Black Hat
File List
- Black Hat USA/Black Hat USA 2017/Making Diversity a Priority in Security.mp4 996.5 MB
- Black Hat USA/Black Hat USA 2011/Pictures - Dan Tentler - Black Hat USA 2011.rar 567.2 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-panel-video.rm 532.8 MB
- Black Hat USA/Black Hat USA 2012/Dan Tentler Black Hat USA 2012.rar 528.7 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-jeremy-rauch-video.rm 493.4 MB
- Black Hat Asia/Black Hat Japan 2007/Black Hat Japan 2007 NHK coverage.VOB 483.4 MB
- Black Hat USA/Black Hat USA 2007/Black Hat USA 2007 pictures.rar 467.9 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-jd-glaser-video.rm 462.3 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-martin-khoo-video.rm 448.5 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-caezar-video.rm 434.8 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-joey-video.rm 430.1 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-wilfred-video.rm 408.6 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-jennifer-granick-video.rm 401.0 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-batz-video.rm 391.9 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-greg-hoglund-video.rm 368.7 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-mjr-video.rm 366.3 MB
- Black Hat DC/Black Hat DC 2007/Presentations/Joe Grand Hardware Hacking.rar 360.0 MB
- Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-pierre-video.rm 341.2 MB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 Keynote Every Security Team is a Software Team Now by Dino Dai Zovi.mp4 265.9 MB
- Black Hat Abu Dhabi/bh-ad-12.rar 222.1 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-SHINDER-HARRISON.mp4 205.7 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-OFIR-ARKIN.mp4 201.8 MB
- Black Hat Abu Dhabi/bh-ad-11.rar 200.0 MB
- Black Hat USA/Black Hat USA 2016/Keynote - The Hidden Architecture of our Time - Why This Internet Worked, How We Could Lose It.mp4 198.0 MB
- Black Hat DC/Black Hat DC 2011/Video/Inglourious Hackers - Targeting Web Clients - Laurent Oudot.mp4 196.7 MB
- Black Hat USA/Black Hat USA 2022/Keynote Black Hat at 25 Where Do We Go from Here.mp4 187.4 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-TIM-MULLEN.mp4 171.4 MB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 Keynote.mp4 171.0 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-BEALE-HINTZ.mp4 169.9 MB
- Black Hat USA/Black Hat USA 2017/Revoke-Obfuscation - PowerShell Obfuscation Detection (And Evasion) Using Science.mp4 155.4 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Abbasi-Ghost-In-The-PLC-Designing-An-Undetectable-Programmable-Logic-Controller-Rootkit.pdf 151.3 MB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Asia 2019 Keynote The Next Arms Race.mp4 149.9 MB
- Black Hat Asia/Black Hat Singapore 2023/Trends and Top Takeaways from Black Hat Asia.mp4 149.0 MB
- Black Hat USA/Black Hat USA 2024/Keynote Democracy's Biggest Year The Fight for Secure Elections Around the World.mp4 147.8 MB
- Black Hat USA/Black Hat USA 2017/Challenges of Cooperation Across Cyberspace.mp4 143.5 MB
- Black Hat Europe/Black Hat Europe 2019/Locknote Conclusions and Key Takeaways from Black Hat Europe 2019.mp4 143.1 MB
- Black Hat USA/Black Hat USA 2021/Keynote Hacking the Cybersecurity Puzzle.mp4 141.2 MB
- Black Hat USA/Black Hat USA 2015/video/The Lifecycle Of A Revolution.mp4 139.8 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-TEMMINGH-MEER.mp4 138.5 MB
- Black Hat Europe/Black Hat Europe 2023/Locknote Conclusions and Key Takeaways from Day 2.mp4 138.2 MB
- Black Hat Asia/Black Hat Singapore 2024/Keynote - Securing Our Cyberspace Together.mp4 137.8 MB
- Black Hat USA/Black Hat USA 2016/Panel - Removing Roadblocks to Diversity.mp4 135.4 MB
- Black Hat Europe/Black Hat Europe 2023/Locknote Conclusions and Key Takeaways from Day 1.mp4 135.3 MB
- Black Hat Europe/Black Hat Europe 2023/Keynote My Lessons from the Uber Case.mp4 133.2 MB
- Black Hat Asia/Black Hat Singapore 2019/Investigating Malware Using Memory Forensics - A Practical Approach.mp4 133.0 MB
- Black Hat Asia/Black Hat Singapore 2022/Keynote #HackingDemocracy Will Our Societies Hold.mp4 128.0 MB
- Black Hat USA/Black Hat USA 2015/video/Remote Exploitation Of An Unaltered Passenger Vehicle.mp4 127.6 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Kenneth-Geers-Hacking-in-a-Foreign-Language-A-Network-Security-Guide-to-Russia-and-Beyond-English.flac 126.2 MB
- Black Hat USA/Black Hat USA 2017/Hacking Serverless Runtimes - Profiling AWS Lambda Azure Functions & More.mp4 126.1 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-JEREMIAH-GROSSMAN.mp4 124.5 MB
- Black Hat USA/Black Hat USA 2022/Pre - Stuxnet, Post - Stuxnet Everything Has Changed, Nothing Has Changed.mp4 119.9 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-CHIP-ANDREWS.mp4 119.9 MB
- Black Hat USA/Black Hat USA 2017/Game of Chromes - Owning the Web with Zombie Chrome Extensions.mp4 117.8 MB
- Black Hat USA/Black Hat USA 2017/Exploit Kit Cornucopia.mp4 117.7 MB
- Black Hat USA/Black Hat USA 2017/Evading Microsoft ATA for Active Directory Domination.mp4 117.6 MB
- Black Hat USA/Black Hat USA 2017/Network Automation is Not Your Safe Haven.mp4 117.2 MB
- Black Hat USA/Black Hat USA 2021/Locknote Conclusions and Key Takeaways from Day 1.mp4 116.2 MB
- Black Hat USA/Black Hat USA 2017/Broadpwn - Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets.mp4 115.7 MB
- Black Hat USA/Black Hat USA 2017/An ACE Up the Sleeve - Designing Active Directory DACL Backdoors.mp4 115.2 MB
- Black Hat USA/Black Hat USA 2017/Betraying the BIOS - Where the Guardians of the BIOS are Failing.mp4 114.4 MB
- Black Hat USA/Black Hat USA 2021/Keynote Supply Chain Infections and the Future of Contactless Deliveries.mp4 114.3 MB
- Black Hat USA/Black Hat USA 2024/Keynote Fireside Chat with Moxie Marlinspike.mp4 113.8 MB
- Black Hat Asia/Black Hat Singapore 2023/Keynote - Preparing the Long Journey for Data Security.mp4 112.5 MB
- Black Hat USA/Black Hat USA 2017/Honey, I Shrunk the Attack Surface - Adventures in Android Security Hardening.mp4 111.3 MB
- Black Hat Asia/Black Hat Singapore 2023/Forward Focus - The Impact of Artificial Intelligence.mp4 111.1 MB
- Black Hat Asia/Black Hat Singapore 2023/Fireside Chat Jeff Moss and Gaurav Keerthi.mp4 110.8 MB
- Black Hat Asia/Black Hat Singapore 2016/Su A Cyder - Homebrewing Malware for IOS Like a BO$$.mp4 109.5 MB
- Black Hat USA/Black Hat USA 2017/Hacking Hardware with a $10 SD Card Reader.mp4 109.3 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Hideaki-Ihara-Forensics-in-Japan-Japanese.flac 108.2 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Satoru-Koyama-Our-Security-Depends-on-Your-Security-Japanese.flac 106.8 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Saumil-Shah-David-Cole-Adware-Spyware-English.flac 106.7 MB
- Black Hat USA/Black Hat USA 2017/Bug Collisions Meet Government Vulnerability Disclosure.mp4 104.4 MB
- Black Hat Asia/Black Hat Singapore 2022/Keynote Measure Security Effectively.mp4 103.6 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-JD-GLASER.mp4 102.2 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-JONATHAN-WILKINS.mp4 100.7 MB
- Black Hat USA/Black Hat USA 2017/Bochspwn Reloaded - Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking.mp4 100.6 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Dan-Kaminsky-Black-Ops-tcp-ip-English.flac 98.7 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Dominique-Brezinsski-A-Paranoid-Perspective-of-an-Interpreted-Language-English.flac 98.1 MB
- Black Hat USA/Black Hat USA 2011/video/Staring into the Abyss The Dark Side of Security and Professional Intelligence - Richard Thieme.mp4 97.9 MB
- Black Hat USA/Black Hat USA 2015/video/Defeating Pass the Hash Separation Of Powers.mp4 97.7 MB
- Black Hat USA/Black Hat USA 2017/Go to Hunt, Then Sleep.mp4 96.6 MB
- Black Hat USA/Black Hat USA 2015/video/Automated Human Vulnerability Scanning With AVA.mp4 96.5 MB
- Black Hat USA/Black Hat USA 2015/video/Big Game Hunting The Peculiarities Of Nation State Malware Research.mp4 96.4 MB
- Black Hat Europe/Black Hat Europe 2021/Securing the Public, who is in Charge.mp4 95.5 MB
- Black Hat Asia/Black Hat Japan 2005/audio/David-Maynor-Architecture-Flaws-in-Common-Security-Tools-English.flac 95.1 MB
- Black Hat USA/Black Hat USA 2017/The Active Directory Botnet.mp4 94.8 MB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 Keynote - Parisa Tabriz.mp4 94.7 MB
- Black Hat USA/Black Hat USA 2017/Developing Trust and Gitting Betrayed.mp4 93.3 MB
- Black Hat USA/Black Hat USA 2017/Why Most Cyber Security Training Fails and What We Can Do About it.mp4 93.0 MB
- Black Hat USA/Black Hat USA 2017/WiFuzz - Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake.mp4 92.5 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-URITY.mp4 92.2 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Keynote-The-Day-After-Katsuya-Uchida-Japanese.flac 91.7 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Jeremiah-Grossman-Phishing-With-Super-Bait-English.flac 91.4 MB
- Black Hat USA/Black Hat USA 2017/Breaking the x86 Instruction Set.mp4 90.7 MB
- Black Hat USA/Black Hat USA 2017/Friday the 13th - JSON Attacks.mp4 90.3 MB
- Black Hat Asia/Black Hat Singapore 2023/Behind the Scenes How Criminal Enterprises Pre-infect Millions of Mobile Devices.mp4 89.9 MB
- Black Hat Europe/Black Hat Europe 2019/Hackers, Journalists and the Ethical Swamp.mp4 89.0 MB
- Black Hat USA/Black Hat USA 2017/Redesigning PKI to Solve Revocation Expiration and Rotation Problems.mp4 88.8 MB
- Black Hat Asia/Black Hat Singapore 2015/Understanding SCADA's Modbus Protocol.mp4 88.7 MB
- Black Hat USA/Black Hat USA 2017/Fad or Future Getting Past the Bug Bounty Hype.mp4 88.7 MB
- Black Hat USA/Black Hat USA 2017/Big Game Theory Hunting - The Peculiarities of Human Behavior in the InfoSec Game.mp4 88.5 MB
- Black Hat USA/Black Hat USA 2017/Infecting the Enterprise - Abusing Office365Powershell for Covert C2.mp4 88.4 MB
- Black Hat USA/Black Hat USA 2017/Cracking the Lens - Targeting HTTP's Hidden Attack-Surface.mp4 87.7 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Chris-Hurley-Identifying-and-Responding-to-Wireless-Attacks-English.flac 87.7 MB
- Black Hat USA/Black Hat USA 2017/ShieldFS - The Last Word in Ransomware Resilient File Systems.mp4 86.4 MB
- Black Hat USA/Black Hat USA 2017/Exploiting Network Printers.mp4 86.2 MB
- Black Hat USA/Black Hat USA 2017/Breaking XSS Mitigations Via Script Gadgets.mp4 86.1 MB
- Black Hat USA/Black Hat USA 2017/Datacenter Orchestration Security and Insecurity - Assessing Kubernetes, Mesos, and Docker at Scale.mp4 86.0 MB
- Black Hat Europe/Black Hat Europe 2021/Security Industry Call to Action We Need a Cloud Vulnerability Database.mp4 85.8 MB
- Black Hat USA/Black Hat USA 2015/video/The Memory Sinkhole Unleashing An X86 Design Flaw Allowing Universal Privilege.mp4 85.8 MB
- Black Hat Europe/Black Hat Europe 2021/ReCertifying Active Directory Certificate Services.mp4 85.7 MB
- Black Hat USA/Black Hat USA 2017/Automated Testing of Crypto Software Using Differential Fuzzing.mp4 84.9 MB
- Black Hat USA/Black Hat USA 2017/Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev.mp4 84.5 MB
- Black Hat Europe/Black Hat Europe 2024/Locknote Conclusions and Key Takeaways from Black Hat Europe 2024.mp4 84.5 MB
- Black Hat USA/Black Hat USA 2017/Cloak & Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.mp4 84.2 MB
- Black Hat USA/Black Hat USA 2024/Locknote Conclusions & Key Takeaways from Black Hat USA 2024.mp4 83.9 MB
- Black Hat USA/Black Hat USA 2021/Do You Speak My Language Make Static Analysis Engines Understand Each Other.mp4 82.9 MB
- Black Hat Asia/Black Hat Singapore 2024/Fireside Chat Jeff Moss and Ruimin He.mp4 82.0 MB
- Black Hat Europe/Black Hat Europe 2023/Hiding in the Clouds Abusing Azure DevOps Services to Bypass Microsoft Sentinel Analytic Rules.mp4 81.5 MB
- Black Hat USA/Black Hat USA 2015/video/Attacking Hypervisors Using Firmware And Hardware.mp4 80.7 MB
- Black Hat Asia/Black Hat Singapore 2024/Emerging Frontiers Insights from the Black Hat Asia Review Board.mp4 80.3 MB
- Black Hat USA/Black Hat USA 2013/Dan Tentler Black Hat USA 2013.rar 79.6 MB
- Black Hat Europe/Black Hat Europe 2023/The Black Hat Europe Network Operations Center (NOC) Report.mp4 79.2 MB
- Black Hat Europe/Black Hat Europe 2021/Keynote Embedding a Human Centric Approach Into a Global Cyber Security Program.mp4 79.2 MB
- Black Hat USA/Black Hat USA 2015/video/Red Vs Blue Modern Active Directory Attacks, Detection, And Protection.mp4 78.6 MB
- Black Hat USA/Black Hat USA 2015/video/Abusing Windows Management Instrumentation WMI To Build A Persistent, Asyn.mp4 78.4 MB
- Black Hat Europe/Black Hat Europe 2020/The Hunt for Major League IoT-ICS Threats A Deep Dive into IoT Threat Terrain.mp4 78.3 MB
- Black Hat USA/Black Hat USA 2013/video/Keynote - Gen. Alexander.mp4 78.3 MB
- Black Hat USA/Black Hat USA 2014/video/Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014.mp4 76.7 MB
- Black Hat Europe/Black Hat Europe 2018/Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces.mp4 76.0 MB
- Black Hat Europe/Black Hat Europe 2018/A Measured Response to a Grain of Rice.mp4 75.8 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-LITCHFIELD-HAMMAD.mp4 75.8 MB
- Black Hat Europe/Black Hat Europe 2024/Keynote Fighting Cybercrime in 2024.mp4 75.4 MB
- Black Hat Asia/Black Hat Singapore 2019/Office in Wonderland.mp4 75.3 MB
- Black Hat USA/Black Hat USA 2017/Intel AMT Stealth Breakthrough.mp4 75.3 MB
- Black Hat USA/Black Hat USA 2017/How We Created the First SHA-1 Collision and What it Means for Hash Security.mp4 75.1 MB
- Black Hat USA/Black Hat USA 2017/Behind the Plexiglass Curtain - Stats and Stories from the Black Hat NOC.mp4 74.7 MB
- Black Hat USA/Black Hat USA 2015/video/Is The NSA Still Listening To Your Calls A Surveillance Debate.mp4 74.4 MB
- Black Hat USA/Black Hat USA 2016/Advanced CAN Injection Techniques for Vehicle Networks.mp4 74.4 MB
- Black Hat Asia/Black Hat Singapore 2020/Engineering Cybersecurity for a Nation What Singapore is Learning from Cars and Sanitation.mp4 73.8 MB
- Black Hat USA/Black Hat USA 2017/Exploiting a Single SQLite Vulnerability Across Multiple Software.mp4 73.4 MB
- Black Hat Europe/Black Hat Europe 2021/Keynote Clocking On.mp4 73.2 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Jamie-Butler-Sherri-Sparks-Rootkit-Detection-English.flac 73.0 MB
- Black Hat USA/Black Hat USA 2021/Back in Black Hat The 7th Annual Black Hat USA NOC Report.mp4 72.8 MB
- Black Hat USA/Black Hat USA 2015/video/Social Engineering The Windows Kernel Finding & Exploiting Token Handling Vulnerabilities.mp4 72.7 MB
- Black Hat Europe/Black Hat Europe 2019/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.mp4 72.7 MB
- Black Hat Europe/Black Hat Europe 2021/From Coordinated Disclosure to Cooperative Vulnerability When Dealing w - Critical Software Stacks.mp4 71.8 MB
- Black Hat USA/Black Hat USA 2015/video/Pen Testing A City.mp4 71.7 MB
- Black Hat USA/Black Hat USA 2017/Breaking the Laws of Robotics - Attacking Industrial Robots.mp4 71.4 MB
- Black Hat USA/Black Hat USA 2017/How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass & more.mp4 71.3 MB
- Black Hat Europe/Black Hat Europe 2023/LogoFAIL Security Implications of Image Parsing During System Boot.mp4 71.3 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Ejovi-Nuwere-The-Art-of-SIP-Fuzzing-and-Vulnerabilities-Found-in-VoIP-English.flac 71.2 MB
- Black Hat USA/Black Hat USA 2014/video/Computrace Backdoor Revisited.mp4 71.2 MB
- Black Hat USA/Black Hat USA 2013/video/Hacking, Surveilling, and Deceiving victims on Smart TV.mp4 70.9 MB
- Black Hat Windows/Black Hat Windows 2002/Video/BH-USA-WIN-02-HARRIS-SOUPPAYA.mp4 70.9 MB
- Black Hat USA/Black Hat USA 2011/video/Hacking and Forensicating an Oracle Database Server - David Litchfield.mp4 70.8 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Workshop - SamuraiWTF.mp4 70.5 MB
- Black Hat Asia/Black Hat Singapore 2019/Intel VISA Through the Rabbit Hole.mp4 70.4 MB
- Black Hat Europe/Black Hat Europe 2021/Veni, No Vidi, No Vici Attacks on ETW Blind EDR Sensors.mp4 70.1 MB
- Black Hat USA/Black Hat USA 2017/Practical Tips for Defending Web Applications in the Age of DevOps.mp4 69.9 MB
- Black Hat USA/Black Hat USA 2015/video/The NSA Playset A Year Of Toys And Tools.mp4 69.9 MB
- Black Hat Asia/Black Hat Singapore 2023/Leveraging Streaming-Based Outlier Detection and SliceLine to Stop Heavily Distributed Bot Attacks.mp4 69.7 MB
- Black Hat Asia/Black Hat Singapore 2015/Locknote - Conclusions and Key Takeaways from Black Hat 2015.mp4 69.5 MB
- Black Hat Europe/Black Hat Europe 2019/Doors of Durin The Veiled Gate to Siemens S7 Silicon.mp4 68.8 MB
- Black Hat USA/Black Hat USA 2015/video/Panel How The Wassenaar Arrangement s Export Control Of Intrusion Soft Affect.mp4 68.7 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Michael-Sutton-Adam-Green-The-Art-of-File-Format-Fuzzing-English.flac 68.6 MB
- Black Hat Asia/Black Hat Singapore 2023/Hand Me Your SECRET, MCU Microarchitectural Timing Attacks on Microcontrollers are Practical.mp4 68.6 MB
- Black Hat USA/Black Hat USA 2024/The Hidden Treasure of Crash Reports.mp4 68.3 MB
- Black Hat USA/Black Hat USA 2021/Keynote Secretary Alejandro Mayorkas.mp4 67.8 MB
- Black Hat USA/Black Hat USA 2018/Keynote - Optimistic Dissatisfaction with the Status Quo.mp4 67.7 MB
- Black Hat USA/Black Hat USA 2017/Digital Vengeance - Exploiting the Most Notorious C&C Toolkits.mp4 67.1 MB
- Black Hat USA/Black Hat USA 2015/video/Android Security State Of The Union.mp4 67.0 MB
- Black Hat Europe/Black Hat Europe 2023/Breaching the Perimeter via Cloud Synchronized Browser Settings.mp4 66.8 MB
- Black Hat Europe/Black Hat Europe 2019/Implementing the Lessons Learned From a Major Cyber Attack.mp4 66.4 MB
- Black Hat USA/Black Hat USA 2015/video/Writing Bad @$$ Malware For OS X.mp4 66.4 MB
- Black Hat Asia/Black Hat Singapore 2022/Locknote Conclusions and Key Takeaways from Black Hat Asia 2022.mp4 66.4 MB
- Black Hat USA/Black Hat USA 2015/video/GameOver Zeus Badguys And Backends.mp4 66.0 MB
- Black Hat USA/Black Hat USA 2014/video/When the Lights Go Out - Hacking Cisco EnergyWise.mp4 65.8 MB
- Black Hat Asia/Black Hat Singapore 2023/When Knowledge Graph Meets TTPs Automated & Adaptive Executable TTP Intelligence for Security.mp4 65.6 MB
- Black Hat USA/Black Hat USA 2019/Making Big Things Better The Dead Cow Way.mp4 65.4 MB
- Black Hat USA/Black Hat USA 2022/Blasting Event - Driven Cornucopia WMI - based User - Space Attacks Blind SIEMs and EDRs.mp4 65.1 MB
- Black Hat USA/Black Hat USA 2014/video/Windows Kernel Graphics Driver Attack Surface.mp4 65.1 MB
- Black Hat Europe/Black Hat Europe 2023/A Security RISC The State of Microarchitectural Attacks on RISC-V.mp4 65.0 MB
- Black Hat USA/Black Hat USA 2015/video/Winning The Online Banking War.mp4 65.0 MB
- Black Hat Asia/Black Hat Singapore 2019/Keep Everyone In Sync Effective Approaches Borrowed from Open Source Communities.mp4 64.8 MB
- Black Hat Asia/Black Hat Singapore 2023/Abusing Azure Active Directory From MFA Bypass to Listing Global Administrators.mp4 64.8 MB
- Black Hat Europe/Black Hat Europe 2021/Locknote Conclusions and Key Takeaways from Black Hat Europe 2021.mp4 64.6 MB
- Black Hat USA/Black Hat USA 2015/video/Defeating Machine Learning What Your Security Vendor Is Not Telling You.mp4 64.5 MB
- Black Hat Europe/Black Hat Europe 2019/Alexa, Hack My Server(less) Please.mp4 63.6 MB
- Black Hat USA/Black Hat USA 2024/Quantum Security Myths, Facts, and Realities.mp4 63.5 MB
- Black Hat USA/Black Hat USA 2015/video/Advanced IC Reverse Engineering Tech In Depth Analysis Of A Modern Smart Cards.mp4 63.4 MB
- Black Hat Asia/Black Hat Singapore 2019/CQTools The New Ultimate Hacking Toolkit.mp4 63.3 MB
- Black Hat Europe/Black Hat Europe 2023/The Magnetic Pull of Mutable Protection Worked Examples in Cryptographic Agility.mp4 63.2 MB
- Black Hat Europe/Black Hat Europe 2021/The Black Hat Europe NOC (Network Operations Center) Report.mp4 63.2 MB
- Black Hat USA/Black Hat USA 2022/Locknote Conclusions and Key Takeaways from Black Hat USA 2022.mp4 63.1 MB
- Black Hat Europe/Black Hat Europe 2023/Security Through Transparency Scaling Your Customer Trust Program.mp4 63.0 MB
- Black Hat USA/Black Hat USA 2017/Defeating Samsung KNOX with Zero Privilege.mp4 62.8 MB
- Black Hat USA/Black Hat USA 2024/Living off Microsoft Copilot.mp4 62.5 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-AttendeeVideo.mp4 62.5 MB
- Black Hat Asia/Black Hat Singapore 2020/Locknote Conclusions and Key Takeaways from Day 2.mp4 62.4 MB
- Black Hat Asia/Black Hat Singapore 2021/Keynote Lessons From 11 Billion Breached Records.mp4 62.4 MB
- Black Hat Asia/Black Hat Singapore 2023/Sweet Dreams Abusing Sleep Mode to Break Wi-Fi Encryption and Disrupt WPA2 3 Networks.mp4 62.1 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-1-16-28-56.rm 62.0 MB
- Black Hat Europe/Black Hat Europe 2023/Off The Record - Weaponizing DHCP DNS Dynamic Updates.mp4 61.9 MB
- Black Hat Europe/Black Hat Europe 2020/Light Commands Hacking Voice Assistants with Lasers.mp4 61.7 MB
- Black Hat Europe/Black Hat Europe 2018/Locknote Conclusions and Key Takeaways from Black Hat Europe 2018.mp4 61.4 MB
- Black Hat Europe/Black Hat Europe 2023/My Invisible Adversary Burnout.mp4 61.3 MB
- Black Hat USA/Black Hat USA 2020/We Went to Iowa and All We Got were These Felony Arrest Records.mp4 61.1 MB
- Black Hat USA/Black Hat USA 2022/Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.mp4 61.0 MB
- Black Hat Asia/Black Hat Singapore 2024/Cloud Console Cartographer Tapping Into Mapping- Slogging Thru Logging.mp4 60.8 MB
- Black Hat USA/Black Hat USA 2011/video/Keynote Speaker Cofer Black.mp4 60.6 MB
- Black Hat USA/Black Hat USA 2017/Attacking Encrypted USB Keys the Hard(ware) Way.mp4 60.5 MB
- Black Hat USA/Black Hat USA 2019/DevSecOps - What, Why and How.mp4 60.4 MB
- Black Hat USA/Black Hat USA 2020/Stress Testing Democracy Election Integrity During A Global Pandemic.mp4 60.4 MB
- Black Hat Asia/Black Hat Singapore 2024/LLMs at the Core From Attention to Action in Scaling Security Teams.mp4 60.3 MB
- Black Hat Europe/Black Hat Europe 2019/ClusterFuzz Fuzzing at Google Scale.mp4 60.3 MB
- Black Hat USA/Black Hat USA 2013/video/Spy-jacking the Booters.mp4 60.2 MB
- Black Hat Asia/Black Hat Singapore 2019/iOS Dual Booting Demystified.mp4 60.2 MB
- Black Hat USA/Black Hat USA 2015/video/From False Positives To Actionable Analysis Behavioral Intrusion Detection.mp4 59.9 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Day 1 Keynote - Diplomacy and Combating Evolving International Cyber Threats.mp4 59.5 MB
- Black Hat Asia/Black Hat Singapore 2023/E-Meet (or Emit) My Keystrokes How Benign Screen-sharing Meetings Could Leak Typing Behaviors.mp4 59.3 MB
- Black Hat Europe/Black Hat Europe 2019/Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing.mp4 59.3 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk.mp4 59.2 MB
- Black Hat Asia/Black Hat Singapore 2023/Bypassing Anti-Cheats & Hacking Competitive Games.mp4 59.2 MB
- Black Hat USA/Black Hat USA 2017/Adventures in Attacking Wind Farm Control Networks.mp4 59.1 MB
- Black Hat Asia/Black Hat Singapore 2018/Day 1 Keynote National Cyber-Aggression and Private-Sector Internet Infrastructure.mp4 59.0 MB
- Black Hat USA/Black Hat USA 2017/kRX - Comprehensive Kernel Protection Against Just-In-Time Code Reuse.mp4 58.5 MB
- Black Hat Europe/Black Hat Europe 2019/Is Your Mental Health for Sale.mp4 58.5 MB
- Black Hat Europe/Black Hat Europe 2024/Improving Side-Channel Protections for Intel TDX.mp4 58.5 MB
- Black Hat USA/Black Hat USA 2024/Laser Beams & Light Streams Building Affordable Light-Based Hardware Security Tooling.mp4 58.4 MB
- Black Hat USA/Black Hat USA 2024/Living off Microsoft Copilot (1).mp4 58.4 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 Keynote Blue to Red Traversing the Spectrum by Amanda Rousseau.mp4 58.3 MB
- Black Hat Asia/Black Hat Singapore 2023/Grand Theft House RF Lock Pick Tool to Unlock Smart Door Lock.mp4 58.1 MB
- Black Hat USA/Black Hat USA 2015/video/Harnessing Intelligence From Malware Repositories.mp4 58.1 MB
- Black Hat Asia/Black Hat Singapore 2023/firmWar An Imminent Threat to the Foundation of Computing.mp4 58.1 MB
- Black Hat Asia/Black Hat Singapore 2017/Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017.mp4 58.0 MB
- Black Hat Asia/Black Hat Singapore 2023/Nakatomi Space Lateral Movement as L1 Post-exploitation in OT.mp4 58.0 MB
- Black Hat Europe/Black Hat Europe 2023/Sweet QuaDreams or Nightmare Before Christmas Dissecting an iOS 0-Day.mp4 58.0 MB
- Black Hat Europe/Black Hat Europe 2024/Keynote Frédérick Douzet.mp4 58.0 MB
- Black Hat USA/Black Hat USA 2013/video/Welcome & Introduction to Black Hat USA 2013.mp4 57.9 MB
- Black Hat USA/Black Hat USA 2019/How Do Cyber Insurers View The World.mp4 57.8 MB
- Black Hat USA/Black Hat USA 2013/video/Million Browser Botnet.mp4 57.8 MB
- Black Hat USA/Black Hat USA 2015/video/Fingerprints On Mobile Devices Abusing And Leaking.mp4 57.5 MB
- Black Hat Europe/Black Hat Europe 2023/Vulnerabilities in Old Third-Party Software Components- Importance of Having SBoM for IoT OT Devices.mp4 57.5 MB
- Black Hat Europe/Black Hat Europe 2019/Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet.mp4 57.3 MB
- Black Hat USA/Black Hat USA 2024/How Hackers Changed the Media (and the Media Changed Hackers).mp4 57.2 MB
- Black Hat USA/Black Hat USA 2014/video/Unveiling the Open Source Visualization Engine for Busy Hackers.mp4 57.0 MB
- Black Hat USA/Black Hat USA 2022/Trying to Be Everything to Everyone Let’s Talk About Burnout.mp4 56.9 MB
- Black Hat USA/Black Hat USA 2014/video/A Journey to Protect Points-of-Sale.mp4 56.9 MB
- Black Hat Asia/Black Hat Singapore 2023/The Black Hat Asia NOC Report.mp4 56.8 MB
- Black Hat Asia/Black Hat Singapore 2017/Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing.mp4 56.6 MB
- Black Hat USA/Black Hat USA 2014/video/Building Safe Systems at Scale - Lessons from Six Months at Yahoo.mp4 56.4 MB
- Black Hat USA/Black Hat USA 2024/MaLDAPtive Diving Deep Into LDAP Obfuscation, Deobfuscation & Detection.mp4 56.4 MB
- Black Hat USA/Black Hat USA 2008/video/Reverse DNS Tunneling Shellcode - Ty Miller.mp4 56.3 MB
- Black Hat Asia/Black Hat Singapore 2023/Alice in Kernel Land Lessons Learned From the eBPF Rabbit Hole.mp4 56.3 MB
- Black Hat USA/Black Hat USA 2011/video/Aerial Cyber Apocalypse If We Can Do It So Can They - Richard Perkins, Mike Tassey.mp4 56.3 MB
- Black Hat USA/Black Hat USA 2024/AI Safety and You Perspectives on Evolving Risks and Impacts.mp4 56.2 MB
- Black Hat Asia/Black Hat Singapore 2023/A Run a Day Won't Keep the Hacker Away Inference Attacks in Fitness Tracking Social Networks.mp4 56.1 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.mp4 56.0 MB
- Black Hat USA/Black Hat USA 2009/video/Meet the Feds Feds vs. Ex-Feds - Panel.mp4 55.9 MB
- Black Hat USA/Black Hat USA 2009/video/Clobbering the Cloud - Haroon Meer, Nick Arvanitis, Marco Slaviero.mp4 55.9 MB
- Black Hat Asia/Black Hat Singapore 2023/Security Advocacy Shouldn't Be for Security Professionals How the Industry Misses the Mark.mp4 55.8 MB
- Black Hat Asia/Black Hat Singapore 2024/The Black Hat Asia Network Operations Center (NOC) Report.mp4 55.6 MB
- Black Hat Europe/Black Hat Europe 2023/REDIScovering HeadCrab - A Technical Analysis of a Novel Malware and the Mind Behind It.mp4 55.5 MB
- Black Hat USA/Black Hat USA 2022/A Fully Trained Jedi, You Are Not.mp4 55.5 MB
- Black Hat Europe/Black Hat Europe 2021/No Such Thing as a Stupid Question Why Knowledge Shaming is Making Us Less Secure.mp4 55.2 MB
- Black Hat Asia/Black Hat Singapore 2019/How to Survive the Hardware Assisted Control-Flow Integrity Enforcement.mp4 55.2 MB
- Black Hat Europe/Black Hat Europe 2020/A New Hope The One Last Chance to Save Your SSD Data.mp4 55.2 MB
- Black Hat Europe/Black Hat Europe 2019/New Exploit Technique In Java Deserialization Attack.mp4 55.2 MB
- Black Hat Europe/Black Hat Europe 2017/videos/BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux IoT Device.mp4 55.1 MB
- Black Hat USA/Black Hat USA 2022/The 8th Annual Black Hat USA NOC Report.mp4 54.9 MB
- Black Hat USA/Black Hat USA 2013/video/Stepping p3wns - Adventures in Full Spectrum Embedded Exploitation.mp4 54.8 MB
- Black Hat USA/Black Hat USA 2024/What Lies Beneath the Surface Evaluating LLMs for Offensive Cyber Capabilities.mp4 54.8 MB
- Black Hat Europe/Black Hat Europe 2024/The Black Hat Europe Network Operations Center (NOC) Report.mp4 54.7 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016.mp4 54.7 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Breaking BHAD - Abusing Belkin Home Automation Devices.mp4 54.6 MB
- Black Hat USA/Black Hat USA 2014/video/A Survey of Remote Automotive Attack Surfaces.mp4 54.6 MB
- Black Hat Asia/Black Hat Singapore 2015/Hacking the Wireless World with Software Defined Radio - 2.0.mp4 54.6 MB
- Black Hat Asia/Black Hat Singapore 2020/What the Log So Many Events, so Little Time.mp4 54.5 MB
- Black Hat USA/Black Hat USA 2015/video/FileCry The New Age Of XXE.mp4 54.4 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Revisiting XSS Sanitization.mp4 54.3 MB
- Black Hat Asia/Black Hat Singapore 2020/Locknote Conclusions and Key Takeaways from Day 1.mp4 54.3 MB
- Black Hat USA/Black Hat USA 2017/All Your SMS & Contacts Belong to ADUPS & Others.mp4 54.3 MB
- Black Hat USA/Black Hat USA 2015/video/Ah Universal Android Rooting Is Back.mp4 54.1 MB
- Black Hat Asia/Black Hat Singapore 2021/Pre-built JOP Chains with the JOP ROCKET Bypassing DEP without ROP.mp4 54.1 MB
- Black Hat Europe/Black Hat Europe 2023/VoBERT Unstable Log Sequence Anomaly Detection Introducing Vocabulary-Free BERT.mp4 54.1 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Hacking the Wireless World with Software Defined Radio - 2.0.mp4 54.1 MB
- Black Hat Europe/Black Hat Europe 2019/Conducting a Successful False Flag Cyber Operation (Blame it on China).mp4 54.0 MB
- Black Hat Europe/Black Hat Europe 2019/Mobile Network Hacking, IP Edition.mp4 53.8 MB
- Black Hat Europe/Black Hat Europe 2018/Perception Deception Physical Adversarial Attack Challenges.mp4 53.8 MB
- Black Hat Asia/Black Hat Singapore 2024/Bad Randomness Protecting Against Cryptography's Perfect Crime.mp4 53.8 MB
- Black Hat USA/Black Hat USA 2015/video/The Little Pump Gauge That Could Attacks Against Gas Pump Monitoring Systems.mp4 53.7 MB
- Black Hat USA/Black Hat USA 2013/video/Mactans - Injecting Malware Into iOS Devices via Malicious Chargers.mp4 53.7 MB
- Black Hat Europe/Black Hat Europe 2024/Is Your Memory Protected Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms.mp4 53.7 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Lights Off The Darkness of the Smart Meters.mp4 53.7 MB
- Black Hat USA/Black Hat USA 2024/Driving Forces Behind Industry 4.0 and Digital Transformation for Critical Infrastructure.mp4 53.7 MB
- Black Hat Europe/Black Hat Europe 2023/Keynote Industrialising Cyber Defence in an Asymmetric World.mp4 53.7 MB
- Black Hat USA/Black Hat USA 2011/video/Welcome & Introduction to Black Hat USA 2011 Jeff Moss, Keynote Speaker Cofer Black.mp4 53.6 MB
- Black Hat USA/Black Hat USA 2015/video/Emanate Like A Boss Generalized Covert Data Exfiltration With Funtenna.mp4 53.6 MB
- Black Hat Europe/Black Hat Europe 2023/Unmasking APTs An Automated Approach for Real-World Threat Attribution.mp4 53.6 MB
- Black Hat Europe/Black Hat Europe 2019/Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds.mp4 53.6 MB
- Black Hat Europe/Black Hat Europe 2019/Unveiling the Underground World of Anti-Cheats.mp4 53.5 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Automating Incident Response.mp4 53.4 MB
- Black Hat Asia/Black Hat Singapore 2023/Cloudy With a Chance of Exploits Compromising Critical Infrastructure Through IIoT Cloud Solutions.mp4 53.3 MB
- Black Hat USA/Black Hat USA 2022/No Mr. Cyber Threat - A Psychological Approach To Managing the Fail - to - Challenge Vulnerability.mp4 53.3 MB
- Black Hat USA/Black Hat USA 2013/video/Maltego Tungsten As a Collaborative Attack Platform.mp4 53.3 MB
- Black Hat Asia/Black Hat Singapore 2023/Weaponizing Mobile Infrastructure Are Politically Motivated Cyber Attacks a Threat to Democracy.mp4 53.1 MB
- Black Hat Europe/Black Hat Europe 2021/Greetings from the '90s Exploiting the Design of Industrial Controllers in Modern Settings.mp4 53.1 MB
- Black Hat USA/Black Hat USA 2020/Hacking Public Opinion.mp4 53.0 MB
- Black Hat USA/Black Hat USA 2024/The 10th Annual Black Hat USA Network Operations Center (NOC) Report.mp4 52.9 MB
- Black Hat Europe/Black Hat Europe 2019/Hands Off and Putting SLAB SLUB Feng Shui in a Blackbox.mp4 52.9 MB
- Black Hat USA/Black Hat USA 2022/RollBack - A New Time - Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems.mp4 52.8 MB
- Black Hat USA/Black Hat USA 2014/video/I Know Your Filtering Policy Better than You Do.mp4 52.8 MB
- Black Hat Europe/Black Hat Europe 2023/How We Taught ChatGPT-4 to Break mbedTLS AES With Side-Channel Attacks.mp4 52.7 MB
- Black Hat Europe/Black Hat Europe 2024/Breaking Matter Vulnerabilities in the Matter Protocol.mp4 52.6 MB
- Black Hat Asia/Black Hat Singapore 2019/PASTA Portable Automotive Security Testbed with Adaptability.mp4 52.6 MB
- Black Hat Asia/Black Hat Singapore 2022/Keynote Fireside Chat with U.S. National Cyber Director Chris Inglis.mp4 52.4 MB
- Black Hat USA/Black Hat USA 2024/15 Ways to Break Your Copilot.mp4 52.4 MB
- Black Hat Europe/Black Hat Europe 2024/Over the Air Compromise of Modern Volkswagen Group Vehicles.mp4 52.4 MB
- Black Hat Europe/Black Hat Europe 2023/AutoSpill Zero Effort Credential Stealing from Mobile Password Managers.mp4 52.3 MB
- Black Hat Europe/Black Hat Europe 2018/Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM.mp4 52.3 MB
- Black Hat DC/Black Hat DC 2010/Metasploit and Money - HD More.mp4 52.3 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/IPSec in a Windows 2000 World - Rooster, Dan William.opus 52.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Reflected File Download - A New Web Attack Vector.mp4 52.3 MB
- Black Hat Europe/Black Hat Europe 2023/Illegitimate Data Protection Requests - To Delete or to Address.mp4 52.2 MB
- Black Hat USA/Black Hat USA 2000/video/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices.mp4 52.0 MB
- Black Hat Europe/Black Hat Europe 2024/Infusing AI in Cybersecurity The Times They Are AI-Changin'.mp4 52.0 MB
- Black Hat USA/Black Hat USA 2011/video/Owning Your Phone at Every Layer - A Mobile Security Panel - Tyler Shields, Anthony Lineberry, Charlie Miller, Chris Wysopal, Dino Dai Zovi, more.mp4 51.8 MB
- Black Hat Asia/Black Hat Singapore 2024/The Hack@DAC Story Learnings from Organizing the World's Largest Hardware Hacking Competition.mp4 51.8 MB
- Black Hat USA/Black Hat USA 2016/Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace.mp4 51.8 MB
- Black Hat Asia/Black Hat Singapore 2024/You Shall Not PASS - Analysing a NSO iOS Spyware Sample.mp4 51.7 MB
- Black Hat USA/Black Hat USA 2024/Self-Hosted GitHub CI CD Runners Continuous Integration, Continuous Destruction.mp4 51.6 MB
- Black Hat Asia/Black Hat Singapore 2017/The Power of Data-Oriented Attacks.mp4 51.5 MB
- Black Hat USA/Black Hat USA 2013/video/The Factoring Dead - Preparing for Cyptopocalypse.mp4 51.5 MB
- Black Hat USA/Black Hat USA 2024/Arbitrary Data Manipulation and Leakage with CPU Zero-Day Bugs on RISC-V.mp4 51.5 MB
- Black Hat USA/Black Hat USA 2024/Flipping Bits Your Credentials Are Certainly Mine.mp4 51.5 MB
- Black Hat USA/Black Hat USA 2017/The Industrial Revolution of Lateral Movement.mp4 51.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Evasion of High-End IDPS Devices at the IPv6 Era.mp4 51.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.mp4 51.3 MB
- Black Hat Europe/Black Hat Europe 2019/Advanced VBA Macros Attack & Defence.mp4 51.2 MB
- Black Hat Asia/Black Hat Singapore 2022/SideWinder Uncoils to Strike.mp4 51.2 MB
- Black Hat Asia/Black Hat Singapore 2017/What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection.mp4 51.2 MB
- Black Hat USA/Black Hat USA 2008/video/Pushing the Camel Through the Eye of a Needle - Haroon Meer.mp4 51.2 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.mp4 51.2 MB
- Black Hat Asia/Black Hat Singapore 2024/Confused Learning Supply Chain Attacks through Machine Learning Models.mp4 51.2 MB
- Black Hat USA/Black Hat USA 2020/Lateral Movement & Privilege Escalation in GCP Compromise Organizations without Dropping an Implant.mp4 51.2 MB
- Black Hat USA/Black Hat USA 2011/video/Lives on The Line Securing Crisis Maps in Libya, Sudan, and Pakistan - Securing Crisis Maps in Libya, Sudan, and Pakistan.mp4 51.2 MB
- Black Hat Europe/Black Hat Europe 2019/Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit.mp4 51.0 MB
- Black Hat USA/Black Hat USA 2013/video/RFID Hacking - Live Free or RFID Hard.mp4 50.9 MB
- Black Hat USA/Black Hat USA 2019/Responding to a Cyber Attack with Missiles.mp4 50.9 MB
- Black Hat Asia/Black Hat Singapore 2023/Dirty Bin Cache A New Code Injection Poisoning Binary Translation Cache.mp4 50.9 MB
- Black Hat USA/Black Hat USA 2018/Legal Landmines - How Law and Policy are Rapidly Shaping Information Security.mp4 50.8 MB
- Black Hat Europe/Black Hat Europe 2020/Precursor Towards Evidence-Based Trust in Hardware.mp4 50.8 MB
- Black Hat USA/Black Hat USA 2002/video/Panel - Hacker Court.mp4 50.8 MB
- Black Hat USA/Black Hat USA 2022/The Cyber Safety Review Board Studying Incidents to Drive Systemic Change.mp4 50.8 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Larry Leibrock - Digital Information, User Tokens, Privacy and Forensics Investigations The Case of Windows XP Platform.mp4 50.7 MB
- Black Hat USA/Black Hat USA 2000/video/Marcus Ranum - Full Disclosure and Open Source.mp4 50.7 MB
- Black Hat USA/Black Hat USA 2014/video/Extreme Privilege Escalation on Windows 8 UEFI Systems.mp4 50.6 MB
- Black Hat Asia/Black Hat Singapore 2015/MLD Considered Harmful - Breaking Another IPv6 Subprotocol.mp4 50.5 MB
- Black Hat USA/Black Hat USA 2016/Breaking Payment Points of Interaction (POI).mp4 50.5 MB
- Black Hat USA/Black Hat USA 2017/The Epocholypse 2038 - What's in Store for the Next 20 Years.mp4 50.3 MB
- Black Hat Asia/Black Hat Singapore 2022/SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets.mp4 50.3 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Automating Linux Malware Analysis Using Limon Sandbox.mp4 50.2 MB
- Black Hat USA/Black Hat USA 2013/video/Multiplexed Wired Attack Surfaces.mp4 50.2 MB
- Black Hat USA/Black Hat USA 2024/Is Defense Winning.mp4 50.2 MB
- Black Hat USA/Black Hat USA 2016/The Linux Kernel Hidden Inside Windows 10.mp4 50.1 MB
- Black Hat USA/Black Hat USA 2014/video/Creating a Spider Goat - Security with Intel CPU Transactional Memory Support.mp4 50.1 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Self-Driving and Connected Cars - Fooling Sensors and Tracking Drivers.mp4 50.0 MB
- Black Hat Europe/Black Hat Europe 2021/HTTP 2 The Sequel is Always Worse.mp4 50.0 MB
- Black Hat Europe/Black Hat Europe 2018/Perfectly Deniable Steganographic Disk Encryption.mp4 49.9 MB
- Black Hat Asia/Black Hat Singapore 2017/Phishing for Funds - Understanding Business Email Compromise.mp4 49.9 MB
- Black Hat Asia/Black Hat Singapore 2014/The Machines That Betrayed Their Masters by Glenn Wilkinson.mp4 49.9 MB
- Black Hat Europe/Black Hat Europe 2023/TunnelCrack Leaking VPN Traffic by Manipulating Routing Tables.mp4 49.9 MB
- Black Hat Europe/Black Hat Europe 2016/videos/50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.mp4 49.9 MB
- Black Hat Asia/Black Hat Singapore 2023/Dilemma in IoT Access Control Revealing Novel Attacks and Design Challenges in Mobile-as-a-Gateway.mp4 49.8 MB
- Black Hat Asia/Black Hat Singapore 2022/The Firmware Supply-Chain Security Is Broken Can We Fix It.mp4 49.8 MB
- Black Hat Europe/Black Hat Europe 2019/Exploiting Windows Hello for Business.mp4 49.7 MB
- Black Hat USA/Black Hat USA 2024/Nope, S7ill Not Secure Stealing Private Keys From S7 PLCs.mp4 49.7 MB
- Black Hat Asia/Black Hat Singapore 2023/The Various Shades of Supply Chain SBOM, N-Days and Zero Trust.mp4 49.6 MB
- Black Hat USA/Black Hat USA 2024/Practical LLM Security Takeaways From a Year in the Trenches.mp4 49.6 MB
- Black Hat USA/Black Hat USA 2015/video/Taking Event Correlation With You.mp4 49.6 MB
- Black Hat Asia/Black Hat Singapore 2023/Fuzzing the Native NTFS Read-Write Driver (NTFS3) in the Linux Kernel.mp4 49.5 MB
- Black Hat USA/Black Hat USA 2014/video/Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces.mp4 49.4 MB
- Black Hat Asia/Black Hat Singapore 2015/Browsers Gone Wild.mp4 49.4 MB
- Black Hat USA/Black Hat USA 2013/video/How to Build a SpyPhone.mp4 49.4 MB
- Black Hat Asia/Black Hat Singapore 2023/Stealing With Style Using CSS to Exploit ProtonMail & Friends.mp4 49.3 MB
- Black Hat USA/Black Hat USA 2019/How to Detect that Your Domains are Being Abused for Phishing by Using DNS.mp4 49.2 MB
- Black Hat Asia/Black Hat Singapore 2024/EDR Reloaded Erase Data Remotely.mp4 49.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Welcome & Introduction to Black Hat Europe 2014.mp4 49.0 MB
- Black Hat USA/Black Hat USA 2016/VoIP Wars - the Phreakers Awaken.mp4 49.0 MB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 Keynote.mp4 49.0 MB
- Black Hat USA/Black Hat USA 2014/video/Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring.mp4 48.9 MB
- Black Hat USA/Black Hat USA 2009/video/Hacker Court 2-2 - Panel.mp4 48.9 MB
- Black Hat Europe/Black Hat Europe 2020/efiXplorer Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis.mp4 48.9 MB
- Black Hat Asia/Black Hat Singapore 2024/Debug7 Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs.mp4 48.9 MB
- Black Hat USA/Black Hat USA 2019/Integration of Cyber Insurance Into A Risk Management Program.mp4 48.9 MB
- Black Hat USA/Black Hat USA 2016/A Retrospective on the Use of Export Cryptography.mp4 48.9 MB
- Black Hat USA/Black Hat USA 2024/Main Stage Let Me Tell You a Story Technology and the 4 Vs.mp4 48.8 MB
- Black Hat Asia/Black Hat Singapore 2023/Breaking Managed Data Services in the Cloud.mp4 48.6 MB
- Black Hat Asia/Black Hat Singapore 2014/Dude, WTF in My CAN by Alberto Garcia Illera & Javier Vazquez Vidal.mp4 48.6 MB
- Black Hat DC/Black Hat DC 2010/Hardware is the New King - Joe Grand aka Kingpin.mp4 48.6 MB
- Black Hat USA/Black Hat USA 2024/Swipe Left for Identity Theft An Analysis of User Data Privacy Risks on Location-based Dating Apps.mp4 48.5 MB
- Black Hat USA/Black Hat USA 2018/Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre.mp4 48.5 MB
- Black Hat Asia/Black Hat Singapore 2023/Breaking the Chain An Attacker's Perspective on Supply Chain Vulnerabilities and Flaws.mp4 48.4 MB
- Black Hat Europe/Black Hat Europe 2024/SpAIware & More Advanced Prompt Injection Exploits in LLM Applications.mp4 48.4 MB
- Black Hat Asia/Black Hat Singapore 2023/A New Attack Interface in Java Applications.mp4 48.3 MB
- Black Hat USA/Black Hat USA 2014/video/How Smartcard Payment Systems Fail.mp4 48.3 MB
- Black Hat USA/Black Hat USA 2021/Everything has Changed in iOS 14, but Jailbreak is Eternal.mp4 48.3 MB
- Black Hat Europe/Black Hat Europe 2019/Tackling Privilege Escalation with Offense and Defense.mp4 48.2 MB
- Black Hat USA/Black Hat USA 2024/The Way to Android Root Exploiting Your GPU on Smartphone.mp4 48.2 MB
- Black Hat USA/Black Hat USA 2021/Certified Pre-Owned Abusing Active Directory Certificate Services.mp4 48.2 MB
- Black Hat Europe/Black Hat Europe 2016/videos/(Pen)Testing Vehicles with CANToolz.mp4 48.1 MB
- Black Hat USA/Black Hat USA 2019/Finding Our Path How We're Trying to Improve Active Directory Security.mp4 48.0 MB
- Black Hat Asia/Black Hat Singapore 2020/Store-to-Leak Forwarding There and Back Again.mp4 48.0 MB
- Black Hat USA/Black Hat USA 2021/An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructures.mp4 48.0 MB
- Black Hat Asia/Black Hat Singapore 2023/Prototype Pollution Leads to RCE Gadgets Everywhere.mp4 48.0 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.mp4 47.9 MB
- Black Hat USA/Black Hat USA 2019/Cyber Insurance 101 for CISO's.mp4 47.9 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Hadoop Security - Seven Ways to Kill an Elephant.mp4 47.9 MB
- Black Hat Abu Dhabi/bh-ad-10.rar 47.8 MB
- Black Hat Europe/Black Hat Europe 2024/The Double (AI) Agent Flipping a GenAI Agent Behavior.mp4 47.7 MB
- Black Hat Europe/Black Hat Europe 2024/Defending off the land Agentless defenses available today.mp4 47.7 MB
- Black Hat USA/Black Hat USA 2024/Listen Up Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap.mp4 47.7 MB
- Black Hat Asia/Black Hat Singapore 2024/The Final Chapter Unlimited ways to bypass your macOS privacy mechanisms.mp4 47.7 MB
- Black Hat USA/Black Hat USA 2009/video/Kostya Kortchinsky - Bruce Schneier.mp4 47.7 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.mp4 47.6 MB
- Black Hat USA/Black Hat USA 2011/video/Automated Detection of HPP Vulnerabilities in Web Applications - Marco Balduzzi.mp4 47.5 MB
- Black Hat Europe/Black Hat Europe 2024/The Devil is in the (Micro-) Architectures Uncovering New Side-Channel and Bit-Flip Attack Surfaces.mp4 47.5 MB
- Black Hat Asia/Black Hat Singapore 2015/(In)Security of Mobile Banking.mp4 47.5 MB
- Black Hat USA/Black Hat USA 2011/video/Chip & PIN is Definitely Broken - Adam Laurie, Zac Franken, Andrea Barisani, Daniele Bianco.mp4 47.4 MB
- Black Hat USA/Black Hat USA 2011/video/Black Ops of TCPIP 2011 - Dan Kaminsky.mp4 47.4 MB
- Black Hat USA/Black Hat USA 2016/Investigating DDOS - Architecture Actors and Attribution.mp4 47.2 MB
- Black Hat USA/Black Hat USA 2008/conference cd/viewers/AdobeReader_enu-8.1.2-1.i486.rpm 47.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Endrun - Secure Digital Communications for Our Modern Dystopia.mp4 47.1 MB
- Black Hat USA/Black Hat USA 2008/conference cd/viewers/AdobeReader_enu-8.1.2-1.i386.deb 47.1 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.mp4 47.1 MB
- Black Hat USA/Black Hat USA 2019/MITRE ATT&CK The Play at Home Edition.mp4 47.1 MB
- Black Hat Europe/Black Hat Europe 2021/Resting on Feet of Clay Securely Bootstrapping OPC UA Deployments.mp4 47.1 MB
- Black Hat Asia/Black Hat Singapore 2024/How to Make Hugging Face to Hug Worms Discovering and Exploiting Unsafe Pickle.loads.mp4 47.0 MB
- Black Hat USA/Black Hat USA 2017/Intercepting iCloud Keychain.mp4 47.0 MB
- Black Hat USA/Black Hat USA 2019/Controlled Chaos The Inevitable Marriage of DevOps & Security.mp4 47.0 MB
- Black Hat Asia/Black Hat Singapore 2016/Exploiting Linux and Pax ASLR's Weaknesses on 32 Bit and 64 Bit Systems.mp4 46.9 MB
- Black Hat USA/Black Hat USA 2024/A Framework for Evaluating National Cybersecurity Strategies.mp4 46.8 MB
- Black Hat Asia/Black Hat Singapore 2024/China's Military Cyber Operations Has the Strategic Support Force Come of Age.mp4 46.8 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.mp4 46.8 MB
- Black Hat Europe/Black Hat Europe 2024/From Pass-the-Hash to Code Execution on Schneider Electric M340 PLCs.mp4 46.8 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Enraptured Minds - Strategic Gaming of Cognitive Mindhacks.mp4 46.7 MB
- Black Hat USA/Black Hat USA 2011/video/Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal - Fran Brown, Rob Ragan.mp4 46.7 MB
- Black Hat USA/Black Hat USA 2024/Secure Shells in Shambles.mp4 46.7 MB
- Black Hat USA/Black Hat USA 2011/video/Crypto for Pentesters - Thomas Ptacek, Michael Tracy.mp4 46.7 MB
- Black Hat USA/Black Hat USA 2016/A Journey From JNDI LDAP Manipulation to Remote Code Execution Dream Land.mp4 46.6 MB
- Black Hat USA/Black Hat USA 2011/video/Macs in the Age of the APT - Alex Stamos, BJ Orvis, Paul Youn.mp4 46.6 MB
- Black Hat USA/Black Hat USA 2011/video/Battery Firmware Hacking - Charlie miller.mp4 46.6 MB
- Black Hat USA/Black Hat USA 2024/We R in a Right Pickle With All These Insecure Serialization Formats.mp4 46.6 MB
- Black Hat Europe/Black Hat Europe 2015/videos/VOIP Wars - Destroying Jar Jar Lync.mp4 46.6 MB
- Black Hat Europe/Black Hat Europe 2021/New Ways of IPV6 Scanning.mp4 46.6 MB
- Black Hat USA/Black Hat USA 2024/That Gambling Site It's Fueled by Chinese Organized Crime.mp4 46.6 MB
- Black Hat USA/Black Hat USA 2024/From MLOps to MLOops - Exposing the Attack Surface of Machine Learning Platforms.mp4 46.6 MB
- Black Hat DC/Black Hat DC 2008/Video/Social Engineering and the CIA - Petet Earnest.mp4 46.6 MB
- Black Hat USA/Black Hat USA 2019/Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD).mp4 46.5 MB
- Black Hat Europe/Black Hat Europe 2024/WorstFit Unveiling Hidden Transformers in Windows ANSI.mp4 46.5 MB
- Black Hat USA/Black Hat USA 2020/When Lightning Strikes Thrice Breaking Thunderbolt 3 Security.mp4 46.5 MB
- Black Hat USA/Black Hat USA 2014/video/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.mp4 46.5 MB
- Black Hat Asia/Black Hat Singapore 2020/Adversary Detection Pipelines Finally Making Your Threat Intel Useful.mp4 46.5 MB
- Black Hat USA/Black Hat USA 2011/video/The PWNIE Awards.mp4 46.5 MB
- Black Hat USA/Black Hat USA 2011/video/The Rustock Botnet Takedown - Julia Wolf, Alex Lanstein.mp4 46.4 MB
- Black Hat Asia/Black Hat Singapore 2023/Hacked on National Television.mp4 46.4 MB
- Black Hat USA/Black Hat USA 2016/The Tao of Hardware the Te of Implants.mp4 46.4 MB
- Black Hat USA/Black Hat USA 2024/Reinforcement Learning for Autonomous Resilient Cyber Defense.mp4 46.4 MB
- Black Hat USA/Black Hat USA 2008/video/Iron Chef Fuzzing Challenge - 1-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.mp4 46.3 MB
- Black Hat Europe/Black Hat Europe 2024/My other ClassLoader is your ClassLoader Creating evil twin instances of a class.mp4 46.3 MB
- Black Hat USA/Black Hat USA 2024/Hardening HSMs for Banking-Grade Crypto Wallets.mp4 46.3 MB
- Black Hat USA/Black Hat USA 2014/video/Catching Malware En Masse - DNS and IP Style.mp4 46.2 MB
- Black Hat USA/Black Hat USA 2024/Attention Is All You Need for Semantics Detection A Novel Transformer on Neural-Symbolic Approach.mp4 46.2 MB
- Black Hat USA/Black Hat USA 2024/Locked Down but Not Out Fighting the Hidden War in Your Bootloader.mp4 46.2 MB
- Black Hat USA/Black Hat USA 2024/Main Stage Solving the Cyber Hard Problems A View into Problem Solving from the White House.mp4 46.2 MB
- Black Hat Europe/Black Hat Europe 2024/Unmasking State-Sponsored Mobile Surveillance Malware from Russia, China, and North Korea.mp4 46.1 MB
- Black Hat USA/Black Hat USA 2011/video/Weapons of Targeted Attack Modern Document Exploit Techniques - Sung-ting Tsai, Ming-Chieh Pan.mp4 46.1 MB
- Black Hat USA/Black Hat USA 2018/Day Zero - A Road Map to #BHUSA 2018.mp4 46.1 MB
- Black Hat Asia/Black Hat Singapore 2022/Backdoor Investigation and Incident Response From Zero to Profit.mp4 46.1 MB
- Black Hat USA/Black Hat USA 2014/video/Researching Android Device Security with the Help of a Droid Army.mp4 46.1 MB
- Black Hat USA/Black Hat USA 2024/Behind Enemy Lines Engaging and Disrupting Ransomware Web Panels.mp4 46.0 MB
- Black Hat Europe/Black Hat Europe 2023/The Pool Party You Will Never Forget New Process Injection Techniques Using Windows Thread Pools.mp4 46.0 MB
- Black Hat USA/Black Hat USA 2015/video/TrustKit Code Injection On IOS 8 For The Greater Good.mp4 46.0 MB
- Black Hat USA/Black Hat USA 2024/Into the Inbox Novel Email Spoofing Attack Patterns.mp4 45.9 MB
- Black Hat Asia/Black Hat Singapore 2024/Breaking Managed Identity Barriers In Azure Services.mp4 45.9 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.mp4 45.9 MB
- Black Hat USA/Black Hat USA 2011/video/Attacking Clientside JIT Compilers - Chris Rohlf, Yan Ivnitskiy.mp4 45.8 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Securing Your Network 2-2 - Eric Schultze & Erik Birkholz.mp4 45.8 MB
- Black Hat Asia/Black Hat Singapore 2024/Magicdot A Hacker's Magic Show of Disappearing Dots and Spaces.mp4 45.8 MB
- Black Hat USA/Black Hat USA 2014/video/GRR - Find All the Badness, Collect All the Things.mp4 45.8 MB
- Black Hat USA/Black Hat USA 2013/video/Let s Get Physical - Breaking Home Security Systems and Bypassing Building Controls.mp4 45.8 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Hoff_Virtualization_Security_Apocalypse/BH_US_08_Hoff_Virtualization_Security_Apocalypse.pdf 45.7 MB
- Black Hat USA/Black Hat USA 2013/video/PWNIE AWARDS.mp4 45.7 MB
- Black Hat USA/Black Hat USA 2015/video/The Kali Linux Dojo Workshop #1 Rolling Your Own Generating Custom Kali Linux 2.mp4 45.7 MB
- Black Hat USA/Black Hat USA 2016/OSS Security Maturity - Time to Put on Your Big Boy Pants.mp4 45.6 MB
- Black Hat USA/Black Hat USA 2014/video/Digging for IE11 Sandbox Escapes Part 1.mp4 45.6 MB
- Black Hat USA/Black Hat USA 2015/video/PWNIE AWARDS.mp4 45.5 MB
- Black Hat USA/Black Hat USA 2015/video/Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA.mp4 45.5 MB
- Black Hat USA/Black Hat USA 2016/Xenpwn - Breaking Paravirtualized Devices.mp4 45.5 MB
- Black Hat USA/Black Hat USA 2016/Behind the Scenes of iOS Security.mp4 45.4 MB
- Black Hat USA/Black Hat USA 2011/video/Introduction to Tamper Evident Devices - datagram.mp4 45.4 MB
- Black Hat USA/Black Hat USA 2024/Let the Cache Cache and Let the WebAssembly Assemble Knockin' on Chrome's Shell.mp4 45.4 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Towards a Policy-Agnostic Control-Flow Integrity Implementation.mp4 45.3 MB
- Black Hat USA/Black Hat USA 2024/Project 0xA11C Deoxidizing the Rust Malware Ecosystem.mp4 45.3 MB
- Black Hat Asia/Black Hat Singapore 2020/Biometrics & Privacy Time to Faceoff or is that FaceApp.mp4 45.3 MB
- Black Hat USA/Black Hat USA 2019/Bounty Operations Best Practices and Common Pitfalls to Avoid in the First 6-12 Months.mp4 45.3 MB
- Black Hat Europe/Black Hat Europe 2024/How the Internet Dodged a Bullet The KeyTrap Denial-of-Service Attacks against DNSSEC.mp4 45.3 MB
- Black Hat USA/Black Hat USA 2024/Attacking Samsung Galaxy A - Boot Chain, and Beyond.mp4 45.3 MB
- Black Hat USA/Black Hat USA 2024/Predict, Prioritize, Patch How Microsoft Harnesses LLMs for Security Response.mp4 45.3 MB
- Black Hat USA/Black Hat USA 2024/Main Stage From the Office of the CISO Smarter, Faster, Stronger Security in the Age of AI.mp4 45.3 MB
- Black Hat Asia/Black Hat Singapore 2022/macOS Vulnerabilities Hiding in Plain Sight.mp4 45.2 MB
- Black Hat Asia/Black Hat Singapore 2023/Engaging the Next Generation of Cybersecurity Professionals The Power of Security Zines.mp4 45.2 MB
- Black Hat USA/Black Hat USA 2009/video/Reversing and Exploiting an Apple Firmware Update - K. Chen.mp4 45.2 MB
- Black Hat USA/Black Hat USA 2022/UWB Real Time Locating Systems How Secure Radio Communications May Fail in Practice.mp4 45.2 MB
- Black Hat USA/Black Hat USA 2016/Intra-Process Memory Protection for Applications on ARM and X86 - Leveraging the ELF ABI.mp4 45.2 MB
- Black Hat USA/Black Hat USA 2019/Adventures in the Underland The CQForensic Toolkit as a Unique Weapon Against Hackers.mp4 45.2 MB
- Black Hat Asia/Black Hat Singapore 2023/Revisiting Stealthy Sensitive Information Collection from Android Apps.mp4 45.1 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Exploring Yosemite - Abusing Mac OS X 10.10.mp4 45.1 MB
- Black Hat Asia/Black Hat Singapore 2020/Page Cache Attacks Microarchitectural Attacks on Flawless Hardware.mp4 45.1 MB
- Black Hat USA/Black Hat USA 2014/video/Why Control System Cyber-Security Sucks.mp4 45.1 MB
- Black Hat Europe/Black Hat Europe 2021/Zen and the Art of Adversarial Machine Learning.mp4 45.1 MB
- Black Hat USA/Black Hat USA 2013/video/Above My Pay Grade - Cyber Response at the National Level.mp4 45.0 MB
- Black Hat Asia/Black Hat Singapore 2021/Disappeared Coins Steal Hashrate in Stratum Secretly.mp4 45.0 MB
- Black Hat USA/Black Hat USA 2011/video/A Crushing Blow at the Heart of SAP’s J2EE Engine - Alexander Polyakov.mp4 45.0 MB
- Black Hat USA/Black Hat USA 2014/video/Governments As Malware Authors - The Next Generation.mp4 44.9 MB
- Black Hat USA/Black Hat USA 2024/You've Already Been Hacked What if There Is a Backdoor in Your UEFI OROM.mp4 44.9 MB
- Black Hat Asia/Black Hat Singapore 2024/How to Get the Most Out of the Python Decompilers Uncompyle6 and Decompyle3 - How to Write and Read.mp4 44.8 MB
- Black Hat Europe/Black Hat Europe 2019/Understanding the IoT Threat Landscape.mp4 44.8 MB
- Black Hat USA/Black Hat USA 2014/video/VoIP Wars - Attack of the Cisco Phones.mp4 44.8 MB
- Black Hat USA/Black Hat USA 2015/video/Breaking Payloads With Runtime Code Stripping And Image Freezing.mp4 44.8 MB
- Black Hat Europe/Black Hat Europe 2023/Millions of Patient Records at Risk The Perils of Legacy Protocols.mp4 44.7 MB
- Black Hat Asia/Black Hat Singapore 2024/The Dark Side of EDR Repurpose EDR as an Offensive Tool.mp4 44.7 MB
- Black Hat USA/Black Hat USA 2020/EtherOops Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks.mp4 44.7 MB
- Black Hat Asia/Black Hat Singapore 2019/Preloading Insecurity In Your Electron.mp4 44.6 MB
- Black Hat USA/Black Hat USA 2007/presentations/Krawetz/Presentation/bh-usa-07-krawetz.pdf 44.6 MB
- Black Hat USA/Black Hat USA 2011/video/Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex - Shreeraj Shah.mp4 44.5 MB
- Black Hat DC/Black Hat DC 2010/The WOMBAT API - Querying a global network of advanced honeypots - Stefano Zanero, Paolo Milani Comparetti.mp4 44.5 MB
- Black Hat USA/Black Hat USA 2020/Demigod The Art of Emulating Kernel Rootkits.mp4 44.5 MB
- Black Hat Europe/Black Hat Europe 2023/Through the Looking Glass How Open Source Projects See Vulnerability Disclosure.mp4 44.4 MB
- Black Hat USA/Black Hat USA 2024/Microarchitecture Vulnerabilities Past, Present, and Future.mp4 44.4 MB
- Black Hat USA/Black Hat USA 2015/video/Cloning 3G4G SIM Cards With A PC And An Oscilloscope Lessons Learned.mp4 44.4 MB
- Black Hat USA/Black Hat USA 2014/video/The Beast is in Your Memory.mp4 44.3 MB
- Black Hat Europe/Black Hat Europe 2023/Deleting Your Domain Preventing Data Leaks at TLD Scale.mp4 44.3 MB
- Black Hat Asia/Black Hat Singapore 2015/Keynote - Information Technology Systems in a Post-Silcon World.mp4 44.3 MB
- Black Hat Europe/Black Hat Europe 2023/Evils in the Sparse Texture Memory Exploit Kernel Based on Undefined Behaviors of Graphic APIs.mp4 44.3 MB
- Black Hat USA/Black Hat USA 2016/Measuring Adversary Costs to Exploit Commercial Software.mp4 44.3 MB
- Black Hat USA/Black Hat USA 2022/Living Off the Walled Garden Abusing the Features of the Early Launch Antimalware Ecosystem.mp4 44.3 MB
- Black Hat USA/Black Hat USA 2019/Breaking Through Another Side Bypassing Firmware Security Boundaries from Embedded Controller.mp4 44.3 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Witchcraft Compiler Collection - Towards Self Aware Computer Programs.mp4 44.3 MB
- Black Hat Europe/Black Hat Europe 2021/Building Better CSIRTs Using Behavioral Psychology.mp4 44.2 MB
- Black Hat USA/Black Hat USA 2022/Real 'Cyber War' Espionage, DDoS, Leaks, and Wipers in the Russian Invasion of Ukraine.mp4 44.2 MB
- Black Hat USA/Black Hat USA 2014/video/Abusing Microsoft Kerberos - Sorry You Guys Don't Get It.mp4 44.1 MB
- Black Hat USA/Black Hat USA 2016/HTTP 2 & Quic - Teaching Good Protocols to Do Bad Things.mp4 44.1 MB
- Black Hat Asia/Black Hat Singapore 2016/Rapid Radio Reversing.mp4 44.1 MB
- Black Hat USA/Black Hat USA 2016/Understanding HL7 2.X Standards, Pen Testing, and Defending HL7 2.X Messages.mp4 44.1 MB
- Black Hat Europe/Black Hat Europe 2017/videos/How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement.mp4 44.1 MB
- Black Hat Asia/Black Hat Singapore 2016/The Kitchen's Finally Burned Down - DLP Security Bakeoff.mp4 44.1 MB
- Black Hat USA/Black Hat USA 2009/video/Metasploit Autopsy - Reconstructing the Crime Scene - Peter Silberman, Steve Davis.mp4 44.1 MB
- Black Hat USA/Black Hat USA 2016/Language Properties of Phone Scammers - Cyberdefense At the Level of the Human.mp4 44.0 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Stegospolit - Exploit Delivery With Steganography and Polyglots.mp4 44.0 MB
- Black Hat USA/Black Hat USA 2016/The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android.mp4 44.0 MB
- Black Hat USA/Black Hat USA 2009/video/Demystifying Fuzzers - Michael Eddington.mp4 43.9 MB
- Black Hat DC/Black Hat DC 2011/Video/The Getaway - Methods and Defenses for Data Exfiltration - Sean Coyne, Ryan Kazanciyan.mp4 43.9 MB
- Black Hat DC/Black Hat DC 2011/Video/How To Hack Companiesand Make Millions- Part 1-2 - Chris Hadnagy.mp4 43.9 MB
- Black Hat USA/Black Hat USA 2015/video/Dom Flow Untangling The DOM For More Easy Juicy Bugs.mp4 43.9 MB
- Black Hat USA/Black Hat USA 2024/Modern Kill Chains Real World SaaS Attacks and Mitigation Strategies.mp4 43.8 MB
- Black Hat USA/Black Hat USA 2022/Smishmash - Text Based 2fa Spoofing Using OSINT, Phishing Techniques and a Burner Phone.mp4 43.8 MB
- Black Hat USA/Black Hat USA 2024/Breaching AWS Accounts Through Shadow Resources.mp4 43.8 MB
- Black Hat USA/Black Hat USA 2014/video/Lifecycle of a Phone Fraudster - Exposing Fraud Activity.mp4 43.8 MB
- Black Hat USA/Black Hat USA 2016/DPTrace - Dual Purpose Trace for Exploitability Analysis of Program Crashes.mp4 43.8 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Blended Web and Database Attacks on Real-Time, In-Memory Platforms.mp4 43.7 MB
- Black Hat USA/Black Hat USA 2022/Bug Hunters Dump User Data. Can They Keep it Well They're Keeping it Anyway.mp4 43.7 MB
- Black Hat USA/Black Hat USA 2009/video/There’s a Fox in the Henhouse - Jeff Williams.mp4 43.7 MB
- Black Hat Asia/Black Hat Singapore 2021/Enter Sandbox.mp4 43.7 MB
- Black Hat USA/Black Hat USA 2019/Finding a Needle in an Encrypted Haystack.mp4 43.7 MB
- Black Hat USA/Black Hat USA 2015/video/BGP Stream.mp4 43.7 MB
- Black Hat Europe/Black Hat Europe 2024/Mind the Data Gap Privacy Challenges in Autonomous AI Agents.mp4 43.6 MB
- Black Hat USA/Black Hat USA 2011/video/Legal Aspects of Cybersecurity - (AKA) CYBERLAW A Year in Review, Cases, Issues, Your Questions My (Alleged) Answers - Robert Clark.mp4 43.6 MB
- Black Hat USA/Black Hat USA 2017/(in)Security in Building Automation - How to Create Dark Buildings with Light Speed.mp4 43.6 MB
- Black Hat Asia/Black Hat Singapore 2021/In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems.mp4 43.5 MB
- Black Hat Europe/Black Hat Europe 2024/A Novel Attack Surface Java Authentication and Authorization Service (JAAS).mp4 43.5 MB
- Black Hat USA/Black Hat USA 2024/Cyber Claims Outlook 2024 Trends, Threats, and Tomorrow's Challenges.mp4 43.5 MB
- Black Hat USA/Black Hat USA 2015/video/Exploiting The DRAM Rowhammer Bug To Gain Kernel Privileges.mp4 43.5 MB
- Black Hat USA/Black Hat USA 2011/video/Inside Apple’s MDM Black Box - David Schultz.mp4 43.5 MB
- Black Hat USA/Black Hat USA 2024/From HAL to HALT Thwarting Skynet's Siblings in the GenAI Coding Era.mp4 43.5 MB
- Black Hat USA/Black Hat USA 2017/OpenCrypto - Unchaining the JavaCard Ecosystem.mp4 43.5 MB
- Black Hat USA/Black Hat USA 2011/video/Windows Hooks of Death Kernel Attacks Through User-Mode Callbacks - Tarjei Mandt.mp4 43.4 MB
- Black Hat Asia/Black Hat Singapore 2021/Insights and Predictions What's Next in InfoSec.mp4 43.4 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.mp4 43.4 MB
- Black Hat USA/Black Hat USA 2011/video/Sour Pickles - Marco Slaviero.mp4 43.4 MB
- Black Hat Europe/Black Hat Europe 2019/Practical Side-Channel Attacks Against WPA-TKIP.mp4 43.4 MB
- Black Hat USA/Black Hat USA 2024/Splitting the Email Atom Exploiting Parsers to Bypass Access Controls.mp4 43.3 MB
- Black Hat USA/Black Hat USA 2016/Call Me - Gathering Threat Intelligence on Telephony Scams to Detect Fraud.mp4 43.3 MB
- Black Hat USA/Black Hat USA 2021/Securing Open Source Software - End-to-end, At massive scale, Together.mp4 43.3 MB
- Black Hat USA/Black Hat USA 2013/video/Power Analysis Attacks for Cheapskates.mp4 43.3 MB
- Black Hat USA/Black Hat USA 2014/video/The BEAST Wins Again - Why TLS Keeps Failing to Protect HTTP.mp4 43.3 MB
- Black Hat USA/Black Hat USA 2021/Next-Gen DFIR Mass Exploits & Supplier Compromise.mp4 43.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).mp4 43.2 MB
- Black Hat USA/Black Hat USA 2016/Windows 10 Mitigation Improvements.mp4 43.2 MB
- Black Hat USA/Black Hat USA 2024/Tracing Origins Navigating Content Authenticity in the Deepfake Era.mp4 43.2 MB
- Black Hat USA/Black Hat USA 2019/All the 4G Modules Could be Hacked.mp4 43.2 MB
- Black Hat USA/Black Hat USA 2016/Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy.mp4 43.1 MB
- Black Hat Europe/Black Hat Europe 2019/Booting the iOS Kernel to an Interactive Bash Shell on QEMU.mp4 43.1 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.mp4 43.1 MB
- Black Hat Asia/Black Hat Singapore 2016/Never Trust Your Inputs - Causing 'Catastrophic Physical Consequences' From The Sensor.mp4 43.1 MB
- Black Hat USA/Black Hat USA 2016/Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS.mp4 43.1 MB
- Black Hat USA/Black Hat USA 2024/Bytecode Jiu-Jitsu Choking Interpreters to Force Execution of Malicious Bytecode.mp4 43.0 MB
- Black Hat Asia/Black Hat Singapore 2015/Client-Side Protection Against DOM-Based XSS Done Right (tm).mp4 43.0 MB
- Black Hat Europe/Black Hat Europe 2024/Apple Disk-O Party.mp4 43.0 MB
- Black Hat Europe/Black Hat Europe 2024/Exposing the dark corners of SAP 4-Years of Threat Intelligence data analyzed.mp4 43.0 MB
- Black Hat Europe/Black Hat Europe 2023/Reviving JIT Vulnerabilities Unleashing the Power of Maglev Compiler Bugs on Chrome Browser.mp4 43.0 MB
- Black Hat USA/Black Hat USA 2009/video/Anti-Forensics The Rootkit Connection - Bill Blunden.mp4 43.0 MB
- Black Hat Asia/Black Hat Singapore 2019/Zombie POODLE, GOLDENDOODLE, and How TLSv1.3 Can Save Us All.mp4 42.9 MB
- Black Hat USA/Black Hat USA 2024/Bugs of Yore A Bug Hunting Journey on VMware's Hypervisor.mp4 42.8 MB
- Black Hat USA/Black Hat USA 2016/HEIST - HTTP Encrypted Information can be Stolen Through TCP-Windows.mp4 42.8 MB
- Black Hat USA/Black Hat USA 2024/In Defense of Facts Setting Standards Against Information Threats.mp4 42.8 MB
- Black Hat USA/Black Hat USA 2009/video/Managed Code Rootkits - Erez Metula.mp4 42.8 MB
- Black Hat USA/Black Hat USA 2011/video/Bit-Squatting DNS Hijacking Without Exploitation - Artem Dinaburg.mp4 42.8 MB
- Black Hat Europe/Black Hat Europe 2019/What the Fuzz.mp4 42.8 MB
- Black Hat USA/Black Hat USA 2008/video/Threats to the 2008 Presidential Election (and more) - Oliver Friedrichs.mp4 42.8 MB
- Black Hat USA/Black Hat USA 2018/Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives.mp4 42.8 MB
- Black Hat Asia/Black Hat Singapore 2023/Two Bugs With One PoC Rooting Pixel 6 From Android 12 to Android 13.mp4 42.8 MB
- Black Hat Asia/Black Hat Singapore 2024/Unveiling the Cracks in Virtualization, Mastering the Host System-VMware Workstation Escape.mp4 42.8 MB
- Black Hat USA/Black Hat USA 2021/Alcatraz A Practical Hypervisor Sandbox to Prevent Escapes from the KVM QEMU and KVM-Based MicroVMs.mp4 42.7 MB
- Black Hat USA/Black Hat USA 2022/Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.mp4 42.7 MB
- Black Hat USA/Black Hat USA 2024/Surfacing a Hydra Unveiling a Multi-Headed Chinese State-Sponsored Campaign.mp4 42.7 MB
- Black Hat USA/Black Hat USA 2024/Gotta Cache Em All Bending the Rules of Web Cache Exploitation.mp4 42.7 MB
- Black Hat USA/Black Hat USA 2021/How I Used a JSON Deserialization 0day to Steal Your Money on the Blockchain.mp4 42.6 MB
- Black Hat Europe/Black Hat Europe 2023/Something Rotten in the State of Data Centers.mp4 42.5 MB
- Black Hat USA/Black Hat USA 2021/Windows Heap-backed Pool The Good, the Bad, and the Encoded.mp4 42.5 MB
- Black Hat USA/Black Hat USA 2024/Moral Hazards and Ethical Considerations in Cyber-Insurance.mp4 42.5 MB
- Black Hat USA/Black Hat USA 2024/Uncovering Supply Chain Attack with Code Genome Framework.mp4 42.5 MB
- Black Hat USA/Black Hat USA 2009/video/VC Panel Security Business Strategies During a Recession - Panel.mp4 42.4 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Workshop - Mobile Network Forensics.mp4 42.4 MB
- Black Hat USA/Black Hat USA 2024/ACE Up the Sleeve Hacking Into Apple's New USB-C Controller.mp4 42.4 MB
- Black Hat USA/Black Hat USA 2013/video/Rooting SIM cards.mp4 42.3 MB
- Black Hat USA/Black Hat USA 2022/eBPF ELFs JMPing Through the Windows.mp4 42.3 MB
- Black Hat USA/Black Hat USA 2024/Low Energy to High Energy Hacking Nearby EV-Chargers Over Bluetooth.mp4 42.3 MB
- Black Hat Europe/Black Hat Europe 2021/Message in a Broken Bottle Exploring the Linux IPC Attack Surface.mp4 42.3 MB
- Black Hat Europe/Black Hat Europe 2024/When (Remote) Shells Fall Into The Same Hole Rooting DrayTek Routers Before Attackers Can.mp4 42.3 MB
- Black Hat USA/Black Hat USA 2024/Are Your Backups Still Immutable, Even Though You Can't Access Them.mp4 42.3 MB
- Black Hat Europe/Black Hat Europe 2024/Enhancing Automatic Vulnerability Discovery for Windows RPC COM in New Ways.mp4 42.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).mp4 42.2 MB
- Black Hat USA/Black Hat USA 2024/The GCP Jenga Tower Hacking Millions of Google's Servers With a Single Package (and more).mp4 42.2 MB
- Black Hat Asia/Black Hat Singapore 2022/The Virtual Battlefield in 2022 Russia Ukraine War & Its Policy Implications.mp4 42.2 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/ad-12-OFlynn.zip 42.2 MB
- Black Hat USA/Black Hat USA 2024/Terrapin Attack Breaking SSH Channel Integrity by Sequence Number Manipulation.mp4 42.2 MB
- Black Hat Europe/Black Hat Europe 2017/videos/By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms.mp4 42.2 MB
- Black Hat USA/Black Hat USA 2024/Achilles' Heel of JS Engines Exploiting Modern Browsers During WASM Execution.mp4 42.2 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-2/bh-asia-03-day2-t2-5-16-28-56.rm 42.2 MB
- Black Hat Asia/Black Hat Singapore 2024/The Key to Remote Vehicle Control Autonomous Driving Domain Controller.mp4 42.2 MB
- Black Hat USA/Black Hat USA 2015/video/SMBv2 Sharing More Than Just Your Files.mp4 42.1 MB
- Black Hat Europe/Black Hat Europe 2023/One Million ASUS Routers Under Control Exploiting ASUS DDNS to MITM Admin Credentials.mp4 42.0 MB
- Black Hat USA/Black Hat USA 2015/video/These re Not Your Grand Daddy s CPU Performance Counters CPU Hardware Performa.mp4 42.0 MB
- Black Hat Europe/Black Hat Europe 2014/Video/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2 2).mp4 42.0 MB
- Black Hat USA/Black Hat USA 2021/Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones.mp4 42.0 MB
- Black Hat Europe/Black Hat Europe 2024/LLMbotomy Shutting the Trojan Backdoors.mp4 41.9 MB
- Black Hat USA/Black Hat USA 2024/From Weapon to Target Quantum Computers Paradox.mp4 41.9 MB
- Black Hat USA/Black Hat USA 2015/video/Rocking The Pocket Book Hacking Chemical Plant For Competition And Extortion.mp4 41.9 MB
- Black Hat USA/Black Hat USA 2013/video/The SCADA That Didn't Cry Wolf - Who s Really Attacking Your ICS Devices - 2 2.mp4 41.9 MB
- Black Hat USA/Black Hat USA 2016/Subverting Apple Graphics - Practical Approaches to Remotely Gaining Root.mp4 41.9 MB
- Black Hat USA/Black Hat USA 2015/video/Broadcasting Your Attack Security Testing DAB Radio In Cars.mp4 41.8 MB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe '24 - Speaker Coaching Program Orientation Call.mp4 41.8 MB
- Black Hat USA/Black Hat USA 2022/Calculating Risk in the Era of Obscurity Reading Between the Lines of Security Advisories.mp4 41.8 MB
- Black Hat USA/Black Hat USA 2011/video/Corporate Espionage for Dummies The Hidden Threat of Embedded Web Servers - Michael Sutton.mp4 41.8 MB
- Black Hat USA/Black Hat USA 2015/video/Battle Of The SKM And IUM How Windows 10 Rewrites OS Architecture.mp4 41.8 MB
- Black Hat Asia/Black Hat Singapore 2024/URB Excalibur The New VMware All-Platform VM Escapes.mp4 41.8 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017.mp4 41.7 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.mp4 41.7 MB
- Black Hat USA/Black Hat USA 2021/ERROR BadAlloc - Broken Memory Allocators Led to Millions of Vulnerable IoT & Embedded Devices.mp4 41.7 MB
- Black Hat USA/Black Hat USA 2009/video/Post Exploitation Bliss - Loading Meterpreter on a Factory iPhone - Vincenzo Iozzo, Charlie Miller.mp4 41.7 MB
- Black Hat USA/Black Hat USA 2014/video/CloudBots - Harvesting Crypto Coins Like a Botnet Farmer.mp4 41.7 MB
- Black Hat USA/Black Hat USA 2016/SGX Secure Enclaves in Practice - Security and Crypto Review.mp4 41.7 MB
- Black Hat USA/Black Hat USA 2015/video/Data Driven Threat Intelligence Metrics On Indicator Dissemination And Sharing.mp4 41.6 MB
- Black Hat Europe/Black Hat Europe 2024/The CVSS Deception How We've Been Misled on Vulnerability Severity.mp4 41.6 MB
- Black Hat Europe/Black Hat Europe 2024/Decoding EM-FI Attacks Lessons Learned from Glitching the GigaDevice GD32F407.mp4 41.6 MB
- Black Hat USA/Black Hat USA 2011/video/Apple iOS Security Evaluation Vulnerability Analysis and Data Encryptio - Dino Dai Zovi.mp4 41.6 MB
- Black Hat USA/Black Hat USA 2013/video/OptiROP - The Art of Hunting ROP Gadgets.mp4 41.6 MB
- Black Hat USA/Black Hat USA 2024/The Hack@DAC Story Learnings from Organizing the World's Largest Hardware Hacking Competition.mp4 41.5 MB
- Black Hat USA/Black Hat USA 2008/video/Inducing Momentary Faults Within Secure StandardsMicrocontrollers - Christopher Tarnovsky.mp4 41.5 MB
- Black Hat USA/Black Hat USA 2015/video/Switches Get Stitches.mp4 41.5 MB
- Black Hat USA/Black Hat USA 2021/President's Cup Cyber Competition Finding the Best Cyber Talent in the US Government.mp4 41.5 MB
- Black Hat USA/Black Hat USA 2024/Foreign Information Manipulation and Interference (Disinformation 2.0).mp4 41.5 MB
- Black Hat USA/Black Hat USA 2016/Can You Trust Me Now An Exploration Into the Mobile Threat Landscape.mp4 41.5 MB
- Black Hat USA/Black Hat USA 2018/New Norms and Policies in Cyber-Diplomacy.mp4 41.5 MB
- Black Hat DC/Black Hat DC 2011/Video/XSS Street-Fight - The Only Rule Is There Are No Rules - Ryan Barnett.mp4 41.5 MB
- Black Hat Europe/Black Hat Europe 2024/UNC1860 and The Temple of Oats - Iran's hidden hand in Middle Eastern Networks.mp4 41.4 MB
- Black Hat USA/Black Hat USA 2008/video/A New Breed of Rootkit The System Management Mode (SMM) Rootkit - Shawn Embleton, Sherri Sparks.mp4 41.4 MB
- Black Hat Asia/Black Hat Singapore 2023/PPLdump Is Dead. Long Live PPLdump.mp4 41.4 MB
- Black Hat USA/Black Hat USA 2016/Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic.mp4 41.4 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Bringing a Machete to the Amazon.mp4 41.4 MB
- Black Hat USA/Black Hat USA 2021/Safeguarding UEFI Ecosystem Firmware Supply Chain is Hard(coded).mp4 41.3 MB
- Black Hat USA/Black Hat USA 2020/All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate.mp4 41.3 MB
- Black Hat Asia/Black Hat Singapore 2021/The Rise of Potatoes Privilege Escalations in Windows Services.mp4 41.3 MB
- Black Hat Asia/Black Hat Singapore 2017/Open Sourcing Automotive Diagnostics.mp4 41.3 MB
- Black Hat USA/Black Hat USA 2016/Using EMET to Disable EMET.mp4 41.3 MB
- Black Hat Asia/Black Hat Singapore 2019/DevSecOps What, Why and How.mp4 41.3 MB
- Black Hat USA/Black Hat USA 2009/video/Smart Parking Meter Implementations, Globalism, and You - Joe Grand, Jacob Appelbaum, Chris Tarnovsky.mp4 41.3 MB
- Black Hat USA/Black Hat USA 2022/Bug Bounty Evolution Not Your Grandson's Bug Bounty.mp4 41.3 MB
- Black Hat Europe/Black Hat Europe 2024/WiFi Calling Revealing Downgrade Attacks and Not-so-private private Keys.mp4 41.2 MB
- Black Hat USA/Black Hat USA 2016/Breaking Hardware-Enforced Security With Hypervisors.mp4 41.2 MB
- Black Hat USA/Black Hat USA 2015/video/Faux Disk Encryption Realities Of Secure Storage On Mobile Devices.mp4 41.2 MB
- Black Hat USA/Black Hat USA 2008/video/MetaPost Exploitation - Val Smith, Colin Ames.mp4 41.2 MB
- Black Hat USA/Black Hat USA 2020/Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.mp4 41.2 MB
- Black Hat DC/Black Hat DC 2010/Deconstructing a Secure Processor - Christopher Tarnovsky.mp4 41.2 MB
- Black Hat Asia/Black Hat Singapore 2024/LLM4Shell Discovering and Exploiting RCE Vulnerabilities in Real-World LLM-Integrated Frameworks.mp4 41.2 MB
- Black Hat DC/Black Hat DC 2011/Video/Attacks to SAP Web Applications - Your crown jewels online - Mariano Nunez Di Croce.mp4 41.2 MB
- Black Hat USA/Black Hat USA 2024/Ignore Your Generative AI Safety Instructions. Violate the CFAA.mp4 41.2 MB
- Black Hat Europe/Black Hat Europe 2021/Practical Attacks Against Attribute based Encryption.mp4 41.2 MB
- Black Hat USA/Black Hat USA 2022/In Need of 'Pair' Review Vulnerable Code Contributions by GitHub Copilot.mp4 41.1 MB
- Black Hat USA/Black Hat USA 2021/ProxyLogon is Just the Tip of the Iceberg A New Attack Surface on Microsoft Exchange Server.mp4 41.1 MB
- Black Hat DC/Black Hat DC 2011/Video/A practical attack against GPRS EDGE UMTS HSPA mobile data communications - David Perez & Jose Pico.mp4 41.1 MB
- Black Hat Europe/Black Hat Europe 2018/SDL at Scale Growing Security Champions.mp4 41.0 MB
- Black Hat USA/Black Hat USA 2015/video/Commercial Mobile Spyware Detecting The Undetectable.mp4 41.0 MB
- Black Hat Europe/Black Hat Europe 2021/The Bad Guys Win - Analysis of 10,000 Magecart Vulnerabilities.mp4 40.9 MB
- Black Hat USA/Black Hat USA 2009/video/Fuzzing the Phone in Your Phone - Charlie Miller, Collin Mulliner.mp4 40.9 MB
- Black Hat USA/Black Hat USA 2011/video/Spy-Sense Spyware Tool for Executing Stealthy Exploits Against Sensor Networks - Thanassis Giannetsos.mp4 40.9 MB
- Black Hat Europe/Black Hat Europe 2014/Video/DTM Components - Shadow Keys to the ICS Kingdom.mp4 40.9 MB
- Black Hat USA/Black Hat USA 2016/AMSI - How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It.mp4 40.9 MB
- Black Hat Asia/Black Hat Singapore 2022/Taking Kernel Hardening to the Next Level.mp4 40.9 MB
- Black Hat DC/Black Hat DC 2010/Whose Internet Is It, Anyway - Andrew Fried, Richard Cox, Ben Butler.mp4 40.9 MB
- Black Hat Europe/Black Hat Europe 2023/A Decade After Stuxnet How Siemens S7 is Still an Attacker's Heaven.mp4 40.8 MB
- Black Hat USA/Black Hat USA 2014/video/The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends.mp4 40.8 MB
- Black Hat USA/Black Hat USA 2016/The Remote Malicious Butler Did It.mp4 40.8 MB
- Black Hat Asia/Black Hat Singapore 2024/Chinese APT A Master of Exploiting Edge Devices.mp4 40.8 MB
- Black Hat USA/Black Hat USA 2014/video/Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions.mp4 40.8 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Enforcer - Timothy Mullen.mp4 40.8 MB
- Black Hat USA/Black Hat USA 2009/video/CSO Panel Black Hat Strategy Meeting - Panel.mp4 40.8 MB
- Black Hat Asia/Black Hat Singapore 2014/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 2 by Jose Miguel Esparza.mp4 40.7 MB
- Black Hat USA/Black Hat USA 2013/video/Android - One Root to Own them All.mp4 40.7 MB
- Black Hat Europe/Black Hat Europe 2020/Shield with Hole New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy.mp4 40.7 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.mp4 40.7 MB
- Black Hat Europe/Black Hat Europe 2019/BlueMaster Bypassing and Fixing Bluetooth-based Proximity Authentication.mp4 40.7 MB
- Black Hat USA/Black Hat USA 2016/Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency.mp4 40.6 MB
- Black Hat USA/Black Hat USA 2016/Iran's Soft-War for Internet Dominance.mp4 40.6 MB
- Black Hat Asia/Black Hat Singapore 2017/Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud.mp4 40.6 MB
- Black Hat Asia/Black Hat Singapore 2020/BitLeaker Subverting BitLocker with One Vulnerability.mp4 40.6 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Richard Thieme - Masters of the Unseen The Art of Information Warfare.mp4 40.6 MB
- Black Hat USA/Black Hat USA 2016/Timing Attacks Have Never Been So Practical - Advanced Cross-Site Search Attacks.mp4 40.6 MB
- Black Hat USA/Black Hat USA 2016/Beyond the Mcse - Active Directory for the Security Professional.mp4 40.6 MB
- Black Hat Asia/Black Hat Singapore 2016/Locknote - Conclusions and Key Takeaways from Black Hat Asia 2016.mp4 40.6 MB
- Black Hat USA/Black Hat USA 2000/video/Rooster and JD Glaser - Defending Your Network With Active Directory Services.mp4 40.6 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Attacking the Linux PRNG on Android.mp4 40.6 MB
- Black Hat USA/Black Hat USA 2004/Hacker Court 04 Pirates of the Potomac.mp4 40.6 MB
- Black Hat USA/Black Hat USA 2017/Tracking Ransomware End to End.mp4 40.6 MB
- Black Hat USA/Black Hat USA 2022/A New Trend for the Blue Team Using a Symbolic Engine to Detect Evasive Forms of Malware Ransomware.mp4 40.5 MB
- Black Hat USA/Black Hat USA 2002/video/The Honeynet Project - 2nd Generation Honeynet Technologies.mp4 40.5 MB
- Black Hat Asia/Black Hat Singapore 2023/Dirty Stream Attack, Turning Android Share Targets Into Attack Vectors.mp4 40.5 MB
- Black Hat USA/Black Hat USA 2024/One Hack to Rule Them All Pervasive Account Takeovers in Integration Platforms.mp4 40.5 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Stumping the Mobile Chipset.mp4 40.5 MB
- Black Hat DC/Black Hat DC 2011/Video/Forgotten World - Corporate Business Application Systems - Alexander Polyakov.mp4 40.5 MB
- Black Hat USA/Black Hat USA 2014/video/Hacking the Wireless World with Software Defined Radio - 2.0.mp4 40.5 MB
- Black Hat USA/Black Hat USA 2015/video/Understanding And Managing Entropy Usage.mp4 40.5 MB
- Black Hat USA/Black Hat USA 2021/With Friends Like eBPF, Who Needs Enemies.mp4 40.5 MB
- Black Hat Europe/Black Hat Europe 2023/Attacking NPUs of Multiple Platforms.mp4 40.5 MB
- Black Hat USA/Black Hat USA 2014/video/Capstone - Next Generation Disassembly Framework.mp4 40.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Workshop - Teensy Programming for Everyone.mp4 40.5 MB
- Black Hat USA/Black Hat USA 2016/The Art of Reverse Engineering Flash Exploits.mp4 40.4 MB
- Black Hat Asia/Black Hat Singapore 2020/The Black Hat NOC Greatest Hits and HolyCows.mp4 40.4 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.mp4 40.4 MB
- Black Hat Europe/Black Hat Europe 2020/Please Make a Dentist Appointment ASAP Attacking IOBluetoothFamily HCI and Vendor-Specific Commands.mp4 40.4 MB
- Black Hat USA/Black Hat USA 2016/Pay No Attention to That Hacker Behind the Curtain - A Look Inside the Black Hat Network.mp4 40.4 MB
- Black Hat Asia/Black Hat Singapore 2022/The Hidden RCE Surfaces That Control the Droids.mp4 40.4 MB
- Black Hat USA/Black Hat USA 2022/The Battle Against the Billion - Scale Internet Underground Industry Advertising Fraud Detection.mp4 40.3 MB
- Black Hat USA/Black Hat USA 2014/video/Bitcoin Transaction Malleability Theory in Practice.mp4 40.3 MB
- Black Hat Europe/Black Hat Europe 2023/A World-View of IP Spoofing in L4 Volumetric DoS Attacks - and a Call to Enable BCP38.mp4 40.3 MB
- Black Hat USA/Black Hat USA 2019/Hacking Ten Million Useful Idiots Online Propaganda as a Socio-Technical Security Project.mp4 40.3 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Falling Domino's - Kevin McPeake, Wouter Aukema.mp4 40.2 MB
- Black Hat USA/Black Hat USA 2013/video/UART THOU MAD.mp4 40.2 MB
- Black Hat USA/Black Hat USA 2016/Demystifying the Secure Enclave Processor.mp4 40.2 MB
- Black Hat Asia/Black Hat Singapore 2023/You Can Run, but You Can't Hide - Finding the Footprints of Hidden Shellcode.mp4 40.1 MB
- Black Hat USA/Black Hat USA 2013/video/Post Exploitation Operations with Cloud Synchronization.mp4 40.1 MB
- Black Hat USA/Black Hat USA 2021/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.mp4 40.1 MB
- Black Hat USA/Black Hat USA 2014/video/The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them.mp4 40.1 MB
- Black Hat USA/Black Hat USA 2003/video/Matthew Franz and Sean Convery - BGP Vulnerability Testing.mp4 40.1 MB
- Black Hat Asia/Black Hat Singapore 2024/The Hole in Sandbox Escape Modern Web-Based App Sandbox From Site-Isolation Perspective.mp4 40.1 MB
- Black Hat Asia/Black Hat Singapore 2017/Cache Side Channel Attack - Exploitability and Countermeasures.mp4 40.1 MB
- Black Hat Asia/Black Hat Singapore 2015/The Nightmare Behind The Cross Platform Mobile Apps Dream.mp4 40.0 MB
- Black Hat Asia/Black Hat Singapore 2024/What the TrustZone-M Doesn't See, the MCU Does Grieve Over Lessons Learned.mp4 40.0 MB
- Black Hat USA/Black Hat USA 2024/Compromising Confidential Compute, One Bug at a Time.mp4 40.0 MB
- Black Hat Europe/Black Hat Europe 2024/Security analysis of Residential Gateways and ISPs global network domination is (sneakily) possible.mp4 40.0 MB
- Black Hat USA/Black Hat USA 2020/Election Security Securing America's Future.mp4 39.9 MB
- Black Hat USA/Black Hat USA 2022/ELF Section Docking Revisiting Stageless Payload Delivery.mp4 39.9 MB
- Black Hat USA/Black Hat USA 2009/video/Fighting Russian Cybercrime Mobsters - Dmitri Alperovitch.mp4 39.9 MB
- Black Hat USA/Black Hat USA 2011/video/Post Memory Corruption Memory Analysis - Jonathan Brossard.mp4 39.9 MB
- Black Hat USA/Black Hat USA 2016/Pwnie Awards 2016.mp4 39.9 MB
- Black Hat USA/Black Hat USA 2006/video/Panel - Jericho Forum.mp4 39.9 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Cybercrime in The Deep Web.mp4 39.9 MB
- Black Hat DC/Black Hat DC 2011/Video/De-Anonymizing Live CDs through Physical Memory Analysis - Andrew Case.mp4 39.9 MB
- Black Hat USA/Black Hat USA 2016/Hackproofing Oracle Ebusiness Suite.mp4 39.9 MB
- Black Hat USA/Black Hat USA 2015/video/Breaking HTTPS With BGP Hijacking.mp4 39.8 MB
- Black Hat USA/Black Hat USA 2003/video/Chuck Willis - Forensics with Linux 101.mp4 39.7 MB
- Black Hat USA/Black Hat USA 2024/Remote, One-Click, Breaking through Smartphones via a Non Well-Known Remote Attack Surface.mp4 39.6 MB
- Black Hat USA/Black Hat USA 2024/Unveiling Mac Security A Comprehensive Exploration of Sandboxing and AppData TCC.mp4 39.6 MB
- Black Hat USA/Black Hat USA 2011/video/Security When Nano-Seconds Count - James Arlen.mp4 39.6 MB
- Black Hat Europe/Black Hat Europe 2014/Video/ret2dir - Deconstructing Kernel Isolation.mp4 39.6 MB
- Black Hat USA/Black Hat USA 2016/Capturing 0Day Exploits With Perfectly Placed Hardware Traps.mp4 39.5 MB
- Black Hat Asia/Black Hat Singapore 2017/Hack Microsoft Using Microsoft Signed Binaries.mp4 39.5 MB
- Black Hat Asia/Black Hat Singapore 2020/ZombieLoad Leaking Data on Intel CPUs.mp4 39.5 MB
- Black Hat USA/Black Hat USA 2019/Rogue7 Rogue Engineering-Station Attacks on S7 Simatic PLCs.mp4 39.5 MB
- Black Hat Europe/Black Hat Europe 2016/videos/WiFi-Based IMSI Catcher.mp4 39.5 MB
- Black Hat USA/Black Hat USA 2021/The Devil is in the GAN Defending Deep Generative Models Against Adversarial Attacks.mp4 39.5 MB
- Black Hat USA/Black Hat USA 2019/Lessons and Lulz The 5th Annual Black Hat USA NOC Report.mp4 39.5 MB
- Black Hat USA/Black Hat USA 2022/IAM The One Who Knocks.mp4 39.5 MB
- Black Hat Europe/Black Hat Europe 2023/CollidePower The Evolution of Software-based Power Side-Channels Attacks.mp4 39.4 MB
- Black Hat USA/Black Hat USA 2015/video/Dance Like Nobodys Watching Encrypt Like Everyone Is A Peek Inside The BlackHat.mp4 39.4 MB
- Black Hat USA/Black Hat USA 2009/video/I Just Found 10 Million SSNs - Alessandro Acquisti.mp4 39.4 MB
- Black Hat Asia/Black Hat Singapore 2020/Complexity Killed Security.mp4 39.4 MB
- Black Hat USA/Black Hat USA 2024/Listen to the Whispers Web Timing Attacks that Actually Work.mp4 39.4 MB
- Black Hat Europe/Black Hat Europe 2023/How I Learned to Stop Worrying and Build a Modern Detection & Response Program.mp4 39.4 MB
- Black Hat USA/Black Hat USA 2024/From Exploits to Forensics Evidence - Unraveling the Unitronics Attack.mp4 39.4 MB
- Black Hat Asia/Black Hat Singapore 2015/From Zero to Secure in One Minute.mp4 39.4 MB
- Black Hat USA/Black Hat USA 2011/video/Exploiting USB Devices with Arduino - Greg Ose.mp4 39.3 MB
- Black Hat USA/Black Hat USA 2024/ICS Risk Strategies for Assessing Operational, Safety, Financial, and Cybersecurity Risks.mp4 39.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.mp4 39.3 MB
- Black Hat USA/Black Hat USA 2024/All Your Secrets Belong to Us Leveraging Firmware Bugs to Break TEEs.mp4 39.2 MB
- Black Hat Asia/Black Hat Singapore 2020/The Evil Alt-Ego (ab)using HTTP Alternative Services.mp4 39.2 MB
- Black Hat Europe/Black Hat Europe 2016/videos/ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.mp4 39.1 MB
- Black Hat USA/Black Hat USA 2011/video/Don’t Drop the SOAP Real World Web Service Testing for Web Hackers - Tom Eston, Joshua Abraham.mp4 39.1 MB
- Black Hat USA/Black Hat USA 2020/Office Drama on macOS.mp4 39.1 MB
- Black Hat USA/Black Hat USA 2021/FragAttacks Breaking Wi-Fi through Fragmentation and Aggregation.mp4 39.1 MB
- Black Hat Asia/Black Hat Singapore 2024/From BYOVD to a 0-day Unveiling Advanced Exploits in Cyber Recruiting Scams.mp4 39.1 MB
- Black Hat Asia/Black Hat Singapore 2022/DroidGuard A Deep Dive into SafetyNet.mp4 39.1 MB
- Black Hat Europe/Black Hat Europe 2015/videos/(In-)Security of Backend-As-A-Service.mp4 39.0 MB
- Black Hat DC/Black Hat DC 2010/Enhancing ZFS in the Kernel - Soy Christian Kendi.mp4 39.0 MB
- Black Hat DC/Black Hat DC 2010/Unmanned Aerial Vehicles - Exploit Automation with the Metasploit Framework - James Lee.mp4 39.0 MB
- Black Hat USA/Black Hat USA 2016/Applied Machine Learning for Data Exfil and Other Fun Topics.mp4 39.0 MB
- Black Hat USA/Black Hat USA 2017/Ichthyology - Phishing as a Science.mp4 38.9 MB
- Black Hat USA/Black Hat USA 2017/PEIMA - Harnessing Power Laws to Detect Malicious Activities.mp4 38.9 MB
- Black Hat USA/Black Hat USA 2024/Tunnel Vision Exploring VPN Post-Exploitation Techniques.mp4 38.9 MB
- Black Hat Asia/Black Hat Singapore 2017/The UEFI Firmware Rootkits - Myths and Reality.mp4 38.9 MB
- Black Hat USA/Black Hat USA 2022/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen - based Devices.mp4 38.9 MB
- Black Hat Asia/Black Hat Singapore 2014/The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling.mp4 38.9 MB
- Black Hat USA/Black Hat USA 2024/Project Zero Ten Years of 'Make 0-Day Hard'.mp4 38.9 MB
- Black Hat USA/Black Hat USA 2022/Leveraging the Apple ESF for Behavioral Detections.mp4 38.9 MB
- Black Hat USA/Black Hat USA 2016/Towards a Holistic Approach in Building Intelligence to Fight Crimeware.mp4 38.9 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/0312190-surestream-16-28-56.rm 38.9 MB
- Black Hat USA/Black Hat USA 2009/video/A Black Hat Vulnerability Risk Assessment - Panel.mp4 38.9 MB
- Black Hat USA/Black Hat USA 2009/video/The Language of Trust - Mark Dowd, Ryan Smith, David Dewey.mp4 38.8 MB
- Black Hat Europe/Black Hat Europe 2019/Reverse Engineering and Exploiting Builds in the Cloud.mp4 38.8 MB
- Black Hat USA/Black Hat USA 2013/video/Hunting the Shadows - In-Depth Analysis of Escalated APT Attacks.mp4 38.8 MB
- Black Hat Asia/Black Hat Singapore 2016/DSCOMPROMISED - A Windows DSC Attack Framework.mp4 38.8 MB
- Black Hat USA/Black Hat USA 2022/CastGuard Mitigating Type Confusion in C.mp4 38.8 MB
- Black Hat Europe/Black Hat Europe 2020/IAM Concerned OAuth Token Hijacking in Google Cloud (GCP).mp4 38.8 MB
- Black Hat USA/Black Hat USA 2016/Cunning With CNG - Soliciting Secrets From Schannel.mp4 38.8 MB
- Black Hat USA/Black Hat USA 2016/Into the Core - In-Depth Exploration of Windows 10 IoT Core.mp4 38.8 MB
- Black Hat Europe/Black Hat Europe 2016/videos/How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing.mp4 38.8 MB
- Black Hat USA/Black Hat USA 2015/video/Breaking Access Controls With BLEKey.mp4 38.8 MB
- Black Hat DC/Black Hat DC 2011/Video/The Baseband Apocalypse - All Your Baseband Are Belong To Us - Ralf-Philipp Weinmann.mp4 38.7 MB
- Black Hat USA/Black Hat USA 2024/Modern Anti-Abuse Mechanisms in Competitive Video Games.mp4 38.7 MB
- Black Hat USA/Black Hat USA 2016/An Insider's Guide to Cyber-Insurance and Security Guarantees.mp4 38.7 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare.mp4 38.7 MB
- Black Hat DC/Black Hat DC 2010/Malware analysis for the enterprise - Jason Ross.mp4 38.7 MB
- Black Hat Asia/Black Hat Singapore 2014/AIS Exposed. Understanding Vulnerabilities and Attacks 2.0 by Marco Balduzzi.mp4 38.6 MB
- Black Hat Europe/Black Hat Europe 2021/From Logic to Memory Winning the Solitaire in Reparse Points.mp4 38.6 MB
- Black Hat Asia/Black Hat Singapore 2015/Slime - Automated Anti-Sandboxing Disarmament System.mp4 38.6 MB
- Black Hat Europe/Black Hat Europe 2024/Guest Revolution Chaining 3-bugs to compromise the Windows kernel from the VMware guest.mp4 38.6 MB
- Black Hat Asia/Black Hat Singapore 2016/Automated Dynamic Fireware Analysis At Scale - A Case Study on Embedded Web Interfaces.mp4 38.6 MB
- Black Hat USA/Black Hat USA 2014/video/Saving Cyberspace by Jason Healey.mp4 38.5 MB
- Black Hat Asia/Black Hat Singapore 2015/Forging the USB Armory.mp4 38.5 MB
- Black Hat Europe/Black Hat Europe 2020/Hacking Government Cybersecurity.mp4 38.5 MB
- Black Hat Europe/Black Hat Europe 2021/ChaosDB How We Hacked Databases of Thousands of Azure Customers (rev).mp4 38.5 MB
- Black Hat USA/Black Hat USA 2024/Windows Downdate Downgrade Attacks Using Windows Updates.mp4 38.4 MB
- Black Hat Europe/Black Hat Europe 2018/Video Killed the Text Star OSINT Approach.mp4 38.4 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Harit-Breaking-Bad-Stealing-Patient-Data-Through-Medical-Devices.pdf 38.4 MB
- Black Hat USA/Black Hat USA 2024/Overcoming State Finding Baseband Vulnerabilities by Fuzzing Layer-2.mp4 38.4 MB
- Black Hat USA/Black Hat USA 2014/video/The Library of Sparta.mp4 38.4 MB
- Black Hat USA/Black Hat USA 2011/video/Server-Side JavaScript Injection Attacking and Defending NoSQL and Node.js - Bryan Sullivan.mp4 38.4 MB
- Black Hat DC/Black Hat DC 2010/Connection String Attack - Chema Alonso & Palako.mp4 38.3 MB
- Black Hat USA/Black Hat USA 2014/video/Pivoting in Amazon Clouds.mp4 38.3 MB
- Black Hat USA/Black Hat USA 2022/TruEMU An Extensible, Open - Source, Whole - System iOS Emulator.mp4 38.3 MB
- Black Hat Asia/Black Hat Singapore 2022/The Next Gen PlugX ShadowPad A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT.mp4 38.3 MB
- Black Hat USA/Black Hat USA 2013/video/Mainframes - The Past Will Come to Haunt You.mp4 38.3 MB
- Black Hat DC/Black Hat DC 2010/Exploiting Lawful Interception to Wiretap the Internet.mp4 38.2 MB
- Black Hat USA/Black Hat USA 2020/Detecting Access Token Manipulation.mp4 38.2 MB
- Black Hat USA/Black Hat USA 2011/video/Trillions of Lines of Code and Counting Securing Applications At Scale - Jeremiah Grossman, Brad Arkin, Alex Hutton, Adrain Lane, John Johnson.mp4 38.2 MB
- Black Hat USA/Black Hat USA 2021/Another Road Leads to the Host From a Message to VM Escape on Nvidia vGPU.mp4 38.2 MB
- Black Hat USA/Black Hat USA 2021/MFA-ing the Un-MFA-ble Protecting Auth Systems' Core Secrets.mp4 38.2 MB
- Black Hat USA/Black Hat USA 2015/video/How To Hack Government Technologists As Policy Makers.mp4 38.1 MB
- Black Hat USA/Black Hat USA 2022/Elevating Kerberos to the Next Level.mp4 38.1 MB
- Black Hat USA/Black Hat USA 2016/When the Cops Come A-Knocking - Handling Technical Assistance Demands from Law Enforcement.mp4 38.1 MB
- Black Hat USA/Black Hat USA 2011/video/War Texting Weaponizing Machine 2 Machine - Don Bailey.mp4 38.1 MB
- Black Hat Europe/Black Hat Europe 2018/DeepPhish Simulating Malicious AI.mp4 38.1 MB
- Black Hat Asia/Black Hat Singapore 2023/Operation Clairvoyance How APT Groups Spy on the Media Industry.mp4 38.1 MB
- Black Hat USA/Black Hat USA 2024/Strengthen Cyber-security by Leveraging Cyber-Insurance.mp4 38.0 MB
- Black Hat Asia/Black Hat Singapore 2022/AMSI & Bypass Review of Known AMSI Bypass Techniques and Introducing a New One.mp4 38.0 MB
- Black Hat Asia/Black Hat Singapore 2015/Relaying EMV Contactless Transactions Using Off-The-Self Android Devices.mp4 38.0 MB
- Black Hat Europe/Black Hat Europe 2023/New Techniques for Split-Second DNS Rebinding.mp4 38.0 MB
- Black Hat USA/Black Hat USA 2020/Practical Defenses Against Adversarial Machine Learning.mp4 38.0 MB
- Black Hat USA/Black Hat USA 2024/The Fundamentals of Cyber-Insurance.mp4 38.0 MB
- Black Hat USA/Black Hat USA 2016/Pangu 9 Internals.mp4 38.0 MB
- Black Hat USA/Black Hat USA 2022/Whip the Whisperer Simulating Side Channel Leakage.mp4 38.0 MB
- Black Hat Europe/Black Hat Europe 2024/Main Stage Understanding and Reducing Supply Chain and Software Vulnerability Risks.mp4 38.0 MB
- Black Hat USA/Black Hat USA 2016/Hardening AWS Environments and Automating Incident Response for AWS Compromises.mp4 38.0 MB
- Black Hat Europe/Black Hat Europe 2024/The Bugs in Your Bootloaders Embedded Device Secure Boot Fails and How to Fix Them.mp4 38.0 MB
- Black Hat USA/Black Hat USA 2009/video/Practical Windows XP2003 Heap Exploitation - John McDonald, Chris Valasek.mp4 37.9 MB
- Black Hat Asia/Black Hat Singapore 2022/AutoSpear Towards Automatically Bypassing and Inspecting Web Application Firewalls.mp4 37.9 MB
- Black Hat Europe/Black Hat Europe 2021/Windows Defender - Demystifying and Bypassing ASR by Understanding the AV's Signatures.mp4 37.9 MB
- Black Hat Asia/Black Hat Singapore 2024/The Fault in Our Metrics Rethinking How We Measure Detection & Response.mp4 37.9 MB
- Black Hat USA/Black Hat USA 2009/video/Global Spying - Steve Topletz, Jonathan Logan, Kyle Williams.mp4 37.9 MB
- Black Hat USA/Black Hat USA 2021/Reverse Engineering the M1.mp4 37.8 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/03121901-surestream-16-28-56.rm 37.8 MB
- Black Hat USA/Black Hat USA 2013/video/Javascript Static Security Analysis Made Easy with JSPrime.mp4 37.8 MB
- Black Hat Europe/Black Hat Europe 2021/Hardware Security Module - Executing Unsigned Code in HSM TEE.mp4 37.8 MB
- Black Hat USA/Black Hat USA 2022/Kubernetes Privilege Escalation Container Escape == Cluster Admin.mp4 37.8 MB
- Black Hat Europe/Black Hat Europe 2021/Hand in Your Pocket Without You Noticing Current State of Mobile Wallet Security.mp4 37.8 MB
- Black Hat USA/Black Hat USA 2003/video/Larry Leibrock - Digital Information,User Tokens,Privacy and Forensics Investigation.mp4 37.7 MB
- Black Hat Europe/Black Hat Europe 2020/My Ticks Don't Lie New Timing Attacks for Hypervisor Detection.mp4 37.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_C3.mp3 37.7 MB
- Black Hat USA/Black Hat USA 2024/The Overlooked Attack Surface Diving into Windows Client Components for RCE Vulnerabilities.mp4 37.7 MB
- Black Hat USA/Black Hat USA 2019/I'm Unique, Just Like You Human Side-Channels and Their Implications for Security and Privacy.mp4 37.6 MB
- Black Hat USA/Black Hat USA 2016/Analysis of the Attack Surface of Windows 10 Virtualization-Based Security.mp4 37.6 MB
- Black Hat DC/Black Hat DC 2010/Security Testing Best Practiceson complex File Format Fuzzing - Qing Wang.mp4 37.6 MB
- Black Hat USA/Black Hat USA 2019/The Path Less Traveled Abusing Kubernetes Defaults.mp4 37.6 MB
- Black Hat USA/Black Hat USA 2009/video/DC Panel Update from Washington - Panel.mp4 37.6 MB
- Black Hat USA/Black Hat USA 2014/video/Stay Out of the Kitchen - A DLP Security Bake-Off.mp4 37.6 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Malicious PDF Analysis.mp4 37.6 MB
- Black Hat USA/Black Hat USA 2021/5G IMSI Catchers Mirage5G IMSI Catchers Mirage.mp4 37.6 MB
- Black Hat USA/Black Hat USA 2019/Sensor and Process Fingerprinting in Industrial Control Systems.mp4 37.6 MB
- Black Hat USA/Black Hat USA 2014/video/Protecting Data In-Use from Firmware and Physical Attacks.mp4 37.6 MB
- Black Hat USA/Black Hat USA 2009/video/Cloudburst - Hacking 3D and Breaking Out of VMware - Kostya Kortchinsky.mp4 37.6 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.mp4 37.6 MB
- Black Hat Europe/Black Hat Europe 2021/The Data Distribution Service (DDS) Protocol is Critical Let's Use it Securely.mp4 37.5 MB
- Black Hat DC/Black Hat DC 2011/Video/Exploiting Smart-Phone USB Connectivity For Fun And Profit - Angelos Stavrou & Zhaohui Wang.mp4 37.5 MB
- Black Hat USA/Black Hat USA 2015/video/HI THIS IS URGENT PLZ FIX ASAP Critical Vulnerabilities And Bug Bounty Programs.mp4 37.5 MB
- Black Hat USA/Black Hat USA 2021/Disinformation At Scale Using GPT-3 Maliciously for Information Operations.mp4 37.5 MB
- Black Hat USA/Black Hat USA 2009/video/Weaponizing the Web - Nathan Hamiel, Shawn Moyer.mp4 37.5 MB
- Black Hat USA/Black Hat USA 2016/Crippling HTTPs With Unholy PAC.mp4 37.5 MB
- Black Hat DC/Black Hat DC 2011/Video/Counterattack - Turning the tables on exploitation attempts from tools like metasploit - scriptjunkie.mp4 37.5 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.mp4 37.5 MB
- Black Hat USA/Black Hat USA 2013/video/SSL, Gone in 30 Seconds - A BREACH beyond CRIME.mp4 37.5 MB
- Black Hat USA/Black Hat USA 2022/Breaking Firmware Trust From Pre - EFI Exploiting Early Boot Phases.mp4 37.4 MB
- Black Hat USA/Black Hat USA 2021/Security Analysis of CHERI ISASecurity Analysis of CHERI ISA.mp4 37.4 MB
- Black Hat USA/Black Hat USA 2016/Pwning Your Java Messaging With Deserialization Vulnerabilities.mp4 37.4 MB
- Black Hat Asia/Black Hat Singapore 2017/24 Techniques to Gather Threat Intel and Track Actors.mp4 37.4 MB
- Black Hat USA/Black Hat USA 2016/Adaptive Kernel Live Patching - An Open Collaborative Effort.mp4 37.4 MB
- Black Hat USA/Black Hat USA 2015/video/Bring Back The Honeypots.mp4 37.4 MB
- Black Hat USA/Black Hat USA 2015/video/The Kali Linux Dojo Workshop #2 Kali USB Setups With Persistent Stores & LUKS N.mp4 37.4 MB
- Black Hat Asia/Black Hat Singapore 2021/Vibe Check IDK About This. Why Students May Shy Away From Cyber in a Surveillance State.mp4 37.3 MB
- Black Hat USA/Black Hat USA 2021/Come to the Dark Side, We Have Apples Turning macOS Management Evil.mp4 37.3 MB
- Black Hat Asia/Black Hat Singapore 2024/SystemUI As EvilPiP The Hijacking Attacks on Modern Mobile Devices.mp4 37.3 MB
- Black Hat USA/Black Hat USA 2021/Cloudy with a Chance of APT Novel Microsoft 365 Attacks in the Wild.mp4 37.3 MB
- Black Hat Europe/Black Hat Europe 2019/Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction.mp4 37.3 MB
- Black Hat USA/Black Hat USA 2016/GreatFET - Making GoodFET Great Again.mp4 37.2 MB
- Black Hat USA/Black Hat USA 2009/video/Economics and the Underground Economy - Cormac Herley.mp4 37.2 MB
- Black Hat Asia/Black Hat Singapore 2016/Keynote - Devaluing Attack - Disincentivizing Threats Against The Next Billion Devices.mp4 37.2 MB
- Black Hat USA/Black Hat USA 2021/Over the Air Baseband Exploit Gaining Remote Code Execution on 5G Smartphones.mp4 37.2 MB
- Black Hat USA/Black Hat USA 2015/video/Stagefright Scary Code In The Heart Of Android.mp4 37.1 MB
- Black Hat USA/Black Hat USA 2016/The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM.mp4 37.1 MB
- Black Hat Asia/Black Hat Singapore 2018/Securing Your In-Ear-Fitness Coach Challenges in Hardening Next Generation Wearables.mp4 37.1 MB
- Black Hat USA/Black Hat USA 2024/Becoming Cybersecurity Bilingual Effective Communication for Hackers.mp4 37.1 MB
- Black Hat Asia/Black Hat Singapore 2017/Mobile-Telephony Threats in Asia.mp4 37.1 MB
- Black Hat USA/Black Hat USA 2019/New Vulnerabilities in 5G Networks.mp4 37.0 MB
- Black Hat Europe/Black Hat Europe 2019/Fatal Fury on ESP32 Time to Release Hardware Exploits.mp4 37.0 MB
- Black Hat USA/Black Hat USA 2016/Drone Attacks on Industrial Wireless - A New Front in Cyber Security.mp4 37.0 MB
- Black Hat USA/Black Hat USA 2022/The Growth of Global Election Disinformation The Role Methodology of Government - linked Cyber Actors.mp4 37.0 MB
- Black Hat USA/Black Hat USA 2011/video/Smartfuzzing the Web Carpe Vestra Foramina - Nathan Hamiel, Justin Engler, Seth Law, Gregory Fleischer.mp4 37.0 MB
- Black Hat USA/Black Hat USA 2009/video/Veiled - A Browser Based Darknet - Billy Hoffman, Matt Wood.mp4 37.0 MB
- Black Hat USA/Black Hat USA 2015/video/Abusing XSLT For Practical Attacks.mp4 37.0 MB
- Black Hat USA/Black Hat USA 2022/Dive Into Apple IO80211Family Vol. 2.mp4 36.9 MB
- Black Hat USA/Black Hat USA 2016/Horse Pill - A New Type of Linux Rootkit.mp4 36.9 MB
- Black Hat Asia/Black Hat Singapore 2023/Phoenix Domain Attack Vulnerable Links in Domain Name Delegation and Revocation.mp4 36.9 MB
- Black Hat USA/Black Hat USA 2014/video/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.mp4 36.9 MB
- Black Hat Europe/Black Hat Europe 2020/How Embedded TCP IP Stacks Breed Critical Vulnerabilities.mp4 36.9 MB
- Black Hat Europe/Black Hat Europe 2021/They Hacked Thousands of Cloud Accounts Then Sent Us Weird GIFs.mp4 36.9 MB
- Black Hat Asia/Black Hat Singapore 2014/Persist It - Using and Abusing Microsoft's Fix It Patches by Jon Erickson.mp4 36.8 MB
- Black Hat Asia/Black Hat Singapore 2015/Decentralized Malware on The Blockchain.mp4 36.8 MB
- Black Hat USA/Black Hat USA 2009/video/Exploratory Android Surgery - Jesse Burns.mp4 36.8 MB
- Black Hat USA/Black Hat USA 2001/video/Lance Spitzner - The Honey Net Project.mp4 36.8 MB
- Black Hat Asia/Black Hat Singapore 2015/Manna from Heaven - Improving the State of Wireless Rogue AP Attacks.mp4 36.8 MB
- Black Hat USA/Black Hat USA 2008/video/The Internet is Broken Beyond Document.Cookie - Extreme Client-side Exploitation - Nathan McFeters, Rob Carter, John Heasman.mp4 36.8 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_PN4.mp3 36.8 MB
- Black Hat USA/Black Hat USA 2024/Break the Wall from Bottom Automated Discovery of Protocol-Level Evasion Vulnerabilities.mp4 36.8 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/AFEv2-Gupta.zip 36.8 MB
- Black Hat Asia/Black Hat Singapore 2021/Give Me a SQL Injection, I Shall PWN IIS and SQL Server.mp4 36.8 MB
- Black Hat USA/Black Hat USA 2024/SnailLoad Anyone on the Internet Can Learn What You're Doing.mp4 36.8 MB
- Black Hat USA/Black Hat USA 2006/video/Moore - Metasploit Reloaded.mp4 36.7 MB
- Black Hat USA/Black Hat USA 2024/Securing Network Appliances New Technologies and Old Challenges.mp4 36.7 MB
- Black Hat USA/Black Hat USA 2022/Controlling the Source Abusing Source Code Management Systems.mp4 36.7 MB
- Black Hat USA/Black Hat USA 2016/When Governments Attack - State Sponsored Malware Attacks Against Activists Lawyers and Journalists.mp4 36.7 MB
- Black Hat Asia/Black Hat Singapore 2016/The Tactical Application Security Program - Getting Stuff Done.mp4 36.7 MB
- Black Hat USA/Black Hat USA 2020/Fooling Windows through Superfetch.mp4 36.7 MB
- Black Hat USA/Black Hat USA 2016/Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX.mp4 36.6 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_PN7.mp3 36.6 MB
- Black Hat USA/Black Hat USA 2024/OVPNX 4 Zero-Days Leading to RCE, LPE and KCE (via BYOVD) Affecting Millions of OpenVPN Endpoints.mp4 36.6 MB
- Black Hat Asia/Black Hat Singapore 2014/Owning a Building - Exploiting Access Control and Facility Management Systems by Billy Rios.mp4 36.6 MB
- Black Hat USA/Black Hat USA 2011/video/Reviving Smart Card Analysis - Karsten Nohl, Chris Tarnovsky.mp4 36.6 MB
- Black Hat USA/Black Hat USA 2011/video/Hacking .Net Applications The Black Arts - Jon McCoy.mp4 36.6 MB
- Black Hat USA/Black Hat USA 2009/video/Cloud Computing Models and Vulnerabilities - Raining on the Trendy New Parade - Alex Stamos, Andrew Becherer & Nathan Wilcox.mp4 36.6 MB
- Black Hat USA/Black Hat USA 2002/video/ian Goldberg - Off the Record Messaging.mp4 36.6 MB
- Black Hat USA/Black Hat USA 2002/video/Dennis Groves and Bill Pennington - Web Application Security.mp4 36.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ec10.mp3 36.5 MB
- Black Hat Europe/Black Hat Europe 2021/Picking Lockfiles Attacking & Defending Your Supply Chain.mp4 36.5 MB
- Black Hat USA/Black Hat USA 2010/Semiconductor Security Awareness Today and yesterday - Christopher Tarnovsky.mp4 36.5 MB
- Black Hat USA/Black Hat USA 2008/video/Bluetooth v2.1 - A New Security Infrastructure and New Vulnerabilities - Andrew Lindell.mp4 36.5 MB
- Black Hat Asia/Black Hat Singapore 2017/Go Get My Vulnerabilities.mp4 36.5 MB
- Black Hat USA/Black Hat USA 2015/video/The Tactical Application Security Program Getting Stuff Done.mp4 36.5 MB
- Black Hat USA/Black Hat USA 2024/Confusion Attacks Exploiting Hidden Semantic Ambiguity in Apache HTTP Server.mp4 36.4 MB
- Black Hat USA/Black Hat USA 2019/Infighting Among Russian Security Services in the Cyber Sphere.mp4 36.4 MB
- Black Hat USA/Black Hat USA 2024/Super Hat Trick Exploit Chrome and Firefox Four Times.mp4 36.4 MB
- Black Hat DC/Black Hat DC 2011/Video/How to Steal a Nuclear Warhead Without Voiding Your XBox Warranty - Intro to tamper evident devices, applications & circumvention - Jamie Schwettmann & Eric Michaud.mp4 36.4 MB
- Black Hat USA/Black Hat USA 2019/Chip.Fail - Glitching the Silicon of the Connected World.mp4 36.4 MB
- Black Hat Europe/Black Hat Europe 2023/When The Front Door Becomes a Backdoor The Security Paradox of OSDP.mp4 36.4 MB
- Black Hat USA/Black Hat USA 2020/Plundervolt Flipping Bits from Software without Rowhammer.mp4 36.4 MB
- Black Hat USA/Black Hat USA 2013/video/Bochspwn - Identifying 0-Days via System-Wide Memory Access Pattern Analysis.mp4 36.4 MB
- Black Hat USA/Black Hat USA 2018/Windows Offender - Reverse Engineering Windows Defender's Antivirus Emulator.mp4 36.4 MB
- Black Hat USA/Black Hat USA 2020/Industrial Protocol Gateways Under Analysis.mp4 36.4 MB
- Black Hat USA/Black Hat USA 2014/video/Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm.mp4 36.3 MB
- Black Hat USA/Black Hat USA 2015/video/Behind The Mask The Agenda, Tricks, & Tactics Of The Federal Trade Commission.mp4 36.3 MB
- Black Hat Asia/Black Hat Singapore 2024/Faults in Our Bus Novel Bus Fault Attack to Break Trusted Execution Environments.mp4 36.3 MB
- Black Hat USA/Black Hat USA 2002/video/Roger Dingledine - Why is Anonymity So Hard.mp4 36.3 MB
- Black Hat USA/Black Hat USA 2013/video/What s on the Wire - Physical Layer Tapping with Project Daisho.mp4 36.3 MB
- Black Hat USA/Black Hat USA 2022/All Your GNN Models and Data Belong to Me.mp4 36.3 MB
- Black Hat DC/Black Hat DC 2011/Video/Keynote - Cyber Conflicts - Challenging the Future - Pat Arnold.mp4 36.2 MB
- Black Hat USA/Black Hat USA 2015/video/Forging The USB Armory, An Open Source Secure Flash Drive Sized Computer.mp4 36.2 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 - PWNY Awards.mp4 36.2 MB
- Black Hat USA/Black Hat USA 2021/Sleight of ARM Demystifying Intel Houdini.mp4 36.2 MB
- Black Hat Asia/Black Hat Singapore 2018/return-to-csu A New Method to Bypass 64-bit Linux ASLR.mp4 36.2 MB
- Black Hat Asia/Black Hat Singapore 2018/XOM-switch Hiding Your Code from Advanced Code Reuse Attacks In One Shot.mp4 36.2 MB
- Black Hat USA/Black Hat USA 2017/They're Coming for Your Tools - Exploiting Design Flaws for Active Intrusion Prevention.mp4 36.2 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Day 2 Keynote - Security Through Distrusting.mp4 36.1 MB
- Black Hat USA/Black Hat USA 1999/video/Dr Mudge - Keynote.mp4 36.1 MB
- Black Hat USA/Black Hat USA 2019/Look, No Hands - The Remote, Interaction-less Attack Surface of the iPhone.mp4 36.1 MB
- Black Hat USA/Black Hat USA 2024/From Doxing to Doorstep Exposing Privacy Intrusion Techniques used by Hackers for Extortion.mp4 36.1 MB
- Black Hat USA/Black Hat USA 2020/Decade of the RATs - Custom Chinese Linux Rootkits for Everyone.mp4 36.1 MB
- Black Hat USA/Black Hat USA 2015/video/Hidden Risks Of Biometric Identifiers And How To Avoid Them.mp4 36.1 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-3-16-28-56.rm 36.1 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.mp4 36.1 MB
- Black Hat USA/Black Hat USA 2019/Denial of Service with a Fistful of Packets Exploiting Algorithmic Complexity Vulnerabilities.mp4 36.1 MB
- Black Hat Asia/Black Hat Singapore 2014/Building Trojan Hardware at Home by JP Dunning.mp4 36.1 MB
- Black Hat USA/Black Hat USA 2022/Attacks From a New Front Door in 4G & 5G Mobile Networks.mp4 36.1 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Even The Lastpass Will Be Stolen, Deal With It.mp4 36.0 MB
- Black Hat Europe/Black Hat Europe 2019/Chain of Fools An Exploration of Certificate Chain Validation Mishaps.mp4 36.0 MB
- Black Hat USA/Black Hat USA 2022/Industroyer2 Sandworm's Cyberwarfare Targets Ukraine's Power Grid Again.mp4 36.0 MB
- Black Hat USA/Black Hat USA 2016/AirBnBeware - Short Term Rentals Long Term Pwnage.mp4 36.0 MB
- Black Hat USA/Black Hat USA 2019/Securing the System A Deep Dive into Reversing Android Pre-Installed Apps.mp4 36.0 MB
- Black Hat USA/Black Hat USA 2013/video/Buying into the Bias - Why Vulnerability Statistics Suck.mp4 36.0 MB
- Black Hat Asia/Black Hat Singapore 2022/Backdooring of Real Time Automotive OS Devices.mp4 35.9 MB
- Black Hat USA/Black Hat USA 2024/Unraveling the Mind Behind the APT - Analyzing the Role of Pretexting in CTI and Attribution.mp4 35.9 MB
- Black Hat Asia/Black Hat Singapore 2020/Back to the Future. Cross-Protocol Attacks in the Era of 5G.mp4 35.9 MB
- Black Hat USA/Black Hat USA 2015/video/Unicorn Next Generation CPU Emulator Framework.mp4 35.9 MB
- Black Hat Asia/Black Hat Singapore 2020/CDPwn Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days.mp4 35.9 MB
- Black Hat Windows/Black Hat Windows 2001/Video/The Black Hat Time Machine What Happens Next Year - Panel.mp4 35.9 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).mp4 35.9 MB
- Black Hat Europe/Black Hat Europe 2024/AML Injection Attacks on Confidential VMs.mp4 35.9 MB
- Black Hat Asia/Black Hat Singapore 2016/Practical New Developments in The Breach Attack.mp4 35.9 MB
- Black Hat USA/Black Hat USA 2016/Hell on Earth - From Browser to System Compromise.mp4 35.9 MB
- Black Hat USA/Black Hat USA 2020/Remote Timing Attacks on TPMs, AKA TPM-Fail.mp4 35.8 MB
- Black Hat Europe/Black Hat Europe 2011/Video/Black Hat Europe 2011 - Keynote - Bruce Schneier.mp4 35.8 MB
- Black Hat DC/Black Hat DC 2011/Video/Active Exploitation Detection - Marc Eisenbarth.mp4 35.8 MB
- Black Hat USA/Black Hat USA 2022/Glitched on Earth by Humans A Black - Box Security Evaluation of the SpaceX Starlink User Terminal.mp4 35.8 MB
- Black Hat Asia/Black Hat Singapore 2017/The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents.mp4 35.8 MB
- Black Hat USA/Black Hat USA 2024/Navigating the Complex Challenges of Setting Up Efficient and Robust OT SOC Capabilities.mp4 35.7 MB
- Black Hat USA/Black Hat USA 2022/No One Is Entitled to Their Own Facts, Except in Cybersecurity.mp4 35.7 MB
- Black Hat USA/Black Hat USA 2014/video/Prevalent Characteristics in Modern Malware.mp4 35.7 MB
- Black Hat Asia/Black Hat Singapore 2016/PLC Blaster - A worm Living Solely In The PLC.mp4 35.7 MB
- Black Hat Europe/Black Hat Europe 2020/It's not FINished The Evolving Maturity in Ransomware Operations.mp4 35.7 MB
- Black Hat USA/Black Hat USA 2017/Web Cache Deception Attack.mp4 35.7 MB
- Black Hat USA/Black Hat USA 2011/video/Vulnerabilities of Wireless Water Meter Networks - John McNabb.mp4 35.7 MB
- Black Hat USA/Black Hat USA 2009/video/A 16-bit Rootkit and Second Generation Zigbee Chips -Travis Goodspeed.mp4 35.6 MB
- Black Hat USA/Black Hat USA 2022/From Hackathon to Hacked Web3's Security Journey.mp4 35.6 MB
- Black Hat DC/Black Hat DC 2010/Interpreter Exploitation - Pointer Inference and JIT Spraying - Dion.mp4 35.6 MB
- Black Hat USA/Black Hat USA 2009/video/Breaking the Security Myths of Extended Validation SSL Certificates - Alexander Sotirov, Mike Zusman.mp4 35.6 MB
- Black Hat USA/Black Hat USA 2014/video/Call To Arms - A Tale of the Weaknesses of Current Client-Side XSS Filtering.mp4 35.6 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bu2.mp3 35.6 MB
- Black Hat USA/Black Hat USA 2013/video/Predicting Susceptibility to Socialbots on Twitter.mp4 35.5 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass.mp4 35.5 MB
- Black Hat USA/Black Hat USA 2014/video/Oracle Data Redaction is Broken by David Litchfield.mp4 35.5 MB
- Black Hat Asia/Black Hat Singapore 2023/New Wine in an Old Bottle Attacking Chrome WebSQL.mp4 35.5 MB
- Black Hat USA/Black Hat USA 2016/Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools.mp4 35.5 MB
- Black Hat USA/Black Hat USA 2021/The Case for a National Cybersecurity Safety Board.mp4 35.5 MB
- Black Hat USA/Black Hat USA 2022/Browser - Powered Desync Attacks A New Frontier in HTTP Request Smuggling.mp4 35.4 MB
- Black Hat USA/Black Hat USA 2021/Timeless Timing Attacks.mp4 35.4 MB
- Black Hat Europe/Black Hat Europe 2019/Simple Spyware Androids Invisible Foreground Services and How to (Ab)use Them.mp4 35.4 MB
- Black Hat USA/Black Hat USA 2021/20 Ways to Bypass Your macOS Privacy Mechanisms.mp4 35.4 MB
- Black Hat USA/Black Hat USA 2024/Isolation or Hallucination Hacking AI Infrastructure Providers for Fun and Weights.mp4 35.4 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Hiding In Plain Sight - Advances In Malware Covert Communication Channels.mp4 35.4 MB
- Black Hat USA/Black Hat USA 2014/video/Time Trial - Racing Towards Practical Timing Attacks.mp4 35.4 MB
- Black Hat Asia/Black Hat Singapore 2023/Insider Threats Packing Their Bags With Corporate Data.mp4 35.4 MB
- Black Hat Windows/Black Hat Windows 2001/Video/MS SQL Server Security Overview - Chip Andrews.mp4 35.4 MB
- Black Hat USA/Black Hat USA 2014/video/Smart Nest Thermostat - A Smart Spy in Your Home.mp4 35.3 MB
- Black Hat USA/Black Hat USA 2019/Paging All Windows Geeks - Finding Evil in Windows 10 Compressed Memory.mp4 35.3 MB
- Black Hat USA/Black Hat USA 2021/A Hole in the Tube Uncovering Vulnerabilities in Critical Infrastructure of Healthcare Facilities.mp4 35.3 MB
- Black Hat USA/Black Hat USA 2021/Anatomy of Native IIS Malware.mp4 35.3 MB
- Black Hat USA/Black Hat USA 2003/video/Andrea Matwyshyn - Introduction to Corporate Information Security Law.mp4 35.3 MB
- Black Hat USA/Black Hat USA 2009/video/Is Your Phone Pwned - Kevin Mahaffey, Anthony Lineberry, John Hering.mp4 35.3 MB
- Black Hat USA/Black Hat USA 2024/Use Your Spell Against You Threat Prevention of Smart Contract Exploit By Reusing Opcode Trace.mp4 35.3 MB
- Black Hat USA/Black Hat USA 2021/The Mass Effect How Opportunistic Workers Drift into Cybercrime.mp4 35.3 MB
- Black Hat USA/Black Hat USA 2014/video/The State of Incident Response by Bruce Schneier.mp4 35.3 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.mp4 35.2 MB
- Black Hat Asia/Black Hat Singapore 2021/A General Approach to Bypassing Many Kernel Protections and its Mitigation.mp4 35.2 MB
- Black Hat USA/Black Hat USA 2013/video/Combating the Insider Threat at the FBI - Real-world Lessons Learned.mp4 35.2 MB
- Black Hat USA/Black Hat USA 2002/video/Mark Eckenwiler - USA Patriot Act and Criminal Investigations.mp4 35.2 MB
- Black Hat Asia/Black Hat Singapore 2021/Hey, You, Get off My Private Data Do Apps Respect Your Privacy as They Claim.mp4 35.2 MB
- Black Hat Asia/Black Hat Singapore 2020/Raiden Glitching Framework.mp4 35.2 MB
- Black Hat USA/Black Hat USA 2013/video/Teridian SoC Exploitation - Exploration of Harvard Architecture Smart Grid Systems.mp4 35.2 MB
- Black Hat USA/Black Hat USA 2015/video/Assessing And Exploiting BigNum Vulnerabilities.mp4 35.2 MB
- Black Hat DC/Black Hat DC 2010/WiFi Security or Descending Into Depression and Drink - Mike Kershaw aka Dragorn.mp4 35.2 MB
- Black Hat Europe/Black Hat Europe 2019/Far Sides of Java Remote Protocols.mp4 35.1 MB
- Black Hat USA/Black Hat USA 2022/Fault - Injection Detection Circuits Design, Calibration, Validation and Tuning.mp4 35.1 MB
- Black Hat USA/Black Hat USA 2019/Women in Security Building a Female InfoSec Community in Korea, Japan, and Taiwan.mp4 35.1 MB
- Black Hat USA/Black Hat USA 2016/HTTP Cookie Hijacking in the Wild - Security and Privacy Implications.mp4 35.1 MB
- Black Hat Asia/Black Hat Singapore 2024/Voice Phishing Syndicates Unmasked An In-Depth Investigation and Exposure.mp4 35.1 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_PN2.mp3 35.1 MB
- Black Hat Europe/Black Hat Europe 2018/Evolving Security Experts Among Teenagers.mp4 35.0 MB
- Black Hat USA/Black Hat USA 2009/video/Our Favorite XSS Filters and How to Attack Them - Eduardo Vela Nava, David Lindsay.mp4 35.0 MB
- Black Hat Europe/Black Hat Europe 2023/Kidnapping Without Hostages Virtual Kidnapping and the Dark Road Ahead.mp4 35.0 MB
- Black Hat USA/Black Hat USA 2009/video/What the Hell is Inside There - Chris Tarnovsky.mp4 35.0 MB
- Black Hat USA/Black Hat USA 2003/video/Honey Project - Latest Advances in Honeynet Technologies.mp4 35.0 MB
- Black Hat USA/Black Hat USA 2009/video/State of the Art Post Exploitation in Hardened PHP Environments - Stefan Esser.mp4 35.0 MB
- Black Hat USA/Black Hat USA 2021/Rope Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution.mp4 35.0 MB
- Black Hat USA/Black Hat USA 2024/TuDoor Attack Systematically Exploring and Exploiting Logic Vulnerabilities.mp4 34.9 MB
- Black Hat USA/Black Hat USA 2020/Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares.mp4 34.9 MB
- Black Hat USA/Black Hat USA 2016/Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool.mp4 34.9 MB
- Black Hat USA/Black Hat USA 2013/video/Fully Arbitrary 802.3 Packet Injection - Maximizing Ethernet Attack Surface.mp4 34.9 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_RA5.mp3 34.8 MB
- Black Hat USA/Black Hat USA 2011/video/Sticking to the Facts Scientific Study of Static Analysis Tools - Chuck Willis, Kris Britton.mp4 34.8 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Self-Verifying Authentication - A Framework For Safer Integrations of Single-Sign-On Services.mp4 34.8 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Breaking Bad - Stealing Patient Data Through Medical Devices.mp4 34.8 MB
- Black Hat USA/Black Hat USA 2002/video/Panel - Vulnerability Disclosure What the Feds Think.mp4 34.8 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Nation-State Moneymule's Hunting Season - APT Attacks Targeting Financial Institutions.mp4 34.8 MB
- Black Hat USA/Black Hat USA 2005/video/Cunningham w Morgan - US Natl Sec.mp4 34.8 MB
- Black Hat USA/Black Hat USA 2018/Unpacking the Packed Unpacker - Reverse Engineering an Android Anti-Analysis Native Library.mp4 34.8 MB
- Black Hat USA/Black Hat USA 2016/Augmenting Static Analysis Using Pintool - Ablation.mp4 34.8 MB
- Black Hat Asia/Black Hat Singapore 2015/Bar-Mitzva Attack - Breaking SSL with 13-Year Old RC4 Weakness.mp4 34.8 MB
- Black Hat USA/Black Hat USA 2016/1000 Ways to Die in Mobile Oauth.mp4 34.8 MB
- Black Hat Europe/Black Hat Europe 2024/The Insecure IoT Cloud Strikes Again RCE on all Ruijie Cloud-Connected Devices.mp4 34.8 MB
- Black Hat USA/Black Hat USA 2009/video/Fast & Furious Reverse Engineering with TitanEngine - Mario Vuksan, Tomislav Pericin.mp4 34.7 MB
- Black Hat USA/Black Hat USA 2020/Security Research on Mercedes-Benz From Hardware to Car Control.mp4 34.7 MB
- Black Hat USA/Black Hat USA 2013/video/Defending Networks With Incomplete Information - A Machine Learning Approach.mp4 34.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_L2.mp3 34.7 MB
- Black Hat USA/Black Hat USA 2011/video/Faces Of Facebook Privacy in the Age of Augmented Reality - Alessandro Acquisti.mp4 34.7 MB
- Black Hat USA/Black Hat USA 2019/Operational Templates for State-Level Attack and Collective Defense of Countries.mp4 34.7 MB
- Black Hat Europe/Black Hat Europe 2021/BadMesher New Attack Surfaces of Wi Fi Mesh Network.mp4 34.7 MB
- Black Hat USA/Black Hat USA 2019/Playing Offense and Defense with Deepfakes.mp4 34.7 MB
- Black Hat USA/Black Hat USA 2019/Arm IDA and Cross Check Reversing the Boeing 787's Core Network.mp4 34.6 MB
- Black Hat Europe/Black Hat Europe 2018/Straight Outta VMware Modern Exploitation of the SVGA Device for Guest-to-Host Escapes.mp4 34.6 MB
- Black Hat USA/Black Hat USA 2011/video/Microsoft Vista NDA-less The Good, The Bad, and The Ugly - Chris Paget.mp4 34.6 MB
- Black Hat USA/Black Hat USA 2024/Skirting the Tornado Essential Strategies for CISOs to Sidestep Government Fallout.mp4 34.6 MB
- Black Hat USA/Black Hat USA 2014/video/Write Once, Pwn Anywhere.mp4 34.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_wh2.mp3 34.5 MB
- Black Hat USA/Black Hat USA 2006/video/Panel - Anti - spyware Coalition.mp4 34.5 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Gyrophone - Eavesdropping Using a Gyroscope.mp4 34.5 MB
- Black Hat USA/Black Hat USA 2008/video/Software Radio and the Future of Wireless Security - Michael Ossmann.mp4 34.5 MB
- Black Hat USA/Black Hat USA 2009/video/MetaPhish pt. 2 - Val Smith, Colin Ames & David Kerb.mp4 34.4 MB
- Black Hat USA/Black Hat USA 2009/video/Your Mind - Legal Status, Rights and Securing Yourself - Tiffany Rad & James Arlen.mp4 34.4 MB
- Black Hat DC/Black Hat DC 2010/The Four Types of Locks - Deviant Ollam.mp4 34.4 MB
- Black Hat USA/Black Hat USA 2022/Chasing Your Tail With a Raspberry Pi.mp4 34.4 MB
- Black Hat USA/Black Hat USA 2024/Kicking in the Door to the Cloud Exploiting Cloud Provider Vulnerabilities for Initial Access.mp4 34.4 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_PN9.mp3 34.3 MB
- Black Hat Asia/Black Hat Singapore 2015/Next Level Cheating and Leveling Up Mitigations.mp4 34.3 MB
- Black Hat Europe/Black Hat Europe 2021/How We Can Power Real Security Machine Learning Progress Through Open Algorithms and Benchmarks.mp4 34.3 MB
- Black Hat USA/Black Hat USA 2015/video/Back Doors And Front Doors Breaking The Unbreakable System.mp4 34.3 MB
- Black Hat Europe/Black Hat Europe 2019/How to Break PDF Encryption.mp4 34.3 MB
- Black Hat DC/Black Hat DC 2011/Video/Attacking Oracle Web Applications with Metasploit - Chris Gates aka carnal0wnage.mp4 34.2 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_L4.mp3 34.2 MB
- Black Hat Europe/Black Hat Europe 2021/How Your E book Might Be Reading You Exploiting EPUB Reading Systems.mp4 34.2 MB
- Black Hat USA/Black Hat USA 2016/Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf.mp4 34.2 MB
- Black Hat USA/Black Hat USA 2014/video/SATCOM Terminals - Hacking by Air, Sea, and Land by Ruben Santamarta.mp4 34.2 MB
- Black Hat Asia/Black Hat Singapore 2017/Fried Apples - Jailbreak DIY.mp4 34.2 MB
- Black Hat USA/Black Hat USA 2020/Virtually Private Networks.mp4 34.2 MB
- Black Hat USA/Black Hat USA 2011/video/Owning the Routing Table - New OSPF Attacks - Gabi Nakibly.mp4 34.2 MB
- Black Hat USA/Black Hat USA 2014/video/ICSCorsair - How I Will PWN Your ERP Through 4-20 mA Current Loop.mp4 34.1 MB
- Black Hat DC/Black Hat DC 2010/Internet Explorer turns you personal computer into a public File Server - Jorge Luis Alvarez Medina.mp4 34.1 MB
- Black Hat DC/Black Hat DC 2010/Hacking Russia - Inside an unprecended prosecution of organized cybercrime - Joseph Menn.mp4 34.1 MB
- Black Hat USA/Black Hat USA 2019/Behind the Scenes The Industry of Social Media Manipulation Driven by Malware.mp4 34.1 MB
- Black Hat USA/Black Hat USA 2019/Zombie Ant Farming Practical Tips for Playing Hide and Seek with Linux EDRs.mp4 34.1 MB
- Black Hat DC/Black Hat DC 2008/Video/Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools - Shreeraj Shah.mp4 34.1 MB
- Black Hat Europe/Black Hat Europe 2020/From Zero to Sixty The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower (2).mp4 34.1 MB
- Black Hat Europe/Black Hat Europe 2020/From Zero to Sixty The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower.mp4 34.1 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_P4.mp3 34.1 MB
- Black Hat Asia/Black Hat Singapore 2017/Beyond the Blacklists - Detecting Malicious URL Through Machine Learning.mp4 34.0 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_RE4.mp3 34.0 MB
- Black Hat Europe/Black Hat Europe 2024/Heartbeat Havoc Unveiling Remote Vulnerabilities in Windows Network Load Balancing.mp4 34.0 MB
- Black Hat Asia/Black Hat Singapore 2017/Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE.mp4 34.0 MB
- Black Hat Asia/Black Hat Singapore 2021/The Price of Compatibility Defeating macOS Kernel Using Extended File Attributes.mp4 34.0 MB
- Black Hat USA/Black Hat USA 2013/video/Honey, I'm Home - Hacking Z-Wave Home Automation Systems.mp4 34.0 MB
- Black Hat USA/Black Hat USA 2022/BrokenMesh New Attack Surfaces of Bluetooth Mesh.mp4 34.0 MB
- Black Hat USA/Black Hat USA 2011/video/The Law of Mobile Hacking - Jennifer Granick.mp4 34.0 MB
- Black Hat USA/Black Hat USA 2021/Deepfake Social Engineering Creating a Framework for Synthetic Media Social Engineering.mp4 34.0 MB
- Black Hat USA/Black Hat USA 2017/Escalating Insider Threats Using VMware's API.mp4 34.0 MB
- Black Hat USA/Black Hat USA 2000/video/John McDonald - Group Talk.mp4 34.0 MB
- Black Hat USA/Black Hat USA 2022/Pwning Cloud Vendors with Untraditional PostgreSQL Vulnerabilities.mp4 34.0 MB
- Black Hat DC/Black Hat DC 2010/Why Black Hats Always Win - Val Smith, Chris.mp4 33.9 MB
- Black Hat USA/Black Hat USA 2021/The Ripple Effect Building a Diverse Security Research Team.mp4 33.9 MB
- Black Hat Europe/Black Hat Europe 2023/Indirect Prompt Injection Into LLMs Using Images and Sounds.mp4 33.9 MB
- Black Hat Asia/Black Hat Singapore 2020/Escaping Virtualized Containers.mp4 33.9 MB
- Black Hat USA/Black Hat USA 2021/PCIe Device Attacks Beyond DMA. Exploiting PCIe Switches, Messages and Errors.mp4 33.9 MB
- Black Hat USA/Black Hat USA 2022/Demystifying Key Stretching and PAKEs.mp4 33.9 MB
- Black Hat USA/Black Hat USA 2021/Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity.mp4 33.9 MB
- Black Hat USA/Black Hat USA 2022/New Memory Forensics Techniques to Defeat Device Monitoring Malware.mp4 33.9 MB
- Black Hat Asia/Black Hat Singapore 2014/Disasters in the Making - How I Torture Open Government Data Systems for Fun, Profit, and Time Travel.mp4 33.9 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Design Issues and Software Vulnerabilities in Embedded Systems - FX.mp4 33.9 MB
- Black Hat USA/Black Hat USA 2016/Web Application Firewalls - Analysis of Detection Logic.mp4 33.9 MB
- Black Hat Asia/Black Hat Singapore 2022/Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems.mp4 33.8 MB
- Black Hat USA/Black Hat USA 2011/video/Hacking Medical Devices for Fun and Insulin Breaking the Human SCADA System - Jay Radckiffe.mp4 33.8 MB
- Black Hat USA/Black Hat USA 2014/video/Exposing Bootkits with BIOS Emulation.mp4 33.8 MB
- Black Hat Europe/Black Hat Europe 2021/One Glitch to Rule Them All Fault Injection Attacks Against the AMD Secure Processor.mp4 33.8 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_L3.mp3 33.8 MB
- Black Hat USA/Black Hat USA 2008/video/Return-Oriented Programming Exploits Without Code Inspection - Hovav Shacham.mp4 33.8 MB
- Black Hat Europe/Black Hat Europe 2000/Video/Getting Rooted and Never Knowing It - Job De Haas.mp4 33.8 MB
- Black Hat USA/Black Hat USA 2009/video/Ruby for Pentesters - Michael Tracy, Chris Rohlf, Eric Monti.mp4 33.8 MB
- Black Hat USA/Black Hat USA 2011/video/Exploiting the iOS Kernel - Stefan Esser.mp4 33.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_MO5.mp3 33.7 MB
- Black Hat USA/Black Hat USA 2009/video/Using Guided Missiles in Drive-Bys - Automatic Browser Fingerprinting - Egypt.mp4 33.7 MB
- Black Hat USA/Black Hat USA 2022/RCE - as - a - Service Lessons Learned from 5 Years of Real - World CI CD Pipeline Compromise.mp4 33.7 MB
- Black Hat USA/Black Hat USA 2008/video/Visual Forensic Analysis and Reverse Engineering of Binary Data - Greg Conti, Erik Dean.mp4 33.7 MB
- Black Hat USA/Black Hat USA 2020/Reverse Engineering the Tesla Battery Management System to increase Power Available.mp4 33.7 MB
- Black Hat USA/Black Hat USA 2014/video/Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device.mp4 33.7 MB
- Black Hat USA/Black Hat USA 2013/video/Hacking Like in the Movies - Visualizing Page Tables for Local Exploitation.mp4 33.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_MO3.mp3 33.6 MB
- Black Hat Europe/Black Hat Europe 2019/HTTP Desync Attacks Request Smuggling Reborn.mp4 33.6 MB
- Black Hat Europe/Black Hat Europe 2021/A Deep Dive into Privacy Dashboard of Top Android Vendors.mp4 33.6 MB
- Black Hat Europe/Black Hat Europe 2018/How to Build Synthetic Persons in Cyberspace.mp4 33.6 MB
- Black Hat USA/Black Hat USA 2019/All Your Apple are Belong to Us Unique Identification and Cross-Device Tracking of Apple Devices.mp4 33.6 MB
- Black Hat USA/Black Hat USA 2015/video/Most Ransomware Isn t As Complex As You Might Think.mp4 33.5 MB
- Black Hat USA/Black Hat USA 2009/video/Reverse Engineering by Crayon - Danny Quist, Lorie Liebrock.mp4 33.5 MB
- Black Hat Europe/Black Hat Europe 2020/Fingerprint-Jacking Practical Fingerprint Authorization Hijacking in Android Apps.mp4 33.5 MB
- Black Hat USA/Black Hat USA 2008/conference cd/viewers/AdbeRdr90_en_US.exe 33.5 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Bazaliy-Mobile-Espionage-in-the-Wild-Pegasus-and-Nation-State-Level-Attacks.pdf 33.5 MB
- Black Hat USA/Black Hat USA 2014/video/A Practical Attack Against VDI Solutions.mp4 33.5 MB
- Black Hat USA/Black Hat USA 2014/video/RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits.mp4 33.5 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_R4.mp3 33.5 MB
- Black Hat USA/Black Hat USA 2021/Typhoon Mangkhut One-click Remote Universal Root Formed with Two Vulnerabilities.mp4 33.5 MB
- Black Hat Asia/Black Hat Singapore 2018/Nation-State Moneymule's Hunting Season - APT Attacks Targeting Financial Institutions.mp4 33.5 MB
- Black Hat Windows/Black Hat Windows 2003/Video/.NET from the Hacker's Perspective - Drew Miller.mp4 33.4 MB
- Black Hat DC/Black Hat DC 2010/iPhone Privacy - Nicolas Seriot.mp4 33.4 MB
- Black Hat USA/Black Hat USA 2015/video/Abusing Silent Mitigations Understanding Weaknesses Within Internet Explorer.mp4 33.4 MB
- Black Hat USA/Black Hat USA 2015/video/ZigBee Exploited The Good, The Bad, And The Ugly.mp4 33.4 MB
- Black Hat Asia/Black Hat Singapore 2015/I Know Where You've Been - Geo-Inference Attacks Via The Browser Cache.mp4 33.4 MB
- Black Hat Asia/Black Hat Singapore 2020/Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.mp4 33.4 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Writing Secure and Hack Resistant Code 2-2 - Michael Howard, David Leblanc.mp4 33.4 MB
- Black Hat USA/Black Hat USA 2001/video/Gregory S Miles - Computer Forensics a Critical Process in Your Incident Response Plan.mp4 33.3 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bs4.mp3 33.3 MB
- Black Hat Asia/Black Hat Singapore 2021/Blackhat Asia 21Locknote Conclusions and Key Takeaways from Day 1 locknote.mp4 33.3 MB
- Black Hat USA/Black Hat USA 2008/video/Iron Chef Fuzzing Challenge - 2-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.mp4 33.3 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ngw5.mp3 33.3 MB
- Black Hat DC/Black Hat DC 2011/Video/Hacking the Fast Lane - Security issues in 802.11p, DSRC and WAVE - Bruno Goncalves de Oliveira & Rob Havelt.mp4 33.3 MB
- Black Hat USA/Black Hat USA 2019/Hacking Your Non-Compete.mp4 33.3 MB
- Black Hat USA/Black Hat USA 2021/Bam the BAM - Electromagnetic Fault Injection & Automotive Systems.mp4 33.3 MB
- Black Hat USA/Black Hat USA 2024/Ops It is JTAG's Fault Journey to Unlocking Automotive Grade IC.mp4 33.2 MB
- Black Hat Asia/Black Hat Singapore 2017/Keynote - The Seven Axioms of Security.mp4 33.2 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_MO4.mp3 33.2 MB
- Black Hat USA/Black Hat USA 2003/video/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Theory) 1-2.mp4 33.2 MB
- Black Hat Asia/Black Hat Singapore 2014/Scan All the Things - Project Sonar by Mark Schloesser.mp4 33.2 MB
- Black Hat USA/Black Hat USA 2019/Firmware Cartography Charting the Course for Modern Server Compromise.mp4 33.2 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Effective File Format Fuzzing - Thoughts, Techniques and Results.mp4 33.2 MB
- Black Hat USA/Black Hat USA 2021/Breaking Secure Bootloaders.mp4 33.2 MB
- Black Hat USA/Black Hat USA 2015/video/Server Side Template Injection RCE For The Modern Web App.mp4 33.2 MB
- Black Hat USA/Black Hat USA 2020/IMP4GT IMPersonation Attacks in 4G NeTworks.mp4 33.1 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_H3.mp3 33.1 MB
- Black Hat USA/Black Hat USA 2014/video/Poacher Turned Gamekeeper - Lessons Learned from Eight Years of Breaking Hypervisors.mp4 33.1 MB
- Black Hat USA/Black Hat USA 2022/Monitoring Surveillance Vendors A Deep Dive into In - the - Wild Android Full Chains in 2021.mp4 33.1 MB
- Black Hat Asia/Black Hat Singapore 2021/Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet.mp4 33.1 MB
- Black Hat USA/Black Hat USA 2000/video/Jennifer Granick and Mark Eckenwiler - What Internet Service Providers Need to Know About the Law.mp4 33.1 MB
- Black Hat USA/Black Hat USA 2015/video/Why Security Data Science Matters & How It's Different Pitfalls And Promises.mp4 33.1 MB
- Black Hat USA/Black Hat USA 2021/Symbexcel Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros.mp4 33.1 MB
- Black Hat USA/Black Hat USA 2015/video/Internet Facing PLCs A New Back Orifice.mp4 33.1 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Attacking Windows by Windows.mp4 33.0 MB
- Black Hat USA/Black Hat USA 2022/A Journey Into Fuzzing WebAssembly Virtual Machines.mp4 33.0 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ent3.mp3 33.0 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ent5.mp3 33.0 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Keynote - What Got Us Here Wont Get Us There.mp4 33.0 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_PN3.mp3 33.0 MB
- Black Hat USA/Black Hat USA 2020/Policy Implications of Faulty Cyber Risk Models and How to Fix Them.mp4 33.0 MB
- Black Hat DC/Black Hat DC 2010/Agile Security or How to defend applications with five-dat release cycles - Bryan Sullivan.mp4 33.0 MB
- Black Hat USA/Black Hat USA 2014/video/Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware.mp4 33.0 MB
- Black Hat Europe/Black Hat Europe 2014/Video/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1 2).mp4 33.0 MB
- Black Hat Asia/Black Hat Singapore 2024/Game of Cross Cache Let's Win It in a More Effective Way.mp4 33.0 MB
- Black Hat Europe/Black Hat Europe 2024/Unveiling the Power of Intune Leveraging Intune for Breaking Into Your Cloud and On-Premise.mp4 33.0 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Next Level Cheating and Leveling Up Mitigations.mp4 32.9 MB
- Black Hat Asia/Black Hat Singapore 2022/The Little Seal Bug Optical Sound Recovery from Lightweight Reflective Objects.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2019/Shifting Knowledge Left Keeping up with Modern Application Security.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_wl2.mp3 32.9 MB
- Black Hat USA/Black Hat USA 2009/video/Rapid Enterprise Triaging - Aaron LeMasters, Michael Murphy.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2013/video/Evading Deep Inspection for Fun and Shell.mp4 32.9 MB
- Black Hat DC/Black Hat DC 2011/Video/Checkmate with Denial of Service - Tom Brennan, Ryan Barnett.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2019/He Said, She Said - Poisoned RDP Offense and Defense.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2014/video/Multipath TCP - Breaking Today s Networks with Tomorrow s Protocols.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2013/video/Home Invasion v2.0 - Attacking Network-Controlled Hardware.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2024/Cracking the 5G Fortress Peering Into 5G's Vulnerability Abyss.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2022/Attack on Titan M, Reloaded Vulnerability Research on a Modern Security Chip.mp4 32.9 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Scala Security - Examining the Play and LiftWeb Frameworks.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2013/video/CreepyDOL - Cheap, Distributed Stalking.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2015/video/Web Timing Attacks Made Practical.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2014/video/Understanding TOCTTOU in the Windows Kernel Font Scaler Engine.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2021/Arm'd and Dangerous.mp4 32.9 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_PN5.mp3 32.8 MB
- Black Hat Europe/Black Hat Europe 2021/TeamTNT Explosive Cryptomining.mp4 32.8 MB
- Black Hat USA/Black Hat USA 2022/Charged by an Elephant - An APT Fabricating Evidence to Throw You In Jail.mp4 32.8 MB
- Black Hat Asia/Black Hat Singapore 2017/Man-in-the-SCADA - Anatomy of Data Integrity Attacks in Industrial Control Systems.mp4 32.8 MB
- Black Hat USA/Black Hat USA 2015/video/Crash & Pay How To Own And Clone Contactless Payment Devices.mp4 32.8 MB
- Black Hat USA/Black Hat USA 2016/Canspy - A Platform for Auditing Can Devices.mp4 32.8 MB
- Black Hat Asia/Black Hat Singapore 2021/Domain Borrowing Catch My C2 Traffic if You Can.mp4 32.8 MB
- Black Hat Asia/Black Hat Singapore 2021/The Cost of Complexity Different Vulnerabilities While Implementing the Same RFC.mp4 32.8 MB
- Black Hat USA/Black Hat USA 2021/Breaking the Isolation Cross-Account AWS Vulnerabilities.mp4 32.8 MB
- Black Hat USA/Black Hat USA 2022/Go With the Flow Enforcing Program Behavior Through Syscall Sequences and Origins.mp4 32.8 MB
- Black Hat USA/Black Hat USA 2013/video/Using Online Activity as Digital DNA to Create a Better Spear Phisher.mp4 32.8 MB
- Black Hat Asia/Black Hat Singapore 2020/Kr00k How KRACKing Amazon Echo Exposed a Billion Vulnerable Wi-Fi Devices.mp4 32.7 MB
- Black Hat USA/Black Hat USA 2009/video/Analyzing Security Research in the Media - Panel.mp4 32.7 MB
- Black Hat DC/Black Hat DC 2010/Playing in a Satellite Environment 1.2 - Leonardo Nve Egea.mp4 32.7 MB
- Black Hat USA/Black Hat USA 2022/Perimeter Breached Hacking an Access Control System.mp4 32.7 MB
- Black Hat USA/Black Hat USA 2021/Breaking Network Segregation Using Esoteric Command & Control Channels.mp4 32.7 MB
- Black Hat USA/Black Hat USA 2020/Portable Document Flaws 101.mp4 32.7 MB
- Black Hat Europe/Black Hat Europe 2017/videos/How Samsung Secures Your Wallet and How To Break It.mp4 32.7 MB
- Black Hat Europe/Black Hat Europe 2021/Burning Bridges - Stopping Lateral Movement via the RPC Firewall.mp4 32.7 MB
- Black Hat USA/Black Hat USA 2019/Process Injection Techniques - Gotta Catch Them All.mp4 32.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_C5.mp3 32.7 MB
- Black Hat Asia/Black Hat Singapore 2021/How I Can Unlock Your Smart Door Security Pitfalls in Cross-Vendor IoT Access Control.mp4 32.7 MB
- Black Hat USA/Black Hat USA 2015/video/Stranger Danger What Is The Risk From 3rd Party Libraries.mp4 32.6 MB
- Black Hat Europe/Black Hat Europe 2018/When Machines Can't Talk.mp4 32.6 MB
- Black Hat USA/Black Hat USA 2022/AAD Joined Machines - The New Lateral Movement.mp4 32.6 MB
- Black Hat USA/Black Hat USA 2015/video/Adventures In Femtoland 350 Yuan For Invaluable Fun.mp4 32.6 MB
- Black Hat USA/Black Hat USA 2008/video/Deeper Door Exploiting the NIC Chipset - Sherri Sparks, Shawn Embleton.mp4 32.5 MB
- Black Hat USA/Black Hat USA 2019/The Enemy Within Modern Supply Chain Attacks.mp4 32.5 MB
- Black Hat USA/Black Hat USA 2014/video/The Devil Does Not Exist - The Role of Deception in Cyber.mp4 32.5 MB
- Black Hat USA/Black Hat USA 2021/Wibbly Wobbly, Timey Wimey - What's Really Inside Apple's U1 Chip.mp4 32.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_da5.mp3 32.5 MB
- Black Hat Windows/Black Hat Windows 2001/Video/IPSec in a Windows 2000 World - Rooster, Dan William 2-2.mp4 32.5 MB
- Black Hat Asia/Black Hat Singapore 2015/Bypassing Malware Detection Mechanisms in Online Banking.mp4 32.5 MB
- Black Hat USA/Black Hat USA 2015/video/Breaking Honeypots For Fun And Profit.mp4 32.5 MB
- Black Hat Europe/Black Hat Europe 2018/Attacking Hardware Systems Using Resonance and the Laws of Physics.mp4 32.5 MB
- Black Hat USA/Black Hat USA 2020/Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers.mp4 32.5 MB
- Black Hat USA/Black Hat USA 2003/video/Brandon Wiley - The Superworm Manifesto.mp4 32.5 MB
- Black Hat Europe/Black Hat Europe 2024/Blast-RADIUS Breaking RADIUS, the de facto standard protocol for authentication, authorization.mp4 32.5 MB
- Black Hat DC/Black Hat DC 2010/Global Security Report 2010 Analysis of Investigations and Penetration Tests - Nicholas J Percoco.mp4 32.5 MB
- Black Hat USA/Black Hat USA 2022/Internal Server Error Exploiting Inter - Process Communication in SAP's HTTP Server.mp4 32.5 MB
- Black Hat USA/Black Hat USA 2022/Talent Need Not Apply Tradecraft and Objectives of Job - themed APT Social Engineering.mp4 32.5 MB
- Black Hat USA/Black Hat USA 2015/video/Bringing A Cannon To A Knife Fight.mp4 32.5 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_E4.mp3 32.5 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Surviving OpenHack IV - Steve Riley, Timothy Bollefer.mp4 32.4 MB
- Black Hat Europe/Black Hat Europe 2021/Exploiting CSP in WebKit to Break Authentication and Authorization.mp4 32.4 MB
- Black Hat DC/Black Hat DC 2011/Video/Popping Shell on A(ndroid)RM Devices - Itzhak (Zuk) Avraham.mp4 32.4 MB
- Black Hat USA/Black Hat USA 2016/Windows 10 Segment Heap Internals.mp4 32.4 MB
- Black Hat USA/Black Hat USA 2014/video/SecSi Product Development.mp4 32.4 MB
- Black Hat USA/Black Hat USA 2020/Detecting Fake 4G Base Stations in Real Time.mp4 32.4 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.mp4 32.3 MB
- Black Hat Europe/Black Hat Europe 2019/Unleashing the Power of My 20 Years Old Car.mp4 32.3 MB
- Black Hat USA/Black Hat USA 2022/The Open Threat Hunting Framework Enabling Organizations to Build, Operationalize, and Scale Threat.mp4 32.3 MB
- Black Hat USA/Black Hat USA 2024/Deep Backdoors in Deep Reinforcement Learning Agents.mp4 32.3 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-2/bh-asia-03-day2-t2-2-16-28-56.rm 32.3 MB
- Black Hat Asia/Black Hat Singapore 2024/One Flip is All It Takes Identifying Syscall-Guard Variables for Data-Only Attacks.mp4 32.3 MB
- Black Hat Asia/Black Hat Singapore 2014/Beyond Check The Box - Powering Intrusion Investigations by Jim Aldridge.mp4 32.3 MB
- Black Hat Asia/Black Hat Singapore 2014/OFFENSIVE - Exploiting DNS Servers Changes by Leonardo Nve.mp4 32.3 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Breaking Access Controls with Blekey.mp4 32.2 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ngw4.mp3 32.2 MB
- Black Hat USA/Black Hat USA 2016/Exploiting Curiosity and Context - How to Make People Click on a Dangerous Link.mp4 32.2 MB
- Black Hat USA/Black Hat USA 2003/video/Lance Spitzner - Honey Topics.mp4 32.2 MB
- Black Hat Asia/Black Hat Singapore 2024/Immoral Fiber Unlocking & Discovering New Offensive Capabilities of Fibers.mp4 32.2 MB
- Black Hat USA/Black Hat USA 2008/video/Attacking the Vista Heap - Ben Hawkes.mp4 32.2 MB
- Black Hat USA/Black Hat USA 2014/video/Babar-ians at the Gate - Data Protection at Massive Scale.mp4 32.2 MB
- Black Hat USA/Black Hat USA 2014/video/48 Dirty Little Secrets Cryptographers Don't Want You To Know.mp4 32.2 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_wl5.mp3 32.2 MB
- Black Hat USA/Black Hat USA 2019/Selling 0-Days to Governments and Offensive Security Companies.mp4 32.2 MB
- Black Hat Asia/Black Hat Singapore 2022/Unix Domain Socket A Hidden Door Leading to Privilege Escalation in the Android Ecosystem.mp4 32.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service.mp4 32.1 MB
- Black Hat Asia/Black Hat Singapore 2016/The Security Wolf of Wall Street - Fighting Crime With High Frequency Classification and.mp4 32.1 MB
- Black Hat USA/Black Hat USA 2002/video/Dan Kaminsky - Black Ops of TCPIP.mp4 32.1 MB
- Black Hat USA/Black Hat USA 2020/You have No Idea Who Sent that Email 18 Attacks on Email Sender Authentication.mp4 32.1 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ngw3.mp3 32.1 MB
- Black Hat USA/Black Hat USA 2013/video/End-to-end Analysis of Domain Generating Algorithm Malware Family.mp4 32.1 MB
- Black Hat USA/Black Hat USA 2022/A Dirty Little History Bypassing Spectre Hardware Defenses to Leak Kernel Data.mp4 32.0 MB
- Black Hat USA/Black Hat USA 2010/Burning Asgrd - Enno Rey, Daniel Mende, Rene Graf.mp4 32.0 MB
- Black Hat Asia/Black Hat Singapore 2017/Anti-Plugin - Don't Let Your App Play as an Android Plugin.mp4 32.0 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bf3.mp3 32.0 MB
- Black Hat USA/Black Hat USA 2015/video/How To Implement IT Security After A Cyber Meltdown.mp4 32.0 MB
- Black Hat USA/Black Hat USA 2015/video/Internet Scale File Analysis.mp4 32.0 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bs2.mp3 32.0 MB
- Black Hat Asia/Black Hat Singapore 2023/Attacking the WebAssembly Compiler of WebKit.mp4 32.0 MB
- Black Hat Europe/Black Hat Europe 2020/The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study.mp4 32.0 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_wh3.mp3 32.0 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bs3.mp3 32.0 MB
- Black Hat USA/Black Hat USA 2022/Déjà Vu Uncovering Stolen Algorithms in Commercial Products.mp4 32.0 MB
- Black Hat USA/Black Hat USA 2024/Will We Survive the Transitive Vulnerability Locusts.mp4 32.0 MB
- Black Hat Asia/Black Hat Singapore 2019/Winter is Coming Back.mp4 32.0 MB
- Black Hat USA/Black Hat USA 2021/Bypassing Windows Hello for Business and Pleasure.mp4 32.0 MB
- Black Hat USA/Black Hat USA 2008/video/Windows Hibernation File for Fun And Profit - Matthieu Suiche.mp4 32.0 MB
- Black Hat Asia/Black Hat Singapore 2020/The Evil of Spy Camera.mp4 32.0 MB
- Black Hat USA/Black Hat USA 2022/Catch Me If You Can Deterministic Discovery of Race Conditions with Fuzzing.mp4 32.0 MB
- Black Hat USA/Black Hat USA 2015/video/ThunderStrike 2 Sith Strike.mp4 32.0 MB
- Black Hat Europe/Black Hat Europe 2024/Redefining the Origin of Secrecy in a Post-Quantum World.mp4 31.9 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_M3.mp3 31.9 MB
- Black Hat USA/Black Hat USA 2022/Automatic Protocol Reverse Engineering.mp4 31.9 MB
- Black Hat Asia/Black Hat Singapore 2016/Let's See What's Out There - Mapping the Wireless IOT.mp4 31.9 MB
- Black Hat Europe/Black Hat Europe 2021/The Art of Exploiting UAF by Ret2bpf in Android Kernel.mp4 31.9 MB
- Black Hat USA/Black Hat USA 2024/Threat Hunting with LLM From Discovering APT SAAIWC to Tracking APTs with AI.mp4 31.9 MB
- Black Hat USA/Black Hat USA 2013/video/Revealing Embedded Fingerprints - Deriving intelligence from USB stack interactions.mp4 31.9 MB
- Black Hat USA/Black Hat USA 2014/video/Dynamic Flash Instrumentation for Fun and Profit.mp4 31.9 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_mt3.mp3 31.8 MB
- Black Hat USA/Black Hat USA 2010/Understanding the Low Fragmenation Heap - Chris Valasek.mp4 31.8 MB
- Black Hat USA/Black Hat USA 2019/Worm Charming Harvesting Malware Lures for Fun and Profit.mp4 31.8 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bf5.mp3 31.8 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_MO2.mp3 31.8 MB
- Black Hat USA/Black Hat USA 2022/Oops.. I Glitched It Again How to Multi - Glitch the Glitching - Protections on ARM TrustZone - M.mp4 31.8 MB
- Black Hat Asia/Black Hat Singapore 2016/Break Out of The Truman Show - Active Detection and Escape of Dynamic Binary Instrumentation.mp4 31.8 MB
- Black Hat USA/Black Hat USA 2011/video/Femtocells A Poisonous Needle in the Operator’s Hay Stack - Nico Golde, Kevin Redon.mp4 31.8 MB
- Black Hat USA/Black Hat USA 2019/Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites.mp4 31.8 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Bypassing HTTP Strict Transport Security.mp4 31.8 MB
- Black Hat USA/Black Hat USA 2020/Needing the DoH The Ongoing Encryption and Centralization of DNS.mp4 31.8 MB
- Black Hat Asia/Black Hat Singapore 2022/To Loot or Not to Loot - That Is Not a Question When State Nexus APT Targets Online Entertainment.mp4 31.7 MB
- Black Hat USA/Black Hat USA 2011/video/Constant Insecurity Things You Didn’t Know About (PECOFF) Portable Executable File Format - Mario Vuksan, Tomislav Pericin.mp4 31.7 MB
- Black Hat USA/Black Hat USA 2014/video/Nobody is Listening to Your Phone Calls. - Really A Debate and Discussion on the NSA s Activities.mp4 31.7 MB
- Black Hat USA/Black Hat USA 2014/video/The New Page of Injections Book - Memcached Injections.mp4 31.7 MB
- Black Hat Asia/Black Hat Singapore 2024/Bypassing Entra ID Conditional Access Like APT A Deep Dive Into Device Authentication Mechanisms.mp4 31.7 MB
- Black Hat Europe/Black Hat Europe 2024/Diving into Spooler Discovering LPE and RCE Vulnerabilities in Windows Printer Driver.mp4 31.7 MB
- Black Hat Europe/Black Hat Europe 2015/videos/A Peek Under the Blue Coat.mp4 31.7 MB
- Black Hat USA/Black Hat USA 2022/Trace Me if You Can Bypassing Linux Syscall Tracing.mp4 31.7 MB
- Black Hat USA/Black Hat USA 2022/Harm Reduction A Framework for Effective & Compassionate Security Guidance.mp4 31.7 MB
- Black Hat Asia/Black Hat Singapore 2020/Redback Advanced Static Binary Injection.mp4 31.7 MB
- Black Hat Europe/Black Hat Europe 2018/Deep Impact Recognizing Unknown Malicious Activities from Zero Knowledge.mp4 31.7 MB
- Black Hat Asia/Black Hat Singapore 2021/Racing the Dark A New TOCTTOU Story From Apple's Core.mp4 31.7 MB
- Black Hat USA/Black Hat USA 2019/0-days - u0026 Mitigations Roadways to Exploit and Secure Connected BMW Cars.mp4 31.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_PN10.mp3 31.7 MB
- Black Hat USA/Black Hat USA 2020/Spectra Breaking Separation Between Wireless Chips.mp4 31.7 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Inside Android's SafetyNet Attestation.mp4 31.7 MB
- Black Hat Asia/Black Hat Singapore 2019/Return of the Insecure Brazilian Voting Machines.mp4 31.6 MB
- Black Hat Europe/Black Hat Europe 2024/Vulnerabilities in the eSIM download protocol.mp4 31.6 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Abusing Software Defined Networks.mp4 31.6 MB
- Black Hat USA/Black Hat USA 2021/HPE iLO5 Firmware Security - Go Home Cryptoprocessor, You're Drunk.mp4 31.6 MB
- Black Hat USA/Black Hat USA 2009/video/The Pwnie Awards.mp4 31.6 MB
- Black Hat Europe/Black Hat Europe 2020/Bypassing NGAV for Fun and Profit.mp4 31.6 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ec7.mp3 31.5 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_L5.mp3 31.5 MB
- Black Hat Europe/Black Hat Europe 2021/Is This My Domain Controller A New Class of Active Directory Protocol Injection Attacks.mp4 31.5 MB
- Black Hat USA/Black Hat USA 2024/Surveilling the Masses with Wi-Fi Positioning Systems.mp4 31.5 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-1/bh-asia-03-day2-t1-4-16-28-56.rm 31.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ee2.mp3 31.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ti5.mp3 31.4 MB
- Black Hat USA/Black Hat USA 2021/ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication.mp4 31.4 MB
- Black Hat USA/Black Hat USA 2016/Captain Hook - Pirating AVS to Bypass Exploit Mitigations.mp4 31.4 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Breaking Out HSTS (and HPKP) On Firefox, IE Edge and (Possibly) Chrome.mp4 31.4 MB
- Black Hat USA/Black Hat USA 2019/Defense Against Rapidly Morphing DDOS.mp4 31.4 MB
- Black Hat Europe/Black Hat Europe 2017/videos/A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities.mp4 31.4 MB
- Black Hat USA/Black Hat USA 2021/Greybox Program Synthesis A New Approach to Attack Dataflow Obfuscation.mp4 31.4 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ti2.mp3 31.4 MB
- Black Hat Europe/Black Hat Europe 2021/2021 A Titan M Odyssey.mp4 31.4 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Androbugs Framework - An Android Application Security Vilnerability Scanner.mp4 31.4 MB
- Black Hat USA/Black Hat USA 2015/video/Information Access And Information Sharing Where We Are And Where We Are Going.mp4 31.4 MB
- Black Hat USA/Black Hat USA 2021/Action Bias and the Two Most Dangerous Words in Cybersecurity.mp4 31.4 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_H4.mp3 31.3 MB
- Black Hat USA/Black Hat USA 2018/Pwnie Awards.mp4 31.3 MB
- Black Hat Europe/Black Hat Europe 2016/videos/EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.mp4 31.3 MB
- Black Hat USA/Black Hat USA 2016/Bad for Enterprise - Attacking BYOD Enterprise Mobile Security Solutions.mp4 31.3 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_I2.mp3 31.3 MB
- Black Hat Asia/Black Hat Singapore 2020/First Contact - Vulnerabilities in Contactless Payments.mp4 31.3 MB
- Black Hat Europe/Black Hat Europe 2017/videos/How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine.mp4 31.3 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_T4.mp3 31.3 MB
- Black Hat USA/Black Hat USA 2024/UnOAuthorized A Technique to Privilege Escalation to Global Administrator.mp4 31.3 MB
- Black Hat USA/Black Hat USA 2016/Building Trust & Enabling Innovation for Voice Enabled IoT.mp4 31.3 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_si3.mp3 31.3 MB
- Black Hat Asia/Black Hat Singapore 2022/Codema Attack Controlling Your Smart Home Through Dangling Management Channels.mp4 31.3 MB
- Black Hat Asia/Black Hat Singapore 2021/Mining and Exploiting (Mobile) Payment Credential Leaks in the Wild.mp4 31.3 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Web Hacking - JD Glaser, Saumil Shah.mp4 31.2 MB
- Black Hat USA/Black Hat USA 2003/video/Panel - Hiring Trends in InfoSec.mp4 31.2 MB
- Black Hat Asia/Black Hat Singapore 2017/Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel.mp4 31.2 MB
- Black Hat USA/Black Hat USA 2022/Process Injection Breaking All macOS Security Layers With a Single Vulnerability.mp4 31.2 MB
- Black Hat DC/Black Hat DC 2010/0-Knowledge Fuzzing - Vincenzo Iozzo.mp4 31.2 MB
- Black Hat USA/Black Hat USA 2013/video/TLS - SECRETS.mp4 31.1 MB
- Black Hat USA/Black Hat USA 2009/video/Hacker Court 1-2 - Panel.mp4 31.1 MB
- Black Hat Asia/Black Hat Singapore 2016/Automated Detection of Firefox Extension Reuse Vulnerabilities.mp4 31.1 MB
- Black Hat Asia/Black Hat Singapore 2021/In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor.mp4 31.1 MB
- Black Hat USA/Black Hat USA 2024/Crashing the Party Vulnerabilities in RPKI Validation.mp4 31.1 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ee5.mp3 31.1 MB
- Black Hat Europe/Black Hat Europe 2017/videos/A Process is No One - Hunting for Token Manipulation.mp4 31.1 MB
- Black Hat USA/Black Hat USA 2015/video/When IoT Attacks Hacking A Linux Powered Rifle.mp4 31.1 MB
- Black Hat USA/Black Hat USA 2021/CnCHunter An MITM-Approach to Identify Live CnC Servers.mp4 31.0 MB
- Black Hat USA/Black Hat USA 2012/video/HTML5 Threats.mp4 31.0 MB
- Black Hat USA/Black Hat USA 2016/PLC-Blaster - A Worm Living Solely in the PLC.mp4 31.0 MB
- Black Hat USA/Black Hat USA 2014/video/Understanding IMSI Privacy.mp4 31.0 MB
- Black Hat Europe/Black Hat Europe 2019/Trust in Apple's Secret Garden Exploring & Reversing Apple's Continuity Protocol.mp4 31.0 MB
- Black Hat USA/Black Hat USA 2022/How Supercomputer - scale Neural Network Models Apply to Defensive Cybersecurity Problems.mp4 31.0 MB
- Black Hat USA/Black Hat USA 2022/Breaking the Chrome Sandbox with Mojo.mp4 31.0 MB
- Black Hat USA/Black Hat USA 2015/video/Deep Learning On Disassembly.mp4 31.0 MB
- Black Hat USA/Black Hat USA 2016/I Came to Drop Bombs - Auditing the Compression Algorithm Weapon Cache.mp4 30.9 MB
- Black Hat USA/Black Hat USA 2021/The Dark Age of Memory Corruption Mitigations in the Spectre Era.mp4 30.9 MB
- Black Hat USA/Black Hat USA 2015/video/Targeted Takedowns Minimizing Collateral Damage Using Passive DNS.mp4 30.9 MB
- Black Hat USA/Black Hat USA 2003/video/Jay Beale - Locking Down Mac OS X.mp4 30.9 MB
- Black Hat Asia/Black Hat Singapore 2022/Using Zero to Attack Zero-Knowledge Proof (ZKP) PLONK.mp4 30.9 MB
- Black Hat USA/Black Hat USA 2010/Things you wanted to know but were afraid to ask - Lee Kushner, Mike Murray.mp4 30.9 MB
- Black Hat USA/Black Hat USA 2008/video/ePassports Reloaded - Jeroen van Beek.mp4 30.9 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bf2.mp3 30.8 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Flip Feng Shui - Rowhammering the VM's Isolation.mp4 30.8 MB
- Black Hat DC/Black Hat DC 2011/Video/Malware Distribution via Widgetization of the Web - Neil Daswani.mp4 30.8 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Zero Days, Thousands of Nights - The Life & Times of Zero-Day Vulns and Their Exploits.mp4 30.8 MB
- Black Hat USA/Black Hat USA 2010/The future of DNS Security - Panel.mp4 30.8 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Attacking NextGen Roaming Networks.mp4 30.8 MB
- Black Hat USA/Black Hat USA 2011/video/ARM Exploitation ROPmap - Long Le.mp4 30.7 MB
- Black Hat USA/Black Hat USA 2021/HTTP 2 The Sequel is Always Worse.mp4 30.7 MB
- Black Hat DC/Black Hat DC 2010/Neurosurgery With Meterpreter - Colin Ames, David Kerb.mp4 30.7 MB
- Black Hat USA/Black Hat USA 2019/Exploring the New World - Remote Exploitation of SQLite and Curl.mp4 30.7 MB
- Black Hat USA/Black Hat USA 2019/Come Join the CAFSA - Continuous Automated Firmware Security Analysis.mp4 30.7 MB
- Black Hat Asia/Black Hat Singapore 2018/Counter-Infiltration Future-Proof Counter Attacks Against Exploit Kit Infrastructure.mp4 30.7 MB
- Black Hat Asia/Black Hat Singapore 2024/LinkDoor A Hidden Attack Surface in the Android Netlink Kernel Modules.mp4 30.7 MB
- Black Hat Windows/Black Hat Windows 2001/Video/IPSec in a Windows 2000 World - Rooster, Dan William 1-2.mp4 30.7 MB
- Black Hat USA/Black Hat USA 2010/Voyage of the reverser - Sergey Bratus, Greg Conti.mp4 30.7 MB
- Black Hat USA/Black Hat USA 2013/video/BIOS Security.mp4 30.7 MB
- Black Hat USA/Black Hat USA 2020/Hacking the Voter Lessons from a Decade of Russian Military Operations.mp4 30.7 MB
- Black Hat Europe/Black Hat Europe 2020/Manufacturing Hardware Implants from Idea to Mass Production A Hacker's Journey.mp4 30.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_RA4.mp3 30.7 MB
- Black Hat USA/Black Hat USA 2014/video/Mobile Device Mismanagement.mp4 30.7 MB
- Black Hat USA/Black Hat USA 2013/video/Funderbolt - Adventures in Thunderbolt DMA Attacks.mp4 30.7 MB
- Black Hat Europe/Black Hat Europe 2024/Parse Me, Baby, One More Time Bypassing HTML Sanitizer via Parsing Differentials.mp4 30.7 MB
- Black Hat USA/Black Hat USA 2020/HTTP Request Smuggling in 2020 - New Variants, New Defenses and New Challenges.mp4 30.7 MB
- Black Hat Asia/Black Hat Singapore 2020/Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities.mp4 30.6 MB
- Black Hat USA/Black Hat USA 2014/video/Abusing Performance Optimization Weaknesses to Bypass ASLR.mp4 30.6 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_R3.mp3 30.6 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_wh5.mp3 30.6 MB
- Black Hat Asia/Black Hat Singapore 2016/Multivariate Solutions To Emerging Passive DNS Challenges.mp4 30.6 MB
- Black Hat USA/Black Hat USA 2009/video/More Tricks for Defeating SSL - Moxie Marlinspike.mp4 30.5 MB
- Black Hat USA/Black Hat USA 2009/video/Something to Do with Network Security - Dan Kaminsky.mp4 30.5 MB
- Black Hat USA/Black Hat USA 2016/Abusing Bleeding Edge Web Standards for Appsec Glory.mp4 30.5 MB
- Black Hat Europe/Black Hat Europe 2017/videos/CALDERA - Automating Adversary Emulation.mp4 30.5 MB
- Black Hat USA/Black Hat USA 2020/I calc'd Calc - Exploiting Excel Online.mp4 30.5 MB
- Black Hat USA/Black Hat USA 2009/video/Advanced Mac OS X Rootkits - Dino Dai Zovi.mp4 30.5 MB
- Black Hat Asia/Black Hat Singapore 2024/Privacy Detective Sniffing Out Your Data Leaks for Android.mp4 30.5 MB
- Black Hat Europe/Black Hat Europe 2020/LadderLeak Breaking ECDSA with Less than One Bit of Nonce Leakage.mp4 30.5 MB
- Black Hat Europe/Black Hat Europe 2021/Who Did It - How We Attributed Campaigns of a Cyber Mercenary.mp4 30.5 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Going Auth The Rails On A Crazy Train.mp4 30.5 MB
- Black Hat Asia/Black Hat Singapore 2020/Hey Google, Activate Spyware - When Google Assistant Uses a Vulnerability as a Feature.mp4 30.5 MB
- Black Hat USA/Black Hat USA 2021/Mobius Band Explore Hyper-V Attack Interface through Vulnerabilities Internals.mp4 30.4 MB
- Black Hat USA/Black Hat USA 2014/video/Contemporary Automatic Program Analysis.mp4 30.4 MB
- Black Hat USA/Black Hat USA 2020/iOS Kernel PAC, One Year Later.mp4 30.4 MB
- Black Hat Asia/Black Hat Singapore 2022/The Next Generation of Windows Exploitation Attacking the Common Log File System.mp4 30.4 MB
- Black Hat USA/Black Hat USA 2014/video/SAP, Credit Cards, and the Bird that Talks Too Much.mp4 30.4 MB
- Black Hat Europe/Black Hat Europe 2020/Quantum Security and Cryptography You Are (Probably) Doing it Wrong.mp4 30.4 MB
- Black Hat Asia/Black Hat Singapore 2022/Dynamic Process Isolation.mp4 30.4 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_C4.mp3 30.4 MB
- Black Hat USA/Black Hat USA 2015/video/WSUSpect Compromising The Windows Enterprise Via Windows Update.mp4 30.4 MB
- Black Hat USA/Black Hat USA 2019/A Compendium of Container Escapes.mp4 30.4 MB
- Black Hat Europe/Black Hat Europe 2017/videos/The Apple of Your EFI - An Updated Study of EFI Security.mp4 30.4 MB
- Black Hat Asia/Black Hat Singapore 2015/Hiding Behind Android Runtime (ART).mp4 30.3 MB
- Black Hat USA/Black Hat USA 2013/video/Dissecting CSRF Attacks and Countermeasures.mp4 30.3 MB
- Black Hat USA/Black Hat USA 2011/video/Sophail A Critical Analysis of Sophos Antivirus - Tavis Ormandy.mp4 30.3 MB
- Black Hat USA/Black Hat USA 2020/Uncommon Sense Detecting Exploits with Novel Hardware Performance Counters and ML Magic.mp4 30.3 MB
- Black Hat Europe/Black Hat Europe 2024/CodeCloak A DRL-Based Method for Mitigating Code Leakage by LLM Code Assistants.mp4 30.3 MB
- Black Hat USA/Black Hat USA 2022/I Am Whoever I Say I Am Infiltrating Identity Providers Using a 0Click Exploit.mp4 30.3 MB
- Black Hat USA/Black Hat USA 2022/Backdooring and Hijacking Azure AD Accounts by Abusing External Identities.mp4 30.3 MB
- Black Hat USA/Black Hat USA 2021/Crashing Your Way to Medium-IL Exploiting the PDB Parser for Privilege Escalation.mp4 30.3 MB
- Black Hat Asia/Black Hat Singapore 2020/Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale.mp4 30.3 MB
- Black Hat DC/Black Hat DC 2011/Video/Responsibility for the Harm and Risk of Security Security Flaws - Cassio Goldschmidt.mp4 30.3 MB
- Black Hat USA/Black Hat USA 2016/Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter.mp4 30.3 MB
- Black Hat Asia/Black Hat Singapore 2017/MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE.mp4 30.3 MB
- Black Hat Europe/Black Hat Europe 2024/Is JavaScript Trustworthy in Cloud Computing.mp4 30.2 MB
- Black Hat Europe/Black Hat Europe 2024/Black Hat EU 2024 Speaker Orientation (Meeting Recording).mp4 30.2 MB
- Black Hat USA/Black Hat USA 2014/video/Exploiting Unpatched iOS Vulnerabilities for Fun and Profit.mp4 30.2 MB
- Black Hat USA/Black Hat USA 2013/video/BinaryPig - Scalable Malware Analytics in Hadoop.mp4 30.2 MB
- Black Hat USA/Black Hat USA 2009/video/Beckstrom’s Law - Rod Beckstrom.mp4 30.2 MB
- Black Hat USA/Black Hat USA 2016/TCP Injection Attacks in the Wild - a Large Scale Study.mp4 30.2 MB
- Black Hat USA/Black Hat USA 2014/video/Digging for IE11 Sandbox Escapes Part 2.mp4 30.2 MB
- Black Hat Asia/Black Hat Singapore 2020/Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation.mp4 30.2 MB
- Black Hat USA/Black Hat USA 2016/Blunting the Phisher's Spear - A Risk-Based Approach.mp4 30.2 MB
- Black Hat USA/Black Hat USA 2014/video/From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices.mp4 30.2 MB
- Black Hat USA/Black Hat USA 2009/video/SADE Injecting Agents in to VM Guest OS - Matt Conover.mp4 30.2 MB
- Black Hat Europe/Black Hat Europe 2021/Achieving Linux Kernel Code Execution Through a Malicious USB Device.mp4 30.2 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Writing Secure and Hack Resistant Code 1-2 - Michaek Howard, David Leblanc.mp4 30.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Hack Your ATM with Friend s Raspberry.Py.mp4 30.2 MB
- Black Hat USA/Black Hat USA 2009/video/Unmasking You - Joshua Abraham, Robert Hansen.mp4 30.1 MB
- Black Hat Europe/Black Hat Europe 2020/FPs are Cheap. Show me the CVEs.mp4 30.1 MB
- Black Hat USA/Black Hat USA 2003/video/Gerardo Richarte - Modern Intrusion Practices.mp4 30.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black-box Assessment of Pseudorandom Algorithms.mp4 30.1 MB
- Black Hat USA/Black Hat USA 2009/video/Recoverable Advanced Metering Infrastructure - Mike Davis.mp4 30.1 MB
- Black Hat USA/Black Hat USA 2003/video/Thomas Akin - WebMail Forensics.mp4 30.1 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_RE5.mp3 30.1 MB
- Black Hat USA/Black Hat USA 2022/Ret2page The Art of Exploiting Use - After - Free Vulnerabilities in the Dedicated Cache.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2016/Account Jumping Post Infection Persistency & Lateral Movement in AWS.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2022/Return to Sender - Detecting Kernel Exploits with eBPF.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2020/Mind Games Using Data to Solve for the Human Element.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2021/A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2022/Better Privacy Through Offense How To Build a Privacy Red Team.mp4 30.0 MB
- Black Hat Asia/Black Hat Singapore 2020/Wi-Fi Brokering.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_T2.mp3 30.0 MB
- Black Hat USA/Black Hat USA 2013/video/Pass-the-Hash 2 - The Admin's Revenge.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2020/Kr00k Serious Vulnerability Affected Encryption of Billion Wi-Fi Devices.mp4 30.0 MB
- Black Hat Asia/Black Hat Singapore 2022/Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2019/Project Zero Five Years of 'Make 0Day Hard'.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2011/video/Covert Post-Exploitation Forensics with Metasploit - Wesley McGrew.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2002/video/Tim Mullen - Neutralizing Nimda Automated Strikeback.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2019/PicoDMA DMA Attacks at Your Fingertips.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2019/Debug for Bug Crack and Hack Apple Core by Itself.mp4 30.0 MB
- Black Hat USA/Black Hat USA 2019/Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine.mp4 29.9 MB
- Black Hat Europe/Black Hat Europe 2018/Container Attack Surface Reduction Beyond Name Space Isolation.mp4 29.9 MB
- Black Hat USA/Black Hat USA 2020/Carrying our Insecurities with Us The Risks of Implanted Medical Devices in Secure Spaces.mp4 29.9 MB
- Black Hat USA/Black Hat USA 2009/video/Embedded Management Interfaces - Hristo Bojinov, Elie Bursztein, Dan Boneh.mp4 29.9 MB
- Black Hat USA/Black Hat USA 2022/Unlimited Results Breaking Firmware Encryption of ESP32 - V3.mp4 29.9 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Charl van der Walt and Christoff Breytenbach - The Role of Non Obvious Relationships in the Foot Printing Process.mp4 29.9 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_R2.mp3 29.9 MB
- Black Hat Asia/Black Hat Singapore 2017/Exploiting USB IP in Linux.mp4 29.9 MB
- Black Hat USA/Black Hat USA 2018/So I became a Domain Controller.mp4 29.9 MB
- Black Hat USA/Black Hat USA 2022/XMPP Stanza Smuggling or How I Hacked Zoom.mp4 29.9 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ec8.mp3 29.9 MB
- Black Hat USA/Black Hat USA 1999/video/Panel - Competitive Intelligence.mp4 29.9 MB
- Black Hat USA/Black Hat USA 2020/Ruling StarCraft Game Spitefully - Exploiting the Blind Spot of AI-Powered Game Bots.mp4 29.9 MB
- Black Hat Asia/Black Hat Singapore 2014/I Know You Want Me - Unplugging PlugX by Takahiro Haruyama & Hiroshi Suzuki.mp4 29.8 MB
- Black Hat USA/Black Hat USA 2010/CLOUDINOMICON - christopher.mp4 29.8 MB
- Black Hat Asia/Black Hat Singapore 2018/Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems.mp4 29.8 MB
- Black Hat Asia/Black Hat Singapore 2014/Keynote by Dr. Steve Crocker.mp4 29.8 MB
- Black Hat USA/Black Hat USA 2020/My Cloud is APT's Cloud Investigating and Defending Office 365.mp4 29.8 MB
- Black Hat Asia/Black Hat Singapore 2015/The Underground Ecosystem of Credit Card Frauds.mp4 29.8 MB
- Black Hat USA/Black Hat USA 2001/video/Martin Roesch - Snort.mp4 29.8 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Cyber Judo - Offensive Cyber Defense.mp4 29.8 MB
- Black Hat Asia/Black Hat Singapore 2020/Misuse of DNS, the Second Most Used Protocol.mp4 29.8 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_wl4.mp3 29.8 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Safeguarding Your Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.mp4 29.8 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_M2.mp3 29.7 MB
- Black Hat Asia/Black Hat Singapore 2024/Attacking Debug Modules In The Android Ecosystem.mp4 29.7 MB
- Black Hat Asia/Black Hat Singapore 2021/Hunting Vulnerabilities of gRPC Protocol Armed Mobile IoT Applications.mp4 29.7 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Applied Black Op Networking on Windows XP - Dan Kaminsky.mp4 29.7 MB
- Black Hat Europe/Black Hat Europe 2020/Effective Vulnerability Discovery with Machine Learning.mp4 29.7 MB
- Black Hat DC/Black Hat DC 2007/Presentations/grand_hh_training_dc2007.pdf 29.7 MB
- Black Hat USA/Black Hat USA 2019/Rough and Ready Frameworks to Measure Persistent Engagement and Deterrence.mp4 29.7 MB
- Black Hat USA/Black Hat USA 2015/video/Bypass Surgery Abusing Content Delivery Networks With Ser-Side Request Forgery.mp4 29.7 MB
- Black Hat Europe/Black Hat Europe 2020/Debug Resurrection on Nordic nRF52 Series.mp4 29.6 MB
- Black Hat USA/Black Hat USA 2000/video/Edward G Schwartz and Diana Kelly - Data Privacy What should the CIO and CISO be doing.mp4 29.6 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Lessons Learned from Eight Years of Breaking Hypervisors.mp4 29.6 MB
- Black Hat USA/Black Hat USA 1999/video/Davis, Ozier, Nebel, and Migues - Panel Discussion.mp4 29.6 MB
- Black Hat USA/Black Hat USA 2001/video/Job de Haas - GSM WAP and SMS Security.mp4 29.6 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/ad-12-Dmitrienko-over-the-air-demo.mp4 29.6 MB
- Black Hat Europe/Black Hat Europe 2017/videos/CLKscrew - Exposing The Perils of Security-Oblivious Energy Management.mp4 29.6 MB
- Black Hat Asia/Black Hat Singapore 2023/PMFault Voltage Fault Injection on Server Platforms Through the PMBus.mp4 29.6 MB
- Black Hat Asia/Black Hat Singapore 2022/ExplosION The Hidden Mines in the Android ION Driver.mp4 29.5 MB
- Black Hat USA/Black Hat USA 2019/Command Injection in F5 iRules.mp4 29.5 MB
- Black Hat DC/Black Hat DC 2010/Hacking Oracle 11g (or has Oracle's security posture really changed - David Litchfield.mp4 29.5 MB
- Black Hat USA/Black Hat USA 2024/Relationships Matter Reconstructing the Organizational and Social Structure of a Ransomware Gang.mp4 29.5 MB
- Black Hat USA/Black Hat USA 2020/Heroku Abuse Operations Hunting Wolves in Sheep's Clothing.mp4 29.5 MB
- Black Hat USA/Black Hat USA 2020/Emulating Samsung's Baseband for Security Testing.mp4 29.5 MB
- Black Hat USA/Black Hat USA 2020/Reversing the Root Identifying the Exploited Vulnerability in 0-days Used In-The-Wild.mp4 29.5 MB
- Black Hat USA/Black Hat USA 2011/video/Don’t Hate the Player, Hate the Game Inside the Android Patch Lifecycle - Anthony Lineberry, Tim Strazzere, Tim Wyatt.mp4 29.4 MB
- Black Hat USA/Black Hat USA 2020/The Paramedic's Guide to Surviving Cybersecurity.mp4 29.4 MB
- Black Hat Asia/Black Hat Singapore 2024/CertifiedDCOM The Privilege Escalation Journey to Domain Admin with DCOM.mp4 29.4 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ee4.mp3 29.4 MB
- Black Hat USA/Black Hat USA 2014/video/It Just (Net)works - The Truth About iOS 7 s Multipeer Connectivity Framework.mp4 29.4 MB
- Black Hat USA/Black Hat USA 2011/video/Hacking Google Chrome OS - Matt Johansen, Kyle Osborn.mp4 29.4 MB
- Black Hat Europe/Black Hat Europe 2020/Hermes Attack Steal DNN Models In AI Privatization Deployment Scenarios.mp4 29.4 MB
- Black Hat DC/Black Hat DC 2011/Video/Identifying the True IP Network Identity of I2P Service Hosts - Adrian Crenshaw aka Irongeek.mp4 29.4 MB
- Black Hat Asia/Black Hat Singapore 2021/Anti-Forensics Reverse Engineering a Leading Phone Forensic Tool.mp4 29.4 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_da4.mp3 29.4 MB
- Black Hat USA/Black Hat USA 2001/video/Kevin McPeake and Chris Goggins - Falling Dominos.mp4 29.4 MB
- Black Hat USA/Black Hat USA 2009/video/Computer Crime Year in Review - Jennifer Granick.mp4 29.4 MB
- Black Hat Europe/Black Hat Europe 2014/Video/APTs Way - Evading Your EBNIDS.mp4 29.4 MB
- Black Hat USA/Black Hat USA 2011/video/SSL And The Future of Authenticity - Moxie Marlinspike.mp4 29.4 MB
- Black Hat DC/Black Hat DC 2010/An Uninvited Guest Who Won't Go Home - Bill.mp4 29.3 MB
- Black Hat Asia/Black Hat Singapore 2022/Remote Memory-Deduplication Attacks.mp4 29.3 MB
- Black Hat USA/Black Hat USA 2013/video/The Outer Limits - Hacking The Samsung Smart TV.mp4 29.3 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Workshop - Understanding Botnets By Building One.mp4 29.3 MB
- Black Hat Asia/Black Hat Singapore 2022/Like Lightning From the Cloud Finding RCEs in an Embedded TLS Library.mp4 29.3 MB
- Black Hat USA/Black Hat USA 2003/video/Jan K Rutkowski - Advance Windows 2000 Rootkits Detection.mp4 29.3 MB
- Black Hat USA/Black Hat USA 2008/video/SmartCard APDU Analysis - Ivan Buetler.mp4 29.3 MB
- Black Hat USA/Black Hat USA 2003/video/Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks.mp4 29.2 MB
- Black Hat Asia/Black Hat Singapore 2021/Threat Hunting in Active Directory Environment.mp4 29.2 MB
- Black Hat DC/Black Hat DC 2011/Video/Stuxnet Redux - Malware Attribution and Lessons Learned - Taking the guesswork out of cyber attribution - Tom Parker.mp4 29.2 MB
- Black Hat DC/Black Hat DC 2010/Physical Security in a Networked World - Video Surveillance, Video Analytics, and you - Joshua A Marpet.mp4 29.2 MB
- Black Hat Asia/Black Hat Singapore 2019/See Like a Bat Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs.mp4 29.2 MB
- Black Hat Asia/Black Hat Singapore 2020/From an URGENT 11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet.mp4 29.1 MB
- Black Hat USA/Black Hat USA 2019/Automation Techniques in C Reverse Engineering.mp4 29.1 MB
- Black Hat USA/Black Hat USA 2013/video/Lawful Access Panel.mp4 29.1 MB
- Black Hat USA/Black Hat USA 2010/Understanding the Windows SMB NTLM weak nonce vulnerablity - Hernan Ochoa, Agustin Azubel.mp4 29.1 MB
- Black Hat USA/Black Hat USA 2020/Stealthily Access Your Android Phones Bypass the Bluetooth Authentication.mp4 29.1 MB
- Black Hat USA/Black Hat USA 2005/video/Kenneth Geers - Hacking in a Foreign.mp4 29.1 MB
- Black Hat USA/Black Hat USA 2003/video/Eric Goldman - Criminal Copyright infringement and warez trading.mp4 29.1 MB
- Black Hat USA/Black Hat USA 2010/Your career is your business - Lee Kushner, Mike Murray.mp4 29.1 MB
- Black Hat Asia/Black Hat Singapore 2017/Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT.mp4 29.1 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Intel ME - Flash File System Explained.mp4 29.1 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Marcus Ranum - Full Disclosure and Open Source 2-2.opus 29.0 MB
- Black Hat USA/Black Hat USA 2020/Breaking Brains, Solving Problems Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros.mp4 29.0 MB
- Black Hat USA/Black Hat USA 2022/Ghost in the Wireless, iwlwifi Edition.mp4 29.0 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Securing Your Network 1-2 - Eric Schultze & Erik Birkholz.mp4 29.0 MB
- Black Hat USA/Black Hat USA 2022/ElectroVolt Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron.mp4 29.0 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Forensics Tools and Processes for Windows XP Platforms - Larry Leibrock.mp4 28.9 MB
- Black Hat Asia/Black Hat Singapore 2020/Faking a Factory Creating and Operating a Realistic Honeypot.mp4 28.9 MB
- Black Hat Asia/Black Hat Singapore 2020/3d Red Pill - A Guest-to-Host Escape on QEMU KVM Virtio Device.mp4 28.9 MB
- Black Hat Europe/Black Hat Europe 2021/APTs Go Teleworking The Rise of VPN Exploits.mp4 28.9 MB
- Black Hat USA/Black Hat USA 2020/A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning.mp4 28.9 MB
- Black Hat DC/Black Hat DC 2008/Video/Side Channel Analysis on Embedded Systems Impact and Countermeasures - Job de Haas.mp4 28.9 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Lost in Transaction - Process Doppelgänging.mp4 28.9 MB
- Black Hat USA/Black Hat USA 2014/video/Breaking the Security of Physical Devices by Silvio Cesare.mp4 28.9 MB
- Black Hat USA/Black Hat USA 2014/video/PWNIE Awards at Black Hat USA 2014.mp4 28.8 MB
- Black Hat USA/Black Hat USA 2009/video/Lockpicking Forensics - Datagram.mp4 28.8 MB
- Black Hat USA/Black Hat USA 2003/video/Drew Miller - .Net from the hackers perspective Part 2 .mp4 28.8 MB
- Black Hat Asia/Black Hat Singapore 2021/Reverse Engineering Compliance.mp4 28.8 MB
- Black Hat USA/Black Hat USA 2008/video/iRK - Crafting OS X Kernel Rootkits - Jesse D’Aguanno.mp4 28.8 MB
- Black Hat USA/Black Hat USA 2019/Critical Zero Days Remotely Compromise the Most Popular Real-Time OS.mp4 28.8 MB
- Black Hat USA/Black Hat USA 2003/video/Jaya Baloo - Lawful Interception of IP the European Context.mp4 28.8 MB
- Black Hat USA/Black Hat USA 2022/Do Not Trust the ASA, Trojans.mp4 28.7 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Red Team Techniques for Evading, Bypassing & Disabling MS.mp4 28.7 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Hiding PIN's Artifacts to Defeat Evasive Malware.mp4 28.7 MB
- Black Hat DC/Black Hat DC 2008/Video/Botnet Population and Intelligence Gathering Techniques - Christopher Davis & David Dagon.mp4 28.7 MB
- Black Hat USA/Black Hat USA 2009/video/Sniff Keystrokes with Lasers Voltmeters - Andrea Barisani, Daniele Bianco.mp4 28.7 MB
- Black Hat USA/Black Hat USA 2015/video/Internet Plumbing Gor Security Professionals The State Of BGP Security.mp4 28.7 MB
- Black Hat USA/Black Hat USA 2021/Whoops, I Accidentally Helped Start the Offensive Intel Branch of a Foreign Intel Service.mp4 28.7 MB
- Black Hat USA/Black Hat USA 2008/video/Highway to Hell Hacking Toll Systems - Nate Lawson.mp4 28.7 MB
- Black Hat USA/Black Hat USA 2022/sOfT7 Revealing the Secrets of Siemens S7 PLCs.mp4 28.7 MB
- Black Hat USA/Black Hat USA 2020/Repurposing Neural Networks to Generate Synthetic Media for Information Operations.mp4 28.7 MB
- Black Hat Europe/Black Hat Europe 2019/Inside Out - The Cloud has Never been so Close.mp4 28.6 MB
- Black Hat USA/Black Hat USA 2014/video/Reverse Engineering Flash Memory for Fun and Benefit.mp4 28.6 MB
- Black Hat USA/Black Hat USA 2014/video/Miniaturization.mp4 28.6 MB
- Black Hat USA/Black Hat USA 2008/video/Black Ops 2008 - Dan Kaminsky.mp4 28.6 MB
- Black Hat USA/Black Hat USA 2020/Whispers Among the Stars A Practical Look at Perpetrating Satellite Eavesdropping Attacks.mp4 28.6 MB
- Black Hat USA/Black Hat USA 2021/DBREACH Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics.mp4 28.5 MB
- Black Hat USA/Black Hat USA 2009/video/Johnny Long Me to We - Johnny Long.mp4 28.5 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_H2.mp3 28.5 MB
- Black Hat USA/Black Hat USA 2016/Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process.mp4 28.5 MB
- Black Hat USA/Black Hat USA 2022/Google Reimagined a Phone. It was Our Job to Red Team and Secure it.mp4 28.5 MB
- Black Hat USA/Black Hat USA 2013/video/With BIGDATA comes BIG responsibility - Practical exploiting of MDX injections.mp4 28.5 MB
- Black Hat USA/Black Hat USA 2024/Hook, Line and Sinker Phishing Windows Hello for Business.mp4 28.4 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Freeze Drying for Capturing Environment-Sensitive Malware Alive.mp4 28.4 MB
- Black Hat USA/Black Hat USA 2015/video/The Battle For Free Speech On The Internet.mp4 28.4 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-1/bh-asia-03-day2-t1-3-16-28-56.rm 28.4 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-6-16-28-56.rm 28.4 MB
- Black Hat Europe/Black Hat Europe 2021/A Universal Way to Exploit Android PendingIntents in High profile and System Apps.mp4 28.4 MB
- Black Hat USA/Black Hat USA 2020/OTRazor Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts.mp4 28.4 MB
- Black Hat USA/Black Hat USA 2021/The Kitten that Charmed Me The 9 Lives of a Nation State Attacker.mp4 28.4 MB
- Black Hat Asia/Black Hat Singapore 2023/Deception at Scale How Malware Abuses Trust.mp4 28.3 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_E2.mp3 28.3 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Securing Wireless Networks with 802.1x, EAP-TLS and PEAP - Steve Riley.mp4 28.3 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/03121903-surestream-16-28-56.rm 28.3 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/03121903-surestream-16-28-56_arch001.rm 28.3 MB
- Black Hat USA/Black Hat USA 2011/video/Mobile Malware Madness, and How To Cap the Mad Hatters - Neil Daswani.mp4 28.3 MB
- Black Hat USA/Black Hat USA 2004/Jennifer Granick - Legal Liability and Security Incident Investigation.mp4 28.3 MB
- Black Hat USA/Black Hat USA 2018/Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies.mp4 28.3 MB
- Black Hat USA/Black Hat USA 2002/video/Scott Blake - Politics of Vulnerabilities.mp4 28.3 MB
- Black Hat USA/Black Hat USA 2015/video/Repurposing OnionDuke A Single Case Study Around Reusing Nation State Malware.mp4 28.3 MB
- Black Hat USA/Black Hat USA 2024/PageJack A Powerful Exploit Technique With Page-Level UAF.mp4 28.3 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_mt4.mp3 28.3 MB
- Black Hat USA/Black Hat USA 2022/DirectX The New Hyper - V Attack Surface.mp4 28.2 MB
- Black Hat USA/Black Hat USA 2022/The COW (Container On Windows) Who Escaped the Silo.mp4 28.2 MB
- Black Hat USA/Black Hat USA 2016/Dungeons Dragons and Security.mp4 28.2 MB
- Black Hat USA/Black Hat USA 2011/video/Vulnerability Extrapolation or Give Me More Bugs Like That, Please - Fabian Yamaguchi.mp4 28.2 MB
- Black Hat USA/Black Hat USA 2011/video/Virtualization Under Attack Breaking Out of KVM - Nelson Elhage.mp4 28.2 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_C1.mp3 28.2 MB
- Black Hat USA/Black Hat USA 2015/video/Review And Exploit Neglected Attack Surfaces In IOS 8.mp4 28.2 MB
- Black Hat USA/Black Hat USA 2019/The Discovery of a Government Malware and an Unexpected Spy Scandal.mp4 28.2 MB
- Black Hat DC/Black Hat DC 2011/Video/Beyond AutoRun - Exploiting Software Vulnerabilities with Removable Storage - Jon Larimer.mp4 28.2 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_wh4.mp3 28.1 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_da1.mp3 28.1 MB
- Black Hat USA/Black Hat USA 2006/video/Hoffman - Analysis of Web App worms.mp4 28.1 MB
- Black Hat USA/Black Hat USA 2009/video/Router Exploitation - FX.mp4 28.1 MB
- Black Hat USA/Black Hat USA 2010/BlindElephant - Patrick Thomas.mp4 28.1 MB
- Black Hat USA/Black Hat USA 2010/There's a party at ring0 - Tavis Ormandy, Julien Tinnes.mp4 28.1 MB
- Black Hat USA/Black Hat USA 2013/video/Universal DDoS Mitigation Bypass.mp4 28.1 MB
- Black Hat Europe/Black Hat Europe 2018/Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses.mp4 28.1 MB
- Black Hat Europe/Black Hat Europe 2021/Owfuzz WiFi Nightmare.mp4 28.1 MB
- Black Hat USA/Black Hat USA 2013/video/Compromising Industrial Facilities from 40 Miles Away.mp4 28.0 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_RE3.mp3 28.0 MB
- Black Hat USA/Black Hat USA 2011/video/Physical Memory Forensics for Files and Cache - Jamie Butler, Justin Murdock.mp4 28.0 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_mt2.mp3 28.0 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Silently Breaking ASLR In The Cloud.mp4 28.0 MB
- Black Hat USA/Black Hat USA 2009/video/The Laws of Vulnerabilities Research Version 2.0 Comparing Critical Infrastructure Industries - Panel.mp4 28.0 MB
- Black Hat Windows/Black Hat Windows 2003/Video/IIS 6.0's Security Architecture - It's a Whole New World - Michael Muckin.mp4 28.0 MB
- Black Hat USA/Black Hat USA 2015/video/Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware.mp4 27.9 MB
- Black Hat Europe/Black Hat Europe 2015/videos/LTE & IMSI Catcher Myths.mp4 27.9 MB
- Black Hat USA/Black Hat USA 2022/Android Universal Root Exploiting Mobile GPU - Command Queue Drivers.mp4 27.9 MB
- Black Hat USA/Black Hat USA 2014/video/Leviathan - Command and Control Communications on Planet Earth.mp4 27.9 MB
- Black Hat USA/Black Hat USA 2021/Qualcomm WiFi Infinity War.mp4 27.9 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Vulnerability Exploitation In Docker Container Environments.mp4 27.9 MB
- Black Hat USA/Black Hat USA 2002/video/Cean Convery - Hacking Layer Two.mp4 27.9 MB
- Black Hat Europe/Black Hat Europe 2020/Finding Bugs Compiler Knows but Doesn't Tell You-Dissecting Undefined Behavior Optimizations in LLVM.mp4 27.9 MB
- Black Hat USA/Black Hat USA 2014/video/Android FakeID Vulnerability Walkthrough.mp4 27.8 MB
- Black Hat USA/Black Hat USA 2008/video/Predictable PRNG in the vulnerable Debian OpenSSL package, the What and the How - Luciano Bello and Maximiliano Bertacchini.mp4 27.8 MB
- Black Hat USA/Black Hat USA 2019/The Future of ATO.mp4 27.8 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_R5.mp3 27.8 MB
- Black Hat Asia/Black Hat Singapore 2021/We Are About to Land - How CloudDragon Turns a Nightmare Into Reality.mp4 27.8 MB
- Black Hat USA/Black Hat USA 2013/video/Just-In-Time Code Reuse - The More Things Change, the More They Stay the Same.mp4 27.8 MB
- Black Hat Asia/Black Hat Singapore 2014/Tomorrow's News is Today's Intel - Journalists as Targets and Compromise Vectors by Shane Huntley.mp4 27.8 MB
- Black Hat USA/Black Hat USA 2024/Stop Sandboxing Exploitable Functions and Modules Using In-Kernel Machine Learning.mp4 27.8 MB
- Black Hat USA/Black Hat USA 2010/Virt-ICE next gen debugger for malware analysis - NGUYEN Anh Quynh.mp4 27.8 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Incident Response in a Microsoft World - John Mushin.mp4 27.7 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_si2.mp3 27.7 MB
- Black Hat USA/Black Hat USA 2020/Dive into Apple IO80211FamilyV2.mp4 27.7 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing.mp4 27.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_I4.mp3 27.7 MB
- Black Hat USA/Black Hat USA 2016/Does Dropping USB Drives in Parking Lots and Other Places Really Work.mp4 27.7 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_da2.mp3 27.6 MB
- Black Hat Asia/Black Hat Singapore 2024/Back to the Roots Finding the Origin of CSP Security Bugs.mp4 27.6 MB
- Black Hat DC/Black Hat DC 2011/Video/The Apple Sand Box - Dionysus Blazakis.mp4 27.6 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_E3.mp3 27.6 MB
- Black Hat USA/Black Hat USA 2015/video/Securing Your Big Data Environment.mp4 27.6 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ee1.mp3 27.6 MB
- Black Hat Europe/Black Hat Europe 2018/Level Up Your Security Mindset.mp4 27.6 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_si5.mp3 27.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ti1.mp3 27.5 MB
- Black Hat USA/Black Hat USA 2003/video/David Maynor - Leave the Theory Behind and Embrace the Code.mp4 27.5 MB
- Black Hat USA/Black Hat USA 2019/Everybody be Cool, This is a Robbery.mp4 27.5 MB
- Black Hat USA/Black Hat USA 2019/Ghidra - Journey from Classified NSA Tool to Open Source.mp4 27.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_wl1.mp3 27.5 MB
- Black Hat Asia/Black Hat Singapore 2021/Hiding Objects from Computer Vision by Exploiting Correlation Biases.mp4 27.5 MB
- Black Hat USA/Black Hat USA 2001/video/Last Stage Of Delirium Research Group - UNIX Assembly Codes Development for Vulnerabilities.mp4 27.4 MB
- Black Hat USA/Black Hat USA 2001/video/Rain Forest Puppy - TBD.mp4 27.4 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_P5.mp3 27.4 MB
- Black Hat Europe/Black Hat Europe 2020/POSWorld. Should You be Afraid of Hands-On Payment Devices.mp4 27.4 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ti4.mp3 27.4 MB
- Black Hat USA/Black Hat USA 2016/Design Approaches for Security Automation.mp4 27.4 MB
- Black Hat USA/Black Hat USA 2010/Utilizing code reuse - Stefan Esser.mp4 27.4 MB
- Black Hat USA/Black Hat USA 2014/video/MoRE Shadow Walker - The Progression of TLB-Splitting on x86.mp4 27.4 MB
- Black Hat USA/Black Hat USA 2020/Hacking the Supply Chain - The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices.mp4 27.3 MB
- Black Hat USA/Black Hat USA 2003/video/Adam Shostack - Identity, Economics, Security, and Terrorism.mp4 27.3 MB
- Black Hat Asia/Black Hat Singapore 2014/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 1 by Jose Miguel Esparza.mp4 27.3 MB
- Black Hat USA/Black Hat USA 2006/video/Paul Bohm - Taming Bugs.mp4 27.3 MB
- Black Hat USA/Black Hat USA 2021/Defeating a Secure Element with Multiple Laser Fault Injections.mp4 27.3 MB
- Black Hat Europe/Black Hat Europe 2019/OEM Finder Hunting Vulnerable OEM IoT Devices at Scale.mp4 27.3 MB
- Black Hat USA/Black Hat USA 2022/Cautious A New Exploitation Method No Pipe but as Nasty as Dirty Pipe.mp4 27.3 MB
- Black Hat USA/Black Hat USA 2013/video/Press ROOT to Continue - Detecting OSX and Windows Bootkits with RDFU.mp4 27.3 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_PN1.mp3 27.3 MB
- Black Hat USA/Black Hat USA 2016/Over the Edge - Silently Owning Windows 10's Secure Browser.mp4 27.3 MB
- Black Hat USA/Black Hat USA 2021/Hack Different Pwning iOS 14 with Generation Z Bug.mp4 27.2 MB
- Black Hat USA/Black Hat USA 2003/video/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Practice) 2-2.mp4 27.2 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_M5.mp3 27.2 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Hunting Flaws in MS SQL Server - Cesar Cerrudo, Aaron Newman.mp4 27.2 MB
- Black Hat USA/Black Hat USA 2020/Escaping Virtualized Containers.mp4 27.2 MB
- Black Hat Europe/Black Hat Europe 2015/videos/New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.mp4 27.2 MB
- Black Hat USA/Black Hat USA 2019/HTTP Desync Attacks Smashing into the Cell Next Door.mp4 27.1 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_I3.mp3 27.1 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Exploiting Adobe Flash Player In The Era Of Control Flow Guard.mp4 27.1 MB
- Black Hat USA/Black Hat USA 2008/video/Leveraging the Edge Abusing SSL VPNs - Mike Zusman.mp4 27.1 MB
- Black Hat USA/Black Hat USA 2011/video/USB - Undermining Security Barriers - Andy Davis.mp4 27.1 MB
- Black Hat Asia/Black Hat Singapore 2015/Hopping on the CAN Bus.mp4 27.1 MB
- Black Hat USA/Black Hat USA 2013/video/Abusing Web APIs Through Scripted Android Applications.mp4 27.1 MB
- Black Hat USA/Black Hat USA 2009/video/Internet Special Ops - Andrew Fried, Paul Vixie, Christopher Lee.mp4 27.0 MB
- Black Hat USA/Black Hat USA 2013/video/How to grow a TREE (Taint-Enabled Reverse Engineering Environment) from a CBASS.mp4 27.0 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ti3.mp3 27.0 MB
- Black Hat Asia/Black Hat Singapore 2021/The Motion Sensor Western The Good, the Bad, and the Ugly.mp4 27.0 MB
- Black Hat USA/Black Hat USA 2013/video/Fact and Fiction - Defending Medical Device.mp4 27.0 MB
- Black Hat DC/Black Hat DC 2008/Video/URI Use and Abuse - Nathan McFeters and Rob Carter.mp4 27.0 MB
- Black Hat Europe/Black Hat Europe 2020/Portable Data exFiltration XSS for PDFs.mp4 27.0 MB
- Black Hat USA/Black Hat USA 2020/Stopping Snake Oil with Smaller Healthcare Providers Addressing Security with Actionable Plans.mp4 27.0 MB
- Black Hat Asia/Black Hat Singapore 2022/Cooper Knows the Shortest Stave Finding 134 Bugs in the Binding Code of Scripting Languages.mp4 27.0 MB
- Black Hat USA/Black Hat USA 2016/Viral Video - Exploiting SSRF in Video Converters.mp4 27.0 MB
- Black Hat Asia/Black Hat Singapore 2021/Scavenger Misuse Error Handling Leading to Qemu KVM Escape.mp4 27.0 MB
- Black Hat USA/Black Hat USA 2016/Breaking FIDO - Are Exploits in There.mp4 27.0 MB
- Black Hat USA/Black Hat USA 2008/video/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 2-2 - John Benson.mp4 27.0 MB
- Black Hat USA/Black Hat USA 2016/AVLeak - Fingerprinting Antivirus Emulators for Advanced Malware Evasion.mp4 27.0 MB
- Black Hat USA/Black Hat USA 2011/video/Siemens Simatic S7 PLC Exploitation - Dillon Beresford.mp4 26.9 MB
- Black Hat USA/Black Hat USA 2011/video/Beyond Files Forensic OWADE Cloud Based Forensic - Elie Bursztein.mp4 26.9 MB
- Black Hat DC/Black Hat DC 2010/The Underground Economy of the Pay Per Install PPI Business - Kevin Stevens.mp4 26.9 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Man in the Binder - He Who Controls IPC, Controls the Droid.mp4 26.9 MB
- Black Hat USA/Black Hat USA 2010/Social Networking Special Ops - Chris Sumner.mp4 26.9 MB
- Black Hat USA/Black Hat USA 2013/video/Java Every-Days - Exploiting Software Running on Three Billion Devices.mp4 26.9 MB
- Black Hat USA/Black Hat USA 2003/video/Bruce Schneier - Keynote, Following the Money Security Proxies and Agenda.mp4 26.9 MB
- Black Hat Asia/Black Hat Singapore 2024/A Glimpse Into The Protocol Fuzz Windows RDP Client For Fun And Profit.mp4 26.9 MB
- Black Hat USA/Black Hat USA 2018/How can Someone with Autism Specifically Enhance the Cyber Security Workforce.mp4 26.9 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ent4.mp3 26.9 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_I5.mp3 26.9 MB
- Black Hat Europe/Black Hat Europe 2000/Video/Issues Surrounding International Computer Crime Laws - Jennifer Granick.mp4 26.9 MB
- Black Hat Asia/Black Hat Singapore 2021/A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices.mp4 26.9 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ec9.mp3 26.8 MB
- Black Hat Asia/Black Hat Singapore 2014/Discovering Debug Interfaces with the JTAGulator Part 2 by Joe Grand.mp4 26.8 MB
- Black Hat USA/Black Hat USA 2004/Joe Grand - Introduction to Embedded Security.mp4 26.8 MB
- Black Hat USA/Black Hat USA 2000/video/David LeBlanc - Real World Techniques in Network Security Management.mp4 26.7 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bs1.mp3 26.7 MB
- Black Hat USA/Black Hat USA 2003/video/Dan Kaminsky - Stack Black Ops.mp4 26.7 MB
- Black Hat USA/Black Hat USA 2009/video/Netscreen of the Dead - Graeme Neilson.mp4 26.7 MB
- Black Hat DC/Black Hat DC 2008/Presentations/Dhanjani-Rios/Presentation/bh-dc-08-dhanjani-rios.pdf 26.7 MB
- Black Hat USA/Black Hat USA 2003/video/Jennifer Granick - The Law of 'Sploits.mp4 26.7 MB
- Black Hat USA/Black Hat USA 2008/video/Malware Detection Through Network Flow Analysis - Bruce Potter.mp4 26.7 MB
- Black Hat USA/Black Hat USA 2020/An Unauthenticated Journey to Root Pwning Your Company's Enterprise Software Servers.mp4 26.7 MB
- Black Hat Europe/Black Hat Europe 2020/Jack-in-the-Cache A New Code injection Technique through Modifying X86-to-ARM Translation Cache.mp4 26.7 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-2/bh-asia-03-day2-t2-1-16-28-56.rm 26.7 MB
- Black Hat USA/Black Hat USA 2016/The Year in Flash.mp4 26.7 MB
- Black Hat DC/Black Hat DC 2011/Video/Stale pointers are the new black - Vincenzo Iozzo, Giovanni Gola.mp4 26.7 MB
- Black Hat USA/Black Hat USA 2001/video/Ian Goldberg - Breaking 80211 WEP.mp4 26.6 MB
- Black Hat USA/Black Hat USA 2021/Put in One Bug and Pop Out More An Effective Way of Bug Hunting in Chrome.mp4 26.6 MB
- Black Hat USA/Black Hat USA 2012/video/Trust, Security and Society.mp4 26.6 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_H5.mp3 26.6 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_k2.mp3 26.6 MB
- Black Hat Asia/Black Hat Singapore 2024/Operation PoisonedApple Tracing Credit Card Information Theft to Payment Fraud.mp4 26.6 MB
- Black Hat USA/Black Hat USA 2010/Unauthorized Internet Wiretapping - Tim Cross.mp4 26.6 MB
- Black Hat Europe/Black Hat Europe 2024/Reasonable Regs vs Red Tape How Should Governments Tackle the Cyber Intrusion Market.mp4 26.6 MB
- Black Hat USA/Black Hat USA 2008/video/Hacking and Injecting Federal Trojans - 1-2 - Lukas Grunwald.mp4 26.6 MB
- Black Hat USA/Black Hat USA 2019/Flying a False Flag Advanced C2, Trust Conflicts, and Domain Takeover.mp4 26.6 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.mp4 26.5 MB
- Black Hat USA/Black Hat USA 2005/video/David Mortman, Others - National ID Debate.mp4 26.5 MB
- Black Hat USA/Black Hat USA 2015/video/Distributing The Reconstruction Of High Level Intermediate Representation.mp4 26.5 MB
- Black Hat USA/Black Hat USA 2019/Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs.mp4 26.5 MB
- Black Hat USA/Black Hat USA 2008/video/New Classes of Security and Privacy Vulnerabilities for Implantable Wireless Medical Devices - Tadayoshi Kohno, Kevin Fu.mp4 26.5 MB
- Black Hat USA/Black Hat USA 2010/Wardriving the smart Grid - shawn moyer.mp4 26.5 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_RA1.mp3 26.5 MB
- Black Hat USA/Black Hat USA 2003/video/Lance Spitzner - Honeypots.mp4 26.5 MB
- Black Hat USA/Black Hat USA 2010/These aren't the permissions you're looking for - Anthony Lineberry, Tim Wyatt, David Luke Richardson.mp4 26.5 MB
- Black Hat USA/Black Hat USA 2001/video/Cory Scott - Systems Management in an Untrusted Network.mp4 26.5 MB
- Black Hat Asia/Black Hat Singapore 2014/Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang.mp4 26.4 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations.mp4 26.4 MB
- Black Hat Asia/Black Hat Singapore 2017/Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box.mp4 26.4 MB
- Black Hat USA/Black Hat USA 2009/video/MetaPhish pt. 1 - Val Smith, Colin Ames & David Kerb.mp4 26.4 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.mp4 26.4 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_PN6.mp3 26.4 MB
- Black Hat USA/Black Hat USA 2015/video/Spread Spectrum Satcom Hacking Attacking The Globalstar Simplex Data Service.mp4 26.4 MB
- Black Hat USA/Black Hat USA 2010/Standing on the shoulders of the blue monster - olle b.mp4 26.3 MB
- Black Hat DC/Black Hat DC 2011/Video/Hey You, Get Off of My Cloud - Application-Level Denial of Service Attacks and Defenses - Bryan Sullivan.mp4 26.3 MB
- Black Hat Europe/Black Hat Europe 2018/Attacking and Defending Blockchains From Horror Stories to Secure Wallets.mp4 26.3 MB
- Black Hat USA/Black Hat USA 2009/video/Introducing Ring -3 Rootkits - Alexander Tereshkin & Rafal Wojtczuk.mp4 26.3 MB
- Black Hat USA/Black Hat USA 2003/video/Josh Daymont - Hardening Windows CE.mp4 26.3 MB
- Black Hat Asia/Black Hat Singapore 2016/Numchecker - A System Approach for Kernel Rootkit Detection.mp4 26.3 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_T3.mp3 26.3 MB
- Black Hat USA/Black Hat USA 2005/video/Robert W Clark - Legal Aspects.mp4 26.3 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Dealing The Perfect Hand - Shuffling Memory Blocks On z OS.mp4 26.3 MB
- Black Hat USA/Black Hat USA 2012/video/Legal Aspects of Cyberspace Operations.mp4 26.3 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_P1.mp3 26.3 MB
- Black Hat USA/Black Hat USA 2021/hAFL1 Our Journey of Fuzzing Hyper-V and Discovering a 0-Day.mp4 26.3 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Payload Anatomy & Future Mutations - Riley Hassell.mp4 26.2 MB
- Black Hat USA/Black Hat USA 2019/Breaking Samsung's ARM TrustZone.mp4 26.2 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_da3.mp3 26.2 MB
- Black Hat USA/Black Hat USA 2012/video/Backdoors.mp4 26.2 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning.mp4 26.2 MB
- Black Hat Asia/Black Hat Singapore 2014/Discovering Debug Interfaces with the JTAGulator Part 1 by Joe Grand.mp4 26.2 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Panel - Hacker Court.opus 26.2 MB
- Black Hat USA/Black Hat USA 2020/A Decade After Stuxnet's Printer Vulnerability Printing is Still the Stairway to Heaven.mp4 26.2 MB
- Black Hat USA/Black Hat USA 2016/Memory Forensics Using Virtual Machine Introspection for Cloud Computing.mp4 26.2 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_si1.mp3 26.1 MB
- Black Hat USA/Black Hat USA 2010/The DMCA and ACTA Vs Academic and Professional Research - Tiffany Rad, Christopher Mooney.mp4 26.1 MB
- Black Hat Europe/Black Hat Europe 2001/video/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 1-2.mp4 26.1 MB
- Black Hat USA/Black Hat USA 2009/video/Win at Reversing - Nick Harbour.mp4 26.1 MB
- Black Hat USA/Black Hat USA 2005/video/Jennifer Granick - Top 10 Issues.mp4 26.1 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Graph-Based Binary Analysis - Halvar Flake.mp4 26.1 MB
- Black Hat Asia/Black Hat Singapore 2017/Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data.mp4 26.1 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_L1.mp3 26.1 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Dan Kaminsky - Stack Black Ops.mp4 26.1 MB
