| ↑ Parent Directory |
| 'We Wait, Because We Know You' - Inside the Ransomware Negotiation Economics - 2022.description
|
2022-04-21 12:40 |
796 B |
| 'We Wait, Because We Know You' - Inside the Ransomware Negotiation Economics - 2022.info.json
|
2022-04-21 12:40 |
265.5 KB |
| 'We Wait, Because We Know You' - Inside the Ransomware Negotiation Economics - 2022.mp4
|
2022-01-31 18:08 |
59.5 MB |
| 2021 - A Titan M Odyssey - 2022.description
|
2022-04-21 12:44 |
796 B |
| 2021 - A Titan M Odyssey - 2022.info.json
|
2022-04-21 12:44 |
267.4 KB |
| 2021 - A Titan M Odyssey - 2022.mp4
|
2022-02-01 02:49 |
87.4 MB |
| A Deep Dive into Privacy Dashboard of Top Android Vendors - 2022.description
|
2022-04-21 12:52 |
895 B |
| A Deep Dive into Privacy Dashboard of Top Android Vendors - 2022.info.json
|
2022-04-21 12:52 |
265.5 KB |
| A Deep Dive into Privacy Dashboard of Top Android Vendors - 2022.mp4
|
2022-01-31 21:56 |
88.9 MB |
| A Universal Way to Exploit Android PendingIntents in High-profile and System Apps - 2022.description
|
2022-04-21 12:47 |
751 B |
| A Universal Way to Exploit Android PendingIntents in High-profile and System Apps - 2022.info.json
|
2022-04-21 12:48 |
509.2 KB |
| A Universal Way to Exploit Android PendingIntents in High-profile and System Apps - 2022.mp4
|
2022-02-01 01:18 |
72.2 MB |
| Achieving Linux Kernel Code Execution Through a Malicious USB Device - 2022.description
|
2022-04-21 12:43 |
712 B |
| Achieving Linux Kernel Code Execution Through a Malicious USB Device - 2022.info.json
|
2022-04-21 12:43 |
266.4 KB |
| Achieving Linux Kernel Code Execution Through a Malicious USB Device - 2022.mp4
|
2022-02-01 12:14 |
84.7 MB |
| AIModel-Mutator - Finding Vulnerabilities in TensorFlow - 2022.description
|
2022-04-21 12:40 |
1.1 KB |
| AIModel-Mutator - Finding Vulnerabilities in TensorFlow - 2022.info.json
|
2022-04-21 12:40 |
265.6 KB |
| AIModel-Mutator - Finding Vulnerabilities in TensorFlow - 2022.mp4
|
2022-01-31 20:55 |
58.1 MB |
| APTs Go Teleworking - The Rise of VPN Exploits - 2022.description
|
2022-04-21 12:53 |
665 B |
| APTs Go Teleworking - The Rise of VPN Exploits - 2022.info.json
|
2022-04-21 12:53 |
264.4 KB |
| APTs Go Teleworking - The Rise of VPN Exploits - 2022.mp4
|
2022-02-01 02:24 |
74.9 MB |
| BadMesher - New Attack Surfaces of Wi-Fi Mesh Network - 2022.description
|
2022-04-21 12:39 |
776 B |
| BadMesher - New Attack Surfaces of Wi-Fi Mesh Network - 2022.info.json
|
2022-04-21 12:39 |
266.4 KB |
| BadMesher - New Attack Surfaces of Wi-Fi Mesh Network - 2022.mp4
|
2022-01-31 18:35 |
69.7 MB |
| Building Better CSIRTs Using Behavioral Psychology - 2022.description
|
2022-04-21 12:46 |
767 B |
| Building Better CSIRTs Using Behavioral Psychology - 2022.info.json
|
2022-04-21 12:46 |
265.4 KB |
| Building Better CSIRTs Using Behavioral Psychology - 2022.mp4
|
2022-02-01 04:26 |
117.9 MB |
| Burning Bridges - Stopping Lateral Movement via the RPC Firewall - 2022.description
|
2022-04-21 12:39 |
709 B |
| Burning Bridges - Stopping Lateral Movement via the RPC Firewall - 2022.info.json
