Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.pdf | 4.7 MiB | 2021 Jul 23 07:36 |
Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.pptx | 5.0 MiB | 2021 Jul 23 07:32 |
Agent X - TBA.pptx | 8.0 MiB | 2021 Jul 27 18:42 |
Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.pdf | 440.4 KiB | 2021 Jul 19 15:51 |
Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.pptx | 843.1 KiB | 2021 Jul 19 15:50 |
Babak Javadi Nick Draffen Eric Bettse Anze Jensterle - The PACS-man Comes For Us All.pdf | 68.1 MiB | 2021 Jul 31 21:19 |
Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.pdf | 2.0 MiB | 2021 Jul 19 18:06 |
Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.pptx | 45.2 MiB | 2021 Jul 19 18:07 |
Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.key | 12.5 MiB | 2021 Jul 22 17:47 |
Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.pdf | 14.6 MiB | 2021 Jul 22 17:47 |
Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.pptx | 10.2 MiB | 2021 Jul 22 17:48 |
Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.pdf | 9.1 MiB | 2021 Jul 19 16:56 |
Brian Hong - Sleight of ARM - Demystifying Intel Houdini-Slides.pdf | 4.6 MiB | 2021 Jul 22 18:27 |
Brian Hong - Sleight of ARM - Demystifying Intel Houdini.pdf | 3.1 MiB | 2021 Jul 22 18:27 |
Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.pdf | 22.9 MiB | 2021 Jul 22 17:57 |
Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.pptx | 298.8 MiB | 2021 Jul 22 17:58 |
Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.pdf | 2.0 MiB | 2021 Jul 22 18:01 |
Christopher Wade - Breaking Secure Bootloaders.pdf | 1.5 MiB | 2021 Jul 19 18:22 |
Claire Vacherot - Sneak into buildings with KNXnetIP.pdf | 2.8 MiB | 2021 Jul 25 17:33 |
Dan Petro - Youre Doing IoT RNG.pdf | 794.4 KiB | 2021 Jul 27 19:10 |
David Dworken - Worming through IDEs.pdf | 1.9 MiB | 2021 Jul 22 17:15 |
Dennis Giese - Robots with lasers and cameras but no security- Liberating your vacuum from the cloud.pdf | 249.4 MiB | 2021 Jul 31 21:21 |
Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.pptx | 2.8 MiB | 2021 Jul 19 17:56 |
Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.pdf | 3.4 MiB | 2021 Jul 22 17:51 |
Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.pptx | 10.7 MiB | 2021 Jul 22 17:52 |
Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.pdf | 4.5 MiB | 2021 Jul 23 07:40 |
Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.pdf | 14.4 MiB | 2021 Jul 19 18:31 |
Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-goose.txt | 686 B | 2021 Jul 19 16:19 |
Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.pdf | 44.3 MiB | 2021 Jul 19 16:18 |
Ian Vitek - Central bank digital currency, threats and vulnerabilities.pdf | 1.7 MiB | 2021 Jul 25 17:36 |
Ian Vitek - Central bank digital currency, threats and vulnerabilities.pptx | 4.4 MiB | 2021 Jul 25 17:37 |
Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.pdf | 567.3 KiB | 2021 Jul 27 18:43 |
Jacob Baines - Bring Your Own Print Driver Vulnerability.pdf | 4.7 MiB | 2021 Jul 19 15:53 |
James Kettle - HTTP2 - The Sequel is Always Worse - Slides.pdf | 975.3 KiB | 2021 Jul 22 17:42 |
James Kettle - HTTP2 - The Sequel is Always Worse - Whitepaper.pdf | 656.0 KiB | 2021 Jul 22 17:44 |
Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High(-Level) Languages.pdf | 1.2 MiB | 2021 Jul 19 16:24 |
Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.pdf | 2.4 MiB | 2021 Jul 22 17:33 |
Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.pptx | 5.2 MiB | 2021 Jul 22 17:35 |
Joseph Gabay - Dos- Denial of Shopping – Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.pdf | 11.7 MiB | 2021 Jul 25 17:27 |
Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.pdf | 4.0 MiB | 2021 Jul 23 07:45 |
Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.odp | 6.5 MiB | 2021 Jul 22 17:39 |
Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.pdf | 4.9 MiB | 2021 Jul 22 17:40 |
Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.pdf | 9.4 MiB | 2021 Jul 23 07:51 |
Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric - tools.zip | 1.7 KiB | 2021 Jul 19 18:34 |
Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.pdf | 6.6 MiB | 2021 Jul 19 16:53 |
Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections - Slides.pdf | 709.4 KiB | 2021 Jul 27 18:47 |
Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.pdf | 980.2 KiB | 2021 Jul 27 18:46 |
Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.pdf | 4.9 MiB | 2021 Jul 23 07:03 |
Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.pptx | 22.8 MiB | 2021 Jul 23 07:03 |
Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.pdf | 13.3 MiB | 2021 Jul 27 19:05 |
Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.pdf | 2.6 MiB | 2021 Jul 25 17:32 |
PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.pdf | 1.8 MiB | 2021 Jul 19 17:38 |
Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.pdf | 26.5 MiB | 2021 Jul 19 18:25 |
Paz Hameiri - TEMPEST radio station-Slides.pdf | 1.1 MiB | 2021 Jul 19 16:39 |
Paz Hameiri - TEMPEST radio station.pdf | 554.0 KiB | 2021 Jul 19 16:40 |
Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.pdf | 776.4 KiB | 2021 Jul 22 17:28 |
Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.pdf | 4.8 MiB | 2021 Jul 19 18:02 |
Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.pdf | 7.3 MiB | 2021 Jul 19 16:37 |
Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.pptx | 28.8 MiB | 2021 Jul 19 16:37 |
Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.pdf | 4.6 MiB | 2021 Jul 19 18:15 |
Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.pdf | 12.4 MiB | 2021 Jul 19 16:03 |
Rotem Bar - Abusing SAST tools When scanners do more than just scanning.pdf | 3.4 MiB | 2021 Jul 22 18:21 |
Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.pdf | 28.7 MiB | 2021 Jul 19 16:22 |
Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.pdf | 2.6 MiB | 2021 Jul 22 18:03 |
Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.pptx | 5.3 MiB | 2021 Jul 22 18:04 |
Salvador Mendoza - PINATA- PIN Automatic Try Attack - Slides.pdf | 74.0 MiB | 2021 Jul 27 18:55 |
Salvador Mendoza - PINATA- PIN Automatic Try Attack.pdf | 7.3 MiB | 2021 Jul 27 18:54 |
Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.pdf | 2.6 MiB | 2021 Jul 30 19:37 |
Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.pdf | 13.5 MiB | 2021 Jul 23 07:03 |
Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.odp | 28.1 MiB | 2021 Jul 22 18:07 |
Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.pdf | 13.5 MiB | 2021 Jul 22 18:06 |
Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Slides.pdf | 1023.4 KiB | 2021 Jul 19 17:00 |
Tamas K Lengyel - Fuzzing Linux with Xen.pdf | 10.0 MiB | 2021 Jul 22 17:50 |
Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.pdf | 9.0 MiB | 2021 Jul 27 18:33 |
Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.pdf | 7.2 MiB | 2021 Jul 25 17:35 |
Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.pdf | 17.2 MiB | 2021 Jul 19 18:12 |
Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.pptx | 20.2 MiB | 2021 Jul 19 18:11 |
Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).pdf | 6.8 MiB | 2021 Jul 19 17:13 |
Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).pptx | 13.0 MiB | 2021 Jul 19 17:14 |
Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.pdf | 6.3 MiB | 2021 Jul 19 18:27 |
Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.pdf | 3.7 MiB | 2021 Jul 31 10:02 |
_hyp3ri0n aka Alejandro Caceres Jason Hopper - PunkSPIDER and IOStation- Making a Mess All Over the Internet.pptx | 4.1 MiB | 2021 Jul 25 17:23 |
jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.pdf | 3.9 MiB | 2021 Jul 22 17:38 |