Parent directory/ | - | - |
A Practical Attack Against VDI Solutions.mp4 | 27.3 MiB | 2021 Apr 12 21:10 |
APTs Way - Evading Your EBNIDS.mp4 | 36.5 MiB | 2021 Apr 12 21:10 |
Abusing Software Defined Networks.mp4 | 41.4 MiB | 2021 Apr 12 21:10 |
Abusing Software Defined Networks.srt | 67.9 KiB | 2019 Oct 01 07:18 |
Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.mp4 | 57.4 MiB | 2021 Apr 12 21:10 |
Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.srt | 108.8 KiB | 2019 Oct 01 07:18 |
Android Kernel and OS Security Assessment with Iron Crow.mp4 | 17.3 MiB | 2021 Apr 12 21:10 |
Android Kernel and OS Security Assessment with Iron Crow.srt | 30.0 KiB | 2019 Oct 01 07:18 |
Attacking the Linux PRNG on Android.mp4 | 52.2 MiB | 2021 Apr 12 21:10 |
Attacking the Linux PRNG on Android.srt | 68.3 KiB | 2019 Oct 01 07:18 |
Blended Web and Database Attacks on Real-Time, In-Memory Platforms.mp4 | 51.2 MiB | 2021 Apr 12 21:10 |
Blended Web and Database Attacks on Real-Time, In-Memory Platforms.srt | 78.0 KiB | 2019 Oct 01 07:18 |
Bringing a Machete to the Amazon.mp4 | 48.2 MiB | 2021 Apr 12 21:10 |
Bringing a Machete to the Amazon.srt | 78.3 KiB | 2019 Oct 01 07:18 |
Bypassing HTTP Strict Transport Security.mp4 | 40.7 MiB | 2021 Apr 12 21:10 |
C11 Metaprogramming Applied to Software Obfuscation.mp4 | 25.8 MiB | 2021 Apr 12 21:10 |
C11 Metaprogramming Applied to Software Obfuscation.srt | 46.1 KiB | 2019 Sep 30 16:01 |
Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.mp4 | 50.2 MiB | 2021 Apr 12 21:10 |
Charge Your Device with the Latest Malware.mp4 | 19.6 MiB | 2021 Apr 12 21:10 |
Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).mp4 | 44.1 MiB | 2021 Apr 12 21:10 |
Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).srt | 81.6 KiB | 2019 Oct 01 07:18 |
Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).mp4 | 16.7 MiB | 2021 Apr 12 21:10 |
Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).srt | 24.3 KiB | 2019 Oct 01 07:18 |
DTM Components - Shadow Keys to the ICS Kingdom.mp4 | 49.2 MiB | 2021 Apr 12 21:10 |
DTM Components - Shadow Keys to the ICS Kingdom.srt | 65.2 KiB | 2019 Sep 30 16:02 |
Don t Trust Your USB How to Find Bugs in USB Device Drivers.mp4 | 25.5 MiB | 2021 Apr 12 21:10 |
Endrun - Secure Digital Communications for Our Modern Dystopia.mp4 | 51.9 MiB | 2021 Apr 12 21:10 |
Evasion of High-End IDPS Devices at the IPv6 Era.mp4 | 57.3 MiB | 2021 Apr 12 21:10 |
Evasion of High-End IDPS Devices at the IPv6 Era.srt | 76.6 KiB | 2019 Oct 01 07:18 |
Exploring Yosemite - Abusing Mac OS X 10.10.mp4 | 52.7 MiB | 2021 Apr 12 21:10 |
Exploring Yosemite - Abusing Mac OS X 10.10.srt | 63.8 KiB | 2019 Sep 30 16:02 |
Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service.mp4 | 41.9 MiB | 2021 Apr 12 21:10 |
Freeze Drying for Capturing Environment-Sensitive Malware Alive.mp4 | 35.6 MiB | 2021 Apr 12 21:10 |
Freeze Drying for Capturing Environment-Sensitive Malware Alive.srt | 44.1 KiB | 2019 Oct 01 07:18 |
Gyrophone - Eavesdropping Using a Gyroscope.mp4 | 44.0 MiB | 2021 Apr 12 21:10 |
Hack Your ATM with Friend s Raspberry.Py.mp4 | 35.4 MiB | 2021 Apr 12 21:10 |
Hacking the Wireless World with Software Defined Radio - 2.0.mp4 | 61.1 MiB | 2021 Apr 12 21:10 |
