Parent directory/ | - | - |
(in)Security in Building Automation - How to Create Dark Buildings with Light Speed.en.transcribed.srt | 62.4 KiB | 2019 Sep 30 16:44 |
(in)Security in Building Automation - How to Create Dark Buildings with Light Speed.mp4 | 18.5 MiB | 2021 Apr 02 20:00 |
Adventures in Attacking Wind Farm Control Networks.en.transcribed.srt | 87.2 KiB | 2019 Oct 01 07:20 |
Adventures in Attacking Wind Farm Control Networks.mp4 | 26.5 MiB | 2021 Apr 02 20:00 |
All Your SMS & Contacts Belong to ADUPS & Others.en.transcribed.srt | 60.8 KiB | 2019 Oct 01 07:20 |
All Your SMS & Contacts Belong to ADUPS & Others.mp4 | 20.7 MiB | 2021 Apr 02 20:00 |
An ACE Up the Sleeve - Designing Active Directory DACL Backdoors.en.transcribed.srt | 144.9 KiB | 2019 Sep 30 16:44 |
An ACE Up the Sleeve - Designing Active Directory DACL Backdoors.mp4 | 44.7 MiB | 2021 Apr 02 20:00 |
Attacking Encrypted USB Keys the Hard(ware) Way.en.transcribed.srt | 104.9 KiB | 2019 Oct 01 07:20 |
Attacking Encrypted USB Keys the Hard(ware) Way.mp4 | 25.4 MiB | 2021 Apr 02 20:00 |
Automated Testing of Crypto Software Using Differential Fuzzing.en.transcribed.srt | 94.8 KiB | 2019 Oct 01 07:20 |
Automated Testing of Crypto Software Using Differential Fuzzing.mp4 | 30.9 MiB | 2021 Apr 02 20:00 |
Behind the Plexiglass Curtain - Stats and Stories from the Black Hat NOC.en.transcribed.srt | 128.2 KiB | 2019 Sep 30 16:44 |
Behind the Plexiglass Curtain - Stats and Stories from the Black Hat NOC.mp4 | 31.5 MiB | 2021 Apr 02 20:00 |
Betraying the BIOS - Where the Guardians of the BIOS are Failing.en.transcribed.srt | 97.9 KiB | 2019 Sep 30 16:44 |
Betraying the BIOS - Where the Guardians of the BIOS are Failing.mp4 | 44.7 MiB | 2021 Apr 02 20:00 |
Big Game Theory Hunting - The Peculiarities of Human Behavior in the InfoSec Game.en.transcribed.srt | 144.0 KiB | 2019 Sep 30 16:44 |
Big Game Theory Hunting - The Peculiarities of Human Behavior in the InfoSec Game.mp4 | 35.9 MiB | 2021 Apr 02 20:00 |
Black Hat USA 2017 Keynote.en.transcribed.srt | 186.6 KiB | 2019 Oct 01 07:20 |
Black Hat USA 2017 Keynote.mp4 | 86.5 MiB | 2021 Apr 02 20:00 |
Bochspwn Reloaded - Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking.en.transcribed.srt | 146.0 KiB | 2019 Sep 30 16:44 |
Bochspwn Reloaded - Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking.mp4 | 45.0 MiB | 2021 Apr 02 20:00 |
Breaking XSS Mitigations Via Script Gadgets.en.transcribed.srt | 125.7 KiB | 2019 Oct 01 07:20 |
Breaking XSS Mitigations Via Script Gadgets.mp4 | 35.8 MiB | 2021 Apr 02 20:00 |
Breaking the Laws of Robotics - Attacking Industrial Robots.en.transcribed.srt | 103.7 KiB | 2019 Sep 30 16:44 |
Breaking the Laws of Robotics - Attacking Industrial Robots.mp4 | 32.0 MiB | 2021 Apr 02 20:00 |
Breaking the x86 Instruction Set.en.transcribed.srt | 145.9 KiB | 2019 Oct 01 07:20 |
Breaking the x86 Instruction Set.mp4 | 33.2 MiB | 2021 Apr 02 20:00 |