- Black Hat USA/Black Hat USA 2019/Fantastic Red-Team Attacks and How to Find Them.mp4 26.1 MB
- Black Hat Europe/Black Hat Europe 2021/Your Trash Kernel Bug, My Precious 0 day.mp4 26.1 MB
- Black Hat USA/Black Hat USA 2008/video/No More Signatures Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling - Ivan Ristic, Ofar Shezaf.mp4 26.1 MB
- Black Hat Europe/Black Hat Europe 2016/videos/DRAMA - How Your DRAM Becomes a Security Problem.mp4 26.1 MB
- Black Hat USA/Black Hat USA 2015/video/Return To Where You Can t Exploit What You Can t Find.mp4 26.1 MB
- Black Hat USA/Black Hat USA 2002/video/Mike Schiffman - The Need for an 802.11b Toolkit.mp4 26.1 MB
- Black Hat USA/Black Hat USA 2013/video/Smashing the Font Scaler Engine in Windows Kernel.mp4 26.0 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Healthcare and New Federal Security Protections - Kate Borten.mp4 26.0 MB
- Black Hat USA/Black Hat USA 2020/Beyond Root Custom Firmware for Embedded Mobile Chipsets.mp4 26.0 MB
- Black Hat Europe/Black Hat Europe 2023/HODOR Reducing Attack Surface on Node.js via System Call Limitation.mp4 26.0 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Exfiltrating Reconnaissance Data from Air-Gapped ICS SCADA Networks.mp4 26.0 MB
- Black Hat Europe/Black Hat Europe 2016/videos/CTX - Eliminating BREACH with Context Hiding.mp4 26.0 MB
- Black Hat USA/Black Hat USA 2004/Alessandro Acquisti - Privacy Economics and Immediate Gratification.mp4 25.9 MB
- Black Hat Windows/Black Hat Windows 2003/Video/HTTP Advanced Assessment Techniques - Saumil Shah.mp4 25.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/KEYNOTE - Whitfield Diffie.mp4 25.9 MB
- Black Hat USA/Black Hat USA 2020/Room for Escape Scribbling Outside the Lines of Template Security.mp4 25.9 MB
- Black Hat Europe/Black Hat Europe 2018/BLEEDINGBIT Your APs Belong to Us.mp4 25.9 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_I1.mp3 25.9 MB
- Black Hat USA/Black Hat USA 2019/Inside the Apple T2.mp4 25.9 MB
- Black Hat USA/Black Hat USA 2008/video/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite.mp4 25.9 MB
- Black Hat USA/Black Hat USA 2018/WebAssembly - A New World of Native Exploits on the Browser.mp4 25.9 MB
- Black Hat USA/Black Hat USA 2021/Let's Attack Let's Encrypt.mp4 25.8 MB
- Black Hat USA/Black Hat USA 2001/video/Chip Andrews - SQL Security Revisited.mp4 25.8 MB
- Black Hat USA/Black Hat USA 2024/Bypassing ARM's Memory Tagging Extension with a Side-Channel Attack.mp4 25.8 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_H1.mp3 25.8 MB
- Black Hat USA/Black Hat USA 2013/video/BlackberryOS 10 From a Security Perspective.mp4 25.8 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bf1.mp3 25.8 MB
- Black Hat USA/Black Hat USA 2020/Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities.mp4 25.8 MB
- Black Hat USA/Black Hat USA 2002/video/Rick Smith - The Biometrics Dilemma.mp4 25.8 MB
- Black Hat USA/Black Hat USA 2005/video/Joseph Ansanelli - Future of Personal info.mp4 25.8 MB
- Black Hat USA/Black Hat USA 2018/The Science of Hiring and Retaining Female Cybersecurity Engineers.mp4 25.8 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/03121902-surestream-16-28-56.rm 25.8 MB
- Black Hat DC/Black Hat DC 2011/Video/How To Hack Companiesand Make Millions- Part 2-2 - Chris Hadnagy.mp4 25.8 MB
- Black Hat USA/Black Hat USA 2009/video/Attacking Intel Bios - Rafal Wojtczuk, Alexander Tereshkin.mp4 25.7 MB
- Black Hat Europe/Black Hat Europe 2021/Vulnerability Intelligence.mp4 25.7 MB
- Black Hat Europe/Black Hat Europe 2021/ECMO Rehost Embedded Linux Kernels via Peripheral Transplantation.mp4 25.7 MB
- Black Hat Asia/Black Hat Singapore 2021/Apple Neural Engine Internal From ML Algorithm to HW Registers.mp4 25.7 MB
- Black Hat USA/Black Hat USA 2012/video/File Disinfection Framework.mp4 25.7 MB
- Black Hat USA/Black Hat USA 2018/Understanding and Exploiting Implanted Medical Devices.mp4 25.7 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Rooting EVERY Android - From Extension to Exploitation.mp4 25.7 MB
- Black Hat USA/Black Hat USA 2002/video/Goldman and Marotta - Securing Your Computing Environment to Conform to Privacy Regulations.mp4 25.7 MB
- Black Hat USA/Black Hat USA 2002/video/Rain Forest Puppy - Novell The Forgotten OS.mp4 25.7 MB
- Black Hat USA/Black Hat USA 2011/video/Playing in the Reader X Sandbox - Paul Sabanal, Mark Yason.mp4 25.7 MB
- Black Hat USA/Black Hat USA 2003/video/Panel - Hacker Court.mp4 25.7 MB
- Black Hat USA/Black Hat USA 2009/video/Attacking SMS - Zane Lackey, Luis Miras.mp4 25.7 MB
- Black Hat USA/Black Hat USA 2020/Healthscare - An Insider's Biopsy of Healthcare Application Security.mp4 25.6 MB
- Black Hat USA/Black Hat USA 2019/Breaking Encrypted Databases Generic Attacks on Range Queries.mp4 25.6 MB
- Black Hat USA/Black Hat USA 2019/Hunting for Bugs, Catching Dragons.mp4 25.6 MB
- Black Hat DC/Black Hat DC 2008/Video/A Picture’s Worth Digital Image Analysis - Dr. Neal Krawetz.mp4 25.6 MB
- Black Hat USA/Black Hat USA 2016/An AI Approach to Malware Similarity Analysis - Mapping the Malware Genome With a Deep Neural Network.mp4 25.6 MB
- Black Hat USA/Black Hat USA 2008/video/Decompilers and Beyond - Ilfak Guilfanov.mp4 25.6 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_T1.mp3 25.6 MB
- Black Hat Asia/Black Hat Singapore 2021/Mem2Img Memory-Resident Malware Detection via Convolution Neural Network.mp4 25.6 MB
- Black Hat USA/Black Hat USA 2019/Detecting Deep Fakes with Mice.mp4 25.6 MB
- Black Hat USA/Black Hat USA 2018/The Unbearable Lightness of BMC's.mp4 25.6 MB
- Black Hat USA/Black Hat USA 2018/Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet.mp4 25.6 MB
- Black Hat USA/Black Hat USA 2009/video/Exploiting Rich Content - Riley Hassell.mp4 25.5 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_E1.mp3 25.5 MB
- Black Hat USA/Black Hat USA 2016/Unleash the Infection Monkey - A Modern Alternative to Pen-Tests.mp4 25.5 MB
- Black Hat Europe/Black Hat Europe 2023/TsuKing Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.mp4 25.5 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Hey Man, Have You Forgotten To Intialize Your Memory.mp4 25.5 MB
- Black Hat USA/Black Hat USA 2020/Black-Box Laser Fault Injection on a Secure Memory.mp4 25.5 MB
- Black Hat Europe/Black Hat Europe 2018/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.mp4 25.5 MB
- Black Hat USA/Black Hat USA 2019/Internet-Scale Analysis of AWS Cognito Security.mp4 25.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ngw2.mp3 25.5 MB
- Black Hat USA/Black Hat USA 2018/Deep Neural Networks for Hackers - Methods, Applications, and Open Source Tools.mp4 25.5 MB
- Black Hat Europe/Black Hat Europe 2019/Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries.mp4 25.4 MB
- Black Hat Asia/Black Hat Singapore 2014/USB Attacks Need Physical Access Right Not Any More… by Andy Davis.mp4 25.4 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.mp4 25.4 MB
- Black Hat USA/Black Hat USA 2012/video/WebTracking for You.mp4 25.4 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.mp4 25.4 MB
- Black Hat Europe/Black Hat Europe 2018/Cutting Edge Microsoft Browser Security - From People Who Owned It.mp4 25.4 MB
- Black Hat USA/Black Hat USA 2019/Attacking iPhone XS Max.mp4 25.4 MB
- Black Hat USA/Black Hat USA 2012/video/AMF Testing.mp4 25.4 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.mp4 25.4 MB
- Black Hat Asia/Black Hat Singapore 2018/When Good Turns Evil Using Intel SGX to Stealthily Steal Bitcoins.mp4 25.4 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Finding Needles in Haystacks (The Size of Countries).mp4 25.4 MB
- Black Hat USA/Black Hat USA 2002/video/Diana Kelly and Ian Poynter - Single Sign On 101.mp4 25.4 MB
- Black Hat USA/Black Hat USA 2022/Devils Are in the File Descriptors It Is Time To Catch Them All.mp4 25.3 MB
- Black Hat USA/Black Hat USA 2019/Securing Apps in the Open-By-Default Cloud.mp4 25.3 MB
- Black Hat USA/Black Hat USA 2016/Security Through Design - Making Security Better By Designing for People.mp4 25.3 MB
- Black Hat USA/Black Hat USA 2013/video/I Can Hear You Now - Traffic Interception and Remote Mobile Phone Cloning.mp4 25.3 MB
- Black Hat Asia/Black Hat Singapore 2014/Comprehensive Virtual Appliance Detection by Kang Li.mp4 25.2 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ent2.mp3 25.2 MB
- Black Hat Asia/Black Hat Singapore 2017/Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge.mp4 25.2 MB
- Black Hat USA/Black Hat USA 2002/video/Rich Murphy - Locking Down Your FreeBSD Install.mp4 25.2 MB
- Black Hat Asia/Black Hat Singapore 2016/A New CVE 2015 0057 Exploit Technology.mp4 25.2 MB
- Black Hat USA/Black Hat USA 2008/video/REST for the Wicked - Bryan Sullivan.mp4 25.2 MB
- Black Hat Asia/Black Hat Singapore 2014/JS Suicide - Using JavaScript Security Features to Kill JS Security by Ahamed Nafeez.mp4 25.2 MB
- Black Hat USA/Black Hat USA 2019/Attacking Electric Motors for Fun and Profit.mp4 25.2 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Strike and Counterstrike The Law on Automated Intrusions and Striking Back - Curtis Karnow.mp4 25.2 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bu1.mp3 25.2 MB
- Black Hat USA/Black Hat USA 2021/Smashing the ML Stack for Fun and Lawsuits.mp4 25.2 MB
- Black Hat USA/Black Hat USA 2020/Multiple Bugs in Multi-Party Computation Breaking Cryptocurrency's Strongest Wallets.mp4 25.2 MB
- Black Hat USA/Black Hat USA 2022/Stalloris RPKI Downgrade Attack.mp4 25.2 MB
- Black Hat USA/Black Hat USA 2003/video/Curtis E Karnow - Running the Matrix.mp4 25.1 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Jaya Baloo - Lawful Interception of IP The European Context.mp4 25.1 MB
- Black Hat USA/Black Hat USA 2010/Virtually Pwned - Claudio Criscione.mp4 25.1 MB
- Black Hat USA/Black Hat USA 2022/To Flexibly Tame Kernel Execution With Onsite Analysis.mp4 25.1 MB
- Black Hat Asia/Black Hat Singapore 2016/Cantact - An Open Tool for Automative Exploitation.mp4 25.1 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Shuster-Passive-Fingerprinting-Of-HTTP2-Clients.pdf 25.1 MB
- Black Hat Asia/Black Hat Singapore 2018/Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised ML.mp4 25.1 MB
- Black Hat USA/Black Hat USA 2020/Lamphone Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps.mp4 25.1 MB
- Black Hat USA/Black Hat USA 2018/Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina.mp4 25.1 MB
- Black Hat USA/Black Hat USA 2014/video/Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways.mp4 25.1 MB
- Black Hat USA/Black Hat USA 2001/video/Walter Gary Sharp - Key Legal Implications of Computer Network Defense.mp4 25.1 MB
- Black Hat USA/Black Hat USA 2008/video/The Four Horsemen of the Virtualization Security Apocalypse - Christofer Hoff.mp4 25.1 MB
- Black Hat USA/Black Hat USA 2008/video/Protocols and Encryption of the Storm Botnet - Joe Stewart.mp4 25.1 MB
- Black Hat USA/Black Hat USA 2002/video/Richard George - Views On The Future Direction of Information Assurance.mp4 25.1 MB
- Black Hat USA/Black Hat USA 1999/video/Peter Stephenson - Introduction to Cyber Forensic Analysis.mp4 25.0 MB
- Black Hat USA/Black Hat USA 2008/video/Concurrency Attacks in Web Applications - Scott Stender, Alexander Vidergar.mp4 25.0 MB
- Black Hat USA/Black Hat USA 2018/Miasm - Reverse Engineering Framework.mp4 25.0 MB
- Black Hat USA/Black Hat USA 2016/Pindemonium - A DBI-Based Generic Unpacker for Windows Executable.mp4 25.0 MB
- Black Hat USA/Black Hat USA 2024/PyLingual A Python Decompilation Framework for Evolving Python Versions.mp4 25.0 MB
- Black Hat USA/Black Hat USA 2003/video/Silvio Cesare - Opensource Kernel Auditing and Exploitation.mp4 25.0 MB
- Black Hat Asia/Black Hat Singapore 2018/Tales from the NOC Going Public in Asia.mp4 25.0 MB
- Black Hat USA/Black Hat USA 2004/Peter Feaver - Kenneth Greers - Cyber Jihad and the Globalization of Warfare.mp4 25.0 MB
- Black Hat USA/Black Hat USA 2009/video/Cyberspace A Fragile Ecosystem - Robert Lentz.mp4 25.0 MB
- Black Hat DC/Black Hat DC 2008/Video/RFIDIOts - Practical RFID hacking (without soldering irons) - Adam Laurie.mp4 25.0 MB
- Black Hat Europe/Black Hat Europe 2020/Story of Jailbreaking iOS 13.mp4 25.0 MB
- Black Hat Asia/Black Hat Singapore 2014/Diving Into IE 10's Enhanced Protected Mode Sandbox by Mark Vincent Yason.mp4 25.0 MB
- Black Hat DC/Black Hat DC 2008/Video/Threats to the 2008 Presidential Election - Oliver Fredrichs.mp4 25.0 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Drake-Exploiting_Java_Memory_Corruption-Slides.pdf 25.0 MB
- Black Hat Asia/Black Hat Singapore 2014/Solutum Cumulus Mediocris by Eldar Marcussen.mp4 25.0 MB
- Black Hat USA/Black Hat USA 2020/Discovering Hidden Properties to Attack the Node.js Ecosystem.mp4 25.0 MB
- Black Hat USA/Black Hat USA 2018/Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities.mp4 25.0 MB
- Black Hat USA/Black Hat USA 2004/Bruce Potter - and - Brian Wotring.mp4 25.0 MB
- Black Hat USA/Black Hat USA 2006/presentations/046_Gbadegesin.pdf 25.0 MB
- Black Hat USA/Black Hat USA 2005/video/Greg Conti - Crafting a Tivo.mp4 24.9 MB
- Black Hat DC/Black Hat DC 2011/Video/Kernel Pool Exploitation on Windows 7 - Tarjei Mandt.mp4 24.9 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Falling Dominos - Kevin McPeake, Wouter Aukema.opus 24.9 MB
- Black Hat USA/Black Hat USA 2021/Generating YARA Rules by Classifying Malicious Byte Sequences.mp4 24.9 MB
- Black Hat USA/Black Hat USA 2009/video/Stoned Bootkit - Peter Kleissner.mp4 24.9 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_R1.mp3 24.8 MB
- Black Hat Windows/Black Hat Windows 2003/Video/FrontPage Server Extensions on Windows Server 2003 - Mark Burnett.mp4 24.8 MB
- Black Hat USA/Black Hat USA 2020/How I Created My Clone Using AI - Next-Gen Social Engineering.mp4 24.8 MB
- Black Hat DC/Black Hat DC 2008/Video/Classification and Detection of Application Backdoors - Chris Wysopal.mp4 24.8 MB
- Black Hat USA/Black Hat USA 2013/video/Beyond the Application - Cellular Privacy Regulatory Space.mp4 24.8 MB
- Black Hat Europe/Black Hat Europe 2018/RustZone Writing Trusted Applications in Rust.mp4 24.8 MB
- Black Hat USA/Black Hat USA 2020/Breaking VSM by Attacking SecureKernel.mp4 24.8 MB
- Black Hat DC/Black Hat DC 2010/Beware of Serialized GUI Objects Bearing Data - David Byrne, Rohini Sulatycki.mp4 24.8 MB
- Black Hat USA/Black Hat USA 2016/Access Keys Will Kill You Before You Kill the Password.mp4 24.7 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Atkinson-A-Process-Is-No-One-Hunting-For-Token-Manipulation.pdf 24.7 MB
- Black Hat USA/Black Hat USA 2014/video/Mission mPOSsible by Nils - Jon Butler.mp4 24.7 MB
- Black Hat USA/Black Hat USA 2016/Brute-Forcing Lockdown Harddrive Pin Codes.mp4 24.7 MB
- Black Hat USA/Black Hat USA 2000/video/Ian Poynter and Diana Kelly - The Truth About ASPs.mp4 24.7 MB
- Black Hat Europe/Black Hat Europe 2024/SysBumps Exploiting Speculative Execution in System Calls for Breaking KASLR.mp4 24.7 MB
- Black Hat USA/Black Hat USA 2020/Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa.mp4 24.7 MB
- Black Hat Asia/Black Hat Singapore 2021/A Mirage of Safety Bug Finding & Exploit Techniques of Top Android Vendor's Privacy Protection Apps.mp4 24.7 MB
- Black Hat USA/Black Hat USA 2021/Legal Pitfalls to Avoid in Security Incidents.mp4 24.7 MB
- Black Hat USA/Black Hat USA 2006/video/Saumil Shah - Metasploit Plugins.mp4 24.7 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Defending Against Malicious Application Compatibility Shims.mp4 24.6 MB
- Black Hat Asia/Black Hat Singapore 2017/3G 4G Intranet Scanning and its Application on the WormHole Vulnerability.mp4 24.6 MB
- Black Hat USA/Black Hat USA 2009/video/Psychotronica - Nitesh Dhanjani.mp4 24.6 MB
- Black Hat DC/Black Hat DC 2008/Video/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani & Billy Rios.mp4 24.6 MB
- Black Hat USA/Black Hat USA 2003/video/Ofir Arkin - Revolutionizing Operating System Fingerprinting.mp4 24.6 MB
- Black Hat USA/Black Hat USA 2018/SDL the Wont Break the Bank.mp4 24.6 MB
- Black Hat USA/Black Hat USA 2000/video/Kingpin and Brian Oblivian - Secure Hardware Design.mp4 24.6 MB
- Black Hat USA/Black Hat USA 2020/Breaking Samsung's Root of Trust Exploiting Samsung S10 Secure Boot.mp4 24.6 MB
- Black Hat USA/Black Hat USA 2013/video/Energy Fraud and Orchestrated Blackouts - Issues with Wireless Metering Protocols.mp4 24.6 MB
- Black Hat Europe/Black Hat Europe 2018/Eternal War in XNU Kernel Objects.mp4 24.6 MB
- Black Hat USA/Black Hat USA 2021/Applying AI as a Service to Targeted Phishing & Defending Against AI Generated Attacks.mp4 24.6 MB
- Black Hat Asia/Black Hat Singapore 2017/Betting Against the House - Security and Stability When the Odds are Against You.mp4 24.6 MB
- Black Hat USA/Black Hat USA 2019/HostSplit Exploitable Antipatterns in Unicode Normalization.mp4 24.6 MB
- Black Hat USA/Black Hat USA 2003/video/Fredric Bret - Mounet - Automated Detection of COM Vulnerabilities.mp4 24.6 MB
- Black Hat USA/Black Hat USA 2011/video/Analyzing SPDY Getting to Know the New Web Protocol - Thomas Roth.mp4 24.5 MB
- Black Hat DC/Black Hat DC 2008/Video/SCADA Security - Jason Larsen.mp4 24.5 MB
- Black Hat Europe/Black Hat Europe 2014/Video/A Practical Attack Against VDI Solutions.mp4 24.5 MB
- Black Hat USA/Black Hat USA 2021/Bridging Security Infrastructure Between the Data Center and AWS Lambda.mp4 24.5 MB
- Black Hat Asia/Black Hat Singapore 2020/May the Trust be with You Empowering TrustZone-M with Multiple Trusted Environments.mp4 24.5 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_K3A.mp3 24.5 MB
- Black Hat USA/Black Hat USA 2021/A Broken Chain Discovering OPC UA Attack Surface and Exploiting the Supply Chain.mp4 24.5 MB
- Black Hat DC/Black Hat DC 2007/Video/RFID for Beginners - Chris Paget and the ACLU.mp4 24.5 MB
- Black Hat USA/Black Hat USA 2013/video/A Tale of One Software Bypass of Windows 8 Secure Boot.mp4 24.5 MB
- Black Hat USA/Black Hat USA 2022/Trust Dies in Darkness Shedding Light on Samsung's TrustZone Keymaster Design.mp4 24.5 MB
- Black Hat USA/Black Hat USA 2015/video/Staying Persistent In Software Defined Networks.mp4 24.5 MB
- Black Hat USA/Black Hat USA 2018/Why so Spurious Achieving Local Privilege Escalation on Operating Systems.mp4 24.5 MB
- Black Hat USA/Black Hat USA 2022/Human or Not Can You Really Detect the Fake Voices.mp4 24.5 MB
- Black Hat USA/Black Hat USA 2020/FASTCash and INJX Pure How Threat Actors Use Public Standards for Financial Fraud.mp4 24.5 MB
- Black Hat USA/Black Hat USA 2003/video/Panel - Adversary Characterization and Scoring System.mp4 24.5 MB
- Black Hat USA/Black Hat USA 2015/video/API Deobfuscator Resolving Obfuscated API Functions In Modern Packers.mp4 24.5 MB
- Black Hat USA/Black Hat USA 2002/video/Dow Herath Mehta Spencer and Flake - Professional Source Code Auditing.mp4 24.5 MB
- Black Hat Asia/Black Hat Singapore 2016/Enterprise Apps - Bypassing the IOS Gatekeeper.mp4 24.4 MB
- Black Hat USA/Black Hat USA 2018/SirenJack - Cracking a Secure Emergency Warning Siren System.mp4 24.4 MB
- Black Hat USA/Black Hat USA 2018/Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers.mp4 24.4 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Quantum Key Distribution and the Future of Encryption.mp4 24.4 MB
- Black Hat USA/Black Hat USA 2020/Exploiting Kernel Races through Taming Thread Interleaving.mp4 24.4 MB
- Black Hat USA/Black Hat USA 2008/video/Braving the Cold New Methods for Preventing Cold Boot Attacks on Encryption Keys - Patrick McGregor.mp4 24.4 MB
- Black Hat USA/Black Hat USA 2022/How Firefox Uses In - process Sandboxing To Protect Itself From Exploitable Libraries.mp4 24.4 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-1/bh-asia-03-day2-t1-1-16-28-56.rm 24.4 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-4-16-28-56.rm 24.4 MB
- Black Hat USA/Black Hat USA 1999/video/Eric Schultze and George Kurtz - Over the Router, Through the Firewall, to Grandma's House We Go.mp4 24.4 MB
- Black Hat USA/Black Hat USA 2002/video/Fischbach and Lacoste - Seris - IP Backbone Security.mp4 24.4 MB
- Black Hat USA/Black Hat USA 2003/video/Neel Mehta - Advanced in ELF runtime binary encryption - Shiva.mp4 24.4 MB
- Black Hat Europe/Black Hat Europe 2020/Design Pitfalls in Commercial Mini-Programs on Android and iOS.mp4 24.4 MB
- Black Hat USA/Black Hat USA 2006/presentations/063_Embleton.pdf 24.3 MB
- Black Hat USA/Black Hat USA 2014/video/OpenStack Cloud at Yahoo Scale - How to Avoid Disaster.mp4 24.3 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Decoding & Understanding Internet Worms - Dale Coddington & Ryan Permeh.opus 24.3 MB
- Black Hat USA/Black Hat USA 2014/video/APT Attribution and DNS Profiling.mp4 24.3 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_wh1.mp3 24.3 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_RA3.mp3 24.3 MB
- Black Hat USA/Black Hat USA 2021/Government-Mandated Front Doors A Global Assessment of Legalized Government Access to Data.mp4 24.3 MB
- Black Hat Europe/Black Hat Europe 2020/Cross-Site Escape Pwning macOS Safari Sandbox the Unusual Way.mp4 24.3 MB
- Black Hat USA/Black Hat USA 2003/video/Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks.mp4 24.3 MB
- Black Hat USA/Black Hat USA 2006/video/Rutkowska - Subverting Vista Kernel.mp4 24.3 MB
- Black Hat DC/Black Hat DC 2008/Video/Developments in Cisco IOS Forensics - Felix FX Linder.mp4 24.3 MB
- Black Hat Europe/Black Hat Europe 2018/No Free Charge Theorem 2.0 How to Steal Private Information from a Mobile Device Using a Powerbank.mp4 24.3 MB
- Black Hat USA/Black Hat USA 2019/Exploiting Qualcomm WLAN and Modem Over The Air.mp4 24.3 MB
- Black Hat USA/Black Hat USA 2001/video/Renaud Deraison - The Nessus Project Reducing the Costs of Vulnerability Assessment.mp4 24.2 MB
- Black Hat USA/Black Hat USA 2022/The Journey of Hunting In - the - Wild Windows LPE 0day.mp4 24.2 MB
- Black Hat USA/Black Hat USA 2015/video/Remote Physical Damage 101 Bread And Butter Attacks.mp4 24.2 MB
- Black Hat USA/Black Hat USA 1999/audio/Dr Mudge - Keynote.opus 24.2 MB
- Black Hat USA/Black Hat USA 2005/video/Paul Vixie - Preventing Child Neglect.mp4 24.2 MB
- Black Hat USA/Black Hat USA 2008/video/Suberverting the Xen Hypervisor - Rafal Wojtczuk.mp4 24.2 MB
- Black Hat USA/Black Hat USA 2009/video/Fight Against 1-Day Exploits - Jeongwook Oh.mp4 24.2 MB
- Black Hat USA/Black Hat USA 2020/When TLS Hacks You.mp4 24.2 MB
- Black Hat USA/Black Hat USA 2018/Decompiler Internals - Microcode.mp4 24.2 MB
- Black Hat USA/Black Hat USA 2002/video/Ofir Arkin - Cracking VoIP Architecture.mp4 24.2 MB
- Black Hat USA/Black Hat USA 2018/AI & ML in Cyber Security - Why Algorithms are Dangerous.mp4 24.2 MB
- Black Hat USA/Black Hat USA 2022/Malware Classification With Machine Learning Enhanced by Windows Kernel Emulation.mp4 24.1 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-2-16-28-56.rm 24.1 MB
- Black Hat Europe/Black Hat Europe 2000/Video/ICMP Usage In Scanning - Ofir Arkin.mp4 24.1 MB
- Black Hat USA/Black Hat USA 2000/video/Diana Kelly - Translasting US Privacy Regulations for Implementation.mp4 24.1 MB
- Black Hat USA/Black Hat USA 2018/How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems.mp4 24.1 MB
- Black Hat USA/Black Hat USA 2008/video/Get Rich or Die Trying - Making Money on the Web, The Black Hat Way - Jeremiah Grossman, Arian Evans.mp4 24.1 MB
- Black Hat USA/Black Hat USA 2003/video/Paul Wouters - IPSEC Opportunistic Encryption using DNSSEC.mp4 24.0 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_K3B.mp3 24.0 MB
- Black Hat DC/Black Hat DC 2008/Video/Keynote - Quest for the Holy Grail - Jerry Dixon.mp4 24.0 MB
- Black Hat USA/Black Hat USA 2012/video/Exploit Mitigation in Windows 8.mp4 23.9 MB
- Black Hat USA/Black Hat USA 2008/video/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 1-2 - John Benson.mp4 23.9 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ee3.mp3 23.9 MB
- Black Hat USA/Black Hat USA 2002/video/Len Sassaman - Forensic Dead - Ends.mp4 23.9 MB
- Black Hat Europe/Black Hat Europe 2021/Practical HTTP Header Smuggling Sneaking Past Reverse Proxies to Attack AWS and Beyond.mp4 23.9 MB
- Black Hat Asia/Black Hat Singapore 2021/The B-MAD Approach to Threat Modeling.mp4 23.9 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Passive Fingerprinting of HTTP 2 Clients.mp4 23.9 MB
- Black Hat USA/Black Hat USA 2006/video/Panel - Hacker Court - Part2.mp4 23.9 MB
- Black Hat USA/Black Hat USA 2001/video/Richard Thieme - Defending the Information Web New Ways of Thinking About Security.mp4 23.9 MB
- Black Hat USA/Black Hat USA 2019/Managing for Success Maintaining a Healthy Bug Bounty Program Long Term.mp4 23.9 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_E5.mp3 23.8 MB
- Black Hat USA/Black Hat USA 2008/video/Passive and Active Leakage of Secret Data from Non-Networked Computer - 1-2 - Eric Filiol.mp4 23.8 MB
- Black Hat USA/Black Hat USA 2006/video/Hoffman - AJAX Insecurity.mp4 23.8 MB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Asia 2018 Keynote A Short Course in Cyber Warfare - by The Grugq.mp4 23.8 MB
- Black Hat USA/Black Hat USA 2002/video/Jay Beale - Attacking and Securing UNIX FTP Servers.mp4 23.8 MB
- Black Hat USA/Black Hat USA 2006/video/Sutton and MacManus - Punk 0de.mp4 23.8 MB
- Black Hat USA/Black Hat USA 2010/TitanMist Your First Step to reversing nirvana - Mario Vuksan, Tomislav Pericin.mp4 23.8 MB
- Black Hat USA/Black Hat USA 2016/A Lightbulb Worm.mp4 23.7 MB
- Black Hat USA/Black Hat USA 2012/video/Looking into the Eye of the Meter.mp4 23.7 MB
- Black Hat USA/Black Hat USA 2002/video/Jed Haile - Hogwash.mp4 23.7 MB
- Black Hat USA/Black Hat USA 2003/video/Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques.mp4 23.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_RE2.mp3 23.7 MB
- Black Hat Europe/Black Hat Europe 2021/Skeletons in the App Sandbox 5 Ways to Escape.mp4 23.7 MB
- Black Hat USA/Black Hat USA 2005/video/Mudge - Economics Physics Psycology.mp4 23.7 MB
- Black Hat USA/Black Hat USA 2004/Panel - Application Security Crossfire.mp4 23.7 MB
- Black Hat USA/Black Hat USA 2010/State of SSL on the internet - Ivan Ristic.mp4 23.7 MB
- Black Hat USA/Black Hat USA 2006/video/Zanero - HostBased Anomaly Detection.mp4 23.6 MB
- Black Hat Europe/Black Hat Europe 2020/Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control....mp4 23.6 MB
- Black Hat USA/Black Hat USA 2005/video/Joe Grand - Sec Problems HWare Devices.mp4 23.6 MB
- Black Hat USA/Black Hat USA 1999/video/Jeffrey Hunker - Keynote Protecting Americas Cyberspace Version 1.0 of the National Plan.mp4 23.6 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Exploiting DCOM - Yoshiaki Komoriya, Hidenobu Sekiu.mp4 23.6 MB
- Black Hat Asia/Black Hat Singapore 2020/Securing the Next Version of HTTP How QUIC and HTTP 3 Compare to HTTP 2.mp4 23.6 MB
- Black Hat USA/Black Hat USA 2020/IoT Skimmer Energy Market Manipulation through High-Wattage IoT Botnets.mp4 23.5 MB
- Black Hat USA/Black Hat USA 2019/The Most Secure Browser Pwning Chrome from 2016 to 2019.mp4 23.5 MB
- Black Hat USA/Black Hat USA 2008/video/Viral Infections in Cisco iOS - Ariel Futoransky.mp4 23.5 MB
- Black Hat USA/Black Hat USA 2021/Zero - The Funniest Number in Cryptography.mp4 23.5 MB
- Black Hat USA/Black Hat USA 2013/video/Owning the Routing Table - Part II.mp4 23.5 MB
- Black Hat USA/Black Hat USA 2014/video/BadUSB - On Accessories that Turn Evil by Karsten Nohl - Jakob Lell.mp4 23.5 MB
- Black Hat USA/Black Hat USA 2014/video/Internet Scanning - Current State and Lessons Learned.mp4 23.5 MB
- Black Hat Europe/Black Hat Europe 2020/Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel.mp4 23.4 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Your Scripts In My Page - What Could Possibly Go Wrong.mp4 23.4 MB
- Black Hat USA/Black Hat USA 2006/video/Rauch - PDB - The Protocal Debugger.mp4 23.4 MB
- Black Hat Europe/Black Hat Europe 2017/videos/DIFUZE - Android Kernel Driver Fuzzing.mp4 23.4 MB
- Black Hat USA/Black Hat USA 2020/About Directed Fuzzing and Use-After-Free How to Find Complex & Silent Bugs.mp4 23.4 MB
- Black Hat USA/Black Hat USA 2006/video/Sparks and Others - Sidewinder.mp4 23.4 MB
- Black Hat USA/Black Hat USA 2015/video/Certifi gate Front Door Access To Pwning Millions Of Androids.mp4 23.4 MB
- Black Hat USA/Black Hat USA 2016/Hacking Next-Gen ATMs - From Capture to Cashout.mp4 23.4 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_RE1.mp3 23.3 MB
- Black Hat USA/Black Hat USA 2012/video/CuteCats.exe and the Arab Spring.mp4 23.3 MB
- Black Hat USA/Black Hat USA 2008/video/Cisco IOS Shellcodes Backdoors - Gyan Chawdhary, Varun Uppal.mp4 23.3 MB
- Black Hat USA/Black Hat USA 2000/video/Greg Hoglund - Advanced Buffer Overflow Techniques.mp4 23.3 MB
- Black Hat Europe/Black Hat Europe 2003/Video/FX - Design and Software Vulnerabilities In Embedded Systems.mp4 23.3 MB
- Black Hat USA/Black Hat USA 2003/video/FX - More Embedded Systems.mp4 23.3 MB
- Black Hat USA/Black Hat USA 2002/video/Roelof Temmingh and Haroon Meer - Setiri.mp4 23.3 MB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 Highlights.mp4 23.3 MB
- Black Hat USA/Black Hat USA 2018/Catch me, Yes we can - Pwning Social Engineers.mp4 23.3 MB
- Black Hat USA/Black Hat USA 2004/Stefano Zanero - Detecting 0 Day Attacks with Learning IDS.mp4 23.3 MB
- Black Hat USA/Black Hat USA 2015/video/How Vulnerable Are We To Scams.mp4 23.3 MB
- Black Hat USA/Black Hat USA 2008/video/RETrace - Applied Reverse Engineering on OS X - Tiller Beauchamp, David Weston.mp4 23.3 MB
- Black Hat Asia/Black Hat Singapore 2017/Keynote - Why We are Not Building a Defendable Internet.mp4 23.3 MB
- Black Hat DC/Black Hat DC 2011/Video/Your Cloud Is In My Pocket - Matthieu Suiche.mp4 23.3 MB
- Black Hat USA/Black Hat USA 2005/video/Robert Morris Sr - Non-Cryptographic Ways.mp4 23.2 MB
- Black Hat USA/Black Hat USA 2021/Exploiting Windows COM WinRT ServicesExploiting Windows COM WinRT Services.mp4 23.2 MB
- Black Hat USA/Black Hat USA 2018/ZEROing Trust - Do Zero Trust Approaches Deliver Real Security.mp4 23.2 MB
- Black Hat USA/Black Hat USA 2018/DeepLocker - Concealing Targeted Attacks with AI Locksmithing.mp4 23.2 MB
- Black Hat USA/Black Hat USA 2002/video/Shaun Clowes - Fixing and Making Holes in Binaries.mp4 23.2 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Nohl_Mifare/BH_US_08_Nohl_Mifare.pdf 23.2 MB
- Black Hat USA/Black Hat USA 1999/audio/Bruce Schneier - A hacker looks at cryptography.opus 23.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/C11 Metaprogramming Applied to Software Obfuscation.mp4 23.2 MB
- Black Hat USA/Black Hat USA 2002/video/Robert Baird and Mike Lynn - Advanced 80211b Attack.mp4 23.1 MB
- Black Hat USA/Black Hat USA 2000/video/Gordon Reichard Jr - Trust, Security, Partnership Strategies in Selecting a Managed Service Provider.mp4 23.1 MB
- Black Hat USA/Black Hat USA 2018/Stealth Mango and the Prevalence of Mobile Surveillanceware.mp4 23.1 MB
- Black Hat USA/Black Hat USA 2014/video/Reflections on Trusting TrustZone.mp4 23.1 MB
- Black Hat USA/Black Hat USA 2020/Experimenting with Real-Time Event Feeds.mp4 23.1 MB
- Black Hat Asia/Black Hat Singapore 2015/Exploiting Social Navigation.mp4 23.1 MB
- Black Hat USA/Black Hat USA 2024/Main Stage Understanding and Reducing Supply Chain and Software Vulnerability Risks.mp4 23.1 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Is this a dupeBH-Tokyo-04-Jap-talk-and-english-translation-cybercrime.opus 23.1 MB
- Black Hat DC/Black Hat DC 2008/Video/DTRACE The Reverse Engineer’s Unexpected Swiss Army Knife - David Weston, Tiller Beauchamp.mp4 23.1 MB
- Black Hat USA/Black Hat USA 2020/Improving Mental Models of End-to-End Encrypted Communication.mp4 23.1 MB
- Black Hat USA/Black Hat USA 2004/Joe Grand - A Historical Look at Hardware Token Compromises.mp4 23.0 MB
- Black Hat Europe/Black Hat Europe 2013/Practical Exploitation Using A Malicious Service Set Identifier (SSID).mp4 23.0 MB
- Black Hat USA/Black Hat USA 2016/Watching Commodity Malware Get Sold to a Targeted Actor.mp4 23.0 MB
- Black Hat DC/Black Hat DC 2010/Mac OS X Physical Memory Analysis - Matthieu Suiche.mp4 23.0 MB
- Black Hat USA/Black Hat USA 2001/video/Mike Beekey - ARP Vulnerabilities Indefensible Local Network Attacks.mp4 23.0 MB
- Black Hat USA/Black Hat USA 2000/video/David Litchfield - Compromising web Servers and Defensive Techniques.mp4 23.0 MB
- Black Hat Europe/Black Hat Europe 2023/Breaking Theoretical Limits The Gap Between Virtual NICs and Physical Network Cards.mp4 23.0 MB
- Black Hat USA/Black Hat USA 2000/video/Ron Gula - Bypassing Intrusion Detection Systems.mp4 22.9 MB
- Black Hat USA/Black Hat USA 2004/Spoonm - Metasploit Hacking Like in the Movies.mp4 22.9 MB
- Black Hat USA/Black Hat USA 2004/Chris Kret - Nobodys Anonymous - Tracking Spam and Covert Channels.mp4 22.9 MB
- Black Hat Europe/Black Hat Europe 2020/BinTyper Type Confusion Detection for C Binaries.mp4 22.9 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Ahlberg-Chasing-Foxes-By-The-Numbers-Patterns-Of-Life-And-Activity-In-Hacker-Forums.pdf 22.9 MB
- Black Hat Europe/Black Hat Europe 2001/video/One-Way SQL Hacking - JD Glaser & Saumil Udayan Shah.mp4 22.9 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bf4.mp3 22.9 MB
- Black Hat Asia/Black Hat Singapore 2015/DABiD - The Powerful Interactive Android Debugger for Android Malware Analysis.mp4 22.9 MB
- Black Hat USA/Black Hat USA 2019/PeriScope An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.mp4 22.8 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Ishiyama - FFR - EXCALOC.eng.opus 22.8 MB
- Black Hat DC/Black Hat Federal 2006/My IDS is better than yours. Or is it - Stefano Zanero.opus 22.8 MB
- Black Hat USA/Black Hat USA 2012/video/IP Spoofing.mp4 22.8 MB
- Black Hat USA/Black Hat USA 2018/Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots.mp4 22.8 MB
- Black Hat DC/Black Hat DC 2008/Video/Dynamic Taint Propagation Finding Vulnerabilities Without Attacking - Brian Chess & Jacob West.mp4 22.7 MB
- Black Hat USA/Black Hat USA 2008/video/Living in the RIA World Blurring the Line Between Web and Desktop Security - Alex Stamos, David Thiel, Justine Osborne.mp4 22.7 MB
- Black Hat Asia/Black Hat Singapore 2018/Server Tailgating - A Chosen-PlainText Attack on RDP.mp4 22.7 MB
- Black Hat Asia/Black Hat Singapore 2018/Prison Break Season 6 Defeating the Mitigations Adopted by Android OEMs.mp4 22.7 MB
- Black Hat USA/Black Hat USA 2012/video/Security Paradigm.mp4 22.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_P3.mp3 22.7 MB
- Black Hat USA/Black Hat USA 2018/It's a PHP Unserialization Vulnerability Jim, but Not as We Know It.mp4 22.7 MB
- Black Hat Europe/Black Hat Europe 2021/Lost in the Loader The Many Faces of the Windows PE File Format.mp4 22.6 MB
- Black Hat Europe/Black Hat Europe 2024/Operation MIDAS - Tracking Fraudulent Financial Program Organizations.mp4 22.6 MB
- Black Hat Europe/Black Hat Europe 2001/video/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 1-2.mp4 22.6 MB
- Black Hat USA/Black Hat USA 2012/video/BlackOps.mp4 22.6 MB
- Black Hat USA/Black Hat USA 2001/video/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 2.mp4 22.6 MB
- Black Hat Europe/Black Hat Europe 2000/Video/What Is Involved In a Forensic Effort - John Tan.mp4 22.6 MB
- Black Hat USA/Black Hat USA 2000/video/Scott Blake - The Pros and Cons of Hiring Hackers.mp4 22.5 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming.mp4 22.5 MB
- Black Hat USA/Black Hat USA 2004/Michael Sherma - Web Application Session Strength.mp4 22.5 MB
- Black Hat USA/Black Hat USA 2020/CloudLeak DNN Model Extractions from Commercial MLaaS Platforms.mp4 22.5 MB
- Black Hat USA/Black Hat USA 2003/video/Panel - Proposed Vulnerability Handling.mp4 22.5 MB
- Black Hat Europe/Black Hat Europe 2013/Shelters or Windmills - The Struggle For Power and Information Advantage.mp4 22.5 MB
- Black Hat USA/Black Hat USA 2008/video/Insane Detection of Insane Rootkits - Yuriy Bulygin.mp4 22.5 MB
- Black Hat USA/Black Hat USA 2019/SSO Wars The Token Menace.mp4 22.5 MB
- Black Hat DC/Black Hat DC 2010/Cyber Effects Prediction - Shane Powell.mp4 22.5 MB
- Black Hat Europe/Black Hat Europe 2014/Video/The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.mp4 22.5 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Use-After-Use-After-Free - Exploit UAF by Generating Your Own.mp4 22.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_k1.mp3 22.4 MB
- Black Hat USA/Black Hat USA 1999/video/Dominique Brezinski - Building a Forensics Toolkit That Will Protect You from Evil Influences.mp4 22.4 MB
- Black Hat Asia/Black Hat Singapore 2021/A New Era of One-Click Attacks How to Break Install-Less Apps.mp4 22.4 MB
- Black Hat Asia/Black Hat Singapore 2017/Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox.mp4 22.4 MB
- Black Hat DC/Black Hat DC 2008/Video/Biometric and Token-Based Access Control Systems - Zac Franken.mp4 22.4 MB
- Black Hat Europe/Black Hat Europe 2021/We Wait, Because We Know You - Inside the Ransomware Negotiation Economics.mp4 22.4 MB
- Black Hat USA/Black Hat USA 2006/video/Cache and Maynor - Device Drivers.mp4 22.4 MB
- Black Hat USA/Black Hat USA 2020/Operation Chimera - APT Operation Targets Semiconductor Vendors.mp4 22.4 MB
- Black Hat USA/Black Hat USA 2019/The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring.mp4 22.3 MB
- Black Hat USA/Black Hat USA 2015/video/Understanding The Attack Surface & Attack Resilience Of Project Spartan.mp4 22.3 MB
- Black Hat USA/Black Hat USA 2018/Last Call for SATCOM Security.mp4 22.3 MB
- Black Hat Europe/Black Hat Europe 2013/Hacking Appliances - Ironic exploitation of security products.mp4 22.3 MB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Asia 2023 Highlights.mp4 22.3 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.mp4 22.3 MB
- Black Hat USA/Black Hat USA 2019/Messaging Layer Security Towards a New Era of Secure Group Messaging.mp4 22.3 MB
- Black Hat USA/Black Hat USA 2009/video/Is That You, Baby, or Just a Bridge in the Sky.mp4 22.3 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Bypassing Clang's SafeStack for Fun and Profit.mp4 22.2 MB
- Black Hat USA/Black Hat USA 2018/Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering.mp4 22.2 MB
- Black Hat USA/Black Hat USA 2018/Exploitation of a Modern Smartphone Baseband.mp4 22.2 MB
- Black Hat USA/Black Hat USA 2006/presentations/044_Moore.pdf 22.2 MB
- Black Hat USA/Black Hat USA 2020/NoJITsu Locking Down JavaScript Engines.mp4 22.2 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_mt5.mp3 22.2 MB
- Black Hat Europe/Black Hat Europe 2021/AIModel Mutator Finding Vulnerabilities in TensorFlow.mp4 22.2 MB
- Black Hat DC/Black Hat DC 2010/Decrypting DPAPI data - Jean-Michel Picod, Elie Bursztein.mp4 22.2 MB
- Black Hat Europe/Black Hat Europe 2020/How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration (2).mp4 22.2 MB
- Black Hat Europe/Black Hat Europe 2020/How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration.mp4 22.2 MB
- Black Hat Asia/Black Hat Singapore 2022/Hunting and Exploiting Recursive MMIO Flaws in QEMU KVM.mp4 22.2 MB
- Black Hat USA/Black Hat USA 2000/video/Jeff Thompson - Making Unix Secure for the Internet with Trusted Operating Systems.mp4 22.2 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Grossman_Get_Rich_or_Die_Trying/BH_US_08_Grossman_Evans_Get_Rich_or_Die_Trying.pdf 22.2 MB
- Black Hat USA/Black Hat USA 2006/video/Spradlin - Auditing data Access.mp4 22.1 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Russ-Rogers-Covert-Channels-English done.opus 22.1 MB
- Black Hat USA/Black Hat USA 1999/video/Ira Winkler - The Road to Riches.mp4 22.1 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Ortiz-Steganography-Slides.pdf 22.1 MB
- Black Hat USA/Black Hat USA 2016/Building a Product Security Incident Response Team - Learnings From the Hivemind.mp4 22.1 MB
- Black Hat USA/Black Hat USA 2020/Routopsy Modern Routing Protocol Vulnerability Analysis and Exploitation.mp4 22.1 MB
- Black Hat USA/Black Hat USA 2004/Kevin Madi - Evolution of Incident Response.av.mp4 22.1 MB
- Black Hat Asia/Black Hat Singapore 2015/We Can Still Crack You General Unpacking Method For Android Packer (no Root).mp4 22.1 MB
- Black Hat USA/Black Hat USA 2018/A Dive in to Hyper-V Architecture & Vulnerabilities.mp4 22.1 MB
- Black Hat USA/Black Hat USA 2014/video/Probabilistic Spying on Encrypted Tunnels.mp4 22.1 MB
- Black Hat USA/Black Hat USA 2004/Roger Dingledine - Putting the P back in VPN.mp4 22.1 MB
- Black Hat USA/Black Hat USA 2020/TiYunZong Exploit Chain to Remotely Root Modern Android Devices - Pwn Android Phones from 2015-2020.mp4 22.1 MB
- Black Hat Europe/Black Hat Europe 2012/Video/CANAPE - Bytes Your Bits.mp4 22.1 MB
- Black Hat USA/Black Hat USA 2005/video/Eugene Tsyrkievich - Ozone.mp4 22.1 MB
- Black Hat USA/Black Hat USA 2021/Hacking a Capsule Hotel - Ghost in the Bedrooms.mp4 22.1 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Attacking The XNU Kernel In El Capitain.mp4 22.1 MB
- Black Hat Europe/Black Hat Europe 2019/Breaking Bootloaders on the Cheap.mp4 22.1 MB
- Black Hat USA/Black Hat USA 2006/video/Mandia - State of Incident Response.mp4 22.1 MB
- Black Hat USA/Black Hat USA 1999/video/Padgett Peterson - Overlooked Local Attack Techniques.mp4 22.0 MB
- Black Hat USA/Black Hat USA 2009/video/Mo’ Money Mo’ Problems - Jeremiah Grossman, Trey Ford.mp4 22.0 MB
- Black Hat USA/Black Hat USA 2012/video/Bouncer Land.mp4 22.0 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_T5.mp3 22.0 MB
- Black Hat USA/Black Hat USA 2008/video/Web Application Canonicalization, Encoding and Transcoding Attacks - Arian Evans.mp4 22.0 MB
- Black Hat USA/Black Hat USA 2022/DNSSEC Downgrade Attacks.mp4 22.0 MB
- Black Hat USA/Black Hat USA 2016/Cyber War in Perspective - Analysis From the Crisis in Ukraine.mp4 22.0 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_wl3.mp3 22.0 MB
- Black Hat USA/Black Hat USA 2006/video/Stamos and lackey - Breakin Ajax web.mp4 22.0 MB
- Black Hat DC/Black Hat DC 2008/Video/(un)Smashing the Stack Overflows, Countermeasures, and the Real World - Shawn Moyer.mp4 21.9 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Don t Trust Your USB How to Find Bugs in USB Device Drivers.mp4 21.9 MB
- Black Hat USA/Black Hat USA 2020/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side..mp4 21.9 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Bypassing Secure Boot Using Fault Injection.mp4 21.9 MB
- Black Hat Asia/Black Hat Singapore 2021/X-in-the-Middle Attacking Fast Charging Piles and Electric Vehicles.mp4 21.9 MB
- Black Hat USA/Black Hat USA 2008/video/Circumventing Automated JavaScriptAnalysis Tools - Billy Hoffman.mp4 21.9 MB
- Black Hat USA/Black Hat USA 2014/video/802.1x and Beyond.mp4 21.9 MB
- Black Hat USA/Black Hat USA 2000/video/Joey - Advanced Windows NT and 2000 Security.mp4 21.8 MB
- Black Hat USA/Black Hat USA 1998/video/Ian Goldberg - Cell Phone Security A History and The State of the Art.mp4 21.8 MB
- Black Hat Asia/Black Hat Singapore 2018/A Deal with the Devil Breaking Smart Contracts.mp4 21.8 MB
- Black Hat Europe/Black Hat Europe 2013/Power Analysis Attacks for Cheapskates.mp4 21.8 MB
- Black Hat Europe/Black Hat Europe 2018/Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild.mp4 21.8 MB
- Black Hat USA/Black Hat USA 2001/video/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 1.mp4 21.8 MB
- Black Hat USA/Black Hat USA 2004/Len Sassman - The Anonymity Toolkit.mp4 21.8 MB
- Black Hat Asia/Black Hat Singapore 2018/Death Profile Now iOS Has Been Compromised to Suspected Ransomware.mp4 21.8 MB
- Black Hat USA/Black Hat USA 2008/conference cd/viewers/AdbeRdr812_en_US_i386.dmg 21.8 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_MO1.mp3 21.8 MB
- Black Hat USA/Black Hat USA 2014/video/How to Leak a 100-Million-Node Social Graph in Just One Week.mp4 21.8 MB
- Black Hat USA/Black Hat USA 2009/video/Unraveling Unicode - Chris Weber.mp4 21.8 MB
- Black Hat USA/Black Hat USA 2000/video/Jericho and Munge - Hard Core Web Defacement Statistics Trends and Analysis.mp4 21.8 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_C2.mp3 21.8 MB
- Black Hat USA/Black Hat USA 2010/WPA Migration Mode - Leandro Meiners, Diego Sor.mp4 21.8 MB
- Black Hat USA/Black Hat USA 2021/Can You Hear Me Now Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications.mp4 21.8 MB
- Black Hat USA/Black Hat USA 2008/video/Mobitex Network Security - olleB.mp4 21.8 MB
- Black Hat USA/Black Hat USA 1998/video/Dominique Brezinski - Penetrating NT Networks Through Information Leaks and Policy Weaknesses.mp4 21.7 MB
- Black Hat USA/Black Hat USA 1999/video/Bruce Schneier - A hacker looks at cryptography.mp4 21.7 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Panel - Jericho Forum.opus 21.7 MB
- Black Hat Europe/Black Hat Europe 2018/I Block You Because I Love You Social Account Identification Attack Against a Website Visitor.mp4 21.7 MB
- Black Hat USA/Black Hat USA 1999/audio/Davis, Ozier, Nebel, and Migues - Panel Discussion.opus 21.7 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_si4.mp3 21.7 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Panel - Anti - spyware Coalition.opus 21.7 MB
- Black Hat USA/Black Hat USA 2012/video/Java Exploitation.mp4 21.7 MB
- Black Hat Asia/Black Hat Singapore 2014/Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani-tagged.mp4 21.7 MB
- Black Hat Europe/Black Hat Europe 2001/video/X-Remote ICMP Based OS Fingerprinting Techniqu es - Ofir Arkin.mp4 21.7 MB
- Black Hat Asia/Black Hat Singapore 2014/Privacy-by-Design for the Security Practitioner by Richard Chow.mp4 21.6 MB
- Black Hat Europe/Black Hat Europe 2015/videos/How To Break XML Encryption - Automatically.mp4 21.6 MB
- Black Hat USA/Black Hat USA 2006/video/Grossman - Hacking Intranet Outside.mp4 21.6 MB
- Black Hat USA/Black Hat USA 1999/audio/Peter Stephenson - Introduction to Cyber Forensic Analysis.opus 21.6 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Breaking Big Data - Evading Analysis of the Metadata of Your Life.mp4 21.6 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-1/bh-asia-03-day2-t1-2-16-28-56.rm 21.6 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-5-16-28-56.rm 21.6 MB
- Black Hat USA/Black Hat USA 1999/video/Larry Korba - Hope Hype and Horrors E - Commerce Explored.mp4 21.6 MB
- Black Hat USA/Black Hat USA 1999/video/Simple Nomad - Modern NetWare Hacking.mp4 21.6 MB
- Black Hat USA/Black Hat USA 2004/FX - Vulnerability Finding in Win32A Comparison.mp4 21.6 MB
- Black Hat USA/Black Hat USA 2006/video/Caswell and Moore - Thermoptic Camo.mp4 21.5 MB
- Black Hat USA/Black Hat USA 1999/audio/Ira Winkler - The Road to Riches.opus 21.5 MB
- Black Hat Europe/Black Hat Europe 2018/The Undeniable Truth.mp4 21.5 MB
- Black Hat USA/Black Hat USA 2005/video/Grugq - Defeating Forensic Analysis.mp4 21.5 MB
- Black Hat USA/Black Hat USA 2018/Snooping on Cellular Gateways and Their Critical Role in ICS.mp4 21.5 MB
- Black Hat USA/Black Hat USA 2018/KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous.mp4 21.5 MB
- Black Hat USA/Black Hat USA 2019/ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended.mp4 21.5 MB
- Black Hat Europe/Black Hat Europe 2000/Video/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.mp4 21.5 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.mp4 21.5 MB
- Black Hat USA/Black Hat USA 2000/video/Lee Kushner - The State of Employment in the Information Security Industry.mp4 21.5 MB
- Black Hat USA/Black Hat USA 2004/Brad Bolin - Information Security Law Update.mp4 21.5 MB
- Black Hat USA/Black Hat USA 2020/The Dark Side of the Cloud - How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis.mp4 21.5 MB
- Black Hat USA/Black Hat USA 2019/On Trust Stories from the Front Lines.mp4 21.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ngw1.mp3 21.4 MB
- Black Hat USA/Black Hat USA 2012/video/The Big Picture.mp4 21.4 MB
- Black Hat USA/Black Hat USA 1999/video/Sarah Gordon - Viruses in the Information Age.mp4 21.4 MB
- Black Hat USA/Black Hat USA 2005/video/Jim Christy - The Defense Cyber Crime.mp4 21.4 MB
- Black Hat USA/Black Hat USA 2010/Welcome and introduction to Black Hat - Keynote Speaker.mp4 21.4 MB
- Black Hat USA/Black Hat USA 2014/video/Data-Only Pwning Microsoft Windows Kernel.mp4 21.4 MB
- Black Hat Asia/Black Hat Singapore 2018/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4 21.3 MB
- Black Hat USA/Black Hat USA 2014/video/Badger - The Networked Security State Estimation Toolkit.mp4 21.3 MB
- Black Hat USA/Black Hat USA 1999/audio/Batz - Security Issues Affecting Internet Transit Points and Backbone Providers.opus 21.3 MB
- Black Hat Asia/Black Hat Singapore 2017/All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision.mp4 21.3 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Advanced Oracle Attack Techniques - David Litchfield.opus 21.3 MB
- Black Hat USA/Black Hat USA 2018/The Finest Penetration Testing Framework for Software-Defined Networks.mp4 21.3 MB
- Black Hat Asia/Black Hat Singapore 2018/Shadow-Box v2 The Practical and Omnipotent Sandbox for ARM.mp4 21.3 MB
- Black Hat Europe/Black Hat Europe 2016/videos/AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.mp4 21.2 MB
- Black Hat USA/Black Hat USA 2018/IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies.mp4 21.2 MB
- Black Hat USA/Black Hat USA 2006/presentations/005_FX.pdf 21.2 MB
- Black Hat USA/Black Hat USA 2001/video/Timothy Mullen - Grabbing User Credentials via W2k ODBC Libraries.mp4 21.2 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.mp4 21.2 MB
- Black Hat USA/Black Hat USA 2016/What's the DFIRence for ICS.mp4 21.2 MB
- Black Hat USA/Black Hat USA 2012/video/iOS Kernel.mp4 21.2 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ent1.mp3 21.2 MB
- Black Hat USA/Black Hat USA 2015/video/Taxonomic Modeling Of Security Threats In Software Defined Networking.mp4 21.2 MB
- Black Hat USA/Black Hat USA 1999/audio/Larry Korba - Hope Hype and Horrors E - Commerce Explored.opus 21.2 MB
- Black Hat Asia/Black Hat Singapore 2021/Wideshears Investigating and Breaking Widevine on QTEE.mp4 21.2 MB
- Black Hat USA/Black Hat USA 2000/video/Jeremy Rauch - The Security of Network Devices.mp4 21.2 MB
- Black Hat USA/Black Hat USA 2019/Lessons From Two Years of Crypto Audits.mp4 21.2 MB
- Black Hat Asia/Black Hat Singapore 2017/Welcome & Introduction to Black Hat Asia 2017.mp4 21.2 MB
- Black Hat USA/Black Hat USA 2019/MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection.mp4 21.1 MB
- Black Hat USA/Black Hat USA 1999/audio/Sarah Gordon - Viruses in the Information Age.opus 21.1 MB
- Black Hat USA/Black Hat USA 2019/Reverse Engineering WhatsApp Encryption for Chat Manipulation and More.mp4 21.1 MB
- Black Hat USA/Black Hat USA 2020/The Devils in the Dependency Data Driven Software Composition Analysis.mp4 21.1 MB
- Black Hat USA/Black Hat USA 2022/AEPIC Leak Architecturally Leaking Uninitialized Data from the Microarchitecture.mp4 21.1 MB
- Black Hat USA/Black Hat USA 2005/video/Himanshu Dwivedi - iSCI Insecure SCSI.mp4 21.1 MB
- Black Hat USA/Black Hat USA 2015/video/The Node js Highway Attacks Are At Full Throttle.mp4 21.1 MB
- Black Hat Asia/Black Hat Singapore 2018/Hourglass Model 2.0 Case Study of Southeast Asia Underground Services Abusing Global 2FA.mp4 21.1 MB
- Black Hat USA/Black Hat USA 1999/video/Brent Huston - Appliance Firewalls a detailed review.mp4 21.1 MB
- Black Hat USA/Black Hat USA 2012/video/SQL Injections.mp4 21.1 MB
- Black Hat USA/Black Hat USA 2002/video/Dan Veeneman - Vulnerabilities of Cellular and Satellite - based Voice and Data Networks.mp4 21.1 MB
- Black Hat USA/Black Hat USA 2006/video/Finnigan - How to Unwrap Oracle.mp4 21.1 MB
- Black Hat USA/Black Hat USA 2021/Can You Roll Your Own SIEM.mp4 21.1 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/injectso Modifying and Spying on Running Processes Under Linux - Shaun Clowes.opus 21.1 MB
- Black Hat USA/Black Hat USA 2005/video/Ofir Arkin - Infrastructure Discovery.mp4 21.1 MB
- Black Hat USA/Black Hat USA 2018/From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it.mp4 21.1 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen.opus 21.1 MB
- Black Hat USA/Black Hat USA 2006/video/Marinescu - WIN Vista Heap Mgmt.mp4 21.0 MB
- Black Hat Europe/Black Hat Europe 2020/This is for the Pwners Exploiting a WebKit 0-day in PlayStation 4.mp4 21.0 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Key Reinstallation Attacks - Breaking the WPA2 Protocol.mp4 21.0 MB
- Black Hat USA/Black Hat USA 2018/Legal Liability for IOT Cybersecurity Vulnerabilities.mp4 21.0 MB
- Black Hat USA/Black Hat USA 2019/Woke Hiring Won't Save Us An Actionable Approach to Diversity Hiring and Retention.mp4 21.0 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Randomization Can't Stop BPF JIT Spray.mp4 21.0 MB
- Black Hat Asia/Black Hat Singapore 2014/SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal.mp4 21.0 MB
- Black Hat USA/Black Hat USA 2000/video/Hal McConnell - Threats from Organized Crime and Terrorists.mp4 20.9 MB
- Black Hat Europe/Black Hat Europe 2020/Permission Mining in GCP.mp4 20.9 MB
- Black Hat USA/Black Hat USA 2008/video/A Hypervisor IPS based on Hardware Assisted Virtualization Technology - Junichi Murakami.mp4 20.9 MB
- Black Hat USA/Black Hat USA 2001/video/Brian Martin and B K DeLong - Lessons Learned From attrition.org.mp4 20.9 MB
- Black Hat USA/Black Hat USA 2016/An Inconvenient Trust - User Attitudes Toward Security and Usability Tradeoffs.mp4 20.8 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_ec6.mp3 20.8 MB
- Black Hat DC/Black Hat DC 2010/Neat New & Ridiculous Flash Hacks - Mike Bailey.mp4 20.8 MB
- Black Hat USA/Black Hat USA 2019/Preventing Authentication Bypass A Tale of Two Researchers.mp4 20.8 MB
- Black Hat USA/Black Hat USA 2003/video/Simple Nomad - Covering Your Tracks.mp4 20.8 MB
- Black Hat Europe/Black Hat Europe 2013/Dude, Where's My Laptop.mp4 20.8 MB
- Black Hat USA/Black Hat USA 2018/Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops.mp4 20.8 MB
- Black Hat USA/Black Hat USA 2013/video/CrowdSource - Open Source Crowd Trained Machine Learning Model for Malware Detection.mp4 20.8 MB
- Black Hat USA/Black Hat USA 2018/Mainframe [zOS] Reverse Engineering and Exploit Development.mp4 20.8 MB
- Black Hat USA/Black Hat USA 2021/A Survivor-Centric, Trauma-Informed Approach to Stalkerware.mp4 20.8 MB
- Black Hat USA/Black Hat USA 2018/Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities.mp4 20.7 MB
- Black Hat USA/Black Hat USA 2012/video/NFC Analysis.mp4 20.7 MB
- Black Hat USA/Black Hat USA 2018/Mental Health Hacks - Fighting Burnout, Depression and Suicide in the Hacker Community.mp4 20.7 MB
- Black Hat USA/Black Hat USA 2018/TLBleed - When Protecting Your CPU Caches is Not Enough.mp4 20.7 MB
- Black Hat USA/Black Hat USA 2018/WireGuard - Next Generation Secure Network Tunnel.mp4 20.7 MB
- Black Hat USA/Black Hat USA 2014/video/Evasion of High-End IPS Devices in the Age of IPv6.mp4 20.7 MB
- Black Hat USA/Black Hat USA 2013/video/Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.mp4 20.7 MB
- Black Hat USA/Black Hat USA 2006/video/Sotirov - HotPatching3rd Party Patch.mp4 20.7 MB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 at the ExCel, London December 9-12.mp4 20.7 MB
- Black Hat Europe/Black Hat Europe 2019/BluePill Neutralizing Anti-Analysis Behavior in Malware Dissection.mp4 20.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_M4B.mp3 20.7 MB
- Black Hat USA/Black Hat USA 2012/video/BeEF attack with MITM.mp4 20.6 MB
- Black Hat Europe/Black Hat Europe 2019/Side Channel Attacks in 4G and 5G Cellular Networks.mp4 20.6 MB
- Black Hat USA/Black Hat USA 1999/audio/Eric Schultze and George Kurtz - Over the Router, Through the Firewall, to Grandma's House We Go.opus 20.6 MB
- Black Hat DC/Black Hat DC 2011/Video/Fireside Chat - Debora Plunkett and Jeff Moss.mp4 20.6 MB
- Black Hat USA/Black Hat USA 2019/Legal GNSS Spoofing and its Effects on Autonomous Vehicles.mp4 20.6 MB
- Black Hat USA/Black Hat USA 2004/Richard Thieme - Saying Whatever he Wants.mp4 20.6 MB
- Black Hat USA/Black Hat USA 2002/video/Aaron Higbee and Chris Davis - DC Phone Home.mp4 20.6 MB
- Black Hat USA/Black Hat USA 2005/video/Derek Soeder, Ryan Permeh - eYe Bootroot.mp4 20.6 MB
- Black Hat USA/Black Hat USA 2001/video/Steven Christey - CVE Behind the Scenes The Complexity of Being Simple.mp4 20.6 MB
- Black Hat Europe/Black Hat Europe 2013/Hardening Windows 8 apps for the Windows Store.mp4 20.6 MB
- Black Hat USA/Black Hat USA 2006/video/Jesse Burns - Fuzzing Win32.mp4 20.6 MB
- Black Hat USA/Black Hat USA 2021/Internal Affairs Hacking File System Access from the Web.mp4 20.6 MB
- Black Hat USA/Black Hat USA 2014/video/Investigating PowerShell Attacks.mp4 20.5 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Trustworthy Computing Update - Scott Clup.mp4 20.5 MB
- Black Hat USA/Black Hat USA 1998/video/Jennifer Granick - What's Different About Evidence in Computer Crime litigation.mp4 20.5 MB
- Black Hat Asia/Black Hat Singapore 2015/Resurrecting The Read Logs Permission on Samsung Devices.mp4 20.5 MB
- Black Hat USA/Black Hat USA 1999/video/Mike Schiffmman - The Firewalk Tool.mp4 20.5 MB
- Black Hat USA/Black Hat USA 2003/video/Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder.mp4 20.5 MB
- Black Hat USA/Black Hat USA 2022/Is WebAssembly Really Safe - Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way.mp4 20.5 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Tang-Clkscrew-Exposing-The-Perils-Of-Security-Oblivious-Energy-Management.pdf 20.4 MB
- Black Hat Asia/Black Hat Singapore 2020/WIFI-Important Remote Attack Surface Threat is Expanding.mp4 20.4 MB
- Black Hat DC/Black Hat DC 2008/Video/Preparing for the Cross Site Request Forgery Defense - Chuck Willis.mp4 20.4 MB
- Black Hat USA/Black Hat USA 2002/presentations/higbee_davis/DCPH_X86.ISO 20.4 MB
- Black Hat USA/Black Hat USA 2018/Meltdown - Basics, Details, Consequences.mp4 20.4 MB
- Black Hat USA/Black Hat USA 1999/audio/Simple Nomad - Modern NetWare Hacking.opus 20.4 MB
- Black Hat Europe/Black Hat Europe 2018/Where 2 Worlds Collide Bringing Mimikatz et al to UNIX.mp4 20.4 MB
- Black Hat USA/Black Hat USA 2019/Cybersecurity Risk Assessment for Safety-Critical Systems.mp4 20.4 MB
- Black Hat USA/Black Hat USA 2018/A Deep Dive into macOS MDM (and How it can be Compromised).mp4 20.3 MB
- Black Hat USA/Black Hat USA 2008/video/Client-side Security - Petko D. Petkov.mp4 20.3 MB
- Black Hat USA/Black Hat USA 2006/video/Silberman and Butler - RAIDEv1.0.mp4 20.3 MB
- Black Hat USA/Black Hat USA 2006/video/Bruce Potter - Bluetooth Defense Kit.mp4 20.3 MB
- Black Hat USA/Black Hat USA 2018/Lessons and Lulz - The 4th Annual Black Hat USA NOC Report.mp4 20.3 MB
- Black Hat USA/Black Hat USA 1999/video/Scott Culp - Building a Security Response Process.mp4 20.3 MB
- Black Hat USA/Black Hat USA 2002/video/Dan Veeneman - Wireless Overview - Protocols and Threat Models.mp4 20.3 MB
- Black Hat USA/Black Hat USA 2019/Dragonblood Attacking the Dragonfly Handshake of WPA3.mp4 20.3 MB
- Black Hat USA/Black Hat USA 2018/Remotely Attacking System Firmware.mp4 20.3 MB
- Black Hat Europe/Black Hat Europe 2012/Video/The Pwnage Saga Continues.mp4 20.3 MB
- Black Hat USA/Black Hat USA 2012/video/Multiple Operation System Vurnarability.mp4 20.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/WebKit Everywhere - Secure or Not.mp4 20.3 MB
- Black Hat USA/Black Hat USA 1999/audio/Jeremy Rauch - How Responsive are Vendors to Security Problems When They Aren't Being Pressured.opus 20.3 MB
- Black Hat Asia/Black Hat Singapore 2021/How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover.mp4 20.3 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Stealing with BGP - Steve Dugan.mp4 20.2 MB
- Black Hat Asia/Black Hat Singapore 2018/KSMA Breaking Android Kernel Isolation and Rooting with ARM MMU Features.mp4 20.2 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_P2.mp3 20.2 MB
- Black Hat Europe/Black Hat Europe 2023/Hacking Your Documentation Who Should WTFM.mp4 20.2 MB
- Black Hat USA/Black Hat USA 2022/Custom Processing Unit Tracing and Patching Intel Atom Microcode.mp4 20.2 MB
- Black Hat USA/Black Hat USA 2005/video/Jeff Moss, Gillman Louie - Welcome Keynote.mp4 20.2 MB
- Black Hat USA/Black Hat USA 2019/Biometric Authentication Under Threat Liveness Detection Hacking.mp4 20.2 MB
- Black Hat USA/Black Hat USA 2012/video/Pin Pad Pwn.mp4 20.2 MB
- Black Hat USA/Black Hat USA 2001/video/Palante - Top 25 Overlooked Security Configuration on Your Switches and Routers.mp4 20.2 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_bs5.mp3 20.2 MB
- Black Hat USA/Black Hat USA 2018/Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks.mp4 20.2 MB
- Black Hat USA/Black Hat USA 2014/video/Epidemiology of Software Vulnerabilities - A Study of Attack Surface Spread.mp4 20.2 MB
- Black Hat USA/Black Hat USA 2001/video/Marshall Beddoe and Chris Abad - The Siphon Project.mp4 20.1 MB
- Black Hat Asia/Black Hat Singapore 2020/Tracking the Criminal of Fake News Based on a Unified Embedding.mp4 20.1 MB
- Black Hat USA/Black Hat USA 2019/Behind the scenes of iOS and Mac Security.mp4 20.1 MB
- Black Hat USA/Black Hat USA 1999/video/Jeremy Rauch - How Responsive are Vendors to Security Problems When They Aren't Being Pressured.mp4 20.1 MB
- Black Hat Asia/Black Hat Singapore 2015/Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring.mp4 20.1 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Java Library Hole Allowing Multiplatform Denial-Of-Service - Marc Schoenefeld.mp4 20.1 MB
- Black Hat USA/Black Hat USA 1999/video/Marcus Ranum - Burglar Alarms and Booby Traps.mp4 20.1 MB
- Black Hat Asia/Black Hat Singapore 2022/Bypass CFG in Chrome.mp4 20.1 MB
- Black Hat USA/Black Hat USA 2018/Kernel Mode Threats and Practical Defenses.mp4 20.1 MB
- Black Hat USA/Black Hat USA 1999/audio/Padgett Peterson - Overlooked Local Attack Techniques.opus 20.0 MB
- Black Hat USA/Black Hat USA 2012/video/Hardware Backdooring.mp4 20.0 MB
- Black Hat USA/Black Hat USA 2018/Reversing a Japanese Wireless SD Card - From Zero to Code Execution.mp4 20.0 MB
- Black Hat USA/Black Hat USA 2005/video/Alex Stamos - SteAlex Stamos, Stender - Attacking web Servicender - Attacking web Service.mp4 20.0 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_a1.mp3 20.0 MB
- Black Hat USA/Black Hat USA 2021/Your Software IS NOT Vulnerable CSAF, VEX, and the Future of Advisories.mp4 20.0 MB
- Black Hat USA/Black Hat USA 2013/video/Out of Control - Demonstrating SCADA Device Exploitation.mp4 20.0 MB
- Black Hat USA/Black Hat USA 2005/video/Sherri Sparks, Jamie Butler - Shadow Walker.mp4 20.0 MB
- Black Hat Asia/Black Hat Singapore 2014/UI Redressing Attacks on Android Devices Revisited by Marcus Niemietz.mp4 20.0 MB
- Black Hat USA/Black Hat USA 2012/video/Smashing the Furure for Fun & Profit.mp4 20.0 MB
- Black Hat USA/Black Hat USA 2012/video/Hacking for Fun & Profit.mp4 20.0 MB
- Black Hat USA/Black Hat USA 2002/video/Bruce Potter - 802.11X.mp4 20.0 MB
- Black Hat USA/Black Hat USA 2003/video/Gerhard Eschelbeck - Law Vulnerabilities.mp4 20.0 MB
- Black Hat USA/Black Hat USA 2019/Transparency in the Software Supply Chain Making SBOM a Reality.mp4 20.0 MB
- Black Hat USA/Black Hat USA 2018/Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology.mp4 19.9 MB
- Black Hat DC/Black Hat DC 2008/Video/Analyzing an Unknown RF Based Data Transmission (Aka Fun with 27Mhz Wireless Keyboards) - Max Moser.mp4 19.9 MB
- Black Hat Europe/Black Hat Europe 2001/video/Politics of Vulnerability Reporting - Scott Blake.mp4 19.9 MB
- Black Hat USA/Black Hat USA 2003/video/Sutterfield - Enterprise security for converging technologies.mp4 19.9 MB
- Black Hat Asia/Black Hat Singapore 2015/API Deobfuscator - Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis.mp4 19.9 MB
- Black Hat Asia/Black Hat Singapore 2021/(Un)protected Broadcasts in Android 9 and 10.mp4 19.9 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU2B.mp3 19.8 MB
- Black Hat USA/Black Hat USA 2008/video/No More 0-Days (or Code-Based Intrusion Detection by Korset) - Ohad Ben-Cohen.mp4 19.8 MB
- Black Hat USA/Black Hat USA 2014/video/How to Wear Your Password.mp4 19.8 MB
- Black Hat USA/Black Hat USA 2016/Side-Channel Attacks on Everyday Applications.mp4 19.8 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Third Generation Exploits on NTWin2k Platforms - Halvar Flake.opus 19.8 MB
- Black Hat USA/Black Hat USA 2021/Fixing a Memory Forensics Blind Spot Linux Kernel Tracing.mp4 19.8 MB
- Black Hat USA/Black Hat USA 2018/Threat Modeling in 2018 - Attacks, Impacts and Other Updates.mp4 19.8 MB
- Black Hat USA/Black Hat USA 1999/audio/David Bovee - VPN Architectures Looking at the Complete Picture.opus 19.8 MB
- Black Hat USA/Black Hat USA 2001/video/Ofir Arkin - Introducing X Playing Tricks with ICMP.mp4 19.8 MB
- Black Hat USA/Black Hat USA 2019/Death to the IOC What's Next in Threat Intelligence.mp4 19.7 MB
- Black Hat USA/Black Hat USA 2014/video/Why You Need to Detect More Than PtH.mp4 19.7 MB
- Black Hat USA/Black Hat USA 2014/video/Pulling Back the Curtain on Airport Security - Can a Weapon Get Past TSA.mp4 19.7 MB
- Black Hat USA/Black Hat USA 1999/video/Jennifer Grannick - Forensic Issues in Hacker Prosecutions.mp4 19.7 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Adam Shostack - Will People Ever Pay for Privacy.mp4 19.7 MB
- Black Hat USA/Black Hat USA 1999/video/David Bovee - VPN Architectures Looking at the Complete Picture.mp4 19.7 MB
- Black Hat USA/Black Hat USA 2014/video/What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels.mp4 19.7 MB
- Black Hat USA/Black Hat USA 2012/video/Malware.mp4 19.7 MB
- Black Hat USA/Black Hat USA 2008/video/How to Impress Girls with Browser Memory Protection Bypasses - Alexander Sotirov, Mark Dowd.mp4 19.7 MB
- Black Hat USA/Black Hat USA 2006/video/Panel - Hacker Court.mp4 19.6 MB
- Black Hat USA/Black Hat USA 2000/video/Simple Nomad - Strategies for Defeating Distributed Attacks.mp4 19.6 MB
- Black Hat USA/Black Hat USA 1999/audio/Jennifer Grannick - Forensic Issues in Hacker Prosecutions.opus 19.6 MB
- Black Hat USA/Black Hat USA 2003/video/SensePost - Putting Tea back into CyberTerrorism.mp4 19.6 MB
- Black Hat USA/Black Hat USA 1999/audio/Scott Culp - Building a Security Response Process.opus 19.6 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-1/bh-asia-03-day2-t1-5-16-28-56.rm 19.6 MB
- Black Hat USA/Black Hat USA 1999/video/Batz - Security Issues Affecting Internet Transit Points and Backbone Providers.mp4 19.6 MB
- Black Hat USA/Black Hat USA 2016/BadWPAD.mp4 19.5 MB
- Black Hat USA/Black Hat USA 2014/video/Abuse of CPE Devices and Recommended Fixes.mp4 19.5 MB
- Black Hat USA/Black Hat USA 2012/video/Software Exploitation.mp4 19.5 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_K4.mp3 19.5 MB
- Black Hat USA/Black Hat USA 2002/video/Dave Aitel - An Introduction to Spike.mp4 19.5 MB
- Black Hat USA/Black Hat USA 2013/video/Pass the Hash and other credential theft and reuse - Preventing Lateral Movement.mp4 19.5 MB
- Black Hat USA/Black Hat USA 1999/audio/Brent Huston - Appliance Firewalls a detailed review.opus 19.5 MB
- Black Hat USA/Black Hat USA 2018/GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs.mp4 19.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/The Heavy Metal That Poisoned the Droid.mp4 19.5 MB
- Black Hat USA/Black Hat USA 2005/video/Ian Clarke, Oskar Sandberg - Scalable searches.mp4 19.5 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Shaun Clowes - Generic Technical Defences.mp4 19.5 MB
- Black Hat USA/Black Hat USA 2005/video/Jeff Moss and Panel - CISO QA.mp4 19.4 MB
- Black Hat USA/Black Hat USA 2015/video/Graphic Content Ahead Towards Auto Scalable Analysis Of Graphical Images Emb.mp4 19.4 MB
- Black Hat USA/Black Hat USA 1998/video/Bruce K. Marshall - Statistical Analysis of Reusable Password Systems and Their Alternatives.mp4 19.4 MB
- Black Hat USA/Black Hat USA 2006/video/Kaminsky - BlackOPS 2006.mp4 19.4 MB
- Black Hat USA/Black Hat USA 2001/video/James Bamford - Researching Secrets Part II.mp4 19.4 MB
- Black Hat USA/Black Hat USA 2022/Eliminating Triage Intermediaries for Zero - day Exploits Using a Decentralised Payout Protocol.mp4 19.4 MB
- Black Hat USA/Black Hat USA 2016/Certificate Bypass - Hiding and Executing Malware from a Digitally Signed Executable.mp4 19.4 MB
- Black Hat USA/Black Hat USA 2008/video/Developments in Cisco iOS Forensics - Felix FX Linder.mp4 19.4 MB
- Black Hat USA/Black Hat USA 2021/Diving in to Spooler Discovering LPE and RCE Vulnerabilities in Windows Printer.mp4 19.3 MB
- Black Hat USA/Black Hat USA 2005/video/Ejovi Nuwere - SIP Format Fuzz in Voip.mp4 19.3 MB
- Black Hat Asia/Black Hat Singapore 2020/Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier.mp4 19.3 MB
- Black Hat USA/Black Hat USA 2008/video/Satan is on My Friends List Attacking Social Networks - Shawn Moyer, Nathan Hamiel.mp4 19.3 MB
- Black Hat USA/Black Hat USA 2012/video/Random Number Generator in PHP.mp4 19.3 MB
- Black Hat USA/Black Hat USA 2019/WebAuthn 101 - Demystifying WebAuthn.mp4 19.3 MB
- Black Hat USA/Black Hat USA 2010/Ushering in the post GRC world applied threat modeling - Alex Hutton, Allison Miller.mp4 19.3 MB
- Black Hat USA/Black Hat USA 2005/video/Andrew Van der Stock - OWASP Guide.eng.mp4 19.3 MB
- Black Hat USA/Black Hat USA 1999/audio/Dominique Brezinski - Building a Forensics Toolkit That Will Protect You from Evil Influences.opus 19.2 MB
- Black Hat USA/Black Hat USA 2014/video/Bringing Software Defined Radio to the Penetration Testing Community.mp4 19.2 MB
- Black Hat USA/Black Hat USA 2018/Lowering the Bar - Deep Learning for Side Channel Analysis.mp4 19.2 MB
- Black Hat USA/Black Hat USA 2001/video/Andrew van der Stock - Alternatives to Honeypots.mp4 19.2 MB
- Black Hat USA/Black Hat USA 2008/video/AppSec A-Z Reverse Engineering, Source Code Auditing, Fuzzing, and Exploitation - Jared DeMott.mp4 19.2 MB
- Black Hat USA/Black Hat USA 2000/video/Job De Haas - Getting Rooted and Never Knowing It.mp4 19.2 MB
- Black Hat USA/Black Hat USA 2002/video/Maximiliano Caceres - Syscall Proxying.mp4 19.2 MB
- Black Hat USA/Black Hat USA 2003/video/David Litchfield - Variations in Exploit Methods between Linux and Windows.mp4 19.2 MB
- Black Hat Europe/Black Hat Europe 2017/videos/I Trust My Zombies - A Trust-Enabled Botnet.mp4 19.2 MB
- Black Hat USA/Black Hat USA 2006/video/VK1-Larkin-Fight org Cyber crime.mp4 19.2 MB
- Black Hat USA/Black Hat USA 2004/Nitesh Dhanjani - Justin Clark.mp4 19.2 MB
- Black Hat USA/Black Hat USA 2016/Attacking SDN Infrastructure - Are We Ready for the Next-Gen Networking.mp4 19.2 MB
- Black Hat Europe/Black Hat Europe 2013/DropSmack - How Cloud Synchronization Services Render Your Corporate Firewall.mp4 19.2 MB
- Black Hat USA/Black Hat USA 2019/Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime.mp4 19.1 MB
- Black Hat USA/Black Hat USA 2015/video/CrackLord Maximizing Password Cracking Boxes.mp4 19.1 MB
- Black Hat DC/Black Hat DC 2008/Video/IO in the Cyber Domain, Immunity Style - Sinan Eren & Dave Aitel.mp4 19.1 MB
- Black Hat USA/Black Hat USA 2010/The emperor has no cloths - Ben Feinstein, Ben Keen-.mp4 19.1 MB
- Black Hat USA/Black Hat USA 2020/Engineering Empathy Adapting Software Engineering Principles and Process to Security.mp4 19.1 MB
- Black Hat Europe/Black Hat Europe 2013/The Deputies Are Still Confused.mp4 19.1 MB
- Black Hat USA/Black Hat USA 2005/video/Beetle Potter - Evil Twins 802.11.mp4 19.1 MB
- Black Hat USA/Black Hat USA 2014/video/Attacking Mobile Broadband Modems Like a Criminal Would.mp4 19.0 MB
- Black Hat Europe/Black Hat Europe 2013/Mesh Stalkings-Penetration Testing with Small Networked Devices.mp4 19.0 MB
- Black Hat USA/Black Hat USA 2000/video/Mark Kadrich - Intrusion Detection in High Speed Networks.mp4 19.0 MB
- Black Hat USA/Black Hat USA 2000/video/Padgett Peterson - Securing EMail Gateways from Attacks - What to do While Waiting for Vendors to Respond to the latest virus and worms.mp4 19.0 MB
- Black Hat Europe/Black Hat Europe 2001/video/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 2-2.mp4 19.0 MB
- Black Hat USA/Black Hat USA 2008/video/FLEX, AMF 3 and BlazeDS An Assessment - Jacob Carlson, Kevin Stadmeyer.mp4 19.0 MB
- Black Hat USA/Black Hat USA 2018/For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4 19.0 MB
- Black Hat USA/Black Hat USA 2020/Web Cache Entanglement Novel Pathways to Poisoning.mp4 18.9 MB
- Black Hat USA/Black Hat USA 2018/Hardening Hyper-V through Offensive Security Research.mp4 18.9 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Authenticator Leakage Through Backup Channels on Android.mp4 18.9 MB
- Black Hat Europe/Black Hat Europe 2023/Orchestrate This Kubernetes Rootkit.mp4 18.9 MB
- Black Hat USA/Black Hat USA 2012/video/Interview with Neal Stephenson.mp4 18.9 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Vivisection of an Exploit Development Process - David Aitel.mp4 18.9 MB
- Black Hat USA/Black Hat USA 2012/video/Exploiting Firefox.mp4 18.9 MB
- Black Hat Europe/Black Hat Europe 2020/How to Better Fuzz Windows 10 Directx Kernel at Present.mp4 18.9 MB
- Black Hat USA/Black Hat USA 1999/video/Teresa Lunt - Taxonomy of Intrusion Detection Systems.mp4 18.9 MB
- Black Hat USA/Black Hat USA 2006/video/Johnny Long - Hacking Hollywood.mp4 18.9 MB
- Black Hat USA/Black Hat USA 2006/video/Willis and Belani - Web App Incident.mp4 18.8 MB
- Black Hat USA/Black Hat USA 2012/video/Ghost in the Air (Traffic).mp4 18.8 MB
- Black Hat Asia/Black Hat Singapore 2016/Hey, Your Parcel Looks Bad - Fuzzing and Exploiting Parcel - Ization Vulnerabilties in Android.mp4 18.8 MB
- Black Hat Europe/Black Hat Europe 2013/The Sandbox Roulette - Are You Ready For The Gamble.mp4 18.8 MB
- Black Hat USA/Black Hat USA 2018/From Bot to Robot - How Abilities and Law Change with Physicality.mp4 18.7 MB
- Black Hat Asia/Black Hat Singapore 2021/New Attack Surface in Safari Using Just One Web Audio Vulnerability to Rule Safari.mp4 18.7 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Paul Wouters - Deploying DNSSEC.mp4 18.7 MB
- Black Hat USA/Black Hat USA 2016/BadTunnel - How Do I Get Big Brother Power.mp4 18.7 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Marcus Ranum - Full Disclosure and Open Source 1-2.opus 18.7 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Becoming You - A Glimpse Into Credential Abuse.mp4 18.7 MB
- Black Hat Asia/Black Hat Singapore 2020/The Inside Story There are Apps in Apps and Here is How to Break Them.mp4 18.7 MB
- Black Hat USA/Black Hat USA 2016/Keystone Engine - Next Generation Assembler Framework.mp4 18.7 MB
- Black Hat USA/Black Hat USA 2018/Your Voice is My Passport.mp4 18.7 MB
- Black Hat Europe/Black Hat Europe 2016/videos/When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.mp4 18.6 MB
- Black Hat USA/Black Hat USA 1999/video/Tatum - Managing the External Environment.mp4 18.6 MB
- Black Hat USA/Black Hat USA 2004/Gerard Eschelbeck - The laws of Vulnerabilities for Internal Networks.mp4 18.6 MB
- Black Hat USA/Black Hat USA 2014/video/Learn How to Control Every Room at a Luxury Hotel Remotely.mp4 18.6 MB
- Black Hat DC/Black Hat DC 2008/Video/Security Failures in Secure Devices - Christopher Tarnovsky.mp4 18.6 MB
- Black Hat USA/Black Hat USA 2015/video/Bypass Control Flow Guard Comprehensively.mp4 18.6 MB
- Black Hat Europe/Black Hat Europe 2016/videos/GPU Security Exposed.mp4 18.5 MB
- Black Hat USA/Black Hat USA 1999/audio/Panel - Competitive Intelligence.opus 18.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/The Mobile Exploit Intelligence Project.mp4 18.5 MB
- Black Hat USA/Black Hat USA 2012/video/Hacking with WebSockets.mp4 18.5 MB
- Black Hat USA/Black Hat USA 2005/video/Sensepost - Deus ex Machina.mp4 18.5 MB
- Black Hat USA/Black Hat USA 2013/video/The Web IS Vulnerable - XSS Defense on the BattleFront.mp4 18.5 MB
- Black Hat DC/Black Hat DC 2008/Video/Cracking GSM - David Hulton and Steve.mp4 18.5 MB
- Black Hat USA/Black Hat USA 2018/Outsmarting the Smart City.mp4 18.5 MB
- Black Hat USA/Black Hat USA 1999/video/Adam Shostack - Towards a Taxonomy of Network Testing Techniques.mp4 18.5 MB
- Black Hat USA/Black Hat USA 1999/audio/Jon David - Putting Intrusion Detection into Intrusion Detection Systems.opus 18.5 MB
- Black Hat USA/Black Hat USA 2004/Sensepost - When The Tables Turn.mp4 18.5 MB
- Black Hat USA/Black Hat USA 1999/video/Ed Gerck - Overview of Certification systems x509, CA, PGP and SKIP.mp4 18.5 MB
- Black Hat USA/Black Hat USA 2012/video/Hacking the Corporare Mind.mp4 18.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits.mp4 18.5 MB
- Black Hat USA/Black Hat USA 2004/Tzi-cker Chiueh - Program Semantics Aware Intrusion Detection.mp4 18.4 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Moore - Metasploit Reloaded.opus 18.4 MB
- Black Hat USA/Black Hat USA 2003/video/Chris Paget - Click to Continue Shatter Attacks on Win32.mp4 18.4 MB
- Black Hat USA/Black Hat USA 1999/video/William Cheswick - Closing Session.mp4 18.4 MB
- Black Hat USA/Black Hat USA 1999/audio/Marcus Ranum - Burglar Alarms and Booby Traps.opus 18.4 MB
- Black Hat DC/Black Hat DC 2011/Video/Breaking Encryption in the Cloud - Cheap, GPU Accelerated Supercomputing for Everyone - Thomas Roth.mp4 18.4 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Offensive Threat Modeling for Attackers - Turning Threat Modeling on its Hea.mp4 18.4 MB
- Black Hat USA/Black Hat USA 2018/No Royal Road - Notes on Dangerous Game.mp4 18.3 MB
- Black Hat USA/Black Hat USA 2012/video/Crack a Microcell.mp4 18.3 MB
- Black Hat Europe/Black Hat Europe 2013/Off Grid communications with Android - Meshing the mobile world.mp4 18.3 MB
- Black Hat USA/Black Hat USA 2006/video/Hulton and Moniz - Faster pwning.mp4 18.3 MB
- Black Hat USA/Black Hat USA 2018/Another Flip in the Row.mp4 18.3 MB
- Black Hat USA/Black Hat USA 2006/video/BIDOU - IPS Shortcomings.mp4 18.3 MB
- Black Hat USA/Black Hat USA 2018/There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently.mp4 18.3 MB
- Black Hat Europe/Black Hat Europe 2013/Advanced Heap Manipulation in Windows 8.mp4 18.2 MB
- Black Hat USA/Black Hat USA 2006/video/Ptacek and Goldsmith - Elec Sheep.mp4 18.2 MB
- Black Hat USA/Black Hat USA 2019/GDPArrrrr Using Privacy Laws to Steal Identities.mp4 18.2 MB
- Black Hat Asia/Black Hat Singapore 2018/International Problems Serialized Fuzzing for ICU Vulnerabilities.mp4 18.2 MB
- Black Hat USA/Black Hat USA 2018/Over-the-Air - How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars.mp4 18.2 MB
- Black Hat Europe/Black Hat Europe 2013/OptiSig - Semantic Signature for Metamorphic Malware.mp4 18.2 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Apple vs. Google Client Platforms.mp4 18.2 MB
- Black Hat Europe/Black Hat Europe 2018/AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace.mp4 18.2 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_RA2.mp3 18.1 MB
- Black Hat USA/Black Hat USA 2015/video/Optimized Fuzzing IOKit In IOS.mp4 18.1 MB
- Black Hat USA/Black Hat USA 1999/audio/William Cheswick - Closing Session.opus 18.1 MB
- Black Hat USA/Black Hat USA 2008/video/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani, Billy K Rios.mp4 18.1 MB
- Black Hat USA/Black Hat USA 2015/video/THIS IS DeepERENT Tracking App Behaviors With Nothing Changed Phone.mp4 18.1 MB
- Black Hat USA/Black Hat USA 2018/Automated Discovery of Deserialization Gadget Chains.mp4 18.1 MB
- Black Hat USA/Black Hat USA 2000/video/Arthur Money - Closing Keynote.mp4 18.1 MB
- Black Hat Windows/Black Hat Windows 2003/Video/The Role of Non Obvious Relationships in the Foot Printing Process - Haroon Meer, Charl Van Der Walt.mp4 18.1 MB
- Black Hat USA/Black Hat USA 1999/audio/Tatum - Managing the External Environment.opus 18.1 MB
- Black Hat USA/Black Hat USA 2012/video/Probing The Mobile Operating Networks.mp4 18.1 MB
- Black Hat USA/Black Hat USA 1999/video/Eugene Schultz - Security Issues with Configuring and Maintaining an IIS 4 Server.mp4 18.1 MB
- Black Hat USA/Black Hat USA 2012/video/Evasion of Web Application.mp4 18.1 MB
- Black Hat USA/Black Hat USA 2018/Identity Theft - Attacks on SSO Systems.mp4 18.0 MB
- Black Hat USA/Black Hat USA 2004/Phillip Hallam - Baker - Phishing - commiting Fraud in Public.mp4 18.0 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_K2.mp3 18.0 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Hacking XPATH 2.0.mp4 18.0 MB
- Black Hat USA/Black Hat USA 2001/video/Simple Nomad and Todd Sabin - The RAZOR Warez.mp4 18.0 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Marco Valleri and Alberto Ornaghi - Man In The Middle Attacks.mp4 18.0 MB
- Black Hat USA/Black Hat USA 2012/video/Passive Bluetooth Monitoring.mp4 17.9 MB
- Black Hat Europe/Black Hat Europe 2001/video/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 2-2.mp4 17.9 MB
- Black Hat USA/Black Hat USA 2019/Battle of Windows Service A Silver Bullet to Discover File Privilege Escalation Bugs Automatically.mp4 17.9 MB
- Black Hat USA/Black Hat USA 2008/video/Pointers and Handlers - Alex Ionescu.mp4 17.9 MB
- Black Hat USA/Black Hat USA 2005/video/Alex Wheeler, Niel Mehta - Owning Anti-virus.eng.mp4 17.9 MB
- Black Hat USA/Black Hat USA 2005/video/Tzi-cker Chiueh - Checking Array Bound.mp4 17.9 MB
- Black Hat USA/Black Hat USA 2012/video/Secure Browser Plugins.mp4 17.9 MB
- Black Hat USA/Black Hat USA 2008/video/Jinx - Malware 2.0 - Itzik Kotler, Jonathan Rom.mp4 17.9 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-cybercrime-kill-chain-artes-slides.pdf 17.8 MB
- Black Hat USA/Black Hat USA 2000/video/Jason Garms - Defending Windows 2000 on the Internet.mp4 17.8 MB
- Black Hat USA/Black Hat USA 2014/video/One Packer to Rule Them All.mp4 17.8 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/03121900-surestream-16-28-56.rm 17.8 MB
- Black Hat USA/Black Hat USA 2008/video/Xploiting Google Gadgets Gmalware and Beyond - Tom Stracener, Robert Hansen.mp4 17.8 MB
- Black Hat Europe/Black Hat Europe 2013/The M2M Risk Assessment Guide, a Cyber Fast Track Project.mp4 17.8 MB
- Black Hat USA/Black Hat USA 2000/video/Bruce Schneier - The Instrument and Death of Security.mp4 17.8 MB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 Highlights.mp4 17.8 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0.mp4 17.8 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Rooster and JD Glaser - Defending Your Network With Active Directory Services.opus 17.7 MB
- Black Hat USA/Black Hat USA 2001/video/Scott Blake - Dog of War Attack Box Design.mp4 17.7 MB
- Black Hat USA/Black Hat USA 2018/An Attacker Looks at Docker - Approaching Multi-Container Applications.mp4 17.7 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Jailbreaking Apple Watch.mp4 17.7 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu17-Crumbaugh-How-To-Rob-A-Bank-Over-The-Phone.pdf 17.7 MB
- Black Hat USA/Black Hat USA 2008/video/Passive and Active Leakage of Secret Data from Non-Networked Computer 2-2 - Eric Filiol.mp4 17.7 MB
- Black Hat Europe/Black Hat Europe 2014/Video/SSL Validation Checking vs. Go(ing) to Fail.mp4 17.7 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Panel - Hacker Court.opus 17.7 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Secure Password Managers and Military-Grade Encryption on Smartphones Oh Re.mp4 17.6 MB
- Black Hat Europe/Black Hat Europe 2012/Video/SSL TLS Interception Proxies and Transitive Trust.mp4 17.6 MB
- Black Hat USA/Black Hat USA 2006/presentations/059_Rieback.pdf 17.6 MB
- Black Hat Asia/Black Hat Singapore 2020/Win the 0-Day Racing Game Against Botnet in Public Cloud.mp4 17.6 MB
- Black Hat USA/Black Hat USA 2019/API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.mp4 17.6 MB
- Black Hat USA/Black Hat USA 2006/video/Fischbach - Carrier VOIP Security.mp4 17.6 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Attacking IPv6 Implementation Using Fragmentation.mp4 17.5 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Hide Android Applications in Images.mp4 17.5 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Bypassing Local Windows Authentication To Defeat Full Disk Encryption.mp4 17.5 MB
- Black Hat USA/Black Hat USA 2003/video/Bruce Potter - Java Card 101.mp4 17.5 MB
- Black Hat USA/Black Hat USA 2006/video/Burdach - Physical memory Forensics.mp4 17.5 MB
- Black Hat USA/Black Hat USA 2001/video/Jay Beale - Attacking and Defending BIND DJBDNS DNS Servers.mp4 17.5 MB
- Black Hat USA/Black Hat USA 2006/video/S Stender - Attacking Inatl Software.mp4 17.5 MB
- Black Hat Europe/Black Hat Europe 2013/Using D-Space to Open Doors.mp4 17.5 MB
- Black Hat USA/Black Hat USA 2004/Jamie Butler - Greg Hoglund - VICE Catch the Hookers.mp4 17.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/The IETF & The Future of Security Protocols - All The Signal, None of the No.mp4 17.5 MB
- Black Hat USA/Black Hat USA 1999/video/Peter Shipley and Tom Jackiewicz - Security Issues with Implementing and Deploying the LDAP Directory System.mp4 17.5 MB
- Black Hat USA/Black Hat USA 2003/video/Rick Smith - Masquerades,Tricking Modern Auth Systems.mp4 17.5 MB
- Black Hat USA/Black Hat USA 2001/video/Daji Sanai - Promiscuous Node Detection Using ARP Packets.mp4 17.4 MB
- Black Hat USA/Black Hat USA 1998/video/Patrick Richard - Open Network PKI Design Issues or Business as Usual.mp4 17.4 MB
- Black Hat Asia/Black Hat Singapore 2022/USMA Share Kernel Code With Me.mp4 17.4 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Implementing Practical Electrical Glitching Attacks.mp4 17.4 MB
- Black Hat USA/Black Hat USA 2006/presentations/072_Boehm.pdf 17.4 MB
- Black Hat USA/Black Hat USA 2005/video/Phil Zimmerman - My Next Big Project.mp4 17.4 MB
- Black Hat USA/Black Hat USA 2018/Black Box is Dead. Long Live Black Box.mp4 17.4 MB
- Black Hat USA/Black Hat USA 2016/Samsung Pay - Tokenized Numbers Flaws and Issues.mp4 17.4 MB
- Black Hat Asia/Black Hat Singapore 2021/The Tangled Webview - Javascriptinterface Once More.mp4 17.4 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Dissecting Smart Meters.mp4 17.4 MB
- Black Hat USA/Black Hat USA 2022/(Long) Dragon Tails - Measuring Dependence on International Vulnerability Research.mp4 17.4 MB
- Black Hat Asia/Black Hat Singapore 2020/Attacking and Defending Machine Learning Applications of Public Cloud.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2013/video/CMX - IEEE Clean File Metadata Exchange.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2015/video/The Applications Of Deep Learning On Traffic Identification.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2005/video/Alexander Kornbrust - Circumvent Oracle.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2005/video/James C. Foster, Vincent T. Liu - Catch Me if You Can.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2013/video/Hiding @ Depth - Exploring, Subverting, and Breaking NAND Flash Memory.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2000/video/John McDonald - Stateful Inspection of FireWall-1.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2014/video/Defeating the Transparency Feature of DBI.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2005/video/David Litchfield - All New 0 Day.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2001/video/Bruce Schneier - Paradigms Lost Engineering vs Risk Management.mp4 17.3 MB
- Black Hat USA/Black Hat USA 1999/audio/Mike Schiffmman - The Firewalk Tool.opus 17.3 MB
- Black Hat USA/Black Hat USA 2018/Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2000/video/Terry Losonky - National Information Assurance Partnership.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2004/Adam Laurie - Martin Hurfurt - BlueSnarfing the Risk from Digital Pickpockets.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2012/video/Flash Sandboxes.mp4 17.3 MB
- Black Hat USA/Black Hat USA 2006/video/Panel - Disclosure Public.mp4 17.2 MB
- Black Hat Europe/Black Hat Europe 2018/Real-Time Detection of Attacks Leveraging Domain Administrator Privilege.mp4 17.2 MB
- Black Hat USA/Black Hat USA 2018/Attacking Client-Side JIT Compilers.mp4 17.2 MB
- Black Hat USA/Black Hat USA 2019/Monsters in the Middleboxes Building Tools for Detecting HTTPS Interception.mp4 17.2 MB
- Black Hat USA/Black Hat USA 2012/video/Exploit Windows 8.mp4 17.2 MB
- Black Hat USA/Black Hat USA 2008/video/Nmap Scanning the Internet - Fyodor Vaskovich.mp4 17.1 MB
- Black Hat USA/Black Hat USA 2019/Mobile Interconnect Threats How Next-Gen Products May be Already Outdated.mp4 17.1 MB
- Black Hat USA/Black Hat USA 2006/video/Johnny Long - Death of 1000 Cuts.mp4 17.1 MB
- Black Hat Asia/Black Hat Singapore 2016/Android Commercial Spyware Disease and Medication.mp4 17.1 MB
- Black Hat USA/Black Hat USA 2013/video/Exploiting Network Surveillance Cameras Like a Hollywood Hacker.mp4 17.1 MB
- Black Hat USA/Black Hat USA 1999/audio/Adam Shostack - Towards a Taxonomy of Network Testing Techniques.opus 17.1 MB
- Black Hat USA/Black Hat USA 2018/Squeezing a Key through a Carry Bit.mp4 17.1 MB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-2/bh-asia-03-day2-t2-4-16-28-56.rm 17.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/034_Endler.pdf 17.1 MB
- Black Hat USA/Black Hat USA 2020/Demystifying Modern Windows Rootkits.mp4 17.1 MB
- Black Hat USA/Black Hat USA 2018/Breaking the IIoT - Hacking industrial Control Gateways.mp4 17.1 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Heap Layout Optimisation for Exploitation.mp4 17.1 MB
- Black Hat USA/Black Hat USA 2006/video/Noel Anderseon - Wifi in WIN Vista.mp4 17.1 MB
- Black Hat USA/Black Hat USA 2016/Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization.mp4 17.0 MB
- Black Hat USA/Black Hat USA 2005/video/Adam Boileau - Trust Transcience.mp4 17.0 MB
- Black Hat USA/Black Hat USA 2005/video/Paul Simmonds - The Jericho Challenge.mp4 17.0 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Auditing Binaries for Security Vulnerabilities - Halvar Flake.opus 17.0 MB
- Black Hat USA/Black Hat USA 2006/video/O'Connor - Vunls not So Embedded Sys.mp4 17.0 MB
- Black Hat USA/Black Hat USA 2006/video/FX - The Blackberry Case.mp4 17.0 MB
- Black Hat USA/Black Hat USA 2012/video/Insider Data Theft.mp4 17.0 MB
- Black Hat Europe/Black Hat Europe 2012/Video/One-byte Modification for Breaking Memory Forensic Analysis.mp4 17.0 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Defending Privacy at the U.S. Border - A Guide for Travelers Carrying Digita.mp4 16.9 MB
- Black Hat USA/Black Hat USA 1999/audio/Ed Gerck - Overview of Certification systems x509, CA, PGP and SKIP.opus 16.8 MB
- Black Hat USA/Black Hat USA 2018/Is the Mafia Taking Over Cybercrime.mp4 16.8 MB
- Black Hat Europe/Black Hat Europe 2018/Keeping Secrets Emerging Practice in Database Encryption.mp4 16.8 MB
- Black Hat USA/Black Hat USA 2006/video/Hoglund - Hacking WOW Adv rootkit.mp4 16.8 MB
- Black Hat Europe/Black Hat Europe 2001/video/injectso Modifying and Spying on Running Processes Under Linux - Shawn Clowes.mp4 16.8 MB
- Black Hat Europe/Black Hat Europe 2003/Video/David Litchfield - All New Oracle 0 - day Attacking and Defending Oracle.mp4 16.8 MB
- Black Hat USA/Black Hat USA 2013/video/Hot Knives Through Butter - Bypassing Automated Analysis Systems.mp4 16.8 MB
- Black Hat USA/Black Hat USA 2004/Ralf Spenneberg - IKE Testing IKE Implementations.mp4 16.8 MB
- Black Hat Europe/Black Hat Europe 2001/video/The Other Side of Information Security - Wilco van Grinkel.mp4 16.8 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 Highlights.mp4 16.7 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Is Your Timespace Safe - Time and Position Spoofing Opensourcely.mp4 16.7 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Smartphone s Apps Are Not That Smart - Insecure Development Practices.mp4 16.7 MB
- Black Hat Europe/Black Hat Europe 2017/videos/The Spear to Break the Security Wall of S7Commplus.mp4 16.7 MB
- Black Hat USA/Black Hat USA 2014/video/SVG - Exploiting Browsers without Image Parsing Bugs.mp4 16.7 MB
- Black Hat USA/Black Hat USA 2007/presentations/Barisani_and_Bianco/Extras/3.avi 16.7 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Gonzalez-How-To-Fool-An-ADC-Part-II-Or-Hiding-Destruction-Of-Turbine-With-A-Little-Help-Of-Signal-Processing.pdf 16.7 MB
- Black Hat Europe/Black Hat Europe 2018/Under the SEA - A Look at the Syrian Electronic Army's Mobile Tooling.mp4 16.7 MB
- Black Hat USA/Black Hat USA 2012/video/Errata Hits Puberty.mp4 16.7 MB
- Black Hat USA/Black Hat USA 2012/video/Javascript Threats.mp4 16.6 MB
- Black Hat USA/Black Hat USA 2018/LTE Network Automation Under Threat.mp4 16.6 MB
- Black Hat Europe/Black Hat Europe 2012/Video/GDI Font Fuzzing in Windows Kernel For Fun.mp4 16.6 MB
- Black Hat USA/Black Hat USA 2012/video/Automated Malware Analysis.mp4 16.6 MB
- Black Hat USA/Black Hat USA 2015/video/Mobile Point Of Scam Attacking The Square Reader.mp4 16.6 MB
- Black Hat USA/Black Hat USA 2006/video/V9-Scholz-SIP Stack Fingerprinting.mp4 16.6 MB
- Black Hat USA/Black Hat USA 2018/An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities.mp4 16.6 MB
- Black Hat USA/Black Hat USA 2012/video/Maximizing Home-field Advantage.mp4 16.6 MB
- Black Hat USA/Black Hat USA 2016/O-Checker - Detection of Malicious Documents Through Deviation From File Format Specifications.mp4 16.6 MB
- Black Hat USA/Black Hat USA 2004/K K Mookhey - Evasion and Detection of Web Application Tactics.mp4 16.5 MB
- Black Hat USA/Black Hat USA 2006/video/Ofir Arkin - Bypassing NAC Systems.mp4 16.5 MB
- Black Hat USA/Black Hat USA 2004/Cameron Hotchkies - Blind Injection Automation Techniques.mp4 16.5 MB
- Black Hat USA/Black Hat USA 2016/Dark Side of the DNS Force.mp4 16.5 MB
- Black Hat USA/Black Hat USA 2004/Seth Fogie - Pocket PC Abuse.mp4 16.5 MB
- Black Hat Asia/Black Hat Singapore 2020/Patching Loopholes Finding Backdoors in Applications.mp4 16.5 MB
- Black Hat USA/Black Hat USA 2004/JD Glaser - Hacking With Executives.mp4 16.5 MB
- Black Hat USA/Black Hat USA 1999/video/Jon David - Putting Intrusion Detection into Intrusion Detection Systems.mp4 16.5 MB
- Black Hat Asia/Black Hat Singapore 2016/Bypassing Browser Security Policies for Fun and Profit.mp4 16.5 MB
- Black Hat USA/Black Hat USA 2003/video/Aldora Louw - Notes on Domino.mp4 16.5 MB
- Black Hat USA/Black Hat USA 2000/video/Richard Theime - Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the Board is Disappearing.mp4 16.5 MB
- Black Hat USA/Black Hat USA 2005/video/Jeremiah Grossman - Phishing with Super Bait.mp4 16.4 MB
- Black Hat USA/Black Hat USA 2005/video/Allen Harper, Edward Balas - The Birth of roo.eng.mp4 16.4 MB
- Black Hat Asia/Black Hat Singapore 2016/Hacking a Professional Drone.mp4 16.4 MB
- Black Hat USA/Black Hat USA 2012/video/Breaking .NET Sandboxes.mp4 16.4 MB
- Black Hat USA/Black Hat USA 2015/video/Subverting Satellite Receivers For Botnet And Profit.mp4 16.4 MB
- Black Hat Asia/Black Hat Singapore 2016/I'm Not a Human - Breaking the Google Recaptcha.mp4 16.4 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Attacks Against GSMA's M2M Remote Provisioning.mp4 16.4 MB
- Black Hat Europe/Black Hat Europe 2013/Multiplayer Online Games Insecurity.mp4 16.3 MB
- Black Hat USA/Black Hat USA 2001/video/Thomas Olofsson - Building a Blind IP Spoofed Portscanning Tool.mp4 16.3 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Sugiura - Winny Poo - Japanese.opus 16.3 MB
- Black Hat Europe/Black Hat Europe 2013/Floating Car Data from Smartphones.mp4 16.3 MB
- Black Hat USA/Black Hat USA 2002/video/Paul Knight - Dynamic Routing Inside IPsec VPNs.mp4 16.3 MB
- Black Hat USA/Black Hat USA 2018/A Brief History of Mitigation - The Path to EL1 in iOS 11.mp4 16.3 MB
- Black Hat USA/Black Hat USA 2020/Hiding Process Memory via Anti-Forensic Techniques.mp4 16.2 MB
- Black Hat USA/Black Hat USA 1999/audio/Peter Shipley and Tom Jackiewicz - Security Issues with Implementing and Deploying the LDAP Directory System.opus 16.2 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Vasilomanolakis-I-Trust-My-Zombies-A-Trust-Enabled-Botnet-wp.pdf 16.2 MB
- Black Hat USA/Black Hat USA 1999/video/Greg Hoglund - 1000 Hackers in a box Failings of Security Scanners.mp4 16.2 MB
- Black Hat USA/Black Hat USA 2014/video/My Google Glass Sees Your Passwords.mp4 16.2 MB
- Black Hat DC/Black Hat DC 2010/Metasploit - Advanced command injection exploitation - cmd.exe in the 00's - David D Rude.mp4 16.2 MB
- Black Hat USA/Black Hat USA 2006/video/Chris Eng - Breaking Crypto.mp4 16.2 MB
- Black Hat Europe/Black Hat Europe 2001/video/Hackproofing Lotus Domino - David Litchfield.mp4 16.2 MB
- Black Hat USA/Black Hat USA 2018/Don't @ Me - Hunting Twitter Bots at Scale.mp4 16.1 MB
- Black Hat USA/Black Hat USA 2004/Peter Siberman Richard Johnson - Comparison Buffer Overflow Prevention Implementations and Weaknesses.mp4 16.1 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Oracle Security II - David Litchfield.mp4 16.1 MB
- Black Hat Europe/Black Hat Europe 2018/Broken Links Emergence and Future of Software-Supply Chain Compromises.mp4 16.1 MB
- Black Hat USA/Black Hat USA 2006/video/Gutterman - Vulns Linux Random Num.mp4 16.1 MB
- Black Hat USA/Black Hat USA 1999/audio/Jim Litchko - Total BS Security business - based systems security.opus 16.1 MB
- Black Hat USA/Black Hat USA 2016/Ouroboros - Tearing Xen Hypervisor With the Snake.mp4 16.1 MB
- Black Hat USA/Black Hat USA 2002/video/Halvar Flake - Graph Based Binary Analysis.mp4 16.1 MB
- Black Hat Europe/Black Hat Europe 2013/Who's Really Attacking Your ICS Devices.mp4 16.1 MB
- Black Hat USA/Black Hat USA 2003/video/Philip Zimmermann - Keynote with Introduction by Jeff Moss.mp4 16.1 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Cyber-Attacks & SAP systems - Is Our Business-Critical Infrastructure Expose.mp4 16.1 MB
- Black Hat USA/Black Hat USA 2013/video/Truncating TLS Connections to Violate Beliefs in Web Applications.mp4 16.1 MB
- Black Hat USA/Black Hat USA 2018/Practical Web Cache Poisoning - Redefining 'Unexploitable'.mp4 16.1 MB
- Black Hat USA/Black Hat USA 2011/video/SSH as the Next Back Door. Are You Giving Hackers Root Access - Joe Skehan.mp4 16.1 MB
- Black Hat USA/Black Hat USA 2006/video/Gbadegesin - TCPIP in WIN Vista.mp4 16.0 MB
- Black Hat USA/Black Hat USA 1999/audio/Teresa Lunt - Taxonomy of Intrusion Detection Systems.opus 16.0 MB
- Black Hat USA/Black Hat USA 2004/Sarah Gordon - Antivirus Security Softwear Tests.mp4 16.0 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Web Application Security -Jeremiah Grossman, Bill Pennington.mp4 16.0 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Preventing Oh Shit Moments for 20 Euros or Less.mp4 16.0 MB
- Black Hat Europe/Black Hat Europe 2012/Video/All Your Calls Are Still Belong to Us - How We Compromised the Cisco VoIP Cr.mp4 16.0 MB
- Black Hat USA/Black Hat USA 1999/audio/Base - Security (or lack thereof) and our Friends in Redmond.opus 16.0 MB
- Black Hat Europe/Black Hat Europe 2013/Building a Defensive Framework for Medical Device Security.mp4 16.0 MB
- Black Hat Europe/Black Hat Europe 2013/Hybrid Defense - How to Protect Yourself From Polymorphic 0-days.mp4 16.0 MB
- Black Hat USA/Black Hat USA 2005/video/Robert J Hansen, Meredith L Patterson - Stopping Injection.mp4 15.9 MB
- Black Hat USA/Black Hat USA 2015/video/Exploiting Out of Order Execution For Covert Cross VM Communication.mp4 15.9 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oit5.m4a 15.9 MB
- Black Hat USA/Black Hat USA 2006/video/Tereshkin - Rootkits Attack Firewall.mp4 15.9 MB
- Black Hat USA/Black Hat USA 2001/video/Daniel VanBelleghem - Solving Network Mystries.mp4 15.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Lotus Domino - Penetration Through the Controller.mp4 15.8 MB
- Black Hat Europe/Black Hat Europe 2016/videos/I Know What You Saw Last Minute - The Chrome Browser Case.mp4 15.8 MB
- Black Hat USA/Black Hat USA 2003/video/Jeffrey Prusan - Technical Security Countermeasures.mp4 15.8 MB
- Black Hat Asia/Black Hat Singapore 2014/Ultimate Dom Based XSS Detection Scanner on Cloud by Nera W. C. Liu & Albert Yu.mp4 15.8 MB
- Black Hat USA/Black Hat USA 2004/Rebecca Mercuri - Bev Harris - Managing Election Data The California Recall.mp4 15.8 MB
- Black Hat Europe/Black Hat Europe 2018/The Last Line of Defense Understanding and Attacking Apple File System on iOS.mp4 15.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Ops of PKI - Dan Kaminski.mp4 15.7 MB
- Black Hat USA/Black Hat USA 1999/audio/Eugene Schultz - Security Issues with Configuring and Maintaining an IIS 4 Server.opus 15.7 MB
- Black Hat USA/Black Hat USA 2015/video/My Bro The ELK Obtaining Context From Security Events.mp4 15.7 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William.eng.json 15.7 MB
- Black Hat USA/Black Hat USA 2006/video/Schulman - Phishing with Asterisk.mp4 15.7 MB
- Black Hat USA/Black Hat USA 2003/video/Greg Hoglund - Runtime Decompilation.mp4 15.7 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao2.m4a 15.7 MB
- Black Hat USA/Black Hat USA 2014/video/Point of Sale System Architecture and Security.mp4 15.6 MB
- Black Hat Europe/Black Hat Europe 2013/Hacking Video Conferencing Systems.mp4 15.6 MB
- Black Hat USA/Black Hat USA 2020/EdTech - The Ultimate APT.mp4 15.6 MB
- Black Hat USA/Black Hat USA 1999/video/Jim Litchko - Total BS Security business - based systems security.mp4 15.5 MB
- Black Hat USA/Black Hat USA 2006/video/David Litchfeild - All new 0day.mp4 15.5 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Mittal-Kautilya_Teensy_Beyond_Shell-Slides.pdf 15.5 MB
- Black Hat USA/Black Hat USA 2012/video/MAC EFI Rootkits.mp4 15.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/An Attacker s Day into Virology - Human vs Computer.mp4 15.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/HDMI - Hacking Displays Made Interesting.mp4 15.5 MB
- Black Hat USA/Black Hat USA 2018/Deep Dive into an ICS Firewall, Looking for the Fire Hole.mp4 15.5 MB
- Black Hat USA/Black Hat USA 2004/Paul Simmons - Welcome to Black Hat.mp4 15.5 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Sutton_Embeded_Web_Servers_Slides.pdf 15.5 MB
- Black Hat USA/Black Hat USA 2006/presentations/064_Scholz.pdf 15.4 MB
- Black Hat USA/Black Hat USA 2020/A Framework for Evaluating and Patching the Human Factor in Cybersecurity.mp4 15.4 MB
- Black Hat USA/Black Hat USA 2008/video/Detecting & Preventing the Xen Hypervisor Subversions - Joanna Rutkowska, Rafal Wojtczuk.mp4 15.4 MB
- Black Hat USA/Black Hat USA 2004/Robert Morris - The Future of the History.mp4 15.3 MB
- Black Hat USA/Black Hat USA 2006/video/Cushman - MS Security fundamentals.mp4 15.3 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.opus 15.3 MB
- Black Hat USA/Black Hat USA 2016/Next-Generation of Exploit Kit Detection By Building Simulated Obfuscators.mp4 15.3 MB
- Black Hat USA/Black Hat USA 2004/Panel - The Black Hat Testimonies.mp4 15.3 MB
- Black Hat USA/Black Hat USA 2004/Thorsen Holz - Maximilliam Dornseif - NoSEBrEaK Defeating Honeypots.mp4 15.2 MB
- Black Hat USA/Black Hat USA 2011/video/Killing the Myth of Cisco IOS Diversity Towards Large-Scale Exploitation of Cisco IOS - Ang Cui, Jatin Kataria, Salvatore Stolfo.mp4 15.2 MB
- Black Hat Europe/Black Hat Europe 2019/Thinking Outside the JIT Compiler.mp4 15.2 MB
- Black Hat USA/Black Hat USA 2002/video/Jeff Jonas - Non Obvious Relationship Awareness.mp4 15.2 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/The Black Hat Time Machine What Happens Next Year - Panel.opus 15.2 MB
- Black Hat USA/Black Hat USA 2019/Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing.mp4 15.2 MB
- Black Hat USA/Black Hat USA 2003/video/Marcus Sachs - Building a Global Culture of Security(Luncheon Speaker).mp4 15.2 MB
- Black Hat USA/Black Hat USA 2001/video/Chad R Skipper - Polymorphism and Intrusion Detection Systems.mp4 15.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).mp4 15.1 MB
- Black Hat USA/Black Hat USA 2012/video/Windows Kernel Exploitation.mp4 15.1 MB
- Black Hat Europe/Black Hat Europe 2013/A Perfect CRIME Only TIME Will Tell.mp4 15.1 MB
- Black Hat Europe/Black Hat Europe 2018/Thermanator and the Thermal Residue Attack.mp4 15.1 MB
- Black Hat USA/Black Hat USA 2013/video/OPSEC Failures of Spies.mp4 15.1 MB
- Black Hat USA/Black Hat USA 2020/Superman Powered by Kryptonite Turn the Adversarial Attack into Your Defense Weapon.mp4 15.1 MB
- Black Hat USA/Black Hat USA 2015/video/Exploiting XXE Vulnerabilities In File Parsing Functionality.mp4 15.1 MB
- Black Hat USA/Black Hat USA 2004/Halvar Flake - Diff Navigate Audit.mp4 15.1 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Kawaguchi - Threats - to - Japanese - Landscape.jp.opus 15.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/050_Gutterman.pdf 15.0 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Panel - Vulnerability Disclosure What the Feds Think.opus 15.0 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Jan K Rutkowski - Advance Windows 2000 Rootkits Detection.opus 15.0 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Web Hacking - JD Glaser, Saumil Shah.opus 15.0 MB
- Black Hat USA/Black Hat USA 2006/video/Zambon and Bolzoni - NIDS False Pos.mp4 15.0 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oit3.m4a 15.0 MB
- Black Hat USA/Black Hat USA 2008/video/Taking the Hype Out of Hypervisor - Tal Garfinkel.mp4 15.0 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Stender - Attack Internatl SW - English.opus 15.0 MB
- Black Hat USA/Black Hat USA 2002/video/Richard Clarke - Keynote National Strategy for Securing Cyberspace.mp4 15.0 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Kawaguchi - Threats - to - Japanese - Landscape.eng.opus 15.0 MB
- Black Hat USA/Black Hat USA 2008/video/VirtuallySecure - Oded Horovitz, Tal Garfinkel.mp4 14.9 MB
- Black Hat USA/Black Hat USA 1999/video/Base - Security (or lack thereof) and our Friends in Redmond.mp4 14.9 MB
- Black Hat Asia/Black Hat Japan 2007/Black Hat Japan 2007 NHK news coverage.mp4 14.9 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Charl-When-the-table-turn-Japanese.opus 14.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Beyond Scanning - Automating Web Application Security Tests.mp4 14.9 MB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Asia 2024 Highlights.mp4 14.9 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Joe-Grand-Hardware-Vulns-English.opus 14.9 MB
- Black Hat USA/Black Hat USA 2018/None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service.mp4 14.8 MB
- Black Hat USA/Black Hat USA 2012/video/Torturing OpenSSL.mp4 14.8 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Venable-Breaking-Big-Data-Evading-Analysis-Of-The-Metadata-Of-Your-Life.pdf 14.8 MB
- Black Hat Europe/Black Hat Europe 2013/To dock or not to dock, that is the question.mp4 14.8 MB
- Black Hat Europe/Black Hat Europe 2003/Video/David Aitel - Vivisection of an Exploit Development Process 1-2.mp4 14.8 MB
- Black Hat USA/Black Hat USA 2004/Brett Moore - Shoot the Messenger.mp4 14.8 MB
- Black Hat Asia/Black Hat Singapore 2014/Advanced JPEG Steganography and Detection by John Ortiz.mp4 14.8 MB
- Black Hat Europe/Black Hat Europe 2013/Invisibility Purge - Unmasking the Dormant Events of Invisible Web Controls.mp4 14.8 MB
- Black Hat USA/Black Hat USA 1999/audio/Greg Hoglund - 1000 Hackers in a box Failings of Security Scanners.opus 14.8 MB
- Black Hat USA/Black Hat USA 2018/Compression Oracle Attacks on VPN Networks.mp4 14.8 MB
- Black Hat USA/Black Hat USA 2008/video/Alternative Medicine The Malware Analyst’s Blue Pill - Paul Royal.mp4 14.7 MB
- Black Hat Europe/Black Hat Europe 2003/Video/BBP - BSD Heap Smashing.mp4 14.7 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Razavi-Flip-Feng-Shui-Rowhammering-The-VMs-Isolation.pdf 14.7 MB
- Black Hat USA/Black Hat USA 2012/video/Intrusion Detection.mp4 14.7 MB
- Black Hat USA/Black Hat USA 2005/video/Joe Klein - Soc Engineering Methodology.mp4 14.7 MB
- Black Hat Europe/Black Hat Europe 2012/Video/The Kelihos Botnet.mp4 14.6 MB
- Black Hat USA/Black Hat USA 2013/video/Mobile Malware - Why the Traditional AV Paradigm is Doomed.mp4 14.6 MB
- Black Hat USA/Black Hat USA 2006/video/Potter - Trusted Computing Revolution.mp4 14.6 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Nicolas Fischbach - DDoS Mitigation and Analysis at the Infrastructure Level.mp4 14.6 MB
- Black Hat Europe/Black Hat Europe 2017/videos/GDPR and Third Party JS - Can It Be Done.mp4 14.6 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Stamos - Breaking AJAX - English.opus 14.6 MB
- Black Hat USA/Black Hat USA 2018/Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths.mp4 14.6 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Paul Bohm - Taming Bugs.opus 14.6 MB
- Black Hat USA/Black Hat USA 2008/video/Next Generation Collaborative Reversing with Ida Pro and CollabREate - Chris Eagle, Tim Vidas.mp4 14.6 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Evans - Get - Rich - Money - BlackHat - way.eng.opus 14.5 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Job de Haas - GSM WAP and SMS Security.opus 14.5 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_df4.m4a 14.5 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw5.m4a 14.5 MB
- Black Hat USA/Black Hat USA 2018/Stop that Release, There's a Vulnerability.mp4 14.5 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Justin_Searle/BlackHat_EU_2011_Searle_Infrastructure_attack-WP.pdf 14.5 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Johnny-Long-Google-Hacking-Japanese-Translated.opus 14.5 MB
- Black Hat USA/Black Hat USA 2012/video/Javascript Botnets.mp4 14.5 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/MS SQL Server Security Overview - Chip Andrews.opus 14.5 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Getting Rooted and Never Knowing It - Job De Haas.opus 14.5 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Moyer - Hamiel - Satan - is - on - MyFriends.eng.opus 14.5 MB
- Black Hat USA/Black Hat USA 2008/video/Natural Security - Jeff Moss, Rod Beckström.mp4 14.5 MB
- Black Hat USA/Black Hat USA 2004/Dan Kaminsky - the Black Ops of DNS.mp4 14.4 MB
- Black Hat USA/Black Hat USA 2005/video/Esteban Martinez - Advanced SQL Injection.eng.mp4 14.4 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao1.m4a 14.4 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Safeguarding You Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.opus 14.4 MB
- Black Hat USA/Black Hat USA 2019/Detecting Malicious Files with YARA Rules as They Traverse the Network.mp4 14.4 MB
- Black Hat USA/Black Hat USA 2005/video/Adam A Young, Modi Yang - Building Robust Backdoors.eng.mp4 14.4 MB
- Black Hat USA/Black Hat USA 2004/Saumil Shah - Defeating Automated Web Assessment Tools.mp4 14.4 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Evans - Get - Rich - Money - BlackHat - way.jp.opus 14.4 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Holz - Catching Malware - Japanese.opus 14.4 MB
- Black Hat Europe/Black Hat Europe 2013/Honeypot That Can Bite - Reverse Penetration.mp4 14.4 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Jennifer Granick and Mark Eckenwiler - What Internet Service Providers Need to Know About the Law.opus 14.3 MB
- Black Hat USA/Black Hat USA 2015/video/Attacking ECMAScript Engines With Redefinition.mp4 14.3 MB
- Black Hat USA/Black Hat USA 2000/video/Ron Moritz - Proactive Defense Against Malicious Code.mp4 14.3 MB
- Black Hat USA/Black Hat USA 2006/presentations/053_Schulman.pdf 14.3 MB
- Black Hat USA/Black Hat USA 2006/video/Merloni and Carettoni - Blue Bag.mp4 14.3 MB
- Black Hat USA/Black Hat USA 2018/Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out.mp4 14.3 MB
- Black Hat Europe/Black Hat Europe 2012/Video/A Sandbox Odyssey.mp4 14.3 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Chris-Eagle-IdaPro-English.opus 14.3 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Kevin McPeake and Chris Goggins - Falling Dominos.opus 14.2 MB
- Black Hat Europe/Black Hat Europe 2013/Next Generation Mobile Rootkits.mp4 14.2 MB
- Black Hat USA/Black Hat USA 2008/video/Complexity in Computer Security - a Risky Business - Jeff Moss, Ian Angell.mp4 14.2 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Geers - Cyberspace - Warfare.jp.opus 14.2 MB
- Black Hat USA/Black Hat USA 2018/Playback - A TLS 1.3 Story.mp4 14.2 MB
- Black Hat USA/Black Hat USA 2011/video/PPI-Geolocation The Next Generation of 802.11 Visualization and Geo-Location - Johnny Cache.mp4 14.2 MB
- Black Hat USA/Black Hat USA 2002/video/JD Glaser - JDs Toolbox Fire and Ice.mp4 14.2 MB
- Black Hat USA/Black Hat USA 2000/video/Brian Snow - We Need Assurance.mp4 14.2 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oit2.m4a 14.1 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Charge Your Device with the Latest Malware.mp4 14.1 MB
- Black Hat USA/Black Hat USA 2018/Return of Bleichenbacher's Oracle Threat (ROBOT).mp4 14.1 MB
- Black Hat Europe/Black Hat Europe 2013/Practical Attacks Against MDM Solutions.mp4 14.1 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - The Honeynet Project - 2nd Generation Honeynet Technologies.opus 14.1 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing.mp4 14.1 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Josh Daymont - Hardening Windows CE.opus 14.1 MB
- Black Hat USA/Black Hat USA 2002/video/Sutton&Greene - The Art Of File Format Fuzz.mp4 14.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Rauch - PDB - The Protocal Debugger.opus 14.1 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Charl-van-der-Walt-When-the-Tables-Turn-English.opus 14.1 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.opus 14.1 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Geers - Cyberspace - Warfare.eng.opus 14.0 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Wim_Remes/BlackHat_EU_2011_Remes_Blind_Squinter_rules-Slides.pdf 14.0 MB
- Black Hat USA/Black Hat USA 2012/video/Dex Education.mp4 14.0 MB
- Black Hat Europe/Black Hat Europe 2018/Off-Path Attacks Against PKI.mp4 14.0 MB
- Black Hat USA/Black Hat USA 2014/video/Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android.mp4 14.0 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Data Mining a Mountain of Zero Day Vulnerabilities.mp4 14.0 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Secure in 2010 Broken in 2011.mp4 14.0 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao3.m4a 14.0 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Matthew Franz and Sean Convery - BGP Vulnerability Testing.opus 14.0 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.opus 13.9 MB
- Black Hat USA/Black Hat USA 2003/video/Patrick Miller - Spider(tool).mp4 13.9 MB
- Black Hat USA/Black Hat USA 2014/video/A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks.mp4 13.9 MB
- Black Hat USA/Black Hat USA 2012/video/Find Me in your Database.mp4 13.9 MB
- Black Hat USA/Black Hat USA 2004/Michael Raggo - Steganography Steganalysis Cryptanalysis.mp4 13.9 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Joe-Grand-Hardware-Vulns-Japanese.opus 13.8 MB
- Black Hat USA/Black Hat USA 1999/audio/Jeffrey Hunker - Keynote Protecting Americas Cyberspace Version 1.0 of the National Plan.opus 13.8 MB
- Black Hat Asia/Black Hat Singapore 2018/Breaking the Attack Graph How to Leverage Graphs to Strengthen Security in a Domain Environment.mp4 13.8 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Geers - Eisen - IPv6 - Update - Japanese.opus 13.8 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Lessons From Defending The Indefensible.mp4 13.8 MB
- Black Hat USA/Black Hat USA 2019/Bypassing the Maginot Line Remotely Exploit the Hardware Decoder on Smartphone.mp4 13.8 MB
- Black Hat USA/Black Hat USA 2006/presentations/076_OConnor.pdf 13.8 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Hacking Databases for Owning Your Data - Cesar Cerrudo & Esteban Martinez Fayo.opus 13.8 MB
- Black Hat USA/Black Hat USA 2018/Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines.mp4 13.8 MB
- Black Hat USA/Black Hat USA 2013/video/TOR ALL-THE-THINGS.mp4 13.8 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Gerardo Richarte - Modern Intrusion Practices.opus 13.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU1A.mp3 13.7 MB
- Black Hat USA/Black Hat USA 2010/Virtual Forensics - Christiaan Beek.mp4 13.7 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Murakami - Hypervisor - IPS.jp.opus 13.7 MB
- Black Hat USA/Black Hat USA 2019/Testing Your Organization's Social Media Awareness.mp4 13.7 MB
- Black Hat Asia/Black Hat Singapore 2017/Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging.mp4 13.7 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Chuck Willis - Forensics with Linux 101.opus 13.7 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Jay Beale - Locking Down Mac OS X.opus 13.7 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_df3.m4a 13.7 MB
- Black Hat Asia/Black Hat Singapore 2018/New Compat Vulnerabilities in Linux Device Drivers.mp4 13.7 MB
- Black Hat USA/Black Hat USA 2006/video/Dai Zovi - Hardware Virtualization.mp4 13.7 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Ptacek and Goldsmith - Elec Sheep.opus 13.7 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Commix - Detecting and Exploiting Command Injection Flaws.mp4 13.7 MB
- Black Hat USA/Black Hat USA 2006/video/Panel - Meet the Feds.mp4 13.7 MB
- Black Hat USA/Black Hat USA 2007/presentations/Barisani_and_Bianco/Presentation/bh-usa-07-barisani_and_Bianco.pdf 13.7 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Last Stage Of Delirium Research Group - UNIX Assembly Codes Development for Vulnerabilities.opus 13.7 MB
- Black Hat USA/Black Hat USA 2019/A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works.mp4 13.7 MB
- Black Hat USA/Black Hat USA 2006/video/Rieback - RFID Malware Demystified.mp4 13.6 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Moyer - Hamiel - Satan - is - on - MyFriends.jp.opus 13.6 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - David Maynor - Leave the Theory Behind and Embrace the Code.opus 13.6 MB
- Black Hat USA/Black Hat USA 2006/video/Grunwald - New Attack RFID Systems.mp4 13.6 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/van - Beek - ePassports - Reloaded.jp.opus 13.6 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oit4.m4a 13.6 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Grossman - Hacking Intranet - English.opus 13.5 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Caswell and Moore - Thermoptic Camo.opus 13.5 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Rutkowska - Subverting Vista - English.opus 13.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/IVR Security- Internal Network Attack via Phone Lines.mp4 13.5 MB
- Black Hat USA/Black Hat USA 2008/video/Mifare - Little Security, Despite Obscurity - Karsten Nohl.mp4 13.5 MB
- Black Hat USA/Black Hat USA 2020/Hunting Invisible Salamanders Cryptographic (in)Security with Attacker-Controlled Keys.mp4 13.5 MB
- Black Hat Asia/Black Hat Singapore 2016/The Perl Jam 2 - The Camel Strikes Back.mp4 13.5 MB
- Black Hat Asia/Black Hat Singapore 2017/Dig Into the Attack Surface of PDF and Gain 100 CVEs in 1 Year.mp4 13.5 MB
- Black Hat USA/Black Hat USA 2015/video/ROPInjector Using Return Oriented Programming For Polymorphism & Antivirus Evas.mp4 13.5 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Tenaglia-Breaking-Bhad-Abusing-Belkin-Home-Automation-Devices.pdf 13.4 MB
- Black Hat USA/Black Hat USA 2006/video/Mohney - Defend with Voice Analytics.mp4 13.4 MB
- Black Hat USA/Black Hat USA 2009/video/Deactivate the Rootkit - Alfredo Ortega.mp4 13.4 MB
- Black Hat USA/Black Hat USA 2008/video/Bluepilling the Xen Hypervisor - Joanna Rutkowska, Alexander Tereshkin.mp4 13.4 MB
- Black Hat USA/Black Hat USA 2006/video/Auger and Sima - 0day subscriptions.mp4 13.4 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/van - Beek - ePassports - Reloaded.eng.opus 13.4 MB
- Black Hat USA/Black Hat USA 2021/Demystify AI Security Products With a Universal Pluggable XAI Translator.mp4 13.4 MB
- Black Hat USA/Black Hat USA 2005/video/Mike Pomraning - Injection Flaws.mp4 13.3 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/McFeters - Extreme - Client - side - Exploitation.jp.opus 13.3 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Mulliner - Exploiting - SymbianOS.eng.opus 13.3 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Hoshizawa - online Swindler - English.opus 13.3 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Hoffman - Analysis of Web App worms.opus 13.3 MB
- Black Hat USA/Black Hat USA 2006/presentations/026_Ptacek.pdf 13.3 MB
- Black Hat USA/Black Hat USA 2018/The Air-Gap Jumpers.mp4 13.3 MB
- Black Hat USA/Black Hat USA 2006/video/Moniz and Moore - 6 Degrees XSSploit.mp4 13.3 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Healthcare and New Federal Security Protections - Kate Borten.opus 13.3 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_akw6.m4a 13.3 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Incident Response in a Microsoft World - John Mushin.opus 13.3 MB
- Black Hat Europe/Black Hat Europe 2013/Let's Play - Applanting.mp4 13.2 MB
- Black Hat USA/Black Hat USA 2013/video/Clickjacking Revisted - A Perceptual View of UI Security.mp4 13.2 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Caezar-Scoring-CTF-Games-English.opus 13.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Two Factor Failure.mp4 13.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Android Kernel and OS Security Assessment with Iron Crow.mp4 13.2 MB
- Black Hat USA/Black Hat USA 2016/The Risk From Power Lines - How to Sniff the G3 and Prime Data and Detect the Interfere Attack.mp4 13.2 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/McFeters - Extreme - Client - side - Exploitation.eng.opus 13.2 MB
- Black Hat USA/Black Hat USA 2013/video/Untwining Twine.mp4 13.2 MB
- Black Hat USA/Black Hat USA 2012/video/Exchanging Demands.mp4 13.2 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oit1.m4a 13.2 MB
- Black Hat USA/Black Hat USA 2006/video/Lambert - Sec Engineer in win Vista.mp4 13.2 MB
- Black Hat DC/Black Hat Federal 2006/New Directions in Disk Forensics - Simson L. Garfinkel.opus 13.2 MB
- Black Hat Europe/Black Hat Europe 2018/When Everyone's Dog is Named Fluffy.mp4 13.2 MB
- Black Hat USA/Black Hat USA 2005/video/Ben Laurie - CaPerl.mp4 13.2 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_df1.m4a 13.1 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Kortti - Input Attack Trees - Japanese.opus 13.1 MB
- Black Hat Europe/Black Hat Europe 2012/Video/FYI - You ve Got LFI.mp4 13.1 MB
- Black Hat Asia/Black Hat Singapore 2000/Audio/panel.opus 13.1 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems(Theory).opus 13.1 MB
- Black Hat USA/Black Hat USA 2006/video/Kornburst - Oracle rootkits 2.0.mp4 13.1 MB
- Black Hat USA/Black Hat USA 2010/You will be billed 90000 for this call - Mikko Hypponen.mp4 13.1 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Issues Surrounding International Computer Crime Laws - Jennifer Granick.opus 13.1 MB
- Black Hat Europe/Black Hat Europe 2015/videos/All your Root Checks Belong To Us - The Sad State of Root Detection.mp4 13.1 MB
- Black Hat USA/Black Hat USA 1999/audio/JD Glaser - Auditing NT Catching Greg Hoglund.opus 13.0 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Cean Convery - Hacking Layer Two.opus 13.0 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Drew Miller - .Net from the hackers perspective Part 2 .opus 13.0 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dow Herath Mehta Spencer and Flake - Professional Source Code Auditing.opus 13.0 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Strategies for Defeating Distributed Attacks - Simple Nomad.opus 13.0 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.opus 13.0 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Gerhard-Escelbeck-Laws-of-vulnerbilities-English.opus 13.0 MB
- Black Hat Windows/Black Hat Windows 2004/Audio/2004_Black_Hat_Win-Curtis_Kret-Nobodys_anonymous_trackintg_spam-un-clean.m4a 13.0 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Wi-Fi Advanced Fuzzing - Laurent Butti.opus 13.0 MB
- Black Hat USA/Black Hat USA 2001/video/Tim Newsham - Cracking WEP Keys.mp4 13.0 MB
- Black Hat USA/Black Hat USA 2018/I, for One, Welcome Our New Power Analysis Overlords.mp4 13.0 MB
- Black Hat USA/Black Hat USA 2012/video/Windows 7 Phone Hacking & Exploitation.mp4 13.0 MB
- Black Hat USA/Black Hat USA 2006/video/Franco - Case Studies Secure Dev IE7.mp4 12.9 MB
- Black Hat USA/Black Hat USA 2013/video/Malicious File for Exploiting Forensic Software.mp4 12.9 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Ian Goldberg - Breaking 80211 WEP.opus 12.9 MB
- Black Hat USA/Black Hat USA 1998/audio/Ian Goldberg - Cell Phone Security A History and The State of the Art.opus 12.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/They Ought to Know Better - Exploiting Security Gateways via Their Web Inter.mp4 12.9 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Chip Andrews - SQL Security Revisited.opus 12.9 MB
- Black Hat USA/Black Hat USA 2011/video/IEEE Software Taggant System - Mark Kennedy, Igor Muttik.mp4 12.9 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Brian Martin and B K DeLong - Lessons Learned From attrition.org.opus 12.9 MB
- Black Hat USA/Black Hat USA 1997/Chris Goggans - Internet Attack Methodologies.opus 12.9 MB
- Black Hat USA/Black Hat USA 2013/video/Big Data for Web Application Security.mp4 12.8 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Lance Spitzner - The Honey Net Project.opus 12.8 MB
- Black Hat USA/Black Hat USA 2014/video/Fingerprinting Web Application Platforms by Variations in PNG Implementations.mp4 12.8 MB
- Black Hat USA/Black Hat USA 2012/video/Web Exploit Toolkits.mp4 12.8 MB
- Black Hat DC/Black Hat Federal 2006/Beyond EIP - spoonm, skape.opus 12.8 MB
- Black Hat USA/Black Hat USA 2001/video/Jeff Nathan and Kevin Depeugh - Layer 2 Attacks.mp4 12.8 MB
- Black Hat USA/Black Hat USA 2006/video/Halvar Flake - Need New Tools.mp4 12.8 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Ishiyama - FFR - EXCALOC.jp.opus 12.7 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_ows4.m4a 12.7 MB
- Black Hat USA/Black Hat USA 2001/video/Jose Nazario - The Future of Network Worms.mp4 12.7 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw2.m4a 12.7 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Rutkowska - Subverting Vista Kernel.opus 12.7 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Breeding Sandworms - How To Fuzz Your Way Out of Adobe Reader s Sandbox.mp4 12.7 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Mudge - Analysis of Tactis used in discovering passive monitoring devices - continuation of 25.opus 12.7 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Ofir Arkin - Cracking VoIP Architecture.opus 12.6 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_ows1.m4a 12.6 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Johnny-Long-Google-Hacks-English.opus 12.6 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - ian Goldberg - Off the Record Messaging.opus 12.6 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt1a.mp3 12.6 MB
- Black Hat USA/Black Hat USA 2006/presentations/010_Bilar.pdf 12.6 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Endler and Collier - Hacking VOIP.opus 12.6 MB
- Black Hat DC/Black Hat Federal 2006/Combatting Symbian Malware - Jarno Niemelä.opus 12.6 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Roger Dingledine - Why is Anonymity So Hard.opus 12.6 MB
- Black Hat USA/Black Hat USA 2018/Detecting Credential Compromise in AWS.mp4 12.6 MB
- Black Hat USA/Black Hat USA 2012/video/Columbus Rule and DHS.mp4 12.5 MB
- Black Hat USA/Black Hat USA 2011/video/Overcoming iOS Data Protection to Re-enable iPhone Forensic - Andrey Belenko.mp4 12.5 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Kaminsky - BlackOPS 2006.opus 12.5 MB
- Black Hat USA/Black Hat USA 2005/video/Michael Sutton, Adam Greene - Art Of File Format.mp4 12.5 MB
- Black Hat USA/Black Hat USA 2013/video/Password Hashing - The Future is Now.mp4 12.5 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/360 Anomaly Based Unsupervised Intrusion Detection - Stefano Zanero.opus 12.5 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Hoff-Cloudinomicon-v11.pdf 12.4 MB
- Black Hat DC/Black Hat Federal 2006/Analysis of Web Application Worms and Viruses - Billy Hoffman.opus 12.4 MB
- Black Hat USA/Black Hat USA 2013/video/Legal Considerations for Cellular Research.mp4 12.4 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Andrea Matwyshyn - Introduction to Corporate Information Security Law.opus 12.4 MB
- Black Hat USA/Black Hat USA 2009/video/Long-Term Sessions - This Is Why We Can’t Have Nice Things - Steve Ocepek.mp4 12.4 MB
- Black Hat DC/Black Hat Federal 2006/Client Side Penetration Testing - Max Caceres.opus 12.4 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Adam Shostack - Identity,Economics,Security,and Terrorism.opus 12.4 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Dan Kaminsky - Stack Black Ops.opus 12.4 MB
- Black Hat Europe/Black Hat Europe 2018/In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild.mp4 12.3 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dan Kaminsky - Black Ops of TCPIP.opus 12.3 MB
- Black Hat USA/Black Hat USA 2018/Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims.mp4 12.3 MB
- Black Hat USA/Black Hat USA 2012/video/Package Clone Detection.mp4 12.3 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Edward G Schwartz and Diana Kelly - Data Privacy What should the CIO and CISO be doing.opus 12.3 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt3b.mp3 12.3 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Making Windows Exploits More Reliable - Kostya Kortchinsky.opus 12.3 MB
- Black Hat USA/Black Hat USA 2004/David Litchfield - All New 0 Day.mp4 12.3 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_key1.m4a 12.2 MB
- Black Hat Europe/Black Hat Europe 2018/The Mummy 2018 - Microsoft Accidentally Summons Back Ugly Attacks from the Past.mp4 12.2 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Gregory S Miles - Computer Forensics a Critical Process in Your Incident Response Plan.opus 12.2 MB
- Black Hat USA/Black Hat USA 2001/video/Robert Hansen - htaccess Scripts in Apache Environments.mp4 12.2 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Miller - Hacking - Mac - OSX.jp.opus 12.2 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Panel - Hacker Court.opus 12.2 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw4.m4a 12.2 MB
- Black Hat Europe/Black Hat Europe 2013/Harnessing GPUs - Building Better Browser Based Botnets.mp4 12.2 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Active & Passive Fingerprinting of Microsoft Based Operating Systems using the ICMP protocol - Ofir Arkin.opus 12.2 MB
- Black Hat USA/Black Hat USA 1998/audio/Jennifer Granick - What's Different About Evidence in Computer Crime litigation.opus 12.1 MB
- Black Hat Asia/Black Hat Singapore 2017/Hacking HTTP 2 - New Attacks on the Internet's Next Generation Foundation.mp4 12.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Sparks and Others - Sidewinder.opus 12.1 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Miller - Hacking - Mac - OSX.eng.opus 12.1 MB
- Black Hat Asia/Black Hat Singapore 2018/Breach Detection At Scale With AWS Honey Tokens.mp4 12.1 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Rain Forest Puppy - Novell The Forgotten OS.opus 12.1 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_df5.m4a 12.1 MB
- Black Hat USA/Black Hat USA 2013/video/Denying Service to DDoS Protection Services.mp4 12.0 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Mandia - State of Incident Response.opus 12.0 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Fredric Bret - Mounet - Automated Detection of COM Vulnerabilities.opus 12.0 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Saumil Shah - Metasploit Plugins.opus 12.0 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Stamos and lackey - Breakin Ajax web.opus 12.0 MB
- Black Hat USA/Black Hat USA 2004/David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.mp4 12.0 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Jeff-Moss-Closing-English.flac 11.9 MB
- Black Hat USA/Black Hat USA 2018/InfoSec Philosophies for the Corrupt Economy.mp4 11.9 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Martin Roesch - Snort.opus 11.9 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - FX - More Embedded Systems.opus 11.9 MB
- Black Hat DC/Black Hat Federal 2006/An Advanced NTFS Data Hiding Technique - Irby Thompson, Matthew Monroe.opus 11.9 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Bohm - Taming Bugs - English.opus 11.9 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Heap Feng Shui in JavaScript - Alexander Sotirov.opus 11.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Issues with Embedded Device Disclosures - Helping the Vendors and Recognizin.mp4 11.9 MB
- Black Hat USA/Black Hat USA 2011/video/The Troika of E-Discovery Ethics, ESI, and Expertise in a Web 2.0 World - Richard Costa.mp4 11.8 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 - David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.mp4 11.8 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Fischbach and Lacoste - Seris - IP Backbone Security.opus 11.8 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Jennifer Granick - The Law of 'Sploits.opus 11.8 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Panel - Hiring Trends in InfoSec.opus 11.8 MB
- Black Hat Asia/Black Hat Singapore 2000/Audio/jeremy-rauch.opus 11.8 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Brandon Wiley - The Superworm Manifesto.opus 11.7 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_ows2.m4a 11.7 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Vivek-Advanced_WiFi_Security_Slides.pdf 11.7 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Diana Kelly and Ian Poynter - Single Sign On 101.opus 11.7 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Ofir Arkin - Revolutionizing Operating System Fingerprinting.opus 11.7 MB
- Black Hat USA/Black Hat USA 2011/video/OAuth - Securing the Insecure - Khash Kiani.mp4 11.7 MB
- Black Hat USA/Black Hat USA 2006/video/SensePost - A tale of two Proxies.mp4 11.7 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Hoffman - AJAX Insecurity.opus 11.6 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Protecting your IP Network Infrastructure - Nicolas Fischbach & Sebastian Lacoste-Seris.opus 11.6 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Jaya Baloo - Lawful Interception of IP the European Context.opus 11.6 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks.opus 11.6 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Ian Poynter and Diana Kelly - The Truth About ASPs.opus 11.6 MB
- Black Hat USA/Black Hat USA 2018/Fire & Ice - Making and Breaking macOS Firewalls.mp4 11.6 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - David LeBlanc - Real World Techniques in Network Security Management.opus 11.6 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Cory Scott - Systems Management in an Untrusted Network.opus 11.6 MB
- Black Hat USA/Black Hat USA 2011/video/Familiarity Breeds Contempt The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities - Sandy Clark, Matt Blaze.mp4 11.6 MB
- Black Hat USA/Black Hat USA 2018/How can Communities Move Forward After Incidents of Sexual Harassment or Assault.mp4 11.6 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Kingpin and Brian Oblivian - Secure Hardware Design.opus 11.6 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Silvio Cesare - Opensource Kernel Auditing and Exploitation.opus 11.6 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Unknown-English to Japanese.opus 11.6 MB
- Black Hat USA/Black Hat USA 2018/How I Learned to Stop Worrying and Love the SBOM.mp4 11.6 MB
- Black Hat USA/Black Hat USA 2009/video/Automated Malware Similarity Analysis - Daniel Raygoza.mp4 11.6 MB
- Black Hat USA/Black Hat USA 2004/Eugene Tsyrklevich - Attacking Host Intrusion Prevention Systems.mp4 11.5 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Honey Project - Latest Advances in Honeynet Technologies.opus 11.5 MB
- Black Hat USA/Black Hat USA 2000/video/Dominque Brezinski - Anatomy of Common Programming Security Issues.mp4 11.5 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Willis and Belani - Web App Incident.opus 11.5 MB
- Black Hat USA/Black Hat USA 2013/video/New Trends in FastFlux Networks.mp4 11.5 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Rain Forest Puppy - TBD.opus 11.5 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dennis Groves and Bill Pennington - Web Application Security.opus 11.5 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_ows5.m4a 11.5 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Mike Schiffman - The Need for an 802.11b Toolkit.opus 11.4 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Panel - Adversary Characterization and Scoring System.opus 11.4 MB
- Black Hat Europe/Black Hat Europe 2017/videos/A Universal Controller to Take Over a Z-Wave Network.mp4 11.4 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_ows3.m4a 11.4 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - David Litchfield - Compromising web Servers and Defensive Techniques.opus 11.4 MB
- Black Hat USA/Black Hat USA 2009/video/Defensive Rewriting - Bryan Sullivan.mp4 11.3 MB
- Black Hat USA/Black Hat USA 1999/video/JD Glaser - Auditing NT Catching Greg Hoglund.mp4 11.3 MB
- Black Hat Asia/Black Hat Singapore 2016/Incident Response @ Scale Building a Next Generation SOC.mp4 11.3 MB
- Black Hat USA/Black Hat USA 1999/video/William Cheswick - Keynote.mp4 11.3 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Lance Spitzner - Honey Topics.opus 11.3 MB
- Black Hat USA/Black Hat USA 1998/audio/Patrick Richard - Open Network PKI Design Issues or Business as Usual.opus 11.3 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU4A.mp3 11.3 MB
- Black Hat USA/Black Hat USA 2012/video/Gadgets.mp4 11.3 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Triaging Crashed With Backward Taint Analysis For Arm Architecture.mp4 11.3 MB
- Black Hat USA/Black Hat USA 2008/video/Side-Channel Timing Attacks on MSP430 Microcontroller Firmware - Travis Goodspeed.mp4 11.3 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Thomas Akin - WebMail Forensics.opus 11.3 MB
- Black Hat USA/Black Hat USA 2001/video/Mandy Andress - Wireless LAN Security.mp4 11.2 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Software Virtualization Based Rootkits - Sun Bing.opus 11.2 MB
- Black Hat USA/Black Hat USA 1997/Jeremy Rauch - Security Implications of Distributed Network Management.opus 11.2 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Routing Protocol Attacks - FX.opus 11.2 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/SCTPscan - Finding Entry Points to SS7 Networks & Telecommunication Backbones - Philippe Langlois.opus 11.2 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Panel - Disclosure Public.opus 11.2 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Hasegawa - Attacking - with - Character - Encoding.jp.opus 11.2 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - John McDonald - Group Talk.opus 11.1 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Aiko - Reverse with- API and Sysenter.eng.opus 11.1 MB
- Black Hat USA/Black Hat USA 1997/Dominique Brezinski - Security Posture Assessment (SPA) of Windows NT Networks.opus 11.1 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Entrapment - Tricking Malware with Transparent, Scalable Malware Analysis.mp4 11.1 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Aiko - Reverse with API and Sysenter.jp.eng.opus 11.1 MB
- Black Hat USA/Black Hat USA 2018/AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries.mp4 11.1 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Jeff Thompson - Making Unix Secure for the Internet with Trusted Operating Systems.opus 11.1 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw1.m4a 11.1 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Walter Gary Sharp - Key Legal Implications of Computer Network Defense.opus 11.1 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Hasegawa - Attacking - with - Character - Encoding.eng.opus 11.1 MB
- Black Hat Europe/Black Hat Europe 2018/Drill Apple Core Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit.mp4 11.1 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Tim Mullen - Neutralizing Nimda Automated Strikeback.opus 11.0 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Nohl - Secret - Algorithms - from - Hardware.eng.opus 11.0 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Rich Murphy - Locking Down Your FreeBSD Install.opus 11.0 MB
- Black Hat Europe/Black Hat Europe 2012/Video/36 Views of Cyberspace.mp4 11.0 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Marshall Beddoe and Chris Abad - The Siphon Project.opus 11.0 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dan Veeneman - Vulnerabilities of Cellular and Satellite - based Voice and Data Networks.opus 11.0 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Greg Hoglund - Advanced Buffer Overflow Techniques.opus 11.0 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Shaun Clowes - Fixing and Making Holes in Binaries.opus 11.0 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Eric Goldman - Criminal Copyright infringement and warez trading.opus 11.0 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Mobile Security SMS and WAP - Jab De Haas.opus 11.0 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao6.m4a 11.0 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU3B.mp3 11.0 MB
- Black Hat DC/Black Hat Federal 2006/Extracting Unexpected Functionality from Existing Networks - Dan Kaminsky.opus 11.0 MB
- Black Hat Europe/Black Hat Europe 2018/Cloud-Native Sandboxes for Microservices Understanding New Threats and Attacks.mp4 10.9 MB
- Black Hat USA/Black Hat USA 2014/video/Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs.mp4 10.9 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Nohl - Secret - Algorithms - from - Hardware.jp.opus 10.9 MB
- Black Hat USA/Black Hat USA 2006/presentations/052_Rauch.pdf 10.9 MB
- Black Hat USA/Black Hat USA 2006/presentations/078_Veyssett.pdf 10.9 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Rick Smith - The Biometrics Dilemma.opus 10.9 MB
- Black Hat Asia/Black Hat Singapore 2000/Audio/jd-glaser.opus 10.9 MB
- Black Hat USA/Black Hat USA 2018/Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.mp4 10.9 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Panel - Proposed Vulnerability Handling.opus 10.9 MB
- Black Hat Asia/Black Hat Singapore 2000/Audio/martin-khoo.opus 10.8 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU2A.mp3 10.8 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Shulman.pdf 10.8 MB
- Black Hat USA/Black Hat USA 2006/video/Butler - Exponential Growth Rootkit.mp4 10.8 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Web Application Security - Jeremiah Grossman.opus 10.8 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/KeyNote - Dan - Kaminsky - End - of - Cache.jp.opus 10.8 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Jeremy Rauch - The Security of Network Devices.opus 10.8 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU3A.mp3 10.8 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Hulton and Moniz - Faster pwning.opus 10.8 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems.opus 10.8 MB
- Black Hat USA/Black Hat USA 2011/video/The Ultimate Study of Real-Life SSL Issues - Ivan Ristic.mp4 10.8 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/KeyNote - Dan - Kaminsky - End - of - Cache.eng.opus 10.7 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Sutterfield - Enterprise security for converging technologies.opus 10.7 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/ICMP Usage In Scanning - Ofir Arkin.opus 10.7 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Vboot Kit Compromising Windows Vista Security - Nitin Kumar & Vipin Kumar.opus 10.7 MB
- Black Hat USA/Black Hat USA 2018/Finding Xori - Malware Analysis Triage with Automated Disassembly.mp4 10.7 MB
- Black Hat USA/Black Hat USA 2009/video/The Conficker Mystery - Mikko Hypponen.mp4 10.7 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Bruce Potter - Bluetooth Defense Kit.opus 10.7 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Argyros-Another-Brick-Off-The-Wall-Deconstructing-Web-Application-Firewalls-Using-Automata-Learning.pdf 10.7 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Renaud Deraison - The Nessus Project Reducing the Costs of Vulnerability Assessment.opus 10.7 MB
- Black Hat USA/Black Hat USA 2005/video/Kevin Maffey w others - Long Range RFID.opus 10.7 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt5c.mp3 10.6 MB
- Black Hat USA/Black Hat USA 1998/video/John Bailey - SOCKS, PPTP & IPSec Implementation & Futures.mp4 10.6 MB
- Black Hat USA/Black Hat USA 1998/video/Marcus Ranum - How to REALLY Secure the Internet.mp4 10.6 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Schulman - Phishing with Asterisk.opus 10.6 MB
- Black Hat Asia/Black Hat Singapore 2000/Audio/caezar.opus 10.6 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/X-Remote ICMP Based OS Fingerprinting Techniques - Ofir Arkin.opus 10.6 MB
- Black Hat USA/Black Hat USA 2008/video/Meet the Owner of a Real Hacked Company - Forensic Analysis - Mark Shelhart.mp4 10.6 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dan Veeneman - Wireless Overview - Protocols and Threat Models.opus 10.6 MB
- Black Hat USA/Black Hat USA 2005/video/David Maynor - NX - How Well Does it Say NO.mp4 10.5 MB
- Black Hat USA/Black Hat USA 2006/video/Yuan Fan - MatriXay.mp4 10.5 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/How We Beat the 5th Argus Hacking Contest - LSD.opus 10.5 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU1B.mp3 10.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt4c.mp3 10.5 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Robert Baird and Mike Lynn - Advanced 80211b Attack.opus 10.5 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Lewman-Narcos-Counterfeiters-And-Scammers-An-Approach-To-Visualize-Illegal-Markets.pdf 10.5 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/What Is Involved In a Forensic Effort - John Tan.opus 10.5 MB
- Black Hat Europe/Black Hat Europe 2013/XML Out-of-Band Data Retrieval.mp4 10.5 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Ron Gula - Bypassing Intrusion Detection Systems.opus 10.5 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Fischbach - Carrier VOIP Security.opus 10.5 MB
- Black Hat USA/Black Hat USA 1997/Hobbit - Microsoft LM athentication, CIFS, and All Kinds of Password Problems.opus 10.5 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Marinescu - WIN Vista Heap Mgmt.opus 10.5 MB
- Black Hat USA/Black Hat USA 2007/presentations/Barisani_and_Bianco/Extras/2.avi 10.5 MB
- Black Hat USA/Black Hat USA 1999/audio/William Cheswick - Keynote.opus 10.5 MB
- Black Hat USA/Black Hat USA 2006/video/Bilar - Auto Malware Classification.mp4 10.4 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Okatani - Keynote - Japanese.opus 10.4 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU4B.mp3 10.4 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Johnny Long - Hacking Hollywood.opus 10.4 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Gerhard Eschelbeck - Law Vulnerabilities.opus 10.4 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt2c.mp3 10.4 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Sutton and MacManus - Punk 0de.opus 10.4 MB
- Black Hat USA/Black Hat USA 2018/Real Eyes, Realize, Real Lies - Beating Deception Technologies.mp4 10.3 MB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 at the ExCel, London December 9-12 Sizzle Reel.mp4 10.3 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Panel-English.opus 10.3 MB
- Black Hat USA/Black Hat USA 2006/presentations/023_Mohney.pdf 10.3 MB
- Black Hat USA/Black Hat USA 2005/video/Barnaby Jack - Kernel Exploitation.mp4 10.3 MB
- Black Hat USA/Black Hat USA 2009/video/Worst of the Best of the Best - Kevin Stadmeyer.mp4 10.2 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Smart Card Security - Marc Witteman.opus 10.2 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/George_Hedfors/BlackHat_EU_2011_Hedfors_Owning_the_datacenter-Slides.pdf 10.2 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - BIDOU - IPS Shortcomings.opus 10.2 MB
- Black Hat Asia/Black Hat Singapore 2000/Audio/joey.opus 10.2 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Jed Haile - Hogwash.opus 10.2 MB
- Black Hat USA/Black Hat USA 2018/Dissecting Non-Malicious Artifacts - One IP at a Time.mp4 10.2 MB
- Black Hat Asia/Black Hat Singapore 2018/All Your Payment Tokens Are Mine Vulnerabilities of Mobile Payment Systems.mp4 10.2 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - FX - The Blackberry Case.opus 10.2 MB
- Black Hat USA/Black Hat USA 2018/Measuring the Speed of the Red Queen's Race Adaption and Evasion in Malware.mp4 10.2 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Zanero - HostBased Anomaly Detection.opus 10.2 MB
- Black Hat USA/Black Hat USA 2006/video/Dwivedi - Shoot Nxt Persn says VLANS.mp4 10.1 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/One-Way SQL Hacking - JD Glaser & Saumil Udayan Shah.opus 10.1 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Mark Eckenwiler - USA Patriot Act and Criminal Investigations.opus 10.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/036_Zovi.pdf 10.1 MB
- Black Hat USA/Black Hat USA 2024/Calling all Cybersecurity Pros Join Us at Black Hat USA 2024 at the Mandalay Bay.mp4 10.1 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Roelof Temmingh and Haroon Meer - Setiri.opus 10.1 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Researching Secrets - James Bamford.opus 10.1 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_df2.m4a 10.0 MB
- Black Hat USA/Black Hat USA 2013/video/Detecting Vulnerabilities in Virtual Devices with Conformance Testing.mp4 10.0 MB
- Black Hat USA/Black Hat USA 1997/Bruce Schneier - Why Cryptograpy is Harder Than it Looks.opus 10.0 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Jericho and Munge - Hard Core Web Defacement Statistics Trends and Analysis.opus 10.0 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU3C.mp3 10.0 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Defense in Depth Winning in Spit of Yourself - Erik Schlutz, David Leblanc.opus 10.0 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Lance Spitzner - Honeypots.opus 10.0 MB
- Black Hat USA/Black Hat USA 1998/audio/Bruce K. Marshall - Statistical Analysis of Reusable Password Systems and Their Alternatives.opus 10.0 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Maximiliano Caceres - Syscall Proxying.opus 10.0 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Gordon Reichard Jr - Trust, Security, Partnership Strategies in Selecting a Managed Service Provider.opus 10.0 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Ofir Arkin - Introducing X Playing Tricks with ICMP.opus 10.0 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Sintsov-Pen-Testing-Vehicles-With-Cantoolz.pdf 10.0 MB
- Black Hat USA/Black Hat USA 2010/Security innovation network panel.mp4 9.9 MB
- Black Hat Europe/Black Hat Europe 2013/Huawei - From China with Love.mp4 9.9 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Chris Paget - Click to Continue Shatter Attacks on Win32.opus 9.9 MB
- Black Hat USA/Black Hat USA 2008/video/Protecting Vulnerable Applications with IIS7 - Brian Holyfield.mp4 9.9 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_akw14.m4a 9.9 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices.opus 9.9 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Jay Beale - Attacking and Defending BIND DJBDNS DNS Servers.opus 9.9 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Curtis E Karnow - Running the Matrix.opus 9.9 MB
- Black Hat USA/Black Hat USA 2009/video/Hacking the Smart Grid - Tony Flick.mp4 9.9 MB
- Black Hat USA/Black Hat USA 2006/video/Tom Beardsley - Monkeyspaw.mp4 9.9 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw3.m4a 9.9 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Bruce Potter - Java Card 101.opus 9.9 MB
- Black Hat USA/Black Hat USA 1998/audio/Dominique Brezinski - Penetrating NT Networks Through Information Leaks and Policy Weaknesses.opus 9.8 MB
- Black Hat USA/Black Hat USA 2018/Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme.mp4 9.8 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Mike Beekey - ARP Vulnerabilities Indefensible Local Network Attacks.opus 9.8 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - SensePost - Putting Tea back into CyberTerrorism.opus 9.8 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Larry Leibrock - Digital Information,User Tokens,Privacy and Forensics Investigation.opus 9.8 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - O'Connor - Vunls not So Embedded Sys.opus 9.8 MB
- Black Hat DC/Black Hat Federal 2006/How to Automatically Sandbox IIS With Zero False Positive and Negative - Tzi-cker Chiueh (partial).opus 9.8 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Aaron Higbee and Chris Davis - DC Phone Home.opus 9.8 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 1.opus 9.8 MB
- Black Hat DC/Black Hat DC 2007/Audio/Data Seepage How to Give Attackers a Roadmap to Your Network - David Maynor & Robert Graham.opus 9.8 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Data Seepage How to Give Attackers a Roadmap to Your Network - David Maynor & Robert Graham.opus 9.8 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw6.m4a 9.8 MB
- Black Hat USA/Black Hat USA 2004/Himanshu Dwivedi - Insecure IP Storage Networks.mp4 9.7 MB
- Black Hat USA/Black Hat USA 2006/presentations/002_Squire.pdf 9.7 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Johnny Long - Death of 1000 Cuts.opus 9.7 MB
- Black Hat USA/Black Hat USA 1998/audio/Tom Ptacek - Problems with Intrusion Detection Systems.opus 9.7 MB
- Black Hat USA/Black Hat USA 1999/audio/Rooster - DNS Security Issues.opus 9.7 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Diana Kelly - Translasting US Privacy Regulations for Implementation.opus 9.7 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - VK1-Larkin-Fight_org_Cyber_crime.mp3.opus 9.7 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Cache and Maynor - Device Drivers.opus 9.7 MB
- Black Hat DC/Black Hat Federal 2006/Heuristic Vulnerability Analysis and Attack - Drew Copley.opus 9.7 MB
- Black Hat DC/Black Hat DC 2008/Presentations/Krawetz/Presentation/bh-dc-08-krawetz.pdf 9.7 MB
- Black Hat Asia/Black Hat Singapore 2014/Say It Ain't So - An Implementation of Deniable Encryption by Ari Trachtenberg.mp4 9.7 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Inside Web Attacks - The Real Payloads.mp4 9.6 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 2.opus 9.6 MB
- Black Hat Asia/Black Hat Singapore 2000/Audio/jennifer-granick.opus 9.6 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Goldman and Marotta - Securing Your Computing Environment to Conform to Privacy Regulations.opus 9.6 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.opus 9.6 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt2a.mp3 9.6 MB
- Black Hat USA/Black Hat USA 2009/video/Breaking the Unbreakable Oracle with Metasploit - Chris Gates.mp4 9.6 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Lee Kushner - The State of Employment in the Information Security Industry.opus 9.6 MB
- Black Hat USA/Black Hat USA 2018/Holding on for Tonight - Addiction in InfoSec.mp4 9.6 MB
- Black Hat USA/Black Hat USA 2006/presentations/041_Dwivedi.pdf 9.5 MB
- Black Hat USA/Black Hat USA 2008/video/Methods for Understanding Targeted Attacks with Office Documents - Bruce Dang.mp4 9.5 MB
- Black Hat USA/Black Hat USA 2003/video/Dario Forte (Luncheon) - International Hacking When the cooperation is the only cure.mp4 9.5 MB
- Black Hat USA/Black Hat USA 2004/James Foster - Managing Hackers.mp4 9.5 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Neel Mehta - Advanced in ELF runtime binary encryption - Shiva.opus 9.5 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Andrew van der Stock - Alternatives to Honeypots.opus 9.5 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Spradlin - Auditing data Access.opus 9.5 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Paul Wouters - IPSEC Opportunistic Encryption using DNSSEC.opus 9.5 MB
- Black Hat USA/Black Hat USA 2013/video/Shattering Illusions in Lock-Free Worlds - Compiler Hardware Behaviors in OS and VMs.mp4 9.5 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks.opus 9.5 MB
- Black Hat USA/Black Hat USA 2006/presentations/043_Fan-Rong.pdf 9.5 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Next Generation Debuggers for Reverse Engineering - ERESI Team.opus 9.5 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Ionescu_Pointers_and_Handles/BH_US_08_Ionescu_Pointers_and_Handles.pdf 9.4 MB
- Black Hat USA/Black Hat USA 2018/Back to the Future - A Radical Insecure Design of KVM on ARM.mp4 9.4 MB
- Black Hat USA/Black Hat USA 2010/USB - Paul carugati.mp4 9.4 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt5a.mp3 9.4 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Cushman - MS Security fundamentals.opus 9.4 MB
- Black Hat USA/Black Hat USA 2009/video/How Economics and Information Security Affects Cyber Crime - Peter Guerra.mp4 9.4 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Politics of Vulnerability Reporting - Scott Blake.opus 9.4 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Gbadegesin - TCPIP in WIN Vista.opus 9.4 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Active Directory and Group Policy - Raymond Forbes.opus 9.4 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU5A.mp3 9.4 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques.opus 9.3 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/How can the Security Researcher Community Work Better for the Common Good - Jeff Moss, Roger Cumming.opus 9.3 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Rutkowska-Security-Through-Distrusting.pdf 9.3 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Chris Eng - Breaking Crypto.opus 9.3 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Steven Christey - CVE Behind the Scenes The Complexity of Being Simple.opus 9.3 MB
- Black Hat USA/Black Hat USA 2011/video/Heap Spray Detection with Heap Inspector - Aaron LeMasters.mp4 9.3 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Simple Nomad - Strategies for Defeating Distributed Attacks.opus 9.3 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Plenty of Coppers in Change - Stuart Hyde.opus 9.2 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Jesse Burns - Fuzzing Win32.opus 9.2 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Scott Blake - The Pros and Cons of Hiring Hackers.opus 9.2 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dave Aitel - An Introduction to Spike.opus 9.2 MB
- Black Hat USA/Black Hat USA 2018/ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware.mp4 9.2 MB
- Black Hat USA/Black Hat USA 2003/video/Kevin Spett - Java Decompilation and Application Security.mp4 9.2 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Noel Anderseon - Wifi in WIN Vista.opus 9.2 MB
- Black Hat USA/Black Hat USA 2013/video/Denial of Service as a Service - Asymmetrical Warfare at its Finest.mp4 9.2 MB
- Black Hat USA/Black Hat USA 1999/video/Rooster - DNS Security Issues.mp4 9.2 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - SamuraiWTF.eng.json 9.2 MB
- Black Hat Asia/Black Hat Singapore 2000/Audio/greg-hoglund.opus 9.2 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Bruce Potter - 802.11X.opus 9.1 MB
- Black Hat Asia/Black Hat Singapore 2000/Audio/mjr.opus 9.1 MB
- Black Hat USA/Black Hat USA 2018/Qualitative Look at Autonomous Peer Communication's Impact on Organizational Phishing Detection.mp4 9.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Grossman - Hacking Intranet Outside.opus 9.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Rieback - RFID Malware Demystified.opus 9.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Sotirov - HotPatching3rd Party Patch.opus 9.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - V9-Scholz-SIP_Stack_Fingerprinting.opus 9.1 MB
- Black Hat USA/Black Hat USA 2008/video/SQL Injection Worms for Fun and Profit - Justin Clarke.mp4 9.1 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Palante - Top 25 Overlooked Security Configuration on Your Switches and Routers.opus 9.1 MB
- Black Hat USA/Black Hat USA 2018/Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking.mp4 9.1 MB
- Black Hat USA/Black Hat USA 2009/video/Macsploitation with Metasploit - Dino Dai Zovi.mp4 9.0 MB
- Black Hat USA/Black Hat USA 1997/Ray Kaplan - Meet The Enemy.opus 9.0 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Mohney - Defend with Voice Analytics.opus 9.0 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Padgett Peterson - Securing EMail Gateways from Attacks - What to do While Waiting for Vendors to Respond to the latest virus and worms.opus 9.0 MB
- Black Hat USA/Black Hat USA 2005/video/Tyler Close - Shatter Proofing Windows.eng.mp4 9.0 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/SMTP Information Gathering - Lluis Mora.opus 9.0 MB
- Black Hat DC/Black Hat Federal 2006/Characterising the real threats to our nation’s critical information systems - Tom Parker, Matthew G Devost.opus 9.0 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Simple Nomad - Covering Your Tracks.opus 9.0 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Job De Haas - Getting Rooted and Never Knowing It.opus 9.0 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Valeros-50-Thousand-Needles-In-5-Million-Haystacks-Understanding-Old-Malware-Tricks-To-Find-New-Malware-Families.pdf 8.9 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Jason Garms - Defending Windows 2000 on the Internet.opus 8.9 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Dang - Understanding - Targeted - Attacks - with - Office - Docs.eng.opus 8.9 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt5b.mp3 8.9 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-droid-exploitation-saga-gupta-slides.pdf 8.9 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Dang - Understanding - Targeted - Attacks - with - Office - Docs.jp.opus 8.9 MB
- Black Hat USA/Black Hat USA 2004/Patrick Chambert - Managing MSIE Security in Corporate Networks by Creating Custom Internet Zones.mp4 8.8 MB
- Black Hat USA/Black Hat USA 1997/Dr. Mudge - Secure Coding Practices and Source Code Analysis.opus 8.8 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Security Issues in the Infrastructure - Panel Discussion.opus 8.8 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Bilby - Defeating Win Forensic - Japanese.opus 8.8 MB
- Black Hat USA/Black Hat USA 2005/video/Gilman Louie keynote audio.opus 8.8 MB
- Black Hat USA/Black Hat USA 2006/presentations/029_Benninger.pdf 8.8 MB
- Black Hat USA/Black Hat USA 2011/video/Affiliate Programs Legitimate Business or Fueling Cybercrime - Bradley Anstis.mp4 8.8 MB
- Black Hat USA/Black Hat USA 2005/video/Kevin Cardwell - Toolkits.mp4 8.8 MB
- Black Hat USA/Black Hat USA 2006/presentations/018_Arkin.pdf 8.8 MB
- Black Hat USA/Black Hat USA 2005/video/Ken Hines - Using Causal Analysis.mp4 8.7 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Security-Friday-Japanese.opus 8.7 MB
- Black Hat USA/Black Hat USA 2009/video/Gizmo - Rachel Engel.mp4 8.7 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt1b.mp3 8.7 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt2b.mp3 8.7 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-MacJon-StealthAttacks_Slides.pdf 8.7 MB
- Black Hat USA/Black Hat USA 1998/audio/Dr. Mudge - Problems with VPN Technologies.opus 8.7 MB
- Black Hat USA/Black Hat USA 2002/presentations/arkin/arkin-bh-us-02-voip.ppt 8.7 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao5.m4a 8.7 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_akw7.m4a 8.7 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices.eng.json 8.6 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Gutterman - Vulns Linux Random Num.opus 8.6 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Jeffrey Prusan - Technical Security Countermeasures.opus 8.6 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Joey - Advanced Windows NT and 2000 Security.opus 8.6 MB
- Black Hat USA/Black Hat USA 2010/Security is not a four letter word - Michael Davis.mp4 8.6 MB
- Black Hat USA/Black Hat USA 2011/video/From Redmond with Love - Katie Moussouris.mp4 8.6 MB
- Black Hat USA/Black Hat USA 2009/video/MD5 Collisions - Marc Bevand.mp4 8.6 MB
- Black Hat USA/Black Hat USA 2006/presentations/062_Lambert.pdf 8.6 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Bandukwala-Fun_w_Google_Custom_Searches_Slides.pdf 8.6 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/RFIDIOts!!! - Practical RFID hacking (without soldering irons) - Adam Laurie.opus 8.6 MB
- Black Hat USA/Black Hat USA 2004/Andrew Stevens - How Next Generation Application Proxies Protect Against the Latest Attacks and Intrusions.mp4 8.5 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Why Government Systems Fail at Security - Chey Cobb.opus 8.5 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Kernel Wars - Joel Eriksson.opus 8.5 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Defending Your Network with Kerberos - Rooster & J.D. Glaser.opus 8.5 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU5B.mp3 8.5 MB
- Black Hat USA/Black Hat USA 2006/video/Moyer - Defending BlackBox Web Apps.mp4 8.5 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Sabanal_Yason.pdf 8.5 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Dai Zovi - Hardware Virtualization.opus 8.5 MB
- Black Hat USA/Black Hat USA 2006/video/Neerumalla - SQL Inject.mp4 8.5 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Shunichi-Arai-Winny-English-Translated.opus 8.5 MB
- Black Hat USA/Black Hat USA 2009/video/Advanced MySQL Exploitation - Muhaimin Dzulfakar.mp4 8.5 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU4C.mp3 8.5 MB
- Black Hat Asia/Black Hat Japan 2004/audio/David Litchfield-English.opus 8.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt4a.mp3 8.5 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Arthur Money - Closing Keynote.opus 8.5 MB
- Black Hat USA/Black Hat USA 2005/video/Chris Evans, Thompson - Self-defending.mp4 8.4 MB
- Black Hat USA/Black Hat USA 2004/Lauren Oudot - Digital Active Self Defence.mp4 8.4 MB
- Black Hat Europe/Black Hat Europe 2012/Video/An Assortment of Database Goodies.mp4 8.4 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Mark Kadrich - Intrusion Detection in High Speed Networks.opus 8.4 MB
- Black Hat USA/Black Hat USA 2006/presentations/013_Merloni.pdf 8.4 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Smith-The-Apple-Of-Your-EFI-An-Updated-Analysis-Of-The-State-Of-Apples-EFI-Security-Support.pdf 8.4 MB
- Black Hat USA/Black Hat USA 2006/presentations/Grossman/Grossman-PoCsamples_key.zip 8.4 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Merloni and Carettoni - Blue Bag.opus 8.4 MB
- Black Hat USA/Black Hat USA 2005/video/spoonm, scape - Beyond EIP.mp4 8.4 MB
- Black Hat USA/Black Hat USA 1997/Sluggo - Denial of Service Attacks, and Defensive Strategies.opus 8.3 MB
- Black Hat Asia/Black Hat Singapore 2000/Audio/pierre.opus 8.3 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Moniz - XSSploitation - Japanese.opus 8.3 MB
- Black Hat Asia/Black Hat Singapore 2018/Mac-A-Mal An Automated Platform for Mac Malware Hunting.mp4 8.3 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Jay Beale - Attacking and Securing UNIX FTP Servers.opus 8.3 MB
- Black Hat Europe/Black Hat Europe 2015/videos/New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.mp4 8.3 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_M1A.mp3 8.2 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Len Sassaman - Forensic Dead - Ends.opus 8.2 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Arnaboldi-Exposing-Hidden-Exploitable-Behaviors-In-Programming-Languages-Using-Differential-Fuzzing.pdf 8.2 MB
- Black Hat USA/Black Hat USA 2009/video/MSF & Telephony - Druid.mp4 8.2 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Silberman and Butler - RAIDEv1.0.opus 8.2 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Security-Friday-Partial-Japanese.opus 8.2 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/New Botnets Trends and Threats - Augusto Paes de Barros, André Fucs & Victor Pereira.opus 8.2 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_TU2C.mp3 8.2 MB
- Black Hat USA/Black Hat USA 1999/audio/Rob Karas - Open Source Monitoring.opus 8.2 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Remote Web Application Dissassembly with ODBC Error Messages - David Litchfield.opus 8.2 MB
- Black Hat USA/Black Hat USA 2009/video/BitTorrent Hacks - Michael Brooks.mp4 8.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Panel - Meet the Feds.opus 8.1 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Philip Zimmermann - Keynote with Introduction by Jeff Moss.opus 8.1 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_M4A.mp3 8.1 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Scott Blake - Politics of Vulnerabilities.opus 8.1 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Maynor_Graham.pdf 8.1 MB
- Black Hat DC/Black Hat Federal 2006/Nematodes - Dave Aitel.opus 8.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Finnigan - How to Unwrap Oracle.opus 8.1 MB
- Black Hat USA/Black Hat USA 2010/The black art of binary hijacking - Nick Harbour.mp4 8.1 MB
- Black Hat Asia/Black Hat Singapore 2000/Audio/batz.opus 8.0 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Rick Smith - Masquerades,Tricking Modern Auth Systems.opus 8.0 MB
- Black Hat USA/Black Hat USA 1998/audio/Bruce Schneier - Mistakes and Blunders A Hacker Looks at Cryptography.opus 8.0 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-grossman.pdf 8.0 MB
- Black Hat DC/Black Hat DC 2008/Video/Exploiting Live Virtual Machine Migration - Jon Oberheide.mp4 8.0 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 5 7.mp4 8.0 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Shunichi-Arai-Winny-Japanese.opus 8.0 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/GS and ASLR in Windows Vista - Ollie Whitehouse.opus 8.0 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/NIDS False Positive Reduction Through Anomaly Detection - Damiano Bolzoni.opus 7.9 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-pokingserverswithFacebook-Walikar-slides.pdf 7.9 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Daji Sanai - Promiscuous Node Detection Using ARP Packets.opus 7.9 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Kropotov-Enraptured-Minds-Strategic-Gaming-Of-Cognitive-Mindhacks.pdf 7.9 MB
- Black Hat USA/Black Hat USA 2004/Chris Hurley - WorldWide War Drive.mp4 7.9 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Scott Blake - Dog of War Attack Box Design.opus 7.9 MB
- Black Hat Asia/Black Hat Japan 2004/audio/keynote-Raisuke-Miyawaki-English-Translation.opus 7.9 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-the-endless-game-yang-slides.pdf 7.9 MB
- Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao4.m4a 7.9 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Aldora Louw - Notes on Domino.opus 7.9 MB
- Black Hat DC/Black Hat DC 2008/Presentations/Krawetz/Whitepaper/bh-dc-08-krawetz-WP.pdf 7.8 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Dror-Thumann/Presentation/bh-eu-07-dror.pdf 7.8 MB
- Black Hat USA/Black Hat USA 2009/video/Kismet and MSF - Mike Kershaw.mp4 7.8 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-dror.pdf 7.8 MB
- Black Hat USA/Black Hat USA 2005/video/Akshay Aggarwal - Rapid Threat Modeling.mp4 7.8 MB
- Black Hat USA/Black Hat USA 2018/Demystifying PTSD in the Cybersecurity Environment.mp4 7.8 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Lambert - Sec Engineering in win Vista.opus 7.8 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Zambon and Bolzoni - NIDS False Pos.opus 7.8 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Beery-Grady-Cyber-Judo-Offensive-Cyber-Defense.pdf 7.8 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Lundeen-New_Ways_Hack_WebApp-Slides.pdf 7.8 MB
- Black Hat USA/Black Hat USA 2012/video/API s for improving Security.mp4 7.7 MB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 3 8.mp4 7.7 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Halvar Flake - Graph Based Binary Analysis.opus 7.7 MB
- Black Hat DC/Black Hat Federal 2006/Implementing and Detecting An ACPI BIOS Rootkit - John Heasman (bad audio quality).opus 7.7 MB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 6 8.mp4 7.7 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Hal McConnell - Threats from Organized Crime and Terrorists.opus 7.7 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Neal Krawetz - You are what you type.opus 7.7 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Bruce Schneier - Keynote,Following the Money Security Proxies and Agenda.opus 7.7 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Finding Holes in Closed-source Software - Havlar Flake.opus 7.6 MB
- Black Hat USA/Black Hat USA 2011/video/Function Rerouting from Kernel Land with Hades - Jason Raber.mp4 7.6 MB
- Black Hat USA/Black Hat USA 2008/video/A Fox in the Hen House (UPnP IGD) - Jonathan Squire.mp4 7.6 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Tereshkin - Rootkits Attack Firewall.opus 7.6 MB
- Black Hat USA/Black Hat USA 2006/video/Morana - Sec Into Software LifeCycle.mp4 7.6 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_M1B.mp3 7.6 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/ScarabMon - Automating Web Application Penetration Tests - Jonathan Wilkins.opus 7.5 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Hoglund - Hacking WOW Adv rootkit.opus 7.5 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Simple Nomad and Todd Sabin - The RAZOR Warez.opus 7.5 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt4b.mp3 7.5 MB
- Black Hat USA/Black Hat USA 1999/video/Rob Karas - Open Source Monitoring.mp4 7.5 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Halvar Flake - Need New Tools.opus 7.5 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Hisamichi-Okamura-Cybercrime-Treaty-Japanese.opus 7.5 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/Hackproofing Lotus Domino - David Litchfield.opus 7.4 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/The Other Side of Information Security - Wilco van Ginkel.opus 7.4 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Paul Knight - Dynamic Routing Inside IPsec VPNs.opus 7.4 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 5 8.mp4 7.4 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - S Stender - Attacking Inatl Software.opus 7.4 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Richard Clarke - Keynote National Strategy for Securing Cyberspace.opus 7.4 MB
- Black Hat USA/Black Hat USA 2004/David Worth - Cryptographic Port Knocking.mp4 7.4 MB
- Black Hat USA/Black Hat USA 2006/video/Veysset and Butti - Wifi Adv Stealth.mp4 7.4 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Ofir Arkin - Bypassing NAC Systems.opus 7.3 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 6 8.mp4 7.3 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_M1C.mp3 7.3 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Greg Hoglund - Runtime Decompilation.opus 7.3 MB
- Black Hat USA/Black Hat USA 2018/The Problems and Promise of WebAssembly.mp4 7.3 MB
- Black Hat USA/Black Hat USA 2006/video/Frei and May - Speed of Insecurity.mp4 7.3 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Kornburst - Oracle rootkits 2.0.opus 7.3 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder.opus 7.3 MB
- Black Hat USA/Black Hat USA 2011/audio/11_bhb_tt3a.mp3 7.3 MB
- Black Hat USA/Black Hat USA 2004/Patrick - Chambet - Google Attacks.mp4 7.3 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Franco - Case Studies Secure Dev IE7.opus 7.2 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Burdach - Physical memory Forensics.opus 7.2 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - James Bamford - Researching Secrets Part II.opus 7.2 MB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 5 8.mp4 7.2 MB
- Black Hat USA/Black Hat USA 2013/video/Tribute to Barnaby Jack.mp4 7.2 MB
- Black Hat USA/Black Hat USA 2006/video/Charles Edge - Attacking Apples Xsan.mp4 7.2 MB
- Black Hat USA/Black Hat USA 2006/video/Kimball Code Integrate Vunl audit.mp4 7.2 MB
- Black Hat DC/Black Hat Federal 2006/Finding Digital Evidence in Physical Memory - Mariusz Burdach.opus 7.2 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 6 7.mp4 7.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Potter - Trusted Computing Revolution.opus 7.1 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Yuji-Ukai-Japanese-with-english-questions.opus 7.1 MB
- Black Hat USA/Black Hat USA 2006/video/Brosch - Runtime Packers Hidden Prob.mp4 7.1 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - John McDonald - Stateful Inspection of FireWall-1.opus 7.1 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Thomas Olofsson - Building a Blind IP Spoofed Portscanning Tool.opus 7.1 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/BlackHat_EU_2011_GushinBehar_Building_Floodgates-Slides.pdf 7.0 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - David Litchfeild - All new 0day.opus 7.0 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-androidmarcus_niemietz-slides.pdf 7.0 MB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 2 8.mp4 7.0 MB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/BH-US-06-Lambert.pdf 7.0 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 4 8.mp4 7.0 MB
- Black Hat USA/Black Hat USA 2006/video/Gallagher - Preventing CrossSite Req.mp4 7.0 MB
- Black Hat USA/Black Hat USA 2004/Gregory S Miles - Travis Schack - Introduction to Global Security Syndicate.mp4 7.0 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Timothy Mullen - Grabbing User Credentials via W2k ODBC Libraries.opus 6.9 MB
- Black Hat USA/Black Hat USA 2005/video/MadHat, Simple Nomad - SPA.mp4 6.9 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - David Litchfield - Variations in Exploit Methods between Linux and Windows.opus 6.9 MB
- Black Hat USA/Black Hat USA 2005/video/Caezar Cerrudo - Demystifying SQL - Oracle.mp4 6.9 MB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 1 8.mp4 6.9 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Daniel VanBelleghem - Solving Network Mystries.opus 6.9 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Chad R Skipper - Polymorphism and Intrusion Detection Systems.opus 6.9 MB
- Black Hat USA/Black Hat USA 2006/presentations/077_Willis.pdf 6.9 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-schultze.pdf 6.8 MB
- Black Hat USA/Black Hat USA 2006/presentations/003_Hoffman.pdf 6.8 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Auger and Sima - 0day subscriptions.opus 6.8 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 2 7.mp4 6.8 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Ron Moritz - Proactive Defense Against Malicious Code.opus 6.8 MB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 7 8.mp4 6.8 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Sutton & Greene - The Art Of File Format Fuzz.opus 6.8 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 1 7.mp4 6.8 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Butler - Exponential Growth Rootkit.opus 6.8 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 5 7.mp4 6.7 MB
- Black Hat USA/Black Hat USA 2006/presentations/021_Kimball.pdf 6.7 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Jose Nazario - The Future of Network Worms.opus 6.7 MB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 8 8.mp4 6.7 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Auditing The Security of Applications - David Litchfield.opus 6.7 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Tim Newsham - Cracking WEP Keys.opus 6.7 MB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 4 8.mp4 6.7 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Mulliner - Exploiting - SymbianOS.jp.opus 6.7 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Jericho Forum.eng.json 6.6 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/BH_US_08_Conti_Dean_Visual_Forensic_Analysis.pdf 6.6 MB
- Black Hat USA/Black Hat USA 2006/presentations/037_Zanero.pdf 6.6 MB
- Black Hat USA/Black Hat USA 2008/video/Vista and ActiveX Controls - Su Yong Kim.mp4 6.6 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Moniz and Moore - 6 Degrees XSSploit.opus 6.6 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - JD Glaser - JDs Toolbox Fire and Ice.opus 6.6 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 3 7.mp4 6.6 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Long.pdf 6.5 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Long.pdf 6.5 MB
- Black Hat DC/Black Hat DC 2007/Audio/2007_BlackHat_DC-V1-Paget_and_ACLU-RFID.m4a 6.5 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Marcus Ranum - Full Disclosure and Open Source.eng.json 6.5 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Virtual Private Problems A Broken Dream - Loki.opus 6.5 MB
- Black Hat USA/Black Hat USA 1998/audio/Richard Thieme - Convergence - Every Man (and Woman) a Spy.opus 6.5 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Terry Losonky - National Information Assurance Partnership.opus 6.5 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 7 8.mp4 6.5 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Yuji-Ukai-eeye-Japanese.opus 6.4 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 2 8.mp4 6.4 MB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 Why Attend the World's Premier Technical Cybersecurity Conference.mp4 6.4 MB
- Black Hat USA/Black Hat USA 2006/presentations/068_Mandia.pdf 6.4 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/International Organized Crime and Terrorism - Hal Mcconnall.opus 6.4 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 1 8.mp4 6.3 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Patrick Miller - Spider(tool).opus 6.3 MB
- Black Hat USA/Black Hat USA 2006/presentations/069_Trainor.pdf 6.3 MB
- Black Hat USA/Black Hat USA 1998/audio/Marcus Ranum - How to REALLY Secure the Internet.opus 6.3 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Suiche_Windows_Hibernation_File/BH_US_08_Suiche_Windows_hibernation_file_for_fun'n'profit_0_3.pdf 6.3 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - SensePost - A tale of two Proxies.opus 6.3 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 4 7.mp4 6.3 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/BH_US_08_DAuganno_iRK_OS_X_Rootkits.pdf 6.3 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Richard George - Views On The Future Direction of Information Assurance.opus 6.3 MB
- Black Hat Europe/Black Hat Europe 2001/Audio/IDS Evasion Design Tricks for Buffer Overflow Exploits - Anders Ingeborn.opus 6.2 MB
- Black Hat USA/Black Hat USA 2008/video/Hacking and Injecting Federal Trojans - 2-2 - Lukas Grunwald.mp4 6.2 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Thompson-Red-Team-Techniques-For-Evading-Bypassing-And-Disabling-MS-Advanced-Threat-Protection-And-Advanced-Threat-Analytics.pdf 6.2 MB
- Black Hat USA/Black Hat USA 2006/video/SQUIRE - Project Cowbird.mp4 6.2 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_Code.zip 6.2 MB
- Black Hat USA/Black Hat USA 2006/video/Waldron - VOIP Security Essentials.mp4 6.2 MB
- Black Hat USA/Black Hat USA 2006/video/Trainor - The Statue of Liberty.mp4 6.2 MB
- Black Hat USA/Black Hat USA 2006/presentations/070_Rutkowska.pdf 6.2 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Maggi-Pocket-Sized-Badness-Why-Ransomware-Comes-As-A-Plot-Twist-In-The-Cat-Mouse-Game.pdf 6.2 MB
- Black Hat USA/Black Hat USA 2007/presentations/Hoagland/Whitepaper/bh-usa-07-hoagland-WP2.pdf 6.2 MB
- Black Hat USA/Black Hat USA 2006/presentations/073_Caswell.pdf 6.1 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Robert Hansen - htaccess Scripts in Apache Environments.opus 6.1 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Jurczyk-Effective-File-Format-Fuzzing-Thoughts-Techniques-And-Results.pdf 6.1 MB
- Black Hat USA/Black Hat USA 2004/Sarah Gordon - Privacy Do as I Say Not as I Do.mp4 6.1 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 3 8.mp4 6.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Grunwald - New Attack RFID Systems.opus 6.1 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Geers.pdf 6.1 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Vivek-Advanced_WiFi_Security_Code.zip 6.1 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 6 7.mp4 6.1 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Null Sessions, MSRPC, and Windows 2000 - Todd Sabin.opus 6.1 MB
- Black Hat DC/Black Hat DC 2008/Presentations/Beauchamp-Weston/Presentation/bh-dc-08-beauchamp-weston.pdf 6.0 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/McGregor_Cold_Boot_Attacks/BH_US_08_McGregor_Cold_Boot_Attacks.pdf 6.0 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Dhanjani_Rios_Bad_Sushi/BH_US_08_Dhanjani_and_Rios_Bad_Sushi.pdf 6.0 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Wen-Use-After-Use-After-Free-Exploit-UAF-By-Generating-Your-Own.pdf 6.0 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 2 7.mp4 6.0 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 6 7.mp4 6.0 MB
- Black Hat USA/Black Hat USA 2007/presentations/Krawetz/Whitepaper/bh-usa-07-krawetz-WP.pdf 6.0 MB
- Black Hat USA/Black Hat USA 2005/video/Yuan Fan - SQL Injection Detection.mp4 6.0 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Hovor-Automating-Incident-Investigations-Sit-Back-And-Relax-Bots-Are-Taking-Over.pdf 6.0 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 3 7.mp4 6.0 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 1 7.mp4 5.9 MB
- Black Hat USA/Black Hat USA 1997/Ira Winkler - Who are the Real Black Hats.opus 5.9 MB
- Black Hat USA/Black Hat USA 2010/SprayPAL - Patrick Engebretson, Josh Pauli, Kyle Cronin.mp4 5.9 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Conti/software/rumint/rumint_172.zip 5.9 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Anti - spyware Coalition.eng.json 5.9 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Raul_Siles/BlackHat_EU_2011_Siles_SAP_Session-Slides.pdf 5.9 MB
- Black Hat USA/Black Hat USA 2008/video/Free-space Quantum Key Distribution at GHz Transmission Rates - Joshua Bienfang.mp4 5.9 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 4 7.mp4 5.9 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Andrey Malyshev and Serg Vasilenkov - Security Analysis of Microsoft Encrypted File System.mp4 5.9 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 5 7.mp4 5.9 MB
- Black Hat USA/Black Hat USA 2005/video/Shawn Moyer - Owning The C-Suite.mp4 5.9 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Make My Day – Just Run a Web Scanner Countering The Faults of Typical Web Scanners Through Byte-code Injection - Toshinari Kureha & Dr. Brian Chess.opus 5.9 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Richard Thieme - Defending the Information Web New Ways of Thinking About Security.opus 5.9 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Falling Dominos - Kevin McPeake, Wouter Aukema.eng.json 5.9 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Falling Domino's - Kevin McPeake, Wouter Aukema.eng.json 5.9 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 2 7.mp4 5.8 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Wang-AI-Based-Antivirus-Can-Alphaav-Win-The-Battle-In-Which-Man-Has-Failed.pdf 5.8 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Black-Hat-AD-2010-android-sandcastle-slides.pdf 5.8 MB
- Black Hat USA/Black Hat USA 1997/Peter Shipley - Securing your Network with Free Utilities.opus 5.8 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Panel - Removing Roadblocks to Diversity.eng.json 5.8 MB
- Black Hat DC/Black Hat Federal 2006/My IDS is better than yours. Or is it - Stefano Zanero.eng.json 5.8 MB
- Black Hat USA/Black Hat USA 2008/video/Temporal Reverse Engineering - Danny Quist, Colin Ames.mp4 5.8 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 3 7.mp4 5.8 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Marcus Sachs - Building a Global Culture of Security(Luncheon Speaker).opus 5.8 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit and Money - HD More.eng.json 5.8 MB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 Short Reel.mp4 5.7 MB
- Black Hat USA/Black Hat USA 2005/video/James C Foster - BlackHat Standup.mp4 5.7 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Mandal-The-Great-Escapes-Of-Vmware-A-Retrospective-Case-Study-Of-Vmware-G2H-Escape-Vulnerabilities.pdf 5.7 MB
- Black Hat USA/Black Hat USA 2008/video/Deobfuscator An Automated Approach to the Identification and Removal of Code Obfuscation - Eric Laspe, Jason Raber.mp4 5.7 MB
- Black Hat USA/Black Hat USA 2006/presentations/027_Moniz-Hulton.pdf 5.7 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/Squire-cowbird-0.9.0-bh-wma11b.tgz 5.7 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 1 7.mp4 5.7 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Understanding SCADA's Modbus Protocol.eng.json 5.7 MB
- Black Hat USA/Black Hat USA 2006/video/Benninger - Find gold Browser Cache.mp4 5.7 MB
- Black Hat USA/Black Hat USA 1998/audio/John Bailey - SOCKS, PPTP & IPSec Implementation & Futures.opus 5.6 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/Squire-cowbird-0.9.0-bh-wma11b.zip 5.6 MB
- Black Hat USA/Black Hat USA 1997/Priest - Building the Business Case for Management for Increased Security.opus 5.6 MB
- Black Hat USA/Black Hat USA 2008/video/Metamorphic - Polymorphic Malware DNA - Chet Hosmer.mp4 5.6 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Schmidt-Attacking-Next-Gen-Roaming-Networks.pdf 5.5 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Jeff Nathan and Kevin Depeugh - Layer 2 Attacks.opus 5.5 MB
- Black Hat USA/Black Hat USA 2005/video/Darrin Barrall - Shakespearean Shellcode.mp4 5.5 MB
- Black Hat USA/Black Hat USA 2008/video/Mobile Phone Messaging Anti-Forensics - Zane Lackey, Luis Miras.mp4 5.5 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Brian Snow - We Need Assurance.opus 5.5 MB
- Black Hat USA/Black Hat USA 2006/presentations/033_Grossman.pdf 5.4 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Dan Kaminski phreebird_suite_1.0.tar.gz 5.4 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Oudot-Extrusion-and-Web-Hacking-slides.pdf 5.4 MB
- Black Hat USA/Black Hat USA 2008/video/Winning the Race to Bare Metal - UEFI Hypervisors - Don Bailey, Martin Mocko.mp4 5.4 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Dominque Brezinski - Anatomy of Common Programming Security Issues.opus 5.4 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Mandy Andress - Wireless LAN Security.opus 5.4 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Richard Theime - Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the Board is Disappearing.opus 5.4 MB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Grossman.pdf 5.4 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Caswell and Moore - Thermoptic Camo.eng.json 5.3 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Spitler-Software_Security_Goes_Mobile_Slides.pdf 5.3 MB
- Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Jeff Jonas - Non Obvious Relationship Awareness.opus 5.3 MB
- Black Hat Asia/Black Hat Singapore 2015/Welcome and Introduction to Black Hat Asia 2015.mp4 5.3 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 4 7.mp4 5.3 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Stamos and lackey - Breakin Ajax web.eng.json 5.2 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Partial-Chris-Eagle-Japanese-Translated.opus 5.2 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Su A Cyder - Homebrewing Malware for IOS Like a BO$$.eng.json 5.2 MB
- Black Hat USA/Black Hat USA 1997/QMaster - Secure Implementations of ActiveX in a Corporate Environment.opus 5.2 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Blanco-WI-FI-Direct-To-Hell-Attacking-WI-FI-Direct-Protocol-Implementations.pdf 5.1 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Safeguarding You Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.json 5.1 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Safeguarding Your Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.json 5.1 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Analysis of Microsoft Office password protection systems, and survey of encryption holes in other MS Windows applications - Andrey Malyshev.opus 5.1 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Economics and the Underground Economy - Cormac Herley.eng.json 5.0 MB
- Black Hat USA/Black Hat USA 2006/presentations/028_Gallagher.pdf 5.0 MB
- Black Hat USA/Black Hat USA 2006/presentations/066_Frei-May.pdf 4.9 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Hacker Court 04 Pirates of the Potomac.eng.json 4.9 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Rooster and JD Glaser - Defending Your Network With Active Directory Services.eng.json 4.9 MB
- Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Bruce Schneier - The Instrument and Death of Security.opus 4.9 MB
- Black Hat USA/Black Hat USA 2005/video/Renaud Bidou - Dirty BlackMail DoS Story.mp4 4.9 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Cean Convery - Hacking Layer Two.eng.json 4.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Mobile Network Forensics.eng.json 4.9 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.json 4.9 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.json 4.9 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Brian Martin and B K DeLong - Lessons Learned From attrition.org.eng.json 4.9 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chuck Willis - Forensics with Linux 101.eng.json 4.9 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Crypto for Pentesters - Thomas Ptacek, Michael Tracy.eng.json 4.8 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Raul_Siles/BlackHat_EU_2011_Siles_SAP_Session-WP.pdf 4.8 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Advanced Oracle Attack Techniques - David Litchfield.eng.json 4.8 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - Analysis of Web App worms.eng.json 4.8 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Theory) 1-2.eng.json 4.8 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Dror-Thumann=/Presentation/bh-eu-07-dror.ppt 4.8 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Dror-Thumann/Presentation/bh-eu-07-dror.ppt 4.8 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moore - Metasploit Reloaded.eng.json 4.8 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Matthew Franz and Sean Convery - BGP Vulnerability Testing.eng.json 4.8 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Rouch-A-Universal-Controller-To-Take-Over-A-Z-Wave-Network.pdf 4.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Clobbering the Cloud - Haroon Meer, Nick Arvanitis, Marco Slaviero.eng.json 4.7 MB
- Black Hat USA/Black Hat USA 2002/presentations/endler/idefense.zip 4.7 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Kevin Spett - Java Decompilation and Application Security.opus 4.7 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Berta-Breaking-Out-HSTS-And-HPKP-On-Firefox-IE-Edge-And-Possibly-Chrome.pdf 4.7 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.eng.json 4.7 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Chris Goggans - Internet Attack Methodologies.eng.json 4.7 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hadoop Security - Seven Ways to Kill an Elephant.eng.json 4.6 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Long.pdf 4.6 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Aumasson-CryptanalysisVSReality_Slides.pdf 4.6 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jay Beale - Attacking and Defending BIND DJBDNS DNS Servers.eng.json 4.6 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Willis_Belani.pdf 4.6 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Paquet-Clouston-Ego-Market_When-Greed-for-Fame-Benefits-Large-Scale-Botnets.pdf 4.6 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honey Topics.eng.json 4.6 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Hacker Court.eng.json 4.6 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Auditing Binaries for Security Vulnerabilities - Halvar Flake.eng.json 4.6 MB
- Black Hat Asia/Black Hat Japan 2007/presentations/Kolbitsch and Keil.rar 4.5 MB
- Black Hat USA/Black Hat USA 2008/video/Playing by Virtual Security Rules How Virtualization Changes Everything and What to Do about It - Steve Pate.mp4 4.5 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Claudio_Criscione/BlackHat_EU_2011_Criscione_VirtualizationFailures-Slides.pdf 4.5 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_Slides.pdf 4.5 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/The Honeynet Project - 2nd Generation Honeynet Technologies.eng.json 4.5 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hardware is the New King - Joe Grand aka Kingpin.eng.json 4.5 MB
- Black Hat USA/Black Hat USA 2008/video/Got Citrix, Hack It - Shanit Gupta.mp4 4.5 MB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 - Short Reel.mp4 4.5 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - AJAX Insecurity.eng.json 4.5 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Pollet-RTS-Electricity-for-Free-slides.pdf 4.5 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert W Clark - Legal Aspects.json 4.5 MB
- Black Hat USA/Black Hat USA 2005/video/Darrin Barrall, David Dewey - Plug and Root.opus 4.5 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court - Part2.eng.json 4.5 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dominique Brezinski - Security Posture Assessment (SPA) of Windows NT Networks.eng.json 4.4 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.json 4.4 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.json 4.4 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Mavroudis-Talking-Behind-Your-Back-Attacks-And-Countermeasures-Of-Ultrasonic-Cross-Device-Tracking.pdf 4.4 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 1-2 - Michaek Howard, David Leblanc.eng.json 4.4 MB
- Black Hat DC/Black Hat Federal 2006/Analysis of Web Application Worms and Viruses - Billy Hoffman.eng.json 4.4 MB
- Black Hat USA/Black Hat USA 2006/presentations/024_Moyer.pdf 4.4 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-geers-up.pdf 4.4 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-geers-up.pdf 4.4 MB
- Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Dario Forte (Luncheon) - International Hacking When the cooperation is the only cure.opus 4.4 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Understanding Botnets By Building One.eng.json 4.4 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Eugene Tsyrkievich - Ozone.eng.json 4.3 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Kaminsky - Black Ops of TCPIP.eng.json 4.3 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Cunningham w Morgan - US Natl Sec.eng.json 4.3 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Smart Parking Meter Implementations, Globalism, and You - Joe Grand, Jacob Appelbaum, Chris Tarnovsky.eng.json 4.3 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jay Beale - Locking Down Mac OS X.eng.json 4.3 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.json 4.3 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.json 4.3 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jennifer Granick and Mark Eckenwiler - What Internet Service Providers Need to Know About the Law.eng.json 4.3 MB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Hoshizawa.pdf 4.3 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.json 4.3 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.json 4.3 MB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-amini-portnoy.pdf 4.3 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Computer Crime Year in Review - Jennifer Granick.eng.json 4.3 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite_en.json 4.3 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite.eng.json 4.3 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Apple iOS Security Evaluation Vulnerability Analysis and Data Encryptio - Dino Dai Zovi.eng.json 4.3 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Bruce Potter - and - Brian Wotring.eng.json 4.3 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Josh Daymont - Hardening Windows CE.eng.json 4.3 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Stamos, Stender - Attacking web Service.json 4.3 MB
- Black Hat USA/Black Hat USA 2006/presentations/055_Sutton.pdf 4.2 MB
- Black Hat DC/Black Hat Federal 2006/Beyond EIP - spoonm, skape.eng.json 4.2 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dan Kaminsky - Stack Black Ops.eng.json 4.2 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roger Dingledine - Why is Anonymity So Hard.eng.json 4.2 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Job de Haas - GSM WAP and SMS Security.eng.json 4.2 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Timmers-Bypassing-Secure-Boot-Using-Fault-Injection.pdf 4.2 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/DC Panel Update from Washington - Panel.eng.json 4.2 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chip Andrews - SQL Security Revisited.eng.json 4.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Survey of Remote Automotive Attack Surfaces.eng.json 4.2 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-art-of-cyberwar-geers-slides.pdf 4.2 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Circumventing Automated JavaScriptAnalysis Tools - Billy Hoffman.eng.json 4.2 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Blackhat-AD-2010-Hansen-Sokol-HTTPS-Can-Byte-Me-slides.pdf 4.2 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 2-2.eng.json 4.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Morana - Sec Into Software LifeCycle.opus 4.1 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 2-2 - Eric Schultze & Erik Birkholz.eng.json 4.1 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mandia - State of Incident Response.eng.json 4.1 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Searle-breaking-grid.pdf 4.1 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerabilities of Wireless Water Meter Networks - John McNabb.eng.json 4.1 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ira Winkler - The Road to Riches.eng.json 4.1 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Grugq - Defeating Forensic Analysis.eng.json 4.1 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Social Engineering and the CIA - Petet Earnest.eng.json 4.1 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/What the Hell is Inside There - Chris Tarnovsky.eng.json 4.1 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Lance Spitzner - The Honey Net Project.eng.json 4.1 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH_EU_05-Berrueta_Andres.rar 4.1 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Shacham_Return_Oriented_Programming/BH_US_08_Shacham_Return_Oriented_Programming.pdf 4.1 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploratory Android Surgery - Jesse Burns.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2006/presentations/080_Marinescu.pdf 4.0 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Ortiz-Steganography-WP.pdf 4.0 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Surviving OpenHack IV - Steve Riley, Timothy Bollefer.eng.json 4.0 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools - Shreeraj Shah.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Battery Firmware Hacking - Charlie miller.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Bilar - Auto Malware Classification.opus 4.0 MB
