Parent directory/ | - | - |
(Pen)Testing Vehicles with CANToolz.eng.srt | 95.5 KiB | 2021 Apr 11 04:57 |
(Pen)Testing Vehicles with CANToolz.mp4 | 65.3 MiB | 2021 Apr 12 05:13 |
50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.eng.srt | 77.1 KiB | 2021 Apr 11 04:45 |
50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.mp4 | 62.2 MiB | 2021 Apr 12 05:13 |
AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.eng.srt | 36.8 KiB | 2021 Apr 11 04:54 |
AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.mp4 | 31.7 MiB | 2021 Apr 12 05:13 |
ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.eng.srt | 70.2 KiB | 2021 Apr 12 04:55 |
ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.mp4 | 39.1 MiB | 2021 Apr 12 05:13 |
Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning.mp4 | 35.8 MiB | 2021 Apr 12 05:13 |
Attacking Windows by Windows.eng.srt | 45.2 KiB | 2021 Apr 11 04:35 |
Attacking Windows by Windows.mp4 | 40.8 MiB | 2021 Apr 12 05:13 |
Automating Incident Response.mp4 | 65.2 MiB | 2021 Apr 12 05:13 |
Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.eng.srt | 70.7 KiB | 2021 Apr 11 05:04 |
Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.mp4 | 35.6 MiB | 2021 Apr 12 05:13 |
Breaking BHAD - Abusing Belkin Home Automation Devices.eng.srt | 100.4 KiB | 2021 Apr 11 04:35 |
Breaking BHAD - Abusing Belkin Home Automation Devices.mp4 | 63.4 MiB | 2021 Apr 12 05:13 |
Breaking Big Data - Evading Analysis of the Metadata of Your Life.eng.srt | 66.3 KiB | 2021 Apr 11 05:07 |
Breaking Big Data - Evading Analysis of the Metadata of Your Life.mp4 | 32.2 MiB | 2021 Apr 12 05:13 |
Bypassing Clang's SafeStack for Fun and Profit.eng.srt | 51.7 KiB | 2021 Apr 11 04:59 |
Bypassing Clang's SafeStack for Fun and Profit.mp4 | 34.4 MiB | 2021 Apr 12 05:13 |
Bypassing Secure Boot Using Fault Injection.mp4 | 29.8 MiB | 2021 Apr 12 05:13 |
CTX - Eliminating BREACH with Context Hiding.eng.srt | 62.1 KiB | 2021 Apr 11 05:01 |
CTX - Eliminating BREACH with Context Hiding.mp4 | 35.1 MiB | 2021 Apr 12 05:13 |
Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.eng.srt | 50.2 KiB | 2021 Apr 11 04:41 |
Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.mp4 | 29.7 MiB | 2021 Apr 12 05:13 |
Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.eng.srt | 69.8 KiB | 2021 Apr 11 04:43 |
Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.mp4 | 38.0 MiB | 2021 Apr 12 05:13 |
Cyber Judo - Offensive Cyber Defense.mp4 | 41.6 MiB | 2021 Apr 12 05:13 |
Cyber Judo Offensive Cyber Defense.eng.srt | 66.4 KiB | 2021 Apr 11 04:35 |
DRAMA - How Your DRAM Becomes a Security Problem.eng.srt | 85.5 KiB | 2021 Apr 11 04:35 |
DRAMA - How Your DRAM Becomes a Security Problem.mp4 | 35.8 MiB | 2021 Apr 12 05:13 |
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk.eng.srt | 82.8 KiB | 2021 Apr 11 05:10 |
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk.mp4 | 70.2 MiB | 2021 Apr 12 05:13 |
EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.eng.srt | 92.3 KiB | 2021 Apr 11 04:35 |
EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.mp4 | 41.6 MiB | 2021 Apr 12 05:13 |
Effective File Format Fuzzing - Thoughts, Techniques and Results.eng.srt | 81.6 KiB | 2021 Apr 11 04:45 |
Effective File Format Fuzzing - Thoughts, Techniques and Results.mp4 | 48.2 MiB | 2021 Apr 12 05:13 |
Flip Feng Shui - Rowhammering the VM's Isolation.eng.srt | 92.9 KiB | 2021 Apr 11 04:49 |
Flip Feng Shui - Rowhammering the VM's Isolation.mp4 | 42.3 MiB | 2021 Apr 12 05:13 |