Hadoop Security - Seven Ways to Kill an Elephant.mp4 | 58.1 MiB | 2021 Apr 12 21:10 |
Hadoop Security - Seven Ways to Kill an Elephant.srt | 126.9 KiB | 2019 Sep 30 16:01 |
Hide Android Applications in Images.mp4 | 20.8 MiB | 2021 Apr 12 21:10 |
Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).mp4 | 52.1 MiB | 2021 Apr 12 21:10 |
Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).srt | 69.5 KiB | 2019 Sep 30 16:01 |
Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).mp4 | 47.1 MiB | 2021 Apr 12 21:10 |
Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).srt | 51.8 KiB | 2019 Sep 30 16:02 |
Lessons Learned from Eight Years of Breaking Hypervisors.mp4 | 36.7 MiB | 2021 Apr 12 21:10 |
Lights Off The Darkness of the Smart Meters.mp4 | 58.9 MiB | 2021 Apr 12 21:10 |
Man in the Binder - He Who Controls IPC, Controls the Droid.mp4 | 32.3 MiB | 2021 Apr 12 21:10 |
Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.mp4 | 57.8 MiB | 2021 Apr 12 21:10 |
Next Level Cheating and Leveling Up Mitigations.mp4 | 42.4 MiB | 2021 Apr 12 21:10 |
Next Level Cheating and Leveling Up Mitigations.srt | 75.8 KiB | 2019 Oct 01 07:18 |
PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1 2).mp4 | 33.5 MiB | 2021 Apr 12 21:10 |
PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2 2).mp4 | 43.1 MiB | 2021 Apr 12 21:10 |
Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare.mp4 | 49.9 MiB | 2021 Apr 12 21:10 |
Quantum Key Distribution and the Future of Encryption.mp4 | 28.2 MiB | 2021 Apr 12 21:10 |
Reflected File Download - A New Web Attack Vector.mp4 | 55.0 MiB | 2021 Apr 12 21:10 |
Reflected File Download - A New Web Attack Vector.srt | 65.4 KiB | 2019 Oct 01 07:18 |
Revisiting XSS Sanitization.mp4 | 65.5 MiB | 2021 Apr 12 21:10 |
Revisiting XSS Sanitization.srt | 86.8 KiB | 2019 Oct 01 07:18 |
SSL Validation Checking vs. Go(ing) to Fail.mp4 | 21.7 MiB | 2021 Apr 12 21:10 |
SSL Validation Checking vs. Go(ing) to Fail.srt | 36.5 KiB | 2019 Oct 01 07:18 |
Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass.mp4 | 43.5 MiB | 2021 Apr 12 21:10 |
Scala Security - Examining the Play and LiftWeb Frameworks.mp4 | 37.6 MiB | 2021 Apr 12 21:10 |
Scala Security - Examining the Play and LiftWeb Frameworks.srt | 78.7 KiB | 2019 Sep 30 16:02 |
Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.mp4 | 55.5 MiB | 2021 Apr 12 21:10 |
Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.srt | 86.6 KiB | 2019 Oct 01 07:18 |
The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.mp4 | 29.1 MiB | 2021 Apr 12 21:10 |
The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.srt | 38.5 KiB | 2019 Sep 30 16:01 |
Two Factor Failure.mp4 | 16.5 MiB | 2021 Apr 12 21:10 |
Two Factor Failure.srt | 41.3 KiB | 2019 Oct 01 07:18 |
WebKit Everywhere - Secure or Not.mp4 | 26.0 MiB | 2021 Apr 12 21:10 |
WebKit Everywhere - Secure or Not.srt | 43.5 KiB | 2019 Sep 30 16:02 |
Welcome & Introduction to Black Hat Europe 2014.mp4 | 62.1 MiB | 2021 Apr 12 21:10 |
ret2dir - Deconstructing Kernel Isolation.mp4 | 45.0 MiB | 2021 Apr 12 21:10 |
ret2dir - Deconstructing Kernel Isolation.srt | 94.5 KiB | 2019 Sep 30 16:02 |