- Black Hat USA/Black Hat USA 2006/presentations/061_Morgenstern.pdf 4.0 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Wong-Fed-Up-Getting-Shattered-And-Log-Jammed-A-New-Generation-Of-Crypto-Is-Coming.pdf 4.0 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kim_Vista_ActiveX_Controls/BH_US_08_Kim_Vista_and_ActiveX_control_Slides.pdf 4.0 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-reverse-and-simulate-guihery-slides.pdf 4.0 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mark Eckenwiler - USA Patriot Act and Criminal Investigations.eng.json 4.0 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stender - Attack Internatl SW - English.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rauch - PDB - The Protocal Debugger.eng.json 4.0 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Russ-Rogers-Covert-Channels-English done.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Himanshu Dwivedi - iSCI Insecure SCSI.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Maynor - Leave the Theory Behind and Embrace the Code.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Bruce Schneier - Paradigms Lost Engineering vs Risk Management.opus 4.0 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Miller-CALDERA-Automating-Adversary-Emulation.pdf 4.0 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reversing and Exploiting an Apple Firmware Update - K. Chen.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Diana Kelly and Ian Poynter - Single Sign On 101.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Malware Detection Through Network Flow Analysis - Bruce Potter.eng.json 4.0 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Mandia.pdf 4.0 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 1-2.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - Introduction to Embedded Security.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting USB Devices with Arduino - Greg Ose.eng.json 4.0 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Black Hat USA 2003 - Dan Kaminsky - Stack Black Ops.eng.json 3.9 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bruce Potter - Bluetooth Defense Kit.eng.json 3.9 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Lives on The Line Securing Crisis Maps in Libya, Sudan, and Pakistan - Securing Crisis Maps in Libya, Sudan, and Pakistan.eng.json 3.9 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Justin_Searle/BlackHat_EU_2011_Searle_Infrastructure_attack-Slides.pdf 3.9 MB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Bruce K. Marshall - Statistical Analysis of Reusable Password Systems and Their Alternatives.eng.json 3.9 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Inside Apple’s MDM Black Box - David Schultz.eng.json 3.9 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 2-2 - Michael Howard, David Leblanc.eng.json 3.9 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Thomas Akin - WebMail Forensics.eng.json 3.9 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jennifer Granick - Top 10 Issues.eng.json 3.9 MB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/bh-win-04-milroy.pdf 3.9 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Kevin Madi - Evolution of Incident Response.av.eng.json 3.9 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dr Mudge - Keynote.eng.json 3.9 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.json 3.9 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.json 3.9 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Moyer - Defending BlackBox Web Apps.opus 3.9 MB
- Black Hat USA/Black Hat USA 2006/presentations/082_Krawetz.pdf 3.9 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.jp.eng.json 3.9 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ian Poynter and Diana Kelly - The Truth About ASPs.eng.json 3.9 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-evans-up.pdf 3.9 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-evans-up.pdf 3.9 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeff Thompson - Making Unix Secure for the Internet with Trusted Operating Systems.eng.json 3.9 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Dwivedi - Shoot Nxt Persn says VLANS.opus 3.9 MB
- Black Hat USA/Black Hat USA 2008/video/Fuzzing Proprietary SCADA Protocols - Sergey Bratus.opus 3.9 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rain Forest Puppy - Novell The Forgotten OS.eng.json 3.9 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dennis Groves and Bill Pennington - Web Application Security.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fuzzing the Phone in Your Phone - Charlie Miller, Collin Mulliner.eng.json 3.8 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Why Black Hats Always Win - Val Smith, Chris.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Kevin McPeake and Chris Goggins - Falling Dominos.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Alessandro Acquisti - Privacy Economics and Immediate Gratification.eng.json 3.8 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Beek-Taming_Worms_RATS_Dragons-Slides.pdf 3.8 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Staring into the Abyss The Dark Side of Security and Professional Intelligence - Richard Thieme.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jennifer Granick - Legal Liability and Security Incident Investigation.eng.json 3.8 MB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.json 3.8 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/.NET from the Hacker's Perspective - Drew Miller.eng.json 3.8 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-lessons-from-history-healey-slides.pdf 3.8 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mike Schiffman - The Need for an 802.11b Toolkit.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Jeremy Rauch - Security Implications of Distributed Network Management.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/New Classes of Security and Privacy Vulnerabilities for Implantable Wireless Medical Devices - Tadayoshi Kohno, Kevin Fu.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Metasploit Autopsy - Reconstructing the Crime Scene - Peter Silberman, Steve Davis.eng.json 3.8 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Honey Project - Latest Advances in Honeynet Technologies.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Building Safe Systems at Scale - Lessons from Six Months at Yahoo.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Neerumalla - SQL Inject.opus 3.8 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal - Fran Brown, Rob Ragan.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Sluggo - Denial of Service Attacks, and Defensive Strategies.eng.json 3.8 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How to Steal a Nuclear Warhead Without Voiding Your XBox Warranty - Intro to tamper evident devices, applications & circumvention - Jamie Schwettmann & Eric Michaud.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Rain Forest Puppy - TBD.eng.json 3.8 MB
- Black Hat DC/Black Hat Federal 2006/New Directions in Disk Forensics - Simson L. Garfinkel.eng.json 3.8 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Vulnerability Disclosure What the Feds Think.eng.json 3.8 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Cops and Robbers - Cheating Las Vegas - Jeff Jonas.opus 3.8 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Edward G Schwartz and Diana Kelly - Data Privacy What should the CIO and CISO be doing.eng.json 3.7 MB
- Black Hat USA/Black Hat USA 2006/presentations/074_Potter.pdf 3.7 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Patroklos_Argyroudis/BlackHat_EU_2011_ArgyroudisGlynos_Kernel_exploitation-Slides.pdf 3.7 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Deconstructing a Secure Processor - Christopher Tarnovsky.eng.json 3.7 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Concurrency Attacks in Web Applications - Scott Stender, Alexander Vidergar.eng.json 3.7 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes.pdf 3.7 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/REST for the Wicked - Bryan Sullivan.eng.json 3.7 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-malicious URI-Hamon-Slides.pdf 3.7 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Grand - Sec Problems HWare Devices.json 3.7 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/OpenQVis/inventor.dll 3.7 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sensepost - Deus ex Machina.eng.json 3.7 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - Application Security Crossfire.eng.json 3.7 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Brandon Wiley - The Superworm Manifesto.eng.json 3.7 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hulton and Moniz - Faster pwning.eng.json 3.7 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/CSO Panel Black Hat Strategy Meeting - Panel.eng.json 3.7 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.json 3.7 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.json 3.7 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.json 3.7 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.json 3.7 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Drew Miller - .Net from the hackers perspective Part 2 .eng.json 3.7 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brad Bolin - Information Security Law Update.eng.json 3.7 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/URI Use and Abuse - Nathan McFeters and Rob Carter.eng.json 3.7 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - A Historical Look at Hardware Token Compromises.eng.json 3.7 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem.pdf 3.7 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is Your Phone Pwned - Kevin Mahaffey, Anthony Lineberry, John Hering.eng.json 3.7 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honeypots.eng.json 3.7 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Fischbach - Carrier VOIP Security.eng.json 3.7 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Wilkins/wilkins- Source Code.rar 3.6 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Defense in Depth Winning in Spit of Yourself - Erik Schlutz, David Leblanc.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Martin Roesch - Snort.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/There’s a Fox in the Henhouse - Jeff Williams.eng.json 3.6 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Keynote - Quest for the Holy Grail - Jerry Dixon.eng.json 3.6 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Getaway - Methods and Defenses for Data Exfiltration - Sean Coyne, Ryan Kazanciyan.eng.json 3.6 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Veiled - A Browser Based Darknet - Billy Hoffman, Matt Wood.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Post Exploitation Bliss - Loading Meterpreter on a Factory iPhone - Vincenzo Iozzo, Charlie Miller.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Your Mind - Legal Status, Rights and Securing Yourself - Tiffany Rad & James Arlen.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning Your Phone at Every Layer - A Mobile Security Panel - Tyler Shields, Anthony Lineberry, Charlie Miller, Chris Wysopal, Dino Dai Zovi, more.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Attacking Clientside JIT Compilers - Chris Rohlf, Yan Ivnitskiy.eng.json 3.6 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Malware analysis for the enterprise - Jason Ross.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 2-2 - Panel.eng.json 3.6 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Geers.pdf 3.6 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Geers.pdf 3.6 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Inducing Momentary Faults Within Secure StandardsMicrocontrollers - Christopher Tarnovsky.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2006/presentations/056_Butler.pdf 3.6 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Strategies for Defeating Distributed Attacks - Simple Nomad.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Len Sassman - The Anonymity Toolkit.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mainframes - The Past Will Come to Haunt You.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Maltego Tungsten As a Collaborative Attack Platform.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sour Pickles - Marco Slaviero.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Meet the Feds Feds vs. Ex-Feds - Panel.eng.json 3.6 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/A Picture’s Worth Digital Image Analysis - Dr. Neal Krawetz.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Black Ops of TCPIP 2011 - Dan Kaminsky.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloud Computing Models and Vulnerabilities - Raining on the Trendy New Parade - Alex Stamos, Andrew Becherer & Nathan Wilcox.eng.json 3.6 MB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-sensepost.pdf 3.6 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Forensics Tools and Processes for Windows XP Platforms - Larry Leibrock.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Willis and Belani - Web App Incident.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Buetler_SmartCard_APDU_Analysis/BH_US_08_Buetler_SmartCard_APDU_Analysis_V1_0_2.pdf 3.6 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Beetle Potter - Evil Twins 802.11.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Ops 2008 - Dan Kaminsky.eng.json 3.6 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Identifying the True IP Network Identity of I2P Service Hosts - Adrian Crenshaw aka Irongeek.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Eric Goldman - Criminal Copyright infringement and warez trading.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ian Goldberg - Breaking 80211 WEP.eng.json 3.6 MB
- Black Hat USA/Black Hat USA 2008/video/Active 802.11 Fingerprinting - Sergey Bratus, Daniel Peebles, Cory Cornelius, Axel Hansen.opus 3.6 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Walter Gary Sharp - Key Legal Implications of Computer Network Defense.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Friedrichs_Threats_to_the_2008_Presidential_Election/BH_US_08_Friedrichs_Threats_to_the_2008_Presidential_Election.pdf 3.5 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ian Clarke, Oskar Sandberg - Scalable searches.json 3.5 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Four Types of Locks - Deviant Ollam.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2006/presentations/014_Potter.pdf 3.5 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Attacking the Vista Heap - Ben Hawkes.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/The Big Picture.eng.json 3.5 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Design Issues and Software Vulnerabilities in Embedded Systems - FX.eng.json 3.5 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.json 3.5 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.json 3.5 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/XSS Street-Fight - The Only Rule Is There Are No Rules - Ryan Barnett.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Internet is Broken Beyond Document.Cookie - Extreme Client-side Exploitation - Nathan McFeters, Rob Carter, John Heasman.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2006/presentations/075_Waldron.pdf 3.5 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Server-Side JavaScript Injection Attacking and Defending NoSQL and Node.js - Bryan Sullivan.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Patrick Richard - Open Network PKI Design Issues or Business as Usual.eng.json 3.5 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Global Security Report 2010 Analysis of Investigations and Penetration Tests - Nicholas J Percoco.eng.json 3.5 MB
- Black Hat DC/Black Hat Federal 2006/An Advanced NTFS Data Hiding Technique - Irby Thompson, Matthew Monroe.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Practice) 2-2.eng.json 3.5 MB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Investigating Malware Using Memory Forensics - A Practical Approach.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Reverse DNS Tunneling Shellcode - Ty Miller.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/David Bovee - VPN Architectures Looking at the Complete Picture.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Law of Mobile Hacking - Jennifer Granick.eng.json 3.5 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Holtmanns-Detach-Me-Not.pdf 3.5 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Cameron Hotchkies - Blind Injection Automation Techniques.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fighting Russian Cybercrime Mobsters - Dmitri Alperovitch.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Frei and May - Speed of Insecurity.opus 3.5 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Client-side Security - Petko D. Petkov.eng.json 3.5 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/LTE & IMSI Catcher Myths.eng.json 3.5 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Threats to the 2008 Presidential Election - Oliver Fredrichs.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Security When Nano-Seconds Count - James Arlen.eng.json 3.5 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hiring Trends in InfoSec.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Larry Leibrock - Digital Information,User Tokens,Privacy and Forensics Investigation.eng.json 3.4 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/DropSmack - How Cloud Synchronization Services Render Your Corporate Firewall.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Analyzing Security Research in the Media - Panel.eng.json 3.4 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dan-Kaminsky-Black-Ops-tcp-ip-English.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Braving the Cold New Methods for Preventing Cold Boot Attacks on Encryption Keys - Patrick McGregor.eng.json 3.4 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Counterattack - Turning the tables on exploitation attempts from tools like metasploit - scriptjunkie.eng.json 3.4 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Donenfeld-Rooten-Apples-Vulnerability-Heaven-In-The-IOS-Sandbox.pdf 3.4 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Whose Internet Is It, Anyway - Andrew Fried, Richard Cox, Ben Butler.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Anti-Forensics The Rootkit Connection - Bill Blunden.eng.json 3.4 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Agile Security or How to defend applications with five-dat release cycles - Bryan Sullivan.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/RETrace - Applied Reverse Engineering on OS X - Tiller Beauchamp, David Weston.eng.json 3.4 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Kendall_McMillan.pdf 3.4 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Fischbach and Lacoste - Seris - IP Backbone Security.eng.json 3.4 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-English.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Lockpicking Forensics - Datagram.eng.json 3.4 MB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.json 3.4 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-for-cheapskates-o'flynn-slides.pdf 3.4 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/WiFi Security or Descending Into Depression and Drink - Mike Kershaw aka Dragorn.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jay Beale - Attacking and Securing UNIX FTP Servers.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Introduction to Tamper Evident Devices - datagram.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jaya Baloo - Lawful Interception of IP the European Context.eng.json 3.4 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani & Billy Rios.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hacker Court.eng.json 3.4 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.json 3.4 MB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Stamos-Lackey.pdf 3.4 MB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Ian Goldberg - Cell Phone Security A History and The State of the Art.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Potter - Java Card 101.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/BIDOU - IPS Shortcomings.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Yuan Fan - MatriXay.opus 3.4 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani, Billy K Rios.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Silvio Cesare - Opensource Kernel Auditing and Exploitation.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Satan is on My Friends List Attacking Social Networks - Shawn Moyer, Nathan Hamiel.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sparks and Others - Sidewinder.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Smartfuzzing the Web Carpe Vestra Foramina - Nathan Hamiel, Justin Engler, Seth Law, Gregory Fleischer.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Kret - Nobodys Anonymous - Tracking Spam and Covert Channels.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Living in the RIA World Blurring the Line Between Web and Desktop Security - Alex Stamos, David Thiel, Justine Osborne.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ray Kaplan - Meet The Enemy.eng.json 3.4 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Legal Aspects of Cybersecurity - (AKA) CYBERLAW A Year in Review, Cases, Issues, Your Questions My (Alleged) Answers - Robert Clark.eng.json 3.4 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Seri-BlueBorne-A-New-Class-Of-Airborne-Attacks-Compromising-Any-Bluetooth-Enabled-Linux-IoT-Device.pdf 3.4 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing.eng.json 3.4 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Marco_Balduzzi/BlackHat_EU_2011_Balduzzi_HTTP_Parameter-Slides.pdf 3.4 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluetooth v2.1 - A New Security Infrastructure and New Vulnerabilities - Andrew Lindell.eng.json 3.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.eng.json 3.3 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Preparing for the Cross Site Request Forgery Defense - Chuck Willis.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Bidou.pdf 3.3 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Faces Of Facebook Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sticking to the Facts Scientific Study of Static Analysis Tools - Chuck Willis, Kris Britton.eng.json 3.3 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Client-Side Protection Against DOM-Based XSS Done Right (tm).eng.json 3.3 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Enforcer - Timothy Mullen.eng.json 3.3 MB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.json 3.3 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Russia - Inside an unprecended prosecution of organized cybercrime - Joseph Menn.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking for Fun & Profit.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Beckstrom’s Law - Rod Beckstrom.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Curtis E Karnow - Running the Matrix.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerardo Richarte - Modern Intrusion Practices.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/ian Goldberg - Off the Record Messaging.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Sutterfield - Enterprise security for converging technologies.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jim Christy - The Defense Cyber Crime.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Shaun Clowes - Fixing and Making Holes in Binaries.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam Boileau - Trust Transcience.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Greg Hoglund - Advanced Buffer Overflow Techniques.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Trainor - The Statue of Liberty.opus 3.3 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Android - One Root to Own them All.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/HTML5 Threats.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Language of Trust - Mark Dowd, Ryan Smith, David Dewey.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Demystifying Fuzzers - Michael Eddington.eng.json 3.3 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Chris-Eagle-IdaPro-English.eng.json 3.3 MB
- Black Hat DC/Black Hat DC 2008/Presentations/Friedrichs/Whitepaper/bh-dc-08-friedrichs.pdf 3.3 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Return-Oriented Programming Exploits Without Code Inspection - Hovav Shacham.eng.json 3.3 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/SPF-Weidman.zip 3.3 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Legal Aspects of Cyberspace Operations.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Taking the Hype Out of Hypervisor - Tal Garfinkel.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Threats to the 2008 Presidential Election (and more) - Oliver Friedrichs.eng.json 3.3 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/win32 ver/proxmon-1.0.14.exe 3.3 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Noel Anderseon - Wifi in WIN Vista.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Gula - Bypassing Intrusion Detection Systems.eng.json 3.3 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/SCADA Security - Jason Larsen.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Post Exploitation Operations with Cloud Synchronization.eng.json 3.3 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 1-2 - Chris Hadnagy.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/VC Panel Security Business Strategies During a Recession - Panel.eng.json 3.3 MB
- Black Hat DC/Black Hat Federal 2006/Client Side Penetration Testing - Max Caceres.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dr. Mudge - Secure Coding Practices and Source Code Analysis.eng.json 3.3 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Richard Thieme - Masters of the Unseen The Art of Information Warfare.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Macs in the Age of the APT - Alex Stamos, BJ Orvis, Paul Youn.eng.json 3.3 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/DSCOMPROMISED - A Windows DSC Attack Framework.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Disclosure Public.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Babar-ians at the Gate - Data Protection at Massive Scale.eng.json 3.3 MB
- Black Hat DC/Black Hat Federal 2006/Extracting Unexpected Functionality from Existing Networks - Dan Kaminsky.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joseph Ansanelli - Future of Personal info.json 3.3 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pushing the Camel Through the Eye of a Needle - Haroon Meer.eng.json 3.3 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A Black Hat Vulnerability Risk Assessment - Panel.eng.json 3.3 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Ma-How-Samsung-Secures-Your-Wallet-And-How-To-Break-It.pdf 3.3 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rutkowska - Subverting Vista Kernel.eng.json 3.2 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Slaviero-Lifting-the-Fog-slides.pdf 3.2 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Mobile Exploit Intelligence Project.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Aerial Cyber Apocalypse If We Can Do It So Can They - Richard Perkins, Mike Tassey.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Mitigation in Windows 8.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Weaponizing the Web - Nathan Hamiel, Shawn Moyer.eng.json 3.2 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Dissecting Smart Meters.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Bruce Schneier - Why Cryptograpy is Harder Than it Looks.eng.json 3.2 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Teensy Programming for Everyone.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ptacek and Goldsmith - Elec Sheep.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 2 - Val Smith, Colin Ames & David Kerb.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Smashing the Furure for Fun & Profit.eng.json 3.2 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Sullivan-Towards-A-Policy-Agnostic-Control-Flow-Integrity-Implementation.pdf 3.2 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Strike and Counterstrike The Law on Automated Intrusions and Striking Back - Curtis Karnow.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/NFC Analysis.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Spoonm - Metasploit Hacking Like in the Movies.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Keynote Speaker Cofer Black.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protocols and Encryption of the Storm Botnet - Joe Stewart.eng.json 3.2 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Gerhard-Escelbeck-Laws-of-vulnerbilities-English.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why Control System Cyber-Security Sucks.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Global Spying - Steve Topletz, Jonathan Logan, Kyle Williams.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Bit-Squatting DNS Hijacking Without Exploitation - Artem Dinaburg.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Diana Kelly - Translasting US Privacy Regulations for Implementation.eng.json 3.2 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Potter_Network_Flow_Analysis/BH_US_08_Potter_Netflow.pdf 3.2 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Four Horsemen of the Virtualization Security Apocalypse - Christofer Hoff.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 1-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeremy Rauch - The Security of Network Devices.eng.json 3.2 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Malicious PDF Analysis.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keynote - The Hidden Architecture of our Time - Why This Internet Worked, How We Could Lose It.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kostya Kortchinsky - Bruce Schneier.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Understanding the Windows SMB NTLM weak nonce vulnerablity - Hernan Ochoa, Agustin Azubel.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2006/presentations/045_Cushman.pdf 3.2 MB
- Black Hat DC/Black Hat DC 2007/Video/Black Hat DC 2007 captions/RFID for Beginners - Chris Paget and the ACLU.eng.json 3.2 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-deHaas.pdf 3.2 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-deHaas.pdf 3.2 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-HTML5_Top_10_Shah_Slides.pdf 3.2 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/De-Anonymizing Live CDs through Physical Memory Analysis - Andrew Case.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Chip & PIN is Definitely Broken - Adam Laurie, Zac Franken, Andrea Barisani, Daniele Bianco.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cache and Maynor - Device Drivers.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CreepyDOL - Cheap, Distributed Stalking.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/VK1-Larkin-Fight org Cyber crime.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fast & Furious Reverse Engineering with TitanEngine - Mario Vuksan, Tomislav Pericin.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Roger Dingledine - Putting the P back in VPN.eng.json 3.2 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Charl van der Walt and Christoff Breytenbach - The Role of Non Obvious Relationships in the Foot Printing Process.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Bruce Potter - 802.11X.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Advanced CAN Injection Techniques for Vehicle Networks.eng.json 3.2 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Active Exploitation Detection - Marc Eisenbarth.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Jesse Burns - Fuzzing Win32.eng.json 3.2 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Side Channel Analysis on Embedded Systems Impact and Countermeasures - Job de Haas.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kenneth Geers - Hacking in a Foreign.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 2-2 - John Benson.eng.json 3.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.json 3.2 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stamos - Breaking AJAX - English.eng.json 3.2 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Payload Anatomy & Future Mutations - Riley Hassell.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kaminsky - BlackOPS 2006.eng.json 3.2 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Hoshizawa - online Swindler - English.eng.json 3.2 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Sarah Gordon - Viruses in the Information Age.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Bruce Schneier - A hacker looks at cryptography.eng.json 3.1 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-nunez di croce-WP.pdf 3.1 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Meer_Through_the_Eye_of_a_Needle/BH_US_08_SensePost_Meer_Funneling_Data.pdf 3.1 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/FLEX, AMF 3 and BlazeDS An Assessment - Jacob Carlson, Kevin Stadmeyer.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Benninger - Find gold Browser Cache.opus 3.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/IP Spoofing.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C. Foster, Vincent T. Liu - Catch Me if You Can.json 3.1 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dow Herath Mehta Spencer and Flake - Professional Source Code Auditing.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Leveraging the Edge Abusing SSL VPNs - Mike Zusman.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Adversary Characterization and Scoring System.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Evans.pdf 3.1 MB
- Black Hat USA/Black Hat USA 1999/video/Jeff Moss - Remarks Before the keynote.mp4 3.1 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/War Texting Weaponizing Machine 2 Machine - Don Bailey.eng.json 3.1 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Keynote - Information Technology Systems in a Post-Silcon World.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/006_Hoffman_web.pdf 3.1 MB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Black Hat USA 2019 Keynote Every Security Team is a Software Team Now by Dino Dai Zovi.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Andrew van der Stock - Alternatives to Honeypots.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Andrea Matwyshyn - Introduction to Corporate Information Security Law.eng.json 3.1 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Atch-Exfiltrating-Reconnaissance-Data-From-Air-Gapped-Ics-Scada-Networks.pdf 3.1 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Caezar-Scoring-CTF-Games-English.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Hat USA 2008 - PWNY Awards.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Errata Hits Puberty.eng.json 3.1 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/ret2dir - Deconstructing Kernel Isolation.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Gallagher - Preventing CrossSite Req.opus 3.1 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grossman - Hacking Intranet Outside.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/AppSec A-Z Reverse Engineering, Source Code Auditing, Fuzzing, and Exploitation - Jared DeMott.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Marcus Ranum - Burglar Alarms and Booby Traps.eng.json 3.1 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hackers, Journalists and the Ethical Swamp.eng.json 3.1 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/IIS 6.0's Security Architecture - It's a Whole New World - Michael Muckin.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking and Forensicating an Oracle Database Server - David Litchfield.eng.json 3.1 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Conducting a Successful False Flag Cyber Operation (Blame it on China).eng.json 3.1 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Underground Ecosystem of Credit Card Frauds.eng.json 3.1 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Hacking XPATH 2.0.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sherri Sparks, Jamie Butler - Shadow Walker.json 3.1 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Philip Zimmermann - Keynote with Introduction by Jeff Moss.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Software Radio and the Future of Wireless Security - Michael Ossmann.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Recoverable Advanced Metering Infrastructure - Mike Davis.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerhard Eschelbeck - Law Vulnerabilities.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Xploiting Google Gadgets Gmalware and Beyond - Tom Stracener, Robert Hansen.eng.json 3.1 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 1-2 - Eric Schultze & Erik Birkholz.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Secure Browser Plugins.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Rapid Enterprise Triaging - Aaron LeMasters, Michael Murphy.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cunning With CNG - Soliciting Secrets From Schannel.eng.json 3.1 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Internet Special Ops - Andrew Fried, Paul Vixie, Christopher Lee.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reverse Engineering by Crayon - Danny Quist, Lorie Liebrock.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Our Favorite XSS Filters and How to Attack Them - Eduardo Vela Nava, David Lindsay.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Cory Scott - Systems Management in an Untrusted Network.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Tim Mullen - Neutralizing Nimda Automated Strikeback.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Ofir Arkin - Cracking VoIP Architecture.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Combating the Insider Threat at the FBI - Real-world Lessons Learned.eng.json 3.0 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Applied Black Op Networking on Windows XP - Dan Kaminsky.eng.json 3.0 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stuxnet Redux - Malware Attribution and Lessons Learned - Taking the guesswork out of cyber attribution - Tom Parker.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Teridian SoC Exploitation - Exploration of Harvard Architecture Smart Grid Systems.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Vixie - Preventing Child Neglect.eng.json 3.0 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Welcome & Introduction to Black Hat Europe 2014.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Proposed Vulnerability Handling.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Jennifer Granick - What's Different About Evidence in Computer Crime litigation.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/CuteCats.exe and the Arab Spring.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Suberverting the Xen Hypervisor - Rafal Wojtczuk.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jan K Rutkowski - Advance Windows 2000 Rootkits Detection.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Goldman and Marotta - Securing Your Computing Environment to Conform to Privacy Regulations.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jennifer Granick - The Law of 'Sploits.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Bienfang_Quantum_Key_Distribution/BH_US_08_Bienfang_Quantum_Key_Distribution.pdf 3.0 MB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Frank Breedijk on Seccubus.mp4 3.0 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Windows Kernel Graphics Driver Attack Surface.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Power Analysis Attacks for Cheapskates.eng.json 3.0 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Researching Android Device Security with the Help of a Droid Army.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Covert Post-Exploitation Forensics with Metasploit - Wesley McGrew.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tzi-cker Chiueh - Checking Array Bound.json 3.0 MB
- Black Hat USA/Black Hat USA 2024/Startup Spotlight Competition at Black Hat.mp4 3.0 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Hobbit - Microsoft LM athentication, CIFS, and All Kinds of Password Problems.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Extreme Privilege Escalation on Windows 8 UEFI Systems.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeremy Rauch - How Responsive are Vendors to Security Problems When They Aren't Being Pressured.eng.json 3.0 MB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.json 3.0 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Offensive Threat Modeling for Attackers - Turning Threat Modeling on its Hea.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Derek Soeder, Ryan Permeh - eYe Bootroot.json 3.0 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Corporate Espionage for Dummies The Hidden Threat of Embedded Web Servers - Michael Sutton.eng.json 3.0 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Phishing for Funds - Understanding Business Email Compromise.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking Like in the Movies - Visualizing Page Tables for Local Exploitation.eng.json 3.0 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Tactical Application Security Program - Getting Stuff Done.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Lambert - Sec Engineer in win Vista.eng.json 3.0 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - SQUIRE - Project Cowbird.opus 3.0 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hey You, Get Off of My Cloud - Application-Level Denial of Service Attacks and Defenses - Bryan Sullivan.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced Mac OS X Rootkits - Dino Dai Zovi.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2008/conference cd/viewers/FoxitReaderLinux.tar.gz 3.0 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Saumil-Shah-David-Cole-Adware-Spyware-English.eng.json 3.0 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat 2015.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Looking into the Eye of the Meter.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Rustock Botnet Takedown - Julia Wolf, Alex Lanstein.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Batz - Security Issues Affecting Internet Transit Points and Backbone Providers.eng.json 3.0 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection.eng.json 3.0 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.eng.json 3.0 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Checkmate with Denial of Service - Tom Brennan, Ryan Barnett.eng.json 3.0 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2005/video/Johnny Long - Google Hacking for Pen Test.mp4 3.0 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Bazaliy-Jailbreaking-Apple-Watch.pdf 3.0 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Tom Beardsley - Monkeyspaw.opus 3.0 MB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Geers-Eisen.pdf 3.0 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Aaron Higbee and Chris Davis - DC Phone Home.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Nitesh Dhanjani - Justin Clark.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Google Chrome OS - Matt Johansen, Kyle Osborn.eng.json 3.0 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Jaya Baloo - Lawful Interception of IP The European Context.eng.json 3.0 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Spy-jacking the Booters.eng.json 3.0 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Drake-Exploiting_Java_Memory_Corruption-WP.pdf 3.0 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BIOS Security.eng.json 3.0 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Allen Harper, Edward Balas - The Birth of roo.eng.json 3.0 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Shaun Clowes - Generic Technical Defences.eng.json 3.0 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/(un)Smashing the Stack Overflows, Countermeasures, and the Real World - Shawn Moyer.eng.json 3.0 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SCTPscan - Finding Entry Points to SS7 Networks & Telecommunication Backbones - Philippe Langlois.eng.json 3.0 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Endrun - Secure Digital Communications for Our Modern Dystopia.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dave Aitel - An Introduction to Spike.eng.json 2.9 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Open Sourcing Automotive Diagnostics.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2006/presentations/016_Eng.pdf 2.9 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reviving Smart Card Analysis - Karsten Nohl, Chris Tarnovsky.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Simple Nomad - Modern NetWare Hacking.eng.json 2.9 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2019.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex - Shreeraj Shah.eng.json 2.9 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-Japanese.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Linux Kernel Hidden Inside Windows 10.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Ruby for Pentesters - Michael Tracy, Chris Rohlf, Eric Monti.eng.json 2.9 MB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 1-2.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/These aren't the permissions you're looking for - Anthony Lineberry, Tim Wyatt, David Luke Richardson.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Robert Baird and Mike Lynn - Advanced 80211b Attack.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More Signatures Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling - Ivan Ristic, Ofar Shezaf.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Next Generation Collaborative Reversing with Ida Pro and CollabREate - Chris Eagle, Tim Vidas.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/FX - Vulnerability Finding in Win32A Comparison.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moniz and Moore - 6 Degrees XSSploit.eng.json 2.9 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.json 2.9 MB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jed Haile - Hogwash.eng.json 2.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The IETF & The Future of Security Protocols - All The Signal, None of the No.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Wheeler, Niel Mehta - Owning Anti-virus.eng.json 2.9 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Cantact - An Open Tool for Automative Exploitation.eng.json 2.9 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Data Seepage How to Give Attackers a Roadmap to Your Network - David Maynor & Robert Graham.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Catching Malware En Masse - DNS and IP Style.eng.json 2.9 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Elaassal-Dealing-The-Perfect-Hand-Shuffling-Memory-Blocks-On-ZOS.pdf 2.9 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/S Stender - Attacking Inatl Software.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Mitigation Improvements.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/48 Dirty Little Secrets Cryptographers Don't Want You To Know.eng.json 2.9 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Self-Driving and Connected Cars - Fooling Sensors and Tracking Drivers.eng.json 2.9 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Browsers Gone Wild.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Gordon Reichard Jr - Trust, Security, Partnership Strategies in Selecting a Managed Service Provider.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2007/presentations/Thermos/Presentation/bh-usa-07-thermos.pdf 2.9 MB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A 16-bit Rootkit and Second Generation Zigbee Chips -Travis Goodspeed.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Sullivan_REST_for_the_Wicked/BH_US_08_Sullivan_REST_for_the_wicked.pdf 2.9 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-FX-Huawei-slides.pdf 2.9 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Keynote - Devaluing Attack - Disincentivizing Threats Against The Next Billion Devices.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/OSS Security Maturity - Time to Put on Your Big Boy Pants.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2006/presentations/009_Spradlin.pdf 2.9 MB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2002/presentations/higbee_davis/higbeedavis-bh-us-02-phone.ppt 2.9 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/360 Anomaly Based Unsupervised Intrusion Detection - Stefano Zanero.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Gregory S Miles - Computer Forensics a Critical Process in Your Incident Response Plan.eng.json 2.9 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Using D-Space to Open Doors.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Call To Arms - A Tale of the Weaknesses of Current Client-Side XSS Filtering.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Decompilers and Beyond - Ilfak Guilfanov.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Antivirus Security Softwear Tests.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Constant Insecurity Things You Didn’t Know About (PECOFF) Portable Executable File Format - Mario Vuksan, Tomislav Pericin.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Defending Networks With Incomplete Information - A Machine Learning Approach.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/FX - The Blackberry Case.eng.json 2.9 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Wireless Networks with 802.1x, EAP-TLS and PEAP - Steve Riley.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Using Guided Missiles in Drive-Bys - Automatic Browser Fingerprinting - Egypt.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ofir Arkin - Infrastructure Discovery.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Richard Thieme - Saying Whatever he Wants.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2002/presentations/groves-bh-us-02-webapps.ppt 2.9 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rieback - RFID Malware Demystified.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning the Routing Table - New OSPF Attacks - Gabi Nakibly.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Closing Session.eng.json 2.9 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking .Net Applications The Black Arts - Jon McCoy.eng.json 2.9 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/HTTP Advanced Assessment Techniques - Saumil Shah.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Embedded Management Interfaces - Hristo Bojinov, Elie Bursztein, Dan Boneh.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Kingpin and Brian Oblivian - Secure Hardware Design.eng.json 2.8 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Holz - Catching Malware - Japanese.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Steven Christey - CVE Behind the Scenes The Complexity of Being Simple.eng.json 2.8 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Exploiting Smart-Phone USB Connectivity For Fun And Profit - Angelos Stavrou & Zhaohui Wang.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2002/presentations/schiffman-bh-us-02-wireless.ppt 2.8 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/MetaPost Exploitation - Val Smith, Colin Ames.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Get Rich or Die Trying - Making Money on the Web, The Black Hat Way - Jeremiah Grossman, Arian Evans.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Medical Devices for Fun and Insulin Breaking the Human SCADA System - Jay Radckiffe.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Silberman and Butler - RAIDEv1.0.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.json 2.8 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Marinescu - WIN Vista Heap Mgmt.eng.json 2.8 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Dude, Where's My Laptop.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/SSL, Gone in 30 Seconds - A BREACH beyond CRIME.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoglund - Hacking WOW Adv rootkit.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rick Smith - The Biometrics Dilemma.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chris Paget - Click to Continue Shatter Attacks on Win32.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacking Oracle Web Applications with Metasploit - Chris Gates aka carnal0wnage.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/FX - More Embedded Systems.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 1-2 - Panel.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Baseband Apocalypse - All Your Baseband Are Belong To Us - Ralf-Philipp Weinmann.eng.json 2.8 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Satoru-Koyama-Our-Security-Depends-on-Your-Security-Japanese.eng.json 2.8 MB
- Black Hat DC/Black Hat Federal 2006/How to Automatically Sandbox IIS With Zero False Positive and Negative - Tzi-cker Chiueh (partial).eng.json 2.8 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The M2M Risk Assessment Guide, a Cyber Fast Track Project.eng.json 2.8 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Heap Feng Shui in JavaScript - Alexander Sotirov.eng.json 2.8 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacking-Japanese-Translated.eng.json 2.8 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Automating Linux Malware Analysis Using Limon Sandbox.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Hate the Player, Hate the Game Inside the Android Patch Lifecycle - Anthony Lineberry, Tim Strazzere, Tim Wyatt.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Web Application Canonicalization, Encoding and Transcoding Attacks - Arian Evans.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Developments in Cisco IOS Forensics - Felix FX Linder.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How Smartcard Payment Systems Fail.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Dynamic Taint Propagation Finding Vulnerabilities Without Attacking - Brian Chess & Jacob West.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Managed Code Rootkits - Erez Metula.eng.json 2.8 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Finding Needles in Haystacks (The Size of Countries).eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/I Just Found 10 Million SSNs - Alessandro Acquisti.eng.json 2.8 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking BHAD - Abusing Belkin Home Automation Devices.eng.json 2.8 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Appliances - Ironic exploitation of security products.eng.json 2.8 MB
- Black Hat Asia/Black Hat Japan 2006/presentations/bh-jp-06-Okatani.pdf 2.8 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Sugiura - Winny Poo - Japanese.eng.json 2.8 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/A practical attack against GPRS EDGE UMTS HSPA mobile data communications - David Perez & Jose Pico.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/File Disinfection Framework.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss and Panel - CISO QA.json 2.8 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Researching Secrets - James Bamford.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Underground Economy of the Pay Per Install PPI Business - Kevin Stevens.eng.json 2.8 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Vboot Kit Compromising Windows Vista Security - Nitin Kumar & Vipin Kumar.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Rick Smith - Masquerades,Tricking Modern Auth Systems.eng.json 2.8 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-When-the-table-turn-Japanese.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Neel Mehta - Advanced in ELF runtime binary encryption - Shiva.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jericho and Munge - Hard Core Web Defacement Statistics Trends and Analysis.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Natural Security - Jeff Moss, Rod Beckström.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Malware Distribution via Widgetization of the Web - Neil Daswani.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Security Failures in Secure Devices - Christopher Tarnovsky.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neurosurgery With Meterpreter - Colin Ames, David Kerb.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Hacking Hollywood.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Saumil Shah - Metasploit Plugins.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Predicting Susceptibility to Socialbots on Twitter.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Bouncer Land.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Paul Wouters - IPSEC Opportunistic Encryption using DNSSEC.eng.json 2.8 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Murakami - Hypervisor - IPS.jp.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/O'Connor - Vunls not So Embedded Sys.eng.json 2.8 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-social-engineering-threats-MacDougall-Slides.pdf 2.8 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Vulnerabilities of Cellular and Satellite - based Voice and Data Networks.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ejovi Nuwere - SIP Format Fuzz in Voip.json 2.8 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Greg Conti - Crafting a Tivo.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A New Breed of Rootkit The System Management Mode (SMM) Rootkit - Shawn Embleton, Sherri Sparks.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Heasman-WP.pdf 2.8 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Hidden Risks Of Biometric Identifiers And How To Avoid Them-tagged.eng.json 2.8 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Charles Edge - Attacking Apples Xsan.opus 2.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/State of the Art Post Exploitation in Hardened PHP Environments - Stefan Esser.eng.json 2.8 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Walenstein.pdf 2.8 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Shen-Nation-State Moneymules-Hunting-Season-APT-Attacks-Targeting-Financial-Institutions.pdf 2.8 MB
- Black Hat USA/Black Hat USA 2006/presentations/017_Morana.pdf 2.8 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.eng.json 2.8 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacks-English.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Exploitation Using A Malicious Service Set Identifier (SSID).eng.json 2.7 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Graph-Based Binary Analysis - Halvar Flake.eng.json 2.7 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-van-der-Walt-When-the-Tables-Turn-English.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss, Gillman Louie - Welcome Keynote.mp4.json 2.7 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Measure Security Effectively.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 1-2.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/RFID Hacking - Live Free or RFID Hard.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Deputies Are Still Confused.eng.json 2.7 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Martin_Barnum_Christey.pdf 2.7 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/More Tricks for Defeating SSL - Moxie Marlinspike.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Million Browser Botnet.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Passive Bluetooth Monitoring.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Outer Limits - Hacking The Samsung Smart TV.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Drop the SOAP Real World Web Service Testing for Web Hackers - Tom Eston, Joshua Abraham.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Visual Forensic Analysis and Reverse Engineering of Binary Data - Greg Conti, Erik Dean.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Making Windows Exploits More Reliable - Kostya Kortchinsky.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Next Level Cheating and Leveling Up Mitigations.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jason Garms - Defending Windows 2000 on the Internet.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mike Beekey - ARP Vulnerabilities Indefensible Local Network Attacks.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Tzi-cker Chiueh - Program Semantics Aware Intrusion Detection.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Nobody is Listening to Your Phone Calls. - Really A Debate and Discussion on the NSA s Activities.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/CANAPE - Bytes Your Bits.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/SensePost - Putting Tea back into CyberTerrorism.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Above My Pay Grade - Cyber Response at the National Level.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Practical Windows XP2003 Heap Exploitation - John McDonald, Chris Valasek.eng.json 2.7 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/FrontPage Server Extensions on Windows Server 2003 - Mark Burnett.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Feaver - Kenneth Greers - Cyber Jihad and the Globalization of Warfare.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Chris Eng - Breaking Crypto.eng.json 2.7 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Laspe_Raber_Deobfuscator/BH_US_08_Laspe_Raber_Deobfuscator.pdf 2.7 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Keynote - What Got Us Here Wont Get Us There.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Vasilomanolakis-I-Trust-My-Zombies-A-Trust-Enabled-Botnet.pdf 2.7 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Group Talk.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Trillions of Lines of Code and Counting Securing Applications At Scale - Jeremiah Grossman, Brad Arkin, Alex Hutton, Adrain Lane, John Johnson.eng.json 2.7 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Forgotten World - Corporate Business Application Systems - Alexander Polyakov.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jennifer Grannick - Forensic Issues in Hacker Prosecutions.eng.json 2.7 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Physical Security in a Networked World - Video Surveillance, Video Analytics, and you - Joshua A Marpet.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dai Zovi - Hardware Virtualization.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lights Off The Darkness of the Smart Meters.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Windows Hooks of Death Kernel Attacks Through User-Mode Callbacks - Tarjei Mandt.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Stepping p3wns - Adventures in Full Spectrum Embedded Exploitation.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 1997/Richard Thieme - Keynote.opus 2.7 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Beyond Files Forensic OWADE Cloud Based Forensic - Elie Bursztein.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Veysset and Butti - Wifi Adv Stealth.opus 2.7 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gbadegesin - TCPIP in WIN Vista.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Sherma - Web Application Session Strength.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Security Paradigm.eng.json 2.7 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Beyond AutoRun - Exploiting Software Vulnerabilities with Removable Storage - Jon Larimer.eng.json 2.7 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Okatani - Keynote - Japanese.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Scott Culp - Building a Security Response Process.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Karakostas-Ctx-Eliminating-BREACH-With-Context-Hiding.pdf 2.7 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/The Role of Non Obvious Relationships in the Foot Printing Process - Haroon Meer, Charl Van Der Walt.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The SCADA That Didn't Cry Wolf - Who s Really Attacking Your ICS Devices - 2 2.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Death of 1000 Cuts.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Smartphone s Apps Are Not That Smart - Insecure Development Practices.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Off Grid communications with Android - Meshing the mobile world.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mudge - Economics Physics Psycology.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2009/audio/09_BHB_K1.mp3 2.7 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Bochspwn - Identifying 0-Days via System-Wide Memory Access Pattern Analysis.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Funderbolt - Adventures in Thunderbolt DMA Attacks.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Laws of Vulnerabilities Research Version 2.0 Comparing Critical Infrastructure Industries - Panel.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Multiplexed Wired Attack Surfaces.eng.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Sklyarov-Intel-ME-Flash-File-System-Explained.pdf 2.7 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Johnny Long Me to We - Johnny Long.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Schulman - Phishing with Asterisk.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Lee Kushner - The State of Employment in the Information Security Industry.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Mortman, Others - National ID Debate.json 2.7 MB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/injectso Modifying and Spying on Running Processes Under Linux - Shawn Clowes.eng.json 2.7 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hacking the Fast Lane - Security issues in 802.11p, DSRC and WAVE - Bruno Goncalves de Oliveira & Rob Havelt.eng.json 2.7 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Time Trial - Racing Towards Practical Timing Attacks.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/McFeters_Carter_Heasman_Client-side_Exploitation/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf 2.6 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Lifecycle of a Phone Fraudster - Exposing Fraud Activity.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David Litchfield - Compromising web Servers and Defensive Techniques.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Insider's Guide to Cyber-Insurance and Security Guarantees.eng.json 2.6 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Arkin-ppt.pdf 2.6 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Ablon-Zero-Days-Thousands-Of-Nights-The-Life-And-Times-Of-Zero-Day-Vulnerabilities-And-Their-Exploits.pdf 2.6 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Something to Do with Network Security - Dan Kaminsky.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Ofir Arkin - Revolutionizing Operating System Fingerprinting.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Even The Lastpass Will Be Stolen, Deal With It.eng.json 2.6 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Botnet Population and Intelligence Gathering Techniques - Christopher Davis & David Dagon.eng.json 2.6 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Apple Sand Box - Dionysus Blazakis.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eric Schultze and George Kurtz - Over the Router, Through the Firewall, to Grandma's House We Go.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Cardwell.pdf 2.6 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Java Every-Days - Exploiting Software Running on Three Billion Devices.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Greg Hoglund - Runtime Decompilation.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace.eng.json 2.6 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Active & Passive Fingerprinting of Microsoft Based Operating Systems using the ICMP protocol - Ofir Arkin.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BlackOps.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Scala Security - Examining the Play and LiftWeb Frameworks.eng.json 2.6 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Ha-Check_Your_Zombie_Devices_Slides.pdf 2.6 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Potter - Trusted Computing Revolution.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Automated Detection of HPP Vulnerabilities in Web Applications - Marco Balduzzi.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Abusing Software Defined Networks.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jeffrey Prusan - Technical Security Countermeasures.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sensepost - When The Tables Turn.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Goktas-Bypassing-Clangs-SafeStack.pdf 2.6 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Davis, Ozier, Nebel, and Migues - Panel Discussion.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unveiling the Open Source Visualization Engine for Busy Hackers.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Malware.eng.json 2.6 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The WOMBAT API - Querying a global network of advanced honeypots - Stefano Zanero, Paolo Milani Comparetti.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Buying into the Bias - Why Vulnerability Statistics Suck.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Li-When-Virtualization-Encounters-AFL-A-Portable-Virtual-Device-Fuzzing-Framework-With-AFL.pdf 2.6 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/An Uninvited Guest Who Won't Go Home - Bill.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/One-Way SQL Hacking - JD Glaser & Saumil Udayan Shah.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Inside Android's SafetyNet Attestation.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-OHanlon-WiFi-IMSI-Catcher.pdf 2.6 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Security Wolf of Wall Street - Fighting Crime With High Frequency Classification and.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ira Winkler - Who are the Real Black Hats.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Defending Against Malicious Application Compatibility Shims.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Seth Fogie - Pocket PC Abuse.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/FX - Design and Software Vulnerabilities In Embedded Systems.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/How to Impress Girls with Browser Memory Protection Bypasses - Alexander Sotirov, Mark Dowd.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Andrew Van der Stock - OWASP Guide.eng.json 2.6 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Belenko-iOS_Data_Protection.pdf 2.6 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David LeBlanc - Real World Techniques in Network Security Management.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Wireless Overview - Protocols and Threat Models.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Going Auth The Rails On A Crazy Train.eng.json 2.6 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/OpenQVis/qt-mt230nc.dll 2.6 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Factoring Dead - Preparing for Cyptopocalypse.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/GRR - Find All the Badness, Collect All the Things.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Siberman Richard Johnson - Comparison Buffer Overflow Prevention Implementations and Weaknesses.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2002/presentations/hoglund-bh-us-02-apsecurity.ppt 2.6 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Language Properties of Phone Scammers - Cyberdefense At the Level of the Human.eng.json 2.6 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.jp.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Microsoft Vista NDA-less The Good, The Bad, and The Ugly - Chris Paget.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/V9-Scholz-SIP Stack Fingerprinting.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Last Stage Of Delirium Research Group - UNIX Assembly Codes Development for Vulnerabilities.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bringing a Machete to the Amazon.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Oracle Data Redaction is Broken by David Litchfield.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Data Mining a Mountain of Zero Day Vulnerabilities.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Panel - Competitive Intelligence.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeremiah Grossman - Phishing with Super Bait.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Politics of Vulnerability Reporting - Scott Blake.eng.json 2.6 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Ridley-Escaping-The-Sandbox-slides.pdf 2.6 MB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/X-Remote ICMP Based OS Fingerprinting Techniqu es - Ofir Arkin.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Post Memory Corruption Memory Analysis - Jonathan Brossard.eng.json 2.6 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/DTRACE The Reverse Engineer’s Unexpected Swiss Army Knife - David Weston, Tiller Beauchamp.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Filiol-By-Design-Backdooring-Of-Encryption-System-Can-We-Trust-Foreign-Encryption-Algorithms.pdf 2.6 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits.eng.json 2.6 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.jp.eng.json 2.6 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-leibrock.pdf 2.6 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/CloudBots - Harvesting Crypto Coins Like a Botnet Farmer.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Marshall Beddoe and Chris Abad - The Siphon Project.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roelof Temmingh and Haroon Meer - Setiri.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Win at Reversing - Nick Harbour.eng.json 2.6 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Waldron - VOIP Security Essentials.opus 2.6 MB
- Black Hat USA/Black Hat USA 2008/conference cd/viewers/FoxitReader23_setup.exe 2.6 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloudburst - Hacking 3D and Breaking Out of VMware - Kostya Kortchinsky.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.eng.json 2.6 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Revisiting XSS Sanitization.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Stefano Zanero - Detecting 0 Day Attacks with Learning IDS.eng.json 2.5 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Next Level Cheating and Leveling Up Mitigations.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/(In-)Security of Backend-As-A-Service.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Simple Nomad - Covering Your Tracks.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Power Analysis Attacks for Cheapskates.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybercrime in The Deep Web.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Stephenson - Introduction to Cyber Forensic Analysis.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hardening Windows 8 apps for the Windows Store.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Dex Education.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Evans.pdf 2.5 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Evans.pdf 2.5 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Random Number Generator in PHP.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.eng.json 2.5 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Mobile-Telephony Threats in Asia.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploiting Rich Content - Riley Hassell.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/When the Lights Go Out - Hacking Cisco EnergyWise.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/From Coordinated Disclosure to Cooperative Vulnerability When Dealing w - Critical Software Stacks.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Insider Data Theft.eng.json 2.5 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/MLD Considered Harmful - Breaking Another IPv6 Subprotocol.eng.json 2.5 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Keynote - Cyber Conflicts - Challenging the Future - Pat Arnold.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/SADE Injecting Agents in to VM Guest OS - Matt Conover.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/SSL TLS Interception Proxies and Transitive Trust.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Implementing the Lessons Learned From a Major Cyber Attack.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Investigating DDOS - Architecture Actors and Attribution.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Stay Out of the Kitchen - A DLP Security Bake-Off.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Apple vs. Google Client Platforms.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sutton and MacManus - Punk 0de.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dan Kaminsky - the Black Ops of DNS.eng.json 2.5 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Interpreter Exploitation - Pointer Inference and JIT Spraying - Dion.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Shipley and Tom Jackiewicz - Security Issues with Implementing and Deploying the LDAP Directory System.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Black Ops of PKI - Dan Kaminski.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Call Me - Gathering Threat Intelligence on Telephony Scams to Detect Fraud.eng.json 2.5 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Dynamic Fireware Analysis At Scale - A Case Study on Embedded Web Interfaces.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BeEF attack with MITM.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/The Other Side of Information Security - Wilco van Grinkel.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Plenty of Coppers in Change - Stuart Hyde.eng.json 2.5 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Rapid Radio Reversing.eng.json 2.5 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Geers - Eisen - IPv6 - Update - Japanese.eng.json 2.5 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Rutkowska - Subverting Vista - English.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/JD Glaser - Hacking With Executives.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Butti/Presentation/bh-eu-07-butti-handouts.pdf 2.5 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Security Myths of Extended Validation SSL Certificates - Alexander Sotirov, Mike Zusman.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pay No Attention to That Hacker Behind the Curtain - A Look Inside the Black Hat Network.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSL And The Future of Authenticity - Moxie Marlinspike.eng.json 2.5 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Stealing with BGP - Steve Dugan.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Beyond the Mcse - Active Directory for the Security Professional.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Simple Nomad - Strategies for Defeating Distributed Attacks.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Automating Incident Response.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Poacher Turned Gamekeeper - Lessons Learned from Eight Years of Breaking Hypervisors.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Adam Shostack - Identity, Economics, Security, and Terrorism.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Spy-Sense Spyware Tool for Executing Stealthy Exploits Against Sensor Networks - Thanassis Giannetsos.eng.json 2.5 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Manna from Heaven - Improving the State of Wireless Rogue AP Attacks.eng.json 2.5 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Trustworthy Computing Update - Scott Clup.eng.json 2.5 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Defending Privacy at the U.S. Border - A Guide for Travelers Carrying Digita.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/WebTracking for You.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Detecting & Preventing the Xen Hypervisor Subversions - Joanna Rutkowska, Rafal Wojtczuk.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Miniaturization.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hiding In Plain Sight - Advances In Malware Covert Communication Channels.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/What s on the Wire - Physical Layer Tapping with Project Daisho.eng.json 2.5 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Heelan-Heap-Layout-Optimisation-For-Exploitation.pdf 2.5 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Fredric Bret - Mounet - Automated Detection of COM Vulnerabilities.eng.json 2.5 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Lawful Access Panel.eng.json 2.4 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hopping on the CAN Bus.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 1.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/AMF Testing.eng.json 2.4 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Classification and Detection of Application Backdoors - Chris Wysopal.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Who's Really Attacking Your ICS Devices.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Threats.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unmasking You - Joshua Abraham, Robert Hansen.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Michael Sutton, Adam Greene - Art Of File Format.json 2.4 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Asia 2016.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Schneier - Keynote, Following the Money Security Proxies and Agenda.eng.json 2.4 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Vivisection of an Exploit Development Process - David Aitel.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Butti/Presentation/bh-eu-07-Butti.pdf 2.4 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-Butti.pdf 2.4 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Just-In-Time Code Reuse - The More Things Change, the More They Stay the Same.eng.json 2.4 MB
- Black Hat DC/Black Hat Federal 2006/Combatting Symbian Malware - Jarno Niemelä.eng.json 2.4 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Exploiting Lawful Interception to Wiretap the Internet.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Shelters or Windmills - The Struggle For Power and Information Advantage.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 1.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zanero - HostBased Anomaly Detection.eng.json 2.4 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Hunting Flaws in MS SQL Server - Cesar Cerrudo, Aaron Newman.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Virt-ICE next gen debugger for malware analysis - NGUYEN Anh Quynh.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Retrospective on the Use of Export Cryptography.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2006/presentations/007_Edge.pdf 2.4 MB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 - Vertical Reel.mp4 2.4 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Practical New Developments in The Breach Attack.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Highway to Hell Hacking Toll Systems - Nate Lawson.eng.json 2.4 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cache Side Channel Attack - Exploitability and Countermeasures.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Keynote Blue to Red Traversing the Spectrum by Amanda Rousseau.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Hardware-Enforced Security With Hypervisors.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Finnigan - How to Unwrap Oracle.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Measuring Adversary Costs to Exploit Commercial Software.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Tao of Hardware the Te of Implants.eng.json 2.4 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/iPhone Privacy - Nicolas Seriot.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Paul Bohm - Taming Bugs.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Wi-Fi Advanced Fuzzing - Laurent Butti.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 1-2 - John Benson.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Mike Schiffmman - The Firewalk Tool.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Behind the Scenes of iOS Security.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions.eng.json 2.4 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Man-in-the-SCADA - Anatomy of Data Integrity Attacks in Industrial Control Systems.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016.eng.json 2.4 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.jp.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gutterman - Vulns Linux Random Num.eng.json 2.4 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Multivariate Solutions To Emerging Passive DNS Challenges.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Cyber-Attacks & SAP systems - Is Our Business-Critical Infrastructure Expose.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Crack a Microcell.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/ClusterFuzz Fuzzing at Google Scale.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Adam Laurie - Martin Hurfurt - BlueSnarfing the Risk from Digital Pickpockets.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Mesh Stalkings-Penetration Testing with Small Networked Devices.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking SMS - Zane Lackey, Luis Miras.eng.json 2.4 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.jp.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/BlackHat_EU_2011_Neely_EAPeak-Slides.pdf 2.4 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Grossman - Hacking Intranet - English.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Finding Holes in Closed-source Software - Havlar Flake.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 1-2 - Lukas Grunwald.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Zusman_Abusing_SSL_VPNs/BH_US_08_Zusman_SSL_VPN_Abuse.pdf 2.4 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Scott Blake - The Pros and Cons of Hiring Hackers.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Flip Feng Shui - Rowhammering the VM's Isolation.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting the iOS Kernel - Stefan Esser.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/DPTrace - Dual Purpose Trace for Exploitability Analysis of Program Crashes.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Library of Sparta.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Larry Korba - Hope Hype and Horrors E - Commerce Explored.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/iRK - Crafting OS X Kernel Rootkits - Jesse D’Aguanno.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gerard Eschelbeck - The laws of Vulnerabilities for Internal Networks.eng.json 2.4 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.jp.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Chris Schimdt on OWASP ESAPI Project.mp4 2.4 MB
- Black Hat USA/Black Hat USA 2007/presentations/Belani_and_Jones/Presentation/bh-usa-07-belani_and_jones.pdf 2.4 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ofir Arkin - Introducing X Playing Tricks with ICMP.eng.json 2.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Design Approaches for Security Automation.eng.json 2.4 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.json 2.3 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Kitchen's Finally Burned Down - DLP Security Bakeoff.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 2.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.json 2.3 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.eng.json 2.3 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet.eng.json 2.3 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Detection of Firefox Extension Reuse Vulnerabilities.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Torturing OpenSSL.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Silently Breaking ASLR In The Cloud.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using EMET to Disable EMET.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2009/video/Welcome and Introduction to Black Hat USA 2009 - Jeff Moss.mp4 2.3 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/How can the Security Researcher Community Work Better for the Common Good - Jeff Moss, Roger Cumming.eng.json 2.3 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-art-of-cyberwar-geers-book.pdf 2.3 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sophail A Critical Analysis of Sophos Antivirus - Tavis Ormandy.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Yang-Signing-Into-Billion-Mobile-Apps-Effortlessly-With-OAuth20.pdf 2.3 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/VirtuallySecure - Oded Horovitz, Tal Garfinkel.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Can You Trust Me Now An Exploration Into the Mobile Threat Landscape.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Trust, Security and Society.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mark Kadrich - Intrusion Detection in High Speed Networks.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Building a Defensive Framework for Medical Device Security.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Prevalent Characteristics in Modern Malware.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Is Your Mental Health for Sale.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dominique Brezinski - Building a Forensics Toolkit That Will Protect You from Evil Influences.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Hacking Databases for Owning Your Data - Cesar Cerrudo & Esteban Martinez Fayo.eng.json 2.3 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacks to SAP Web Applications - Your crown jewels online - Mariano Nunez Di Croce.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Iran's Soft-War for Internet Dominance.eng.json 2.3 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Kenneth-Geers-Hacking-in-a-Foreign-Language-A-Network-Security-Guide-to-Russia-and-Beyond-English.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Sutton&Greene - The Art Of File Format Fuzz.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Phil Zimmerman - My Next Big Project.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/What the Fuzz.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Router Exploitation - FX.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Rebecca Mercuri - Bev Harris - Managing Election Data The California Recall.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Phillip Hallam - Baker - Phishing - commiting Fraud in Public.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SMTP Information Gathering - Lluis Mora.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Nicolas Fischbach - DDoS Mitigation and Analysis at the Infrastructure Level.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Renaud Deraison - The Nessus Project Reducing the Costs of Vulnerability Assessment.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Larry Leibrock - Digital Information, User Tokens, Privacy and Forensics Investigations The Case of Windows XP Platform.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Spradlin - Auditing data Access.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware.eng.json 2.3 MB
- Black Hat DC/Black Hat Federal 2006/Nematodes - Dave Aitel.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Rooting SIM cards.eng.json 2.3 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Enhancing ZFS in the Kernel - Soy Christian Kendi.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Kimball Code Integrate Vunl audit.opus 2.3 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Smart Nest Thermostat - A Smart Spy in Your Home.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Stoned Bootkit - Peter Kleissner.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Brent Huston - Appliance Firewalls a detailed review.eng.json 2.3 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Meyer-Attacks-Against-GSMAS-M2M-Remote-Provisioning.pdf 2.3 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Stamos_Thiel_Osborne_RIA_World/BH_US_08_Stamos_Thiel_Osborne_Living_RIA_World.pdf 2.3 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Beast is in Your Memory.eng.json 2.3 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Fireside Chat - Debora Plunkett and Jeff Moss.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 1-2.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Stegospolit - Exploit Delivery With Steganography and Polyglots.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Scott Blake - Politics of Vulnerabilities.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 2-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AirBnBeware - Short Term Rentals Long Term Pwnage.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/APTs Way - Evading Your EBNIDS.eng.json 2.3 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Chris-Hurley-Identifying-and-Responding-to-Wireless-Attacks-English.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert J Hansen, Meredith L Patterson - Stopping Injection.json 2.3 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pointers and Handlers - Alex Ionescu.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Black-box Assessment of Pseudorandom Algorithms.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - The Black Hat Testimonies.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Defending Your Network with Kerberos - Rooster & J.D. Glaser.eng.json 2.3 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Forging the USB Armory.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Xenpwn - Breaking Paravirtualized Devices.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/K K Mookhey - Evasion and Detection of Web Application Tactics.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lessons Learned from Eight Years of Breaking Hypervisors.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Breaking Access Controls with Blekey.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deeper Door Exploiting the NIC Chipset - Sherri Sparks, Shawn Embleton.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Beyond Scanning - Automating Web Application Security Tests.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Computrace Backdoor Revisited.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hell on Earth - From Browser to System Compromise.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/VOIP Wars - Destroying Jar Jar Lync.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Franco - Case Studies Secure Dev IE7.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Intrusion Detection.eng.json 2.3 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Preventing Oh Shit Moments for 20 Euros or Less.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Peter Shipley - Securing your Network with Free Utilities.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP Cookie Hijacking in the Wild - Security and Privacy Implications.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jim Litchko - Total BS Security business - based systems security.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2002/presentations/endler/endler-us-02-webapps101.ppt 2.3 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The State of Incident Response by Bruce Schneier.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/MAC EFI Rootkits.eng.json 2.3 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Mandia.pdf 2.3 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/0-Knowledge Fuzzing - Vincenzo Iozzo.eng.json 2.3 MB
- Black Hat DC/Black Hat DC 2008/Presentations/Tarnovsky/Presentation/bh-dc-08-tarnovsky.pdf 2.3 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.jp.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/James Bamford - Researching Secrets Part II.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/End-to-end Analysis of Domain Generating Algorithm Malware Family.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Next Generation Debuggers for Reverse Engineering - ERESI Team.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Chain of Fools An Exploration of Certificate Chain Validation Mishaps.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Timur Duehr on RagWeed.mp4 2.2 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Adam Shostack - Will People Ever Pay for Privacy.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Alternative Medicine The Malware Analyst’s Blue Pill - Paul Royal.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Maximizing Home-field Advantage.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking the Corporare Mind.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/KEYNOTE - Whitfield Diffie.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Saving Cyberspace by Jason Healey.eng.json 2.2 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Unmanned Aerial Vehicles - Exploit Automation with the Metasploit Framework - James Lee.eng.json 2.2 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Hideaki-Ihara-Forensics-in-Japan-Japanese.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sotirov - HotPatching3rd Party Patch.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/A Peek Under the Blue Coat.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/MoRE Shadow Walker - The Progression of TLB-Splitting on x86.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jamie Butler - Greg Hoglund - VICE Catch the Hookers.eng.json 2.2 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Michael-Sutton-Adam-Green-The-Art-of-File-Format-Fuzzing-English.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jon David - Putting Intrusion Detection into Intrusion Detection Systems.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ofir Arkin - Bypassing NAC Systems.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/DevSecOps - What, Why and How.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/VoIP Wars - Attack of the Cisco Phones.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding IMSI Privacy.eng.json 2.2 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.jp.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Heavy Metal That Poisoned the Droid.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hunting the Shadows - In-Depth Analysis of Escalated APT Attacks.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Horse Pill - A New Type of Linux Rootkit.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BinaryPig - Scalable Malware Analytics in Hadoop.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Padgett Peterson - Overlooked Local Attack Techniques.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Exploring Yosemite - Abusing Mac OS X 10.10.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mobile Device Mismanagement.eng.json 2.2 MB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-grossman.pdf 2.2 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 1 - Val Smith, Colin Ames & David Kerb.eng.json 2.2 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/From Zero to Secure in One Minute.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Halvar Flake - Diff Navigate Audit.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Abusing Bleeding Edge Web Standards for Appsec Glory.eng.json 2.2 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Unknown-English to Japanese.eng.json 2.2 MB
- Black Hat DC/Black Hat Federal 2006/Characterising the real threats to our nation’s critical information systems - Tom Parker, Matthew G Devost.eng.json 2.2 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Why Government Systems Fail at Security - Chey Cobb.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Software Exploitation.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/VoIP Wars - the Phreakers Awaken.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploiting Firefox.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rich Murphy - Locking Down Your FreeBSD Install.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HEIST - HTTP Encrypted Information can be Stolen Through TCP-Windows.eng.json 2.2 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Oracle Security II - David Litchfield.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Demystifying the Secure Enclave Processor.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cushman - MS Security fundamentals.eng.json 2.2 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Exploiting Linux and Pax ASLR's Weaknesses on 32 Bit and 64 Bit Systems.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-fischbach.pdf 2.2 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-fischbach.pdf 2.2 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/IO in the Cyber Domain, Immunity Style - Sinan Eren & Dave Aitel.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Journey to Protect Points-of-Sale.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP 2 & Quic - Teaching Good Protocols to Do Bad Things.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Multiple Operation System Vurnarability.eng.json 2.2 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Web Application Security -Jeremiah Grossman, Bill Pennington.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Welcome & Introduction to Black Hat USA 2011 Jeff Moss, Keynote Speaker Cofer Black.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Tackling Privilege Escalation with Offense and Defense.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Towards a Holistic Approach in Building Intelligence to Fight Crimeware.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Devil Does Not Exist - The Role of Deception in Cyber.eng.json 2.2 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.jp.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Ghost in the Air (Traffic).eng.json 2.2 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Decrypting DPAPI data - Jean-Michel Picod, Elie Bursztein.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Interview with Neal Stephenson.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Meet the Feds.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Reversing a Japanese Wireless SD Card - From Zero to Code Execution.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Sniff Keystrokes with Lasers Voltmeters - Andrea Barisani, Daniele Bianco.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.eng.json 2.2 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stale pointers are the new black - Vincenzo Iozzo, Giovanni Gola.eng.json 2.2 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Paul Simmons - Welcome to Black Hat.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Predictable PRNG in the vulnerable Debian OpenSSL package, the What and the How - Luciano Bello and Maximiliano Bertacchini.eng.json 2.2 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Analyzing an Unknown RF Based Data Transmission (Aka Fun with 27Mhz Wireless Keyboards) - Max Moser.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The BEAST Wins Again - Why TLS Keeps Failing to Protect HTTP.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2 2).eng.json 2.2 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.jp.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Capturing 0Day Exploits With Perfectly Placed Hardware Traps.eng.json 2.2 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Decentralized Malware on The Blockchain.eng.json 2.2 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dominique-Brezinsski-A-Paranoid-Perspective-of-an-Interpreted-Language-English.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device.eng.json 2.2 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mifare - Little Security, Despite Obscurity - Karsten Nohl.eng.json 2.2 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Attacking IPv6 Implementation Using Fragmentation.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Payment Points of Interaction (POI).eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2007/presentations/Dwivedi_and_Lackey/Presentation/bh-usa-07-dwivedi_and_lackey.pdf 2.1 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Evasion of High-End IDPS Devices at the IPv6 Era.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2006/presentations/039_Finnigan.pdf 2.1 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - The Seven Axioms of Security.eng.json 2.1 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Connection String Attack - Chema Alonso & Palako.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More 0-Days (or Code-Based Intrusion Detection by Korset) - Ohad Ben-Cohen.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Intra-Process Memory Protection for Applications on ARM and X86 - Leveraging the ELF ABI.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Halvar Flake - Need New Tools.eng.json 2.1 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Kortti - Input Attack Trees - Japanese.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Pin Pad Pwn.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Auger and Sima - 0day subscriptions.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Saumil Shah - Defeating Automated Web Assessment Tools.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerability Extrapolation or Give Me More Bugs Like That, Please - Fabian Yamaguchi.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/UART THOU MAD.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Reverse Engineering and Exploiting Builds in the Cloud.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Paul Knight - Dynamic Routing Inside IPsec VPNs.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Governments As Malware Authors - The Next Generation.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Remote Malicious Butler Did It.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Maynor - NX - How Well Does it Say NO.json 2.1 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Netscreen of the Dead - Graeme Neilson.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Xavier Mertens (xme) on Pastemon.mp4 2.1 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Probing The Mobile Operating Networks.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Applied Machine Learning for Data Exfil and Other Fun Topics.eng.json 2.1 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Locknote Conclusions and Key Takeaways from Black Hat Asia 2022.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Viral Infections in Cisco iOS - Ariel Futoransky.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/I Know Your Filtering Policy Better than You Do.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/SGX Secure Enclaves in Practice - Security and Crypto Review.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Cisco IOS Shellcodes Backdoors - Gyan Chawdhary, Varun Uppal.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hardening AWS Environments and Automating Incident Response for AWS Compromises.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor.zip 2.1 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When the Cops Come A-Knocking - Handling Technical Assistance Demands from Law Enforcement.eng.json 2.1 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.jp.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Padgett Peterson - Securing EMail Gateways from Attacks - What to do While Waiting for Vendors to Respond to the latest virus and worms.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When Governments Attack - State Sponsored Malware Attacks Against Activists Lawyers and Journalists.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OptiROP - The Art of Hunting ROP Gadgets.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fact and Fiction - Defending Medical Device.eng.json 2.1 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/24 Techniques to Gather Threat Intel and Track Actors.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Femtocells A Poisonous Needle in the Operator’s Hay Stack - Nico Golde, Kevin Redon.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Timing Attacks Have Never Been So Practical - Advanced Cross-Site Search Attacks.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/van_Beek_ePassports_Reloaded/bh_us_08_van_Beek_ePassports_Reloaded_Slides.pdf 2.1 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/HTTP Desync Attacks Request Smuggling Reborn.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Arkin.pdf 2.1 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Invisibility Purge - Unmasking the Dormant Events of Invisible Web Controls.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 2-2.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Sandbox Roulette - Are You Ready For The Gamble.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Stateful Inspection of FireWall-1.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Bing/Presentation/bh-eu-07-bing.pdf 2.1 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bing.pdf 2.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass-the-Hash 2 - The Admin's Revenge.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/iOS Kernel.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TLS - SECRETS.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Tatum - Managing the External Environment.eng.json 2.1 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Biometric and Token-Based Access Control Systems - Zac Franken.eng.json 2.1 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bohm - Taming Bugs - English.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Maximiliano Caceres - Syscall Proxying.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Evasion of Web Application.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Blended Web and Database Attacks on Real-Time, In-Memory Platforms.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/SQL Injections.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Mobile Malware Madness, and How To Cap the Mad Hatters - Neil Daswani.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure in 2010 Broken in 2011.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brett Moore - Shoot the Messenger.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hardware Backdooring.eng.json 2.1 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Ha-Check_Your_Zombie_Devices_WP.pdf 2.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hackproofing Oracle Ebusiness Suite.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exchanging Demands.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Base - Security (or lack thereof) and our Friends in Redmond.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Physical Memory Forensics for Files and Cache - Jamie Butler, Justin Murdock.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Introducing Ring -3 Rootkits - Alexander Tereshkin & Rafal Wojtczuk.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Multiplayer Online Games Insecurity.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Siemens Simatic S7 PLC Exploitation - Dillon Beresford.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Dissecting CSRF Attacks and Countermeasures.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Java Exploitation.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Home Invasion v2.0 - Attacking Network-Controlled Hardware.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Simple Nomad and Todd Sabin - The RAZOR Warez.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor Folder/Sessions.CAB 2.1 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.json 2.1 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Amol_SCADA_Slides.pdf 2.1 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard Clarke - Keynote National Strategy for Securing Cyberspace.eng.json 2.1 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Fireside Chat with U.S. National Cyber Director Chris Inglis.eng.json 2.1 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Nitesh_Dhanjani/BlackHat_EU_2011_Dhanjani_Attacks_Against_Apples_iOS-WP.pdf 2.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/I Can Hear You Now - Traffic Interception and Remote Mobile Phone Cloning.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Into the Core - In-Depth Exploration of Windows 10 IoT Core.eng.json 2.1 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SmartCard APDU Analysis - Ivan Buetler.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf 2.0 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Performance Optimization Weaknesses to Bypass ASLR.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Halvar Flake - Graph Based Binary Analysis.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Complexity in Computer Security - a Risky Business - Jeff Moss, Ian Angell.eng.json 2.0 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-slides.pdf 2.0 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Pwnie Awards.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Sensepost.pdf 2.0 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Sensepost.pdf 2.0 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Teresa Lunt - Taxonomy of Intrusion Detection Systems.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Virtualization Under Attack Breaking Out of KVM - Nelson Elhage.eng.json 2.0 MB
- Black Hat DC/Black Hat DC 2008/Presentations/Franken/Presentation/bh-dc-08-franken.pdf 2.0 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Thorsen Holz - Maximilliam Dornseif - NoSEBrEaK Defeating Honeypots.eng.json 2.0 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Let's See What's Out There - Mapping the Wireless IOT.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert Morris Sr - Non-Cryptographic Ways.json 2.0 MB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 2 by Jose Miguel Esparza.eng.json 2.0 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Responsibility for the Harm and Risk of Security Security Flaws - Cassio Goldschmidt.eng.json 2.0 MB
- Black Hat DC/Black Hat Federal 2006/Implementing and Detecting An ACPI BIOS Rootkit - John Heasman (bad audio quality).eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pulling Back the Curtain on Airport Security - Can a Weapon Get Past TSA.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Sensepost.pdf 2.0 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Analysis of the Attack Surface of Windows 10 Virtualization-Based Security.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Doors of Durin The Veiled Gate to Siemens S7 Silicon.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Mo’ Money Mo’ Problems - Jeremiah Grossman, Trey Ford.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crippling HTTPs With Unholy PAC.eng.json 2.0 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fully Arbitrary 802.3 Packet Injection - Maximizing Ethernet Attack Surface.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daniel VanBelleghem - Solving Network Mystries.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2007/presentations/Laurie/Presentation/bh-usa-07-laurie.pdf 2.0 MB
- Black Hat DC/Black Hat DC 2008/Presentations/Laurie/Presentation/bh-dc-08-laurie.pdf 2.0 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Numchecker - A System Approach for Kernel Rootkit Detection.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Corina-Difuzzing-Android-Kernel-Drivers.pdf 2.0 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mohney - Defend with Voice Analytics.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/New Botnets Trends and Threats - Augusto Paes de Barros, André Fucs & Victor Pereira.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Multipath TCP - Breaking Today s Networks with Tomorrow s Protocols.eng.json 2.0 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Year in Flash.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Exploiting Adobe Flash Player In The Era Of Control Flow Guard.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Assortment of Database Goodies.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them_en.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Thomas_Roth/BlackHat_EU_2011_Roth_Breaking_encryptions-Slides.pdf 2.0 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Jinx - Malware 2.0 - Itzik Kotler, Jonathan Rom.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Bypassing Secure Boot Using Fault Injection.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Paging All Windows Geeks - Finding Evil in Windows 10 Compressed Memory.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Insane Detection of Insane Rootkits - Yuriy Bulygin.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2012/tools tube/Matias Katz & Maxi Soler.mp4 2.0 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Atkinson-A-Process-Is-No-One-Hunting-For-Token-Manipulation-wp.pdf 2.0 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Creating a Spider Goat - Security with Intel CPU Transactional Memory Support.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/GS and ASLR in Windows Vista - Ollie Whitehouse.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Klein - Soc Engineering Methodology.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Seri-BlueBorne-A-New-Class-Of-Airborne-Attacks-Compromising-Any-Bluetooth-Enabled-Linux-IoT-Device-wp.pdf 2.0 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Video Conferencing Systems.eng.json 2.0 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-pokingserverswithFacebook-Walikar-WP.pdf 2.0 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Vulnerability Exploitation In Docker Container Environments.eng.json 2.0 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Beyond the Blacklists - Detecting Malicious URL Through Machine Learning.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 2-2.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ben Laurie - CaPerl.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Scott Blake - Dog of War Attack Box Design.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Canspy - A Platform for Auditing Can Devices.eng.json 2.0 MB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 1 by Jose Miguel Esparza.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Ralf Spenneberg - IKE Testing IKE Implementations.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Dube-Rios/Whitepaper/bh-eu-07-rios-WP.pdf 2.0 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-rios-WP.pdf 2.0 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwnie Awards 2016.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking Intel Bios - Rafal Wojtczuk, Alexander Tereshkin.eng.json 2.0 MB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shinder.pdf 2.0 MB
- Black Hat USA/Black Hat USA 2012/tools tube/Konrads Smelkovs.mp4 2.0 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Let s Get Physical - Breaking Home Security Systems and Bypassing Building Controls.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to Build a SpyPhone.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Breaking the Security of Physical Devices by Silvio Cesare.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hacking Next-Gen ATMs - From Capture to Cashout.eng.json 2.0 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eugene Schultz - Security Issues with Configuring and Maintaining an IIS 4 Server.eng.json 2.0 MB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-rauch.pdf 2.0 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/GreatFET - Making GoodFET Great Again.eng.json 2.0 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2021.eng.json 2.0 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/PLC Blaster - A worm Living Solely In The PLC.eng.json 2.0 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Keynote-The-Day-After-Katsuya-Uchida-Japanese.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Issues with Embedded Device Disclosures - Helping the Vendors and Recognizin.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Entrapment - Tricking Malware with Transparent, Scalable Malware Analysis.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Web Exploit Toolkits.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to grow a TREE (Taint-Enabled Reverse Engineering Environment) from a CBASS.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Automated Malware Analysis.eng.json 1.9 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Nightmare Behind The Cross Platform Mobile Apps Dream.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Using Online Activity as Digital DNA to Create a Better Spear Phisher.eng.json 1.9 MB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Wicherski-Holz.pdf 1.9 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking Big Data - Evading Analysis of the Metadata of Your Life.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Honeypot That Can Bite - Reverse Penetration.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Analyzing SPDY Getting to Know the New Web Protocol - Thomas Roth.eng.json 1.9 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/David-Maynor-Architecture-Flaws-in-Common-Security-Tools-English.eng.json 1.9 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jamie-Butler-Sherri-Sparks-Rootkit-Detection-English.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Capstone - Next Generation Disassembly Framework.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Journey From JNDI LDAP Manipulation to Remote Code Execution Dream Land.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Honey, I'm Home - Hacking Z-Wave Home Automation Systems.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/36 Views of Cyberspace.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2007/presentations/Roecher_and_Thumann/Presentation/bh-usa-07-roecher_and_thumann.pdf 1.9 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Robert Hansen - htaccess Scripts in Apache Environments.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwning Your Java Messaging With Deserialization Vulnerabilities.eng.json 1.9 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Oracle 11g (or has Oracle's security posture really changed - David Litchfield.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Practical Attack Against VDI Solutions.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Eugene Tsyrklevich - Attacking Host Intrusion Prevention Systems.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SensePost - A tale of two Proxies.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Leviathan - Command and Control Communications on Planet Earth.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Developments in Cisco iOS Forensics - Felix FX Linder.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Job De Haas - Getting Rooted and Never Knowing It.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Rocking The Pocket Book Hacking Chemical Plant For Competition And Extortion.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure Password Managers and Military-Grade Encryption on Smartphones Oh Re.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Greg Hoglund - 1000 Hackers in a box Failings of Security Scanners.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HDMI - Hacking Displays Made Interesting.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Attacks Against MDM Solutions.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/David Litchfeild - All new 0day.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ed Gerck - Overview of Certification systems x509, CA, PGP and SKIP.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Arthur Money - Closing Keynote.eng.json 1.9 MB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/E-Meet (or Emit) My Keystrokes How Benign Screen-sharing Meetings Could Leak Typing Behaviors.eng.json 1.9 MB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani-tagged.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 1999/audio/Jeff Moss Remarks Before the keynote.opus 1.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Attacker s Day into Virology - Human vs Computer.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pivoting in Amazon Clouds.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/A Tale of One Software Bypass of Windows 8 Secure Boot.eng.json 1.9 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Relaying EMV Contactless Transactions Using Off-The-Self Android Devices.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Dynamic Flash Instrumentation for Fun and Profit.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Psychotronica - Nitesh Dhanjani.eng.json 1.9 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Beware of Serialized GUI Objects Bearing Data - David Byrne, Rohini Sulatycki.eng.json 1.9 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Break Out of The Truman Show - Active Detection and Escape of Dynamic Binary Instrumentation.eng.json 1.9 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote #HackingDemocracy Will Our Societies Hold.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Laurie/Presentation/bh-eu-07-laurie.pdf 1.9 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-laurie.pdf 1.9 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Len Sassaman - Forensic Dead - Ends.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf 1.9 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fatal Fury on ESP32 Time to Release Hardware Exploits.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exposing Bootkits with BIOS Emulation.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Subverting Apple Graphics - Practical Approaches to Remotely Gaining Root.eng.json 1.9 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Power of Data-Oriented Attacks.eng.json 1.9 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-for-cheapskates-o'flynn-WP.pdf 1.9 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Lei-The-Spear-To-Break -The-Security-Wall-Of-S7CommPlus.pdf 1.9 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Witchcraft Compiler Collection - Towards Self Aware Computer Programs.eng.json 1.9 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/RFIDIOts - Practical RFID hacking (without soldering irons) - Adam Laurie.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Langlois=/Presentation/bh-eu-07-langlois.ppt 1.9 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Press ROOT to Continue - Detecting OSX and Windows Bootkits with RDFU.eng.json 1.9 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Null Sessions, MSRPC, and Windows 2000 - Todd Sabin.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Adam Shostack - Towards a Taxonomy of Network Testing Techniques.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Auditing The Security of Applications - David Litchfield.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking with WebSockets.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/OptiSig - Semantic Signature for Metamorphic Malware.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/0-days - u0026 Mitigations Roadways to Exploit and Secure Connected BMW Cars.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Hal McConnell - Threats from Organized Crime and Terrorists.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Vanhoef-Key-Reinstallation-Attacks-Breaking-The-WPA2-Protocol.pdf 1.9 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Securing the Public, who is in Charge.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/ePassports Reloaded - Jeroen van Beek.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Joey - Advanced Windows NT and 2000 Security.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Langlois/Presentation/bh-eu-07-langlois.ppt 1.9 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/No Such Thing as a Stupid Question Why Knowledge Shaming is Making Us Less Secure.eng.json 1.9 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Remote Web Application Dissassembly with ODBC Error Messages - David Litchfield.eng.json 1.9 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The UEFI Firmware Rootkits - Myths and Reality.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Tim Newsham - Cracking WEP Keys.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Nmap Scanning the Internet - Fyodor Vaskovich.eng.json 1.9 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Virtual Private Problems A Broken Dream - Loki.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bitcoin Transaction Malleability Theory in Practice.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam A Young, Modi Yang - Building Robust Backdoors.eng.json 1.9 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Bandukwala-Fun_w_Google_Custom_Searches_WP.pdf 1.9 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/spoonm, scape - Beyond EIP.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/All Your Calls Are Still Belong to Us - How We Compromised the Cisco VoIP Cr.eng.json 1.9 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Palante - Top 25 Overlooked Security Configuration on Your Switches and Routers.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Paul Wouters - Deploying DNSSEC.eng.json 1.9 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-David-Code-Deobfuscation-Intertwining-Dynamic-Static-And-Symbolic-Approaches.pdf 1.9 MB
- Black Hat USA/Black Hat USA 2006/presentations/049_Zambon.pdf 1.8 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Columbus Rule and DHS.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pangu 9 Internals.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2007/presentations/Miras/Presentation/bh-usa-07-mira.pdf 1.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is That You, Baby, or Just a Bridge in the Sky.eng.json 1.8 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Security Testing Best Practiceson complex File Format Fuzzing - Qing Wang.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Breaking .NET Sandboxes.eng.json 1.8 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with- API and Sysenter.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cyberspace A Fragile Ecosystem - Robert Lentz.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Litchfield - Variations in Exploit Methods between Linux and Windows.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SAP, Credit Cards, and the Bird that Talks Too Much.eng.json 1.8 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - Why We are Not Building a Defendable Internet.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluepilling the Xen Hypervisor - Joanna Rutkowska, Alexander Tereshkin.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard George - Views On The Future Direction of Information Assurance.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Attacking the Linux PRNG on Android.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Butler - Exponential Growth Rootkit.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unveiling the Underground World of Anti-Cheats.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Argyros-Another-Brick-Off-The-Wall-Deconstructing-Web-Application-Firewalls-Using-Automata-Learning-wp.pdf 1.8 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Reflected File Download - A New Web Attack Vector.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2006/presentations/025_Cache.pdf 1.8 MB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/How to Detect that Your Domains are Being Abused for Phishing by Using DNS.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass the Hash and other credential theft and reuse - Preventing Lateral Movement.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/802.1x and Beyond.eng.json 1.8 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Oyedata-Kalra-slides.pdf 1.8 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Microsoft Kerberos - Sorry You Guys Don't Get It.eng.json 1.8 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Whitehouse.pdf 1.8 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Never Trust Your Inputs - Causing 'Catastrophic Physical Consequences' From The Sensor.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Does Dropping USB Drives in Parking Lots and Other Places Really Work.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Meet the Owner of a Real Hacked Company - Forensic Analysis - Mark Shelhart.eng.json 1.8 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bar-Mitzva Attack - Breaking SSL with 13-Year Old RC4 Weakness.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Priest - Building the Business Case for Management for Increased Security.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/How to Break PDF Encryption.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2006/presentations/019_Fishbach.pdf 1.8 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer - 1-2 - Eric Filiol.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Keynote - Gen. Alexander.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Welcome & Introduction to Black Hat USA 2013.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unraveling Unicode - Chris Weber.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ChaosDB How We Hacked Databases of Thousands of Azure Customers (rev).eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Alexa, Hack My Server(less) Please.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking FIDO - Are Exploits in There.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side..eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side._en.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Mobile Network Hacking, IP Edition.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/New Exploit Technique In Java Deserialization Attack.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marcus Sachs - Building a Global Culture of Security(Luncheon Speaker).eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Alejandro Hernaandez on DotDotPwn.mp4 1.8 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ReCertifying Active Directory Certificate Services.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Hackproofing Lotus Domino - David Litchfield.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Javascript Static Security Analysis Made Easy with JSPrime.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Universal DDoS Mitigation Bypass.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Dwivedi.pdf 1.8 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/To dock or not to dock, that is the question.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jeff Jonas - Non Obvious Relationship Awareness.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Black Hat USA 2004 - David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Grushcovski-GDPR-And-Third-Party-JS-Can-It-Be-Done.pdf 1.8 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Booting the iOS Kernel to an Interactive Bash Shell on QEMU.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-dror-WP.pdf 1.8 MB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Bug Hunters Dump User Data. Can They Keep it Well They're Keeping it Anyway.eng.json 1.8 MB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Emerging Frontiers Insights from the Black Hat Asia Review Board.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Gyrophone - Eavesdropping Using a Gyroscope.eng.json 1.8 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neat New & Ridiculous Flash Hacks - Mike Bailey.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mission mPOSsible by Nils - Jon Butler.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Dror-Thumann/Whitepaper/bh-eu-07-dror-WP.pdf 1.8 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Dror-Thumann=/Whitepaper/bh-eu-07-dror-WP.pdf 1.8 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mactans - Injecting Malware Into iOS Devices via Malicious Chargers.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jose Nazario - The Future of Network Worms.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/JD Glaser - JDs Toolbox Fire and Ice.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Greetings from the '90s Exploiting the Design of Industrial Controllers in Modern Settings.eng.json 1.8 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Conti/BH_US_05_Conti.pdf 1.8 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Kernel Pool Exploitation on Windows 7 - Tarjei Mandt.eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Chen-Self-Verifying-Authentication-A-Framework-For-Safer-Integrations-Of-Single-Sign-On-Services.pdf 1.8 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/They Ought to Know Better - Exploiting Security Gateways via Their Web Inter.eng.json 1.8 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hiding Behind Android Runtime (ART).eng.json 1.8 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/IVR Security- Internal Network Attack via Phone Lines.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/NIDS False Positive Reduction Through Anomaly Detection - Damiano Bolzoni.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AMSI - How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/USB - Undermining Security Barriers - Andy Davis.eng.json 1.7 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hack Microsoft Using Microsoft Signed Binaries.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Simmonds - The Jericho Challenge.json 1.7 MB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-geers.pdf 1.7 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-butti-handouts.pdf 1.7 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Smith_Ames_Meta-Post_Exploitation/BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf 1.7 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Trust in Apple's Secret Garden Exploring & Reversing Apple's Continuity Protocol.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Understanding HL7 2.X Standards, Pen Testing, and Defending HL7 2.X Messages.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Google Reimagined a Phone. It was Our Job to Red Team and Secure it.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.eng.json 1.7 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Popping Shell on A(ndroid)RM Devices - Itzhak (Zuk) Avraham.eng.json 1.7 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Japanese.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process.eng.json 1.7 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Go Get My Vulnerabilities.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Package Clone Detection.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Fyodor on Mastering Nmap.mp4 1.7 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Make My Day – Just Run a Web Scanner Countering The Faults of Typical Web Scanners Through Byte-code Injection - Toshinari Kureha & Dr. Brian Chess.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reflections on Trusting TrustZone.eng.json 1.7 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 2-2 - Chris Hadnagy.eng.json 1.7 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/BH_AD_12_MWRI_LTE_Ruks_Slides.pdf 1.7 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Drone Attacks on Industrial Wireless - A New Front in Cyber Security.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/kRX - Comprehensive Kernel Protection Against Just-In-Time Code Reuse.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Timothy Mullen - Grabbing User Credentials via W2k ODBC Libraries.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Raggo - Steganography Steganalysis Cryptanalysis.eng.json 1.7 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-security-impacts-atlasis-slides.pdf 1.7 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Side-Channel Timing Attacks on MSP430 Microcontroller Firmware - Travis Goodspeed.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Barnaby Jack - Kernel Exploitation.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Moritz - Proactive Defense Against Malicious Code.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BlackberryOS 10 From a Security Perspective.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Web Application Firewalls - Analysis of Detection Logic.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Adaptive Kernel Live Patching - An Open Collaborative Effort.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Advanced VBA Macros Attack & Defence.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Segment Heap Internals.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Embedding a Human Centric Approach Into a Global Cyber Security Program.eng.json 1.7 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-riley-wireless/bh-win-03-riley.pdf 1.7 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Kernel Wars - Joel Eriksson.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Androbugs Framework - An Android Application Security Vilnerability Scanner.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Kelihos Botnet.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/1000 Ways to Die in Mobile Oauth.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/A Crushing Blow at the Heart of SAP’s J2EE Engine - Alexander Polyakov.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Out of Control - Demonstrating SCADA Device Exploitation.eng.json 1.7 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Internet Explorer turns you personal computer into a public File Server - Jorge Luis Alvarez Medina.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2006/presentations/051_Kornbrust.pdf 1.7 MB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Lotus Domino - Penetration Through the Controller.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Zen and the Art of Adversarial Machine Learning.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/ARM Exploitation ROPmap - Long Le.eng.json 1.7 MB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Authenticator Leakage Through Backup Channels on Android.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Contemporary Automatic Program Analysis.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alexander Kornbrust - Circumvent Oracle.json 1.7 MB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Sugiura.pdf 1.7 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-sensepost.ppt 1.7 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-sensepost/bh-win-03-sensepost.ppt 1.7 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Windows 8.eng.json 1.7 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeremiah-Grossman-Phishing-With-Super-Bait-English.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Gadgets.eng.json 1.7 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Betting Against the House - Security and Stability When the Odds are Against You.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fight Against 1-Day Exploits - Jeongwook Oh.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Methods for Understanding Targeted Attacks with Office Documents - Bruce Dang.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Kornbrust/kornbrust_circumvent_oracle_encryption_101.zip 1.7 MB
- Black Hat USA/Black Hat USA 2012/tools tube/GoogleDiggity Crew.mp4 1.7 MB
- Black Hat DC/Black Hat Federal 2006/Finding Digital Evidence in Physical Memory - Mariusz Burdach.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse Engineering Flash Memory for Fun and Benefit.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Cyber Judo - Offensive Cyber Defense.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Harnessing GPUs - Building Better Browser Based Botnets.eng.json 1.7 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Fried Apples - Jailbreak DIY.eng.json 1.7 MB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Straight Outta VMware Modern Exploitation of the SVGA Device for Guest-to-Host Escapes.eng.json 1.7 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Gen PlugX ShadowPad A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT.eng.json 1.7 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Thomas Olofsson - Building a Blind IP Spoofed Portscanning Tool.eng.json 1.7 MB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Intel VISA Through the Rabbit Hole.eng.json 1.6 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/DTM Components - Shadow Keys to the ICS Kingdom.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/JD Glaser - Auditing NT Catching Greg Hoglund.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Litchfield - All New 0 Day.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2007/presentations/Hill/Presentation/bh-usa-07-hill.pdf 1.6 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Reverse Engineering Flash Exploits.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Revealing Embedded Fingerprints - Deriving intelligence from USB stack interactions.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2007/presentations/Cowen/Presentation/bh-usa-07-cowen.pdf 1.6 MB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Didier Stevens on PDF Tools.mp4 1.6 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/API s for improving Security.eng.json 1.6 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Hisamichi-Okamura-Cybercrime-Treaty-Japanese.eng.json 1.6 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Your Cloud Is In My Pocket - Matthieu Suiche.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks.eng.json 1.6 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Virtual Battlefield in 2022 Russia Ukraine War & Its Policy Implications.eng.json 1.6 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AMSI & Bypass Review of Known AMSI Bypass Techniques and Introducing a New One.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Terry Losonky - National Information Assurance Partnership.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Worth - Cryptographic Port Knocking.eng.json 1.6 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.eng.json 1.6 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/All your Root Checks Belong To Us - The Sad State of Root Detection.eng.json 1.6 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Next Generation Mobile Rootkits.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Himanshu Dwivedi - Insecure IP Storage Networks.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Aldora Louw - Notes on Domino.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Find Me in your Database.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Burdach - Physical memory Forensics.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Flash Sandboxes.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking, Surveilling, and Deceiving victims on Smart TV.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jeff Nathan and Kevin Depeugh - Layer 2 Attacks.eng.json 1.6 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Litchfield - All New Oracle 0 - day Attacking and Defending Oracle.eng.json 1.6 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes-wp.pdf 1.6 MB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/DevSecOps What, Why and How.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AVLeak - Fingerprinting Antivirus Emulators for Advanced Malware Evasion.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Weapons of Targeted Attack Modern Document Exploit Techniques - Sung-ting Tsai, Ming-Chieh Pan.eng.json 1.6 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/David Litchfield-English.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/ICSCorsair - How I Will PWN Your ERP Through 4-20 mA Current Loop.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Playing in the Reader X Sandbox - Paul Sabanal, Mark Yason.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zambon and Bolzoni - NIDS False Pos.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Keynote.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobitex Network Security - olleB.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mandy Andress - Wireless LAN Security.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kornburst - Oracle rootkits 2.0.eng.json 1.6 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Anti-Plugin - Don't Let Your App Play as an Android Plugin.eng.json 1.6 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-quanitfying-royal-slide.pdf 1.6 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Let's Play - Applanting.eng.json 1.6 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/(In)Security of Mobile Banking.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grunwald - New Attack RFID Systems.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Botnets.eng.json 1.6 MB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Understanding The Attack Surface & Attack Resilience Of Project Spartan.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exploiting Unpatched iOS Vulnerabilities for Fun and Profit.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Polino-Hiding-Pins-Artifacts-To-Defeat-Evasive-Malware.pdf 1.5 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/International Organized Crime and Terrorism - Hal Mcconnall.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image0.pict 1.5 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/How To Break XML Encryption - Automatically.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Harper-Balas.pdf 1.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 2.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Memory Forensics Using Virtual Machine Introspection for Cloud Computing.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Rooting EVERY Android - From Extension to Exploitation.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Clocking On.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Exploiting Network Surveillance Cameras Like a Hollywood Hacker.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2012/tools tube/Raphael Mudge.mp4 1.5 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdoor Investigation and Incident Response From Zero to Profit.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Maynor.pdf 1.5 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Hosmer_Polymorphic_Malware/BH_US_08_Hosmer_Polymorphic_Malware.pdf 1.5 MB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Diving Into IE 10's Enhanced Protected Mode Sandbox by Mark Vincent Yason.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/James Foster - Managing Hackers.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CrowdSource - Open Source Crowd Trained Machine Learning Model for Malware Detection.eng.json 1.5 MB
- Black Hat DC/Black Hat DC 2008/Presentations/DeHaas/Presentation/bh-dc-08-dehaas.pdf 1.5 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Floating Car Data from Smartphones.eng.json 1.5 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Hidden RCE Surfaces That Control the Droids.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SecSi Product Development.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Evading Deep Inspection for Fun and Shell.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Robert Morris - The Future of the History.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Practical Attacks Against Attribute based Encryption.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Merloni and Carettoni - Blue Bag.eng.json 1.5 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Remote Memory-Deduplication Attacks.eng.json 1.5 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Playing in a Satellite Environment 1.2 - Leonardo Nve Egea.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Jason_Geffner/BlackHat_EU_2011_Geffner_Exporting_RSA_Keys-Slides.pdf 1.5 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Beetle-Potter.pdf 1.5 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dwivedi - Shoot Nxt Persn says VLANS.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/CTX - Eliminating BREACH with Context Hiding.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Long-Term Sessions - This Is Why We Can’t Have Nice Things - Steve Ocepek.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hiding @ Depth - Exploring, Subverting, and Breaking NAND Flash Memory.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hands Off and Putting SLAB SLUB Feng Shui in a Blackbox.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Inconvenient Trust - User Attitudes Toward Security and Usability Tradeoffs.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Android FakeID Vulnerability Walkthrough.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Man in the Binder - He Who Controls IPC, Controls the Droid.eng.json 1.5 MB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-oudot.rar 1.5 MB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/TPM/tpmwg-mainrev62_Part1_Design_Pr 1.5 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Bruce Schneier - The Instrument and Death of Security.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeffrey Hunker - Keynote Protecting Americas Cyberspace Version 1.0 of the National Plan.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding TOCTTOU in the Windows Kernel Font Scaler Engine.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2012/tools tube/Gursev Kalra.mp4 1.5 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Wen-Use-After-Use-After-Free-Exploit-UAF-By-Generating-Your-Own-wp.pdf 1.5 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/A Sandbox Odyssey.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Use-After-Use-After-Free - Exploit UAF by Generating Your Own.eng.json 1.5 MB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/I Know You Want Me - Unplugging PlugX by Takahiro Haruyama & Hiroshi Suzuki.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moyer - Defending BlackBox Web Apps.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1 2).eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Abusing Web APIs Through Scripted Android Applications.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Internet Scanning - Current State and Lessons Learned.eng.json 1.5 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-Japanese-with-english-questions.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Marco Valleri and Alberto Ornaghi - Man In The Middle Attacks.eng.json 1.5 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Unix Domain Socket A Hidden Door Leading to Privilege Escalation in the Android Ecosystem.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An AI Approach to Malware Similarity Analysis - Mapping the Malware Genome With a Deep Neural Network.eng.json 1.5 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-eeye-Japanese.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Mario Vuksan on TitanEngine.mp4 1.5 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Exploiting USB IP in Linux.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Software Virtualization Based Rootkits - Sun Bing.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/BBP - BSD Heap Smashing.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Backdoors.eng.json 1.5 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/I'm Not a Human - Breaking the Google Recaptcha.eng.json 1.5 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-FX-Blitzableiter-slides.pdf 1.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bringing Software Defined Radio to the Penetration Testing Community.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Exploiting Curiosity and Context - How to Make People Click on a Dangerous Link.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Dube-Rios/Presentation/bh-eu-07-rios.pdf 1.5 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-rios.pdf 1.5 MB
- Black Hat DC/Black Hat Federal 2006/Heuristic Vulnerability Analysis and Attack - Drew Copley.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mike Pomraning - Injection Flaws.eng.json 1.5 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Butti/Whitepaper/bh-eu-07-butti-handouts.pdf 1.5 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Slime - Automated Anti-Sandboxing Disarmament System.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Protecting Data In-Use from Firmware and Physical Attacks.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2024/Living off Microsoft Copilot- DEMO- invoice manipulation.mp4 1.5 MB
- Black Hat USA/Black Hat USA 2006/presentations/081_Shah.pdf 1.5 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE.eng.json 1.5 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Brian Snow - We Need Assurance.eng.json 1.4 MB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Ejovi-Nuwere-The-Art-of-SIP-Fuzzing-and-Vulnerabilities-Found-in-VoIP-English.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Advanced Heap Manipulation in Windows 8.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory_en.json 1.4 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Richard Thieme - Defending the Information Web New Ways of Thinking About Security.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2006/presentations/008_Stender.pdf 1.4 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Miller_Reverse_DNS_Tunneling_Shellcode/BH_US_08_Ty_Miller_Reverse_DNS_Tunneling_Shellcode.pdf 1.4 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine.pdf 1.4 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Kevin Spett - Java Decompilation and Application Security.eng.json 1.4 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Cyber Effects Prediction - Shane Powell.eng.json 1.4 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/I Know Where You've Been - Geo-Inference Attacks Via The Browser Cache.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2012/tools tube/David Mirza Ahmad.mp4 1.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Account Jumping Post Infection Persistency & Lateral Movement in AWS.eng.json 1.4 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-over-the-air-dmitrienko-slides.pdf 1.4 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Cash-is-king-Eston-Slides.pdf 1.4 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SATCOM Terminals - Hacking by Air, Sea, and Land by Ruben Santamarta.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bilar - Auto Malware Classification.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Lightbulb Worm.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Exploiting Windows Hello for Business.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chad R Skipper - Polymorphism and Intrusion Detection Systems.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Killing the Myth of Cisco IOS Diversity Towards Large-Scale Exploitation of Cisco IOS - Ang Cui, Jatin Kataria, Salvatore Stolfo.eng.json 1.4 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Firmware Supply-Chain Security Is Broken Can We Fix It.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Your Scripts In My Page - What Could Possibly Go Wrong.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building Trust & Enabling Innovation for Voice Enabled IoT.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Breeding Sandworms - How To Fuzz Your Way Out of Adobe Reader s Sandbox.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/QMaster - Secure Implementations of ActiveX in a Corporate Environment.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Energy Fraud and Orchestrated Blackouts - Issues with Wireless Metering Protocols.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Smashing the Font Scaler Engine in Windows Kernel.eng.json 1.4 MB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.jp.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The PWNIE Awards.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2012/tools tube/Yaniv Karta.mp4 1.4 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Gurgq-Base-Jumping-slides.pdf 1.4 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Implementing Practical Electrical Glitching Attacks.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Epidemiology of Software Vulnerabilities - A Study of Attack Surface Spread.eng.json 1.4 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/3G 4G Intranet Scanning and its Application on the WormHole Vulnerability.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Captain Hook - Pirating AVS to Bypass Exploit Mitigations.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-wp.pdf 1.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Augmenting Static Analysis Using Pintool - Ablation.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Patrick Miller - Spider(tool).eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/A Perfect CRIME Only TIME Will Tell.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Compromising Industrial Facilities from 40 Miles Away.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/With BIGDATA comes BIG responsibility - Practical exploiting of MDX injections.eng.json 1.4 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bilby - Defeating Win Forensic - Japanese.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Dominque Brezinski - Anatomy of Common Programming Security Issues.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Practical Side-Channel Attacks Against WPA-TKIP.eng.json 1.4 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-HTML5_Top_10_Shah_WP.pdf 1.4 MB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Lessons From Defending The Indefensible.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Far Sides of Java Remote Protocols.eng.json 1.4 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Using Zero to Attack Zero-Knowledge Proof (ZKP) PLONK.eng.json 1.4 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bypassing Malware Detection Mechanisms in Online Banking.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/GDI Font Fuzzing in Windows Kernel For Fun.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Worst of the Best of the Best - Kevin Stadmeyer.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2012/tools tube/FishNet Team.mp4 1.4 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Certifi gate Front Door Access To Pwning Millions Of Androids.eng.json 1.4 MB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/ZombieLoad Leaking Data on Intel CPUs.eng.json 1.4 MB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-west.pdf 1.4 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Sumit Siddarth on Hacking XPath 2.mp4 1.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/TCP Injection Attacks in the Wild - a Large Scale Study.eng.json 1.4 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdooring of Real Time Automotive OS Devices.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Paquet-Clouston-Ego-Market_When-Greed-for-Fame-Benefits-Large-Scale-Botnets-wp.pdf 1.4 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Butti/Presentation/bh-eu-07-butti-handouts.ppt 1.4 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/PWNIE Awards at Black Hat USA 2014.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/References/Marro_masters_thesis.pdf 1.4 MB
- Black Hat DC/Black Hat DC 2008/Presentations/McFeters-Rios-Carter/Whitepaper/bh-dc-mcfeters-rios-carter-WP.pdf 1.4 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/A Practical Attack Against VDI Solutions.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Mulliner-Inside-Androids-SafetyNet-Attestation.pdf 1.4 MB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-butler.pdf 1.4 MB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/BlackHat_EU_2011_Chiriac_Rootkit_detection-Slides.pdf 1.4 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tereshkin - Rootkits Attack Firewall.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Levomaki-Automatic-Discovery-Of-Evasion-Vulnerabilities-Using-Targeted-Protocol-Fuzzing.pdf 1.4 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Hypervisor IPS based on Hardware Assisted Virtualization Technology - Junichi Murakami.eng.json 1.4 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/One Glitch to Rule Them All Fault Injection Attacks Against the AMD Secure Processor.eng.json 1.4 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Cracking GSM - David Hulton and Steve.eng.json 1.4 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Defensive Rewriting - Bryan Sullivan.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy.pdf 1.3 MB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/ScarabMon - Automating Web Application Penetration Tests - Jonathan Wilkins.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/PLC-Blaster - A Worm Living Solely in the PLC.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/PWNIE AWARDS.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/The Data Distribution Service (DDS) Protocol is Critical Let's Use it Securely.eng.json 1.3 MB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.eng.json 1.3 MB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Server Tailgating - A Chosen-PlainText Attack on RDP.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/It Just (Net)works - The Truth About iOS 7 s Multipeer Connectivity Framework.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hybrid Defense - How to Protect Yourself From Polymorphic 0-days.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2012/tools tube/Georgia Weidman about SPF.mp4 1.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kevin Cardwell - Toolkits.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSH as the Next Back Door. Are You Giving Hackers Root Access - Joe Skehan.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Hines.pdf 1.3 MB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/PCIe Device Attacks Beyond DMA. Exploiting PCIe Switches, Messages and Errors.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Blunting the Phisher's Spear - A Risk-Based Approach.eng.json 1.3 MB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Investigating PowerShell Attacks.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/I Trust My Zombies - A Trust-Enabled Botnet.eng.json 1.3 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-English-Translated.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Richard Theime - Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the Board is Disappearing.eng.json 1.3 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hey Man, Have You Forgotten To Intialize Your Memory.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/2021 A Titan M Odyssey.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2007/presentations/Tsyrklevich/Presentation/bh-usa-07-tsyrklevich.pdf 1.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantum Key Distribution and the Future of Encryption.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Attacking The XNU Kernel In El Capitain.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Owning the Routing Table - Part II.eng.json 1.3 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Moniz - XSSploitation - Japanese.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/I Came to Drop Bombs - Auditing the Compression Algorithm Weapon Cache.eng.json 1.3 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Cash-is-king-Eston-WP.pdf 1.3 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Taking Kernel Hardening to the Next Level.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Armin Buescher on ReplayProxy.mp4 1.3 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-howard-leblanc.pdf 1.3 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Web IS Vulnerable - XSS Defense on the BattleFront.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Whitehouse/Presentation/bh-eu-07-whitehouse.pdf 1.3 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Whitehouse/Presentation/bh-eu-07-whitehouse.pdf 1.3 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-whitehouse.pdf 1.3 MB
- Black Hat USA/Black Hat USA 2006/presentations/Benninger/Benninger-dumpAutoComplete.zip 1.3 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Brute-Forcing Lockdown Harddrive Pin Codes.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2012/tools tube/Dan Cornell.mp4 1.3 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Andres_Riancho/BlackHat_EU_2011_Riancho_Web_App-Slides.pdf 1.3 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Litchfield - All New 0 Day.eng.json 1.3 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Enterprise Apps - Bypassing the IOS Gatekeeper.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Rafal_Los/BlackHat_EU_2011_Los_Defying_Logic-Slides.pdf 1.3 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Little Seal Bug Optical Sound Recovery from Lightweight Reflective Objects.eng.json 1.3 MB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Breaking Encryption in the Cloud - Cheap, GPU Accelerated Supercomputing for Everyone - Thomas Roth.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Willem Mouton on YETI Tool.mp4 1.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cyber War in Perspective - Analysis From the Crisis in Ukraine.eng.json 1.3 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Dynamic Process Isolation.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building a Product Security Incident Response Team - Learnings From the Hivemind.eng.json 1.3 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hey, Your Parcel Looks Bad - Fuzzing and Exploiting Parcel - Ization Vulnerabilties in Android.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hot Knives Through Butter - Bypassing Automated Analysis Systems.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tyler Close - Shatter Proofing Windows.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Two Factor Failure.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Tom Forbes on XCAT Xpath Injection.mp4 1.3 MB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Defeating Samsung KNOX with Zero Privilege.eng.json 1.3 MB
- Black Hat DC/Black Hat DC 2008/Presentations/McFeters-Rios-Carter/Presentation/bh-dc-08-mcfeters-rios-carter.pdf 1.3 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Leak a 100-Million-Node Social Graph in Just One Week.eng.json 1.3 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Oi-Android_Rootkit-Slides.pdf 1.3 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hand in Your Pocket Without You Noticing Current State of Mobile Wallet Security.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 7 7.mp4 1.3 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Sutton_Embeded_Web_Servers_WP.pdf 1.3 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Automated Malware Similarity Analysis - Daniel Raygoza.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer 2-2 - Eric Filiol.eng.json 1.3 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Side Channel Attacks in 4G and 5G Cellular Networks.eng.json 1.3 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Bad for Enterprise - Attacking BYOD Enterprise Mobile Security Solutions.eng.json 1.3 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-Japanese.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/BH_US_08_DeMott_AppSec_A-Z_Source_Code_Auditing.pdf 1.2 MB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-mcfeters-rios-carter.pdf 1.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/One Packer to Rule Them All.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows Kernel Exploitation.eng.json 1.2 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BlueMaster Bypassing and Fixing Bluetooth-based Proximity Authentication.eng.json 1.2 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/A New CVE 2015 0057 Exploit Technology.eng.json 1.2 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems.eng.json 1.2 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Java Library Hole Allowing Multiplatform Denial-Of-Service - Marc Schoenefeld.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why You Need to Detect More Than PtH.eng.json 1.2 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/FYI - You ve Got LFI.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protecting Vulnerable Applications with IIS7 - Brian Holyfield.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Watching Commodity Malware Get Sold to a Targeted Actor.eng.json 1.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bypassing HTTP Strict Transport Security.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Maxi Soler on FireCAT.mp4 1.2 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SideWinder Uncoils to Strike.eng.json 1.2 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/ExplosION The Hidden Mines in the Android ION Driver.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2007/presentations/Maynor_and_Graham/Whitepaper/bh-usa-07-maynor_and_graham-WP.pdf 1.2 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Resurrecting The Read Logs Permission on Samsung Devices.eng.json 1.2 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Skeletons in the App Sandbox 5 Ways to Escape.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2007/presentations/De_Haas/Presentation/bh-usa-07-de_haas.pdf 1.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Page of Injections Book - Memcached Injections.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2004/Johnny Long - You Got That With Google.mp4 1.2 MB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Local Windows Authentication To Defeat Full Disk Encryption.eng.json 1.2 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge.eng.json 1.2 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hack Your ATM with Friend s Raspberry.Py.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rooster - DNS Security Issues.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Pate_Virtual_Security_Rules/BH_US_08_Steve_Pate_Virtual_Security_Rules.pdf 1.2 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/PPI-Geolocation The Next Generation of 802.11 Visualization and Geo-Location - Johnny Cache.eng.json 1.2 MB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Sutton.pdf 1.2 MB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Two Bugs With One PoC Rooting Pixel 6 From Android 12 to Android 13.eng.json 1.2 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Like Lightning From the Cloud Finding RCEs in an Embedded TLS Library.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Ben-Cohen_No_More_0-Days/BH_US_08_Ohad_Ben_Cohen_Slides.pdf 1.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Access Keys Will Kill You Before You Kill the Password.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/OpenStack Cloud at Yahoo Scale - How to Avoid Disaster.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2006/presentations/040_Beardsley.pdf 1.2 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Neerumalla - SQL Inject.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadWPAD.eng.json 1.2 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-legal_aspects_of_cyverspace_clark_Slides.pdf 1.2 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Oyedata-Kalra-WP.pdf 1.2 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Arnaboldi-Exposing-Hidden-Exploitable-Behaviors-In-Programming-Languages-Using-Differential-Fuzzing-wp.pdf 1.2 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Windows Hibernation File for Fun And Profit - Matthieu Suiche.eng.json 1.2 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Partial-Chris-Eagle-Japanese-Translated.eng.json 1.2 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-inspection-of-windows-evdokimov-slides.pdf 1.2 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Jeff Moss - Welcome - English.opus 1.2 MB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-mcfeters-rios-carter-WP.pdf 1.2 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Shawn Moyer - Owning The C-Suite.json 1.2 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/bh-win-03-kaminsky.pdf 1.2 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Grossman.pdf 1.2 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Brossard-Witchcraft-Compiler-Collection-Towards-Self-Aware-Computer-Programs-wp.pdf 1.2 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/macOS Vulnerabilities Hiding in Plain Sight.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2007/presentations/Del_Moral_Talabis/Presentation/bh-usa-07-del_moral_talabis.pdf 1.2 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Dubin-I-Know-What-You-Saw-Last-Minute-The-Chrome-Browser-Case-WP.pdf 1.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Point of Sale System Architecture and Security.eng.json 1.2 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Presentation/bh-eu-07-vanegue.ppt 1.2 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Vanegue-Panel/Presentation/bh-eu-07-vanegue.ppt 1.2 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-cybercrime-kill-chain-artes-wp.pdf 1.2 MB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Esteban Martinez - Advanced SQL Injection.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/How Economics and Information Security Affects Cyber Crime - Peter Guerra.eng.json 1.2 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Clickjacking Revisted - A Perceptual View of UI Security.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2012/tools tube/Darren Manners.mp4 1.2 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks.eng.json 1.2 MB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Exploiting Social Navigation.eng.json 1.2 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Pwnage Saga Continues.eng.json 1.2 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Filiol_Leakage_of_Non-Networked_Computers/BH_US_08_Filiol_Leakage_of_Non-Networked_Computers.pdf 1.2 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dungeons Dragons and Security.eng.json 1.2 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Bolzoni-Zambon/Presentation/bh-eu-07-bolzoni.pdf 1.1 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bolzoni.pdf 1.1 MB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/One-byte Modification for Breaking Memory Forensic Analysis.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Defeating the Transparency Feature of DBI.eng.json 1.1 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-security-impacts-atlasis-wp.pdf 1.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OPSEC Failures of Spies.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Security Through Design - Making Security Better By Designing for People.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SQL Injection Worms for Fun and Profit - Justin Clarke.eng.json 1.1 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Wear Your Password.eng.json 1.1 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-securityfriday.pdf 1.1 MB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-securityfriday/bh-win-03-securityfriday.pdf 1.1 MB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Cops and Robbers - Cheating Las Vegas - Jeff Jonas.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows 7 Phone Hacking & Exploitation.eng.json 1.1 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/C11 Metaprogramming Applied to Software Obfuscation.eng.json 1.1 MB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/TeamTNT Explosive Cryptomining.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2007/presentations/Wysopal_and_Eng/Presentation/bh-usa-07-wysopal_and_eng.pdf 1.1 MB
- Black Hat USA/Black Hat USA 2008/conference cd/viewers/SumatraPDF-0.8.1-install.exe 1.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Truncating TLS Connections to Violate Beliefs in Web Applications.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Trainor - The Statue of Liberty.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/index.apxl.gz 1.1 MB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Jose Esparza on Peepdf.mp4 1.1 MB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines-tagged.eng.json 1.1 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-reverse-and-simulate-guihery-wp.pdf 1.1 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Christian Martorella on Wfuzz & WebSlayer v2.0.mp4 1.1 MB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rob Karas - Open Source Monitoring.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2007/presentations/Stender/Presentation/bh-usa-07-stender.pdf 1.1 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Learn How to Control Every Room at a Luxury Hotel Remotely.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image9.png 1.1 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Legal Considerations for Cellular Research.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/John Bailey - SOCKS, PPTP & IPSec Implementation & Futures.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Marcus Ranum - How to REALLY Secure the Internet.eng.json 1.1 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Bypassing Browser Security Policies for Fun and Profit.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2007/presentations/DeMott_Enbody_and_Punch/Presentation/bh-usa-07-demott_enbody_and_punch.pdf 1.1 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Cooper Knows the Shortest Stave Finding 134 Bugs in the Binding Code of Scripting Languages.eng.json 1.1 MB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hacking a Professional Drone.eng.json 1.1 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Pollet-RTS-Electricity-for-Free-wp.pdf 1.1 MB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Reverse Engineering Compliance.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Boileau/BH_US_05-Boileau.pdf 1.1 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Deactivate the Rootkit - Alfredo Ortega.eng.json 1.1 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Callas.pdf 1.1 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Callas.pdf 1.1 MB
- Black Hat Asia/Black Hat Singapore 2014/You Can't See Me - A Mac OS X Rootkit Uses the Tricks You Haven't Known Yet.mp4 1.1 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-sensepost.pdf 1.1 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-sensepost.pdf 1.1 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Ferruh Mavituna on Netsparker.mp4 1.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Viral Video - Exploiting SSRF in Video Converters.eng.json 1.1 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/Tangerine.zip 1.1 MB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Make KSMA Great Again The Art of Rooting Android Devices by GPU MMU Features.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Untwining Twine.eng.json 1.1 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/To Loot or Not to Loot - That Is Not a Question When State Nexus APT Targets Online Entertainment.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daji Sanai - Promiscuous Node Detection Using ARP Packets.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Byoungyoung Lee on DarunGrim.mp4 1.1 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Hurley - WorldWide War Drive.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Morana - Sec Into Software LifeCycle.eng.json 1.1 MB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Mac OS X Physical Memory Analysis - Matthieu Suiche.eng.json 1.1 MB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/BH_EU_05_Berrueta_Andres.pdf 1.1 MB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05 Berrueta Andres.pdf 1.1 MB
- Black Hat USA/Black Hat USA 2012/tools tube/Andreas Schmidt.mp4 1.1 MB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/decoded-screenshot.tiff 1.1 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/DroidGuard A Deep Dive into SafetyNet.eng.json 1.1 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Partial-Japanese.eng.json 1.1 MB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Password Hashing - The Future is Now.eng.json 1.1 MB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Simple Spyware Androids Invisible Foreground Services and How to (Ab)use Them.eng.json 1.1 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-droid-exploitation-saga-gupta-WP.pdf 1.1 MB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with David SecurityNinja Rook on Agnitio v2.mp4 1.1 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/What's the DFIRence for ICS.eng.json 1.1 MB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Exploiting DCOM - Yoshiaki Komoriya, Hidenobu Sekiu.eng.json 1.1 MB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-clowes.pdf 1.1 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SVG - Exploiting Browsers without Image Parsing Bugs.eng.json 1.1 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Dubin-I-Know-What-You-Saw-Last-Minute-The-Chrome-Browser-Case.pdf 1.1 MB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Hey Google, Activate Spyware - When Google Assistant Uses a Vulnerability as a Feature.eng.json 1.1 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/SSL Validation Checking vs. Go(ing) to Fail.eng.json 1.0 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/OAuth - Securing the Insecure - Khash Kiani.eng.json 1.0 MB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Richard Thieme - Keynote.eng.json 1.0 MB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/keynote-Raisuke-Miyawaki-English-Translation.eng.json 1.0 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Vanegue-Panel/elfsh.rar 1.0 MB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/I Block You Because I Love You Social Account Identification Attack Against a Website Visitor.eng.json 1.0 MB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Back - connect to the Connected Car. Search for Vulnerabilities in the VW Electric Car.eng.json 1.0 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/WebKit Everywhere - Secure or Not.eng.json 1.0 MB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Affiliate Programs Legitimate Business or Fueling Cybercrime - Bradley Anstis.eng.json 1.0 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Lauren Oudot - Digital Active Self Defence.eng.json 1.0 MB
- Black Hat USA/Black Hat USA 2007/presentations/Fowler/Whitepaper/bh-usa-07-fowler-WP.pdf 1.0 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abuse of CPE Devices and Recommended Fixes.eng.json 1.0 MB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AutoSpear Towards Automatically Bypassing and Inspecting Web Application Firewalls.eng.json 1.0 MB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/One Flip is All It Takes Identifying Syscall-Guard Variables for Data-Only Attacks.eng.json 1.0 MB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Exploiting Live Virtual Machine Migration - Jon Oberheide.eng.json 1.0 MB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/My Google Glass Sees Your Passwords.eng.json 1.0 MB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box.eng.json 1.0 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.eng.json 1.0 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Lei-The-Spear-To-Break -The-Security-Wall-Of-S7CommPlus-wp.pdf 1.0 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Corina-Difuzzing-Android-Kernel-Drivers-wp.pdf 1.0 MB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Conficker Mystery - Mikko Hypponen.eng.json 1.0 MB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Donenfeld-Stumping-The-Mobile-Chipset-wp.pdf 1.0 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Over the Edge - Silently Owning Windows 10's Secure Browser.eng.json 1.0 MB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Privacy Do as I Say Not as I Do.eng.json 1.0 MB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Don t Trust Your USB How to Find Bugs in USB Device Drivers.eng.json 1.0 MB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-quynh.pdf 1.0 MB
- Black Hat USA/Black Hat USA 2007/presentations/Yason/Presentation/bh-usa-07-yason.pdf 1.0 MB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Kureha=/Presentation/bh-eu-07-chess-kureha.ppt 1.0 MB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0.eng.json 1.0 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Amol_SCADA_WP.pdf 1.0 MB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Benninger - Find gold Browser Cache.eng.json 1.0 MB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Tang-Clkscrew-Exposing-The-Perils-Of-Security-Oblivious-Energy-Management-wp.pdf 1.0 MB
- Black Hat Europe/Black Hat Europe 2003/Video/David Aitel - Vivisection of an Exploit Development Process 2-2.mp4 1.0 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Unleash the Infection Monkey - A Modern Alternative to Pen-Tests.eng.json 1.0 MB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-van_der_Stock.pdf 1.0 MB
- Black Hat Asia/Black Hat Japan 2006/audio/Jeff Moss - Welcome - Japanese.opus 1.0 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Rad-International-Cyber-Jurisdiction-slides.pdf 1.0 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Lundeen-New_Ways_Hack_WebApp-WP.pdf 1.0 MB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Exploiting-Logical-Flaws-Siddharth-Slides.pdf 1.0 MB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Side-Channel Attacks on Everyday Applications.eng.json 1023.7 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Kendall_McMillan-WP.pdf 1023.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Jeff-Moss-Closing-Japanese-Translated.opus 1022.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Chuck Willis on OWASP Broken Web Applications Project.mp4 1021.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Bruce Schneier - Paradigms Lost Engineering vs Risk Management.eng.json 1017.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Is Your Timespace Safe - Time and Position Spoofing Opensourcely.eng.json 1015.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring.eng.json 1015.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Chris Evans, Thompson - Self-defending.json 1015.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Big Data for Web Application Security.eng.json 1015.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Miller/Whitepaper/bh-usa-07-miller-WP.pdf 1014.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Quist_Ames_Temporal_Reverse_Engineering/BH_US_08_Quist_Ames_Temporal_Reverse_Engineering.pdf 1014.4 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor.eng.json 1012.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization.eng.json 1011.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Kureha/Presentation/bh-eu-07-chess-kureha.ppt 1011.5 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine-wp.pdf 1009.8 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-MacJon-StealthAttacks_WP.pdf 1008.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Badger - The Networked Security State Estimation Toolkit.eng.json 1004.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Bulygin/Presentation/bh-usa-07-bulygin.pdf 1004.3 KB
- Black Hat DC/Black Hat Federal 2006/Breakable - David Litchfield (partial).opus 1003.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Certificate Bypass - Hiding and Executing Malware from a Digitally Signed Executable.eng.json 1002.9 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Who Did It - How We Attributed Campaigns of a Cyber Mercenary.eng.json 1002.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Inside Out - The Cloud has Never been so Close.eng.json 1001.0 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/Guihery-netzob-0.4-git.tar.gz 1000.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.eng.json 1000.1 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Smith-The-Apple-Of-Your-EFI-An-Updated-Analysis-Of-The-State-Of-Apples-EFI-Security-Support-wp.pdf 999.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/convrey-bh-us-02-layer2.ppt 999.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Baker/Presentation/bh-usa-07-baker.pdf 998.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Grunwald_Federal_Trojans/bh_us_08_Grunwald_Federal_Trojans.pdf 997.7 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-riley.pdf 995.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Frei and May - Speed of Insecurity.eng.json 995.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Attacking Mobile Broadband Modems Like a Criminal Would.eng.json 989.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/New Trends in FastFlux Networks.eng.json 987.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denying Service to DDoS Protection Services.eng.json 984.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Write Once, Pwn Anywhere.eng.json 980.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit - Advanced command injection exploitation - cmd.exe in the 00's - David D Rude.eng.json 976.9 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Burney-Becoming-You-A-Glimpse-Into-Credential-Abuse.pdf 976.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Whitehouse/Whitepaper/bh-eu-07-whitehouse-WP-2.pdf 976.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Whitehouse/Whitepaper/bh-eu-07-whitehouse-WP-2.pdf 976.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gallagher - Preventing CrossSite Req.eng.json 976.1 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/bh-win-03-cerrudo.pdf 973.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-dugan.pdf 971.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Clarke-Sandberg.pdf 967.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/MadHat, Simple Nomad - SPA.json 964.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Understanding the IoT Threat Landscape.eng.json 963.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dario Forte (Luncheon) - International Hacking When the cooperation is the only cure.eng.json 962.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Butler_and_Kendall/Presentation/bh-usa-07-butler_and_kendall.pdf 957.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Panel-English.eng.json 956.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-whitehouse-WP-2.pdf 956.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Ristic_Shezaf_Defending_Web_0-Day_Attacks/BH_US_08_No_More_Signatures_Defending_from_0-Day_Attacks_ModProfiler_Ivan_Ristic_Ofer_Shezaf.pdf 955.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Freeze Drying for Capturing Environment-Sensitive Malware Alive.eng.json 953.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TOR ALL-THE-THINGS.eng.json 953.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/We Can Still Crack You General Unpacking Method For Android Packer (no Root).eng.json 952.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Gupta_Got_Citrix_Hack_It/BH_US_08_Gupta_Got_Citrix_Hack_IT.pdf 945.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ken Hines - Using Causal Analysis.eng.json 944.6 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-sensepost-notes.pdf 944.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-sensepost/bh-win-03-sensepost-notes.pdf 944.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Evasion of High-End IPS Devices in the Age of IPv6.eng.json 942.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unleashing the Power of My 20 Years Old Car.eng.json 942.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds.eng.json 942.4 KB
- Black Hat USA/Black Hat USA 2006/presentations/042_Bidou.pdf 942.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Akshay Aggarwal - Rapid Threat Modeling.json 936.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Sabanal_and_Yason/Presentation/bh-usa-07-sabanal_and_yason.pdf 936.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Jeff-Moss-Thank-You-English.opus 935.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CMX - IEEE Clean File Metadata Exchange.eng.json 934.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Dempster/Whitepaper/bh-usa-07-Dempster-WP.pdf 930.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.eng.json 921.6 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Serkan Ozkan on CVEdetails.mp4 917.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denial of Service as a Service - Asymmetrical Warfare at its Finest.eng.json 910.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Familiarity Breeds Contempt The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities - Sandy Clark, Matt Blaze.eng.json 908.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Quist_and_Valsmith/Presentation/bh-usa-07-quist_and_valsmith.pdf 908.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Moyer_Hamiel_Attacking_Social_Networks/BH_US_08_Moyer_Hamiel_Satan_is_on_my_Friends_List_Slides.pdf 904.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/APT Attribution and DNS Profiling.eng.json 904.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C Foster - BlackHat Standup.eng.json 901.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hide Android Applications in Images.eng.json 900.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/Computer_Virus_Protection.tiff 900.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Overcoming iOS Data Protection to Re-enable iPhone Forensic - Andrey Belenko.eng.json 897.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Welcome & Introduction to Black Hat Asia 2017.eng.json 897.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobile Phone Messaging Anti-Forensics - Zane Lackey, Luis Miras.eng.json 896.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Andrew Stevens - How Next Generation Application Proxies Protect Against the Latest Attacks and Intrusions.eng.json 896.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Pedro Joaquin on Routerpwn.mp4 894.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit.eng.json 892.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Function Rerouting from Kernel Land with Hades - Jason Raber.eng.json 890.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Perl Jam 2 - The Camel Strikes Back.eng.json 888.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Isaac Dawson on The Web Browser Testing System (WBTS).mp4 886.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Commix - Detecting and Exploiting Command Injection Flaws.eng.json 886.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Byrne/Presentation/bh-usa-07-byrne.pdf 884.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Hawkes_Attacking_Vista_Heap/BH_US_08_Hawkes_Attacking_Vista_Heap.pdf 883.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Probabilistic Spying on Encrypted Tunnels.eng.json 883.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/SAFE - Wireless LAN Security in Depth.pdf 882.3 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/SAFE - Wireless LAN Security in Depth.pdf 882.3 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Moyer/Presentation/bh-dc-08-moyer.pdf 882.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pindemonium - A DBI-Based Generic Unpacker for Windows Executable.eng.json 881.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick Chambert - Managing MSIE Security in Corporate Networks by Creating Custom Internet Zones.eng.json 881.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BluePill Neutralizing Anti-Analysis Behavior in Malware Dissection.eng.json 876.5 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Shah/Presentation/bh-dc-08-shah.pdf 874.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Android Kernel and OS Security Assessment with Iron Crow.eng.json 872.9 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/LaGrande/F03USSCMS25_OS.pdf 872.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image.pict 871.2 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Arkin-WP.pdf 869.5 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/XML Out-of-Band Data Retrieval.eng.json 869.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gregory S Miles - Travis Schack - Introduction to Global Security Syndicate.eng.json 869.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Attacking SDN Infrastructure - Are We Ready for the Next-Gen Networking.eng.json 868.5 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Jonathan Chittenden.mp4 868.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/SAFE - A Security Blueprint for Enterprise Networks.pdf 867.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/SAFE - A Security Blueprint for Enterprise Networks.pdf 867.8 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Operation Clairvoyance How APT Groups Spy on the Media Industry.eng.json 866.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Generation of Windows Exploitation Attacking the Common Log File System.eng.json 865.9 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Friedrichs/Whitepaper/bh-dc-08-friedrichs-WP.pdf 865.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Detecting Vulnerabilities in Virtual Devices with Conformance Testing.eng.json 861.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keystone Engine - Next Generation Assembler Framework.eng.json 859.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Stephan Chenette on FireShark v2.mp4 858.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kismet and MSF - Mike Kershaw.eng.json 858.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/IEEE Software Taggant System - Mark Kennedy, Igor Muttik.eng.json 855.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Gizmo - Rachel Engel.eng.json 853.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Brad TheNurse Smith on BH Arsenal 2011.mp4 851.4 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-slides.pdf 849.3 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with James Forshaw on CANAPE.mp4 849.1 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Paget.pdf 848.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Del_Moral_Talabis/Extras/del_moral_talabis-demo_movie.zip 847.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MSF & Telephony - Druid.eng.json 847.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Renaud Bidou - Dirty BlackMail DoS Story.json 846.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mobile Malware - Why the Traditional AV Paradigm is Doomed.eng.json 846.1 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_WP.pdf 845.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Ultimate Study of Real-Life SSL Issues - Ivan Ristic.eng.json 844.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Breaking Bootloaders on the Cheap.eng.json 838.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Symantec-GS_Protections_in_Vista.pdf 838.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tom Beardsley - Monkeyspaw.eng.json 836.9 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-cerrudo/Examples/Adobe - Crash.html 836.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Next-Generation of Exploit Kit Detection By Building Simulated Obfuscators.eng.json 835.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Huawei - From China with Love.eng.json 835.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hardware Security Module - Executing Unsigned Code in HSM TEE.eng.json 833.9 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Shuster-Passive-Fingerprinting-Of-HTTP2-Clients-wp.pdf 833.1 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-malicious URI-Hamon-WP.pdf 832.8 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-remediating-Aldridge-Slides.pdf 832.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Bratus_Fuzzing_SCADA_Protocols/Bratus_Active_802.11_Fringerprinting/BH_US_08_Bratus_Peebles_Cornelius_Hansen_Active_802.11_fingerprinting.pdf 831.9 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Larsen/Presentation/bh-dc-08-larsen.pdf 830.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Analysis of Microsoft Office password protection systems, and survey of encryption holes in other MS Windows applications - Andrey Malyshev.eng.json 830.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Troika of E-Discovery Ethics, ESI, and Expertise in a Web 2.0 World - Richard Costa.eng.json 827.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/BH_US_08_DeMott_AppSec_A-Z_RE_Methodology.pdf 825.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Hunting and Exploiting Recursive MMIO Flaws in QEMU KVM.eng.json 824.8 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_win32_200.zip 824.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Waldron - VOIP Security Essentials.eng.json 824.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Charge Your Device with the Latest Malware.eng.json 824.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Incident Response @ Scale Building a Next Generation SOC.eng.json 824.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SQUIRE - Project Cowbird.eng.json 824.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Bypassing the Maginot Line Remotely Exploit the Hardware Decoder on Smartphone.eng.json 824.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).eng.json 821.8 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Jason_Geffner/BlackHat_EU_2011_Geffner_Exporting_RSA_Keys-WP.pdf 820.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Ouroboros - Tearing Xen Hypervisor With the Snake.eng.json 816.4 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-MadHatUnspecific-SimpleNomad.pdf 816.1 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Grand.pdf 813.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Maynor-Graham/Presentation/bh-eu-07-maynor-graham.pdf 810.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Metamorphic - Polymorphic Malware DNA - Chet Hosmer.eng.json 810.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-maynor-graham.pdf 810.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hacking HTTP 2 - New Attacks on the Internet's Next Generation Foundation.eng.json 809.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Darrin Barrall - Shakespearean Shellcode.json 807.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/honeynet-bh-us-02-honeynet.ppt 806.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/LaGrande/F03USSCMS18_OS.pdf 806.2 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-burnett.pdf 805.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Active 802.11 Fingerprinting - Sergey Bratus, Daniel Peebles, Cory Cornelius, Axel Hansen.eng.json 805.0 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-kanatoko_jp.pdf 802.4 KB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Abbasi-Ghost-In-The-PLC-Designing-An-Undetectable-Programmable-Logic-Controller-Rootkit-wp.pdf 800.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Codema Attack Controlling Your Smart Home Through Dangling Management Channels.eng.json 792.6 KB
