neuroky.me file explorer

neu·ro·kyme

public share-first archive

See also:
  1. neuroky.me - home
  2. /public - files that anyone can download
  3. sftp ftp.neuroky.me - this archive is accessible over sftp

Index of /youtube.com/Black Hat - Videos/2021


Upload to /youtube.com/Black Hat - Videos/2021

0%
Name ▲ Modified Size
↑ Parent Directory
'We Are About to Land' - How CloudDragon Turns a Nightmare Into Reality - 2021.description 2022-04-21 14:47 875 B
'We Are About to Land' - How CloudDragon Turns a Nightmare Into Reality - 2021.info.json 2022-04-21 14:47 265.4 KB
'We Are About to Land' - How CloudDragon Turns a Nightmare Into Reality - 2021.mp4 2021-09-01 16:01 86.5 MB
(Un)protected Broadcasts in Android 9 and 10 - 2021.description 2022-04-21 15:03 844 B
(Un)protected Broadcasts in Android 9 and 10 - 2021.info.json 2022-04-21 15:03 265.5 KB
(Un)protected Broadcasts in Android 9 and 10 - 2021.mp4 2021-09-01 13:40 63.0 MB
20+ Ways to Bypass Your macOS Privacy Mechanisms - 2021.description 2022-04-21 13:14 767 B
20+ Ways to Bypass Your macOS Privacy Mechanisms - 2021.info.json 2022-04-21 13:14 265.4 KB
20+ Ways to Bypass Your macOS Privacy Mechanisms - 2021.mp4 2021-12-06 21:51 111.7 MB
3d Red Pill - A Guest-to-Host Escape on QEMU_KVM Virtio Device - 2021.description 2022-04-21 16:01 376 B
3d Red Pill - A Guest-to-Host Escape on QEMU_KVM Virtio Device - 2021.info.json 2022-04-21 16:01 501.0 KB
3d Red Pill - A Guest-to-Host Escape on QEMU_KVM Virtio Device - 2021.mp4 2021-02-27 01:49 79.3 MB
5G IMSI Catchers Mirage5G IMSI Catchers Mirage - 2021.description 2022-04-21 12:59 732 B
5G IMSI Catchers Mirage5G IMSI Catchers Mirage - 2021.info.json 2022-04-21 12:59 265.5 KB
5G IMSI Catchers Mirage5G IMSI Catchers Mirage - 2021.mp4 2021-12-06 19:11 109.8 MB
A Broken Chain - Discovering OPC UA Attack Surface and Exploiting the Supply Chain - 2021.description 2022-04-21 13:03 613 B
A Broken Chain - Discovering OPC UA Attack Surface and Exploiting the Supply Chain - 2021.info.json 2022-04-21 13:03 264.8 KB
A Broken Chain - Discovering OPC UA Attack Surface and Exploiting the Supply Chain - 2021.mp4 2021-12-07 04:57 70.0 MB
A Decade After Stuxnet's Printer Vulnerability - Printing is Still the Stairway to Heaven - 2021.description 2022-04-21 16:33 688 B
A Decade After Stuxnet's Printer Vulnerability - Printing is Still the Stairway to Heaven - 2021.info.json 2022-04-21 16:33 598.2 KB
A Decade After Stuxnet's Printer Vulnerability - Printing is Still the Stairway to Heaven - 2021.mp4 2021-01-20 16:50 94.0 MB
A Framework for Evaluating and Patching the Human Factor in Cybersecurity - 2021.description 2022-04-21 16:57 708 B
A Framework for Evaluating and Patching the Human Factor in Cybersecurity - 2021.info.json 2022-04-21 16:57 453.0 KB
A Framework for Evaluating and Patching the Human Factor in Cybersecurity - 2021.mp4 2021-01-20 00:52 68.3 MB
A General Approach to Bypassing Many Kernel Protections and its Mitigation - 2021.description 2022-04-21 15:03 509 B
A General Approach to Bypassing Many Kernel Protections and its Mitigation - 2021.info.json 2022-04-21 15:03 613.0 KB
A General Approach to Bypassing Many Kernel Protections and its Mitigation - 2021.mp4 2021-08-19 14:15 111.2 MB
A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning - 2021.description 2022-04-21 16:44 731 B
A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning - 2021.info.json 2022-04-21 16:44 650.7 KB
A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning - 2021.mp4 2021-01-19 20:19 126.3 MB
A Hole in the Tube - Uncovering Vulnerabilities in Critical Infrastructure of Healthcare Facilities - 2021.description 2022-04-21 13:03 1.4 KB
A Hole in the Tube - Uncovering Vulnerabilities in Critical Infrastructure of Healthcare Facilities - 2021.info.json 2022-04-21 13:03 266.0 KB
A Hole in the Tube - Uncovering Vulnerabilities in Critical Infrastructure of Healthcare Facilities - 2021.mp4 2021-12-06 20:02 80.3 MB
A Little Less Speculation, a Little More Action - Deep Dive into Fuchsia's Mitigations for CPU Side.. - 2021.description 2022-04-21 17:25 1.2 KB
A Little Less Speculation, a Little More Action - Deep Dive into Fuchsia's Mitigations for CPU Side.. - 2021.info.json 2022-04-21 17:25 595.6 KB
A Little Less Speculation, a Little More Action - Deep Dive into Fuchsia's Mitigations for CPU Side.. - 2021.mp4 2021-01-20 07:06 94.7 MB
A Look Ahead at Cyber Security in 2021 - 2021.description 2022-04-21 17:35 257 B
A Look Ahead at Cyber Security in 2021 - 2021.info.json 2022-04-21 17:35 347.6 KB
A Look Ahead at Cyber Security in 2021 - 2021.mp4 2021-02-16 12:47 50.3 MB
A Mirage of Safety - Bug Finding & Exploit Techniques of Top Android Vendor's Privacy Protection Apps - 2021.description 2022-04-21 14:56 611 B
A Mirage of Safety - Bug Finding & Exploit Techniques of Top Android Vendor's Privacy Protection Apps - 2021.info.json 2022-04-21 14:56 264.5 KB
A Mirage of Safety - Bug Finding & Exploit Techniques of Top Android Vendor's Privacy Protection Apps - 2021.mp4 2021-09-01 18:16 74.0 MB
A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms - 2021.description 2022-04-21 13:14 1.1 KB
A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms - 2021.info.json 2022-04-21 13:14 265.3 KB
A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms - 2021.mp4 2021-12-06 23:37 93.4 MB
A New Era of One-Click Attacks - How to Break Install-Less Apps - 2021.description 2022-04-21 14:37 958 B
A New Era of One-Click Attacks - How to Break Install-Less Apps - 2021.info.json 2022-04-21 14:37 264.9 KB
A New Era of One-Click Attacks - How to Break Install-Less Apps - 2021.mp4 2021-09-01 12:12 69.6 MB
A New Hope - The One Last Chance to Save Your SSD Data - 2021.description 2022-04-21 15:38 522 B
A New Hope - The One Last Chance to Save Your SSD Data - 2021.info.json 2022-04-21 15:38 577.4 KB
A New Hope - The One Last Chance to Save Your SSD Data - 2021.mp4 2021-04-06 12:29 158.4 MB
A Survivor-Centric, Trauma-Informed Approach to Stalkerware - 2021.description 2022-04-21 13:11 590 B
A Survivor-Centric, Trauma-Informed Approach to Stalkerware - 2021.info.json 2022-04-21 13:11 264.4 KB
A Survivor-Centric, Trauma-Informed Approach to Stalkerware - 2021.mp4 2021-12-06 23:45 68.5 MB
A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices - 2021.description 2022-04-21 15:02 693 B
A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices - 2021.info.json 2022-04-21 15:02 264.7 KB
A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices - 2021.mp4 2021-09-01 16:01 75.7 MB
About Directed Fuzzing and Use-After-Free - How to Find Complex & Silent Bugs - 2021.description 2022-04-21 16:47 528 B
About Directed Fuzzing and Use-After-Free - How to Find Complex & Silent Bugs - 2021.info.json 2022-04-21 16:47 527.6 KB
About Directed Fuzzing and Use-After-Free - How to Find Complex & Silent Bugs - 2021.mp4 2021-01-19 22:46 107.7 MB
Action Bias and the Two Most Dangerous Words in Cybersecurity - 2021.description 2022-04-21 13:12 659 B
Action Bias and the Two Most Dangerous Words in Cybersecurity - 2021.info.json 2022-04-21 13:12 264.8 KB
Action Bias and the Two Most Dangerous Words in Cybersecurity - 2021.mp4 2021-12-07 00:11 102.7 MB
Active Directory Security in the Cloud Age - 2021.description 2022-04-21 14:34 51 B
Active Directory Security in the Cloud Age - 2021.info.json 2022-04-21 14:34 263.7 KB
Active Directory Security in the Cloud Age - 2021.mp4 2021-10-18 14:59 60.3 MB
Adversary Detection Pipelines - Finally Making Your Threat Intel Useful - 2021.description 2022-04-21 16:06 375 B
Adversary Detection Pipelines - Finally Making Your Threat Intel Useful - 2021.info.json 2022-04-21 16:06 265.1 KB
Adversary Detection Pipelines - Finally Making Your Threat Intel Useful - 2021.mp4 2021-02-26 21:35 170.0 MB
Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet - 2021.description 2022-04-21 14:57 624 B
Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet - 2021.info.json 2022-04-21 14:57 266.1 KB
Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet - 2021.mp4 2021-09-01 17:06 93.3 MB
Alcatraz - A Practical Hypervisor Sandbox to Prevent Escapes from the KVM_QEMU and KVM-Based MicroVMs - 2021.description 2022-04-21 13:00 970 B
Alcatraz - A Practical Hypervisor Sandbox to Prevent Escapes from the KVM_QEMU and KVM-Based MicroVMs - 2021.info.json 2022-04-21 13:00 265.5 KB
Alcatraz - A Practical Hypervisor Sandbox to Prevent Escapes from the KVM_QEMU and KVM-Based MicroVMs - 2021.mp4 2021-12-06 20:40 119.9 MB
All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate... - 2021.description 2022-04-21 17:33 944 B
All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate... - 2021.info.json 2022-04-21 17:33 716.9 KB
All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate... - 2021.mp4 2021-01-20 12:27 193.4 MB
ALPACA - Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication - 2021.description 2022-04-21 13:02 610 B
ALPACA - Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication - 2021.info.json 2022-04-21 13:02 265.6 KB
ALPACA - Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication - 2021.mp4 2021-12-06 22:26 97.0 MB
An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructures - 2021.description 2022-04-21 14:23 844 B
An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructures - 2021.info.json 2022-04-21 14:23 265.6 KB
An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructures - 2021.mp4 2021-12-06 16:47 142.4 MB
An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers - 2021.description 2022-04-21 16:33 685 B
An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers - 2021.info.json 2022-04-21 16:33 600.8 KB
An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers - 2021.mp4 2021-01-20 14:43 107.2 MB
Anatomy of Native IIS Malware - 2021.description 2022-04-21 13:09 659 B
Anatomy of Native IIS Malware - 2021.info.json 2022-04-21 13:09 265.1 KB
Anatomy of Native IIS Malware - 2021.mp4 2021-12-07 05:05 100.2 MB
Another Road Leads to the Host - From a Message to VM Escape on Nvidia vGPU - 2021.description 2022-04-21 13:10 663 B
Another Road Leads to the Host - From a Message to VM Escape on Nvidia vGPU - 2021.info.json 2022-04-21 13:10 265.5 KB
Another Road Leads to the Host - From a Message to VM Escape on Nvidia vGPU - 2021.mp4 2021-12-07 04:15 117.5 MB
Apple Neural Engine Internal - From ML Algorithm to HW Registers - 2021.description 2022-04-21 14:54 625 B
Apple Neural Engine Internal - From ML Algorithm to HW Registers - 2021.info.json 2022-04-21 14:54 264.6 KB
Apple Neural Engine Internal - From ML Algorithm to HW Registers - 2021.mp4 2021-09-01 14:21 78.5 MB
Applying AI as a Service to Targeted Phishing & Defending Against AI Generated Attacks - 2021.description 2022-04-21 14:07 859 B
Applying AI as a Service to Targeted Phishing & Defending Against AI Generated Attacks - 2021.info.json 2022-04-21 14:07 265.1 KB
Applying AI as a Service to Targeted Phishing & Defending Against AI Generated Attacks - 2021.mp4 2021-12-06 16:15 70.7 MB
Arm'd and Dangerous - 2021.description 2022-04-21 12:59 401 B
Arm'd and Dangerous - 2021.info.json 2022-04-21 12:59 265.5 KB
Arm'd and Dangerous - 2021.mp4 2021-12-06 19:36 73.0 MB
Attacking and Defending Machine Learning Applications of Public Cloud - 2021.description 2022-04-21 15:50 443 B
Attacking and Defending Machine Learning Applications of Public Cloud - 2021.info.json 2022-04-21 15:50 448.2 KB
Attacking and Defending Machine Learning Applications of Public Cloud - 2021.mp4 2021-02-27 04:25 51.1 MB
Automate Security Incident Response - Minimize Risk and Downtime from Cyber Security Threats. - 2021.description 2022-04-21 17:35 388 B
Automate Security Incident Response - Minimize Risk and Downtime from Cyber Security Threats. - 2021.info.json 2022-04-21 17:35 361.0 KB
Automate Security Incident Response - Minimize Risk and Downtime from Cyber Security Threats. - 2021.mp4 2021-02-16 12:58 57.2 MB
Back in Black Hat - The 7th Annual Black Hat USA NOC Report - 2021.description 2022-04-21 15:16 545 B
Back in Black Hat - The 7th Annual Black Hat USA NOC Report - 2021.info.json 2022-04-21 15:16 265.1 KB
Back in Black Hat - The 7th Annual Black Hat USA NOC Report - 2021.mp4 2021-08-20 15:08 244.9 MB