Broadpwn - Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets.en.transcribed.srt | 108.9 KiB | 2019 Sep 30 16:44 |
Broadpwn - Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets.mp4 | 47.0 MiB | 2021 Apr 02 20:00 |
Bug Collisions Meet Government Vulnerability Disclosure.en.transcribed.srt | 154.7 KiB | 2019 Oct 01 07:20 |
Bug Collisions Meet Government Vulnerability Disclosure.mp4 | 42.6 MiB | 2021 Apr 02 20:00 |
Challenges of Cooperation Across Cyberspace.en.transcribed.srt | 128.3 KiB | 2019 Oct 01 07:20 |
Challenges of Cooperation Across Cyberspace.mp4 | 43.5 MiB | 2021 Apr 02 20:00 |
Cloak & Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.en.transcribed.srt | 140.1 KiB | 2019 Sep 30 16:44 |
Cloak & Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.mp4 | 33.4 MiB | 2021 Apr 02 20:00 |
Cracking the Lens - Targeting HTTP's Hidden Attack-Surface.en.transcribed.srt | 121.0 KiB | 2019 Sep 30 16:44 |
Cracking the Lens - Targeting HTTP's Hidden Attack-Surface.mp4 | 37.1 MiB | 2021 Apr 02 20:00 |
Datacenter Orchestration Security and Insecurity - Assessing Kubernetes, Mesos, and Docker at Scale.en.transcribed.srt | 126.2 KiB | 2019 Sep 30 16:44 |
Datacenter Orchestration Security and Insecurity - Assessing Kubernetes, Mesos, and Docker at Scale.mp4 | 36.7 MiB | 2021 Apr 02 20:00 |
Defeating Samsung KNOX with Zero Privilege.mp4 | 28.3 MiB | 2021 Apr 02 20:00 |
Developing Trust and Gitting Betrayed.en.transcribed.srt | 144.5 KiB | 2019 Oct 01 07:20 |
Developing Trust and Gitting Betrayed.mp4 | 38.2 MiB | 2021 Apr 02 20:00 |
Digital Vengeance - Exploiting the Most Notorious C&C Toolkits.en.transcribed.srt | 97.8 KiB | 2019 Sep 30 16:44 |
Digital Vengeance - Exploiting the Most Notorious C&C Toolkits.mp4 | 28.7 MiB | 2021 Apr 02 20:00 |
Escalating Insider Threats Using VMware's API.en.transcribed.srt | 37.8 KiB | 2019 Oct 01 07:20 |
Escalating Insider Threats Using VMware's API.mp4 | 14.8 MiB | 2021 Apr 02 20:00 |
Evading Microsoft ATA for Active Directory Domination.en.transcribed.srt | 102.3 KiB | 2019 Oct 01 07:20 |
Evading Microsoft ATA for Active Directory Domination.mp4 | 51.4 MiB | 2021 Apr 02 20:00 |
Exploit Kit Cornucopia.en.transcribed.srt | 129.2 KiB | 2019 Oct 01 07:20 |
Exploit Kit Cornucopia.mp4 | 47.7 MiB | 2021 Apr 02 20:00 |
Exploiting Network Printers.en.transcribed.srt | 109.2 KiB | 2019 Oct 01 07:20 |
Exploiting Network Printers.mp4 | 34.7 MiB | 2021 Apr 02 20:00 |
Exploiting a Single SQLite Vulnerability Across Multiple Software.en.transcribed.srt | 84.8 KiB | 2019 Oct 01 07:20 |
Exploiting a Single SQLite Vulnerability Across Multiple Software.mp4 | 31.6 MiB | 2021 Apr 02 20:00 |
Fad or Future Getting Past the Bug Bounty Hype.en.transcribed.srt | 149.5 KiB | 2019 Oct 01 07:20 |
Fad or Future Getting Past the Bug Bounty Hype.mp4 | 35.2 MiB | 2021 Apr 02 20:00 |