- Black Hat USA/Black Hat USA 2006/presentations/047_Grunwald.pdf 792.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/USMA Share Kernel Code With Me.eng.json 791.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/DABiD - The Powerful Interactive Android Debugger for Android Malware Analysis.eng.json 791.1 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/NGSCB/F03USSCMS22_OS.pdf 790.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Data-Only Pwning Microsoft Windows Kernel.eng.json 790.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/BitTorrent Hacks - Michael Brooks.eng.json 787.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with API and Sysenter.jp.eng.json 787.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Yuan Fan - MatriXay.eng.json 782.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Del_Moral_Talabis/Whitepaper/bh-usa-07-del_moral_talabis-WP.pdf 782.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds.eng.json 779.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds_en.json 779.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Samsung Pay - Tokenized Numbers Flaws and Issues.eng.json 779.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Winning the Race to Bare Metal - UEFI Hypervisors - Don Bailey, Martin Mocko.eng.json 778.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Chenette_and_Joseph/Presentation/bh-usa-07-chenette_and_joseph.pdf 777.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Shattering Illusions in Lock-Free Worlds - Compiler Hardware Behaviors in OS and VMs.eng.json 771.4 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Grand.pdf 771.2 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Grand.pdf 771.2 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Andreas_Wiegenstein/BlackHat_EU_2011_Wiegenstein_The_ABAP_Underverse-Slides.pdf 770.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/smith-bh-us-02-biometric.ppt 769.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/ToolsTube with Marcus Carey on Vsploit.mp4 768.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/API Deobfuscator - Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis.eng.json 768.7 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/BlackHat_EU_2011_Neely_EAPeak-WP.pdf 765.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Owfuzz WiFi Nightmare.eng.json 764.5 KB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf 763.7 KB
- Black Hat USA/Black Hat USA 2009/audio/sessionlisting.pdf 763.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 Session Listing.pdf 763.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Brosch - Runtime Packers Hidden Prob.eng.json 763.2 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Sutton-Greene.pdf 762.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Android Commercial Spyware Disease and Medication.eng.json 761.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Stewart_Protocols_of_the_Storm/BH_US_08_Stewart_Protocols_of_the_Storm.pdf 757.5 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf 757.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/How NAT Works.pdf 751.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/How NAT Works.pdf 751.8 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/References/bh-us-02-convery-switches.pdf 751.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Bypass Control Flow Guard Comprehensively.eng.json 750.0 KB
- Black Hat USA/Black Hat USA 1997/Route - TCPIP Insecurities - partial.opus 747.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Boileau/metlstorms_sshjack-1.02.tar.gz 747.0 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Is WebAssembly Really Safe - Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way.eng.json 746.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/AIModel Mutator Finding Vulnerabilities in TensorFlow.eng.json 740.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MD5 Collisions - Marc Bevand.eng.json 740.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacking the Smart Grid - Tony Flick.eng.json 738.9 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-ziegler-WP.pdf 737.7 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Andrey Labunets on Windbgshark.mp4 734.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Yuan Fan - SQL Injection Detection.eng.json 733.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Inside Web Attacks - The Real Payloads.eng.json 733.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Caezar Cerrudo - Demystifying SQL - Oracle.json 732.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kimball Code Integrate Vunl audit.eng.json 728.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Bolzoni_and_Zambon/Presentation/bh-usa-07-bolzoni_and_zambon.pdf 728.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-kret.pdf 728.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/From Redmond with Love - Katie Moussouris.eng.json 726.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Unbreakable Oracle with Metasploit - Chris Gates.eng.json 725.4 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 8 8.mp4 724.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Sabanal_and_Yason/Whitepaper/bh-usa-07-sabanal_and_yason-WP.pdf 724.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Langlois/Presentation/bh-eu-07-langlois.pdf 724.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-langlois.pdf 723.7 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Sebastian_Muniz/BlackHat_EU_2011_MunizOrtega_Cisco_iOS-Slides 721.7 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Rutkowska-ppt.pdf 721.4 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/BH_EU_05_Kornbrust.pdf 721.0 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05 Kornbrust.pdf 721.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/OpenQVis/soqt.dll 720.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Fox in the Hen House (UPnP IGD) - Jonathan Squire.eng.json 719.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Free-space Quantum Key Distribution at GHz Transmission Rates - Joshua Bienfang.eng.json 717.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Macsploitation with Metasploit - Dino Dai Zovi.eng.json 712.8 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-kolbitsch-keil.pdf 712.7 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 7 7.mp4 709.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Baseline Process - Best Practices.pdf 709.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Baseline Process - Best Practices.pdf 709.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Thinking Outside the JIT Compiler.eng.json 708.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Grossman/Whitepaper/bh-usa-07-grossman-WP.pdf 708.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Stracener_Hansen_Xploiting_Google_Gadgets/BH_US_08_Hansen_Stracener_XploitingGoogleGadgets.pdf 707.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Dig Into the Attack Surface of PDF and Gain 100 CVEs in 1 Year.eng.json 703.1 KB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-1-16-28-56_arch001.rm 702.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick - Chambet - Google Attacks.eng.json 695.2 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_freebsd_200.zip 693.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Fuzzing Proprietary SCADA Protocols - Sergey Bratus.eng.json 690.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Temporal Reverse Engineering - Danny Quist, Colin Ames.eng.json 687.0 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-remediating-Aldridge-WP.pdf 685.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/caceres/caceres-bh-us-02-syscall.ppt 684.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/OpenQVis/OpenQVis.exe 684.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Heap Spray Detection with Heap Inspector - Aaron LeMasters.eng.json 683.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Veysset and Butti - Wifi Adv Stealth.eng.json 679.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Triaging Crashed With Backward Taint Analysis For Arm Architecture.eng.json 678.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta.eng.json 678.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta_en.json 678.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Bypass CFG in Chrome.eng.json 677.3 KB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Li-When-Virtualization-Encounters-AFL-A-Portable-Virtual-Device-Fuzzing-Framework-With-AFL-wp.pdf 677.2 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_macosx_200.zip 673.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-nunez di croce.pdf 673.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/eckinwiler-us-02-patriotact.ppt 672.0 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-androidmarcus_niemietz-WP.pdf 667.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Chess_West_Fay_and_Kureha/Whitepaper/bh-usa-07-chess_west_fay_and_kureha-WP.pdf 665.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Jack/BH_US_05-Jack.pdf 663.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Bulygin/Whitepaper/bh-usa-07-bulygin-WP.pdf 661.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Charles Edge - Attacking Apples Xsan.eng.json 658.7 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/bh-win-04-blight.pdf 655.2 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Paget-WP.pdf 651.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Squire_Fox_in_the_Hen_House/BH_US_08_Squire_A_Fox_in_the_Hen_House_UPnP_IGD_v1.0.0 Slides.pdf 651.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Dhamankar_and_King/Presentation/bh-usa-07-dhamankar_and_king.pdf 649.4 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Chess-West/Whitepaper/bh-dc-08-chess-west.pdf 648.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Fingerprinting Web Application Platforms by Variations in PNG Implementations.eng.json 648.3 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-over-the-air-dmitrienko-WP.pdf 646.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Moyer_Hamiel_Attacking_Social_Networks/BH_US_08_Moyer_Hamiel_Satan_is_on_my_Friends_List_Whitepaper.pdf 646.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_linux_200.zip 641.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-glancey.pdf 638.3 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Andres_Riancho/BlackHat_EU_2011_Riancho_Web_App-WP.pdf 638.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Playing by Virtual Security Rules How Virtualization Changes Everything and What to Do about It - Steve Pate.eng.json 632.9 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-laporte-kollmann.pdf 629.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deobfuscator An Automated Approach to the Identification and Removal of Code Obfuscation - Eric Laspe, Jason Raber.eng.json 628.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-Kumar-WP.pdf 627.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bhalla-WP.pdf 626.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Bhalla-Kazerooni/Whitepaper/bh-eu-07-bhalla-WP.pdf 626.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadTunnel - How Do I Get Big Brother Power.eng.json 624.5 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/Pictures/David-Alfredo.JPG 624.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-3.pict 621.9 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Conti/papers/20050515_SOUPS_Malviz_Conti.pdf 621.3 KB
- Black Hat USA/Black Hat USA 2011/Black Hat USA 2011 Session Listing.pdf 620.5 KB
- Black Hat USA/Black Hat USA 2011/audio/sessionlisting.pdf 620.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 Session Listing.pdf 620.5 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Matt Bergin about PHPMap.mp4 618.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Butti/Whitepaper/bh-eu-07-Butti.pdf 615.8 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Nazario.pdf 615.2 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Beddoe/BH_US_05-Beddoe.pdf 611.7 KB
- Black Hat USA/Black Hat USA 2002/presentations/sassaman/sassaman-blackhat02.tar.gz.ungz 610.0 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Clark/BH_US_05-Clark.pdf 608.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vipin-Nitin Kumar/Whitepaper/bh-eu-07-Kumar-WP.pdf 608.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Vipin-Nitin Kumar/Whitepaper/bh-eu-07-Kumar-WP.pdf 608.2 KB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Liang-Attacking-Windows-By-Windows.pdf 606.3 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Zanero.pdf 605.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dark Side of the DNS Force.eng.json 605.4 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Close/tylerclose_whitepaper_US05.pdf 602.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android.eng.json 602.3 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Sabanal_Yason-WP.pdf 601.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Beyond the Application - Cellular Privacy Regulatory Space.eng.json 595.8 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Oberheide/Whitepaper/bh-dc-08-oberheide.pdf 595.8 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/Pictures/David.JPG 594.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs.eng.json 594.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/OEM Finder Hunting Vulnerable OEM IoT Devices at Scale.eng.json 590.5 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-kanatoko_en.pdf 589.9 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-rogers.pdf 586.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Thiel/Presentation/bh-usa-07-thiel.pdf 584.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Dhamankar_and_King/Whitepaper/bh-usa-07-dhamankar_and_king-WP.pdf 578.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/libtomcrypt.tar.gz 570.1 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-ziegler.pdf 569.5 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/Pictures/Alfredo.JPG 568.7 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/bh-win-04-shah.pdf 565.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Bulygin_Detection_of_Rootkits/bh-us-08-bulygin_Chip_Based_Approach_to_Detect_Rootkits.pdf 563.6 KB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-rogers.pdf 561.7 KB
- Black Hat USA/Black Hat USA 2002/presentations/knight/knight-bh-us-02-vpn.ppt 559.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/schonefeld-bh-us-02-java.ppt 559.0 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Andreas_Wiegenstein/BlackHat_EU_2011_Wiegenstein_The_ABAP_Underverse-WP.pdf 558.5 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Martin_Barnum_Christey-WP.pdf 557.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-cerrudo.pdf 556.0 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/rules_default_users.xml 555.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced MySQL Exploitation - Muhaimin Dzulfakar.eng.json 552.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/0321304543.01.LZZZZZZZ.tiff 552.5 KB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-chong.pdf 552.3 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-schoenfeld.pdf 552.1 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Oudot-Extrusion-and-Web-Hacking-wp.pdf 549.6 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Andrey Malyshev and Serg Vasilenkov - Security Analysis of Microsoft Encrypted File System.eng.json 548.0 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 7 7.mp4 547.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Afek/Whitepaper/bh-usa-07-afek-WP.pdf 547.1 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Oyedata-Kalra-guide.pdf 547.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Whitepaper/bh-eu-07-cerrudo-WP.pdf 541.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Malicious File for Exploiting Forensic Software.eng.json 539.5 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Whitehouse-WP.pdf 539.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/bh-dc-07-Whitehouse-WP.pdf 539.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/Kimball_LEVI.zip 537.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/caldwell-bh-us-02-event.ppt 536.5 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Cunningham/BH_US_05-Cunningham.pdf 534.8 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Wysopal-Eng/Presentation/bh-dc-08-wysopal-eng.pdf 532.8 KB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-shah.pdf 532.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/DeMott_Enbody_and_Punch/Whitepaper/bh-usa-07-demott_enbody_and_punch-WP.pdf 531.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.eng.json 530.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-barros.pdf 528.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Fucs, Paes de Barros, Pereira/Presentation/bh-eu-07-barros.pdf 525.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Whitehouse/Whitepaper/bh-eu-07-whitehouse-WP-1.pdf 525.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Whitehouse/Whitepaper/bh-eu-07-whitehouse-WP-1.pdf 525.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/maximo-dr-1.jpg 524.6 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Wysopal-Eng/Presentation/bh-dc-08-wysopal.pdf 523.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Bing/Whitepaper/bh-eu-07-bing-WP.pdf 522.4 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-west-WP.pdf 520.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bing-WP.pdf 519.0 KB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Rutkowska.pdf 518.7 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/source.zip 516.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Welcome and Introduction to Black Hat Asia 2015.eng.json 514.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/computer-virus-spreads.tiff 512.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-whitehouse-WP-1.pdf 512.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Kortchinsky/Whitepaper/bh-eu-07-kortchinsky-WP.pdf 509.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Dwivedi_and_Lackey/Whitepaper/bh-usa-07-dwivedi_and_lackey-WP.pdf 508.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-kortchinsky-WP.pdf 506.6 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Steve-DHulton/Presentation/bh-dc-08-steve-dhulton.pdf 502.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Bratus_Fuzzing_SCADA_Protocols/BH_US_08_Bratus_Fuzzing_SCADA_Protocols.pdf 499.2 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Marco_Balduzzi/BlackHat_EU_2011_Balduzzi_HTTP_Parameter-WP.pdf 495.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/sassaman/sassaman-blackhat02.tar.gz 1 493.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Coffey/Presentation/bh-usa-07-coffey_and_viega.pdf 493.3 KB
- Black Hat USA/Black Hat USA 2002/presentations/fischbach-us-02-ipbackbone.ppt 493.0 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Black-Hat-AD-2010-android-sandcastle-wp.pdf 492.9 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/BH_AD_12_MWRI_LTE_Ruks_WP.pdf 491.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Vista and ActiveX Controls - Su Yong Kim.eng.json 491.6 KB
- Black Hat USA/Black Hat USA 2006/presentations/054_Burdach.pdf 491.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/sensepost-bh-us-02-setiri.ppt 491.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William.eng.txt 490.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/206007080.tiff 488.0 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Sparks-Butler.pdf 484.1 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Mudge.pdf 483.9 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William.eng.lrc 483.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE SessionIDs.pdf 483.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.jp.eng.json 482.7 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Sumner-Concerns_w_Facebook_WP.pdf 480.9 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Tom_Keetch/BlackHat_EU_2011_Keetch_Sandboxes-Slides.pdf 476.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/060_Tereshkin.pdf 471.6 KB
- Black Hat USA/Black Hat USA 2004/Chris Egale - Attacking Obfuscated Code with IDA pro.mp4 471.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/IMG_0121.JPG 470.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-cerrudo/bh-win-04-cerrudo.pdf 470.1 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Sklyarov-Intel-ME-Flash-File-System-Explained-wp.pdf 469.7 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Laurie_Herfurt_Holtmann/bh-eu-05-trifinite-up.pdf 468.0 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-trifinite-up.pdf 468.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Risk From Power Lines - How to Sniff the G3 and Prime Data and Detect the Interfere Attack.eng.json 467.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Ossmann_Software_Radio/BH_US_08_Ossmann_Software_Radio.pdf 465.7 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Rafal_Los/BlackHat_EU_2011_Los_Defying_Logic-WP.pdf 464.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Yason/Whitepaper/bh-usa-07-yason-WP.pdf 464.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Johnny Long - Google Hacking for Pen Test.json 463.1 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Donenfeld-Rooten-Apples-Vulnerability-Heaven-In-The-IOS-Sandbox-wp.pdf 459.4 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-zanero.pdf 455.4 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-zanero.pdf 455.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Guilfanov_Decompilers_and_Beyond/BH_US_08_Guilfanov_Decompilers_and_Beyond_slides.pdf 452.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/olle_B_Mobitex_Network_Security/BH_US_08_OlleB_Mobitex_Network_Security_Slides.pdf 448.8 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Cerrudo-WP.pdf 446.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Fowler/Presentation/bh-usa-07-fowler.pdf 444.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco IOS Reference Guide.pdf 442.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Cisco IOS Reference Guide.pdf 442.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 2-2 - Lukas Grunwald.eng.json 440.0 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-hoffman.pdf 438.3 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05_zanero.ppt 437.0 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05 zanero.ppt 437.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/O-Checker - Detection of Malicious Documents Through Deviation From File Format Specifications.eng.json 430.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Presentation/bh-eu-07-cerrudo.pdf 429.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Meer_and_Slaviero/Whitepaper/bh-usa-07-meer_and_slaviero-WP.pdf 429.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-9.pict 428.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Guilfanov_Decompilers_and_Beyond/BH_US_08_Guilfanov_Decompilers_and_Beyond_white_paper.pdf 428.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Ortega/Presentation/bh-usa-07-ortega.pdf 426.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging.eng.json 424.3 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/LaGrande/F03USSCMS180_OS.pdf 418.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-4.pict 413.9 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-flake.pdf 408.1 KB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/shah-httprint_paper.pdf 407.5 KB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-halvar.pdf 406.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William.eng.srt 404.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/sassaman/mixmaster-2.9b34.tar.gz 400.0 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kaminsky.pdf 399.3 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Kaminsky.pdf 399.3 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-smartphone-penetration-Weidman-Slides.pdf 399.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/murphey/murphey-bh-us-o2-freebsd.ppt 394.0 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Barrall.pdf 393.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/BH_US_08_DeMott_AppSec_A-Z_Introducstion_to_Reverse_Engineering.pdf 391.8 KB
- Black Hat USA/Black Hat USA 2006/presentations/057_Silberman.pdf 391.6 KB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-aitel.pdf 388.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Clark/Presentation/bh-usa-07-clark.pdf 387.6 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-FX.pdf 384.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William.eng.tsv 384.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Joglekar/Presentation/bh-usa-07-joglekar.pdf 384.0 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Laurie_Herfurt_Holtmann/Whitepaper_Blueprinting_Mulliner_Herfurt.pdf 381.3 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/Whitepaper Blueprinting Mulliner Herfurt.pdf 381.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-7.pict 381.2 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William.eng.vtt 380.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Skape-Reducing_Entropy_of_gs_Cookies.pdf 379.7 KB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Boehm.pdf 376.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Dingledine_and_Mathewson/Presentation/bh-usa-07-dingledine_and_mathewson.pdf 376.1 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/OpenQVis/MSVCRTD.DLL 376.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/goldman-bh-us-02-privacy-.ppt 375.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-peterson.pdf 374.3 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-flake.pdf 374.1 KB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Yang-Signing-Into-Billion-Mobile-Apps-Effortlessly-With-OAuth20-wp.pdf 373.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Zanero/Presentation/bh-eu-07-zanero.pdf 373.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Zanero/Presentation/bh-eu-07-zanero.pdf 373.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-zanero.pdf 373.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Eagle_Vidas_Collaborative_Reversing/BH_US_08_Eagle_Vidas_Collabreate_pres.pdf 366.8 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Mittal-Kautilya_Teensy_Beyond_Shell-WP.pdf 365.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Harbour/Presentation/bh-usa-07-harbour.pdf 365.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-luiz-ramos.pdf 364.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Luiz_Ramos/Presentation/bh-eu-07-luiz_ramos.pdf 364.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/bh-us-04-silberman-paper.pdf 363.7 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-geers-WP.pdf 363.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Geers/Greetz from Room 101.pdf 360.8 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Beauchamp-Weston/Whitepaper/bh-dc-08-beauchamp-weston-WP.pdf 358.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/wisp-quarter.jpg 357.1 KB
- Black Hat USA/Black Hat USA 2006/presentations/030_Burns.pdf 356.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-eriksson.pdf 356.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Tribute to Barnaby Jack.eng.json 355.9 KB
- Black Hat USA/Black Hat USA 2006/presentations/067_Neerumalla.pdf 353.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Goodspeed_Side-channel_Timing_Attacks/BH_US_08_Goodspeed_Side-channel_Timing_Attacks_Slides.pdf 353.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Amini_and_Portnoy/Whitepaper/bh-usa-07-amini_and_portnoy-WP.pdf 351.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image2.pict 351.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Chess_West_Fay_and_Kureha/Presentation/bh-usa-07-chess_west_fay_and_kureha.pdf 351.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2.tar 350.0 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-quynh-WP.pdf 349.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Squire_Fox_in_the_Hen_House/BH_US_08_Squire_A_Fox_in_the_Hen_House White Paper.pdf 348.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Vanegue-Panel/Presentation/bh-eu-07-vanegue.pdf 343.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Litchfield/Presentation/bh-usa-07-litchfield.pdf 341.1 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Windows 2003 Web Server Hardeni 341.0 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-baker.pdf 336.6 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Stamos-Stender.pdf 336.0 KB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-paper-sensepost.pdf 335.6 KB
- Black Hat USA/Black Hat USA 2004/Dominique Brezinski - Acting in Milliseconds - Why Defense Processes Need to Change.mp4 334.8 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Shulman-WP.pdf 334.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/LaGrande/F03USSCMS157_OS.pdf 333.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/usrp-motherboard-1.jpg 332.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Symantec-MacOSX_DeepSight_Report.pdf 332.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-hargett.pdf 331.9 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-grugq.pdf 329.4 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-grugq.pdf 329.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Hoagland/Whitepaper/bh-usa-07-hoagland-WP.pdf 328.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Chess-Kureha/Whitepaper/bh-eu-07-chess-kureha-WP.pdf 326.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Kureha=/Whitepaper/bh-eu-07-chess-kureha-WP.pdf 326.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Kureha/Whitepaper/bh-eu-07-chess-kureha-WP.pdf 326.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Whitepaper/bh-eu-07-vanegue-WP.pdf 325.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/dv1448033.jpg 325.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleA_flat-Layer0Image.jpg 325.2 KB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-grugq.pdf 325.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/wisp-quarter-1.jpg 324.6 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-miller.pdf 324.5 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Making Diversity a Priority in Security.eng.srt 322.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Garfinkle_Taking_the_Hype_Out_of_Hypervisor/BH_US_08_Garfinkel_Taking_the_Hype_Out_of_Hypervisors.pdf 322.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Vanegue-Panel/Whitepaper/bh-eu-07-vanegue-WP.pdf 321.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Piromposa_Embody-Defeating_Buffer_Oveflow_Prevention_Hardwar.pdf 318.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Piromposa_Embody-Defeating_Buffer_Oveflow_Prevention_Hardware.pdf 318.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleA_grad-Layer0Image.jpg 318.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Stender_Vidergar_Concurrency_Attacks/BH_US_08_Stender_Vidergar_Concurrency_Attacks_in_Web_Applications_Presentation.pdf 317.4 KB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Reshetova-Randomization-Can't-Stop-BPF-JIT-Spray-wp.pdf 316.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/OpenQVis/msvcrt.dll 315.5 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Patroklos_Argyroudis/BlackHat_EU_2011_ArgyroudisGlynos_Kernel_exploitation-WP.pdf 313.7 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Willis/Presentation/bh-dc-08-willis.pdf 312.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Grugq.pdf 312.6 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Broesch-ppt.pdf 312.3 KB
- Black Hat USA/Black Hat USA 2002/presentations/phenoelit-bh-us-02-network.pdf 312.3 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-wp-v1.pdf 312.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Ben-Cohen_No_More_0-Days/BH_US_08_Ohad_Ben_Cohen_whitepaper.pdf 311.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Ferguson/Whitepaper/bh-usa-07-ferguson-WP.pdf 311.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Hill/Whitepaper/bh-usa-07-hill-WP.pdf 307.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleD_flat-Layer0Image.jpg 306.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-8.pict 303.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Mora/Presentation/bh-eu-07-mora.pdf 303.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-mora.pdf 302.9 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Windows 2003 Terminal Server Ha 302.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Packet Telephony Center - A Novel Approach for the Ma.pdf 302.1 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Cisco Packet Telephony Center - A Novel Approach for the Ma.pdf 302.1 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Windows 2003 Domain Controller 302.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco VPN Solution Center 2.2.pdf 301.6 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Cisco VPN Solution Center 2.2.pdf 301.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bolzoni-WP-APHRODITE.pdf 301.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Bolzoni-Zambon/Whitepapers/bh-eu-07-bolzoni-WP-APHRODITE.pdf 301.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/LaGrande/F03USSCMS16_OS.pdf 301.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleD_grad-Layer0Image.jpg 298.9 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Conti/software/rumint/scan21.rum 298.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-vanegue-WP.pdf 298.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Windows 2003 Member Server Hard 298.0 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Meyer-Attacks-Against-GSMAS-M2M-Remote-Provisioning-wp.pdf 295.6 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Claudio_Criscione/BlackHat_EU_2011_Criscione_VirtualizationFailures-WP.pdf 295.5 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Rouch-A-Universal-Controller-To-Take-Over-A-Z-Wave-Network-wp.pdf 292.8 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Spitler-Software_Security_Goes_Mobile_WP.pdf 291.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Afek/Presentation/bh-usa-07-afek.pdf 290.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Lindsay/Whitepaper/bh-usa-07-lindsay-WP.pdf 290.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-zanero-WP.pdf 289.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Welcome and Introduction to Black Hat USA 2009 - Jeff Moss.eng.json 288.8 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Heelan-Heap-Layout-Optimisation-For-Exploitation-wp.pdf 288.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-5.pict 287.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices.eng.txt 287.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Eriksson_Oberg_Nyberg_and_Jammar/Presentation/bh-usa-07-eriksson_oberg_nyberg_and_jammar.pdf 284.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/BH_US_08_DeMott_AppSec_A-Z_Exploitation_3.pdf 284.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices.eng.lrc 282.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/mullen-us-02-nimda.ppt 282.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/alice_front-cropped-1.jpg 281.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Chawdhary_Uppal_Cisco_IOS_Shellcodes/BH_US_08_Chawdhary_Uppal_Cisco_IOS_Shellcodes.pdf 281.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Zanero/Whitepaper/bh-eu-07-zanero-WP.pdf 280.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Zanero/Whitepaper/bh-eu-07-zanero-WP.pdf 280.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Younan-et_al-Heap_Protection_Paper.pdf 280.2 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-smartphone-penetration-Weidman-WP.pdf 280.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-14.pict 279.4 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Zanero-WP.pdf 279.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Murakami_Hypervisor_IPS/bh_us_08_Murakami_Hypervisor_IPS_Slides.pdf 278.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/murphey/systrace-for-FreeBSD4.5.tgz 277.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Benson_Electronic_Discovery/BH_US_08_Benson_White_Paper.pdf 276.6 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-seki.pdf 276.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Miras/Whitepaper/bh-usa-07-miras-WP.pdf 275.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Kortchinsky/Presentation/bh-eu-07-kortchinsky.pdf 274.2 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Laurie_Herfurt_Holtmann/BH_EU_05_Laurie_Herfurt_Holtmann.pdf 273.9 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05 Laurie Herfurt Holtmann.pdf 273.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/BH_US_08_DeMott_AppSec_A-Z_Exploitation_1.pdf 273.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-kortchinsky.pdf 272.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-vanegue.pdf 272.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-dugan.pdf 272.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kim_Vista_ActiveX_Controls/BH_US_08_Kim_Vista_and_ActiveX_control.zip 272.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Perry/Presentation/bh-usa-07-perry.pdf 272.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kim_Vista_ActiveX_Controls/BH_US_08_Kim_Vista_and_ActiveX_control_WhitePaper.pdf 271.2 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Nazario-WP.pdf 270.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Day Zero - A Road Map to #BHUSA 2018.eng.srt 270.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - SamuraiWTF.eng.srt 269.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Over the Air Baseband Exploit Gaining Remote Code Execution on 5G Smartphones.eng.json 268.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William.eng.text 266.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/shinder-bh-us-02-cybercrime.ppt 266.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeff Moss - Remarks Before the keynote.eng.json 265.6 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/LaGrande/F03USSCMS20_OS.pdf 265.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-halvarflake.pdf 265.2 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/yersinia-0.5.1.tar.gz 264.9 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Route - TCPIP Insecurities - partial.eng.json 263.7 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-shah.pdf 262.6 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-lessons-from-history-healey-WP.pdf 261.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Hoffman_and_Terrill/Whitepaper/bh-usa-07-hoffman_and_terril-WP.pdf 260.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/GPRS.pdf 259.6 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/GPRS.pdf 259.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Fucs, Paes de Barros, Pereira/Whitepaper/bh-eu-07-barros-WP.pdf 259.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-15.pict 258.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Kornbrust/BH_US_05-Kornbrust.pdf 258.0 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Close/BH_US_05-Close.pdf 257.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Ortega/Whitepaper/bh-usa-07-ortega-WP.pdf 255.9 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Damir_Rajnovic/BlackHat_EU_2011_Rajnovic_Monoculture-WP.pdf 255.4 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Young.pdf 255.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleF_flat-Layer0Image.jpg 254.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-barros-WP.pdf 254.0 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - English.eng.json 252.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - SamuraiWTF.eng.vtt 252.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-polak/bh-win-04-polak.pdf 252.2 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Cerrudo.pdf 251.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Whitepaper/bh-eu-07-wilkins-WP.pdf 251.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Wilkins/Whitepaper/bh-eu-07-wilkins-WP.pdf 251.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/dv1448038.jpg 251.0 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Barrall-Dewey.pdf 250.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleF_grad-Layer0Image.jpg 249.8 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-inspection-of-windows-evdokimov-WP.pdf 249.2 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Sachin/Presentation/bh-dc-08-sachin-WP.pdf 248.8 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-etisalat_invoice.pdf 248.5 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-etisalat invoice.pdf 248.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Lindell/Whitepaper/bh-usa-07-lindell-WP.pdf 248.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-wilkins-WP.pdf 248.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/doc/proxmon.pdf 248.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/potter-bh-us-02-8021x.ppt 248.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/BH_US_08_DeMott_AppSec_A-Z_Exploitation_4.pdf 246.0 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Clark/Black Hat USA 2005 Legal Precedents- Major Clark.doc 243.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Brad_Spengler-PaX-presentation.pdf 243.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/flash-on-iphone.png 242.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Morin/Presentation/bh-usa-07-morin.pdf 241.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeff-Moss-Closing-English.eng.json 239.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-10.pict 239.6 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-stealing-from-thieves-Saher-slides.pdf 238.9 KB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Stender.pdf 238.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/LaGrande/F03USSCMS24_OS.pdf 238.2 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-litchfield.pdf 237.7 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-litchfield.pdf 237.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Lackey_and_Garbutt/Presentation/bh-usa-07-lackey_and_garbutt.pdf 237.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - SamuraiWTF.eng.txt 236.0 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Cerrudo-ppt.pdf 234.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Lindsay/Presentation/bh-usa-07-lindsay.pdf 234.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - SamuraiWTF.eng.lrc 234.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Sotirov_Dowd_Bypassing_Memory_Protections/BH_US_08_Sotirov_Dowd_Bypassing_Memory_Protections.pdf 233.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Palmer_Newsham_and_Stamos/Whitepaper/bh-usa-07-palmer_newsham_stamos-WP.pdf 233.5 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fan.pdf 232.3 KB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Kortti.pdf 232.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Tsyrklevich/Whitepaper/bh-usa-07-tsyrklevich-WP.pdf 232.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Holyfield_Protecting_with_IIS7/BH_US_08_Holyfield_Protecting_Vulnerable_Applications_with_IIS7.pdf 230.6 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-art-of-cyberwar-geers-WP.pdf 228.8 KB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Moniz.pdf 227.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Shacham-Ret2LibcWithoutFunctionCalls.pdf 227.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Vaskovich_Nmap_Scanning_the_Internet/BH_US_08_Vaskovich_Nmap_Scanning_the_Internet.pdf 225.7 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-simmonds.pdf 224.9 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-simmonds.pdf 224.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/index.html 224.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Bailey_Race_to_Bare_Metal/BH_US_08_Bailey_Winning_the_Race_to_Bare_Metay_Slides.pdf 224.2 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Windows 2000 Web Server Hardeni 224.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-11.pict 223.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Dempster/Presentation/bh-usa-07-dempster.pdf 222.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleC_flat-Layer0Image.jpg 222.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bolzoni-WP-POSEIDON.pdf 221.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Bolzoni-Zambon/Whitepapers/bh-eu-07-bolzoni-WP-POSEIDON.pdf 221.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Jericho Forum.eng.txt 219.2 KB
- Black Hat Asia/Black Hat Singapore 2003/bh-archives-2003.html 219.2 KB
- Black Hat Europe/Black Hat Europe 2003/bh-archives-2003.html 219.2 KB
- Black Hat USA/Black Hat USA 2003/bh-archives-2003.html 219.2 KB
- Black Hat Windows/Black Hat Windows 2003/bh-archives-2003.html 219.2 KB
- Black Hat USA/Black Hat USA 2003/audio/bh-archives-2003.html 219.2 KB
- Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Bilby.pdf 218.3 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-farrow.pdf 218.2 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-farrow.pdf 218.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/BH_US_08_DeMott_AppSec_A-Z_Exploitation_2.pdf 218.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/IISLockDown.exeUsageAna.doc 217.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices.eng.tsv 217.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Lindner_Cisco_IOS_Forensics/BH_US_08_Lindner_Developments_in_IOS_Forensics.pdf 216.2 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/disasm.dll 216.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Perry/Extras/Cited_Work/levine-timing.pdf 216.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Jericho Forum.eng.lrc 215.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleC_grad-Layer0Image.jpg 215.3 KB
- Black Hat USA/Black Hat USA 2002/presentations/aitel-bh-us-02-spike.ppt 214.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Filiol_Leakage_of_Non-Networked_Computers/tempest.mp3 214.0 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Frank Breedijk on Seccubus.eng.json 213.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Peirce/Whitepaper/bh-usa-07-peirce-WP.pdf 212.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Wysopal_and_Eng/Whitepaper/bh-usa-07-wysopal_and_eng-WP.pdf 212.0 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Wysopal-Eng/Whitepaper/bh-dc-08-wysopal-eng-WP.pdf 211.3 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/LaGrande/F03USSCMS17_OS.pdf 211.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha.tar 210.0 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Chess-West/Whitepaper/bh-dc-08-chess-west-WP.pdf 209.9 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Windows 2000 Terminal Server Ha 208.5 KB
- Black Hat USA/Black Hat USA 2006/presentations/038_Sotirov.pdf 208.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Sotirov/Presentation/bh-eu-07-sotirov.pdf 208.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - SamuraiWTF.eng.tsv 207.6 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Sebastian_Muniz/BlackHat_EU_2011_MunizOrtega_Cisco_iOS-WP.pdf 207.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/kaminsky-bh-us-02-blackops.ppt 207.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-aitel/UTF16INTHEWILD_Jan30.sxi 206.9 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-carvey.pdf 206.1 KB
- Black Hat DC/Black Hat Federal 2006/Breakable - David Litchfield (partial).eng.json 204.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/dugan-us-02-layer.ppt 204.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Sotirov/Presentation/bh-usa-07-sotirov.pdf 204.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleE_flat-Layer0Image.jpg 203.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Security Best Practices for Cisco Unity 3.0.pdf 202.7 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Security Best Practices for Cisco Unity 3.0.pdf 202.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Sotirov/Presentation/bh-eu-07-sotirov.pdf 202.7 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Windows 2000 Member Server Hard 202.5 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Foster-Liu.pdf 201.7 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Windows 2000 Domain Controller 201.5 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Blackhat-AD-2010-Hansen-Sokol-HTTPS-Can-Byte-Me-wp.pdf 201.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-12.pict 201.1 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Mahaffey/BH_US_05-Mahaffey.pdf 200.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Joglekar/Whitepaper/bh-usa-07-joglekar-WP.pdf 200.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Perry/Whitepaper/bh-usa-07-perry-WP.pdf 200.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Marcus Ranum - Full Disclosure and Open Source.eng.txt 199.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/HomeMonitor.tiff 199.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/Picture 42-1.jpg 198.6 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH_EU_05-Kornbrust.rar 198.3 KB
- Black Hat USA/Black Hat USA 2002/presentations/akin-bh-us-02-cisco/CiscoRouterForensics.ppt 197.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Marcus Ranum - Full Disclosure and Open Source.eng.lrc 197.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleE_grad-Layer0Image.jpg 196.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices.eng.srt 195.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Shacham_et_al-AttacksOnASLR.pdf 195.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-aitel/bh-win-03-aitel.pdf 195.4 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/BlackHat_EU_2011_Chiriac_Rootkit_detection-WP.pdf 195.1 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/NGSCB/F03USSCMS21_OS.pdf 194.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/0294327sid1400.js 193.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.eng.txt 193.3 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/libpcap-0.7.1.tar.gz 193.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-eriksson-WP.pdf 192.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moore_and_Valsmith/Whitepaper/bh-usa-07-moore_and_valsmith-WP.pdf 191.7 KB
- Black Hat USA/Black Hat USA 2002/presentations/blake-bh-us-02-flaws.ppt 191.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Timur Duehr on RagWeed.eng.json 190.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Best Practices for Catalyst 4000, 5000 and 6000 Series Swit.pdf 190.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Best Practices for Catalyst 4000, 5000 and 6000 Series Swit.pdf 190.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.eng.lrc 188.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/iStock_000003294058XSmall.jpg 188.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/Picture 36-1.jpg 187.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Metro IP Technology.pdf 187.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Metro IP Technology.pdf 187.0 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Black Hat USA 2017 Keynote.eng.srt 186.6 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Day 1 Keynote - Diplomacy and Combating Evolving International Cyber Threats.eng.srt 186.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Economics and the Underground Economy - Cormac Herley.eng.txt 185.6 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/configure 185.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Langlois=/Whitepaper/bh-eu-07-langlois-WP.pdf 184.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Langlois/Whitepaper/bh-eu-07-langlois-WP.pdf 184.3 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/repscan.exe 184.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices.eng.vtt 183.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Stamos and lackey - Breakin Ajax web.eng.txt 183.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Economics and the Underground Economy - Cormac Herley.eng.lrc 181.7 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening.zip 181.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/LaGrande/F03USscms19_OS.pdf 181.0 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Semiconductor Security Awareness Today and yesterday - Christopher Tarnovsky.eng.srt 180.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Schmeidl_and_Spindell/Whitepaper/bh-usa-07-schmeidl_and_spindell-WP.pdf 180.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/index.apxl.gz 179.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Stamos and lackey - Breakin Ajax web.eng.lrc 179.6 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/The Apple of Your EFI - An Updated Study of EFI Security.eng.srt 179.6 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/The DMCA and ACTA Vs Academic and Professional Research - Tiffany Rad, Christopher Mooney.eng.srt 179.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening.zip 178.9 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-kolbitsch-keil-WP.pdf 178.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleB_grad-Layer0Image.jpg 177.8 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-callas-up.pdf 177.4 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-callas-up.pdf 177.4 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Thank-You-English.eng.json 177.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/stone_marbleB_flat-Layer0Image.jpg 177.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - SamuraiWTF.eng.text 177.2 KB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Razavi-Flip-Feng-Shui-Rowhammering-The-VMs-Isolation-wp.pdf 176.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Sotirov/Whitepaper/bh-usa-07-sotirov-WP.pdf 176.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Maintaining a Cisco Unity System (with Microsoft Exchange a.pdf 175.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Maintaining a Cisco Unity System (with Microsoft Exchange a.pdf 175.9 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/CLOUDINOMICON - christopher.eng.srt 175.6 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Revoke-Obfuscation - PowerShell Obfuscation Detection (And Evasion) Using Science.eng.srt 174.8 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/A Process is No One - Hunting for Token Manipulation.eng.srt 174.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/TW_RGB_0000_MAIN.jpg 174.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Brian Martin and B K DeLong - Lessons Learned From attrition.org.eng.txt 173.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/aproxy_malloc.c 173.1 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Jack/BH_US_05-Jack_White_Paper.pdf 173.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/iStock_000002786228XSmall.jpg 172.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00026.jpg 172.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Panel - Removing Roadblocks to Diversity.eng.txt 172.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Feinstien_and_Peck/Whitepaper/bh-usa-07-feinstien_and_peck-WP.pdf 170.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-sotirov-WP.pdf 170.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Brian Martin and B K DeLong - Lessons Learned From attrition.org.eng.lrc 170.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/epilepsy-malice.png 169.8 KB
- Black Hat DC/Black Hat Federal 2006/My IDS is better than yours. Or is it - Stefano Zanero.eng.txt 169.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Panel - Removing Roadblocks to Diversity.eng.lrc 169.7 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/clowes-bh-us-02-binaries.ppt 169.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Gutman_Waissbein_and_Futoransky/Whitepaper/bh-usa-07-gutman_futoransky_and_waissbein-WP.pdf 169.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Falling Dominos - Kevin McPeake, Wouter Aukema.eng.srt 169.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Falling Domino's - Kevin McPeake, Wouter Aukema.eng.srt 169.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Hardening Hyper-V through Offensive Security Research.eng.srt 168.2 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/LEVI.exe 168.0 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Oi-Android_Rootkit-WP.pdf 167.9 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Aumasson-CryptanalysisVSReality_WP.pdf 167.7 KB
- Black Hat DC/Black Hat Federal 2006/My IDS is better than yours. Or is it - Stefano Zanero.eng.lrc 167.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Anti - spyware Coalition.eng.txt 167.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/WhiteCorners_cover.jpg 167.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Jericho Forum.eng.srt 167.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/New Norms and Policies in Cyber-Diplomacy.eng.srt 167.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Jericho Forum.eng.tsv 166.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/Harmony_DP_System-1.jpg 166.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Marcus Ranum - Full Disclosure and Open Source.eng.srt 165.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Anti - spyware Coalition.eng.lrc 165.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Understanding and Exploiting Implanted Medical Devices.eng.srt 165.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit and Money - HD More.eng.txt 165.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs.eng.srt 165.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/SANS_Inside_The_Buffer_Overflow_Attack.pdf 165.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jay Beale - Attacking and Defending BIND DJBDNS DNS Servers.eng.txt 165.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-kumar.pdf 165.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vipin-Nitin Kumar/Presentation/bh-eu-07-kumar.pdf 165.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Vipin-Nitin Kumar/Presentation/bh-eu-07-kumar.pdf 165.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Building a Perimeter Security Solution.pdf 164.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Building a Perimeter Security Solution.pdf 164.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/Picture 1-1.png 164.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.txt 164.1 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.txt 164.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Johnny Long - You Got That With Google.eng.json 164.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Sotirov/Whitepaper/bh-eu-07-sotirov-WP.pdf 163.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Sotirov/Whitepaper/bh-eu-07-sotirov-WP.pdf 163.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-mullen.pdf 163.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit and Money - HD More.eng.lrc 163.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/The Science of Hiring and Retaining Female Cybersecurity Engineers.eng.srt 163.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Horovitz_Virtually_Secure/BH_US_08_Horovitz_virtually_secure.pdf 162.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Russ-Rogers-Covert-Channels-English done.eng.txt 162.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Luiz_Ramos/Whitepaper/bh-eu-07-luiz_ramos-WP.pdf 162.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-luiz-ramos-WP.pdf 162.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/capture-telemetry.jpg 162.1 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Soeder-Permeh.pdf 162.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jay Beale - Attacking and Defending BIND DJBDNS DNS Servers.eng.lrc 161.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.lrc 161.2 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.lrc 161.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Eriksson_Oberg_Nyberg_and_Jammar/Whitepaper/bh-usa-07-eriksson_oberg_nyberg_and_jammar-WP.pdf 160.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Safeguarding You Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.txt 160.7 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Safeguarding Your Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.txt 160.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet.eng.srt 160.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/NGSCB/ngscb_tcb.doc 160.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Understanding SCADA's Modbus Protocol.eng.srt 160.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Marcus Ranum - Full Disclosure and Open Source.eng.tsv 160.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Hasse/Presentation/bh-usa-07-hasse.pdf 160.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Falling Dominos - Kevin McPeake, Wouter Aukema.eng.txt 160.1 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Falling Domino's - Kevin McPeake, Wouter Aukema.eng.txt 160.1 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Oudot/BH_EU_05-Oudot.pdf 159.6 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Oudot.pdf 159.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Eagle_Vidas_Collaborative_Reversing/BH_US_08_Eagle_Vidas_Collabreate_paper.pdf 159.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/obj/Debug/binviz_0.01.pdb 159.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/Picture 1-6.png 159.4 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Russ-Rogers-Covert-Channels-English done.eng.lrc 159.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently.eng.srt 159.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Dror-Thumann/Extras/CiscoHostPP.zip 159.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Dror-Thumann=/Extras/CiscoHostPP.zip 159.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Catch me, Yes we can - Pwning Social Engineers.eng.srt 158.9 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Fyodor on Mastering Nmap.eng.json 158.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Hiroaki_Etoh-ProPolice-CanSecWest2005.pdf 158.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Caswell and Moore - Thermoptic Camo.eng.txt 158.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Falling Dominos - Kevin McPeake, Wouter Aukema.eng.lrc 158.4 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Falling Domino's - Kevin McPeake, Wouter Aukema.eng.lrc 158.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Safeguarding You Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.lrc 158.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Safeguarding Your Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.lrc 158.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honey Topics.eng.txt 157.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00037.jpg 157.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Falling Dominos - Kevin McPeake, Wouter Aukema.eng.vtt 157.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Falling Domino's - Kevin McPeake, Wouter Aukema.eng.vtt 157.0 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/CLKscrew - Exposing The Perils of Security-Oblivious Energy Management.eng.srt 156.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Windows Offender - Reverse Engineering Windows Defender's Antivirus Emulator.eng.srt 156.8 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Your career is your business - Lee Kushner, Mike Murray.eng.srt 156.6 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Tom_Keetch/BlackHat_EU_2011_Keetch-Sandboxes-WP.pdf 156.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Caswell and Moore - Thermoptic Camo.eng.lrc 156.1 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Return of the Insecure Brazilian Voting Machines.eng.srt 155.5 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Breaking Bad - Stealing Patient Data Through Medical Devices.eng.srt 155.3 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Vanhoef-Key-Reinstallation-Attacks-Breaking-The-WPA2-Protocol-wp.pdf 155.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Marcus Ranum - Full Disclosure and Open Source.eng.vtt 155.1 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chris Schimdt on OWASP ESAPI Project.eng.json 154.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/ZEROing Trust - Do Zero Trust Approaches Deliver Real Security.eng.srt 154.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Anti - spyware Coalition.eng.srt 154.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00015.jpg 154.8 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Bug Collisions Meet Government Vulnerability Disclosure.eng.srt 154.7 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Things you wanted to know but were afraid to ask - Lee Kushner, Mike Murray.eng.srt 154.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00025.jpg 154.6 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Moser/Whitepaper/bh-dc-08-moser-WP.pdf 154.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities.eng.srt 154.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/tile_whitecorners_brown-light.tiff 154.5 KB
- Black Hat DC/Black Hat Federal 2006/My IDS is better than yours. Or is it - Stefano Zanero.eng.srt 154.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Jericho Forum.eng.vtt 154.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honey Topics.eng.lrc 154.4 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Moyer/Whitepaper/bh-dc-08-moyer-WP.pdf 154.3 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/DIFUZE - Android Kernel Driver Fuzzing.eng.srt 154.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Whitepaper/bh-usa-07-moyer-WP.pdf 153.6 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Flake.pdf 153.4 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Flake.pdf 153.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Coffey/Whitepaper/bh-usa-07-coffey_and_viega-WP.pdf 153.2 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/httprint200_scaled.png 153.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/scope-usrp-icd-300dpi-redacted-1.jpg 153.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerabilities of Wireless Water Meter Networks - John McNabb.eng.txt 152.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Theory) 1-2.eng.txt 152.5 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Hansen-Patterson/HP2005.pdf 152.4 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/There's a party at ring0 - Tavis Ormandy, Julien Tinnes.eng.srt 151.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Rooster and JD Glaser - Defending Your Network With Active Directory Services.eng.txt 151.1 KB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Karakostas-Ctx-Eliminating-BREACH-With-Context-Hiding-wp.pdf 151.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Black Hat USA 2018 Keynote - Parisa Tabriz.eng.srt 151.0 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities.eng.srt 150.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-langlois-WP.pdf 150.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00006.jpg 150.5 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Social Networking Special Ops - Chris Sumner.eng.srt 150.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Royal_Malware_Analyst's_Blue_Pill/BH_US_08_Royal_Malware_Analyst's_Blue_Pill_Slides.pdf 150.4 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Shah.pdf 150.3 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Shah.pdf 150.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Mainframe [zOS] Reverse Engineering and Exploit Development.eng.srt 150.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Su A Cyder - Homebrewing Malware for IOS Like a BO$$.eng.txt 150.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Don't @ Me - Hunting Twitter Bots at Scale.eng.srt 150.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Closing-Japanese-Translated.eng.json 150.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Theory) 1-2.eng.lrc 149.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Shelhart_Meet_the_Owner/BH_US_08_Trustwave_Presentation_Shelhart_Meet_Owner.pdf 149.6 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Fad or Future Getting Past the Bug Bounty Hype.eng.srt 149.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerabilities of Wireless Water Meter Networks - John McNabb.eng.lrc 149.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Understanding SCADA's Modbus Protocol.eng.vtt 149.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Mobile Network Forensics.eng.txt 149.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Rooster and JD Glaser - Defending Your Network With Active Directory Services.eng.lrc 149.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Hacker Court 04 Pirates of the Potomac.eng.srt 148.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Keynote - Optimistic Dissatisfaction with the Status Quo.eng.srt 148.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Su A Cyder - Homebrewing Malware for IOS Like a BO$$.eng.lrc 148.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Perry/Extras/Cited_Work/usability.pdf 148.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002.html 148.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00020.jpg 147.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/An Introduction to IP Security (IPSec) Encryption.pdf 147.7 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/An Introduction to IP Security (IPSec) Encryption.pdf 147.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Computer Crime Year in Review - Jennifer Granick.eng.txt 147.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Alejandro Hernaandez on DotDotPwn.eng.json 147.4 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Xavier Mertens (xme) on Pastemon.eng.json 147.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Stealth Mango and the Prevalence of Mobile Surveillanceware.eng.srt 147.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/olle_B_Mobitex_Network_Security/BH_US_08_OlleB_Mobitex_security_issues.pdf 146.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Mobile Network Forensics.eng.lrc 146.6 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Exploiting-Logical-Flaws-Siddharth-WP.pdf 146.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Clobbering the Cloud - Haroon Meer, Nick Arvanitis, Marco Slaviero.eng.txt 146.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/halvar-bh-us-02-binary.ppt 146.0 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Bochspwn Reloaded - Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking.eng.srt 146.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices - 2-2.eng.txt 145.9 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Breaking the x86 Instruction Set.eng.srt 145.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00014.jpg 145.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Anti - spyware Coalition.eng.vtt 145.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image3.png 145.0 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/An ACE Up the Sleeve - Designing Active Directory DACL Backdoors.eng.srt 144.9 KB
- Black Hat DC/Black Hat Federal 2006/My IDS is better than yours. Or is it - Stefano Zanero.eng.vtt 144.8 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Ushering in the post GRC world applied threat modeling - Alex Hutton, Allison Miller.eng.srt 144.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fayo/BH_US-05-Fayo.pdf 144.7 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Why Most Cyber Security Training Fails and What We Can Do About it.eng.srt 144.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Computer Crime Year in Review - Jennifer Granick.eng.lrc 144.6 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Developing Trust and Gitting Betrayed.eng.srt 144.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-aitel.pdf 144.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Legal Landmines - How Law and Policy are Rapidly Shaping Information Security.eng.srt 144.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Clobbering the Cloud - Haroon Meer, Nick Arvanitis, Marco Slaviero.eng.lrc 144.2 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/InterceptImports.dll 144.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Waissbein_Futoransky_and_Saura/Whitepaper/bh-usa-07-waissbein_futoransky_and_saura-WP.pdf 144.0 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Big Game Theory Hunting - The Peculiarities of Human Behavior in the InfoSec Game.eng.srt 144.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/How can Someone with Autism Specifically Enhance the Cyber Security Workforce.eng.srt 144.0 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Unauthorized Internet Wiretapping - Tim Cross.eng.srt 143.9 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stender - Attack Internatl SW - English.eng.txt 143.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Su A Cyder - Homebrewing Malware for IOS Like a BO$$.eng.srt 143.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit and Money - HD More.eng.srt 143.4 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/CALDERA - Automating Adversary Emulation.eng.srt 143.4 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations.eng.srt 143.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Stender_Vidergar_Concurrency_Attacks/BH_US_08_Stender_Vidergar_Concurrency_Attacks_in Web_Applications_Whitepaper.pdf 143.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/med_telem_diag_v4.png 143.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/tile_whitecorners_brown-dark.tiff 142.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it.eng.srt 142.8 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Understanding SCADA's Modbus Protocol.eng.txt 142.7 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Willis/Whitepaper/bh-dc-08-willis-WP.pdf 142.6 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Dealing The Perfect Hand - Shuffling Memory Blocks On z OS.eng.srt 142.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Panel - Removing Roadblocks to Diversity.eng.srt 142.6 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/source.zip 142.3 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Wardriving the smart Grid - shawn moyer.eng.srt 142.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Understanding SCADA's Modbus Protocol.eng.lrc 141.5 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Kernel Mode Threats and Practical Defenses.eng.srt 141.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Lindell_Bluetooth_2_1/BH_US_08_Lindell_Bluetooth_2.1_New_Vulnerabilities.pdf 141.3 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stender - Attack Internatl SW - English.eng.lrc 141.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Anti - spyware Coalition.eng.tsv 141.1 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux IoT Device.eng.srt 140.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/The Unbearable Lightness of BMC's.eng.srt 140.9 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Broesch-WP.pdf 140.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite_en.txt 140.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite.eng.txt 140.5 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/TLBleed - When Protecting Your CPU Caches is Not Enough.eng.srt 140.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Hacker Court 04 Pirates of the Potomac.eng.txt 140.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/SirenJack - Cracking a Secure Emergency Warning Siren System.eng.srt 140.2 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Cloak & Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.eng.srt 140.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Matthew Franz and Sean Convery - BGP Vulnerability Testing.eng.txt 140.1 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/InterceptInlinesCI.dll 140.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/InterceptInlinesEPO.dll 140.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Perry/Extras/torflow-20070627.zip 140.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Hacker Court.eng.srt 139.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Thomas Akin - WebMail Forensics.eng.srt 139.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices.eng.text 139.7 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Voyage of the reverser - Sergey Bratus, Greg Conti.eng.srt 139.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/tile_whitecorners_gray-light.tiff 139.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Deep Neural Networks for Hackers - Methods, Applications, and Open Source Tools.eng.srt 139.0 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Chris Goggans - Internet Attack Methodologies.eng.txt 139.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Bolzoni_and_Zambon/Whitepaper/bh-usa-07-bolzoni_and_zambon-WP.pdf 138.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre.eng.srt 138.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Crypto for Pentesters - Thomas Ptacek, Michael Tracy.eng.txt 138.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Panel - Removing Roadblocks to Diversity.eng.tsv 138.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Hacker Court 04 Pirates of the Potomac.eng.lrc 138.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Cean Convery - Hacking Layer Two.eng.txt 138.6 KB
- Black Hat DC/Black Hat Federal 2006/My IDS is better than yours. Or is it - Stefano Zanero.eng.tsv 138.4 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Red Team Techniques for Evading, Bypassing & Disabling MS.eng.srt 138.4 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming.eng.srt 138.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Matthew Franz and Sean Convery - BGP Vulnerability Testing.eng.lrc 138.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite_en.lrc 138.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jennifer Granick - Legal Liability and Security Incident Investigation.eng.txt 138.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite.eng.lrc 138.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Legal Liability for IOT Cybersecurity Vulnerabilities.eng.srt 138.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/Picture 33-1.jpg 138.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moore - Metasploit Reloaded.eng.txt 137.9 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev.eng.srt 137.7 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Hacking Serverless Runtimes - Profiling AWS Lambda Azure Functions & More.eng.srt 137.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor Folder/setup.exe 137.5 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering.eng.srt 137.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Len Sassman - The Anonymity Toolkit.eng.txt 137.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Advanced Oracle Attack Techniques - David Litchfield.eng.srt 137.2 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Chris Goggans - Internet Attack Methodologies.eng.lrc 137.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-karnow-notes.pdf 137.2 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Utilizing code reuse - Stefan Esser.eng.srt 137.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Stamos and lackey - Breakin Ajax web.eng.tsv 137.1 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/libnet-1.0.2a.tar.gz 136.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Cean Convery - Hacking Layer Two.eng.lrc 136.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Crypto for Pentesters - Thomas Ptacek, Michael Tracy.eng.lrc 136.8 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/TitanMist Your First Step to reversing nirvana - Mario Vuksan, Tomislav Pericin.eng.srt 136.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Auditing Binaries for Security Vulnerabilities - Halvar Flake.eng.txt 136.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Advanced Oracle Attack Techniques - David Litchfield.eng.txt 136.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/From Bot to Robot - How Abilities and Law Change with Physicality.eng.srt 136.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moore_and_Valsmith/Presentation/bh-usa-07-moore_and_valsmith.pdf 136.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit and Money - HD More.eng.tsv 136.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moore - Metasploit Reloaded.eng.lrc 136.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/7070592-0-large-1.jpg 136.0 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Security innovation network panel.eng.srt 136.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Rooster and JD Glaser - Defending Your Network With Active Directory Services.eng.srt 135.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Snooping on Cellular Gateways and Their Critical Role in ICS.eng.srt 135.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/AI & ML in Cyber Security - Why Algorithms are Dangerous.eng.srt 135.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/tile_whitecorners_brown-medium.tiff 135.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Hacker Court 04 Pirates of the Potomac.eng.vtt 135.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Su A Cyder - Homebrewing Malware for IOS Like a BO$$.eng.vtt 135.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/The Honeynet Project - 2nd Generation Honeynet Technologies.eng.txt 135.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jennifer Granick - Legal Liability and Security Incident Investigation.eng.lrc 135.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Goodspeed_Side-channel_Timing_Attacks/BH_US_08_Goodspeed_Side-channel_Timing_Attacks_White_Paper.pdf 135.2 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Falling Dominos - Kevin McPeake, Wouter Aukema.eng.tsv 135.2 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Falling Domino's - Kevin McPeake, Wouter Aukema.eng.tsv 135.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/config/ltmain.sh 135.2 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/The future of DNS Security - Panel.eng.srt 135.1 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Hansen-Patterson/BH_US_05-Hansen-Patterson.pdf 134.8 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Advanced Oracle Attack Techniques - David Litchfield.eng.lrc 134.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Why so Spurious Achieving Local Privilege Escalation on Operating Systems.eng.srt 134.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Auditing Binaries for Security Vulnerabilities - Halvar Flake.eng.lrc 134.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Len Sassman - The Anonymity Toolkit.eng.lrc 134.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - AJAX Insecurity.eng.txt 134.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hadoop Security - Seven Ways to Kill an Elephant.eng.txt 134.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court - Part2.eng.srt 134.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - Analysis of Web App worms.eng.srt 134.3 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Thomas_Roth/BlackHat_EU_2011_Roth_Breaking_encryptions-WP.pdf 134.2 KB
- Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Taft-GPU-Security-Exposed.pdf 134.1 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/These aren't the permissions you're looking for Anthony Lineberry, Tim Wyatt, David Luke Richardson.eng.srt 134.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Another Flip in the Row.eng.srt 133.9 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Wim_Remes/BlackHat_EU_2011_Remes_Blind_Squinter_rules-WP.pdf 133.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Economics and the Underground Economy - Cormac Herley.eng.tsv 133.8 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Honey, I Shrunk the Attack Surface - Adventures in Android Security Hardening.eng.srt 133.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives.eng.srt 133.8 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-the-endless-game-yang-WP.pdf 133.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/The Honeynet Project - 2nd Generation Honeynet Technologies.eng.lrc 133.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Mobile Network Forensics.eng.srt 133.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Mora/Whitepaper/bh-eu-07-mora-WP.pdf 133.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert W Clark - Legal Aspects.txt 133.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-mora-WP.pdf 133.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.eng.tsv 132.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Mental Health Hacks - Fighting Burnout, Depression and Suicide in the Hacker Community.eng.srt 132.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/WebAssembly - A New World of Native Exploits on the Browser.eng.srt 132.6 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/DataThief Folder/Data Thief V1(Beta) Help.doc 132.5 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/DeepLocker - Concealing Targeted Attacks with AI Locksmithing.eng.srt 132.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit and Money - HD More.eng.vtt 132.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Panel - Removing Roadblocks to Diversity.eng.vtt 132.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hadoop Security - Seven Ways to Kill an Elephant.eng.lrc 132.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Kaminsky - Black Ops of TCPIP.eng.txt 132.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 1-2 - Michaek Howard, David Leblanc.eng.txt 132.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - AJAX Insecurity.eng.lrc 132.3 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dominique Brezinski - Security Posture Assessment (SPA) of Windows NT Networks.eng.txt 132.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Data Thief V1(Beta) Help.doc 132.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Data Thief V1(Beta) Help.doc 132.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Unity Data and the Directory.pdf 131.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Cisco Unity Data and the Directory.pdf 131.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Embleton_Sparks_SMM_Rookits/BH_US_08_Embleton_Sparks_SMM_Rootkits_Slides.pdf 131.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems.eng.srt 131.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Survey of Remote Automotive Attack Surfaces.eng.txt 131.7 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Zero Days, Thousands of Nights - The Life & Times of Zero-Day Vulns and Their Exploits.eng.srt 131.5 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Redesigning PKI to Solve Revocation Expiration and Rotation Problems.eng.srt 131.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks.eng.srt 131.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/WhiteCorners_plain.jpg 131.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert W Clark - Legal Aspects.lrc 131.3 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Understanding the Low Fragmenation Heap - Chris Valasek.eng.srt 131.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Josh Daymont - Hardening Windows CE.eng.txt 131.0 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Keynote Hacking the Cybersecurity Puzzle.eng.srt 130.9 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Klein.pdf 130.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Defense in Depth Winning in Spit of Yourself - Erik Schlutz, David Leblanc.eng.txt 130.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Meet the Feds Feds vs. Ex-Feds - Panel.eng.txt 130.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 1-2 - Michaek Howard, David Leblanc.eng.lrc 130.4 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dominique Brezinski - Security Posture Assessment (SPA) of Windows NT Networks.eng.lrc 130.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Kaminsky - Black Ops of TCPIP.eng.lrc 130.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chuck Willis - Forensics with Linux 101.eng.srt 130.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/A Deep Dive into macOS MDM (and How it can be Compromised).eng.srt 130.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00013.jpg 130.2 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Standing on the shoulders of the blue monster - olle b.eng.srt 130.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mark Eckenwiler - USA Patriot Act and Criminal Investigations.eng.txt 129.8 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/How We Created the First SHA-1 Collision and What it Means for Hash Security.eng.srt 129.4 KB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-grugq.rar 129.3 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Exploit Kit Cornucopia.eng.srt 129.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Survey of Remote Automotive Attack Surfaces.eng.lrc 129.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Josh Daymont - Hardening Windows CE.eng.lrc 129.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/A Dive in to Hyper-V Architecture & Vulnerabilities.eng.srt 129.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/DC Panel Update from Washington - Panel.eng.txt 129.0 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Attacking NextGen Roaming Networks.eng.srt 128.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Brian Martin and B K DeLong - Lessons Learned From attrition.org.eng.tsv 128.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Callas_Alder_Bettati_and_Matthewson/Presentation/bh-usa-07-callas_alder_bettati_matthewson.pdf 128.4 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Challenges of Cooperation Across Cyberspace.eng.srt 128.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/tile_whitecorners_gray-medium.tiff 128.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.srt 128.2 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.srt 128.2 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Nation-State Moneymule's Hunting Season - APT Attacks Targeting Financial Institutions.eng.srt 128.2 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Behind the Plexiglass Curtain - Stats and Stories from the Black Hat NOC.eng.srt 128.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Caswell and Moore - Thermoptic Camo.eng.tsv 128.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Spafford-MorrisWormAnalysis.pdf 127.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Meet the Feds Feds vs. Ex-Feds - Panel.eng.lrc 127.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/heap-corruption.html 127.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Defense in Depth Winning in Spit of Yourself - Erik Schlutz, David Leblanc.eng.lrc 127.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Smart Parking Meter Implementations, Globalism, and You - Joe Grand, Jacob Appelbaum, Chris Tarnovsky.eng.txt 127.7 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Nohl-Attacking-Phone-Privacy-wp.pdf 127.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Hacker Court.eng.vtt 127.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mark Eckenwiler - USA Patriot Act and Criminal Investigations.eng.lrc 127.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Advanced Oracle Attack Techniques - David Litchfield.eng.vtt 127.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/DC Panel Update from Washington - Panel.eng.lrc 127.2 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/BH_EU_05_Cerrudo.pdf 127.1 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05 Cerrudo.pdf 127.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle.html 127.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Automated Discovery of Deserialization Gadget Chains.eng.srt 126.9 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Safeguarding You Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.tsv 126.8 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Safeguarding Your Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.tsv 126.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops.eng.srt 126.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Maynor_and_Graham/Whitepaper/bh-usa-07-maynor_and_graham-WP2.pdf 126.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Understanding SCADA's Modbus Protocol.eng.tsv 126.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ian Clarke, Oskar Sandberg - Scalable searches.txt 126.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/200266711-1.jpg 126.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00008.jpg 126.2 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Datacenter Orchestration Security and Insecurity - Assessing Kubernetes, Mesos, and Docker at Scale.eng.srt 126.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Apple iOS Security Evaluation Vulnerability Analysis and Data Encryptio - Dino Dai Zovi.eng.txt 126.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Su A Cyder - Homebrewing Malware for IOS Like a BO$$.eng.tsv 125.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Smart Parking Meter Implementations, Globalism, and You - Joe Grand, Jacob Appelbaum, Chris Tarnovsky.eng.lrc 125.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Cunningham w Morgan - US Natl Sec.eng.txt 125.8 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Breaking XSS Mitigations Via Script Gadgets.eng.srt 125.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hardware is the New King - Joe Grand aka Kingpin.eng.srt 125.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/WireGuard - Next Generation Secure Network Tunnel.eng.srt 125.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Caswell and Moore - Thermoptic Camo.eng.srt 125.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/cerberus2.txt 125.5 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-FX-Blitzableiter-wp.pdf 125.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brad Bolin - Information Security Law Update.eng.txt 125.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.tsv 125.1 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.tsv 125.1 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Go to Hunt, Then Sleep.eng.srt 125.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Crypto for Pentesters - Thomas Ptacek, Michael Tracy.eng.srt 124.9 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Lost in Transaction - Process Doppelgänging.eng.srt 124.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Rooster and JD Glaser - Defending Your Network With Active Directory Services.eng.vtt 124.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - Analysis of Web App worms.eng.txt 124.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Hacker Court.eng.txt 124.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploratory Android Surgery - Jesse Burns.eng.txt 124.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Eugene Tsyrkievich - Ozone.eng.txt 124.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Understanding Botnets By Building One.eng.srt 124.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Cunningham w Morgan - US Natl Sec.eng.lrc 124.3 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Oberheide/Whitepaper/bh-dc-08-oberheide-WP.pdf 124.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Apple iOS Security Evaluation Vulnerability Analysis and Data Encryptio - Dino Dai Zovi.eng.lrc 124.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00030.jpg 124.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/A Brief History of Mitigation - The Path to EL1 in iOS 11.eng.srt 124.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Stamos, Stender - Attacking web Service.txt 123.9 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.srt 123.9 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.srt 123.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/virus_big.jpg 123.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ian Clarke, Oskar Sandberg - Scalable searches.lrc 123.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/LTE Network Automation Under Threat.eng.srt 123.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - Analysis of Web App worms.eng.lrc 123.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roger Dingledine - Why is Anonymity So Hard.eng.txt 123.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - Analysis of Web App worms.eng.vtt 123.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Grugq - Defeating Forensic Analysis.eng.txt 123.3 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Passive Fingerprinting of HTTP 2 Clients.eng.srt 123.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Hacker Court.eng.lrc 123.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brad Bolin - Information Security Law Update.eng.lrc 123.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Thomas Akin - WebMail Forensics.eng.vtt 123.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 2-2.eng.srt 123.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Thomas Akin - WebMail Forensics.eng.txt 123.0 KB
- Black Hat DC/Black Hat Federal 2006/Analysis of Web Application Worms and Viruses - Billy Hoffman.eng.txt 123.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00016.jpg 122.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools - Shreeraj Shah.eng.txt 122.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology.eng.srt 122.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploratory Android Surgery - Jesse Burns.eng.lrc 122.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Eugene Tsyrkievich - Ozone.eng.lrc 122.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Surviving OpenHack IV - Steve Riley, Timothy Bollefer.eng.txt 122.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Wojtczuk_Subverting_the_Xen_Hypervisor/BH_US_08_Wojtczuk_Subverting_the_Xen_Hypervisor.pdf 122.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-13.pict 122.6 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Barnum-WP.pdf 122.6 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Klein_Sprundel.pdf 122.6 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Klein Sprundel.pdf 122.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Malware Detection Through Network Flow Analysis - Bruce Potter.eng.srt 122.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Kevin McPeake and Chris Goggins - Falling Dominos.eng.txt 122.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Cean Convery - Hacking Layer Two.eng.srt 122.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Russ-Rogers-Covert-Channels-English done.eng.srt 122.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices - 1-2.eng.txt 122.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court - Part2.eng.vtt 122.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chuck Willis - Forensics with Linux 101.eng.txt 122.3 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Key Reinstallation Attacks - Breaking the WPA2 Protocol.eng.srt 122.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Stamos, Stender - Attacking web Service.lrc 122.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Lance Spitzner - The Honey Net Project.eng.srt 122.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jennifer Granick - Top 10 Issues.eng.txt 122.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Chess-Kureha/Presentation/bh-eu-07-chess-kureha.pdf 122.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Meltdown - Basics, Details, Consequences.eng.srt 122.0 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Enraptured Minds - Strategic Gaming of Cognitive Mindhacks.eng.srt 122.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roger Dingledine - Why is Anonymity So Hard.eng.lrc 121.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 2-2 - Eric Schultze & Erik Birkholz.eng.srt 121.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Clark_SQL_Injection_for_Fun/BH_US_08_Clark_SQL_Injection_for_Fun_Profit.pdf 121.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Safeguarding You Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.srt 121.6 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Safeguarding Your Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.srt 121.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-chess-kureha.pdf 121.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/What the Hell is Inside There - Chris Tarnovsky.eng.srt 121.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chip Andrews - SQL Security Revisited.eng.txt 121.5 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/BlindElephant - Patrick Thomas.eng.srt 121.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Keynote Supply Chain Infections and the Future of Contactless Deliveries.eng.srt 121.5 KB
- Black Hat DC/Black Hat Federal 2006/Analysis of Web Application Worms and Viruses - Billy Hoffman.eng.lrc 121.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Grugq - Defeating Forensic Analysis.eng.lrc 121.4 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement.eng.srt 121.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chuck Willis - Forensics with Linux 101.eng.vtt 121.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal - Fran Brown, Rob Ragan.eng.txt 121.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chuck Willis - Forensics with Linux 101.eng.lrc 121.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers.eng.srt 121.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/The Honeynet Project - 2nd Generation Honeynet Technologies.eng.srt 121.3 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.srt 121.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Thomas Akin - WebMail Forensics.eng.lrc 121.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools - Shreeraj Shah.eng.lrc 121.1 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Cracking the Lens - Targeting HTTP's Hidden Attack-Surface.eng.srt 121.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01.suo 121.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jay Beale - Attacking and Defending BIND DJBDNS DNS Servers.eng.tsv 121.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honey Topics.eng.tsv 120.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Surviving OpenHack IV - Steve Riley, Timothy Bollefer.eng.lrc 120.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Bruce Potter - and - Brian Wotring.eng.txt 120.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Angell_Keynote_Complexity_In_Computer_Systems/BH_US_Angell_Keynote_Complexity.pdf 120.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Stress Testing Democracy Election Integrity During A Global Pandemic.eng.srt 120.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Kevin McPeake and Chris Goggins - Falling Dominos.eng.lrc 120.5 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Lowering the Bar - Deep Learning for Side Channel Analysis.eng.srt 120.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court - Part2.eng.txt 120.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Theory) 1-2.eng.tsv 120.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.txt 120.4 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.txt 120.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jennifer Granick - Top 10 Issues.eng.lrc 120.2 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Fischbach.pdf 120.2 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Fischbach.pdf 120.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Pre - Stuxnet, Post - Stuxnet Everything Has Changed, Nothing Has Changed.eng.srt 120.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Stewart/Whitepaper/bh-usa-07-stewart-WP.pdf 120.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Mobile Network Forensics.eng.vtt 120.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chip Andrews - SQL Security Revisited.eng.lrc 120.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Ristic_Shezaf_Defending_Web_0-Day_Attacks/BH_US_08_No_More_Signatures_Defending_from_0-Day_Attacks_ModProfiler_Ivan_Ristic_Ofer_Shezaf_Wp.pdf 119.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Rooster and JD Glaser - Defending Your Network With Active Directory Services.eng.tsv 119.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/holman-bh-us-02-email.pdf 119.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/aclocal.m4 119.9 KB
- Black Hat DC/Black Hat Federal 2006/Analysis of Web Application Worms and Viruses - Billy Hoffman.eng.srt 119.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hardware is the New King - Joe Grand aka Kingpin.eng.txt 119.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Philip Zimmermann - Keynote with Introduction by Jeff Moss.eng.txt 119.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.srt 119.3 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.srt 119.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal - Fran Brown, Rob Ragan.eng.lrc 119.3 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Hiding PIN's Artifacts to Defeat Evasive Malware.eng.srt 119.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court - Part2.eng.lrc 119.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Bruce Potter - and - Brian Wotring.eng.lrc 119.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Attacking Client-Side JIT Compilers.eng.srt 119.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Inside Apple’s MDM Black Box - David Schultz.eng.txt 118.9 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Didier Stevens on PDF Tools.eng.json 118.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/An Attacker Looks at Docker - Approaching Multi-Container Applications.eng.srt 118.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Social Engineering and the CIA - Petet Earnest.eng.txt 118.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hadoop Security - Seven Ways to Kill an Elephant.eng.srt 118.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/CareLinkScreen-1.jpg 118.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moore - Metasploit Reloaded.eng.srt 118.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Kaminsky - Black Ops of TCPIP.eng.srt 118.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.lrc 118.5 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.lrc 118.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hardware is the New King - Joe Grand aka Kingpin.eng.lrc 118.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00031.jpg 118.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dan Kaminsky - Stack Black Ops.eng.txt 118.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mandia - State of Incident Response.eng.txt 118.4 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Trends and Top Takeaways from Black Hat Asia.eng.srt 118.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jennifer Granick and Mark Eckenwiler - What Internet Service Providers Need to Know About the Law.eng.srt 118.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.srt 118.2 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.srt 118.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jay Beale - Locking Down Mac OS X.eng.srt 118.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/SDL the Wont Break the Bank.eng.srt 118.1 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017.eng.srt 118.1 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Keynote My Lessons from the Uber Case.eng.srt 118.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Circumventing Automated JavaScriptAnalysis Tools - Billy Hoffman.eng.srt 118.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Lives on The Line Securing Crisis Maps in Libya, Sudan, and Pakistan - Securing Crisis Maps in Libya, Sudan, and Pakistan.eng.txt 118.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting USB Devices with Arduino - Greg Ose.eng.txt 117.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Kret - Nobodys Anonymous - Tracking Spam and Covert Channels.eng.txt 117.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies.eng.srt 117.6 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Day 2 Keynote - Security Through Distrusting.eng.srt 117.5 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.eng.srt 117.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Hacker Court 04 Pirates of the Potomac.eng.tsv 117.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Social Engineering and the CIA - Petet Earnest.eng.lrc 117.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jennifer Granick and Mark Eckenwiler - What Internet Service Providers Need to Know About the Law.eng.txt 117.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ira Winkler - The Road to Riches.eng.srt 117.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Inside Apple’s MDM Black Box - David Schultz.eng.lrc 117.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.txt 117.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.txt 117.0 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Sluggo - Denial of Service Attacks, and Defensive Strategies.eng.txt 117.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.srt 117.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/Picture 38.jpg 116.8 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Heap Layout Optimisation for Exploitation.eng.srt 116.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mandia - State of Incident Response.eng.lrc 116.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Remotely Attacking System Firmware.eng.srt 116.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dan Kaminsky - Stack Black Ops.eng.lrc 116.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Caswell and Moore - Thermoptic Camo.eng.vtt 116.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Maynor - Leave the Theory Behind and Embrace the Code.eng.srt 116.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chip Andrews - SQL Security Revisited.eng.srt 116.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Philip Zimmermann - Keynote with Introduction by Jeff Moss.eng.lrc 116.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Marcus Ranum - Full Disclosure and Open Source.eng.text 116.6 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/ShieldFS - The Last Word in Ransomware Resilient File Systems.eng.srt 116.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Lives on The Line Securing Crisis Maps in Libya, Sudan, and Pakistan - Securing Crisis Maps in Libya, Sudan, and Pakistan.eng.lrc 116.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Auditing Binaries for Security Vulnerabilities - Halvar Flake.eng.srt 116.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Mobile Network Forensics.eng.tsv 116.1 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Keynote - Our Kryptonite A Defendable Internet.eng.srt 116.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Cean Convery - Hacking Layer Two.eng.tsv 116.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting USB Devices with Arduino - Greg Ose.eng.lrc 116.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jennifer Granick and Mark Eckenwiler - What Internet Service Providers Need to Know About the Law.eng.lrc 116.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Clobbering the Cloud - Haroon Meer, Nick Arvanitis, Marco Slaviero.eng.tsv 115.9 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Chris Goggans - Internet Attack Methodologies.eng.srt 115.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - Japanese.eng.json 115.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hardware is the New King - Joe Grand aka Kingpin.eng.vtt 115.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.lrc 115.7 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.lrc 115.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.txt 115.6 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.txt 115.6 KB
- Black Hat DC/Black Hat Federal 2006/Beyond EIP - spoonm, skape.eng.srt 115.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Pwnie Awards.eng.srt 115.6 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Practical Tips for Defending Web Applications in the Age of DevOps.eng.srt 115.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.vtt 115.5 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.vtt 115.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Cameron Hotchkies - Blind Injection Automation Techniques.eng.txt 115.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Matthew Franz and Sean Convery - BGP Vulnerability Testing.eng.srt 115.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dan Kaminsky - Stack Black Ops.eng.srt 115.3 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-references.pdf 115.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How to Steal a Nuclear Warhead Without Voiding Your XBox Warranty - Intro to tamper evident devices, applications & circumvention - Jamie Schwettmann & Eric Michaud.eng.txt 115.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Kret - Nobodys Anonymous - Tracking Spam and Covert Channels.eng.lrc 115.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Himanshu Dwivedi - iSCI Insecure SCSI.eng.txt 115.0 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 1-2 - Michaek Howard, David Leblanc.eng.srt 114.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Why Black Hats Always Win - Val Smith, Chris.eng.txt 114.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moore - Metasploit Reloaded.eng.tsv 114.9 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Sluggo - Denial of Service Attacks, and Defensive Strategies.eng.lrc 114.9 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.vtt 114.9 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.vtt 114.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Squeezing a Key through a Carry Bit.eng.srt 114.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rauch - PDB - The Protocal Debugger.eng.txt 114.5 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Dismantling DDoS - Lessons in Scaling.eng.srt 114.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.lrc 114.4 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.lrc 114.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Crypto for Pentesters - Thomas Ptacek, Michael Tracy.eng.tsv 114.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dennis Groves and Bill Pennington - Web Application Security.eng.txt 114.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Understanding Botnets By Building One.eng.vtt 114.1 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Vboot Kit Compromising Windows Vista Security - Nitin Kumar & Vipin Kumar.eng.srt 114.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Alessandro Acquisti - Privacy Economics and Immediate Gratification.eng.txt 113.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Cean Convery - Hacking Layer Two.eng.vtt 113.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.jp.eng.txt 113.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Miasm - Reverse Engineering Framework.eng.srt 113.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Practical Web Cache Poisoning - Redefining 'Unexploitable'.eng.srt 113.6 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 1-2.eng.srt 113.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Crypto for Pentesters - Thomas Ptacek, Michael Tracy.eng.vtt 113.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Computer Crime Year in Review - Jennifer Granick.eng.tsv 113.5 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How to Steal a Nuclear Warhead Without Voiding Your XBox Warranty - Intro to tamper evident devices, applications & circumvention - Jamie Schwettmann & Eric Michaud.eng.lrc 113.4 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Hacking Hardware with a $10 SD Card Reader.eng.srt 113.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Himanshu Dwivedi - iSCI Insecure SCSI.eng.lrc 113.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Black Hat USA 2003 - Dan Kaminsky - Stack Black Ops.eng.srt 113.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Identity Theft - Attacks on SSO Systems.eng.srt 113.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Why Black Hats Always Win - Val Smith, Chris.eng.lrc 113.3 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Chris Goggans - Internet Attack Methodologies.eng.tsv 113.3 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/The emperor has no cloths - Ben Feinstein, Ben Keen-.eng.srt 113.2 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Insights and Predictions What's Next in InfoSec.eng.srt 113.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Cameron Hotchkies - Blind Injection Automation Techniques.eng.lrc 113.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Measuring Delay, Jitter, and Packet Loss with Cisco IOS SAA.pdf 113.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Measuring Delay, Jitter, and Packet Loss with Cisco IOS SAA.pdf 113.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/LaGrande/F03USscms156_OS.pdf 113.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rauch - PDB - The Protocal Debugger.eng.lrc 113.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Lance Spitzner - The Honey Net Project.eng.txt 112.9 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Chiueh.pdf 112.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Matthew Franz and Sean Convery - BGP Vulnerability Testing.eng.tsv 112.9 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 2-2.eng.vtt 112.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 2-2 - Eric Schultze & Erik Birkholz.eng.txt 112.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00007.jpg 112.7 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Bruce K. Marshall - Statistical Analysis of Reusable Password Systems and Their Alternatives.eng.txt 112.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/The Finest Penetration Testing Framework for Software-Defined Networks.eng.srt 112.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Walter Gary Sharp - Key Legal Implications of Computer Network Defense.eng.txt 112.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/EarlyPacemakerProgrammer.jpg 112.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.txt 112.5 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.txt 112.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Integration of Cyber Insurance Into A Risk Management Program.eng.srt 112.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dennis Groves and Bill Pennington - Web Application Security.eng.lrc 112.5 KB
- Black Hat DC/Black Hat Federal 2006/Beyond EIP - spoonm, skape.eng.txt 112.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Eric Goldman - Criminal Copyright infringement and warez trading.eng.txt 112.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerabilities of Wireless Water Meter Networks - John McNabb.eng.tsv 112.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies.eng.srt 112.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Alessandro Acquisti - Privacy Economics and Immediate Gratification.eng.lrc 112.3 KB
- Black Hat USA/Black Hat USA 2006/presentations/Trainor/Trainor_Whitepaper_US06.pdf 112.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Safeguarding You Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.vtt 112.3 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Safeguarding Your Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.vtt 112.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Theory) 1-2.eng.srt 112.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Social Engineering and the CIA - Petet Earnest.eng.srt 112.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bruce Potter - Bluetooth Defense Kit.eng.txt 112.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - AJAX Insecurity.eng.srt 112.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloud Computing Models and Vulnerabilities - Raining on the Trendy New Parade - Alex Stamos, Andrew Becherer & Nathan Wilcox.eng.txt 112.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.jp.eng.lrc 112.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Cunningham w Morgan - US Natl Sec.eng.srt 111.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/gnuradio_board.jpg 111.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dr Mudge - Keynote.eng.txt 111.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.lrc 111.6 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.lrc 111.6 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Owning a Building - Exploiting Access Control and Facility Management Systems by Billy Rios.eng.srt 111.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Lance Spitzner - The Honey Net Project.eng.lrc 111.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Stamos and lackey - Breakin Ajax web.eng.srt 111.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Anti - spyware Coalition.eng.text 111.4 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Keynote - Securing Our Cyberspace Together.eng.srt 111.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Advanced Oracle Attack Techniques - David Litchfield.eng.tsv 111.3 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Bruce K. Marshall - Statistical Analysis of Reusable Password Systems and Their Alternatives.eng.lrc 111.3 KB
- Black Hat DC/Black Hat Federal 2006/Beyond EIP - spoonm, skape.eng.lrc 111.3 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Infecting the Enterprise - Abusing Office365Powershell for Covert C2.eng.srt 111.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 2-2 - Eric Schultze & Erik Birkholz.eng.lrc 111.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Willem Mouton on YETI Tool.eng.json 111.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Vulnerability Disclosure What the Feds Think.eng.srt 111.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Russ-Rogers-Covert-Channels-English done.eng.tsv 110.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Walter Gary Sharp - Key Legal Implications of Computer Network Defense.eng.lrc 110.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - Introduction to Embedded Security.eng.txt 110.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/It's a PHP Unserialization Vulnerability Jim, but Not as We Know It.eng.srt 110.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Bruce Potter - and - Brian Wotring.eng.srt 110.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Eric Goldman - Criminal Copyright infringement and warez trading.eng.lrc 110.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hadoop Security - Seven Ways to Kill an Elephant.eng.tsv 110.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Jericho Forum.eng.text 110.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Russ-Rogers-Covert-Channels-English done.eng.vtt 110.6 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/CQTools The New Ultimate Hacking Toolkit.eng.srt 110.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD).eng.srt 110.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Clobbering the Cloud - Haroon Meer, Nick Arvanitis, Marco Slaviero.eng.srt 110.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bruce Potter - Bluetooth Defense Kit.eng.lrc 110.5 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Patrick Richard - Open Network PKI Design Issues or Business as Usual.eng.txt 110.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reversing and Exploiting an Apple Firmware Update - K. Chen.eng.txt 110.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/The Honeynet Project - 2nd Generation Honeynet Technologies.eng.vtt 110.4 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Friday the 13th - JSON Attacks.eng.srt 110.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.vtt 110.4 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.vtt 110.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Maynor - Leave the Theory Behind and Embrace the Code.eng.txt 110.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 2-2.eng.json 110.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloud Computing Models and Vulnerabilities - Raining on the Trendy New Parade - Alex Stamos, Andrew Becherer & Nathan Wilcox.eng.lrc 110.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dr Mudge - Keynote.eng.lrc 110.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jennifer Granick and Mark Eckenwiler - What Internet Service Providers Need to Know About the Law.eng.vtt 110.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Kevin Madi - Evolution of Incident Response.av.eng.srt 110.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Malware Detection Through Network Flow Analysis - Bruce Potter.eng.vtt 110.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Stamos, Stender - Attacking web Service.srt 110.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moore - Metasploit Reloaded.eng.vtt 109.9 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Scan All the Things - Project Sonar by Mark Schloesser.eng.srt 109.8 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.vtt 109.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Eugene Tsyrkievich - Ozone.eng.srt 109.7 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.txt 109.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Lance Spitzner - The Honey Net Project.eng.vtt 109.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - Introduction to Embedded Security.eng.lrc 109.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 2-2 - Panel.eng.txt 109.5 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Zombie POODLE, GOLDENDOODLE, and How TLSv1.3 Can Save Us All.eng.srt 109.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Concurrency Attacks in Web Applications - Scott Stender, Alexander Vidergar.eng.txt 109.5 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/WiFuzz - Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake.eng.srt 109.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Surviving OpenHack IV - Steve Riley, Timothy Bollefer.eng.srt 109.3 KB
- Black Hat DC/Black Hat Federal 2006/Analysis of Web Application Worms and Viruses - Billy Hoffman.eng.vtt 109.2 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Exploiting Network Printers.eng.srt 109.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 2-2 - Eric Schultze & Erik Birkholz.eng.vtt 109.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/heparin-contamination.png 109.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/The Honeynet Project - 2nd Generation Honeynet Technologies.eng.tsv 109.2 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Investigating Malware Using Memory Forensics - A Practical Approach.eng.txt 109.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Maynor - Leave the Theory Behind and Embrace the Code.eng.lrc 109.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Forensics Tools and Processes for Windows XP Platforms - Larry Leibrock.eng.srt 109.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/NGSCB/NGSCB_Security_Model.doc 109.0 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Keynote Black Hat at 25 Where Do We Go from Here.eng.srt 109.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.srt 109.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.srt 109.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rain Forest Puppy - Novell The Forgotten OS.eng.srt 108.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Maltego Tungsten As a Collaborative Attack Platform.eng.srt 108.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - Analysis of Web App worms.eng.tsv 108.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jay Beale - Locking Down Mac OS X.eng.vtt 108.9 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Auditing Binaries for Security Vulnerabilities - Halvar Flake.eng.tsv 108.9 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Broadpwn - Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets.eng.srt 108.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chuck Willis - Forensics with Linux 101.eng.tsv 108.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reversing and Exploiting an Apple Firmware Update - K. Chen.eng.lrc 108.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Josh Daymont - Hardening Windows CE.eng.srt 108.8 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Chris Goggans - Internet Attack Methodologies.eng.vtt 108.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.vtt 108.8 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.vtt 108.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite_en.tsv 108.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Ops 2008 - Dan Kaminsky.eng.srt 108.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite.eng.tsv 108.7 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Patrick Richard - Open Network PKI Design Issues or Business as Usual.eng.lrc 108.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - AJAX Insecurity.eng.tsv 108.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Falling Dominos - Kevin McPeake, Wouter Aukema.eng.text 108.7 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Falling Domino's - Kevin McPeake, Wouter Aukema.text 108.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Understanding SCADA's Modbus Protocol.eng.text 108.7 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Burning Asgrd - Enno Rey, Daniel Mende, Rene Graf.eng.srt 108.6 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 2-2 - Michael Howard, David Leblanc.eng.srt 108.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Diana Kelly and Ian Poynter - Single Sign On 101.eng.srt 108.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert W Clark - Legal Aspects.srt 108.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 2-2 - Michael Howard, David Leblanc.eng.txt 108.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Malware analysis for the enterprise - Jason Ross.eng.txt 108.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Building Safe Systems at Scale - Lessons from Six Months at Yahoo.eng.txt 108.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Rain Forest Puppy - TBD.eng.srt 108.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hadoop Security - Seven Ways to Kill an Elephant.eng.vtt 108.2 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.lrc 108.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ian Poynter and Diana Kelly - The Truth About ASPs.eng.srt 108.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/What the Hell is Inside There - Chris Tarnovsky.eng.txt 108.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Auditing Binaries for Security Vulnerabilities - Halvar Flake.eng.vtt 108.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Threat Modeling in 2018 - Attacks, Impacts and Other Updates.eng.srt 108.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 2-2 - Panel.eng.lrc 108.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert W Clark - Legal Aspects.tsv 108.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/dbpsk.pdf 108.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fuzzing the Phone in Your Phone - Charlie Miller, Collin Mulliner.eng.txt 107.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Circumventing Automated JavaScriptAnalysis Tools - Billy Hoffman.eng.vtt 107.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Concurrency Attacks in Web Applications - Scott Stender, Alexander Vidergar.eng.lrc 107.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices - 2-2.eng.srt 107.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grossman - Hacking Intranet Outside.eng.txt 107.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Identifying the True IP Network Identity of I2P Service Hosts - Adrian Crenshaw aka Irongeek.eng.txt 107.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Deconstructing a Secure Processor - Christopher Tarnovsky.eng.srt 107.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Matthew Franz and Sean Convery - BGP Vulnerability Testing.eng.vtt 107.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning Your Phone at Every Layer - A Mobile Security Panel - Tyler Shields, Anthony Lineberry, Charlie Miller, Chris Wysopal, Dino Dai Zovi, more.eng.txt 107.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/How Do Cyber Insurers View The World.eng.srt 107.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Diana Kelly and Ian Poynter - Single Sign On 101.eng.txt 107.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bruce Potter - Bluetooth Defense Kit.eng.srt 107.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Honey Project - Latest Advances in Honeynet Technologies.eng.srt 107.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dominique Brezinski - Security Posture Assessment (SPA) of Windows NT Networks.eng.tsv 107.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/sacbee.png 107.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Staring into the Abyss The Dark Side of Security and Professional Intelligence - Richard Thieme.eng.srt 107.4 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM.eng.srt 107.3 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Investigating Malware Using Memory Forensics - A Practical Approach.eng.lrc 107.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 2-2 - Michael Howard, David Leblanc.eng.lrc 107.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mainframes - The Past Will Come to Haunt You.eng.srt 107.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/What the Hell is Inside There - Chris Tarnovsky.eng.vtt 107.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Practice) 2-2.eng.txt 107.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 1-2.eng.txt 107.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Building Safe Systems at Scale - Lessons from Six Months at Yahoo.eng.lrc 106.9 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dominique Brezinski - Security Posture Assessment (SPA) of Windows NT Networks.eng.srt 106.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roger Dingledine - Why is Anonymity So Hard.eng.srt 106.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Martin Roesch - Snort.eng.txt 106.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Deep Dive into an ICS Firewall, Looking for the Fire Hole.eng.srt 106.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Metasploit Autopsy - Reconstructing the Crime Scene - Peter Silberman, Steve Davis.eng.txt 106.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/DC Panel Update from Washington - Panel.eng.srt 106.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Vulnerability Disclosure What the Feds Think.eng.txt 106.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina.eng.srt 106.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Malware analysis for the enterprise - Jason Ross.eng.lrc 106.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/What the Hell is Inside There - Chris Tarnovsky.eng.lrc 106.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Black Ops of TCPIP 2011 - Dan Kaminsky.eng.txt 106.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Maynor - Leave the Theory Behind and Embrace the Code.eng.vtt 106.7 KB
- Black Hat DC/Black Hat Federal 2006/New Directions in Disk Forensics - Simson L. Garfinkel.eng.srt 106.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chip Andrews - SQL Security Revisited.eng.vtt 106.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - Application Security Crossfire.eng.srt 106.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Jeremy Rauch - Security Implications of Distributed Network Management.eng.txt 106.5 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.eng.srt 106.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Diana Kelly and Ian Poynter - Single Sign On 101.eng.lrc 106.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Josh Daymont - Hardening Windows CE.eng.tsv 106.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Playing Offense and Defense with Deepfakes.eng.srt 106.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Smart Parking Meter Implementations, Globalism, and You - Joe Grand, Jacob Appelbaum, Chris Tarnovsky.eng.srt 106.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Edward G Schwartz and Diana Kelly - Data Privacy What should the CIO and CISO be doing.eng.srt 106.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Kaminsky - Black Ops of TCPIP.eng.vtt 106.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fuzzing the Phone in Your Phone - Charlie Miller, Collin Mulliner.eng.lrc 106.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Understanding Botnets By Building One.eng.txt 106.4 KB
- Black Hat DC/Black Hat Federal 2006/Beyond EIP - spoonm, skape.eng.vtt 106.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ira Winkler - The Road to Riches.eng.txt 106.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/No Royal Road - Notes on Dangerous Game.eng.srt 106.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mike Schiffman - The Need for an 802.11b Toolkit.eng.srt 106.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Compression Oracle Attacks on VPN Networks.eng.srt 106.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Over-the-Air - How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars.eng.srt 106.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 1-2 - Michaek Howard, David Leblanc.eng.tsv 106.1 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/How Samsung Secures Your Wallet and How To Break It.eng.srt 106.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Hacking Public Opinion.eng.srt 106.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Identifying the True IP Network Identity of I2P Service Hosts - Adrian Crenshaw aka Irongeek.eng.lrc 106.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/.NET from the Hacker's Perspective - Drew Miller.eng.srt 106.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning Your Phone at Every Layer - A Mobile Security Panel - Tyler Shields, Anthony Lineberry, Charlie Miller, Chris Wysopal, Dino Dai Zovi, more.eng.lrc 106.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Cunningham w Morgan - US Natl Sec.eng.tsv 106.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/REST for the Wicked - Bryan Sullivan.eng.srt 105.9 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 1-2.eng.lrc 105.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hulton and Moniz - Faster pwning.eng.txt 105.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Veiled - A Browser Based Darknet - Billy Hoffman, Matt Wood.eng.txt 105.8 KB
- Black Hat DC/Black Hat Federal 2006/My IDS is better than yours. Or is it - Stefano Zanero.eng.text 105.7 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms.eng.srt 105.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - Introduction to Embedded Security.eng.srt 105.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Vulnerability Disclosure What the Feds Think.eng.lrc 105.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Teensy Programming for Everyone.eng.txt 105.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/jay_beale/beale-bh-us-02-unixftp.ppt 105.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Understanding Botnets By Building One.eng.lrc 105.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Kaminsky - Black Ops of TCPIP.eng.tsv 105.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grossman - Hacking Intranet Outside.eng.lrc 105.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Practice) 2-2.eng.lrc 105.4 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Precursor Towards Evidence-Based Trust in Hardware.eng.srt 105.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Active Exploitation Detection - Marc Eisenbarth.eng.txt 105.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeff Thompson - Making Unix Secure for the Internet with Trusted Operating Systems.eng.srt 105.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 1-2 - Michaek Howard, David Leblanc.eng.vtt 105.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Martin Roesch - Snort.eng.lrc 105.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Metasploit Autopsy - Reconstructing the Crime Scene - Peter Silberman, Steve Davis.eng.lrc 105.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Grand - Sec Problems HWare Devices.txt 105.2 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Jeremy Rauch - Security Implications of Distributed Network Management.eng.lrc 105.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ira Winkler - The Road to Riches.eng.lrc 105.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Cunningham w Morgan - US Natl Sec.eng.vtt 105.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Black Ops of TCPIP 2011 - Dan Kaminsky.eng.lrc 105.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ira Winkler - The Road to Riches.eng.vtt 105.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Network Time Protocol - Best Practice.pdf 105.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Network Time Protocol - Best Practice.pdf 105.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/New Classes of Security and Privacy Vulnerabilities for Implantable Wireless Medical Devices - Tadayoshi Kohno, Kevin Fu.eng.srt 105.0 KB
- Black Hat DC/Black Hat Federal 2006/New Directions in Disk Forensics - Simson L. Garfinkel.eng.txt 105.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honeypots.eng.srt 105.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/DC Panel Update from Washington - Panel.eng.tsv 105.0 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Attacking Encrypted USB Keys the Hard(ware) Way.eng.srt 104.9 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 2-2.eng.txt 104.9 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Farrow.pdf 104.9 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Farrow.pdf 104.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honey Topics.eng.srt 104.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Counterattack - Turning the tables on exploitation attempts from tools like metasploit - scriptjunkie.eng.txt 104.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.txt 104.8 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.txt 104.8 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 1-2.eng.vtt 104.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mandia - State of Incident Response.eng.srt 104.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Attacking Clientside JIT Compilers - Chris Rohlf, Yan Ivnitskiy.eng.txt 104.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-English.eng.txt 104.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Battery Firmware Hacking - Charlie miller.eng.txt 104.6 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.txt 104.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities.eng.srt 104.5 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Sumit Siddarth on Hacking XPath 2.eng.json 104.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00021.jpg 104.5 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stender - Attack Internatl SW - English.eng.tsv 104.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00017.jpg 104.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Hacker Court.eng.tsv 104.4 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Perfectly Deniable Steganographic Disk Encryption.eng.srt 104.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dan Kaminsky - Stack Black Ops.eng.vtt 104.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/So I became a Domain Controller.eng.srt 104.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/New Classes of Security and Privacy Vulnerabilities for Implantable Wireless Medical Devices - Tadayoshi Kohno, Kevin Fu.eng.txt 104.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Threats to the 2008 Presidential Election - Oliver Fredrichs.eng.txt 104.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Smart Parking Meter Implementations, Globalism, and You - Joe Grand, Jacob Appelbaum, Chris Tarnovsky.eng.tsv 104.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/tile_whitecorners_gray-dark.tiff 104.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hulton and Moniz - Faster pwning.eng.lrc 104.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite_en.srt 104.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Veiled - A Browser Based Darknet - Billy Hoffman, Matt Wood.eng.lrc 104.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite.eng.srt 104.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Grugq - Defeating Forensic Analysis.eng.srt 104.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Schneier/Whitepaper/bh-usa-07-schneier-WP.pdf 104.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Thiel/Whitepaper/bh-usa-07-thiel-WP.pdf 104.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 2-2.eng.lrc 104.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Kevin Madi - Evolution of Incident Response.av.eng.txt 104.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Grand - Sec Problems HWare Devices.lrc 104.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/The Big Picture.eng.txt 103.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Beetle Potter - Evil Twins 802.11.eng.txt 103.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Bruce Schneier - A hacker looks at cryptography.eng.txt 103.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hardware is the New King - Joe Grand aka Kingpin.eng.tsv 103.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Theory) 1-2.eng.vtt 103.8 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Exfiltrating Reconnaissance Data from Air-Gapped ICS SCADA Networks.eng.srt 103.7 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Breaking the Laws of Robotics - Attacking Industrial Robots.eng.srt 103.7 KB
- Black Hat DC/Black Hat Federal 2006/New Directions in Disk Forensics - Simson L. Garfinkel.eng.lrc 103.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jennifer Granick - Legal Liability and Security Incident Investigation.eng.tsv 103.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Teensy Programming for Everyone.eng.lrc 103.6 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.srt 103.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Battery Firmware Hacking - Charlie miller.eng.srt 103.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hacker Court.eng.srt 103.6 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.lrc 103.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.lrc 103.5 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.lrc 103.5 KB
- Black Hat DC/Black Hat Federal 2006/Analysis of Web Application Worms and Viruses - Billy Hoffman.eng.tsv 103.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/A Picture’s Worth Digital Image Analysis - Dr. Neal Krawetz.eng.srt 103.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Survey of Remote Automotive Attack Surfaces.eng.srt 103.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Your Mind - Legal Status, Rights and Securing Yourself - Tiffany Rad & James Arlen.eng.txt 103.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Larry Leibrock - Digital Information,User Tokens,Privacy and Forensics Investigation.eng.srt 103.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Attacking Clientside JIT Compilers - Chris Rohlf, Yan Ivnitskiy.eng.lrc 103.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Active Exploitation Detection - Marc Eisenbarth.eng.lrc 103.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Battery Firmware Hacking - Charlie miller.eng.lrc 103.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court - Part2.eng.tsv 103.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-English.eng.lrc 103.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Faces Of Facebook Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.txt 103.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ian Poynter and Diana Kelly - The Truth About ASPs.eng.txt 103.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jay Beale - Attacking and Securing UNIX FTP Servers.eng.txt 103.2 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Bruce K. Marshall - Statistical Analysis of Reusable Password Systems and Their Alternatives.eng.srt 103.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Language of Trust - Mark Dowd, Ryan Smith, David Dewey.eng.txt 103.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/New Classes of Security and Privacy Vulnerabilities for Implantable Wireless Medical Devices - Tadayoshi Kohno, Kevin Fu.eng.lrc 103.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/There’s a Fox in the Henhouse - Jeff Williams.eng.txt 103.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Counterattack - Turning the tables on exploitation attempts from tools like metasploit - scriptjunkie.eng.lrc 103.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Survey of Remote Automotive Attack Surfaces.eng.tsv 103.1 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.srt 103.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/LTE & IMSI Catcher Myths.eng.txt 103.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Black Hat USA 2003 - Dan Kaminsky - Stack Black Ops.eng.vtt 103.0 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/A Measured Response to a Grain of Rice.eng.srt 103.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.jp.eng.srt 103.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honeypots.eng.txt 102.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Kevin Madi - Evolution of Incident Response.av.eng.lrc 102.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Apple iOS Security Evaluation Vulnerability Analysis and Data Encryptio - Dino Dai Zovi.eng.tsv 102.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Lockpicking Forensics - Datagram.eng.txt 102.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-SpoonM-Skape.pdf 102.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Apple iOS Security Evaluation Vulnerability Analysis and Data Encryptio - Dino Dai Zovi.eng.srt 102.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jay Beale - Locking Down Mac OS X.eng.txt 102.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Threats to the 2008 Presidential Election - Oliver Fredrichs.eng.lrc 102.7 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Tzi-Cker.pdf 102.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/CSO Panel Black Hat Strategy Meeting - Panel.eng.srt 102.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Vulnerability Disclosure What the Feds Think.eng.vtt 102.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mark Eckenwiler - USA Patriot Act and Criminal Investigations.eng.tsv 102.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - AJAX Insecurity.eng.vtt 102.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Willis and Belani - Web App Incident.eng.txt 102.6 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.txt 102.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/The Big Picture.eng.lrc 102.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dennis Groves and Bill Pennington - Web Application Security.eng.srt 102.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Making Big Things Better The Dead Cow Way.eng.srt 102.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Stamos, Stender - Attacking web Service.tsv 102.3 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Evading Microsoft ATA for Active Directory Domination.eng.srt 102.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Security When Nano-Seconds Count - James Arlen.eng.txt 102.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is Your Phone Pwned - Kevin Mahaffey, Anthony Lineberry, John Hering.eng.srt 102.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Design Issues and Software Vulnerabilities in Embedded Systems - FX.eng.srt 102.3 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Shifting Knowledge Left Keeping up with Modern Application Security.eng.srt 102.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Clobbering the Cloud - Haroon Meer, Nick Arvanitis, Marco Slaviero.eng.vtt 102.2 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Jeremy Rauch - Security Implications of Distributed Network Management.eng.srt 102.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Beetle Potter - Evil Twins 802.11.eng.lrc 102.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ian Poynter and Diana Kelly - The Truth About ASPs.eng.lrc 102.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Stamos and lackey - Breakin Ajax web.eng.vtt 102.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rain Forest Puppy - Novell The Forgotten OS.eng.txt 102.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Your Mind - Legal Status, Rights and Securing Yourself - Tiffany Rad & James Arlen.eng.lrc 102.1 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Social Engineering and the CIA - Petet Earnest.eng.vtt 102.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Bruce Schneier - A hacker looks at cryptography.eng.lrc 102.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Eugene Tsyrkievich - Ozone.eng.tsv 102.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools - Shreeraj Shah.eng.srt 101.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jay Beale - Locking Down Mac OS X.eng.lrc 101.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/There’s a Fox in the Henhouse - Jeff Williams.eng.lrc 101.9 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Intel ME - Flash File System Explained.eng.srt 101.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.txt 101.8 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.txt 101.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Language of Trust - Mark Dowd, Ryan Smith, David Dewey.eng.lrc 101.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honeypots.eng.lrc 101.6 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.lrc 101.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Four Types of Locks - Deviant Ollam.eng.srt 101.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Faces Of Facebook Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.lrc 101.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Bruce Potter - and - Brian Wotring.eng.vtt 101.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/LTE & IMSI Catcher Myths.eng.lrc 101.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.srt 101.5 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.srt 101.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jennifer Granick and Mark Eckenwiler - What Internet Service Providers Need to Know About the Law.eng.tsv 101.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jay Beale - Attacking and Securing UNIX FTP Servers.eng.lrc 101.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Lives on The Line Securing Crisis Maps in Libya, Sudan, and Pakistan - Securing Crisis Maps in Libya, Sudan, and Pakistan.eng.srt 101.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roger Dingledine - Why is Anonymity So Hard.eng.tsv 101.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Circumventing Automated JavaScriptAnalysis Tools - Billy Hoffman.eng.txt 101.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.srt 101.4 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.srt 101.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Josh Daymont - Hardening Windows CE.eng.vtt 101.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Willis and Belani - Web App Incident.eng.lrc 101.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Lockpicking Forensics - Datagram.eng.lrc 101.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rain Forest Puppy - Novell The Forgotten OS.eng.lrc 101.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chip Andrews - SQL Security Revisited.eng.tsv 101.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous.eng.srt 101.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Unpacking the Packed Unpacker - Reverse Engineering an Android Anti-Analysis Native Library.eng.srt 101.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00009.jpg 100.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit and Money - HD More.eng.text 100.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Stamos, Stender - Attacking web Service.vtt 100.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/URI Use and Abuse - Nathan McFeters and Rob Carter.eng.srt 100.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Brian Martin and B K DeLong - Lessons Learned From attrition.org.eng.srt 100.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Security When Nano-Seconds Count - James Arlen.eng.lrc 100.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploratory Android Surgery - Jesse Burns.eng.tsv 100.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeff Thompson - Making Unix Secure for the Internet with Trusted Operating Systems.eng.txt 100.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jim Christy - The Defense Cyber Crime.eng.txt 100.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/The Path Less Traveled Abusing Kubernetes Defaults.eng.srt 100.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Infighting Among Russian Security Services in the Cyber Sphere.eng.srt 100.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/I'm Unique, Just Like You Human Side-Channels and Their Implications for Security and Privacy.eng.srt 100.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Circumventing Automated JavaScriptAnalysis Tools - Billy Hoffman.eng.lrc 100.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.srt 100.6 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.srt 100.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Bruce Potter - and - Brian Wotring.eng.tsv 100.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.lrc 100.6 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.lrc 100.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Hacking Hollywood.eng.srt 100.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Grugq - Defeating Forensic Analysis.eng.tsv 100.5 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Richard Thieme - Masters of the Unseen The Art of Information Warfare.eng.txt 100.5 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Clark/Black Hat USA 2005 DoJ Prosecutions July 2004 to June 2005 Complied by Major Clark.doc 100.5 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Fireside Chat Jeff Moss and Ruimin He.eng.srt 100.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Controlled Chaos The Inevitable Marriage of DevOps & Security.eng.srt 100.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Diana Kelly and Ian Poynter - Single Sign On 101.eng.vtt 100.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Black Hat USA 2003 - Dan Kaminsky - Stack Black Ops.eng.txt 100.3 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Sluggo - Denial of Service Attacks, and Defensive Strategies.eng.srt 100.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Fischbach - Carrier VOIP Security.eng.txt 100.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Panel - Removing Roadblocks to Diversity.eng.text 100.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Brandon Wiley - The Superworm Manifesto.eng.srt 100.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Len Sassman - The Anonymity Toolkit.eng.tsv 100.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Economics and the Underground Economy - Cormac Herley.eng.srt 100.1 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems.eng.srt 100.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Kevin McPeake and Chris Goggins - Falling Dominos.eng.srt 100.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/The Future of ATO.eng.srt 100.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Kevin Madi - Evolution of Incident Response.av.eng.vtt 100.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Honey Project - Latest Advances in Honeynet Technologies.eng.txt 100.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Su A Cyder - Homebrewing Malware for IOS Like a BO$$.eng.text 100.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Eugene Tsyrkievich - Ozone.eng.vtt 100.0 KB
- Black Hat USA/Black Hat USA 1997/bh-archives-97-98-99.html 100.0 KB
- Black Hat USA/Black Hat USA 1998/bh-archives-97-98-99.html 100.0 KB
- Black Hat USA/Black Hat USA 1999/bh-archives-97-98-99.html 100.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Getaway - Methods and Defenses for Data Exfiltration - Sean Coyne, Ryan Kazanciyan.eng.txt 100.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Keynote Democracy's Biggest Year The Fight for Secure Elections Around the World.eng.srt 100.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ian Goldberg - Breaking 80211 WEP.eng.txt 100.0 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Payload Anatomy & Future Mutations - Riley Hassell.eng.srt 99.9 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/The Hidden Treasure of Crash Reports.eng.srt 99.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Fischbach and Lacoste - Seris - IP Backbone Security.eng.txt 99.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeff Thompson - Making Unix Secure for the Internet with Trusted Operating Systems.eng.lrc 99.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Metasploit Autopsy - Reconstructing the Crime Scene - Peter Silberman, Steve Davis.eng.srt 99.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Surviving OpenHack IV - Steve Riley, Timothy Bollefer.eng.vtt 99.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Inducing Momentary Faults Within Secure StandardsMicrocontrollers - Christopher Tarnovsky.eng.srt 99.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.tsv 99.7 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.tsv 99.7 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Beyond Check The Box - Powering Intrusion Investigations by Jim Aldridge.eng.srt 99.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dominique Brezinski - Security Posture Assessment (SPA) of Windows NT Networks.eng.vtt 99.7 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dan-Kaminsky-Black-Ops-tcp-ip-English.eng.srt 99.6 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Self-Verifying Authentication - A Framework For Safer Integrations of Single-Sign-On Services.eng.srt 99.6 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 2-2 - Michael Howard, David Leblanc.eng.vtt 99.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Drew Miller - .Net from the hackers perspective Part 2 .eng.srt 99.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sour Pickles - Marco Slaviero.eng.srt 99.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Staring into the Abyss The Dark Side of Security and Professional Intelligence - Richard Thieme.eng.vtt 99.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rain Forest Puppy - Novell The Forgotten OS.eng.vtt 99.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths.eng.srt 99.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert W Clark - Legal Aspects.vtt 99.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dr Mudge - Keynote.eng.srt 99.4 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers.html 99.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Black Hat USA 2003 - Dan Kaminsky - Stack Black Ops.eng.lrc 99.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools - Shreeraj Shah.eng.tsv 99.3 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/George_Hedfors/BlackHat_EU_2011_Hedfors_Owning_the_datacenter-WP.pdf 99.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keynote - The Hidden Architecture of our Time - Why This Internet Worked, How We Could Lose It.eng.srt 99.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ian Poynter and Diana Kelly - The Truth About ASPs.eng.vtt 99.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/XSS Street-Fight - The Only Rule Is There Are No Rules - Ryan Barnett.eng.srt 99.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/MITRE ATT&CK The Play at Home Edition.eng.srt 99.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Forensics Tools and Processes for Windows XP Platforms - Larry Leibrock.eng.vtt 99.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Job de Haas - GSM WAP and SMS Security.eng.srt 99.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.tsv 99.1 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.tsv 99.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.tsv 99.1 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.tsv 99.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jim Christy - The Defense Cyber Crime.eng.lrc 99.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Getaway - Methods and Defenses for Data Exfiltration - Sean Coyne, Ryan Kazanciyan.eng.lrc 99.1 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Strategies for Defeating Distributed Attacks - Simple Nomad.eng.srt 99.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeremy Rauch - How Responsive are Vendors to Security Problems When They Aren't Being Pressured.eng.srt 99.0 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Tsyrklevich.pdf 99.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Honey Project - Latest Advances in Honeynet Technologies.eng.lrc 99.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mandia - State of Incident Response.eng.tsv 98.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - Application Security Crossfire.eng.txt 98.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Fischbach - Carrier VOIP Security.eng.lrc 98.9 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Network Automation is Not Your Safe Haven.eng.srt 98.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerhard Eschelbeck - Law Vulnerabilities.eng.txt 98.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/HTML5 Threats.eng.txt 98.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Richard Thieme - Masters of the Unseen The Art of Information Warfare.eng.lrc 98.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/DC Panel Update from Washington - Panel.eng.vtt 98.8 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ray Kaplan - Meet The Enemy.eng.srt 98.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.vtt 98.7 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.vtt 98.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Healthscare - An Insider's Biopsy of Healthcare Application Security.eng.srt 98.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ian Goldberg - Breaking 80211 WEP.eng.lrc 98.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jennifer Granick - Top 10 Issues.eng.tsv 98.6 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/The Black Hat NOC Greatest Hits and HolyCows.eng.srt 98.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roger Dingledine - Why is Anonymity So Hard.eng.vtt 98.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jaya Baloo - Lawful Interception of IP the European Context.eng.srt 98.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sensepost - Deus ex Machina.eng.txt 98.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Worm Charming Harvesting Malware Lures for Fun and Profit.eng.srt 98.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stuxnet Redux - Malware Attribution and Lessons Learned - Taking the guesswork out of cyber attribution - Tom Parker.eng.txt 98.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/BIDOU - IPS Shortcomings.eng.txt 98.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sensepost - Deus ex Machina.eng.srt 98.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Greg Hoglund - Advanced Buffer Overflow Techniques.eng.srt 98.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sour Pickles - Marco Slaviero.eng.txt 98.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kotler_Rom_Jinx_Malware/BH_US_08_Kotler_Rom_Jinx_Malware.pdf 98.5 KB
- Black Hat Europe/Black Hat Europe 2011/Video/Black Hat Europe 2011 captions/Black Hat Europe 2011 - Keynote - Bruce Schneier.eng.srt 98.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Malware Detection Through Network Flow Analysis - Bruce Potter.eng.txt 98.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Fischbach and Lacoste - Seris - IP Backbone Security.eng.lrc 98.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - Introduction to Embedded Security.eng.vtt 98.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Project Zero Five Years of 'Make 0Day Hard'.eng.srt 98.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Ops 2008 - Dan Kaminsky.eng.vtt 98.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reversing and Exploiting an Apple Firmware Update - K. Chen.eng.srt 98.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-miller-notes.pdf 98.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-miller/bh-win-03-miller-notes.pdf 98.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Surviving OpenHack IV - Steve Riley, Timothy Bollefer.eng.tsv 98.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Your Mind - Legal Status, Rights and Securing Yourself - Tiffany Rad & James Arlen.eng.srt 98.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Lessons and Lulz - The 4th Annual Black Hat USA NOC Report.eng.srt 98.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/.NET from the Hacker's Perspective - Drew Miller.eng.vtt 98.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Your Voice is My Passport.eng.srt 98.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Preparing for the Cross Site Request Forgery Defense - Chuck Willis.eng.txt 98.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Global Security Report 2010 Analysis of Investigations and Penetration Tests - Nicholas J Percoco.eng.srt 98.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Smartfuzzing the Web Carpe Vestra Foramina - Nathan Hamiel, Justin Engler, Seth Law, Gregory Fleischer.eng.txt 98.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Alessandro Acquisti - Privacy Economics and Immediate Gratification.eng.srt 98.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Thomas Akin - WebMail Forensics.eng.tsv 98.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Beckstrom’s Law - Rod Beckstrom.eng.srt 98.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Smart Parking Meter Implementations, Globalism, and You - Joe Grand, Jacob Appelbaum, Chris Tarnovsky.eng.vtt 98.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploratory Android Surgery - Jesse Burns.eng.srt 98.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - A Historical Look at Hardware Token Compromises.eng.txt 98.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - Application Security Crossfire.eng.lrc 97.9 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Betraying the BIOS - Where the Guardians of the BIOS are Failing.eng.srt 97.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Attacking the Vista Heap - Ben Hawkes.eng.srt 97.8 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Digital Vengeance - Exploiting the Most Notorious C&C Toolkits.eng.srt 97.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Secure Shells in Shambles.eng.srt 97.8 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.srt 97.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.eng.txt 97.8 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/WPA Migration Mode - Leandro Meiners, Diego Sor.eng.srt 97.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/A Picture’s Worth Digital Image Analysis - Dr. Neal Krawetz.eng.txt 97.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeff Thompson - Making Unix Secure for the Internet with Trusted Operating Systems.eng.vtt 97.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Grand - Sec Problems HWare Devices.srt 97.7 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Breaking Out HSTS (and HPKP) On Firefox, IE Edge and (Possibly) Chrome.eng.srt 97.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Honey Project - Latest Advances in Honeynet Technologies.eng.vtt 97.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Rain Forest Puppy - TBD.eng.vtt 97.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00018.jpg 97.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Edward G Schwartz and Diana Kelly - Data Privacy What should the CIO and CISO be doing.eng.vtt 97.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Malware Detection Through Network Flow Analysis - Bruce Potter.eng.lrc 97.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.eng.txt 97.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.txt 97.6 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.txt 97.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Defense in Depth Winning in Spit of Yourself - Erik Schlutz, David Leblanc.eng.tsv 97.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Getaway - Methods and Defenses for Data Exfiltration - Sean Coyne, Ryan Kazanciyan.eng.srt 97.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Introduction to Tamper Evident Devices - datagram.eng.txt 97.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chuck Willis on OWASP Broken Web Applications Project.eng.json 97.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Next Generation Collaborative Reversing with Ida Pro and CollabREate - Chris Eagle, Tim Vidas.eng.txt 97.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kostya Kortchinsky - Bruce Schneier.eng.srt 97.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rauch - PDB - The Protocal Debugger.eng.srt 97.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.tsv 97.5 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.tsv 97.5 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.vtt 97.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Curtis E Karnow - Running the Matrix.eng.txt 97.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sour Pickles - Marco Slaviero.eng.lrc 97.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Staring into the Abyss The Dark Side of Security and Professional Intelligence - Richard Thieme.eng.txt 97.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Hacking Ten Million Useful Idiots Online Propaganda as a Socio-Technical Security Project.eng.srt 97.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Deconstructing a Secure Processor - Christopher Tarnovsky.eng.vtt 97.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Decompiler Internals - Microcode.eng.srt 97.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Lives on The Line Securing Crisis Maps in Libya, Sudan, and Pakistan - Securing Crisis Maps in Libya, Sudan, and Pakistan.eng.tsv 97.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerhard Eschelbeck - Law Vulnerabilities.eng.lrc 97.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sensepost - Deus ex Machina.eng.lrc 97.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/HTML5 Threats.eng.lrc 97.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dan Kaminsky - Stack Black Ops.eng.tsv 97.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SCTPscan - Finding Entry Points to SS7 Networks & Telecommunication Backbones - Philippe Langlois.eng.txt 97.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mainframes - The Past Will Come to Haunt You.eng.txt 97.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Adventures in the Underland The CQForensic Toolkit as a Unique Weapon Against Hackers.eng.srt 97.2 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Building Trojan Hardware at Home by JP Dunning.eng.srt 97.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rutkowska - Subverting Vista Kernel.eng.txt 97.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/New Classes of Security and Privacy Vulnerabilities for Implantable Wireless Medical Devices - Tadayoshi Kohno, Kevin Fu.eng.vtt 97.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - Application Security Crossfire.eng.vtt 97.1 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Virtually Pwned - Claudio Criscione.eng.srt 97.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Royal_Malware_Analyst's_Blue_Pill/BH_US_08_Royal_Malware_Analyst's_Blue_Pill_WhitePaper.pdf 97.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Keynote - Quest for the Holy Grail - Jerry Dixon.eng.txt 97.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/BIDOU - IPS Shortcomings.eng.lrc 97.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/advanced-malloc-exploits.html 97.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stuxnet Redux - Malware Attribution and Lessons Learned - Taking the guesswork out of cyber attribution - Tom Parker.eng.lrc 96.9 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.vtt 96.9 KB
- Black Hat DC/Black Hat Federal 2006/New Directions in Disk Forensics - Simson L. Garfinkel.eng.vtt 96.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting USB Devices with Arduino - Greg Ose.eng.srt 96.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mike Schiffman - The Need for an 802.11b Toolkit.eng.vtt 96.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - A Historical Look at Hardware Token Compromises.eng.lrc 96.9 KB
- Black Hat USA/Black Hat USA 2006/presentations/031_Hacker.pdf 96.9 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Ian Goldberg - Cell Phone Security A History and The State of the Art.eng.txt 96.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Aerial Cyber Apocalypse If We Can Do It So Can They - Richard Perkins, Mike Tassey.eng.txt 96.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/RETrace - Applied Reverse Engineering on OS X - Tiller Beauchamp, David Weston.eng.txt 96.8 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Attacking Hardware Systems Using Resonance and the Laws of Physics.eng.srt 96.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Russia - Inside an unprecended prosecution of organized cybercrime - Joseph Menn.eng.txt 96.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Maltego Tungsten As a Collaborative Attack Platform.eng.vtt 96.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Willis and Belani - Web App Incident.eng.srt 96.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Client-side Security - Petko D. Petkov.eng.srt 96.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/.NET from the Hacker's Perspective - Drew Miller.eng.txt 96.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Preparing for the Cross Site Request Forgery Defense - Chuck Willis.eng.lrc 96.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Smartfuzzing the Web Carpe Vestra Foramina - Nathan Hamiel, Justin Engler, Seth Law, Gregory Fleischer.eng.lrc 96.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Lateral Movement & Privilege Escalation in GCP Compromise Organizations without Dropping an Implant.eng.srt 96.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/A Picture’s Worth Digital Image Analysis - Dr. Neal Krawetz.eng.lrc 96.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Bruce Schneier - Why Cryptograpy is Harder Than it Looks.eng.srt 96.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brad Bolin - Information Security Law Update.eng.tsv 96.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mike Schiffman - The Need for an 802.11b Toolkit.eng.txt 96.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Staring into the Abyss The Dark Side of Security and Professional Intelligence - Richard Thieme.eng.lrc 96.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Meet the Feds Feds vs. Ex-Feds - Panel.eng.tsv 96.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/programmer-inverted.jpg 96.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.lrc 96.6 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.lrc 96.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Server-Side JavaScript Injection Attacking and Defending NoSQL and Node.js - Bryan Sullivan.eng.srt 96.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Rain Forest Puppy - TBD.eng.txt 96.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Beetle Potter - Evil Twins 802.11.eng.srt 96.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/WiFi-Based IMSI Catcher.eng.srt 96.4 KB
- Black Hat DC/Black Hat Federal 2006/Beyond EIP - spoonm, skape.eng.tsv 96.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting USB Devices with Arduino - Greg Ose.eng.tsv 96.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Global Security Report 2010 Analysis of Investigations and Penetration Tests - Nicholas J Percoco.eng.txt 96.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Himanshu Dwivedi - iSCI Insecure SCSI.eng.srt 96.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why Control System Cyber-Security Sucks.eng.txt 96.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00028.jpg 96.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mandia - State of Incident Response.eng.vtt 96.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal - Fran Brown, Rob Ragan.eng.tsv 96.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Dissecting Smart Meters.eng.txt 96.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.eng.lrc 96.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 2-2 - Panel.eng.srt 96.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Post Exploitation Operations with Cloud Synchronization.eng.srt 96.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bruce Potter - Bluetooth Defense Kit.eng.vtt 96.2 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Keynote Guardians of the AI Era Navigating the Cybersecurity Landscape of Tomorrow.eng.srt 96.2 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Raphael Mudge.eng.json 96.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is Your Phone Pwned - Kevin Mahaffey, Anthony Lineberry, John Hering.eng.txt 96.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Rough and Ready Frameworks to Measure Persistent Engagement and Deterrence.eng.srt 96.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Introduction to Tamper Evident Devices - datagram.eng.lrc 96.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Curtis E Karnow - Running the Matrix.eng.lrc 96.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Black Ops of TCPIP 2011 - Dan Kaminsky.eng.srt 96.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Chris-Eagle-IdaPro-English.eng.srt 96.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine.eng.srt 96.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Flying a False Flag Advanced C2, Trust Conflicts, and Domain Takeover.eng.srt 96.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fighting Russian Cybercrime Mobsters - Dmitri Alperovitch.eng.srt 96.0 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/SDL at Scale Growing Security Champions.eng.srt 96.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Keynote - Quest for the Holy Grail - Jerry Dixon.eng.lrc 95.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/.NET from the Hacker's Perspective - Drew Miller.eng.lrc 95.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Silvio Cesare - Opensource Kernel Auditing and Exploitation.eng.txt 95.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mainframes - The Past Will Come to Haunt You.eng.lrc 95.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani & Billy Rios.eng.srt 95.9 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.txt 95.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Social Engineering and the CIA - Petet Earnest.eng.tsv 95.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/REST for the Wicked - Bryan Sullivan.eng.vtt 95.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.eng.lrc 95.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Inside Apple’s MDM Black Box - David Schultz.eng.tsv 95.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-miller.pdf 95.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-miller/bh-win-03-miller.pdf 95.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rutkowska - Subverting Vista Kernel.eng.lrc 95.7 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-social-engineering-threats-MacDougall-WP.pdf 95.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Inducing Momentary Faults Within Secure StandardsMicrocontrollers - Christopher Tarnovsky.eng.txt 95.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mike Schiffman - The Need for an 802.11b Toolkit.eng.lrc 95.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Reverse DNS Tunneling Shellcode - Ty Miller.eng.txt 95.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - Introduction to Embedded Security.eng.tsv 95.6 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Ian Goldberg - Cell Phone Security A History and The State of the Art.eng.lrc 95.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Next Generation Collaborative Reversing with Ida Pro and CollabREate - Chris Eagle, Tim Vidas.eng.lrc 95.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/RETrace - Applied Reverse Engineering on OS X - Tiller Beauchamp, David Weston.eng.lrc 95.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Armin Buescher on ReplayProxy.eng.json 95.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Rain Forest Puppy - TBD.eng.lrc 95.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Ghidra - Journey from Classified NSA Tool to Open Source.eng.srt 95.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rauch - PDB - The Protocal Debugger.eng.tsv 95.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/(Pen)Testing Vehicles with CANToolz.eng.srt 95.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Kevin McPeake and Chris Goggins - Falling Dominos.eng.tsv 95.5 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Bruce K. Marshall - Statistical Analysis of Reusable Password Systems and Their Alternatives.eng.vtt 95.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/akin-bh-us-02-cisco/ExampleEvidenceLabels.doc 95.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/NGSCB/NGSCBhardware.doc 95.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Locknote Conclusions and Key Takeaways from Black Hat USA 2022.eng.srt 95.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Global Security Report 2010 Analysis of Investigations and Penetration Tests - Nicholas J Percoco.eng.lrc 95.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Whose Internet Is It, Anyway - Andrew Fried, Richard Cox, Ben Butler.eng.srt 95.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fast & Furious Reverse Engineering with TitanEngine - Mario Vuksan, Tomislav Pericin.eng.txt 95.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SCTPscan - Finding Entry Points to SS7 Networks & Telecommunication Backbones - Philippe Langlois.eng.lrc 95.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/CSO Panel Black Hat Strategy Meeting - Panel.eng.txt 95.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is Your Phone Pwned - Kevin Mahaffey, Anthony Lineberry, John Hering.eng.lrc 95.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Aerial Cyber Apocalypse If We Can Do It So Can They - Richard Perkins, Mike Tassey.eng.lrc 95.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fuzzing the Phone in Your Phone - Charlie Miller, Collin Mulliner.eng.srt 95.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ian Clarke, Oskar Sandberg - Scalable searches.tsv 95.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Russia - Inside an unprecended prosecution of organized cybercrime - Joseph Menn.eng.lrc 95.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Errata Hits Puberty.eng.srt 95.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite_en.vtt 95.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite.eng.vtt 95.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Apple iOS Security Evaluation Vulnerability Analysis and Data Encryptio - Dino Dai Zovi.eng.vtt 95.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Marcus Ranum - Burglar Alarms and Booby Traps.eng.txt 95.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/There’s a Fox in the Henhouse - Jeff Williams.eng.srt 95.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Client-Side Protection Against DOM-Based XSS Done Right (tm).eng.txt 95.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Edward G Schwartz and Diana Kelly - Data Privacy What should the CIO and CISO be doing.eng.txt 95.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Why Black Hats Always Win - Val Smith, Chris.eng.tsv 95.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Grugq - Defeating Forensic Analysis.eng.vtt 95.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honey Topics.eng.vtt 95.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00003.jpg 95.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/DSCOMPROMISED - A Windows DSC Attack Framework.eng.txt 94.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Inside Apple’s MDM Black Box - David Schultz.eng.srt 94.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Dissecting Smart Meters.eng.lrc 94.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Malicious PDF Analysis.eng.srt 94.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Understanding Botnets By Building One.eng.tsv 94.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why Control System Cyber-Security Sucks.eng.lrc 94.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is Your Phone Pwned - Kevin Mahaffey, Anthony Lineberry, John Hering.eng.vtt 94.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00010.jpg 94.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Bit-Squatting DNS Hijacking Without Exploitation - Artem Dinaburg.eng.txt 94.8 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Automated Testing of Crypto Software Using Differential Fuzzing.eng.srt 94.8 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.lrc 94.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Payload Anatomy & Future Mutations - Riley Hassell.eng.txt 94.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/CSO Panel Black Hat Strategy Meeting - Panel.eng.vtt 94.7 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Willis_Belani-WP.pdf 94.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Jeremy Rauch - Security Implications of Distributed Network Management.eng.vtt 94.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fighting Russian Cybercrime Mobsters - Dmitri Alperovitch.eng.txt 94.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Anti-Forensics The Rootkit Connection - Bill Blunden.eng.txt 94.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Silvio Cesare - Opensource Kernel Auditing and Exploitation.eng.lrc 94.7 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Bruce K. Marshall - Statistical Analysis of Reusable Password Systems and Their Alternatives.eng.tsv 94.7 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Locknote Conclusions and Key Takeaways from Day 1.eng.srt 94.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Alessandro Acquisti - Privacy Economics and Immediate Gratification.eng.tsv 94.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam Boileau - Trust Transcience.eng.txt 94.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honeypots.eng.vtt 94.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Reverse DNS Tunneling Shellcode - Ty Miller.eng.lrc 94.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Inducing Momentary Faults Within Secure StandardsMicrocontrollers - Christopher Tarnovsky.eng.lrc 94.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Battery Firmware Hacking - Charlie miller.eng.vtt 94.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/DropSmack - How Cloud Synchronization Services Render Your Corporate Firewall.eng.srt 94.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/CSO Panel Black Hat Strategy Meeting - Panel.eng.lrc 94.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/War Texting Weaponizing Machine 2 Machine - Don Bailey.eng.txt 94.5 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/A Deal with the Devil Breaking Smart Contracts.eng.srt 94.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Drew Miller - .Net from the hackers perspective Part 2 .eng.txt 94.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Bruce Schneier - Why Cryptograpy is Harder Than it Looks.eng.txt 94.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Braving the Cold New Methods for Preventing Cold Boot Attacks on Encryption Keys - Patrick McGregor.eng.srt 94.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/WiFi Security or Descending Into Depression and Drink - Mike Kershaw aka Dragorn.eng.txt 94.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning Your Phone at Every Layer - A Mobile Security Panel - Tyler Shields, Anthony Lineberry, Charlie Miller, Chris Wysopal, Dino Dai Zovi, more.eng.srt 94.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Security When Nano-Seconds Count - James Arlen.eng.srt 94.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Lance Spitzner - The Honey Net Project.eng.tsv 94.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Keynote Speaker Cofer Black.eng.txt 94.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Why Black Hats Always Win - Val Smith, Chris.eng.srt 94.4 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/The Active Directory Botnet.eng.srt 94.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Attacking the Vista Heap - Ben Hawkes.eng.txt 94.4 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Game of Chromes - Owning the Web with Zombie Chrome Extensions.eng.srt 94.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Edward G Schwartz and Diana Kelly - Data Privacy What should the CIO and CISO be doing.eng.lrc 94.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/A Picture’s Worth Digital Image Analysis - Dr. Neal Krawetz.eng.vtt 94.3 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dan-Kaminsky-Black-Ops-tcp-ip-English.eng.txt 94.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Himanshu Dwivedi - iSCI Insecure SCSI.eng.tsv 94.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Keynote Fireside Chat with Moxie Marlinspike.eng.srt 94.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Diana Kelly and Ian Poynter - Single Sign On 101.eng.tsv 94.2 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Nothing but Net Leveraging macOS's Networking Frameworks to Heuristically Detect Malware.eng.srt 94.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Design Issues and Software Vulnerabilities in Embedded Systems - FX.eng.vtt 94.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jaya Baloo - Lawful Interception of IP the European Context.eng.txt 94.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/ian Goldberg - Off the Record Messaging.eng.txt 94.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking for Fun & Profit.eng.txt 94.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Maynor - Leave the Theory Behind and Embrace the Code.eng.tsv 94.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00005.jpg 94.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Enforcer - Timothy Mullen.eng.txt 94.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Attacking Clientside JIT Compilers - Chris Rohlf, Yan Ivnitskiy.eng.srt 94.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Firmware Cartography Charting the Course for Modern Server Compromise.eng.srt 94.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Building Safe Systems at Scale - Lessons from Six Months at Yahoo.eng.srt 94.1 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/How to Build Synthetic Persons in Cyberspace.eng.srt 94.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Legal Aspects of Cyberspace Operations.eng.srt 94.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools - Shreeraj Shah.eng.vtt 93.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fast & Furious Reverse Engineering with TitanEngine - Mario Vuksan, Tomislav Pericin.eng.lrc 93.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/VK1-Larkin-Fight org Cyber crime.eng.txt 93.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Combating the Insider Threat at the FBI - Real-world Lessons Learned.eng.srt 93.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Advanced CAN Injection Techniques for Vehicle Networks.eng.srt 93.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mainframes - The Past Will Come to Haunt You.eng.vtt 93.8 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Client-Side Protection Against DOM-Based XSS Done Right (tm).eng.lrc 93.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Andrew van der Stock - Alternatives to Honeypots.eng.txt 93.7 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Securing Your In-Ear-Fitness Coach Challenges in Hardening Next Generation Wearables.eng.srt 93.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/ret2dir - Deconstructing Kernel Isolation.eng.txt 93.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Smashing the Furure for Fun & Profit.eng.srt 93.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fighting Russian Cybercrime Mobsters - Dmitri Alperovitch.eng.lrc 93.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Drew Miller - .Net from the hackers perspective Part 2 .eng.lrc 93.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00002.jpg 93.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/DSCOMPROMISED - A Windows DSC Attack Framework.eng.lrc 93.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Anti-Forensics The Rootkit Connection - Bill Blunden.eng.lrc 93.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning the Routing Table - New OSPF Attacks - Gabi Nakibly.eng.txt 93.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Marcus Ranum - Burglar Alarms and Booby Traps.eng.lrc 93.6 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning.eng.srt 93.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Hat USA 2008 - PWNY Awards.eng.txt 93.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.vtt 93.5 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.vtt 93.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Internet is Broken Beyond Document.Cookie - Extreme Client-side Exploitation - Nathan McFeters, Rob Carter, John Heasman.eng.srt 93.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Bit-Squatting DNS Hijacking Without Exploitation - Artem Dinaburg.eng.lrc 93.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.vtt 93.4 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.vtt 93.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Attacking the Vista Heap - Ben Hawkes.eng.lrc 93.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - A Historical Look at Hardware Token Compromises.eng.srt 93.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Global Spying - Steve Topletz, Jonathan Logan, Kyle Williams.eng.srt 93.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00029.jpg 93.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hacker Court.eng.vtt 93.3 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.jp.eng.vtt 93.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Lives on The Line Securing Crisis Maps in Libya, Sudan, and Pakistan - Securing Crisis Maps in Libya, Sudan, and Pakistan.eng.vtt 93.3 KB
