Parent directory/ | - | - |
Jake McGinty - How to - really - piss off the surveillance state with your privacy tool.mp4 | 70.5 MiB | 2022 Jan 13 11:01 |
Alexander Bolshev, Gleb Cherbov, Svetlana Cherkasova - DTM components - shadow keys.mp4 | 68.9 MiB | 2022 Jan 13 11:01 |
Dmitry Schelkunov, Vasily Bukasov - Deobfuscation and beyond.mp4 | 66.9 MiB | 2022 Jan 13 11:01 |
Alexander 'Solar Designer' Peslyak - Is infosec a game.mp4 | 65.5 MiB | 2022 Jan 13 11:01 |
Nicolas Gregoire - Hunting for top bounties.mp4 | 63.9 MiB | 2022 Jan 13 11:01 |
Patroklos Argyroudis - Project Heapbleed.mp4 | 61.8 MiB | 2022 Jan 13 11:01 |
Sergey Soldatov, Mikhail Egorov - Non-cryptographic research of orthodox cryptographic media.mp4 | 59.2 MiB | 2022 Jan 13 11:01 |
Alexey Osipov, Timur Yunusov, Kirill Nesterov - 4x4G - from SIM to GGSN.mp4 | 55.6 MiB | 2022 Jan 13 11:01 |
Rene Freingruber - EMET 5.0 - armor or curtain.mp4 | 55.5 MiB | 2022 Jan 13 11:01 |
Jean-Philippe Aumasson - Crypto coding v2.mp4 | 53.3 MiB | 2022 Jan 13 11:01 |
Pavel Zhovner - Household RFID-based access tricks.mp4 | 51.1 MiB | 2022 Jan 13 11:01 |
Marco Grassi - Steroids for your App Security assessment.mp4 | 49.9 MiB | 2022 Jan 13 11:01 |
Ivan Novikov - Unexpected expected exception - think different about web-related vulnerabilities.mp4 | 49.5 MiB | 2022 Jan 13 11:01 |
Peter Hlavaty - Racing with Droids.mp4 | 45.5 MiB | 2022 Jan 13 11:01 |
Roman Bazhin - A pentesters view of Oracle Database Communication Protocol.mp4 | 45.0 MiB | 2022 Jan 13 11:01 |
Nikita Tarakanov - The past, the present and the future of software exploitation techniques.mp4 | 41.4 MiB | 2022 Jan 13 11:01 |
Dmitry Boomov - De-anonymization and total espionage.mp4 | 40.4 MiB | 2022 Jan 13 11:01 |
Nikita Tarakanov - Data-only PWNing Microsoft Windows kernel - exploitation of.mp4 | 37.4 MiB | 2022 Jan 13 11:01 |