Parent directory/ | - | - |
A Measured Response to a Grain of Rice.eng.srt | 103.0 KiB | 2019 Sep 30 16:00 |
A Measured Response to a Grain of Rice.mp4 | 75.2 MiB | 2021 Apr 10 20:55 |
AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace.eng.srt | 48.2 KiB | 2019 Sep 30 16:00 |
AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace.mp4 | 20.8 MiB | 2021 Apr 10 20:55 |
Attacking Hardware Systems Using Resonance and the Laws of Physics.eng.srt | 96.8 KiB | 2019 Sep 30 16:00 |
Attacking Hardware Systems Using Resonance and the Laws of Physics.mp4 | 36.3 MiB | 2021 Apr 10 20:55 |
Attacking and Defending Blockchains From Horror Stories to Secure Wallets.eng.srt | 86.0 KiB | 2019 Sep 30 16:00 |
Attacking and Defending Blockchains From Horror Stories to Secure Wallets.mp4 | 28.2 MiB | 2021 Apr 10 20:55 |
BLEEDINGBIT Your APs Belong to Us.eng.srt | 79.3 KiB | 2019 Sep 30 16:00 |
BLEEDINGBIT Your APs Belong to Us.mp4 | 22.9 MiB | 2021 Apr 10 20:55 |
Black Hat Europe 2018 Keynote.eng.srt | 66.7 KiB | 2019 Sep 30 16:00 |
Black Hat Europe 2018 Keynote.mp4 | 60.7 MiB | 2021 Apr 10 20:55 |
Broken Links Emergence and Future of Software-Supply Chain Compromises.eng.srt | 61.5 KiB | 2019 Sep 30 16:00 |
Broken Links Emergence and Future of Software-Supply Chain Compromises.mp4 | 17.3 MiB | 2021 Apr 10 20:55 |
Cloud-Native Sandboxes for Microservices Understanding New Threats and Attacks.eng.srt | 35.7 KiB | 2019 Sep 30 16:00 |
Cloud-Native Sandboxes for Microservices Understanding New Threats and Attacks.mp4 | 11.9 MiB | 2021 Apr 10 20:55 |
Container Attack Surface Reduction Beyond Name Space Isolation.eng.srt | 84.2 KiB | 2019 Sep 30 16:00 |
Container Attack Surface Reduction Beyond Name Space Isolation.mp4 | 32.9 MiB | 2021 Apr 10 20:55 |
Cutting Edge Microsoft Browser Security - From People Who Owned It.eng.srt | 57.5 KiB | 2019 Sep 30 16:00 |
Cutting Edge Microsoft Browser Security - From People Who Owned It.mp4 | 27.5 MiB | 2021 Apr 10 20:55 |
Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.eng.srt | 81.7 KiB | 2019 Sep 30 16:00 |
Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.mp4 | 28.4 MiB | 2021 Apr 10 20:55 |
Deep Impact Recognizing Unknown Malicious Activities from Zero Knowledge.eng.srt | 57.9 KiB | 2019 Sep 30 16:00 |
Deep Impact Recognizing Unknown Malicious Activities from Zero Knowledge.mp4 | 33.1 MiB | 2021 Apr 10 20:55 |
DeepPhish Simulating Malicious AI.eng.srt | 70.1 KiB | 2019 Sep 30 16:00 |
DeepPhish Simulating Malicious AI.mp4 | 41.3 MiB | 2021 Apr 10 20:55 |
Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces.eng.srt | 61.4 KiB | 2019 Sep 30 16:00 |
Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces.mp4 | 58.3 MiB | 2021 Apr 10 20:55 |
Drill Apple Core Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit.eng.srt | 54.8 KiB | 2019 Sep 30 16:00 |
Drill Apple Core Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit.mp4 | 11.5 MiB | 2021 Apr 10 20:56 |
Eternal War in XNU Kernel Objects.eng.srt | 43.4 KiB | 2019 Sep 30 16:00 |
Eternal War in XNU Kernel Objects.mp4 | 25.3 MiB | 2021 Apr 10 20:56 |
Evolving Security Experts Among Teenagers.eng.srt | 76.1 KiB | 2019 Sep 30 16:00 |
Evolving Security Experts Among Teenagers.mp4 | 34.5 MiB | 2021 Apr 10 20:56 |
How to Build Synthetic Persons in Cyberspace.eng.srt | 94.0 KiB | 2019 Sep 30 16:00 |
How to Build Synthetic Persons in Cyberspace.mp4 | 29.4 MiB | 2021 Apr 10 20:56 |
I Block You Because I Love You Social Account Identification Attack Against a Website Visitor.mp4 | 23.5 MiB | 2021 Apr 10 20:56 |
In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild.eng.srt | 42.0 KiB | 2019 Sep 30 16:00 |
In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild.mp4 | 13.0 MiB | 2021 Apr 10 20:56 |
Keeping Secrets Emerging Practice in Database Encryption.eng.srt | 68.0 KiB | 2019 Sep 30 16:00 |
Keeping Secrets Emerging Practice in Database Encryption.mp4 | 17.7 MiB | 2021 Apr 10 20:56 |
