Parent directory/ | - | - |
A Crushing Blow at the Heart of SAP’s J2EE Engine - Alexander Polyakov.mp4 | 56.4 MiB | 2021 Apr 04 04:30 |
ARM Exploitation ROPmap - Long Le.mp4 | 62.6 MiB | 2021 Apr 04 04:30 |
Aerial Cyber Apocalypse If We Can Do It So Can They - Richard Perkins, Mike Tassey.mp4 | 66.6 MiB | 2021 Apr 04 04:30 |
Affiliate Programs Legitimate Business or Fueling Cybercrime - Bradley Anstis.mp4 | 17.5 MiB | 2021 Apr 04 04:30 |
Analyzing SPDY Getting to Know the New Web Protocol - Thomas Roth.mp4 | 44.1 MiB | 2021 Apr 04 04:30 |
Apple iOS Security Evaluation Vulnerability Analysis and Data Encryptio - Dino Dai Zovi.mp4 | 70.7 MiB | 2021 Apr 04 04:30 |
Attacking Clientside JIT Compilers - Chris Rohlf, Yan Ivnitskiy.mp4 | 67.0 MiB | 2021 Apr 04 04:30 |
Automated Detection of HPP Vulnerabilities in Web Applications - Marco Balduzzi.mp4 | 64.2 MiB | 2021 Apr 04 04:30 |
Battery Firmware Hacking - Charlie miller.mp4 | 66.7 MiB | 2021 Apr 04 04:30 |
Beyond Files Forensic OWADE Cloud Based Forensic - Elie Bursztein.mp4 | 53.3 MiB | 2021 Apr 04 04:30 |
Bit-Squatting DNS Hijacking Without Exploitation - Artem Dinaburg.mp4 | 66.2 MiB | 2021 Apr 04 04:30 |
Black Ops of TCPIP 2011 - Dan Kaminsky.mp4 | 67.5 MiB | 2021 Apr 04 04:30 |
Chip & PIN is Definitely Broken - Adam Laurie, Zac Franken, Andrea Barisani, Daniele Bianco.mp4 | 76.2 MiB | 2021 Apr 04 04:30 |
Constant Insecurity Things You Didn’t Know About (PECOFF) Portable Executable File Format - Mario Vuksan, Tomislav Pericin.mp4 | 54.6 MiB | 2021 Apr 04 04:30 |
Corporate Espionage for Dummies The Hidden Threat of Embedded Web Servers - Michael Sutton.mp4 | 53.4 MiB | 2021 Apr 04 04:30 |
Covert Post-Exploitation Forensics with Metasploit - Wesley McGrew.mp4 | 54.3 MiB | 2021 Apr 04 04:30 |
Crypto for Pentesters - Thomas Ptacek, Michael Tracy.mp4 | 67.3 MiB | 2021 Apr 04 04:30 |
Don’t Drop the SOAP Real World Web Service Testing for Web Hackers - Tom Eston, Joshua Abraham.mp4 | 51.1 MiB | 2021 Apr 04 04:30 |
Don’t Hate the Player, Hate the Game Inside the Android Patch Lifecycle - Anthony Lineberry, Tim Strazzere, Tim Wyatt.mp4 | 56.1 MiB | 2021 Apr 04 04:30 |
Exploiting USB Devices with Arduino - Greg Ose.mp4 | 63.5 MiB | 2021 Apr 04 04:30 |
Exploiting the iOS Kernel - Stefan Esser.mp4 | 57.9 MiB | 2021 Apr 04 04:30 |
Faces Of Facebook Privacy in the Age of Augmented Reality - Alessandro Acquisti.mp4 | 63.0 MiB | 2021 Apr 04 04:30 |
Familiarity Breeds Contempt The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities - Sandy Clark, Matt Blaze.mp4 | 19.8 MiB | 2021 Apr 04 04:30 |
Femtocells A Poisonous Needle in the Operator’s Hay Stack - Nico Golde, Kevin Redon.mp4 | 47.8 MiB | 2021 Apr 04 04:30 |
From Redmond with Love - Katie Moussouris.mp4 | 15.1 MiB | 2021 Apr 04 04:30 |
Function Rerouting from Kernel Land with Hades - Jason Raber.mp4 | 14.8 MiB | 2021 Apr 04 04:30 |
