Parent directory/ | - | - |
A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.eng.srt | 75.7 KiB | 2020 Apr 25 19:37 |
A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.mp4 | 123.1 MiB | 2021 Mar 22 20:00 |
Are You Trading Stocks Securely by Alejandro Hernandez.eng.srt | 58.8 KiB | 2020 Apr 25 07:15 |
Are You Trading Stocks Securely by Alejandro Hernandez.mp4 | 108.8 MiB | 2021 Mar 22 20:00 |
BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.eng.srt | 54.7 KiB | 2020 Apr 25 04:56 |
BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.mp4 | 48.5 MiB | 2021 Mar 22 20:00 |
CoinMiner are Evasive by Thomas Roccia and Omri Moyal.eng.srt | 57.9 KiB | 2020 Apr 25 04:54 |
CoinMiner are Evasive by Thomas Roccia and Omri Moyal.mp4 | 77.1 MiB | 2021 Mar 22 20:00 |
Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.eng.srt | 90.8 KiB | 2020 Apr 25 04:55 |
Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.mp4 | 89.0 MiB | 2021 Mar 22 20:00 |
Crypto Gold Mine Is Your Environment Safe by Austin McBride.eng.srt | 58.6 KiB | 2020 Apr 25 19:38 |
Crypto Gold Mine Is Your Environment Safe by Austin McBride.mp4 | 81.7 MiB | 2021 Mar 22 20:00 |
Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.mp4 | 108.0 MiB | 2021 Mar 22 20:00 |
Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.eng.srt | 39.2 KiB | 2020 Apr 25 04:54 |
Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.mp4 | 81.9 MiB | 2021 Mar 22 20:00 |
From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.eng.srt | 47.7 KiB | 2020 Apr 25 04:57 |
From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.mp4 | 81.1 MiB | 2021 Mar 22 20:00 |
Fuzz your smartphone from 4G base station side by Tsojen Liu.eng.srt | 46.5 KiB | 2020 Apr 25 04:56 |
Fuzz your smartphone from 4G base station side by Tsojen Liu.mp4 | 83.7 MiB | 2021 Mar 22 20:00 |
GLitch hammering your phone through WebGL by Pietro Frigo.eng.srt | 66.7 KiB | 2020 Apr 25 07:08 |
GLitch hammering your phone through WebGL by Pietro Frigo.mp4 | 92.0 MiB | 2021 Mar 22 20:00 |
How to hack SD-WAN and keep your sanity by Sergey Goreychik.mp4 | 114.8 MiB | 2021 Mar 22 20:00 |
INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.eng.srt | 46.6 KiB | 2020 Apr 25 04:56 |
INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.mp4 | 72.1 MiB | 2021 Mar 22 20:00 |
Keynote Cyber Arms Race by Mikko Hyppönen.eng.srt | 75.5 KiB | 2020 Apr 25 04:54 |
Keynote Cyber Arms Race by Mikko Hyppönen.mp4 | 137.9 MiB | 2021 Mar 22 20:00 |
Keynote Power, Patience, and Persistence by Kenneth Geers.eng.srt | 54.5 KiB | 2020 Apr 25 04:56 |
Keynote Power, Patience, and Persistence by Kenneth Geers.mp4 | 101.3 MiB | 2021 Mar 22 20:00 |
LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.mp4 | 106.9 MiB | 2021 Mar 22 20:00 |
Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.eng.srt | 50.0 KiB | 2020 Apr 25 04:54 |
Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.mp4 | 92.4 MiB | 2021 Mar 22 20:00 |
Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.eng.srt | 52.4 KiB | 2020 Apr 25 07:25 |
Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.mp4 | 116.4 MiB | 2021 Mar 22 20:00 |
Practical method and practice of OSINT for cyber defense by Ataru Ishii.mp4 | 104.8 MiB | 2021 Mar 22 20:00 |
Privacy by Design Methodology by Vanessa Henri.eng.srt | 56.8 KiB | 2020 Apr 25 07:32 |
Privacy by Design Methodology by Vanessa Henri.mp4 | 80.9 MiB | 2021 Mar 22 20:00 |
RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.mp4 | 37.6 MiB | 2021 Mar 22 20:00 |
Reading the norms of cyberspace - by Koichiro Sparky Komiyama.mp4 | 86.6 MiB | 2021 Mar 22 20:00 |
Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.eng.srt | 62.7 KiB | 2020 Apr 25 04:55 |
Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.mp4 | 90.1 MiB | 2021 Mar 22 20:00 |
Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.eng.srt | 50.7 KiB | 2020 Apr 25 04:55 |
Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.mp4 | 69.0 MiB | 2021 Mar 22 20:00 |
Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.eng.srt | 45.8 KiB | 2020 Apr 25 04:55 |
Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.mp4 | 89.5 MiB | 2021 Mar 22 20:00 |
The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.eng.srt | 78.0 KiB | 2020 Apr 25 04:56 |
The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.mp4 | 136.6 MiB | 2021 Mar 22 20:00 |
The Mystery of WannaCry Mutants - by Makoto Iwamura.mp4 | 106.6 MiB | 2021 Mar 22 20:00 |
The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.mp4 | 79.6 MiB | 2021 Mar 22 20:00 |
WHAT THE FAX by Yaniv Balmas, Eyal Itkin.eng.srt | 68.1 KiB | 2020 Apr 25 04:54 |
WHAT THE FAX by Yaniv Balmas, Eyal Itkin.mp4 | 100.4 MiB | 2021 Mar 22 20:00 |
Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.eng.srt | 49.6 KiB | 2020 Apr 25 04:55 |
Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.mp4 | 88.8 MiB | 2021 Mar 22 20:00 |
Who's guarding the gateway - by Nicole Beckwith.eng.srt | 38.2 KiB | 2020 Apr 25 07:28 |
Who's guarding the gateway - by Nicole Beckwith.mp4 | 67.1 MiB | 2021 Mar 22 20:00 |
Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.eng.srt | 38.2 KiB | 2020 Apr 25 04:55 |
Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.mp4 | 74.2 MiB | 2021 Mar 22 20:00 |
uclear Weapons and Cyber Risks by Julia Franziska Berghofer.eng.srt | 59.6 KiB | 2020 Apr 25 07:31 |
uclear Weapons and Cyber Risks by Julia Franziska Berghofer.mp4 | 96.9 MiB | 2021 Mar 22 20:00 |