|
2022-04-21 12:39 |
267.1 KB |
| Burning Bridges - Stopping Lateral Movement via the RPC Firewall - 2022.mp4
|
2022-01-31 22:25 |
86.1 MB |
| ChaosDB - How We Hacked Databases of Thousands of Azure Customers (rev) - 2022.description
|
2022-04-21 12:32 |
725 B |
| ChaosDB - How We Hacked Databases of Thousands of Azure Customers (rev) - 2022.info.json
|
2022-04-21 12:32 |
266.8 KB |
| ChaosDB - How We Hacked Databases of Thousands of Azure Customers (rev) - 2022.mp4
|
2022-02-08 08:42 |
59.0 MB |
| Do You Speak My Language? Make Static Analysis Engines Understand Each Other - 2022.description
|
2022-08-25 16:21 |
754 B |
| Do You Speak My Language? Make Static Analysis Engines Understand Each Other - 2022.info.json
|
2022-08-25 16:21 |
313.1 KB |
| Do You Speak My Language? Make Static Analysis Engines Understand Each Other - 2022.mp4
|
2022-07-05 17:34 |
247.6 MB |
| ECMO - Rehost Embedded Linux Kernels via Peripheral Transplantation - 2022.description
|
2022-04-21 12:41 |
789 B |
| ECMO - Rehost Embedded Linux Kernels via Peripheral Transplantation - 2022.info.json
|
2022-04-21 12:41 |
266.0 KB |
| ECMO - Rehost Embedded Linux Kernels via Peripheral Transplantation - 2022.mp4
|
2022-02-01 09:37 |
66.5 MB |
| ERROR - BadAlloc! - Broken Memory Allocators Led to Millions of Vulnerable IoT & Embedded Devices (2) - 2022.description
|
2022-04-28 10:10 |
896 B |
| ERROR - BadAlloc! - Broken Memory Allocators Led to Millions of Vulnerable IoT & Embedded Devices (2) - 2022.info.json
|
2022-04-28 10:10 |
265.7 KB |
| ERROR - BadAlloc! - Broken Memory Allocators Led to Millions of Vulnerable IoT & Embedded Devices (2) - 2022.mp4
|
2022-01-19 13:13 |
126.9 MB |
| Exploiting CSP in WebKit to Break Authentication and Authorization - 2022.description
|
2022-04-21 12:53 |
934 B |
| Exploiting CSP in WebKit to Break Authentication and Authorization - 2022.info.json
|
2022-04-21 12:53 |
264.9 KB |
| Exploiting CSP in WebKit to Break Authentication and Authorization - 2022.mp4
|
2022-02-01 08:44 |
87.7 MB |
| From Coordinated Disclosure to Cooperative Vulnerability When Dealing w_ Critical Software Stacks - 2022.description
|
2022-04-21 12:34 |
677 B |
| From Coordinated Disclosure to Cooperative Vulnerability When Dealing w_ Critical Software Stacks - 2022.info.json
|
2022-04-21 12:34 |
265.7 KB |
| From Coordinated Disclosure to Cooperative Vulnerability When Dealing w_ Critical Software Stacks - 2022.mp4
|
2022-02-01 18:54 |
235.6 MB |
| From Logic to Memory - Winning the Solitaire in Reparse Points - 2022.description
|
2022-04-21 12:51 |
801 B |
| From Logic to Memory - Winning the Solitaire in Reparse Points - 2022.info.json
|
2022-04-21 12:51 |
267.9 KB |
| From Logic to Memory - Winning the Solitaire in Reparse Points - 2022.mp4
|
2022-02-01 13:06 |
100.2 MB |
| Greetings from the '90s - Exploiting the Design of Industrial Controllers in Modern Settings - 2022.description
|
2022-04-21 12:32 |
981 B |
| Greetings from the '90s - Exploiting the Design of Industrial Controllers in Modern Settings - 2022.info.json
|
