|
File Name ↓ |
File Size ↓ |
Date ↓ |
|
Parent directory/ |
- |
- |
|
Adam Crosser - Ghost Calls - Abusing Web Conferencing for Covert Command
& Control.pdf |
101.2 MiB |
2025 Jul 15 11:24 |
|
Adam Zabrocki Marko Mitic - How to secure unique ecosystem shipping 1
billion cores.pdf |
2.6 MiB |
2025 Jul 23 03:51 |
|
Agostino Panico - De-Virtualizing the Dragon Automated Unpacking and
Deobfuscation of Nested VM-Based Protectors using Symbolic Execution and
Taint Tracking.pdf |
6.6 MiB |
2025 Jul 08 15:03 |
|
Agostino Panico - Jailbreaking the Hivemind Finding and Exploiting
Kernel Vulnerabilities in the eBPF Subsystem.pdf |
5.6 MiB |
2025 Jul 08 15:14 |
|
Alejandro Hernando Borja Martinez - Kill Chain Reloaded Abusing legacy
paths for stealth persistence - Demo 1.mp4 |
4.5 MiB |
2025 Jul 30 05:12 |
|
Alejandro Hernando Borja Martinez - Kill Chain Reloaded Abusing legacy
paths for stealth persistence - Demo 2.mp4 |
752.8 KiB |
2025 Jul 30 05:12 |
|
Alejandro Hernando Borja Martinez - Kill Chain Reloaded Abusing legacy
paths for stealth persistence - Demo 3.mp4 |
899.2 KiB |
2025 Jul 30 05:12 |
|
Alejandro Hernando Borja Martinez - Kill Chain Reloaded Abusing legacy
paths for stealth persistence - Demo 4.mp4 |
1.5 MiB |
2025 Jul 30 05:12 |
|
Alejandro Hernando Borja Martinez - Kill Chain Reloaded Abusing legacy
paths for stealth persistence - Demo 5.mp4 |
3.8 MiB |
2025 Jul 30 05:12 |
|
Alejandro Hernando Borja Martinez - Kill Chain Reloaded Abusing legacy
paths for stealth persistence.pdf |
2.4 MiB |
2025 Jul 11 11:18 |
|
Alejandro Vazquez Vazquez Maria San Jose - Infecting the Boot to Own the
Kernel Bootkits and Rootkits Development Presentation
BootkitSourceCode.rar |
889.5 MiB |
2025 Jul 11 14:22 |
|
Alejandro Vazquez Vazquez Maria San Jose - Infecting the Boot to Own the
Kernel Bootkits and Rootkits Development Presentation Demo1.mp4 |
2.5 MiB |
2025 Jul 30 05:12 |
|
Alejandro Vazquez Vazquez Maria San Jose - Infecting the Boot to Own the
Kernel Bootkits and Rootkits Development Presentation Demo2.mp4 |
2.9 MiB |
2025 Jul 30 05:12 |
|
Alejandro Vazquez Vazquez Maria San Jose - Infecting the Boot to Own the
Kernel Bootkits and Rootkits Development Presentation Demo3.mp4 |
6.7 MiB |
2025 Jul 30 05:12 |
|
Alejandro Vazquez Vazquez Maria San Jose - Infecting the Boot to Own the
Kernel Bootkits and Rootkits Development Presentation Demo4.mp4 |
10.3 MiB |
2025 Jul 30 05:12 |
|
Alejandro Vazquez Vazquez Maria San Jose - Infecting the Boot to Own the
Kernel Bootkits and Rootkits Development Presentation.pdf |
10.4 MiB |
2025 Jul 11 14:20 |
|
Alex Holden - Killing Killnet.pdf |
5.1 MiB |
2025 Jul 17 12:30 |
|
Alon Leviev Netanel Ben Simon - BitUnlocker Leveraging Windows Recovery
to Extract BitLocker Secrets.pdf |
3.6 MiB |
2025 Jul 22 13:41 |
|
Andrew Logan - Voice Cloning Air Traffic Control Vulnerabilities at
Runway Crossings.pdf |
7.8 MiB |
2025 Jul 15 00:52 |
|