- Black Hat DC/Black Hat Federal 2006/An Advanced NTFS Data Hiding Technique - Irby Thompson, Matthew Monroe.eng.srt 93.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Payload Anatomy & Future Mutations - Riley Hassell.eng.lrc 93.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.vtt 93.3 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.vtt 93.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Martin Roesch - Snort.eng.srt 93.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Rick Smith - Masquerades,Tricking Modern Auth Systems.eng.txt 93.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dan-Kaminsky-Black-Ops-tcp-ip-English.eng.lrc 93.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam Boileau - Trust Transcience.eng.lrc 93.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court.eng.srt 93.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00004.jpg 93.2 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Bruce Schneier - Why Cryptograpy is Harder Than it Looks.eng.lrc 93.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Virtually Private Networks.eng.srt 93.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jaya Baloo - Lawful Interception of IP the European Context.eng.lrc 93.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Threats to the 2008 Presidential Election (and more) - Oliver Friedrichs.eng.txt 93.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/The Paramedic's Guide to Surviving Cybersecurity.eng.srt 93.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sparks and Others - Sidewinder.eng.txt 93.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/WiFi Security or Descending Into Depression and Drink - Mike Kershaw aka Dragorn.eng.lrc 93.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/ian Goldberg - Off the Record Messaging.eng.lrc 93.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chuck Willis - Forensics with Linux 101.eng.text 93.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Larry Leibrock - Digital Information,User Tokens,Privacy and Forensics Investigation.eng.txt 93.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bruce Potter - Bluetooth Defense Kit.eng.tsv 93.0 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Enforcer - Timothy Mullen.eng.lrc 93.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Vboot Kit Compromising Windows Vista Security - Nitin Kumar & Vipin Kumar.eng.vtt 93.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/War Texting Weaponizing Machine 2 Machine - Don Bailey.eng.lrc 92.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Keynote Speaker Cofer Black.eng.lrc 92.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking for Fun & Profit.eng.lrc 92.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hulton and Moniz - Faster pwning.eng.srt 92.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How to Steal a Nuclear Warhead Without Voiding Your XBox Warranty - Intro to tamper evident devices, applications & circumvention - Jamie Schwettmann & Eric Michaud.eng.tsv 92.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/URI Use and Abuse - Nathan McFeters and Rob Carter.eng.vtt 92.9 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/RustZone Writing Trusted Applications in Rust.eng.srt 92.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ptacek and Goldsmith - Elec Sheep.eng.srt 92.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Teensy Programming for Everyone.eng.srt 92.8 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matias Katz & Maxi Soler.eng.json 92.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/David Bovee - VPN Architectures Looking at the Complete Picture.eng.txt 92.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Shaun Clowes - Fixing and Making Holes in Binaries.eng.txt 92.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/SCADA Security - Jason Larsen.eng.txt 92.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Brandon Wiley - The Superworm Manifesto.eng.vtt 92.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Drew Miller - .Net from the hackers perspective Part 2 .eng.vtt 92.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dennis Groves and Bill Pennington - Web Application Security.eng.tsv 92.7 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 2-2.eng.tsv 92.7 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Strategies for Defeating Distributed Attacks - Simple Nomad.eng.txt 92.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dr Mudge - Keynote.eng.tsv 92.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/DropSmack - How Cloud Synchronization Services Render Your Corporate Firewall.eng.txt 92.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sparks and Others - Sidewinder.eng.srt 92.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Outsmarting the Smart City.eng.srt 92.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00032.jpg 92.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Gerhard-Escelbeck-Laws-of-vulnerbilities-English.eng.txt 92.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/VK1-Larkin-Fight org Cyber crime.eng.lrc 92.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Behind the Scenes The Industry of Social Media Manipulation Driven by Malware.eng.srt 92.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dennis Groves and Bill Pennington - Web Application Security.eng.vtt 92.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Enforcer - Timothy Mullen.eng.srt 92.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Job de Haas - GSM WAP and SMS Security.eng.vtt 92.5 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 1-2 - Chris Hadnagy.eng.txt 92.5 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass & more.eng.srt 92.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Malware analysis for the enterprise - Jason Ross.eng.srt 92.5 KB
- Black Hat DC/Black Hat Federal 2006/An Advanced NTFS Data Hiding Technique - Irby Thompson, Matthew Monroe.eng.txt 92.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 2-2 - Eric Schultze & Erik Birkholz.eng.tsv 92.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Whispers Among the Stars A Practical Look at Perpetrating Satellite Eavesdropping Attacks.eng.srt 92.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Potter - Java Card 101.eng.srt 92.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Lessons and Lulz The 5th Annual Black Hat USA NOC Report.eng.srt 92.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/WiFi Security or Descending Into Depression and Drink - Mike Kershaw aka Dragorn.eng.srt 92.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Black Hat USA 2019 Keynote Every Security Team is a Software Team Now by Dino Dai Zovi.eng.srt 92.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How to Steal a Nuclear Warhead Without Voiding Your XBox Warranty - Intro to tamper evident devices, applications & circumvention - Jamie Schwettmann & Eric Michaud.eng.srt 92.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Job de Haas - GSM WAP and SMS Security.eng.txt 92.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani, Billy K Rios.eng.srt 92.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jennifer Granick - Top 10 Issues.eng.srt 92.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/David Bovee - VPN Architectures Looking at the Complete Picture.eng.srt 92.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Andrew van der Stock - Alternatives to Honeypots.eng.lrc 92.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Law of Mobile Hacking - Jennifer Granick.eng.srt 92.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ian Goldberg - Breaking 80211 WEP.eng.srt 92.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/ret2dir - Deconstructing Kernel Isolation.eng.lrc 92.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Vboot Kit Compromising Windows Vista Security - Nitin Kumar & Vipin Kumar.eng.txt 92.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ira Winkler - The Road to Riches.eng.tsv 92.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/eweek.css 92.1 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dr. Mudge - Secure Coding Practices and Source Code Analysis.eng.srt 92.1 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Sluggo - Denial of Service Attacks, and Defensive Strategies.eng.tsv 92.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 2-2 - Michael Howard, David Leblanc.eng.tsv 92.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Building Safe Systems at Scale - Lessons from Six Months at Yahoo.eng.tsv 92.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Threats to the 2008 Presidential Election (and more) - Oliver Friedrichs.eng.lrc 92.0 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Strategies for Defeating Distributed Attacks - Simple Nomad.eng.vtt 92.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Hat USA 2008 - PWNY Awards.eng.lrc 92.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Greg Conti - Crafting a Tivo.eng.srt 92.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sparks and Others - Sidewinder.eng.lrc 92.0 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Fireside Chat Jeff Moss and Gaurav Keerthi.eng.srt 92.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Bruce Potter - 802.11X.eng.txt 91.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning the Routing Table - New OSPF Attacks - Gabi Nakibly.eng.lrc 91.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Brian Martin and B K DeLong - Lessons Learned From attrition.org.eng.vtt 91.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Anti-Forensics The Rootkit Connection - Bill Blunden.eng.srt 91.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Living in the RIA World Blurring the Line Between Web and Desktop Security - Alex Stamos, David Thiel, Justine Osborne.eng.srt 91.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 2 - Val Smith, Colin Ames & David Kerb.eng.txt 91.9 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Bounty Operations Best Practices and Common Pitfalls to Avoid in the First 6-12 Months.eng.srt 91.9 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Strategies for Defeating Distributed Attacks - Simple Nomad.eng.lrc 91.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/David Bovee - VPN Architectures Looking at the Complete Picture.eng.lrc 91.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Circumventing Automated JavaScriptAnalysis Tools - Billy Hoffman.eng.tsv 91.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Larry Leibrock - Digital Information,User Tokens,Privacy and Forensics Investigation.eng.lrc 91.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00024.jpg 91.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-Japanese.eng.txt 91.8 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/State of SSL on the internet - Ivan Ristic.eng.srt 91.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Four Types of Locks - Deviant Ollam.eng.vtt 91.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Walter Gary Sharp - Key Legal Implications of Computer Network Defense.eng.srt 91.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Economics and the Underground Economy - Cormac Herley.eng.vtt 91.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Satan is on My Friends List Attacking Social Networks - Shawn Moyer, Nathan Hamiel.eng.srt 91.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/The Enemy Within Modern Supply Chain Attacks.eng.srt 91.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Survey of Remote Automotive Attack Surfaces.eng.vtt 91.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Caswell and Moore - Thermoptic Camo.eng.text 91.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Forensics Tools and Processes for Windows XP Platforms - Larry Leibrock.eng.txt 91.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Gula - Bypassing Intrusion Detection Systems.eng.srt 91.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Concurrency Attacks in Web Applications - Scott Stender, Alexander Vidergar.eng.srt 91.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cache and Maynor - Device Drivers.eng.txt 91.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Shaun Clowes - Fixing and Making Holes in Binaries.eng.lrc 91.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Job de Haas - GSM WAP and SMS Security.eng.lrc 91.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/FX - The Blackberry Case.eng.txt 91.5 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/DropSmack - How Cloud Synchronization Services Render Your Corporate Firewall.eng.lrc 91.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Gerhard-Escelbeck-Laws-of-vulnerbilities-English.eng.lrc 91.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerardo Richarte - Modern Intrusion Practices.eng.txt 91.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/SCADA Security - Jason Larsen.eng.lrc 91.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.eng.txt 91.5 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.tsv 91.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Sutterfield - Enterprise security for converging technologies.eng.txt 91.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Hacker Court 04 Pirates of the Potomac.eng.text 91.5 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Repurposing Neural Networks to Generate Synthetic Media for Information Operations.eng.srt 91.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kaminsky - BlackOPS 2006.eng.srt 91.5 KB
- Black Hat DC/Black Hat Federal 2006/An Advanced NTFS Data Hiding Technique - Irby Thompson, Matthew Monroe.eng.lrc 91.5 KB
- Black Hat DC/Black Hat DC 2007/Video/Black Hat DC 2007 captions/RFID for Beginners - Chris Paget and the ACLU.eng.srt 91.5 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.txt 91.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Andrea Matwyshyn - Introduction to Corporate Information Security Law.eng.txt 91.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Locknote Conclusions and Key Takeaways from Day 1.eng.srt 91.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Xploiting Google Gadgets Gmalware and Beyond - Tom Stracener, Robert Hansen.eng.txt 91.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hiring Trends in InfoSec.eng.srt 91.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloud Computing Models and Vulnerabilities - Raining on the Trendy New Parade - Alex Stamos, Andrew Becherer & Nathan Wilcox.eng.tsv 91.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Four Types of Locks - Deviant Ollam.eng.txt 91.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Rick Smith - Masquerades,Tricking Modern Auth Systems.eng.lrc 91.4 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dr. Mudge - Secure Coding Practices and Source Code Analysis.eng.txt 91.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Fischbach - Carrier VOIP Security.eng.srt 91.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluetooth v2.1 - A New Security Infrastructure and New Vulnerabilities - Andrew Lindell.eng.srt 91.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Kevin McPeake and Chris Goggins - Falling Dominos.eng.vtt 91.3 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-quanitfying-royal-WP.pdf 91.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Eric Goldman - Criminal Copyright infringement and warez trading.eng.tsv 91.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jay Beale - Locking Down Mac OS X.eng.tsv 91.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sour Pickles - Marco Slaviero.eng.vtt 91.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Larry Leibrock - Digital Information,User Tokens,Privacy and Forensics Investigation.eng.vtt 91.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks.eng.txt 91.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mark Eckenwiler - USA Patriot Act and Criminal Investigations.eng.srt 91.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Post Exploitation Bliss - Loading Meterpreter on a Factory iPhone - Vincenzo Iozzo, Charlie Miller.eng.srt 91.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Alessandro Acquisti - Privacy Economics and Immediate Gratification.eng.vtt 91.2 KB
- Black Hat DC/Black Hat Federal 2006/Client Side Penetration Testing - Max Caceres.eng.srt 91.2 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.srt 91.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Ferruh Mavituna on Netsparker.eng.json 91.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Braving the Cold New Methods for Preventing Cold Boot Attacks on Encryption Keys - Patrick McGregor.eng.txt 91.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dr Mudge - Keynote.eng.vtt 91.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out.eng.srt 91.1 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Mario Vuksan on TitanEngine.eng.json 91.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Satan is on My Friends List Attacking Social Networks - Shawn Moyer, Nathan Hamiel.eng.txt 91.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.jp.eng.tsv 91.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joseph Ansanelli - Future of Personal info.srt 91.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 1-2 - Chris Hadnagy.eng.lrc 91.0 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Next-Gen DFIR Mass Exploits & Supplier Compromise.eng.srt 91.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Kevin Madi - Evolution of Incident Response.av.eng.tsv 91.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerardo Richarte - Modern Intrusion Practices.eng.srt 91.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/New Classes of Security and Privacy Vulnerabilities for Implantable Wireless Medical Devices - Tadayoshi Kohno, Kevin Fu.eng.tsv 91.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Post Exploitation Bliss - Loading Meterpreter on a Factory iPhone - Vincenzo Iozzo, Charlie Miller.eng.txt 91.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Tim Mullen - Neutralizing Nimda Automated Strikeback.eng.srt 91.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-burnett.pdf 91.0 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.txt 91.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Threats to the 2008 Presidential Election - Oliver Fredrichs.eng.srt 90.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Getaway - Methods and Defenses for Data Exfiltration - Sean Coyne, Ryan Kazanciyan.eng.vtt 90.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/What the Hell is Inside There - Chris Tarnovsky.eng.tsv 90.9 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 1-2.eng.tsv 90.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Forensics Tools and Processes for Windows XP Platforms - Larry Leibrock.eng.lrc 90.9 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Keynote Lessons From 11 Billion Breached Records.eng.srt 90.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Concurrency Attacks in Web Applications - Scott Stender, Alexander Vidergar.eng.tsv 90.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A Black Hat Vulnerability Risk Assessment - Panel.eng.txt 90.8 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Locknote Conclusions and Key Takeaways from Day 2.eng.srt 90.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Vulnerability Disclosure What the Feds Think.eng.tsv 90.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/caceres/SyscallProxying.pdf 90.8 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Levomaki-Automatic-Discovery-Of-Evasion-Vulnerabilities-Using-Targeted-Protocol-Fuzzing-wp.pdf 90.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Routopsy Modern Routing Protocol Vulnerability Analysis and Exploitation.eng.srt 90.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Legal Aspects of Cybersecurity - (AKA) CYBERLAW A Year in Review, Cases, Issues, Your Questions My (Alleged) Answers - Robert Clark.eng.srt 90.7 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dan-Kaminsky-Black-Ops-tcp-ip-English.eng.vtt 90.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeremy Rauch - How Responsive are Vendors to Security Problems When They Aren't Being Pressured.eng.txt 90.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploratory Android Surgery - Jesse Burns.eng.vtt 90.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jay Beale - Attacking and Defending BIND DJBDNS DNS Servers.eng.srt 90.7 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Defending off the land Agentless defenses available today.eng.srt 90.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Walter Gary Sharp - Key Legal Implications of Computer Network Defense.eng.tsv 90.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Bruce Potter - 802.11X.eng.lrc 90.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Android - One Root to Own them All.eng.srt 90.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Metasploit Autopsy - Reconstructing the Crime Scene - Peter Silberman, Steve Davis.eng.vtt 90.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Breaking the IIoT - Hacking industrial Control Gateways.eng.srt 90.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Sutterfield - Enterprise security for converging technologies.eng.lrc 90.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reversing and Exploiting an Apple Firmware Update - K. Chen.eng.tsv 90.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Global Security Report 2010 Analysis of Investigations and Penetration Tests - Nicholas J Percoco.eng.vtt 90.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/PicoDMA DMA Attacks at Your Fingertips.eng.srt 90.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/URI Use and Abuse - Nathan McFeters and Rob Carter.eng.txt 90.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeremy Rauch - The Security of Network Devices.eng.srt 90.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 2 - Val Smith, Colin Ames & David Kerb.eng.lrc 90.5 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.lrc 90.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Andrea Matwyshyn - Introduction to Corporate Information Security Law.eng.lrc 90.5 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Detecting Fake 4G Base Stations in Real Time.eng.srt 90.5 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.tsv 90.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Four Types of Locks - Deviant Ollam.eng.lrc 90.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Grand - Sec Problems HWare Devices.eng.vtt 90.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Steven Christey - CVE Behind the Scenes The Complexity of Being Simple.eng.txt 90.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerardo Richarte - Modern Intrusion Practices.eng.lrc 90.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/ian Goldberg - Off the Record Messaging.eng.srt 90.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Client-side Security - Petko D. Petkov.eng.txt 90.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Braving the Cold New Methods for Preventing Cold Boot Attacks on Encryption Keys - Patrick McGregor.eng.lrc 90.4 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Okatani - Keynote - Japanese.eng.srt 90.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Weaponizing the Web - Nathan Hamiel, Shawn Moyer.eng.txt 90.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks.eng.srt 90.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Silvio Cesare - Opensource Kernel Auditing and Exploitation.eng.srt 90.3 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ray Kaplan - Meet The Enemy.eng.txt 90.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Law of Mobile Hacking - Jennifer Granick.eng.txt 90.3 KB
- Black Hat DC/Black Hat Federal 2006/Extracting Unexpected Functionality from Existing Networks - Dan Kaminsky.eng.srt 90.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 1-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.srt 90.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jaya Baloo - Lawful Interception of IP the European Context.eng.vtt 90.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Vboot Kit Compromising Windows Vista Security - Nitin Kumar & Vipin Kumar.eng.lrc 90.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cache and Maynor - Device Drivers.eng.lrc 90.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks.eng.lrc 90.2 KB
- Black Hat DC/Black Hat Federal 2006/Extracting Unexpected Functionality from Existing Networks - Dan Kaminsky.eng.txt 90.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Command Injection in F5 iRules.eng.srt 90.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-Japanese.eng.lrc 90.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rauch - PDB - The Protocal Debugger.eng.vtt 90.2 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing.eng.srt 90.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C. Foster, Vincent T. Liu - Catch Me if You Can.txt 90.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Noel Anderseon - Wifi in WIN Vista.eng.txt 90.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/XSS Street-Fight - The Only Rule Is There Are No Rules - Ryan Barnett.eng.vtt 90.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking for Fun & Profit.eng.srt 90.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Applied Black Op Networking on Windows XP - Dan Kaminsky.eng.srt 90.2 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.srt 90.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate.eng.srt 90.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Closing Session.eng.srt 90.2 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2018.eng.srt 90.2 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Hoshizawa - online Swindler - English.eng.srt 90.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Whose Internet Is It, Anyway - Andrew Fried, Richard Cox, Ben Butler.eng.txt 90.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Suberverting the Xen Hypervisor - Rafal Wojtczuk.eng.txt 90.1 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.vtt 90.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ian Poynter and Diana Kelly - The Truth About ASPs.eng.tsv 90.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - Analysis of Web App worms.eng.text 90.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Inducing Momentary Faults Within Secure StandardsMicrocontrollers - Christopher Tarnovsky.eng.vtt 90.0 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dr. Mudge - Secure Coding Practices and Source Code Analysis.eng.lrc 90.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Beyond Root Custom Firmware for Embedded Mobile Chipsets.eng.srt 90.0 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.lrc 90.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.eng.lrc 90.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils-bh.tar 90.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jennifer Granick - The Law of 'Sploits.eng.txt 90.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Mobile Exploit Intelligence Project.eng.srt 90.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Xploiting Google Gadgets Gmalware and Beyond - Tom Stracener, Robert Hansen.eng.lrc 90.0 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/IIS 6.0's Security Architecture - It's a Whole New World - Michael Muckin.eng.srt 90.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Post Exploitation Bliss - Loading Meterpreter on a Factory iPhone - Vincenzo Iozzo, Charlie Miller.eng.lrc 89.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/FX - The Blackberry Case.eng.lrc 89.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reversing and Exploiting an Apple Firmware Update - K. Chen.eng.vtt 89.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Satan is on My Friends List Attacking Social Networks - Shawn Moyer, Nathan Hamiel.eng.lrc 89.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Keynote - Quest for the Holy Grail - Jerry Dixon.eng.srt 89.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Proposed Vulnerability Handling.eng.txt 89.9 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Tomorrow's News is Today's Intel - Journalists as Targets and Compromise Vectors by Shane Huntley.eng.srt 89.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Unified VPN Suite.pdf 89.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Cisco Unified VPN Suite.pdf 89.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A Black Hat Vulnerability Risk Assessment - Panel.eng.lrc 89.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 2-2 - John Benson.eng.srt 89.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/URI Use and Abuse - Nathan McFeters and Rob Carter.eng.lrc 89.8 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Keynote - Cybersecurity The Next Generation.eng.srt 89.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/carelink-at-home.jpg 89.8 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/How to Get the Most Out of the Python Decompilers Uncompyle6 and Decompyle3 - How to Write and Read.eng.srt 89.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Your Mind - Legal Status, Rights and Securing Yourself - Tiffany Rad & James Arlen.eng.vtt 89.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stamos - Breaking AJAX - English.eng.srt 89.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 2-2 - Panel.eng.tsv 89.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Attacking the Vista Heap - Ben Hawkes.eng.vtt 89.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/A Compendium of Container Escapes.eng.srt 89.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Client-side Security - Petko D. Petkov.eng.lrc 89.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 1-2 - Chris Hadnagy.eng.srt 89.6 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Jeremy Rauch - Security Implications of Distributed Network Management.eng.tsv 89.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeff Thompson - Making Unix Secure for the Internet with Trusted Operating Systems.eng.tsv 89.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Internet Special Ops - Andrew Fried, Paul Vixie, Christopher Lee.eng.txt 89.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Law of Mobile Hacking - Jennifer Granick.eng.lrc 89.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Design Issues and Software Vulnerabilities in Embedded Systems - FX.eng.txt 89.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Grand - Sec Problems HWare Devices.tsv 89.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Moral Hazards and Ethical Considerations in Cyber-Insurance.eng.srt 89.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Kret - Nobodys Anonymous - Tracking Spam and Covert Channels.eng.tsv 89.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Client-side Security - Petko D. Petkov.eng.vtt 89.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeremy Rauch - How Responsive are Vendors to Security Problems When They Aren't Being Pressured.eng.lrc 89.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Strike and Counterstrike The Law on Automated Intrusions and Striking Back - Curtis Karnow.eng.srt 89.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Macs in the Age of the APT - Alex Stamos, BJ Orvis, Paul Youn.eng.txt 89.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keynote - The Hidden Architecture of our Time - Why This Internet Worked, How We Could Lose It.eng.vtt 89.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Keynote - Information Technology Systems in a Post-Silcon World.eng.srt 89.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.eng.txt 89.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced Mac OS X Rootkits - Dino Dai Zovi.eng.txt 89.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Jaya Baloo - Lawful Interception of IP The European Context.eng.txt 89.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Whose Internet Is It, Anyway - Andrew Fried, Richard Cox, Ben Butler.eng.lrc 89.3 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Ian Goldberg - Cell Phone Security A History and The State of the Art.eng.srt 89.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joukov-et_al-Kefence_files/overflow.png 89.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Hacking Your Non-Compete.eng.srt 89.2 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Patrick Richard - Open Network PKI Design Issues or Business as Usual.eng.tsv 89.2 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/When Good Turns Evil Using Intel SGX to Stealthily Steal Bitcoins.eng.srt 89.2 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ray Kaplan - Meet The Enemy.eng.lrc 89.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Metasploit Autopsy - Reconstructing the Crime Scene - Peter Silberman, Steve Davis.eng.tsv 89.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/REST for the Wicked - Bryan Sullivan.eng.txt 89.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Weaponizing the Web - Nathan Hamiel, Shawn Moyer.eng.lrc 89.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Escaping Virtualized Containers.eng.srt 89.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tzi-cker Chiueh - Checking Array Bound.srt 89.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Cameron Hotchkies - Blind Injection Automation Techniques.eng.tsv 89.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Recoverable Advanced Metering Infrastructure - Mike Davis.eng.txt 89.1 KB
- Black Hat DC/Black Hat Federal 2006/Extracting Unexpected Functionality from Existing Networks - Dan Kaminsky.eng.lrc 89.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Noel Anderseon - Wifi in WIN Vista.eng.lrc 89.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.eng.txt 89.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dow Herath Mehta Spencer and Flake - Professional Source Code Auditing.eng.txt 89.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Battery Firmware Hacking - Charlie miller.eng.tsv 89.0 KB
- Black Hat DC/Black Hat Federal 2006/Client Side Penetration Testing - Max Caceres.eng.txt 89.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Internet is Broken Beyond Document.Cookie - Extreme Client-side Exploitation - Nathan McFeters, Rob Carter, John Heasman.eng.txt 89.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Steven Christey - CVE Behind the Scenes The Complexity of Being Simple.eng.lrc 89.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Deconstructing a Secure Processor - Christopher Tarnovsky.eng.txt 88.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C. Foster, Vincent T. Liu - Catch Me if You Can.lrc 88.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Endrun - Secure Digital Communications for Our Modern Dystopia.eng.txt 88.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Himanshu Dwivedi - iSCI Insecure SCSI.eng.vtt 88.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Welcome & Introduction to Black Hat Europe 2014.eng.txt 88.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting USB Devices with Arduino - Greg Ose.eng.vtt 88.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jennifer Granick - The Law of 'Sploits.eng.lrc 88.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Suberverting the Xen Hypervisor - Rafal Wojtczuk.eng.lrc 88.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 1-2 - Panel.eng.srt 88.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Physical Security in a Networked World - Video Surveillance, Video Analytics, and you - Joshua A Marpet.eng.srt 88.8 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Nakatomi Space Lateral Movement as L1 Post-exploitation in OT.eng.srt 88.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Living in the RIA World Blurring the Line Between Web and Desktop Security - Alex Stamos, David Thiel, Justine Osborne.eng.txt 88.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rain Forest Puppy - Novell The Forgotten OS.eng.tsv 88.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Demystifying Fuzzers - Michael Eddington.eng.srt 88.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Design Issues and Software Vulnerabilities in Embedded Systems - FX.eng.lrc 88.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Attacking Clientside JIT Compilers - Chris Rohlf, Yan Ivnitskiy.eng.tsv 88.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Checkmate with Denial of Service - Tom Brennan, Ryan Barnett.eng.txt 88.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Greg Hoglund - Advanced Buffer Overflow Techniques.eng.vtt 88.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Proposed Vulnerability Handling.eng.lrc 88.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fighting Russian Cybercrime Mobsters - Dmitri Alperovitch.eng.vtt 88.7 KB
- Black Hat DC/Black Hat Federal 2006/New Directions in Disk Forensics - Simson L. Garfinkel.eng.tsv 88.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Diana Kelly - Translasting US Privacy Regulations for Implementation.eng.srt 88.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Leveraging the Edge Abusing SSL VPNs - Mike Zusman.eng.txt 88.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Chris-Eagle-IdaPro-English.eng.vtt 88.6 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Black Hat Asia 2019 Keynote The Next Arms Race.eng.srt 88.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Eric Goldman - Criminal Copyright infringement and warez trading.eng.srt 88.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Cory Scott - Systems Management in an Untrusted Network.eng.srt 88.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sensepost - Deus ex Machina.eng.vtt 88.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/VC Panel Security Business Strategies During a Recession - Panel.eng.srt 88.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 2-2 - Panel.eng.vtt 88.6 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Sluggo - Denial of Service Attacks, and Defensive Strategies.eng.vtt 88.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A 16-bit Rootkit and Second Generation Zigbee Chips -Travis Goodspeed.eng.txt 88.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.srt 88.5 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.srt 88.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fuzzing the Phone in Your Phone - Charlie Miller, Collin Mulliner.eng.tsv 88.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Spoonm - Metasploit Hacking Like in the Movies.eng.txt 88.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Side Channel Analysis on Embedded Systems Impact and Countermeasures - Job de Haas.eng.srt 88.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ray Kaplan - Meet The Enemy.eng.vtt 88.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Macs in the Age of the APT - Alex Stamos, BJ Orvis, Paul Youn.eng.lrc 88.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Whose Internet Is It, Anyway - Andrew Fried, Richard Cox, Ben Butler.eng.vtt 88.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Lambert - Sec Engineer in win Vista.eng.txt 88.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Beckstrom’s Law - Rod Beckstrom.eng.txt 88.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Return-Oriented Programming Exploits Without Code Inspection - Hovav Shacham.eng.txt 88.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/REST for the Wicked - Bryan Sullivan.eng.lrc 88.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Martin Roesch - Snort.eng.tsv 88.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Malicious PDF Analysis.eng.txt 88.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hacker Court.eng.txt 88.3 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/return-to-csu A New Method to Bypass 64-bit Linux ASLR.eng.srt 88.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Getaway - Methods and Defenses for Data Exfiltration - Sean Coyne, Ryan Kazanciyan.eng.tsv 88.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Internet is Broken Beyond Document.Cookie - Extreme Client-side Exploitation - Nathan McFeters, Rob Carter, John Heasman.eng.lrc 88.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Veiled - A Browser Based Darknet - Billy Hoffman, Matt Wood.eng.srt 88.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Security Industry Call to Action We Need a Cloud Vulnerability Database.eng.srt 88.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Taking the Hype Out of Hypervisor - Tal Garfinkel.eng.srt 88.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Sarah Gordon - Viruses in the Information Age.eng.srt 88.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kostya Kortchinsky - Bruce Schneier.eng.txt 88.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Deconstructing a Secure Processor - Christopher Tarnovsky.eng.lrc 88.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/We Went to Iowa and All We Got were These Felony Arrest Records.eng.srt 88.2 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/5G IMSI Catchers Mirage5G IMSI Catchers Mirage.eng.srt 88.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Internet Special Ops - Andrew Fried, Paul Vixie, Christopher Lee.eng.lrc 88.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.eng.lrc 88.1 KB
- Black Hat DC/Black Hat Federal 2006/Client Side Penetration Testing - Max Caceres.eng.lrc 88.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Russia - Inside an unprecended prosecution of organized cybercrime - Joseph Menn.eng.srt 88.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Living in the RIA World Blurring the Line Between Web and Desktop Security - Alex Stamos, David Thiel, Justine Osborne.eng.lrc 88.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Power Analysis Attacks for Cheapskates.eng.srt 88.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Malware Detection Through Network Flow Analysis - Bruce Potter.eng.tsv 88.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Embedded Management Interfaces - Hristo Bojinov, Elie Bursztein, Dan Boneh.eng.txt 88.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reverse Engineering by Crayon - Danny Quist, Lorie Liebrock.eng.txt 88.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Mitigation in Windows 8.eng.txt 88.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dow Herath Mehta Spencer and Flake - Professional Source Code Auditing.eng.lrc 88.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-English.eng.srt 88.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Agile Security or How to defend applications with five-dat release cycles - Bryan Sullivan.eng.srt 88.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Malware analysis for the enterprise - Jason Ross.eng.tsv 88.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Braving the Cold New Methods for Preventing Cold Boot Attacks on Encryption Keys - Patrick McGregor.eng.vtt 88.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Practice) 2-2.eng.tsv 88.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning Your Phone at Every Layer - A Mobile Security Panel - Tyler Shields, Anthony Lineberry, Charlie Miller, Chris Wysopal, Dino Dai Zovi, more.eng.tsv 88.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced Mac OS X Rootkits - Dino Dai Zovi.eng.lrc 88.0 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Jaya Baloo - Lawful Interception of IP The European Context.eng.lrc 87.9 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2024.eng.srt 87.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Recoverable Advanced Metering Infrastructure - Mike Davis.eng.lrc 87.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Cean Convery - Hacking Layer Two.eng.text 87.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/IP Spoofing.eng.srt 87.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/The Big Picture.eng.tsv 87.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dave Aitel - An Introduction to Spike.eng.txt 87.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Willis and Belani - Web App Incident.eng.vtt 87.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.eng.lrc 87.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing.eng.txt 87.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with David SecurityNinja Rook on Agnitio v2.eng.json 87.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pushing the Camel Through the Eye of a Needle - Haroon Meer.eng.txt 87.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Inside Apple’s MDM Black Box - David Schultz.eng.vtt 87.7 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.tsv 87.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/FLEX, AMF 3 and BlazeDS An Assessment - Jacob Carlson, Kevin Stadmeyer.eng.srt 87.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Mitigation in Windows 8.eng.srt 87.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Identifying the True IP Network Identity of I2P Service Hosts - Adrian Crenshaw aka Irongeek.eng.tsv 87.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani, Billy K Rios.eng.txt 87.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/The Big Picture.eng.srt 87.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Sutterfield - Enterprise security for converging technologies.eng.srt 87.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Brandon Wiley - The Superworm Manifesto.eng.txt 87.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Reverse DNS Tunneling Shellcode - Ty Miller.eng.srt 87.6 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Escaping Virtualized Containers.eng.srt 87.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/NFC Analysis.eng.srt 87.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.tsv 87.6 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.tsv 87.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Babar-ians at the Gate - Data Protection at Massive Scale.eng.srt 87.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Chip & PIN is Definitely Broken - Adam Laurie, Zac Franken, Andrea Barisani, Daniele Bianco.eng.txt 87.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Welcome & Introduction to Black Hat Europe 2014.eng.lrc 87.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Endrun - Secure Digital Communications for Our Modern Dystopia.eng.lrc 87.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices - 1-2.eng.srt 87.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Disclosure Public.eng.srt 87.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Babar-ians at the Gate - Data Protection at Massive Scale.eng.txt 87.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Introduction to Tamper Evident Devices - datagram.eng.srt 87.5 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/These aren't the permissions you're looking for - Anthony Lineberry, Tim Wyatt, David Luke Richardson.eng.txt 87.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Adversary Characterization and Scoring System.eng.srt 87.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 1-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.txt 87.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/There’s a Fox in the Henhouse - Jeff Williams.eng.vtt 87.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Driving Forces Behind Industry 4.0 and Digital Transformation for Critical Infrastructure.eng.srt 87.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Chris-Eagle-IdaPro-English.eng.txt 87.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Leveraging the Edge Abusing SSL VPNs - Mike Zusman.eng.lrc 87.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Server-Side JavaScript Injection Attacking and Defending NoSQL and Node.js - Bryan Sullivan.eng.vtt 87.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Chip & PIN is Definitely Broken - Adam Laurie, Zac Franken, Andrea Barisani, Daniele Bianco.eng.srt 87.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kaminsky - BlackOPS 2006.eng.txt 87.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Attacking Clientside JIT Compilers - Chris Rohlf, Yan Ivnitskiy.eng.vtt 87.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hacker Court.eng.lrc 87.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Return-Oriented Programming Exploits Without Code Inspection - Hovav Shacham.eng.lrc 87.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kostya Kortchinsky - Bruce Schneier.eng.vtt 87.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Spoonm - Metasploit Hacking Like in the Movies.eng.lrc 87.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Why Black Hats Always Win - Val Smith, Chris.eng.vtt 87.3 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Houston, We Have a Problem Analyzing the Security of Low Earth Orbit Satellites.eng.srt 87.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hiring Trends in InfoSec.eng.txt 87.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Ops 2008 - Dan Kaminsky.eng.txt 87.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Checkmate with Denial of Service - Tom Brennan, Ryan Barnett.eng.lrc 87.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Staring into the Abyss The Dark Side of Security and Professional Intelligence - Richard Thieme.eng.tsv 87.3 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Investigating Malware Using Memory Forensics - A Practical Approach.eng.tsv 87.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Mitigation in Windows 8.eng.lrc 87.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Beckstrom’s Law - Rod Beckstrom.eng.lrc 87.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/S Stender - Attacking Inatl Software.eng.txt 87.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Malicious PDF Analysis.eng.lrc 87.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/FASTCash and INJX Pure How Threat Actors Use Public Standards for Financial Fraud.eng.srt 87.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sticking to the Facts Scientific Study of Static Analysis Tools - Chuck Willis, Kris Britton.eng.txt 87.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/RETrace - Applied Reverse Engineering on OS X - Tiller Beauchamp, David Weston.eng.srt 87.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Is the Mafia Taking Over Cybercrime.eng.srt 87.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Server-Side JavaScript Injection Attacking and Defending NoSQL and Node.js - Bryan Sullivan.eng.txt 87.2 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Adventures in Attacking Wind Farm Control Networks.eng.srt 87.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kostya Kortchinsky - Bruce Schneier.eng.lrc 87.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking and Forensicating an Oracle Database Server - David Litchfield.eng.txt 87.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Lambert - Sec Engineer in win Vista.eng.lrc 87.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A 16-bit Rootkit and Second Generation Zigbee Chips -Travis Goodspeed.eng.lrc 87.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Diana Kelly - Translasting US Privacy Regulations for Implementation.eng.txt 87.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Batz - Security Issues Affecting Internet Transit Points and Backbone Providers.eng.txt 87.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honeypots.eng.tsv 87.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Brandon Wiley - The Superworm Manifesto.eng.lrc 87.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/There’s a Fox in the Henhouse - Jeff Williams.eng.tsv 87.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/How Hackers Changed the Media (and the Media Changed Hackers).eng.srt 87.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Side Channel Analysis on Embedded Systems Impact and Countermeasures - Job de Haas.eng.txt 87.0 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe '24 - Speaker Coaching Program Orientation Call.eng.srt 87.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fuzzing the Phone in Your Phone - Charlie Miller, Collin Mulliner.eng.vtt 87.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Veiled - A Browser Based Darknet - Billy Hoffman, Matt Wood.eng.tsv 87.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Looking into the Eye of the Meter.eng.srt 87.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ptacek and Goldsmith - Elec Sheep.eng.txt 86.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Offensive Threat Modeling for Attackers - Turning Threat Modeling on its Hea.eng.srt 86.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jan K Rutkowski - Advance Windows 2000 Rootkits Detection.eng.txt 86.9 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/HTTP Desync Attacks Smashing into the Cell Next Door.eng.srt 86.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Payload Anatomy & Future Mutations - Riley Hassell.eng.vtt 86.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Agile Security or How to defend applications with five-dat release cycles - Bryan Sullivan.eng.txt 86.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Roger Dingledine - Putting the P back in VPN.eng.srt 86.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Building Safe Systems at Scale - Lessons from Six Months at Yahoo.eng.vtt 86.9 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Locknote Conclusions & Key Takeaways from Black Hat USA 2024.eng.srt 86.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani & Billy Rios.eng.vtt 86.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Malicious PDF Analysis.eng.vtt 86.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stender - Attack Internatl SW - English.eng.srt 86.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reverse Engineering by Crayon - Danny Quist, Lorie Liebrock.eng.lrc 86.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.eng.srt 86.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.jp.eng.txt 86.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A Black Hat Vulnerability Risk Assessment - Panel.eng.srt 86.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing.eng.lrc 86.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Rooster and JD Glaser - Defending Your Network With Active Directory Services.eng.text 86.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeremy Rauch - How Responsive are Vendors to Security Problems When They Aren't Being Pressured.eng.vtt 86.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Analyzing Security Research in the Media - Panel.eng.srt 86.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Internet is Broken Beyond Document.Cookie - Extreme Client-side Exploitation - Nathan McFeters, Rob Carter, John Heasman.eng.vtt 86.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Smashing the Furure for Fun & Profit.eng.txt 86.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pushing the Camel Through the Eye of a Needle - Haroon Meer.eng.lrc 86.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Analyzing Security Research in the Media - Panel.eng.txt 86.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Beckstrom’s Law - Rod Beckstrom.eng.vtt 86.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rick Smith - The Biometrics Dilemma.eng.txt 86.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani, Billy K Rios.eng.lrc 86.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Chris-Eagle-IdaPro-English.eng.lrc 86.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Malware Distribution via Widgetization of the Web - Neil Daswani.eng.txt 86.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection.eng.txt 86.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Post Exploitation Operations with Cloud Synchronization.eng.vtt 86.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Gerhard-Escelbeck-Laws-of-vulnerbilities-English.eng.srt 86.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Black Ops of TCPIP 2011 - Dan Kaminsky.eng.vtt 86.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Ops 2008 - Dan Kaminsky.eng.lrc 86.6 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani & Billy Rios.eng.txt 86.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - A Historical Look at Hardware Token Compromises.eng.vtt 86.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hiring Trends in InfoSec.eng.lrc 86.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Return-Oriented Programming Exploits Without Code Inspection - Hovav Shacham.eng.srt 86.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ejovi Nuwere - SIP Format Fuzz in Voip.srt 86.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Babar-ians at the Gate - Data Protection at Massive Scale.eng.lrc 86.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hackers, Journalists and the Ethical Swamp.eng.srt 86.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Black Hat USA 2003 - Dan Kaminsky - Stack Black Ops.eng.tsv 86.5 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Understanding the Windows SMB NTLM weak nonce vulnerablity - Hernan Ochoa, Agustin Azubel.eng.txt 86.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Embedded Management Interfaces - Hristo Bojinov, Elie Bursztein, Dan Boneh.eng.lrc 86.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Chip & PIN is Definitely Broken - Adam Laurie, Zac Franken, Andrea Barisani, Daniele Bianco.eng.lrc 86.5 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Charl van der Walt and Christoff Breytenbach - The Role of Non Obvious Relationships in the Foot Printing Process.eng.srt 86.5 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/From Zero to Sixty The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower (2).eng.srt 86.5 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/From Zero to Sixty The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower.eng.srt 86.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Black Ops of TCPIP 2011 - Dan Kaminsky.eng.tsv 86.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Real 'Cyber War' Espionage, DDoS, Leaks, and Wipers in the Russian Invasion of Ukraine.eng.srt 86.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Your Mind - Legal Status, Rights and Securing Yourself - Tiffany Rad & James Arlen.eng.tsv 86.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Bruce Schneier - Why Cryptograpy is Harder Than it Looks.eng.vtt 86.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 1-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.lrc 86.5 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/De-Anonymizing Live CDs through Physical Memory Analysis - Andrew Case.eng.srt 86.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Fantastic Red-Team Attacks and How to Find Them.eng.srt 86.5 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/XSS Street-Fight - The Only Rule Is There Are No Rules - Ryan Barnett.eng.txt 86.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Aerial Cyber Apocalypse If We Can Do It So Can They - Richard Perkins, Mike Tassey.eng.srt 86.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chris Paget - Click to Continue Shatter Attacks on Win32.eng.txt 86.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Legal Aspects of Cybersecurity - (AKA) CYBERLAW A Year in Review, Cases, Issues, Your Questions My (Alleged) Answers - Robert Clark.eng.txt 86.4 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/A Security RISC The State of Microarchitectural Attacks on RISC-V.eng.srt 86.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/FX - Vulnerability Finding in Win32A Comparison.eng.txt 86.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 1-2 - Eric Schultze & Erik Birkholz.eng.srt 86.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sticking to the Facts Scientific Study of Static Analysis Tools - Chuck Willis, Kris Britton.eng.lrc 86.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Sensor and Process Fingerprinting in Industrial Control Systems.eng.srt 86.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Disclosure Public.eng.txt 86.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CreepyDOL - Cheap, Distributed Stalking.eng.srt 86.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moore - Metasploit Reloaded.eng.text 86.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Law of Mobile Hacking - Jennifer Granick.eng.vtt 86.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dave Aitel - An Introduction to Spike.eng.lrc 86.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal - Fran Brown, Rob Ragan.eng.srt 86.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reviving Smart Card Analysis - Karsten Nohl, Chris Tarnovsky.eng.txt 86.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Server-Side JavaScript Injection Attacking and Defending NoSQL and Node.js - Bryan Sullivan.eng.lrc 86.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluetooth v2.1 - A New Security Infrastructure and New Vulnerabilities - Andrew Lindell.eng.txt 86.3 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/These aren't the permissions you're looking for - Anthony Lineberry, Tim Wyatt, David Luke Richardson.eng.lrc 86.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Sherma - Web Application Session Strength.eng.srt 86.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Noel Anderseon - Wifi in WIN Vista.eng.srt 86.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Gula - Bypassing Intrusion Detection Systems.eng.txt 86.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/EtherOops Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks.eng.srt 86.3 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites.eng.srt 86.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Honey Project - Latest Advances in Honeynet Technologies.eng.tsv 86.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kaminsky - BlackOPS 2006.eng.lrc 86.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/BIDOU - IPS Shortcomings.eng.srt 86.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hulton and Moniz - Faster pwning.eng.tsv 86.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Calculating Risk in the Era of Obscurity Reading Between the Lines of Security Advisories.eng.srt 86.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sticking to the Facts Scientific Study of Static Analysis Tools - Chuck Willis, Kris Britton.eng.srt 86.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Diana Kelly - Translasting US Privacy Regulations for Implementation.eng.lrc 86.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ptacek and Goldsmith - Elec Sheep.eng.lrc 86.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C. Foster, Vincent T. Liu - Catch Me if You Can.srt 86.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/The Lifecycle Of A Revolution.eng.srt 86.0 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.srt 86.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Living in the RIA World Blurring the Line Between Web and Desktop Security - Alex Stamos, David Thiel, Justine Osborne.eng.vtt 86.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Martin Roesch - Snort.eng.vtt 86.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking and Forensicating an Oracle Database Server - David Litchfield.eng.lrc 86.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Hacking Hollywood.eng.vtt 86.0 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Attacking and Defending Blockchains From Horror Stories to Secure Wallets.eng.srt 86.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Side Channel Analysis on Embedded Systems Impact and Countermeasures - Job de Haas.eng.lrc 86.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Philip Zimmermann - Keynote with Introduction by Jeff Moss.eng.tsv 86.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jennifer Granick - Top 10 Issues.eng.vtt 86.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Lessons From Two Years of Crypto Audits.eng.srt 86.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Nunez Di Croce/sapyto-0.9.rar 86.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Batz - Security Issues Affecting Internet Transit Points and Backbone Providers.eng.lrc 86.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Agile Security or How to defend applications with five-dat release cycles - Bryan Sullivan.eng.lrc 85.9 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Investigating Malware Using Memory Forensics - A Practical Approach.eng.srt 85.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jan K Rutkowski - Advance Windows 2000 Rootkits Detection.eng.lrc 85.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Allen Harper, Edward Balas - The Birth of roo.eng.txt 85.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/CuteCats.exe and the Arab Spring.eng.srt 85.9 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Attacking Electric Motors for Fun and Profit.eng.srt 85.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Threats to the 2008 Presidential Election - Oliver Fredrichs.eng.tsv 85.9 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Eren-Aitel/Presentation/bh-dc-08-eren.pdf 85.9 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Eren-Aitel/Presentation/bh-dc-08-eren-aitel.pdf 85.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/.NET from the Hacker's Perspective - Drew Miller.eng.tsv 85.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Analyzing Security Research in the Media - Panel.eng.lrc 85.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/S Stender - Attacking Inatl Software.eng.lrc 85.9 KB
- Black Hat DC/Black Hat Federal 2006/An Advanced NTFS Data Hiding Technique - Irby Thompson, Matthew Monroe.eng.vtt 85.9 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Laser Beams & Light Streams Building Affordable Light-Based Hardware Security Tooling.eng.srt 85.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Andrea Matwyshyn - Introduction to Corporate Information Security Law.eng.srt 85.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Conducting a Successful False Flag Cyber Operation (Blame it on China).eng.srt 85.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning Your Phone at Every Layer - A Mobile Security Panel - Tyler Shields, Anthony Lineberry, Charlie Miller, Chris Wysopal, Dino Dai Zovi, more.eng.vtt 85.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Our Favorite XSS Filters and How to Attack Them - Eduardo Vela Nava, David Lindsay.eng.txt 85.9 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/The Black Hat Asia Network Operations Center (NOC) Report.eng.srt 85.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Macs in the Age of the APT - Alex Stamos, BJ Orvis, Paul Youn.eng.srt 85.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/icd.jpg 85.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Sarah Gordon - Viruses in the Information Age.eng.txt 85.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Call To Arms - A Tale of the Weaknesses of Current Client-Side XSS Filtering.eng.txt 85.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Vixie - Preventing Child Neglect.eng.txt 85.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Smartfuzzing the Web Carpe Vestra Foramina - Nathan Hamiel, Justin Engler, Seth Law, Gregory Fleischer.eng.srt 85.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is Your Phone Pwned - Kevin Mahaffey, Anthony Lineberry, John Hering.eng.tsv 85.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/DropSmack - How Cloud Synchronization Services Render Your Corporate Firewall.eng.vtt 85.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani & Billy Rios.eng.lrc 85.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Heroku Abuse Operations Hunting Wolves in Sheep's Clothing.eng.srt 85.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/XSS Street-Fight - The Only Rule Is There Are No Rules - Ryan Barnett.eng.lrc 85.7 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.srt 85.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Tactical Application Security Program - Getting Stuff Done.eng.txt 85.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Exploitation of a Modern Smartphone Baseband.eng.srt 85.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Smashing the Furure for Fun & Profit.eng.lrc 85.7 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Understanding the Windows SMB NTLM weak nonce vulnerablity - Hernan Ochoa, Agustin Azubel.eng.lrc 85.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Beetle Potter - Evil Twins 802.11.eng.vtt 85.6 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Pomraning.pdf 85.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Willis and Belani - Web App Incident.eng.tsv 85.6 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Satoru-Koyama-Our-Security-Depends-on-Your-Security-Japanese.eng.txt 85.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloud Computing Models and Vulnerabilities - Raining on the Trendy New Parade - Alex Stamos, Andrew Becherer & Nathan Wilcox.eng.srt 85.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Maltego Tungsten As a Collaborative Attack Platform.eng.txt 85.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/VC Panel Security Business Strategies During a Recession - Panel.eng.txt 85.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluetooth v2.1 - A New Security Infrastructure and New Vulnerabilities - Andrew Lindell.eng.lrc 85.5 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Advanced JPEG Steganography and Detection by John Ortiz.eng.srt 85.5 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stamos - Breaking AJAX - English.eng.txt 85.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Legal Aspects of Cybersecurity - (AKA) CYBERLAW A Year in Review, Cases, Issues, Your Questions My (Alleged) Answers - Robert Clark.eng.lrc 85.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/DRAMA - How Your DRAM Becomes a Security Problem.eng.srt 85.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Disclosure Public.eng.lrc 85.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Caezar-Scoring-CTF-Games-English.eng.srt 85.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Breaking Brains, Solving Problems Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros.eng.srt 85.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Using D-Space to Open Doors.eng.txt 85.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rick Smith - The Biometrics Dilemma.eng.lrc 85.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Practice) 2-2.eng.srt 85.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Last Call for SATCOM Security.eng.srt 85.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Gula - Bypassing Intrusion Detection Systems.eng.lrc 85.4 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild.eng.srt 85.4 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Jennifer Granick - What's Different About Evidence in Computer Crime litigation.eng.txt 85.4 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/The Magnetic Pull of Mutable Protection Worked Examples in Cryptographic Agility.eng.srt 85.4 KB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-mullen.pdf 85.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - Application Security Crossfire.eng.tsv 85.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Christian Martorella on Wfuzz & WebSlayer v2.0.eng.json 85.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection.eng.lrc 85.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dai Zovi - Hardware Virtualization.eng.txt 85.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/LTE & IMSI Catcher Myths.eng.srt 85.3 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Geers - Eisen - IPv6 - Update - Japanese.eng.txt 85.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Global Spying - Steve Topletz, Jonathan Logan, Kyle Williams.eng.vtt 85.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Threats to the 2008 Presidential Election (and more) - Oliver Friedrichs.eng.srt 85.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Potter - Java Card 101.eng.txt 85.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Computer Crime Year in Review - Jennifer Granick.eng.srt 85.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joseph Ansanelli - Future of Personal info.txt 85.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hiring Trends in InfoSec.eng.vtt 85.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-English.eng.tsv 85.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/FX - Vulnerability Finding in Win32A Comparison.eng.lrc 85.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CreepyDOL - Cheap, Distributed Stalking.eng.txt 85.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.jp.eng.lrc 85.2 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Chris Goggans - Internet Attack Methodologies.eng.text 85.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Malware Distribution via Widgetization of the Web - Neil Daswani.eng.lrc 85.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Advanced Oracle Attack Techniques - David Litchfield.eng.text 85.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Anti-Forensics The Rootkit Connection - Bill Blunden.eng.vtt 85.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Goldman and Marotta - Securing Your Computing Environment to Conform to Privacy Regulations.eng.txt 85.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacking-Japanese-Translated.eng.srt 85.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Four Horsemen of the Virtualization Security Apocalypse - Christofer Hoff.eng.srt 85.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00019.jpg 85.1 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Surfacing a Hydra Unveiling a Multi-Headed Chinese State-Sponsored Campaign.eng.srt 85.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Tarnovsky_Momentary_Faults/BH_US_08_Tarnovsky_Momentary_Faults_in_Smartcards.pdf 85.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Spy-jacking the Booters.eng.srt 85.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chris Paget - Click to Continue Shatter Attacks on Win32.eng.lrc 85.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/NGSCB/ngscb_authentication.doc 85.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/David Bovee - VPN Architectures Looking at the Complete Picture.eng.vtt 85.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mike Schiffman - The Need for an 802.11b Toolkit.eng.tsv 85.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reviving Smart Card Analysis - Karsten Nohl, Chris Tarnovsky.eng.lrc 85.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Security When Nano-Seconds Count - James Arlen.eng.vtt 85.0 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Saumil-Shah-David-Cole-Adware-Spyware-English.eng.srt 85.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Derek Soeder, Ryan Permeh - eYe Bootroot.srt 85.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Jesse Burns - Fuzzing Win32.eng.srt 85.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Global Security Report 2010 Analysis of Investigations and Penetration Tests - Nicholas J Percoco.eng.tsv 84.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moniz and Moore - 6 Degrees XSSploit.eng.txt 84.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mudge - Economics Physics Psycology.eng.srt 84.9 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Patrick Richard - Open Network PKI Design Issues or Business as Usual.eng.srt 84.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sparks and Others - Sidewinder.eng.vtt 84.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeremy Rauch - The Security of Network Devices.eng.txt 84.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Open Sourcing Automotive Diagnostics.eng.srt 84.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Potter - Java Card 101.eng.vtt 84.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hardware is the New King - Joe Grand aka Kingpin.eng.text 84.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.text 84.8 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/MS SQL Server Security Overview - Chip Andrews.eng.text 84.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Sarah Gordon - Viruses in the Information Age.eng.lrc 84.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.eng.txt 84.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sour Pickles - Marco Slaviero.eng.tsv 84.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Beetle Potter - Evil Twins 802.11.eng.tsv 84.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Edward G Schwartz and Diana Kelly - Data Privacy What should the CIO and CISO be doing.eng.tsv 84.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Shaun Clowes - Fixing and Making Holes in Binaries.eng.srt 84.8 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Exploiting a Single SQLite Vulnerability Across Multiple Software.eng.srt 84.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/VC Panel Security Business Strategies During a Recession - Panel.eng.lrc 84.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Maltego Tungsten As a Collaborative Attack Platform.eng.lrc 84.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Beyond Scanning - Automating Web Application Security Tests.eng.srt 84.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ian Goldberg - Breaking 80211 WEP.eng.vtt 84.8 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Denial of Service with a Fistful of Packets Exploiting Algorithmic Complexity Vulnerabilities.eng.srt 84.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sherri Sparks, Jamie Butler - Shadow Walker.srt 84.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Secure Browser Plugins.eng.txt 84.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Operational Templates for State-Level Attack and Collective Defense of Countries.eng.srt 84.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Reversing the Root Identifying the Exploited Vulnerability in 0-days Used In-The-Wild.eng.srt 84.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Our Favorite XSS Filters and How to Attack Them - Eduardo Vela Nava, David Lindsay.eng.lrc 84.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam Boileau - Trust Transcience.eng.srt 84.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Vixie - Preventing Child Neglect.eng.lrc 84.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Android - One Root to Own them All.eng.txt 84.7 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Keynote - Preparing the Long Journey for Data Security.eng.srt 84.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/CSO Panel Black Hat Strategy Meeting - Panel.eng.tsv 84.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Tactical Application Security Program - Getting Stuff Done.eng.lrc 84.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stamos - Breaking AJAX - English.eng.lrc 84.6 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/The Hacker's Guide to Policyland.eng.srt 84.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Language of Trust - Mark Dowd, Ryan Smith, David Dewey.eng.tsv 84.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/LTE & IMSI Catcher Myths.eng.tsv 84.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Medical Devices for Fun and Insulin Breaking the Human SCADA System - Jay Radckiffe.eng.srt 84.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Allen Harper, Edward Balas - The Birth of roo.eng.lrc 84.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ptacek and Goldsmith - Elec Sheep.eng.vtt 84.6 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/MaLDAPtive Diving Deep Into LDAP Obfuscation, Deobfuscation & Detection.eng.srt 84.6 KB
- Black Hat DC/Black Hat DC 2007/Video/Black Hat DC 2007 captions/RFID for Beginners - Chris Paget and the ACLU.eng.vtt 84.6 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Ichthyology - Phishing as a Science.eng.srt 84.6 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Level Up Your Security Mindset.eng.srt 84.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Potter - Java Card 101.eng.lrc 84.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/No Mr. Cyber Threat - A Psychological Approach To Managing the Fail - to - Challenge Vulnerability.eng.srt 84.5 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/LLMs at the Core From Attention to Action in Scaling Security Teams.eng.srt 84.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joseph Ansanelli - Future of Personal info.lrc 84.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Call To Arms - A Tale of the Weaknesses of Current Client-Side XSS Filtering.eng.lrc 84.5 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Jennifer Granick - What's Different About Evidence in Computer Crime litigation.eng.lrc 84.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Legal Aspects of Cyberspace Operations.eng.vtt 84.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Teridian SoC Exploitation - Exploration of Harvard Architecture Smart Grid Systems.eng.srt 84.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Concurrency Attacks in Web Applications - Scott Stender, Alexander Vidergar.eng.vtt 84.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Maynor-Graham/Whitepaper/bh-eu-07-maynor-graham-WP.pdf 84.4 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Back in Black Hat The 7th Annual Black Hat USA NOC Report.eng.srt 84.4 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.vtt 84.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat 2015.eng.txt 84.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How to Steal a Nuclear Warhead Without Voiding Your XBox Warranty - Intro to tamper evident devices, applications & circumvention - Jamie Schwettmann & Eric Michaud.eng.vtt 84.4 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Unity Data Architecture and How Cisco Unity Works.pdf 84.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Cisco Unity Data Architecture and How Cisco Unity Works.pdf 84.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Secure Browser Plugins.eng.srt 84.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Researching Android Device Security with the Help of a Droid Army.eng.srt 84.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Enforcer - Timothy Mullen.eng.vtt 84.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.eng.srt 84.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluetooth v2.1 - A New Security Infrastructure and New Vulnerabilities - Andrew Lindell.eng.vtt 84.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Fischbach - Carrier VOIP Security.eng.tsv 84.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fast & Furious Reverse Engineering with TitanEngine - Mario Vuksan, Tomislav Pericin.eng.srt 84.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.srt 84.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA.eng.srt 84.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.tsv 84.3 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.tsv 84.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Malware analysis for the enterprise - Jason Ross.eng.vtt 84.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/A Picture’s Worth Digital Image Analysis - Dr. Neal Krawetz.eng.tsv 84.3 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Jennifer Granick - What's Different About Evidence in Computer Crime litigation.eng.srt 84.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Ofir Arkin - Cracking VoIP Architecture.eng.srt 84.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Marinescu - WIN Vista Heap Mgmt.eng.txt 84.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/BH_US_08_DeMott_AppSec_A-Z_Fuzzing1.pdf 84.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pushing the Camel Through the Eye of a Needle - Haroon Meer.eng.srt 84.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-maynor-graham-WP.pdf 84.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CreepyDOL - Cheap, Distributed Stalking.eng.lrc 84.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joseph Ansanelli - Future of Personal info.vtt 84.2 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Holz - Catching Malware - Japanese.eng.txt 84.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why Control System Cyber-Security Sucks.eng.srt 84.2 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Container Attack Surface Reduction Beyond Name Space Isolation.eng.srt 84.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeremy Rauch - The Security of Network Devices.eng.lrc 84.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Counterattack - Turning the tables on exploitation attempts from tools like metasploit - scriptjunkie.eng.tsv 84.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-hassell.pdf 84.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hulton and Moniz - Faster pwning.eng.vtt 84.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Walter Gary Sharp - Key Legal Implications of Computer Network Defense.eng.vtt 84.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Legal Aspects of Cyberspace Operations.eng.txt 84.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Satoru-Koyama-Our-Security-Depends-on-Your-Security-Japanese.eng.lrc 84.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Selling 0-Days to Governments and Offensive Security Companies.eng.srt 84.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Phishing for Funds - Understanding Business Email Compromise.eng.srt 84.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.eng.lrc 84.1 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/SCADA Security - Jason Larsen.eng.srt 84.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Drew Miller - .Net from the hackers perspective Part 2 .eng.tsv 84.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Neel Mehta - Advanced in ELF runtime binary encryption - Shiva.eng.txt 84.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Goldman and Marotta - Securing Your Computing Environment to Conform to Privacy Regulations.eng.lrc 84.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Rain Forest Puppy - TBD.eng.tsv 84.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mark Eckenwiler - USA Patriot Act and Criminal Investigations.eng.vtt 84.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/AppSec A-Z Reverse Engineering, Source Code Auditing, Fuzzing, and Exploitation - Jared DeMott.eng.srt 84.0 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Cloudy with a Chance of APT Novel Microsoft 365 Attacks in the Wild.eng.srt 84.0 KB
- Black Hat DC/Black Hat Federal 2006/Client Side Penetration Testing - Max Caceres.eng.vtt 84.0 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Breaking Secure Bootloaders.eng.srt 84.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Chip.Fail - Glitching the Silicon of the Connected World.eng.srt 84.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protocols and Encryption of the Storm Botnet - Joe Stewart.eng.srt 84.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - A Historical Look at Hardware Token Compromises.eng.tsv 84.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Smashing the Furure for Fun & Profit.eng.vtt 84.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Safeguarding You Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.text 84.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Safeguarding Your Business Assets Through Understanding of the Win32API - Todd Feinman, David Goldman.eng.text 84.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Identifying the True IP Network Identity of I2P Service Hosts - Adrian Crenshaw aka Irongeek.eng.srt 84.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Using D-Space to Open Doors.eng.lrc 84.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/The Devils in the Dependency Data Driven Software Composition Analysis.eng.srt 84.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Extreme Privilege Escalation on Windows 8 UEFI Systems.eng.srt 84.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Android - One Root to Own them All.eng.lrc 83.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Robert Baird and Mike Lynn - Advanced 80211b Attack.eng.srt 83.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Keynote - Quest for the Holy Grail - Jerry Dixon.eng.tsv 83.9 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/The Undeniable Truth.eng.srt 83.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Hate the Player, Hate the Game Inside the Android Patch Lifecycle - Anthony Lineberry, Tim Strazzere, Tim Wyatt.eng.txt 83.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Gregory S Miles - Computer Forensics a Critical Process in Your Incident Response Plan.eng.srt 83.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Antivirus Security Softwear Tests.eng.txt 83.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeremy Rauch - The Security of Network Devices.eng.vtt 83.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Security When Nano-Seconds Count - James Arlen.eng.tsv 83.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Gula - Bypassing Intrusion Detection Systems.eng.vtt 83.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Wheeler, Niel Mehta - Owning Anti-virus.eng.srt 83.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 2-2 - John Benson.eng.txt 83.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Errata Hits Puberty.eng.vtt 83.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dai Zovi - Hardware Virtualization.eng.lrc 83.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Secure Browser Plugins.eng.lrc 83.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/cnet_iphone_300x150.swf 83.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/cnet_iphone_300x150.swf 83.8 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Stephan Chenette on FireShark v2.eng.json 83.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Four Horsemen of the Virtualization Security Apocalypse - Christofer Hoff.eng.txt 83.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moniz and Moore - 6 Degrees XSSploit.eng.lrc 83.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/SSL, Gone in 30 Seconds - A BREACH beyond CRIME.eng.srt 83.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Christey/Presentation/bh-usa-07-christey.pdf 83.7 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Keynote Industrialising Cyber Defence in an Asymmetric World.eng.srt 83.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Nitesh Dhanjani - Justin Clark.eng.txt 83.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dow Herath Mehta Spencer and Flake - Professional Source Code Auditing.eng.srt 83.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Fischbach - Carrier VOIP Security.eng.vtt 83.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court - Part2.eng.text 83.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Combating the Insider Threat at the FBI - Real-world Lessons Learned.eng.vtt 83.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Geers - Eisen - IPv6 - Update - Japanese.eng.lrc 83.6 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.vtt 83.6 KB
- Black Hat DC/Black Hat DC 2007/Video/Black Hat DC 2007 captions/RFID for Beginners - Chris Paget and the ACLU.eng.txt 83.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Faces Of Facebook Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.tsv 83.5 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/The Black Hat Europe Network Operations Center (NOC) Report.eng.srt 83.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/The 10th Annual Black Hat USA Network Operations Center (NOC) Report.eng.srt 83.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2019.eng.txt 83.5 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Understanding the Windows SMB NTLM weak nonce vulnerablity - Hernan Ochoa, Agustin Azubel.eng.srt 83.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Matthew Franz and Sean Convery - BGP Vulnerability Testing.eng.text 83.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Black Hat USA 2019 Keynote Every Security Team is a Software Team Now by Dino Dai Zovi.eng.vtt 83.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-When-the-table-turn-Japanese.eng.txt 83.5 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/The Machines That Betrayed Their Masters by Glenn Wilkinson.eng.srt 83.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The IETF & The Future of Security Protocols - All The Signal, None of the No.eng.txt 83.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Keynote - Quest for the Holy Grail - Jerry Dixon.eng.vtt 83.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.eng.srt 83.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Death of 1000 Cuts.eng.srt 83.5 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Black Hat Asia 2018 Keynote A Short Course in Cyber Warfare - by The Grugq.eng.srt 83.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00034.jpg 83.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks.eng.vtt 83.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Securing the System A Deep Dive into Reversing Android Pre-Installed Apps.eng.srt 83.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Global Spying - Steve Topletz, Jonathan Logan, Kyle Williams.eng.txt 83.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerardo Richarte - Modern Intrusion Practices.eng.vtt 83.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Software Radio and the Future of Wireless Security - Michael Ossmann.eng.srt 83.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Curtis E Karnow - Running the Matrix.eng.srt 83.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/BH_US_08_DeMott_AppSec_A-Z_Slides.pdf 83.4 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/efiXplorer Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis.eng.srt 83.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Crypto for Pentesters - Thomas Ptacek, Michael Tracy.eng.text 83.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Post Exploitation Bliss - Loading Meterpreter on a Factory iPhone - Vincenzo Iozzo, Charlie Miller.eng.vtt 83.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani, Billy K Rios.eng.vtt 83.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.tsv 83.3 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.tsv 83.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Android - One Root to Own them All.eng.vtt 83.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat 2015.eng.lrc 83.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Measuring the Speed of the Red Queen's Race Adaption and Evasion in Malware.eng.srt 83.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Cunningham w Morgan - US Natl Sec.eng.text 83.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Legal Aspects of Cyberspace Operations.eng.lrc 83.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kenneth Geers - Hacking in a Foreign.eng.srt 83.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Lockpicking Forensics - Datagram.eng.tsv 83.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Advanced CAN Injection Techniques for Vehicle Networks.eng.vtt 83.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/ian Goldberg - Off the Record Messaging.eng.vtt 83.2 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Scammers Who Scam Scammers, Hackers Who Hack Hackers Exploring a Sub - economy on Cybercrime Forums.eng.srt 83.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Sherma - Web Application Session Strength.eng.txt 83.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Hacking XPATH 2.0.eng.txt 83.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/MetaPost Exploitation - Val Smith, Colin Ames.eng.srt 83.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Uncommon Sense Detecting Exploits with Novel Hardware Performance Counters and ML Magic.eng.srt 83.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/War Texting Weaponizing Machine 2 Machine - Don Bailey.eng.srt 83.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends.eng.srt 83.1 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling.eng.txt 83.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00027.jpg 83.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-English.eng.vtt 83.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jennifer Granick and Mark Eckenwiler - What Internet Service Providers Need to Know About the Law.eng.text 83.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Decompilers and Beyond - Ilfak Guilfanov.eng.txt 83.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Marinescu - WIN Vista Heap Mgmt.eng.lrc 83.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court.eng.vtt 83.0 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Holz - Catching Malware - Japanese.eng.lrc 83.0 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Unmasking APTs An Automated Approach for Real-World Threat Attribution.eng.srt 83.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Four Horsemen of the Virtualization Security Apocalypse - Christofer Hoff.eng.lrc 83.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 2-2 - John Benson.eng.lrc 83.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Keynote - Devaluing Attack - Disincentivizing Threats Against The Next Billion Devices.eng.srt 83.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sherri Sparks, Jamie Butler - Shadow Walker.txt 83.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Return of Bleichenbacher's Oracle Threat (ROBOT).eng.srt 82.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Corporate Espionage for Dummies The Hidden Threat of Embedded Web Servers - Michael Sutton.eng.txt 82.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Adversary Characterization and Scoring System.eng.txt 82.9 KB
- Black Hat DC/Black Hat DC 2007/Video/Black Hat DC 2007 captions/RFID for Beginners - Chris Paget and the ACLU.eng.lrc 82.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk.eng.srt 82.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Teensy Programming for Everyone.eng.vtt 82.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Neel Mehta - Advanced in ELF runtime binary encryption - Shiva.eng.lrc 82.8 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Hobbit - Microsoft LM athentication, CIFS, and All Kinds of Password Problems.eng.srt 82.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Silvio Cesare - Opensource Kernel Auditing and Exploitation.eng.vtt 82.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing.eng.srt 82.8 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Engineering Empathy Adapting Software Engineering Principles and Process to Security.eng.srt 82.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Hoshizawa - online Swindler - English.eng.txt 82.8 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Larry Leibrock - Digital Information, User Tokens, Privacy and Forensics Investigations The Case of Windows XP Platform.eng.txt 82.8 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Tales from the NOC Going Public in Asia.eng.srt 82.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Demystifying Fuzzers - Michael Eddington.eng.txt 82.8 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 1-2.eng.srt 82.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Exploiting Smart-Phone USB Connectivity For Fun And Profit - Angelos Stavrou & Zhaohui Wang.eng.txt 82.7 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/My Invisible Adversary Burnout.eng.srt 82.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brad Bolin - Information Security Law Update.eng.srt 82.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Global Spying - Steve Topletz, Jonathan Logan, Kyle Williams.eng.lrc 82.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Antivirus Security Softwear Tests.eng.lrc 82.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Threats to the 2008 Presidential Election - Oliver Fredrichs.eng.vtt 82.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/The Black Hat Europe NOC (Network Operations Center) Report.eng.srt 82.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Greg Conti - Crafting a Tivo.eng.txt 82.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Controlling the Source Abusing Source Code Management Systems.eng.srt 82.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sensepost - Deus ex Machina.eng.tsv 82.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Hate the Player, Hate the Game Inside the Android Patch Lifecycle - Anthony Lineberry, Tim Strazzere, Tim Wyatt.eng.lrc 82.6 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/The Hack@DAC Story Learnings from Organizing the World's Largest Hardware Hacking Competition.eng.srt 82.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stamos - Breaking AJAX - English.eng.vtt 82.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Browsers Gone Wild.eng.srt 82.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jed Haile - Hogwash.eng.srt 82.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rieback - RFID Malware Demystified.eng.txt 82.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Rapid Enterprise Triaging - Aaron LeMasters, Michael Murphy.eng.srt 82.5 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Charl van der Walt and Christoff Breytenbach - The Role of Non Obvious Relationships in the Foot Printing Process.eng.txt 82.5 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Hoshizawa - online Swindler - English.eng.vtt 82.5 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Fail Harder Finding Critical 0 - Days in Spite of Ourselves.eng.srt 82.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Nitesh Dhanjani - Justin Clark.eng.lrc 82.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/OSS Security Maturity - Time to Put on Your Big Boy Pants.eng.txt 82.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Fischbach and Lacoste - Seris - IP Backbone Security.eng.tsv 82.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/A Framework for Evaluating National Cybersecurity Strategies.eng.srt 82.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Legal Aspects of Cybersecurity - (AKA) CYBERLAW A Year in Review, Cases, Issues, Your Questions My (Alleged) Answers - Robert Clark.eng.vtt 82.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Job de Haas - GSM WAP and SMS Security.eng.tsv 82.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Windows Kernel Graphics Driver Attack Surface.eng.txt 82.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Hacker Court.eng.text 82.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ian Goldberg - Breaking 80211 WEP.eng.tsv 82.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Mobile Exploit Intelligence Project.eng.vtt 82.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/HostSplit Exploitable Antipatterns in Unicode Normalization.eng.srt 82.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/VC Panel Security Business Strategies During a Recession - Panel.eng.vtt 82.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Wireless Networks with 802.1x, EAP-TLS and PEAP - Steve Riley.eng.srt 82.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking .Net Applications The Black Arts - Jon McCoy.eng.txt 82.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Satan is on My Friends List Attacking Social Networks - Shawn Moyer, Nathan Hamiel.eng.vtt 82.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The IETF & The Future of Security Protocols - All The Signal, None of the No.eng.lrc 82.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2019.eng.lrc 82.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Google Chrome OS - Matt Johansen, Kyle Osborn.eng.srt 82.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/WiFi Security or Descending Into Depression and Drink - Mike Kershaw aka Dragorn.eng.vtt 82.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-When-the-table-turn-Japanese.eng.lrc 82.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Reverse DNS Tunneling Shellcode - Ty Miller.eng.tsv 82.3 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Ian Goldberg - Cell Phone Security A History and The State of the Art.eng.vtt 82.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Attacking the Vista Heap - Ben Hawkes.eng.tsv 82.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kenneth Geers - Hacking in a Foreign.eng.txt 82.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Data Mining a Mountain of Zero Day Vulnerabilities.eng.txt 82.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Reverse DNS Tunneling Shellcode - Ty Miller.eng.vtt 82.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Bit-Squatting DNS Hijacking Without Exploitation - Artem Dinaburg.eng.srt 82.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Derek Soeder, Ryan Permeh - eYe Bootroot.txt 82.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Hacking XPATH 2.0.eng.lrc 82.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tzi-cker Chiueh - Checking Array Bound.txt 82.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 2-2 - John Benson.eng.vtt 82.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sherri Sparks, Jamie Butler - Shadow Walker.lrc 82.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Finding a Needle in an Encrypted Haystack.eng.srt 82.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Adversary Characterization and Scoring System.eng.lrc 82.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Using Guided Missiles in Drive-Bys - Automatic Browser Fingerprinting - Egypt.eng.srt 82.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Spoonm - Metasploit Hacking Like in the Movies.eng.srt 82.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Portable Document Flaws 101.eng.srt 82.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Strike and Counterstrike The Law on Automated Intrusions and Striking Back - Curtis Karnow.eng.vtt 82.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Aaron Higbee and Chris Davis - DC Phone Home.eng.srt 82.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Do You Speak My Language Make Static Analysis Engines Understand Each Other.eng.srt 82.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco's PIX Firewall and Stateful Firewall Security.pdf 82.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Cisco's PIX Firewall and Stateful Firewall Security.pdf 82.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Demystifying Fuzzers - Michael Eddington.eng.lrc 82.0 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Sugiura - Winny Poo - Japanese.eng.srt 82.0 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/XOM-switch Hiding Your Code from Advanced Code Reuse Attacks In One Shot.eng.srt 82.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fighting Russian Cybercrime Mobsters - Dmitri Alperovitch.eng.tsv 82.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Eric Goldman - Criminal Copyright infringement and warez trading.eng.vtt 82.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jay Beale - Attacking and Securing UNIX FTP Servers.eng.tsv 82.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Emulating Samsung's Baseband for Security Testing.eng.srt 82.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Hat USA 2008 - PWNY Awards.eng.srt 82.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Dynamic Taint Propagation Finding Vulnerabilities Without Attacking - Brian Chess & Jacob West.eng.txt 82.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mike Beekey - ARP Vulnerabilities Indefensible Local Network Attacks.eng.txt 82.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/RETrace - Applied Reverse Engineering on OS X - Tiller Beauchamp, David Weston.eng.tsv 82.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Richard Thieme - Saying Whatever he Wants.eng.txt 82.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Forgotten World - Corporate Business Application Systems - Alexander Polyakov.eng.txt 82.0 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Forensics Tools and Processes for Windows XP Platforms - Larry Leibrock.eng.tsv 82.0 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Come to the Dark Side, We Have Apples Turning macOS Management Evil.eng.srt 81.9 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Hoshizawa - online Swindler - English.eng.lrc 81.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Christey/Whitepaper/bh-usa-07-christey-WP.pdf 81.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/IIS 6.0's Security Architecture - It's a Whole New World - Michael Muckin.eng.vtt 81.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Sherma - Web Application Session Strength.eng.lrc 81.9 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling.eng.lrc 81.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Cory Scott - Systems Management in an Untrusted Network.eng.vtt 81.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Mobile Exploit Intelligence Project.eng.txt 81.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Covert Post-Exploitation Forensics with Metasploit - Wesley McGrew.eng.txt 81.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Decompilers and Beyond - Ilfak Guilfanov.eng.lrc 81.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Strike and Counterstrike The Law on Automated Intrusions and Striking Back - Curtis Karnow.eng.txt 81.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Corporate Espionage for Dummies The Hidden Threat of Embedded Web Servers - Michael Sutton.eng.lrc 81.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mainframes - The Past Will Come to Haunt You.eng.tsv 81.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/David Bovee - VPN Architectures Looking at the Complete Picture.eng.tsv 81.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Goldman and Marotta - Securing Your Computing Environment to Conform to Privacy Regulations.eng.srt 81.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/DSCOMPROMISED - A Windows DSC Attack Framework.eng.srt 81.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BlackOps.eng.srt 81.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Mitigation in Windows 8.eng.vtt 81.8 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Mac-ing Sense of the 3CX Supply Chain Attack Analysis of the macOS Payloads.eng.srt 81.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacking-Japanese-Translated.eng.txt 81.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00036.jpg 81.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Demystifying Fuzzers - Michael Eddington.eng.vtt 81.8 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Cloud Console Cartographer Tapping Into Mapping- Slogging Thru Logging.eng.srt 81.7 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.tsv 81.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Active Exploitation Detection - Marc Eisenbarth.eng.tsv 81.7 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Reasonable Regs vs Red Tape How Should Governments Tackle the Cyber Intrusion Market.eng.srt 81.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jay Beale - Attacking and Securing UNIX FTP Servers.eng.srt 81.7 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.eng.srt 81.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Million Browser Botnet.eng.srt 81.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dr. Mudge - Secure Coding Practices and Source Code Analysis.eng.vtt 81.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 1-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.vtt 81.7 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Charl van der Walt and Christoff Breytenbach - The Role of Non Obvious Relationships in the Foot Printing Process.eng.lrc 81.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jay Beale - Attacking and Defending BIND DJBDNS DNS Servers.eng.vtt 81.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Sutterfield - Enterprise security for converging technologies.eng.vtt 81.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Effective File Format Fuzzing - Thoughts, Techniques and Results.eng.srt 81.6 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Becoming You - A Glimpse Into Credential Abuse.eng.srt 81.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex - Shreeraj Shah.eng.srt 81.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Holz - Catching Malware - Japanese.eng.srt 81.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Gordon Reichard Jr - Trust, Security, Partnership Strategies in Selecting a Managed Service Provider.eng.srt 81.5 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Exploiting Smart-Phone USB Connectivity For Fun And Profit - Angelos Stavrou & Zhaohui Wang.eng.lrc 81.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Curtis E Karnow - Running the Matrix.eng.tsv 81.5 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Strategies for Defeating Distributed Attacks - Simple Nomad.eng.tsv 81.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 2 - Val Smith, Colin Ames & David Kerb.eng.srt 81.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Caezar-Scoring-CTF-Games-English.eng.txt 81.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BIOS Security.eng.txt 81.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Critical Zero Days Remotely Compromise the Most Popular Real-Time OS.eng.srt 81.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/URI Use and Abuse - Nathan McFeters and Rob Carter.eng.tsv 81.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Greg Conti - Crafting a Tivo.eng.lrc 81.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Lee Kushner - The State of Employment in the Information Security Industry.eng.srt 81.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Catching Malware En Masse - DNS and IP Style.eng.srt 81.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Google Chrome OS - Matt Johansen, Kyle Osborn.eng.txt 81.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Offensive Threat Modeling for Attackers - Turning Threat Modeling on its Hea.eng.txt 81.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/OSS Security Maturity - Time to Put on Your Big Boy Pants.eng.lrc 81.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Richard Thieme - Masters of the Unseen The Art of Information Warfare.eng.tsv 81.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking for Fun & Profit.eng.vtt 81.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Ignore Your Generative AI Safety Instructions. Violate the CFAA.eng.srt 81.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Windows Kernel Graphics Driver Attack Surface.eng.lrc 81.3 KB
- Black Hat DC/Black Hat Federal 2006/Extracting Unexpected Functionality from Existing Networks - Dan Kaminsky.eng.vtt 81.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Constant Insecurity Things You Didn’t Know About (PECOFF) Portable Executable File Format - Mario Vuksan, Tomislav Pericin.eng.txt 81.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rieback - RFID Malware Demystified.eng.lrc 81.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/The Big Picture.eng.vtt 81.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kenneth Geers - Hacking in a Foreign.eng.lrc 81.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tzi-cker Chiueh - Checking Array Bound.lrc 81.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Anti-Forensics The Rootkit Connection - Bill Blunden.eng.tsv 81.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rutkowska - Subverting Vista Kernel.eng.srt 81.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Introduction to Tamper Evident Devices - datagram.eng.tsv 81.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Post Exploitation Operations with Cloud Synchronization.eng.txt 81.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Derek Soeder, Ryan Permeh - eYe Bootroot.lrc 81.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years.html 81.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Braving the Cold New Methods for Preventing Cold Boot Attacks on Encryption Keys - Patrick McGregor.eng.tsv 81.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking .Net Applications The Black Arts - Jon McCoy.eng.lrc 81.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/How can Communities Move Forward After Incidents of Sexual Harassment or Assault.eng.srt 81.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat 2015.eng.srt 81.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/He Said, She Said - Poisoned RDP Offense and Defense.eng.srt 81.2 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Eren-Aitel/Presentation/bh-dc-08-aitel.pdf 81.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Mobile Exploit Intelligence Project.eng.lrc 81.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Data Seepage How to Give Attackers a Roadmap to Your Network - David Maynor & Robert Graham.eng.txt 81.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Strike and Counterstrike The Law on Automated Intrusions and Striking Back - Curtis Karnow.eng.lrc 81.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Smartfuzzing the Web Carpe Vestra Foramina - Nathan Hamiel, Justin Engler, Seth Law, Gregory Fleischer.eng.tsv 81.1 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stender - Attack Internatl SW - English.eng.vtt 81.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Understanding Botnets By Building One.eng.text 81.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Lockpicking Forensics - Datagram.eng.srt 81.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2019.eng.srt 81.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Counterattack - Turning the tables on exploitation attempts from tools like metasploit - scriptjunkie.eng.srt 81.1 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Civil Cyber Defense-Defend Non-Profits as They Combat Human Trafficking Subvert Authoritarian Regime.eng.srt 81.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Leveraging the Edge Abusing SSL VPNs - Mike Zusman.eng.srt 81.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cache and Maynor - Device Drivers.eng.srt 81.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Linux Kernel Hidden Inside Windows 10.eng.srt 81.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/My Cloud is APT's Cloud Investigating and Defending Office 365.eng.srt 81.0 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Larry Leibrock - Digital Information, User Tokens, Privacy and Forensics Investigations The Case of Windows XP Platform.eng.lrc 81.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Meet the Feds Feds vs. Ex-Feds - Panel.eng.srt 81.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.vtt 81.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.vtt 81.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Analyzing Security Research in the Media - Panel.eng.vtt 81.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kaminsky - BlackOPS 2006.eng.vtt 81.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jim Christy - The Defense Cyber Crime.eng.tsv 81.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grossman - Hacking Intranet Outside.eng.tsv 81.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Tim Mullen - Neutralizing Nimda Automated Strikeback.eng.vtt 81.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/iOS Kernel PAC, One Year Later.eng.srt 81.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Baseband Apocalypse - All Your Baseband Are Belong To Us - Ralf-Philipp Weinmann.eng.txt 80.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss and Panel - CISO QA.srt 80.9 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Saumil-Shah-David-Cole-Adware-Spyware-English.eng.txt 80.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Applied Black Op Networking on Windows XP - Dan Kaminsky.eng.vtt 80.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Covert Post-Exploitation Forensics with Metasploit - Wesley McGrew.eng.lrc 80.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 1-2 - Eric Schultze & Erik Birkholz.eng.txt 80.9 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 1-2.eng.txt 80.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Law of Mobile Hacking - Jennifer Granick.eng.tsv 80.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Cory Scott - Systems Management in an Untrusted Network.eng.txt 80.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Revisiting XSS Sanitization.eng.srt 80.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Dynamic Taint Propagation Finding Vulnerabilities Without Attacking - Brian Chess & Jacob West.eng.lrc 80.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Richard Thieme - Saying Whatever he Wants.eng.lrc 80.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Client-side Security - Petko D. Petkov.eng.tsv 80.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Inducing Momentary Faults Within Secure StandardsMicrocontrollers - Christopher Tarnovsky.eng.tsv 80.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Taking the Hype Out of Hypervisor - Tal Garfinkel.eng.vtt 80.8 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Keynote - Information Technology Systems in a Post-Silcon World.eng.vtt 80.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Towards a Policy-Agnostic Control-Flow Integrity Implementation.eng.srt 80.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Caezar-Scoring-CTF-Games-English.eng.lrc 80.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Disclosure Public.eng.vtt 80.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More Signatures Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling - Ivan Ristic, Ofar Shezaf.eng.srt 80.8 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Inside the Apple T2.eng.srt 80.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Data Mining a Mountain of Zero Day Vulnerabilities.eng.lrc 80.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Adversary Characterization and Scoring System.eng.vtt 80.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Security Research on Mercedes-Benz From Hardware to Car Control.eng.srt 80.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jaya Baloo - Lawful Interception of IP the European Context.eng.tsv 80.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Forgotten World - Corporate Business Application Systems - Alexander Polyakov.eng.lrc 80.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/CuteCats.exe and the Arab Spring.eng.txt 80.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Keynote Speaker Cofer Black.eng.srt 80.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Reverse Engineering the Tesla Battery Management System to increase Power Available.eng.srt 80.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Messaging Layer Security Towards a New Era of Secure Group Messaging.eng.srt 80.7 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.txt 80.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Bruce Schneier - A hacker looks at cryptography.eng.tsv 80.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mike Beekey - ARP Vulnerabilities Indefensible Local Network Attacks.eng.lrc 80.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Side Channel Analysis on Embedded Systems Impact and Countermeasures - Job de Haas.eng.vtt 80.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hadoop Security - Seven Ways to Kill an Elephant.eng.text 80.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/IP Spoofing.eng.txt 80.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Dissecting Smart Meters.eng.tsv 80.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Gerhard-Escelbeck-Laws-of-vulnerbilities-English.eng.vtt 80.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Greg Hoglund - Advanced Buffer Overflow Techniques.eng.txt 80.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/IP Spoofing.eng.vtt 80.6 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Preparing for the Cross Site Request Forgery Defense - Chuck Willis.eng.tsv 80.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacking-Japanese-Translated.eng.lrc 80.6 KB
- Black Hat DC/Black Hat Federal 2006/An Advanced NTFS Data Hiding Technique - Irby Thompson, Matthew Monroe.eng.tsv 80.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Bruce Potter - 802.11X.eng.srt 80.6 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Breaking Network Segregation Using Esoteric Command & Control Channels.eng.srt 80.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal - Fran Brown, Rob Ragan.eng.vtt 80.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BIOS Security.eng.lrc 80.6 KB
- Black Hat DC/Black Hat Federal 2006/How to Automatically Sandbox IIS With Zero False Positive and Negative - Tzi-cker Chiueh (partial).eng.srt 80.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Post Exploitation Operations with Cloud Synchronization.eng.lrc 80.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Andrea Matwyshyn - Introduction to Corporate Information Security Law.eng.vtt 80.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Taking the Hype Out of Hypervisor - Tal Garfinkel.eng.txt 80.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Veiled - A Browser Based Darknet - Billy Hoffman, Matt Wood.eng.vtt 80.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tzi-cker Chiueh - Checking Array Bound.vtt 80.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017.eng.txt 80.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking Like in the Movies - Visualizing Page Tables for Local Exploitation.eng.txt 80.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Offensive Threat Modeling for Attackers - Turning Threat Modeling on its Hea.eng.lrc 80.5 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/DropSmack - How Cloud Synchronization Services Render Your Corporate Firewall.eng.tsv 80.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/HTML5 Threats.eng.tsv 80.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends.eng.txt 80.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Diana Kelly - Translasting US Privacy Regulations for Implementation.eng.vtt 80.4 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Okatani - Keynote - Japanese.eng.txt 80.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Hacking the Voter Lessons from a Decade of Russian Military Operations.eng.srt 80.4 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Hacking Government Cybersecurity.eng.srt 80.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.txt 80.4 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.txt 80.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dan-Kaminsky-Black-Ops-tcp-ip-English.eng.tsv 80.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Silvio Cesare - Opensource Kernel Auditing and Exploitation.eng.tsv 80.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Google Chrome OS - Matt Johansen, Kyle Osborn.eng.lrc 80.4 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Office in Wonderland.eng.srt 80.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Shaun Clowes - Generic Technical Defences.eng.srt 80.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The SCADA That Didn't Cry Wolf - Who s Really Attacking Your ICS Devices - 2 2.eng.srt 80.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Closing Session.eng.vtt 80.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A Black Hat Vulnerability Risk Assessment - Panel.eng.vtt 80.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Self-Driving and Connected Cars - Fooling Sensors and Tracking Drivers.eng.txt 80.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/DSCOMPROMISED - A Windows DSC Attack Framework.eng.tsv 80.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacks-English.eng.srt 80.3 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/IAM The One Who Knocks.eng.srt 80.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/RETrace - Applied Reverse Engineering on OS X - Tiller Beauchamp, David Weston.eng.vtt 80.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Four Types of Locks - Deviant Ollam.eng.tsv 80.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Cory Scott - Systems Management in an Untrusted Network.eng.lrc 80.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Above My Pay Grade - Cyber Response at the National Level.eng.srt 80.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Saumil-Shah-David-Cole-Adware-Spyware-English.eng.lrc 80.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00012.jpg 80.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Constant Insecurity Things You Didn’t Know About (PECOFF) Portable Executable File Format - Mario Vuksan, Tomislav Pericin.eng.lrc 80.2 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/With Friends Like eBPF, Who Needs Enemies.eng.srt 80.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacking Oracle Web Applications with Metasploit - Chris Gates aka carnal0wnage.eng.txt 80.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jennifer Granick - Legal Liability and Security Incident Investigation.eng.srt 80.2 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/The Devil is in the GAN Defending Deep Generative Models Against Adversarial Attacks.eng.srt 80.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.txt 80.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Sutterfield - Enterprise security for converging technologies.eng.tsv 80.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jericho and Munge - Hard Core Web Defacement Statistics Trends and Analysis.eng.srt 80.1 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Data Seepage How to Give Attackers a Roadmap to Your Network - David Maynor & Robert Graham.eng.lrc 80.1 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Tom Forbes on XCAT Xpath Injection.eng.json 80.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.text 80.1 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/The Black Hat Time Machine What Happens Next Year - Panel.eng.text 80.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing.eng.srt 80.1 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Security Advocacy Shouldn't Be for Security Professionals How the Industry Misses the Mark.eng.srt 80.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Our Favorite XSS Filters and How to Attack Them - Eduardo Vela Nava, David Lindsay.eng.srt 80.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/The Cyber Safety Review Board Studying Incidents to Drive Systemic Change.eng.srt 80.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Agile Security or How to defend applications with five-dat release cycles - Bryan Sullivan.eng.vtt 80.1 KB
- Black Hat DC/Black Hat Federal 2006/Analysis of Web Application Worms and Viruses - Billy Hoffman.eng.text 80.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/CuteCats.exe and the Arab Spring.eng.lrc 80.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoglund - Hacking WOW Adv rootkit.eng.txt 80.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Morin/Whitepaper/bh-usa-07-morin-WP.pdf 80.0 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/The Black Hat Asia NOC Report.eng.srt 80.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Software Radio and the Future of Wireless Security - Michael Ossmann.eng.txt 80.0 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/dbencrypt.exe 80.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Perry/Extras/torbutton-1.1.3-alpha.xpi 80.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Chip & PIN is Definitely Broken - Adam Laurie, Zac Franken, Andrea Barisani, Daniele Bianco.eng.vtt 80.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/APTs Way - Evading Your EBNIDS.eng.txt 80.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Living off Microsoft Copilot (1).eng.srt 80.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Roger Dingledine - Putting the P back in VPN.eng.txt 80.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/IP Spoofing.eng.lrc 80.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Living off Microsoft Copilot.eng.srt 80.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Greg Hoglund - Advanced Buffer Overflow Techniques.eng.lrc 80.0 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 1-2.eng.lrc 79.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 1-2 - Eric Schultze & Erik Birkholz.eng.lrc 79.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.eng.tsv 79.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Antivirus Security Softwear Tests.eng.srt 79.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.srt 79.9 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Ian Goldberg - Cell Phone Security A History and The State of the Art.eng.tsv 79.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Babar-ians at the Gate - Data Protection at Massive Scale.eng.vtt 79.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Sarah Gordon - Viruses in the Information Age.eng.vtt 79.9 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Demigod The Art of Emulating Kernel Rootkits.eng.srt 79.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/REST for the Wicked - Bryan Sullivan.eng.tsv 79.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Taking the Hype Out of Hypervisor - Tal Garfinkel.eng.lrc 79.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/FLEX, AMF 3 and BlazeDS An Assessment - Jacob Carlson, Kevin Stadmeyer.eng.vtt 79.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Threats to the 2008 Presidential Election (and more) - Oliver Friedrichs.eng.tsv 79.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Gerhard-Escelbeck-Laws-of-vulnerbilities-English.eng.tsv 79.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.eng.srt 79.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Brandon Wiley - The Superworm Manifesto.eng.tsv 79.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacks-English.eng.txt 79.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Computer Crime Year in Review - Jennifer Granick.eng.vtt 79.8 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.lrc 79.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Baseband Apocalypse - All Your Baseband Are Belong To Us - Ralf-Philipp Weinmann.eng.lrc 79.8 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Something Rotten in the State of Data Centers.eng.srt 79.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Managed Code Rootkits - Erez Metula.eng.srt 79.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.eng.vtt 79.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/(un)Smashing the Stack Overflows, Countermeasures, and the Real World - Shawn Moyer.eng.srt 79.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Faces Of Facebook Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.srt 79.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Measure Security Effectively.eng.srt 79.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Hacking XPATH 2.0.eng.srt 79.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/BIDOU - IPS Shortcomings.eng.tsv 79.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stuxnet Redux - Malware Attribution and Lessons Learned - Taking the guesswork out of cyber attribution - Tom Parker.eng.tsv 79.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/New Vulnerabilities in 5G Networks.eng.srt 79.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ejovi Nuwere - SIP Format Fuzz in Voip.txt 79.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protocols and Encryption of the Storm Botnet - Joe Stewart.eng.txt 79.7 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Self-Hosted GitHub CI CD Runners Continuous Integration, Continuous Destruction.eng.srt 79.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Embleton_Sparks_SMM_Rookits/BH_US_08_Embleton_Sparks_SMM_Rootkits_WhitePaper.pdf 79.7 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/PEIMA - Harnessing Power Laws to Detect Malicious Activities.eng.srt 79.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Auditing Binaries for Security Vulnerabilities - Halvar Flake.eng.text 79.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Caezar-Scoring-CTF-Games-English.eng.vtt 79.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Whose Internet Is It, Anyway - Andrew Fried, Richard Cox, Ben Butler.eng.tsv 79.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/Picture 1-2.png 79.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sticking to the Facts Scientific Study of Static Analysis Tools - Chuck Willis, Kris Britton.eng.vtt 79.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00033.jpg 79.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sparks and Others - Sidewinder.eng.tsv 79.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Breaking Through Another Side Bypassing Firmware Security Boundaries from Embedded Controller.eng.srt 79.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.lrc 79.6 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.lrc 79.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.eng.srt 79.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Tim Mullen - Neutralizing Nimda Automated Strikeback.eng.txt 79.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking Like in the Movies - Visualizing Page Tables for Local Exploitation.eng.lrc 79.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Russia - Inside an unprecended prosecution of organized cybercrime - Joseph Menn.eng.tsv 79.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking for Fun & Profit.eng.tsv 79.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Return-Oriented Programming Exploits Without Code Inspection - Hovav Shacham.eng.vtt 79.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Circumventing Automated JavaScriptAnalysis Tools - Billy Hoffman.eng.text 79.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Living in the RIA World Blurring the Line Between Web and Desktop Security - Alex Stamos, David Thiel, Justine Osborne.eng.tsv 79.6 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/China's Military Cyber Operations Has the Strategic Support Force Come of Age.eng.srt 79.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Automation Techniques in C Reverse Engineering.eng.srt 79.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Modern Kill Chains Real World SaaS Attacks and Mitigation Strategies.eng.srt 79.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends.eng.lrc 79.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Come Join the CAFSA - Continuous Automated Firmware Security Analysis.eng.srt 79.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.jp.eng.txt 79.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Scala Security - Examining the Play and LiftWeb Frameworks.eng.txt 79.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Deconstructing a Secure Processor - Christopher Tarnovsky.eng.tsv 79.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Roger Dingledine - Putting the P back in VPN.eng.vtt 79.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Internet is Broken Beyond Document.Cookie - Extreme Client-side Exploitation - Nathan McFeters, Rob Carter, John Heasman.eng.tsv 79.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Macs in the Age of the APT - Alex Stamos, BJ Orvis, Paul Youn.eng.vtt 79.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jennifer Granick - The Law of 'Sploits.eng.srt 79.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/De-Anonymizing Live CDs through Physical Memory Analysis - Andrew Case.eng.txt 79.4 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Perception Deception Physical Adversarial Attack Challenges.eng.srt 79.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/De-Anonymizing Live CDs through Physical Memory Analysis - Andrew Case.eng.vtt 79.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Robert Baird and Mike Lynn - Advanced 80211b Attack.eng.txt 79.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Greg Conti - Crafting a Tivo.eng.vtt 79.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Clobbering the Cloud - Haroon Meer, Nick Arvanitis, Marco Slaviero.eng.text 79.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Buying into the Bias - Why Vulnerability Statistics Suck.eng.srt 79.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Jesse Burns - Fuzzing Win32.eng.txt 79.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/FX - More Embedded Systems.eng.srt 79.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Client-Side Protection Against DOM-Based XSS Done Right (tm).eng.tsv 79.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BIOS Security.eng.srt 79.3 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/How to Survive the Hardware Assisted Control-Flow Integrity Enforcement.eng.srt 79.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.text 79.3 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Incident Response in a Microsoft World - John Mushin.eng.text 79.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Underground Ecosystem of Credit Card Frauds.eng.srt 79.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Software Radio and the Future of Wireless Security - Michael Ossmann.eng.lrc 79.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hey You, Get Off of My Cloud - Application-Level Denial of Service Attacks and Defenses - Bryan Sullivan.eng.srt 79.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Outer Limits - Hacking The Samsung Smart TV.eng.srt 79.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Researching Android Device Security with the Help of a Droid Army.eng.txt 79.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Practice) 2-2.eng.vtt 79.3 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen - based Devices.eng.srt 79.3 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Murakami - Hypervisor - IPS.jp.eng.txt 79.3 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/BLEEDINGBIT Your APs Belong to Us.eng.srt 79.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Web Application Canonicalization, Encoding and Transcoding Attacks - Arian Evans.eng.srt 79.3 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Okatani - Keynote - Japanese.eng.lrc 79.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Saumil Shah - Metasploit Plugins.eng.srt 79.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Introduction to Tamper Evident Devices - datagram.eng.vtt 79.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Client-Side Protection Against DOM-Based XSS Done Right (tm).eng.srt 79.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Roger Dingledine - Putting the P back in VPN.eng.lrc 79.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloud Computing Models and Vulnerabilities - Raining on the Trendy New Parade - Alex Stamos, Andrew Becherer & Nathan Wilcox.eng.vtt 79.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Power Analysis Attacks for Cheapskates.eng.vtt 79.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Larry Leibrock - Digital Information,User Tokens,Privacy and Forensics Investigation.eng.tsv 79.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Hidden Risks Of Biometric Identifiers And How To Avoid Them-tagged.eng.srt 79.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Andrea Matwyshyn - Introduction to Corporate Information Security Law.eng.tsv 79.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hackers, Journalists and the Ethical Swamp.eng.vtt 79.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017.eng.lrc 79.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Threats to the 2008 Presidential Election (and more) - Oliver Friedrichs.eng.vtt 79.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.eng.srt 79.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Self-Driving and Connected Cars - Fooling Sensors and Tracking Drivers.eng.lrc 79.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Behind the scenes of iOS and Mac Security.eng.srt 79.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/CuteCats.exe and the Arab Spring.eng.vtt 79.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Errata Hits Puberty.eng.txt 79.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 1-2 - Chris Hadnagy.eng.vtt 79.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Four Horsemen of the Virtualization Security Apocalypse - Christofer Hoff.eng.vtt 79.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks.eng.tsv 79.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Zombie Ant Farming Practical Tips for Playing Hide and Seek with Linux EDRs.eng.srt 79.1 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.tsv 79.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.lrc 79.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Gordon Reichard Jr - Trust, Security, Partnership Strategies in Selecting a Managed Service Provider.eng.txt 79.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rutkowska - Subverting Vista Kernel.eng.tsv 79.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Recoverable Advanced Metering Infrastructure - Mike Davis.eng.srt 79.1 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Security Failures in Secure Devices - Christopher Tarnovsky.eng.txt 79.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Mitigation in Windows 8.eng.tsv 79.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Shaun Clowes - Fixing and Making Holes in Binaries.eng.tsv 79.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/FrontPage Server Extensions on Windows Server 2003 - Mark Burnett.eng.srt 79.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Bruce Schneier - A hacker looks at cryptography.eng.srt 79.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keynote - The Hidden Architecture of our Time - Why This Internet Worked, How We Could Lose It.eng.txt 79.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Underground Economy of the Pay Per Install PPI Business - Kevin Stevens.eng.srt 79.0 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Oven Repair (The Hardware Hacking Way).eng.srt 79.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protocols and Encryption of the Storm Botnet - Joe Stewart.eng.lrc 79.0 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/HTTP Advanced Assessment Techniques - Saumil Shah.eng.srt 79.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Aaron Higbee and Chris Davis - DC Phone Home.eng.txt 79.0 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Charl van der Walt and Christoff Breytenbach - The Role of Non Obvious Relationships in the Foot Printing Process.eng.vtt 79.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/haile-bh-us-02-hogwash.ppt 79.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.txt 79.0 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Design Issues and Software Vulnerabilities in Embedded Systems - FX.eng.tsv 79.0 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Saumil-Shah-David-Cole-Adware-Spyware-English.eng.vtt 79.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerabilities of Wireless Water Meter Networks - John McNabb.eng.srt 79.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Exploiting Smart-Phone USB Connectivity For Fun And Profit - Angelos Stavrou & Zhaohui Wang.eng.srt 79.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/What Lies Beneath the Surface Evaluating LLMs for Offensive Cyber Capabilities.eng.srt 79.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Dude, Where's My Laptop.eng.txt 79.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/The Honeynet Project - 2nd Generation Honeynet Technologies.eng.text 79.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacking Oracle Web Applications with Metasploit - Chris Gates aka carnal0wnage.eng.lrc 79.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Fischbach and Lacoste - Seris - IP Backbone Security.eng.srt 78.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Simple Nomad - Modern NetWare Hacking.eng.srt 78.9 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Physical Attacks Against Smartphones.eng.srt 78.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Russia - Inside an unprecended prosecution of organized cybercrime - Joseph Menn.eng.vtt 78.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoglund - Hacking WOW Adv rootkit.eng.lrc 78.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking Like in the Movies - Visualizing Page Tables for Local Exploitation.eng.srt 78.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/BadUSB - On Accessories that Turn Evil by Karsten Nohl - Jakob Lell.eng.json 78.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/VK1-Larkin-Fight org Cyber crime.eng.srt 78.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gutterman - Vulns Linux Random Num.eng.txt 78.9 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Virt-ICE next gen debugger for malware analysis - NGUYEN Anh Quynh.eng.srt 78.9 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Industrial Protocol Gateways Under Analysis.eng.srt 78.8 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/From Hackathon to Hacked Web3's Security Journey.eng.srt 78.8 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/How I Created My Clone Using AI - Next-Gen Social Engineering.eng.srt 78.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.txt 78.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacks-English.eng.lrc 78.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Bit-Squatting DNS Hijacking Without Exploitation - Artem Dinaburg.eng.tsv 78.8 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 2-2.eng.text 78.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/De-Anonymizing Live CDs through Physical Memory Analysis - Andrew Case.eng.lrc 78.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hackers, Journalists and the Ethical Swamp.eng.txt 78.8 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/An Unauthenticated Journey to Root Pwning Your Company's Enterprise Software Servers.eng.srt 78.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Silberman and Butler - RAIDEv1.0.eng.txt 78.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Rustock Botnet Takedown - Julia Wolf, Alex Lanstein.eng.srt 78.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Aerial Cyber Apocalypse If We Can Do It So Can They - Richard Perkins, Mike Tassey.eng.tsv 78.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Appliances - Ironic exploitation of security products.eng.srt 78.8 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Shaun Clowes - Generic Technical Defences.eng.txt 78.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/ian Goldberg - Off the Record Messaging.eng.tsv 78.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Jesse Burns - Fuzzing Win32.eng.lrc 78.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Theory) 1-2.eng.text 78.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/CastGuard Mitigating Type Confusion in C.eng.srt 78.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/SCADA Security - Jason Larsen.eng.tsv 78.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/O'Connor - Vunls not So Embedded Sys.eng.txt 78.7 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/We R in a Right Pickle With All These Insecure Serialization Formats.eng.srt 78.7 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Okatani - Keynote - Japanese.eng.vtt 78.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/VK1-Larkin-Fight org Cyber crime.eng.tsv 78.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Tim Mullen - Neutralizing Nimda Automated Strikeback.eng.lrc 78.6 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Patrick Richard - Open Network PKI Design Issues or Business as Usual.eng.vtt 78.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Andrew van der Stock - Alternatives to Honeypots.eng.srt 78.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/WiFi Security or Descending Into Depression and Drink - Mike Kershaw aka Dragorn.eng.tsv 78.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Noel Anderseon - Wifi in WIN Vista.eng.vtt 78.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jim Christy - The Defense Cyber Crime.eng.srt 78.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Kingpin and Brian Oblivian - Secure Hardware Design.eng.srt 78.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ejovi Nuwere - SIP Format Fuzz in Voip.lrc 78.6 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Needing the DoH The Ongoing Encryption and Centralization of DNS.eng.srt 78.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Stamos and lackey - Breakin Ajax web.eng.text 78.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Looking into the Eye of the Meter.eng.vtt 78.6 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Securing Open Source Software - End-to-end, At massive scale, Together.eng.srt 78.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/NFC Analysis.eng.vtt 78.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring.eng.srt 78.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Shaun Clowes - Fixing and Making Holes in Binaries.eng.vtt 78.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A Black Hat Vulnerability Risk Assessment - Panel.eng.tsv 78.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why Control System Cyber-Security Sucks.eng.tsv 78.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Ofir Arkin - Cracking VoIP Architecture.eng.vtt 78.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2.tar.gz 78.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CreepyDOL - Cheap, Distributed Stalking.eng.vtt 78.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Macs in the Age of the APT - Alex Stamos, BJ Orvis, Paul Youn.eng.tsv 78.5 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Biometrics & Privacy Time to Faceoff or is that FaceApp.eng.srt 78.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Predict, Prioritize, Patch How Microsoft Harnesses LLMs for Security Response.eng.srt 78.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Robert Baird and Mike Lynn - Advanced 80211b Attack.eng.lrc 78.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dow Herath Mehta Spencer and Flake - Professional Source Code Auditing.eng.vtt 78.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sherri Sparks, Jamie Butler - Shadow Walker.vtt 78.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/IMG_0120.JPG 78.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Black Hat USA 2019 Keynote Every Security Team is a Software Team Now by Dino Dai Zovi.eng.txt 78.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/PatientPushingPacemakerCart1958.jpg 78.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Cantact - An Open Tool for Automative Exploitation.eng.txt 78.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keynote - The Hidden Architecture of our Time - Why This Internet Worked, How We Could Lose It.eng.lrc 78.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Johnny Long Me to We - Johnny Long.eng.srt 78.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.eng.vtt 78.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Jesse Burns - Fuzzing Win32.eng.vtt 78.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/48 Dirty Little Secrets Cryptographers Don't Want You To Know.eng.srt 78.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Offensive Threat Modeling for Attackers - Turning Threat Modeling on its Hea.eng.vtt 78.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Researching Android Device Security with the Help of a Droid Army.eng.lrc 78.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking and Forensicating an Oracle Database Server - David Litchfield.eng.srt 78.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Detecting Access Token Manipulation.eng.srt 78.3 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.tsv 78.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/APTs Way - Evading Your EBNIDS.eng.lrc 78.3 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Hobbit - Microsoft LM athentication, CIFS, and All Kinds of Password Problems.eng.txt 78.3 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Improving Side-Channel Protections for Intel TDX.eng.srt 78.3 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/normal_report_scaled.png 78.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 1-2 - Panel.eng.vtt 78.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Rapid Enterprise Triaging - Aaron LeMasters, Michael Murphy.eng.txt 78.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Errata Hits Puberty.eng.lrc 78.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerhard Eschelbeck - Law Vulnerabilities.eng.tsv 78.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Gordon Reichard Jr - Trust, Security, Partnership Strategies in Selecting a Managed Service Provider.eng.lrc 78.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court.eng.txt 78.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.jp.eng.lrc 78.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare.eng.srt 78.2 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Investigating Malware Using Memory Forensics - A Practical Approach.eng.vtt 78.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Murakami - Hypervisor - IPS.jp.eng.lrc 78.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Ofir Arkin - Cracking VoIP Architecture.eng.txt 78.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Mobile Network Forensics.eng.text 78.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Weaponizing the Web - Nathan Hamiel, Shawn Moyer.eng.srt 78.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.lrc 78.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Scala Security - Examining the Play and LiftWeb Frameworks.eng.lrc 78.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/I Just Found 10 Million SSNs - Alessandro Acquisti.eng.txt 78.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Covert Post-Exploitation Forensics with Metasploit - Wesley McGrew.eng.srt 78.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protocols and Encryption of the Storm Botnet - Joe Stewart.eng.vtt 78.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Get Rich or Die Trying - Making Money on the Web, The Black Hat Way - Jeremiah Grossman, Arian Evans.eng.srt 78.2 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Locknote Conclusions and Key Takeaways from Day 1.eng.srt 78.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Language Properties of Phone Scammers - Cyberdefense At the Level of the Human.eng.srt 78.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hackers, Journalists and the Ethical Swamp.eng.lrc 78.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/FLEX, AMF 3 and BlazeDS An Assessment - Jacob Carlson, Kevin Stadmeyer.eng.txt 78.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Finding Our Path How We're Trying to Improve Active Directory Security.eng.srt 78.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/LTE & IMSI Catcher Myths.eng.vtt 78.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries.eng.srt 78.1 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Understanding the Windows SMB NTLM weak nonce vulnerablity - Hernan Ochoa, Agustin Azubel.eng.vtt 78.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.lrc 78.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam Boileau - Trust Transcience.eng.tsv 78.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Aaron Higbee and Chris Davis - DC Phone Home.eng.lrc 78.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A New Breed of Rootkit The System Management Mode (SMM) Rootkit - Shawn Embleton, Sherri Sparks.eng.txt 78.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Ruby for Pentesters - Michael Tracy, Chris Rohlf, Eric Monti.eng.srt 78.1 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/The Black Hat Europe Network Operations Center (NOC) Report.eng.srt 78.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Aerial Cyber Apocalypse If We Can Do It So Can They - Richard Perkins, Mike Tassey.eng.vtt 78.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Stefano Zanero - Detecting 0 Day Attacks with Learning IDS.eng.txt 78.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hardening Windows 8 apps for the Windows Store.eng.srt 78.0 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Bruce Schneier - Why Cryptograpy is Harder Than it Looks.eng.tsv 78.0 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Jennifer Granick - What's Different About Evidence in Computer Crime litigation.eng.vtt 78.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Wheeler, Niel Mehta - Owning Anti-virus.eng.txt 78.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Stopping Snake Oil with Smaller Healthcare Providers Addressing Security with Actionable Plans.eng.srt 78.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/droppedImage-6.pict 78.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.text 78.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Kernel Mode Rootkits Stealth and Subversion of Trust - Greg Hoglund.eng.text 78.0 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Elevating Kerberos to the Next Level.eng.srt 78.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Teensy Programming for Everyone.eng.tsv 78.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/360 Anomaly Based Unsupervised Intrusion Detection - Stefano Zanero.eng.txt 78.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Post Exploitation Bliss - Loading Meterpreter on a Factory iPhone - Vincenzo Iozzo, Charlie Miller.eng.tsv 77.9 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Isaac Dawson on The Web Browser Testing System (WBTS).eng.json 77.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Batz - Security Issues Affecting Internet Transit Points and Backbone Providers.eng.srt 77.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Physical Security in a Networked World - Video Surveillance, Video Analytics, and you - Joshua A Marpet.eng.vtt 77.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hiring Trends in InfoSec.eng.tsv 77.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Shaun Clowes - Generic Technical Defences.eng.lrc 77.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Security Failures in Secure Devices - Christopher Tarnovsky.eng.lrc 77.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fast & Furious Reverse Engineering with TitanEngine - Mario Vuksan, Tomislav Pericin.eng.tsv 77.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pushing the Camel Through the Eye of a Needle - Haroon Meer.eng.vtt 77.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jay Beale - Locking Down Mac OS X.eng.text 77.9 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Breaking Encrypted Databases Generic Attacks on Range Queries.eng.srt 77.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/XSS Street-Fight - The Only Rule Is There Are No Rules - Ryan Barnett.eng.tsv 77.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Ops 2008 - Dan Kaminsky.eng.tsv 77.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Developments in Cisco IOS Forensics - Felix FX Linder.eng.srt 77.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.vtt 77.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Scott Culp - Building a Security Response Process.eng.txt 77.8 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.vtt 77.8 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Engineering Cybersecurity for a Nation What Singapore is Learning from Cars and Sanitation.eng.srt 77.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss, Gillman Louie - Welcome Keynote.mp4.txt 77.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Implementing the Lessons Learned From a Major Cyber Attack.eng.srt 77.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Smartfuzzing the Web Carpe Vestra Foramina - Nathan Hamiel, Justin Engler, Seth Law, Gregory Fleischer.eng.vtt 77.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Dude, Where's My Laptop.eng.lrc 77.8 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Black Hat USA 2019 Keynote Every Security Team is a Software Team Now by Dino Dai Zovi.eng.lrc 77.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Diana Kelly and Ian Poynter - Single Sign On 101.eng.text 77.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Security Paradigm.eng.txt 77.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Extreme Privilege Escalation on Windows 8 UEFI Systems.eng.txt 77.8 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Heap Feng Shui in JavaScript - Alexander Sotirov.eng.srt 77.7 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/disguised_report_scaled.png 77.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Josh Daymont - Hardening Windows CE.eng.text 77.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Silberman and Butler - RAIDEv1.0.eng.lrc 77.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/OSS Security Maturity - Time to Put on Your Big Boy Pants.eng.srt 77.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Tactical Application Security Program - Getting Stuff Done.eng.srt 77.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Conducting a Successful False Flag Cyber Operation (Blame it on China).eng.vtt 77.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/(un)Smashing the Stack Overflows, Countermeasures, and the Real World - Shawn Moyer.eng.txt 77.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Enforcer - Timothy Mullen.eng.tsv 77.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Funderbolt - Adventures in Thunderbolt DMA Attacks.eng.srt 77.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Active Exploitation Detection - Marc Eisenbarth.eng.srt 77.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Keynote Speaker Cofer Black.eng.tsv 77.6 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/AIS Exposed. Understanding Vulnerabilities and Attacks 2.0 by Marco Balduzzi.eng.srt 77.6 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Isolation or Hallucination Hacking AI Infrastructure Providers for Fun and Weights.eng.srt 77.6 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/SCADA Security - Jason Larsen.eng.vtt 77.6 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Hobbit - Microsoft LM athentication, CIFS, and All Kinds of Password Problems.eng.lrc 77.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Ofir Arkin - Cracking VoIP Architecture.eng.lrc 77.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Rapid Enterprise Triaging - Aaron LeMasters, Michael Murphy.eng.lrc 77.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jennifer Grannick - Forensic Issues in Hacker Prosecutions.eng.txt 77.6 KB
- Black Hat DC/Black Hat Federal 2006/Client Side Penetration Testing - Max Caceres.eng.tsv 77.6 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/It's not FINished The Evolving Maturity in Ransomware Operations.eng.srt 77.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.eng.srt 77.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Software Radio and the Future of Wireless Security - Michael Ossmann.eng.vtt 77.5 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Serkan Ozkan on CVEdetails.eng.json 77.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/O'Connor - Vunls not So Embedded Sys.eng.lrc 77.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Securing Apps in the Open-By-Default Cloud.eng.srt 77.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Proposed Vulnerability Handling.eng.srt 77.5 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.txt 77.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/BIDOU - IPS Shortcomings.eng.vtt 77.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Cantact - An Open Tool for Automative Exploitation.eng.lrc 77.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dominique Brezinski - Security Posture Assessment (SPA) of Windows NT Networks.eng.text 77.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Derek Soeder, Ryan Permeh - eYe Bootroot.vtt 77.5 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.vtt 77.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking .Net Applications The Black Arts - Jon McCoy.eng.srt 77.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Preparing for the Cross Site Request Forgery Defense - Chuck Willis.eng.srt 77.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/FLEX, AMF 3 and BlazeDS An Assessment - Jacob Carlson, Kevin Stadmeyer.eng.lrc 77.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court.eng.lrc 77.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/360 Anomaly Based Unsupervised Intrusion Detection - Stefano Zanero.eng.srt 77.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Payload Anatomy & Future Mutations - Riley Hassell.eng.tsv 77.4 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA.eng.vtt 77.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/In Need of 'Pair' Review Vulnerable Code Contributions by GitHub Copilot.eng.srt 77.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Identifying the True IP Network Identity of I2P Service Hosts - Adrian Crenshaw aka Irongeek.eng.vtt 77.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Finding Needles in Haystacks (The Size of Countries).eng.srt 77.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/More Tricks for Defeating SSL - Moxie Marlinspike.eng.srt 77.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ofir Arkin - Infrastructure Discovery.eng.srt 77.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/RFID Hacking - Live Free or RFID Hard.eng.srt 77.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gutterman - Vulns Linux Random Num.eng.lrc 77.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Richard Thieme - Masters of the Unseen The Art of Information Warfare.eng.srt 77.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Apple Sand Box - Dionysus Blazakis.eng.txt 77.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Researching Secrets - James Bamford.eng.srt 77.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - Introduction to Embedded Security.eng.text 77.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Language of Trust - Mark Dowd, Ryan Smith, David Dewey.eng.srt 77.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More Signatures Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling - Ivan Ristic, Ofar Shezaf.eng.txt 77.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/OTRazor Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts.eng.srt 77.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Corporate Espionage for Dummies The Hidden Threat of Embedded Web Servers - Michael Sutton.eng.srt 77.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Satan is on My Friends List Attacking Social Networks - Shawn Moyer, Nathan Hamiel.eng.tsv 77.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C. Foster, Vincent T. Liu - Catch Me if You Can.vtt 77.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Noel Anderseon - Wifi in WIN Vista.eng.tsv 77.2 KB
- Black Hat DC/Black Hat Federal 2006/Beyond EIP - spoonm, skape.eng.text 77.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Marcus Ranum - Burglar Alarms and Booby Traps.eng.tsv 77.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/I Just Found 10 Million SSNs - Alessandro Acquisti.eng.lrc 77.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Wheeler, Niel Mehta - Owning Anti-virus.eng.lrc 77.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Multiple Bugs in Multi-Party Computation Breaking Cryptocurrency's Strongest Wallets.eng.srt 77.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ejovi Nuwere - SIP Format Fuzz in Voip.vtt 77.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A New Breed of Rootkit The System Management Mode (SMM) Rootkit - Shawn Embleton, Sherri Sparks.eng.lrc 77.1 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/360 Anomaly Based Unsupervised Intrusion Detection - Stefano Zanero.eng.lrc 77.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brad Bolin - Information Security Law Update.eng.vtt 77.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Gregory S Miles - Computer Forensics a Critical Process in Your Incident Response Plan.eng.txt 77.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ofir Arkin - Infrastructure Discovery.eng.txt 77.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Attacks From a New Front Door in 4G & 5G Mobile Networks.eng.srt 77.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Extreme Privilege Escalation on Windows 8 UEFI Systems.eng.lrc 77.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Extreme Privilege Escalation on Windows 8 UEFI Systems.eng.vtt 77.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ptacek and Goldsmith - Elec Sheep.eng.tsv 77.1 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Data Seepage How to Give Attackers a Roadmap to Your Network - David Maynor & Robert Graham.eng.srt 77.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Better Privacy Through Offense How To Build a Privacy Red Team.eng.srt 77.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Automating Linux Malware Analysis Using Limon Sandbox.eng.txt 77.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/A practical attack against GPRS EDGE UMTS HSPA mobile data communications - David Perez & Jose Pico.eng.txt 77.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/State of the Art Post Exploitation in Hardened PHP Environments - Stefan Esser.eng.txt 77.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Keynote - Devaluing Attack - Disincentivizing Threats Against The Next Billion Devices.eng.txt 77.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/50 Thousand Needles in 5 Million Haystacks Understanding Old Malware Tricks.eng.srt 77.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 1-2 - Eric Schultze & Erik Birkholz.eng.vtt 77.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chip Andrews - SQL Security Revisited.eng.text 77.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sticking to the Facts Scientific Study of Static Analysis Tools - Chuck Willis, Kris Britton.eng.tsv 77.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Teridian SoC Exploitation - Exploration of Harvard Architecture Smart Grid Systems.eng.vtt 77.0 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Breaking Managed Identity Barriers In Azure Services.eng.srt 77.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Secure Browser Plugins.eng.vtt 77.0 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones.eng.srt 77.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Open Sourcing Automotive Diagnostics.eng.vtt 77.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Office Drama on macOS.eng.srt 76.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Keynote - Information Technology Systems in a Post-Silcon World.eng.txt 76.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/O'Connor - Vunls not So Embedded Sys.eng.srt 76.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Andrew van der Stock - Alternatives to Honeypots.eng.tsv 76.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Gregory S Miles - Computer Forensics a Critical Process in Your Incident Response Plan.eng.vtt 76.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Stepping p3wns - Adventures in Full Spectrum Embedded Exploitation.eng.srt 76.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Potter - Java Card 101.eng.tsv 76.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Phishing for Funds - Understanding Business Email Compromise.eng.vtt 76.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Curtis E Karnow - Running the Matrix.eng.vtt 76.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Stefano Zanero - Detecting 0 Day Attacks with Learning IDS.eng.lrc 76.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Dissecting Smart Meters.eng.srt 76.9 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Blanco-WI-FI-Direct-To-Hell-Attacking-WI-FI-Direct-Protocol-Implementations-wp.pdf 76.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Windows Kernel Graphics Driver Attack Surface.eng.srt 76.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00022.jpg 76.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoffman - AJAX Insecurity.eng.text 76.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/(un)Smashing the Stack Overflows, Countermeasures, and the Real World - Shawn Moyer.eng.lrc 76.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-When-the-table-turn-Japanese.eng.srt 76.8 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 1-2.eng.srt 76.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Oracle Data Redaction is Broken by David Litchfield.eng.txt 76.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Scott Culp - Building a Security Response Process.eng.lrc 76.8 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Writing Your Own Ticket to the Cloud Like APT A Dive to AD FS Attacks, Detections, and Mitigations.eng.srt 76.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoglund - Hacking WOW Adv rootkit.eng.srt 76.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Bruce Potter - 802.11X.eng.tsv 76.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-Japanese.eng.srt 76.7 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Tracing Origins Navigating Content Authenticity in the Deepfake Era.eng.srt 76.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss, Gillman Louie - Welcome Keynote.mp4.lrc 76.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert W Clark - Legal Aspects.text 76.7 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Jaya Baloo - Lawful Interception of IP The European Context.eng.srt 76.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ray Kaplan - Meet The Enemy.eng.tsv 76.7 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.lrc 76.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Security Paradigm.eng.lrc 76.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Hobbit - Microsoft LM athentication, CIFS, and All Kinds of Password Problems.eng.vtt 76.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Natural Security - Jeff Moss, Rod Beckström.eng.srt 76.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cunning With CNG - Soliciting Secrets From Schannel.eng.srt 76.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluetooth v2.1 - A New Security Infrastructure and New Vulnerabilities - Andrew Lindell.eng.tsv 76.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Analyzing Security Research in the Media - Panel.eng.tsv 76.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Defeating Machine Learning What Your Security Vendor Is Not Telling You.eng.srt 76.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Xploiting Google Gadgets Gmalware and Beyond - Tom Stracener, Robert Hansen.eng.srt 76.6 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.text 76.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerardo Richarte - Modern Intrusion Practices.eng.tsv 76.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Abusing Software Defined Networks.eng.txt 76.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lights Off The Darkness of the Smart Meters.eng.txt 76.6 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani & Billy Rios.eng.tsv 76.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.eng.vtt 76.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reverse Engineering by Crayon - Danny Quist, Lorie Liebrock.eng.srt 76.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jennifer Grannick - Forensic Issues in Hacker Prosecutions.eng.lrc 76.5 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Disasters in the Making - How I Torture Open Government Data Systems for Fun, Profit, and Time Travel.eng.srt 76.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More Signatures Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling - Ivan Ristic, Ofar Shezaf.eng.lrc 76.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/48 Dirty Little Secrets Cryptographers Don't Want You To Know.eng.txt 76.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Self-Driving and Connected Cars - Fooling Sensors and Tracking Drivers.eng.srt 76.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Spy-jacking the Booters.eng.vtt 76.5 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Spectra Breaking Separation Between Wireless Chips.eng.srt 76.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Phishing for Funds - Understanding Business Email Compromise.eng.txt 76.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/AppSec A-Z Reverse Engineering, Source Code Auditing, Fuzzing, and Exploitation - Jared DeMott.eng.vtt 76.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The IETF & The Future of Security Protocols - All The Signal, None of the No.eng.srt 76.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Get Rich or Die Trying - Making Money on the Web, The Black Hat Way - Jeremiah Grossman, Arian Evans.eng.txt 76.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Natural Security - Jeff Moss, Rod Beckström.eng.txt 76.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dow Herath Mehta Spencer and Flake - Professional Source Code Auditing.eng.tsv 76.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/CANAPE - Bytes Your Bits.eng.srt 76.5 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Breaking VSM by Attacking SecureKernel.eng.srt 76.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Automating Linux Malware Analysis Using Limon Sandbox.eng.srt 76.4 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacking-Japanese-Translated.eng.vtt 76.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How Smartcard Payment Systems Fail.eng.txt 76.4 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Issues Surrounding International Computer Crime Laws - Jennifer Granick.eng.text 76.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam Boileau - Trust Transcience.eng.vtt 76.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Return-Oriented Programming Exploits Without Code Inspection - Hovav Shacham.eng.tsv 76.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Gregory S Miles - Computer Forensics a Critical Process in Your Incident Response Plan.eng.lrc 76.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeremy Rauch - How Responsive are Vendors to Security Problems When They Aren't Being Pressured.eng.tsv 76.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Insider's Guide to Cyber-Insurance and Security Guarantees.eng.srt 76.4 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Three New Attacks Against JSON Web Tokens.eng.srt 76.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/RFC1135.html 76.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Keynote - Devaluing Attack - Disincentivizing Threats Against The Next Billion Devices.eng.lrc 76.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Sherma - Web Application Session Strength.eng.vtt 76.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ofir Arkin - Infrastructure Discovery.eng.lrc 76.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Simple Nomad - Modern NetWare Hacking.eng.txt 76.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Building Better CSIRTs Using Behavioral Psychology.eng.srt 76.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Vulnerabilities of Cellular and Satellite - based Voice and Data Networks.eng.srt 76.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jan K Rutkowski - Advance Windows 2000 Rootkits Detection.eng.srt 76.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Mitigation Improvements.eng.srt 76.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.eng.tsv 76.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Web Cache Entanglement Novel Pathways to Poisoning.eng.srt 76.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Locked Down but Not Out Fighting the Hidden War in Your Bootloader.eng.srt 76.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Android - One Root to Own them All.eng.tsv 76.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Keynote - Information Technology Systems in a Post-Silcon World.eng.lrc 76.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking BHAD - Abusing Belkin Home Automation Devices.eng.srt 76.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Welcome & Introduction to Black Hat Europe 2014.eng.srt 76.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Weaponizing the Web - Nathan Hamiel, Shawn Moyer.eng.tsv 76.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jed Haile - Hogwash.eng.txt 76.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Suberverting the Xen Hypervisor - Rafal Wojtczuk.eng.srt 76.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The M2M Risk Assessment Guide, a Cyber Fast Track Project.eng.srt 76.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Rapid Enterprise Triaging - Aaron LeMasters, Michael Murphy.eng.vtt 76.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Chris-Eagle-IdaPro-English.eng.tsv 76.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/War Texting Weaponizing Machine 2 Machine - Don Bailey.eng.tsv 76.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani, Billy K Rios.eng.tsv 76.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing.eng.tsv 76.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices - 2-2.eng.text 76.2 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Defense in Depth Winning in Spit of Yourself - Erik Schlutz, David Leblanc.eng.srt 76.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Schneier - Keynote, Following the Money Security Proxies and Agenda.eng.txt 76.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Automating Linux Malware Analysis Using Limon Sandbox.eng.lrc 76.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fast & Furious Reverse Engineering with TitanEngine - Mario Vuksan, Tomislav Pericin.eng.vtt 76.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/State of the Art Post Exploitation in Hardened PHP Environments - Stefan Esser.eng.lrc 76.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/VC Panel Security Business Strategies During a Recession - Panel.eng.tsv 76.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/ret2dir - Deconstructing Kernel Isolation.eng.tsv 76.1 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Evolving Security Experts Among Teenagers.eng.srt 76.1 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Sweet QuaDreams or Nightmare Before Christmas Dissecting an iOS 0-Day.eng.srt 76.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeremy Rauch - The Security of Network Devices.eng.tsv 76.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Defending Networks With Incomplete Information - A Machine Learning Approach.eng.txt 76.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Deputies Are Still Confused.eng.txt 76.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/A practical attack against GPRS EDGE UMTS HSPA mobile data communications - David Perez & Jose Pico.eng.lrc 76.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 2 - Val Smith, Colin Ames & David Kerb.eng.tsv 76.1 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Infusing AI in Cybersecurity The Times They Are AI-Changin'.eng.srt 76.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Wheeler, Niel Mehta - Owning Anti-virus.eng.vtt 76.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Process Injection Techniques - Gotta Catch Them All.eng.srt 76.0 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Catch Me If You Can Deterministic Discovery of Race Conditions with Fuzzing.eng.srt 76.0 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/RollBack - A New Time - Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems.eng.srt 76.0 KB
- Black Hat DC/Black Hat Federal 2006/Extracting Unexpected Functionality from Existing Networks - Dan Kaminsky.eng.tsv 76.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Stender/Whitepaper/bh-usa-07-stender-WP.pdf 76.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Apple Sand Box - Dionysus Blazakis.eng.lrc 76.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Maynor - NX - How Well Does it Say NO.txt 76.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Babar-ians at the Gate - Data Protection at Massive Scale.eng.tsv 76.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Andrew Van der Stock - OWASP Guide.eng.srt 76.0 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Nation-State Moneymule's Hunting Season - APT Attacks Targeting Financial Institutions.eng.srt 75.9 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 1-2.eng.txt 75.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/DC Panel Update from Washington - Panel.eng.text 75.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hacker Court.eng.tsv 75.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Legal Aspects of Cybersecurity - (AKA) CYBERLAW A Year in Review, Cases, Issues, Your Questions My (Alleged) Answers - Robert Clark.eng.tsv 75.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Keynote - Devaluing Attack - Disincentivizing Threats Against The Next Billion Devices.eng.vtt 75.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Kingpin and Brian Oblivian - Secure Hardware Design.eng.txt 75.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Next Generation Collaborative Reversing with Ida Pro and CollabREate - Chris Eagle, Tim Vidas.eng.tsv 75.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Phishing for Funds - Understanding Business Email Compromise.eng.lrc 75.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joseph Ansanelli - Future of Personal info.tsv 75.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/From Coordinated Disclosure to Cooperative Vulnerability When Dealing w - Critical Software Stacks.eng.txt 75.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Gula - Bypassing Intrusion Detection Systems.eng.tsv 75.8 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/You will be billed 90000 for this call - Mikko Hypponen.eng.srt 75.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neurosurgery With Meterpreter - Colin Ames, David Kerb.eng.srt 75.8 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Underground Ecosystem of Credit Card Frauds.eng.txt 75.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The M2M Risk Assessment Guide, a Cyber Fast Track Project.eng.txt 75.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Teridian SoC Exploitation - Exploration of Harvard Architecture Smart Grid Systems.eng.txt 75.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Project 0xA11C Deoxidizing the Rust Malware Ecosystem.eng.srt 75.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/File Disinfection Framework.eng.srt 75.8 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Blackhat Asia 21Locknote Conclusions and Key Takeaways from Day 1 locknote.eng.srt 75.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Server-Side JavaScript Injection Attacking and Defending NoSQL and Node.js - Bryan Sullivan.eng.tsv 75.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Robert Baird and Mike Lynn - Advanced 80211b Attack.eng.vtt 75.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Spoonm - Metasploit Hacking Like in the Movies.eng.tsv 75.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Catching Malware En Masse - DNS and IP Style.eng.txt 75.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Maltego Tungsten As a Collaborative Attack Platform.eng.tsv 75.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Uncovering Supply Chain Attack with Code Genome Framework.eng.srt 75.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Keynote - What Got Us Here Wont Get Us There.eng.srt 75.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Using Guided Missiles in Drive-Bys - Automatic Browser Fingerprinting - Egypt.eng.txt 75.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Playback - A TLS 1.3 Story.eng.srt 75.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kenneth Geers - Hacking in a Foreign.eng.vtt 75.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Diana Kelly - Translasting US Privacy Regulations for Implementation.eng.tsv 75.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeff Thompson - Making Unix Secure for the Internet with Trusted Operating Systems.eng.text 75.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/FX - Vulnerability Finding in Win32A Comparison.eng.srt 75.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/SADE Injecting Agents in to VM Guest OS - Matt Conover.eng.txt 75.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/48 Dirty Little Secrets Cryptographers Don't Want You To Know.eng.lrc 75.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why Control System Cyber-Security Sucks.eng.vtt 75.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Medical Devices for Fun and Insulin Breaking the Human SCADA System - Jay Radckiffe.eng.vtt 75.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Beckstrom’s Law - Rod Beckstrom.eng.tsv 75.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reviving Smart Card Analysis - Karsten Nohl, Chris Tarnovsky.eng.srt 75.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Bit-Squatting DNS Hijacking Without Exploitation - Artem Dinaburg.eng.vtt 75.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Security Wolf of Wall Street - Fighting Crime With High Frequency Classification and.eng.srt 75.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C. Foster, Vincent T. Liu - Catch Me if You Can.tsv 75.6 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/All Your Secrets Belong to Us Leveraging Firmware Bugs to Break TEEs.eng.srt 75.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Death of 1000 Cuts.eng.txt 75.6 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dr. Mudge - Secure Coding Practices and Source Code Analysis.eng.tsv 75.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Sugiura - Winny Poo - Japanese.eng.vtt 75.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/HTML5 Threats.eng.srt 75.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection.eng.srt 75.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced Mac OS X Rootkits - Dino Dai Zovi.eng.srt 75.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Stamos, Stender - Attacking web Service.text 75.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Get Rich or Die Trying - Making Money on the Web, The Black Hat Way - Jeremiah Grossman, Arian Evans.eng.lrc 75.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Tzi-cker Chiueh - Program Semantics Aware Intrusion Detection.eng.srt 75.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-van-der-Walt-When-the-Tables-Turn-English.eng.srt 75.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Simple Nomad - Modern NetWare Hacking.eng.lrc 75.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How Smartcard Payment Systems Fail.eng.lrc 75.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Agile Security or How to defend applications with five-dat release cycles - Bryan Sullivan.eng.tsv 75.5 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Understanding the Windows SMB NTLM weak nonce vulnerablity - Hernan Ochoa, Agustin Azubel.eng.tsv 75.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Researching Android Device Security with the Help of a Droid Army.eng.vtt 75.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Silberman and Butler - RAIDEv1.0.eng.srt 75.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 1-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.tsv 75.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Oracle Data Redaction is Broken by David Litchfield.eng.lrc 75.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Natural Security - Jeff Moss, Rod Beckström.eng.lrc 75.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/The Hack@DAC Story Learnings from Organizing the World's Largest Hardware Hacking Competition.eng.srt 75.5 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/CSIRowhammer Closing the Case of Half - Double and Beyond.eng.srt 75.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.eng.txt 75.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 1-2 - Michaek Howard, David Leblanc.eng.text 75.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Bouncer Land.eng.srt 75.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Bruce Potter - and - Brian Wotring.eng.text 75.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jed Haile - Hogwash.eng.lrc 75.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Four Horsemen of the Virtualization Security Apocalypse - Christofer Hoff.eng.tsv 75.4 KB
- Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Walters.pdf 75.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 1-2 - Chris Hadnagy.eng.tsv 75.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Invisibility Purge - Unmasking the Dormant Events of Invisible Web Controls.eng.txt 75.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Abusing Software Defined Networks.eng.lrc 75.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Responding to a Cyber Attack with Missiles.eng.srt 75.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/DSCOMPROMISED - A Windows DSC Attack Framework.eng.vtt 75.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Saumil Shah - Metasploit Plugins.eng.txt 75.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jennifer Granick - The Law of 'Sploits.eng.tsv 75.4 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Where 2 Worlds Collide Bringing Mimikatz et al to UNIX.eng.srt 75.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Marcus Ranum - Burglar Alarms and Booby Traps.eng.srt 75.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.eng.srt 75.4 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/SpAIware & More Advanced Prompt Injection Exploits in LLM Applications.eng.srt 75.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Decade of the RATs - Custom Chinese Linux Rootkits for Everyone.eng.srt 75.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/IIS 6.0's Security Architecture - It's a Whole New World - Michael Muckin.eng.txt 75.4 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Keynote Fighting Cybercrime in 2024.eng.srt 75.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Battle Of The SKM And IUM How Windows 10 Rewrites OS Architecture.eng.srt 75.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Spoonm - Metasploit Hacking Like in the Movies.eng.vtt 75.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lights Off The Darkness of the Smart Meters.eng.lrc 75.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pay No Attention to That Hacker Behind the Curtain - A Look Inside the Black Hat Network.eng.srt 75.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David LeBlanc - Real World Techniques in Network Security Management.eng.srt 75.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Disclosure Public.eng.tsv 75.3 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 1-2.eng.vtt 75.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Off Grid communications with Android - Meshing the mobile world.eng.srt 75.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Defending Networks With Incomplete Information - A Machine Learning Approach.eng.srt 75.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David Litchfield - Compromising web Servers and Defensive Techniques.eng.srt 75.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kostya Kortchinsky - Bruce Schneier.eng.tsv 75.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Kingpin and Brian Oblivian - Secure Hardware Design.eng.lrc 75.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking BHAD - Abusing Belkin Home Automation Devices.eng.txt 75.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.eng.txt 75.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Malware Detection Through Network Flow Analysis - Bruce Potter.eng.text 75.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Windows Hooks of Death Kernel Attacks Through User-Mode Callbacks - Tarjei Mandt.eng.srt 75.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Feaver - Kenneth Greers - Cyber Jihad and the Globalization of Warfare.eng.srt 75.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Smashing the Furure for Fun & Profit.eng.tsv 75.2 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/One-Way SQL Hacking - JD Glaser & Saumil Udayan Shah.eng.txt 75.2 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Sugiura - Winny Poo - Japanese.eng.txt 75.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Underground Ecosystem of Credit Card Frauds.eng.lrc 75.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex - Shreeraj Shah.eng.vtt 75.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Wireless Networks with 802.1x, EAP-TLS and PEAP - Steve Riley.eng.vtt 75.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Teridian SoC Exploitation - Exploration of Harvard Architecture Smart Grid Systems.eng.lrc 75.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Mitigation Improvements.eng.txt 75.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends.eng.vtt 75.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/AppSec A-Z Reverse Engineering, Source Code Auditing, Fuzzing, and Exploitation - Jared DeMott.eng.txt 75.2 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/injectso Modifying and Spying on Running Processes Under Linux - Shawn Clowes.eng.txt 75.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cache and Maynor - Device Drivers.eng.tsv 75.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Stagefright Scary Code In The Heart Of Android.eng.srt 75.1 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Confused Learning Supply Chain Attacks through Machine Learning Models.eng.srt 75.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Combating the Insider Threat at the FBI - Real-world Lessons Learned.eng.txt 75.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pushing the Camel Through the Eye of a Needle - Haroon Meer.eng.tsv 75.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Hidden Risks Of Biometric Identifiers And How To Avoid Them.eng.srt 75.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring.eng.txt 75.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Defending Networks With Incomplete Information - A Machine Learning Approach.eng.lrc 75.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roger Dingledine - Why is Anonymity So Hard.eng.text 75.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Proposed Vulnerability Handling.eng.tsv 75.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Graph-Based Binary Analysis - Halvar Flake.eng.srt 75.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mudge - Economics Physics Psycology.eng.vtt 75.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Maynor - Leave the Theory Behind and Embrace the Code.eng.text 75.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Something to Do with Network Security - Dan Kaminsky.eng.srt 75.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Greg Hoglund - Runtime Decompilation.eng.txt 75.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/SSL, Gone in 30 Seconds - A BREACH beyond CRIME.eng.vtt 75.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Emanate Like A Boss Generalized Covert Data Exfiltration With Funtenna.eng.srt 75.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The M2M Risk Assessment Guide, a Cyber Fast Track Project.eng.lrc 75.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rutkowska - Subverting Vista Kernel.eng.vtt 75.0 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 1-2.eng.lrc 75.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Hat USA 2008 - PWNY Awards.eng.tsv 75.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Staring into the Abyss The Dark Side of Security and Professional Intelligence - Richard Thieme.eng.text 75.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Catching Malware En Masse - DNS and IP Style.eng.lrc 75.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Deputies Are Still Confused.eng.lrc 75.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss and Panel - CISO QA.txt 75.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Wikipedia_Buffer_overflow.html 75.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Richard Thieme - Saying Whatever he Wants.eng.srt 75.0 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Forward Focus - The Impact of Artificial Intelligence.eng.srt 75.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/MetaPost Exploitation - Val Smith, Colin Ames.eng.vtt 75.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Using Guided Missiles in Drive-Bys - Automatic Browser Fingerprinting - Egypt.eng.lrc 74.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/NFC Analysis.eng.txt 74.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Ruby for Pentesters - Michael Tracy, Chris Rohlf, Eric Monti.eng.txt 74.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Keynote - Cyber Conflicts - Challenging the Future - Pat Arnold.eng.srt 74.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Recoverable Advanced Metering Infrastructure - Mike Davis.eng.tsv 74.9 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SCTPscan - Finding Entry Points to SS7 Networks & Telecommunication Backbones - Philippe Langlois.eng.tsv 74.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Security Paradigm.eng.srt 74.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Drop the SOAP Real World Web Service Testing for Web Hackers - Tom Eston, Joshua Abraham.eng.srt 74.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Goldman and Marotta - Securing Your Computing Environment to Conform to Privacy Regulations.eng.vtt 74.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Linux Kernel Hidden Inside Windows 10.eng.txt 74.9 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/From Doxing to Doorstep Exposing Privacy Intrusion Techniques used by Hackers for Extortion.eng.srt 74.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.eng.tsv 74.8 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/How the Internet Dodged a Bullet The KeyTrap Denial-of-Service Attacks against DNSSEC.eng.srt 74.8 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Writing Bad @$$ Malware For OS X.eng.srt 74.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Mortman, Others - National ID Debate.txt 74.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Bouncer Land.eng.txt 74.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Visual Forensic Analysis and Reverse Engineering of Binary Data - Greg Conti, Erik Dean.eng.srt 74.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Schneier - Keynote, Following the Money Security Proxies and Agenda.eng.lrc 74.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/That Gambling Site It's Fueled by Chinese Organized Crime.eng.srt 74.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Shipley and Tom Jackiewicz - Security Issues with Implementing and Deploying the LDAP Directory System.eng.txt 74.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).eng.srt 74.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Even The Lastpass Will Be Stolen, Deal With It.eng.srt 74.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.eng.lrc 74.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jed Haile - Hogwash.eng.vtt 74.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Vixie - Preventing Child Neglect.eng.srt 74.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/IIS 6.0's Security Architecture - It's a Whole New World - Michael Muckin.eng.lrc 74.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Trillions of Lines of Code and Counting Securing Applications At Scale - Jeremiah Grossman, Brad Arkin, Alex Hutton, Adrain Lane, John Johnson.eng.srt 74.7 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/15 Ways to Break Your Copilot.eng.srt 74.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Nobody is Listening to Your Phone Calls. - Really A Debate and Discussion on the NSA s Activities.eng.txt 74.7 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Satoru-Koyama-Our-Security-Depends-on-Your-Security-Japanese.eng.srt 74.7 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Devising and Detecting Phishing Large Language Models vs. Smaller Human Models.eng.srt 74.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Using Guided Missiles in Drive-Bys - Automatic Browser Fingerprinting - Egypt.eng.vtt 74.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Counterattack - Turning the tables on exploitation attempts from tools like metasploit - scriptjunkie.eng.vtt 74.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/From Coordinated Disclosure to Cooperative Vulnerability When Dealing w - Critical Software Stacks.eng.lrc 74.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/New Classes of Security and Privacy Vulnerabilities for Implantable Wireless Medical Devices - Tadayoshi Kohno, Kevin Fu.eng.text 74.6 KB