Hacking .Net Applications The Black Arts - Jon McCoy.mp4 | 55.5 MiB | 2021 Apr 04 04:30 |
Hacking Google Chrome OS - Matt Johansen, Kyle Osborn.mp4 | 51.2 MiB | 2021 Apr 04 04:30 |
Hacking Medical Devices for Fun and Insulin Breaking the Human SCADA System - Jay Radckiffe.mp4 | 57.2 MiB | 2021 Apr 04 04:30 |
Hacking and Forensicating an Oracle Database Server - David Litchfield.mp4 | 68.5 MiB | 2021 Apr 04 04:30 |
Heap Spray Detection with Heap Inspector - Aaron LeMasters.mp4 | 16.5 MiB | 2021 Apr 04 04:30 |
IEEE Software Taggant System - Mark Kennedy, Igor Muttik.mp4 | 20.0 MiB | 2021 Apr 04 04:30 |
Inside Apple’s MDM Black Box - David Schultz.mp4 | 68.3 MiB | 2021 Apr 04 04:30 |
Introduction to Tamper Evident Devices - datagram.mp4 | 58.3 MiB | 2021 Apr 04 04:30 |
Keynote Speaker Cofer Black.mp4 | 56.2 MiB | 2021 Apr 04 04:30 |
Killing the Myth of Cisco IOS Diversity Towards Large-Scale Exploitation of Cisco IOS - Ang Cui, Jatin Kataria, Salvatore Stolfo.mp4 | 25.7 MiB | 2021 Apr 04 04:30 |
Legal Aspects of Cybersecurity - (AKA) CYBERLAW A Year in Review, Cases, Issues, Your Questions My (Alleged) Answers - Robert Clark.mp4 | 58.0 MiB | 2021 Apr 04 04:30 |
Lives on The Line Securing Crisis Maps in Libya, Sudan, and Pakistan - Securing Crisis Maps in Libya, Sudan, and Pakistan.mp4 | 67.4 MiB | 2021 Apr 04 04:30 |
Macs in the Age of the APT - Alex Stamos, BJ Orvis, Paul Youn.mp4 | 58.4 MiB | 2021 Apr 04 04:30 |
Microsoft Vista NDA-less The Good, The Bad, and The Ugly - Chris Paget.mp4 | 53.0 MiB | 2021 Apr 04 04:30 |
Mobile Malware Madness, and How To Cap the Mad Hatters - Neil Daswani.mp4 | 46.7 MiB | 2021 Apr 04 04:30 |
OAuth - Securing the Insecure - Khash Kiani.mp4 | 22.3 MiB | 2021 Apr 04 04:30 |
Overcoming iOS Data Protection to Re-enable iPhone Forensic - Andrey Belenko.mp4 | 22.0 MiB | 2021 Apr 04 04:30 |
Owning Your Phone at Every Layer - A Mobile Security Panel - Tyler Shields, Anthony Lineberry, Charlie Miller, Chris Wysopal, Dino Dai Zovi, more.mp4 | 67.7 MiB | 2021 Apr 04 04:30 |
Owning the Routing Table - New OSPF Attacks - Gabi Nakibly.mp4 | 62.8 MiB | 2021 Apr 04 04:30 |
PPI-Geolocation The Next Generation of 802.11 Visualization and Geo-Location - Johnny Cache.mp4 | 22.0 MiB | 2021 Apr 04 04:30 |
Physical Memory Forensics for Files and Cache - Jamie Butler, Justin Murdock.mp4 | 52.1 MiB | 2021 Apr 04 04:30 |
Playing in the Reader X Sandbox - Paul Sabanal, Mark Yason.mp4 | 42.0 MiB | 2021 Apr 04 04:30 |
Post Memory Corruption Memory Analysis - Jonathan Brossard.mp4 | 65.4 MiB | 2021 Apr 04 04:30 |
Pulp Google Hacking – The Next Generation Search Engine Hacking Arsenal - Fran Brown, Rob Ragan.mp4 | 70.1 MiB | 2021 Apr 04 04:30 |
Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex - Shreeraj Shah.mp4 | 67.4 MiB | 2021 Apr 04 04:30 |
