Parent directory/ | - | - |
HACKER JEOPARDY.mp4 | 131.0 MiB | 2021 Jul 04 03:21 |
IronPython... OMFG - M. Salvati.mp4 | 63.5 MiB | 2021 Jul 04 03:21 |
Using Machines to exploit Machines - G. Barnhart Magen, E. Caltum.mp4 | 62.9 MiB | 2021 Jul 04 03:21 |
Sneaking Past Device Guard - P. Tsukerman.mp4 | 57.8 MiB | 2021 Jul 04 03:21 |
Introduction to IoT Reverse Engineering - V. Di Giampietro.mp4 | 56.4 MiB | 2021 Jul 04 03:21 |
whoami priv - show me your privileges and I will lead you to SYSTEM - A. Pierini.mp4 | 55.8 MiB | 2021 Jul 04 03:21 |
You try to detect mimikatz - V. Le Toux.mp4 | 53.8 MiB | 2021 Jul 04 03:21 |
Who watches the watchmen - M. Bergman, M. Smeets.mp4 | 50.5 MiB | 2021 Jul 04 03:21 |
In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll.mp4 | 49.4 MiB | 2021 Jul 04 03:21 |
Social Forensication A Multidisciplinary Approach to Successful Social Engineering - J.Gray.mp4 | 49.4 MiB | 2021 Jul 04 03:21 |
DPAPI and DPAPI-NG Decrypting All Users' Secrets and PFX Passwords - P. Januskiewicz.mp4 | 47.5 MiB | 2021 Jul 04 03:21 |
Exploits in Wetware - R. Sell.mp4 | 47.3 MiB | 2021 Jul 04 03:21 |
RHme3 Hacking through failure - B. Gardiner, J. Beverley, C. Dewinter.mp4 | 47.1 MiB | 2021 Jul 04 03:21 |
All your GPS Trackers belong to US - C. Kasmi, P. Barre.mp4 | 46.0 MiB | 2021 Jul 04 03:21 |
Cracking the Perimeter with SharpShooter - D. Chell.mp4 | 43.2 MiB | 2021 Jul 04 03:21 |
Abusing Google Play Billing for fun and unlimited credits - G. Lopes.mp4 | 40.6 MiB | 2021 Jul 04 03:21 |
BMS is destroyed by - smart button - E. Litvinov.mp4 | 35.9 MiB | 2021 Jul 04 03:21 |
DPAPI and DPAPI-NG Decrypting All Users' Secrets and PFX Passwords - P. Januskiewicz.eng.srt | 92.8 KiB | 2019 Dec 17 00:52 |
HACKER JEOPARDY.eng.srt | 90.0 KiB | 2019 Dec 16 22:14 |
IronPython... OMFG - M. Salvati.eng.srt | 85.6 KiB | 2019 Dec 16 22:17 |
Using Machines to exploit Machines - G. Barnhart Magen, E. Caltum.eng.srt | 79.1 KiB | 2019 Dec 16 22:52 |
Exploits in Wetware - R. Sell.eng.srt | 74.8 KiB | 2019 Dec 16 17:39 |
RHme3 Hacking through failure - B. Gardiner, J. Beverley, C. Dewinter.eng.srt | 74.0 KiB | 2019 Dec 16 22:53 |
Social Forensication A Multidisciplinary Approach to Successful Social Engineering - J.Gray.eng.srt | 72.3 KiB | 2019 Dec 16 09:10 |
In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll.eng.srt | 71.0 KiB | 2019 Dec 16 17:39 |
Cracking the Perimeter with SharpShooter - D. Chell.eng.srt | 70.1 KiB | 2019 Dec 16 17:38 |
Sneaking Past Device Guard - P. Tsukerman.eng.srt | 66.5 KiB | 2019 Dec 16 22:20 |
Introduction to IoT Reverse Engineering - V. Di Giampietro.eng.srt | 64.9 KiB | 2019 Dec 16 17:38 |
whoami priv - show me your privileges and I will lead you to SYSTEM - A. Pierini.eng.srt | 61.1 KiB | 2019 Dec 16 17:38 |
All your GPS Trackers belong to US - C. Kasmi, P. Barre.eng.srt | 51.1 KiB | 2019 Dec 16 22:16 |
Abusing Google Play Billing for fun and unlimited credits - G. Lopes.eng.srt | 43.1 KiB | 2019 Dec 16 22:22 |
BMS is destroyed by - smart button - E. Litvinov.eng.srt | 32.2 KiB | 2019 Dec 16 17:38 |