Friday the 13th - JSON Attacks.en.transcribed.srt | 110.4 KiB | 2019 Sep 30 16:44 |
Friday the 13th - JSON Attacks.mp4 | 40.5 MiB | 2021 Apr 02 20:00 |
Game of Chromes - Owning the Web with Zombie Chrome Extensions.en.transcribed.srt | 94.3 KiB | 2019 Sep 30 16:44 |
Game of Chromes - Owning the Web with Zombie Chrome Extensions.mp4 | 48.9 MiB | 2021 Apr 02 20:00 |
Go to Hunt, Then Sleep.en.transcribed.srt | 125.0 KiB | 2019 Oct 01 07:20 |
Go to Hunt, Then Sleep.mp4 | 40.7 MiB | 2021 Apr 02 20:00 |
Hacking Hardware with a $10 SD Card Reader.en.transcribed.srt | 113.4 KiB | 2019 Oct 01 07:20 |
Hacking Hardware with a $10 SD Card Reader.mp4 | 40.0 MiB | 2021 Apr 02 20:00 |
Hacking Serverless Runtimes - Profiling AWS Lambda Azure Functions & More.en.transcribed.srt | 137.6 KiB | 2019 Sep 30 16:44 |
Hacking Serverless Runtimes - Profiling AWS Lambda Azure Functions & More.mp4 | 50.7 MiB | 2021 Apr 02 20:00 |
Honey, I Shrunk the Attack Surface - Adventures in Android Security Hardening.en.transcribed.srt | 133.8 KiB | 2019 Sep 30 16:44 |
Honey, I Shrunk the Attack Surface - Adventures in Android Security Hardening.mp4 | 48.8 MiB | 2021 Apr 02 20:00 |
How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass & more.en.transcribed.srt | 92.5 KiB | 2019 Oct 01 07:20 |
How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass & more.mp4 | 28.9 MiB | 2021 Apr 02 20:00 |
How We Created the First SHA-1 Collision and What it Means for Hash Security.en.transcribed.srt | 129.4 KiB | 2019 Oct 01 07:20 |
How We Created the First SHA-1 Collision and What it Means for Hash Security.mp4 | 31.0 MiB | 2021 Apr 02 20:00 |
Ichthyology - Phishing as a Science.en.transcribed.srt | 84.6 KiB | 2019 Sep 30 16:44 |
Ichthyology - Phishing as a Science.mp4 | 14.6 MiB | 2021 Apr 02 20:00 |
Infecting the Enterprise - Abusing Office365Powershell for Covert C2.en.transcribed.srt | 111.2 KiB | 2019 Sep 30 16:44 |
Infecting the Enterprise - Abusing Office365Powershell for Covert C2.mp4 | 36.6 MiB | 2021 Apr 02 20:00 |
Intel AMT Stealth Breakthrough.en.transcribed.srt | 74.5 KiB | 2019 Oct 01 07:20 |
Intel AMT Stealth Breakthrough.mp4 | 33.4 MiB | 2021 Apr 02 20:00 |
Intercepting iCloud Keychain.en.transcribed.srt | 71.2 KiB | 2019 Oct 01 07:20 |
Intercepting iCloud Keychain.mp4 | 19.3 MiB | 2021 Apr 02 20:00 |
Making Diversity a Priority in Security.en.transcribed.srt | 322.8 KiB | 2019 Oct 01 07:20 |
Making Diversity a Priority in Security.mp4 | 114.9 MiB | 2021 Apr 02 20:00 |
Network Automation is Not Your Safe Haven.en.transcribed.srt | 98.9 KiB | 2019 Oct 01 07:20 |
Network Automation is Not Your Safe Haven.mp4 | 39.9 MiB | 2021 Apr 02 20:00 |
Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev.en.transcribed.srt | 137.7 KiB | 2019 Oct 01 07:20 |
Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev.mp4 | 36.3 MiB | 2021 Apr 02 20:00 |
OpenCrypto - Unchaining the JavaCard Ecosystem.en.transcribed.srt | 73.1 KiB | 2019 Sep 30 16:44 |