Back to the Future. Cross-Protocol Attacks in the Era of 5G - 2021.description 2022-04-21 16:01 451 B
Back to the Future. Cross-Protocol Attacks in the Era of 5G - 2021.info.json 2022-04-21 16:01 490.4 KB
Back to the Future. Cross-Protocol Attacks in the Era of 5G - 2021.mp4 2021-02-27 02:23 119.5 MB
Bam the BAM - Electromagnetic Fault Injection & Automotive Systems - 2021.description 2022-04-21 13:13 618 B
Bam the BAM - Electromagnetic Fault Injection & Automotive Systems - 2021.info.json 2022-04-21 13:13 264.6 KB
Bam the BAM - Electromagnetic Fault Injection & Automotive Systems - 2021.mp4 2021-12-07 01:25 93.7 MB
Beyond Root - Custom Firmware for Embedded Mobile Chipsets - 2021.description 2022-04-21 16:44 525 B
Beyond Root - Custom Firmware for Embedded Mobile Chipsets - 2021.info.json 2022-04-21 16:44 592.9 KB
Beyond Root - Custom Firmware for Embedded Mobile Chipsets - 2021.mp4 2021-01-20 02:33 108.2 MB
BinTyper - Type Confusion Detection for C++ Binaries - 2021.description 2022-04-21 15:27 479 B
BinTyper - Type Confusion Detection for C++ Binaries - 2021.info.json 2022-04-21 15:27 484.3 KB
BinTyper - Type Confusion Detection for C++ Binaries - 2021.mp4 2021-03-23 12:26 65.1 MB
Biometrics & Privacy - Time to Faceoff or is that FaceApp - 2021.description 2022-04-21 15:49 457 B
Biometrics & Privacy - Time to Faceoff or is that FaceApp - 2021.info.json 2022-04-21 15:49 575.7 KB
Biometrics & Privacy - Time to Faceoff or is that FaceApp - 2021.mp4 2021-02-27 05:02 151.6 MB
BitLeaker - Subverting BitLocker with One Vulnerability - 2021.description 2022-04-21 15:46 360 B
BitLeaker - Subverting BitLocker with One Vulnerability - 2021.info.json 2022-04-21 15:46 583.5 KB
BitLeaker - Subverting BitLocker with One Vulnerability - 2021.mp4 2021-02-27 10:23 130.5 MB
Black-Box Laser Fault Injection on a Secure Memory - 2021.description 2022-04-21 17:28 908 B
Black-Box Laser Fault Injection on a Secure Memory - 2021.info.json 2022-04-21 17:28 606.1 KB
Black-Box Laser Fault Injection on a Secure Memory - 2021.mp4 2021-01-20 07:48 108.5 MB
Blackhat Asia 21Locknote - Conclusions and Key Takeaways from Day 1 locknote - 2021.description 2022-04-21 15:16 574 B
Blackhat Asia 21Locknote - Conclusions and Key Takeaways from Day 1 locknote - 2021.info.json 2022-04-21 15:16 557.7 KB
Blackhat Asia 21Locknote - Conclusions and Key Takeaways from Day 1 locknote - 2021.mp4 2021-08-20 09:37 203.2 MB
Breaking Brains, Solving Problems - Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros - 2021.description 2022-04-28 10:57 765 B
Breaking Brains, Solving Problems - Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros - 2021.info.json 2022-04-28 10:57 607.8 KB
Breaking Brains, Solving Problems - Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros - 2021.mp4 2021-01-20 10:44 129.2 MB
Breaking Network Segregation Using Esoteric Command & Control Channels - 2021.description 2022-04-21 14:01 538 B
Breaking Network Segregation Using Esoteric Command & Control Channels - 2021.info.json 2022-04-21 14:01 265.1 KB
Breaking Network Segregation Using Esoteric Command & Control Channels - 2021.mp4 2021-12-07 04:11 89.5 MB
Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot - 2021.description 2022-04-21 17:02 898 B
Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot - 2021.info.json 2022-04-21 17:02 572.1 KB
Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot - 2021.mp4 2021-01-20 11:08 114.7 MB
Breaking Secure Bootloaders - 2021.description 2022-04-21 13:12 423 B
Breaking Secure Bootloaders - 2021.info.json 2022-04-21 13:12 266.4 KB
Breaking Secure Bootloaders - 2021.mp4 2021-12-06 21:08 90.7 MB
Breaking the Isolation - Cross-Account AWS Vulnerabilities - 2021.description 2022-04-21 13:03 793 B
Breaking the Isolation - Cross-Account AWS Vulnerabilities - 2021.info.json 2022-04-21 13:03 264.9 KB
Breaking the Isolation - Cross-Account AWS Vulnerabilities - 2021.mp4 2021-12-06 19:01 70.0 MB
Breaking VSM by Attacking SecureKernel - 2021.description 2022-04-21 17:03 848 B
Breaking VSM by Attacking SecureKernel - 2021.info.json 2022-04-21 17:03 605.2 KB
Breaking VSM by Attacking SecureKernel - 2021.mp4 2021-01-20 08:18 101.9 MB
Bridging Security Infrastructure Between the Data Center and AWS Lambda - 2021.description 2022-04-21 13:04 794 B
Bridging Security Infrastructure Between the Data Center and AWS Lambda - 2021.info.json 2022-04-21 13:04 544.7 KB
Bridging Security Infrastructure Between the Data Center and AWS Lambda - 2021.mp4 2021-12-01 12:01 72.9 MB
Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers - 2021.description 2022-04-21 16:48 640 B
Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers - 2021.info.json 2022-04-21 16:48 589.6 KB
Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers - 2021.mp4 2021-01-19 20:06 177.9 MB
Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa - 2021.description 2022-04-21 16:44 589 B
Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa - 2021.info.json 2022-04-21 16:44 560.3 KB
Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa - 2021.mp4 2021-01-20 01:42 118.2 MB
Bypassing NGAV for Fun and Profit - 2021.description 2022-04-21 15:23 460 B
Bypassing NGAV for Fun and Profit - 2021.info.json 2022-04-21 15:23 264.9 KB
Bypassing NGAV for Fun and Profit - 2021.mp4 2021-05-21 20:27 86.0 MB
Bypassing Windows Hello for Business and Pleasure - 2021.description 2022-04-21 13:00 777 B
Bypassing Windows Hello for Business and Pleasure - 2021.info.json 2022-04-21 13:00 264.9 KB
Bypassing Windows Hello for Business and Pleasure - 2021.mp4 2021-12-06 18:36 95.0 MB
Can You Hear Me Now Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications - 2021.description 2022-04-21 15:11 676 B
Can You Hear Me Now Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications - 2021.info.json 2022-04-21 15:11 264.7 KB
Can You Hear Me Now Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications - 2021.mp4 2021-08-21 01:53 69.5 MB
Can You Roll Your Own SIEM - 2021.description 2022-04-21 13:13 763 B
Can You Roll Your Own SIEM - 2021.info.json 2022-04-21 13:13 265.9 KB
Can You Roll Your Own SIEM - 2021.mp4 2021-12-06 20:56 63.5 MB
Can Your Security Mid Game Stand Up to the IT Ransomware Playbook - 2021.description 2022-04-21 14:35 257 B
Can Your Security Mid Game Stand Up to the IT Ransomware Playbook - 2021.info.json 2022-04-21 14:35 264.5 KB
Can Your Security Mid Game Stand Up to the IT Ransomware Playbook - 2021.mp4 2021-10-12 15:32 79.4 MB
Carrying our Insecurities with Us - The Risks of Implanted Medical Devices in Secure Spaces - 2021.description 2022-04-21 16:39 727 B
Carrying our Insecurities with Us - The Risks of Implanted Medical Devices in Secure Spaces - 2021.info.json 2022-04-21 16:39 595.7 KB
Carrying our Insecurities with Us - The Risks of Implanted Medical Devices in Secure Spaces - 2021.mp4 2021-01-20 15:15 131.0 MB
CDPwn - Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days - 2021.description 2022-04-21 15:40 446 B
CDPwn - Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days - 2021.info.json 2022-04-21 15:40 265.2 KB
CDPwn - Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days - 2021.mp4 2021-09-01 08:55 110.4 MB
Certified Pre-Owned - Abusing Active Directory Certificate Services - 2021.description 2022-04-21 13:15 569 B
Certified Pre-Owned - Abusing Active Directory Certificate Services - 2021.info.json 2022-04-21 13:15 265.3 KB
Certified Pre-Owned - Abusing Active Directory Certificate Services - 2021.mp4 2021-12-06 21:12 144.1 MB
Cloud Native AppSec in 2021 - 2021.description 2022-04-21 14:33 40 B
Cloud Native AppSec in 2021 - 2021.info.json 2022-04-21 14:33 263.4 KB
Cloud Native AppSec in 2021 - 2021.mp4 2021-10-21 17:52 44.7 MB
CloudLeak - DNN Model Extractions from Commercial MLaaS Platforms - 2021.description 2022-04-21 16:42 868 B
CloudLeak - DNN Model Extractions from Commercial MLaaS Platforms - 2021.info.json 2022-04-21 16:42 599.2 KB
CloudLeak - DNN Model Extractions from Commercial MLaaS Platforms - 2021.mp4 2021-01-19 23:04 99.2 MB
Cloudy with a Chance of APT - Novel Microsoft 365 Attacks in the Wild - 2021.description 2022-04-21 13:16 682 B
Cloudy with a Chance of APT - Novel Microsoft 365 Attacks in the Wild - 2021.info.json 2022-04-21 13:16 266.5 KB
Cloudy with a Chance of APT - Novel Microsoft 365 Attacks in the Wild - 2021.mp4 2021-12-06 22:39 116.1 MB
CnCHunter - An MITM-Approach to Identify Live CnC Servers - 2021.description 2022-04-21 13:49 878 B
CnCHunter - An MITM-Approach to Identify Live CnC Servers - 2021.info.json 2022-04-21 13:49 560.2 KB
CnCHunter - An MITM-Approach to Identify Live CnC Servers - 2021.mp4 2021-12-01 15:37 93.1 MB
Come to the Dark Side, We Have Apples - Turning macOS Management Evil - 2021.description 2022-04-21 13:30 316 B
Come to the Dark Side, We Have Apples - Turning macOS Management Evil - 2021.info.json 2022-04-21 13:30 265.0 KB
Come to the Dark Side, We Have Apples - Turning macOS Management Evil - 2021.mp4 2021-12-06 20:56 109.8 MB
Complexity Killed Security - 2021.description 2022-04-21 16:08 473 B
Complexity Killed Security - 2021.info.json 2022-04-21 16:08 506.7 KB
Complexity Killed Security - 2021.mp4 2021-02-27 12:30 122.0 MB
Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities - 2021.description 2022-04-21 17:08 583 B
Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities - 2021.info.json 2022-04-21 17:08 602.6 KB
Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities - 2021.mp4 2021-01-20 12:49 114.3 MB
Crashing Your Way to Medium-IL - Exploiting the PDB Parser for Privilege Escalation - 2021.description 2022-04-21 13:31 685 B
Crashing Your Way to Medium-IL - Exploiting the PDB Parser for Privilege Escalation - 2021.info.json 2022-04-21 13:31 265.0 KB
Crashing Your Way to Medium-IL - Exploiting the PDB Parser for Privilege Escalation - 2021.mp4 2021-12-07 12:49 93.8 MB
Cross-Site Escape - Pwning macOS Safari Sandbox the Unusual Way - 2021.description 2022-04-21 15:25 467 B
Cross-Site Escape - Pwning macOS Safari Sandbox the Unusual Way - 2021.info.json 2022-04-21 15:25 492.0 KB
Cross-Site Escape - Pwning macOS Safari Sandbox the Unusual Way - 2021.mp4 2021-03-10 12:46 72.9 MB
Cybersecurity Meets Reality - 2021.description 2022-04-21 14:30 74 B
Cybersecurity Meets Reality - 2021.info.json 2022-04-21 14:30 43.5 KB
Cybersecurity Meets Reality - 2021.mp4 2021-11-11 05:04 80.5 MB
Cybersecurity Threats in 2021 - What You Need to Know - 2021.description 2022-04-21 16:10 254 B
Cybersecurity Threats in 2021 - What You Need to Know - 2021.info.json 2022-04-21 16:10 263.9 KB
Cybersecurity Threats in 2021 - What You Need to Know - 2021.mp4 2021-09-01 23:02 66.4 MB
DBREACH - Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics - 2021.description 2022-04-28 10:14 855 B
DBREACH - Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics - 2021.info.json 2022-04-28 10:14 266.8 KB
DBREACH - Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics - 2021.mp4 2021-12-07 07:39 90.0 MB
Debug Resurrection on Nordic nRF52 Series - 2021.description 2022-04-21 15:25 442 B
Debug Resurrection on Nordic nRF52 Series - 2021.info.json 2022-04-21 15:25 555.7 KB
Debug Resurrection on Nordic nRF52 Series - 2021.mp4 2021-03-10 14:02 97.2 MB
Decade of the RATs – Custom Chinese Linux Rootkits for Everyone - 2021.description 2022-04-21 16:41 718 B
Decade of the RATs – Custom Chinese Linux Rootkits for Everyone - 2021.info.json 2022-04-21 16:41 265.4 KB
Decade of the RATs – Custom Chinese Linux Rootkits for Everyone - 2021.mp4 2021-07-26 08:13 270.2 MB
Deepfake Social Engineering - Creating a Framework for Synthetic Media Social Engineering - 2021.description 2022-04-21 13:16 613 B
Deepfake Social Engineering - Creating a Framework for Synthetic Media Social Engineering - 2021.info.json 2022-04-21 13:16 265.4 KB
Deepfake Social Engineering - Creating a Framework for Synthetic Media Social Engineering - 2021.mp4 2021-12-06 18:19 105.8 MB
Defeating a Secure Element with Multiple Laser Fault Injections - 2021.description 2022-04-21 13:49 847 B
Defeating a Secure Element with Multiple Laser Fault Injections - 2021.info.json 2022-04-21 13:49 265.4 KB
Defeating a Secure Element with Multiple Laser Fault Injections - 2021.mp4 2021-12-07 06:34 78.0 MB