- Black Hat DC/Black Hat DC 2007/Video/Black Hat DC 2007 captions/RFID for Beginners - Chris Paget and the ACLU.eng.tsv 74.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lights Off The Darkness of the Smart Meters.eng.srt 74.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Exploitation Using A Malicious Service Set Identifier (SSID).eng.srt 74.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Mitigation Improvements.eng.lrc 74.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More Signatures Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling - Ivan Ristic, Ofar Shezaf.eng.vtt 74.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Tzi-cker Chiueh - Program Semantics Aware Intrusion Detection.eng.txt 74.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Smart Parking Meter Implementations, Globalism, and You - Joe Grand, Jacob Appelbaum, Chris Tarnovsky.eng.text 74.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Power Analysis Attacks for Cheapskates.eng.txt 74.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/AppSec A-Z Reverse Engineering, Source Code Auditing, Fuzzing, and Exploitation - Jared DeMott.eng.lrc 74.5 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Intel AMT Stealth Breakthrough.eng.srt 74.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Group Talk.eng.txt 74.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Advanced CAN Injection Techniques for Vehicle Networks.eng.txt 74.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rick Smith - The Biometrics Dilemma.eng.srt 74.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Combating the Insider Threat at the FBI - Real-world Lessons Learned.eng.lrc 74.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Reinforcement Learning for Autonomous Resilient Cyber Defense.eng.srt 74.5 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Dude, WTF in My CAN by Alberto Garcia Illera & Javier Vazquez Vidal.eng.srt 74.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing.eng.vtt 74.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Xploiting Google Gadgets Gmalware and Beyond - Tom Stracener, Robert Hansen.eng.tsv 74.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/SADE Injecting Agents in to VM Guest OS - Matt Conover.eng.lrc 74.5 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Sugiura - Winny Poo - Japanese.eng.lrc 74.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Hacking the Supply Chain - The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices.eng.srt 74.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Saumil Shah - Metasploit Plugins.eng.lrc 74.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/ret2dir - Deconstructing Kernel Isolation.eng.srt 74.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Death of 1000 Cuts.eng.lrc 74.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex - Shreeraj Shah.eng.txt 74.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.eng.txt 74.4 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Rutkowska - Subverting Vista - English.eng.srt 74.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.eng.lrc 74.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unveiling the Open Source Visualization Engine for Busy Hackers.eng.srt 74.4 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-van-der-Walt-When-the-Tables-Turn-English.eng.txt 74.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Predicting Susceptibility to Socialbots on Twitter.eng.srt 74.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Sarah Gordon - Viruses in the Information Age.eng.tsv 74.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Linux Kernel Hidden Inside Windows 10.eng.vtt 74.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Maynor - NX - How Well Does it Say NO.lrc 74.3 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Reverse Engineering the M1.eng.srt 74.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/I Just Found 10 Million SSNs - Alessandro Acquisti.eng.srt 74.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Remote Timing Attacks on TPMs, AKA TPM-Fail.eng.srt 74.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Looking into the Eye of the Meter.eng.txt 74.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/A practical attack against GPRS EDGE UMTS HSPA mobile data communications - David Perez & Jose Pico.eng.srt 74.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking BHAD - Abusing Belkin Home Automation Devices.eng.lrc 74.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Nobody is Listening to Your Phone Calls. - Really A Debate and Discussion on the NSA s Activities.eng.srt 74.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Google Chrome OS - Matt Johansen, Kyle Osborn.eng.vtt 74.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring.eng.lrc 74.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Lifecycle of a Phone Fraudster - Exposing Fraud Activity.eng.srt 74.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/NFC Analysis.eng.lrc 74.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Gordon Reichard Jr - Trust, Security, Partnership Strategies in Selecting a Managed Service Provider.eng.vtt 74.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Linux Kernel Hidden Inside Windows 10.eng.lrc 74.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Kevin Madi - Evolution of Incident Response.av.eng.text 74.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Ruby for Pentesters - Michael Tracy, Chris Rohlf, Eric Monti.eng.lrc 74.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Open Sourcing Automotive Diagnostics.eng.txt 74.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss and Panel - CISO QA.lrc 74.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Mind Games Using Data to Solve for the Human Element.eng.srt 74.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mudge - Economics Physics Psycology.eng.txt 74.2 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/The Fundamentals of Cyber-Insurance.eng.srt 74.2 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/injectso Modifying and Spying on Running Processes Under Linux - Shawn Clowes.eng.lrc 74.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Conducting a Successful False Flag Cyber Operation (Blame it on China).eng.txt 74.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Stop that Release, There's a Vulnerability.eng.srt 74.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Aaron Higbee and Chris Davis - DC Phone Home.eng.vtt 74.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Fooling Windows through Superfetch.eng.srt 74.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Davis, Ozier, Nebel, and Migues - Panel Discussion.eng.srt 74.1 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/One-Way SQL Hacking - JD Glaser & Saumil Udayan Shah.eng.lrc 74.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/FrontPage Server Extensions on Windows Server 2003 - Mark Burnett.eng.txt 74.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.eng.srt 74.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mandia - State of Incident Response.eng.text 74.1 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Practical LLM Security Takeaways From a Year in the Trenches.eng.srt 74.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Heap Feng Shui in JavaScript - Alexander Sotirov.eng.txt 74.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Hat USA 2008 - PWNY Awards.eng.vtt 74.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ira Winkler - The Road to Riches.eng.text 74.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/War Texting Weaponizing Machine 2 Machine - Don Bailey.eng.vtt 74.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Making Windows Exploits More Reliable - Kostya Kortchinsky.eng.txt 74.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Paul Wouters - IPSEC Opportunistic Encryption using DNSSEC.eng.txt 74.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Lockpicking Forensics - Datagram.eng.vtt 74.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/How I Learned to Stop Worrying and Love the SBOM.eng.srt 74.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Browsers Gone Wild.eng.vtt 74.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Greg Hoglund - Runtime Decompilation.eng.lrc 74.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Leveraging the Edge Abusing SSL VPNs - Mike Zusman.eng.vtt 74.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Demystifying Fuzzers - Michael Eddington.eng.tsv 74.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Steven Christey - CVE Behind the Scenes The Complexity of Being Simple.eng.tsv 74.0 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Holz - Catching Malware - Japanese.eng.vtt 74.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA.eng.txt 74.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Legal Aspects of Cyberspace Operations.eng.tsv 74.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Mortman, Others - National ID Debate.lrc 74.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Suberverting the Xen Hypervisor - Rafal Wojtczuk.eng.tsv 73.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rich Murphy - Locking Down Your FreeBSD Install.eng.srt 73.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CreepyDOL - Cheap, Distributed Stalking.eng.tsv 73.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Bouncer Land.eng.lrc 73.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Web Application Canonicalization, Encoding and Transcoding Attacks - Arian Evans.eng.txt 73.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Applied Black Op Networking on Windows XP - Dan Kaminsky.eng.txt 73.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Nobody is Listening to Your Phone Calls. - Really A Debate and Discussion on the NSA s Activities.eng.lrc 73.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Multiplexed Wired Attack Surfaces.eng.srt 73.9 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Oops.. I Glitched It Again How to Multi - Glitch the Glitching - Protections on ARM TrustZone - M.eng.srt 73.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Service Level Management - Best Practices.pdf 73.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Service Level Management - Best Practices.pdf 73.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Power Analysis Attacks for Cheapskates.eng.lrc 73.9 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/These aren't the permissions you're looking for - Anthony Lineberry, Tim Wyatt, David Luke Richardson.eng.srt 73.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/FX - Design and Software Vulnerabilities In Embedded Systems.eng.srt 73.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jennifer Granick - The Law of 'Sploits.eng.vtt 73.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Advanced CAN Injection Techniques for Vehicle Networks.eng.lrc 73.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploiting Rich Content - Riley Hassell.eng.srt 73.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex - Shreeraj Shah.eng.lrc 73.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Invisibility Purge - Unmasking the Dormant Events of Invisible Web Controls.eng.lrc 73.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Apple iOS Security Evaluation Vulnerability Analysis and Data Encryptio - Dino Dai Zovi.eng.text 73.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Kret - Nobodys Anonymous - Tracking Spam and Covert Channels.eng.srt 73.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Catching Malware En Masse - DNS and IP Style.eng.vtt 73.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ian Poynter and Diana Kelly - The Truth About ASPs.eng.text 73.7 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling.eng.srt 73.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Mobile Exploit Intelligence Project.eng.tsv 73.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jennifer Granick - Legal Liability and Security Incident Investigation.eng.vtt 73.7 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare.eng.srt 73.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Tzi-cker Chiueh - Program Semantics Aware Intrusion Detection.eng.lrc 73.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Charged by an Elephant - An APT Fabricating Evidence to Throw You In Jail.eng.srt 73.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-van-der-Walt-When-the-Tables-Turn-English.eng.lrc 73.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.eng.tsv 73.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Looking into the Eye of the Meter.eng.lrc 73.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Going Auth The Rails On A Crazy Train.eng.srt 73.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jason Garms - Defending Windows 2000 on the Internet.eng.srt 73.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Cantact - An Open Tool for Automative Exploitation.eng.srt 73.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Schulman - Phishing with Asterisk.eng.srt 73.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.eng.lrc 73.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Batz - Security Issues Affecting Internet Transit Points and Backbone Providers.eng.tsv 73.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kaminsky - BlackOPS 2006.eng.tsv 73.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Shipley and Tom Jackiewicz - Security Issues with Implementing and Deploying the LDAP Directory System.eng.lrc 73.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss, Gillman Louie - Welcome Keynote.mp4.srt 73.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Cyber Insurance 101 for CISO's.eng.srt 73.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/GRR - Find All the Badness, Collect All the Things.eng.txt 73.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Visual Forensic Analysis and Reverse Engineering of Binary Data - Greg Conti, Erik Dean.eng.txt 73.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Fischbach and Lacoste - Seris - IP Backbone Security.eng.vtt 73.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Secure Browser Plugins.eng.tsv 73.6 KB
- Black Hat DC/Black Hat Federal 2006/How to Automatically Sandbox IIS With Zero False Positive and Negative - Tzi-cker Chiueh (partial).eng.txt 73.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Group Talk.eng.lrc 73.6 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Strike and Counterstrike The Law on Automated Intrusions and Striking Back - Curtis Karnow.eng.tsv 73.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity.html 73.6 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Bruce K. Marshall - Statistical Analysis of Reusable Password Systems and Their Alternatives.eng.text 73.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/AMF Testing.eng.txt 73.6 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Improving Mental Models of End-to-End Encrypted Communication.eng.srt 73.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning the Routing Table - New OSPF Attacks - Gabi Nakibly.eng.tsv 73.6 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Jaya Baloo - Lawful Interception of IP The European Context.eng.tsv 73.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 2 - Val Smith, Colin Ames & David Kerb.eng.vtt 73.6 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Comprehensive Virtual Appliance Detection by Kang Li.eng.srt 73.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Internet Special Ops - Andrew Fried, Paul Vixie, Christopher Lee.eng.tsv 73.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Open Sourcing Automotive Diagnostics.eng.lrc 73.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Graph-Based Binary Analysis - Halvar Flake.eng.txt 73.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.eng.vtt 73.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Side Channel Analysis on Embedded Systems Impact and Countermeasures - Job de Haas.eng.tsv 73.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Lambert - Sec Engineer in win Vista.eng.tsv 73.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ira Winkler - Who are the Real Black Hats.eng.txt 73.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jay Beale - Attacking and Securing UNIX FTP Servers.eng.vtt 73.5 KB
- Black Hat DC/Black Hat DC 2008/Presentations/FX/Whitepaper/bh-dc-08-fx-WP.pdf 73.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.eng.srt 73.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Time Trial - Racing Towards Practical Timing Attacks.eng.txt 73.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Conducting a Successful False Flag Cyber Operation (Blame it on China).eng.lrc 73.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Global Spying - Steve Topletz, Jonathan Logan, Kyle Williams.eng.tsv 73.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/poynter-bh-us-02-sso.ppt 73.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Black Ops of PKI - Dan Kaminski.eng.srt 73.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.jp.eng.txt 73.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat 2015.eng.vtt 73.5 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Shuffle Up and Deal Analyzing the Security of Automated Card Shufflers.eng.srt 73.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 2-2 - John Benson.eng.tsv 73.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.eng.srt 73.5 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Jennifer Granick - What's Different About Evidence in Computer Crime litigation.eng.tsv 73.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Chip & PIN is Definitely Broken - Adam Laurie, Zac Franken, Andrea Barisani, Daniele Bianco.eng.tsv 73.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Lee Kushner - The State of Employment in the Information Security Industry.eng.vtt 73.4 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Breaching the Perimeter via Cloud Synchronized Browser Settings.eng.srt 73.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Faces Of Facebook Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.vtt 73.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Laws of Vulnerabilities Research Version 2.0 Comparing Critical Infrastructure Industries - Panel.eng.srt 73.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeremiah Grossman - Phishing with Super Bait.srt 73.4 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/The Memory Sinkhole Unleashing An X86 Design Flaw Allowing Universal Privilege.eng.srt 73.4 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA.eng.lrc 73.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Botnet Population and Intelligence Gathering Techniques - Christopher Davis & David Dagon.eng.srt 73.4 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stamos - Breaking AJAX - English.eng.tsv 73.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Exploitation Using A Malicious Service Set Identifier (SSID).eng.txt 73.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Bruce Potter - 802.11X.eng.vtt 73.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Michael Sutton, Adam Greene - Art Of File Format.txt 73.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Leveraging the Edge Abusing SSL VPNs - Mike Zusman.eng.tsv 73.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Underground Ecosystem of Credit Card Frauds.eng.vtt 73.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Getaway - Methods and Defenses for Data Exfiltration - Sean Coyne, Ryan Kazanciyan.eng.text 73.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerabilities of Wireless Water Meter Networks - John McNabb.eng.vtt 73.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Heap Feng Shui in JavaScript - Alexander Sotirov.eng.lrc 73.3 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/bu-win-03-cerrudo-notes 73.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Vulnerabilities of Cellular and Satellite - based Voice and Data Networks.eng.txt 73.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Welcome & Introduction to Black Hat Europe 2014.eng.tsv 73.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Shaun Clowes - Generic Technical Defences.eng.vtt 73.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Room for Escape Scribbling Outside the Lines of Template Security.eng.srt 73.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Adversary Characterization and Scoring System.eng.tsv 73.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Plundervolt Flipping Bits from Software without Rowhammer.eng.srt 73.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacks-English.eng.vtt 73.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Len Sassman - The Anonymity Toolkit.eng.srt 73.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Endrun - Secure Digital Communications for Our Modern Dystopia.eng.tsv 73.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Applied Black Op Networking on Windows XP - Dan Kaminsky.eng.lrc 73.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Passive Bluetooth Monitoring.eng.srt 73.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Managed Code Rootkits - Erez Metula.eng.vtt 73.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/FrontPage Server Extensions on Windows Server 2003 - Mark Burnett.eng.lrc 73.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Beyond AutoRun - Exploiting Software Vulnerabilities with Removable Storage - Jon Larimer.eng.srt 73.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reverse Engineering by Crayon - Danny Quist, Lorie Liebrock.eng.tsv 73.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Tactical Application Security Program - Getting Stuff Done.eng.tsv 73.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/.NET from the Hacker's Perspective - Drew Miller.eng.text 73.2 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Quantum Security Myths, Facts, and Realities.eng.srt 73.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Panel - Competitive Intelligence.eng.txt 73.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mudge - Economics Physics Psycology.eng.lrc 73.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Factoring Dead - Preparing for Cyptopocalypse.eng.srt 73.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Meet the Feds Feds vs. Ex-Feds - Panel.eng.vtt 73.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Paul Wouters - IPSEC Opportunistic Encryption using DNSSEC.eng.lrc 73.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Making Windows Exploits More Reliable - Kostya Kortchinsky.eng.lrc 73.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/The Tactical Application Security Program Getting Stuff Done.eng.srt 73.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Post Exploitation Operations with Cloud Synchronization.eng.tsv 73.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Goldman and Marotta - Securing Your Computing Environment to Conform to Privacy Regulations.eng.tsv 73.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Bochspwn - Identifying 0-Days via System-Wide Memory Access Pattern Analysis.eng.srt 73.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Kingpin and Brian Oblivian - Secure Hardware Design.eng.vtt 73.1 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/They're Coming for Your Tools - Exploiting Design Flaws for Active Intrusion Prevention.eng.srt 73.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/The Role of Non Obvious Relationships in the Foot Printing Process - Haroon Meer, Charl Van Der Walt.eng.srt 73.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is Your Phone Pwned - Kevin Mahaffey, Anthony Lineberry, John Hering.eng.text 73.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.eng.vtt 73.1 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Unmasking State-Sponsored Mobile Surveillance Malware from Russia, China, and North Korea.eng.srt 73.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Panel - Competitive Intelligence.eng.srt 73.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Web Application Canonicalization, Encoding and Transcoding Attacks - Arian Evans.eng.lrc 73.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neurosurgery With Meterpreter - Colin Ames, David Kerb.eng.txt 73.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A New Breed of Rootkit The System Management Mode (SMM) Rootkit - Shawn Embleton, Sherri Sparks.eng.srt 73.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BlackOps.eng.vtt 73.1 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/OpenCrypto - Unchaining the JavaCard Ecosystem.eng.srt 73.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Shelters or Windmills - The Struggle For Power and Information Advantage.eng.srt 73.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.eng.tsv 73.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/FX - More Embedded Systems.eng.vtt 73.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss and Panel - CISO QA.vtt 73.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Client-Side Protection Against DOM-Based XSS Done Right (tm).eng.vtt 73.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/I, for One, Welcome Our New Power Analysis Overlords.eng.srt 73.0 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/firmWar An Imminent Threat to the Foundation of Computing.eng.srt 73.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Interpreter Exploitation - Pointer Inference and JIT Spraying - Dion.eng.srt 73.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Smartphone s Apps Are Not That Smart - Insecure Development Practices.eng.srt 73.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Tao of Hardware the Te of Implants.eng.srt 73.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Arbitrary Data Manipulation and Leakage with CPU Zero-Day Bugs on RISC-V.eng.srt 73.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerhard Eschelbeck - Law Vulnerabilities.eng.srt 73.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Security Failures in Secure Devices - Christopher Tarnovsky.eng.srt 73.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.eng.txt 73.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking and Forensicating an Oracle Database Server - David Litchfield.eng.tsv 73.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Panel - Vulnerability Disclosure What the Feds Think.eng.text 72.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced Mac OS X Rootkits - Dino Dai Zovi.eng.tsv 72.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Apple vs. Google Client Platforms.eng.txt 72.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Keynote Speaker Cofer Black.eng.vtt 72.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Security Analysis of CHERI ISASecurity Analysis of CHERI ISA.eng.srt 72.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cache and Maynor - Device Drivers.eng.vtt 72.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Ofir Arkin - Revolutionizing Operating System Fingerprinting.eng.srt 72.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Alternative Medicine The Malware Analyst’s Blue Pill - Paul Royal.eng.txt 72.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/SensePost - Putting Tea back into CyberTerrorism.eng.txt 72.8 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/How Embedded TCP IP Stacks Breed Critical Vulnerabilities.eng.srt 72.8 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Hiding in the Clouds Abusing Azure DevOps Services to Bypass Microsoft Sentinel Analytic Rules.eng.srt 72.8 KB
- Black Hat DC/Black Hat Federal 2006/How to Automatically Sandbox IIS With Zero False Positive and Negative - Tzi-cker Chiueh (partial).eng.lrc 72.8 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/IPSec in a Windows 2000 World - Rooster, Dan William 1-2.eng.text 72.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Writing Secure and Hack Resistant Code 2-2 - Michael Howard, David Leblanc.eng.text 72.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Random Number Generator in PHP.eng.txt 72.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Project Zero Ten Years of 'Make 0-Day Hard'.eng.srt 72.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Language of Trust - Mark Dowd, Ryan Smith, David Dewey.eng.vtt 72.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Graph-Based Binary Analysis - Halvar Flake.eng.lrc 72.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sherri Sparks, Jamie Butler - Shadow Walker.tsv 72.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Appliances - Ironic exploitation of security products.eng.txt 72.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Cory Scott - Systems Management in an Untrusted Network.eng.tsv 72.8 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Behind the Scenes How Criminal Enterprises Pre-infect Millions of Mobile Devices.eng.srt 72.8 KB
- Black Hat DC/Black Hat Federal 2006/How to Automatically Sandbox IIS With Zero False Positive and Negative - Tzi-cker Chiueh (partial).eng.vtt 72.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Fire & Ice - Making and Breaking macOS Firewalls.eng.srt 72.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Paul Wouters - IPSEC Opportunistic Encryption using DNSSEC.eng.srt 72.8 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Sleight of ARM Demystifying Intel Houdini.eng.srt 72.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/CuteCats.exe and the Arab Spring.eng.tsv 72.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BIOS Security.eng.vtt 72.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/FX - The Blackberry Case.eng.tsv 72.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Abusing Software Defined Networks.eng.srt 72.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Visual Forensic Analysis and Reverse Engineering of Binary Data - Greg Conti, Erik Dean.eng.lrc 72.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Hacking XPATH 2.0.eng.vtt 72.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/VK1-Larkin-Fight org Cyber crime.eng.vtt 72.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Measure Security Effectively.eng.txt 72.7 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Plenty of Coppers in Change - Stuart Hyde.eng.srt 72.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/The Discovery of a Government Malware and an Unexpected Spy Scandal.eng.srt 72.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Potter - Trusted Computing Revolution.eng.txt 72.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Taking the Hype Out of Hypervisor - Tal Garfinkel.eng.tsv 72.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/IP Spoofing.eng.tsv 72.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Our Favorite XSS Filters and How to Attack Them - Eduardo Vela Nava, David Lindsay.eng.tsv 72.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Bochspwn - Identifying 0-Days via System-Wide Memory Access Pattern Analysis.eng.txt 72.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Time Trial - Racing Towards Practical Timing Attacks.eng.lrc 72.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.vtt 72.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Drop the SOAP Real World Web Service Testing for Web Hackers - Tom Eston, Joshua Abraham.eng.txt 72.7 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/These aren't the permissions you're looking for - Anthony Lineberry, Tim Wyatt, David Luke Richardson.eng.tsv 72.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/WebTracking for You.eng.srt 72.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/DTRACE The Reverse Engineer’s Unexpected Swiss Army Knife - David Weston, Tiller Beauchamp.eng.srt 72.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Malicious PDF Analysis.eng.tsv 72.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Our Favorite XSS Filters and How to Attack Them - Eduardo Vela Nava, David Lindsay.eng.vtt 72.6 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/From Exploits to Forensics Evidence - Unraveling the Unitronics Attack.eng.srt 72.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Checkmate with Denial of Service - Tom Brennan, Ryan Barnett.eng.srt 72.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Detecting Credential Compromise in AWS.eng.srt 72.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jan K Rutkowski - Advance Windows 2000 Rootkits Detection.eng.tsv 72.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Dragonblood Attacking the Dragonfly Handshake of WPA3.eng.srt 72.6 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Stealing With Style Using CSS to Exploit ProtonMail & Friends.eng.srt 72.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jon David - Putting Intrusion Detection into Intrusion Detection Systems.eng.srt 72.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Vulnerabilities of Cellular and Satellite - based Voice and Data Networks.eng.lrc 72.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/GRR - Find All the Badness, Collect All the Things.eng.lrc 72.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jeffrey Prusan - Technical Security Countermeasures.eng.srt 72.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Greg Hoglund - Advanced Buffer Overflow Techniques.eng.tsv 72.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The SCADA That Didn't Cry Wolf - Who s Really Attacking Your ICS Devices - 2 2.eng.vtt 72.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jericho and Munge - Hard Core Web Defacement Statistics Trends and Analysis.eng.vtt 72.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Rick Smith - Masquerades,Tricking Modern Auth Systems.eng.tsv 72.5 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Exploitation Using A Malicious Service Set Identifier (SSID).eng.lrc 72.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Modern Anti-Abuse Mechanisms in Competitive Video Games.eng.srt 72.5 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Story of Jailbreaking iOS 13.eng.srt 72.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ira Winkler - Who are the Real Black Hats.eng.lrc 72.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Kaminsky - Black Ops of TCPIP.eng.text 72.5 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Over the Air, Under the Radar Attacking and Securing the Pixel Modem.eng.srt 72.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jennifer Grannick - Forensic Issues in Hacker Prosecutions.eng.srt 72.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/(un)Smashing the Stack Overflows, Countermeasures, and the Real World - Shawn Moyer.eng.vtt 72.5 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Appliances - Ironic exploitation of security products.eng.vtt 72.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Last Stage Of Delirium Research Group - UNIX Assembly Codes Development for Vulnerabilities.eng.srt 72.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Million Browser Botnet.eng.vtt 72.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Rustock Botnet Takedown - Julia Wolf, Alex Lanstein.eng.txt 72.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/RCE - as - a - Service Lessons Learned from 5 Years of Real - World CI CD Pipeline Compromise.eng.srt 72.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Fredric Bret - Mounet - Automated Detection of COM Vulnerabilities.eng.srt 72.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/CloudBots - Harvesting Crypto Coins Like a Botnet Farmer.eng.txt 72.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/AMF Testing.eng.lrc 72.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Win at Reversing - Nick Harbour.eng.txt 72.4 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/A General Approach to Bypassing Many Kernel Protections and its Mitigation.eng.srt 72.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud.eng.srt 72.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits.eng.txt 72.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Recoverable Advanced Metering Infrastructure - Mike Davis.eng.vtt 72.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/HTTP Advanced Assessment Techniques - Saumil Shah.eng.vtt 72.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Bug Hunters Dump User Data. Can They Keep it Well They're Keeping it Anyway..eng.srt 72.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.eng.lrc 72.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Discovering Debug Interfaces with the JTAGulator Part 1 by Joe Grand.eng.srt 72.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rain Forest Puppy - Novell The Forgotten OS.eng.text 72.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Checkmate with Denial of Service - Tom Brennan, Ryan Barnett.eng.tsv 72.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Dynamic Taint Propagation Finding Vulnerabilities Without Attacking - Brian Chess & Jacob West.eng.srt 72.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Rustock Botnet Takedown - Julia Wolf, Alex Lanstein.eng.vtt 72.3 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine.eng.srt 72.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A 16-bit Rootkit and Second Generation Zigbee Chips -Travis Goodspeed.eng.tsv 72.3 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.eng.srt 72.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/SensePost - Putting Tea back into CyberTerrorism.eng.srt 72.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Lance Spitzner - The Honey Net Project.eng.text 72.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Caezar-Scoring-CTF-Games-English.eng.tsv 72.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Predicting Susceptibility to Socialbots on Twitter.eng.txt 72.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Nitesh Dhanjani - Justin Clark.eng.srt 72.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Charl van der Walt and Christoff Breytenbach - The Role of Non Obvious Relationships in the Foot Printing Process.eng.tsv 72.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Next Generation Debuggers for Reverse Engineering - ERESI Team.eng.txt 72.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Above My Pay Grade - Cyber Response at the National Level.eng.vtt 72.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neurosurgery With Meterpreter - Colin Ames, David Kerb.eng.lrc 72.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Eugene Tsyrkievich - Ozone.eng.text 72.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking Like in the Movies - Visualizing Page Tables for Local Exploitation.eng.vtt 72.2 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Breaking Kerberos' RC4 Cipher and Spoofing Windows PACs.eng.srt 72.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM.eng.srt 72.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.jp.eng.lrc 72.2 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Inside Android's SafetyNet Attestation.eng.srt 72.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Panel - Competitive Intelligence.eng.lrc 72.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Trillions of Lines of Code and Counting Securing Applications At Scale - Jeremiah Grossman, Brad Arkin, Alex Hutton, Adrain Lane, John Johnson.eng.txt 72.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Michael Sutton, Adam Greene - Art Of File Format.lrc 72.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Edward G Schwartz and Diana Kelly - Data Privacy What should the CIO and CISO be doing.eng.text 72.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2019.eng.vtt 72.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Death of 1000 Cuts.eng.vtt 72.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Appliances - Ironic exploitation of security products.eng.lrc 72.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gbadegesin - TCPIP in WIN Vista.eng.txt 72.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Next Level Cheating and Leveling Up Mitigations.eng.txt 72.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Allen Harper, Edward Balas - The Birth of roo.eng.srt 72.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Beyond Scanning - Automating Web Application Security Tests.eng.vtt 72.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Weaponizing the Web - Nathan Hamiel, Shawn Moyer.eng.vtt 72.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking and Forensicating an Oracle Database Server - David Litchfield.eng.vtt 72.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Beyond Files Forensic OWADE Cloud Based Forensic - Elie Bursztein.eng.srt 72.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.eng.vtt 72.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Proposed Vulnerability Handling.eng.vtt 72.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.eng.tsv 72.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Covert Post-Exploitation Forensics with Metasploit - Wesley McGrew.eng.vtt 72.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Practical Windows XP2003 Heap Exploitation - John McDonald, Chris Valasek.eng.txt 72.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Batz - Security Issues Affecting Internet Transit Points and Backbone Providers.eng.vtt 72.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Simple Nomad - Modern NetWare Hacking.eng.vtt 72.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/SensePost - Putting Tea back into CyberTerrorism.eng.lrc 72.0 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Keynote by Dr. Steve Crocker.eng.srt 72.0 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/CDPwn Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days.eng.srt 72.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection.eng.tsv 72.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-Japanese.eng.tsv 72.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Trust, Security and Society.eng.srt 71.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tzi-cker Chiueh - Checking Array Bound.tsv 71.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Antivirus Security Softwear Tests.eng.vtt 71.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.eng.srt 71.9 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/One-Way SQL Hacking - JD Glaser & Saumil Udayan Shah.eng.srt 71.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jan K Rutkowski - Advance Windows 2000 Rootkits Detection.eng.vtt 71.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.jp.eng.srt 71.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Drop the SOAP Real World Web Service Testing for Web Hackers - Tom Eston, Joshua Abraham.eng.lrc 71.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Defending Against Malicious Application Compatibility Shims.eng.srt 71.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Murakami - Hypervisor - IPS.jp.eng.srt 71.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Byrne/Whitepaper/bh-usa-07-byrne-WP.pdf 71.9 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Steve-DHulton/Whitepaper/bh-dc-08-steve-dhulton-WP.pdf 71.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chris Paget - Click to Continue Shatter Attacks on Win32.eng.srt 71.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Rustock Botnet Takedown - Julia Wolf, Alex Lanstein.eng.lrc 71.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Measure Security Effectively.eng.lrc 71.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/DBREACH Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics.eng.srt 71.9 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/iOS Dual Booting Demystified.eng.srt 71.9 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Perimeter Breached Hacking an Access Control System.eng.srt 71.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/De-Anonymizing Live CDs through Physical Memory Analysis - Andrew Case.eng.tsv 71.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 1-2 - Panel.eng.txt 71.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Bochspwn - Identifying 0-Days via System-Wide Memory Access Pattern Analysis.eng.lrc 71.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Apple vs. Google Client Platforms.eng.lrc 71.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Random Number Generator in PHP.eng.lrc 71.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Post Memory Corruption Memory Analysis - Jonathan Brossard.eng.srt 71.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Potter - Trusted Computing Revolution.eng.srt 71.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Beyond Scanning - Automating Web Application Security Tests.eng.txt 71.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Internet Special Ops - Andrew Fried, Paul Vixie, Christopher Lee.eng.srt 71.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Siberman Richard Johnson - Comparison Buffer Overflow Prevention Implementations and Weaknesses.eng.txt 71.8 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Hidden Risks Of Biometric Identifiers And How To Avoid Them-tagged.eng.vtt 71.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hey You, Get Off of My Cloud - Application-Level Denial of Service Attacks and Defenses - Bryan Sullivan.eng.vtt 71.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Multiplexed Wired Attack Surfaces.eng.txt 71.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Practical Windows XP2003 Heap Exploitation - John McDonald, Chris Valasek.eng.srt 71.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Developments in Cisco IOS Forensics - Felix FX Linder.eng.vtt 71.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Mortman, Others - National ID Debate.srt 71.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Drew Miller - .Net from the hackers perspective Part 2 .eng.text 71.8 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Heap Feng Shui in JavaScript - Alexander Sotirov.eng.vtt 71.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Group Talk.eng.srt 71.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Forgotten World - Corporate Business Application Systems - Alexander Polyakov.eng.srt 71.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jim Christy - The Defense Cyber Crime.eng.vtt 71.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Underground Economy of the Pay Per Install PPI Business - Kevin Stevens.eng.vtt 71.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Threats.eng.srt 71.7 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Hoshizawa - online Swindler - English.eng.tsv 71.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Potter - Trusted Computing Revolution.eng.lrc 71.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dan Kaminsky - the Black Ops of DNS.eng.srt 71.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.srt 71.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Wireless Networks with 802.1x, EAP-TLS and PEAP - Steve Riley.eng.txt 71.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Dissecting Smart Meters.eng.vtt 71.7 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Making Windows Exploits More Reliable - Kostya Kortchinsky.eng.srt 71.7 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/In Defense of Facts Setting Standards Against Information Threats.eng.srt 71.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare.eng.txt 71.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Malware.eng.srt 71.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Trying to Be Everything to Everyone Let’s Talk About Burnout.eng.srt 71.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Revisiting XSS Sanitization.eng.vtt 71.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Predicting Susceptibility to Socialbots on Twitter.eng.lrc 71.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/CloudBots - Harvesting Crypto Coins Like a Botnet Farmer.eng.lrc 71.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ofir Arkin - Infrastructure Discovery.eng.vtt 71.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/CSO Panel Black Hat Strategy Meeting - Panel.eng.text 71.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Alternative Medicine The Malware Analyst’s Blue Pill - Paul Royal.eng.lrc 71.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.srt 71.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Tactical Application Security Program - Getting Stuff Done.eng.vtt 71.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Byoungyoung Lee on DarunGrim.eng.json 71.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/FX - Vulnerability Finding in Win32A Comparison.eng.tsv 71.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How Smartcard Payment Systems Fail.eng.srt 71.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Feaver - Kenneth Greers - Cyber Jihad and the Globalization of Warfare.eng.txt 71.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat 2015.eng.tsv 71.6 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Developments in Cisco IOS Forensics - Felix FX Linder.eng.txt 71.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Poacher Turned Gamekeeper - Lessons Learned from Eight Years of Breaking Hypervisors.eng.txt 71.6 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Hiding Process Memory via Anti-Forensic Techniques.eng.srt 71.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Spy-jacking the Booters.eng.txt 71.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Pen Testing A City.eng.srt 71.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dave Aitel - An Introduction to Spike.eng.tsv 71.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.eng.vtt 71.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Outer Limits - Hacking The Samsung Smart TV.eng.vtt 71.5 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/360 Anomaly Based Unsupervised Intrusion Detection - Stefano Zanero.eng.vtt 71.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Vixie - Preventing Child Neglect.eng.tsv 71.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Ruby for Pentesters - Michael Tracy, Chris Rohlf, Eric Monti.eng.vtt 71.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Back Doors And Front Doors Breaking The Unbreakable System.eng.srt 71.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/BH_US_08_DeMott_AppSec_A-Z_Fuzzing.pdf 71.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/SSL TLS Interception Proxies and Transitive Trust.eng.srt 71.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/AI Safety and You Perspectives on Evolving Risks and Impacts.eng.srt 71.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Preparing for the Cross Site Request Forgery Defense - Chuck Willis.eng.vtt 71.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Lambert - Sec Engineer in win Vista.eng.srt 71.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/FrontPage Server Extensions on Windows Server 2003 - Mark Burnett.eng.vtt 71.5 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Security Through Transparency Scaling Your Customer Trust Program.eng.srt 71.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Last Stage Of Delirium Research Group - UNIX Assembly Codes Development for Vulnerabilities.eng.txt 71.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Win at Reversing - Nick Harbour.eng.lrc 71.5 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers.eng.srt 71.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protocols and Encryption of the Storm Botnet - Joe Stewart.eng.tsv 71.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gbadegesin - TCPIP in WIN Vista.eng.lrc 71.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Buying into the Bias - Why Vulnerability Statistics Suck.eng.vtt 71.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Passive Bluetooth Monitoring.eng.txt 71.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Hacking Hollywood.eng.txt 71.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Trillions of Lines of Code and Counting Securing Applications At Scale - Jeremiah Grossman, Brad Arkin, Alex Hutton, Adrain Lane, John Johnson.eng.lrc 71.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Bruce Schneier - A hacker looks at cryptography.eng.vtt 71.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Software Radio and the Future of Wireless Security - Michael Ossmann.eng.tsv 71.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cunning With CNG - Soliciting Secrets From Schannel.eng.txt 71.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Grugq - Defeating Forensic Analysis.eng.text 71.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Million Browser Botnet.eng.txt 71.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Vivisection of an Exploit Development Process - David Aitel.eng.txt 71.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eric Schultze and George Kurtz - Over the Router, Through the Firewall, to Grandma's House We Go.eng.srt 71.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Andrew van der Stock - Alternatives to Honeypots.eng.vtt 71.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.eng.srt 71.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Listen Up Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap.eng.srt 71.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Breaking the Chrome Sandbox with Mojo.eng.srt 71.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Active & Passive Fingerprinting of Microsoft Based Operating Systems using the ICMP protocol - Ofir Arkin.eng.srt 71.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Measure Security Effectively.eng.vtt 71.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dan Kaminsky - Stack Black Ops.eng.text 71.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Detecting & Preventing the Xen Hypervisor Subversions - Joanna Rutkowska, Rafal Wojtczuk.eng.txt 71.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/eBPF ELFs JMPing Through the Windows.eng.srt 71.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Siberman Richard Johnson - Comparison Buffer Overflow Prevention Implementations and Weaknesses.eng.srt 71.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Who's Really Attacking Your ICS Devices.eng.srt 71.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Off Grid communications with Android - Meshing the mobile world.eng.txt 71.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Internal Server Error Exploiting Inter - Process Communication in SAP's HTTP Server.eng.srt 71.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Hacking XPATH 2.0.eng.tsv 71.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Roger Dingledine - Putting the P back in VPN.eng.tsv 71.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Using D-Space to Open Doors.eng.srt 71.3 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.jp.eng.txt 71.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rick Smith - The Biometrics Dilemma.eng.tsv 71.3 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Saumil-Shah-David-Cole-Adware-Spyware-English.eng.tsv 71.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/SSL TLS Interception Proxies and Transitive Trust.eng.txt 71.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Marshall Beddoe and Chris Abad - The Siphon Project.eng.srt 71.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Saumil Shah - Metasploit Plugins.eng.vtt 71.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Jesse Burns - Fuzzing Win32.eng.tsv 71.3 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Virt-ICE next gen debugger for malware analysis - NGUYEN Anh Quynh.eng.vtt 71.3 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/The Ripple Effect Building a Diverse Security Research Team.eng.srt 71.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moniz and Moore - 6 Degrees XSSploit.eng.srt 71.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Lives on The Line Securing Crisis Maps in Libya, Sudan, and Pakistan - Securing Crisis Maps in Libya, Sudan, and Pakistan.eng.text 71.2 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/A Run a Day Won't Keep the Hacker Away Inference Attacks in Fitness Tracking Social Networks.eng.srt 71.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/200px-Pax_tux.png 71.2 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Intercepting iCloud Keychain.eng.srt 71.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Breaking Samsung's ARM TrustZone.eng.srt 71.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits.eng.lrc 71.2 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Welcome and introduction to Black Hat - Keynote Speaker.eng.srt 71.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Understanding And Managing Entropy Usage.eng.srt 71.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Web Application Canonicalization, Encoding and Transcoding Attacks - Arian Evans.eng.vtt 71.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Practical Windows XP2003 Heap Exploitation - John McDonald, Chris Valasek.eng.lrc 71.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Deputies Are Still Confused.eng.srt 71.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reviving Smart Card Analysis - Karsten Nohl, Chris Tarnovsky.eng.tsv 71.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Mike Schiffmman - The Firewalk Tool.eng.srt 71.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/S Stender - Attacking Inatl Software.eng.tsv 71.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.tsv 71.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kenneth Geers - Hacking in a Foreign.eng.tsv 71.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gbadegesin - TCPIP in WIN Vista.eng.srt 71.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BeEF attack with MITM.eng.srt 71.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 1-2 - Panel.eng.lrc 71.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Next Level Cheating and Leveling Up Mitigations.eng.lrc 71.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/48 Dirty Little Secrets Cryptographers Don't Want You To Know.eng.vtt 71.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Wireless Networks with 802.1x, EAP-TLS and PEAP - Steve Riley.eng.lrc 71.1 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Virtual Forensics - Christiaan Beek.eng.srt 71.1 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/ICS Risk Strategies for Assessing Operational, Safety, Financial, and Cybersecurity Risks.eng.srt 71.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A 16-bit Rootkit and Second Generation Zigbee Chips -Travis Goodspeed.eng.srt 71.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits.eng.srt 71.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Scott Culp - Building a Security Response Process.eng.srt 71.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Mitigation Improvements.eng.vtt 71.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hackers, Journalists and the Ethical Swamp.eng.tsv 71.0 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Preloading Insecurity In Your Electron.eng.srt 71.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Siberman Richard Johnson - Comparison Buffer Overflow Prevention Implementations and Weaknesses.eng.lrc 71.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.eng.srt 71.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Exploiting Smart-Phone USB Connectivity For Fun And Profit - Angelos Stavrou & Zhaohui Wang.eng.vtt 71.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roelof Temmingh and Haroon Meer - Setiri.eng.srt 71.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare.eng.vtt 71.0 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Pwning Cloud Vendors with Untraditional PostgreSQL Vulnerabilities.eng.srt 71.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring.eng.vtt 71.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Black Hat USA 2003 - Dan Kaminsky - Stack Black Ops.eng.text 71.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Developments in Cisco IOS Forensics - Felix FX Linder.eng.lrc 71.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare.eng.lrc 71.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Multiplexed Wired Attack Surfaces.eng.lrc 71.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Swipe Left for Identity Theft An Analysis of User Data Privacy Risks on Location-based Dating Apps.eng.srt 71.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Remote Exploitation Of An Unaltered Passenger Vehicle.eng.srt 71.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keynote - The Hidden Architecture of our Time - Why This Internet Worked, How We Could Lose It.eng.tsv 71.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jeffrey Prusan - Technical Security Countermeasures.eng.txt 71.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Flipping Bits Your Credentials Are Certainly Mine.eng.srt 71.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Spy-jacking the Booters.eng.lrc 71.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Capacity and Performance Management - Best Practices.pdf 71.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Capacity and Performance Management - Best Practices.pdf 71.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Next Generation Debuggers for Reverse Engineering - ERESI Team.eng.lrc 70.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Feaver - Kenneth Greers - Cyber Jihad and the Globalization of Warfare.eng.lrc 70.9 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Moyer.pdf 70.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Endrun - Secure Digital Communications for Our Modern Dystopia.eng.srt 70.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Spy-Sense Spyware Tool for Executing Stealthy Exploits Against Sensor Networks - Thanassis Giannetsos.eng.srt 70.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Last Stage Of Delirium Research Group - UNIX Assembly Codes Development for Vulnerabilities.eng.lrc 70.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM.eng.txt 70.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite.eng.text 70.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Secure the Planet New Strategic Initiatives from Microsoft to Rock Your World - Mike Reavey, Katie Moussouris, Steve Adegbite_en.text 70.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Safeguarding UEFI Ecosystem Firmware Supply Chain is Hard(coded).eng.srt 70.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dave Aitel - An Introduction to Spike.eng.srt 70.8 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Leveraging the Apple ESF for Behavioral Detections.eng.srt 70.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cunning With CNG - Soliciting Secrets From Schannel.eng.lrc 70.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Automated Detection of HPP Vulnerabilities in Web Applications - Marco Balduzzi.eng.srt 70.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Wheeler-Mehta.pdf 70.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Offensive Threat Modeling for Attackers - Turning Threat Modeling on its Hea.eng.tsv 70.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/MetaPost Exploitation - Val Smith, Colin Ames.eng.txt 70.8 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/New Memory Forensics Techniques to Defeat Device Monitoring Malware.eng.srt 70.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Dude, Where's My Laptop.eng.srt 70.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Finding Needles in Haystacks (The Size of Countries).eng.vtt 70.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Is Defense Winning.eng.srt 70.8 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Richard Thieme - Masters of the Unseen The Art of Information Warfare.eng.vtt 70.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX.html 70.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Job de Haas - GSM WAP and SMS Security.eng.text 70.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BIOS Security.eng.tsv 70.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools - Shreeraj Shah.eng.text 70.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Wireless Overview - Protocols and Threat Models.eng.txt 70.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stuxnet Redux - Malware Attribution and Lessons Learned - Taking the guesswork out of cyber attribution - Tom Parker.eng.srt 70.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Something to Do with Network Security - Dan Kaminsky.eng.txt 70.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Economics and the Underground Economy - Cormac Herley.eng.text 70.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Johnny Long Me to We - Johnny Long.eng.txt 70.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Keynote - What Got Us Here Wont Get Us There.eng.txt 70.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploratory Android Surgery - Jesse Burns.eng.text 70.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Manna from Heaven - Improving the State of Wireless Rogue AP Attacks.eng.txt 70.7 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/AI Assisted Decision Making of Security Review Needs for New Features.eng.srt 70.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rauch - PDB - The Protocal Debugger.eng.text 70.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/SSL, Gone in 30 Seconds - A BREACH beyond CRIME.eng.txt 70.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Stephenson - Introduction to Cyber Forensic Analysis.eng.txt 70.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Beyond Scanning - Automating Web Application Security Tests.eng.lrc 70.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Backslash Powered Scanning Hunting Unknown Vulnerability Classes.eng.srt 70.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace.eng.srt 70.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Passive Bluetooth Monitoring.eng.lrc 70.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Get Rich or Die Trying - Making Money on the Web, The Black Hat Way - Jeremiah Grossman, Arian Evans.eng.vtt 70.6 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Politics of Vulnerability Reporting - Scott Blake.eng.srt 70.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Brandon Wiley - The Superworm Manifesto.eng.text 70.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Lifecycle of a Phone Fraudster - Exposing Fraud Activity.eng.txt 70.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Black Hat USA 2019 Keynote Every Security Team is a Software Team Now by Dino Dai Zovi.eng.tsv 70.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Covert Post-Exploitation Forensics with Metasploit - Wesley McGrew.eng.tsv 70.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Million Browser Botnet.eng.lrc 70.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Alessandro Acquisti - Privacy Economics and Immediate Gratification.eng.text 70.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Hacking Hollywood.eng.lrc 70.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Microsoft Vista NDA-less The Good, The Bad, and The Ugly - Chris Paget.eng.srt 70.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Researching Secrets - James Bamford.eng.vtt 70.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Chris Eng - Breaking Crypto.eng.srt 70.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OptiROP - The Art of Hunting ROP Gadgets.eng.srt 70.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Insider Data Theft.eng.txt 70.6 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Vibe Check IDK About This. Why Students May Shy Away From Cyber in a Surveillance State.eng.srt 70.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sutton and MacManus - Punk 0de.eng.txt 70.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Poacher Turned Gamekeeper - Lessons Learned from Eight Years of Breaking Hypervisors.eng.lrc 70.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-van-der-Walt-When-the-Tables-Turn-English.eng.vtt 70.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/OSS Security Maturity - Time to Put on Your Big Boy Pants.eng.vtt 70.6 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/The Other Side of Information Security - Wilco van Grinkel.eng.txt 70.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/JD Glaser - Hacking With Executives.eng.srt 70.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Off Grid communications with Android - Meshing the mobile world.eng.lrc 70.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Laws of Vulnerabilities Research Version 2.0 Comparing Critical Infrastructure Industries - Panel.eng.txt 70.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/SSL TLS Interception Proxies and Transitive Trust.eng.lrc 70.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/More Tricks for Defeating SSL - Moxie Marlinspike.eng.vtt 70.5 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Weaponizing Mobile Infrastructure Are Politically Motivated Cyber Attacks a Threat to Democracy.eng.srt 70.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Computrace Backdoor Revisited.eng.srt 70.5 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/You Shall Not PASS - Analysing a NSO iOS Spyware Sample.eng.srt 70.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Seth Fogie - Pocket PC Abuse.eng.srt 70.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.eng.srt 70.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools.html 70.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cunning With CNG - Soliciting Secrets From Schannel.eng.vtt 70.5 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Beyond AutoRun - Exploiting Software Vulnerabilities with Removable Storage - Jon Larimer.eng.txt 70.5 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Breaking Managed Data Services in the Cloud.eng.srt 70.4 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/GDPR and Third Party JS - Can It Be Done.eng.srt 70.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mike Schiffman - The Need for an 802.11b Toolkit.eng.text 70.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Low Energy to High Energy Hacking Nearby EV-Chargers Over Bluetooth.eng.srt 70.4 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/injectso Modifying and Spying on Running Processes Under Linux - Shawn Clowes.eng.srt 70.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Adam Shostack - Identity, Economics, Security, and Terrorism.eng.srt 70.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Intrusion Detection.eng.srt 70.4 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Conti/software/secvis/secvis_v1.11.tar.gz 70.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Corporate Espionage for Dummies The Hidden Threat of Embedded Web Servers - Michael Sutton.eng.tsv 70.4 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Illegitimate Data Protection Requests - To Delete or to Address.eng.srt 70.4 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/The Cost of Complexity Different Vulnerabilities While Implementing the Same RFC.eng.srt 70.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Antivirus Security Softwear Tests.eng.tsv 70.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Stepping p3wns - Adventures in Full Spectrum Embedded Exploitation.eng.vtt 70.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Corporate Espionage for Dummies The Hidden Threat of Embedded Web Servers - Michael Sutton.eng.vtt 70.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jeffrey Prusan - Technical Security Countermeasures.eng.lrc 70.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Data Seepage How to Give Attackers a Roadmap to Your Network - David Maynor & Robert Graham.eng.vtt 70.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/iPhone Privacy - Nicolas Seriot.eng.txt 70.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Stephenson - Introduction to Cyber Forensic Analysis.eng.srt 70.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android.eng.srt 70.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Call To Arms - A Tale of the Weaknesses of Current Client-Side XSS Filtering.eng.tsv 70.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Detecting & Preventing the Xen Hypervisor Subversions - Joanna Rutkowska, Rafal Wojtczuk.eng.lrc 70.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Stoned Bootkit - Peter Kleissner.eng.txt 70.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AirBnBeware - Short Term Rentals Long Term Pwnage.eng.srt 70.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Post Memory Corruption Memory Analysis - Jonathan Brossard.eng.txt 70.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Vivisection of an Exploit Development Process - David Aitel.eng.lrc 70.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/therapies_joules_4_c.jpg 70.3 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Dirty Vanity A New Approach to Code Injection & EDR Bypass.eng.srt 70.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/How We Can Power Real Security Machine Learning Progress Through Open Algorithms and Benchmarks.eng.srt 70.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Global Security Report 2010 Analysis of Investigations and Penetration Tests - Nicholas J Percoco.eng.text 70.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacking Oracle Web Applications with Metasploit - Chris Gates aka carnal0wnage.eng.srt 70.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM.eng.lrc 70.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Hunting Flaws in MS SQL Server - Cesar Cerrudo, Aaron Newman.eng.srt 70.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/RFID Hacking - Live Free or RFID Hard.eng.vtt 70.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/File Disinfection Framework.eng.txt 70.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/MetaPost Exploitation - Val Smith, Colin Ames.eng.lrc 70.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moniz and Moore - 6 Degrees XSSploit.eng.tsv 70.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Windows Kernel Graphics Driver Attack Surface.eng.tsv 70.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Mesh Stalkings-Penetration Testing with Small Networked Devices.eng.srt 70.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Embedded Management Interfaces - Hristo Bojinov, Elie Bursztein, Dan Boneh.eng.tsv 70.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Beyond the Mcse - Active Directory for the Security Professional.eng.txt 70.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Shipley and Tom Jackiewicz - Security Issues with Implementing and Deploying the LDAP Directory System.eng.srt 70.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Suberverting the Xen Hypervisor - Rafal Wojtczuk.eng.vtt 70.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Allen Harper, Edward Balas - The Birth of roo.eng.tsv 70.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The WOMBAT API - Querying a global network of advanced honeypots - Stefano Zanero, Paolo Milani Comparetti.eng.srt 70.1 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/DeepPhish Simulating Malicious AI.eng.srt 70.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Ofir Arkin - Cracking VoIP Architecture.eng.tsv 70.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Windows Kernel Graphics Driver Attack Surface.eng.vtt 70.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joukov-et_al-Kefence_files/amutils.png 70.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Look, No Hands - The Remote, Interaction-less Attack Surface of the iPhone.eng.srt 70.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Marinescu - WIN Vista Heap Mgmt.eng.srt 70.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/OSS Security Maturity - Time to Put on Your Big Boy Pants.eng.tsv 70.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.jp.eng.lrc 70.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/implant image.JPG 70.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Talent Need Not Apply Tradecraft and Objectives of Job - themed APT Social Engineering.eng.srt 70.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Funderbolt - Adventures in Thunderbolt DMA Attacks.eng.vtt 70.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Chris Eng - Breaking Crypto.eng.txt 70.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-When-the-table-turn-Japanese.eng.vtt 70.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/How to Impress Girls with Browser Memory Protection Bypasses - Alexander Sotirov, Mark Dowd.eng.txt 70.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Google Chrome OS - Matt Johansen, Kyle Osborn.eng.tsv 70.1 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Social Engineering and the CIA - Petet Earnest.eng.text 70.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Nitesh Dhanjani - Justin Clark.eng.tsv 70.1 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 1-2.eng.vtt 70.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Extreme Privilege Escalation on Windows 8 UEFI Systems.eng.tsv 70.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chris Paget - Click to Continue Shatter Attacks on Win32.eng.tsv 70.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Constant Insecurity Things You Didn’t Know About (PECOFF) Portable Executable File Format - Mario Vuksan, Tomislav Pericin.eng.srt 70.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/SSL, Gone in 30 Seconds - A BREACH beyond CRIME.eng.lrc 70.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Welcome & Introduction to Black Hat Europe 2014.eng.vtt 70.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Grand - Sec Problems HWare Devices.text 70.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Language Properties of Phone Scammers - Cyberdefense At the Level of the Human.eng.vtt 70.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Simple Nomad - Covering Your Tracks.eng.txt 70.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/NGSCB/NGSCB_Privacy_Enhancements.doc 70.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Hardening HSMs for Banking-Grade Crypto Wallets.eng.srt 70.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/URI Use and Abuse - Nathan McFeters and Rob Carter.eng.text 70.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The M2M Risk Assessment Guide, a Cyber Fast Track Project.eng.vtt 70.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Finding Needles in Haystacks (The Size of Countries).eng.txt 70.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Keynote - What Got Us Here Wont Get Us There.eng.lrc 70.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Cyber-Attacks & SAP systems - Is Our Business-Critical Infrastructure Expose.eng.txt 70.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Wireless Overview - Protocols and Threat Models.eng.lrc 70.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honey Topics.eng.text 70.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Vulnerabilities of Cellular and Satellite - based Voice and Data Networks.eng.vtt 70.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sensepost - When The Tables Turn.eng.txt 70.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reverse Engineering by Crayon - Danny Quist, Lorie Liebrock.eng.vtt 69.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/FLEX, AMF 3 and BlazeDS An Assessment - Jacob Carlson, Kevin Stadmeyer.eng.tsv 69.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Forensics Tools and Processes for Windows XP Platforms - Larry Leibrock.eng.text 69.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/FX - More Embedded Systems.eng.txt 69.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Stepping p3wns - Adventures in Full Spectrum Embedded Exploitation.eng.txt 69.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Paul Knight - Dynamic Routing Inside IPsec VPNs.eng.txt 69.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Malware.eng.txt 69.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Derek Soeder, Ryan Permeh - eYe Bootroot.tsv 69.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Rapid Enterprise Triaging - Aaron LeMasters, Michael Murphy.eng.tsv 69.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Lifecycle of a Phone Fraudster - Exposing Fraud Activity.eng.lrc 69.9 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Jeremy Rauch - Security Implications of Distributed Network Management.eng.text 69.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking .Net Applications The Black Arts - Jon McCoy.eng.vtt 69.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Something to Do with Network Security - Dan Kaminsky.eng.lrc 69.9 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.tsv 69.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Beyond AutoRun - Exploiting Software Vulnerabilities with Removable Storage - Jon Larimer.eng.lrc 69.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them.eng.srt 69.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Laws of Vulnerabilities Research Version 2.0 Comparing Critical Infrastructure Industries - Panel.eng.lrc 69.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking Like in the Movies - Visualizing Page Tables for Local Exploitation.eng.tsv 69.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Marshall Beddoe and Chris Abad - The Siphon Project.eng.txt 69.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/What s on the Wire - Physical Layer Tapping with Project Daisho.eng.srt 69.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Johnny Long Me to We - Johnny Long.eng.lrc 69.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Stephenson - Introduction to Cyber Forensic Analysis.eng.lrc 69.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/File Disinfection Framework.eng.vtt 69.8 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/HTTP 2 The Sequel is Always Worse.eng.srt 69.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016.eng.srt 69.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.tsv 69.7 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.tsv 69.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Next Level Cheating and Leveling Up Mitigations.eng.txt 69.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Building Safe Systems at Scale - Lessons from Six Months at Yahoo.eng.text 69.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/S Stender - Attacking Inatl Software.eng.srt 69.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-Japanese.eng.vtt 69.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends.eng.tsv 69.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Managed Code Rootkits - Erez Metula.eng.txt 69.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bringing a Machete to the Amazon.eng.txt 69.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Wireless Overview - Protocols and Threat Models.eng.srt 69.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Insider Data Theft.eng.lrc 69.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Bring Back The Honeypots.eng.srt 69.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Surviving OpenHack IV - Steve Riley, Timothy Bollefer.eng.text 69.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/FX - Vulnerability Finding in Win32A Comparison.eng.vtt 69.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hardening Windows 8 apps for the Windows Store.eng.vtt 69.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Schulman - Phishing with Asterisk.eng.txt 69.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/File Disinfection Framework.eng.lrc 69.6 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Android Parcels The Bad, the Good and the Better - Introducing Android's Safer Parcel.eng.srt 69.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Steven Christey - CVE Behind the Scenes The Complexity of Being Simple.eng.srt 69.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sutton and MacManus - Punk 0de.eng.lrc 69.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Manna from Heaven - Improving the State of Wireless Rogue AP Attacks.eng.lrc 69.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rieback - RFID Malware Demystified.eng.srt 69.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mike Beekey - ARP Vulnerabilities Indefensible Local Network Attacks.eng.srt 69.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jason Garms - Defending Windows 2000 on the Internet.eng.txt 69.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/HTML5 Threats.eng.vtt 69.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Implementing the Lessons Learned From a Major Cyber Attack.eng.vtt 69.6 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/The Other Side of Information Security - Wilco van Grinkel.eng.lrc 69.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Certified Pre-Owned Abusing Active Directory Certificate Services.eng.srt 69.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.eng.vtt 69.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Battery Firmware Hacking - Charlie miller.eng.text 69.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Time Trial - Racing Towards Practical Timing Attacks.eng.srt 69.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The IETF & The Future of Security Protocols - All The Signal, None of the No.eng.tsv 69.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2019.eng.tsv 69.5 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Store-to-Leak Forwarding There and Back Again.eng.srt 69.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/How to Impress Girls with Browser Memory Protection Bypasses - Alexander Sotirov, Mark Dowd.eng.srt 69.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Phil Zimmerman - My Next Big Project.txt 69.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Medical Devices for Fun and Insulin Breaking the Human SCADA System - Jay Radckiffe.eng.txt 69.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/HTTP Advanced Assessment Techniques - Saumil Shah.eng.txt 69.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Post Memory Corruption Memory Analysis - Jonathan Brossard.eng.lrc 69.5 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Jaya Baloo - Lawful Interception of IP The European Context.eng.vtt 69.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Chris Eng - Breaking Crypto.eng.lrc 69.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Vixie - Preventing Child Neglect.eng.vtt 69.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Malware Distribution via Widgetization of the Web - Neil Daswani.eng.tsv 69.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Data Seepage How to Give Attackers a Roadmap to Your Network - David Maynor & Robert Graham.eng.tsv 69.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Underground Economy of the Pay Per Install PPI Business - Kevin Stevens.eng.txt 69.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Greg Hoglund - Runtime Decompilation.eng.srt 69.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Finding Needles in Haystacks (The Size of Countries).eng.lrc 69.4 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Breaking Matter Vulnerabilities in the Matter Protocol.eng.srt 69.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/How to Impress Girls with Browser Memory Protection Bypasses - Alexander Sotirov, Mark Dowd.eng.lrc 69.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Active Exploitation Detection - Marc Eisenbarth.eng.vtt 69.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/FX - More Embedded Systems.eng.lrc 69.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Beyond the Mcse - Active Directory for the Security Professional.eng.lrc 69.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Xploiting Google Gadgets Gmalware and Beyond - Tom Stracener, Robert Hansen.eng.vtt 69.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Beyond the Mcse - Active Directory for the Security Professional.eng.srt 69.4 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructures.eng.srt 69.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/From MLOps to MLOops - Exposing the Attack Surface of Machine Learning Platforms.eng.srt 69.3 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/What Does an LLM-Powered Threat Intelligence Program Look Like.eng.srt 69.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Why Black Hats Always Win - Val Smith, Chris.eng.text 69.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Stepping p3wns - Adventures in Full Spectrum Embedded Exploitation.eng.lrc 69.3 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/The Various Shades of Supply Chain SBOM, N-Days and Zero Trust.eng.srt 69.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Trustworthy Computing Update - Scott Clup.eng.txt 69.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Keynote - Information Technology Systems in a Post-Silcon World.eng.tsv 69.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking .Net Applications The Black Arts - Jon McCoy.eng.tsv 69.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Feaver - Kenneth Greers - Cyber Jihad and the Globalization of Warfare.eng.vtt 69.3 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.jp.eng.srt 69.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Graph-Based Binary Analysis - Halvar Flake.eng.vtt 69.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Kr00k Serious Vulnerability Affected Encryption of Billion Wi-Fi Devices.eng.srt 69.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Automating Linux Malware Analysis Using Limon Sandbox.eng.vtt 69.3 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Bug Bounty Evolution Not Your Grandson's Bug Bounty.eng.srt 69.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Law of Mobile Hacking - Jennifer Granick.eng.text 69.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jennifer Granick - Top 10 Issues.eng.text 69.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 1-2 - Eric Schultze & Erik Birkholz.eng.tsv 69.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Attacking Clientside JIT Compilers - Chris Rohlf, Yan Ivnitskiy.eng.text 69.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/iPhone Privacy - Nicolas Seriot.eng.lrc 69.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Security Myths of Extended Validation SSL Certificates - Alexander Sotirov, Mike Zusman.eng.txt 69.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Cameron Hotchkies - Blind Injection Automation Techniques.eng.srt 69.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Backdooring and Hijacking Azure AD Accounts by Abusing External Identities.eng.srt 69.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Honey Project - Latest Advances in Honeynet Technologies.eng.text 69.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Self-Driving and Connected Cars - Fooling Sensors and Tracking Drivers.eng.vtt 69.2 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Alice in Kernel Land Lessons Learned From the eBPF Rabbit Hole.eng.srt 69.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/How To Hack Government Technologists As Policy Makers.eng.srt 69.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Decompilers and Beyond - Ilfak Guilfanov.eng.srt 69.2 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/FX - Design and Software Vulnerabilities In Embedded Systems.eng.txt 69.2 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Researching Secrets - James Bamford.eng.txt 69.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Marshall Beddoe and Chris Abad - The Siphon Project.eng.lrc 69.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Detection of Firefox Extension Reuse Vulnerabilities.eng.txt 69.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Managed Code Rootkits - Erez Metula.eng.lrc 69.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Stoned Bootkit - Peter Kleissner.eng.lrc 69.2 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Breaking the Chain An Attacker's Perspective on Supply Chain Vulnerabilities and Flaws.eng.srt 69.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Gordon Reichard Jr - Trust, Security, Partnership Strategies in Selecting a Managed Service Provider.eng.tsv 69.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/CANAPE - Bytes Your Bits.eng.vtt 69.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.eng.txt 69.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Braving the Cold New Methods for Preventing Cold Boot Attacks on Encryption Keys - Patrick McGregor.eng.text 69.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/MFA-ing the Un-MFA-ble Protecting Auth Systems' Core Secrets.eng.srt 69.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Andrew Van der Stock - OWASP Guide.eng.txt 69.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sophail A Critical Analysis of Sophos Antivirus - Tavis Ormandy.eng.srt 69.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Natural Security - Jeff Moss, Rod Beckström.eng.vtt 69.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Malware.eng.lrc 69.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Insider's Guide to Cyber-Insurance and Security Guarantees.eng.vtt 69.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sensepost - When The Tables Turn.eng.lrc 69.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/What the Hell is Inside There - Chris Tarnovsky.eng.text 69.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Simple Nomad - Covering Your Tracks.eng.lrc 69.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/State of the Art Post Exploitation in Hardened PHP Environments - Stefan Esser.eng.srt 69.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Marinescu - WIN Vista Heap Mgmt.eng.tsv 69.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Lee Kushner - The State of Employment in the Information Security Industry.eng.txt 69.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The WOMBAT API - Querying a global network of advanced honeypots - Stefano Zanero, Paolo Milani Comparetti.eng.txt 69.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Rapid Radio Reversing.eng.srt 69.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Johnny Long Me to We - Johnny Long.eng.vtt 69.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - Application Security Crossfire.eng.text 69.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Is The NSA Still Listening To Your Calls A Surveillance Debate.eng.srt 69.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Thomas Akin - WebMail Forensics.eng.text 69.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Predicting Susceptibility to Socialbots on Twitter.eng.vtt 69.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jason Garms - Defending Windows 2000 on the Internet.eng.lrc 69.0 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Strategies for Defeating Distributed Attacks - Simple Nomad.eng.text 69.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The IETF & The Future of Security Protocols - All The Signal, None of the No.eng.vtt 69.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Phillip Hallam - Baker - Phishing - commiting Fraud in Public.eng.txt 69.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Cyber-Attacks & SAP systems - Is Our Business-Critical Infrastructure Expose.eng.lrc 69.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Black Box is Dead. Long Live Black Box.eng.srt 69.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The SCADA That Didn't Cry Wolf - Who s Really Attacking Your ICS Devices - 2 2.eng.txt 69.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Win at Reversing - Nick Harbour.eng.srt 69.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Windows Hooks of Death Kernel Attacks Through User-Mode Callbacks - Tarjei Mandt.eng.vtt 68.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Tzi-cker Chiueh - Program Semantics Aware Intrusion Detection.eng.vtt 68.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Classification and Detection of Application Backdoors - Chris Wysopal.eng.srt 68.9 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Off The Record - Weaponizing DHCP DNS Dynamic Updates.eng.srt 68.9 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Abusing CNC Technologies.eng.srt 68.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Client-side Security - Petko D. Petkov.eng.text 68.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Asia 2016.eng.srt 68.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking BHAD - Abusing Belkin Home Automation Devices.eng.vtt 68.9 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Abusing Azure Active Directory From MFA Bypass to Listing Global Administrators.eng.srt 68.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Schulman - Phishing with Asterisk.eng.lrc 68.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Phishing for Funds - Understanding Business Email Compromise.eng.tsv 68.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Neel Mehta - Advanced in ELF runtime binary encryption - Shiva.eng.tsv 68.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Hate the Player, Hate the Game Inside the Android Patch Lifecycle - Anthony Lineberry, Tim Strazzere, Tim Wyatt.eng.tsv 68.9 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Microarchitecture Vulnerabilities Past, Present, and Future.eng.srt 68.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.jp.eng.txt 68.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bringing a Machete to the Amazon.eng.lrc 68.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Renaud Deraison - The Nessus Project Reducing the Costs of Vulnerability Assessment.eng.srt 68.9 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/The Bugs in Your Bootloaders Embedded Device Secure Boot Fails and How to Fix Them.eng.srt 68.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoglund - Hacking WOW Adv rootkit.eng.vtt 68.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David LeBlanc - Real World Techniques in Network Security Management.eng.vtt 68.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Baseband Apocalypse - All Your Baseband Are Belong To Us - Ralf-Philipp Weinmann.eng.srt 68.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Richard Thieme - Saying Whatever he Wants.eng.tsv 68.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Dynamic Taint Propagation Finding Vulnerabilities Without Attacking - Brian Chess & Jacob West.eng.tsv 68.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Medical Devices for Fun and Insulin Breaking the Human SCADA System - Jay Radckiffe.eng.lrc 68.9 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Hobbit - Microsoft LM athentication, CIFS, and All Kinds of Password Problems.eng.tsv 68.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/When the Lights Go Out - Hacking Cisco EnergyWise.eng.txt 68.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Next Level Cheating and Leveling Up Mitigations.eng.lrc 68.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/HTTP Advanced Assessment Techniques - Saumil Shah.eng.lrc 68.9 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Jailbreaking Apple Watch.eng.srt 68.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Using D-Space to Open Doors.eng.tsv 68.8 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater.eng.srt 68.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Underground Economy of the Pay Per Install PPI Business - Kevin Stevens.eng.lrc 68.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security.html 68.8 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling.eng.tsv 68.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Adam Laurie - Martin Hurfurt - BlueSnarfing the Risk from Digital Pickpockets.eng.srt 68.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/More Tricks for Defeating SSL - Moxie Marlinspike.eng.txt 68.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Ofir Arkin - Revolutionizing Operating System Fingerprinting.eng.txt 68.8 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/When Machines Can't Talk.eng.srt 68.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Keynote Blue to Red Traversing the Spectrum by Amanda Rousseau.eng.txt 68.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.jp.eng.txt 68.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection.eng.vtt 68.7 KB
- Black Hat DC/Black Hat Federal 2006/New Directions in Disk Forensics - Simson L. Garfinkel.eng.text 68.7 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Aggarwal.pdf 68.7 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/The Fault in Our Metrics Rethinking How We Measure Detection & Response.eng.srt 68.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Exploring the New World - Remote Exploitation of SQLite and Curl.eng.srt 68.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/From Zero to Secure in One Minute.eng.srt 68.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced Mac OS X Rootkits - Dino Dai Zovi.eng.vtt 68.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines.eng.srt 68.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.tsv 68.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 2-2 - Eric Schultze & Erik Birkholz.eng.text 68.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dr Mudge - Keynote.eng.text 68.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2 2).eng.srt 68.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Defending Against Malicious Application Compatibility Shims.eng.txt 68.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Windows Hooks of Death Kernel Attacks Through User-Mode Callbacks - Tarjei Mandt.eng.txt 68.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jericho and Munge - Hard Core Web Defacement Statistics Trends and Analysis.eng.txt 68.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.text 68.6 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Healthcare and New Federal Security Protections - Kate Borten.eng.text 68.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Paul Knight - Dynamic Routing Inside IPsec VPNs.eng.lrc 68.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.eng.srt 68.6 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Reflections on Trust in the Software Supply Chain.eng.srt 68.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David Litchfield - Compromising web Servers and Defensive Techniques.eng.vtt 68.6 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/President's Cup Cyber Competition Finding the Best Cyber Talent in the US Government.eng.srt 68.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Defense in Depth Winning in Spit of Yourself - Erik Schlutz, David Leblanc.eng.vtt 68.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Bouncer Land.eng.vtt 68.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSL And The Future of Authenticity - Moxie Marlinspike.eng.srt 68.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Researching Secrets - James Bamford.eng.lrc 68.6 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/How Supercomputer - scale Neural Network Models Apply to Defensive Cybersecurity Problems.eng.srt 68.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neurosurgery With Meterpreter - Colin Ames, David Kerb.eng.vtt 68.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/GRR - Find All the Badness, Collect All the Things.eng.srt 68.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rieback - RFID Malware Demystified.eng.tsv 68.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Constant Insecurity Things You Didn’t Know About (PECOFF) Portable Executable File Format - Mario Vuksan, Tomislav Pericin.eng.tsv 68.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Drop the SOAP Real World Web Service Testing for Web Hackers - Tom Eston, Joshua Abraham.eng.vtt 68.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeremiah Grossman - Phishing with Super Bait.txt 68.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting USB Devices with Arduino - Greg Ose.eng.text 68.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hiding In Plain Sight - Advances In Malware Covert Communication Channels.eng.srt 68.5 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Locknote Conclusions and Key Takeaways from Day 2.eng.srt 68.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Keynote - What Got Us Here Wont Get Us There.eng.vtt 68.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Himanshu Dwivedi - iSCI Insecure SCSI.eng.text 68.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More Signatures Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling - Ivan Ristic, Ofar Shezaf.eng.tsv 68.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Living in the RIA World Blurring the Line Between Web and Desktop Security - Alex Stamos, David Thiel, Justine Osborne.eng.text 68.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.eng.lrc 68.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/OSPF Configuration Management with SNMP.pdf 68.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/OSPF Configuration Management with SNMP.pdf 68.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Stealing with BGP - Steve Dugan.eng.srt 68.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Trustworthy Computing Update - Scott Clup.eng.lrc 68.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Marcus Ranum - Burglar Alarms and Booby Traps.eng.vtt 68.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Lee Kushner - The State of Employment in the Information Security Industry.eng.lrc 68.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Exploiting Lawful Interception to Wiretap the Internet.eng.srt 68.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Security Myths of Extended Validation SSL Certificates - Alexander Sotirov, Mike Zusman.eng.lrc 68.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Hate the Player, Hate the Game Inside the Android Patch Lifecycle - Anthony Lineberry, Tim Strazzere, Tim Wyatt.eng.srt 68.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/They Hacked Thousands of Cloud Accounts Then Sent Us Weird GIFs.eng.srt 68.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.eng.vtt 68.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Andrew Van der Stock - OWASP Guide.eng.vtt 68.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Errata Hits Puberty.eng.tsv 68.4 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Apple's Predicament NSPredicate Exploits on iOS and macOS.eng.srt 68.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Andrew Van der Stock - OWASP Guide.eng.lrc 68.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Security Wolf of Wall Street - Fighting Crime With High Frequency Classification and.eng.vtt 68.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/O'Connor - Vunls not So Embedded Sys.eng.vtt 68.4 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Holz - Catching Malware - Japanese.eng.tsv 68.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/FX - Design and Software Vulnerabilities In Embedded Systems.eng.lrc 68.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Highway to Hell Hacking Toll Systems - Nate Lawson.eng.srt 68.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Automated Detection of HPP Vulnerabilities in Web Applications - Marco Balduzzi.eng.txt 68.4 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Counter-Infiltration Future-Proof Counter Attacks Against Exploit Kit Infrastructure.eng.srt 68.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Shaun Clowes - Generic Technical Defences.eng.tsv 68.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The SCADA That Didn't Cry Wolf - Who s Really Attacking Your ICS Devices - 2 2.eng.lrc 68.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Java Every-Days - Exploiting Software Running on Three Billion Devices.eng.txt 68.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Researching Android Device Security with the Help of a Droid Army.eng.tsv 68.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Rain Forest Puppy - TBD.eng.text 68.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reviving Smart Card Analysis - Karsten Nohl, Chris Tarnovsky.eng.vtt 68.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court.eng.tsv 68.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Decompilers and Beyond - Ilfak Guilfanov.eng.tsv 68.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Teridian SoC Exploitation - Exploration of Harvard Architecture Smart Grid Systems.eng.tsv 68.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Underground Ecosystem of Credit Card Frauds.eng.tsv 68.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Vboot Kit Compromising Windows Vista Security - Nitin Kumar & Vipin Kumar.eng.tsv 68.3 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Vulnerabilities in Old Third-Party Software Components- Importance of Having SBoM for IoT OT Devices.eng.srt 68.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The WOMBAT API - Querying a global network of advanced honeypots - Stefano Zanero, Paolo Milani Comparetti.eng.lrc 68.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Greg Conti - Crafting a Tivo.eng.tsv 68.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Phil Zimmerman - My Next Big Project.lrc 68.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Hidden Risks Of Biometric Identifiers And How To Avoid Them-tagged.eng.txt 68.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hey You, Get Off of My Cloud - Application-Level Denial of Service Attacks and Defenses - Bryan Sullivan.eng.txt 68.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Power Analysis Attacks for Cheapskates.eng.srt 68.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rick Smith - The Biometrics Dilemma.eng.vtt 68.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware.eng.srt 68.3 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/X-Remote ICMP Based OS Fingerprinting Techniqu es - Ofir Arkin.eng.srt 68.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools.eng.txt 68.3 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Threat Hunting in Active Directory Environment.eng.srt 68.3 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/The Dark Side of EDR Repurpose EDR as an Offensive Tool.eng.srt 68.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet.eng.srt 68.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Nobody is Listening to Your Phone Calls. - Really A Debate and Discussion on the NSA s Activities.eng.vtt 68.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 1.eng.txt 68.2 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/From HAL to HALT Thwarting Skynet's Siblings in the GenAI Coding Era.eng.srt 68.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Exploiting Smart-Phone USB Connectivity For Fun And Profit - Angelos Stavrou & Zhaohui Wang.eng.tsv 68.2 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Into the Inbox Novel Email Spoofing Attack Patterns.eng.srt 68.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dominique-Brezinsski-A-Paranoid-Perspective-of-an-Interpreted-Language-English.eng.txt 68.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/More Tricks for Defeating SSL - Moxie Marlinspike.eng.lrc 68.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/When the Lights Go Out - Hacking Cisco EnergyWise.eng.srt 68.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Lawful Access Panel.eng.srt 68.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Trillions of Lines of Code and Counting Securing Applications At Scale - Jeremiah Grossman, Brad Arkin, Alex Hutton, Adrain Lane, John Johnson.eng.vtt 68.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Silberman and Butler - RAIDEv1.0.eng.vtt 68.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Detection of Firefox Extension Reuse Vulnerabilities.eng.lrc 68.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Tim Mullen - Neutralizing Nimda Automated Strikeback.eng.tsv 68.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/HTTP Request Smuggling in 2020 - New Variants, New Defenses and New Challenges.eng.srt 68.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Last Stage Of Delirium Research Group - UNIX Assembly Codes Development for Vulnerabilities.eng.vtt 68.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Ofir Arkin - Revolutionizing Operating System Fingerprinting.eng.lrc 68.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Just-In-Time Code Reuse - The More Things Change, the More They Stay the Same.eng.srt 68.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Robert Baird and Mike Lynn - Advanced 80211b Attack.eng.tsv 68.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Keynote - Devaluing Attack - Disincentivizing Threats Against The Next Billion Devices.eng.tsv 68.1 KB
- Black Hat DC/Black Hat Federal 2006/Combatting Symbian Malware - Jarno Niemelä.eng.srt 68.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Wheeler, Niel Mehta - Owning Anti-virus.eng.tsv 68.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Keynote - Cyber Conflicts - Challenging the Future - Pat Arnold.eng.vtt 68.1 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/These aren't the permissions you're looking for - Anthony Lineberry, Tim Wyatt, David Luke Richardson.eng.vtt 68.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/ret2dir - Deconstructing Kernel Isolation.eng.vtt 68.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/When the Lights Go Out - Hacking Cisco EnergyWise.eng.lrc 68.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/The Battle For Free Speech On The Internet.eng.srt 68.1 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Grossman - Hacking Intranet - English.eng.srt 68.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloudburst - Hacking 3D and Breaking Out of VMware - Kostya Kortchinsky.eng.srt 68.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.txt 68.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jericho and Munge - Hard Core Web Defacement Statistics Trends and Analysis.eng.lrc 68.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Windows Hooks of Death Kernel Attacks Through User-Mode Callbacks - Tarjei Mandt.eng.lrc 68.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Richard Thieme - Saying Whatever he Wants.eng.vtt 68.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.eng.srt 68.0 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Keeping Secrets Emerging Practice in Database Encryption.eng.srt 68.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bringing a Machete to the Amazon.eng.srt 68.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jason Garms - Defending Windows 2000 on the Internet.eng.vtt 68.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cache Side Channel Attack - Exploitability and Countermeasures.eng.srt 68.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/CANAPE - Bytes Your Bits.eng.txt 68.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/REST for the Wicked - Bryan Sullivan.eng.text 68.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bruce Potter - Bluetooth Defense Kit.eng.text 68.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Above My Pay Grade - Cyber Response at the National Level.eng.txt 68.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Phillip Hallam - Baker - Phishing - commiting Fraud in Public.eng.lrc 68.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roelof Temmingh and Haroon Meer - Setiri.eng.txt 67.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Browsers Gone Wild.eng.txt 67.9 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Politics of Vulnerability Reporting - Scott Blake.eng.txt 67.9 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Debug7 Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs.eng.srt 67.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Keynote Blue to Red Traversing the Spectrum by Amanda Rousseau.eng.lrc 67.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Neel Mehta - Advanced in ELF runtime binary encryption - Shiva.eng.srt 67.9 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/How I Learned to Stop Worrying and Build a Modern Detection & Response Program.eng.srt 67.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).eng.txt 67.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/(un)Smashing the Stack Overflows, Countermeasures, and the Real World - Shawn Moyer.eng.tsv 67.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Going Auth The Rails On A Crazy Train.eng.txt 67.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Aaron Higbee and Chris Davis - DC Phone Home.eng.tsv 67.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Defending Against Malicious Application Compatibility Shims.eng.lrc 67.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Defending Privacy at the U.S. Border - A Guide for Travelers Carrying Digita.eng.srt 67.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Len Sassman - The Anonymity Toolkit.eng.vtt 67.9 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Off Grid communications with Android - Meshing the mobile world.eng.vtt 67.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Defending Networks With Incomplete Information - A Machine Learning Approach.eng.vtt 67.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Factoring Dead - Preparing for Cyptopocalypse.eng.txt 67.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Davis, Ozier, Nebel, and Migues - Panel Discussion.eng.vtt 67.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.eng.srt 67.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/An Uninvited Guest Who Won't Go Home - Bill.eng.srt 67.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Beyond AutoRun - Exploiting Software Vulnerabilities with Removable Storage - Jon Larimer.eng.vtt 67.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking SMS - Zane Lackey, Luis Miras.eng.srt 67.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sour Pickles - Marco Slaviero.eng.text 67.8 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.tsv 67.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.jp.eng.lrc 67.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Deconstructing a Secure Processor - Christopher Tarnovsky.eng.text 67.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Gregory S Miles - Computer Forensics a Critical Process in Your Incident Response Plan.eng.tsv 67.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Java Every-Days - Exploiting Software Running on Three Billion Devices.eng.lrc 67.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/RFID Hacking - Live Free or RFID Hard.eng.txt 67.8 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Hidden Risks Of Biometric Identifiers And How To Avoid Them-tagged.eng.lrc 67.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/(In-)Security of Backend-As-A-Service.eng.srt 67.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Mitigation Improvements.eng.tsv 67.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Simple Nomad - Covering Your Tracks.eng.srt 67.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hey You, Get Off of My Cloud - Application-Level Denial of Service Attacks and Defenses - Bryan Sullivan.eng.lrc 67.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rich Murphy - Locking Down Your FreeBSD Install.eng.txt 67.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Exploitation Using A Malicious Service Set Identifier (SSID).eng.vtt 67.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Call Me - Gathering Threat Intelligence on Telephony Scams to Detect Fraud.eng.txt 67.7 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/A Decade After Stuxnet How Siemens S7 is Still an Attacker's Heaven.eng.srt 67.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Combating the Insider Threat at the FBI - Real-world Lessons Learned.eng.tsv 67.7 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses.eng.srt 67.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zanero - HostBased Anomaly Detection.eng.srt 67.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Stegospolit - Exploit Delivery With Steganography and Polyglots.eng.srt 67.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Internet is Broken Beyond Document.Cookie - Extreme Client-side Exploitation - Nathan McFeters, Rob Carter, John Heasman.eng.text 67.7 KB
- Black Hat USA/Black Hat USA 1998/pictures/00000077.JPG 67.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/The Kitten that Charmed Me The 9 Lives of a Nation State Attacker.eng.srt 67.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Black-box Assessment of Pseudorandom Algorithms.eng.srt 67.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/A Picture’s Worth Digital Image Analysis - Dr. Neal Krawetz.eng.text 67.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Behind The Mask The Agenda, Tricks, & Tactics Of The Federal Trade Commission.eng.srt 67.7 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Rutkowska - Subverting Vista - English.eng.txt 67.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Automated Detection of HPP Vulnerabilities in Web Applications - Marco Balduzzi.eng.lrc 67.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeremiah Grossman - Phishing with Super Bait.lrc 67.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/clock.pdf 67.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/I Just Found 10 Million SSNs - Alessandro Acquisti.eng.vtt 67.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Cantact - An Open Tool for Automative Exploitation.eng.vtt 67.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Kingpin and Brian Oblivian - Secure Hardware Design.eng.tsv 67.7 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 1-2.eng.tsv 67.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exchanging Demands.eng.srt 67.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/AppSec A-Z Reverse Engineering, Source Code Auditing, Fuzzing, and Exploitation - Jared DeMott.eng.tsv 67.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Internet Scale File Analysis.eng.srt 67.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.tsv 67.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/A practical attack against GPRS EDGE UMTS HSPA mobile data communications - David Perez & Jose Pico.eng.vtt 67.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Visual Forensic Analysis and Reverse Engineering of Binary Data - Greg Conti, Erik Dean.eng.vtt 67.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dai Zovi - Hardware Virtualization.eng.tsv 67.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Hacking Databases for Owning Your Data - Cesar Cerrudo & Esteban Martinez Fayo.eng.srt 67.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Going Auth The Rails On A Crazy Train.eng.vtt 67.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.text 67.5 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Terminal Server The Day of Reconing - Erik Birkholz, Clinton Mugge.eng.text 67.5 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/360 Anomaly Based Unsupervised Intrusion Detection - Stefano Zanero.eng.tsv 67.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jim Litchko - Total BS Security business - based systems security.eng.srt 67.5 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Kenneth-Geers-Hacking-in-a-Foreign-Language-A-Network-Security-Guide-to-Russia-and-Beyond-English.eng.srt 67.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Java Every-Days - Exploiting Software Running on Three Billion Devices.eng.srt 67.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ofir Arkin - Infrastructure Discovery.eng.tsv 67.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).eng.vtt 67.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Stranger Danger What Is The Risk From 3rd Party Libraries.eng.srt 67.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.jp.eng.lrc 67.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/The Case for a National Cybersecurity Safety Board.eng.srt 67.5 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/LogoFAIL Security Implications of Image Parsing During System Boot.eng.srt 67.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Lifecycle of a Phone Fraudster - Exposing Fraud Activity.eng.vtt 67.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sensepost - When The Tables Turn.eng.srt 67.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Investigating DDOS - Architecture Actors and Attribution.eng.srt 67.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Call Me - Gathering Threat Intelligence on Telephony Scams to Detect Fraud.eng.srt 67.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ian Clarke, Oskar Sandberg - Scalable searches.srt 67.5 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/REDIScovering HeadCrab - A Technical Analysis of a Novel Malware and the Mind Behind It.eng.srt 67.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard Clarke - Keynote National Strategy for Securing Cyberspace.eng.txt 67.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Finnigan - How to Unwrap Oracle.eng.srt 67.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Hunting for Bugs, Catching Dragons.eng.srt 67.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Attacking the Vista Heap - Ben Hawkes.eng.text 67.4 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Rutkowska - Subverting Vista - English.eng.vtt 67.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Linux Kernel Hidden Inside Windows 10.eng.tsv 67.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Wi-Fi Advanced Fuzzing - Laurent Butti.eng.srt 67.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Outer Limits - Hacking The Samsung Smart TV.eng.txt 67.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Davis, Ozier, Nebel, and Migues - Panel Discussion.eng.txt 67.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.text 67.4 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Computer Forensics With an Emphasis on the NT Operating System - Paul Mobley.eng.text 67.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Oracle Security II - David Litchfield.eng.txt 67.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Trustworthy Computing Update - Scott Clup.eng.srt 67.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Ofir Arkin - Revolutionizing Operating System Fingerprinting.eng.vtt 67.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 2.eng.txt 67.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jeffrey Prusan - Technical Security Countermeasures.eng.vtt 67.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 1.eng.lrc 67.4 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Web Cache Deception Attack.eng.srt 67.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Halvar Flake - Diff Navigate Audit.eng.txt 67.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/V9-Scholz-SIP Stack Fingerprinting.eng.srt 67.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Above My Pay Grade - Cyber Response at the National Level.eng.lrc 67.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Cantact - An Open Tool for Automative Exploitation.eng.tsv 67.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A New Breed of Rootkit The System Management Mode (SMM) Rootkit - Shawn Embleton, Sherri Sparks.eng.vtt 67.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Browsers Gone Wild.eng.lrc 67.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/CANAPE - Bytes Your Bits.eng.lrc 67.3 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Politics of Vulnerability Reporting - Scott Blake.eng.lrc 67.3 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Satoru-Koyama-Our-Security-Depends-on-Your-Security-Japanese.eng.tsv 67.3 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities.eng.srt 67.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sutton and MacManus - Punk 0de.eng.srt 67.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The State of Incident Response by Bruce Schneier.eng.srt 67.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Going Auth The Rails On A Crazy Train.eng.lrc 67.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Security Paradigm.eng.vtt 67.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Brian Martin and B K DeLong - Lessons Learned From attrition.org.eng.text 67.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Factoring Dead - Preparing for Cyptopocalypse.eng.lrc 67.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools.eng.lrc 67.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using EMET to Disable EMET.eng.txt 67.3 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/All Cops Are Broadcasting Breaking TETRA After Decades in the Shadows.eng.srt 67.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/I calc'd Calc - Exploiting Excel Online.eng.srt 67.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/IIS 6.0's Security Architecture - It's a Whole New World - Michael Muckin.eng.tsv 67.3 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dominique-Brezinsski-A-Paranoid-Perspective-of-an-Interpreted-Language-English.eng.lrc 67.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Laws of Vulnerabilities Research Version 2.0 Comparing Critical Infrastructure Industries - Panel.eng.vtt 67.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.eng.srt 67.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Mitigation in Windows 8.eng.text 67.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Larry Korba - Hope Hype and Horrors E - Commerce Explored.eng.srt 67.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Self-Driving and Connected Cars - Fooling Sensors and Tracking Drivers.eng.tsv 67.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerhard Eschelbeck - Law Vulnerabilities.eng.vtt 67.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).eng.lrc 67.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Factoring Dead - Preparing for Cyptopocalypse.eng.vtt 67.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-When-the-table-turn-Japanese.eng.tsv 67.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/RFID Hacking - Live Free or RFID Hard.eng.lrc 67.2 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Pre-built JOP Chains with the JOP ROCKET Bypassing DEP without ROP.eng.srt 67.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David Litchfield - Compromising web Servers and Defensive Techniques.eng.txt 67.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert J Hansen, Meredith L Patterson - Stopping Injection.txt 67.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unveiling the Open Source Visualization Engine for Busy Hackers.eng.vtt 67.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roelof Temmingh and Haroon Meer - Setiri.eng.lrc 67.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Simple Nomad - Modern NetWare Hacking.eng.tsv 67.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Call To Arms - A Tale of the Weaknesses of Current Client-Side XSS Filtering.eng.srt 67.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Insider Data Theft.eng.srt 67.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/kernel-stack.html 67.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Buying into the Bias - Why Vulnerability Statistics Suck.eng.txt 67.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Something to Do with Network Security - Dan Kaminsky.eng.vtt 67.1 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Satoru-Koyama-Our-Security-Depends-on-Your-Security-Japanese.eng.vtt 67.1 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/A Pain in the NAS Exploiting Cloud Connectivity to PWN Your NAS.eng.srt 67.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Carrying our Insecurities with Us The Risks of Implanted Medical Devices in Secure Spaces.eng.srt 67.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Multiplexed Wired Attack Surfaces.eng.vtt 67.1 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Botnet Population and Intelligence Gathering Techniques - Christopher Davis & David Dagon.eng.vtt 67.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Is Your Mental Health for Sale.eng.srt 67.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/VirtuallySecure - Oded Horovitz, Tal Garfinkel.eng.txt 67.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Disinformation At Scale Using GPT-3 Maliciously for Information Operations.eng.srt 67.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Power Analysis Attacks for Cheapskates.eng.tsv 67.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Miniaturization.eng.txt 67.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Next Generation Collaborative Reversing with Ida Pro and CollabREate - Chris Eagle, Tim Vidas.eng.srt 67.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Looking into the Eye of the Meter.eng.tsv 67.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/iPhone Privacy - Nicolas Seriot.eng.srt 67.0 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Leveraging Streaming-Based Outlier Detection and SliceLine to Stop Heavily Distributed Bot Attacks.eng.srt 67.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Compromising Confidential Compute, One Bug at a Time.eng.srt 67.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Funderbolt - Adventures in Thunderbolt DMA Attacks.eng.txt 67.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Mobile-Telephony Threats in Asia.eng.srt 67.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Smart Nest Thermostat - A Smart Spy in Your Home.eng.srt 67.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Joe Grand - A Historical Look at Hardware Token Compromises.eng.text 67.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Automating Incident Response.eng.srt 67.0 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/The Pool Party You Will Never Forget New Process Injection Techniques Using Windows Thread Pools.eng.srt 67.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Dynamic Fireware Analysis At Scale - A Case Study on Embedded Web Interfaces.eng.txt 67.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoglund - Hacking WOW Adv rootkit.eng.tsv 67.0 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/The Mass Effect How Opportunistic Workers Drift into Cybercrime.eng.srt 67.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Call Me - Gathering Threat Intelligence on Telephony Scams to Detect Fraud.eng.lrc 66.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Egale - Attacking Obfuscated Code with IDA pro.eng.json 66.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Inside Apple’s MDM Black Box - David Schultz.eng.text 66.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/David Bovee - VPN Architectures Looking at the Complete Picture.eng.text 66.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Sutton&Greene - The Art Of File Format Fuzz.eng.txt 66.9 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Bypass Surgery Abusing Content Delivery Networks With Ser-Side Request Forgery.eng.srt 66.9 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Rutkowska - Subverting Vista - English.eng.lrc 66.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/The Role of Non Obvious Relationships in the Foot Printing Process - Haroon Meer, Charl Van Der Walt.eng.vtt 66.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Keynote - Quest for the Holy Grail - Jerry Dixon.eng.text 66.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/The Role of Non Obvious Relationships in the Foot Printing Process - Haroon Meer, Charl Van Der Walt.eng.txt 66.9 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ira Winkler - Who are the Real Black Hats.eng.srt 66.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grossman - Hacking Intranet Outside.eng.srt 66.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Whose Internet Is It, Anyway - Andrew Fried, Richard Cox, Ben Butler.eng.text 66.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM.eng.vtt 66.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 1-2 - Lukas Grunwald.eng.txt 66.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Outer Limits - Hacking The Samsung Smart TV.eng.lrc 66.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/ClusterFuzz Fuzzing at Google Scale.eng.srt 66.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Padgett Peterson - Overlooked Local Attack Techniques.eng.srt 66.8 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Google Reimagined a Phone. It was Our Job to Red Team and Secure it..eng.srt 66.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Davis, Ozier, Nebel, and Migues - Panel Discussion.eng.lrc 66.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Open Sourcing Automotive Diagnostics.eng.tsv 66.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.eng.vtt 66.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Even The Lastpass Will Be Stolen, Deal With It.eng.vtt 66.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/NFC Analysis.eng.tsv 66.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Dex Education.eng.srt 66.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Simple Nomad - Strategies for Defeating Distributed Attacks.eng.srt 66.8 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Peter Shipley - Securing your Network with Free Utilities.eng.txt 66.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Schulman - Phishing with Asterisk.eng.vtt 66.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Okatani - Keynote - Japanese.eng.tsv 66.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/FX - The Blackberry Case.eng.srt 66.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Conducting a Successful False Flag Cyber Operation (Blame it on China).eng.tsv 66.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Performance Management - Best Practices.pdf 66.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Performance Management - Best Practices.pdf 66.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David LeBlanc - Real World Techniques in Network Security Management.eng.txt 66.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 1.eng.txt 66.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Advanced CAN Injection Techniques for Vehicle Networks.eng.tsv 66.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/I Just Found 10 Million SSNs - Alessandro Acquisti.eng.tsv 66.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.lrc 66.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The M2M Risk Assessment Guide, a Cyber Fast Track Project.eng.tsv 66.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Catching Malware En Masse - DNS and IP Style.eng.tsv 66.8 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Privacy-by-Design for the Security Practitioner by Richard Chow.eng.srt 66.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jed Haile - Hogwash.eng.tsv 66.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Design Issues and Software Vulnerabilities in Embedded Systems - FX.eng.text 66.8 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling.eng.vtt 66.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/CloudBots - Harvesting Crypto Coins Like a Botnet Farmer.eng.srt 66.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA.eng.tsv 66.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Classification and Detection of Application Backdoors - Chris Wysopal.eng.txt 66.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Sherma - Web Application Session Strength.eng.tsv 66.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Discovering Hidden Properties to Attack the Node.js Ecosystem.eng.srt 66.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Automated Human Vulnerability Scanning With AVA.eng.srt 66.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/XSS Street-Fight - The Only Rule Is There Are No Rules - Ryan Barnett.eng.text 66.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A New Breed of Rootkit The System Management Mode (SMM) Rootkit - Shawn Embleton, Sherri Sparks.eng.tsv 66.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacks-English.eng.tsv 66.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rich Murphy - Locking Down Your FreeBSD Install.eng.lrc 66.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/DPTrace - Dual Purpose Trace for Exploitability Analysis of Program Crashes.eng.srt 66.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex - Shreeraj Shah.eng.tsv 66.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Paul Wouters - IPSEC Opportunistic Encryption using DNSSEC.eng.vtt 66.7 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Black Hat Europe 2018 Keynote.eng.srt 66.7 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Practically - exploitable Cryptographic - Vulnerabilities in Matrix.eng.srt 66.7 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Cyber Claims Outlook 2024 Trends, Threats, and Tomorrow's Challenges.eng.srt 66.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/V9-Scholz-SIP Stack Fingerprinting.eng.txt 66.6 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.eng.srt 66.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dominique Brezinski - Building a Forensics Toolkit That Will Protect You from Evil Influences.eng.txt 66.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/The Most Secure Browser Pwning Chrome from 2016 to 2019.eng.srt 66.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Ops 2008 - Dan Kaminsky.eng.text 66.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Lance Spitzner - Honeypots.eng.text 66.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Bringing A Cannon To A Knife Fight.eng.srt 66.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fighting Russian Cybercrime Mobsters - Dmitri Alperovitch.eng.text 66.6 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Overcoming State Finding Baseband Vulnerabilities by Fuzzing Layer-2.eng.srt 66.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Bochspwn - Identifying 0-Days via System-Wide Memory Access Pattern Analysis.eng.vtt 66.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Fredric Bret - Mounet - Automated Detection of COM Vulnerabilities.eng.vtt 66.6 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Gotta Cache Em All Bending the Rules of Web Cache Exploitation.eng.srt 66.6 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/The Other Side of Information Security - Wilco van Grinkel.eng.srt 66.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Shelters or Windmills - The Struggle For Power and Information Advantage.eng.vtt 66.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacking-Japanese-Translated.eng.tsv 66.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David Litchfield - Compromising web Servers and Defensive Techniques.eng.lrc 66.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Silently Breaking ASLR In The Cloud.eng.srt 66.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dan Kaminsky - the Black Ops of DNS.eng.txt 66.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.jp.eng.srt 66.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Computer Crime Year in Review - Jennifer Granick.eng.text 66.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Buying into the Bias - Why Vulnerability Statistics Suck.eng.lrc 66.5 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Compromising LLMs The Advent of AI Malware.eng.srt 66.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Kret - Nobodys Anonymous - Tracking Spam and Covert Channels.eng.vtt 66.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Android Security State Of The Union.eng.srt 66.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/ElectroVolt Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron.eng.srt 66.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Practical New Developments in The Breach Attack.eng.srt 66.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/hAFL1 Our Journey of Fuzzing Hyper-V and Discovering a 0-Day.eng.srt 66.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Stay Out of the Kitchen - A DLP Security Bake-Off.eng.txt 66.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pay No Attention to That Hacker Behind the Curtain - A Look Inside the Black Hat Network.eng.vtt 66.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Passive Bluetooth Monitoring.eng.vtt 66.5 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Security is not a four letter word - Michael Davis.eng.srt 66.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Ruby for Pentesters - Michael Tracy, Chris Rohlf, Eric Monti.eng.tsv 66.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Silberman and Butler - RAIDEv1.0.eng.tsv 66.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Deepfake Social Engineering Creating a Framework for Synthetic Media Social Engineering.eng.srt 66.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss, Gillman Louie - Welcome Keynote.mp4.vtt 66.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/48 Dirty Little Secrets Cryptographers Don't Want You To Know.eng.tsv 66.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.jp.eng.srt 66.4 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Plenty of Coppers in Change - Stuart Hyde.eng.txt 66.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eric Schultze and George Kurtz - Over the Router, Through the Firewall, to Grandma's House We Go.eng.txt 66.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Practical Defenses Against Adversarial Machine Learning.eng.srt 66.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Funderbolt - Adventures in Thunderbolt DMA Attacks.eng.lrc 66.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Applied Black Op Networking on Windows XP - Dan Kaminsky.eng.tsv 66.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacks to SAP Web Applications - Your crown jewels online - Mariano Nunez Di Croce.eng.srt 66.4 KB
- Black Hat USA/Black Hat USA 2002/presentations/litchfield-bh-us-02.pdf 66.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/QuickLook/Thumbnail.jpg 66.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/InfoSec Philosophies for the Corrupt Economy.eng.srt 66.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/DTRACE The Reverse Engineer’s Unexpected Swiss Army Knife - David Weston, Tiller Beauchamp.eng.vtt 66.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 2.eng.lrc 66.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Attacking Samsung Galaxy A - Boot Chain, and Beyond.eng.srt 66.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Cyber Judo Offensive Cyber Defense.eng.srt 66.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hiring Trends in InfoSec.eng.text 66.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Lambert - Sec Engineer in win Vista.eng.vtt 66.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gerard Eschelbeck - The laws of Vulnerabilities for Internal Networks.eng.txt 66.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Lamphone Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps.eng.srt 66.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mike Beekey - ARP Vulnerabilities Indefensible Local Network Attacks.eng.tsv 66.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/The Role of Non Obvious Relationships in the Foot Printing Process - Haroon Meer, Charl Van Der Walt.eng.lrc 66.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Unmanned Aerial Vehicles - Exploit Automation with the Metasploit Framework - James Lee.eng.srt 66.4 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing.eng.srt 66.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/FX - Design and Software Vulnerabilities In Embedded Systems.eng.vtt 66.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How Smartcard Payment Systems Fail.eng.tsv 66.3 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Cloudy With a Chance of Exploits Compromising Critical Infrastructure Through IIoT Cloud Solutions.eng.srt 66.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Forgotten World - Corporate Business Application Systems - Alexander Polyakov.eng.tsv 66.3 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation.eng.srt 66.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Spradlin - Auditing data Access.eng.srt 66.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hopping on the CAN Bus.eng.srt 66.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Windows Downdate Downgrade Attacks Using Windows Updates.eng.srt 66.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Dynamic Fireware Analysis At Scale - A Case Study on Embedded Web Interfaces.eng.lrc 66.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using EMET to Disable EMET.eng.lrc 66.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Halvar Flake - Diff Navigate Audit.eng.lrc 66.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/IMP4GT IMPersonation Attacks in 4G NeTworks.eng.srt 66.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploiting Rich Content - Riley Hassell.eng.vtt 66.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Smartphone s Apps Are Not That Smart - Insecure Development Practices.eng.vtt 66.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard Clarke - Keynote National Strategy for Securing Cyberspace.eng.lrc 66.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/VoIP Wars - the Phreakers Awaken.eng.srt 66.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert J Hansen, Meredith L Patterson - Stopping Injection.lrc 66.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Mortman, Others - National ID Debate.vtt 66.2 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Inside Android's SafetyNet Attestation.eng.txt 66.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Kubernetes Privilege Escalation Container Escape == Cluster Admin.eng.srt 66.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.eng.srt 66.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Metasploit Autopsy - Reconstructing the Crime Scene - Peter Silberman, Steve Davis.eng.text 66.2 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Sweet Dreams Abusing Sleep Mode to Break Wi-Fi Encryption and Disrupt WPA2 3 Networks.eng.srt 66.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Oracle Security II - David Litchfield.eng.lrc 66.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Miniaturization.eng.lrc 66.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David LeBlanc - Real World Techniques in Network Security Management.eng.lrc 66.2 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Plenty of Coppers in Change - Stuart Hyde.eng.vtt 66.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/When Lightning Strikes Thrice Breaking Thunderbolt 3 Security.eng.srt 66.2 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Inside Android's SafetyNet Attestation.eng.vtt 66.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Concurrency Attacks in Web Applications - Scott Stender, Alexander Vidergar.eng.text 66.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Dynamic Taint Propagation Finding Vulnerabilities Without Attacking - Brian Chess & Jacob West.eng.vtt 66.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Get Rich or Die Trying - Making Money on the Web, The Black Hat Way - Jeremiah Grossman, Arian Evans.eng.tsv 66.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Baseband Apocalypse - All Your Baseband Are Belong To Us - Ralf-Philipp Weinmann.eng.tsv 66.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Demystifying Modern Windows Rootkits.eng.srt 66.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Botnet Population and Intelligence Gathering Techniques - Christopher Davis & David Dagon.eng.txt 66.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Murakami - Hypervisor - IPS.jp.eng.vtt 66.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How Smartcard Payment Systems Fail.eng.vtt 66.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Keynote - Cyber Conflicts - Challenging the Future - Pat Arnold.eng.txt 66.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Go With the Flow Enforcing Program Behavior Through Syscall Sequences and Origins.eng.srt 66.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Even The Lastpass Will Be Stolen, Deal With It.eng.txt 66.1 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with James Forshaw on CANAPE.eng.json 66.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/GameOver Zeus Badguys And Backends.eng.srt 66.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/The Little Pump Gauge That Could Attacks Against Gas Pump Monitoring Systems.eng.srt 66.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Nitesh Dhanjani - Justin Clark.eng.vtt 66.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 1-2 - Lukas Grunwald.eng.lrc 66.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Black Ops of PKI - Dan Kaminski.eng.vtt 66.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/There’s a Fox in the Henhouse - Jeff Williams.eng.text 66.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/VirtuallySecure - Oded Horovitz, Tal Garfinkel.eng.lrc 66.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.eng.srt 66.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Checkmate with Denial of Service - Tom Brennan, Ryan Barnett.eng.vtt 66.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/SensePost - Putting Tea back into CyberTerrorism.eng.vtt 66.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gbadegesin - TCPIP in WIN Vista.eng.vtt 66.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions.eng.srt 66.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.eng.vtt 66.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Active & Passive Fingerprinting of Microsoft Based Operating Systems using the ICMP protocol - Ofir Arkin.eng.vtt 66.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Marshall Beddoe and Chris Abad - The Siphon Project.eng.vtt 66.1 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Making Windows Exploits More Reliable - Kostya Kortchinsky.eng.vtt 66.1 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Classification and Detection of Application Backdoors - Chris Wysopal.eng.lrc 66.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Next Level Cheating and Leveling Up Mitigations.eng.srt 66.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Burning Bridges - Stopping Lateral Movement via the RPC Firewall.eng.srt 66.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Reverse DNS Tunneling Shellcode - Ty Miller.eng.text 66.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reversing and Exploiting an Apple Firmware Update - K. Chen.eng.text 66.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Scott Blake - The Pros and Cons of Hiring Hackers.eng.srt 66.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Sutton&Greene - The Art Of File Format Fuzz.eng.lrc 66.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Switches Get Stitches.eng.srt 66.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jennifer Grannick - Forensic Issues in Hacker Prosecutions.eng.vtt 66.0 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/HARry Parser and the Cursed Tracker Breaking the Spell of Online Data Collection.eng.srt 66.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 1.eng.lrc 66.0 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Nicolas Fischbach - DDoS Mitigation and Analysis at the Infrastructure Level.eng.txt 65.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ejovi Nuwere - SIP Format Fuzz in Voip.tsv 65.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Fireside Chat - Debora Plunkett and Jeff Moss.eng.txt 65.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/JD Glaser - Hacking With Executives.eng.txt 65.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/V9-Scholz-SIP Stack Fingerprinting.eng.lrc 65.9 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/When (Remote) Shells Fall Into The Same Hole Rooting DrayTek Routers Before Attackers Can.eng.srt 65.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/ERROR BadAlloc - Broken Memory Allocators Led to Millions of Vulnerable IoT & Embedded Devices.eng.srt 65.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploiting Rich Content - Riley Hassell.eng.txt 65.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Four Types of Locks - Deviant Ollam.eng.text 65.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Legal Pitfalls to Avoid in Security Incidents.eng.srt 65.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Library of Sparta.eng.srt 65.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/The Big Picture.eng.text 65.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Automating Linux Malware Analysis Using Limon Sandbox.eng.tsv 65.9 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Building a Defensive Framework for Medical Device Security.eng.srt 65.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Fireside Chat - Debora Plunkett and Jeff Moss.eng.srt 65.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Kitchen's Finally Burned Down - DLP Security Bakeoff.eng.srt 65.9 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SCTPscan - Finding Entry Points to SS7 Networks & Telecommunication Backbones - Philippe Langlois.eng.srt 65.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.eng.tsv 65.9 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Evils in the Sparse Texture Memory Exploit Kernel Based on Undefined Behaviors of Graphic APIs.eng.srt 65.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Mobile-Telephony Threats in Asia.eng.txt 65.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Seth Fogie - Pocket PC Abuse.eng.txt 65.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017.eng.srt 65.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jennifer Grannick - Forensic Issues in Hacker Prosecutions.eng.tsv 65.9 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Active & Passive Fingerprinting of Microsoft Based Operating Systems using the ICMP protocol - Ofir Arkin.eng.txt 65.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacking Oracle Web Applications with Metasploit - Chris Gates aka carnal0wnage.eng.tsv 65.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ofir Arkin - Introducing X Playing Tricks with ICMP.eng.srt 65.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stuxnet Redux - Malware Attribution and Lessons Learned - Taking the guesswork out of cyber attribution - Tom Parker.eng.vtt 65.8 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Plenty of Coppers in Change - Stuart Hyde.eng.lrc 65.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Beyond Files Forensic OWADE Cloud Based Forensic - Elie Bursztein.eng.vtt 65.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BlackOps.eng.txt 65.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.vtt 65.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Potter - Java Card 101.eng.text 65.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Let the Cache Cache and Let the WebAssembly Assemble Knockin' on Chrome's Shell.eng.srt 65.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Schneier - Keynote, Following the Money Security Proxies and Agenda.eng.srt 65.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dominique Brezinski - Building a Forensics Toolkit That Will Protect You from Evil Influences.eng.lrc 65.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Router Exploitation - FX.eng.txt 65.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eric Schultze and George Kurtz - Over the Router, Through the Firewall, to Grandma's House We Go.eng.lrc 65.8 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.srt 65.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.eng.tsv 65.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/WebTracking for You.eng.vtt 65.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.jp.eng.tsv 65.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Internet Special Ops - Andrew Fried, Paul Vixie, Christopher Lee.eng.vtt 65.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Retrospective on the Use of Export Cryptography.eng.srt 65.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Martin Roesch - Snort.eng.text 65.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Stay Out of the Kitchen - A DLP Security Bake-Off.eng.lrc 65.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Unknown-English to Japanese.eng.txt 65.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Using Guided Missiles in Drive-Bys - Automatic Browser Fingerprinting - Egypt.eng.tsv 65.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/format-string/exploit-fs.html 65.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mark Kadrich - Intrusion Detection in High Speed Networks.eng.srt 65.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Scott Culp - Building a Security Response Process.eng.tsv 65.7 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Inside Android's SafetyNet Attestation.eng.lrc 65.7 KB
- Black Hat DC/Black Hat Federal 2006/An Advanced NTFS Data Hiding Technique - Irby Thompson, Matthew Monroe.eng.text 65.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Peter Shipley - Securing your Network with Free Utilities.eng.lrc 65.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Hunting Invisible Salamanders Cryptographic (in)Security with Attacker-Controlled Keys.eng.srt 65.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dan Kaminsky - the Black Ops of DNS.eng.lrc 65.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Group Talk.eng.vtt 65.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unmasking You - Joshua Abraham, Robert Hansen.eng.srt 65.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/eye-52795.jpg 65.6 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Botnet Population and Intelligence Gathering Techniques - Christopher Davis & David Dagon.eng.lrc 65.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Nobody is Listening to Your Phone Calls. - Really A Debate and Discussion on the NSA s Activities.eng.tsv 65.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/VOIP Wars - Destroying Jar Jar Lync.eng.srt 65.6 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/LadderLeak Breaking ECDSA with Less than One Bit of Nonce Leakage.eng.srt 65.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding IMSI Privacy.eng.srt 65.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits.eng.txt 65.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.eng.vtt 65.6 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/The Black Hat Europe NOC Report.eng.srt 65.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Arm IDA and Cross Check Reversing the Boeing 787's Core Network.eng.srt 65.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Keynote - Cyber Conflicts - Challenging the Future - Pat Arnold.eng.lrc 65.6 KB
- Black Hat DC/Black Hat Federal 2006/Nematodes - Dave Aitel.eng.txt 65.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Keynote Blue to Red Traversing the Spectrum by Amanda Rousseau.eng.srt 65.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss and Panel - CISO QA.tsv 65.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - The Seven Axioms of Security.eng.srt 65.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss, Gillman Louie - Welcome Keynote.mp4.tsv 65.6 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Input Output - Syslog (iOS) Obtaining Data From Locked iOS Devices via Live Monitoring.eng.srt 65.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Physical Security in a Networked World - Video Surveillance, Video Analytics, and you - Joshua A Marpet.eng.txt 65.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gerard Eschelbeck - The laws of Vulnerabilities for Internal Networks.eng.lrc 65.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/State of the Art Post Exploitation in Hardened PHP Environments - Stefan Esser.eng.tsv 65.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Glitched on Earth by Humans A Black - Box Security Evaluation of the SpaceX Starlink User Terminal.eng.srt 65.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 1-2 - Lukas Grunwald.eng.srt 65.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP 2 & Quic - Teaching Good Protocols to Do Bad Things.eng.srt 65.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Your Mind - Legal Status, Rights and Securing Yourself - Tiffany Rad & James Arlen.eng.text 65.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Scala Security - Examining the Play and LiftWeb Frameworks.eng.srt 65.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000.htm 65.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Torturing OpenSSL.eng.srt 65.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Rustock Botnet Takedown - Julia Wolf, Alex Lanstein.eng.tsv 65.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Faux Disk Encryption Realities Of Secure Storage On Mobile Devices.eng.srt 65.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Multivariate Solutions To Emerging Passive DNS Challenges.eng.srt 65.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hiding In Plain Sight - Advances In Malware Covert Communication Channels.eng.txt 65.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybercrime in The Deep Web.eng.srt 65.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Even The Lastpass Will Be Stolen, Deal With It.eng.lrc 65.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Security Paradigm.eng.tsv 65.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Endrun - Secure Digital Communications for Our Modern Dystopia.eng.vtt 65.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Practical Windows XP2003 Heap Exploitation - John McDonald, Chris Valasek.eng.vtt 65.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 2-2 - Panel.eng.text 65.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Are Your Backups Still Immutable, Even Though You Can't Access Them.eng.srt 65.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Allen Harper, Edward Balas - The Birth of roo.eng.vtt 65.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Closing Session.eng.txt 65.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Solutum Cumulus Mediocris by Eldar Marcussen.eng.srt 65.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Insider's Guide to Cyber-Insurance and Security Guarantees.eng.txt 65.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.eng.vtt 65.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017.eng.tsv 65.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Panel - Competitive Intelligence.eng.vtt 65.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/O'Connor - Vunls not So Embedded Sys.eng.tsv 65.3 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Politics of Vulnerability Reporting - Scott Blake.eng.vtt 65.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Siberman Richard Johnson - Comparison Buffer Overflow Prevention Implementations and Weaknesses.eng.vtt 65.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal - Fran Brown, Rob Ragan.eng.text 65.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moniz and Moore - 6 Degrees XSSploit.eng.vtt 65.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning the Routing Table - New OSPF Attacks - Gabi Nakibly.eng.srt 65.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Forgotten World - Corporate Business Application Systems - Alexander Polyakov.eng.vtt 65.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/HTTP 2 The Sequel is Always Worse.eng.srt 65.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/SSL TLS Interception Proxies and Transitive Trust.eng.vtt 65.3 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Browser - Powered Desync Attacks A New Frontier in HTTP Request Smuggling.eng.srt 65.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Heap Feng Shui in JavaScript - Alexander Sotirov.eng.tsv 65.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Sutterfield - Enterprise security for converging technologies.eng.text 65.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Spy-Sense Spyware Tool for Executing Stealthy Exploits Against Sensor Networks - Thanassis Giannetsos.eng.vtt 65.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Natural Security - Jeff Moss, Rod Beckström.eng.tsv 65.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Active & Passive Fingerprinting of Microsoft Based Operating Systems using the ICMP protocol - Ofir Arkin.eng.lrc 65.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Appliances - Ironic exploitation of security products.eng.tsv 65.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring.eng.tsv 65.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BlackOps.eng.lrc 65.3 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Murakami - Hypervisor - IPS.jp.eng.tsv 65.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Data Mining a Mountain of Zero Day Vulnerabilities.eng.tsv 65.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Security Myths of Extended Validation SSL Certificates - Alexander Sotirov, Mike Zusman.eng.srt 65.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Post Memory Corruption Memory Analysis - Jonathan Brossard.eng.vtt 65.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Chris Eng - Breaking Crypto.eng.vtt 65.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/JD Glaser - Hacking With Executives.eng.lrc 65.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploiting Rich Content - Riley Hassell.eng.lrc 65.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Interpreter Exploitation - Pointer Inference and JIT Spraying - Dion.eng.vtt 65.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeremiah Grossman - Phishing with Super Bait.vtt 65.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/DTRACE The Reverse Engineer’s Unexpected Swiss Army Knife - David Weston, Tiller Beauchamp.eng.txt 65.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 1.eng.srt 65.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Spy-Sense Spyware Tool for Executing Stealthy Exploits Against Sensor Networks - Thanassis Giannetsos.eng.txt 65.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Dude, Where's My Laptop.eng.tsv 65.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Adam Shostack - Identity, Economics, Security, and Terrorism.eng.txt 65.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Security Failures in Secure Devices - Christopher Tarnovsky.eng.vtt 65.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Measuring Adversary Costs to Exploit Commercial Software.eng.srt 65.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.eng.text 65.2 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.srt 65.2 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Adam Shostack - Will People Ever Pay for Privacy.eng.srt 65.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eric Schultze and George Kurtz - Over the Router, Through the Firewall, to Grandma's House We Go.eng.vtt 65.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Security Failures in Secure Devices - Christopher Tarnovsky.eng.tsv 65.1 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Real - World Detection Evasion Techniques in the Cloud.eng.srt 65.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Seth Fogie - Pocket PC Abuse.eng.lrc 65.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 1-2 - John Benson.eng.srt 65.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Mark Eckenwiler - USA Patriot Act and Criminal Investigations.eng.text 65.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Android - One Root to Own them All.eng.text 65.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Mobile-Telephony Threats in Asia.eng.lrc 65.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/A practical attack against GPRS EDGE UMTS HSPA mobile data communications - David Perez & Jose Pico.eng.tsv 65.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lights Off The Darkness of the Smart Meters.eng.vtt 65.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Rooting SIM cards.eng.srt 65.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.eng.txt 65.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Tzi-cker Chiueh - Program Semantics Aware Intrusion Detection.eng.tsv 65.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Stay Out of the Kitchen - A DLP Security Bake-Off.eng.srt 65.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Fireside Chat - Debora Plunkett and Jeff Moss.eng.lrc 65.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chris Paget - Click to Continue Shatter Attacks on Win32.eng.vtt 65.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dennis Groves and Bill Pennington - Web Application Security.eng.text 65.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zanero - HostBased Anomaly Detection.eng.txt 65.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloudburst - Hacking 3D and Breaking Out of VMware - Kostya Kortchinsky.eng.txt 65.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Predicting Susceptibility to Socialbots on Twitter.eng.tsv 65.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Who's Really Attacking Your ICS Devices.eng.vtt 65.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A 16-bit Rootkit and Second Generation Zigbee Chips -Travis Goodspeed.eng.vtt 65.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Becoming Cybersecurity Bilingual Effective Communication for Hackers.eng.srt 65.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/The Way to Android Root Exploiting Your GPU on Smartphone.eng.srt 65.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Brent Huston - Appliance Firewalls a detailed review.eng.txt 65.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Closing Session.eng.lrc 65.0 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Enter Sandbox.eng.srt 65.0 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/JS Suicide - Using JavaScript Security Features to Kill JS Security by Ahamed Nafeez.eng.srt 65.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Physical Security in a Networked World - Video Surveillance, Video Analytics, and you - Joshua A Marpet.eng.lrc 65.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Multiple Operation System Vurnarability.eng.srt 65.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lessons Learned from Eight Years of Breaking Hypervisors.eng.srt 65.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jeremy Rauch - The Security of Network Devices.eng.text 65.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.jp.eng.txt 65.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Defending Privacy at the U.S. Border - A Guide for Travelers Carrying Digita.eng.txt 65.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Malware.eng.vtt 65.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Tao of Hardware the Te of Implants.eng.vtt 65.0 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Adversary Detection Pipelines Finally Making Your Threat Intel Useful.eng.srt 65.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/VoIP Wars - Attack of the Cisco Phones.eng.srt 65.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Defending Against Malicious Application Compatibility Shims.eng.vtt 65.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Router Exploitation - FX.eng.lrc 65.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits.eng.lrc 65.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Automated Detection of HPP Vulnerabilities in Web Applications - Marco Balduzzi.eng.vtt 65.0 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Nicolas Fischbach - DDoS Mitigation and Analysis at the Infrastructure Level.eng.lrc 65.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Adam Shostack - Identity, Economics, Security, and Terrorism.eng.vtt 65.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rich Murphy - Locking Down Your FreeBSD Install.eng.vtt 64.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Threats.eng.vtt 64.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Abusing Bleeding Edge Web Standards for Appsec Glory.eng.srt 64.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-van-der-Walt-When-the-Tables-Turn-English.eng.tsv 64.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 1.eng.srt 64.9 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Data Driven Threat Intelligence Metrics On Indicator Dissemination And Sharing.eng.srt 64.9 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Day 1 Keynote National Cyber-Aggression and Private-Sector Internet Infrastructure.eng.srt 64.9 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Shelters or Windmills - The Struggle For Power and Information Advantage.eng.txt 64.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Windows Heap-backed Pool The Good, the Bad, and the Encoded.eng.srt 64.9 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Process Injection Breaking All macOS Security Layers With a Single Vulnerability.eng.srt 64.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Hunting Flaws in MS SQL Server - Cesar Cerrudo, Aaron Newman.eng.txt 64.9 KB
- Black Hat DC/Black Hat Federal 2006/How to Automatically Sandbox IIS With Zero False Positive and Negative - Tzi-cker Chiueh (partial).eng.tsv 64.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/NateSmith-StackSmashingPaper.txt 64.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Smashing the ML Stack for Fun and Lawsuits.eng.srt 64.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques.eng.srt 64.9 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Marcus Carey on Vsploit..eng.json 64.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Router Exploitation - FX.eng.srt 64.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Breaking Access Controls with Blekey.eng.srt 64.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Insider's Guide to Cyber-Insurance and Security Guarantees.eng.lrc 64.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.eng.srt 64.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Exploiting Lawful Interception to Wiretap the Internet.eng.txt 64.8 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/No One Is Entitled to Their Own Facts, Except in Cybersecurity.eng.srt 64.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Sugiura - Winny Poo - Japanese.eng.tsv 64.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.jp.eng.vtt 64.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Scott Culp - Building a Security Response Process.eng.vtt 64.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hiding In Plain Sight - Advances In Malware Covert Communication Channels.eng.lrc 64.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluetooth v2.1 - A New Security Infrastructure and New Vulnerabilities - Andrew Lindell.eng.text 64.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Poacher Turned Gamekeeper - Lessons Learned from Eight Years of Breaking Hypervisors.eng.srt 64.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Bouncer Land.eng.tsv 64.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Defending Networks With Incomplete Information - A Machine Learning Approach.eng.tsv 64.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Anti-Forensics The Rootkit Connection - Bill Blunden.eng.text 64.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Beyond Files Forensic OWADE Cloud Based Forensic - Elie Bursztein.eng.txt 64.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sotirov - HotPatching3rd Party Patch.eng.txt 64.8 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Wi-Fi Brokering.eng.srt 64.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/iRK - Crafting OS X Kernel Rootkits - Jesse D’Aguanno.eng.srt 64.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them.eng.txt 64.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Security Wolf of Wall Street - Fighting Crime With High Frequency Classification and.eng.txt 64.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-English.eng.text 64.7 KB
- Black Hat DC/Black Hat Federal 2006/Nematodes - Dave Aitel.eng.lrc 64.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Taking Event Correlation With You.eng.srt 64.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hunting the Shadows - In-Depth Analysis of Escalated APT Attacks.eng.srt 64.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Unknown-English to Japanese.eng.lrc 64.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/DTRACE The Reverse Engineer’s Unexpected Swiss Army Knife - David Weston, Tiller Beauchamp.eng.lrc 64.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/K K Mookhey - Evasion and Detection of Web Application Tactics.eng.srt 64.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Flip Feng Shui - Rowhammering the VM's Isolation.eng.srt 64.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Arm'd and Dangerous.eng.srt 64.7 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Defending Your Network with Kerberos - Rooster & J.D. Glaser.eng.srt 64.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Spy-Sense Spyware Tool for Executing Stealthy Exploits Against Sensor Networks - Thanassis Giannetsos.eng.lrc 64.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.jp.eng.srt 64.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Marinescu - WIN Vista Heap Mgmt.eng.vtt 64.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/VC Panel Security Business Strategies During a Recession - Panel.eng.text 64.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.jp.eng.srt 64.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud.eng.vtt 64.6 KB
- Black Hat DC/Black Hat Federal 2006/Implementing and Detecting An ACPI BIOS Rootkit - John Heasman (bad audio quality).eng.txt 64.6 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Deleting Your Domain Preventing Data Leaks at TLD Scale.eng.srt 64.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Just-In-Time Code Reuse - The More Things Change, the More They Stay the Same.eng.txt 64.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Constant Insecurity Things You Didn’t Know About (PECOFF) Portable Executable File Format - Mario Vuksan, Tomislav Pericin.eng.vtt 64.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Abusing Software Defined Networks.eng.vtt 64.6 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Over the Air Compromise of Modern Volkswagen Group Vehicles.eng.srt 64.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Adam Shostack - Identity, Economics, Security, and Terrorism.eng.lrc 64.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Prevalent Characteristics in Modern Malware.eng.srt 64.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/VOIP Wars - Destroying Jar Jar Lync.eng.txt 64.6 KB
- Black Hat DC/Black Hat Federal 2006/Combatting Symbian Malware - Jarno Niemelä.eng.txt 64.6 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Exploring a New Class of Kernel Exploit Primitive.eng.srt 64.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking BHAD - Abusing Belkin Home Automation Devices.eng.tsv 64.6 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 1-2.eng.tsv 64.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Andrea Matwyshyn - Introduction to Corporate Information Security Law.eng.text 64.6 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Crashing Your Way to Medium-IL Exploiting the PDB Parser for Privilege Escalation.eng.srt 64.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jaya Baloo - Lawful Interception of IP the European Context.eng.text 64.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The WOMBAT API - Querying a global network of advanced honeypots - Stefano Zanero, Paolo Milani Comparetti.eng.vtt 64.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Spy-jacking the Booters.eng.tsv 64.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.eng.txt 64.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Language Properties of Phone Scammers - Cyberdefense At the Level of the Human.eng.txt 64.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Deploying Cisco Unity in Diverse Messaging Environments.pdf 64.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Deploying Cisco Unity in Diverse Messaging Environments.pdf 64.5 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/How can the Security Researcher Community Work Better for the Common Good - Jeff Moss, Roger Cumming.eng.srt 64.5 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/One-Way SQL Hacking - JD Glaser & Saumil Udayan Shah.eng.vtt 64.5 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/X-Remote ICMP Based OS Fingerprinting Techniqu es - Ofir Arkin.eng.txt 64.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits.eng.vtt 64.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/DevSecOps - What, Why and How.eng.srt 64.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Scala Security - Examining the Play and LiftWeb Frameworks.eng.tsv 64.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloudburst - Hacking 3D and Breaking Out of VMware - Kostya Kortchinsky.eng.lrc 64.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Graph-Based Binary Analysis - Halvar Flake.eng.tsv 64.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/FragAttacks Breaking Wi-Fi through Fragmentation and Aggregation.eng.srt 64.5 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/The Insecure IoT Cloud Strikes Again RCE on all Ruijie Cloud-Connected Devices.eng.srt 64.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace.eng.vtt 64.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/The Four Horsemen of the Virtualization Security Apocalypse - Christofer Hoff.eng.text 64.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dave Aitel - An Introduction to Spike.eng.vtt 64.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/From Weapon to Target Quantum Computers Paradox.eng.srt 64.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Whip the Whisperer Simulating Side Channel Leakage.eng.srt 64.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Vulnerabilities of Cellular and Satellite - based Voice and Data Networks.eng.tsv 64.4 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/MoustachedBouncer AitM-Powered Surveillance via Belarus ISPs.eng.srt 64.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Analyzing Security Research in the Media - Panel.eng.text 64.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Defending Privacy at the U.S. Border - A Guide for Travelers Carrying Digita.eng.lrc 64.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zanero - HostBased Anomaly Detection.eng.lrc 64.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Listen to the Whispers Web Timing Attacks that Actually Work.eng.srt 64.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Potter - Trusted Computing Revolution.eng.vtt 64.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.eng.tsv 64.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Discovering Debug Interfaces with the JTAGulator Part 2 by Joe Grand.eng.srt 64.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Dex Education.eng.txt 64.4 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Finding Holes in Closed-source Software - Havlar Flake.eng.srt 64.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Bailey_Race_to_Bare_Metal/BH_US_08_Bailey_Winning_the_Race_to_Bare_Metal_White_Paper.pdf 64.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Decentralized Malware on The Blockchain.eng.srt 64.4 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.text 64.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roelof Temmingh and Haroon Meer - Setiri.eng.vtt 64.4 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/What Is Involved In a Forensic Effort - John Tan.eng.text 64.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.eng.lrc 64.4 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Another Road Leads to the Host From a Message to VM Escape on Nvidia vGPU.eng.srt 64.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Wireless Networks with 802.1x, EAP-TLS and PEAP - Steve Riley.eng.tsv 64.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cunning With CNG - Soliciting Secrets From Schannel.eng.tsv 64.3 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/First Contact - Vulnerabilities in Contactless Payments.eng.srt 64.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Willis and Belani - Web App Incident.eng.text 64.3 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Hand Me Your SECRET, MCU Microarchitectural Timing Attacks on Microcontrollers are Practical.eng.srt 64.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Building a Defensive Framework for Medical Device Security.eng.txt 64.3 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Monitoring Surveillance Vendors A Deep Dive into In - the - Wild Android Full Chains in 2021.eng.srt 64.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Shelters or Windmills - The Struggle For Power and Information Advantage.eng.lrc 64.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.text 64.3 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Web Hacking - JD Glaser, Saumil Shah.eng.text 64.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Brent Huston - Appliance Firewalls a detailed review.eng.srt 64.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Exploiting Lawful Interception to Wiretap the Internet.eng.lrc 64.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh.h 64.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dominique Brezinski - Building a Forensics Toolkit That Will Protect You from Evil Influences.eng.srt 64.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gbadegesin - TCPIP in WIN Vista.eng.tsv 64.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Software Exploitation.eng.srt 64.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Developments in Cisco IOS Forensics - Felix FX Linder.eng.tsv 64.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Lawful Access Panel.eng.txt 64.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.eng.tsv 64.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloud Computing Models and Vulnerabilities - Raining on the Trendy New Parade - Alex Stamos, Andrew Becherer & Nathan Wilcox.eng.text 64.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Brent Huston - Appliance Firewalls a detailed review.eng.lrc 64.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Beyond Files Forensic OWADE Cloud Based Forensic - Elie Bursztein.eng.lrc 64.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking.eng.srt 64.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joseph Ansanelli - Future of Personal info.text 64.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic.eng.srt 64.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Investigating DDOS - Architecture Actors and Attribution.eng.txt 64.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/How to Impress Girls with Browser Memory Protection Bypasses - Alexander Sotirov, Mark Dowd.eng.vtt 64.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Hunting Flaws in MS SQL Server - Cesar Cerrudo, Aaron Newman.eng.lrc 64.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.vtt 64.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.jp.eng.lrc 64.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Security Wolf of Wall Street - Fighting Crime With High Frequency Classification and.eng.lrc 64.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Deputies Are Still Confused.eng.vtt 64.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/DropSmack - How Cloud Synchronization Services Render Your Corporate Firewall.eng.text 64.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks.eng.text 64.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Using D-Space to Open Doors.eng.vtt 64.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.srt 64.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Time Trial - Racing Towards Practical Timing Attacks.eng.vtt 64.1 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.text 64.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deeper Door Exploiting the NIC Chipset - Sherri Sparks, Shawn Embleton.eng.srt 64.1 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Smashing the State Machine The True Potential of Web Race Conditions.eng.srt 64.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Governments As Malware Authors - The Next Generation.eng.srt 64.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them.eng.lrc 64.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Survey of Remote Automotive Attack Surfaces.eng.text 64.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Microsoft Vista NDA-less The Good, The Bad, and The Ugly - Chris Paget.eng.vtt 64.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Steven Christey - CVE Behind the Scenes The Complexity of Being Simple.eng.vtt 64.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fuzzing the Phone in Your Phone - Charlie Miller, Collin Mulliner.eng.text 64.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Locknote Conclusions and Key Takeaways from Black Hat Asia 2022.eng.srt 64.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Next Level Cheating and Leveling Up Mitigations.eng.srt 64.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Just-In-Time Code Reuse - The More Things Change, the More They Stay the Same.eng.lrc 64.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/State of the Art Post Exploitation in Hardened PHP Environments - Stefan Esser.eng.vtt 64.1 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Tracking Ransomware End to End.eng.srt 64.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Behind the Scenes of iOS Security.eng.srt 64.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/The Bad Guys Win - Analysis of 10,000 Magecart Vulnerabilities.eng.srt 64.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Drop the SOAP Real World Web Service Testing for Web Hackers - Tom Eston, Joshua Abraham.eng.tsv 64.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Web Application Canonicalization, Encoding and Transcoding Attacks - Arian Evans.eng.tsv 64.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.jp.eng.text 64.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Eric Goldman - Criminal Copyright infringement and warez trading.eng.text 64.0 KB
- Black Hat DC/Black Hat Federal 2006/Combatting Symbian Malware - Jarno Niemelä.eng.lrc 64.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ptacek and Goldsmith - Elec Sheep.eng.text 64.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How to Steal a Nuclear Warhead Without Voiding Your XBox Warranty - Intro to tamper evident devices, applications & circumvention - Jamie Schwettmann & Eric Michaud.eng.text 64.0 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Vlind Glitch Blind VCC Glitching Technique to Bypass the Secure Boot of Qualcomm MSM8916 Mobile SoC.eng.srt 64.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BeEF attack with MITM.eng.vtt 64.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Wireless Overview - Protocols and Threat Models.eng.vtt 64.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Trust, Security and Society.eng.txt 64.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.eng.lrc 64.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.eng.vtt 64.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting the iOS Kernel - Stefan Esser.eng.srt 64.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Gerhard-Escelbeck-Laws-of-vulnerbilities-English.eng.text 64.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Cameron Hotchkies - Blind Injection Automation Techniques.eng.vtt 64.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Language Properties of Phone Scammers - Cyberdefense At the Level of the Human.eng.lrc 64.0 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/X-Remote ICMP Based OS Fingerprinting Techniqu es - Ofir Arkin.eng.lrc 64.0 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Hunting Flaws in MS SQL Server - Cesar Cerrudo, Aaron Newman.eng.vtt 64.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Decompilers and Beyond - Ilfak Guilfanov.eng.vtt 64.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Paul Wouters - IPSEC Opportunistic Encryption using DNSSEC.eng.tsv 64.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Apple Sand Box - Dionysus Blazakis.eng.srt 64.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Trust, Security and Society.eng.vtt 63.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Padgett Peterson - Securing EMail Gateways from Attacks - What to do While Waiting for Vendors to Respond to the latest virus and worms.eng.srt 63.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Mortman, Others - National ID Debate.tsv 63.9 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/injectso Modifying and Spying on Running Processes Under Linux - Shawn Clowes.eng.vtt 63.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwnie Awards 2016.eng.srt 63.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/FrontPage Server Extensions on Windows Server 2003 - Mark Burnett.eng.tsv 63.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/S Stender - Attacking Inatl Software.eng.vtt 63.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sotirov - HotPatching3rd Party Patch.eng.lrc 63.9 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Dude, Where's My Laptop.eng.vtt 63.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/iRK - Crafting OS X Kernel Rootkits - Jesse D’Aguanno.eng.txt 63.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jeffrey Prusan - Technical Security Countermeasures.eng.tsv 63.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/JD Glaser - Hacking With Executives.eng.vtt 63.8 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/The Double (AI) Agent Flipping a GenAI Agent Behavior.eng.srt 63.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Geers - Eisen - IPv6 - Update - Japanese.eng.tsv 63.8 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/ELF Section Docking Revisiting Stageless Payload Delivery.eng.srt 63.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Maltego Tungsten As a Collaborative Attack Platform.eng.text 63.8 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dan-Kaminsky-Black-Ops-tcp-ip-English.eng.text 63.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Grossman - Hacking Intranet - English.eng.txt 63.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.eng.srt 63.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Who's Really Attacking Your ICS Devices.eng.txt 63.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Smartphone s Apps Are Not That Smart - Insecure Development Practices.eng.txt 63.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Stefano Zanero - Detecting 0 Day Attacks with Learning IDS.eng.tsv 63.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rieback - RFID Malware Demystified.eng.vtt 63.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Dex Education.eng.lrc 63.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/VOIP Wars - Destroying Jar Jar Lync.eng.lrc 63.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/The 8th Annual Black Hat USA NOC Report.eng.srt 63.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Time Trial - Racing Towards Practical Timing Attacks.eng.tsv 63.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.eng.txt 63.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them.eng.vtt 63.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Dynamic Fireware Analysis At Scale - A Case Study on Embedded Web Interfaces.eng.srt 63.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/MetaPost Exploitation - Val Smith, Colin Ames.eng.tsv 63.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Mike Schiffmman - The Firewalk Tool.eng.txt 63.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Macs in the Age of the APT - Alex Stamos, BJ Orvis, Paul Youn.eng.text 63.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Lawful Access Panel.eng.lrc 63.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Scott Blake - Politics of Vulnerabilities.eng.txt 63.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Demystifying PTSD in the Cybersecurity Environment.eng.srt 63.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Exploitation Using A Malicious Service Set Identifier (SSID).eng.tsv 63.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare.eng.tsv 63.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Typhoon Mangkhut One-click Remote Universal Root Formed with Two Vulnerabilities.eng.srt 63.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Investigating DDOS - Architecture Actors and Attribution.eng.lrc 63.7 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Small Leaks, Billions Of Dollars Practical Cryptographic Exploits That Undermine Crypto Wallets.eng.srt 63.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Kevin McPeake and Chris Goggins - Falling Dominos.eng.text 63.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Seth Fogie - Pocket PC Abuse.eng.vtt 63.7 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SMTP Information Gathering - Lluis Mora.eng.txt 63.7 KB
- Black Hat DC/Black Hat DC 2007/Video/Black Hat DC 2007 captions/RFID for Beginners - Chris Paget and the ACLU.eng.text 63.6 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/VoBERT Unstable Log Sequence Anomaly Detection Introducing Vocabulary-Free BERT.eng.srt 63.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Deputies Are Still Confused.eng.tsv 63.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Fischbach - Carrier VOIP Security.eng.text 63.6 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Getting Rooted and Never Knowing It - Job De Haas.eng.text 63.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Building a Defensive Framework for Medical Device Security.eng.lrc 63.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Random Number Generator in PHP.eng.srt 63.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Power Analysis Attacks for Cheapskates.eng.txt 63.6 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Unlimited Results Breaking Firmware Encryption of ESP32 - V3.eng.srt 63.6 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/IAM Concerned OAuth Token Hijacking in Google Cloud (GCP).eng.srt 63.6 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Page Cache Attacks Microarchitectural Attacks on Flawless Hardware.eng.srt 63.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Preventing Oh Shit Moments for 20 Euros or Less.eng.txt 63.6 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.txt 63.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stender - Attack Internatl SW - English.eng.text 63.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices - 1-2.eng.text 63.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/What s on the Wire - Physical Layer Tapping with Project Daisho.eng.vtt 63.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Xenpwn - Breaking Paravirtualized Devices.eng.srt 63.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Last Stage Of Delirium Research Group - UNIX Assembly Codes Development for Vulnerabilities.eng.tsv 63.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Feaver - Kenneth Greers - Cyber Jihad and the Globalization of Warfare.eng.tsv 63.6 KB