Level Up Your Security Mindset.eng.srt | 84.6 KiB | 2019 Sep 30 16:00 |
Level Up Your Security Mindset.mp4 | 34.7 MiB | 2021 Apr 10 20:56 |
Locknote Conclusions and Key Takeaways from Black Hat Europe 2018.eng.srt | 90.2 KiB | 2019 Sep 30 16:00 |
Locknote Conclusions and Key Takeaways from Black Hat Europe 2018.mp4 | 58.9 MiB | 2021 Apr 10 20:56 |
Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild.eng.srt | 85.4 KiB | 2019 Sep 30 16:00 |
Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild.mp4 | 24.6 MiB | 2021 Apr 10 20:56 |
Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM.eng.srt | 107.3 KiB | 2019 Sep 30 16:00 |
Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM.mp4 | 49.7 MiB | 2021 Apr 10 20:56 |
No Free Charge Theorem 2.0 How to Steal Private Information from a Mobile Device Using a Powerbank.eng.srt | 51.6 KiB | 2019 Sep 30 16:00 |
No Free Charge Theorem 2.0 How to Steal Private Information from a Mobile Device Using a Powerbank.mp4 | 25.4 MiB | 2021 Apr 10 20:56 |
Off-Path Attacks Against PKI.eng.srt | 52.8 KiB | 2019 Sep 30 16:00 |
Off-Path Attacks Against PKI.mp4 | 16.8 MiB | 2021 Apr 10 20:56 |
Perception Deception Physical Adversarial Attack Challenges.eng.srt | 79.4 KiB | 2019 Sep 30 16:00 |
Perception Deception Physical Adversarial Attack Challenges.mp4 | 55.0 MiB | 2021 Apr 10 20:56 |
Perfectly Deniable Steganographic Disk Encryption.eng.srt | 104.4 KiB | 2019 Sep 30 16:00 |
Perfectly Deniable Steganographic Disk Encryption.mp4 | 50.5 MiB | 2021 Apr 10 20:56 |
Real-Time Detection of Attacks Leveraging Domain Administrator Privilege.eng.srt | 31.8 KiB | 2019 Sep 30 16:00 |
Real-Time Detection of Attacks Leveraging Domain Administrator Privilege.mp4 | 18.5 MiB | 2021 Apr 10 20:56 |
RustZone Writing Trusted Applications in Rust.eng.srt | 92.9 KiB | 2019 Sep 30 16:00 |
RustZone Writing Trusted Applications in Rust.mp4 | 28.3 MiB | 2021 Apr 10 20:56 |
SDL at Scale Growing Security Champions.eng.srt | 96.0 KiB | 2019 Sep 30 16:00 |
SDL at Scale Growing Security Champions.mp4 | 48.3 MiB | 2021 Apr 10 20:56 |
Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses.mp4 | 31.5 MiB | 2021 Apr 10 20:56 |
Straight Outta VMware Modern Exploitation of the SVGA Device for Guest-to-Host Escapes.mp4 | 34.5 MiB | 2021 Apr 10 20:56 |
The Last Line of Defense Understanding and Attacking Apple File System on iOS.eng.srt | 31.8 KiB | 2019 Sep 30 16:00 |
The Last Line of Defense Understanding and Attacking Apple File System on iOS.mp4 | 16.6 MiB | 2021 Apr 10 20:56 |
The Mummy 2018 - Microsoft Accidentally Summons Back Ugly Attacks from the Past.eng.srt | 36.1 KiB | 2019 Sep 30 16:00 |
The Mummy 2018 - Microsoft Accidentally Summons Back Ugly Attacks from the Past.mp4 | 14.3 MiB | 2021 Apr 10 20:56 |
The Undeniable Truth.eng.srt | 83.9 KiB | 2019 Sep 30 16:00 |
The Undeniable Truth.mp4 | 23.9 MiB | 2021 Apr 10 20:56 |
Thermanator and the Thermal Residue Attack.eng.srt | 30.0 KiB | 2019 Sep 30 16:00 |
Thermanator and the Thermal Residue Attack.mp4 | 17.6 MiB | 2021 Apr 10 20:56 |
Under the SEA - A Look at the Syrian Electronic Army's Mobile Tooling.eng.srt | 51.1 KiB | 2019 Sep 30 16:00 |
Under the SEA - A Look at the Syrian Electronic Army's Mobile Tooling.mp4 | 19.8 MiB | 2021 Apr 10 20:56 |
Video Killed the Text Star OSINT Approach.eng.srt | 46.6 KiB | 2019 Sep 30 16:00 |
Video Killed the Text Star OSINT Approach.mp4 | 30.7 MiB | 2021 Apr 10 20:56 |
When Everyone's Dog is Named Fluffy.eng.srt | 38.1 KiB | 2019 Sep 30 16:00 |
When Everyone's Dog is Named Fluffy.mp4 | 14.5 MiB | 2021 Apr 10 20:56 |
When Machines Can't Talk.eng.srt | 68.7 KiB | 2019 Sep 30 16:00 |
When Machines Can't Talk.mp4 | 36.3 MiB | 2021 Apr 10 20:56 |
Where 2 Worlds Collide Bringing Mimikatz et al to UNIX.eng.srt | 75.4 KiB | 2019 Sep 30 16:00 |
Where 2 Worlds Collide Bringing Mimikatz et al to UNIX.mp4 | 24.0 MiB | 2021 Apr 10 20:56 |