Demigod - The Art of Emulating Kernel Rootkits - 2021.description 2022-04-21 16:36 801 B
Demigod - The Art of Emulating Kernel Rootkits - 2021.info.json 2022-04-21 16:36 820.1 KB
Demigod - The Art of Emulating Kernel Rootkits - 2021.mp4 2021-01-20 13:53 182.0 MB
Demystify AI Security Products With a Universal Pluggable XAI Translator - 2021.description 2022-04-21 13:49 829 B
Demystify AI Security Products With a Universal Pluggable XAI Translator - 2021.info.json 2022-04-21 13:49 502.9 KB
Demystify AI Security Products With a Universal Pluggable XAI Translator - 2021.mp4 2021-12-01 16:37 44.4 MB
Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier - 2021.description 2022-04-21 16:04 434 B
Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier - 2021.info.json 2022-04-21 16:04 448.8 KB
Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier - 2021.mp4 2021-02-26 22:41 59.2 MB
Demystifying Modern Windows Rootkits - 2021.description 2022-04-21 16:48 560 B
Demystifying Modern Windows Rootkits - 2021.info.json 2022-04-21 16:48 533.3 KB
Demystifying Modern Windows Rootkits - 2021.mp4 2021-01-19 20:48 66.6 MB
Demystifying “Limitless XDR” with Nate Fick - 2021.description 2022-04-21 14:31 79 B
Demystifying “Limitless XDR” with Nate Fick - 2021.info.json 2022-04-21 14:31 263.7 KB
Demystifying “Limitless XDR” with Nate Fick - 2021.mp4 2021-10-27 12:12 45.9 MB
Design Pitfalls in Commercial Mini-Programs on Android and iOS - 2021.description 2022-04-21 15:39 498 B
Design Pitfalls in Commercial Mini-Programs on Android and iOS - 2021.info.json 2022-04-21 15:39 489.5 KB
Design Pitfalls in Commercial Mini-Programs on Android and iOS - 2021.mp4 2021-03-28 10:12 86.7 MB
Detecting Access Token Manipulation - 2021.description 2022-04-21 17:35 968 B
Detecting Access Token Manipulation - 2021.info.json 2022-04-21 17:35 591.2 KB
Detecting Access Token Manipulation - 2021.mp4 2021-01-20 05:28 120.5 MB
Detecting Fake 4G Base Stations in Real Time - 2021.description 2022-04-21 16:39 929 B
Detecting Fake 4G Base Stations in Real Time - 2021.info.json 2022-04-21 16:39 621.7 KB
Detecting Fake 4G Base Stations in Real Time - 2021.mp4 2021-01-20 16:00 168.9 MB
Disappeared Coins - Steal Hashrate in Stratum Secretly - 2021.description 2022-04-21 14:38 1.1 KB
Disappeared Coins - Steal Hashrate in Stratum Secretly - 2021.info.json 2022-04-21 14:38 265.1 KB
Disappeared Coins - Steal Hashrate in Stratum Secretly - 2021.mp4 2021-09-01 13:36 123.1 MB
Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel - 2021.description 2022-04-21 15:28 470 B
Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel - 2021.info.json 2022-04-21 15:28 472.2 KB
Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel - 2021.mp4 2021-03-24 13:15 73.2 MB
Discovering Hidden Properties to Attack the Node.js Ecosystem - 2021.description 2022-04-21 16:30 517 B
Discovering Hidden Properties to Attack the Node.js Ecosystem - 2021.info.json 2022-04-21 16:30 593.8 KB
Discovering Hidden Properties to Attack the Node.js Ecosystem - 2021.mp4 2021-01-20 18:02 110.3 MB
Disinformation At Scale - Using GPT-3 Maliciously for Information Operations - 2021.description 2022-04-21 13:17 634 B
Disinformation At Scale - Using GPT-3 Maliciously for Information Operations - 2021.info.json 2022-04-21 13:17 265.4 KB
Disinformation At Scale - Using GPT-3 Maliciously for Information Operations - 2021.mp4 2021-12-07 00:18 111.4 MB
Dive into Apple IO80211FamilyV2 - 2021.description 2022-04-21 17:03 732 B
Dive into Apple IO80211FamilyV2 - 2021.info.json 2022-04-21 17:03 595.4 KB
Dive into Apple IO80211FamilyV2 - 2021.mp4 2021-01-20 12:55 108.3 MB
Diverse Perspectives in Threat Intelligence - 2021.description 2022-04-21 15:19 174 B
Diverse Perspectives in Threat Intelligence - 2021.info.json 2022-04-21 15:19 263.4 KB
Diverse Perspectives in Threat Intelligence - 2021.mp4 2021-09-07 01:14 56.8 MB
Diving in to Spooler - Discovering LPE and RCE Vulnerabilities in Windows Printer - 2021.description 2022-04-21 13:48 714 B
Diving in to Spooler - Discovering LPE and RCE Vulnerabilities in Windows Printer - 2021.info.json 2022-04-21 13:48 264.7 KB
Diving in to Spooler - Discovering LPE and RCE Vulnerabilities in Windows Printer - 2021.mp4 2021-12-07 07:00 56.4 MB
Domain Borrowing - Catch My C2 Traffic if You Can - 2021.description 2022-04-28 10:42 514 B
Domain Borrowing - Catch My C2 Traffic if You Can - 2021.info.json 2022-04-28 10:42 562.0 KB
Domain Borrowing - Catch My C2 Traffic if You Can - 2021.mp4 2021-08-17 13:30 96.2 MB
Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation - 2021.description 2022-04-21 16:07 434 B
Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation - 2021.info.json 2022-04-21 16:07 265.5 KB
Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation - 2021.mp4 2021-10-15 15:27 85.7 MB
Effective Vulnerability Discovery with Machine Learning - 2021.description 2022-04-21 15:36 482 B
Effective Vulnerability Discovery with Machine Learning - 2021.info.json 2022-04-21 15:36 502.1 KB
Effective Vulnerability Discovery with Machine Learning - 2021.mp4 2021-03-28 15:59 200.9 MB
efiXplorer - Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis - 2021.description 2022-04-21 15:37 553 B
efiXplorer - Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis - 2021.info.json 2022-04-21 15:37 687.4 KB
efiXplorer - Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis - 2021.mp4 2021-03-28 12:01 147.6 MB
Emulating Samsung's Baseband for Security Testing - 2021.description 2022-04-21 17:25 890 B
Emulating Samsung's Baseband for Security Testing - 2021.info.json 2022-04-21 17:25 593.6 KB
Emulating Samsung's Baseband for Security Testing - 2021.mp4 2021-01-20 05:03 125.4 MB
Engineering Cybersecurity for a Nation - What Singapore is Learning from Cars and Sanitation - 2021.description 2022-04-21 15:47 442 B
Engineering Cybersecurity for a Nation - What Singapore is Learning from Cars and Sanitation - 2021.info.json 2022-04-21 15:47 265.3 KB
Engineering Cybersecurity for a Nation - What Singapore is Learning from Cars and Sanitation - 2021.mp4 2021-02-27 12:10 244.2 MB
Engineering Empathy - Adapting Software Engineering Principles and Process to Security - 2021.description 2022-04-21 16:11 518 B
Engineering Empathy - Adapting Software Engineering Principles and Process to Security - 2021.info.json 2022-04-21 16:11 598.7 KB
Engineering Empathy - Adapting Software Engineering Principles and Process to Security - 2021.mp4 2021-01-20 17:17 83.1 MB
Enter Sandbox - 2021.description 2022-04-21 14:36 788 B
Enter Sandbox - 2021.info.json 2022-04-21 14:36 266.7 KB
Enter Sandbox - 2021.mp4 2021-09-01 12:32 102.7 MB
Escaping Virtualized Containers - 2021.description 2022-04-21 17:03 574 B
Escaping Virtualized Containers - 2021.info.json 2022-04-21 17:03 617.3 KB
Escaping Virtualized Containers - 2021.mp4 2021-02-27 10:57 98.2 MB
EtherOops - Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks - 2021.description 2022-04-21 16:49 967 B
EtherOops - Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks - 2021.info.json 2022-04-21 16:49 620.9 KB
EtherOops - Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks - 2021.mp4 2021-01-20 01:28 232.6 MB
Everything has Changed in iOS 14, but Jailbreak is Eternal - 2021.description 2022-04-21 14:00 471 B
Everything has Changed in iOS 14, but Jailbreak is Eternal - 2021.info.json 2022-04-21 14:00 265.1 KB
Everything has Changed in iOS 14, but Jailbreak is Eternal - 2021.mp4 2021-12-07 04:16 146.1 MB
Experimenting with Real-Time Event Feeds - 2021.description 2022-04-21 17:26 610 B
Experimenting with Real-Time Event Feeds - 2021.info.json 2022-04-21 17:26 284.7 KB
Experimenting with Real-Time Event Feeds - 2021.mp4 2021-01-20 07:36 100.7 MB
Exploiting Kernel Races through Taming Thread Interleaving - 2021.description 2022-04-21 17:34 721 B
Exploiting Kernel Races through Taming Thread Interleaving - 2021.info.json 2022-04-21 17:34 585.9 KB
Exploiting Kernel Races through Taming Thread Interleaving - 2021.mp4 2021-01-20 11:55 111.4 MB
Exploiting Windows COM_WinRT ServicesExploiting Windows COM_WinRT Services - 2021.description 2022-04-21 13:24 523 B
Exploiting Windows COM_WinRT ServicesExploiting Windows COM_WinRT Services - 2021.info.json 2022-04-21 13:24 264.3 KB
Exploiting Windows COM_WinRT ServicesExploiting Windows COM_WinRT Services - 2021.mp4 2021-12-07 22:45 62.8 MB
Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones - 2021.description 2022-04-21 14:02 550 B
Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones - 2021.info.json 2022-04-21 14:02 265.2 KB
Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones - 2021.mp4 2021-12-07 02:48 116.6 MB
Faking a Factory - Creating and Operating a Realistic Honeypot - 2021.description 2022-04-21 15:44 370 B
Faking a Factory - Creating and Operating a Realistic Honeypot - 2021.info.json 2022-04-21 15:44 264.5 KB
Faking a Factory - Creating and Operating a Realistic Honeypot - 2021.mp4 2021-08-27 08:24 83.0 MB
Fast Chat with Austin Murphy, CrowdStrike’s VP & GM, Falcon Complete - 2021.description 2022-04-21 15:19 156 B
Fast Chat with Austin Murphy, CrowdStrike’s VP & GM, Falcon Complete - 2021.info.json 2022-04-21 15:19 263.6 KB
Fast Chat with Austin Murphy, CrowdStrike’s VP & GM, Falcon Complete - 2021.mp4 2021-09-06 00:23 62.9 MB
Fast Chat with Maor Bin - Securing the SaaS App Estate - 2021.description 2022-04-21 15:05 213 B
Fast Chat with Maor Bin - Securing the SaaS App Estate - 2021.info.json 2022-04-21 15:05 263.3 KB
Fast Chat with Maor Bin - Securing the SaaS App Estate - 2021.mp4 2021-08-24 13:28 45.1 MB
FASTCash and INJX_Pure - How Threat Actors Use Public Standards for Financial Fraud - 2021.description 2022-04-21 16:40 642 B
FASTCash and INJX_Pure - How Threat Actors Use Public Standards for Financial Fraud - 2021.info.json 2022-04-21 16:40 583.8 KB
FASTCash and INJX_Pure - How Threat Actors Use Public Standards for Financial Fraud - 2021.mp4 2021-01-20 20:07 108.8 MB
Finding Bugs Compiler Knows but Doesn't Tell You-Dissecting Undefined Behavior Optimizations in LLVM - 2021.description 2022-04-21 15:21 542 B
Finding Bugs Compiler Knows but Doesn't Tell You-Dissecting Undefined Behavior Optimizations in LLVM - 2021.info.json 2022-04-21 15:21 265.0 KB
Finding Bugs Compiler Knows but Doesn't Tell You-Dissecting Undefined Behavior Optimizations in LLVM - 2021.mp4 2021-05-21 14:00 84.4 MB
Fingerprint-Jacking - Practical Fingerprint Authorization Hijacking in Android Apps - 2021.description 2022-04-21 15:32 557 B
Fingerprint-Jacking - Practical Fingerprint Authorization Hijacking in Android Apps - 2021.info.json 2022-04-21 15:32 553.5 KB
Fingerprint-Jacking - Practical Fingerprint Authorization Hijacking in Android Apps - 2021.mp4 2021-03-27 21:32 97.1 MB
First Contact - Vulnerabilities in Contactless Payments - 2021.description 2022-04-21 15:43 414 B
First Contact - Vulnerabilities in Contactless Payments - 2021.info.json 2022-04-21 15:43 265.2 KB
First Contact - Vulnerabilities in Contactless Payments - 2021.mp4 2021-05-13 19:31 93.3 MB
Fixing a Memory Forensics Blind Spot - Linux Kernel Tracing - 2021.description 2022-04-21 13:59 667 B
Fixing a Memory Forensics Blind Spot - Linux Kernel Tracing - 2021.info.json 2022-04-21 13:59 491.5 KB
Fixing a Memory Forensics Blind Spot - Linux Kernel Tracing - 2021.mp4 2021-12-01 18:29 60.7 MB
Fooling Windows through Superfetch - 2021.description 2022-04-21 17:01 1.1 KB
Fooling Windows through Superfetch - 2021.info.json 2022-04-21 17:01 605.4 KB
Fooling Windows through Superfetch - 2021.mp4 2021-01-20 12:05 148.7 MB
Forget Zero Trust - Aim to 'Control the Controllables' - 2021.description 2022-04-21 15:20 251 B
Forget Zero Trust - Aim to 'Control the Controllables' - 2021.info.json 2022-04-21 15:20 264.8 KB
Forget Zero Trust - Aim to 'Control the Controllables' - 2021.mp4 2021-09-03 09:47 104.8 MB
FPs are Cheap. Show me the CVEs! - 2021.description 2022-04-21 15:30 472 B
FPs are Cheap. Show me the CVEs! - 2021.info.json 2022-04-21 15:30 473.9 KB
FPs are Cheap. Show me the CVEs! - 2021.mp4 2021-03-23 10:13 90.9 MB
FragAttacks - Breaking Wi-Fi through Fragmentation and Aggregation - 2021.description 2022-04-21 14:00 607 B
FragAttacks - Breaking Wi-Fi through Fragmentation and Aggregation - 2021.info.json 2022-04-21 14:00 265.2 KB