- Black Hat DC/Black Hat Federal 2006/Client Side Penetration Testing - Max Caceres.eng.text 63.5 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/AutoSpill Zero Effort Credential Stealing from Mobile Password Managers.eng.srt 63.5 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Finding Holes in Closed-source Software - Havlar Flake.eng.txt 63.5 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/injectso Modifying and Spying on Running Processes Under Linux - Shawn Clowes.eng.tsv 63.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/An Uninvited Guest Who Won't Go Home - Bill.eng.txt 63.5 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Baseband Apocalypse - All Your Baseband Are Belong To Us - Ralf-Philipp Weinmann.eng.vtt 63.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Trillions of Lines of Code and Counting Securing Applications At Scale - Jeremiah Grossman, Brad Arkin, Alex Hutton, Adrain Lane, John Johnson.eng.tsv 63.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Manna from Heaven - Improving the State of Wireless Rogue AP Attacks.eng.srt 63.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Attacking IPv6 Implementation Using Fragmentation.eng.srt 63.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sticking to the Facts Scientific Study of Static Analysis Tools - Chuck Willis, Kris Britton.eng.text 63.5 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Holding on for Tonight - Addiction in InfoSec.eng.srt 63.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/File Disinfection Framework.eng.tsv 63.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Computrace Backdoor Revisited.eng.vtt 63.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fact and Fiction - Defending Medical Device.eng.srt 63.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace.eng.txt 63.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/I Am Whoever I Say I Am Infiltrating Identity Providers Using a 0Click Exploit.eng.srt 63.5 KB
- Black Hat DC/Black Hat Federal 2006/Implementing and Detecting An ACPI BIOS Rootkit - John Heasman (bad audio quality).eng.lrc 63.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/A Journey Into Fuzzing WebAssembly Virtual Machines.eng.srt 63.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Barisani_and_Bianco/Whitepaper/bh-usa-07-barisani_and_Bianco-WP.pdf 63.5 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Beyond AutoRun - Exploiting Software Vulnerabilities with Removable Storage - Jon Larimer.eng.tsv 63.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani & Billy Rios.eng.text 63.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/TiYunZong Exploit Chain to Remotely Root Modern Android Devices - Pwn Android Phones from 2015-2020.eng.srt 63.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 1-2 - Panel.eng.tsv 63.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dan Kaminsky - the Black Ops of DNS.eng.vtt 63.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sophail A Critical Analysis of Sophos Antivirus - Tavis Ormandy.eng.txt 63.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neurosurgery With Meterpreter - Colin Ames, David Kerb.eng.tsv 63.4 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/X-Remote ICMP Based OS Fingerprinting Techniqu es - Ofir Arkin.eng.vtt 63.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/httprint200_disguised_rpt.png 63.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unveiling the Open Source Visualization Engine for Busy Hackers.eng.txt 63.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Beyond the Mcse - Active Directory for the Security Professional.eng.vtt 63.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Stephenson - Introduction to Cyber Forensic Analysis.eng.vtt 63.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android.eng.vtt 63.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 2-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.srt 63.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 1-2.eng.srt 63.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Chris-Eagle-IdaPro-English.eng.text 63.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloudburst - Hacking 3D and Breaking Out of VMware - Kostya Kortchinsky.eng.vtt 63.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Exploiting Lawful Interception to Wiretap the Internet.eng.vtt 63.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Beast is in Your Memory.eng.srt 63.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacking Oracle Web Applications with Metasploit - Chris Gates aka carnal0wnage.eng.vtt 63.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/SSL, Gone in 30 Seconds - A BREACH beyond CRIME.eng.tsv 63.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sophail A Critical Analysis of Sophos Antivirus - Tavis Ormandy.eng.vtt 63.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Behind the Scenes of iOS Security.eng.txt 63.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM.eng.tsv 63.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00038.jpg 63.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Trust, Security and Society.eng.lrc 63.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - The Black Hat Testimonies.eng.srt 63.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Iran's Soft-War for Internet Dominance.eng.srt 63.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Simple Nomad - Strategies for Defeating Distributed Attacks.eng.txt 63.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/iRK - Crafting OS X Kernel Rootkits - Jesse D’Aguanno.eng.lrc 63.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Managed Code Rootkits - Erez Metula.eng.tsv 63.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Who's Really Attacking Your ICS Devices.eng.lrc 63.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Measure Security Effectively.eng.tsv 63.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Devil Does Not Exist - The Role of Deception in Cyber.eng.srt 63.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Hardware-Enforced Security With Hypervisors.eng.srt 63.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Smartphone s Apps Are Not That Smart - Insecure Development Practices.eng.lrc 63.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots.eng.srt 63.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Java Every-Days - Exploiting Software Running on Three Billion Devices.eng.vtt 63.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Stefano Zanero - Detecting 0 Day Attacks with Learning IDS.eng.srt 63.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BinaryPig - Scalable Malware Analytics in Hadoop.eng.srt 63.2 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Exploiting OPC-UA in Every Possible Way Practical Attacks Against Modern OPC-UA Architectures.eng.srt 63.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Visual Forensic Analysis and Reverse Engineering of Binary Data - Greg Conti, Erik Dean.eng.tsv 63.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hopping on the CAN Bus.eng.txt 63.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.eng.lrc 63.2 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Grossman - Hacking Intranet - English.eng.lrc 63.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Everybody be Cool, This is a Robbery.eng.srt 63.2 KB
- Black Hat DC/Black Hat Federal 2006/Combatting Symbian Malware - Jarno Niemelä.eng.vtt 63.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Mike Schiffmman - The Firewalk Tool.eng.vtt 63.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Saumil Shah - Metasploit Plugins.eng.tsv 63.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brad Bolin - Information Security Law Update.eng.text 63.1 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Classification and Detection of Application Backdoors - Chris Wysopal.eng.vtt 63.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014.eng.srt 63.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Harnessing Intelligence From Malware Repositories.eng.srt 63.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Ruling StarCraft Game Spitefully - Exploiting the Blind Spot of AI-Powered Game Bots.eng.srt 63.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/SensePost - Putting Tea back into CyberTerrorism.eng.tsv 63.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jamie Butler - Greg Hoglund - VICE Catch the Hookers.eng.txt 63.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSL And The Future of Authenticity - Moxie Marlinspike.eng.txt 63.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Bochspwn - Identifying 0-Days via System-Wide Memory Access Pattern Analysis.eng.tsv 63.1 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/EDR Reloaded Erase Data Remotely.eng.srt 63.1 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Tunnel Vision Exploring VPN Post-Exploitation Techniques.eng.srt 63.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sparks and Others - Sidewinder.eng.text 63.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Scott Blake - Politics of Vulnerabilities.eng.lrc 63.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A Black Hat Vulnerability Risk Assessment - Panel.eng.text 63.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.eng.srt 63.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Mobile Exploit Intelligence Project.eng.text 63.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Walter Gary Sharp - Key Legal Implications of Computer Network Defense.eng.text 63.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Practical New Developments in The Breach Attack.eng.txt 63.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Stepping p3wns - Adventures in Full Spectrum Embedded Exploitation.eng.tsv 63.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Rapid Radio Reversing.eng.vtt 63.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Paul Bohm - Taming Bugs.eng.srt 63.0 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/TunnelCrack Leaking VPN Traffic by Manipulating Routing Tables.eng.srt 63.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Scott Blake - Politics of Vulnerabilities.eng.srt 63.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Library of Sparta.eng.txt 63.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/An Uninvited Guest Who Won't Go Home - Bill.eng.lrc 63.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mike Beekey - ARP Vulnerabilities Indefensible Local Network Attacks.eng.vtt 63.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Power Analysis Attacks for Cheapskates.eng.lrc 63.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Practice) 2-2.eng.text 63.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Rebecca Mercuri - Bev Harris - Managing Election Data The California Recall.eng.srt 63.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Implementing the Lessons Learned From a Major Cyber Attack.eng.txt 63.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace.eng.lrc 62.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Government-Mandated Front Doors A Global Assessment of Legalized Government Access to Data.eng.srt 62.9 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hardening Windows 8 apps for the Windows Store.eng.txt 62.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Asia 2016.eng.vtt 62.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Mike Schiffmman - The Firewalk Tool.eng.lrc 62.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Abusing Software Defined Networks.eng.tsv 62.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Threats to the 2008 Presidential Election (and more) - Oliver Friedrichs.eng.text 62.9 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SMTP Information Gathering - Lluis Mora.eng.lrc 62.9 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.lrc 62.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.srt 62.9 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Keynote Frédérick Douzet.eng.srt 62.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/MLD Considered Harmful - Breaking Another IPv6 Subprotocol.eng.srt 62.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/(In-)Security of Backend-As-A-Service.eng.txt 62.9 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Achieving Linux Kernel Code Execution Through a Malicious USB Device.eng.srt 62.9 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses.eng.txt 62.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSL And The Future of Authenticity - Moxie Marlinspike.eng.vtt 62.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Just-In-Time Code Reuse - The More Things Change, the More They Stay the Same.eng.vtt 62.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Reversing a Japanese Wireless SD Card - From Zero to Code Execution.eng.srt 62.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/CloudBots - Harvesting Crypto Coins Like a Botnet Farmer.eng.tsv 62.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hacking the Fast Lane - Security issues in 802.11p, DSRC and WAVE - Bruno Goncalves de Oliveira & Rob Havelt.eng.srt 62.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unveiling the Open Source Visualization Engine for Busy Hackers.eng.lrc 62.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sophail A Critical Analysis of Sophos Antivirus - Tavis Ormandy.eng.lrc 62.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.jp.eng.txt 62.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Greg Hoglund - Runtime Decompilation.eng.tsv 62.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/WebTracking for You.eng.txt 62.8 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Video-Based Cryptanalysis Recovering Cryptographic Keys from Device Using Video of Power LED.eng.srt 62.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jon David - Putting Intrusion Detection into Intrusion Detection Systems.eng.vtt 62.8 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Making Windows Exploits More Reliable - Kostya Kortchinsky.eng.tsv 62.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Demystifying Fuzzers - Michael Eddington.eng.text 62.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Hate the Player, Hate the Game Inside the Android Patch Lifecycle - Anthony Lineberry, Tim Strazzere, Tim Wyatt.eng.vtt 62.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Saving Cyberspace by Jason Healey.eng.srt 62.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Lawful Access Panel.eng.vtt 62.8 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Finding Holes in Closed-source Software - Havlar Flake.eng.lrc 62.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.eng.txt 62.8 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Can You Roll Your Own SIEM.eng.srt 62.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Group Talk.eng.tsv 62.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jason Garms - Defending Windows 2000 on the Internet.eng.tsv 62.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Strike and Counterstrike The Law on Automated Intrusions and Striking Back - Curtis Karnow.eng.text 62.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Cory Scott - Systems Management in an Untrusted Network.eng.text 62.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Finding Needles in Haystacks (The Size of Countries).eng.tsv 62.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Intrusion Detection.eng.vtt 62.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Defending Privacy at the U.S. Border - A Guide for Travelers Carrying Digita.eng.vtt 62.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.jp.eng.tsv 62.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016.eng.vtt 62.7 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Kenneth-Geers-Hacking-in-a-Foreign-Language-A-Network-Security-Guide-to-Russia-and-Beyond-English.eng.vtt 62.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Mesh Stalkings-Penetration Testing with Small Networked Devices.eng.vtt 62.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/AlephOne_Smashing_The_Stack.html 62.7 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/You Can Run, but You Can't Hide - Finding the Footprints of Hidden Shellcode.eng.srt 62.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AirBnBeware - Short Term Rentals Long Term Pwnage.eng.vtt 62.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing.eng.srt 62.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Greg Hoglund - Runtime Decompilation.eng.vtt 62.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Inducing Momentary Faults Within Secure StandardsMicrocontrollers - Christopher Tarnovsky.eng.text 62.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.jp.eng.txt 62.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning Your Phone at Every Layer - A Mobile Security Panel - Tyler Shields, Anthony Lineberry, Charlie Miller, Chris Wysopal, Dino Dai Zovi, more.eng.text 62.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/FX - More Embedded Systems.eng.tsv 62.7 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Select Bugs From Binary Where Pattern Like CVE - 1337 - Days.eng.srt 62.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Preventing Oh Shit Moments for 20 Euros or Less.eng.lrc 62.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Simple Nomad - Strategies for Defeating Distributed Attacks.eng.lrc 62.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Behind the Scenes of iOS Security.eng.lrc 62.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/RETrace - Applied Reverse Engineering on OS X - Tiller Beauchamp, David Weston.eng.text 62.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Siberman Richard Johnson - Comparison Buffer Overflow Prevention Implementations and Weaknesses.eng.tsv 62.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Red Vs Blue Modern Active Directory Attacks, Detection, And Protection.eng.srt 62.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Laws of Vulnerabilities Research Version 2.0 Comparing Critical Infrastructure Industries - Panel.eng.tsv 62.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.eng.vtt 62.6 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/LLMbotomy Shutting the Trojan Backdoors.eng.srt 62.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Advanced IC Reverse Engineering Tech In Depth Analysis Of A Modern Smart Cards.eng.srt 62.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/MoRE Shadow Walker - The Progression of TLB-Splitting on x86.eng.txt 62.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Renaud Deraison - The Nessus Project Reducing the Costs of Vulnerability Assessment.eng.txt 62.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybercrime in The Deep Web.eng.txt 62.6 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/CloudLeak DNN Model Extractions from Commercial MLaaS Platforms.eng.srt 62.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.eng.vtt 62.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Grossman - Hacking Intranet - English.eng.vtt 62.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Saumil Shah - Defeating Automated Web Assessment Tools.eng.srt 62.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hiding In Plain Sight - Advances In Malware Covert Communication Channels.eng.vtt 62.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zanero - HostBased Anomaly Detection.eng.vtt 62.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ofir Arkin - Bypassing NAC Systems.eng.txt 62.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSL And The Future of Authenticity - Moxie Marlinspike.eng.lrc 62.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hopping on the CAN Bus.eng.lrc 62.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Embedded Management Interfaces - Hristo Bojinov, Elie Bursztein, Dan Boneh.eng.srt 62.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Fredric Bret - Mounet - Automated Detection of COM Vulnerabilities.eng.txt 62.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Apple vs. Google Client Platforms.eng.srt 62.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.eng.vtt 62.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Crack a Microcell.eng.srt 62.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Gula - Bypassing Intrusion Detection Systems.eng.text 62.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Medical Devices for Fun and Insulin Breaking the Human SCADA System - Jay Radckiffe.eng.tsv 62.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/An Uninvited Guest Who Won't Go Home - Bill.eng.vtt 62.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Underground Economy of the Pay Per Install PPI Business - Kevin Stevens.eng.tsv 62.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Post Exploitation Operations with Cloud Synchronization.eng.text 62.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Library of Sparta.eng.lrc 62.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service.eng.srt 62.4 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Timeless Timing Attacks.eng.srt 62.4 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Hourglass Model 2.0 Case Study of Southeast Asia Underground Services Abusing Global 2FA.eng.srt 62.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Implementing the Lessons Learned From a Major Cyber Attack.eng.lrc 62.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/When the Lights Go Out - Hacking Cisco EnergyWise.eng.vtt 62.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Kenneth-Geers-Hacking-in-a-Foreign-Language-A-Network-Security-Guide-to-Russia-and-Beyond-English.eng.txt 62.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hardening Windows 8 apps for the Windows Store.eng.lrc 62.4 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/The Rise of Potatoes Privilege Escalations in Windows Services.eng.srt 62.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Researching Secrets - James Bamford.eng.tsv 62.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ian Clarke, Oskar Sandberg - Scalable searches.vtt 62.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Practical Windows XP2003 Heap Exploitation - John McDonald, Chris Valasek.eng.tsv 62.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Investigating DDOS - Architecture Actors and Attribution.eng.vtt 62.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Lee Kushner - The State of Employment in the Information Security Industry.eng.tsv 62.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The State of Incident Response by Bruce Schneier.eng.txt 62.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Taking the Hype Out of Hypervisor - Tal Garfinkel.eng.text 62.4 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/(in)Security in Building Automation - How to Create Dark Buildings with Light Speed.eng.srt 62.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Win at Reversing - Nick Harbour.eng.vtt 62.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Stealing with BGP - Steve Dugan.eng.vtt 62.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pointers and Handlers - Alex Ionescu.eng.txt 62.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Practical New Developments in The Breach Attack.eng.lrc 62.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Neel Mehta - Advanced in ELF runtime binary encryption - Shiva.eng.vtt 62.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/AAD Joined Machines - The New Lateral Movement.eng.srt 62.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Shipley and Tom Jackiewicz - Security Issues with Implementing and Deploying the LDAP Directory System.eng.vtt 62.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bringing a Machete to the Amazon.eng.vtt 62.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/(In-)Security of Backend-As-A-Service.eng.lrc 62.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Hacking Databases for Owning Your Data - Cesar Cerrudo & Esteban Martinez Fayo.eng.txt 62.3 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses.eng.lrc 62.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Greg Hoglund - Advanced Buffer Overflow Techniques.eng.text 62.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Decade After Stuxnet's Printer Vulnerability Printing is Still the Stairway to Heaven.eng.srt 62.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Multiplexed Wired Attack Surfaces.eng.tsv 62.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.eng.txt 62.3 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Peter Shipley - Securing your Network with Free Utilities.eng.srt 62.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Stealing with BGP - Steve Dugan.eng.txt 62.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/WebTracking for You.eng.lrc 62.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Dom Flow Untangling The DOM For More Easy Juicy Bugs.eng.srt 62.3 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Michael-Sutton-Adam-Green-The-Art-of-File-Format-Fuzzing-English.eng.srt 62.3 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Hideaki-Ihara-Forensics-in-Japan-Japanese.eng.txt 62.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Maximiliano Caceres - Syscall Proxying.eng.txt 62.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Rebecca Mercuri - Bev Harris - Managing Election Data The California Recall.eng.txt 62.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/(In-)Security of Backend-As-A-Service.eng.vtt 62.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Threats.eng.txt 62.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.eng.lrc 62.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mudge - Economics Physics Psycology.eng.tsv 62.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jamie Butler - Greg Hoglund - VICE Catch the Hookers.eng.lrc 62.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Complexity in Computer Security - a Risky Business - Jeff Moss, Ian Angell.eng.srt 62.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Hacking Databases for Owning Your Data - Cesar Cerrudo & Esteban Martinez Fayo.eng.vtt 62.2 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses.eng.vtt 62.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Apple Sand Box - Dionysus Blazakis.eng.tsv 62.2 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/New Techniques for Split-Second DNS Rebinding.eng.srt 62.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/SSL TLS Interception Proxies and Transitive Trust.eng.tsv 62.2 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Kortti - Input Attack Trees - Japanese.eng.txt 62.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hacking the Fast Lane - Security issues in 802.11p, DSRC and WAVE - Bruno Goncalves de Oliveira & Rob Havelt.eng.txt 62.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Highway to Hell Hacking Toll Systems - Nate Lawson.eng.vtt 62.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Can You Trust Me Now An Exploration Into the Mobile Threat Landscape.eng.srt 62.2 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Route to Bugs Analyzing the Security of BGP Message Parsing.eng.srt 62.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Server-Side JavaScript Injection Attacking and Defending NoSQL and Node.js - Bryan Sullivan.eng.text 62.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cache Side Channel Attack - Exploitability and Countermeasures.eng.vtt 62.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Wi-Fi Advanced Fuzzing - Laurent Butti.eng.txt 62.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Keynote - What Got Us Here Wont Get Us There.eng.tsv 62.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sensepost - Deus ex Machina.eng.text 62.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Why Security Data Science Matters & How It's Different Pitfalls And Promises.eng.srt 62.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Microsoft Vista NDA-less The Good, The Bad, and The Ugly - Chris Paget.eng.txt 62.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Power Analysis Attacks for Cheapskates.eng.vtt 62.2 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Decoding EM-FI Attacks Lessons Learned from Glitching the GigaDevice GD32F407.eng.srt 62.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Chris Eng - Breaking Crypto.eng.tsv 62.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Veiled - A Browser Based Darknet - Billy Hoffman, Matt Wood.eng.text 62.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/More Tricks for Defeating SSL - Moxie Marlinspike.eng.tsv 62.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/CuteCats.exe and the Arab Spring.eng.text 62.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Lifecycle of a Phone Fraudster - Exposing Fraud Activity.eng.tsv 62.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/IP Spoofing.eng.text 62.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The SCADA That Didn't Cry Wolf - Who s Really Attacking Your ICS Devices - 2 2.eng.tsv 62.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware.eng.srt 62.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Revisiting XSS Sanitization.eng.txt 62.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybercrime in The Deep Web.eng.lrc 62.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OptiROP - The Art of Hunting ROP Gadgets.eng.vtt 62.1 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Wi-Fi Advanced Fuzzing - Laurent Butti.eng.vtt 62.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/End-to-end Analysis of Domain Generating Algorithm Malware Family.eng.txt 62.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/All the 4G Modules Could be Hacked.eng.srt 62.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/What s on the Wire - Physical Layer Tapping with Project Daisho.eng.txt 62.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Rick Smith - Masquerades,Tricking Modern Auth Systems.eng.srt 62.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Man-in-the-SCADA - Anatomy of Data Integrity Attacks in Industrial Control Systems.eng.srt 62.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Passive Bluetooth Monitoring.eng.tsv 62.0 KB
- Black Hat USA/Black Hat USA 1998/pictures/00000067.JPG 62.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Threats to the 2008 Presidential Election - Oliver Fredrichs.eng.text 62.0 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/One-Way SQL Hacking - JD Glaser & Saumil Udayan Shah.eng.tsv 62.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Fredric Bret - Mounet - Automated Detection of COM Vulnerabilities.eng.lrc 62.0 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Chris-Hurley-Identifying-and-Responding-to-Wireless-Attacks-English.eng.txt 62.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.jp.eng.lrc 62.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/The Dark Side of the Cloud - How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis.eng.srt 62.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016.eng.txt 62.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lights Off The Darkness of the Smart Meters.eng.tsv 62.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Maximizing Home-field Advantage.eng.srt 62.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Splitting the Email Atom Exploiting Parsers to Bypass Access Controls.eng.srt 62.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Malware analysis for the enterprise - Jason Ross.eng.text 62.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/GRR - Find All the Badness, Collect All the Things.eng.vtt 62.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/CloudBots - Harvesting Crypto Coins Like a Botnet Farmer.eng.vtt 61.9 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ira Winkler - Who are the Real Black Hats.eng.tsv 61.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.eng.srt 61.9 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/From Coordinated Disclosure to Cooperative Vulnerability When Dealing w - Critical Software Stacks.eng.srt 61.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/A Peek Under the Blue Coat.eng.srt 61.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Enhancing ZFS in the Kernel - Soy Christian Kendi.eng.srt 61.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.jp.eng.srt 61.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Xenpwn - Breaking Paravirtualized Devices.eng.txt 61.9 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/The Final Chapter Unlimited ways to bypass your macOS privacy mechanisms.eng.srt 61.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Adam Shostack - Will People Ever Pay for Privacy.eng.txt 61.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Million Browser Botnet.eng.tsv 61.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/ClusterFuzz Fuzzing at Google Scale.eng.txt 61.9 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Kenneth-Geers-Hacking-in-a-Foreign-Language-A-Network-Security-Guide-to-Russia-and-Beyond-English.eng.lrc 61.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Larry Korba - Hope Hype and Horrors E - Commerce Explored.eng.vtt 61.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Call To Arms - A Tale of the Weaknesses of Current Client-Side XSS Filtering.eng.vtt 61.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/De-Anonymizing Live CDs through Physical Memory Analysis - Andrew Case.eng.text 61.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BeEF attack with MITM.eng.txt 61.8 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Rope Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution.eng.srt 61.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/The Problems and Promise of WebAssembly.eng.srt 61.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Legal Aspects of Cybersecurity - (AKA) CYBERLAW A Year in Review, Cases, Issues, Your Questions My (Alleged) Answers - Robert Clark.eng.text 61.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The BEAST Wins Again - Why TLS Keeps Failing to Protect HTTP.eng.srt 61.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Off Grid communications with Android - Meshing the mobile world.eng.tsv 61.8 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Securing the Next Version of HTTP How QUIC and HTTP 3 Compare to HTTP 2.eng.srt 61.8 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Understanding the Windows SMB NTLM weak nonce vulnerablity - Hernan Ochoa, Agustin Azubel.eng.text 61.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Oracle Data Redaction is Broken by David Litchfield.eng.srt 61.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Post Exploitation Bliss - Loading Meterpreter on a Factory iPhone - Vincenzo Iozzo, Charlie Miller.eng.text 61.8 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Patrick Richard - Open Network PKI Design Issues or Business as Usual.eng.text 61.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/MoRE Shadow Walker - The Progression of TLB-Splitting on x86.eng.lrc 61.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ofir Arkin - Bypassing NAC Systems.eng.lrc 61.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Renaud Deraison - The Nessus Project Reducing the Costs of Vulnerability Assessment.eng.lrc 61.8 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani.eng.srt 61.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.jp.eng.lrc 61.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 2.eng.srt 61.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.eng.lrc 61.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Sniff Keystrokes with Lasers Voltmeters - Andrea Barisani, Daniele Bianco.eng.srt 61.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Panel - Competitive Intelligence.eng.tsv 61.8 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/A Hole in the Tube Uncovering Vulnerabilities in Critical Infrastructure of Healthcare Facilities.eng.srt 61.8 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Hidden Risks Of Biometric Identifiers And How To Avoid Them-tagged.eng.tsv 61.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Finnigan - How to Unwrap Oracle.eng.txt 61.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/HTTP Advanced Assessment Techniques - Saumil Shah.eng.tsv 61.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Stealing with BGP - Steve Dugan.eng.lrc 61.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Threats.eng.lrc 61.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jon David - Putting Intrusion Detection into Intrusion Detection Systems.eng.txt 61.7 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Hacking Databases for Owning Your Data - Cesar Cerrudo & Esteban Martinez Fayo.eng.lrc 61.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/What the Fuzz.eng.srt 61.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Trace Me if You Can Bypassing Linux Syscall Tracing.eng.srt 61.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Automating Incident Response.eng.txt 61.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/From Coordinated Disclosure to Cooperative Vulnerability When Dealing w - Critical Software Stacks.eng.tsv 61.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Adam Laurie - Martin Hurfurt - BlueSnarfing the Risk from Digital Pickpockets.eng.vtt 61.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/V9-Scholz-SIP Stack Fingerprinting.eng.vtt 61.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/ProxyLogon is Just the Tip of the Iceberg A New Attack Surface on Microsoft Exchange Server.eng.srt 61.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Marshall Beddoe and Chris Abad - The Siphon Project.eng.tsv 61.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/How I Used a JSON Deserialization 0day to Steal Your Money on the Blockchain.eng.srt 61.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cache Side Channel Attack - Exploitability and Countermeasures.eng.txt 61.7 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 2-2.eng.srt 61.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.eng.tsv 61.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Paul Bohm - Taming Bugs.eng.txt 61.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Measuring Adversary Costs to Exploit Commercial Software.eng.txt 61.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pointers and Handlers - Alex Ionescu.eng.lrc 61.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The State of Incident Response by Bruce Schneier.eng.lrc 61.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hacking the Fast Lane - Security issues in 802.11p, DSRC and WAVE - Bruno Goncalves de Oliveira & Rob Havelt.eng.lrc 61.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gerard Eschelbeck - The laws of Vulnerabilities for Internal Networks.eng.srt 61.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - The Black Hat Testimonies.eng.txt 61.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hey You, Get Off of My Cloud - Application-Level Denial of Service Attacks and Defenses - Bryan Sullivan.eng.tsv 61.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Microsoft Vista NDA-less The Good, The Bad, and The Ugly - Chris Paget.eng.lrc 61.6 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Virt-ICE next gen debugger for malware analysis - NGUYEN Anh Quynh.eng.txt 61.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Wi-Fi Advanced Fuzzing - Laurent Butti.eng.lrc 61.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Global Spying - Steve Topletz, Jonathan Logan, Kyle Williams.eng.text 61.6 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/UWB Real Time Locating Systems How Secure Radio Communications May Fail in Practice.eng.srt 61.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/GRR - Find All the Badness, Collect All the Things.eng.tsv 61.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Interpreter Exploitation - Pointer Inference and JIT Spraying - Dion.eng.txt 61.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Adam Laurie - Martin Hurfurt - BlueSnarfing the Risk from Digital Pickpockets.eng.txt 61.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sensepost - When The Tables Turn.eng.vtt 61.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/How to Impress Girls with Browser Memory Protection Bypasses - Alexander Sotirov, Mark Dowd.eng.tsv 61.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jay Beale - Attacking and Defending BIND DJBDNS DNS Servers.eng.text 61.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Oracle Data Redaction is Broken by David Litchfield.eng.tsv 61.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Automating Incident Response.eng.vtt 61.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Revisiting XSS Sanitization.eng.lrc 61.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Rebecca Mercuri - Bev Harris - Managing Election Data The California Recall.eng.lrc 61.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Unknown-English to Japanese.eng.srt 61.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Asia 2016.eng.txt 61.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ian Goldberg - Breaking 80211 WEP.eng.text 61.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Forging the USB Armory.eng.srt 61.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Panel How The Wassenaar Arrangement s Export Control Of Intrusion Soft Affect.eng.srt 61.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Fault - Injection Detection Circuits Design, Calibration, Validation and Tuning.eng.srt 61.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Death of 1000 Cuts.eng.tsv 61.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.jp.eng.txt 61.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Disclosure Public.eng.text 61.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Java Every-Days - Exploiting Software Running on Three Billion Devices.eng.tsv 61.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Chain of Fools An Exploration of Certificate Chain Validation Mishaps.eng.txt 61.5 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Broken Links Emergence and Future of Software-Supply Chain Compromises.eng.srt 61.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/What s on the Wire - Physical Layer Tapping with Project Daisho.eng.lrc 61.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Rapid Radio Reversing.eng.txt 61.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/SADE Injecting Agents in to VM Guest OS - Matt Conover.eng.tsv 61.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.eng.vtt 61.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jericho and Munge - Hard Core Web Defacement Statistics Trends and Analysis.eng.tsv 61.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking SMS - Zane Lackey, Luis Miras.eng.vtt 61.5 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/The Devil is in the (Micro-) Architectures Uncovering New Side-Channel and Bit-Flip Attack Surfaces.eng.srt 61.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dow Herath Mehta Spencer and Flake - Professional Source Code Auditing.eng.text 61.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Call Me - Gathering Threat Intelligence on Telephony Scams to Detect Fraud.eng.vtt 61.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jim Litchko - Total BS Security business - based systems security.eng.txt 61.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking the Corporare Mind.eng.srt 61.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Shaun Clowes - Fixing and Making Holes in Binaries.eng.text 61.4 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces.eng.srt 61.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Hacking Hollywood.eng.tsv 61.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pointers and Handlers - Alex Ionescu.eng.srt 61.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Harm Reduction A Framework for Effective & Compassionate Security Guidance.eng.srt 61.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Random Number Generator in PHP.eng.tsv 61.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Chris-Hurley-Identifying-and-Responding-to-Wireless-Attacks-English.eng.lrc 61.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/From Zero to Secure in One Minute.eng.vtt 61.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/ClusterFuzz Fuzzing at Google Scale.eng.vtt 61.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Trustworthy Computing Update - Scott Clup.eng.vtt 61.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Maximiliano Caceres - Syscall Proxying.eng.lrc 61.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Hideaki-Ihara-Forensics-in-Japan-Japanese.eng.lrc 61.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Adversary Characterization and Scoring System.eng.text 61.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Persist It - Using and Abusing Microsoft's Fix It Patches by Jon Erickson.eng.srt 61.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mobile Device Mismanagement.eng.srt 61.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mainframes - The Past Will Come to Haunt You.eng.text 61.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Tatum - Managing the External Environment.eng.srt 61.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Capturing 0Day Exploits With Perfectly Placed Hardware Traps.eng.srt 61.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/ClusterFuzz Fuzzing at Google Scale.eng.lrc 61.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016.eng.lrc 61.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protocols and Encryption of the Storm Botnet - Joe Stewart.eng.text 61.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hulton and Moniz - Faster pwning.eng.text 61.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Larry Korba - Hope Hype and Horrors E - Commerce Explored.eng.txt 61.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/smash-stack.html 61.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/End-to-end Analysis of Domain Generating Algorithm Malware Family.eng.lrc 61.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Caezar-Scoring-CTF-Games-English.eng.text 61.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Xenpwn - Breaking Paravirtualized Devices.eng.lrc 61.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Win at Reversing - Nick Harbour.eng.tsv 61.3 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Kortti - Input Attack Trees - Japanese.eng.lrc 61.3 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/How Virtual Private Networks Work.pdf 61.3 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/How Virtual Private Networks Work.pdf 61.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/UART THOU MAD.eng.srt 61.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Predictable PRNG in the vulnerable Debian OpenSSL package, the What and the How - Luciano Bello and Maximiliano Bertacchini.eng.srt 61.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Wireless Overview - Protocols and Threat Models.eng.tsv 61.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Franco - Case Studies Secure Dev IE7.eng.txt 61.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme.eng.srt 61.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BeEF attack with MITM.eng.lrc 61.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Browsers Gone Wild.eng.tsv 61.3 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Hideaki-Ihara-Forensics-in-Japan-Japanese.eng.srt 61.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Finnigan - How to Unwrap Oracle.eng.vtt 61.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Design Approaches for Security Automation.eng.srt 61.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Windows Defender - Demystifying and Bypassing ASR by Understanding the AV's Signatures.eng.srt 61.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Hacker Court.eng.text 61.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to Build a SpyPhone.eng.srt 61.2 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Windows Agentless C2 (Ab)using the MDM Client Stack.eng.srt 61.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/RFID Hacking - Live Free or RFID Hard.eng.tsv 61.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with API and Sysenter.jp.eng.txt 61.2 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Action Bias and the Two Most Dangerous Words in Cybersecurity.eng.srt 61.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerability Extrapolation or Give Me More Bugs Like That, Please - Fabian Yamaguchi.eng.txt 61.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Automating Incident Response.eng.lrc 61.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/K K Mookhey - Evasion and Detection of Web Application Tactics.eng.txt 61.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel.eng.srt 61.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Above My Pay Grade - Cyber Response at the National Level.eng.tsv 61.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/How To Implement IT Security After A Cyber Meltdown.eng.srt 61.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Silvio Cesare - Opensource Kernel Auditing and Exploitation.eng.text 61.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.eng.text 61.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Renaud Deraison - The Nessus Project Reducing the Costs of Vulnerability Assessment.eng.vtt 61.2 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Politics of Vulnerability Reporting - Scott Blake.eng.tsv 61.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Potter - Trusted Computing Revolution.eng.tsv 61.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Finnigan - How to Unwrap Oracle.eng.lrc 61.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Shipley and Tom Jackiewicz - Security Issues with Implementing and Deploying the LDAP Directory System.eng.tsv 61.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet.eng.vtt 61.2 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/What the TrustZone-M Doesn't See, the MCU Does Grieve Over Lessons Learned.eng.srt 61.2 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Adam Shostack - Will People Ever Pay for Privacy.eng.lrc 61.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Is Your Mental Health for Sale.eng.vtt 61.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Simple Nomad - Covering Your Tracks.eng.vtt 61.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cache Side Channel Attack - Exploitability and Countermeasures.eng.lrc 61.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Vivisection of an Exploit Development Process - David Aitel.eng.srt 61.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Larry Leibrock - Digital Information,User Tokens,Privacy and Forensics Investigation.eng.text 61.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Network Management System - Best Practices.pdf 61.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Paul Bohm - Taming Bugs.eng.lrc 61.1 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Network Management System - Best Practices.pdf 61.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Factoring Dead - Preparing for Cyptopocalypse.eng.tsv 61.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Going Auth The Rails On A Crazy Train.eng.tsv 61.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Return-Oriented Programming Exploits Without Code Inspection - Hovav Shacham.eng.text 61.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Measuring Adversary Costs to Exploit Commercial Software.eng.lrc 61.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces.eng.srt 61.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Language of Trust - Mark Dowd, Ryan Smith, David Dewey.eng.text 61.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/A Dirty Little History Bypassing Spectre Hardware Defenses to Leak Kernel Data.eng.srt 61.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Simple Nomad - Strategies for Defeating Distributed Attacks.eng.vtt 61.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.text 61.1 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Virt-ICE next gen debugger for malware analysis - NGUYEN Anh Quynh.eng.lrc 61.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Scott Blake - The Pros and Cons of Hiring Hackers.eng.txt 61.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Windows Hooks of Death Kernel Attacks Through User-Mode Callbacks - Tarjei Mandt.eng.tsv 61.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/HPE iLO5 Firmware Security - Go Home Cryptoprocessor, You're Drunk.eng.srt 61.1 KB
- Black Hat USA/Black Hat USA 1998/pictures/00000099.JPG 61.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - The Black Hat Testimonies.eng.lrc 61.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Identifying the True IP Network Identity of I2P Service Hosts - Adrian Crenshaw aka Irongeek.eng.text 61.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Dex Education.eng.vtt 61.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Asia 2016.eng.lrc 61.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Schulman - Phishing with Asterisk.eng.tsv 61.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/FX - The Blackberry Case.eng.vtt 61.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Ofir Arkin - Revolutionizing Operating System Fingerprinting.eng.tsv 61.0 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/CollidePower The Evolution of Software-based Power Side-Channels Attacks.eng.srt 61.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keynote - The Hidden Architecture of our Time - Why This Internet Worked, How We Could Lose It.eng.text 61.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Retrospective on the Use of Export Cryptography.eng.txt 61.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/DPTrace - Dual Purpose Trace for Exploitability Analysis of Program Crashes.eng.vtt 61.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Detecting & Preventing the Xen Hypervisor Subversions - Joanna Rutkowska, Rafal Wojtczuk.eng.srt 61.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Base - Security (or lack thereof) and our Friends in Redmond.eng.txt 61.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Miniaturization.eng.srt 61.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Insider Data Theft.eng.vtt 61.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Interpreter Exploitation - Pointer Inference and JIT Spraying - Dion.eng.lrc 61.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/AMF Testing.eng.tsv 61.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Keynote Blue to Red Traversing the Spectrum by Amanda Rousseau.eng.vtt 61.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Rapid Radio Reversing.eng.lrc 61.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Black Ops of PKI - Dan Kaminski.eng.txt 61.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Black Ops of TCPIP 2011 - Dan Kaminsky.eng.text 61.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Highway to Hell Hacking Toll Systems - Nate Lawson.eng.txt 61.0 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ira Winkler - Who are the Real Black Hats.eng.vtt 61.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.eng.vtt 61.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Library of Sparta.eng.vtt 60.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.jp.eng.srt 60.9 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Security analysis of Residential Gateways and ISPs global network domination is (sneakily) possible.eng.srt 60.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Jesse Burns - Fuzzing Win32.eng.text 60.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Home Invasion v2.0 - Attacking Network-Controlled Hardware.eng.srt 60.9 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/How can the Security Researcher Community Work Better for the Common Good - Jeff Moss, Roger Cumming.eng.txt 60.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Adam Laurie - Martin Hurfurt - BlueSnarfing the Risk from Digital Pickpockets.eng.lrc 60.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Chain of Fools An Exploration of Certificate Chain Validation Mishaps.eng.lrc 60.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.jp.eng.vtt 60.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Closing Session.eng.tsv 60.9 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/OFFENSIVE - Exploiting DNS Servers Changes by Leonardo Nve.eng.srt 60.9 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/ACE Up the Sleeve Hacking Into Apple's New USB-C Controller.eng.srt 60.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Simple Nomad and Todd Sabin - The RAZOR Warez.eng.txt 60.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hackers, Journalists and the Ethical Swamp.eng.text 60.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jon David - Putting Intrusion Detection into Intrusion Detection Systems.eng.lrc 60.9 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale.eng.srt 60.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Babar-ians at the Gate - Data Protection at Massive Scale.eng.text 60.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Mobile-Telephony Threats in Asia.eng.vtt 60.9 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/A New Trend for the Blue Team Using a Symbolic Engine to Detect Evasive Forms of Malware Ransomware.eng.srt 60.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Software Radio and the Future of Wireless Security - Michael Ossmann.eng.text 60.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Larry Korba - Hope Hype and Horrors E - Commerce Explored.eng.lrc 60.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sutton and MacManus - Punk 0de.eng.vtt 60.8 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Attacks Against GSMA's M2M Remote Provisioning.eng.srt 60.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Heavy Metal That Poisoned the Droid.eng.srt 60.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/I Can Hear You Now - Traffic Interception and Remote Mobile Phone Cloning.eng.srt 60.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Andrew Van der Stock - OWASP Guide.eng.tsv 60.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Domo Arigato, Mr. Roboto - Security Robots a la Unit-Testing.eng.text 60.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani, Billy K Rios.eng.text 60.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Cyber-Attacks & SAP systems - Is Our Business-Critical Infrastructure Expose.eng.srt 60.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Beyond the Mcse - Active Directory for the Security Professional.eng.tsv 60.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Evasion of High-End IDPS Devices at the IPv6 Era.eng.srt 60.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.eng.txt 60.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Outer Limits - Hacking The Samsung Smart TV.eng.tsv 60.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/End-to-end Analysis of Domain Generating Algorithm Malware Family.eng.srt 60.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Payment Points of Interaction (POI).eng.srt 60.8 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/All Your SMS & Contacts Belong to ADUPS & Others.eng.srt 60.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.eng.vtt 60.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Industroyer2 Sandworm's Cyberwarfare Targets Ukraine's Power Grid Again.eng.srt 60.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Timing Attacks Have Never Been So Practical - Advanced Cross-Site Search Attacks.eng.srt 60.7 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet.eng.srt 60.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Apple vs. Google Client Platforms.eng.tsv 60.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Something to Do with Network Security - Dan Kaminsky.eng.tsv 60.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Iran's Soft-War for Internet Dominance.eng.txt 60.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with API and Sysenter.jp.eng.lrc 60.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Black-box Assessment of Pseudorandom Algorithms.eng.vtt 60.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic.eng.txt 60.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jim Litchko - Total BS Security business - based systems security.eng.lrc 60.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/20 Ways to Bypass Your macOS Privacy Mechanisms.eng.srt 60.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybercrime in The Deep Web.eng.vtt 60.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Malware.eng.tsv 60.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Next Generation Collaborative Reversing with Ida Pro and CollabREate - Chris Eagle, Tim Vidas.eng.vtt 60.6 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Chris-Hurley-Identifying-and-Responding-to-Wireless-Attacks-English.eng.srt 60.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Phillip Hallam - Baker - Phishing - commiting Fraud in Public.eng.srt 60.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerabilities of Wireless Water Meter Networks - John McNabb.eng.text 60.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Interview with Neal Stephenson.eng.srt 60.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Spradlin - Auditing data Access.eng.vtt 60.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Scott Blake - The Pros and Cons of Hiring Hackers.eng.vtt 60.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Franco - Case Studies Secure Dev IE7.eng.lrc 60.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The WOMBAT API - Querying a global network of advanced honeypots - Stefano Zanero, Paolo Milani Comparetti.eng.tsv 60.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Message in a Broken Bottle Exploring the Linux IPC Attack Surface.eng.srt 60.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/CANAPE - Bytes Your Bits.eng.tsv 60.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 2-2 - John Benson.eng.text 60.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.jp.eng.vtt 60.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/K K Mookhey - Evasion and Detection of Web Application Tactics.eng.lrc 60.6 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/WiFi Calling Revealing Downgrade Attacks and Not-so-private private Keys.eng.srt 60.6 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Dirty Stream Attack, Turning Android Share Targets Into Attack Vectors.eng.srt 60.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacks to SAP Web Applications - Your crown jewels online - Mariano Nunez Di Croce.eng.vtt 60.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Scott Blake - The Pros and Cons of Hiring Hackers.eng.lrc 60.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Intra-Process Memory Protection for Applications on ARM and X86 - Leveraging the ELF ABI.eng.txt 60.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Security Myths of Extended Validation SSL Certificates - Alexander Sotirov, Mike Zusman.eng.vtt 60.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Meet the Feds.eng.srt 60.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/ian Goldberg - Off the Record Messaging.eng.text 60.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Davis, Ozier, Nebel, and Migues - Panel Discussion.eng.tsv 60.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Worth - Cryptographic Port Knocking.eng.txt 60.6 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Chained to Hit Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software.eng.srt 60.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Silently Breaking ASLR In The Cloud.eng.vtt 60.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Tackling Privilege Escalation with Offense and Defense.eng.srt 60.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TLS - SECRETS.eng.srt 60.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.jp.eng.lrc 60.5 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-wheeler-mehta-up.pdf 60.5 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/bh-eu-05-wheeler-mehta-up.pdf 60.5 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.srt 60.5 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/EdTech - The Ultimate APT.eng.srt 60.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Greybox Program Synthesis A New Approach to Attack Dataflow Obfuscation.eng.srt 60.5 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/From Pass-the-Hash to Code Execution on Schneider Electric M340 PLCs.eng.srt 60.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Retrospective on the Use of Export Cryptography.eng.lrc 60.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Welcome & Introduction to Black Hat USA 2011 Jeff Moss, Keynote Speaker Cofer Black.eng.srt 60.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Chain of Fools An Exploration of Certificate Chain Validation Mishaps.eng.srt 60.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Retrospective on the Use of Export Cryptography.eng.vtt 60.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Curtis E Karnow - Running the Matrix.eng.text 60.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Targeted Takedowns Minimizing Collateral Damage Using Passive DNS.eng.srt 60.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity.eng.srt 60.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 1 - Val Smith, Colin Ames & David Kerb.eng.srt 60.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Multipath TCP - Breaking Today s Networks with Tomorrow s Protocols.eng.srt 60.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Ofir Arkin - Cracking VoIP Architecture.eng.text 60.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Express Forwarding (CEF).pdf 60.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Cisco Express Forwarding (CEF).pdf 60.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Black Ops of PKI - Dan Kaminski.eng.lrc 60.5 KB
- Black Hat DC/Black Hat Federal 2006/Characterising the real threats to our nation’s critical information systems - Tom Parker, Matthew G Devost.eng.srt 60.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.txt 60.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Agile Security or How to defend applications with five-dat release cycles - Bryan Sullivan.eng.text 60.5 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/How can the Security Researcher Community Work Better for the Common Good - Jeff Moss, Roger Cumming.eng.lrc 60.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Highway to Hell Hacking Toll Systems - Nate Lawson.eng.lrc 60.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Malware Distribution via Widgetization of the Web - Neil Daswani.eng.srt 60.4 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Ian Goldberg - Cell Phone Security A History and The State of the Art.eng.text 60.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gutterman - Vulns Linux Random Num.eng.tsv 60.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SCTPscan - Finding Entry Points to SS7 Networks & Telecommunication Backbones - Philippe Langlois.eng.vtt 60.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hopping on the CAN Bus.eng.vtt 60.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions.eng.vtt 60.4 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.txt 60.4 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/From False Positives To Actionable Analysis Behavioral Intrusion Detection.eng.srt 60.4 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Defending Your Network with Kerberos - Rooster & J.D. Glaser.eng.txt 60.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bringing a Machete to the Amazon.eng.tsv 60.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Buying into the Bias - Why Vulnerability Statistics Suck.eng.tsv 60.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Security When Nano-Seconds Count - James Arlen.eng.text 60.4 KB
- Black Hat USA/Black Hat USA 2006/presentations/Morgenstern-Brosch/Morgenstern-Addl_Materials.zip 60.4 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Forging The USB Armory, An Open Source Secure Flash Drive Sized Computer.eng.srt 60.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Schneier - Keynote, Following the Money Security Proxies and Agenda.eng.tsv 60.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploiting Firefox.eng.srt 60.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/KEYNOTE - Whitfield Diffie.eng.srt 60.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Sherri Sparks, Jamie Butler - Shadow Walker.text 60.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/IO in the Cyber Domain, Immunity Style - Sinan Eren & Dave Aitel.eng.srt 60.4 KB
- Black Hat DC/Black Hat Federal 2006/Characterising the real threats to our nation’s critical information systems - Tom Parker, Matthew G Devost.eng.txt 60.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.eng.lrc 60.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cushman - MS Security fundamentals.eng.srt 60.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Man-in-the-SCADA - Anatomy of Data Integrity Attacks in Industrial Control Systems.eng.txt 60.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Unmanned Aerial Vehicles - Exploit Automation with the Metasploit Framework - James Lee.eng.vtt 60.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Stegospolit - Exploit Delivery With Steganography and Polyglots.eng.vtt 60.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SMTP Information Gathering - Lluis Mora.eng.srt 60.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Practical New Developments in The Breach Attack.eng.vtt 60.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning the Routing Table - New OSPF Attacks - Gabi Nakibly.eng.vtt 60.3 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Anatomy of Native IIS Malware.eng.srt 60.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/The Role of Non Obvious Relationships in the Foot Printing Process - Haroon Meer, Charl Van Der Walt.eng.tsv 60.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Next Level Cheating and Leveling Up Mitigations.eng.vtt 60.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 1-2 - John Benson.eng.txt 60.3 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Dilemma in IoT Access Control Revealing Novel Attacks and Design Challenges in Mobile-as-a-Gateway.eng.srt 60.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerability Extrapolation or Give Me More Bugs Like That, Please - Fabian Yamaguchi.eng.lrc 60.3 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.vtt 60.3 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Managing for Success Maintaining a Healthy Bug Bounty Program Long Term.eng.srt 60.3 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Apple Disk-O Party.eng.srt 60.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims.eng.srt 60.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Legal Aspects of Cyberspace Operations.eng.text 60.2 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/The Aftermath of a Social Engineering Pentest - Are We Being Ethically Responsible.eng.srt 60.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 1-2 - Lukas Grunwald.eng.vtt 60.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Black Hat USA 2019 Keynote Every Security Team is a Software Team Now by Dino Dai Zovi.eng.text 60.2 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Mittal-Kautilya_Teensy_Beyond_Shell-Code.zip 60.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Smart Nest Thermostat - A Smart Spy in Your Home.eng.vtt 60.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Use-After-Use-After-Free Exploit UAF by Generating Your Own.eng.srt 60.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Funderbolt - Adventures in Thunderbolt DMA Attacks.eng.tsv 60.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Kitchen's Finally Burned Down - DLP Security Bakeoff.eng.vtt 60.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Iran's Soft-War for Internet Dominance.eng.lrc 60.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic.eng.lrc 60.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/iRK - Crafting OS X Kernel Rootkits - Jesse D’Aguanno.eng.vtt 60.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Base - Security (or lack thereof) and our Friends in Redmond.eng.lrc 60.2 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 2 by Jose Miguel Esparza.eng.srt 60.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Next Level Cheating and Leveling Up Mitigations.eng.tsv 60.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sensepost - When The Tables Turn.eng.tsv 60.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/DSCOMPROMISED - A Windows DSC Attack Framework.eng.text 60.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The State of Incident Response by Bruce Schneier.eng.vtt 60.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/SGX Secure Enclaves in Practice - Security and Crypto Review.eng.srt 60.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unmasking You - Joshua Abraham, Robert Hansen.eng.txt 60.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/A Fully Trained Jedi, You Are Not.eng.srt 60.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Diana Kelly - Translasting US Privacy Regulations for Implementation.eng.text 60.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unmasking You - Joshua Abraham, Robert Hansen.eng.vtt 60.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with API and Sysenter.jp.eng.srt 60.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More 0-Days (or Code-Based Intrusion Detection by Korset) - Ohad Ben-Cohen.eng.srt 60.1 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/SCADA Security - Jason Larsen.eng.text 60.1 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Larry Leibrock - Digital Information, User Tokens, Privacy and Forensics Investigations The Case of Windows XP Platform.eng.tsv 60.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware.eng.txt 60.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Exploiting Linux and Pax ASLR's Weaknesses on 32 Bit and 64 Bit Systems.eng.srt 60.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Prevalent Characteristics in Modern Malware.eng.txt 60.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Web Timing Attacks Made Practical.eng.srt 60.1 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Saumil-Shah-David-Cole-Adware-Spyware-English.eng.text 60.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Measuring Adversary Costs to Exploit Commercial Software.eng.vtt 60.1 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Confidence in Chaos Strategies for World - Class Security Operations.eng.srt 60.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Roger Dingledine - Putting the P back in VPN.eng.text 60.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Michael Sutton, Adam Greene - Art Of File Format.srt 60.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/DPTrace - Dual Purpose Trace for Exploitability Analysis of Program Crashes.eng.txt 60.0 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Keep Everyone In Sync Effective Approaches Borrowed from Open Source Communities.eng.srt 60.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Multivariate Solutions To Emerging Passive DNS Challenges.eng.vtt 60.0 KB
- Black Hat DC/Black Hat Federal 2006/Nematodes - Dave Aitel.eng.srt 60.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/KEYNOTE - Whitfield Diffie.eng.txt 60.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Insider Data Theft.eng.tsv 60.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Quist_and_Valsmith/Whitepaper/bh-usa-07-quist_and_valsmith-WP.pdf 60.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/obj/Debug/binviz_0.01.exe 60.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Johnny Long Me to We - Johnny Long.eng.tsv 60.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Numchecker - A System Approach for Kernel Rootkit Detection.eng.txt 60.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Noel Anderseon - Wifi in WIN Vista.eng.text 60.0 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Kr00k How KRACKing Amazon Echo Exposed a Billion Vulnerable Wi-Fi Devices.eng.srt 60.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass-the-Hash 2 - The Admin's Revenge.eng.srt 60.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Smashing the Furure for Fun & Profit.eng.text 60.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/James Bamford - Researching Secrets Part II.eng.txt 60.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SmartCard APDU Analysis - Ivan Buetler.eng.srt 59.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions.eng.txt 59.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Poacher Turned Gamekeeper - Lessons Learned from Eight Years of Breaking Hypervisors.eng.tsv 59.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Extreme Privilege Escalation on Windows 8 UEFI Systems.eng.text 59.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Klein - Soc Engineering Methodology.txt 59.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mark Kadrich - Intrusion Detection in High Speed Networks.eng.txt 59.9 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Spread Spectrum Satcom Hacking Attacking The Globalstar Simplex Data Service.eng.srt 59.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pushing the Camel Through the Eye of a Needle - Haroon Meer.eng.text 59.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).eng.tsv 59.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dai Zovi - Hardware Virtualization.eng.srt 59.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Stephenson - Introduction to Cyber Forensic Analysis.eng.tsv 59.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Web Application Security -Jeremiah Grossman, Bill Pennington.eng.srt 59.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Journey to Protect Points-of-Sale.eng.srt 59.9 KB
- Black Hat USA/Black Hat USA 1998/pictures/00000068.JPG 59.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Simple Nomad and Todd Sabin - The RAZOR Warez.eng.lrc 59.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grossman - Hacking Intranet Outside.eng.vtt 59.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2 2).eng.txt 59.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 1-2 - John Benson.eng.vtt 59.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/FX - Design and Software Vulnerabilities In Embedded Systems.eng.tsv 59.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Security Myths of Extended Validation SSL Certificates - Alexander Sotirov, Mike Zusman.eng.tsv 59.9 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.lrc 59.8 KB
- Black Hat USA/Black Hat USA 1998/pictures/00000066.JPG 59.8 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Larry Leibrock - Digital Information, User Tokens, Privacy and Forensics Investigations The Case of Windows XP Platform.eng.srt 59.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Intra-Process Memory Protection for Applications on ARM and X86 - Leveraging the ELF ABI.eng.lrc 59.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking for Fun & Profit.eng.text 59.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Man-in-the-SCADA - Anatomy of Data Integrity Attacks in Industrial Control Systems.eng.lrc 59.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/APTs Way - Evading Your EBNIDS.eng.tsv 59.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017.eng.vtt 59.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2 2).eng.vtt 59.8 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.vtt 59.8 KB
- Black Hat DC/Black Hat Federal 2006/Characterising the real threats to our nation’s critical information systems - Tom Parker, Matthew G Devost.eng.lrc 59.8 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/How can the Security Researcher Community Work Better for the Common Good - Jeff Moss, Roger Cumming.eng.vtt 59.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Multivariate Solutions To Emerging Passive DNS Challenges.eng.txt 59.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David LeBlanc - Real World Techniques in Network Security Management.eng.tsv 59.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jim Litchko - Total BS Security business - based systems security.eng.vtt 59.8 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/The Other Side of Information Security - Wilco van Grinkel.eng.vtt 59.8 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Defending Your Network with Kerberos - Rooster & J.D. Glaser.eng.lrc 59.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Unraveling the Mind Behind the APT - Analyzing the Role of Pretexting in CTI and Attribution.eng.srt 59.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 1-2 - John Benson.eng.lrc 59.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Witchcraft Compiler Collection - Towards Self Aware Computer Programs.eng.srt 59.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Next Level Cheating and Leveling Up Mitigations.eng.tsv 59.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Building a Defensive Framework for Medical Device Security.eng.vtt 59.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Why Government Systems Fail at Security - Chey Cobb.eng.srt 59.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Trustworthy Computing Update - Scott Clup.eng.tsv 59.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.lrc 59.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Analysis of the Attack Surface of Windows 10 Virtualization-Based Security.eng.srt 59.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Java Exploitation.eng.srt 59.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/VoIP Wars - the Phreakers Awaken.eng.vtt 59.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/All Your GNN Models and Data Belong to Me.eng.srt 59.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Dynamic Fireware Analysis At Scale - A Case Study on Embedded Web Interfaces.eng.vtt 59.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/The Dark Age of Memory Corruption Mitigations in the Spectre Era.eng.srt 59.7 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Dirty Bin Cache A New Code Injection Poisoning Binary Translation Cache.eng.srt 59.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mark Kadrich - Intrusion Detection in High Speed Networks.eng.vtt 59.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Botnet Population and Intelligence Gathering Techniques - Christopher Davis & David Dagon.eng.tsv 59.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ray Kaplan - Meet The Enemy.eng.text 59.7 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Inside Android's SafetyNet Attestation.eng.tsv 59.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/IO in the Cyber Domain, Immunity Style - Sinan Eren & Dave Aitel.eng.txt 59.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/When the Lights Go Out - Hacking Cisco EnergyWise.eng.tsv 59.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Demystifying the Secure Enclave Processor.eng.srt 59.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacks to SAP Web Applications - Your crown jewels online - Mariano Nunez Di Croce.eng.txt 59.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image1.pict 59.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Post Memory Corruption Memory Analysis - Jonathan Brossard.eng.tsv 59.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Kitchen's Finally Burned Down - DLP Security Bakeoff.eng.txt 59.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unmasking You - Joshua Abraham, Robert Hansen.eng.lrc 59.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Torturing OpenSSL.eng.vtt 59.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stale pointers are the new black - Vincenzo Iozzo, Giovanni Gola.eng.txt 59.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Fischbach and Lacoste - Seris - IP Backbone Security.eng.text 59.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Defending Against Malicious Application Compatibility Shims.eng.tsv 59.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware.eng.lrc 59.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Padgett Peterson - Overlooked Local Attack Techniques.eng.vtt 59.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Paging All Windows Geeks - Finding Evil in Windows 10 Compressed Memory.eng.srt 59.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Keynote - Cyber Conflicts - Challenging the Future - Pat Arnold.eng.tsv 59.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Reverse Engineering and Exploiting Builds in the Cloud.eng.srt 59.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 1-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.text 59.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/Pages from therac-274940.pdf 59.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Femtocells A Poisonous Needle in the Operator’s Hay Stack - Nico Golde, Kevin Redon.eng.srt 59.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Stay Out of the Kitchen - A DLP Security Bake-Off.eng.vtt 59.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/OptiSig - Semantic Signature for Metamorphic Malware.eng.srt 59.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/DPTrace - Dual Purpose Trace for Exploitability Analysis of Program Crashes.eng.lrc 59.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/LTE & IMSI Catcher Myths.eng.text 59.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Automated Detection of HPP Vulnerabilities in Web Applications - Marco Balduzzi.eng.tsv 59.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Dissecting Smart Meters.eng.text 59.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Keynote Secretary Alejandro Mayorkas.eng.srt 59.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BlackOps.eng.tsv 59.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Michael Sutton, Adam Greene - Art Of File Format.tsv 59.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sutton and MacManus - Punk 0de.eng.tsv 59.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/Pages from JPCE-maisel-2002.pdf 59.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits.eng.srt 59.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Simple Nomad - Covering Your Tracks.eng.tsv 59.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Rooting SIM cards.eng.vtt 59.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Is Your Mental Health for Sale.eng.txt 59.5 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Unwinding the Stack for Fun and Profit.eng.srt 59.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fully Arbitrary 802.3 Packet Injection - Maximizing Ethernet Attack Surface.eng.srt 59.5 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Lemons and Liability Cyber Warranties as an Experiment in Software Regulation.eng.srt 59.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Spradlin - Auditing data Access.eng.txt 59.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 1-2.eng.txt 59.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Decrypting DPAPI data - Jean-Michel Picod, Elie Bursztein.eng.srt 59.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions.eng.lrc 59.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Biometric and Token-Based Access Control Systems - Zac Franken.eng.srt 59.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/FLEX, AMF 3 and BlazeDS An Assessment - Jacob Carlson, Kevin Stadmeyer.eng.text 59.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exchanging Demands.eng.vtt 59.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Prevalent Characteristics in Modern Malware.eng.lrc 59.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Exploiting Linux and Pax ASLR's Weaknesses on 32 Bit and 64 Bit Systems.eng.txt 59.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Charl van der Walt and Christoff Breytenbach - The Role of Non Obvious Relationships in the Foot Printing Process.eng.text 59.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/KEYNOTE - Whitfield Diffie.eng.lrc 59.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/MLD Considered Harmful - Breaking Another IPv6 Subprotocol.eng.txt 59.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mark Kadrich - Intrusion Detection in High Speed Networks.eng.lrc 59.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.jp.eng.vtt 59.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/iPhone Privacy - Nicolas Seriot.eng.vtt 59.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 1.eng.vtt 59.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Sarah Gordon - Viruses in the Information Age.eng.text 59.3 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Enhancing Automatic Vulnerability Discovery for Windows RPC COM in New Ways.eng.srt 59.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Multivariate Solutions To Emerging Passive DNS Challenges.eng.lrc 59.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic.eng.vtt 59.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces.eng.txt 59.3 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Plenty of Coppers in Change - Stuart Hyde.eng.tsv 59.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lessons Learned from Eight Years of Breaking Hypervisors.eng.vtt 59.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Crack a Microcell.eng.txt 59.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Beetle Potter - Evil Twins 802.11.eng.text 59.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Rapid Enterprise Triaging - Aaron LeMasters, Michael Murphy.eng.text 59.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Keynote - Information Technology Systems in a Post-Silcon World.eng.text 59.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Introduction to Tamper Evident Devices - datagram.eng.text 59.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/I Know Your Filtering Policy Better than You Do.eng.srt 59.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Satan is on My Friends List Attacking Social Networks - Shawn Moyer, Nathan Hamiel.eng.text 59.3 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Stamos - Breaking AJAX - English.eng.text 59.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/James Bamford - Researching Secrets Part II.eng.lrc 59.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Scala Security - Examining the Play and LiftWeb Frameworks.eng.vtt 59.2 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Enforcer - Timothy Mullen.eng.text 59.2 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Jennifer Granick - What's Different About Evidence in Computer Crime litigation.eng.text 59.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/AMF Testing.eng.srt 59.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Michael-Sutton-Adam-Green-The-Art-of-File-Format-Fuzzing-English.eng.txt 59.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/K K Mookhey - Evasion and Detection of Web Application Tactics.eng.vtt 59.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 1.eng.vtt 59.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Data Mining a Mountain of Zero Day Vulnerabilities.eng.srt 59.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CreepyDOL - Cheap, Distributed Stalking.eng.text 59.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Blended Web and Database Attacks on Real-Time, In-Memory Platforms.eng.srt 59.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Let s Get Physical - Breaking Home Security Systems and Bypassing Building Controls.eng.srt 59.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Flip Feng Shui - Rowhammering the VM's Isolation.eng.vtt 59.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacks to SAP Web Applications - Your crown jewels online - Mariano Nunez Di Croce.eng.lrc 59.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Kitchen's Finally Burned Down - DLP Security Bakeoff.eng.lrc 59.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Breaking the Isolation Cross-Account AWS Vulnerabilities.eng.srt 59.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Meet the Feds.eng.txt 59.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Exploiting The DRAM Rowhammer Bug To Gain Kernel Privileges.eng.srt 59.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kostya Kortchinsky - Bruce Schneier.eng.text 59.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Detecting & Preventing the Xen Hypervisor Subversions - Joanna Rutkowska, Rafal Wojtczuk.eng.tsv 59.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Worth - Cryptographic Port Knocking.eng.lrc 59.1 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/The Other Side of Information Security - Wilco van Grinkel.eng.tsv 59.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Numchecker - A System Approach for Kernel Rootkit Detection.eng.lrc 59.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roelof Temmingh and Haroon Meer - Setiri.eng.tsv 59.1 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Emerging Frontiers Insights from the Black Hat Asia Review Board.eng.srt 59.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerardo Richarte - Modern Intrusion Practices.eng.text 59.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.jp.eng.vtt 59.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Insider's Guide to Cyber-Insurance and Security Guarantees.eng.tsv 59.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.eng.txt 59.0 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/The CVSS Deception How We've Been Misled on Vulnerability Severity.eng.srt 59.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/James Bamford - Researching Secrets Part II.eng.srt 59.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Physical Security in a Networked World - Video Surveillance, Video Analytics, and you - Joshua A Marpet.eng.tsv 59.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/One Hack to Rule Them All Pervasive Account Takeovers in Integration Platforms.eng.srt 59.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding IMSI Privacy.eng.vtt 59.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android.eng.txt 59.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2 2).eng.lrc 59.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/You have No Idea Who Sent that Email 18 Attacks on Email Sender Authentication.eng.srt 59.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eric Schultze and George Kurtz - Over the Router, Through the Firewall, to Grandma's House We Go.eng.tsv 59.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ofir Arkin - Introducing X Playing Tricks with ICMP.eng.txt 59.0 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Investigating Malware Using Memory Forensics - A Practical Approach.eng.text 59.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Fireside Chat - Debora Plunkett and Jeff Moss.eng.vtt 59.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Is Your Mental Health for Sale.eng.lrc 59.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/IO in the Cyber Domain, Immunity Style - Sinan Eren & Dave Aitel.eng.lrc 59.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ofir Arkin - Introducing X Playing Tricks with ICMP.eng.vtt 59.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP Cookie Hijacking in the Wild - Security and Privacy Implications.eng.srt 59.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs.eng.srt 59.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stale pointers are the new black - Vincenzo Iozzo, Giovanni Gola.eng.lrc 59.0 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Sluggo - Denial of Service Attacks, and Defensive Strategies.eng.text 59.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Behind the Scenes of iOS Security.eng.vtt 58.9 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Hacked on National Television.eng.srt 58.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Spradlin - Auditing data Access.eng.lrc 58.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Klein - Soc Engineering Methodology.lrc 58.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Pin Pad Pwn.eng.srt 58.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hardware Backdooring.eng.srt 58.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David Litchfield - Compromising web Servers and Defensive Techniques.eng.tsv 58.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/DTRACE The Reverse Engineer’s Unexpected Swiss Army Knife - David Weston, Tiller Beauchamp.eng.tsv 58.9 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Bugs of Yore A Bug Hunting Journey on VMware's Hypervisor.eng.srt 58.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Dynamic Fireware Analysis At Scale - A Case Study on Embedded Web Interfaces.eng.tsv 58.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/VoIP Wars - Attack of the Cisco Phones.eng.vtt 58.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Ghost in the Air (Traffic).eng.srt 58.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/MLD Considered Harmful - Breaking Another IPv6 Subprotocol.eng.lrc 58.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Connection String Attack - Chema Alonso & Palako.eng.srt 58.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Paul Bohm - Taming Bugs.eng.vtt 58.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Analyzing an Unknown RF Based Data Transmission (Aka Fun with 27Mhz Wireless Keyboards) - Max Moser.eng.txt 58.9 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Living Off the Walled Garden Abusing the Features of the Early Launch Antimalware Ecosystem.eng.srt 58.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brett Moore - Shoot the Messenger.eng.srt 58.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits.eng.tsv 58.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/VOIP Wars - Destroying Jar Jar Lync.eng.vtt 58.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Secure Browser Plugins.eng.text 58.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Phishing for Funds - Understanding Business Email Compromise.eng.text 58.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking SMS - Zane Lackey, Luis Miras.eng.txt 58.8 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Single Instruction Multiple Data Leaks in Cutting-edge CPUs, AKA Downfall.eng.srt 58.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Poacher Turned Gamekeeper - Lessons Learned from Eight Years of Breaking Hypervisors.eng.vtt 58.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deeper Door Exploiting the NIC Chipset - Sherri Sparks, Shawn Embleton.eng.txt 58.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Crack a Microcell.eng.lrc 58.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 1 - Val Smith, Colin Ames & David Kerb.eng.txt 58.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Multiple Operation System Vurnarability.eng.vtt 58.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP 2 & Quic - Teaching Good Protocols to Do Bad Things.eng.vtt 58.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Saving Cyberspace by Jason Healey.eng.txt 58.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Spoonm - Metasploit Hacking Like in the Movies.eng.text 58.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Xenpwn - Breaking Paravirtualized Devices.eng.vtt 58.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Breaking Access Controls with Blekey.eng.vtt 58.8 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 1-2.eng.lrc 58.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Auger and Sima - 0day subscriptions.eng.srt 58.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Improving Security on Cisco Routers.pdf 58.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Improving Security on Cisco Routers.pdf 58.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Geers - Eisen - IPv6 - Update - Japanese.eng.srt 58.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - The Seven Axioms of Security.eng.vtt 58.7 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/When The Front Door Becomes a Backdoor The Security Paradox of OSDP.eng.srt 58.7 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Evasive Maneuvers Trends in Phishing Evasion & Anti-Evasion.eng.srt 58.7 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Defending Your Network with Kerberos - Rooster & J.D. Glaser.eng.vtt 58.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Router Exploitation - FX.eng.vtt 58.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deeper Door Exploiting the NIC Chipset - Sherri Sparks, Shawn Embleton.eng.vtt 58.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Flip Feng Shui - Rowhammering the VM's Isolation.eng.txt 58.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Why Government Systems Fail at Security - Chey Cobb.eng.txt 58.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/cpp-vptrs.html 58.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Silently Breaking ASLR In The Cloud.eng.txt 58.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.txt 58.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Beast is in Your Memory.eng.txt 58.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jennifer Granick - Legal Liability and Security Incident Investigation.eng.text 58.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting the iOS Kernel - Stefan Esser.eng.vtt 58.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daniel VanBelleghem - Solving Network Mystries.eng.srt 58.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces.eng.lrc 58.6 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/OVPNX 4 Zero-Days Leading to RCE, LPE and KCE (via BYOVD) Affecting Millions of OpenVPN Endpoints.eng.srt 58.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert J Hansen, Meredith L Patterson - Stopping Injection.srt 58.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Predictable PRNG in the vulnerable Debian OpenSSL package, the What and the How - Luciano Bello and Maximiliano Bertacchini.eng.txt 58.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Call Me - Gathering Threat Intelligence on Telephony Scams to Detect Fraud.eng.tsv 58.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloudburst - Hacking 3D and Breaking Out of VMware - Kostya Kortchinsky.eng.tsv 58.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Exploiting Linux and Pax ASLR's Weaknesses on 32 Bit and 64 Bit Systems.eng.lrc 58.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Iran's Soft-War for Internet Dominance.eng.vtt 58.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert Morris Sr - Non-Cryptographic Ways.srt 58.6 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Michael-Sutton-Adam-Green-The-Art-of-File-Format-Fuzzing-English.eng.lrc 58.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More 0-Days (or Code-Based Intrusion Detection by Korset) - Ohad Ben-Cohen.eng.txt 58.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/DevSecOps - What, Why and How.eng.vtt 58.6 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Adam Shostack - Will People Ever Pay for Privacy.eng.vtt 58.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bohm - Taming Bugs - English.eng.srt 58.6 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Mahaffey/BH_US_05-Mahaffey.rtf 58.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting the iOS Kernel - Stefan Esser.eng.txt 58.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hardening AWS Environments and Automating Incident Response for AWS Compromises.eng.srt 58.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Abusing Bleeding Edge Web Standards for Appsec Glory.eng.txt 58.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Creating a Spider Goat - Security with Intel CPU Transactional Memory Support.eng.srt 58.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Random Number Generator in PHP.eng.vtt 58.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Exploiting Lawful Interception to Wiretap the Internet.eng.tsv 58.6 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Fingerprint-Jacking Practical Fingerprint Authorization Hijacking in Android Apps.eng.srt 58.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Rooting SIM cards.eng.txt 58.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Defending Privacy at the U.S. Border - A Guide for Travelers Carrying Digita.eng.tsv 58.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.eng.lrc 58.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Franco - Case Studies Secure Dev IE7.eng.srt 58.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Beyond Scanning - Automating Web Application Security Tests.eng.tsv 58.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android.eng.lrc 58.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Meet the Feds.eng.lrc 58.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/V9-Scholz-SIP Stack Fingerprinting.eng.tsv 58.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Spy-Sense Spyware Tool for Executing Stealthy Exploits Against Sensor Networks - Thanassis Giannetsos.eng.tsv 58.5 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Hoshizawa - online Swindler - English.eng.text 58.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Underground Ecosystem of Credit Card Frauds.eng.text 58.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud.eng.txt 58.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Classification and Detection of Application Backdoors - Chris Wysopal.eng.tsv 58.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Navigating the Complex Challenges of Setting Up Efficient and Robust OT SOC Capabilities.eng.srt 58.5 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Bad Randomness Protecting Against Cryptography's Perfect Crime.eng.srt 58.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Torturing OpenSSL.eng.txt 58.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Beyond Files Forensic OWADE Cloud Based Forensic - Elie Bursztein.eng.tsv 58.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tzi-cker Chiueh - Checking Array Bound.text 58.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Beckstrom’s Law - Rod Beckstrom.eng.text 58.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Security Wolf of Wall Street - Fighting Crime With High Frequency Classification and.eng.tsv 58.4 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Finding Holes in Closed-source Software - Havlar Flake.eng.vtt 58.4 KB
- Black Hat USA/Black Hat USA 1998/pictures/00000089.JPG 58.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Teridian SoC Exploitation - Exploration of Harvard Architecture Smart Grid Systems.eng.text 58.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Decentralized Malware on The Blockchain.eng.vtt 58.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.eng.srt 58.4 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/The Living Dead Hacking Mobile Face Recognition SDKs with Non-Deepfake Attacks.eng.srt 58.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hunting the Shadows - In-Depth Analysis of Escalated APT Attacks.eng.vtt 58.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - The Black Hat Testimonies.eng.vtt 58.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Active & Passive Fingerprinting of Microsoft Based Operating Systems using the ICMP protocol - Ofir Arkin.eng.tsv 58.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dominique Brezinski - Building a Forensics Toolkit That Will Protect You from Evil Influences.eng.vtt 58.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/SADE Injecting Agents in to VM Guest OS - Matt Conover.eng.srt 58.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ofir Arkin - Introducing X Playing Tricks with ICMP.eng.lrc 58.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeremiah Grossman - Phishing with Super Bait.tsv 58.3 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.jp.eng.srt 58.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hacking the Fast Lane - Security issues in 802.11p, DSRC and WAVE - Bruno Goncalves de Oliveira & Rob Havelt.eng.vtt 58.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking SMS - Zane Lackey, Luis Miras.eng.lrc 58.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Vivisection of an Exploit Development Process - David Aitel.eng.tsv 58.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When the Cops Come A-Knocking - Handling Technical Assistance Demands from Law Enforcement.eng.srt 58.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Computrace Backdoor Revisited.eng.txt 58.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 1.eng.tsv 58.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Next Level Cheating and Leveling Up Mitigations.eng.vtt 58.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deeper Door Exploiting the NIC Chipset - Sherri Sparks, Shawn Embleton.eng.lrc 58.3 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.jp.eng.tsv 58.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.eng.tsv 58.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Paul Simmons - Welcome to Black Hat.eng.srt 58.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Bit-Squatting DNS Hijacking Without Exploitation - Artem Dinaburg.eng.text 58.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Stefano Zanero - Detecting 0 Day Attacks with Learning IDS.eng.vtt 58.3 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Rutkowska - Subverting Vista - English.eng.tsv 58.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware.eng.srt 58.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Alternative Medicine The Malware Analyst’s Blue Pill - Paul Royal.eng.tsv 58.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Scott Blake - Politics of Vulnerabilities.eng.vtt 58.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Payment Points of Interaction (POI).eng.txt 58.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools.eng.srt 58.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Brent Huston - Appliance Firewalls a detailed review.eng.vtt 58.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Enhancing ZFS in the Kernel - Soy Christian Kendi.eng.txt 58.2 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/CnCHunter An MITM-Approach to Identify Live CnC Servers.eng.srt 58.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.eng.vtt 58.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/ThunderStrike 2 Sith Strike.eng.srt 58.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jamie Butler - Greg Hoglund - VICE Catch the Hookers.eng.srt 58.2 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Virtual Private Problems A Broken Dream - Loki.eng.srt 58.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Cyber-Attacks & SAP systems - Is Our Business-Critical Infrastructure Expose.eng.tsv 58.2 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Locknote Conclusions and Key Takeaways from Day 2.eng.srt 58.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Flip Feng Shui - Rowhammering the VM's Isolation.eng.lrc 58.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Silently Breaking ASLR In The Cloud.eng.lrc 58.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/MAC EFI Rootkits.eng.srt 58.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Attack on Titan M, Reloaded Vulnerability Research on a Modern Security Chip.eng.srt 58.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits.eng.tsv 58.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.lrc 58.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Just-In-Time Code Reuse - The More Things Change, the More They Stay the Same.eng.tsv 58.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Schneier - Keynote, Following the Money Security Proxies and Agenda.eng.vtt 58.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Towards a Holistic Approach in Building Intelligence to Fight Crimeware.eng.srt 58.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Counterattack - Turning the tables on exploitation attempts from tools like metasploit - scriptjunkie.eng.text 58.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lessons Learned from Eight Years of Breaking Hypervisors.eng.txt 58.2 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Symbexcel Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros.eng.srt 58.2 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Surveilling the Masses with Wi-Fi Positioning Systems.eng.srt 58.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Analyzing an Unknown RF Based Data Transmission (Aka Fun with 27Mhz Wireless Keyboards) - Max Moser.eng.lrc 58.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Beast is in Your Memory.eng.lrc 58.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Abusing Windows Management Instrumentation WMI To Build A Persistent, Asyn.eng.srt 58.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Smartfuzzing the Web Carpe Vestra Foramina - Nathan Hamiel, Justin Engler, Seth Law, Gregory Fleischer.eng.text 58.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Android Universal Root Exploiting Mobile GPU - Command Queue Drivers.eng.srt 58.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Saving Cyberspace by Jason Healey.eng.lrc 58.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/VirtuallySecure - Oded Horovitz, Tal Garfinkel.eng.srt 58.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/MLD Considered Harmful - Breaking Another IPv6 Subprotocol.eng.vtt 58.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques.eng.vtt 58.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 1 - Val Smith, Colin Ames & David Kerb.eng.lrc 58.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting the iOS Kernel - Stefan Esser.eng.lrc 58.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Halvar Flake - Need New Tools.eng.srt 58.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Rooting SIM cards.eng.lrc 58.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Insane Detection of Insane Rootkits - Yuriy Bulygin.eng.srt 58.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pay No Attention to That Hacker Behind the Curtain - A Look Inside the Black Hat Network.eng.txt 58.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Language Properties of Phone Scammers - Cyberdefense At the Level of the Human.eng.tsv 58.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Mitigation Improvements.eng.text 58.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Padgett Peterson - Overlooked Local Attack Techniques.eng.txt 58.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Beast is in Your Memory.eng.vtt 58.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Abusing Silent Mitigations Understanding Weaknesses Within Internet Explorer.eng.srt 58.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Prevalent Characteristics in Modern Malware.eng.vtt 58.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More 0-Days (or Code-Based Intrusion Detection by Korset) - Ohad Ben-Cohen.eng.lrc 58.0 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Is Your Memory Protected Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms.eng.srt 58.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Software Exploitation.eng.vtt 58.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Cisco IOS Shellcodes Backdoors - Gyan Chawdhary, Varun Uppal.eng.srt 58.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Performance Optimization Weaknesses to Bypass ASLR.eng.txt 58.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS.eng.txt 58.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/VK1-Larkin-Fight org Cyber crime.eng.text 58.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Journey to Protect Points-of-Sale.eng.txt 58.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Governments As Malware Authors - The Next Generation.eng.vtt 58.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Pwnie Awards.eng.txt 58.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Abusing Bleeding Edge Web Standards for Appsec Glory.eng.vtt 58.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Even The Lastpass Will Be Stolen, Deal With It.eng.tsv 58.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud.eng.lrc 58.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014.eng.vtt 58.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Preventing Oh Shit Moments for 20 Euros or Less.eng.srt 58.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Client-Side Protection Against DOM-Based XSS Done Right (tm).eng.text 58.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Can You Trust Me Now An Exploration Into the Mobile Threat Landscape.eng.txt 58.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Why Government Systems Fail at Security - Chey Cobb.eng.lrc 58.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/The Art of Exploiting UAF by Ret2bpf in Android Kernel.eng.srt 58.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Torturing OpenSSL.eng.lrc 57.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Investigating DDOS - Architecture Actors and Attribution.eng.tsv 57.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Predictable PRNG in the vulnerable Debian OpenSSL package, the What and the How - Luciano Bello and Maximiliano Bertacchini.eng.lrc 57.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Combating the Insider Threat at the FBI - Real-world Lessons Learned.eng.text 57.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Abusing Bleeding Edge Web Standards for Appsec Glory.eng.lrc 57.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Finding Xori - Malware Analysis Triage with Automated Disassembly.eng.srt 57.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Manna from Heaven - Improving the State of Wireless Rogue AP Attacks.eng.tsv 57.9 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA.eng.text 57.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploiting Rich Content - Riley Hassell.eng.tsv 57.9 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Deep Impact Recognizing Unknown Malicious Activities from Zero Knowledge.eng.srt 57.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Lawful Access Panel.eng.tsv 57.9 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Defense Against Rapidly Morphing DDOS.eng.srt 57.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Forging the USB Armory.eng.txt 57.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hiding In Plain Sight - Advances In Malware Covert Communication Channels.eng.tsv 57.9 KB
- Black Hat DC/Black Hat Federal 2006/Extracting Unexpected Functionality from Existing Networks - Dan Kaminsky.eng.text 57.9 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/WebAuthn 101 - Demystifying WebAuthn.eng.srt 57.9 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Bypassing NGAV for Fun and Profit.eng.srt 57.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Responsibility for the Harm and Risk of Security Security Flaws - Cassio Goldschmidt.eng.srt 57.8 KB
- Black Hat USA/Black Hat USA 1998/pictures/00000086.JPG 57.8 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/X-Remote ICMP Based OS Fingerprinting Techniqu es - Ofir Arkin.eng.tsv 57.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Hardware-Enforced Security With Hypervisors.eng.vtt 57.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Computrace Backdoor Revisited.eng.lrc 57.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Stateful Inspection of FireWall-1.eng.srt 57.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Physical Memory Forensics for Files and Cache - Jamie Butler, Justin Murdock.eng.srt 57.8 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Breaking Firmware Trust From Pre - EFI Exploiting Early Boot Phases.eng.srt 57.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/I Know Your Filtering Policy Better than You Do.eng.txt 57.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/JD Glaser - Hacking With Executives.eng.tsv 57.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Crack a Microcell.eng.vtt 57.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BinaryPig - Scalable Malware Analytics in Hadoop.eng.vtt 57.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 1-2 - Lukas Grunwald.eng.tsv 57.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.vtt 57.8 KB
- Black Hat DC/Black Hat Federal 2006/Combatting Symbian Malware - Jarno Niemelä.eng.tsv 57.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Enhancing ZFS in the Kernel - Soy Christian Kendi.eng.lrc 57.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pulling Back the Curtain on Airport Security - Can a Weapon Get Past TSA.eng.srt 57.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Welcome & Introduction to Black Hat USA 2011 Jeff Moss, Keynote Speaker Cofer Black.eng.txt 57.7 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised ML.eng.srt 57.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Paul Simmons - Welcome to Black Hat.eng.txt 57.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Devil Does Not Exist - The Role of Deception in Cyber.eng.txt 57.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/iPhone Privacy - Nicolas Seriot.eng.tsv 57.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/AppSec A-Z Reverse Engineering, Source Code Auditing, Fuzzing, and Exploitation - Jared DeMott.eng.text 57.7 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/The Evil Alt-Ego (ab)using HTTP Alternative Services.eng.srt 57.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Linux Kernel Hidden Inside Windows 10.eng.text 57.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Apple Sand Box - Dionysus Blazakis.eng.vtt 57.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Stegospolit - Exploit Delivery With Steganography and Polyglots.eng.txt 57.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Embedded Management Interfaces - Hristo Bojinov, Elie Bursztein, Dan Boneh.eng.vtt 57.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lessons Learned from Eight Years of Breaking Hypervisors.eng.lrc 57.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Phil Zimmerman - My Next Big Project.srt 57.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Miniaturization.eng.tsv 57.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware.eng.vtt 57.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them.eng.tsv 57.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Bruce Schneier - Why Cryptograpy is Harder Than it Looks.eng.text 57.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Stay Out of the Kitchen - A DLP Security Bake-Off.eng.tsv 57.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/MAC EFI Rootkits.eng.txt 57.6 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Hobbit - Microsoft LM athentication, CIFS, and All Kinds of Password Problems.eng.text 57.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hell on Earth - From Browser to System Compromise.eng.srt 57.6 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Millions of Patient Records at Risk The Perils of Legacy Protocols.eng.srt 57.6 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Winter is Coming Back.eng.srt 57.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Man-in-the-SCADA - Anatomy of Data Integrity Attacks in Industrial Control Systems.eng.vtt 57.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/WiFi Security or Descending Into Depression and Drink - Mike Kershaw aka Dragorn.eng.text 57.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Governments As Malware Authors - The Next Generation.eng.txt 57.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploiting Firefox.eng.txt 57.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More Signatures Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling - Ivan Ristic, Ofar Shezaf.eng.text 57.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Design Approaches for Security Automation.eng.txt 57.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Faces Of Facebook Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.text 57.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Adam Shostack - Identity, Economics, Security, and Terrorism.eng.tsv 57.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Smartphone s Apps Are Not That Smart - Insecure Development Practices.eng.tsv 57.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Payment Points of Interaction (POI).eng.lrc 57.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pay No Attention to That Hacker Behind the Curtain - A Look Inside the Black Hat Network.eng.lrc 57.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Seth Fogie - Pocket PC Abuse.eng.tsv 57.5 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Cutting Edge Microsoft Browser Security - From People Who Owned It.eng.srt 57.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Picking Lockfiles Attacking & Defending Your Supply Chain.eng.srt 57.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.jp.eng.vtt 57.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Preparing for the Cross Site Request Forgery Defense - Chuck Willis.eng.text 57.5 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Shelters or Windmills - The Struggle For Power and Information Advantage.eng.tsv 57.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Sutton&Greene - The Art Of File Format Fuzz.eng.srt 57.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jennifer Granick - The Law of 'Sploits.eng.text 57.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device.eng.txt 57.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mobile Device Mismanagement.eng.txt 57.5 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jamie-Butler-Sherri-Sparks-Rootkit-Detection-English.eng.txt 57.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Tao of Hardware the Te of Implants.eng.txt 57.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Mo’ Money Mo’ Problems - Jeremiah Grossman, Trey Ford.eng.srt 57.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.eng.srt 57.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hunting the Shadows - In-Depth Analysis of Escalated APT Attacks.eng.txt 57.5 KB
- Black Hat USA/Black Hat USA 1998/pictures/00000074.JPG 57.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Padgett Peterson - Securing EMail Gateways from Attacks - What to do While Waiting for Vendors to Respond to the latest virus and worms.eng.txt 57.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Can You Trust Me Now An Exploration Into the Mobile Threat Landscape.eng.lrc 57.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Padgett Peterson - Overlooked Local Attack Techniques.eng.lrc 57.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Who's Really Attacking Your ICS Devices.eng.tsv 57.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Looking into the Eye of the Meter.eng.text 57.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Goldman and Marotta - Securing Your Computing Environment to Conform to Privacy Regulations.eng.text 57.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BinaryPig - Scalable Malware Analytics in Hadoop.eng.txt 57.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.eng.tsv 57.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Jinx - Malware 2.0 - Itzik Kotler, Jonathan Rom.eng.srt 57.4 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/My Ticks Don't Lie New Timing Attacks for Hypervisor Detection.eng.srt 57.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Forging the USB Armory.eng.lrc 57.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/IIS 6.0's Security Architecture - It's a Whole New World - Michael Muckin.eng.text 57.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.eng.vtt 57.4 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Knockout Win Against TCC - 20 NEW Ways to Bypass Your MacOS Privacy Mechanisms.eng.srt 57.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure in 2010 Broken in 2011.eng.srt 57.4 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Bypassing Anti-Cheats & Hacking Competitive Games.eng.srt 57.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Maynor - NX - How Well Does it Say NO.tsv 57.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mifare - Little Security, Despite Obscurity - Karsten Nohl.eng.txt 57.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS.eng.lrc 57.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Kingpin and Brian Oblivian - Secure Hardware Design.eng.text 57.3 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.eng.txt 57.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Side Channel Analysis on Embedded Systems Impact and Countermeasures - Job de Haas.eng.text 57.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.eng.txt 57.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Journey to Protect Points-of-Sale.eng.lrc 57.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Maximizing Home-field Advantage.eng.txt 57.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Hardware-Enforced Security With Hypervisors.eng.txt 57.3 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 2-2.eng.srt 57.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Detection of Firefox Extension Reuse Vulnerabilities.eng.tsv 57.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Lockpicking Forensics - Datagram.eng.text 57.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ed Gerck - Overview of Certification systems x509, CA, PGP and SKIP.eng.srt 57.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zanero - HostBased Anomaly Detection.eng.tsv 57.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/How Your E book Might Be Reading You Exploiting EPUB Reading Systems.eng.srt 57.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using EMET to Disable EMET.eng.srt 57.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/An Uninvited Guest Who Won't Go Home - Bill.eng.tsv 57.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Klein - Soc Engineering Methodology.srt 57.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 1.eng.tsv 57.3 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Do Not Trust the ASA, Trojans.eng.srt 57.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Attacking IPv6 Implementation Using Fragmentation.eng.vtt 57.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Multiplayer Online Games Insecurity.eng.srt 57.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Locknote Conclusions and Key Takeaways from Black Hat Asia 2022.eng.txt 57.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Intra-Process Memory Protection for Applications on ARM and X86 - Leveraging the ELF ABI.eng.srt 57.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unveiling the Open Source Visualization Engine for Busy Hackers.eng.tsv 57.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Rebecca Mercuri - Bev Harris - Managing Election Data The California Recall.eng.vtt 57.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Conducting a Successful False Flag Cyber Operation (Blame it on China).eng.text 57.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.eng.txt 57.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/When TLS Hacks You.eng.srt 57.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00001.jpg 57.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rutkowska - Subverting Vista Kernel.eng.text 57.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.eng.srt 57.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing.eng.vtt 57.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Pwnie Awards.eng.lrc 57.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Enhancing ZFS in the Kernel - Soy Christian Kendi.eng.vtt 57.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace.eng.tsv 57.2 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Raiden Glitching Framework.eng.srt 57.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Locknote Conclusions and Key Takeaways from Black Hat Asia 2022.eng.vtt 57.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Mobile-Telephony Threats in Asia.eng.tsv 57.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/What the Fuzz.eng.txt 57.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Stoned Bootkit - Peter Kleissner.eng.tsv 57.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/I Know Your Filtering Policy Better than You Do.eng.lrc 57.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Performance Optimization Weaknesses to Bypass ASLR.eng.lrc 57.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Offensive Threat Modeling for Attackers - Turning Threat Modeling on its Hea.eng.text 57.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Pwnie Awards.eng.srt 57.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/MAC EFI Rootkits.eng.lrc 57.1 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Attacking NPUs of Multiple Platforms.eng.srt 57.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Security Testing Best Practiceson complex File Format Fuzzing - Qing Wang.eng.srt 57.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Power Analysis Attacks for Cheapskates.eng.text 57.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fact and Fiction - Defending Medical Device.eng.vtt 57.1 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00007.jpg 57.1 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00016.jpg 57.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Welcome & Introduction to Black Hat USA 2011 Jeff Moss, Keynote Speaker Cofer Black.eng.lrc 57.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Stegospolit - Exploit Delivery With Steganography and Polyglots.eng.lrc 57.1 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Permission Mining in GCP.eng.srt 57.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Devil Does Not Exist - The Role of Deception in Cyber.eng.lrc 57.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Design Approaches for Security Automation.eng.lrc 57.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 2-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.vtt 57.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gerard Eschelbeck - The laws of Vulnerabilities for Internal Networks.eng.tsv 57.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device.eng.srt 57.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex - Shreeraj Shah.eng.text 57.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Internal Affairs Hacking File System Access from the Web.eng.srt 57.1 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 1-2.eng.vtt 57.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Paul Simmons - Welcome to Black Hat.eng.lrc 57.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Weaponizing the Web - Nathan Hamiel, Shawn Moyer.eng.text 57.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Open Sourcing Automotive Diagnostics.eng.text 57.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Rogue7 Rogue Engineering-Station Attacks on S7 Simatic PLCs.eng.srt 57.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Apple vs. Google Client Platforms.eng.vtt 57.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.eng.txt 57.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploiting Firefox.eng.lrc 57.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Governments As Malware Authors - The Next Generation.eng.lrc 57.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Chip & PIN is Definitely Broken - Adam Laurie, Zac Franken, Andrea Barisani, Daniele Bianco.eng.text 57.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Keynote - Devaluing Attack - Disincentivizing Threats Against The Next Billion Devices.eng.text 57.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Unveiling Mac Security A Comprehensive Exploration of Sandboxing and AppData TCC.eng.srt 57.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing.eng.txt 57.0 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/A Novel Attack Surface Java Authentication and Authorization Service (JAAS).eng.srt 57.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mobile Device Mismanagement.eng.lrc 57.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Tao of Hardware the Te of Implants.eng.lrc 57.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Maximizing Home-field Advantage.eng.vtt 57.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Phillip Hallam - Baker - Phishing - commiting Fraud in Public.eng.tsv 57.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Manna from Heaven - Improving the State of Wireless Rogue AP Attacks.eng.vtt 57.0 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Guest Revolution Chaining 3-bugs to compromise the Windows kernel from the VMware guest.eng.srt 57.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.text 57.0 KB
- Black Hat Windows/Black Hat Windows 2001/Video/Black Hat Windows 2001 captions/Host Based Intrusion Detection Using W2K Auditing Features - Macy Bergoon.eng.text 57.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Netscreen of the Dead - Graeme Neilson.eng.txt 57.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joukov-et_al-Kefence_files/micro.png 57.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.eng.srt 57.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sophail A Critical Analysis of Sophos Antivirus - Tavis Ormandy.eng.tsv 56.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Can You Trust Me Now An Exploration Into the Mobile Threat Landscape.eng.vtt 56.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Introducing Ring -3 Rootkits - Alexander Tereshkin & Rafal Wojtczuk.eng.srt 56.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwning Your Java Messaging With Deserialization Vulnerabilities.eng.srt 56.9 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Mesh Stalkings-Penetration Testing with Small Networked Devices.eng.txt 56.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Capturing 0Day Exploits With Perfectly Placed Hardware Traps.eng.txt 56.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BinaryPig - Scalable Malware Analytics in Hadoop.eng.lrc 56.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Detection of Firefox Extension Reuse Vulnerabilities.eng.srt 56.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hunting the Shadows - In-Depth Analysis of Escalated APT Attacks.eng.lrc 56.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jan K Rutkowski - Advance Windows 2000 Rootkits Detection.eng.text 56.9 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Michael-Sutton-Adam-Green-The-Art-of-File-Format-Fuzzing-English.eng.vtt 56.9 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Chris-Hurley-Identifying-and-Responding-to-Wireless-Attacks-English.eng.vtt 56.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.eng.tsv 56.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Tactical Application Security Program - Getting Stuff Done.eng.text 56.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Implementing the Lessons Learned From a Major Cyber Attack.eng.tsv 56.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device.eng.lrc 56.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dominique Brezinski - Building a Forensics Toolkit That Will Protect You from Evil Influences.eng.tsv 56.8 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Next Generation Debuggers for Reverse Engineering - ERESI Team.eng.tsv 56.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Maximizing Home-field Advantage.eng.lrc 56.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daniel VanBelleghem - Solving Network Mystries.eng.txt 56.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Ghost in the Air (Traffic).eng.txt 56.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Sandbox Roulette - Are You Ready For The Gamble.eng.txt 56.8 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Demystifying Key Stretching and PAKEs.eng.srt 56.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Hardware-Enforced Security With Hypervisors.eng.lrc 56.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeremy Rauch - How Responsive are Vendors to Security Problems When They Aren't Being Pressured.eng.text 56.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Panel - Proposed Vulnerability Handling.eng.text 56.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Devil Does Not Exist - The Role of Deception in Cyber.eng.vtt 56.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Library of Sparta.eng.tsv 56.8 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/A New Hope The One Last Chance to Save Your SSD Data.eng.srt 56.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.eng.vtt 56.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gerard Eschelbeck - The laws of Vulnerabilities for Internal Networks.eng.vtt 56.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hardening Windows 8 apps for the Windows Store.eng.tsv 56.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.eng.lrc 56.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Padgett Peterson - Securing EMail Gateways from Attacks - What to do While Waiting for Vendors to Respond to the latest virus and worms.eng.lrc 56.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Halvar Flake - Need New Tools.eng.txt 56.7 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jamie-Butler-Sherri-Sparks-Rootkit-Detection-English.eng.lrc 56.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSL And The Future of Authenticity - Moxie Marlinspike.eng.tsv 56.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Dex Education.eng.tsv 56.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Reversing a Japanese Wireless SD Card - From Zero to Code Execution.eng.vtt 56.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.eng.lrc 56.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Year in Flash.eng.srt 56.7 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/E-Meet (or Emit) My Keystrokes How Benign Screen-sharing Meetings Could Leak Typing Behaviors.eng.txt 56.7 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Choo Choo, Network Train - The One to Rule Your Perimeter.eng.srt 56.7 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/PPLdump Is Dead. Long Live PPLdump.eng.srt 56.7 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 2-2.eng.txt 56.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/0-Knowledge Fuzzing - Vincenzo Iozzo.eng.txt 56.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mifare - Little Security, Despite Obscurity - Karsten Nohl.eng.lrc 56.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Forging the USB Armory.eng.vtt 56.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/What the Fuzz.eng.vtt 56.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Invisibility Purge - Unmasking the Dormant Events of Invisible Web Controls.eng.tsv 56.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Keynote Blue to Red Traversing the Spectrum by Amanda Rousseau.eng.tsv 56.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/What the Fuzz.eng.lrc 56.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Padgett Peterson - Securing EMail Gateways from Attacks - What to do While Waiting for Vendors to Respond to the latest virus and worms.eng.vtt 56.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.eng.srt 56.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.eng.tsv 56.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.eng.lrc 56.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/WebTracking for You.eng.tsv 56.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/(In-)Security of Backend-As-A-Service.eng.tsv 56.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Saving Cyberspace by Jason Healey.eng.vtt 56.7 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/The Industrial Revolution of Lateral Movement.eng.srt 56.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with API and Sysenter.jp.eng.vtt 56.7 KB
- Black Hat USA/Black Hat USA 1998/pictures/00000083.JPG 56.7 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses.eng.tsv 56.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Issues with Embedded Device Disclosures - Helping the Vendors and Recognizin.eng.txt 56.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.vtt 56.6 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Applied Black Op Networking on Windows XP - Dan Kaminsky.eng.text 56.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Bypassing Secure Boot Using Fault Injection.eng.srt 56.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Rick Smith - Masquerades,Tricking Modern Auth Systems.eng.vtt 56.6 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00010.jpg 56.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/iOS Kernel.eng.srt 56.6 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Bypassing Windows Hello for Business and Pleasure.eng.srt 56.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When Governments Attack - State Sponsored Malware Attacks Against Activists Lawyers and Journalists.eng.srt 56.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Attacking IPv6 Implementation Using Fragmentation.eng.txt 56.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybercrime in The Deep Web.eng.tsv 56.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Locknote Conclusions and Key Takeaways from Black Hat Asia 2022.eng.lrc 56.6 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/How We Taught ChatGPT-4 to Break mbedTLS AES With Side-Channel Attacks.eng.srt 56.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Fireside Chat with U.S. National Cyber Director Chris Inglis.eng.srt 56.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/A Peek Under the Blue Coat.eng.vtt 56.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Advanced CAN Injection Techniques for Vehicle Networks.eng.text 56.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kenneth Geers - Hacking in a Foreign.eng.text 56.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.eng.txt 56.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.eng.srt 56.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BIOS Security.eng.text 56.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.eng.text 56.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Remote Malicious Butler Did It.eng.srt 56.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Gregory S Miles - Computer Forensics a Critical Process in Your Incident Response Plan.eng.text 56.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014.eng.txt 56.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mobile Device Mismanagement.eng.vtt 56.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Big Game Hunting The Peculiarities Of Nation State Malware Research.eng.srt 56.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing.eng.lrc 56.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools.eng.tsv 56.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hackproofing Oracle Ebusiness Suite.eng.srt 56.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Saumil Shah - Defeating Automated Web Assessment Tools.eng.vtt 56.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/DevSecOps - What, Why and How.eng.txt 56.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mohney - Defend with Voice Analytics.eng.txt 56.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Kicking in the Door to the Cloud Exploiting Cloud Provider Vulnerabilities for Initial Access.eng.srt 56.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Design Approaches for Security Automation.eng.vtt 56.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The BEAST Wins Again - Why TLS Keeps Failing to Protect HTTP.eng.vtt 56.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.eng.lrc 56.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hardening AWS Environments and Automating Incident Response for AWS Compromises.eng.txt 56.4 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Generating YARA Rules by Classifying Malicious Byte Sequences.eng.srt 56.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/MoRE Shadow Walker - The Progression of TLB-Splitting on x86.eng.srt 56.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Mesh Stalkings-Penetration Testing with Small Networked Devices.eng.lrc 56.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Complexity in Computer Security - a Risky Business - Jeff Moss, Ian Angell.eng.vtt 56.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Capturing 0Day Exploits With Perfectly Placed Hardware Traps.eng.lrc 56.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Miniaturization.eng.vtt 56.4 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/CoDe16 - 16 Zero-Day Vulnerabilities Affecting CODESYS Framework Leading to Remote Code Execution.eng.srt 56.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/From Coordinated Disclosure to Cooperative Vulnerability When Dealing w - Critical Software Stacks.eng.vtt 56.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam Boileau - Trust Transcience.eng.text 56.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mifare - Little Security, Despite Obscurity - Karsten Nohl.eng.srt 56.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Ghost in the Air (Traffic).eng.lrc 56.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service.eng.txt 56.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.eng.txt 56.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.jp.eng.srt 56.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Pin Pad Pwn.eng.txt 56.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking the Corporare Mind.eng.vtt 56.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/0-Knowledge Fuzzing - Vincenzo Iozzo.eng.srt 56.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/UART THOU MAD.eng.txt 56.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Thorsen Holz - Maximilliam Dornseif - NoSEBrEaK Defeating Honeypots.eng.srt 56.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Netscreen of the Dead - Graeme Neilson.eng.lrc 56.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Phil Zimmerman - My Next Big Project.tsv 56.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Power Analysis Attacks for Cheapskates.eng.tsv 56.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Alexa, Hack My Server(less) Please.eng.srt 56.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Feinstien_and_Peck/Presentation/bh-usa-07-feinstien_and_peck.pdf 56.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking the Corporare Mind.eng.txt 56.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Breaking Access Controls with Blekey.eng.txt 56.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Scott Blake - Politics of Vulnerabilities.eng.tsv 56.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/iRK - Crafting OS X Kernel Rootkits - Jesse D’Aguanno.eng.tsv 56.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ben Laurie - CaPerl.eng.srt 56.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Black-box Assessment of Pseudorandom Algorithms.eng.txt 56.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Sandbox Roulette - Are You Ready For The Gamble.eng.srt 56.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Capstone - Next Generation Disassembly Framework.eng.srt 56.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).eng.srt 56.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Simple Nomad - Strategies for Defeating Distributed Attacks.eng.tsv 56.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/24 Techniques to Gather Threat Intel and Track Actors.eng.srt 56.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert J Hansen, Meredith L Patterson - Stopping Injection.tsv 56.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Attention Is All You Need for Semantics Detection A Novel Transformer on Neural-Symbolic Approach.eng.srt 56.2 KB
- Black Hat DC/Black Hat Federal 2006/Characterising the real threats to our nation’s critical information systems - Tom Parker, Matthew G Devost.eng.vtt 56.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/VirtuallySecure - Oded Horovitz, Tal Garfinkel.eng.tsv 56.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dan Kaminsky - the Black Ops of DNS.eng.tsv 56.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Router Exploitation - FX.eng.tsv 56.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Batz - Security Issues Affecting Internet Transit Points and Backbone Providers.eng.text 56.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Assortment of Database Goodies.eng.txt 56.2 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/From an URGENT 11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet.eng.srt 56.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Malware Distribution via Widgetization of the Web - Neil Daswani.eng.vtt 56.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Halvar Flake - Need New Tools.eng.lrc 56.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Analyzing an Unknown RF Based Data Transmission (Aka Fun with 27Mhz Wireless Keyboards) - Max Moser.eng.srt 56.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Recoverable Advanced Metering Infrastructure - Mike Davis.eng.text 56.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Multiplayer Online Games Insecurity.eng.txt 56.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Rustock Botnet Takedown - Julia Wolf, Alex Lanstein.eng.text 56.2 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Poisoning Web-Scale Training Datasets is Practical.eng.srt 56.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00035.jpg 56.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel.eng.txt 56.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Sandbox Roulette - Are You Ready For The Gamble.eng.lrc 56.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Dissecting CSRF Attacks and Countermeasures.eng.srt 56.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using EMET to Disable EMET.eng.tsv 56.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Russia - Inside an unprecended prosecution of organized cybercrime - Joseph Menn.eng.text 56.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daniel VanBelleghem - Solving Network Mystries.eng.lrc 56.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Beyond the Blacklists - Detecting Malicious URL Through Machine Learning.eng.srt 56.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pointers and Handlers - Alex Ionescu.eng.vtt 56.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00023.jpg 56.1 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/WorstFit Unveiling Hidden Transformers in Windows ANSI.eng.srt 56.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Capturing 0Day Exploits With Perfectly Placed Hardware Traps.eng.vtt 56.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.eng.lrc 56.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Covert Post-Exploitation Forensics with Metasploit - Wesley McGrew.eng.text 56.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel.eng.vtt 56.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014.eng.lrc 56.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/0-Knowledge Fuzzing - Vincenzo Iozzo.eng.lrc 56.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Chain of Fools An Exploration of Certificate Chain Validation Mishaps.eng.vtt 56.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Russ-Rogers-Covert-Channels-English done.eng.text 56.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Attacking IPv6 Implementation Using Fragmentation.eng.lrc 56.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Smart Nest Thermostat - A Smart Spy in Your Home.eng.txt 56.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Decentralized Malware on The Blockchain.eng.txt 56.0 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.text 56.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/DevSecOps - What, Why and How.eng.lrc 56.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Threats.eng.tsv 56.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Bruce Potter - 802.11X.eng.text 56.0 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/DataBinding2Shell Novel Pathways to RCE Web Frameworks.eng.srt 56.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Revisiting XSS Sanitization.eng.tsv 56.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Let's See What's Out There - Mapping the Wireless IOT.eng.srt 56.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/SQL Injections.eng.txt 56.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Femtocells A Poisonous Needle in the Operator’s Hay Stack - Nico Golde, Kevin Redon.eng.txt 56.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Make My Day – Just Run a Web Scanner Countering The Faults of Typical Web Scanners Through Byte-code Injection - Toshinari Kureha & Dr. Brian Chess.eng.txt 56.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/From Logic to Memory Winning the Solitaire in Reparse Points.eng.srt 56.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Microsoft Vista NDA-less The Good, The Bad, and The Ugly - Chris Paget.eng.tsv 56.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hardening AWS Environments and Automating Incident Response for AWS Compromises.eng.lrc 56.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/NFC Analysis.eng.text 56.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Oracle Data Redaction is Broken by David Litchfield.eng.vtt 56.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/VoIP Wars - Attack of the Cisco Phones.eng.txt 55.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/What s on the Wire - Physical Layer Tapping with Project Daisho.eng.tsv 55.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AirBnBeware - Short Term Rentals Long Term Pwnage.eng.txt 55.9 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Kortti - Input Attack Trees - Japanese.eng.srt 55.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Hunting Flaws in MS SQL Server - Cesar Cerrudo, Aaron Newman.eng.tsv 55.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Behind the Scenes of iOS Security.eng.tsv 55.9 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Securing Network Appliances New Technologies and Old Challenges.eng.srt 55.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking Like in the Movies - Visualizing Page Tables for Local Exploitation.eng.text 55.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Developments in Cisco iOS Forensics - Felix FX Linder.eng.srt 55.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Viral Infections in Cisco iOS - Ariel Futoransky.eng.txt 55.9 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/E-Meet (or Emit) My Keystrokes How Benign Screen-sharing Meetings Could Leak Typing Behaviors.eng.lrc 55.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/VoIP Wars - the Phreakers Awaken.eng.txt 55.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.eng.lrc 55.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.eng.text 55.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Multiple Operation System Vurnarability.eng.txt 55.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents.eng.srt 55.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/SQL Injections.eng.srt 55.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Insane Detection of Insane Rootkits - Yuriy Bulygin.eng.txt 55.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Issues with Embedded Device Disclosures - Helping the Vendors and Recognizin.eng.lrc 55.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet.eng.txt 55.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Pin Pad Pwn.eng.lrc 55.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Journey From JNDI LDAP Manipulation to Remote Code Execution Dream Land.eng.srt 55.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/UnOAuthorized A Technique to Privilege Escalation to Global Administrator.eng.srt 55.8 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Anti-Forensics Reverse Engineering a Leading Phone Forensic Tool.eng.srt 55.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/A Peek Under the Blue Coat.eng.txt 55.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Gordon Reichard Jr - Trust, Security, Partnership Strategies in Selecting a Managed Service Provider.eng.text 55.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Sniff Keystrokes with Lasers Voltmeters - Andrea Barisani, Daniele Bianco.eng.txt 55.8 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 2-2.eng.lrc 55.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Breaking the Security of Physical Devices by Silvio Cesare.eng.srt 55.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Brent Huston - Appliance Firewalls a detailed review.eng.tsv 55.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mohney - Defend with Voice Analytics.eng.lrc 55.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Intrusion Detection.eng.txt 55.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/ClusterFuzz Fuzzing at Google Scale.eng.tsv 55.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking the Corporare Mind.eng.lrc 55.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Breaking Access Controls with Blekey.eng.lrc 55.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Stealing with BGP - Steve Dugan.eng.tsv 55.8 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Magicdot A Hacker's Magic Show of Disappearing Dots and Spaces.eng.srt 55.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Netscreen of the Dead - Graeme Neilson.eng.srt 55.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Unmanned Aerial Vehicles - Exploit Automation with the Metasploit Framework - James Lee.eng.txt 55.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Evasion of Web Application.eng.srt 55.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Black-box Assessment of Pseudorandom Algorithms.eng.lrc 55.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Automating Incident Response.eng.tsv 55.8 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Strengthening Cyber Resiliency in a Time of Geopolitical Crises.eng.srt 55.8 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Blast-RADIUS Breaking RADIUS, the de facto standard protocol for authentication, authorization.eng.srt 55.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.eng.tsv 55.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Fredric Bret - Mounet - Automated Detection of COM Vulnerabilities.eng.tsv 55.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 2.eng.tsv 55.8 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them.eng.srt 55.8 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them_en.srt 55.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Honey, I'm Home - Hacking Z-Wave Home Automation Systems.eng.srt 55.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/The GCP Jenga Tower Hacking Millions of Google's Servers With a Single Package (and more).eng.srt 55.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brett Moore - Shoot the Messenger.eng.txt 55.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The BEAST Wins Again - Why TLS Keeps Failing to Protect HTTP.eng.txt 55.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sotirov - HotPatching3rd Party Patch.eng.srt 55.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Building a Defensive Framework for Medical Device Security.eng.tsv 55.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.jp.eng.tsv 55.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Tatum - Managing the External Environment.eng.vtt 55.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Heavy Metal That Poisoned the Droid.eng.vtt 55.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/The NSA Playset A Year Of Toys And Tools.eng.srt 55.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.eng.srt 55.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel.eng.lrc 55.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ben Laurie - CaPerl.eng.txt 55.7 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Grand Theft House RF Lock Pick Tool to Unlock Smart Door Lock.eng.srt 55.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Exploiting Qualcomm WLAN and Modem Over The Air.eng.srt 55.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.jp.eng.tsv 55.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/UART THOU MAD.eng.lrc 55.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Hacker Court.eng.text 55.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/XMPP Stanza Smuggling or How I Hacked Zoom.eng.srt 55.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is That You, Baby, or Just a Bridge in the Sky.eng.srt 55.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Interview with Neal Stephenson.eng.txt 55.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Asia 2016.eng.tsv 55.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C. Foster, Vincent T. Liu - Catch Me if You Can.text 55.6 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00017.jpg 55.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/End-to-end Analysis of Domain Generating Algorithm Malware Family.eng.vtt 55.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Malicious PDF Analysis.eng.text 55.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Appliances - Ironic exploitation of security products.eng.text 55.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Towards a Holistic Approach in Building Intelligence to Fight Crimeware.eng.txt 55.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hopping on the CAN Bus.eng.tsv 55.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Timing Attacks Have Never Been So Practical - Advanced Cross-Site Search Attacks.eng.vtt 55.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Rocking The Pocket Book Hacking Chemical Plant For Competition And Extortion.eng.srt 55.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cache Side Channel Attack - Exploitability and Countermeasures.eng.tsv 55.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Trust, Security and Society.eng.tsv 55.6 KB
- Black Hat USA/Black Hat USA 1998/pictures/00000093.JPG 55.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Decentralized Malware on The Blockchain.eng.lrc 55.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Dynamic Flash Instrumentation for Fun and Profit.eng.srt 55.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/New Botnets Trends and Threats - Augusto Paes de Barros, André Fucs & Victor Pereira.eng.txt 55.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Smart Nest Thermostat - A Smart Spy in Your Home.eng.lrc 55.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Multiplayer Online Games Insecurity.eng.lrc 55.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Sutton&Greene - The Art Of File Format Fuzz.eng.tsv 55.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwnie Awards 2016.eng.vtt 55.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Cyber-Attacks & SAP systems - Is Our Business-Critical Infrastructure Expose.eng.vtt 55.5 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SMTP Information Gathering - Lluis Mora.eng.vtt 55.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Larry Korba - Hope Hype and Horrors E - Commerce Explored.eng.tsv 55.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends.eng.text 55.5 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Richard Thieme - Masters of the Unseen The Art of Information Warfare.eng.text 55.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Virtualization Under Attack Breaking Out of KVM - Nelson Elhage.eng.srt 55.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Detecting & Preventing the Xen Hypervisor Subversions - Joanna Rutkowska, Rafal Wojtczuk.eng.vtt 55.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Rapid Radio Reversing.eng.tsv 55.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ofir Arkin - Infrastructure Discovery.eng.text 55.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service.eng.lrc 55.5 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/My other ClassLoader is your ClassLoader Creating evil twin instances of a class.eng.srt 55.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Viral Infections in Cisco iOS - Ariel Futoransky.eng.srt 55.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Hacking XPATH 2.0.eng.text 55.5 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Fireside Chat - Debora Plunkett and Jeff Moss.eng.tsv 55.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/HTML5 Threats.eng.text 55.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure Password Managers and Military-Grade Encryption on Smartphones Oh Re.eng.srt 55.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AirBnBeware - Short Term Rentals Long Term Pwnage.eng.lrc 55.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Aerial Cyber Apocalypse If We Can Do It So Can They - Richard Perkins, Mike Tassey.eng.text 55.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/VoIP Wars - Attack of the Cisco Phones.eng.lrc 55.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Heavy Metal That Poisoned the Droid.eng.txt 55.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter.eng.srt 55.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Tackling Privilege Escalation with Offense and Defense.eng.vtt 55.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Greg Hoglund - 1000 Hackers in a box Failings of Security Scanners.eng.srt 55.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 2.eng.vtt 55.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eugene Schultz - Security Issues with Configuring and Maintaining an IIS 4 Server.eng.srt 55.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Measuring Adversary Costs to Exploit Commercial Software.eng.tsv 55.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/VoIP Wars - the Phreakers Awaken.eng.lrc 55.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Assortment of Database Goodies.eng.lrc 55.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Chris-Hurley-Identifying-and-Responding-to-Wireless-Attacks-English.eng.tsv 55.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS.eng.srt 55.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Predicting Susceptibility to Socialbots on Twitter.eng.text 55.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Xenpwn - Breaking Paravirtualized Devices.eng.tsv 55.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Multiple Operation System Vurnarability.eng.lrc 55.4 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Jose Esparza on Peepdf.eng.json 55.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Interview with Neal Stephenson.eng.vtt 55.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet.eng.lrc 55.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Skirting the Tornado Essential Strategies for CISOs to Sidestep Government Fallout.eng.srt 55.4 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.eng.text 55.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces.eng.vtt 55.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Nope, S7ill Not Secure Stealing Private Keys From S7 PLCs.eng.srt 55.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.jp.eng.vtt 55.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Femtocells A Poisonous Needle in the Operator’s Hay Stack - Nico Golde, Kevin Redon.eng.lrc 55.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/The Air-Gap Jumpers.eng.srt 55.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploiting Firefox.eng.vtt 55.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/SQL Injections.eng.lrc 55.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alex Wheeler, Niel Mehta - Owning Anti-virus.eng.text 55.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/IoT Skimmer Energy Market Manipulation through High-Wattage IoT Botnets.eng.srt 55.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/A Peek Under the Blue Coat.eng.lrc 55.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Exploiting Adobe Flash Player In The Era Of Control Flow Guard.eng.srt 55.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Paul Bohm - Taming Bugs.eng.tsv 55.4 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bohm - Taming Bugs - English.eng.txt 55.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Chasing Your Tail With a Raspberry Pi.eng.srt 55.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Evasion of High-End IDPS Devices at the IPv6 Era.eng.vtt 55.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Intrusion Detection.eng.lrc 55.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Vulnerability Exploitation In Docker Container Environments.eng.txt 55.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Base - Security (or lack thereof) and our Friends in Redmond.eng.srt 55.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Viral Infections in Cisco iOS - Ariel Futoransky.eng.lrc 55.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Managed Code Rootkits - Erez Metula.eng.text 55.3 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/configure 55.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cushman - MS Security fundamentals.eng.vtt 55.3 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/What the Log So Many Events, so Little Time.eng.srt 55.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Halvar Flake - Graph Based Binary Analysis.eng.srt 55.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/David Litchfeild - All new 0day.eng.txt 55.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Meet the Feds.eng.vtt 55.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency.eng.srt 55.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Unmanned Aerial Vehicles - Exploit Automation with the Metasploit Framework - James Lee.eng.lrc 55.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Practical New Developments in The Breach Attack.eng.tsv 55.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/KEYNOTE - Whitfield Diffie.eng.vtt 55.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Predictable PRNG in the vulnerable Debian OpenSSL package, the What and the How - Luciano Bello and Maximiliano Bertacchini.eng.vtt 55.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Litchfield - Variations in Exploit Methods between Linux and Windows.eng.txt 55.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Closing Session.eng.text 55.3 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/David-Maynor-Architecture-Flaws-in-Common-Security-Tools-English.eng.srt 55.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bitcoin Transaction Malleability Theory in Practice.eng.srt 55.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brett Moore - Shoot the Messenger.eng.lrc 55.3 KB
- Black Hat DC/Black Hat Federal 2006/Nematodes - Dave Aitel.eng.tsv 55.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The BEAST Wins Again - Why TLS Keeps Failing to Protect HTTP.eng.lrc 55.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking Big Data - Evading Analysis of the Metadata of Your Life.eng.txt 55.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Insane Detection of Insane Rootkits - Yuriy Bulygin.eng.lrc 55.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/From Zero to Secure in One Minute.eng.txt 55.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Mobile Malware Madness, and How To Cap the Mad Hatters - Neil Daswani.eng.srt 55.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Ralf Spenneberg - IKE Testing IKE Implementations.eng.txt 55.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HDMI - Hacking Displays Made Interesting.eng.txt 55.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ofir Arkin - Bypassing NAC Systems.eng.srt 55.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cushman - MS Security fundamentals.eng.txt 55.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Spy-jacking the Booters.eng.text 55.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Kenneth-Geers-Hacking-in-a-Foreign-Language-A-Network-Security-Guide-to-Russia-and-Beyond-English.eng.tsv 55.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Stumping the Mobile Chipset.eng.srt 55.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking and Forensicating an Oracle Database Server - David Litchfield.eng.text 55.2 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.tsv 55.2 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Grossman - Hacking Intranet - English.eng.tsv 55.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Reflected File Download - A New Web Attack Vector.eng.srt 55.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hell on Earth - From Browser to System Compromise.eng.txt 55.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/How can the Security Researcher Community Work Better for the Common Good - Jeff Moss, Roger Cumming.eng.tsv 55.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Unknown-English to Japanese.eng.vtt 55.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Ruby for Pentesters - Michael Tracy, Chris Rohlf, Eric Monti.eng.text 55.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Sniff Keystrokes with Lasers Voltmeters - Andrea Barisani, Daniele Bianco.eng.lrc 55.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Tackling Privilege Escalation with Offense and Defense.eng.txt 55.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/BIDOU - IPS Shortcomings.eng.text 55.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Siemens Simatic S7 PLC Exploitation - Dillon Beresford.eng.srt 55.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dominique-Brezinsski-A-Paranoid-Perspective-of-an-Interpreted-Language-English.eng.tsv 55.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Hideaki-Ihara-Forensics-in-Japan-Japanese.eng.vtt 55.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Interview with Neal Stephenson.eng.lrc 55.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Vivisection of an Exploit Development Process - David Aitel.eng.vtt 55.1 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Virt-ICE next gen debugger for malware analysis - NGUYEN Anh Quynh.eng.tsv 55.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Reverse Engineering and Exploiting Builds in the Cloud.eng.txt 55.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why Control System Cyber-Security Sucks.eng.text 55.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Sniff Keystrokes with Lasers Voltmeters - Andrea Barisani, Daniele Bianco.eng.vtt 55.1 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 2-2.eng.vtt 55.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Towards a Holistic Approach in Building Intelligence to Fight Crimeware.eng.lrc 55.1 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00012.jpg 55.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Butler - Exponential Growth Rootkit.eng.txt 55.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More 0-Days (or Code-Based Intrusion Detection by Korset) - Ohad Ben-Cohen.eng.vtt 55.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Retrospective on the Use of Export Cryptography.eng.tsv 55.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BeEF attack with MITM.eng.tsv 55.1 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SMTP Information Gathering - Lluis Mora.eng.tsv 55.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Scott Blake - The Pros and Cons of Hiring Hackers.eng.tsv 55.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Wireless Networks with 802.1x, EAP-TLS and PEAP - Steve Riley.eng.text 55.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Black Ops of PKI - Dan Kaminski.eng.tsv 55.1 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 1 by Jose Miguel Esparza.eng.txt 55.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Exploring Yosemite - Abusing Mac OS X 10.10.eng.srt 55.1 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Shaun Clowes - Generic Technical Defences.eng.text 55.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking Intel Bios - Rafal Wojtczuk, Alexander Tereshkin.eng.srt 55.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cunning With CNG - Soliciting Secrets From Schannel.eng.text 55.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms.eng.srt 55.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/No Such Thing as a Stupid Question Why Knowledge Shaming is Making Us Less Secure.eng.srt 55.0 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Finding Holes in Closed-source Software - Havlar Flake.eng.tsv 55.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/I Can Hear You Now - Traffic Interception and Remote Mobile Phone Cloning.eng.vtt 55.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kaminsky - BlackOPS 2006.eng.text 55.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Cisco IOS Shellcodes Backdoors - Gyan Chawdhary, Varun Uppal.eng.txt 55.0 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Scavenger Misuse Error Handling Leading to Qemu KVM Escape.eng.srt 55.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Paul Knight - Dynamic Routing Inside IPsec VPNs.eng.tsv 55.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Developments in Cisco IOS Forensics - Felix FX Linder.eng.text 55.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/spoonm, scape - Beyond EIP.txt 55.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Heavy Metal That Poisoned the Droid.eng.lrc 55.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/sassaman/sassaman-bh-us-02-forensic.ppt 55.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Len Sassman - The Anonymity Toolkit.eng.text 55.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When the Cops Come A-Knocking - Handling Technical Assistance Demands from Law Enforcement.eng.txt 55.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hacking the Fast Lane - Security issues in 802.11p, DSRC and WAVE - Bruno Goncalves de Oliveira & Rob Havelt.eng.tsv 55.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Timing Attacks Have Never Been So Practical - Advanced Cross-Site Search Attacks.eng.txt 55.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Phillip Hallam - Baker - Phishing - commiting Fraud in Public.eng.vtt 55.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Simple Nomad - Modern NetWare Hacking.eng.text 54.9 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Terrapin Attack Breaking SSH Channel Integrity by Sequence Number Manipulation.eng.srt 54.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/UART THOU MAD.eng.vtt 54.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ben Laurie - CaPerl.eng.lrc 54.9 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Make My Day – Just Run a Web Scanner Countering The Faults of Typical Web Scanners Through Byte-code Injection - Toshinari Kureha & Dr. Brian Chess.eng.lrc 54.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dai Zovi - Hardware Virtualization.eng.vtt 54.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Remote Malicious Butler Did It.eng.txt 54.9 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/New Botnets Trends and Threats - Augusto Paes de Barros, André Fucs & Victor Pereira.eng.lrc 54.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - The Black Hat Testimonies.eng.tsv 54.9 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/How to Make Hugging Face to Hug Worms Discovering and Exploiting Unsafe Pickle.loads.eng.srt 54.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Job De Haas - Getting Rooted and Never Knowing It.eng.srt 54.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Finnigan - How to Unwrap Oracle.eng.tsv 54.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.text 54.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Len Sassaman - Forensic Dead - Ends.eng.srt 54.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Ralf Spenneberg - IKE Testing IKE Implementations.eng.srt 54.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Mobile Malware Madness, and How To Cap the Mad Hatters - Neil Daswani.eng.txt 54.9 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bohm - Taming Bugs - English.eng.lrc 54.8 KB
- Black Hat USA/Black Hat USA 1998/pictures/00000065.JPG 54.8 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Drill Apple Core Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit.eng.srt 54.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Halvar Flake - Graph Based Binary Analysis.eng.txt 54.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Attacker s Day into Virology - Human vs Computer.eng.srt 54.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Multipath TCP - Breaking Today s Networks with Tomorrow s Protocols.eng.txt 54.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Home Invasion v2.0 - Attacking Network-Controlled Hardware.eng.vtt 54.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Welcome & Introduction to Black Hat USA 2011 Jeff Moss, Keynote Speaker Cofer Black.eng.vtt 54.8 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Parse Me, Baby, One More Time Bypassing HTML Sanitizer via Parsing Differentials.eng.srt 54.8 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Locknote Conclusions and Key Takeaways from Day 1.eng.srt 54.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Mike Schiffmman - The Firewalk Tool.eng.tsv 54.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with API and Sysenter.jp.eng.tsv 54.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TLS - SECRETS.eng.vtt 54.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Interpreter Exploitation - Pointer Inference and JIT Spraying - Dion.eng.tsv 54.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Iran's Soft-War for Internet Dominance.eng.tsv 54.8 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Peter Shipley - Securing your Network with Free Utilities.eng.vtt 54.8 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Maxi Soler on FireCAT.eng.json 54.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic.eng.tsv 54.8 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/From Zero to Secure in One Minute.eng.lrc 54.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Hal McConnell - Threats from Organized Crime and Terrorists.eng.srt 54.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Let's See What's Out There - Mapping the Wireless IOT.eng.txt 54.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Stateful Inspection of FireWall-1.eng.txt 54.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP Cookie Hijacking in the Wild - Security and Privacy Implications.eng.txt 54.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cushman - MS Security fundamentals.eng.lrc 54.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Ghost in the Air (Traffic).eng.vtt 54.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Horse Pill - A New Type of Linux Rootkit.eng.srt 54.8 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Women in Security Building a Female InfoSec Community in Korea, Japan, and Taiwan.eng.srt 54.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Catching Malware En Masse - DNS and IP Style.eng.text 54.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Highway to Hell Hacking Toll Systems - Nate Lawson.eng.tsv 54.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Derek Soeder, Ryan Permeh - eYe Bootroot.text 54.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jim Christy - The Defense Cyber Crime.eng.text 54.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Connection String Attack - Chema Alonso & Palako.eng.txt 54.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rich Murphy - Locking Down Your FreeBSD Install.eng.tsv 54.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hell on Earth - From Browser to System Compromise.eng.lrc 54.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Transparency in the Software Supply Chain Making SBOM a Reality.eng.srt 54.7 KB
- Black Hat DC/Black Hat Federal 2006/Nematodes - Dave Aitel.eng.vtt 54.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Tackling Privilege Escalation with Offense and Defense.eng.lrc 54.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder.eng.srt 54.7 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/360 Anomaly Based Unsupervised Intrusion Detection - Stefano Zanero.eng.text 54.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Vulnerability Exploitation In Docker Container Environments.eng.lrc 54.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 1 - Val Smith, Colin Ames & David Kerb.eng.vtt 54.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Beware of Serialized GUI Objects Bearing Data - David Byrne, Rohini Sulatycki.eng.txt 54.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016.eng.tsv 54.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Dr. Mudge - Secure Coding Practices and Source Code Analysis.eng.text 54.7 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Wi-Fi Advanced Fuzzing - Laurent Butti.eng.tsv 54.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Reverse Engineering and Exploiting Builds in the Cloud.eng.vtt 54.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Siemens Simatic S7 PLC Exploitation - Dillon Beresford.eng.txt 54.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding IMSI Privacy.eng.txt 54.7 KB
- Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Mulliner-Inside-Androids-SafetyNet-Attestation-wp.pdf 54.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Reverse Engineering and Exploiting Builds in the Cloud.eng.lrc 54.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Teresa Lunt - Taxonomy of Intrusion Detection Systems.eng.txt 54.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Fireside Chat with U.S. National Cyber Director Chris Inglis.eng.txt 54.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.eng.text 54.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Google Chrome OS - Matt Johansen, Kyle Osborn.eng.text 54.6 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Web Application Security -Jeremiah Grossman, Bill Pennington.eng.vtt 54.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The M2M Risk Assessment Guide, a Cyber Fast Track Project.eng.text 54.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Attacking Hypervisors Using Firmware And Hardware.eng.srt 54.6 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Payload Anatomy & Future Mutations - Riley Hassell.eng.text 54.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.eng.tsv 54.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/VOIP Wars - Destroying Jar Jar Lync.eng.tsv 54.6 KB
- Black Hat USA/Black Hat USA 2001/dsc00002.jpg 54.6 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00013.jpg 54.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Pin Pad Pwn.eng.vtt 54.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Robert Hansen - htaccess Scripts in Apache Environments.eng.txt 54.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass-the-Hash 2 - The Admin's Revenge.eng.vtt 54.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Ralf Spenneberg - IKE Testing IKE Implementations.eng.lrc 54.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Michael Sutton, Adam Greene - Art Of File Format.vtt 54.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with- API and Sysenter.eng.srt 54.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.jp.eng.tsv 54.6 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/(un)Smashing the Stack Overflows, Countermeasures, and the Real World - Shawn Moyer.eng.text 54.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Errata Hits Puberty.eng.text 54.5 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Fuzzing the Native NTFS Read-Write Driver (NTFS3) in the Linux Kernel.eng.srt 54.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When the Cops Come A-Knocking - Handling Technical Assistance Demands from Law Enforcement.eng.lrc 54.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mohney - Defend with Voice Analytics.eng.srt 54.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to Build a SpyPhone.eng.vtt 54.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.eng.txt 54.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Leveraging the Edge Abusing SSL VPNs - Mike Zusman.eng.text 54.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HDMI - Hacking Displays Made Interesting.eng.lrc 54.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Microsoft Kerberos - Sorry You Guys Don't Get It.eng.srt 54.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gutterman - Vulns Linux Random Num.eng.srt 54.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Automated Malware Analysis.eng.srt 54.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Timing Attacks Have Never Been So Practical - Advanced Cross-Site Search Attacks.eng.lrc 54.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/IO in the Cyber Domain, Immunity Style - Sinan Eren & Dave Aitel.eng.vtt 54.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Bridging Security Infrastructure Between the Data Center and AWS Lambda.eng.srt 54.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/AMF Testing.eng.vtt 54.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Our Favorite XSS Filters and How to Attack Them - Eduardo Vela Nava, David Lindsay.eng.text 54.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Cisco IOS Shellcodes Backdoors - Gyan Chawdhary, Varun Uppal.eng.lrc 54.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/File Disinfection Framework.eng.text 54.5 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Nicolas Fischbach - DDoS Mitigation and Analysis at the Infrastructure Level.eng.tsv 54.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jed Haile - Hogwash.eng.text 54.5 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Heap Feng Shui in JavaScript - Alexander Sotirov.eng.text 54.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Teresa Lunt - Taxonomy of Intrusion Detection Systems.eng.srt 54.5 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Responsibility for the Harm and Risk of Security Security Flaws - Cassio Goldschmidt.eng.txt 54.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Software Exploitation.eng.txt 54.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Jeffrey Prusan - Technical Security Countermeasures.eng.text 54.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Arthur Money - Closing Keynote.eng.srt 54.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/buffer-overflows.html 54.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote #HackingDemocracy Will Our Societies Hold.eng.srt 54.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Dissecting CSRF Attacks and Countermeasures.eng.txt 54.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.srt 54.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Chain of Fools An Exploration of Certificate Chain Validation Mishaps.eng.tsv 54.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/David Litchfeild - All new 0day.eng.lrc 54.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking Big Data - Evading Analysis of the Metadata of Your Life.eng.lrc 54.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard George - Views On The Future Direction of Information Assurance.eng.srt 54.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 2 - Val Smith, Colin Ames & David Kerb.eng.text 54.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Payment Points of Interaction (POI).eng.vtt 54.4 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 2-2.eng.txt 54.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brett Moore - Shoot the Messenger.eng.vtt 54.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 1-2 - John Benson.eng.tsv 54.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Man-in-the-SCADA - Anatomy of Data Integrity Attacks in Industrial Control Systems.eng.tsv 54.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/K K Mookhey - Evasion and Detection of Web Application Tactics.eng.tsv 54.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stuxnet Redux - Malware Attribution and Lessons Learned - Taking the guesswork out of cyber attribution - Tom Parker.eng.text 54.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sotirov - HotPatching3rd Party Patch.eng.tsv 54.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Deep Backdoors in Deep Reinforcement Learning Agents.eng.srt 54.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Mobile Malware Madness, and How To Cap the Mad Hatters - Neil Daswani.eng.lrc 54.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Litchfield - Variations in Exploit Methods between Linux and Windows.eng.lrc 54.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/GS and ASLR in Windows Vista - Ollie Whitehouse.eng.srt 54.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Honeypot That Can Bite - Reverse Penetration.eng.srt 54.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Halvar Flake - Diff Navigate Audit.eng.tsv 54.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pivoting in Amazon Clouds.eng.txt 54.4 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/From BYOVD to a 0-day Unveiling Advanced Exploits in Cyber Recruiting Scams.eng.srt 54.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Demystifying the Secure Enclave Processor.eng.vtt 54.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP Cookie Hijacking in the Wild - Security and Privacy Implications.eng.vtt 54.4 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Prototype Pollution Leads to RCE Gadgets Everywhere.eng.srt 54.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/SGX Secure Enclaves in Practice - Security and Crypto Review.eng.vtt 54.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fast & Furious Reverse Engineering with TitanEngine - Mario Vuksan, Tomislav Pericin.eng.text 54.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP Cookie Hijacking in the Wild - Security and Privacy Implications.eng.lrc 54.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Philip Zimmermann - Keynote with Introduction by Jeff Moss.eng.srt 54.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-van-der-Walt-When-the-Tables-Turn-English.eng.text 54.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Saumil Shah - Defeating Automated Web Assessment Tools.eng.txt 54.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Butler - Exponential Growth Rootkit.eng.lrc 54.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/MetaPost Exploitation - Val Smith, Colin Ames.eng.text 54.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Last Stage Of Delirium Research Group - UNIX Assembly Codes Development for Vulnerabilities.eng.text 54.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Beyond AutoRun - Exploiting Software Vulnerabilities with Removable Storage - Jon Larimer.eng.text 54.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Lambert - Sec Engineer in win Vista.eng.text 54.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Remote Malicious Butler Did It.eng.lrc 54.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Remote, One-Click, Breaking through Smartphones via a Non Well-Known Remote Attack Surface.eng.srt 54.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Keynote Speaker Cofer Black.eng.text 54.3 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/POSWorld. Should You be Afraid of Hands-On Payment Devices.eng.srt 54.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat 2015.eng.text 54.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Connection String Attack - Chema Alonso & Palako.eng.lrc 54.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/RFIDIOts - Practical RFID hacking (without soldering irons) - Adam Laurie.eng.srt 54.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/DPTrace - Dual Purpose Trace for Exploitability Analysis of Program Crashes.eng.tsv 54.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware.eng.tsv 54.3 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 1 by Jose Miguel Esparza.eng.lrc 54.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Halvar Flake - Graph Based Binary Analysis.eng.lrc 54.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Blended Web and Database Attacks on Real-Time, In-Memory Platforms.eng.txt 54.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Blended Web and Database Attacks on Real-Time, In-Memory Platforms.eng.vtt 54.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/HTTP Desync Attacks Request Smuggling Reborn.eng.srt 54.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Java Exploitation.eng.vtt 54.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Vixie - Preventing Child Neglect.eng.text 54.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hardening AWS Environments and Automating Incident Response for AWS Compromises.eng.vtt 54.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Analysis of the Attack Surface of Windows 10 Virtualization-Based Security.eng.vtt 54.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding IMSI Privacy.eng.lrc 54.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Paging All Windows Geeks - Finding Evil in Windows 10 Compressed Memory.eng.vtt 54.2 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bohm - Taming Bugs - English.eng.vtt 54.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Scott Blake - Dog of War Attack Box Design.eng.srt 54.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Fireside Chat with U.S. National Cyber Director Chris Inglis.eng.lrc 54.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/0-days - u0026 Mitigations Roadways to Exploit and Secure Connected BMW Cars.eng.srt 54.2 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Grand Theft Drone Reaching Breaking Point in Drone Proprietary RF Link Security.eng.srt 54.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Complexity in Computer Security - a Risky Business - Jeff Moss, Ian Angell.eng.txt 54.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Teresa Lunt - Taxonomy of Intrusion Detection Systems.eng.lrc 54.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Let's See What's Out There - Mapping the Wireless IOT.eng.lrc 54.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unmasking You - Joshua Abraham, Robert Hansen.eng.tsv 54.2 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Black Hat Europe 2022 Virtual Process for Speakers.eng.srt 54.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/MAC EFI Rootkits.eng.vtt 54.2 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Strengthen Cyber-security by Leveraging Cyber-Insurance.eng.srt 54.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/spoonm, scape - Beyond EIP.lrc 54.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Multipath TCP - Breaking Today s Networks with Tomorrow s Protocols.eng.lrc 54.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Stateful Inspection of FireWall-1.eng.lrc 54.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Franco - Case Studies Secure Dev IE7.eng.vtt 54.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Internet Facing PLCs A New Back Orifice.eng.srt 54.1 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Priest - Building the Business Case for Management for Increased Security.eng.srt 54.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam A Young, Modi Yang - Building Robust Backdoors.eng.srt 54.1 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00041.jpg 54.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Andrew van der Stock - Alternatives to Honeypots.eng.text 54.1 KB
