Parent directory/ | - | - |
Sophia D’Antoine - Practical Uses of Program Analysis Automatic Exploit Generation.mp4 | 43.5 MiB | 2019 Oct 01 08:25 |
René Freingruber - Bypassing Application Whitelisting in Critical Infrastructures.mp4 | 62.5 MiB | 2019 Oct 01 08:25 |
Philippe Arteau - The New Wave of Deserialization Bugs.mp4 | 40.9 MiB | 2019 Oct 01 08:25 |
Olivier Bilodeau & Hugo Genesse - Applying DevOps Principles for Better Malware Analysis - YouTube.mp4 | 54.2 MiB | 2019 Oct 01 08:25 |
Miroslav Stampar - Android Practical Introduction into the (In)Security.mp4 | 68.7 MiB | 2019 Oct 01 08:25 |
Masashi Crete Nishihata & John Scott Railton - Not Safe For Organizing....mp4 | 61.5 MiB | 2019 Oct 01 08:25 |
Mark Stanislav - Hide Yo’ Kids Hacking Your Family’s Connected Things.mp4 | 81.6 MiB | 2019 Oct 01 08:25 |
Lex Gill - Law, Metaphor and the Encrypted Machine.mp4 | 43.9 MiB | 2019 Oct 01 08:25 |
Laurent Desaulniers - Stupid Pentester Tricks.mp4 | 37.0 MiB | 2019 Oct 01 08:25 |
Jake Sethi Reiner - Security Problems of an Eleven Year Old and How to Solve Them.mp4 | 9.7 MiB | 2019 Oct 01 08:25 |
Guillaume Ross & Jordan Rogers - Real Solutions From Real Incidents Save Money and Your Job!.mp4 | 116.2 MiB | 2019 Oct 01 08:25 |
Gabriella Coleman - How Anonymous narrowly Evaded the Cyberterrorism Rhetorical Machine.mp4 | 70.1 MiB | 2019 Oct 01 08:25 |
Eugene Rodionov & Alexander Matrosov Analysis of High level Intermediate ....mp4 | 53.0 MiB | 2019 Oct 01 08:25 |
Etienne Martineau - Inter VM Data Exfiltration The Art of Cache Timing Covert Channel ....mp4 | 64.6 MiB | 2019 Oct 01 08:25 |
Eric Evenchick - CANtact An Open Tool for Automotive Exploitation.mp4 | 34.9 MiB | 2019 Oct 01 08:25 |