hitbsecconf2023hkt

[   ]D1 COMMSEC - ALPChecker – Detecting Spoofing and Blinding Attacks - Anastasiia Kropova & Igor Korkin.pdf2023-08-25 01:062.1M 
[   ]D1 COMMSEC - Bugs In Blocks - Karsten Nohl.pdf2023-08-25 00:593.3M 
[   ]D1 COMMSEC - Building a Full-Speed Anti-Censorship Router - Kaijern Lau.pdf2023-08-31 02:243.9M 
[   ]D1 COMMSEC - Shining a Light On Solar System Cyber Security - Sick Codes.pdf2023-08-25 00:5918M 
[   ]D1 COMMSEC Big Match - How I Learned to Stop Reversing and Love the Strings - Paolo Montesel.pdf2023-08-25 01:233.3M 
[   ]D1 LAB - Bring Your Own SOAR Automated Incident Response - Valentine Mairet & Harjeet Sharma.pdf2023-08-25 01:233.4M 
[   ]D1T1 - An Ode to Rabbit Holes - Writing a New Decompiler Just for a Security Audit - Dominic Couture.pdf2023-08-25 01:233.5M 
[   ]D1T1 - Cracking the Shield - Analyzing and Reverse Engineering Antivirus Signatures - Dobin Rutishauser.pdf2023-08-28 04:403.9M 
[   ]D1T1 - Exploiting the Lexmark PostScript Stack - Aaron Adams.pdf2023-08-25 00:5920M 
[   ]D1T1 - FrankeNAND – Extracting Info From Automotive Internet Units - Alexey Kondikov.pdf2023-08-25 00:5911M 
[   ]D1T1 - Hakuin - Injecting Brains Into Blind SQL Injection - Jakub Pruzinec & Quynh Anh Nguyen.pdf2023-08-28 04:291.0M 
[   ]D1T1 - How NTLM Relay Ruins Your Exchange Servers - Tianze Ding - pdf.pdf2023-08-25 00:598.2M 
[   ]D1T1 - It Was Harder to Sniff Bluetooth Through My Mask During The Pandemic - Xeno Kovah.pdf2023-08-28 04:3496M 
[   ]D1T2 - How to Design Your Own Electronic Attack Device - Shupeng Gao.pdf2023-08-25 00:5919M 
[   ]D1T2 - Lazarus Groups Undercover Operations - Large-Scale Infection Campaigns 2022 – 2023 - Lee Taewoo, Seulgi Lee, Dongwook Kim.pdf2023-08-25 00:597.5M 
[   ]D1T2 - Rogue CDB Escaping from VMware Workstation Through the Disk Controller - Wenxu Yin.pdf2023-08-25 01:233.7M 
[   ]D1T2 - Timekiller - Leveraging Asynchronous Clock to Escape from QEMU KVM - Jia, Lei, Tao & Pan.pdf2023-08-25 01:233.4M 
[   ]D1T2 - gVisor - Modern Linux Sandboxing Technology - Li Qiang.pdf2023-08-25 01:231.2M 
[   ]D2 COMMSEC - A Practical Method of Finding Vulnerabilities in Internet of Things - IeckChae Euom.pdf2023-08-28 04:344.4M 
[   ]D2 COMMSEC - B(l)utter – Reversing Flutter Applications by using Dart Runtime - Worawit Wangwarunyoo.pdf2023-08-28 04:341.5M 
[   ]D2 COMMSEC - The Future of Hacking - Unleashing the Power of OpenAIs GPT-4 Code Interpreter - Dexter Ng.pdf2023-08-31 00:1911M 
[   ]D2 COMMSEC - The Tragedy of Bluetooth Low Energy - Linfeng Xiao & Dalin Yang.pdf2023-08-28 04:3411M 
[   ]D2 COMMSEC - Unveiling the Covert Trails of Infostealer Malware Ecosystems - Pavvan Karthick.pdf2023-08-31 00:202.7M 
[   ]D2T1 - Hacking into iOS VOLTE implementation - Hardik Mehta & Rajanish Pathak.pdf2023-08-29 01:376.4M 
[   ]D2T1 - Hunting for Amazon Cognito Security Misconfigurations - Yassine Aboukir.pdf2023-08-28 04:404.5M 
[   ]D2T1 - KeyBleed - Attacking the OneKey Mini - Eric Michaud.pdf2023-09-08 01:1524M 
[   ]D2T1 - Locate Vulnerabilities of Ethereum Smart Contracts with Semi-Automated Analysis - Boik Su.pdf2023-08-28 04:346.0M 
[   ]D2T1 - Scarlet OT – OT Adversary Emulation for Fun and Profit- Vic Huang & Sol Yang.pdf2023-08-28 04:342.4M 
[   ]D2T1 - Windows Kernel Security - A Deep Dive into Two Exploits Demonstrated at Pwn2Own - Thomas Imbert.pdf2023-08-28 04:341.6M 
[   ]D2T2 - Breaking ML Services - Finding 0-days in Azure Machine Learning - NItesh Surana.pdf2023-08-28 04:347.1M 
[   ]D2T2 - From Unknown Parameter to Root - A Story of Unexpected Intrusion Testing Results - Yvan Genuer.pdf2023-08-28 09:216.2M 
[   ]D2T2 - GPTHound – Your Active Directory Security Assistant - John Jiang.pdf2023-08-28 04:344.6M 
[   ]D2T2 - NVMe - New Vulnerabilities Made Easy - Tal Lossos.pdf2023-08-28 04:586.9M 
[   ]D2T2 - TSSHOCK – Breaking MPC Wallets and Digital Custodians - Huu Giap Nguyen & Anh Khoa Nguyen.pdf2023-08-28 04:34386K 
[   ]D2T2 - Take a Picture of Your App Code – Android MRI Interpreter - Sunghyoun Song.pdf2023-08-28 04:345.5M