Anna Antonenko - Remote code execution via MIDI messages 1 bad apple.mp4 |
2.0 MiB |
2025 Jul 30 05:12 |
|
Anna Antonenko - Remote code execution via MIDI messages 2 shell.mp4 |
184.8 KiB |
2025 Jul 30 05:12 |
|
Anna Antonenko - Remote code execution via MIDI messages 3 scary
toccata.mp4 |
1.7 MiB |
2025 Jul 30 05:12 |
|
Anna Antonenko - Remote code execution via MIDI messages.pdf |
2.2 MiB |
2025 Jul 15 19:24 |
|
Anthony Rose Jake Krasnov - Rebadged, Relabeled, and Rooted Pwnage via
the Solar Supply Chain.pdf |
9.6 MiB |
2025 Jul 15 04:09 |
|
Antoine Goichot - OverLAPS - Overriding LAPS Logic - Demo1
SamISetPasswordForeignUser2 get password.mp4 |
914.7 KiB |
2025 Jul 30 05:12 |
|
Antoine Goichot - OverLAPS - Overriding LAPS Logic - Demo2
CheckADPasswordUpdateFactors reset password.mp4 |
552.4 KiB |
2025 Jul 30 05:12 |
|
Antoine Goichot - OverLAPS - Overriding LAPS Logic - Demo3 Registry
Entra reset password.mp4 |
1.1 MiB |
2025 Jul 30 05:12 |
|
Antoine Goichot - OverLAPS - Overriding LAPS Logic - Demo4 Detours.mp4 |
760.1 KiB |
2025 Jul 30 05:12 |
|
Antoine Goichot - OverLAPS - Overriding LAPS Logic.pdf |
4.2 MiB |
2025 Jul 13 15:11 |
|
Archwisp - HaKCing OBD-II Emissions Testing.pdf |
102.9 MiB |
2025 Jul 11 01:44 |
|
Aviad Hahami - Not Just a Pipeline Leak Reconstructing the Real Attack
Behind tj-actions.pdf |
7.4 MiB |
2025 Jul 26 16:57 |
|
Ben Folland - Man-in-the-Malware Intercepting Adversarial
Communications.pdf |
12.8 MiB |
2025 Jul 13 19:05 |
|
Ben Gardiner - Blind Trailer Shouting-Whitepaper.pdf |
1.9 MiB |
2025 Jul 18 16:34 |
|
Ben Gardiner - Blind Trailer Shouting.pdf |
3.2 MiB |
2025 Jul 15 22:03 |
|
Ben Nassi Or Yair - Stav Cohen - Invitation Is All You Need Invoking
Gemini for Workspace Agents with a Simple Google Calendar Invite.pdf |
2.1 MiB |
2025 Jul 15 20:22 |
|
Benjamin Mixon-Baca - TSPU Russia's Firewall and Defending Against the
Future of Digital Repression demo.mp4 |
20.2 MiB |
2025 Jul 30 05:22 |
|
Benjamin Mixon-Baca - TSPU Russia's Firewall and Defending Against the
Future of Digital Repression.pdf |
15.1 MiB |
2025 Jul 16 00:45 |
|
Carl Miller Chris Monteiro - Kill List Hacking an Assassination Site on
the Dark Web.pdf |
9.5 MiB |
2025 Jul 15 13:25 |
|
Cernica Ionut Cosmin - Silent Leaks Harvesting Secrets from Shared Linux
Environments - demo1.mp4 |
1.6 MiB |
2025 Jul 30 05:12 |
|
Cernica Ionut Cosmin - Silent Leaks Harvesting Secrets from Shared Linux
Environments - demo2.mp4 |
1.4 MiB |
2025 Jul 30 05:12 |
|
Cernica Ionut Cosmin - Silent Leaks Harvesting Secrets from Shared Linux
Environments.pdf |
561.4 KiB |
2025 Jul 16 10:07 |
|
Chiao-Lin Yu - Gateways to Chaos - How We Proved Modems Are a Ticking
Time Bomb That Hackers Can Access Everywhere.pdf |
14.4 MiB |
2025 Jul 14 19:19 |
|
Christophe Tafani-Dereeper Matt Muir - Weaponizing Trust Investigating a
Threat Actor Targeting Security Researchers and Academics.pdf |
31.5 MiB |
2025 Jul 24 20:14 |
|
