Parent directory/ | - | - |
(In-)Security of Backend-As-A-Service.mp4 | 52.5 MiB | 2021 Apr 11 23:57 |
(In-)Security of Backend-As-A-Service.srt | 67.6 KiB | 2019 Sep 30 14:58 |
A Peek Under the Blue Coat.mp4 | 54.5 MiB | 2021 Apr 11 23:57 |
A Peek Under the Blue Coat.srt | 62.0 KiB | 2019 Sep 30 14:58 |
All your Root Checks Belong To Us - The Sad State of Root Detection.mp4 | 21.8 MiB | 2021 Apr 11 23:57 |
All your Root Checks Belong To Us - The Sad State of Root Detection.srt | 39.3 KiB | 2019 Sep 30 14:59 |
Androbugs Framework - An Android Application Security Vilnerability Scanner.mp4 | 56.1 MiB | 2021 Apr 11 23:57 |
Androbugs Framework - An Android Application Security Vilnerability Scanner.srt | 40.7 KiB | 2019 Sep 30 14:58 |
Attacking The XNU Kernel In El Capitain.mp4 | 36.0 MiB | 2021 Apr 11 23:57 |
Attacking The XNU Kernel In El Capitain.srt | 34.8 KiB | 2019 Sep 30 14:58 |
Authenticator Leakage Through Backup Channels on Android.mp4 | 29.7 MiB | 2021 Apr 11 23:57 |
Authenticator Leakage Through Backup Channels on Android.srt | 39.9 KiB | 2019 Sep 30 14:58 |
Automating Linux Malware Analysis Using Limon Sandbox.mp4 | 65.3 MiB | 2021 Apr 11 23:57 |
Breaking Access Controls with Blekey.mp4 | 45.6 MiB | 2021 Apr 11 23:57 |
Breaking Access Controls with Blekey.srt | 56.9 KiB | 2019 Sep 30 14:58 |
Bypassing Local Windows Authentication To Defeat Full Disk Encryption.mp4 | 26.3 MiB | 2021 Apr 11 23:57 |
Bypassing Local Windows Authentication To Defeat Full Disk Encryption.srt | 33.7 KiB | 2019 Sep 30 14:59 |
Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.mp4 | 63.6 MiB | 2021 Apr 11 23:57 |
Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.srt | 78.6 KiB | 2019 Sep 30 14:58 |
Commix - Detecting and Exploiting Command Injection Flaws.mp4 | 19.7 MiB | 2021 Apr 11 23:57 |
Commix - Detecting and Exploiting Command Injection Flaws.srt | 18.0 KiB | 2019 Sep 30 14:58 |
Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.mp4 | 72.8 MiB | 2021 Apr 11 23:57 |
Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.srt | 48.6 KiB | 2019 Sep 30 14:58 |
Cybercrime in The Deep Web.mp4 | 55.8 MiB | 2021 Apr 11 23:57 |
Cybercrime in The Deep Web.srt | 58.0 KiB | 2019 Sep 30 14:59 |
Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.mp4 | 56.3 MiB | 2021 Apr 11 23:57 |
Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.srt | 51.4 KiB | 2019 Sep 30 14:59 |
Defending Against Malicious Application Compatibility Shims.mp4 | 38.8 MiB | 2021 Apr 11 23:57 |
Even The Lastpass Will Be Stolen, Deal With It.mp4 | 52.3 MiB | 2021 Apr 11 23:57 |
Even The Lastpass Will Be Stolen, Deal With It.srt | 60.8 KiB | 2019 Sep 30 14:59 |
Exploiting Adobe Flash Player In The Era Of Control Flow Guard.mp4 | 38.7 MiB | 2021 Apr 11 23:57 |
Exploiting Adobe Flash Player In The Era Of Control Flow Guard.srt | 58.7 KiB | 2019 Sep 30 14:59 |
Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.mp4 | 38.3 MiB | 2021 Apr 11 23:57 |
Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.srt | 77.3 KiB | 2019 Sep 30 14:59 |
Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.mp4 | 35.9 MiB | 2021 Apr 11 23:57 |
Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.srt | 45.9 KiB | 2019 Sep 30 14:59 |
Going Auth The Rails On A Crazy Train.mp4 | 50.6 MiB | 2021 Apr 11 23:57 |
Going Auth The Rails On A Crazy Train.srt | 75.9 KiB | 2019 Sep 30 14:59 |
Hey Man, Have You Forgotten To Intialize Your Memory.mp4 | 38.4 MiB | 2021 Apr 11 23:57 |
