attacks Leveraging Domain Administrator Privilege - 2020.info.json
|
2022-04-21 20:52 |
261.3 KB |
| Real-Time Detection of Attacks Leveraging Domain Administrator Privilege - 2020.mp4
|
2019-03-01 18:18 |
79.9 MB |
| Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project - 2020.description
|
2022-04-22 01:18 |
482 B |
| Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project - 2020.info.json
|
2022-04-22 01:18 |
599.1 KB |
| Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project - 2020.mp4
|
2020-03-16 02:43 |
112.7 MB |
| Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots - 2020.description
|
2022-04-21 22:10 |
535 B |
| Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots - 2020.info.json
|
2022-04-21 22:10 |
600.6 KB |
| Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots - 2020.mp4
|
2020-02-17 08:29 |
197.0 MB |
| Remotely Attacking System Firmware - 2020.description
|
2022-04-21 22:43 |
511 B |
| Remotely Attacking System Firmware - 2020.info.json
|
2022-04-21 22:43 |
602.3 KB |
| Remotely Attacking System Firmware - 2020.mp4
|
2021-02-03 22:32 |
227.3 MB |
| Responding to a Cyber Attack with Missiles - 2020.description
|
2022-04-21 19:46 |
487 B |
| Responding to a Cyber Attack with Missiles - 2020.info.json
|
2022-04-21 19:46 |
264.4 KB |
| Responding to a Cyber Attack with Missiles - 2020.mp4
|
2019-12-02 18:42 |
184.0 MB |
| Return of Bleichenbacher's Oracle Threat (ROBOT) - 2020.description
|
2022-04-21 21:12 |
491 B |
| Return of Bleichenbacher's Oracle Threat (ROBOT) - 2020.info.json
|
2022-04-21 21:12 |
498.4 KB |
| Return of Bleichenbacher's Oracle Threat (ROBOT) - 2020.mp4
|
2021-02-03 12:43 |
100.1 MB |
| Return of the Insecure Brazilian Voting Machines - 2020.description
|
2022-04-21 20:55 |
491 B |
| Return of the Insecure Brazilian Voting Machines - 2020.info.json
|
2022-04-21 20:55 |
266.3 KB |
| Return of the Insecure Brazilian Voting Machines - 2020.mp4
|
2019-04-22 13:07 |
103.2 MB |
| return-to-csu - A New Method to Bypass 64-bit Linux ASLR - 2020.description
|
2022-04-21 23:19 |
509 B |
| return-to-csu - A New Method to Bypass 64-bit Linux ASLR - 2020.info.json
|
2022-04-21 23:19 |
677.3 KB |
| return-to-csu - A New Method to Bypass 64-bit Linux ASLR - 2020.mp4
|
2018-08-22 18:29 |
87.2 MB |
| Reverse Engineering and Exploiting Builds in the Cloud - 2020.description
|
2022-04-28 11:13 |
719 B |
| Reverse Engineering and Exploiting Builds in the Cloud - 2020.info.json
|
2022-04-28 11:13 |
661.4 KB |
| Reverse Engineering and Exploiting Builds in the Cloud - 2020.mp4
|
2020-03-17 17:40 |
127.0 MB |
| Reverse Engineering WhatsApp Encryption for Chat Manipulation and More - 2020.description
|
2022-04-21 19:45 |
498 B |
| Reverse Engineering WhatsApp Encryption for Chat Manipulation and More - 2020.info.json
|
2022-04-21 19:45 |
262.9 KB |
| Reverse Engineering WhatsApp Encryption for Chat Manipulation and More - 2020.mp4
|
2019-12-03 15:49 |
45.8 MB |
| Reversing a Japanese Wireless SD Card - From Zero to Code Execution - 2020.description
|
2022-04-21 22:48 |
522 B |
| Reversing a Japanese Wireless SD Card - From Zero to Code Execution - 2020.info.json
|
2022-04-21 22:48 |
600.2 KB |
| Reversing a Japanese Wireless SD Card - From Zero to Code Execution - 2020.mp4
|
2020-03-16 07:17 |
131.7 MB |
| Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox - 2020.description
|
2022-04-21 23:48 |
602 B |
| Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox - 2020.info.json
|
2022-04-21 23:48 |
647.5 KB |
| Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox - 2020.mp4
|
2018-04-06 13:17 |
138.2 MB |
| Rooting EVERY Android - From Extension to Exploitation - 2020.description
|
2022-04-22 01:41 |
517 B |
| Rooting EVERY Android - From Extension to Exploitation - 2020.info.json
|
2022-04-22 01:41 |
532.2 KB |
| Rooting EVERY Android - From Extension to Exploitation - 2020.mp4
|
2021-07-03 10:25 |
207.5 MB |
| Rough and Ready - Frameworks to Measure Persistent Engagement and Deterrence - 2020.description
|
2022-04-21 18:53 |
373 B |
| Rough and Ready - Frameworks to Measure Persistent Engagement and Deterrence - 2020.info.json
|
2022-04-21 18:53 |
265.6 KB |
| Rough and Ready - Frameworks to Measure Persistent Engagement and Deterrence - 2020.mp4
|
2019-12-11 15:58 |
101.4 MB |
| Running a Security Operations Center – Challenges, Solutions and Key Learnings - 2020.description
|
2022-04-21 22:38 |
623 B |
| Running a Security Operations Center – Challenges, Solutions and Key Learnings - 2020.info.json
|
2022-04-21 22:38 |
265.7 KB |
| Running a Security Operations Center – Challenges, Solutions and Key Learnings - 2020.mp4
|
2018-09-17 16:49 |
121.0 MB |
| RustZone - Writing Trusted Applications in Rust - 2020.description
|
2022-04-21 23:36 |
449 B |
| RustZone - Writing Trusted Applications in Rust - 2020.info.json
|
2022-04-21 23:36 |
632.0 KB |
| RustZone - Writing Trusted Applications in Rust - 2020.mp4
|
2019-03-04 19:01 |
104.6 MB |
| rVMI - A New Paradigm for Full System Analysis - 2020.description
|
2022-04-22 00:40 |
426 B |
| rVMI - A New Paradigm for Full System Analysis - 2020.info.json