Christopher Domas - Ghosts in the Machine Check - Conjuring Hardware
Failures for Cross-ring Privilege Escalation.pdf |
12.1 MiB |
2025 Jul 18 14:08 |
|
Cooper Quintin -Recording PCAPs from Stingrays With a $20 Hotspot.pdf |
5.0 MiB |
2025 Jul 15 01:24 |
|
Cyrus Parzian - Loading Models, Launching Shells Abusing AI File Formats
for Code Execution Demo1 v2.mp4 |
975.9 KiB |
2025 Jul 30 05:12 |
|
Cyrus Parzian - Loading Models, Launching Shells Abusing AI File Formats
for Code Execution Demo2 v2.mp4 |
1.1 MiB |
2025 Jul 30 05:12 |
|
Cyrus Parzian - Loading Models, Launching Shells Abusing AI File Formats
for Code Execution Demo3 v2.mp4 |
2.6 MiB |
2025 Jul 30 05:12 |
|
Cyrus Parzian - Loading Models, Launching Shells Abusing AI File Formats
for Code Execution Demo4 v2.mp4 |
846.0 KiB |
2025 Jul 30 05:12 |
|
Cyrus Parzian - Loading Models, Launching Shells Abusing AI File Formats
for Code Execution.pdf |
2.9 MiB |
2025 Jul 28 06:22 |
|
David Cash Rich Warren - Zero Trust, Total Bust - Breaking into
thousands of cloud-based VPNs with one bug.pdf |
8.2 MiB |
2025 Jul 15 18:48 |
|
Dirk-jan Mollema - Advanced Active Directory to Entra ID lateral
movement techniques-demo graph.mp4 |
888.4 KiB |
2025 Jul 30 05:13 |
|
Dirk-jan Mollema - Advanced Active Directory to Entra ID lateral
movement techniques-demo sharepoint actor.mp4 |
717.1 KiB |
2025 Jul 30 05:13 |
|
Dirk-jan Mollema - Advanced Active Directory to Entra ID lateral
movement techniques.pdf |
4.5 MiB |
2025 Jul 22 22:20 |
|
Dr. Bramwell Brizendine - Can't Stop the ROP Automating Universal ASLR
Bypasses for Windows.pdf |
17.0 MiB |
2025 Jul 16 05:31 |
|
Eaton Zveare Roshan Piyush - Unexpected Connections How a vulnerability
in obscure dealer software could have unlocked your car from
anywhere.pdf |
4.7 MiB |
2025 Jul 15 01:22 |
|
Edward Warren - Hacking Hotspots Pre-Auth Remote Code Execution,
Arbitrary SMS & Adjacent Attacks on 5G and 4GLTE Routers - DEMO 1.mp4 |
379.9 KiB |
2025 Jul 30 05:13 |
|
Edward Warren - Hacking Hotspots Pre-Auth Remote Code Execution,
Arbitrary SMS & Adjacent Attacks on 5G and 4GLTE Routers - DEMO 2.mp4 |
2.5 MiB |
2025 Jul 30 05:13 |
|
Edward Warren - Hacking Hotspots Pre-Auth Remote Code Execution,
Arbitrary SMS & Adjacent Attacks on 5G and 4GLTE Routers - DEMO 3.mp4 |
607.6 KiB |
2025 Jul 30 05:13 |
|
Edward Warren - Hacking Hotspots Pre-Auth Remote Code Execution,
Arbitrary SMS & Adjacent Attacks on 5G and 4GLTE Routers - DEMO 4.mp4 |
1.7 MiB |
2025 Jul 30 05:13 |
|
Edward Warren - Hacking Hotspots Pre-Auth Remote Code Execution,
Arbitrary SMS & Adjacent Attacks on 5G and 4GLTE Routers - DEMO 5.mp4 |
604.6 KiB |
2025 Jul 30 05:13 |
|
Edward Warren - Hacking Hotspots Pre-Auth Remote Code Execution,
Arbitrary SMS & Adjacent Attacks on 5G and 4GLTE Routers - DEMO 6.mp4 |
521.3 KiB |
2025 Jul 30 05:13 |
|
Edward Warren - Hacking Hotspots Pre-Auth Remote Code Execution,
Arbitrary SMS & Adjacent Attacks on 5G and 4GLTE Routers - DEMO 7.mp4 |
