hitbsecconf2023hkt
D1 COMMSEC - ALPChecker – Detecting Spoofing and Blinding Attacks - Anastasiia Kropova & Igor Korkin.pdf
2023-08-25 01:06
2.1M
D1 COMMSEC - Bugs In Blocks - Karsten Nohl.pdf
2023-08-25 00:59
3.3M
D1 COMMSEC - Building a Full-Speed Anti-Censorship Router - Kaijern Lau.pdf
2023-08-31 02:24
3.9M
D1 COMMSEC - Shining a Light On Solar System Cyber Security - Sick Codes.pdf
2023-08-25 00:59
18M
D1 COMMSEC Big Match - How I Learned to Stop Reversing and Love the Strings - Paolo Montesel.pdf
2023-08-25 01:23
3.3M
D1 LAB - Bring Your Own SOAR Automated Incident Response - Valentine Mairet & Harjeet Sharma.pdf
2023-08-25 01:23
3.4M
D1T1 - An Ode to Rabbit Holes - Writing a New Decompiler Just for a Security Audit - Dominic Couture.pdf
2023-08-25 01:23
3.5M
D1T1 - Cracking the Shield - Analyzing and Reverse Engineering Antivirus Signatures - Dobin Rutishauser.pdf
2023-08-28 04:40
3.9M
D1T1 - Exploiting the Lexmark PostScript Stack - Aaron Adams.pdf
2023-08-25 00:59
20M
D1T1 - FrankeNAND – Extracting Info From Automotive Internet Units - Alexey Kondikov.pdf
2023-08-25 00:59
11M
D1T1 - Hakuin - Injecting Brains Into Blind SQL Injection - Jakub Pruzinec & Quynh Anh Nguyen.pdf
2023-08-28 04:29
1.0M
D1T1 - How NTLM Relay Ruins Your Exchange Servers - Tianze Ding - pdf.pdf
2023-08-25 00:59
8.2M
D1T1 - It Was Harder to Sniff Bluetooth Through My Mask During The Pandemic - Xeno Kovah.pdf
2023-08-28 04:34
96M
D1T2 - How to Design Your Own Electronic Attack Device - Shupeng Gao.pdf
2023-08-25 00:59
19M
D1T2 - Lazarus Groups Undercover Operations - Large-Scale Infection Campaigns 2022 – 2023 - Lee Taewoo, Seulgi Lee, Dongwook Kim.pdf
2023-08-25 00:59
7.5M
D1T2 - Rogue CDB Escaping from VMware Workstation Through the Disk Controller - Wenxu Yin.pdf
2023-08-25 01:23
3.7M
D1T2 - Timekiller - Leveraging Asynchronous Clock to Escape from QEMU KVM - Jia, Lei, Tao & Pan.pdf
2023-08-25 01:23
3.4M
D1T2 - gVisor - Modern Linux Sandboxing Technology - Li Qiang.pdf
2023-08-25 01:23
1.2M
D2 COMMSEC - A Practical Method of Finding Vulnerabilities in Internet of Things - IeckChae Euom.pdf
2023-08-28 04:34
4.4M
D2 COMMSEC - B(l)utter – Reversing Flutter Applications by using Dart Runtime - Worawit Wangwarunyoo.pdf
2023-08-28 04:34
1.5M
D2 COMMSEC - The Future of Hacking - Unleashing the Power of OpenAIs GPT-4 Code Interpreter - Dexter Ng.pdf
2023-08-31 00:19
11M
D2 COMMSEC - The Tragedy of Bluetooth Low Energy - Linfeng Xiao & Dalin Yang.pdf
2023-08-28 04:34
11M
D2 COMMSEC - Unveiling the Covert Trails of Infostealer Malware Ecosystems - Pavvan Karthick.pdf
2023-08-31 00:20
2.7M
D2T1 - Hacking into iOS VOLTE implementation - Hardik Mehta & Rajanish Pathak.pdf
2023-08-29 01:37
6.4M
D2T1 - Hunting for Amazon Cognito Security Misconfigurations - Yassine Aboukir.pdf
2023-08-28 04:40
4.5M
D2T1 - KeyBleed - Attacking the OneKey Mini - Eric Michaud.pdf
2023-09-08 01:15
24M
D2T1 - Locate Vulnerabilities of Ethereum Smart Contracts with Semi-Automated Analysis - Boik Su.pdf
2023-08-28 04:34
6.0M
D2T1 - Scarlet OT – OT Adversary Emulation for Fun and Profit- Vic Huang & Sol Yang.pdf
2023-08-28 04:34
2.4M
D2T1 - Windows Kernel Security - A Deep Dive into Two Exploits Demonstrated at Pwn2Own - Thomas Imbert.pdf
2023-08-28 04:34
1.6M
D2T2 - Breaking ML Services - Finding 0-days in Azure Machine Learning - NItesh Surana.pdf
2023-08-28 04:34
7.1M
D2T2 - From Unknown Parameter to Root - A Story of Unexpected Intrusion Testing Results - Yvan Genuer.pdf
2023-08-28 09:21
6.2M
D2T2 - GPTHound – Your Active Directory Security Assistant - John Jiang.pdf
2023-08-28 04:34
4.6M
D2T2 - NVMe - New Vulnerabilities Made Easy - Tal Lossos.pdf
2023-08-28 04:58
6.9M
D2T2 - TSSHOCK – Breaking MPC Wallets and Digital Custodians - Huu Giap Nguyen & Anh Khoa Nguyen.pdf
2023-08-28 04:34
386K
D2T2 - Take a Picture of Your App Code – Android MRI Interpreter - Sunghyoun Song.pdf
2023-08-28 04:34
5.5M