|
2022-04-22 00:40 |
581.9 KB |
| rVMI - A New Paradigm for Full System Analysis - 2020.mp4
|
2017-10-31 13:47 |
92.0 MB |
| Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers - 2020.description
|
2022-04-21 23:04 |
511 B |
| Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers - 2020.info.json
|
2022-04-21 23:04 |
589.9 KB |
| Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers - 2020.mp4
|
2020-02-14 14:32 |
147.6 MB |
| SDL at Scale - Growing Security Champions - 2020.description
|
2022-04-21 20:46 |
643 B |
| SDL at Scale - Growing Security Champions - 2020.info.json
|
2022-04-21 20:46 |
266.6 KB |
| SDL at Scale - Growing Security Champions - 2020.mp4
|
2019-03-01 18:01 |
146.9 MB |
| SDL the Wont Break the Bank - 2020.description
|
2022-04-28 15:06 |
460 B |
| SDL the Wont Break the Bank - 2020.info.json
|
2022-04-28 15:06 |
625.9 KB |
| SDL the Wont Break the Bank - 2020.mp4
|
2020-02-11 23:22 |
245.1 MB |
| Secure Boot Under Attack - Simulation to Enhance Fault Attacks & Defenses - 2020.description
|
2022-04-21 20:22 |
656 B |
| Secure Boot Under Attack - Simulation to Enhance Fault Attacks & Defenses - 2020.info.json
|
2022-04-21 20:22 |
262.9 KB |
| Secure Boot Under Attack - Simulation to Enhance Fault Attacks & Defenses - 2020.mp4
|
2019-03-05 14:55 |
120.7 MB |
| Securely Implementing Network Protocols - Detecting and Preventing Logical Flaws - 2020.description
|
2022-04-22 01:06 |
332 B |
| Securely Implementing Network Protocols - Detecting and Preventing Logical Flaws - 2020.info.json
|
2022-04-22 01:06 |
792.6 KB |
| Securely Implementing Network Protocols - Detecting and Preventing Logical Flaws - 2020.mp4
|
2017-10-18 14:45 |
137.0 MB |
| Securing Apps in the Open-By-Default Cloud - 2020.description
|
2022-04-21 19:36 |
537 B |
| Securing Apps in the Open-By-Default Cloud - 2020.info.json
|
2022-04-21 19:36 |
265.4 KB |
| Securing Apps in the Open-By-Default Cloud - 2020.mp4
|
2019-12-11 18:46 |
83.7 MB |
| Securing the System - A Deep Dive into Reversing Android Pre-Installed Apps - 2020.description
|
2022-04-21 19:32 |
748 B |
| Securing the System - A Deep Dive into Reversing Android Pre-Installed Apps - 2020.info.json
|
2022-04-21 19:32 |
266.0 KB |
| Securing the System - A Deep Dive into Reversing Android Pre-Installed Apps - 2020.mp4
|
2019-12-11 18:10 |
126.2 MB |
| Securing Your In-Ear-Fitness Coach - Challenges in Hardening Next Generation Wearables - 2020.description
|
2022-04-28 16:11 |
583 B |
| Securing Your In-Ear-Fitness Coach - Challenges in Hardening Next Generation Wearables - 2020.info.json
|
2022-04-28 16:11 |
681.6 KB |
| Securing Your In-Ear-Fitness Coach - Challenges in Hardening Next Generation Wearables - 2020.mp4
|
2018-08-22 18:28 |
132.6 MB |
| Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds - 2020.description
|
2022-04-21 18:39 |
902 B |
| Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds - 2020.info.json
|
2022-04-21 18:39 |
357.0 KB |
| Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds - 2020.mp4
|
2020-03-17 16:54 |
167.6 MB |
| See Like a Bat - Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs - 2020.description
|
2022-04-21 19:55 |
566 B |
| See Like a Bat - Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs - 2020.info.json
|
2022-04-21 19:55 |
262.9 KB |
| See Like a Bat - Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs - 2020.mp4
|
2019-12-05 12:32 |
46.0 MB |
| Self-Verifying Authentication – A Framework For Safer Integrations of Single-Sign-On Services - 2020.description
|
2022-04-21 23:54 |
681 B |
| Self-Verifying Authentication – A Framework For Safer Integrations of Single-Sign-On Services - 2020.info.json
|
2022-04-21 23:54 |
699.2 KB |
| Self-Verifying Authentication – A Framework For Safer Integrations of Single-Sign-On Services - 2020.mp4
|
2018-04-06 12:57 |
113.8 MB |
| Selling 0-Days to Governments and Offensive Security Companies - 2020.description
|
2022-04-21 19:58 |
382 B |
| Selling 0-Days to Governments and Offensive Security Companies - 2020.info.json
|
2022-04-21 19:58 |
264.4 KB |
| Selling 0-Days to Governments and Offensive Security Companies - 2020.mp4
|
2019-12-11 16:18 |
79.3 MB |
| Sensor and Process Fingerprinting in Industrial Control Systems - 2020.description
|
2022-04-21 19:51 |
642 B |
| Sensor and Process Fingerprinting in Industrial Control Systems - 2020.info.json
|
2022-04-21 19:51 |
266.3 KB |
| Sensor and Process Fingerprinting in Industrial Control Systems - 2020.mp4
|
2019-12-02 13:31 |
133.8 MB |
| Shadow-Box v2 - The Practical and Omnipotent Sandbox for ARM - 2020.description
|
2022-04-21 23:20 |
619 B |
| Shadow-Box v2 - The Practical and Omnipotent Sandbox for ARM - 2020.info.json
|
2022-04-21 23:20 |
568.3 KB |
| Shadow-Box v2 - The Practical and Omnipotent Sandbox for ARM - 2020.mp4
|
2018-08-22 18:24 |
82.6 MB |
| Shifting Knowledge Left - Keeping up with Modern Application Security - 2020.description
|
2022-04-21 18:52 |
589 B |
| Shifting Knowledge Left - Keeping up with Modern Application Security - 2020.info.json
|
2022-04-21 18:52 |
266.1 KB |