FragAttacks - Breaking Wi-Fi through Fragmentation and Aggregation - 2021.mp4 2021-12-07 03:07 107.4 MB
From an URGENT_11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet - 2021.description 2022-04-21 16:02 485 B
From an URGENT_11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet - 2021.info.json 2022-04-21 16:02 514.7 KB
From an URGENT_11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet - 2021.mp4 2021-02-27 00:39 97.5 MB
From Ransomware to RansomOps - Evolution of A Threat - 2021.description 2022-04-21 15:20 173 B
From Ransomware to RansomOps - Evolution of A Threat - 2021.info.json 2022-04-21 15:20 263.7 KB
From Ransomware to RansomOps - Evolution of A Threat - 2021.mp4 2021-09-03 23:14 72.7 MB
From Zero to Sixty - The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower - 2021.description 2022-04-21 15:48 517 B
From Zero to Sixty - The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower - 2021.info.json 2022-04-21 15:48 581.3 KB
From Zero to Sixty - The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower - 2021.mp4 2021-03-10 10:59 97.7 MB
Generating YARA Rules by Classifying Malicious Byte Sequences - 2021.description 2022-04-21 13:25 854 B
Generating YARA Rules by Classifying Malicious Byte Sequences - 2021.info.json 2022-04-21 13:25 265.7 KB
Generating YARA Rules by Classifying Malicious Byte Sequences - 2021.mp4 2021-12-07 02:54 80.0 MB
Give Me a SQL Injection, I Shall PWN IIS and SQL Server - 2021.description 2022-04-21 14:54 772 B
Give Me a SQL Injection, I Shall PWN IIS and SQL Server - 2021.info.json 2022-04-21 14:54 265.3 KB
Give Me a SQL Injection, I Shall PWN IIS and SQL Server - 2021.mp4 2021-09-01 14:22 103.0 MB
Government-Mandated Front Doors - A Global Assessment of Legalized Government Access to Data - 2021.description 2022-04-21 13:29 667 B
Government-Mandated Front Doors - A Global Assessment of Legalized Government Access to Data - 2021.info.json 2022-04-21 13:29 264.6 KB
Government-Mandated Front Doors - A Global Assessment of Legalized Government Access to Data - 2021.mp4 2021-12-07 06:33 73.4 MB
Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control... - 2021.description 2022-04-21 15:30 501 B
Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control... - 2021.info.json 2022-04-21 15:30 489.9 KB
Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control... - 2021.mp4 2021-03-21 14:03 68.5 MB
Greybox Program Synthesis - A New Approach to Attack Dataflow Obfuscation - 2021.description 2022-04-21 13:27 668 B
Greybox Program Synthesis - A New Approach to Attack Dataflow Obfuscation - 2021.info.json 2022-04-21 13:27 265.2 KB
Greybox Program Synthesis - A New Approach to Attack Dataflow Obfuscation - 2021.mp4 2021-12-07 04:14 89.5 MB
Hack Different - Pwning iOS 14 with Generation Z Bug - 2021.description 2022-04-21 13:48 564 B
Hack Different - Pwning iOS 14 with Generation Z Bug - 2021.info.json 2022-04-21 13:48 264.7 KB
Hack Different - Pwning iOS 14 with Generation Z Bug - 2021.mp4 2021-12-07 06:43 80.1 MB
Hacking a Capsule Hotel - Ghost in the Bedrooms - 2021.description 2022-04-28 10:19 573 B
Hacking a Capsule Hotel - Ghost in the Bedrooms - 2021.info.json 2022-04-28 10:19 264.5 KB
Hacking a Capsule Hotel - Ghost in the Bedrooms - 2021.mp4 2021-12-07 03:11 64.8 MB
Hacking Government Cybersecurity - 2021.description 2022-04-21 15:31 373 B
Hacking Government Cybersecurity - 2021.info.json 2022-04-21 15:31 264.9 KB
Hacking Government Cybersecurity - 2021.mp4 2021-09-02 05:51 130.8 MB
Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices - 2021.description 2022-04-21 16:35 693 B
Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices - 2021.info.json 2022-04-21 16:35 601.1 KB
Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices - 2021.mp4 2021-01-20 19:01 117.4 MB
Hacking the Voter - Lessons from a Decade of Russian Military Operations - 2021.description 2022-04-21 16:59 935 B
Hacking the Voter - Lessons from a Decade of Russian Military Operations - 2021.info.json 2022-04-21 16:59 611.3 KB
Hacking the Voter - Lessons from a Decade of Russian Military Operations - 2021.mp4 2021-01-20 05:17 139.5 MB
hAFL1 - Our Journey of Fuzzing Hyper-V and Discovering a 0-Day - 2021.description 2022-04-21 13:47 569 B
hAFL1 - Our Journey of Fuzzing Hyper-V and Discovering a 0-Day - 2021.info.json 2022-04-21 13:47 265.1 KB
hAFL1 - Our Journey of Fuzzing Hyper-V and Discovering a 0-Day - 2021.mp4 2021-12-07 05:44 84.6 MB
Healthscare – An Insider's Biopsy of Healthcare Application Security - 2021.description 2022-04-21 16:11 705 B
Healthscare – An Insider's Biopsy of Healthcare Application Security - 2021.info.json 2022-04-21 16:11 615.7 KB
Healthscare – An Insider's Biopsy of Healthcare Application Security - 2021.mp4 2021-01-20 17:29 100.4 MB
Hermes Attack - Steal DNN Models In AI Privatization Deployment Scenarios - 2021.description 2022-04-21 15:39 482 B
Hermes Attack - Steal DNN Models In AI Privatization Deployment Scenarios - 2021.info.json 2022-04-21 15:39 528.1 KB
Hermes Attack - Steal DNN Models In AI Privatization Deployment Scenarios - 2021.mp4 2021-04-05 16:09 87.5 MB
Heroku Abuse Operations - Hunting Wolves in Sheep's Clothing - 2021.description 2022-04-21 16:37 822 B
Heroku Abuse Operations - Hunting Wolves in Sheep's Clothing - 2021.info.json 2022-04-21 16:37 602.8 KB
Heroku Abuse Operations - Hunting Wolves in Sheep's Clothing - 2021.mp4 2021-01-20 16:38 133.7 MB
Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature - 2021.description 2022-04-21 16:03 525 B
Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature - 2021.info.json 2022-04-21 16:03 509.3 KB
Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature - 2021.mp4 2021-02-27 00:03 104.9 MB
Hey, You, Get off My Private Data - Do Apps Respect Your Privacy as They Claim - 2021.description 2022-04-21 14:56 600 B
Hey, You, Get off My Private Data - Do Apps Respect Your Privacy as They Claim - 2021.info.json 2022-04-21 14:56 265.3 KB
Hey, You, Get off My Private Data - Do Apps Respect Your Privacy as They Claim - 2021.mp4 2021-09-01 17:21 102.5 MB
Hiding Objects from Computer Vision by Exploiting Correlation Biases - 2021.description 2022-04-21 14:38 1.0 KB
Hiding Objects from Computer Vision by Exploiting Correlation Biases - 2021.info.json 2022-04-21 14:38 265.0 KB
Hiding Objects from Computer Vision by Exploiting Correlation Biases - 2021.mp4 2021-09-01 14:04 81.2 MB
Hiding Process Memory via Anti-Forensic Techniques - 2021.description 2022-04-21 16:51 881 B
Hiding Process Memory via Anti-Forensic Techniques - 2021.info.json 2022-04-21 16:51 577.2 KB
Hiding Process Memory via Anti-Forensic Techniques - 2021.mp4 2021-01-20 01:19 63.6 MB
How Application Security Orchestration & Correlation adds Efficiency & Accountability to DevSecOps - 2021.description 2022-04-21 14:25 53 B
How Application Security Orchestration & Correlation adds Efficiency & Accountability to DevSecOps - 2021.info.json 2022-04-21 14:25 263.4 KB
How Application Security Orchestration & Correlation adds Efficiency & Accountability to DevSecOps - 2021.mp4 2021-11-29 16:26 37.1 MB
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover - 2021.description 2022-04-21 14:47 1.0 KB
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover - 2021.info.json 2022-04-21 14:47 264.8 KB
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover - 2021.mp4 2021-09-01 14:28 62.8 MB
How Embedded TCP_IP Stacks Breed Critical Vulnerabilities - 2021.description 2022-04-21 15:35 525 B
How Embedded TCP_IP Stacks Breed Critical Vulnerabilities - 2021.info.json 2022-04-21 15:35 572.6 KB
How Embedded TCP_IP Stacks Breed Critical Vulnerabilities - 2021.mp4 2021-04-05 15:44 112.3 MB
How Healthcare Can Use Network Data To Detect Threats - 2021.description 2022-04-21 16:09 214 B
How Healthcare Can Use Network Data To Detect Threats - 2021.info.json 2022-04-21 16:09 263.9 KB
How Healthcare Can Use Network Data To Detect Threats - 2021.mp4 2021-09-04 04:14 85.7 MB
How I Can Unlock Your Smart Door - Security Pitfalls in Cross-Vendor IoT Access Control - 2021.description 2022-04-21 15:01 1.1 KB
How I Can Unlock Your Smart Door - Security Pitfalls in Cross-Vendor IoT Access Control - 2021.info.json 2022-04-21 15:01 265.5 KB
How I Can Unlock Your Smart Door - Security Pitfalls in Cross-Vendor IoT Access Control - 2021.mp4 2021-09-01 16:55 98.3 MB
How I Created My Clone Using AI - Next-Gen Social Engineering - 2021.description 2022-04-28 10:56 566 B
How I Created My Clone Using AI - Next-Gen Social Engineering - 2021.info.json 2022-04-28 10:56 610.3 KB
How I Created My Clone Using AI - Next-Gen Social Engineering - 2021.mp4 2021-01-20 15:27 108.8 MB
How I Used a JSON Deserialization 0day to Steal Your Money on the Blockchain - 2021.description 2022-04-21 14:25 372 B
How I Used a JSON Deserialization 0day to Steal Your Money on the Blockchain - 2021.info.json 2022-04-21 14:25 265.1 KB
How I Used a JSON Deserialization 0day to Steal Your Money on the Blockchain - 2021.mp4 2021-11-23 19:29 127.4 MB
How is Machine Learning and Data Science Transforming Cyber Security - 2021.description 2022-04-21 14:36 316 B
How is Machine Learning and Data Science Transforming Cyber Security - 2021.info.json 2022-04-21 14:36 265.0 KB
How is Machine Learning and Data Science Transforming Cyber Security - 2021.mp4 2021-09-02 18:21 71.4 MB
How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration - 2021.description 2022-04-21 15:26 574 B
How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration - 2021.info.json 2022-04-21 15:26 486.6 KB
How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration - 2021.mp4 2021-03-21 11:02 70.3 MB
How to Better Fuzz Windows 10 Directx Kernel at Present - 2021.description 2022-04-21 15:22 449 B
How to Better Fuzz Windows 10 Directx Kernel at Present - 2021.info.json 2022-04-21 15:22 469.4 KB
How to Better Fuzz Windows 10 Directx Kernel at Present - 2021.mp4 2021-03-11 15:50 53.6 MB
HPE iLO5 Firmware Security - Go Home Cryptoprocessor, You're Drunk! - 2021.description 2022-04-28 10:11 738 B
HPE iLO5 Firmware Security - Go Home Cryptoprocessor, You're Drunk! - 2021.info.json 2022-04-28 10:11 265.3 KB
HPE iLO5 Firmware Security - Go Home Cryptoprocessor, You're Drunk! - 2021.mp4 2021-12-07 05:51 89.5 MB
HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges - 2021.description 2022-04-21 16:37 594 B
HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges - 2021.info.json 2022-04-21 16:37 619.8 KB
HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges - 2021.mp4 2021-01-20 13:20 128.7 MB
HTTP_2 - The Sequel is Always Worse - 2021.description 2022-04-21 15:07 579 B
HTTP_2 - The Sequel is Always Worse - 2021.info.json 2022-04-21 15:07 265.1 KB
HTTP_2 - The Sequel is Always Worse - 2021.mp4 2021-08-22 16:40 88.2 MB
Hunting Invisible Salamanders - Cryptographic (in)Security with Attacker-Controlled Keys - 2021.description 2022-04-21 16:45 817 B
Hunting Invisible Salamanders - Cryptographic (in)Security with Attacker-Controlled Keys - 2021.info.json 2022-04-21 16:45 526.1 KB
Hunting Invisible Salamanders - Cryptographic (in)Security with Attacker-Controlled Keys - 2021.mp4 2021-01-19 20:51 55.7 MB
Hunting Vulnerabilities of gRPC Protocol Armed Mobile_IoT Applications - 2021.description 2022-04-21 14:46 726 B
Hunting Vulnerabilities of gRPC Protocol Armed Mobile_IoT Applications - 2021.info.json 2022-04-21 14:46 552.7 KB
Hunting Vulnerabilities of gRPC Protocol Armed Mobile_IoT Applications - 2021.mp4 2021-08-16 07:45 99.2 MB
I calc'd Calc - Exploiting Excel Online - 2021.description 2022-04-21 17:27 920 B
I calc'd Calc - Exploiting Excel Online - 2021.info.json 2022-04-21 17:27 606.3 KB
I calc'd Calc - Exploiting Excel Online - 2021.mp4 2021-01-20 10:13 137.4 MB
IAM Concerned - OAuth Token Hijacking in Google Cloud (GCP) - 2021.description 2022-04-21 15:26 439 B
IAM Concerned - OAuth Token Hijacking in Google Cloud (GCP) - 2021.info.json 2022-04-21 15:26 574.2 KB
IAM Concerned - OAuth Token Hijacking in Google Cloud (GCP) - 2021.mp4 2021-03-21 11:25 182.6 MB
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale - 2021.description 2022-04-21 15:50 426 B
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale - 2021.info.json 2022-04-21 15:50 544.0 KB