701.5 KiB |
2025 Jul 30 05:13 |
|
Edward Warren - Hacking Hotspots Pre-Auth Remote Code Execution,
Arbitrary SMS & Adjacent Attacks on 5G and 4GLTE Routers - DEMO 8.mp4 |
373.9 KiB |
2025 Jul 30 05:13 |
|
Edward Warren - Hacking Hotspots Pre-Auth Remote Code Execution,
Arbitrary SMS & Adjacent Attacks on 5G and 4GLTE Routers.pdf |
3.6 MiB |
2025 Jul 15 02:39 |
|
Enzo Damato - Journey to the center of the PSTN How I became a phone
company, and why you should too..pdf |
3.6 MiB |
2025 Jul 14 00:30 |
|
Erwin Karincic Dale Wooden - One Key, Two Key, I Just Stole Your goTenna
Key.pdf |
6.0 MiB |
2025 Jul 16 01:27 |
|
Eugene Lim - Escaping the Privacy Sandbox with Client-Side
Deanonymization Attacks.pdf |
8.4 MiB |
2025 Jul 14 10:09 |
|
Farzan Karimi - Paywall Optional Stream for Free with a New Technique,
Recursive Request Exploits (RRE) Demo-1 Slide-04-Nun-HTML-Bypass.mp4 |
2.3 MiB |
2025 Jul 30 05:13 |
|
Farzan Karimi - Paywall Optional Stream for Free with a New Technique,
Recursive Request Exploits (RRE) Demo-2 Slide-05-Nun-SEO-Bypass.mp4 |
2.0 MiB |
2025 Jul 30 05:13 |
|
Farzan Karimi - Paywall Optional Stream for Free with a New Technique,
Recursive Request Exploits (RRE) Demo-3
Slide-06-Yoga-Referer-Spoofing.mp4 |
1.2 MiB |
2025 Jul 30 05:13 |
|
Farzan Karimi - Paywall Optional Stream for Free with a New Technique,
Recursive Request Exploits (RRE) Demo-4 Slide-18-RRE-Manual.mp4 |
6.7 MiB |
2025 Jul 30 05:13 |
|
Farzan Karimi - Paywall Optional Stream for Free with a New Technique,
Recursive Request Exploits (RRE) Demo-5 Slide-24-RRE-Walkback.mp4 |
6.7 MiB |
2025 Jul 30 05:13 |
|
Farzan Karimi - Paywall Optional Stream for Free with a New Technique,
Recursive Request Exploits (RRE) Demo-6 Slide-25-RRE-Recursive.mp4 |
1.1 MiB |
2025 Jul 30 05:13 |
|
Farzan Karimi - Paywall Optional Stream for Free with a New Technique,
Recursive Request Exploits (RRE) Demo-7 Slide-26-RRE-Streamageddon.mp4 |
9.0 MiB |
2025 Jul 30 05:13 |
|
Farzan Karimi - Paywall Optional Stream for Free with a New Technique,
Recursive Request Exploits (RRE).pdf |
3.2 MiB |
2025 Jul 21 09:41 |
|
Gabriel Gegenhuber Maximilian Günther - Silent Signals Exploiting
Security and Privacy Side-Channels in End-to-End Encrypted
Messengers.pdf |
4.4 MiB |
2025 Jul 17 16:52 |
|
George Chatzisofroniou - Breaking Wi-Fi Easy Connect A Security Analysis
of DPP.pdf |
627.8 KiB |
2025 Jul 25 23:32 |
|
George Hughey Rohit Mothe - What is Dead May Never Die The Ghost of
Internet Explorer in Windows MapUrlToZone.pdf |
2.4 MiB |
2025 Jul 25 21:55 |
|
Godman666 - Carding, Sabotage & Survival A Darknet Market Veteran’s
Story.pdf |
13.5 MiB |
2025 Jul 17 05:19 |
|
Harrison Sand Erlend Leiknes - So Long, and Thanks for All the Phish.pdf |
12.1 MiB |
2025 Jul 15 15:26 |
|
HD Moore - Shaking Out Shells with SSHamble.pdf |
4.1 MiB |
2025 Jul 16 05:32 |
|
Ji'an Zhou Lishuo Song - Safe Harbor or Hostile Waters Unveiling the