| Shifting Knowledge Left - Keeping up with Modern Application Security - 2020.mp4
|
2019-12-11 19:36 |
114.1 MB |
| Side Channel Attacks in 4G and 5G Cellular Networks - 2020.description
|
2022-04-21 18:33 |
709 B |
| Side Channel Attacks in 4G and 5G Cellular Networks - 2020.info.json
|
2022-04-21 18:33 |
269.1 KB |
| Side Channel Attacks in 4G and 5G Cellular Networks - 2020.mp4
|
2020-03-18 16:02 |
65.0 MB |
| Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0 - 2020.description
|
2022-04-22 01:28 |
499 B |
| Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0 - 2020.info.json
|
2022-04-22 01:28 |
210.5 KB |
| Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0 - 2020.mp4
|
2021-07-01 09:33 |
142.5 MB |
| Simple Spyware - Androids Invisible Foreground Services and How to (Ab)use Them - 2020.description
|
2022-04-21 17:48 |
858 B |
| Simple Spyware - Androids Invisible Foreground Services and How to (Ab)use Them - 2020.info.json
|
2022-04-21 17:48 |
489.8 KB |
| Simple Spyware - Androids Invisible Foreground Services and How to (Ab)use Them - 2020.mp4
|
2020-03-20 12:30 |
107.2 MB |
| SirenJack - Cracking a 'Secure' Emergency Warning Siren System - 2020.description
|
2022-04-21 21:35 |
373 B |
| SirenJack - Cracking a 'Secure' Emergency Warning Siren System - 2020.info.json
|
2022-04-21 21:35 |
623.4 KB |
| SirenJack - Cracking a 'Secure' Emergency Warning Siren System - 2020.mp4
|
2020-03-31 08:45 |
228.2 MB |
| Skype & Type - Keystroke Leakage over VoIP - 2020.description
|
2022-04-28 16:31 |
557 B |
| Skype & Type - Keystroke Leakage over VoIP - 2020.info.json
|
2022-04-28 16:31 |
445.3 KB |
| Skype & Type - Keystroke Leakage over VoIP - 2020.mp4
|
2021-06-09 15:53 |
131.7 MB |
| Snooping on Cellular Gateways and Their Critical Role in ICS - 2020.description
|
2022-04-29 23:49 |
561 B |
| Snooping on Cellular Gateways and Their Critical Role in ICS - 2020.info.json
|
2022-04-29 23:49 |
583.7 KB |
| Snooping on Cellular Gateways and Their Critical Role in ICS - 2020.mp4
|
2020-02-19 06:56 |
223.6 MB |
| So I became a Domain Controller - 2020.description
|
2022-04-21 21:18 |
502 B |
| So I became a Domain Controller - 2020.info.json
|
2022-04-21 21:18 |
561.3 KB |
| So I became a Domain Controller - 2020.mp4
|
2020-03-28 23:36 |
278.6 MB |
| So You Want to Market Your Security Product... - 2020.description
|
2022-04-22 00:47 |
492 B |
| So You Want to Market Your Security Product... - 2020.info.json
|
2022-04-22 00:47 |
670.0 KB |
| So You Want to Market Your Security Product... - 2020.mp4
|
2017-10-31 12:53 |
90.3 MB |
| Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization - 2020.description
|
2022-04-22 00:59 |
410 B |
| Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization - 2020.info.json
|
2022-04-22 00:59 |
538.0 KB |
| Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization - 2020.mp4
|
2017-10-27 19:59 |
107.7 MB |
| Squeezing a Key through a Carry Bit - 2020.description
|
2022-04-28 15:12 |
417 B |
| Squeezing a Key through a Carry Bit - 2020.info.json
|
2022-04-28 15:12 |
585.8 KB |
| Squeezing a Key through a Carry Bit - 2020.mp4
|
2020-04-05 23:15 |
113.0 MB |
| SSO Wars - The Token Menace - 2020.description
|
2022-04-21 20:17 |
669 B |
| SSO Wars - The Token Menace - 2020.info.json
|
2022-04-21 20:17 |
264.5 KB |
| SSO Wars - The Token Menace - 2020.mp4
|
2019-11-27 14:10 |
91.5 MB |
| Stealth Mango and the Prevalence of Mobile Surveillanceware - 2020.description
|
2022-04-21 22:34 |
581 B |
| Stealth Mango and the Prevalence of Mobile Surveillanceware - 2020.info.json
|
2022-04-21 22:34 |
593.8 KB |
| Stealth Mango and the Prevalence of Mobile Surveillanceware - 2020.mp4
|
2020-02-19 12:50 |
225.2 MB |
| Stop that Release, There's a Vulnerability! - 2020.description
|
2022-04-21 21:42 |
487 B |
| Stop that Release, There's a Vulnerability! - 2020.info.json
|
2022-04-21 21:43 |
438.0 KB |
| Stop that Release, There's a Vulnerability! - 2020.mp4
|
2020-02-18 18:40 |
148.2 MB |
| Straight Outta VMware - Modern Exploitation of the SVGA Device for Guest-to-Host Escapes - 2020.description
|
2022-04-21 21:04 |
512 B |
| Straight Outta VMware - Modern Exploitation of the SVGA Device for Guest-to-Host Escapes - 2020.info.json
|
2022-04-21 21:04 |
262.5 KB |
| Straight Outta VMware - Modern Exploitation of the SVGA Device for Guest-to-Host Escapes - 2020.mp4
|
2019-03-05 13:29 |
142.9 MB |
| Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops - 2020.description
|
2022-04-28 15:24 |
386 B |
| Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops - 2020.info.json
|
2022-04-28 15:24 |
262.7 KB |
| Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops - 2020.mp4
|
2022-01-07 17:53 |
225.3 MB |
| Stress Testing Democracy Election Integrity During A Global Pandemic - 2020.description
|
2022-04-21 17:39 |
653 B |
| Stress Testing Democracy Election Integrity During A Global Pandemic - 2020.info.json
|
2022-04-21 17:39 |
267.0 KB |
| Stress Testing Democracy Election Integrity During A Global Pandemic - 2020.mp4
|
2020-11-05 13:00 |
276.5 MB |
| Stumping the Mobile Chipset - 2020.description
|
2022-04-22 01:52 |
456 B |