2022-04-21 12:32 |
265.6 KB |
| Greetings from the '90s - Exploiting the Design of Industrial Controllers in Modern Settings - 2022.mp4
|
2022-02-02 05:55 |
324.7 MB |
| Hand in Your Pocket Without You Noticing - Current State of Mobile Wallet Security - 2022.description
|
2022-04-21 12:48 |
950 B |
| Hand in Your Pocket Without You Noticing - Current State of Mobile Wallet Security - 2022.info.json
|
2022-04-21 12:48 |
265.9 KB |
| Hand in Your Pocket Without You Noticing - Current State of Mobile Wallet Security - 2022.mp4
|
2022-01-31 20:37 |
107.0 MB |
| Hardware Security Module - Executing Unsigned Code in HSM TEE - 2022.description
|
2022-04-21 12:56 |
570 B |
| Hardware Security Module - Executing Unsigned Code in HSM TEE - 2022.info.json
|
2022-04-21 12:56 |
270.3 KB |
| Hardware Security Module - Executing Unsigned Code in HSM TEE - 2022.mp4
|
2022-02-01 00:13 |
106.1 MB |
| How We Can Power Real Security Machine Learning Progress Through Open Algorithms and Benchmarks - 2022.description
|
2022-04-21 12:44 |
667 B |
| How We Can Power Real Security Machine Learning Progress Through Open Algorithms and Benchmarks - 2022.info.json
|
2022-04-21 12:44 |
266.8 KB |
| How We Can Power Real Security Machine Learning Progress Through Open Algorithms and Benchmarks - 2022.mp4
|
2022-02-01 10:23 |
91.5 MB |
| How Your E-book Might Be Reading You - Exploiting EPUB Reading Systems - 2022.description
|
2022-04-21 12:47 |
837 B |
| How Your E-book Might Be Reading You - Exploiting EPUB Reading Systems - 2022.info.json
|
2022-04-21 12:47 |
267.0 KB |
| How Your E-book Might Be Reading You - Exploiting EPUB Reading Systems - 2022.mp4
|
2022-01-31 20:52 |
94.8 MB |
| HTTP_2 - The Sequel is Always Worse - 2022.description
|
2022-04-21 12:36 |
794 B |
| HTTP_2 - The Sequel is Always Worse - 2022.info.json
|
2022-04-21 12:36 |
267.1 KB |
| HTTP_2 - The Sequel is Always Worse - 2022.mp4
|
2022-02-01 01:16 |
223.3 MB |
| Is This My Domain Controller A New Class of Active Directory Protocol Injection Attacks - 2022.description
|
2022-04-21 12:55 |
989 B |
| Is This My Domain Controller A New Class of Active Directory Protocol Injection Attacks - 2022.info.json
|
2022-04-21 12:55 |
266.4 KB |
| Is This My Domain Controller A New Class of Active Directory Protocol Injection Attacks - 2022.mp4
|
2022-02-01 04:29 |
90.2 MB |
| Keynote: #HackingDemocracy: Will Our Societies Hold? - 2022.description
|
2022-08-26 12:10 |
226 B |
| Keynote: #HackingDemocracy: Will Our Societies Hold? - 2022.info.json
|
2022-08-26 12:10 |
313.7 KB |
| Keynote: #HackingDemocracy: Will Our Societies Hold? - 2022.mp4
|
2022-06-05 19:15 |
370.5 MB |
| Keynote: Fireside Chat with U.S. National Cyber Director Chris Inglis - 2022.description
|
2022-08-25 17:31 |
400 B |
| Keynote: Fireside Chat with U.S. National Cyber Director Chris Inglis - 2022.info.json
|
2022-08-25 17:31 |
313.5 KB |
| Keynote: Fireside Chat with U.S. National Cyber Director Chris Inglis - 2022.mp4
|
2022-06-05 20:46 |
146.7 MB |
| Keynote: Measure Security Effectively - 2022.description
|