Hidden Perils of the TorchScript Engine in PyTorch.pdf |
19.5 MiB |
2025 Jul 26 01:24 |
|
Jian Zhou ZiYang Li - Client or Server The Hidden Sword of Damocles in
Kafka.pdf |
23.7 MiB |
2025 Jul 14 07:45 |
|
Joe FitzPatrick - Direct Memory Access Everywhere.pdf |
66.5 MiB |
2025 Jul 28 06:21 |
|
Jon DiMaggio John Fokker - Ghosts of REvil An Inside Look with the
Hacker Behind the Kaseya Ransomware Attack.pdf |
6.5 MiB |
2025 Jul 16 00:00 |
|
Joseph Gabay - The One Bitcoin Heist Making a custom Hashcat module to
solve a decade-old puzzle challenge.pdf |
5.7 MiB |
2025 Jul 16 04:18 |
|
Keane Lucas - Claude - Climbing a CTF Scoreboard Near You.pdf |
9.6 MiB |
2025 Jul 23 03:16 |
|
Keanu Nys - Turning Microsoft's Login Page into our Phishing
Infrastructure.pdf |
8.1 MiB |
2025 Jul 21 09:06 |
|
Kenneth Miltenberger Nicholas Fredericksen - From Shanghai to the Shore
The Silent Threat in Global Shipping.pdf |
5.1 MiB |
2025 Jul 14 16:54 |
|
Leon Jacobs - 7 Vulns in 7 Days Breaking Bloatware Faster Than It’s
Built.pdf |
11.2 MiB |
2025 Jul 14 22:22 |
|
Maksim Shudrak - Edge of Tomorrow Foiling Large Supply Chain Attacks By
Taking 5k Abandoned S3 Buckets from Malware and Benign Software cut.mp4 |
3.6 MiB |
2025 Jul 30 05:13 |
|
Maksim Shudrak - Edge of Tomorrow Foiling Large Supply Chain Attacks By
Taking 5k Abandoned S3 Buckets from Malware and Benign Software demo1
cut.mp4 |
6.6 MiB |
2025 Jul 30 05:13 |
|
Maksim Shudrak - Edge of Tomorrow Foiling Large Supply Chain Attacks By
Taking 5k Abandoned S3 Buckets from Malware and Benign Software demo3
cut.mp4 |
2.6 MiB |
2025 Jul 30 05:13 |
|
Maksim Shudrak - Edge of Tomorrow Foiling Large Supply Chain Attacks By
Taking 5k Abandoned S3 Buckets from Malware and Benign Software demo4
cut.mp4 |
3.3 MiB |
2025 Jul 30 05:13 |
|
Maksim Shudrak - Edge of Tomorrow Foiling Large Supply Chain Attacks By
Taking 5k Abandoned S3 Buckets from Malware and Benign Software.pdf |
8.0 MiB |
2025 Jul 19 03:47 |
|
Marcell Szakály Jan Berens - One Modem to Brick Them All Exploiting
Vulnerabilities in the EV Charging Communication.pdf |
2.7 MiB |
2025 Jul 15 00:08 |
|
Marco Casagrande Daniele Antonioli - CTRAPS CTAP Impersonation and API
Confusion Attacks on FIDO2.pdf |
1.6 MiB |
2025 Jul 16 03:18 |
|
Marek Tóth -Browser Extension Clickjacking One Click and Your Credit
Card Is Stolen DEMO1.mp4 |
1.0 MiB |
2025 Jul 30 05:13 |
|
Marek Tóth -Browser Extension Clickjacking One Click and Your Credit
Card Is Stolen DEMO2.mp4 |
981.5 KiB |
2025 Jul 30 05:13 |
|
Marek Tóth -Browser Extension Clickjacking One Click and Your Credit
Card Is Stolen DEMO3.mp4 |
450.7 KiB |
2025 Jul 30 05:13 |
|
Marek Tóth -Browser Extension Clickjacking One Click and Your Credit
Card Is Stolen DEMO4.mp4 |
387.9 KiB |
2025 Jul 30 05:13 |
|
Marek Tóth -Browser Extension Clickjacking One Click and Your Credit
Card Is Stolen DEMO6.mp4 |
7.4 MiB |
2025 Jul 30 05:13 |
|