| Stumping the Mobile Chipset - 2020.info.json
|
2022-04-22 01:52 |
520.4 KB |
| Stumping the Mobile Chipset - 2020.mp4
|
2021-06-13 23:49 |
311.9 MB |
| Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology - 2020.description
|
2022-04-21 22:16 |
607 B |
| Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology - 2020.info.json
|
2022-04-21 22:16 |
263.9 KB |
| Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology - 2020.mp4
|
2021-01-08 23:04 |
171.1 MB |
| Tackling Privilege Escalation with Offense and Defense - 2020.description
|
2022-04-21 18:09 |
521 B |
| Tackling Privilege Escalation with Offense and Defense - 2020.info.json
|
2022-04-21 18:09 |
669.4 KB |
| Tackling Privilege Escalation with Offense and Defense - 2020.mp4
|
2020-03-18 18:52 |
169.9 MB |
| Taking DMA Attacks to the Next Level - 2020.description
|
2022-04-22 00:54 |
852 B |
| Taking DMA Attacks to the Next Level - 2020.info.json
|
2022-04-22 00:54 |
549.7 KB |
| Taking DMA Attacks to the Next Level - 2020.mp4
|
2017-10-27 19:14 |
70.1 MB |
| Taking Over the World Through MQTT - Aftermath - 2020.description
|
2022-04-22 00:44 |
539 B |
| Taking Over the World Through MQTT - Aftermath - 2020.info.json
|
2022-04-22 00:44 |
356.0 KB |
| Taking Over the World Through MQTT - Aftermath - 2020.mp4
|
2017-10-31 12:56 |
88.6 MB |
| Tales from the NOC - Going Public in Asia - 2020.description
|
2022-04-21 23:33 |
620 B |
| Tales from the NOC - Going Public in Asia - 2020.info.json
|
2022-04-21 23:33 |
631.0 KB |
| Tales from the NOC - Going Public in Asia - 2020.mp4
|
2018-08-22 18:25 |
99.8 MB |
| Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking - 2020.description
|
2022-04-22 01:56 |
751 B |
| Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking - 2020.info.json
|
2022-04-22 01:56 |
700.9 KB |
| Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking - 2020.mp4
|
2021-07-02 22:10 |
335.2 MB |
| Testing Your Organization's Social Media Awareness - 2020.description
|
2022-04-21 19:38 |
499 B |
| Testing Your Organization's Social Media Awareness - 2020.info.json
|
2022-04-21 19:38 |
264.6 KB |
| Testing Your Organization's Social Media Awareness - 2020.mp4
|
2019-12-11 14:40 |
47.1 MB |
| The Active Directory Botnet - 2020.description
|
2022-04-22 00:44 |
600 B |
| The Active Directory Botnet - 2020.info.json
|
2022-04-22 00:44 |
262.4 KB |
| The Active Directory Botnet - 2020.mp4
|
2020-01-08 14:32 |
94.0 MB |
| The Air-Gap Jumpers - 2020.description
|
2022-04-21 22:21 |
488 B |
| The Air-Gap Jumpers - 2020.info.json
|
2022-04-21 22:21 |
442.6 KB |
| The Air-Gap Jumpers - 2020.mp4
|
2020-03-24 16:50 |
108.5 MB |
| The Apple of Your EFI - An Updated Study of EFI Security - 2020.description
|
2022-04-21 23:50 |
742 B |
| The Apple of Your EFI - An Updated Study of EFI Security - 2020.info.json
|
2022-04-21 23:50 |
725.5 KB |
| The Apple of Your EFI - An Updated Study of EFI Security - 2020.mp4
|
2018-04-06 12:49 |
86.4 MB |
| The Art of Securing 100 Products - 2020.description
|
2022-04-22 00:51 |
514 B |
| The Art of Securing 100 Products - 2020.info.json
|
2022-04-22 00:51 |
624.6 KB |
| The Art of Securing 100 Products - 2020.mp4
|
2017-10-31 12:54 |
111.4 MB |
| The Avalanche Takedown - Landslide for Law Enforcement - 2020.description
|
2022-04-22 00:47 |
540 B |
| The Avalanche Takedown - Landslide for Law Enforcement - 2020.info.json
|
2022-04-22 00:47 |
585.0 KB |
| The Avalanche Takedown - Landslide for Law Enforcement - 2020.mp4
|
2021-11-13 06:31 |
266.5 MB |
| The Cost of Learning from the Best - How Prior Knowledge Weakens the Security of Deep Neural Networks - 2020.description
|
2022-04-21 19:47 |
551 B |
| The Cost of Learning from the Best - How Prior Knowledge Weakens the Security of Deep Neural Networks - 2020.info.json
|
2022-04-21 19:47 |
264.9 KB |
| The Cost of Learning from the Best - How Prior Knowledge Weakens the Security of Deep Neural Networks - 2020.mp4
|
2019-12-05 12:37 |
54.9 MB |
| The Cyber Shell Game – War, Information Warfare, and the Darkening Web - 2020.description
|
2022-04-21 19:50 |
621 B |
| The Cyber Shell Game – War, Information Warfare, and the Darkening Web - 2020.info.json
|
2022-04-21 19:50 |
264.6 KB |
| The Cyber Shell Game – War, Information Warfare, and the Darkening Web - 2020.mp4
|
2019-12-02 19:05 |
70.5 MB |
| The Devils in the Dependency Data Driven Software Composition Analysis - 2020.description
|
2022-04-21 17:40 |
706 B |
| The Devils in the Dependency Data Driven Software Composition Analysis - 2020.info.json
|
2022-04-21 17:40 |
267.4 KB |
| The Devils in the Dependency Data Driven Software Composition Analysis - 2020.mp4
|
2020-11-13 17:30 |
67.5 MB |
| The Discovery of a Government Malware and an Unexpected Spy Scandal - 2020.description
|
2022-04-21 19:33 |
626 B |
| The Discovery of a Government Malware and an Unexpected Spy Scandal - 2020.info.json
|
2022-04-21 19:33 |
265.7 KB |
| The Discovery of a Government Malware and an Unexpected Spy Scandal - 2020.mp4
|
2019-12-11 18:37 |
98.3 MB |
| The Enemy Within - Modern Supply Chain Attacks - 2020.description
|
2022-04-21 18:56 |
549 B |