Reviving Smart Card Analysis - Karsten Nohl, Chris Tarnovsky.mp4 | 58.2 MiB | 2021 Apr 04 04:30 |
SSH as the Next Back Door. Are You Giving Hackers Root Access - Joe Skehan.mp4 | 25.7 MiB | 2021 Apr 04 04:30 |
SSL And The Future of Authenticity - Moxie Marlinspike.mp4 | 46.0 MiB | 2021 Apr 04 04:30 |
Security When Nano-Seconds Count - James Arlen.mp4 | 65.6 MiB | 2021 Apr 04 04:30 |
Server-Side JavaScript Injection Attacking and Defending NoSQL and Node.js - Bryan Sullivan.mp4 | 66.3 MiB | 2021 Apr 04 04:30 |
Siemens Simatic S7 PLC Exploitation - Dillon Beresford.mp4 | 46.6 MiB | 2021 Apr 04 04:30 |
Smartfuzzing the Web Carpe Vestra Foramina - Nathan Hamiel, Justin Engler, Seth Law, Gregory Fleischer.mp4 | 59.1 MiB | 2021 Apr 04 04:30 |
Sophail A Critical Analysis of Sophos Antivirus - Tavis Ormandy.mp4 | 54.1 MiB | 2021 Apr 04 04:30 |
Sour Pickles - Marco Slaviero.mp4 | 71.9 MiB | 2021 Apr 04 04:30 |
Spy-Sense Spyware Tool for Executing Stealthy Exploits Against Sensor Networks - Thanassis Giannetsos.mp4 | 61.7 MiB | 2021 Apr 04 04:30 |
Staring into the Abyss The Dark Side of Security and Professional Intelligence - Richard Thieme.mp4 | 85.9 MiB | 2021 Apr 04 04:30 |
Sticking to the Facts Scientific Study of Static Analysis Tools - Chuck Willis, Kris Britton.mp4 | 58.3 MiB | 2021 Apr 04 04:30 |
The Law of Mobile Hacking - Jennifer Granick.mp4 | 62.4 MiB | 2021 Apr 04 04:30 |
The PWNIE Awards.mp4 | 42.7 MiB | 2021 Apr 04 04:30 |
The Rustock Botnet Takedown - Julia Wolf, Alex Lanstein.mp4 | 57.6 MiB | 2021 Apr 04 04:30 |
The Troika of E-Discovery Ethics, ESI, and Expertise in a Web 2.0 World - Richard Costa.mp4 | 17.8 MiB | 2021 Apr 04 04:30 |
The Ultimate Study of Real-Life SSL Issues - Ivan Ristic.mp4 | 17.7 MiB | 2021 Apr 04 04:30 |
Trillions of Lines of Code and Counting Securing Applications At Scale - Jeremiah Grossman, Brad Arkin, Alex Hutton, Adrain Lane, John Johnson.mp4 | 63.2 MiB | 2021 Apr 04 04:30 |
USB - Undermining Security Barriers - Andy Davis.mp4 | 44.5 MiB | 2021 Apr 04 04:30 |
Virtualization Under Attack Breaking Out of KVM - Nelson Elhage.mp4 | 45.1 MiB | 2021 Apr 04 04:30 |
Vulnerabilities of Wireless Water Meter Networks - John McNabb.mp4 | 60.5 MiB | 2021 Apr 04 04:30 |
Vulnerability Extrapolation or Give Me More Bugs Like That, Please - Fabian Yamaguchi.mp4 | 44.6 MiB | 2021 Apr 04 04:30 |
War Texting Weaponizing Machine 2 Machine - Don Bailey.mp4 | 53.5 MiB | 2021 Apr 04 04:30 |
Weapons of Targeted Attack Modern Document Exploit Techniques - Sung-ting Tsai, Ming-Chieh Pan.mp4 | 65.1 MiB | 2021 Apr 04 04:30 |
Welcome & Introduction to Black Hat USA 2011 Jeff Moss, Keynote Speaker Cofer Black .mp4 | 54.0 MiB | 2021 Apr 04 04:30 |
Windows Hooks of Death Kernel Attacks Through User-Mode Callbacks - Tarjei Mandt.mp4 | 66.7 MiB | 2021 Apr 04 04:30 |
sessionlisting.pdf | 620.5 KiB | 2019 Sep 30 15:22 |