Marek Tóth -Browser Extension Clickjacking One Click and Your Credit
Card Is Stolen.pdf |
2.9 MiB |
2025 Jul 16 07:58 |
|
Mark Omo James Rowlery - Cash, Drugs, and Guns Why Your Safes Aren't
Safe.pdf |
8.3 MiB |
2025 Jul 18 03:16 |
|
Max Bazalii Marius Fleische - Orion - fuzzing workflow automation demo
v1.mp4 |
6.2 MiB |
2025 Jul 30 05:13 |
|
Max Bazalii Marius Fleische - Orion - fuzzing workflow automation.pdf |
3.1 MiB |
2025 Jul 27 16:03 |
|
Mehdi Elyassa - SCCM The tree that always bears bad fruits.pdf |
2.6 MiB |
2025 Jul 14 20:15 |
|
Micah Lee - We are currently clean on OPSEC The Signalgate Saga.pdf |
19.3 MiB |
2025 Jul 27 23:31 |
|
Michael Torres - Inside Look at Chinese Operational Relay Network -
Demo.mp4 |
1013.5 KiB |
2025 Jul 30 05:13 |
|
Michael Torres - Inside Look at Chinese Operational Relay Network.pdf |
1.5 MiB |
2025 Jul 15 00:05 |
|
Michael Weber - ChromeAlone - Transforming a Browser into a C2 Slides -
Demo.mp4 |
4.9 MiB |
2025 Jul 30 05:13 |
|
Michael Weber - ChromeAlone - Transforming a Browser into a C2
Slides.pdf |
5.9 MiB |
2025 Jul 15 05:06 |
|
Mickey Shkatov Jesse Michael - Help Linux in my Webcam.pdf |
825.8 KiB |
2025 Jul 22 21:57 |
|
Mikko Hypponen - Building a Malware Museum.pdf |
9.6 MiB |
2025 Jul 15 11:09 |
|
Noam Moshe - Turning Camera Surveillance on its Axis.pdf |
4.6 MiB |
2025 Jul 22 17:36 |
|
Olivier Bilodeau Estelle Ruellan - Hackers Dropping Mid-Heist Selfies
LLM Identifies Information Stealer Infection Vector and Extracts IoCs -
Demo.mp4 |
4.1 MiB |
2025 Jul 30 05:13 |
|
Olivier Bilodeau Estelle Ruellan - Hackers Dropping Mid-Heist Selfies
LLM Identifies Information Stealer Infection Vector and Extracts
IoCs.pdf |
13.3 MiB |
2025 Jul 09 09:12 |
|
Ori David - Virtualization Based (In)Security - video 1 mirage.mp4 |
1.6 MiB |
2025 Jul 30 05:13 |
|
Ori David - Virtualization Based (In)Security - video 2 seal data.mp4 |
1022.0 KiB |
2025 Jul 30 05:13 |
|
Ori David - Virtualization Based (In)Security - video 3 monitor data.mp4 |
788.2 KiB |
2025 Jul 30 05:13 |
|
Ori David - Virtualization Based (In)Security - video 4 code exec.mp4 |
901.4 KiB |
2025 Jul 30 05:13 |
|
Ori David - Virtualization Based (In)Security - video 5 anti debug.mp4 |
1.2 MiB |
2025 Jul 30 05:13 |
|
Ori David - Virtualization Based (In)Security.pdf |
2.3 MiB |
2025 Jul 15 09:22 |
|
Patrick Wardle - Mastering Apple's Endpoint Security for Advanced macOS
Malware Detection.pdf |
18.8 MiB |
2025 Jul 21 14:14 |
|
Patrick Wardle -Binary Facades Reversing approaches to extract embedded
scripts in compiled macOS malware.pdf |
14.8 MiB |
2025 Jul 21 14:16 |
|
Philip Young - SSH-nanigans Busting Open the Mainframes Iron Fortress
through Unix.pdf |
9.1 MiB |
2025 Jul 16 06:03 |
|
Qidan He - Dead Made Alive Again Bypassing Intent Destination Checks and
Reintroducing LaunchAnyWhere Privilege Escalation.pdf |
1.9 MiB |
2025 Jul 24 10:27 |
|
Quentin Roland Wilfried Bécard - Turning your Active Directory into the