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale - 2021.mp4 2021-02-27 04:23 85.1 MB
IMP4GT - IMPersonation Attacks in 4G NeTworks - 2021.description 2022-04-21 16:45 907 B
IMP4GT - IMPersonation Attacks in 4G NeTworks - 2021.info.json 2022-04-21 16:45 614.4 KB
IMP4GT - IMPersonation Attacks in 4G NeTworks - 2021.mp4 2021-01-19 19:40 139.1 MB
Improving Mental Models of End-to-End Encrypted Communication - 2021.description 2022-04-28 10:57 650 B
Improving Mental Models of End-to-End Encrypted Communication - 2021.info.json 2022-04-28 10:57 585.6 KB
Improving Mental Models of End-to-End Encrypted Communication - 2021.mp4 2021-01-20 11:34 99.1 MB
In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor - 2021.description 2022-04-21 15:04 909 B
In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor - 2021.info.json 2022-04-21 15:04 369.1 KB
In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor - 2021.mp4 2021-08-19 14:26 79.2 MB
In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems - 2021.description 2022-04-21 15:05 781 B
In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems - 2021.info.json 2022-04-21 15:05 45.2 KB
In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems - 2021.mp4 2021-09-01 12:37 115.7 MB
Incident Response With Wendi Whitmore - 2021.description 2022-04-21 15:18 251 B
Incident Response With Wendi Whitmore - 2021.info.json 2022-04-21 15:18 264.2 KB
Incident Response With Wendi Whitmore - 2021.mp4 2021-08-14 16:11 133.2 MB
Industrial Protocol Gateways Under Analysis - 2021.description 2022-04-21 16:47 1000 B
Industrial Protocol Gateways Under Analysis - 2021.info.json 2022-04-21 16:47 597.8 KB
Industrial Protocol Gateways Under Analysis - 2021.mp4 2021-01-20 01:59 157.6 MB
Insights and Predictions - What's Next in InfoSec - 2021.description 2022-04-21 15:15 610 B
Insights and Predictions - What's Next in InfoSec - 2021.info.json 2022-04-21 15:15 262.9 KB
Insights and Predictions - What's Next in InfoSec - 2021.mp4 2021-08-21 03:21 215.8 MB
Insights on Multi-Factor Authentication - 2021.description 2022-04-21 15:19 160 B
Insights on Multi-Factor Authentication - 2021.info.json 2022-04-21 15:19 264.0 KB
Insights on Multi-Factor Authentication - 2021.mp4 2021-09-06 16:03 50.7 MB
Internal Affairs - Hacking File System Access from the Web - 2021.description 2022-04-21 13:30 802 B
Internal Affairs - Hacking File System Access from the Web - 2021.info.json 2022-04-21 13:30 264.6 KB
Internal Affairs - Hacking File System Access from the Web - 2021.mp4 2021-12-06 22:12 59.6 MB
Intrusion’s Look Ahead to 2022 - 2021.description 2022-04-21 14:24 237 B
Intrusion’s Look Ahead to 2022 - 2021.info.json 2022-04-21 14:24 263.7 KB
Intrusion’s Look Ahead to 2022 - 2021.mp4 2021-12-06 13:51 80.1 MB
iOS Kernel PAC, One Year Later - 2021.description 2022-04-21 16:33 646 B
iOS Kernel PAC, One Year Later - 2021.info.json 2022-04-21 16:33 604.2 KB
iOS Kernel PAC, One Year Later - 2021.mp4 2021-01-20 16:14 132.3 MB
IoT Skimmer - Energy Market Manipulation through High-Wattage IoT Botnets - 2021.description 2022-04-21 17:34 773 B
IoT Skimmer - Energy Market Manipulation through High-Wattage IoT Botnets - 2021.info.json 2022-04-21 17:34 559.1 KB
IoT Skimmer - Energy Market Manipulation through High-Wattage IoT Botnets - 2021.mp4 2021-01-20 11:20 98.2 MB
IPvSeeYou - Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation - 2021.description 2022-04-21 13:27 680 B
IPvSeeYou - Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation - 2021.info.json 2022-04-21 13:27 265.5 KB
IPvSeeYou - Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation - 2021.mp4 2021-12-07 01:34 134.4 MB
It's not FINished - The Evolving Maturity in Ransomware Operations - 2021.description 2022-04-21 15:38 487 B
It's not FINished - The Evolving Maturity in Ransomware Operations - 2021.info.json 2022-04-21 15:38 569.8 KB
It's not FINished - The Evolving Maturity in Ransomware Operations - 2021.mp4 2021-04-05 15:04 105.3 MB
Jack-in-the-Cache - A New Code injection Technique through Modifying X86-to-ARM Translation Cache - 2021.description 2022-04-21 15:27 520 B
Jack-in-the-Cache - A New Code injection Technique through Modifying X86-to-ARM Translation Cache - 2021.info.json 2022-04-21 15:27 485.9 KB
Jack-in-the-Cache - A New Code injection Technique through Modifying X86-to-ARM Translation Cache - 2021.mp4 2021-03-21 15:01 81.1 MB
Keynote - Clocking On - 2021.description 2022-04-21 14:29 523 B
Keynote - Clocking On - 2021.info.json 2022-04-21 14:29 265.4 KB
Keynote - Clocking On - 2021.mp4 2021-11-25 15:08 345.9 MB
Keynote - Embedding a Human-Centric Approach Into a Global Cyber Security Program - 2021.description 2022-04-21 13:01 383 B
Keynote - Embedding a Human-Centric Approach Into a Global Cyber Security Program - 2021.info.json 2022-04-21 13:01 265.8 KB
Keynote - Embedding a Human-Centric Approach Into a Global Cyber Security Program - 2021.mp4 2021-12-07 03:00 331.4 MB
Keynote - Hacking the Cybersecurity Puzzle - 2021.description 2022-04-21 15:12 850 B
Keynote - Hacking the Cybersecurity Puzzle - 2021.info.json 2022-04-21 15:12 267.0 KB
Keynote - Hacking the Cybersecurity Puzzle - 2021.mp4 2021-08-22 03:42 435.8 MB
Keynote - Lessons From 11 Billion Breached Records - 2021.description 2022-04-21 14:36 590 B
Keynote - Lessons From 11 Billion Breached Records - 2021.info.json 2022-04-21 14:36 275.5 KB
Keynote - Lessons From 11 Billion Breached Records - 2021.mp4 2021-09-03 22:22 91.1 MB
Keynote - Secretary Alejandro Mayorkas - 2021.description 2022-04-21 14:21 292 B
Keynote - Secretary Alejandro Mayorkas - 2021.info.json 2022-04-21 14:21 264.5 KB
Keynote - Secretary Alejandro Mayorkas - 2021.mp4 2021-12-06 15:15 230.7 MB
Keynote - Supply Chain Infections and the Future of Contactless Deliveries - 2021.description 2022-04-21 15:06 568 B
Keynote - Supply Chain Infections and the Future of Contactless Deliveries - 2021.info.json 2022-04-21 15:06 266.7 KB
Keynote - Supply Chain Infections and the Future of Contactless Deliveries - 2021.mp4 2021-08-22 16:17 332.8 MB
Kr00k - How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices - 2021.description 2022-04-21 16:02 543 B
Kr00k - How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices - 2021.info.json 2022-04-21 16:02 558.9 KB
Kr00k - How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices - 2021.mp4 2021-02-27 01:03 101.5 MB
Kr00k - Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices - 2021.description 2022-04-21 17:27 1.0 KB
Kr00k - Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices - 2021.info.json 2022-04-21 17:27 604.4 KB
Kr00k - Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices - 2021.mp4 2021-01-20 07:22 121.2 MB
LadderLeak - Breaking ECDSA with Less than One Bit of Nonce Leakage - 2021.description 2022-04-21 15:28 506 B
LadderLeak - Breaking ECDSA with Less than One Bit of Nonce Leakage - 2021.info.json 2022-04-21 15:28 553.4 KB
LadderLeak - Breaking ECDSA with Less than One Bit of Nonce Leakage - 2021.mp4 2021-03-21 15:30 90.9 MB
Lamphone - Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps - 2021.description 2022-04-21 17:02 1012 B
Lamphone - Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps - 2021.info.json 2022-04-21 17:02 577.1 KB
Lamphone - Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps - 2021.mp4 2021-01-20 02:57 106.9 MB
Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant - 2021.description 2022-04-21 16:34 1.0 KB
Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant - 2021.info.json 2022-04-21 16:34 605.8 KB
Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant - 2021.mp4 2021-01-20 19:27 198.1 MB
Legal Pitfalls to Avoid in Security Incidents - 2021.description 2022-04-21 13:32 348 B
Legal Pitfalls to Avoid in Security Incidents - 2021.info.json 2022-04-21 13:32 264.3 KB
Legal Pitfalls to Avoid in Security Incidents - 2021.mp4 2021-12-07 06:36 73.5 MB
Let's Attack Let's Encrypt - 2021.description 2022-04-21 14:01 719 B
Let's Attack Let's Encrypt - 2021.info.json 2022-04-21 14:01 264.6 KB
Let's Attack Let's Encrypt - 2021.mp4 2021-12-07 03:14 72.3 MB
Light Commands - Hacking Voice Assistants with Lasers - 2021.description 2022-04-21 15:36 465 B
Light Commands - Hacking Voice Assistants with Lasers - 2021.info.json 2022-04-21 15:36 519.6 KB
Light Commands - Hacking Voice Assistants with Lasers - 2021.mp4 2021-04-05 17:15 222.8 MB
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2021 - 2021.description 2022-04-21 13:10 525 B
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2021 - 2021.info.json 2022-04-21 13:10 265.1 KB
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2021 - 2021.mp4 2021-12-07 01:04 226.9 MB
Locknote - Conclusions and Key Takeaways from Day 1 - 2021.description 2022-04-21 15:49 334 B
Locknote - Conclusions and Key Takeaways from Day 1 - 2021.info.json 2022-04-21 15:49 603.9 KB
Locknote - Conclusions and Key Takeaways from Day 1 - 2021.mp4 2021-08-19 17:36 335.5 MB
Locknote - Conclusions and Key Takeaways from Day 2 - 2021.description 2022-04-21 15:49 341 B
Locknote - Conclusions and Key Takeaways from Day 2 - 2021.info.json 2022-04-21 15:49 592.0 KB
Locknote - Conclusions and Key Takeaways from Day 2 - 2021.mp4 2021-03-10 11:51 219.6 MB
Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community - 2021.description 2022-04-21 16:35 1.1 KB
Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community - 2021.info.json 2022-04-21 16:35 599.3 KB
Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community - 2021.mp4 2021-02-26 23:25 116.5 MB
Manufacturing Hardware Implants from Idea to Mass Production - A Hacker's Journey - 2021.description 2022-04-21 15:24 432 B
Manufacturing Hardware Implants from Idea to Mass Production - A Hacker's Journey - 2021.info.json 2022-04-21 15:24 264.5 KB
Manufacturing Hardware Implants from Idea to Mass Production - A Hacker's Journey - 2021.mp4 2021-05-21 23:13 183.5 MB
May the Trust be with You - Empowering TrustZone-M with Multiple Trusted Environments - 2021.description 2022-04-21 16:07 510 B
May the Trust be with You - Empowering TrustZone-M with Multiple Trusted Environments - 2021.info.json 2022-04-21 16:07 496.1 KB
May the Trust be with You - Empowering TrustZone-M with Multiple Trusted Environments - 2021.mp4 2021-02-26 20:30 69.9 MB
Mem2Img - Memory-Resident Malware Detection via Convolution Neural Network - 2021.description 2022-04-21 14:40 1.5 KB
Mem2Img - Memory-Resident Malware Detection via Convolution Neural Network - 2021.info.json 2022-04-21 14:40 265.5 KB
Mem2Img - Memory-Resident Malware Detection via Convolution Neural Network - 2021.mp4 2021-09-01 18:29 73.9 MB
MFA-ing the Un-MFA-ble - Protecting Auth Systems' Core Secrets - 2021.description 2022-04-21 13:31 589 B
MFA-ing the Un-MFA-ble - Protecting Auth Systems' Core Secrets - 2021.info.json 2022-04-21 13:31 267.2 KB
MFA-ing the Un-MFA-ble - Protecting Auth Systems' Core Secrets - 2021.mp4 2021-12-07 05:19 109.9 MB
Mining and Exploiting (Mobile) Payment Credential Leaks in the Wild - 2021.description 2022-04-21 14:39 1.3 KB
Mining and Exploiting (Mobile) Payment Credential Leaks in the Wild - 2021.info.json 2022-04-21 14:39 265.8 KB
Mining and Exploiting (Mobile) Payment Credential Leaks in the Wild - 2021.mp4 2021-09-01 13:44 99.2 MB
Misuse of DNS, the Second Most Used Protocol - 2021.description 2022-04-21 15:44 367 B
Misuse of DNS, the Second Most Used Protocol - 2021.info.json 2022-04-21 15:44 264.3 KB
Misuse of DNS, the Second Most Used Protocol - 2021.mp4 2021-09-04 13:38 84.5 MB
Mobius Band - Explore Hyper-V Attack Interface through Vulnerabilities Internals - 2021.description 2022-04-21 13:26 667 B
Mobius Band - Explore Hyper-V Attack Interface through Vulnerabilities Internals - 2021.info.json 2022-04-21 13:26 518.6 KB
Mobius Band - Explore Hyper-V Attack Interface through Vulnerabilities Internals - 2021.mp4 2021-12-02 14:02 82.4 MB
Modernizing API Security - 2021.description 2022-04-21 14:36 45 B
Modernizing API Security - 2021.info.json 2022-04-21 14:36 263.1 KB
Modernizing API Security - 2021.mp4 2021-09-22 16:23 36.5 MB
Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets - 2021.description 2022-04-21 16:14 902 B
Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets - 2021.info.json 2022-04-21 16:14 600.2 KB
Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets - 2021.mp4 2021-01-20 15:44 113.3 MB
My Cloud is APT's Cloud - Investigating and Defending Office 365 - 2021.description 2022-04-21 16:46 715 B
My Cloud is APT's Cloud - Investigating and Defending Office 365 - 2021.info.json 2022-04-21 16:46 603.7 KB
My Cloud is APT's Cloud - Investigating and Defending Office 365 - 2021.mp4 2021-01-19 20:35 141.7 MB
My Ticks Don't Lie - New Timing Attacks for Hypervisor Detection - 2021.description 2022-04-21 15:37 506 B
My Ticks Don't Lie - New Timing Attacks for Hypervisor Detection - 2021.info.json 2022-04-21 15:37 558.5 KB
My Ticks Don't Lie - New Timing Attacks for Hypervisor Detection - 2021.mp4 2021-04-05 15:50 119.7 MB
Needing the DoH - The Ongoing Encryption and Centralization of DNS - 2021.description 2022-04-21 17:28 845 B
Needing the DoH - The Ongoing Encryption and Centralization of DNS - 2021.info.json 2022-04-21 17:28 593.1 KB
Needing the DoH - The Ongoing Encryption and Centralization of DNS - 2021.mp4 2021-01-20 06:38 127.3 MB
New Attack Surface in Safari - Using Just One Web Audio Vulnerability to Rule Safari - 2021.description 2022-04-21 15:00 895 B
New Attack Surface in Safari - Using Just One Web Audio Vulnerability to Rule Safari - 2021.info.json 2022-04-21 15:00 264.9 KB
New Attack Surface in Safari - Using Just One Web Audio Vulnerability to Rule Safari - 2021.mp4 2021-09-01 15:09 56.9 MB
Next Gen SoC - How to get SOCs to do their job, i.e. handle Security - 2021.description 2022-04-21 14:32 64 B
Next Gen SoC - How to get SOCs to do their job, i.e. handle Security - 2021.info.json 2022-04-21 14:32 261.3 KB
Next Gen SoC - How to get SOCs to do their job, i.e. handle Security - 2021.mp4 2021-10-26 18:48 65.5 MB
Next-Gen DFIR - Mass Exploits & Supplier Compromise - 2021.description 2022-04-21 13:32 662 B
Next-Gen DFIR - Mass Exploits & Supplier Compromise - 2021.info.json 2022-04-21 13:32 265.6 KB
Next-Gen DFIR - Mass Exploits & Supplier Compromise - 2021.mp4 2021-12-07 06:04 129.7 MB
NoJITsu - Locking Down JavaScript Engines - 2021.description 2022-04-21 16:43 706 B
NoJITsu - Locking Down JavaScript Engines - 2021.info.json 2022-04-21 16:43 533.6 KB
NoJITsu - Locking Down JavaScript Engines - 2021.mp4 2021-01-20 01:05 99.9 MB
Office Drama on macOS - 2021.description 2022-04-21 16:47 572 B
Office Drama on macOS - 2021.info.json 2022-04-21 16:47 618.9 KB
Office Drama on macOS - 2021.mp4 2021-01-19 22:01 151.7 MB
Operation Chimera - APT Operation Targets Semiconductor Vendors - 2021.description 2022-04-21 16:41 1.0 KB
Operation Chimera - APT Operation Targets Semiconductor Vendors - 2021.info.json 2022-04-21 16:41 612.5 KB
Operation Chimera - APT Operation Targets Semiconductor Vendors - 2021.mp4 2021-01-20 00:44 94.1 MB
Over the Air Baseband Exploit - Gaining Remote Code Execution on 5G Smartphones - 2021.description 2022-04-21 14:06 816 B
Over the Air Baseband Exploit - Gaining Remote Code Execution on 5G Smartphones - 2021.info.json 2022-04-21 14:06 46.2 KB
Over the Air Baseband Exploit - Gaining Remote Code Execution on 5G Smartphones - 2021.mp4 2021-12-06 14:57 108.3 MB
Page Cache Attacks - Microarchitectural Attacks on Flawless Hardware - 2021.description 2022-04-21 16:01 474 B
Page Cache Attacks - Microarchitectural Attacks on Flawless Hardware - 2021.info.json 2022-04-21 16:01 557.0 KB
Page Cache Attacks - Microarchitectural Attacks on Flawless Hardware - 2021.mp4 2021-02-27 01:27 125.7 MB
Patching Loopholes - Finding Backdoors in Applications - 2021.description 2022-04-21 15:46 381 B
Patching Loopholes - Finding Backdoors in Applications - 2021.info.json 2022-04-21 15:46 426.7 KB
Patching Loopholes - Finding Backdoors in Applications - 2021.mp4 2021-02-27 10:34 46.2 MB
PCIe Device Attacks - Beyond DMA. Exploiting PCIe Switches, Messages and Errors - 2021.description 2022-04-21 14:12 945 B
PCIe Device Attacks - Beyond DMA. Exploiting PCIe Switches, Messages and Errors - 2021.info.json 2022-04-21 14:12 45.1 KB
PCIe Device Attacks - Beyond DMA. Exploiting PCIe Switches, Messages and Errors - 2021.mp4 2021-12-06 18:44 104.9 MB
Permission Mining in GCP - 2021.description 2022-04-21 15:22 420 B
Permission Mining in GCP - 2021.info.json 2022-04-21 15:22 264.5 KB
Permission Mining in GCP - 2021.mp4 2021-08-27 18:57 66.1 MB
Please Make a Dentist Appointment ASAP - Attacking IOBluetoothFamily HCI and Vendor-Specific Commands - 2021.description 2022-04-21 15:23 500 B
Please Make a Dentist Appointment ASAP - Attacking IOBluetoothFamily HCI and Vendor-Specific Commands - 2021.info.json 2022-04-21 15:23 581.1 KB
Please Make a Dentist Appointment ASAP - Attacking IOBluetoothFamily HCI and Vendor-Specific Commands - 2021.mp4 2021-03-10 14:40 114.3 MB
Plundervolt - Flipping Bits from Software without Rowhammer - 2021.description 2022-04-21 16:45 917 B
Plundervolt - Flipping Bits from Software without Rowhammer - 2021.info.json 2022-04-21 16:45 599.7 KB
Plundervolt - Flipping Bits from Software without Rowhammer - 2021.mp4 2021-01-20 00:31 151.1 MB
Policy Implications of Faulty Cyber Risk Models and How to Fix Them - 2021.description 2022-04-21 16:58 1.3 KB
Policy Implications of Faulty Cyber Risk Models and How to Fix Them - 2021.info.json 2022-04-21 16:58 636.5 KB
Policy Implications of Faulty Cyber Risk Models and How to Fix Them - 2021.mp4 2021-01-20 06:56 151.6 MB
Portable Data exFiltration - XSS for PDFs - 2021.description 2022-04-21 15:24 462 B
Portable Data exFiltration - XSS for PDFs - 2021.info.json 2022-04-21 15:24 547.0 KB
Portable Data exFiltration - XSS for PDFs - 2021.mp4 2021-03-12 13:02 77.9 MB
Portable Document Flaws 101 - 2021.description 2022-04-21 17:00 429 B
Portable Document Flaws 101 - 2021.info.json 2022-04-21 17:00 675.1 KB
Portable Document Flaws 101 - 2021.mp4 2021-01-20 08:06 132.5 MB
POSWorld. Should You be Afraid of Hands-On Payment Devices - 2021.description 2022-04-21 15:31 501 B
POSWorld. Should You be Afraid of Hands-On Payment Devices - 2021.info.json 2022-04-21 15:31 531.5 KB
POSWorld. Should You be Afraid of Hands-On Payment Devices - 2021.mp4 2021-03-27 19:25 86.2 MB
Practical Defenses Against Adversarial Machine Learning - 2021.description 2022-04-21 17:31 897 B
Practical Defenses Against Adversarial Machine Learning - 2021.info.json 2022-04-21 17:31 531.1 KB
Practical Defenses Against Adversarial Machine Learning - 2021.mp4 2021-01-20 06:08 197.3 MB
Pre-built JOP Chains with the JOP ROCKET - Bypassing DEP without ROP - 2021.description 2022-04-21 14:55 1.1 KB
Pre-built JOP Chains with the JOP ROCKET - Bypassing DEP without ROP - 2021.info.json 2022-04-21 14:55 265.5 KB
Pre-built JOP Chains with the JOP ROCKET - Bypassing DEP without ROP - 2021.mp4 2021-09-01 23:48 171.5 MB
Precursor - Towards Evidence-Based Trust in Hardware - 2021.description 2022-04-21 15:40 419 B
Precursor - Towards Evidence-Based Trust in Hardware - 2021.info.json 2022-04-21 15:40 624.8 KB
Precursor - Towards Evidence-Based Trust in Hardware - 2021.mp4 2021-04-05 16:59 168.4 MB
President's Cup Cyber Competition - Finding the Best Cyber Talent in the US Government - 2021.description 2022-04-21 14:10 760 B
President's Cup Cyber Competition - Finding the Best Cyber Talent in the US Government - 2021.info.json 2022-04-21 14:10 265.7 KB
President's Cup Cyber Competition - Finding the Best Cyber Talent in the US Government - 2021.mp4 2021-12-06 19:17 116.2 MB
ProxyLogon is Just the Tip of the Iceberg - A New Attack Surface on Microsoft Exchange Server! - 2021.description 2022-04-21 14:20 634 B
ProxyLogon is Just the Tip of the Iceberg - A New Attack Surface on Microsoft Exchange Server! - 2021.info.json 2022-04-21 14:20 265.8 KB
ProxyLogon is Just the Tip of the Iceberg - A New Attack Surface on Microsoft Exchange Server! - 2021.mp4 2021-12-06 18:52 118.2 MB
Put in One Bug and Pop Out More - An Effective Way of Bug Hunting in Chrome - 2021.description 2022-04-21 14:19 640 B
Put in One Bug and Pop Out More - An Effective Way of Bug Hunting in Chrome - 2021.info.json 2022-04-21 14:19 265.1 KB
Put in One Bug and Pop Out More - An Effective Way of Bug Hunting in Chrome - 2021.mp4 2021-12-06 16:31 80.9 MB
Qualcomm WiFi - Infinity War - 2021.description 2022-04-21 14:11 671 B
Qualcomm WiFi - Infinity War - 2021.info.json 2022-04-21 14:11 264.8 KB
Qualcomm WiFi - Infinity War - 2021.mp4 2021-12-06 14:20 73.8 MB
Quantum Security and Cryptography - You Are (Probably) Doing it Wrong - 2021.description 2022-04-21 15:39 486 B
Quantum Security and Cryptography - You Are (Probably) Doing it Wrong - 2021.info.json 2022-04-21 15:39 570.4 KB
Quantum Security and Cryptography - You Are (Probably) Doing it Wrong - 2021.mp4 2021-03-28 12:29 98.4 MB
Racing the Dark - A New TOCTTOU Story From Apple's Core - 2021.description 2022-04-21 14:53 615 B
Racing the Dark - A New TOCTTOU Story From Apple's Core - 2021.info.json 2022-04-21 14:53 265.0 KB
Racing the Dark - A New TOCTTOU Story From Apple's Core - 2021.mp4 2021-09-01 15:52 97.2 MB
Raiden Glitching Framework - 2021.description 2022-04-21 15:43 360 B
Raiden Glitching Framework - 2021.info.json 2022-04-21 15:43 619.3 KB
Raiden Glitching Framework - 2021.mp4 2021-02-27 08:07 97.3 MB
Ransomware, ICS Risk & Cyber-Mercenaries - Cybercrime in 2021 - 2021.description 2022-04-21 14:32 75 B
Ransomware, ICS Risk & Cyber-Mercenaries - Cybercrime in 2021 - 2021.info.json 2022-04-21 14:32 263.8 KB
Ransomware, ICS Risk & Cyber-Mercenaries - Cybercrime in 2021 - 2021.mp4 2021-10-21 18:34 76.1 MB
Reclaim the Upper Hand in Cloud Security - 2021.description 2022-04-21 15:17 244 B
Reclaim the Upper Hand in Cloud Security - 2021.info.json 2022-04-21 15:17 263.3 KB
Reclaim the Upper Hand in Cloud Security - 2021.mp4 2021-08-30 14:36 50.0 MB
Recording at Scale Across your Global Network is Essential for your Cyber Security Posture - 2021.description 2022-04-21 14:34 59 B
Recording at Scale Across your Global Network is Essential for your Cyber Security Posture - 2021.info.json 2022-04-21 14:34 264.0 KB
Recording at Scale Across your Global Network is Essential for your Cyber Security Posture - 2021.mp4 2021-10-12 19:59 82.4 MB
Redback - Advanced Static Binary Injection - 2021.description 2022-04-21 15:50 400 B
Redback - Advanced Static Binary Injection - 2021.info.json 2022-04-21 15:50 552.4 KB
Redback - Advanced Static Binary Injection - 2021.mp4 2021-02-27 03:54 93.5 MB
Remote Timing Attacks on TPMs, AKA TPM-Fail - 2021.description 2022-04-21 16:50 705 B
Remote Timing Attacks on TPMs, AKA TPM-Fail - 2021.info.json 2022-04-21 16:50 587.2 KB
Remote Timing Attacks on TPMs, AKA TPM-Fail - 2021.mp4 2021-01-19 22:26 151.4 MB
Repurposing Neural Networks to Generate Synthetic Media for Information Operations - 2021.description 2022-04-21 16:31 1.0 KB
Repurposing Neural Networks to Generate Synthetic Media for Information Operations - 2021.info.json 2022-04-21 16:31 601.3 KB
Repurposing Neural Networks to Generate Synthetic Media for Information Operations - 2021.mp4 2021-01-20 18:15 134.6 MB
Reverse Engineering Compliance - 2021.description 2022-04-21 15:00 616 B
Reverse Engineering Compliance - 2021.info.json 2022-04-21 15:00 264.7 KB
Reverse Engineering Compliance - 2021.mp4 2021-09-01 15:20 93.3 MB
Reverse Engineering the M1 - 2021.description 2022-04-21 14:07 747 B
Reverse Engineering the M1 - 2021.info.json 2022-04-21 14:07 265.4 KB
Reverse Engineering the M1 - 2021.mp4 2021-12-06 14:13 114.0 MB
Reverse Engineering the Tesla Battery Management System to increase Power Available - 2021.description 2022-04-21 17:31 920 B
Reverse Engineering the Tesla Battery Management System to increase Power Available - 2021.info.json 2022-04-21 17:31 606.0 KB
Reverse Engineering the Tesla Battery Management System to increase Power Available - 2021.mp4 2021-01-20 06:24 169.5 MB
Reversing the Root - Identifying the Exploited Vulnerability in 0-days Used In-The-Wild - 2021.description 2022-04-21 17:01 935 B
Reversing the Root - Identifying the Exploited Vulnerability in 0-days Used In-The-Wild - 2021.info.json 2022-04-21 17:01 612.4 KB
Reversing the Root - Identifying the Exploited Vulnerability in 0-days Used In-The-Wild - 2021.mp4 2021-01-20 10:28 135.1 MB
