Parent directory/ | - | - |
A Process is No One - Hunting for Token Manipulation.eng.srt | 174.7 KiB | 2019 Sep 30 16:01 |
A Process is No One - Hunting for Token Manipulation.mp4 | 34.6 MiB | 2021 Apr 11 05:34 |
A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities.eng.srt | 150.9 KiB | 2019 Sep 30 16:01 |
A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities.mp4 | 38.6 MiB | 2021 Apr 11 05:34 |
A Universal Controller to Take Over a Z-Wave Network.eng.srt | 47.2 KiB | 2019 Sep 30 16:01 |
A Universal Controller to Take Over a Z-Wave Network.mp4 | 12.2 MiB | 2021 Apr 11 05:34 |
Attacking NextGen Roaming Networks.eng.srt | 128.8 KiB | 2019 Sep 30 16:01 |
Attacking NextGen Roaming Networks.mp4 | 35.8 MiB | 2021 Apr 11 05:34 |
Attacks Against GSMA's M2M Remote Provisioning.eng.srt | 60.8 KiB | 2019 Sep 30 16:01 |
Attacks Against GSMA's M2M Remote Provisioning.mp4 | 20.1 MiB | 2021 Apr 11 05:34 |
Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing.eng.srt | 90.2 KiB | 2019 Sep 30 16:01 |
Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing.mp4 | 35.8 MiB | 2021 Apr 11 05:34 |
Becoming You - A Glimpse Into Credential Abuse.eng.srt | 81.6 KiB | 2019 Sep 30 16:01 |
Becoming You - A Glimpse Into Credential Abuse.mp4 | 23.6 MiB | 2021 Apr 11 05:34 |
BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux IoT Device.eng.srt | 140.9 KiB | 2019 Sep 30 16:01 |
BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux IoT Device.mp4 | 59.2 MiB | 2021 Apr 11 05:34 |
Breaking Bad - Stealing Patient Data Through Medical Devices.eng.srt | 155.3 KiB | 2019 Sep 30 16:01 |
Breaking Bad - Stealing Patient Data Through Medical Devices.mp4 | 47.9 MiB | 2021 Apr 11 05:34 |
Breaking Out HSTS (and HPKP) On Firefox, IE Edge and (Possibly) Chrome.eng.srt | 97.7 KiB | 2019 Sep 30 16:01 |
Breaking Out HSTS (and HPKP) On Firefox, IE Edge and (Possibly) Chrome.mp4 | 33.6 MiB | 2021 Apr 11 05:34 |
By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms.eng.srt | 105.7 KiB | 2019 Sep 30 16:01 |
By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms.mp4 | 50.1 MiB | 2021 Apr 11 05:34 |
CALDERA - Automating Adversary Emulation.eng.srt | 143.4 KiB | 2019 Sep 30 16:01 |
CALDERA - Automating Adversary Emulation.mp4 | 35.1 MiB | 2021 Apr 11 05:34 |
CLKscrew - Exposing The Perils of Security-Oblivious Energy Management.eng.srt | 156.9 KiB | 2019 Sep 30 16:01 |
CLKscrew - Exposing The Perils of Security-Oblivious Energy Management.mp4 | 35.5 MiB | 2021 Apr 11 05:34 |
DIFUZE - Android Kernel Driver Fuzzing.eng.srt | 154.1 KiB | 2019 Sep 30 16:01 |
DIFUZE - Android Kernel Driver Fuzzing.mp4 | 26.8 MiB | 2021 Apr 11 05:34 |
Day 1 Keynote - Diplomacy and Combating Evolving International Cyber Threats.eng.srt | 186.0 KiB | 2019 Sep 30 16:01 |
Day 1 Keynote - Diplomacy and Combating Evolving International Cyber Threats.mp4 | 96.1 MiB | 2021 Apr 11 05:34 |
Day 2 Keynote - Security Through Distrusting.eng.srt | 117.5 KiB | 2019 Sep 30 16:01 |
Day 2 Keynote - Security Through Distrusting.mp4 | 65.2 MiB | 2021 Apr 11 05:34 |
Dealing The Perfect Hand - Shuffling Memory Blocks On z OS.eng.srt | 142.6 KiB | 2019 Sep 30 16:01 |
Dealing The Perfect Hand - Shuffling Memory Blocks On z OS.mp4 | 29.2 MiB | 2021 Apr 11 05:34 |
Enraptured Minds - Strategic Gaming of Cognitive Mindhacks.eng.srt | 122.0 KiB | 2019 Sep 30 16:01 |
Enraptured Minds - Strategic Gaming of Cognitive Mindhacks.mp4 | 51.4 MiB | 2021 Apr 11 05:34 |
Exfiltrating Reconnaissance Data from Air-Gapped ICS SCADA Networks.eng.srt | 103.7 KiB | 2019 Sep 30 16:01 |
Exfiltrating Reconnaissance Data from Air-Gapped ICS SCADA Networks.mp4 | 31.6 MiB | 2021 Apr 11 05:34 |
Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing.eng.srt | 66.3 KiB | 2019 Sep 30 16:01 |
Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing.mp4 | 17.3 MiB | 2021 Apr 11 05:34 |
Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming.eng.srt | 138.3 KiB | 2019 Sep 30 16:01 |
Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming.mp4 | 26.8 MiB | 2021 Apr 11 05:34 |