attacker’s C2 modern Group Policy Objects enumeration and exploitation
demo1.mp4 |
1.0 MiB |
2025 Jul 30 05:13 |
|
Quentin Roland Wilfried Bécard - Turning your Active Directory into the
attacker’s C2 modern Group Policy Objects enumeration and exploitation
demo2.mp4 |
1.1 MiB |
2025 Jul 30 05:13 |
|
Quentin Roland Wilfried Bécard - Turning your Active Directory into the
attacker’s C2 modern Group Policy Objects enumeration and exploitation
demo3.mp4 |
10.8 MiB |
2025 Jul 30 05:13 |
|
Quentin Roland Wilfried Bécard - Turning your Active Directory into the
attacker’s C2 modern Group Policy Objects enumeration and exploitation
demo4.mp4 |
2.3 MiB |
2025 Jul 30 05:13 |
|
Quentin Roland Wilfried Bécard - Turning your Active Directory into the
attacker’s C2 modern Group Policy Objects enumeration and exploitation
demo5.mp4 |
4.5 MiB |
2025 Jul 30 05:13 |
|
Quentin Roland Wilfried Bécard - Turning your Active Directory into the
attacker’s C2 modern Group Policy Objects enumeration and
exploitation.pdf |
2.5 MiB |
2025 Jul 14 10:41 |
|
Rear Admiral John Mauger, USCG (Ret.) - The Ultimate Hack Applying
Lessons Learned from the loss of TITAN to Maritime Cybersecurity
Demo1.mp4 |
1.0 MiB |
2025 Jul 30 05:13 |
|
Rear Admiral John Mauger, USCG (Ret.) - The Ultimate Hack Applying
Lessons Learned from the loss of TITAN to Maritime Cybersecurity.pdf |
2.0 MiB |
2025 Jul 18 20:33 |
|
Ron Ben Yizhak - You snooze you lose RPC-Racer winning RPC endpoints
against services.pdf |
2.6 MiB |
2025 Jul 15 08:15 |
|
Russell Phillips - How to Fake a Badge like a Pro 11 Tips to
Counterfeiting Event Credentials-demo1-ww2-navy-idv1.mp4 |
1.8 MiB |
2025 Jul 30 05:13 |
|
Russell Phillips - How to Fake a Badge like a Pro 11 Tips to
Counterfeiting Event Credentials-demo2-1966-nato-passv1.mp4 |
1.7 MiB |
2025 Jul 30 05:13 |
|
Russell Phillips - How to Fake a Badge like a Pro 11 Tips to
Counterfeiting Event Credentials-demo3-nasa-vab-passv1.mp4 |
1.9 MiB |
2025 Jul 30 05:13 |
|
Russell Phillips - How to Fake a Badge like a Pro 11 Tips to
Counterfeiting Event Credentials-demo4-2012-nfl-ticketv1.mp4 |
4.1 MiB |
2025 Jul 30 05:13 |
|
Russell Phillips - How to Fake a Badge like a Pro 11 Tips to
Counterfeiting Event Credentials-demo5-2023-spring-festival-ticketv1.mp4 |
4.9 MiB |
2025 Jul 30 05:13 |
|
Russell Phillips - How to Fake a Badge like a Pro 11 Tips to
Counterfeiting Event Credentials.pdf |
31.1 MiB |
2025 Jul 15 22:48 |
|
Ryan Emmons - DisguiseDelimit Exploiting Synology NAS with Delimiters
and Novel Tricks exploit demo v1.0.mp4 |
843.0 KiB |
2025 Jul 30 05:13 |
|
Ryan Emmons - DisguiseDelimit Exploiting Synology NAS with Delimiters
and Novel Tricks-cve-2024-10441 poc v1.3.py |
6.9 KiB |
2025 Jul 22 04:18 |
|
Ryan Emmons - DisguiseDelimit Exploiting Synology NAS with Delimiters
and Novel Tricks-enum linux envvar write techniques v1.0.sh |
2.1 KiB |
2025 Jul 22 03:26 |
|