Room for Escape - Scribbling Outside the Lines of Template Security - 2021.description 2022-04-21 16:58 778 B
Room for Escape - Scribbling Outside the Lines of Template Security - 2021.info.json 2022-04-21 16:58 593.2 KB
Room for Escape - Scribbling Outside the Lines of Template Security - 2021.mp4 2021-01-20 10:56 105.1 MB
Rope - Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution - 2021.description 2022-04-21 14:22 1011 B
Rope - Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution - 2021.info.json 2022-04-21 14:22 265.6 KB
Rope - Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution - 2021.mp4 2021-12-06 16:23 104.8 MB
Routopsy - Modern Routing Protocol Vulnerability Analysis and Exploitation - 2021.description 2022-04-21 16:42 822 B
Routopsy - Modern Routing Protocol Vulnerability Analysis and Exploitation - 2021.info.json 2022-04-21 16:42 613.1 KB
Routopsy - Modern Routing Protocol Vulnerability Analysis and Exploitation - 2021.mp4 2021-01-19 23:14 85.7 MB
Ruling StarCraft Game Spitefully -- Exploiting the Blind Spot of AI-Powered Game Bots - 2021.description 2022-04-21 17:26 775 B
Ruling StarCraft Game Spitefully -- Exploiting the Blind Spot of AI-Powered Game Bots - 2021.info.json 2022-04-21 17:26 601.1 KB
Ruling StarCraft Game Spitefully -- Exploiting the Blind Spot of AI-Powered Game Bots - 2021.mp4 2021-01-20 05:57 138.9 MB
Safeguarding UEFI Ecosystem - Firmware Supply Chain is Hard(coded) - 2021.description 2022-04-21 14:11 1.0 KB
Safeguarding UEFI Ecosystem - Firmware Supply Chain is Hard(coded) - 2021.info.json 2022-04-21 14:11 265.6 KB
Safeguarding UEFI Ecosystem - Firmware Supply Chain is Hard(coded) - 2021.mp4 2021-12-06 16:45 120.4 MB
Scavenger - Misuse Error Handling Leading to Qemu_KVM Escape - 2021.description 2022-04-21 14:37 711 B
Scavenger - Misuse Error Handling Leading to Qemu_KVM Escape - 2021.info.json 2022-04-21 14:37 265.2 KB
Scavenger - Misuse Error Handling Leading to Qemu_KVM Escape - 2021.mp4 2021-09-01 12:23 78.7 MB
Securing Open Source Software - End-to-end, At massive scale, Together - 2021.description 2022-04-21 14:02 1.4 KB
Securing Open Source Software - End-to-end, At massive scale, Together - 2021.info.json 2022-04-21 14:02 266.0 KB
Securing Open Source Software - End-to-end, At massive scale, Together - 2021.mp4 2021-12-06 19:19 116.7 MB
Securing the Next Version of HTTP - How QUIC and HTTP_3 Compare to HTTP_2 - 2021.description 2022-04-21 15:44 403 B
Securing the Next Version of HTTP - How QUIC and HTTP_3 Compare to HTTP_2 - 2021.info.json 2022-04-21 15:44 551.1 KB
Securing the Next Version of HTTP - How QUIC and HTTP_3 Compare to HTTP_2 - 2021.mp4 2021-02-27 09:12 72.8 MB
Securing the Public, who is in Charge - 2021.description 2022-04-28 10:29 270 B
Securing the Public, who is in Charge - 2021.info.json 2022-04-28 10:29 265.4 KB
Securing the Public, who is in Charge - 2021.mp4 2021-11-23 22:51 352.6 MB
Security Analysis of CHERI ISASecurity Analysis of CHERI ISA - 2021.description 2022-04-21 14:04 679 B
Security Analysis of CHERI ISASecurity Analysis of CHERI ISA - 2021.info.json 2022-04-21 14:04 264.1 KB
Security Analysis of CHERI ISASecurity Analysis of CHERI ISA - 2021.mp4 2021-12-06 17:13 107.8 MB
Security Research on Mercedes-Benz - From Hardware to Car Control - 2021.description 2022-04-21 16:43 580 B
Security Research on Mercedes-Benz - From Hardware to Car Control - 2021.info.json 2022-04-21 16:43 661.8 KB
Security Research on Mercedes-Benz - From Hardware to Car Control - 2021.mp4 2021-01-19 23:54 153.5 MB
Self-Learning AI - Minimize Cyber Disruption - 2021.description 2022-04-21 14:35 296 B
Self-Learning AI - Minimize Cyber Disruption - 2021.info.json 2022-04-21 14:35 263.6 KB
Self-Learning AI - Minimize Cyber Disruption - 2021.mp4 2021-09-22 16:18 52.9 MB
Shield with Hole - New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy - 2021.description 2022-04-28 10:48 514 B
Shield with Hole - New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy - 2021.info.json 2022-04-28 10:48 567.2 KB
Shield with Hole - New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy - 2021.mp4 2021-03-21 14:27 134.3 MB
Sleight of ARM - Demystifying Intel Houdini - 2021.description 2022-04-28 10:22 872 B
Sleight of ARM - Demystifying Intel Houdini - 2021.info.json 2022-04-28 10:22 265.5 KB
Sleight of ARM - Demystifying Intel Houdini - 2021.mp4 2021-12-06 21:56 107.4 MB
Smashing the ML Stack for Fun and Lawsuits - 2021.description 2022-04-21 14:23 678 B
Smashing the ML Stack for Fun and Lawsuits - 2021.info.json 2022-04-21 14:23 264.8 KB
Smashing the ML Stack for Fun and Lawsuits - 2021.mp4 2021-12-06 17:12 84.7 MB
Spectra - Breaking Separation Between Wireless Chips - 2021.description 2022-04-21 16:31 637 B
Spectra - Breaking Separation Between Wireless Chips - 2021.info.json 2022-04-21 16:31 602.1 KB
Spectra - Breaking Separation Between Wireless Chips - 2021.mp4 2021-01-20 14:07 147.4 MB
Speed + Security – Best Practices for Securing Containers - 2021.description 2022-04-21 16:10 233 B
Speed + Security – Best Practices for Securing Containers - 2021.info.json 2022-04-21 16:10 264.2 KB
Speed + Security – Best Practices for Securing Containers - 2021.mp4 2021-08-28 11:07 92.4 MB
Staying Ahead of the Changing Attack Landscape with Zero Trust - 2021.description 2022-04-21 14:33 44 B
Staying Ahead of the Changing Attack Landscape with Zero Trust - 2021.info.json 2022-04-21 14:33 264.0 KB
Staying Ahead of the Changing Attack Landscape with Zero Trust - 2021.mp4 2021-10-21 17:53 48.6 MB
Stealthily Access Your Android Phones - Bypass the Bluetooth Authentication - 2021.description 2022-04-21 16:35 697 B
Stealthily Access Your Android Phones - Bypass the Bluetooth Authentication - 2021.info.json 2022-04-21 16:35 603.8 KB
Stealthily Access Your Android Phones - Bypass the Bluetooth Authentication - 2021.mp4 2021-01-20 14:34 125.3 MB
Stopping Snake Oil with Smaller Healthcare Providers - Addressing Security with Actionable Plans - 2021.description 2022-04-21 16:38 734 B
Stopping Snake Oil with Smaller Healthcare Providers - Addressing Security with Actionable Plans - 2021.info.json 2022-04-21 16:38 600.4 KB
Stopping Snake Oil with Smaller Healthcare Providers - Addressing Security with Actionable Plans - 2021.mp4 2021-01-20 17:50 125.4 MB
Store-to-Leak Forwarding - There and Back Again - 2021.description 2022-04-28 10:54 419 B
Store-to-Leak Forwarding - There and Back Again - 2021.info.json 2022-04-28 10:54 566.4 KB
Store-to-Leak Forwarding - There and Back Again - 2021.mp4 2021-02-27 03:08 135.4 MB
Story of Jailbreaking iOS 13 - 2021.description 2022-04-21 15:32 442 B
Story of Jailbreaking iOS 13 - 2021.info.json 2022-04-21 15:32 578.2 KB
Story of Jailbreaking iOS 13 - 2021.mp4 2021-03-28 09:51 73.4 MB
Superman Powered by Kryptonite - Turn the Adversarial Attack into Your Defense Weapon - 2021.description 2022-04-21 17:02 654 B
Superman Powered by Kryptonite - Turn the Adversarial Attack into Your Defense Weapon - 2021.info.json 2022-04-21 17:02 474.4 KB
Superman Powered by Kryptonite - Turn the Adversarial Attack into Your Defense Weapon - 2021.mp4 2021-01-20 02:43 66.0 MB
Symbexcel - Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros - 2021.description 2022-04-21 14:06 1.0 KB
Symbexcel - Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros - 2021.info.json 2022-04-21 14:06 265.7 KB
Symbexcel - Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros - 2021.mp4 2021-12-07 11:38 94.2 MB
Tackling Social Engineering in Today’s Cybersecurity World - 2021.description 2022-04-21 14:33 76 B
Tackling Social Engineering in Today’s Cybersecurity World - 2021.info.json 2022-04-21 14:33 263.8 KB
Tackling Social Engineering in Today’s Cybersecurity World - 2021.mp4 2021-10-21 18:43 59.1 MB
The B-MAD Approach to Threat Modeling - 2021.description 2022-04-21 15:00 657 B
The B-MAD Approach to Threat Modeling - 2021.info.json 2022-04-21 15:00 485.9 KB
The B-MAD Approach to Threat Modeling - 2021.mp4 2021-08-15 21:22 78.4 MB
The Black Hat NOC - Greatest Hits and Holy...Cows - 2021.description 2022-04-21 15:47 324 B
The Black Hat NOC - Greatest Hits and Holy...Cows - 2021.info.json 2022-04-21 15:47 632.7 KB
The Black Hat NOC - Greatest Hits and Holy...Cows - 2021.mp4 2021-02-27 11:31 119.4 MB
The Case for a National Cybersecurity Safety Board - 2021.description 2022-04-21 14:19 1.3 KB
The Case for a National Cybersecurity Safety Board - 2021.info.json 2022-04-21 14:19 540.4 KB
The Case for a National Cybersecurity Safety Board - 2021.mp4 2021-12-02 19:21 116.1 MB
The Cost of Complexity - Different Vulnerabilities While Implementing the Same RFC - 2021.description 2022-04-21 14:39 560 B
The Cost of Complexity - Different Vulnerabilities While Implementing the Same RFC - 2021.info.json 2022-04-21 14:39 266.0 KB
The Cost of Complexity - Different Vulnerabilities While Implementing the Same RFC - 2021.mp4 2021-09-01 21:02 99.5 MB
The Dark Age of Memory Corruption Mitigations in the Spectre Era - 2021.description 2022-04-21 14:05 605 B
The Dark Age of Memory Corruption Mitigations in the Spectre Era - 2021.info.json 2022-04-21 14:05 265.1 KB
The Dark Age of Memory Corruption Mitigations in the Spectre Era - 2021.mp4 2021-12-06 14:42 93.0 MB
The Dark Side of the Cloud - How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis - 2021.description 2022-04-21 16:40 1014 B
The Dark Side of the Cloud - How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis - 2021.info.json 2022-04-21 16:40 536.1 KB
The Dark Side of the Cloud - How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis - 2021.mp4 2021-01-20 19:38 100.7 MB
The Devil is in the GAN - Defending Deep Generative Models Against Adversarial Attacks - 2021.description 2022-04-21 14:30 1.0 KB
The Devil is in the GAN - Defending Deep Generative Models Against Adversarial Attacks - 2021.info.json 2022-04-21 14:30 265.8 KB
The Devil is in the GAN - Defending Deep Generative Models Against Adversarial Attacks - 2021.mp4 2021-11-22 13:40 119.2 MB
The Evil Alt-Ego - (ab)using HTTP Alternative Services - 2021.description 2022-04-21 15:42 425 B
The Evil Alt-Ego - (ab)using HTTP Alternative Services - 2021.info.json 2022-04-21 15:42 264.6 KB
The Evil Alt-Ego - (ab)using HTTP Alternative Services - 2021.mp4 2021-08-31 07:13 122.9 MB
The Evil of Spy Camera - 2021.description 2022-04-21 15:41 311 B
The Evil of Spy Camera - 2021.info.json 2022-04-21 15:41 264.4 KB
The Evil of Spy Camera - 2021.mp4 2021-08-29 21:25 93.3 MB
The Evolution of Ransomeware - 2021.description 2022-04-21 15:21 321 B
The Evolution of Ransomeware - 2021.info.json 2022-04-21 15:21 263.3 KB
The Evolution of Ransomeware - 2021.mp4 2021-08-30 23:09 47.5 MB
The Evolution of the CISO with Ben Carr, CISO at Qualys - 2021.description 2022-04-21 15:19 130 B
The Evolution of the CISO with Ben Carr, CISO at Qualys - 2021.info.json 2022-04-21 15:19 263.8 KB
The Evolution of the CISO with Ben Carr, CISO at Qualys - 2021.mp4 2021-08-31 12:25 82.6 MB
The Hunt for Major League IoT-ICS Threats - A Deep Dive into IoT Threat Terrain - 2021.description 2022-04-21 15:25 478 B
The Hunt for Major League IoT-ICS Threats - A Deep Dive into IoT Threat Terrain - 2021.info.json 2022-04-21 15:25 533.6 KB
The Hunt for Major League IoT-ICS Threats - A Deep Dive into IoT Threat Terrain - 2021.mp4 2021-03-21 10:27 159.8 MB
The Inside Story - There are Apps in Apps and Here is How to Break Them - 2021.description 2022-04-21 16:05 443 B
The Inside Story - There are Apps in Apps and Here is How to Break Them - 2021.info.json 2022-04-21 16:05 480.4 KB
The Inside Story - There are Apps in Apps and Here is How to Break Them - 2021.mp4 2021-02-26 21:50 55.8 MB
The Kitten that Charmed Me - The 9 Lives of a Nation State Attacker - 2021.description 2022-04-21 15:11 966 B
The Kitten that Charmed Me - The 9 Lives of a Nation State Attacker - 2021.info.json 2022-04-21 15:11 265.3 KB
The Kitten that Charmed Me - The 9 Lives of a Nation State Attacker - 2021.mp4 2021-08-20 15:43 92.1 MB
The Mass Effect - How Opportunistic Workers Drift into Cybercrime - 2021.description 2022-04-21 14:03 1.1 KB
The Mass Effect - How Opportunistic Workers Drift into Cybercrime - 2021.info.json 2022-04-21 14:03 265.7 KB