GDPR and Third Party JS - Can It Be Done.eng.srt | 70.4 KiB | 2019 Sep 30 16:01 |
GDPR and Third Party JS - Can It Be Done.mp4 | 17.7 MiB | 2021 Apr 11 05:34 |
Heap Layout Optimisation for Exploitation.eng.srt | 116.8 KiB | 2019 Sep 30 16:01 |
Heap Layout Optimisation for Exploitation.mp4 | 20.3 MiB | 2021 Apr 11 05:34 |
Hiding PIN's Artifacts to Defeat Evasive Malware.eng.srt | 119.3 KiB | 2019 Sep 30 16:01 |
Hiding PIN's Artifacts to Defeat Evasive Malware.mp4 | 34.5 MiB | 2021 Apr 11 05:34 |
How Samsung Secures Your Wallet and How To Break It.eng.srt | 106.1 KiB | 2019 Sep 30 16:01 |
How Samsung Secures Your Wallet and How To Break It.mp4 | 38.1 MiB | 2021 Apr 11 05:34 |
How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine.eng.srt | 72.3 KiB | 2019 Sep 30 16:01 |
How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine.mp4 | 34.8 MiB | 2021 Apr 11 05:34 |
How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement.eng.srt | 121.4 KiB | 2019 Sep 30 16:01 |
How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement.mp4 | 43.4 MiB | 2021 Apr 11 05:34 |
I Trust My Zombies - A Trust-Enabled Botnet.mp4 | 19.2 MiB | 2021 Apr 11 05:34 |
Inside Android's SafetyNet Attestation.mp4 | 35.7 MiB | 2021 Apr 11 05:34 |
Intel ME - Flash File System Explained.eng.srt | 101.8 KiB | 2019 Sep 30 16:01 |
Intel ME - Flash File System Explained.mp4 | 36.0 MiB | 2021 Apr 11 05:34 |
Jailbreaking Apple Watch.eng.srt | 68.8 KiB | 2019 Sep 30 16:01 |
Jailbreaking Apple Watch.mp4 | 19.4 MiB | 2021 Apr 11 05:34 |
Key Reinstallation Attacks - Breaking the WPA2 Protocol.eng.srt | 122.3 KiB | 2019 Sep 30 16:01 |
Key Reinstallation Attacks - Breaking the WPA2 Protocol.mp4 | 23.9 MiB | 2021 Apr 11 05:34 |
Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017.eng.srt | 118.1 KiB | 2019 Sep 30 16:01 |
Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017.mp4 | 45.6 MiB | 2021 Apr 11 05:34 |
Lost in Transaction - Process Doppelgänging.eng.srt | 124.9 KiB | 2019 Sep 30 16:01 |
Lost in Transaction - Process Doppelgänging.mp4 | 33.8 MiB | 2021 Apr 11 05:34 |
Nation-State Moneymule's Hunting Season - APT Attacks Targeting Financial Institutions.eng.srt | 128.2 KiB | 2019 Sep 30 16:01 |
Nation-State Moneymule's Hunting Season - APT Attacks Targeting Financial Institutions.mp4 | 40.8 MiB | 2021 Apr 11 05:34 |
Passive Fingerprinting of HTTP 2 Clients.eng.srt | 123.3 KiB | 2019 Sep 30 16:01 |
Passive Fingerprinting of HTTP 2 Clients.mp4 | 29.2 MiB | 2021 Apr 11 05:34 |
Red Team Techniques for Evading, Bypassing & Disabling MS.eng.srt | 138.4 KiB | 2019 Sep 30 16:01 |
Red Team Techniques for Evading, Bypassing & Disabling MS.mp4 | 33.1 MiB | 2021 Apr 11 05:34 |
Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.eng.srt | 117.3 KiB | 2019 Sep 30 16:01 |
Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.mp4 | 43.3 MiB | 2021 Apr 11 05:34 |
Self-Verifying Authentication - A Framework For Safer Integrations of Single-Sign-On Services.eng.srt | 99.6 KiB | 2019 Sep 30 16:01 |
Self-Verifying Authentication - A Framework For Safer Integrations of Single-Sign-On Services.mp4 | 41.7 MiB | 2021 Apr 11 05:34 |
The Apple of Your EFI - An Updated Study of EFI Security.eng.srt | 179.6 KiB | 2019 Sep 30 16:01 |
The Apple of Your EFI - An Updated Study of EFI Security.mp4 | 35.8 MiB | 2021 Apr 11 05:34 |
The Spear to Break the Security Wall of S7Commplus.eng.srt | 45.8 KiB | 2019 Sep 30 16:01 |
The Spear to Break the Security Wall of S7Commplus.mp4 | 21.2 MiB | 2021 Apr 11 05:34 |
Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations.eng.srt | 143.4 KiB | 2019 Sep 30 16:01 |
Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations.mp4 | 30.3 MiB | 2021 Apr 11 05:34 |
Zero Days, Thousands of Nights - The Life & Times of Zero-Day Vulns and Their Exploits.eng.srt | 131.5 KiB | 2019 Sep 30 16:01 |
Zero Days, Thousands of Nights - The Life & Times of Zero-Day Vulns and Their Exploits.mp4 | 36.9 MiB | 2021 Apr 11 05:34 |