| The Enemy Within - Modern Supply Chain Attacks - 2020.info.json
|
2022-04-21 18:56 |
266.0 KB |
| The Enemy Within - Modern Supply Chain Attacks - 2020.mp4
|
2019-12-11 15:50 |
122.4 MB |
| The Excellent Adventure of XDR – Where is it Going - 2020.description
|
2022-04-21 17:41 |
223 B |
| The Excellent Adventure of XDR – Where is it Going - 2020.info.json
|
2022-04-21 17:41 |
264.0 KB |
| The Excellent Adventure of XDR – Where is it Going - 2020.mp4
|
2020-10-21 15:04 |
90.0 MB |
| The Finest Penetration Testing Framework for Software-Defined Networks - 2020.description
|
2022-04-21 21:20 |
371 B |
| The Finest Penetration Testing Framework for Software-Defined Networks - 2020.info.json
|
2022-04-21 21:20 |
581.1 KB |
| The Finest Penetration Testing Framework for Software-Defined Networks - 2020.mp4
|
2020-04-08 07:55 |
181.2 MB |
| The Future of ApplePwn - How to Save Your Money - 2020.description
|
2022-04-22 00:35 |
352 B |
| The Future of ApplePwn - How to Save Your Money - 2020.info.json
|
2022-04-22 00:35 |
415.5 KB |
| The Future of ApplePwn - How to Save Your Money - 2020.mp4
|
2017-10-31 13:38 |
50.4 MB |
| The Future of ATO - 2020.description
|
2022-04-21 19:03 |
492 B |
| The Future of ATO - 2020.info.json
|
2022-04-21 19:03 |
265.9 KB |
| The Future of ATO - 2020.mp4
|
2019-12-11 18:55 |
91.3 MB |
| The Last Line of Defense - Understanding and Attacking Apple File System on iOS - 2020.description
|
2022-04-21 21:02 |
608 B |
| The Last Line of Defense - Understanding and Attacking Apple File System on iOS - 2020.info.json
|
2022-04-21 21:02 |
261.4 KB |
| The Last Line of Defense - Understanding and Attacking Apple File System on iOS - 2020.mp4
|
2019-03-04 17:48 |
64.4 MB |
| The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data - 2020.description
|
2022-04-22 00:45 |
501 B |
| The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data - 2020.info.json
|
2022-04-22 00:45 |
592.9 KB |
| The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data - 2020.mp4
|
2021-07-07 07:08 |
288.4 MB |
| The Most Secure Browser Pwning Chrome from 2016 to 2019 - 2020.description
|
2022-04-21 20:20 |
593 B |
| The Most Secure Browser Pwning Chrome from 2016 to 2019 - 2020.info.json
|
2022-04-21 20:20 |
265.6 KB |
| The Most Secure Browser Pwning Chrome from 2016 to 2019 - 2020.mp4
|
2019-11-27 14:42 |
74.7 MB |
| The Mummy 2018 – Microsoft Accidentally Summons Back Ugly Attacks from the Past - 2020.description
|
2022-04-21 20:47 |
437 B |
| The Mummy 2018 – Microsoft Accidentally Summons Back Ugly Attacks from the Past - 2020.info.json
|
2022-04-21 20:47 |
261.1 KB |
| The Mummy 2018 – Microsoft Accidentally Summons Back Ugly Attacks from the Past - 2020.mp4
|
2019-03-06 12:41 |
49.6 MB |
| The Origin of Array [@@species] - How Standards Drive Bugs in Script Engines - 2020.description
|
2022-04-22 00:36 |
573 B |
| The Origin of Array [@@species] - How Standards Drive Bugs in Script Engines - 2020.info.json
|
2022-04-22 00:36 |
559.0 KB |
| The Origin of Array [@@species] - How Standards Drive Bugs in Script Engines - 2020.mp4
|
2021-11-11 21:37 |
233.3 MB |
| The Power of Data-Oriented Attacks - 2020.description
|
2022-04-22 01:00 |
828 B |
| The Power of Data-Oriented Attacks - 2020.info.json
|
2022-04-22 01:00 |
780.7 KB |
| The Power of Data-Oriented Attacks - 2020.mp4
|
2020-03-01 20:40 |
188.4 MB |
| The Problems and Promise of WebAssembly - 2020.description
|
2022-04-21 22:34 |
374 B |
| The Problems and Promise of WebAssembly - 2020.info.json
|
2022-04-21 22:34 |
425.9 KB |
| The Problems and Promise of WebAssembly - 2020.mp4
|
2020-10-30 09:30 |
57.8 MB |
| The Science of Hiring and Retaining Female Cybersecurity Engineers - 2020.description
|
2022-04-21 21:37 |
459 B |
| The Science of Hiring and Retaining Female Cybersecurity Engineers - 2020.info.json
|
2022-04-21 21:37 |
615.3 KB |
| The Science of Hiring and Retaining Female Cybersecurity Engineers - 2020.mp4
|
2020-02-23 01:53 |
337.2 MB |
| The Shadow Brokers - Cyber Fear Game-Changers - 2020.description
|
2022-04-22 00:06 |
571 B |
| The Shadow Brokers - Cyber Fear Game-Changers - 2020.info.json
|
2022-04-22 00:06 |
465.6 KB |
| The Shadow Brokers - Cyber Fear Game-Changers - 2020.mp4
|
2017-10-31 13:36 |
57.5 MB |
| The UEFI Firmware Rootkits - Myths and Reality - 2020.description
|
2022-04-22 01:05 |
821 B |
| The UEFI Firmware Rootkits - Myths and Reality - 2020.info.json
|
2022-04-22 01:05 |
652.0 KB |
| The UEFI Firmware Rootkits - Myths and Reality - 2020.mp4
|
2021-06-28 08:45 |
436.6 MB |
| The Unbearable Lightness of BMC's - 2020.description
|
2022-04-21 22:40 |
357 B |
| The Unbearable Lightness of BMC's - 2020.info.json
|
2022-04-21 22:40 |
626.4 KB |
| The Unbearable Lightness of BMC's - 2020.mp4
|
2020-04-02 23:47 |
213.5 MB |
| The Undeniable Truth - 2020.description
|
2022-04-21 20:55 |
559 B |
| The Undeniable Truth - 2020.info.json
|
2022-04-21 20:55 |
264.9 KB |
| The Undeniable Truth - 2020.mp4
|
2019-03-04 15:53 |
83.8 MB |
| There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently - 2020.description
|
2022-04-21 22:42 |
536 B |