2022-08-26 12:03 |
473 B |
| Keynote: Measure Security Effectively - 2022.info.json
|
2022-08-26 12:03 |
314.1 KB |
| Keynote: Measure Security Effectively - 2022.mp4
|
2022-06-05 20:49 |
301.1 MB |
| Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022 - 2022.description
|
2022-08-26 12:06 |
513 B |
| Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022 - 2022.info.json
|
2022-08-26 12:06 |
313.7 KB |
| Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022 - 2022.mp4
|
2022-06-05 19:12 |
198.1 MB |
| Lost in the Loader - The Many Faces of the Windows PE File Format - 2022.description
|
2022-04-21 12:48 |
581 B |
| Lost in the Loader - The Many Faces of the Windows PE File Format - 2022.info.json
|
2022-04-21 12:48 |
266.6 KB |
| Lost in the Loader - The Many Faces of the Windows PE File Format - 2022.mp4
|
2022-01-31 23:56 |
82.1 MB |
| Message in a Broken Bottle - Exploring the Linux IPC Attack Surface - 2022.description
|
2022-04-21 12:43 |
683 B |
| Message in a Broken Bottle - Exploring the Linux IPC Attack Surface - 2022.info.json
|
2022-04-21 12:43 |
265.2 KB |
| Message in a Broken Bottle - Exploring the Linux IPC Attack Surface - 2022.mp4
|
2022-02-01 10:00 |
107.0 MB |
| New Ways of IPV6 Scanning - 2022.description
|
2022-04-21 12:42 |
555 B |
| New Ways of IPV6 Scanning - 2022.info.json
|
2022-04-21 12:42 |
264.5 KB |
| New Ways of IPV6 Scanning - 2022.mp4
|
2022-02-01 05:07 |
117.0 MB |
| No Such Thing as a Stupid Question - Why Knowledge Shaming is Making Us Less Secure - 2022.description
|
2022-04-21 12:54 |
755 B |
| No Such Thing as a Stupid Question - Why Knowledge Shaming is Making Us Less Secure - 2022.info.json
|
2022-04-21 12:54 |
265.2 KB |
| No Such Thing as a Stupid Question - Why Knowledge Shaming is Making Us Less Secure - 2022.mp4
|
2022-02-01 02:12 |
232.3 MB |
| One Glitch to Rule Them All - Fault Injection Attacks Against the AMD Secure Processor - 2022.description
|
2022-04-21 12:52 |
971 B |
| One Glitch to Rule Them All - Fault Injection Attacks Against the AMD Secure Processor - 2022.info.json
|
2022-04-21 12:52 |
265.9 KB |
| One Glitch to Rule Them All - Fault Injection Attacks Against the AMD Secure Processor - 2022.mp4
|
2022-02-01 02:46 |
91.8 MB |
| Owfuzz - WiFi Nightmare - 2022.description
|
2022-04-21 12:50 |
512 B |
| Owfuzz - WiFi Nightmare - 2022.info.json
|
2022-04-21 12:50 |
265.9 KB |
| Owfuzz - WiFi Nightmare - 2022.mp4
|
2022-01-31 23:51 |
73.7 MB |
| Past as Prologue - What Users Can Except with 2022 Cyber Threats - 2022.description
|
2022-04-21 12:57 |
287 B |
| Past as Prologue - What Users Can Except with 2022 Cyber Threats - 2022.info.json
|
2022-04-21 12:57 |
263.4 KB |
| Past as Prologue - What Users Can Except with 2022 Cyber Threats - 2022.mp4
|
2022-01-24 15:00 |
36.6 MB |
| Picking Lockfiles - Attacking & Defending Your Supply Chain - 2022.description
|
2022-04-21 12:50 |
610 B |
| Picking Lockfiles - Attacking & Defending Your Supply Chain - 2022.info.json
|
2022-04-21 12:50 |
269.5 KB |
| Picking Lockfiles - Attacking & Defending Your Supply Chain - 2022.mp4