GPU Security Exposed.eng.srt | 37.4 KiB | 2021 Apr 11 04:51 |
GPU Security Exposed.mp4 | 26.5 MiB | 2021 Apr 12 05:13 |
Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.eng.srt | 87.5 KiB | 2021 Apr 11 04:46 |
Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.mp4 | 59.7 MiB | 2021 Apr 12 05:13 |
How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing.eng.srt | 82.8 KiB | 2021 Apr 11 04:35 |
How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing.mp4 | 52.0 MiB | 2021 Apr 12 05:13 |
I Know What You Saw Last Minute - The Chrome Browser Case.eng.srt | 43.0 KiB | 2021 Apr 11 04:43 |
I Know What You Saw Last Minute - The Chrome Browser Case.mp4 | 23.5 MiB | 2021 Apr 12 05:13 |
Inside Web Attacks - The Real Payloads.eng.srt | 29.3 KiB | 2021 Apr 11 04:54 |
Inside Web Attacks - The Real Payloads.mp4 | 13.3 MiB | 2021 Apr 12 05:13 |
Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016.mp4 | 99.3 MiB | 2021 Apr 12 20:13 |
Locknote Conclusions and Key Takeaways from Black Hat Europe 2016.eng.srt | 90.4 KiB | 2021 Apr 11 05:07 |
Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.eng.srt | 83.6 KiB | 2021 Apr 11 04:35 |
Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.mp4 | 56.8 MiB | 2021 Apr 12 20:13 |
Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.eng.srt | 57.1 KiB | 2021 Apr 11 04:39 |
Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.mp4 | 29.2 MiB | 2021 Apr 12 20:13 |
Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.eng.srt | 89.5 KiB | 2021 Apr 11 04:46 |
Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.mp4 | 38.0 MiB | 2021 Apr 12 20:13 |
Randomization Can't Stop BPF JIT Spray.eng.srt | 48.0 KiB | 2021 Apr 11 05:02 |
Randomization Can't Stop BPF JIT Spray.mp4 | 29.8 MiB | 2021 Apr 12 20:13 |
Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.eng.srt | 87.8 KiB | 2021 Apr 11 04:56 |
Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.mp4 | 51.9 MiB | 2021 Apr 12 20:13 |
Rooting EVERY Android - From Extension to Exploitation.eng.srt | 61.7 KiB | 2021 Apr 11 04:35 |
Rooting EVERY Android - From Extension to Exploitation.mp4 | 38.2 MiB | 2021 Apr 12 20:13 |
Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0.mp4 | 26.0 MiB | 2021 Apr 12 20:13 |
Stumping the Mobile Chipset.eng.srt | 55.2 KiB | 2021 Apr 11 04:35 |
Stumping the Mobile Chipset.mp4 | 47.9 MiB | 2021 Apr 12 20:13 |
Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.eng.srt | 97.0 KiB | 2021 Apr 11 04:38 |
Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.mp4 | 65.7 MiB | 2021 Apr 12 20:13 |
Towards a Policy-Agnostic Control-Flow Integrity Implementation.eng.srt | 80.8 KiB | 2021 Apr 11 04:40 |
Towards a Policy-Agnostic Control-Flow Integrity Implementation.mp4 | 61.9 MiB | 2021 Apr 12 20:13 |
Use-After-Use-After-Free - Exploit UAF by Generating Your Own.eng.srt | 60.2 KiB | 2021 Apr 11 05:03 |
Use-After-Use-After-Free - Exploit UAF by Generating Your Own.mp4 | 35.9 MiB | 2021 Apr 12 20:13 |
When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.eng.srt | 33.0 KiB | 2021 Apr 11 04:50 |
When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.mp4 | 27.8 MiB | 2021 Apr 12 20:13 |
WiFi-Based IMSI Catcher.eng.srt | 96.4 KiB | 2021 Apr 11 04:48 |
WiFi-Based IMSI Catcher.mp4 | 56.3 MiB | 2021 Apr 12 20:13 |
Witchcraft Compiler Collection - Towards Self Aware Computer Programs.eng.srt | 72.9 KiB | 2021 Apr 11 04:35 |
Witchcraft Compiler Collection - Towards Self Aware Computer Programs.mp4 | 56.3 MiB | 2021 Apr 12 20:13 |