| There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently - 2020.info.json
|
2022-04-21 22:42 |
611.6 KB |
| There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently - 2020.mp4
|
2020-02-21 11:24 |
103.0 MB |
| Thermanator and the Thermal Residue Attack - 2020.description
|
2022-04-21 20:46 |
550 B |
| Thermanator and the Thermal Residue Attack - 2020.info.json
|
2022-04-21 20:46 |
261.2 KB |
| Thermanator and the Thermal Residue Attack - 2020.mp4
|
2019-03-06 12:45 |
78.3 MB |
| They're Coming for Your Tools - Exploiting Design Flaws for Active Intrusion Prevention - 2020.description
|
2022-04-22 00:51 |
544 B |
| They're Coming for Your Tools - Exploiting Design Flaws for Active Intrusion Prevention - 2020.info.json
|
2022-04-22 00:51 |
261.2 KB |
| They're Coming for Your Tools - Exploiting Design Flaws for Active Intrusion Prevention - 2020.mp4
|
2017-10-27 18:15 |
35.8 MB |
| Thinking Outside the JIT Compiler - 2020.description
|
2022-04-21 18:05 |
711 B |
| Thinking Outside the JIT Compiler - 2020.info.json
|
2022-04-21 18:05 |
459.3 KB |
| Thinking Outside the JIT Compiler - 2020.mp4
|
2020-03-19 17:33 |
46.4 MB |
| Those Don't Matter! Effective Prioritization Through Exploit Prediction - 2020.description
|
2022-04-21 22:52 |
562 B |
| Those Don't Matter! Effective Prioritization Through Exploit Prediction - 2020.info.json
|
2022-04-21 22:52 |
267.8 KB |
| Those Don't Matter! Effective Prioritization Through Exploit Prediction - 2020.mp4
|
2018-09-17 17:37 |
113.9 MB |
| Threat Modeling in 2018 - Attacks, Impacts and Other Updates - 2020.description
|
2022-04-21 22:47 |
380 B |
| Threat Modeling in 2018 - Attacks, Impacts and Other Updates - 2020.info.json
|
2022-04-21 22:47 |
262.3 KB |
| Threat Modeling in 2018 - Attacks, Impacts and Other Updates - 2020.mp4
|
2018-11-13 18:43 |
69.0 MB |
| TLBleed - When Protecting Your CPU Caches is Not Enough - 2020.description
|
2022-04-21 21:10 |
362 B |
| TLBleed - When Protecting Your CPU Caches is Not Enough - 2020.info.json
|
2022-04-21 21:10 |
632.3 KB |
| TLBleed - When Protecting Your CPU Caches is Not Enough - 2020.mp4
|
2020-04-07 09:28 |
157.8 MB |
| Towards a Policy-Agnostic Control-Flow Integrity Implementation - 2020.description
|
2022-04-22 01:43 |
531 B |
| Towards a Policy-Agnostic Control-Flow Integrity Implementation - 2020.info.json
|
2022-04-22 01:43 |
627.9 KB |
| Towards a Policy-Agnostic Control-Flow Integrity Implementation - 2020.mp4
|
2020-02-21 13:37 |
151.8 MB |
| Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime - 2020.description
|
2022-04-21 18:53 |
472 B |
| Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime - 2020.info.json
|
2022-04-21 18:53 |
265.1 KB |
| Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime - 2020.mp4
|
2019-12-11 18:05 |
59.5 MB |
| Transparency in the Software Supply Chain - Making SBOM a Reality - 2020.description
|
2022-04-21 19:58 |
518 B |
| Transparency in the Software Supply Chain - Making SBOM a Reality - 2020.info.json
|
2022-04-21 19:58 |
263.2 KB |
| Transparency in the Software Supply Chain - Making SBOM a Reality - 2020.mp4
|
2019-12-03 16:14 |
43.9 MB |
| Trust in Apple's Secret Garden - Exploring & Reversing Apple's Continuity Protocol - 2020.description
|
2022-04-21 18:02 |
605 B |
| Trust in Apple's Secret Garden - Exploring & Reversing Apple's Continuity Protocol - 2020.info.json
|
2022-04-21 18:02 |
604.2 KB |
| Trust in Apple's Secret Garden - Exploring & Reversing Apple's Continuity Protocol - 2020.mp4
|
2020-03-19 17:51 |
120.5 MB |
| UbootKit - A Worm Attack for the Bootloader of IoT Devices - 2020.description
|
2022-04-21 23:22 |
456 B |
| UbootKit - A Worm Attack for the Bootloader of IoT Devices - 2020.info.json
|
2022-04-21 23:22 |
667.4 KB |
| UbootKit - A Worm Attack for the Bootloader of IoT Devices - 2020.mp4
|
2018-08-22 18:23 |
70.4 MB |
| Understanding and Exploiting Implanted Medical Devices - 2020.description
|
2022-04-21 21:05 |
553 B |
| Understanding and Exploiting Implanted Medical Devices - 2020.info.json
|
2022-04-21 21:05 |
611.2 KB |
| Understanding and Exploiting Implanted Medical Devices - 2020.mp4
|
2020-03-27 19:09 |
186.6 MB |
| Understanding the IoT Threat Landscape - 2020.description
|
2022-04-21 18:32 |
568 B |
| Understanding the IoT Threat Landscape - 2020.info.json
|
2022-04-21 18:32 |
514.9 KB |
| Understanding the IoT Threat Landscape - 2020.mp4
|
2020-03-18 16:06 |
151.0 MB |
| Unleashing the Power of My 20+ Years Old Car - 2020.description
|
2022-04-21 18:32 |
480 B |
| Unleashing the Power of My 20+ Years Old Car - 2020.info.json
|
2022-04-21 18:32 |
263.9 KB |
| Unleashing the Power of My 20+ Years Old Car - 2020.mp4
|
2020-03-18 19:15 |
90.2 MB |
| Unpacking the Packed Unpacker - Reverse Engineering an Android Anti-Analysis Native Library - 2020.description
|
2022-04-21 21:08 |
307 B |
| Unpacking the Packed Unpacker - Reverse Engineering an Android Anti-Analysis Native Library - 2020.info.json
|
2022-04-21 21:08 |
545.3 KB |
| Unpacking the Packed Unpacker - Reverse Engineering an Android Anti-Analysis Native Library - 2020.mp4
|
2020-03-28 01:22 |
135.8 MB |