OpenCrypto - Unchaining the JavaCard Ecosystem.mp4 | 19.9 MiB | 2021 Apr 02 20:00 |
PEIMA - Harnessing Power Laws to Detect Malicious Activities.en.transcribed.srt | 79.7 KiB | 2019 Sep 30 16:44 |
PEIMA - Harnessing Power Laws to Detect Malicious Activities.mp4 | 15.9 MiB | 2021 Apr 02 20:00 |
Practical Tips for Defending Web Applications in the Age of DevOps.en.transcribed.srt | 115.6 KiB | 2019 Oct 01 07:20 |
Practical Tips for Defending Web Applications in the Age of DevOps.mp4 | 31.1 MiB | 2021 Apr 02 20:00 |
Redesigning PKI to Solve Revocation Expiration and Rotation Problems.en.transcribed.srt | 131.4 KiB | 2019 Oct 01 07:21 |
Redesigning PKI to Solve Revocation Expiration and Rotation Problems.mp4 | 39.4 MiB | 2021 Apr 02 20:00 |
Revoke-Obfuscation - PowerShell Obfuscation Detection (And Evasion) Using Science.en.transcribed.srt | 174.8 KiB | 2019 Sep 30 16:44 |
Revoke-Obfuscation - PowerShell Obfuscation Detection (And Evasion) Using Science.mp4 | 56.7 MiB | 2021 Apr 02 20:00 |
ShieldFS - The Last Word in Ransomware Resilient File Systems.en.transcribed.srt | 116.4 KiB | 2019 Sep 30 16:44 |
ShieldFS - The Last Word in Ransomware Resilient File Systems.mp4 | 37.8 MiB | 2021 Apr 02 20:00 |
The Active Directory Botnet.en.transcribed.srt | 94.4 KiB | 2019 Oct 01 07:20 |
The Active Directory Botnet.mp4 | 40.7 MiB | 2021 Apr 02 20:00 |
The Epocholypse 2038 - What's in Store for the Next 20 Years.en.transcribed.srt | 53.4 KiB | 2019 Sep 30 16:44 |
The Epocholypse 2038 - What's in Store for the Next 20 Years.mp4 | 18.8 MiB | 2021 Apr 02 20:00 |
The Industrial Revolution of Lateral Movement.en.transcribed.srt | 56.7 KiB | 2019 Oct 01 07:20 |
The Industrial Revolution of Lateral Movement.mp4 | 21.5 MiB | 2021 Apr 02 20:00 |
They're Coming for Your Tools - Exploiting Design Flaws for Active Intrusion Prevention.en.transcribed.srt | 73.1 KiB | 2019 Sep 30 16:44 |
They're Coming for Your Tools - Exploiting Design Flaws for Active Intrusion Prevention.mp4 | 14.6 MiB | 2021 Apr 02 20:00 |
Tracking Ransomware End to End.en.transcribed.srt | 64.1 KiB | 2019 Oct 01 07:20 |
Tracking Ransomware End to End.mp4 | 17.0 MiB | 2021 Apr 02 20:00 |
Web Cache Deception Attack.en.transcribed.srt | 67.4 KiB | 2019 Oct 01 07:20 |
Web Cache Deception Attack.mp4 | 14.7 MiB | 2021 Apr 02 20:00 |
Why Most Cyber Security Training Fails and What We Can Do About it.en.transcribed.srt | 144.7 KiB | 2019 Oct 01 07:20 |
Why Most Cyber Security Training Fails and What We Can Do About it.mp4 | 41.9 MiB | 2021 Apr 02 20:00 |
WiFuzz - Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake.en.transcribed.srt | 109.4 KiB | 2019 Sep 30 16:44 |
WiFuzz - Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake.mp4 | 37.9 MiB | 2021 Apr 02 20:00 |
kR^X - Comprehensive Kernel Protection Against Just-In-Time Code Reuse.mp4 | 57.8 MiB | 2019 Sep 30 16:44 |