|
2022-02-01 12:59 |
90.3 MB |
| Practical Attacks Against Attribute-based Encryption - 2022.description
|
2022-04-21 12:54 |
962 B |
| Practical Attacks Against Attribute-based Encryption - 2022.info.json
|
2022-04-21 12:54 |
266.8 KB |
| Practical Attacks Against Attribute-based Encryption - 2022.mp4
|
2022-02-01 05:25 |
104.5 MB |
| Practical HTTP Header Smuggling - Sneaking Past Reverse Proxies to Attack AWS and Beyond - 2022.description
|
2022-04-21 12:44 |
854 B |
| Practical HTTP Header Smuggling - Sneaking Past Reverse Proxies to Attack AWS and Beyond - 2022.info.json
|
2022-04-21 12:44 |
266.5 KB |
| Practical HTTP Header Smuggling - Sneaking Past Reverse Proxies to Attack AWS and Beyond - 2022.mp4
|
2022-02-01 01:04 |
65.3 MB |
| ReCertifying Active Directory Certificate Services - 2022.description
|
2022-04-21 12:33 |
543 B |
| ReCertifying Active Directory Certificate Services - 2022.info.json
|
2022-04-21 12:33 |
265.3 KB |
| ReCertifying Active Directory Certificate Services - 2022.mp4
|
2022-02-01 11:18 |
424.5 MB |
| Resting on Feet of Clay - Securely Bootstrapping OPC UA Deployments - 2022.description
|
2022-04-21 12:41 |
568 B |
| Resting on Feet of Clay - Securely Bootstrapping OPC UA Deployments - 2022.info.json
|
2022-04-21 12:41 |
264.4 KB |
| Resting on Feet of Clay - Securely Bootstrapping OPC UA Deployments - 2022.mp4
|
2022-02-01 06:00 |
217.8 MB |
| Security Industry Call-to-Action - We Need a Cloud Vulnerability Database - 2022.description
|
2022-04-21 12:37 |
650 B |
| Security Industry Call-to-Action - We Need a Cloud Vulnerability Database - 2022.info.json
|
2022-04-21 12:37 |
265.7 KB |
| Security Industry Call-to-Action - We Need a Cloud Vulnerability Database - 2022.mp4
|
2022-02-01 16:43 |
353.2 MB |
| SideWinder Uncoils to Strike - 2022.description
|
2022-08-25 19:09 |
511 B |
| SideWinder Uncoils to Strike - 2022.info.json
|
2022-08-25 19:09 |
84.3 KB |
| SideWinder Uncoils to Strike - 2022.mp4
|
2022-06-05 19:00 |
147.8 MB |
| Skeletons in the App Sandbox - 5+ Ways to Escape - 2022.description
|
2022-04-21 12:42 |
667 B |
| Skeletons in the App Sandbox - 5+ Ways to Escape - 2022.info.json
|
2022-04-21 12:42 |
264.3 KB |
| Skeletons in the App Sandbox - 5+ Ways to Escape - 2022.mp4
|
2022-02-01 10:52 |
62.1 MB |
| TeamTNT - Explosive Cryptomining - 2022.description
|
2022-04-21 12:33 |
806 B |
| TeamTNT - Explosive Cryptomining - 2022.info.json
|
2022-04-21 12:33 |
266.6 KB |
| TeamTNT - Explosive Cryptomining - 2022.mp4
|
2022-02-01 03:31 |
127.1 MB |
| The Art of Exploiting UAF by Ret2bpf in Android Kernel - 2022.description
|
2022-04-21 12:49 |
850 B |
| The Art of Exploiting UAF by Ret2bpf in Android Kernel - 2022.info.json
|
2022-04-21 12:49 |
266.6 KB |
| The Art of Exploiting UAF by Ret2bpf in Android Kernel - 2022.mp4
|
2022-02-01 06:37 |
86.8 MB |
| The Bad Guys Win – Analysis of 10,000 Magecart Vulnerabilities - 2022.description
|
2022-04-21 12:40 |
832 B |
| The Bad Guys Win – Analysis of 10,000 Magecart Vulnerabilities - 2022.info.json
|
2022-04-21 12:40 |
266.9 KB |