| Unveiling the Underground World of Anti-Cheats - 2020.description
|
2022-04-21 18:46 |
462 B |
| Unveiling the Underground World of Anti-Cheats - 2020.info.json
|
2022-04-21 18:46 |
265.1 KB |
| Unveiling the Underground World of Anti-Cheats - 2020.mp4
|
2019-12-19 11:13 |
137.4 MB |
| Use-After-Use-After-Free - Exploit UAF by Generating Your Own - 2020.description
|
2022-04-22 01:54 |
501 B |
| Use-After-Use-After-Free - Exploit UAF by Generating Your Own - 2020.info.json
|
2022-04-22 01:54 |
517.8 KB |
| Use-After-Use-After-Free - Exploit UAF by Generating Your Own - 2020.mp4
|
2021-06-18 22:10 |
192.1 MB |
| Video Killed the Text Star - OSINT Approach - 2020.description
|
2022-04-21 20:58 |
648 B |
| Video Killed the Text Star - OSINT Approach - 2020.info.json
|
2022-04-21 20:58 |
262.1 KB |
| Video Killed the Text Star - OSINT Approach - 2020.mp4
|
2019-03-04 17:07 |
168.7 MB |
| We Went to Iowa and All We Got were These Felony Arrest Records - 2020.description
|
2022-04-21 17:40 |
448 B |
| We Went to Iowa and All We Got were These Felony Arrest Records - 2020.info.json
|
2022-04-21 17:40 |
265.0 KB |
| We Went to Iowa and All We Got were These Felony Arrest Records - 2020.mp4
|
2020-11-13 17:11 |
172.2 MB |
| WebAssembly - A New World of Native Exploits on the Browser - 2020.description
|
2022-04-21 21:22 |
487 B |
| WebAssembly - A New World of Native Exploits on the Browser - 2020.info.json
|
2022-04-21 21:22 |
583.8 KB |
| WebAssembly - A New World of Native Exploits on the Browser - 2020.mp4
|
2020-03-23 21:16 |
252.3 MB |
| WebAuthn 101 - Demystifying WebAuthn - 2020.description
|
2022-04-21 19:23 |
460 B |
| WebAuthn 101 - Demystifying WebAuthn - 2020.info.json
|
2022-04-21 19:23 |
264.6 KB |
| WebAuthn 101 - Demystifying WebAuthn - 2020.mp4
|
2019-12-11 15:44 |
64.9 MB |
| Webcast - A Surprise Trip to Zero-Trust Land - 2020.description
|
2022-04-21 17:45 |
402 B |
| Webcast - A Surprise Trip to Zero-Trust Land - 2020.info.json
|
2022-04-21 17:45 |
263.1 KB |
| Webcast - A Surprise Trip to Zero-Trust Land - 2020.mp4
|
2020-06-19 13:57 |
104.1 MB |
| Welcome & Introduction to Black Hat Asia 2017 - 2020.description
|
2022-04-22 01:20 |
12 B |
| Welcome & Introduction to Black Hat Asia 2017 - 2020.info.json
|
2022-04-22 01:20 |
427.5 KB |
| Welcome & Introduction to Black Hat Asia 2017 - 2020.mp4
|
2018-03-03 09:15 |
197.2 MB |
| What the Fuzz - 2020.description
|
2022-04-21 18:31 |
404 B |
| What the Fuzz - 2020.info.json
|
2022-04-21 18:31 |
464.8 KB |
| What the Fuzz - 2020.mp4
|
2020-03-18 16:51 |
130.7 MB |
| When Everyone's Dog is Named Fluffy - 2020.description
|
2022-04-21 20:44 |
525 B |
| When Everyone's Dog is Named Fluffy - 2020.info.json
|
2022-04-21 20:44 |
262.3 KB |
| When Everyone's Dog is Named Fluffy - 2020.mp4
|
2019-03-04 17:15 |
51.2 MB |
| When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins - 2020.description
|
2022-04-21 23:18 |
567 B |
| When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins - 2020.info.json
|
2022-04-21 23:18 |
676.6 KB |
| When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins - 2020.mp4
|
2018-08-21 16:19 |
67.4 MB |
| When IoT Attacks - Understanding the Safety Risks Associated with Connected Devices - 2020.description
|
2022-04-22 00:49 |
586 B |
| When IoT Attacks - Understanding the Safety Risks Associated with Connected Devices - 2020.info.json
|
2022-04-22 00:49 |
571.6 KB |
| When IoT Attacks - Understanding the Safety Risks Associated with Connected Devices - 2020.mp4
|
2021-06-24 15:17 |
340.7 MB |
| When Machines Can't Talk - 2020.description
|
2022-04-21 20:44 |
478 B |
| When Machines Can't Talk - 2020.info.json
|
2022-04-21 20:44 |
262.5 KB |
| When Machines Can't Talk - 2020.mp4
|
2019-03-05 18:02 |
169.5 MB |
| When Minutes Count - Speed and Accuracy During Incident Response - 2020.description
|
2022-04-21 17:41 |
253 B |
| When Minutes Count - Speed and Accuracy During Incident Response - 2020.info.json
|
2022-04-21 17:41 |
344.8 KB |
| When Minutes Count - Speed and Accuracy During Incident Response - 2020.mp4
|
2020-07-16 22:42 |
57.5 MB |
| When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL - 2020.description
|
2022-04-22 01:25 |
733 B |
| When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL - 2020.info.json
|
2022-04-22 01:25 |
484.1 KB |
| When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL - 2020.mp4
|
2020-03-28 07:06 |
52.6 MB |
| Where 2 Worlds Collide - Bringing Mimikatz et al to UNIX - 2020.description
|
2022-04-21 20:23 |
590 B |
| Where 2 Worlds Collide - Bringing Mimikatz et al to UNIX - 2020.info.json
|
2022-04-21 20:23 |
262.3 KB |
| Where 2 Worlds Collide - Bringing Mimikatz et al to UNIX - 2020.mp4
|
2019-03-04 15:31 |
91.2 MB |
| Why so Spurious Achieving Local Privilege Escalation on Operating Systems - 2020.description
|
2022-04-21 22:22 |
679 B |
| Why so Spurious Achieving Local Privilege Escalation on Operating Systems - 2020.info.json
|
2022-04-21 22:22 |
604.8 KB |
| Why so Spurious Achieving Local Privilege Escalation on Operating Systems - 2020.mp4
|
2020-02-20 17:16 |
170.5 MB |