Ryan Emmons - DisguiseDelimit Exploiting Synology NAS with Delimiters
and Novel Tricks.pdf |
263.9 MiB |
2025 Jul 22 03:49 |
|
Sam Collins Marius Muench - Playing Dirty Without Cheating - Getting
Banned for Fun and No Profit.pdf |
4.8 MiB |
2025 Jul 23 00:00 |
|
Sarah Powazek Jake Braun Adrien Ogee - Cyber Volunteering and Community
Defense - DEF CON Franklin and the Cyber Resilience Corps 1 Year In.pdf |
4.6 MiB |
2025 Jul 30 00:39 |
|
Scott Taylor - Planting C4 Cross-Compatible External C2 for All Your
Implants.pdf |
2.1 MiB |
2025 Jul 29 23:45 |
|
Shang-De Jiang Dong-Yi Ye Tung-Lin Lee - Original Sin of SSO macOS PRT
Cookie Theft & Entra ID Persistence via Device Forgery.pdf |
15.3 MiB |
2025 Jul 28 09:52 |
|
Shourya Pratap Singh Jonny Lin Daniel Seetoh - Passkeys Pwned Turning
WebAuthn Against Itself.pdf |
4.5 MiB |
2025 Jul 22 09:00 |
|
Shu-Hao Tung - From Spoofing to Tunneling New Red Team's Networking
Techniques for Initial Access and Evasion.pdf |
5.3 MiB |
2025 Jul 22 13:56 |
|
Sigusr Polke - Emulating Embedded Linux Devices at Scale with
Light-Touch Firmware Rehosting.pdf |
3.7 MiB |
2025 Jul 22 18:43 |
|
Tal Peleg Coby Abrams - Rusty pearls Postgres RCE on cloud databases -
Demo1.mp4 |
889.6 KiB |
2025 Jul 30 05:13 |
|
Tal Peleg Coby Abrams - Rusty pearls Postgres RCE on cloud databases.pdf |
4.7 MiB |
2025 Jul 28 07:26 |
|
Tal Skverer - Breakin 'Em All - Overcoming Pokemon Go's Anti-Cheat
Mechanism.pdf |
7.9 MiB |
2025 Jul 27 22:16 |
|
Thomas Roccia - Where’s My Crypto, Dude The Ultimate Guide to Crypto
Money Laundering (and How to Track It).pdf |
56.2 MiB |
2025 Jul 25 12:13 |
|
Tobias Diehl - Mind the Data Voids Hijacking Copilot Trust to Deliver C2
Instructions with Microsoft Authority demo1.mp4 |
441.0 KiB |
2025 Jul 30 05:13 |
|
Tobias Diehl - Mind the Data Voids Hijacking Copilot Trust to Deliver C2
Instructions with Microsoft Authority demo2.mp4 |
683.1 KiB |
2025 Jul 30 05:13 |
|
Tobias Diehl - Mind the Data Voids Hijacking Copilot Trust to Deliver C2
Instructions with Microsoft Authority.pdf |
3.2 MiB |
2025 Jul 14 04:37 |
|
Tom Tervoort - No VPN Needed Cryptographic Attacks Against the OPC UA
Protocol - Whitepaper.pdf |
710.1 KiB |
2025 Jul 10 10:44 |
|
Tom Tervoort - No VPN Needed Cryptographic Attacks Against the OPC UA
Protocol.pdf |
4.1 MiB |
2025 Jul 10 10:40 |
|
Valerio Alessandroni - RATs & Socks abusing Google Services.pdf |
1.1 MiB |
2025 Jul 16 02:13 |
|
Wesley McGrew - Amber64 Mining Hacker History from Over Half a Million
Commodore 64 Disks.pdf |
3.3 MiB |
2025 Jul 05 18:30 |
|
Yoav Magid - AppleStorm - Unmasking the Privacy Risks of Apple
Intelligence.pdf |
2.9 MiB |
2025 Jul 23 05:46 |
|
Yuval Gordon - The (Un)Rightful Heir My dMSA Is Your New Domain
Admin.pdf |
1.7 MiB |
2025 Jul 15 10:45 |
|
Zhengyu Liu Jianjia Yu - The DOMino Effect Automated Detection and
Exploitation of DOM Clobbering Vulnerability at Scale.pdf |
9.6 MiB |
2025 Jul 23 14:17 |