| The Bad Guys Win – Analysis of 10,000 Magecart Vulnerabilities - 2022.mp4
|
2022-01-31 19:19 |
117.5 MB |
| The Black Hat Europe NOC (Network Operations Center) Report - 2022.description
|
2022-04-21 12:45 |
642 B |
| The Black Hat Europe NOC (Network Operations Center) Report - 2022.info.json
|
2022-04-21 12:45 |
606.5 KB |
| The Black Hat Europe NOC (Network Operations Center) Report - 2022.mp4
|
2022-01-31 15:51 |
277.3 MB |
| The Data Distribution Service (DDS) Protocol is Critical - Let's Use it Securely! - 2022.description
|
2022-04-21 12:56 |
537 B |
| The Data Distribution Service (DDS) Protocol is Critical - Let's Use it Securely! - 2022.info.json
|
2022-04-21 12:56 |
268.8 KB |
| The Data Distribution Service (DDS) Protocol is Critical - Let's Use it Securely! - 2022.mp4
|
2022-01-31 22:43 |
97.1 MB |
| The Next Gen PlugX⧸ShadowPad? A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT - 2022.description
|
2022-08-25 19:24 |
681 B |
| The Next Gen PlugX⧸ShadowPad? A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT - 2022.info.json
|
2022-08-25 19:24 |
313.4 KB |
| The Next Gen PlugX⧸ShadowPad? A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT - 2022.mp4
|
2022-06-05 18:44 |
105.8 MB |
| They Hacked Thousands of Cloud Accounts Then Sent Us Weird GIFs - 2022.description
|
2022-04-21 12:49 |
715 B |
| They Hacked Thousands of Cloud Accounts Then Sent Us Weird GIFs - 2022.info.json
|
2022-04-21 12:49 |
265.6 KB |
| They Hacked Thousands of Cloud Accounts Then Sent Us Weird GIFs - 2022.mp4
|
2022-02-01 08:44 |
97.7 MB |
| Veni, No Vidi, No Vici - Attacks on ETW Blind EDR Sensors - 2022.description
|
2022-04-21 12:39 |
743 B |
| Veni, No Vidi, No Vici - Attacks on ETW Blind EDR Sensors - 2022.info.json
|
2022-04-21 12:39 |
265.7 KB |
| Veni, No Vidi, No Vici - Attacks on ETW Blind EDR Sensors - 2022.mp4
|
2022-02-01 02:57 |
183.0 MB |
| Vulnerability Intelligence - 2022.description
|
2022-04-21 12:35 |
582 B |
| Vulnerability Intelligence - 2022.info.json
|
2022-04-21 12:35 |
264.7 KB |
| Vulnerability Intelligence - 2022.mp4
|
2022-01-31 18:58 |
107.1 MB |
| Windows Defender - Demystifying and Bypassing ASR by Understanding the AV's Signatures - 2022.description
|
2022-04-21 12:35 |
506 B |
| Windows Defender - Demystifying and Bypassing ASR by Understanding the AV's Signatures - 2022.info.json
|
2022-04-21 12:35 |
267.2 KB |
| Windows Defender - Demystifying and Bypassing ASR by Understanding the AV's Signatures - 2022.mp4
|
2022-01-31 18:04 |
104.5 MB |
| Your Trash Kernel Bug, My Precious 0-day - 2022.description
|
2022-04-21 12:47 |
899 B |
| Your Trash Kernel Bug, My Precious 0-day - 2022.info.json
|
2022-04-21 12:47 |
265.0 KB |
| Your Trash Kernel Bug, My Precious 0-day - 2022.mp4
|
2022-02-01 06:11 |
70.4 MB |
| Zen and the Art of Adversarial Machine Learning - 2022.description
|
2022-04-21 12:36 |
899 B |
| Zen and the Art of Adversarial Machine Learning - 2022.info.json
|
2022-04-21 12:36 |
266.6 KB |
| Zen and the Art of Adversarial Machine Learning - 2022.mp4
|
2022-02-01 01:26 |
122.3 MB |