| Why the World Must Take Notice of the Rising Asian Dark Web - 2020.description
|
2022-04-21 22:55 |
486 B |
| Why the World Must Take Notice of the Rising Asian Dark Web - 2020.info.json
|
2022-04-21 22:55 |
265.6 KB |
| Why the World Must Take Notice of the Rising Asian Dark Web - 2020.mp4
|
2018-09-17 17:12 |
101.8 MB |
| Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations - 2020.description
|
2022-04-21 23:42 |
681 B |
| Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations - 2020.info.json
|
2022-04-21 23:42 |
688.8 KB |
| Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations - 2020.mp4
|
2018-04-06 13:43 |
80.7 MB |
| WiFi-Based IMSI Catcher - 2020.description
|
2022-04-22 01:50 |
456 B |
| WiFi-Based IMSI Catcher - 2020.info.json
|
2022-04-22 01:50 |
745.3 KB |
| WiFi-Based IMSI Catcher - 2020.mp4
|
2020-03-09 10:58 |
123.6 MB |
| Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet - 2020.description
|
2022-04-21 22:21 |
557 B |
| Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet - 2020.info.json
|
2022-04-21 22:21 |
265.6 KB |
| Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet - 2020.mp4
|
2018-11-13 05:50 |
84.1 MB |
| Windows Offender - Reverse Engineering Windows Defender's Antivirus Emulator - 2020.description
|
2022-04-28 14:12 |
470 B |
| Windows Offender - Reverse Engineering Windows Defender's Antivirus Emulator - 2020.info.json
|
2022-04-28 14:12 |
606.8 KB |
| Windows Offender - Reverse Engineering Windows Defender's Antivirus Emulator - 2020.mp4
|
2020-03-28 05:31 |
371.6 MB |
| Winter is Coming Back - 2020.description
|
2022-04-21 19:59 |
566 B |
| Winter is Coming Back - 2020.info.json
|
2022-04-21 19:59 |
265.3 KB |
| Winter is Coming Back - 2020.mp4
|
2019-12-05 12:27 |
89.2 MB |
| Wire Me Through Machine Learning - 2020.description
|
2022-04-22 01:06 |
479 B |
| Wire Me Through Machine Learning - 2020.info.json
|
2022-04-22 01:06 |
261.0 KB |
| Wire Me Through Machine Learning - 2020.mp4
|
2017-10-27 17:54 |
42.2 MB |
| WireGuard - Next Generation Secure Network Tunnel - 2020.description
|
2022-04-21 21:43 |
513 B |
| WireGuard - Next Generation Secure Network Tunnel - 2020.info.json
|
2022-04-21 21:43 |
619.1 KB |
| WireGuard - Next Generation Secure Network Tunnel - 2020.mp4
|
2020-02-16 15:02 |
191.9 MB |
| Women in Security - Building a Female InfoSec Community in Korea, Japan, and Taiwan - 2020.description
|
2022-04-21 19:33 |
634 B |
| Women in Security - Building a Female InfoSec Community in Korea, Japan, and Taiwan - 2020.info.json
|
2022-04-21 19:33 |
267.1 KB |
| Women in Security - Building a Female InfoSec Community in Korea, Japan, and Taiwan - 2020.mp4
|
2019-12-11 16:36 |
124.6 MB |
| Worm Charming - Harvesting Malware Lures for Fun and Profit - 2020.description
|
2022-04-21 19:56 |
576 B |
| Worm Charming - Harvesting Malware Lures for Fun and Profit - 2020.info.json
|
2022-04-21 19:56 |
266.1 KB |
| Worm Charming - Harvesting Malware Lures for Fun and Profit - 2020.mp4
|
2019-12-02 15:35 |
106.2 MB |
| WSUSpendu - How to Hang WSUS Clients - 2020.description
|
2022-04-22 00:52 |
395 B |
| WSUSpendu - How to Hang WSUS Clients - 2020.info.json
|
2022-04-22 00:52 |
625.0 KB |
| WSUSpendu - How to Hang WSUS Clients - 2020.mp4
|
2017-10-31 13:10 |
86.4 MB |
| XOM-switch - Hiding Your Code from Advanced Code Reuse Attacks In One Shot - 2020.description
|
2022-04-21 23:34 |
529 B |
| XOM-switch - Hiding Your Code from Advanced Code Reuse Attacks In One Shot - 2020.info.json
|
2022-04-21 23:34 |
648.0 KB |
| XOM-switch - Hiding Your Code from Advanced Code Reuse Attacks In One Shot - 2020.mp4
|
2018-08-22 18:16 |
44.7 MB |
| Your Voice is My Passport - 2020.description
|
2022-04-21 22:02 |
458 B |
| Your Voice is My Passport - 2020.info.json
|
2022-04-21 22:02 |
522.7 KB |
| Your Voice is My Passport - 2020.mp4
|
2020-04-07 15:29 |
271.5 MB |
| Zero Trust Starts with Identity - 2020.description
|
2022-04-21 17:45 |
212 B |
| Zero Trust Starts with Identity - 2020.info.json
|
2022-04-21 17:45 |
263.9 KB |
| Zero Trust Starts with Identity - 2020.mp4
|
2020-06-19 13:28 |
33.1 MB |
| ZEROing Trust - Do Zero Trust Approaches Deliver Real Security - 2020.description
|
2022-04-21 21:47 |
471 B |
| ZEROing Trust - Do Zero Trust Approaches Deliver Real Security - 2020.info.json
|
2022-04-21 21:47 |
638.1 KB |
| ZEROing Trust - Do Zero Trust Approaches Deliver Real Security - 2020.mp4
|
2020-03-28 08:33 |
139.0 MB |
| Zombie Ant Farming - Practical Tips for Playing Hide and Seek with Linux EDRs - 2020.description
|
2022-04-21 19:18 |
645 B |
| Zombie Ant Farming - Practical Tips for Playing Hide and Seek with Linux EDRs - 2020.info.json
|
2022-04-21 19:18 |
265.8 KB |
| Zombie Ant Farming - Practical Tips for Playing Hide and Seek with Linux EDRs - 2020.mp4
|
2019-12-11 17:08 |
102.2 MB |
| Zombie POODLE, GOLDENDOODLE, and How TLSv1.3 Can Save Us All - 2020.description
|
2022-04-21 20:50 |
645 B |
| Zombie POODLE, GOLDENDOODLE, and How TLSv1.3 Can Save Us All - 2020.info.json
|
2022-04-21 20:50 |
265.4 KB |
| Zombie POODLE, GOLDENDOODLE, and How TLSv1.3 Can Save Us All - 2020.mp4
|
2019-04-22 13:05 |
125.2 MB |