Parent directory/ | - | - |
CiscoPangPang - Cisco to Disco.eng.srt | 33.4 KiB | 2019 Dec 17 20:10 |
md4 - CiscoASA From Zero to ID=0.eng.srt | 41.3 KiB | 2019 Dec 17 20:10 |
Ke Liu - Two Bytes to Rule Adobe Reader Twice The Black Magic Behind the Byte Order Mark.eng.srt | 49.4 KiB | 2019 Dec 17 20:10 |
Juho Nurminen - app setAsDefaultRCE Client Electron, scheme handlers and stealthy security patches.eng.srt | 51.1 KiB | 2019 Dec 17 21:19 |
Jakub Vrana, Krzysztof Kotowicz - Trusted Types & the end of DOM XSS.eng.srt | 53.0 KiB | 2019 Dec 17 20:10 |
An Trinh - Dark sides of Java remote protocols.eng.srt | 57.0 KiB | 2019 Dec 17 21:16 |
Matias Sequeira, Esteban Martinez Fayo, Cesar Cerrudo - Practical LoRaWAN auditing and exploitation.eng.srt | 59.8 KiB | 2019 Dec 17 21:22 |
LimitedResults - Fatal Fury on ESP32 Time to release Hardware Exploits.eng.srt | 62.7 KiB | 2019 Dec 17 20:10 |
Kai Jern Lau, Nguyen Anh Quynh - qiling.io Advanced Binary Emulation framework.eng.srt | 62.9 KiB | 2019 Dec 17 20:10 |
Jayson E. Street - I PWN thee, I PWN thee not.eng.srt | 84.9 KiB | 2019 Dec 17 20:10 |
ZeroNights 2019.mp4 | 823.7 KiB | 2022 Jan 14 05:47 |
ZN 201'9 edition. Grand Opening.mp4 | 3.9 MiB | 2022 Jan 14 05:47 |
Roman Palkin - Malign Machine Learning Models.mp4 | 10.8 MiB | 2022 Jan 14 05:47 |
Maria Nedyak - Hacking Medical Imaging with DICOM.mp4 | 13.3 MiB | 2022 Jan 14 05:47 |
Emil Lerner - Single byte write to RCE exploiting a bug in php-fpm.mp4 | 14.3 MiB | 2022 Jan 14 05:47 |
Alex Kovrizhnykh - crauEmu - your IDE for code-reuse attacks.mp4 | 19.7 MiB | 2022 Jan 14 05:47 |
CiscoPangPang - Cisco to Disco.mp4 | 21.8 MiB | 2022 Jan 14 05:47 |
md4 - CiscoASA From Zero to ID=0.mp4 | 28.2 MiB | 2022 Jan 14 05:47 |
Andrey Akimov - Launching feedback-driven fuzzing on TrustZone TEE.mp4 | 29.8 MiB | 2022 Jan 14 05:47 |
Jakub Vrana, Krzysztof Kotowicz - Trusted Types & the end of DOM XSS.mp4 | 31.3 MiB | 2022 Jan 14 05:47 |
Ilya Shaposhnikov - Oldschool way of hacking MicroDigital ip-cameras.mp4 | 34.1 MiB | 2022 Jan 14 05:47 |
Matias Sequeira, Esteban Martinez Fayo, Cesar Cerrudo - Practical LoRaWAN auditing and exploitation.mp4 | 35.6 MiB | 2022 Jan 14 05:47 |
An Trinh - Dark sides of Java remote protocols.mp4 | 36.6 MiB | 2022 Jan 14 05:47 |
Pavel Cheremushkin - Opwnsource VNC vulnerability research.mp4 | 43.8 MiB | 2022 Jan 14 05:47 |
Kai Jern Lau, Nguyen Anh Quynh - qiling.io Advanced Binary Emulation framework.mp4 | 44.0 MiB | 2022 Jan 14 05:47 |
LimitedResults - Fatal Fury on ESP32 Time to release Hardware Exploits.mp4 | 44.4 MiB | 2022 Jan 14 05:47 |
Juho Nurminen - app setAsDefaultRCE Client Electron, scheme handlers and stealthy security patches.mp4 | 45.9 MiB | 2022 Jan 14 05:47 |
Ke Liu - Two Bytes to Rule Adobe Reader Twice The Black Magic Behind the Byte Order Mark.mp4 | 53.3 MiB | 2022 Jan 14 05:47 |
Alex Matrosov - Hardware Security is Hard how hardware boundaries define platform security.mp4 | 72.5 MiB | 2022 Jan 14 05:47 |
Jayson E. Street - I PWN thee, I PWN thee not.mp4 | 79.4 MiB | 2022 Jan 14 05:47 |