The Mass Effect - How Opportunistic Workers Drift into Cybercrime - 2021.mp4 2021-12-06 14:08 109.2 MB
The Motion Sensor Western - The Good, the Bad, and the Ugly - 2021.description 2022-04-21 15:02 1.2 KB
The Motion Sensor Western - The Good, the Bad, and the Ugly - 2021.info.json 2022-04-21 15:02 265.2 KB
The Motion Sensor Western - The Good, the Bad, and the Ugly - 2021.mp4 2021-09-01 17:22 77.8 MB
The Paramedic's Guide to Surviving Cybersecurity - 2021.description 2022-04-21 16:36 1.3 KB
The Paramedic's Guide to Surviving Cybersecurity - 2021.info.json 2022-04-21 16:36 600.4 KB
The Paramedic's Guide to Surviving Cybersecurity - 2021.mp4 2021-01-20 18:45 139.7 MB
The Price of Compatibility - Defeating macOS Kernel Using Extended File Attributes - 2021.description 2022-04-21 15:02 882 B
The Price of Compatibility - Defeating macOS Kernel Using Extended File Attributes - 2021.info.json 2022-04-21 15:02 265.4 KB
The Price of Compatibility - Defeating macOS Kernel Using Extended File Attributes - 2021.mp4 2021-09-01 14:51 102.5 MB
The Ripple Effect - Building a Diverse Security Research Team - 2021.description 2022-04-21 15:14 499 B
The Ripple Effect - Building a Diverse Security Research Team - 2021.info.json 2022-04-21 15:14 265.2 KB
The Ripple Effect - Building a Diverse Security Research Team - 2021.mp4 2021-08-21 16:07 114.4 MB
The Rise of Potatoes - Privilege Escalations in Windows Services - 2021.description 2022-04-21 15:04 507 B
The Rise of Potatoes - Privilege Escalations in Windows Services - 2021.info.json 2022-04-21 15:04 265.4 KB
The Rise of Potatoes - Privilege Escalations in Windows Services - 2021.mp4 2021-09-01 14:28 119.6 MB
The State of State Machines - 2021.description 2022-04-21 16:09 216 B
The State of State Machines - 2021.info.json 2022-04-21 16:09 263.4 KB
The State of State Machines - 2021.mp4 2021-09-03 20:32 114.4 MB
The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study - 2021.description 2022-04-21 15:32 486 B
The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study - 2021.info.json 2022-04-21 15:32 333.1 KB
The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study - 2021.mp4 2021-03-28 10:17 241.5 MB
The Tangled Webview ----- Javascriptinterface Once More - 2021.description 2022-04-21 15:01 647 B
The Tangled Webview ----- Javascriptinterface Once More - 2021.info.json 2022-04-21 15:01 264.2 KB
The Tangled Webview ----- Javascriptinterface Once More - 2021.mp4 2021-09-01 21:26 51.6 MB
This is for the Pwners - Exploiting a WebKit 0-day in PlayStation 4 - 2021.description 2022-04-21 15:22 490 B
This is for the Pwners - Exploiting a WebKit 0-day in PlayStation 4 - 2021.info.json 2022-04-21 15:22 264.5 KB
This is for the Pwners - Exploiting a WebKit 0-day in PlayStation 4 - 2021.mp4 2021-05-21 15:34 61.5 MB
Threat Hunting in Active Directory Environment - 2021.description 2022-04-21 14:48 999 B
Threat Hunting in Active Directory Environment - 2021.info.json 2022-04-21 14:48 265.5 KB
Threat Hunting in Active Directory Environment - 2021.mp4 2021-09-01 16:35 86.0 MB
Timeless Timing Attacks - 2021.description 2022-04-21 14:09 1.0 KB
Timeless Timing Attacks - 2021.info.json 2022-04-21 14:09 266.7 KB
Timeless Timing Attacks - 2021.mp4 2021-12-06 16:53 110.0 MB
TiYunZong Exploit Chain to Remotely Root Modern Android Devices - Pwn Android Phones from 2015-2020 - 2021.description 2022-04-21 17:28 900 B
TiYunZong Exploit Chain to Remotely Root Modern Android Devices - Pwn Android Phones from 2015-2020 - 2021.info.json 2022-04-21 17:28 670.2 KB
TiYunZong Exploit Chain to Remotely Root Modern Android Devices - Pwn Android Phones from 2015-2020 - 2021.mp4 2021-01-20 10:00 91.1 MB
Tracking the Criminal of Fake News Based on a Unified Embedding - 2021.description 2022-04-21 16:05 448 B
Tracking the Criminal of Fake News Based on a Unified Embedding - 2021.info.json 2022-04-21 16:05 464.7 KB
Tracking the Criminal of Fake News Based on a Unified Embedding - 2021.mp4 2021-02-26 22:06 54.8 MB
Typhoon Mangkhut - One-click Remote Universal Root Formed with Two Vulnerabilities - 2021.description 2022-04-21 14:04 1.0 KB
Typhoon Mangkhut - One-click Remote Universal Root Formed with Two Vulnerabilities - 2021.info.json 2022-04-21 14:04 265.8 KB
Typhoon Mangkhut - One-click Remote Universal Root Formed with Two Vulnerabilities - 2021.mp4 2021-12-06 14:45 102.9 MB
Uncommon Sense - Detecting Exploits with Novel Hardware Performance Counters and ML Magic - 2021.description 2022-04-21 16:57 772 B
Uncommon Sense - Detecting Exploits with Novel Hardware Performance Counters and ML Magic - 2021.info.json 2022-04-21 16:57 629.3 KB
Uncommon Sense - Detecting Exploits with Novel Hardware Performance Counters and ML Magic - 2021.mp4 2021-01-19 23:31 132.6 MB
Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity - 2021.description 2022-04-21 14:20 600 B
Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity - 2021.info.json 2022-04-21 14:20 264.9 KB
Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity - 2021.mp4 2021-12-06 18:31 102.9 MB
Understanding and Addressing The True Risks Facing Connected Machinery _ Operational Technology - 2021.description 2022-04-21 14:34 39 B
Understanding and Addressing The True Risks Facing Connected Machinery _ Operational Technology - 2021.info.json 2022-04-21 14:34 264.0 KB
Understanding and Addressing The True Risks Facing Connected Machinery _ Operational Technology - 2021.mp4 2021-10-18 14:41 44.3 MB
Understanding the Threat Landscape With Juan Andres Guerrero-Saade of SentinelLabs - 2021.description 2022-04-21 15:18 192 B
Understanding the Threat Landscape With Juan Andres Guerrero-Saade of SentinelLabs - 2021.info.json 2022-04-21 15:18 263.9 KB
Understanding the Threat Landscape With Juan Andres Guerrero-Saade of SentinelLabs - 2021.mp4 2021-08-29 00:01 62.9 MB
Vibe Check - IDK About This…. Why Students May Shy Away From Cyber in a Surveillance State - 2021.description 2022-04-21 14:55 520 B
Vibe Check - IDK About This…. Why Students May Shy Away From Cyber in a Surveillance State - 2021.info.json 2022-04-21 14:55 265.1 KB
Vibe Check - IDK About This…. Why Students May Shy Away From Cyber in a Surveillance State - 2021.mp4 2021-09-01 13:18 123.8 MB
Virtually Private Networks - 2021.description 2022-04-21 16:50 597 B
Virtually Private Networks - 2021.info.json 2022-04-21 16:50 653.7 KB
Virtually Private Networks - 2021.mp4 2021-01-20 00:14 152.3 MB
Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities - 2021.description 2022-04-21 15:41 544 B
Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities - 2021.info.json 2022-04-21 15:41 265.0 KB
Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities - 2021.mp4 2021-05-14 03:13 216.9 MB
Web Cache Entanglement - Novel Pathways to Poisoning - 2021.description 2022-04-21 16:38 494 B
Web Cache Entanglement - Novel Pathways to Poisoning - 2021.info.json 2022-04-21 16:38 594.5 KB
Web Cache Entanglement - Novel Pathways to Poisoning - 2021.mp4 2021-01-20 16:26 79.2 MB
What the Log! So Many Events, so Little Time... - 2021.description 2022-04-21 15:45 385 B
What the Log! So Many Events, so Little Time... - 2021.info.json 2022-04-21 15:45 265.1 KB
What the Log! So Many Events, so Little Time... - 2021.mp4 2021-02-27 09:58 159.4 MB
When Lightning Strikes Thrice - Breaking Thunderbolt 3 Security - 2021.description 2022-04-21 16:51 1.1 KB
When Lightning Strikes Thrice - Breaking Thunderbolt 3 Security - 2021.info.json 2022-04-21 16:51 605.6 KB
When Lightning Strikes Thrice - Breaking Thunderbolt 3 Security - 2021.mp4 2021-01-20 02:18 198.5 MB
When TLS Hacks You - 2021.description 2022-04-21 16:38 683 B
When TLS Hacks You - 2021.info.json 2022-04-21 16:38 518.2 KB
When TLS Hacks You - 2021.mp4 2021-01-20 19:15 104.3 MB
Whispers Among the Stars - A Practical Look at Perpetrating Satellite Eavesdropping Attacks - 2021.description 2022-04-21 16:40 700 B
Whispers Among the Stars - A Practical Look at Perpetrating Satellite Eavesdropping Attacks - 2021.info.json 2022-04-21 16:40 578.3 KB
Whispers Among the Stars - A Practical Look at Perpetrating Satellite Eavesdropping Attacks - 2021.mp4 2021-01-20 19:52 122.9 MB
Whoops, I Accidentally Helped Start the Offensive Intel Branch of a Foreign Intel Service - 2021.description 2022-04-21 14:05 522 B
Whoops, I Accidentally Helped Start the Offensive Intel Branch of a Foreign Intel Service - 2021.info.json 2022-04-21 14:05 264.4 KB
Whoops, I Accidentally Helped Start the Offensive Intel Branch of a Foreign Intel Service - 2021.mp4 2021-12-06 13:57 78.9 MB
Why Asset Management Matters for Cybersecurity - 2021.description 2022-04-21 14:31 41 B
Why Asset Management Matters for Cybersecurity - 2021.info.json 2022-04-21 14:31 263.7 KB
Why Asset Management Matters for Cybersecurity - 2021.mp4 2021-10-27 12:46 53.1 MB
Wi-Fi Brokering - 2021.description 2022-04-21 16:08 390 B
Wi-Fi Brokering - 2021.info.json 2022-04-21 16:08 540.6 KB
Wi-Fi Brokering - 2021.mp4 2021-02-26 20:12 91.7 MB
Wibbly Wobbly, Timey Wimey – What's Really Inside Apple's U1 Chip - 2021.description 2022-04-21 14:09 910 B
Wibbly Wobbly, Timey Wimey – What's Really Inside Apple's U1 Chip - 2021.info.json 2022-04-21 14:09 265.2 KB
Wibbly Wobbly, Timey Wimey – What's Really Inside Apple's U1 Chip - 2021.mp4 2021-12-06 18:31 89.0 MB
Wideshears - Investigating and Breaking Widevine on QTEE - 2021.description 2022-04-21 14:53 1.1 KB
Wideshears - Investigating and Breaking Widevine on QTEE - 2021.info.json 2022-04-21 14:53 265.1 KB
Wideshears - Investigating and Breaking Widevine on QTEE - 2021.mp4 2021-09-01 22:15 63.0 MB
WIFI-Important Remote Attack Surface - Threat is Expanding - 2021.description 2022-04-21 15:45 365 B
WIFI-Important Remote Attack Surface - Threat is Expanding - 2021.info.json 2022-04-21 15:45 264.4 KB
WIFI-Important Remote Attack Surface - Threat is Expanding - 2021.mp4 2021-09-02 07:09 63.4 MB
Win the 0-Day Racing Game Against Botnet in Public Cloud - 2021.description 2022-04-21 16:04 429 B
Win the 0-Day Racing Game Against Botnet in Public Cloud - 2021.info.json 2022-04-21 16:04 464.7 KB
Win the 0-Day Racing Game Against Botnet in Public Cloud - 2021.mp4 2021-02-26 22:21 55.0 MB
Windows Heap-backed Pool - The Good, the Bad, and the Encoded - 2021.description 2022-04-21 14:08 507 B
Windows Heap-backed Pool - The Good, the Bad, and the Encoded - 2021.info.json 2022-04-21 14:08 265.3 KB
Windows Heap-backed Pool - The Good, the Bad, and the Encoded - 2021.mp4 2021-12-06 16:54 124.6 MB
With Friends Like eBPF, Who Needs Enemies - 2021.description 2022-04-21 14:03 482 B
With Friends Like eBPF, Who Needs Enemies - 2021.info.json 2022-04-21 14:03 265.1 KB
With Friends Like eBPF, Who Needs Enemies - 2021.mp4 2021-12-06 14:58 106.6 MB
X-in-the-Middle - Attacking Fast Charging Piles and Electric Vehicles - 2021.description 2022-04-21 14:38 546 B
X-in-the-Middle - Attacking Fast Charging Piles and Electric Vehicles - 2021.info.json 2022-04-21 14:38 264.5 KB
X-in-the-Middle - Attacking Fast Charging Piles and Electric Vehicles - 2021.mp4 2021-09-01 16:12 63.2 MB
You have No Idea Who Sent that Email - 18 Attacks on Email Sender Authentication - 2021.description 2022-04-21 16:14 1.0 KB
You have No Idea Who Sent that Email - 18 Attacks on Email Sender Authentication - 2021.info.json 2022-04-21 16:14 267.3 KB
You have No Idea Who Sent that Email - 18 Attacks on Email Sender Authentication - 2021.mp4 2022-01-16 16:10 168.6 MB
Your Software IS_NOT Vulnerable - CSAF, VEX, and the Future of Advisories - 2021.description 2022-04-21 14:24 704 B
Your Software IS_NOT Vulnerable - CSAF, VEX, and the Future of Advisories - 2021.info.json 2022-04-21 14:24 264.6 KB
Your Software IS_NOT Vulnerable - CSAF, VEX, and the Future of Advisories - 2021.mp4 2021-12-06 14:30 64.0 MB
Zero - The Funniest Number in Cryptography - 2021.description 2022-04-21 14:10 718 B
Zero - The Funniest Number in Cryptography - 2021.info.json 2022-04-21 14:10 262.1 KB
Zero - The Funniest Number in Cryptography - 2021.mp4 2021-12-06 14:32 67.6 MB
ZombieLoad - Leaking Data on Intel CPUs - 2021.description 2022-04-21 16:00 505 B
ZombieLoad - Leaking Data on Intel CPUs - 2021.info.json 2022-04-21 16:00 342.1 KB
ZombieLoad - Leaking Data on Intel CPUs - 2021.mp4 2021-02-27 02:46 98.7 MB

[return to top]