Hey Man, Have You Forgotten To Intialize Your Memory.srt | 34.0 KiB | 2019 Sep 30 14:58 |
Hiding In Plain Sight - Advances In Malware Covert Communication Channels.mp4 | 50.8 MiB | 2021 Apr 11 23:57 |
Hiding In Plain Sight - Advances In Malware Covert Communication Channels.srt | 68.0 KiB | 2019 Sep 30 14:59 |
How To Break XML Encryption - Automatically.mp4 | 32.1 MiB | 2021 Apr 11 23:57 |
How To Break XML Encryption - Automatically.srt | 15.1 KiB | 2019 Sep 30 14:58 |
Implementing Practical Electrical Glitching Attacks.mp4 | 26.6 MiB | 2021 Apr 11 23:57 |
Implementing Practical Electrical Glitching Attacks.srt | 39.0 KiB | 2019 Sep 30 14:59 |
Is Your Timespace Safe - Time and Position Spoofing Opensourcely.mp4 | 27.9 MiB | 2021 Apr 11 23:57 |
Is Your Timespace Safe - Time and Position Spoofing Opensourcely.srt | 28.3 KiB | 2019 Sep 30 14:58 |
Keynote - What Got Us Here Wont Get Us There.mp4 | 97.4 MiB | 2021 Apr 11 23:57 |
Keynote - What Got Us Here Wont Get Us There.srt | 73.8 KiB | 2019 Sep 30 14:58 |
LTE & IMSI Catcher Myths.mp4 | 44.3 MiB | 2021 Apr 11 23:57 |
LTE & IMSI Catcher Myths.srt | 71.9 KiB | 2019 Sep 30 14:58 |
Lessons From Defending The Indefensible.mp4 | 19.3 MiB | 2021 Apr 11 23:57 |
Lessons From Defending The Indefensible.srt | 39.1 KiB | 2019 Sep 30 14:58 |
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.mp4 | 97.9 MiB | 2021 Apr 11 23:57 |
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.srt | 52.8 KiB | 2019 Sep 30 14:59 |
New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.mp4 | 43.8 MiB | 2021 Apr 11 23:57 |
New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.srt | 73.2 KiB | 2019 Sep 30 14:59 |
New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.mp4 | 10.6 MiB | 2021 Apr 11 23:57 |
New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.srt | 9.9 KiB | 2019 Sep 30 14:59 |
Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.mp4 | 84.1 MiB | 2021 Apr 11 23:57 |
Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.srt | 70.3 KiB | 2019 Sep 30 14:58 |
Self-Driving and Connected Cars - Fooling Sensors and Tracking Drivers.mp4 | 70.1 MiB | 2021 Apr 11 23:57 |
Silently Breaking ASLR In The Cloud.mp4 | 45.5 MiB | 2021 Apr 11 23:57 |
Stegospolit - Exploit Delivery With Steganography and Polyglots.mp4 | 69.6 MiB | 2021 Apr 11 23:57 |
Stegospolit - Exploit Delivery With Steganography and Polyglots.srt | 57.9 KiB | 2019 Sep 30 14:59 |
Triaging Crashed With Backward Taint Analysis For Arm Architecture.mp4 | 17.7 MiB | 2021 Apr 11 23:57 |
Triaging Crashed With Backward Taint Analysis For Arm Architecture.srt | 18.1 KiB | 2019 Sep 30 14:58 |
Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.mp4 | 56.5 MiB | 2021 Apr 11 23:57 |
Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.srt | 53.8 KiB | 2019 Sep 30 14:59 |
VOIP Wars - Destroying Jar Jar Lync.mp4 | 65.8 MiB | 2021 Apr 11 23:57 |
Vulnerability Exploitation In Docker Container Environments.mp4 | 42.4 MiB | 2021 Apr 11 23:57 |
Vulnerability Exploitation In Docker Container Environments.srt | 51.7 KiB | 2019 Sep 30 14:58 |
Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.mp4 | 64.8 MiB | 2021 Apr 11 23:57 |
Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.srt | 49.7 KiB | 2019 Sep 30 14:58 |
Your Scripts In My Page - What Could Possibly Go Wrong.mp4 | 31.5 MiB | 2021 Apr 11 23:57 |
Your Scripts In My Page - What Could Possibly Go Wrong.srt | 34.4 KiB | 2019 Sep 30 14:59 |