- Black Hat DC/Black Hat Federal 2006/Characterising the real threats to our nation’s critical information systems - Tom Parker, Matthew G Devost.eng.tsv 54.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/I Know Your Filtering Policy Better than You Do.eng.vtt 54.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.eng.lrc 54.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Journey to Protect Points-of-Sale.eng.vtt 54.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Multivariate Solutions To Emerging Passive DNS Challenges.eng.tsv 54.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Evasion of High-End IDPS Devices at the IPv6 Era.eng.txt 54.1 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Faults in Our Bus Novel Bus Fault Attack to Break Trusted Execution Environments.eng.srt 54.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Siemens Simatic S7 PLC Exploitation - Dillon Beresford.eng.lrc 54.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Data Mining a Mountain of Zero Day Vulnerabilities.eng.vtt 54.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SmartCard APDU Analysis - Ivan Buetler.eng.vtt 54.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2021.eng.srt 54.0 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Portable Data exFiltration XSS for PDFs.eng.srt 54.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Software Exploitation.eng.lrc 54.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Connection String Attack - Chema Alonso & Palako.eng.vtt 54.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Beyond the Blacklists - Detecting Malicious URL Through Machine Learning.eng.txt 54.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pointers and Handlers - Alex Ionescu.eng.tsv 54.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert Morris Sr - Non-Cryptographic Ways.txt 54.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Stepping p3wns - Adventures in Full Spectrum Embedded Exploitation.eng.text 54.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Press ROOT to Continue - Detecting OSX and Windows Bootkits with RDFU.eng.srt 54.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Dissecting CSRF Attacks and Countermeasures.eng.lrc 54.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP 2 & Quic - Teaching Good Protocols to Do Bad Things.eng.txt 54.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/HTTP Desync Attacks Request Smuggling Reborn.eng.txt 54.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Beware of Serialized GUI Objects Bearing Data - David Byrne, Rohini Sulatycki.eng.lrc 54.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass.eng.txt 54.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions.eng.tsv 54.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits.eng.vtt 54.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - The Seven Axioms of Security.eng.txt 54.0 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/David-Maynor-Architecture-Flaws-in-Common-Security-Tools-English.eng.txt 54.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Murat_buffer-overflows-demystified.html 54.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Auger and Sima - 0day subscriptions.eng.txt 54.0 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Web Application Security -Jeremiah Grossman, Bill Pennington.eng.txt 54.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Adam Laurie - Martin Hurfurt - BlueSnarfing the Risk from Digital Pickpockets.eng.tsv 54.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Femtocells A Poisonous Needle in the Operator’s Hay Stack - Nico Golde, Kevin Redon.eng.vtt 53.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Understanding HL7 2.X Standards, Pen Testing, and Defending HL7 2.X Messages.eng.srt 53.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When the Cops Come A-Knocking - Handling Technical Assistance Demands from Law Enforcement.eng.vtt 53.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.jp.eng.vtt 53.9 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Biometric and Token-Based Access Control Systems - Zac Franken.eng.vtt 53.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/GreatFET - Making GoodFET Great Again.eng.srt 53.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Responsibility for the Harm and Risk of Security Security Flaws - Cassio Goldschmidt.eng.lrc 53.9 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Hacking Databases for Owning Your Data - Cesar Cerrudo & Esteban Martinez Fayo.eng.tsv 53.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Halvar Flake - Diff Navigate Audit.eng.srt 53.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Oracle Security II - David Litchfield.eng.tsv 53.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Saumil Shah - Defeating Automated Web Assessment Tools.eng.lrc 53.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Auger and Sima - 0day subscriptions.eng.vtt 53.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jason Garms - Defending Windows 2000 on the Internet.eng.text 53.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Hacker_Court/Extras/JI-0.4.pdf 53.8 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 2-2.eng.lrc 53.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Rebecca Mercuri - Bev Harris - Managing Election Data The California Recall.eng.tsv 53.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Robert Hansen - htaccess Scripts in Apache Environments.eng.lrc 53.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image5.png 53.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Reverse Engineering by Crayon - Danny Quist, Lorie Liebrock.eng.text 53.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ofir Arkin - Bypassing NAC Systems.eng.tsv 53.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/FX - More Embedded Systems.eng.text 53.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Greg Hoglund - 1000 Hackers in a box Failings of Security Scanners.eng.txt 53.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Windows Kernel Graphics Driver Attack Surface.eng.text 53.8 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Peter Shipley - Securing your Network with Free Utilities.eng.tsv 53.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Blended Web and Database Attacks on Real-Time, In-Memory Platforms.eng.lrc 53.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pulling Back the Curtain on Airport Security - Can a Weapon Get Past TSA.eng.txt 53.8 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Main Stage Understanding and Reducing Supply Chain and Software Vulnerability Risks.eng.srt 53.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fully Arbitrary 802.3 Packet Injection - Maximizing Ethernet Attack Surface.eng.vtt 53.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The State of Incident Response by Bruce Schneier.eng.tsv 53.8 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/The Hunt for Major League IoT-ICS Threats A Deep Dive into IoT Threat Terrain.eng.srt 53.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/End-to-end Analysis of Domain Generating Algorithm Malware Family.eng.tsv 53.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Exploiting Linux and Pax ASLR's Weaknesses on 32 Bit and 64 Bit Systems.eng.vtt 53.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Is Your Mental Health for Sale.eng.tsv 53.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Aaron Higbee and Chris Davis - DC Phone Home.eng.text 53.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Kitchen's Finally Burned Down - DLP Security Bakeoff.eng.tsv 53.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacks to SAP Web Applications - Your crown jewels online - Mariano Nunez Di Croce.eng.tsv 53.7 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/BitLeaker Subverting BitLocker with One Vulnerability.eng.srt 53.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/A Tale of One Software Bypass of Windows 8 Secure Boot.eng.srt 53.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/James Bamford - Researching Secrets Part II.eng.vtt 53.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Alcatraz A Practical Hypervisor Sandbox to Prevent Escapes from the KVM QEMU and KVM-Based MicroVMs.eng.srt 53.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Complexity in Computer Security - a Risky Business - Jeff Moss, Ian Angell.eng.lrc 53.7 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 2 by Jose Miguel Esparza.eng.txt 53.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Hisamichi-Okamura-Cybercrime-Treaty-Japanese.eng.txt 53.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Decrypting DPAPI data - Jean-Michel Picod, Elie Bursztein.eng.vtt 53.7 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Data Seepage How to Give Attackers a Roadmap to Your Network - David Maynor & Robert Graham.eng.text 53.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert J Hansen, Meredith L Patterson - Stopping Injection.vtt 53.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Towards a Holistic Approach in Building Intelligence to Fight Crimeware.eng.vtt 53.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Entrapment - Tricking Malware with Transparent, Scalable Malware Analysis.eng.txt 53.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fatal Fury on ESP32 Time to Release Hardware Exploits.eng.srt 53.7 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Black Hat Europe 2022 - Speaker Orientation Call.eng.srt 53.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Suberverting the Xen Hypervisor - Rafal Wojtczuk.eng.text 53.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jay Beale - Attacking and Securing UNIX FTP Servers.eng.text 53.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Applied Machine Learning for Data Exfil and Other Fun Topics.eng.srt 53.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Oracle 11g (or has Oracle's security posture really changed - David Litchfield.eng.srt 53.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/SADE Injecting Agents in to VM Guest OS - Matt Conover.eng.vtt 53.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Evasion of Web Application.eng.txt 53.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stale pointers are the new black - Vincenzo Iozzo, Giovanni Gola.eng.srt 53.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Breaking Honeypots For Fun And Profit.eng.srt 53.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gbadegesin - TCPIP in WIN Vista.eng.text 53.6 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/The Open Threat Hunting Framework Enabling Organizations to Build, Operationalize, and Scale Threat.eng.srt 53.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Social Engineering The Windows Kernel Finding & Exploiting Token Handling Vulnerabilities.eng.srt 53.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Welcome & Introduction to Black Hat Europe 2014.eng.text 53.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended.eng.srt 53.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Corporate Espionage for Dummies The Hidden Threat of Embedded Web Servers - Michael Sutton.eng.text 53.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pivoting in Amazon Clouds.eng.lrc 53.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.eng.vtt 53.6 KB
- Black Hat USA/Black Hat USA 2001/dsc00003.jpg 53.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Why Government Systems Fail at Security - Chey Cobb.eng.vtt 53.6 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00002.jpg 53.6 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00008.jpg 53.6 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00018.jpg 53.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/MLD Considered Harmful - Breaking Another IPv6 Subprotocol.eng.tsv 53.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Video Conferencing Systems.eng.srt 53.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Robert Baird and Mike Lynn - Advanced 80211b Attack.eng.text 53.6 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/The Motion Sensor Western The Good, the Bad, and the Ugly.eng.srt 53.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Evasion of High-End IDPS Devices at the IPv6 Era.eng.lrc 53.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fact and Fiction - Defending Medical Device.eng.txt 53.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.eng.txt 53.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Researching Android Device Security with the Help of a Droid Army.eng.text 53.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Geers - Eisen - IPv6 - Update - Japanese.eng.vtt 53.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM.eng.text 53.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Halvar Flake - Need New Tools.eng.vtt 53.5 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Back to the Future - A Radical Insecure Design of KVM on ARM.eng.srt 53.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Multipath TCP - Breaking Today s Networks with Tomorrow s Protocols.eng.vtt 53.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Researching Secrets - James Bamford.eng.text 53.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP 2 & Quic - Teaching Good Protocols to Do Bad Things.eng.lrc 53.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/HTTP Desync Attacks Request Smuggling Reborn.eng.lrc 53.5 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.tsv 53.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - The Seven Axioms of Security.eng.lrc 53.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Crack a Microcell.eng.tsv 53.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/PLC Blaster - A worm Living Solely In The PLC.eng.srt 53.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Finding Needles in Haystacks (The Size of Countries).eng.text 53.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Auger and Sima - 0day subscriptions.eng.lrc 53.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Web Application Security -Jeremiah Grossman, Bill Pennington.eng.lrc 53.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Tatum - Managing the External Environment.eng.txt 53.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Probing The Mobile Operating Networks.eng.srt 53.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Tim Mullen - Neutralizing Nimda Automated Strikeback.eng.text 53.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard Clarke - Keynote National Strategy for Securing Cyberspace.eng.tsv 53.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Lee Kushner - The State of Employment in the Information Security Industry.eng.text 53.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.srt 53.5 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/New Botnets Trends and Threats - Augusto Paes de Barros, André Fucs & Victor Pereira.eng.srt 53.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.eng.srt 53.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Entrapment - Tricking Malware with Transparent, Scalable Malware Analysis.eng.srt 53.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/SSL, Gone in 30 Seconds - A BREACH beyond CRIME.eng.text 53.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/David-Maynor-Architecture-Flaws-in-Common-Security-Tools-English.eng.lrc 53.4 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Everything has Changed in iOS 14, but Jailbreak is Eternal.eng.srt 53.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert Morris Sr - Non-Cryptographic Ways.lrc 53.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to grow a TREE (Taint-Enabled Reverse Engineering Environment) from a CBASS.eng.srt 53.4 KB
- Black Hat DC/Black Hat Federal 2006/How to Automatically Sandbox IIS With Zero False Positive and Negative - Tzi-cker Chiueh (partial).eng.text 53.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Securing Your Network 1-2 - Eric Schultze & Erik Birkholz.eng.text 53.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Franco - Case Studies Secure Dev IE7.eng.tsv 53.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The Underground Economy of the Pay Per Install PPI Business - Kevin Stevens.eng.text 53.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Vulnerability Exploitation In Docker Container Environments.eng.srt 53.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mark Kadrich - Intrusion Detection in High Speed Networks.eng.tsv 53.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Practical HTTP Header Smuggling Sneaking Past Reverse Proxies to Attack AWS and Beyond.eng.srt 53.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/USB Attacks Need Physical Access Right Not Any More… by Andy Davis.eng.srt 53.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Custom Processing Unit Tracing and Patching Intel Atom Microcode.eng.srt 53.4 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/The Epocholypse 2038 - What's in Store for the Next 20 Years.eng.srt 53.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unraveling Unicode - Chris Weber.eng.srt 53.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Internet-Scale Analysis of AWS Cognito Security.eng.srt 53.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Feaver - Kenneth Greers - Cyber Jihad and the Globalization of Warfare.eng.text 53.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Using Guided Missiles in Drive-Bys - Automatic Browser Fingerprinting - Egypt.eng.text 53.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hell on Earth - From Browser to System Compromise.eng.vtt 53.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Breaching AWS Accounts Through Shadow Resources.eng.srt 53.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/More Tricks for Defeating SSL - Moxie Marlinspike.eng.text 53.3 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Defending Your Network with Kerberos - Rooster & J.D. Glaser.eng.tsv 53.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Spradlin - Auditing data Access.eng.tsv 53.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 2-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.txt 53.3 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/These aren't the permissions you're looking for - Anthony Lineberry, Tim Wyatt, David Luke Richardson.eng.text 53.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Beyond the Blacklists - Detecting Malicious URL Through Machine Learning.eng.lrc 53.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerability Extrapolation or Give Me More Bugs Like That, Please - Fabian Yamaguchi.eng.srt 53.3 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Preventing Authentication Bypass A Tale of Two Researchers.eng.srt 53.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Adam Shostack - Will People Ever Pay for Privacy.eng.tsv 53.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Nobody is Listening to Your Phone Calls. - Really A Debate and Discussion on the NSA s Activities.eng.text 53.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HEIST - HTTP Encrypted Information can be Stolen Through TCP-Windows.eng.srt 53.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exposing Bootkits with BIOS Emulation.eng.srt 53.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android.eng.tsv 53.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/FX - Vulnerability Finding in Win32A Comparison.eng.text 53.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools.eng.vtt 53.3 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Bam the BAM - Electromagnetic Fault Injection & Automotive Systems.eng.srt 53.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.eng.vtt 53.3 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.jp.eng.tsv 53.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques.eng.txt 53.3 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/airjack.c 53.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cache and Maynor - Device Drivers.eng.text 53.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Maximiliano Caceres - Syscall Proxying.eng.srt 53.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/VirtuallySecure - Oded Horovitz, Tal Garfinkel.eng.vtt 53.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/MoRE Shadow Walker - The Progression of TLB-Splitting on x86.eng.tsv 53.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jamie Butler - Greg Hoglund - VICE Catch the Hookers.eng.tsv 53.2 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/LLM4Shell Discovering and Exploiting RCE Vulnerabilities in Real-World LLM-Integrated Frameworks.eng.srt 53.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Next Generation Debuggers for Reverse Engineering - ERESI Team.eng.srt 53.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking Medical Devices for Fun and Insulin Breaking the Human SCADA System - Jay Radckiffe.eng.text 53.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Reversing a Japanese Wireless SD Card - From Zero to Code Execution.eng.txt 53.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss and Panel - CISO QA.text 53.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Evasion of Web Application.eng.lrc 53.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Automatic Protocol Reverse Engineering.eng.srt 53.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Keynote-The-Day-After-Katsuya-Uchida-Japanese.eng.txt 53.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/ePassports Reloaded - Jeroen van Beek.eng.srt 53.2 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Sugiura - Winny Poo - Japanese.eng.text 53.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hardware Backdooring.eng.vtt 53.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Keynote-The-Day-After-Katsuya-Uchida-Japanese.eng.srt 53.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pulling Back the Curtain on Airport Security - Can a Weapon Get Past TSA.eng.lrc 53.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Using Online Activity as Digital DNA to Create a Better Spear Phisher.eng.srt 53.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Entrapment - Tricking Malware with Transparent, Scalable Malware Analysis.eng.lrc 53.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/OSS Security Maturity - Time to Put on Your Big Boy Pants.eng.text 53.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Hidden Risks Of Biometric Identifiers And How To Avoid Them-tagged.eng.text 53.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass.eng.lrc 53.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Demystifying the Secure Enclave Processor.eng.txt 53.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Applying AI as a Service to Targeted Phishing & Defending Against AI Generated Attacks.eng.srt 53.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The SCADA That Didn't Cry Wolf - Who s Really Attacking Your ICS Devices - 2 2.eng.text 53.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fact and Fiction - Defending Medical Device.eng.lrc 53.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.txt 53.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/48 Dirty Little Secrets Cryptographers Don't Want You To Know.eng.text 53.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jamie Butler - Greg Hoglund - VICE Catch the Hookers.eng.vtt 53.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.eng.lrc 53.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hackproofing Oracle Ebusiness Suite.eng.txt 53.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Greg Hoglund - 1000 Hackers in a box Failings of Security Scanners.eng.lrc 53.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Unknown-English to Japanese.eng.tsv 53.1 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Auditing The Security of Applications - David Litchfield.eng.srt 53.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Tatum - Managing the External Environment.eng.lrc 53.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Creating a Spider Goat - Security with Intel CPU Transactional Memory Support.eng.vtt 53.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AMSI - How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It.eng.srt 53.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares.eng.srt 53.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare.eng.text 53.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Vulnerabilities of Cellular and Satellite - based Voice and Data Networks.eng.text 53.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Cisco IOS Shellcodes Backdoors - Gyan Chawdhary, Varun Uppal.eng.vtt 53.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Paul Simmons - Welcome to Black Hat.eng.vtt 53.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking SMS - Zane Lackey, Luis Miras.eng.tsv 53.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/sassaman/nilsimsa-0.2.4.tar.gz 53.0 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 2 by Jose Miguel Esparza.eng.lrc 53.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Meet the Feds Feds vs. Ex-Feds - Panel.eng.text 53.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Let s Get Physical - Breaking Home Security Systems and Bypassing Building Controls.eng.vtt 53.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Disaster Recovery - Best Practices.pdf 53.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Disaster Recovery - Best Practices.pdf 53.0 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Let's Attack Let's Encrypt.eng.srt 53.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/36 Views of Cyberspace.eng.txt 53.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Cantact - An Open Tool for Automative Exploitation.eng.text 53.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Automated Malware Analysis.eng.txt 53.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.tsv 53.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Silently Breaking ASLR In The Cloud.eng.tsv 53.0 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 2 by Jose Miguel Esparza.eng.vtt 53.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How Smartcard Payment Systems Fail.eng.text 53.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Witchcraft Compiler Collection - Towards Self Aware Computer Programs.eng.vtt 52.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Graph-Based Binary Analysis - Halvar Flake.eng.text 52.9 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Déjà Vu Uncovering Stolen Algorithms in Commercial Products.eng.srt 52.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deeper Door Exploiting the NIC Chipset - Sherri Sparks, Shawn Embleton.eng.tsv 52.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Gerhard Eschelbeck - Law Vulnerabilities.eng.text 52.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass-the-Hash 2 - The Admin's Revenge.eng.txt 52.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Nicolas Fischbach - DDoS Mitigation and Analysis at the Infrastructure Level.eng.srt 52.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daniel VanBelleghem - Solving Network Mystries.eng.vtt 52.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Flip Feng Shui - Rowhammering the VM's Isolation.eng.tsv 52.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Rooting SIM cards.eng.tsv 52.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 2-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.lrc 52.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.eng.vtt 52.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Adam Shostack - Towards a Taxonomy of Network Testing Techniques.eng.srt 52.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert Morris Sr - Non-Cryptographic Ways.vtt 52.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hey You, Get Off of My Cloud - Application-Level Denial of Service Attacks and Defenses - Bryan Sullivan.eng.text 52.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/timeline-med.png 52.9 KB
- Black Hat DC/Black Hat Federal 2006/Implementing and Detecting An ACPI BIOS Rootkit - John Heasman (bad audio quality).eng.srt 52.9 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Off-Path Attacks Against PKI.eng.srt 52.8 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa.eng.srt 52.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Creating a Spider Goat - Security with Intel CPU Transactional Memory Support.eng.txt 52.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Choosing and Upgrading Software for Cisco IOS Firewall.pdf 52.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Choosing and Upgrading Software for Cisco IOS Firewall.pdf 52.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 1-2 - Chris Hadnagy.eng.text 52.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Renaud Deraison - The Nessus Project Reducing the Costs of Vulnerability Assessment.eng.tsv 52.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Oracle Security II - David Litchfield.eng.srt 52.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/hooks.c 52.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Drop the SOAP Real World Web Service Testing for Web Hackers - Tom Eston, Joshua Abraham.eng.text 52.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques.eng.lrc 52.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/All Your Calls Are Still Belong to Us - How We Compromised the Cisco VoIP Cr.eng.srt 52.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.eng.tsv 52.8 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Searching for RPC Functions to Coerce Authentications in Microsoft Protocols.eng.srt 52.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Reversing a Japanese Wireless SD Card - From Zero to Code Execution.eng.lrc 52.8 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Hackproofing Lotus Domino - David Litchfield.eng.srt 52.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency.eng.txt 52.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ChaosDB How We Hacked Databases of Thousands of Azure Customers (rev).eng.txt 52.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Insane Detection of Insane Rootkits - Yuriy Bulygin.eng.vtt 52.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/ret2dir - Deconstructing Kernel Isolation.eng.text 52.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Bypassing Secure Boot Using Fault Injection.eng.txt 52.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Subverting Apple Graphics - Practical Approaches to Remotely Gaining Root.eng.srt 52.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/OptiSig - Semantic Signature for Metamorphic Malware.eng.vtt 52.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting the iOS Kernel - Stefan Esser.eng.tsv 52.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Keynote - Gen. Alexander.eng.srt 52.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Welcome & Introduction to Black Hat USA 2013.eng.srt 52.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Physical Memory Forensics for Files and Cache - Jamie Butler, Justin Murdock.eng.vtt 52.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Doors of Durin The Veiled Gate to Siemens S7 Silicon.eng.srt 52.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Sutton&Greene - The Art Of File Format Fuzz.eng.vtt 52.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Beast is in Your Memory.eng.tsv 52.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud.eng.tsv 52.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Demystifying the Secure Enclave Processor.eng.lrc 52.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Virtual Private Problems A Broken Dream - Loki.eng.txt 52.7 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 1 by Jose Miguel Esparza.eng.srt 52.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.txt 52.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.jp.eng.vtt 52.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Hisamichi-Okamura-Cybercrime-Treaty-Japanese.eng.lrc 52.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Preventing Oh Shit Moments for 20 Euros or Less.eng.tsv 52.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/www.baltimoresun.tiff 52.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Into the Core - In-Depth Exploration of Windows 10 IoT Core.eng.srt 52.6 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/The Growth of Global Election Disinformation The Role Methodology of Government - linked Cyber Actors.eng.srt 52.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Introducing Ring -3 Rootkits - Alexander Tereshkin & Rafal Wojtczuk.eng.txt 52.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Cameron Hotchkies - Blind Injection Automation Techniques.eng.text 52.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Torturing OpenSSL.eng.tsv 52.6 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00001.jpg 52.6 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00014.jpg 52.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure in 2010 Broken in 2011.eng.vtt 52.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Defeating Pass the Hash Separation Of Powers.eng.srt 52.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/QuickLook/Thumbnail.jpg 52.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Java Every-Days - Exploiting Software Running on Three Billion Devices.eng.text 52.6 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities.eng.srt 52.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Tzi-cker Chiueh - Program Semantics Aware Intrusion Detection.eng.text 52.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Deep Learning On Disassembly.eng.srt 52.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Antivirus Security Softwear Tests.eng.text 52.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hackproofing Oracle Ebusiness Suite.eng.lrc 52.5 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Keynote-The-Day-After-Katsuya-Uchida-Japanese.eng.lrc 52.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.eng.text 52.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Smishmash - Text Based 2fa Spoofing Using OSINT, Phishing Techniques and a Burner Phone.eng.srt 52.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Automated Malware Analysis.eng.lrc 52.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/KEYNOTE - Whitfield Diffie.eng.tsv 52.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.eng.txt 52.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using EMET to Disable EMET.eng.vtt 52.5 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Larry Leibrock - Digital Information, User Tokens, Privacy and Forensics Investigations The Case of Windows XP Platform.eng.vtt 52.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/I Can Hear You Now - Traffic Interception and Remote Mobile Phone Cloning.eng.txt 52.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Practical Attack Against VDI Solutions.eng.srt 52.5 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.opt 52.5 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.opt 52.5 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.opt 52.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Endrun - Secure Digital Communications for Our Modern Dystopia.eng.text 52.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Detection of Firefox Extension Reuse Vulnerabilities.eng.vtt 52.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lessons Learned from Eight Years of Breaking Hypervisors.eng.tsv 52.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When Governments Attack - State Sponsored Malware Attacks Against Activists Lawyers and Journalists.eng.txt 52.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass-the-Hash 2 - The Admin's Revenge.eng.lrc 52.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/RFID Hacking - Live Free or RFID Hard.eng.text 52.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/HTTP Advanced Assessment Techniques - Saumil Shah.eng.text 52.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Pedro Joaquin on Routerpwn.eng.json 52.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.lrc 52.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Intra-Process Memory Protection for Applications on ARM and X86 - Leveraging the ELF ABI.eng.vtt 52.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Fireside Chat with U.S. National Cyber Director Chris Inglis.eng.vtt 52.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Androbugs Framework - An Android Application Security Vilnerability Scanner.eng.srt 52.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Eugene Tsyrklevich - Attacking Host Intrusion Prevention Systems.eng.txt 52.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Browsers Gone Wild.eng.text 52.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction.eng.srt 52.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Remote Web Application Dissassembly with ODBC Error Messages - David Litchfield.eng.srt 52.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.eng.text 52.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jamie-Butler-Sherri-Sparks-Rootkit-Detection-English.eng.srt 52.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jim Litchko - Total BS Security business - based systems security.eng.tsv 52.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.tsv 52.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Virtualization Under Attack Breaking Out of KVM - Nelson Elhage.eng.txt 52.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Michael-Sutton-Adam-Green-The-Art-of-File-Format-Fuzzing-English.eng.tsv 52.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.eng.text 52.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Responsibility for the Harm and Risk of Security Security Flaws - Cassio Goldschmidt.eng.vtt 52.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Jericho and Munge - Hard Core Web Defacement Statistics Trends and Analysis.eng.text 52.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Creating a Spider Goat - Security with Intel CPU Transactional Memory Support.eng.lrc 52.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency.eng.lrc 52.3 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Unveiling the Power of Intune Leveraging Intune for Breaking Into Your Cloud and On-Premise.eng.srt 52.3 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Redefining the Origin of Secrecy in a Post-Quantum World.eng.srt 52.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Bypassing Secure Boot Using Fault Injection.eng.lrc 52.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Breaking Access Controls With BLEKey.eng.srt 52.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TLS - SECRETS.eng.txt 52.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Factoring Dead - Preparing for Cyptopocalypse.eng.text 52.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Biometric and Token-Based Access Control Systems - Zac Franken.eng.txt 52.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Attacks Against MDM Solutions.eng.srt 52.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Drone Attacks on Industrial Wireless - A New Front in Cyber Security.eng.srt 52.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Columbus Rule and DHS.eng.srt 52.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure in 2010 Broken in 2011.eng.txt 52.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Preventing Oh Shit Moments for 20 Euros or Less.eng.vtt 52.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Achilles' Heel of JS Engines Exploiting Modern Browsers During WASM Execution.eng.srt 52.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwnie Awards 2016.eng.txt 52.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Securing the Public, who is in Charge.eng.srt 52.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring.eng.text 52.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Above My Pay Grade - Cyber Response at the National Level.eng.text 52.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Introducing Ring -3 Rootkits - Alexander Tereshkin & Rafal Wojtczuk.eng.vtt 52.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Jinx - Malware 2.0 - Itzik Kotler, Jonathan Rom.eng.txt 52.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/36 Views of Cyberspace.eng.lrc 52.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.lrc 52.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Intra-Process Memory Protection for Applications on ARM and X86 - Leveraging the ELF ABI.eng.tsv 52.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Bruce Schneier - A hacker looks at cryptography.eng.text 52.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Computrace Backdoor Revisited.eng.tsv 52.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Bug Hunters Dump User Data. Can They Keep it Well They're Keeping it Anyway.eng.srt 52.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Marcus Ranum - Burglar Alarms and Booby Traps.eng.text 52.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Going Auth The Rails On A Crazy Train.eng.text 52.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.tsv 52.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Relaying EMV Contactless Transactions Using Off-The-Self Android Devices.eng.srt 52.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Introducing Ring -3 Rootkits - Alexander Tereshkin & Rafal Wojtczuk.eng.lrc 52.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/New Exploit Technique In Java Deserialization Attack.eng.srt 52.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device.eng.vtt 52.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection.eng.text 52.1 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Politics of Vulnerability Reporting - Scott Blake.eng.text 52.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When Governments Attack - State Sponsored Malware Attacks Against Activists Lawyers and Journalists.eng.vtt 52.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Attacking the Linux PRNG on Android.eng.srt 52.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pay No Attention to That Hacker Behind the Curtain - A Look Inside the Black Hat Network.eng.tsv 52.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Get Rich or Die Trying - Making Money on the Web, The Black Hat Way - Jeremiah Grossman, Arian Evans.eng.text 52.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ChaosDB How We Hacked Databases of Thousands of Azure Customers (rev).eng.lrc 52.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A New Breed of Rootkit The System Management Mode (SMM) Rootkit - Shawn Embleton, Sherri Sparks.eng.text 52.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Forging the USB Armory.eng.tsv 52.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Bypassing Secure Boot Using Fault Injection.eng.vtt 52.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Enhancing ZFS in the Kernel - Soy Christian Kendi.eng.tsv 52.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jose Nazario - The Future of Network Worms.eng.txt 52.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/War Texting Weaponizing Machine 2 Machine - Don Bailey.eng.text 52.1 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/The Hat Trick Exploit Chrome Twice from Runtime to JIT.eng.srt 52.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them.eng.txt 52.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them_en.txt 52.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Universal DDoS Mitigation Bypass.eng.srt 52.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Dissecting CSRF Attacks and Countermeasures.eng.vtt 52.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/I Can Hear You Now - Traffic Interception and Remote Mobile Phone Cloning.eng.lrc 52.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Popping Shell on A(ndroid)RM Devices - Itzhak (Zuk) Avraham.eng.txt 52.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Put in One Bug and Pop Out More An Effective Way of Bug Hunting in Chrome.eng.srt 52.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When Governments Attack - State Sponsored Malware Attacks Against Activists Lawyers and Journalists.eng.lrc 52.0 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Aikido Turning EDRs to Malicious Wipers Using 0 - day Exploits.eng.srt 52.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Phil Zimmerman - My Next Big Project.vtt 52.0 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 1-2.eng.text 52.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Prevalent Characteristics in Modern Malware.eng.tsv 52.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Jinx - Malware 2.0 - Itzik Kotler, Jonathan Rom.eng.vtt 52.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Stateful Inspection of FireWall-1.eng.vtt 52.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Physical Memory Forensics for Files and Cache - Jamie Butler, Justin Murdock.eng.txt 52.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Xploiting Google Gadgets Gmalware and Beyond - Tom Stracener, Robert Hansen.eng.text 52.0 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/Tool/test4.exe 52.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Multiplayer Online Games Insecurity.eng.vtt 52.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/MoRE Shadow Walker - The Progression of TLB-Splitting on x86.eng.vtt 52.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Super Hat Trick Exploit Chrome and Firefox Four Times.eng.srt 52.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacker Court 1-2 - Panel.eng.text 52.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Mo’ Money Mo’ Problems - Jeremiah Grossman, Trey Ford.eng.vtt 52.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Trillions of Lines of Code and Counting Securing Applications At Scale - Jeremiah Grossman, Brad Arkin, Alex Hutton, Adrain Lane, John Johnson.eng.text 52.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.eng.lrc 52.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Chris Eng - Breaking Crypto.eng.text 51.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter.eng.txt 51.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Virtualization Under Attack Breaking Out of KVM - Nelson Elhage.eng.lrc 51.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Outer Limits - Hacking The Samsung Smart TV.eng.text 51.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Jaya Baloo - Lawful Interception of IP The European Context.eng.text 51.9 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/BrokenMesh New Attack Surfaces of Bluetooth Mesh.eng.srt 51.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/iOS Kernel.eng.vtt 51.9 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Second Breakfast Implicit and Mutation-Based Serialization Vulnerabilities in .NET.eng.srt 51.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.eng.text 51.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Simmonds - The Jericho Challenge.srt 51.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Robert Hansen - htaccess Scripts in Apache Environments.eng.srt 51.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Laws of Vulnerabilities Research Version 2.0 Comparing Critical Infrastructure Industries - Panel.eng.text 51.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Tao of Hardware the Te of Implants.eng.tsv 51.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT.eng.srt 51.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rick Smith - The Biometrics Dilemma.eng.text 51.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Break Out of The Truman Show - Active Detection and Escape of Dynamic Binary Instrumentation.eng.srt 51.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jon David - Putting Intrusion Detection into Intrusion Detection Systems.eng.tsv 51.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pulling Back the Curtain on Airport Security - Can a Weapon Get Past TSA.eng.vtt 51.9 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Virtual Private Problems A Broken Dream - Loki.eng.lrc 51.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/802.1x and Beyond.eng.txt 51.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Mo’ Money Mo’ Problems - Jeremiah Grossman, Trey Ford.eng.txt 51.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents.eng.txt 51.9 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dominique-Brezinsski-A-Paranoid-Perspective-of-an-Interpreted-Language-English.eng.srt 51.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TLS - SECRETS.eng.lrc 51.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure in 2010 Broken in 2011.eng.lrc 51.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Eugene Tsyrklevich - Attacking Host Intrusion Prevention Systems.eng.lrc 51.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Numchecker - A System Approach for Kernel Rootkit Detection.eng.srt 51.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joukov-et_al-Kefence.html 51.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mifare - Little Security, Despite Obscurity - Karsten Nohl.eng.vtt 51.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Biometric and Token-Based Access Control Systems - Zac Franken.eng.lrc 51.8 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani-tagged.eng.srt 51.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Bytecode Jiu-Jitsu Choking Interpreters to Force Execution of Malicious Bytecode.eng.srt 51.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stale pointers are the new black - Vincenzo Iozzo, Giovanni Gola.eng.tsv 51.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Maximizing Home-field Advantage.eng.tsv 51.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Design Approaches for Security Automation.eng.tsv 51.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More 0-Days (or Code-Based Intrusion Detection by Korset) - Ohad Ben-Cohen.eng.tsv 51.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Year in Flash.eng.vtt 51.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Meet the Feds.eng.tsv 51.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/MAC EFI Rootkits.eng.tsv 51.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Attacks Against MDM Solutions.eng.txt 51.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mobile Device Mismanagement.eng.tsv 51.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Can You Trust Me Now An Exploration Into the Mobile Threat Landscape.eng.tsv 51.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacks-English.eng.text 51.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hardware Backdooring.eng.txt 51.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Jinx - Malware 2.0 - Itzik Kotler, Jonathan Rom.eng.lrc 51.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Analysis of the Attack Surface of Windows 10 Virtualization-Based Security.eng.txt 51.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Information Access And Information Sharing Where We Are And Where We Are Going.eng.srt 51.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Bouncer Land.eng.text 51.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Security Testing Best Practiceson complex File Format Fuzzing - Qing Wang.eng.txt 51.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Bypassing Clang's SafeStack for Fun and Profit.eng.srt 51.7 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 1-2.eng.tsv 51.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Kawaguchi - Threats - to - Japanese - Landscape.eng.text 51.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/iOS Kernel.eng.txt 51.7 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/URB Excalibur The New VMware All-Platform VM Escapes.eng.srt 51.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Never Trust Your Inputs - Causing 'Catastrophic Physical Consequences' From The Sensor.eng.srt 51.6 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them.eng.lrc 51.6 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them_en.lrc 51.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Evasion of Web Application.eng.vtt 51.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ian Clarke, Oskar Sandberg - Scalable searches.text 51.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass the Hash and other credential theft and reuse - Preventing Lateral Movement.eng.srt 51.6 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/May the Trust be with You Empowering TrustZone-M with Multiple Trusted Environments.eng.srt 51.6 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/No Free Charge Theorem 2.0 How to Steal Private Information from a Mobile Device Using a Powerbank.eng.srt 51.6 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Behind Enemy Lines Engaging and Disrupting Ransomware Web Panels.eng.srt 51.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014.eng.tsv 51.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BinaryPig - Scalable Malware Analytics in Hadoop.eng.tsv 51.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Hardware-Enforced Security With Hypervisors.eng.tsv 51.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Davis, Ozier, Nebel, and Migues - Panel Discussion.eng.text 51.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Automating Linux Malware Analysis Using Limon Sandbox.eng.text 51.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.eng.tsv 51.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Java Exploitation.eng.txt 51.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Javascript Static Security Analysis Made Easy with JSPrime.eng.srt 51.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Breaking .NET Sandboxes.eng.srt 51.6 KB
- Black Hat USA/Black Hat USA 2001/dsc00001.jpg 51.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwnie Awards 2016.eng.lrc 51.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Windows Hooks of Death Kernel Attacks Through User-Mode Callbacks - Tarjei Mandt.eng.text 51.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwning Your Java Messaging With Deserialization Vulnerabilities.eng.vtt 51.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/James Bamford - Researching Secrets Part II.eng.tsv 51.6 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/USB - Paul carugati.eng.srt 51.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Physical Memory Forensics for Files and Cache - Jamie Butler, Justin Murdock.eng.lrc 51.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Hacking the Wireless World with Software Defined Radio - 2.0.eng.text 51.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Buying into the Bias - Why Vulnerability Statistics Suck.eng.text 51.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Black Hat USA 2004 - David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.srt 51.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Use Your Spell Against You Threat Prevention of Smart Contract Exploit By Reusing Opcode Trace.eng.srt 51.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/What the Fuzz.eng.tsv 51.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Mobile Malware Madness, and How To Cap the Mad Hatters - Neil Daswani.eng.vtt 51.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Exploiting Adobe Flash Player In The Era Of Control Flow Guard.eng.txt 51.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter.eng.lrc 51.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Ghost in the Air (Traffic).eng.tsv 51.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.jp.eng.tsv 51.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ofir Arkin - Bypassing NAC Systems.eng.vtt 51.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Thorsen Holz - Maximilliam Dornseif - NoSEBrEaK Defeating Honeypots.eng.txt 51.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bar-Mitzva Attack - Breaking SSL with 13-Year Old RC4 Weakness.eng.txt 51.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/SGX Secure Enclaves in Practice - Security and Crypto Review.eng.txt 51.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/0-Knowledge Fuzzing - Vincenzo Iozzo.eng.vtt 51.5 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Mining and Exploiting (Mobile) Payment Credential Leaks in the Wild.eng.srt 51.5 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Insider Threats Packing Their Bags With Corporate Data.eng.srt 51.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/The Role of Non Obvious Relationships in the Foot Printing Process - Haroon Meer, Charl Van Der Walt.eng.text 51.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Hacking .Net Applications The Black Arts - Jon McCoy.eng.text 51.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces.eng.tsv 51.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Internet Special Ops - Andrew Fried, Paul Vixie, Christopher Lee.eng.text 51.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Dynamic Taint Propagation Finding Vulnerabilities Without Attacking - Brian Chess & Jacob West.eng.text 51.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.jp.eng.tsv 51.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Analyzing an Unknown RF Based Data Transmission (Aka Fun with 27Mhz Wireless Keyboards) - Max Moser.eng.vtt 51.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Ofir Arkin - Revolutionizing Operating System Fingerprinting.eng.text 51.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hackproofing Oracle Ebusiness Suite.eng.vtt 51.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Debug for Bug Crack and Hack Apple Core by Itself.eng.srt 51.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Base - Security (or lack thereof) and our Friends in Redmond.eng.tsv 51.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ed Gerck - Overview of Certification systems x509, CA, PGP and SKIP.eng.txt 51.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents.eng.lrc 51.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.eng.vtt 51.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them.eng.vtt 51.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them_en.vtt 51.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fully Arbitrary 802.3 Packet Injection - Maximizing Ethernet Attack Surface.eng.txt 51.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sotirov - HotPatching3rd Party Patch.eng.vtt 51.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ofir Arkin - Introducing X Playing Tricks with ICMP.eng.tsv 51.4 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Breaking the Attack Graph How to Leverage Graphs to Strengthen Security in a Domain Environment.eng.srt 51.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.eng.txt 51.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jose Nazario - The Future of Network Worms.eng.lrc 51.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Leviathan - Command and Control Communications on Planet Earth.eng.srt 51.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Nitesh Dhanjani - Justin Clark.eng.text 51.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Mo’ Money Mo’ Problems - Jeremiah Grossman, Trey Ford.eng.lrc 51.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Marshall Beddoe and Chris Abad - The Siphon Project.eng.text 51.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/I Just Found 10 Million SSNs - Alessandro Acquisti.eng.text 51.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents.eng.vtt 51.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Defense in Depth Winning in Spit of Yourself - Erik Schlutz, David Leblanc.eng.text 51.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Sandbox Roulette - Are You Ready For The Gamble.eng.vtt 51.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Mesh Stalkings-Penetration Testing with Small Networked Devices.eng.tsv 51.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Dynamic Flash Instrumentation for Fun and Profit.eng.txt 51.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Black Hat USA 2008 - PWNY Awards.eng.text 51.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Viral Infections in Cisco iOS - Ariel Futoransky.eng.vtt 51.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Eugene Tsyrklevich - Attacking Host Intrusion Prevention Systems.eng.srt 51.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Psychotronica - Nitesh Dhanjani.eng.srt 51.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploiting Firefox.eng.tsv 51.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/24 Techniques to Gather Threat Intel and Track Actors.eng.vtt 51.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote #HackingDemocracy Will Our Societies Hold.eng.txt 51.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning.eng.srt 51.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Securing the Public, who is in Charge.eng.txt 51.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Analysis of the Attack Surface of Windows 10 Virtualization-Based Security.eng.lrc 51.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced Mac OS X Rootkits - Dino Dai Zovi.eng.text 51.3 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Engaging the Next Generation of Cybersecurity Professionals The Power of Security Zines.eng.srt 51.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Remote Malicious Butler Did It.eng.vtt 51.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side..eng.srt 51.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side._en.srt 51.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Meet the Owner of a Real Hacked Company - Forensic Analysis - Mark Shelhart.eng.srt 51.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Crashing the Party Vulnerabilities in RPKI Validation.eng.srt 51.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Virtualization Under Attack Breaking Out of KVM - Nelson Elhage.eng.vtt 51.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Saving Cyberspace by Jason Healey.eng.tsv 51.3 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Zero-Touch-Pwn Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones.eng.srt 51.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00011.jpg 51.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Funderbolt - Adventures in Thunderbolt DMA Attacks.eng.text 51.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hardware Backdooring.eng.lrc 51.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Break Out of The Truman Show - Active Detection and Escape of Dynamic Binary Instrumentation.eng.txt 51.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.eng.vtt 51.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Botnet Population and Intelligence Gathering Techniques - Christopher Davis & David Dagon.eng.text 51.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/iOS Kernel.eng.lrc 51.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Constant Insecurity Things You Didn’t Know About (PECOFF) Portable Executable File Format - Mario Vuksan, Tomislav Pericin.eng.text 51.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Attacks Against MDM Solutions.eng.lrc 51.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Richard Thieme - Saying Whatever he Wants.eng.text 51.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency.eng.vtt 51.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moniz and Moore - 6 Degrees XSSploit.eng.text 51.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.jp.eng.vtt 51.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neat New & Ridiculous Flash Hacks - Mike Bailey.eng.txt 51.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Popping Shell on A(ndroid)RM Devices - Itzhak (Zuk) Avraham.eng.lrc 51.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Web Application Canonicalization, Encoding and Transcoding Attacks - Arian Evans.eng.text 51.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Journey From JNDI LDAP Manipulation to Remote Code Execution Dream Land.eng.vtt 51.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Alternative Medicine The Malware Analyst’s Blue Pill - Paul Royal.eng.srt 51.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/36 Views of Cyberspace.eng.srt 51.2 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Faking a Factory Creating and Operating a Realistic Honeypot.eng.srt 51.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Java Exploitation.eng.lrc 51.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Thorsen Holz - Maximilliam Dornseif - NoSEBrEaK Defeating Honeypots.eng.vtt 51.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Steven Christey - CVE Behind the Scenes The Complexity of Being Simple.eng.text 51.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter.eng.vtt 51.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Home Invasion v2.0 - Attacking Network-Controlled Hardware.eng.txt 51.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Pwnie Awards.eng.vtt 51.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.eng.vtt 51.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/IO in the Cyber Domain, Immunity Style - Sinan Eren & Dave Aitel.eng.tsv 51.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Breaking the Security of Physical Devices by Silvio Cesare.eng.txt 51.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/SQL Injections.eng.vtt 51.1 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/David-Maynor-Architecture-Flaws-in-Common-Security-Tools-English.eng.vtt 51.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/802.1x and Beyond.eng.lrc 51.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ed Gerck - Overview of Certification systems x509, CA, PGP and SKIP.eng.vtt 51.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.eng.vtt 51.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing.eng.tsv 51.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BlackOps.eng.text 51.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hunting the Shadows - In-Depth Analysis of Escalated APT Attacks.eng.tsv 51.1 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00003.jpg 51.1 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00009.jpg 51.1 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00011.jpg 51.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Governments As Malware Authors - The Next Generation.eng.tsv 51.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Capstone - Next Generation Disassembly Framework.eng.txt 51.1 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Kortti - Input Attack Trees - Japanese.eng.vtt 51.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Exploiting Adobe Flash Player In The Era Of Control Flow Guard.eng.lrc 51.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/FrontPage Server Extensions on Windows Server 2003 - Mark Burnett.eng.text 51.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hacking Next-Gen ATMs - From Capture to Cashout.eng.srt 51.1 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Under the SEA - A Look at the Syrian Electronic Army's Mobile Tooling.eng.srt 51.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Timothy Mullen - Grabbing User Credentials via W2k ODBC Libraries.eng.srt 51.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.eng.tsv 51.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/SGX Secure Enclaves in Practice - Security and Crypto Review.eng.lrc 51.1 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/Inside Android's SafetyNet Attestation.eng.text 51.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Palante - Top 25 Overlooked Security Configuration on Your Switches and Routers.eng.srt 51.1 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/GS and ASLR in Windows Vista - Ollie Whitehouse.eng.txt 51.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Thorsen Holz - Maximilliam Dornseif - NoSEBrEaK Defeating Honeypots.eng.lrc 51.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Padgett Peterson - Overlooked Local Attack Techniques.eng.tsv 51.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cyberspace A Fragile Ecosystem - Robert Lentz.eng.srt 51.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marcus Sachs - Building a Global Culture of Security(Luncheon Speaker).eng.srt 51.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Time Trial - Racing Towards Practical Timing Attacks.eng.text 51.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 2-2 - Chris Hadnagy.eng.srt 51.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Keynote - Cyber Conflicts - Challenging the Future - Pat Arnold.eng.text 51.0 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/The Price of Compatibility Defeating macOS Kernel Using Extended File Attributes.eng.srt 51.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/DevSecOps - What, Why and How.eng.tsv 51.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.srt 51.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS.eng.vtt 51.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fully Arbitrary 802.3 Packet Injection - Maximizing Ethernet Attack Surface.eng.lrc 51.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pivoting in Amazon Clouds.eng.srt 51.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Exploiting Adobe Flash Player In The Era Of Control Flow Guard.eng.vtt 51.0 KB
- Black Hat DC/Black Hat Federal 2006/Implementing and Detecting An ACPI BIOS Rootkit - John Heasman (bad audio quality).eng.tsv 50.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David LeBlanc - Real World Techniques in Network Security Management.eng.text 50.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Journey From JNDI LDAP Manipulation to Remote Code Execution Dream Land.eng.txt 50.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Security Testing Best Practiceson complex File Format Fuzzing - Qing Wang.eng.lrc 50.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/goldberg-us-02-messaging.pdf 50.9 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Video Conferencing Systems.eng.txt 50.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.eng.txt 50.9 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Exploitation Using A Malicious Service Set Identifier (SSID).eng.text 50.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Stegospolit - Exploit Delivery With Steganography and Polyglots.eng.tsv 50.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Pin Pad Pwn.eng.tsv 50.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.eng.tsv 50.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer - 1-2 - Eric Filiol.eng.srt 50.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SAP, Credit Cards, and the Bird that Talks Too Much.eng.srt 50.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Year in Flash.eng.txt 50.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Joey - Advanced Windows NT and 2000 Security.eng.srt 50.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/PLC Blaster - A worm Living Solely In The PLC.eng.txt 50.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Netscreen of the Dead - Graeme Neilson.eng.vtt 50.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/CANAPE - Bytes Your Bits.eng.text 50.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SmartCard APDU Analysis - Ivan Buetler.eng.txt 50.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote #HackingDemocracy Will Our Societies Hold.eng.lrc 50.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Paul Wouters - IPSEC Opportunistic Encryption using DNSSEC.eng.text 50.9 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Diving into Windows Remote Access Service for Pre-Auth Bugs.eng.srt 50.9 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Securing the Public, who is in Charge.eng.lrc 50.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Insider's Guide to Cyber-Insurance and Security Guarantees.eng.text 50.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Let's See What's Out There - Mapping the Wireless IOT.eng.vtt 50.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.eng.srt 50.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ed Gerck - Overview of Certification systems x509, CA, PGP and SKIP.eng.lrc 50.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking BHAD - Abusing Belkin Home Automation Devices.eng.text 50.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Developments in Cisco iOS Forensics - Felix FX Linder.eng.vtt 50.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Breaking the Security of Physical Devices by Silvio Cesare.eng.vtt 50.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure Password Managers and Military-Grade Encryption on Smartphones Oh Re.eng.vtt 50.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/State of the Art Post Exploitation in Hardened PHP Environments - Stefan Esser.eng.text 50.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam A Young, Modi Yang - Building Robust Backdoors.eng.txt 50.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hardening AWS Environments and Automating Incident Response for AWS Compromises.eng.tsv 50.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The IETF & The Future of Security Protocols - All The Signal, None of the No.eng.text 50.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX.eng.srt 50.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SensePost - A tale of two Proxies.eng.txt 50.8 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Rocking The Pocket Book Hacking Chemical Plant For Competition And Extortion.eng.vtt 50.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking the Corporare Mind.eng.tsv 50.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Dynamic Flash Instrumentation for Fun and Profit.eng.lrc 50.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Teresa Lunt - Taxonomy of Intrusion Detection Systems.eng.vtt 50.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Breaking Access Controls with Blekey.eng.tsv 50.8 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bar-Mitzva Attack - Breaking SSL with 13-Year Old RC4 Weakness.eng.lrc 50.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Can You Hear Me Now Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications.eng.srt 50.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Reviving Smart Card Analysis - Karsten Nohl, Chris Tarnovsky.eng.text 50.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Decrypting DPAPI data - Jean-Michel Picod, Elie Bursztein.eng.txt 50.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Home Invasion v2.0 - Attacking Network-Controlled Hardware.eng.lrc 50.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Capturing 0Day Exploits With Perfectly Placed Hardware Traps.eng.tsv 50.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Abusing Bleeding Edge Web Standards for Appsec Glory.eng.tsv 50.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Gyrophone - Eavesdropping Using a Gyroscope.eng.srt 50.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Honey, I'm Home - Hacking Z-Wave Home Automation Systems.eng.vtt 50.7 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Hey, You, Get off My Private Data Do Apps Respect Your Privacy as They Claim.eng.srt 50.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Measure Security Effectively.eng.text 50.7 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Kortti - Input Attack Trees - Japanese.eng.tsv 50.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Fixing a Memory Forensics Blind Spot Linux Kernel Tracing.eng.srt 50.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Automated Malware Analysis.eng.vtt 50.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eugene Schultz - Security Issues with Configuring and Maintaining an IIS 4 Server.eng.vtt 50.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/HTTP Desync Attacks Request Smuggling Reborn.eng.vtt 50.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Lifecycle of a Phone Fraudster - Exposing Fraud Activity.eng.text 50.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Probing The Mobile Operating Networks.eng.txt 50.7 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/DTRACE The Reverse Engineer’s Unexpected Swiss Army Knife - David Weston, Tiller Beauchamp.eng.text 50.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Breaking the Security of Physical Devices by Silvio Cesare.eng.lrc 50.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OptiROP - The Art of Hunting ROP Gadgets.eng.txt 50.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eugene Schultz - Security Issues with Configuring and Maintaining an IIS 4 Server.eng.txt 50.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Horse Pill - A New Type of Linux Rootkit.eng.txt 50.6 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Google Reimagined a Phone. It was Our Job to Red Team and Secure it.eng.txt 50.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/IVR Security- Internal Network Attack via Phone Lines.eng.txt 50.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 1 - Val Smith, Colin Ames & David Kerb.eng.tsv 50.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/I Know Your Filtering Policy Better than You Do.eng.tsv 50.6 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00015.jpg 50.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Power of Data-Oriented Attacks.eng.srt 50.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Natural Security - Jeff Moss, Rod Beckström.eng.text 50.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/GS and ASLR in Windows Vista - Ollie Whitehouse.eng.lrc 50.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Embedding a Human Centric Approach Into a Global Cyber Security Program.eng.srt 50.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Black-box Assessment of Pseudorandom Algorithms.eng.tsv 50.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neurosurgery With Meterpreter - Colin Ames, David Kerb.eng.text 50.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Checkmate with Denial of Service - Tom Brennan, Ryan Barnett.eng.text 50.6 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Racing the Dark A New TOCTTOU Story From Apple's Core.eng.srt 50.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Doors of Durin The Veiled Gate to Siemens S7 Silicon.eng.txt 50.6 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Hideaki-Ihara-Forensics-in-Japan-Japanese.eng.tsv 50.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Keynote - What Got Us Here Wont Get Us There.eng.text 50.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Decentralized Malware on The Blockchain.eng.tsv 50.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hack Microsoft Using Microsoft Signed Binaries.eng.srt 50.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Web Exploit Toolkits.eng.txt 50.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Break Out of The Truman Show - Active Detection and Escape of Dynamic Binary Instrumentation.eng.lrc 50.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Mortman, Others - National ID Debate.text 50.5 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Emerging Frontiers Insights from the Black Hat Asia Review Board.eng.vtt 50.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel.eng.tsv 50.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Journey From JNDI LDAP Manipulation to Remote Code Execution Dream Land.eng.lrc 50.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).eng.vtt 50.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AirBnBeware - Short Term Rentals Long Term Pwnage.eng.tsv 50.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neat New & Ridiculous Flash Hacks - Mike Bailey.eng.lrc 50.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Attacker s Day into Virology - Human vs Computer.eng.txt 50.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Mobile Network Hacking, IP Edition.eng.srt 50.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/The Battle Against the Billion - Scale Internet Underground Industry Advertising Fraud Detection.eng.srt 50.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Halvar Flake - Graph Based Binary Analysis.eng.vtt 50.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Peter Siberman Richard Johnson - Comparison Buffer Overflow Prevention Implementations and Weaknesses.eng.text 50.5 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Video Conferencing Systems.eng.lrc 50.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Capstone - Next Generation Disassembly Framework.eng.lrc 50.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Gen PlugX ShadowPad A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT.eng.txt 50.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Stoned Bootkit - Peter Kleissner.eng.srt 50.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Maximiliano Caceres - Syscall Proxying.eng.tsv 50.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Simple Nomad and Todd Sabin - The RAZOR Warez.eng.srt 50.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/VoIP Wars - the Phreakers Awaken.eng.tsv 50.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking with WebSockets.eng.srt 50.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Intrusion Detection.eng.tsv 50.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/How to Impress Girls with Browser Memory Protection Bypasses - Alexander Sotirov, Mark Dowd.eng.text 50.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Year in Flash.eng.lrc 50.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Smart Nest Thermostat - A Smart Spy in Your Home.eng.tsv 50.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/They Ought to Know Better - Exploiting Security Gateways via Their Web Inter.eng.srt 50.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/USB - Undermining Security Barriers - Andy Davis.eng.txt 50.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.eng.lrc 50.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Virtual Private Problems A Broken Dream - Loki.eng.vtt 50.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/VoIP Wars - Attack of the Cisco Phones.eng.tsv 50.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Analyzing an Unknown RF Based Data Transmission (Aka Fun with 27Mhz Wireless Keyboards) - Max Moser.eng.tsv 50.4 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Conti/papers/20050301_CACM_HackingConferences_Conti.pdf 50.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking Intel Bios - Rafal Wojtczuk, Alexander Tereshkin.eng.vtt 50.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Physical Security in a Networked World - Video Surveillance, Video Analytics, and you - Joshua A Marpet.eng.text 50.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SmartCard APDU Analysis - Ivan Buetler.eng.lrc 50.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2019.eng.text 50.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Halvar Flake - Need New Tools.eng.tsv 50.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Multiple Operation System Vurnarability.eng.tsv 50.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.eng.lrc 50.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet.eng.tsv 50.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Base - Security (or lack thereof) and our Friends in Redmond.eng.vtt 50.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).eng.txt 50.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Issues with Embedded Device Disclosures - Helping the Vendors and Recognizin.eng.srt 50.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Exploiting Lawful Interception to Wiretap the Internet.eng.text 50.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Bochspwn - Identifying 0-Days via System-Wide Memory Access Pattern Analysis.eng.text 50.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jeff Jonas - Non Obvious Relationship Awareness.eng.srt 50.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/PLC Blaster - A worm Living Solely In The PLC.eng.lrc 50.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Windows 8.eng.srt 50.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cloudburst - Hacking 3D and Breaking Out of VMware - Kostya Kortchinsky.eng.text 50.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/A Peek Under the Blue Coat.eng.tsv 50.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/A 16-bit Rootkit and Second Generation Zigbee Chips -Travis Goodspeed.eng.text 50.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brett Moore - Shoot the Messenger.eng.tsv 50.3 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Complexity Killed Security.eng.srt 50.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to grow a TREE (Taint-Enabled Reverse Engineering Environment) from a CBASS.eng.txt 50.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Len Sassaman - Forensic Dead - Ends.eng.txt 50.3 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Cross - Contract Ricochet Attacks & Off - Chain - On - Chain Manipulation of Billion Dollar NFT Collections.eng.srt 50.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Horse Pill - A New Type of Linux Rootkit.eng.vtt 50.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerability Extrapolation or Give Me More Bugs Like That, Please - Fabian Yamaguchi.eng.tsv 50.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ReCertifying Active Directory Certificate Services.eng.srt 50.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking Big Data - Evading Analysis of the Metadata of Your Life.eng.srt 50.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking Intel Bios - Rafal Wojtczuk, Alexander Tereshkin.eng.txt 50.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Decrypting DPAPI data - Jean-Michel Picod, Elie Bursztein.eng.lrc 50.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam A Young, Modi Yang - Building Robust Backdoors.eng.lrc 50.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Real Eyes, Realize, Real Lies - Beating Deception Technologies.eng.srt 50.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote #HackingDemocracy Will Our Societies Hold.eng.vtt 50.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/CloudBots - Harvesting Crypto Coins Like a Botnet Farmer.eng.text 50.3 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 1-2.eng.text 50.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Probing The Mobile Operating Networks.eng.lrc 50.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Siemens Simatic S7 PLC Exploitation - Dillon Beresford.eng.vtt 50.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Welcome & Introduction to Black Hat USA 2011 Jeff Moss, Keynote Speaker Cofer Black.eng.tsv 50.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Silberman and Butler - RAIDEv1.0.eng.text 50.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Devil Does Not Exist - The Role of Deception in Cyber.eng.tsv 50.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Klein - Soc Engineering Methodology.vtt 50.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OptiROP - The Art of Hunting ROP Gadgets.eng.lrc 50.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The BEAST Wins Again - Why TLS Keeps Failing to Protect HTTP.eng.tsv 50.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Horse Pill - A New Type of Linux Rootkit.eng.lrc 50.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Adaptive Kernel Live Patching - An Open Collaborative Effort.eng.srt 50.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Kret - Nobodys Anonymous - Tracking Spam and Covert Channels.eng.text 50.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Broadcasting Your Attack Security Testing DAB Radio In Cars.eng.srt 50.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/TW_RGB_0000_MAIN.png 50.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eugene Schultz - Security Issues with Configuring and Maintaining an IIS 4 Server.eng.lrc 50.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ben Laurie - CaPerl.eng.vtt 50.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/S Stender - Attacking Inatl Software.eng.text 50.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Security Wolf of Wall Street - Fighting Crime With High Frequency Classification and.eng.text 50.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS.eng.tsv 50.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Booting the iOS Kernel to an Interactive Bash Shell on QEMU.eng.srt 50.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/GS and ASLR in Windows Vista - Ollie Whitehouse.eng.vtt 50.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Exploiting Linux and Pax ASLR's Weaknesses on 32 Bit and 64 Bit Systems.eng.tsv 50.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Capstone - Next Generation Disassembly Framework.eng.vtt 50.2 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 2-2.eng.vtt 50.2 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Thresholds Are for Old Threats Demystifying AI and Machine Learning to Enhance SOC Detection.eng.srt 50.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SensePost - A tale of two Proxies.eng.lrc 50.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Marinescu - WIN Vista Heap Mgmt.eng.text 50.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is That You, Baby, or Just a Bridge in the Sky.eng.vtt 50.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Dive Into Apple IO80211Family Vol. 2.eng.srt 50.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/How to Break PDF Encryption.eng.srt 50.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Doors of Durin The Veiled Gate to Siemens S7 Silicon.eng.lrc 50.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Stalloris RPKI Downgrade Attack.eng.srt 50.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Attacking IPv6 Implementation Using Fragmentation.eng.tsv 50.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alexander Kornbrust - Circumvent Oracle.srt 50.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Beyond the Blacklists - Detecting Malicious URL Through Machine Learning.eng.vtt 50.1 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00006.jpg 50.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stale pointers are the new black - Vincenzo Iozzo, Giovanni Gola.eng.vtt 50.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Practical Attack Against VDI Solutions.eng.txt 50.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/SensePost - Putting Tea back into CyberTerrorism.eng.text 50.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Beyond Files Forensic OWADE Cloud Based Forensic - Elie Bursztein.eng.text 50.1 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Immoral Fiber Unlocking & Discovering New Offensive Capabilities of Fibers.eng.srt 50.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.eng.text 50.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mifare - Little Security, Despite Obscurity - Karsten Nohl.eng.tsv 50.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Journey to Protect Points-of-Sale.eng.tsv 50.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Paul Simmons - Welcome to Black Hat.eng.tsv 50.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Self-Driving and Connected Cars - Fooling Sensors and Tracking Drivers.eng.text 50.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jennifer Grannick - Forensic Issues in Hacker Prosecutions.eng.text 50.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/SSL TLS Interception Proxies and Transitive Trust.eng.text 50.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Tim Newsham - Cracking WEP Keys.eng.txt 50.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Attacker s Day into Virology - Human vs Computer.eng.lrc 50.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Why Government Systems Fail at Security - Chey Cobb.eng.tsv 50.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Gadgets.eng.srt 50.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/No Such Thing as a Stupid Question Why Knowledge Shaming is Making Us Less Secure.eng.vtt 50.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Predictable PRNG in the vulnerable Debian OpenSSL package, the What and the How - Luciano Bello and Maximiliano Bertacchini.eng.tsv 50.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/24 Techniques to Gather Threat Intel and Track Actors.eng.txt 50.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.eng.text 50.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Defending Privacy at the U.S. Border - A Guide for Travelers Carrying Digita.eng.text 50.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Heavy Metal That Poisoned the Droid.eng.tsv 50.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/WSUSpect Compromising The Windows Enterprise Via Windows Update.eng.srt 50.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Web Exploit Toolkits.eng.lrc 50.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/From Zero to Secure in One Minute.eng.tsv 50.0 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Priest - Building the Business Case for Management for Increased Security.eng.txt 50.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Rocking The Pocket Book Hacking Chemical Plant For Competition And Extortion.eng.txt 50.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Decompilers and Beyond - Ilfak Guilfanov.eng.text 50.0 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Google Reimagined a Phone. It was Our Job to Red Team and Secure it.eng.lrc 50.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Spy-Sense Spyware Tool for Executing Stealthy Exploits Against Sensor Networks - Thanassis Giannetsos.eng.text 49.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Towards a Holistic Approach in Building Intelligence to Fight Crimeware.eng.tsv 49.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Len Sassaman - Forensic Dead - Ends.eng.vtt 49.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SAP, Credit Cards, and the Bird that Talks Too Much.eng.txt 49.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Into the Core - In-Depth Exploration of Windows 10 IoT Core.eng.txt 49.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Authenticator Leakage Through Backup Channels on Android.eng.txt 49.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mohney - Defend with Voice Analytics.eng.vtt 49.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to grow a TREE (Taint-Enabled Reverse Engineering Environment) from a CBASS.eng.lrc 49.9 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling.eng.text 49.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exchanging Demands.eng.txt 49.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking Intel Bios - Rafal Wojtczuk, Alexander Tereshkin.eng.lrc 49.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - Why We are Not Building a Defendable Internet.eng.srt 49.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Dynamic Flash Instrumentation for Fun and Profit.eng.vtt 49.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/The WOMBAT API - Querying a global network of advanced honeypots - Stefano Zanero, Paolo Milani Comparetti.eng.text 49.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Len Sassaman - Forensic Dead - Ends.eng.lrc 49.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).eng.lrc 49.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cushman - MS Security fundamentals.eng.tsv 49.8 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Deep into Android Bluetooth Bug Hunting New Attack Surfaces and Weak Code Patterns.eng.srt 49.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Alexa, Hack My Server(less) Please.eng.vtt 49.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/IVR Security- Internal Network Attack via Phone Lines.eng.lrc 49.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Multiplexed Wired Attack Surfaces.eng.text 49.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Security Testing Best Practiceson complex File Format Fuzzing - Qing Wang.eng.vtt 49.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Unmanned Aerial Vehicles - Exploit Automation with the Metasploit Framework - James Lee.eng.tsv 49.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device.eng.tsv 49.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/USB - Undermining Security Barriers - Andy Davis.eng.lrc 49.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Payment Points of Interaction (POI).eng.tsv 49.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/JD Glaser - JDs Toolbox Fire and Ice.eng.txt 49.8 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Plenty of Coppers in Change - Stuart Hyde.eng.text 49.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Exploiting Smart-Phone USB Connectivity For Fun And Profit - Angelos Stavrou & Zhaohui Wang.eng.text 49.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mactans - Injecting Malware Into iOS Devices via Malicious Chargers.eng.txt 49.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Applied Machine Learning for Data Exfil and Other Fun Topics.eng.txt 49.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Andrew Van der Stock - OWASP Guide.eng.text 49.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hell on Earth - From Browser to System Compromise.eng.tsv 49.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Reflected File Download - A New Web Attack Vector.eng.vtt 49.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Rieback - RFID Malware Demystified.eng.text 49.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Ralf Spenneberg - IKE Testing IKE Implementations.eng.vtt 49.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Gen PlugX ShadowPad A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT.eng.lrc 49.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Lotus Domino - Penetration Through the Controller.eng.srt 49.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Interview with Neal Stephenson.eng.tsv 49.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Attacker s Day into Virology - Human vs Computer.eng.vtt 49.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.eng.tsv 49.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Tackling Privilege Escalation with Offense and Defense.eng.tsv 49.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Arthur Money - Closing Keynote.eng.txt 49.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Defending Networks With Incomplete Information - A Machine Learning Approach.eng.text 49.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Weapons of Targeted Attack Modern Document Exploit Techniques - Sung-ting Tsai, Ming-Chieh Pan.eng.srt 49.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Schulman - Phishing with Asterisk.eng.text 49.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Dissecting Non-Malicious Artifacts - One IP at a Time.eng.srt 49.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Investigating DDOS - Architecture Actors and Attribution.eng.text 49.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Practical Windows XP2003 Heap Exploitation - John McDonald, Chris Valasek.eng.text 49.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Passive Bluetooth Monitoring.eng.text 49.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Null Sessions, MSRPC, and Windows 2000 - Todd Sabin.eng.txt 49.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Locknote Conclusions and Key Takeaways from Black Hat Asia 2022.eng.tsv 49.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When the Cops Come A-Knocking - Handling Technical Assistance Demands from Law Enforcement.eng.tsv 49.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Practical Attack Against VDI Solutions.eng.lrc 49.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Just-In-Time Code Reuse - The More Things Change, the More They Stay the Same.eng.text 49.7 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/We Are About to Land - How CloudDragon Turns a Nightmare Into Reality.eng.srt 49.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Visual Forensic Analysis and Reverse Engineering of Binary Data - Greg Conti, Erik Dean.eng.text 49.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Using Online Activity as Digital DNA to Create a Better Spear Phisher.eng.txt 49.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pangu 9 Internals.eng.txt 49.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.eng.tsv 49.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Scott Culp - Building a Security Response Process.eng.text 49.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Active Exploitation Detection - Marc Eisenbarth.eng.text 49.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Language Properties of Phone Scammers - Cyberdefense At the Level of the Human.eng.text 49.6 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00005.jpg 49.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Hoglund - Hacking WOW Adv rootkit.eng.text 49.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Reverse Engineering and Exploiting Builds in the Cloud.eng.tsv 49.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Assortment of Database Goodies.eng.srt 49.6 KB
- Black Hat Windows/Black Hat Windows 2001/Pictures/dsc00004.jpg 49.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Timing Attacks Have Never Been So Practical - Advanced Cross-Site Search Attacks.eng.tsv 49.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/24 Techniques to Gather Threat Intel and Track Actors.eng.lrc 49.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Murakami_Hypervisor_IPS/bh_us_08_murakami_Hypervisor_IPS.pdf 49.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Off Grid communications with Android - Meshing the mobile world.eng.text 49.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Relaying EMV Contactless Transactions Using Off-The-Self Android Devices.eng.txt 49.6 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Hack Different Pwning iOS 14 with Generation Z Bug.eng.srt 49.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Honeypot That Can Bite - Reverse Penetration.eng.txt 49.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Million Browser Botnet.eng.text 49.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP Cookie Hijacking in the Wild - Security and Privacy Implications.eng.tsv 49.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Rocking The Pocket Book Hacking Chemical Plant For Competition And Extortion.eng.lrc 49.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Job De Haas - Getting Rooted and Never Knowing It.eng.vtt 49.5 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Emerging Frontiers Insights from the Black Hat Asia Review Board.eng.txt 49.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Into the Core - In-Depth Exploration of Windows 10 IoT Core.eng.lrc 49.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Stracener_Hansen_Xploiting_Google_Gadgets/Document Scrap 'http___exgenesis...'.shs 49.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2 2).eng.tsv 49.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Exploring Yosemite - Abusing Mac OS X 10.10.eng.vtt 49.5 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Video Conferencing Systems.eng.vtt 49.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/JD Glaser - Auditing NT Catching Greg Hoglund.eng.txt 49.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Hal McConnell - Threats from Organized Crime and Terrorists.eng.vtt 49.5 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Making Windows Exploits More Reliable - Kostya Kortchinsky.eng.text 49.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exchanging Demands.eng.lrc 49.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Padgett Peterson - Securing EMail Gateways from Attacks - What to do While Waiting for Vendors to Respond to the latest virus and worms.eng.tsv 49.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Beware of Serialized GUI Objects Bearing Data - David Byrne, Rohini Sulatycki.eng.srt 49.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Greetings from the '90s Exploiting the Design of Industrial Controllers in Modern Settings.eng.srt 49.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Probing The Mobile Operating Networks.eng.vtt 49.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Philip Zimmermann - Keynote with Introduction by Jeff Moss.eng.vtt 49.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways.eng.srt 49.4 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/X-Remote ICMP Based OS Fingerprinting Techniqu es - Ofir Arkin.eng.text 49.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Press ROOT to Continue - Detecting OSX and Windows Bootkits with RDFU.eng.vtt 49.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Tim Newsham - Cracking WEP Keys.eng.lrc 49.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluepilling the Xen Hypervisor - Joanna Rutkowska, Alexander Tereshkin.eng.txt 49.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Blasting Event - Driven Cornucopia WMI - based User - Space Attacks Blind SIEMs and EDRs.eng.srt 49.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/A practical attack against GPRS EDGE UMTS HSPA mobile data communications - David Perez & Jose Pico.eng.text 49.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).eng.text 49.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Developments in Cisco iOS Forensics - Felix FX Linder.eng.txt 49.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Columbus Rule and DHS.eng.txt 49.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Numchecker - A System Approach for Kernel Rootkit Detection.eng.tsv 49.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Call To Arms - A Tale of the Weaknesses of Current Client-Side XSS Filtering.eng.text 49.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/David Litchfeild - All new 0day.eng.srt 49.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Applied Machine Learning for Data Exfil and Other Fun Topics.eng.vtt 49.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with- API and Sysenter.eng.txt 49.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2021.eng.vtt 49.4 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Priest - Building the Business Case for Management for Increased Security.eng.lrc 49.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HEIST - HTTP Encrypted Information can be Stolen Through TCP-Windows.eng.txt 49.4 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Holz - Catching Malware - Japanese.eng.text 49.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Mobile Malware Madness, and How To Cap the Mad Hatters - Neil Daswani.eng.tsv 49.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Playing in the Reader X Sandbox - Paul Sabanal, Mark Yason.eng.txt 49.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam A Young, Modi Yang - Building Robust Backdoors.eng.vtt 49.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dave Aitel - An Introduction to Spike.eng.text 49.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Paul Wouters - Deploying DNSSEC.eng.txt 49.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Smartphone s Apps Are Not That Smart - Insecure Development Practices.eng.text 49.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Arthur Money - Closing Keynote.eng.vtt 49.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Applied Machine Learning for Data Exfil and Other Fun Topics.eng.lrc 49.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SAP, Credit Cards, and the Bird that Talks Too Much.eng.lrc 49.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Active & Passive Fingerprinting of Microsoft Based Operating Systems using the ICMP protocol - Ofir Arkin.eng.text 49.3 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/All Your Apple are Belong to Us Unique Identification and Cross-Device Tracking of Apple Devices.eng.srt 49.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Lawful Access Panel.eng.text 49.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Main Stage Understanding and Reducing Supply Chain and Software Vulnerability Risks.eng.srt 49.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/GreatFET - Making GoodFET Great Again.eng.vtt 49.3 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.eng.tsv 49.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Entrapment - Tricking Malware with Transparent, Scalable Malware Analysis.eng.vtt 49.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwning Your Java Messaging With Deserialization Vulnerabilities.eng.txt 49.3 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Kidnapping Without Hostages Virtual Kidnapping and the Dark Road Ahead.eng.srt 49.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Allen Harper, Edward Balas - The Birth of roo.eng.text 49.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bitcoin Transaction Malleability Theory in Practice.eng.vtt 49.3 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/How to Detect that Your Domains are Being Abused for Phishing by Using DNS.eng.srt 49.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction.eng.txt 49.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Viral Infections in Cisco iOS - Ariel Futoransky.eng.tsv 49.3 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.srt 49.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding IMSI Privacy.eng.tsv 49.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.eng.txt 49.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Greg Hoglund - 1000 Hackers in a box Failings of Security Scanners.eng.vtt 49.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Tim Newsham - Cracking WEP Keys.eng.srt 49.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Press ROOT to Continue - Detecting OSX and Windows Bootkits with RDFU.eng.txt 49.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Dive into Apple IO80211FamilyV2.eng.srt 49.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Dan Veeneman - Wireless Overview - Protocols and Threat Models.eng.text 49.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/GDPArrrrr Using Privacy Laws to Steal Identities.eng.srt 49.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Arthur Money - Closing Keynote.eng.lrc 49.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Return to Sender - Detecting Kernel Exploits with eBPF.eng.srt 49.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/0-days - u0026 Mitigations Roadways to Exploit and Secure Connected BMW Cars.eng.vtt 49.2 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Whoops, I Accidentally Helped Start the Offensive Intel Branch of a Foreign Intel Service.eng.srt 49.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Using Online Activity as Digital DNA to Create a Better Spear Phisher.eng.lrc 49.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/0-Knowledge Fuzzing - Vincenzo Iozzo.eng.tsv 49.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mactans - Injecting Malware Into iOS Devices via Malicious Chargers.eng.lrc 49.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Connection String Attack - Chema Alonso & Palako.eng.tsv 49.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Software Exploitation.eng.tsv 49.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Kernel Wars - Joel Eriksson.eng.srt 49.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Canspy - A Platform for Auditing Can Devices.eng.srt 49.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Sandbox Roulette - Are You Ready For The Gamble.eng.tsv 49.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Authenticator Leakage Through Backup Channels on Android.eng.lrc 49.2 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Effective Vulnerability Discovery with Machine Learning.eng.srt 49.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to grow a TREE (Taint-Enabled Reverse Engineering Environment) from a CBASS.eng.vtt 49.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder.eng.vtt 49.2 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Null Sessions, MSRPC, and Windows 2000 - Todd Sabin.eng.lrc 49.2 KB
- Black Hat DC/Black Hat Federal 2006/Combatting Symbian Malware - Jarno Niemelä.eng.text 49.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Who's Really Attacking Your ICS Devices.eng.text 49.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Kelihos Botnet.eng.srt 49.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Playing in a Satellite Environment 1.2 - Leonardo Nve Egea.eng.srt 49.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Honey, I'm Home - Hacking Z-Wave Home Automation Systems.eng.txt 49.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Maynor - NX - How Well Does it Say NO.srt 49.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/JD Glaser - JDs Toolbox Fire and Ice.eng.lrc 49.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with- API and Sysenter.eng.vtt 49.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Monsters in the Middleboxes Building Tools for Detecting HTTPS Interception.eng.srt 49.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Relaying EMV Contactless Transactions Using Off-The-Self Android Devices.eng.lrc 49.1 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/MaginotDNS Attacking the Boundary of DNS Caching Protection.eng.srt 49.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Halvar Flake - Diff Navigate Audit.eng.vtt 49.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.eng.tsv 49.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.eng.text 49.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Femtocells A Poisonous Needle in the Operator’s Hay Stack - Nico Golde, Kevin Redon.eng.tsv 49.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Simple Nomad and Todd Sabin - The RAZOR Warez.eng.tsv 49.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking with WebSockets.eng.txt 49.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/A Tale of One Software Bypass of Windows 8 Secure Boot.eng.vtt 49.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unveiling the Open Source Visualization Engine for Busy Hackers.eng.text 49.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Fireside Chat with U.S. National Cyber Director Chris Inglis.eng.tsv 49.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Adam Shostack - Towards a Taxonomy of Network Testing Techniques.eng.txt 49.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Netscreen of the Dead - Graeme Neilson.eng.tsv 49.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeff Moss, Gillman Louie - Welcome Keynote.mp4.text 49.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Hal McConnell - Threats from Organized Crime and Terrorists.eng.txt 49.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gutterman - Vulns Linux Random Num.eng.vtt 49.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Null Sessions, MSRPC, and Windows 2000 - Todd Sabin.eng.srt 49.0 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Andrey Labunets on Windbgshark.eng.json 49.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HEIST - HTTP Encrypted Information can be Stolen Through TCP-Windows.eng.vtt 49.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/An Uninvited Guest Who Won't Go Home - Bill.eng.text 49.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eric Schultze and George Kurtz - Over the Router, Through the Firewall, to Grandma's House We Go.eng.text 49.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pangu 9 Internals.eng.lrc 49.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.jp.eng.tsv 49.0 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.ncb 49.0 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.ncb 49.0 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.ncb 49.0 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Bypassing Entra ID Conditional Access Like APT A Deep Dive Into Device Authentication Mechanisms.eng.srt 49.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Developments in Cisco iOS Forensics - Felix FX Linder.eng.lrc 49.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/DTM Components - Shadow Keys to the ICS Kingdom.eng.srt 49.0 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/You Can't See Me - A Mac OS X Rootkit Uses the Tricks You Haven't Known Yet.eng.srt 49.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bitcoin Transaction Malleability Theory in Practice.eng.txt 49.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Honeypot That Can Bite - Reverse Penetration.eng.lrc 49.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace.eng.text 49.0 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Please Make a Dentist Appointment ASAP Attacking IOBluetoothFamily HCI and Vendor-Specific Commands.eng.srt 49.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Don’t Hate the Player, Hate the Game Inside the Android Patch Lifecycle - Anthony Lineberry, Tim Strazzere, Tim Wyatt.eng.text 49.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HEIST - HTTP Encrypted Information can be Stolen Through TCP-Windows.eng.lrc 49.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking FIDO - Are Exploits in There.eng.srt 49.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.vtt 49.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/RFIDIOts - Practical RFID hacking (without soldering irons) - Adam Laurie.eng.vtt 49.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Vulnerability Exploitation In Docker Container Environments.eng.vtt 49.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Side-Channel Timing Attacks on MSP430 Microcontroller Firmware - Travis Goodspeed.eng.srt 49.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Columbus Rule and DHS.eng.lrc 48.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Dissecting CSRF Attacks and Countermeasures.eng.tsv 48.9 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Veni, No Vidi, No Vici Attacks on ETW Blind EDR Sensors.eng.srt 48.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HDMI - Hacking Displays Made Interesting.eng.srt 48.9 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Light Commands Hacking Voice Assistants with Lasers.eng.srt 48.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwning Your Java Messaging With Deserialization Vulnerabilities.eng.lrc 48.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/David Litchfield - Compromising web Servers and Defensive Techniques.eng.text 48.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Teresa Lunt - Taxonomy of Intrusion Detection Systems.eng.tsv 48.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SensePost - A tale of two Proxies.eng.srt 48.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Nmap Scanning the Internet - Fyodor Vaskovich.eng.srt 48.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Neel Mehta - Advanced in ELF runtime binary encryption - Shiva.eng.text 48.9 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Revisiting Stealthy Sensitive Information Collection from Android Apps.eng.srt 48.9 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/New Botnets Trends and Threats - Augusto Paes de Barros, André Fucs & Victor Pereira.eng.vtt 48.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction.eng.lrc 48.9 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dominique-Brezinsski-A-Paranoid-Perspective-of-an-Interpreted-Language-English.eng.vtt 48.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Blended Web and Database Attacks on Real-Time, In-Memory Platforms.eng.tsv 48.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluepilling the Xen Hypervisor - Joanna Rutkowska, Alexander Tereshkin.eng.lrc 48.9 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Cookie Crumbles Unveiling Web Session Integrity Vulnerabilities.eng.srt 48.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Nicolas Fischbach - DDoS Mitigation and Analysis at the Infrastructure Level.eng.vtt 48.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Doors of Durin The Veiled Gate to Siemens S7 Silicon.eng.vtt 48.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - Why We are Not Building a Defendable Internet.eng.txt 48.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daniel VanBelleghem - Solving Network Mystries.eng.tsv 48.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with- API and Sysenter.eng.lrc 48.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/PLC Blaster - A worm Living Solely In The PLC.eng.vtt 48.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.eng.lrc 48.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Press ROOT to Continue - Detecting OSX and Windows Bootkits with RDFU.eng.lrc 48.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bohm - Taming Bugs - English.eng.tsv 48.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Benefits and Limitations of Context-Based Access Control.pdf 48.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Benefits and Limitations of Context-Based Access Control.pdf 48.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard George - Views On The Future Direction of Information Assurance.eng.txt 48.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Insane Detection of Insane Rootkits - Yuriy Bulygin.eng.tsv 48.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Okatani - Keynote - Japanese.eng.text 48.8 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jamie-Butler-Sherri-Sparks-Rootkit-Detection-English.eng.tsv 48.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Japanese.eng.srt 48.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Performance Optimization Weaknesses to Bypass ASLR.eng.srt 48.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Implementing the Lessons Learned From a Major Cyber Attack.eng.text 48.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Using Online Activity as Digital DNA to Create a Better Spear Phisher.eng.vtt 48.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/UART THOU MAD.eng.tsv 48.8 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Give Me a SQL Injection, I Shall PWN IIS and SQL Server.eng.srt 48.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Complexity in Computer Security - a Risky Business - Jeff Moss, Ian Angell.eng.tsv 48.8 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Emerging Frontiers Insights from the Black Hat Asia Review Board.eng.lrc 48.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ejovi Nuwere - SIP Format Fuzz in Voip.text 48.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/SQL Injections.eng.tsv 48.8 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Paging All Windows Geeks - Finding Evil in Windows 10 Compressed Memory.eng.txt 48.8 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Paul Wouters - Deploying DNSSEC.eng.lrc 48.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Oracle 11g (or has Oracle's security posture really changed - David Litchfield.eng.vtt 48.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybercrime in The Deep Web.eng.text 48.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Black Hat USA 2004 - David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.txt 48.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side..eng.txt 48.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side._en.txt 48.7 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/This is for the Pwners Exploiting a WebKit 0-day in PlayStation 4.eng.srt 48.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Honey, I'm Home - Hacking Z-Wave Home Automation Systems.eng.lrc 48.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder.eng.txt 48.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Security Paradigm.eng.text 48.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Evasion of High-End IDPS Devices at the IPv6 Era.eng.tsv 48.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP 2 & Quic - Teaching Good Protocols to Do Bad Things.eng.tsv 48.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Maximiliano Caceres - Syscall Proxying.eng.vtt 48.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/A Broken Chain Discovering OPC UA Attack Surface and Exploiting the Supply Chain.eng.srt 48.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Johnny-Long-Google-Hacking-Japanese-Translated.eng.text 48.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Cisco IOS Shellcodes Backdoors - Gyan Chawdhary, Varun Uppal.eng.tsv 48.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/HTTP Desync Attacks Request Smuggling Reborn.eng.tsv 48.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Package Clone Detection.eng.txt 48.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Greg Conti - Crafting a Tivo.eng.text 48.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Into the Core - In-Depth Exploration of Windows 10 IoT Core.eng.vtt 48.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Pwnie Awards.eng.tsv 48.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/JD Glaser - Auditing NT Catching Greg Hoglund.eng.lrc 48.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Automated Detection of HPP Vulnerabilities in Web Applications - Marco Balduzzi.eng.text 48.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Scott Blake - Dog of War Attack Box Design.eng.vtt 48.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Honeypot That Can Bite - Reverse Penetration.eng.vtt 48.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Saumil Shah - Defeating Automated Web Assessment Tools.eng.tsv 48.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking with WebSockets.eng.lrc 48.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Multiplayer Online Games Insecurity.eng.tsv 48.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Microsoft Kerberos - Sorry You Guys Don't Get It.eng.vtt 48.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Beyond the Mcse - Active Directory for the Security Professional.eng.text 48.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Dynamic Fireware Analysis At Scale - A Case Study on Embedded Web Interfaces.eng.text 48.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ChaosDB How We Hacked Databases of Thousands of Azure Customers (rev).eng.srt 48.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Playing in the Reader X Sandbox - Paul Sabanal, Mark Yason.eng.lrc 48.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Practical Attack Against VDI Solutions.eng.vtt 48.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Adam Shostack - Towards a Taxonomy of Network Testing Techniques.eng.lrc 48.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mohney - Defend with Voice Analytics.eng.tsv 48.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to Build a SpyPhone.eng.txt 48.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Securing the Public, who is in Charge.eng.vtt 48.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2021.eng.txt 48.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - The Seven Axioms of Security.eng.tsv 48.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.eng.text 48.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hardening Windows 8 apps for the Windows Store.eng.text 48.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Workshop - Teensy Programming for Everyone.eng.text 48.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/1000 Ways to Die in Mobile Oauth.eng.srt 48.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exposing Bootkits with BIOS Emulation.eng.vtt 48.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Library of Sparta.eng.text 48.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways.eng.txt 48.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Hal McConnell - Threats from Organized Crime and Terrorists.eng.lrc 48.6 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Keynote-The-Day-After-Katsuya-Uchida-Japanese.eng.vtt 48.6 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Web Application Security -Jeremiah Grossman, Bill Pennington.eng.tsv 48.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/A Tale of One Software Bypass of Windows 8 Secure Boot.eng.txt 48.5 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses.eng.text 48.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/(In-)Security of Backend-As-A-Service.eng.text 48.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Group Talk.eng.text 48.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/ePassports Reloaded - Jeroen van Beek.eng.txt 48.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSL And The Future of Authenticity - Moxie Marlinspike.eng.text 48.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pangu 9 Internals.eng.srt 48.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Adam Shostack - Identity, Economics, Security, and Terrorism.eng.text 48.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Priest - Building the Business Case for Management for Increased Security.eng.vtt 48.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Hacking Hollywood.eng.text 48.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Auger and Sima - 0day subscriptions.eng.tsv 48.5 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Reviving JIT Vulnerabilities Unleashing the Power of Maglev Compiler Bugs on Chrome Browser.eng.srt 48.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/WebTracking for You.eng.text 48.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Adam Shostack - Towards a Taxonomy of Network Testing Techniques.eng.vtt 48.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bitcoin Transaction Malleability Theory in Practice.eng.lrc 48.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Sophail A Critical Analysis of Sophos Antivirus - Tavis Ormandy.eng.text 48.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Malware.eng.text 48.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Paging All Windows Geeks - Finding Evil in Windows 10 Compressed Memory.eng.lrc 48.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Go Get My Vulnerabilities.eng.srt 48.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - Why We are Not Building a Defendable Internet.eng.lrc 48.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bringing a Machete to the Amazon.eng.text 48.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard George - Views On The Future Direction of Information Assurance.eng.vtt 48.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Shelters or Windmills - The Struggle For Power and Information Advantage.eng.text 48.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Paul Knight - Dynamic Routing Inside IPsec VPNs.eng.srt 48.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marcus Sachs - Building a Global Culture of Security(Luncheon Speaker).eng.txt 48.4 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/When Knowledge Graph Meets TTPs Automated & Adaptive Executable TTP Intelligence for Security.eng.srt 48.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeremiah-Grossman-Phishing-With-Super-Bait-English.eng.srt 48.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Subverting Apple Graphics - Practical Approaches to Remotely Gaining Root.eng.vtt 48.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerability Extrapolation or Give Me More Bugs Like That, Please - Fabian Yamaguchi.eng.vtt 48.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse Engineering Flash Memory for Fun and Benefit.eng.srt 48.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them.eng.text 48.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction.eng.vtt 48.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.eng.vtt 48.3 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Lost Control-Breaking Hardware-Assisted Kernel Control-Flow Integrity with Page-Oriented Programming.eng.srt 48.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Sniff Keystrokes with Lasers Voltmeters - Andrea Barisani, Daniele Bianco.eng.tsv 48.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/SnailLoad Anyone on the Internet Can Learn What You're Doing.eng.srt 48.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Attacking the Linux PRNG on Android.eng.txt 48.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side..eng.lrc 48.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side._en.lrc 48.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Evasion of Web Application.eng.tsv 48.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits.eng.text 48.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fight Against 1-Day Exploits - Jeongwook Oh.eng.txt 48.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unveiling the Underground World of Anti-Cheats.eng.srt 48.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Tatum - Managing the External Environment.eng.tsv 48.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unraveling Unicode - Chris Weber.eng.vtt 48.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard George - Views On The Future Direction of Information Assurance.eng.lrc 48.2 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Qualitative Look at Autonomous Peer Communication's Impact on Organizational Phishing Detection.eng.srt 48.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.eng.srt 48.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure Password Managers and Military-Grade Encryption on Smartphones Oh Re.eng.txt 48.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Keynote - Gen. Alexander.eng.txt 48.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Welcome & Introduction to Black Hat USA 2013.eng.txt 48.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Klein - Soc Engineering Methodology.tsv 48.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Next Generation Debuggers for Reverse Engineering - ERESI Team.eng.vtt 48.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder.eng.lrc 48.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluepilling the Xen Hypervisor - Joanna Rutkowska, Alexander Tereshkin.eng.srt 48.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Murakami - Hypervisor - IPS.jp.eng.text 48.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Raggo - Steganography Steganalysis Cryptanalysis.eng.srt 48.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to Build a SpyPhone.eng.lrc 48.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crippling HTTPs With Unholy PAC.eng.txt 48.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2021.eng.lrc 48.2 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace.eng.srt 48.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways.eng.lrc 48.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Package Clone Detection.eng.srt 48.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Black Hat USA 2004 - David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.lrc 48.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Larry Korba - Hope Hype and Horrors E - Commerce Explored.eng.text 48.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Breaking .NET Sandboxes.eng.txt 48.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Package Clone Detection.eng.lrc 48.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fact and Fiction - Defending Medical Device.eng.tsv 48.1 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/injectso Modifying and Spying on Running Processes Under Linux - Shawn Clowes.eng.text 48.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fatal Fury on ESP32 Time to Release Hardware Exploits.eng.vtt 48.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard Clarke - Keynote National Strategy for Securing Cyberspace.eng.srt 48.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/A Tale of One Software Bypass of Windows 8 Secure Boot.eng.lrc 48.1 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Auditing The Security of Applications - David Litchfield.eng.vtt 48.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Subverting Apple Graphics - Practical Approaches to Remotely Gaining Root.eng.txt 48.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Leviathan - Command and Control Communications on Planet Earth.eng.txt 48.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Attacks Against MDM Solutions.eng.vtt 48.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Performance Optimization Weaknesses to Bypass ASLR.eng.tsv 48.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Saumil Shah - Metasploit Plugins.eng.text 48.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service.eng.srt 48.1 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jamie-Butler-Sherri-Sparks-Rootkit-Detection-English.eng.vtt 48.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection.eng.srt 48.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Automating Incident Response.eng.text 48.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 2-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.tsv 48.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/To dock or not to dock, that is the question.eng.srt 48.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Reversing a Japanese Wireless SD Card - From Zero to Code Execution.eng.tsv 48.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Security Myths of Extended Validation SSL Certificates - Alexander Sotirov, Mike Zusman.eng.text 48.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Baseband Apocalypse - All Your Baseband Are Belong To Us - Ralf-Philipp Weinmann.eng.text 48.0 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/CodeCloak A DRL-Based Method for Mitigating Code Leakage by LLM Code Assistants.eng.srt 48.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/How can the Security Researcher Community Work Better for the Common Good - Jeff Moss, Roger Cumming.eng.text 48.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jeff Nathan and Kevin Depeugh - Layer 2 Attacks.eng.txt 48.0 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/Tool/w2k_lib.dll 48.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Stewart/Presentation/bh-usa-07-stewart.pdf 48.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/GreatFET - Making GoodFET Great Again.eng.txt 48.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crippling HTTPs With Unholy PAC.eng.srt 48.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Randomization Can't Stop BPF JIT Spray.eng.srt 48.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unraveling Unicode - Chris Weber.eng.txt 48.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Joe-Grand-Hardware-Vulns-Japanese.eng.text 48.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Classification and Detection of Application Backdoors - Chris Wysopal.eng.text 48.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/ePassports Reloaded - Jeroen van Beek.eng.lrc 48.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Revisiting XSS Sanitization.eng.text 48.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Joey - Advanced Windows NT and 2000 Security.eng.vtt 48.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Let s Get Physical - Breaking Home Security Systems and Bypassing Building Controls.eng.txt 48.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/NoJITsu Locking Down JavaScript Engines.eng.srt 48.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/All Your Calls Are Still Belong to Us - How We Compromised the Cisco VoIP Cr.eng.vtt 48.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marcus Sachs - Building a Global Culture of Security(Luncheon Speaker).eng.lrc 47.9 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Auditing The Security of Applications - David Litchfield.eng.txt 47.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques.eng.tsv 47.9 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Microsoft Defender for Office 365 Evasion - The Story of Confirmed Vulnerability.eng.srt 47.9 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/DnD Decompiling Deep Neural Network Compiled Binary.eng.srt 47.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.eng.srt 47.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Threats.eng.text 47.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mactans - Injecting Malware Into iOS Devices via Malicious Chargers.eng.srt 47.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure Password Managers and Military-Grade Encryption on Smartphones Oh Re.eng.lrc 47.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Charl-When-the-table-turn-Japanese.eng.text 47.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Understanding HL7 2.X Standards, Pen Testing, and Defending HL7 2.X Messages.eng.vtt 47.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Chris Paget - Click to Continue Shatter Attacks on Win32.eng.text 47.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/What s on the Wire - Physical Layer Tapping with Project Daisho.eng.text 47.9 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Halvar Flake - Graph Based Binary Analysis.eng.tsv 47.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Asia 2016.eng.text 47.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Relaying EMV Contactless Transactions Using Off-The-Self Android Devices.eng.vtt 47.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Demystifying the Secure Enclave Processor.eng.tsv 47.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/ePassports Reloaded - Jeroen van Beek.eng.vtt 47.8 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Detecting Deep Fakes with Mice.eng.srt 47.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Attacking the Linux PRNG on Android.eng.lrc 47.8 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/New Botnets Trends and Threats - Augusto Paes de Barros, André Fucs & Victor Pereira.eng.tsv 47.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Columbus Rule and DHS.eng.vtt 47.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Microsoft Vista NDA-less The Good, The Bad, and The Ugly - Chris Paget.eng.text 47.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.eng.text 47.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Analyzing SPDY Getting to Know the New Web Protocol - Thomas Roth.eng.srt 47.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/No Such Thing as a Stupid Question Why Knowledge Shaming is Making Us Less Secure.eng.txt 47.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass-the-Hash 2 - The Admin's Revenge.eng.tsv 47.8 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Redback Advanced Static Binary Injection.eng.srt 47.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/ClusterFuzz Fuzzing at Google Scale.eng.text 47.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.eng.tsv 47.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Vulnerability Exploitation In Docker Container Environments.eng.tsv 47.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Breaking .NET Sandboxes.eng.lrc 47.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Leviathan - Command and Control Communications on Planet Earth.eng.lrc 47.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Automated Malware Analysis.eng.tsv 47.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Attacking the Linux PRNG on Android.eng.vtt 47.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Brad TheNurse Smith on BH Arsenal 2011.eng.json 47.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crippling HTTPs With Unholy PAC.eng.lrc 47.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Subverting Apple Graphics - Practical Approaches to Remotely Gaining Root.eng.lrc 47.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/When the Lights Go Out - Hacking Cisco EnergyWise.eng.text 47.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/FX - The Blackberry Case.eng.text 47.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Defending Against Malicious Application Compatibility Shims.eng.text 47.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Oracle Security II - David Litchfield.eng.vtt 47.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning.eng.txt 47.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Keynote - Gen. Alexander.eng.lrc 47.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Welcome & Introduction to Black Hat USA 2013.eng.lrc 47.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Legal GNSS Spoofing and its Effects on Autonomous Vehicles.eng.srt 47.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zanero - HostBased Anomaly Detection.eng.text 47.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hiding In Plain Sight - Advances In Malware Covert Communication Channels.eng.text 47.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Rapid Radio Reversing.eng.text 47.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/TruEMU An Extensible, Open - Source, Whole - System iOS Emulator.eng.srt 47.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Leviathan - Command and Control Communications on Planet Earth.eng.vtt 47.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cache Side Channel Attack - Exploitability and Countermeasures.eng.text 47.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Remote Malicious Butler Did It.eng.tsv 47.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency.eng.tsv 47.6 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal.eng.srt 47.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/GreatFET - Making GoodFET Great Again.eng.lrc 47.6 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/AML Injection Attacks on Confidential VMs.eng.srt 47.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Alternative Medicine The Malware Analyst’s Blue Pill - Paul Royal.eng.vtt 47.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AMSI - How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It.eng.vtt 47.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Does Dropping USB Drives in Parking Lots and Other Places Really Work.eng.srt 47.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Abusing XSLT For Practical Attacks.eng.srt 47.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices.eng.srt 47.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Breaking .NET Sandboxes.eng.vtt 47.6 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/SystemUI As EvilPiP The Hijacking Attacks on Modern Mobile Devices.eng.srt 47.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Fredric Bret - Mounet - Automated Detection of COM Vulnerabilities.eng.text 47.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing.eng.srt 47.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Let s Get Physical - Breaking Home Security Systems and Bypassing Building Controls.eng.lrc 47.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fight Against 1-Day Exploits - Jeongwook Oh.eng.lrc 47.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Responsibility for the Harm and Risk of Security Security Flaws - Cassio Goldschmidt.eng.tsv 47.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/O'Connor - Vunls not So Embedded Sys.eng.text 47.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cyberspace A Fragile Ecosystem - Robert Lentz.eng.txt 47.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/V9-Scholz-SIP Stack Fingerprinting.eng.text 47.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks.eng.srt 47.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unraveling Unicode - Chris Weber.eng.lrc 47.5 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 2-2.eng.tsv 47.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Exploiting Rich Content - Riley Hassell.eng.text 47.5 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Hackproofing Lotus Domino - David Litchfield.eng.vtt 47.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Issues with Embedded Device Disclosures - Helping the Vendors and Recognizin.eng.tsv 47.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Fried Apples - Jailbreak DIY.eng.srt 47.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Bypassing Secure Boot Using Fault Injection.eng.tsv 47.5 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Auditing The Security of Applications - David Litchfield.eng.lrc 47.5 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/FX - Design and Software Vulnerabilities In Embedded Systems.eng.text 47.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Let's See What's Out There - Mapping the Wireless IOT.eng.tsv 47.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/0-days - u0026 Mitigations Roadways to Exploit and Secure Connected BMW Cars.eng.txt 47.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Ralf Spenneberg - IKE Testing IKE Implementations.eng.tsv 47.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Nightmare Behind The Cross Platform Mobile Apps Dream.eng.srt 47.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mudge - Economics Physics Psycology.eng.text 47.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/DNSSEC Downgrade Attacks.eng.srt 47.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Kernel Pool Exploitation on Windows 7 - Tarjei Mandt.eng.txt 47.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When Governments Attack - State Sponsored Malware Attacks Against Activists Lawyers and Journalists.eng.tsv 47.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.eng.srt 47.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass the Hash and other credential theft and reuse - Preventing Lateral Movement.eng.txt 47.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/No Such Thing as a Stupid Question Why Knowledge Shaming is Making Us Less Secure.eng.lrc 47.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani-tagged.eng.vtt 47.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.tsv 47.4 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/3d Red Pill - A Guest-to-Host Escape on QEMU KVM Virtio Device.eng.srt 47.4 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Drake-Exploiting_Java_Memory_Corruption-Code.zip 47.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/David-Maynor-Architecture-Flaws-in-Common-Security-Tools-English.eng.tsv 47.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Androbugs Framework - An Android Application Security Vilnerability Scanner.eng.vtt 47.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Owning the Routing Table - New OSPF Attacks - Gabi Nakibly.eng.text 47.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Retrospective on the Use of Export Cryptography.eng.text 47.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Siemens Simatic S7 PLC Exploitation - Dillon Beresford.eng.tsv 47.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1 2).eng.srt 47.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.eng.text 47.3 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/LCDPwn Breaking Enterprise - Things with Layer 2 Discovery Protocol Vulnerabilities Again.eng.srt 47.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Measuring Adversary Costs to Exploit Commercial Software.eng.text 47.3 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Misuse of DNS, the Second Most Used Protocol.eng.srt 47.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Moritz - Proactive Defense Against Malicious Code.eng.srt 47.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Paul Bohm - Taming Bugs.eng.text 47.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Entrapment - Tricking Malware with Transparent, Scalable Malware Analysis.eng.tsv 47.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Psychotronica - Nitesh Dhanjani.eng.txt 47.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Remote Web Application Dissassembly with ODBC Error Messages - David Litchfield.eng.vtt 47.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Keynote - Gen. Alexander.eng.vtt 47.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Welcome & Introduction to Black Hat USA 2013.eng.vtt 47.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Introducing Ring -3 Rootkits - Alexander Tereshkin & Rafal Wojtczuk.eng.tsv 47.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Black Ops of PKI - Dan Kaminski.eng.text 47.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning.eng.lrc 47.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ReCertifying Active Directory Certificate Services.eng.txt 47.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unveiling the Underground World of Anti-Cheats.eng.txt 47.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Something to Do with Network Security - Dan Kaminsky.eng.text 47.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Kernel Pool Exploitation on Windows 7 - Tarjei Mandt.eng.srt 47.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass the Hash and other credential theft and reuse - Preventing Lateral Movement.eng.vtt 47.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Roelof Temmingh and Haroon Meer - Setiri.eng.text 47.3 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/E-Meet (or Emit) My Keystrokes How Benign Screen-sharing Meetings Could Leak Typing Behaviors.eng.srt 47.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Psychotronica - Nitesh Dhanjani.eng.vtt 47.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Stoned Bootkit - Peter Kleissner.eng.vtt 47.3 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Back to the Future. Cross-Protocol Attacks in the Era of 5G.eng.srt 47.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Stateful Inspection of FireWall-1.eng.tsv 47.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is That You, Baby, or Just a Bridge in the Sky.eng.txt 47.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/I Can Hear You Now - Traffic Interception and Remote Mobile Phone Cloning.eng.tsv 47.2 KB
- Black Hat DC/Black Hat Federal 2006/Implementing and Detecting An ACPI BIOS Rootkit - John Heasman (bad audio quality).eng.vtt 47.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT.eng.vtt 47.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure in 2010 Broken in 2011.eng.tsv 47.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Universal DDoS Mitigation Bypass.eng.vtt 47.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning.eng.vtt 47.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exposing Bootkits with BIOS Emulation.eng.txt 47.2 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/A Universal Controller to Take Over a Z-Wave Network.eng.srt 47.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Advanced VBA Macros Attack & Defence.eng.srt 47.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jeff Nathan and Kevin Depeugh - Layer 2 Attacks.eng.lrc 47.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Out of Control - Demonstrating SCADA Device Exploitation.eng.srt 47.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Virtualization Under Attack Breaking Out of KVM - Nelson Elhage.eng.tsv 47.2 KB
- Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-granick.pdf 47.2 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Foreign Information Manipulation and Interference (Disinformation 2.0).eng.srt 47.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jeff Jonas - Non Obvious Relationship Awareness.eng.txt 47.1 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Core Escalation Unleashing the Power of Cross-Core Attacks on Heterogeneous System.eng.srt 47.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cyberspace A Fragile Ecosystem - Robert Lentz.eng.lrc 47.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TLS - SECRETS.eng.tsv 47.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/JD Glaser - Hacking With Executives.eng.text 47.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Scott Blake - The Pros and Cons of Hiring Hackers.eng.text 47.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sensepost - When The Tables Turn.eng.text 47.1 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Hiding Objects from Computer Vision by Exploiting Correlation Biases.eng.srt 47.1 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani-tagged.eng.txt 47.1 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/kRX - Comprehensive Kernel Protection Against Just-In-Time Code Reuse.eng.srt 47.1 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/Virt-ICE next gen debugger for malware analysis - NGUYEN Anh Quynh.eng.text 47.1 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Exposing the dark corners of SAP 4-Years of Threat Intelligence data analyzed.eng.srt 47.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Harnessing GPUs - Building Better Browser Based Botnets.eng.srt 47.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Deputies Are Still Confused.eng.text 47.1 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/DevSecOps What, Why and How.eng.srt 47.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hiding Behind Android Runtime (ART).eng.srt 47.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/0-days - u0026 Mitigations Roadways to Exploit and Secure Connected BMW Cars.eng.lrc 47.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Numchecker - A System Approach for Kernel Rootkit Detection.eng.vtt 47.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Barnaby Jack - Kernel Exploitation.eng.srt 47.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Bug Hunters Dump User Data. Can They Keep it Well They're Keeping it Anyway.eng.vtt 47.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/When IoT Attacks Hacking A Linux Powered Rifle.eng.srt 47.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Stealing with BGP - Steve Dugan.eng.text 47.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Dude, Where's My Laptop.eng.text 47.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic.eng.text 47.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Eugene Tsyrklevich - Attacking Host Intrusion Prevention Systems.eng.vtt 47.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert Morris Sr - Non-Cryptographic Ways.tsv 47.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Death to the IOC What's Next in Threat Intelligence.eng.srt 47.0 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Chris-Hurley-Identifying-and-Responding-to-Wireless-Attacks-English.eng.text 47.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Forgotten World - Corporate Business Application Systems - Alexander Polyakov.eng.text 47.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them.eng.tsv 47.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them_en.tsv 47.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side..eng.vtt 47.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side._en.vtt 47.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Using D-Space to Open Doors.eng.text 47.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass the Hash and other credential theft and reuse - Preventing Lateral Movement.eng.lrc 47.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Iran's Soft-War for Internet Dominance.eng.text 47.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Even The Lastpass Will Be Stolen, Deal With It.eng.text 47.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with API and Sysenter.jp.eng.text 47.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Creating a Spider Goat - Security with Intel CPU Transactional Memory Support.eng.tsv 47.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Never Trust Your Inputs - Causing 'Catastrophic Physical Consequences' From The Sensor.eng.vtt 47.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/NIDS False Positive Reduction Through Anomaly Detection - Damiano Bolzoni.eng.srt 47.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Joey - Advanced Windows NT and 2000 Security.eng.txt 47.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/iRK - Crafting OS X Kernel Rootkits - Jesse D’Aguanno.eng.text 47.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Psychotronica - Nitesh Dhanjani.eng.lrc 46.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Gyrophone - Eavesdropping Using a Gyroscope.eng.txt 46.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hackproofing Oracle Ebusiness Suite.eng.tsv 46.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cyberspace A Fragile Ecosystem - Robert Lentz.eng.vtt 46.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ben Laurie - CaPerl.eng.tsv 46.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Nightmare Behind The Cross Platform Mobile Apps Dream.eng.txt 46.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX.eng.txt 46.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/New Exploit Technique In Java Deserialization Attack.eng.vtt 46.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Simple Nomad - Strategies for Defeating Distributed Attacks.eng.text 46.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.eng.text 46.9 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/The black art of binary hijacking - Nick Harbour.eng.srt 46.9 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/E-Meet (or Emit) My Keystrokes How Benign Screen-sharing Meetings Could Leak Typing Behaviors.eng.tsv 46.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hacking Next-Gen ATMs - From Capture to Cashout.eng.vtt 46.9 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ReCertifying Active Directory Certificate Services.eng.lrc 46.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Kernel Pool Exploitation on Windows 7 - Tarjei Mandt.eng.lrc 46.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unveiling the Underground World of Anti-Cheats.eng.lrc 46.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking, Surveilling, and Deceiving victims on Smart TV.eng.srt 46.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HDMI - Hacking Displays Made Interesting.eng.tsv 46.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Drone Attacks on Industrial Wireless - A New Front in Cyber Security.eng.vtt 46.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking with WebSockets.eng.vtt 46.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Job De Haas - Getting Rooted and Never Knowing It.eng.txt 46.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grunwald - New Attack RFID Systems.eng.srt 46.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter.eng.tsv 46.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hacking Next-Gen ATMs - From Capture to Cashout.eng.txt 46.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/ARM Exploitation ROPmap - Long Le.eng.srt 46.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Simmonds - The Jericho Challenge.vtt 46.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Assortment of Database Goodies.eng.tsv 46.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is That You, Baby, or Just a Bridge in the Sky.eng.lrc 46.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/ICSCorsair - How I Will PWN Your ERP Through 4-20 mA Current Loop.eng.srt 46.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Xenpwn - Breaking Paravirtualized Devices.eng.text 46.8 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Prison Break Season 6 Defeating the Mitigations Adopted by Android OEMs.eng.srt 46.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Oracle 11g (or has Oracle's security posture really changed - David Litchfield.eng.txt 46.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Physical Memory Forensics for Files and Cache - Jamie Butler, Justin Murdock.eng.tsv 46.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Multipath TCP - Breaking Today s Networks with Tomorrow s Protocols.eng.tsv 46.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exposing Bootkits with BIOS Emulation.eng.lrc 46.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Rutkowska - Subverting Vista - English.eng.text 46.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Power Analysis Attacks for Cheapskates.eng.text 46.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marcus Sachs - Building a Global Culture of Security(Luncheon Speaker).eng.vtt 46.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Butler - Exponential Growth Rootkit.eng.srt 46.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/DPTrace - Dual Purpose Trace for Exploitability Analysis of Program Crashes.eng.text 46.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Terry Losonky - National Information Assurance Partnership.eng.srt 46.8 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime.eng.srt 46.8 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 1 by Jose Miguel Esparza.eng.vtt 46.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Highway to Hell Hacking Toll Systems - Nate Lawson.eng.text 46.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Dex Education.eng.text 46.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Java Exploitation.eng.tsv 46.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Analysis of the Attack Surface of Windows 10 Virtualization-Based Security.eng.tsv 46.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Joey - Advanced Windows NT and 2000 Security.eng.lrc 46.7 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani-tagged.eng.lrc 46.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents.eng.tsv 46.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/iOS Kernel.eng.tsv 46.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Exploiting CSP in WebKit to Break Authentication and Authorization.eng.srt 46.7 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Kenneth-Geers-Hacking-in-a-Foreign-Language-A-Network-Security-Guide-to-Russia-and-Beyond-English.eng.text 46.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Litchfield - Variations in Exploit Methods between Linux and Windows.eng.srt 46.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Web Exploit Toolkits.eng.srt 46.7 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SCTPscan - Finding Entry Points to SS7 Networks & Telecommunication Backbones - Philippe Langlois.eng.text 46.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Trustworthy Computing Update - Scott Clup.eng.text 46.7 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Change Management - Best Practices.pdf 46.7 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Change Management - Best Practices.pdf 46.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Robert Hansen - htaccess Scripts in Apache Environments.eng.vtt 46.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Seth Fogie - Pocket PC Abuse.eng.text 46.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Call Me - Gathering Threat Intelligence on Telephony Scams to Detect Fraud.eng.text 46.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BlackberryOS 10 From a Security Perspective.eng.txt 46.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reflections on Trusting TrustZone.eng.txt 46.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jeff Jonas - Non Obvious Relationship Awareness.eng.lrc 46.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Palante - Top 25 Overlooked Security Configuration on Your Switches and Routers.eng.txt 46.6 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Exploiting Windows COM WinRT ServicesExploiting Windows COM WinRT Services.eng.srt 46.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/When Lawyers Attack Dealing with the New Rules of Electronic Discovery - 1-2 - John Benson.eng.text 46.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX.eng.vtt 46.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Scott Blake - Politics of Vulnerabilities.eng.text 46.6 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Intel VISA Through the Rabbit Hole.eng.srt 46.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/To dock or not to dock, that is the question.eng.txt 46.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Post Memory Corruption Memory Analysis - Jonathan Brossard.eng.text 46.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Embedded Management Interfaces - Hristo Bojinov, Elie Bursztein, Dan Boneh.eng.text 46.6 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Video Killed the Text Star OSINT Approach.eng.srt 46.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Malware Distribution via Widgetization of the Web - Neil Daswani.eng.text 46.6 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 2-2.eng.tsv 46.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware.eng.text 46.6 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Paul Wouters - Deploying DNSSEC.eng.srt 46.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Palante - Top 25 Overlooked Security Configuration on Your Switches and Routers.eng.vtt 46.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/All Your Calls Are Still Belong to Us - How We Compromised the Cisco VoIP Cr.eng.txt 46.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Internet Explorer turns you personal computer into a public File Server - Jorge Luis Alvarez Medina.eng.srt 46.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Man-in-the-SCADA - Anatomy of Data Integrity Attacks in Industrial Control Systems.eng.text 46.6 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacking Oracle Web Applications with Metasploit - Chris Gates aka carnal0wnage.eng.text 46.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Javascript Static Security Analysis Made Easy with JSPrime.eng.vtt 46.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/All your Root Checks Belong To Us - The Sad State of Root Detection.eng.txt 46.5 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/KSMA Breaking Android Kernel Isolation and Rooting with ARM MMU Features.eng.srt 46.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Gyrophone - Eavesdropping Using a Gyroscope.eng.lrc 46.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Meet the Owner of a Real Hacked Company - Forensic Analysis - Mark Shelhart.eng.vtt 46.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Nightmare Behind The Cross Platform Mobile Apps Dream.eng.lrc 46.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX.eng.lrc 46.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Power of Data-Oriented Attacks.eng.vtt 46.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Ira Winkler - Who are the Real Black Hats.eng.text 46.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Gyrophone - Eavesdropping Using a Gyroscope.eng.vtt 46.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ReCertifying Active Directory Certificate Services.eng.vtt 46.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Job De Haas - Getting Rooted and Never Knowing It.eng.lrc 46.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Patton/Presentation/bh-usa-07-patton.pdf 46.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hacking Next-Gen ATMs - From Capture to Cashout.eng.lrc 46.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - Why We are Not Building a Defendable Internet.eng.vtt 46.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Power of Data-Oriented Attacks.eng.txt 46.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Greg Hoglund - Runtime Decompilation.eng.text 46.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Exploiting Adobe Flash Player In The Era Of Control Flow Guard.eng.tsv 46.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper.html 46.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/httprint_paper.html 46.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Sherma - Web Application Session Strength.eng.text 46.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Oracle 11g (or has Oracle's security posture really changed - David Litchfield.eng.lrc 46.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Random Number Generator in PHP.eng.text 46.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mission mPOSsible by Nils - Jon Butler.eng.srt 46.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Litchfield - All New Oracle 0 - day Attacking and Defending Oracle.eng.srt 46.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.eng.vtt 46.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Multivariate Solutions To Emerging Passive DNS Challenges.eng.text 46.4 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Vulnerabilities in the eSIM download protocol.eng.srt 46.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/OptiSig - Semantic Signature for Metamorphic Malware.eng.txt 46.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Biometric and Token-Based Access Control Systems - Zac Franken.eng.tsv 46.4 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Qualcomm WiFi Infinity War.eng.srt 46.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/RFIDIOts - Practical RFID hacking (without soldering irons) - Adam Laurie.eng.txt 46.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Meet the Owner of a Real Hacked Company - Forensic Analysis - Mark Shelhart.eng.txt 46.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service.eng.tsv 46.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/The COW (Container On Windows) Who Escaped the Silo.eng.srt 46.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pulling Back the Curtain on Airport Security - Can a Weapon Get Past TSA.eng.tsv 46.3 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/How I Can Unlock Your Smart Door Security Pitfalls in Cross-Vendor IoT Access Control.eng.srt 46.3 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Game of Cross Cache Let's Win It in a More Effective Way.eng.srt 46.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/SGX Secure Enclaves in Practice - Security and Crypto Review.eng.tsv 46.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process.eng.srt 46.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unmasking You - Joshua Abraham, Robert Hansen.eng.text 46.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/rootkit-backdoor/execution-path.html 46.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Panel - Competitive Intelligence.eng.text 46.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Beware of Serialized GUI Objects Bearing Data - David Byrne, Rohini Sulatycki.eng.tsv 46.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Win at Reversing - Nick Harbour.eng.text 46.3 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang.eng.srt 46.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mike Beekey - ARP Vulnerabilities Indefensible Local Network Attacks.eng.text 46.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reflections on Trusting TrustZone.eng.lrc 46.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Security Failures in Secure Devices - Christopher Tarnovsky.eng.text 46.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Greetings from the '90s Exploiting the Design of Industrial Controllers in Modern Settings.eng.txt 46.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer - 1-2 - Eric Filiol.eng.vtt 46.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Is Your Mental Health for Sale.eng.text 46.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote #HackingDemocracy Will Our Societies Hold.eng.tsv 46.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Jinx - Malware 2.0 - Itzik Kotler, Jonathan Rom.eng.tsv 46.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Behind the Scenes of iOS Security.eng.text 46.2 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Main Stage From the Office of the CISO Smarter, Faster, Stronger Security in the Age of AI.eng.srt 46.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/To dock or not to dock, that is the question.eng.lrc 46.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Panel - The Black Hat Testimonies.eng.text 46.2 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Hermes Attack Steal DNN Models In AI Privatization Deployment Scenarios.eng.srt 46.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Palante - Top 25 Overlooked Security Configuration on Your Switches and Routers.eng.lrc 46.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Black Hat USA 2004 - David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.vtt 46.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SAP, Credit Cards, and the Bird that Talks Too Much.eng.vtt 46.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/BeEF attack with MITM.eng.text 46.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Break Out of The Truman Show - Active Detection and Escape of Dynamic Binary Instrumentation.eng.vtt 46.2 KB
- Black Hat DC/Black Hat Federal 2006/Finding Digital Evidence in Physical Memory - Mariusz Burdach.eng.srt 46.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fully Arbitrary 802.3 Packet Injection - Maximizing Ethernet Attack Surface.eng.tsv 46.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Next Level Cheating and Leveling Up Mitigations.eng.text 46.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Potter - Trusted Computing Revolution.eng.text 46.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Litchfield - All New 0 Day.eng.srt 46.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions.eng.text 46.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Mobile Network Hacking, IP Edition.eng.vtt 46.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/All Your Calls Are Still Belong to Us - How We Compromised the Cisco VoIP Cr.eng.lrc 46.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 1-2 - Lukas Grunwald.eng.text 46.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Securing the Public, who is in Charge.eng.tsv 46.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BlackberryOS 10 From a Security Perspective.eng.lrc 46.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Issues with Embedded Device Disclosures - Helping the Vendors and Recognizin.eng.vtt 46.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Bruce Schneier - The Instrument and Death of Security.eng.txt 46.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hardware Backdooring.eng.tsv 46.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Analyzing SPDY Getting to Know the New Web Protocol - Thomas Roth.eng.txt 46.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways.eng.vtt 46.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Insider Data Theft.eng.text 46.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Hacking the Fast Lane - Security issues in 802.11p, DSRC and WAVE - Bruno Goncalves de Oliveira & Rob Havelt.eng.text 46.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Lost in the Loader The Many Faces of the Windows PE File Format.eng.srt 46.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Stay Out of the Kitchen - A DLP Security Bake-Off.eng.text 46.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.eng.tsv 46.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Attacking iPhone XS Max.eng.srt 46.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Embedding a Human Centric Approach Into a Global Cyber Security Program.eng.vtt 46.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Power of Data-Oriented Attacks.eng.lrc 46.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Home Invasion v2.0 - Attacking Network-Controlled Hardware.eng.tsv 46.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pivoting in Amazon Clouds.eng.vtt 46.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/GS and ASLR in Windows Vista - Ollie Whitehouse.eng.tsv 46.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Mobile Network Hacking, IP Edition.eng.txt 46.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.eng.txt 46.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Reverse Engineering Flash Exploits.eng.srt 46.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Kitchen's Finally Burned Down - DLP Security Bakeoff.eng.text 46.0 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/I Know You Want Me - Unplugging PlugX by Takahiro Haruyama & Hiroshi Suzuki.eng.srt 46.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/OptiSig - Semantic Signature for Metamorphic Malware.eng.lrc 46.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/RFIDIOts - Practical RFID hacking (without soldering irons) - Adam Laurie.eng.lrc 46.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.eng.text 46.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Crack a Microcell.eng.text 46.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer - 1-2 - Eric Filiol.eng.txt 46.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Booting the iOS Kernel to an Interactive Bash Shell on QEMU.eng.vtt 46.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Journey From JNDI LDAP Manipulation to Remote Code Execution Dream Land.eng.tsv 46.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Attacks to SAP Web Applications - Your crown jewels online - Mariano Nunez Di Croce.eng.text 46.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/MLD Considered Harmful - Breaking Another IPv6 Subprotocol.eng.text 46.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/You've Already Been Hacked What if There Is a Backdoor in Your UEFI OROM.eng.srt 46.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Next Generation Collaborative Reversing with Ida Pro and CollabREate - Chris Eagle, Tim Vidas.eng.text 46.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Mo’ Money Mo’ Problems - Jeremiah Grossman, Trey Ford.eng.tsv 45.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Meet the Owner of a Real Hacked Company - Forensic Analysis - Mark Shelhart.eng.lrc 45.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Methods for Understanding Targeted Attacks with Office Documents - Bruce Dang.eng.txt 45.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Diving in to Spooler Discovering LPE and RCE Vulnerabilities in Windows Printer.eng.srt 45.9 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Your Trash Kernel Bug, My Precious 0 day.eng.srt 45.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/How to Break PDF Encryption.eng.vtt 45.9 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/SysBumps Exploiting Speculative Execution in System Calls for Breaking KASLR.eng.srt 45.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Segment Heap Internals.eng.srt 45.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/tables.c 45.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The UEFI Firmware Rootkits - Myths and Reality.eng.txt 45.9 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Manufacturing Hardware Implants from Idea to Mass Production A Hacker's Journey.eng.srt 45.9 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/HI THIS IS URGENT PLZ FIX ASAP Critical Vulnerabilities And Bug Bounty Programs.eng.srt 45.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/All your Root Checks Belong To Us - The Sad State of Root Detection.eng.lrc 45.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Zen and the Art of Adversarial Machine Learning.eng.srt 45.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Nmap Scanning the Internet - Fyodor Vaskovich.eng.txt 45.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jose Nazario - The Future of Network Worms.eng.srt 45.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/GRR - Find All the Badness, Collect All the Things.eng.text 45.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/James Foster - Managing Hackers.eng.srt 45.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Witchcraft Compiler Collection - Towards Self Aware Computer Programs.eng.txt 45.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Greetings from the '90s Exploiting the Design of Industrial Controllers in Modern Settings.eng.lrc 45.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/36 Views of Cyberspace.eng.vtt 45.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Beyond the Blacklists - Detecting Malicious URL Through Machine Learning.eng.tsv 45.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Johnny Long Me to We - Johnny Long.eng.text 45.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android.eng.text 45.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Video Conferencing Systems.eng.tsv 45.8 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/The Spear to Break the Security Wall of S7Commplus.eng.srt 45.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/A Crushing Blow at the Heart of SAP’s J2EE Engine - Alexander Polyakov.eng.srt 45.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Raggo - Steganography Steganalysis Cryptanalysis.eng.txt 45.8 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/PyLingual A Python Decompilation Framework for Evolving Python Versions.eng.srt 45.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT.eng.txt 45.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Year in Flash.eng.tsv 45.8 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hopping on the CAN Bus.eng.text 45.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.jp.eng.txt 45.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Probing The Mobile Operating Networks.eng.tsv 45.8 KB
- Black Hat DC/Black Hat Federal 2006/Characterising the real threats to our nation’s critical information systems - Tom Parker, Matthew G Devost.eng.text 45.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Decrypting DPAPI data - Jean-Michel Picod, Elie Bursztein.eng.tsv 45.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Cyber Judo - Offensive Cyber Defense.eng.srt 45.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Thorsen Holz - Maximilliam Dornseif - NoSEBrEaK Defeating Honeypots.eng.tsv 45.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking Big Data - Evading Analysis of the Metadata of Your Life.eng.tsv 45.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Finnigan - How to Unwrap Oracle.eng.text 45.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Interpreter Exploitation - Pointer Inference and JIT Spraying - Dion.eng.text 45.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Analyzing SPDY Getting to Know the New Web Protocol - Thomas Roth.eng.lrc 45.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/They Ought to Know Better - Exploiting Security Gateways via Their Web Inter.eng.vtt 45.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Barnaby Jack - Kernel Exploitation.eng.txt 45.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AMSI & Bypass Review of Known AMSI Bypass Techniques and Introducing a New One.eng.txt 45.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Mobile-Telephony Threats in Asia.eng.text 45.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Stephenson - Introduction to Cyber Forensic Analysis.eng.text 45.7 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/ODDFuzz Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing.eng.srt 45.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Booting the iOS Kernel to an Interactive Bash Shell on QEMU.eng.txt 45.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Butler - Exponential Growth Rootkit.eng.tsv 45.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Hacker_Court/Extras/Hacker_Court_Summary_2007.pdf 45.7 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems.eng.srt 45.7 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/How We Organize Large - Scale DDoS Exercises in the Netherlands.eng.srt 45.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/IVR Security- Internal Network Attack via Phone Lines.eng.srt 45.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/(In)Security of Mobile Banking.eng.txt 45.6 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/The Journey of Hunting In - the - Wild Windows LPE 0day.eng.srt 45.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Attacks Against MDM Solutions.eng.tsv 45.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/They Ought to Know Better - Exploiting Security Gateways via Their Web Inter.eng.txt 45.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Horse Pill - A New Type of Linux Rootkit.eng.tsv 45.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jeff Jonas - Non Obvious Relationship Awareness.eng.vtt 45.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Mobile Network Hacking, IP Edition.eng.lrc 45.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alexander Kornbrust - Circumvent Oracle.txt 45.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.eng.lrc 45.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.vtt 45.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Wi-Fi Advanced Fuzzing - Laurent Butti.eng.text 45.6 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Cautious A New Exploitation Method No Pipe but as Nasty as Dirty Pipe.eng.srt 45.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Server Side Template Injection RCE For The Modern Web App.eng.srt 45.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Is This My Domain Controller A New Class of Active Directory Protocol Injection Attacks.eng.srt 45.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SmartCard APDU Analysis - Ivan Buetler.eng.tsv 45.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Next Generation Mobile Rootkits.eng.txt 45.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reflections on Trusting TrustZone.eng.srt 45.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Doors of Durin The Veiled Gate to Siemens S7 Silicon.eng.tsv 45.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Timothy Mullen - Grabbing User Credentials via W2k ODBC Libraries.eng.vtt 45.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Spradlin - Auditing data Access.eng.text 45.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pivoting in Amazon Clouds.eng.tsv 45.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer - 1-2 - Eric Filiol.eng.lrc 45.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The UEFI Firmware Rootkits - Myths and Reality.eng.srt 45.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OptiROP - The Art of Hunting ROP Gadgets.eng.tsv 45.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Simple Nomad and Todd Sabin - The RAZOR Warez.eng.vtt 45.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking SMS - Zane Lackey, Luis Miras.eng.text 45.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/K K Mookhey - Evasion and Detection of Web Application Tactics.eng.text 45.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobitex Network Security - olleB.eng.srt 45.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Trust in Apple's Secret Garden Exploring & Reversing Apple's Continuity Protocol.eng.srt 45.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Breaking the Security of Physical Devices by Silvio Cesare.eng.tsv 45.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hack Microsoft Using Microsoft Signed Binaries.eng.vtt 45.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Locknote - Conclusions & Key Takeaways from Black Hat Asia 2017.eng.text 45.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.text 45.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Robert Hansen - htaccess Scripts in Apache Environments.eng.tsv 45.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Never Trust Your Inputs - Causing 'Catastrophic Physical Consequences' From The Sensor.eng.txt 45.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Silently Breaking ASLR In The Cloud.eng.text 45.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Stefano Zanero - Detecting 0 Day Attacks with Learning IDS.eng.text 45.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Microsoft Kerberos - Sorry You Guys Don't Get It.eng.txt 45.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The UEFI Firmware Rootkits - Myths and Reality.eng.lrc 45.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Nmap Scanning the Internet - Fyodor Vaskovich.eng.lrc 45.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Adaptive Kernel Live Patching - An Open Collaborative Effort.eng.vtt 45.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.tsv 45.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Simmonds - The Jericho Challenge.txt 45.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Revealing Embedded Fingerprints - Deriving intelligence from USB stack interactions.eng.srt 45.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Witchcraft Compiler Collection - Towards Self Aware Computer Programs.eng.lrc 45.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Eugene Tsyrklevich - Attacking Host Intrusion Prevention Systems.eng.tsv 45.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/How to Break PDF Encryption.eng.txt 45.4 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Straight Outta VMware Modern Exploitation of the SVGA Device for Guest-to-Host Escapes.eng.srt 45.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Thomas Olofsson - Building a Blind IP Spoofed Portscanning Tool.eng.srt 45.4 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices.eng.srt 45.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Exploring Yosemite - Abusing Mac OS X 10.10.eng.txt 45.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Keynote-The-Day-After-Katsuya-Uchida-Japanese.eng.tsv 45.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Beware of Serialized GUI Objects Bearing Data - David Byrne, Rohini Sulatycki.eng.vtt 45.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Flash Sandboxes.eng.srt 45.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Bruce Schneier - The Instrument and Death of Security.eng.lrc 45.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/About Directed Fuzzing and Use-After-Free How to Find Complex & Silent Bugs.eng.srt 45.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT.eng.lrc 45.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eugene Schultz - Security Issues with Configuring and Maintaining an IIS 4 Server.eng.tsv 45.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Main Stage Solving the Cyber Hard Problems A View into Problem Solving from the White House.eng.srt 45.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking Big Data - Evading Analysis of the Metadata of Your Life.eng.vtt 45.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Rooting SIM cards.eng.text 45.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Raggo - Steganography Steganalysis Cryptanalysis.eng.lrc 45.4 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Attacking Debug Modules In The Android Ecosystem.eng.srt 45.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.eng.txt 45.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking Intel Bios - Rafal Wojtczuk, Alexander Tereshkin.eng.tsv 45.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Flip Feng Shui - Rowhammering the VM's Isolation.eng.text 45.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/A Deep Dive into Privacy Dashboard of Top Android Vendors.eng.srt 45.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Assortment of Database Goodies.eng.vtt 45.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Booting the iOS Kernel to an Interactive Bash Shell on QEMU.eng.lrc 45.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hiding Behind Android Runtime (ART).eng.txt 45.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/David Litchfeild - All new 0day.eng.tsv 45.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Methods for Understanding Targeted Attacks with Office Documents - Bruce Dang.eng.lrc 45.3 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/UI Redressing Attacks on Android Devices Revisited by Marcus Niemietz.eng.srt 45.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass.eng.srt 45.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 2-2 - Chris Hadnagy.eng.vtt 45.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Greetings from the '90s Exploiting the Design of Industrial Controllers in Modern Settings.eng.vtt 45.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Understanding The Attack Surface & Attack Resilience Of Project Spartan.eng.txt 45.3 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 1 by Jose Miguel Esparza.eng.tsv 45.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016.eng.text 45.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to grow a TREE (Taint-Enabled Reverse Engineering Environment) from a CBASS.eng.tsv 45.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Attacking Windows by Windows.eng.srt 45.2 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 2 by Jose Miguel Esparza.eng.tsv 45.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Greg Hoglund - 1000 Hackers in a box Failings of Security Scanners.eng.tsv 45.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/They Ought to Know Better - Exploiting Security Gateways via Their Web Inter.eng.lrc 45.2 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Remote Web Application Dissassembly with ODBC Error Messages - David Litchfield.eng.txt 45.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Practical Attack Against VDI Solutions.eng.tsv 45.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Miniaturization.eng.text 45.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/24 Techniques to Gather Threat Intel and Track Actors.eng.tsv 45.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HDMI - Hacking Displays Made Interesting.eng.vtt 45.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Contemporary Automatic Program Analysis.eng.txt 45.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AMSI & Bypass Review of Known AMSI Bypass Techniques and Introducing a New One.eng.lrc 45.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.eng.txt 45.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Nmap Scanning the Internet - Fyodor Vaskovich.eng.vtt 45.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Barnaby Jack - Kernel Exploitation.eng.lrc 45.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/USB - Undermining Security Barriers - Andy Davis.eng.srt 45.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Man in the Binder - He Who Controls IPC, Controls the Droid.eng.srt 45.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Universal DDoS Mitigation Bypass.eng.txt 45.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 1.eng.text 45.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/APTs Way - Evading Your EBNIDS.eng.srt 45.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Never Trust Your Inputs - Causing 'Catastrophic Physical Consequences' From The Sensor.eng.lrc 45.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alexander Kornbrust - Circumvent Oracle.lrc 45.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deeper Door Exploiting the NIC Chipset - Sherri Sparks, Shawn Embleton.eng.text 45.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Hunting Flaws in MS SQL Server - Cesar Cerrudo, Aaron Newman.eng.text 45.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam A Young, Modi Yang - Building Robust Backdoors.eng.tsv 45.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Into the Core - In-Depth Exploration of Windows 10 IoT Core.eng.tsv 45.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/PWNIE Awards at Black Hat USA 2014.eng.srt 45.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 2.eng.srt 45.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/BadMesher New Attack Surfaces of Wi Fi Mesh Network.eng.srt 45.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/How to Break PDF Encryption.eng.lrc 45.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mission mPOSsible by Nils - Jon Butler.eng.txt 45.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hello From the Other Side - SSH Over Robust Cache Covert Channels in the Cloud.eng.text 45.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Exploring Yosemite - Abusing Mac OS X 10.10.eng.lrc 45.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Microsoft Kerberos - Sorry You Guys Don't Get It.eng.lrc 45.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Chain of Fools An Exploration of Certificate Chain Validation Mishaps.eng.text 45.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Simmonds - The Jericho Challenge.lrc 45.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Null Sessions, MSRPC, and Windows 2000 - Todd Sabin.eng.vtt 45.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Lotus Domino - Penetration Through the Controller.eng.txt 45.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Exploiting the iOS Kernel - Stefan Esser.eng.text 45.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Rocking The Pocket Book Hacking Chemical Plant For Competition And Extortion.eng.tsv 45.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Next Generation Mobile Rootkits.eng.lrc 45.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014.eng.text 45.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/PLC Blaster - A worm Living Solely In The PLC.eng.tsv 45.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Canspy - A Platform for Auditing Can Devices.eng.vtt 45.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Paging All Windows Geeks - Finding Evil in Windows 10 Compressed Memory.eng.tsv 45.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/A Crushing Blow at the Heart of SAP’s J2EE Engine - Alexander Polyakov.eng.txt 45.0 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Rad-International-Cyber-Jurisdiction-wp.pdf 45.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lessons Learned from Eight Years of Breaking Hypervisors.eng.text 45.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ChaosDB How We Hacked Databases of Thousands of Azure Customers (rev).eng.tsv 45.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.eng.lrc 45.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/(In)Security of Mobile Banking.eng.lrc 45.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sutton and MacManus - Punk 0de.eng.text 45.0 KB
- Black Hat Europe/Black Hat Europe 2000/Video/Black Hat Europe Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.text 45.0 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Grossman - Hacking Intranet - English.eng.text 45.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/How to Detect that Your Domains are Being Abused for Phishing by Using DNS.eng.vtt 45.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exchanging Demands.eng.tsv 45.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Simple Nomad - Covering Your Tracks.eng.text 44.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unveiling the Underground World of Anti-Cheats.eng.vtt 44.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Practical New Developments in The Breach Attack.eng.text 44.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Jeremiah Grossman - Phishing with Super Bait.text 44.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Applied Machine Learning for Data Exfil and Other Fun Topics.eng.tsv 44.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Torturing OpenSSL.eng.text 44.9 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/walmart_netcraft.png 44.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Abusing Software Defined Networks.eng.text 44.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Performance Optimization Weaknesses to Bypass ASLR.eng.vtt 44.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Beast is in Your Memory.eng.text 44.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Tim Newsham - Cracking WEP Keys.eng.vtt 44.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hiding Behind Android Runtime (ART).eng.lrc 44.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Gadgets.eng.txt 44.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Windows 8.eng.vtt 44.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.eng.text 44.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AVLeak - Fingerprinting Antivirus Emulators for Advanced Malware Evasion.eng.srt 44.9 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Testing Your Organization's Social Media Awareness.eng.srt 44.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Windows 8.eng.txt 44.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alexander Kornbrust - Circumvent Oracle.vtt 44.8 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat EU 2024 Speaker Orientation (Meeting Recording).eng.srt 44.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.jp.eng.lrc 44.8 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Satoru-Koyama-Our-Security-Depends-on-Your-Security-Japanese.eng.text 44.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Androbugs Framework - An Android Application Security Vilnerability Scanner.eng.txt 44.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Long-Term Sessions - This Is Why We Can’t Have Nice Things - Steve Ocepek.eng.txt 44.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Embedding a Human Centric Approach Into a Global Cyber Security Program.eng.txt 44.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Len Sassaman - Forensic Dead - Ends.eng.tsv 44.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gerard Eschelbeck - The laws of Vulnerabilities for Internal Networks.eng.text 44.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Remote Web Application Dissassembly with ODBC Error Messages - David Litchfield.eng.lrc 44.8 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/kRX - Comprehensive Kernel Protection Against Just-In-Time Code Reuse.eng.txt 44.8 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/ICMP Usage In Scanning - Ofir Arkin.eng.text 44.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.eng.lrc 44.8 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Mobile Interconnect Threats How Next-Gen Products May be Already Outdated.eng.srt 44.8 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/One-Way SQL Hacking - JD Glaser & Saumil Udayan Shah.eng.text 44.8 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Domain Borrowing Catch My C2 Traffic if You Can.eng.srt 44.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Remote Memory-Deduplication Attacks.eng.srt 44.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Universal DDoS Mitigation Bypass.eng.lrc 44.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Understanding The Attack Surface & Attack Resilience Of Project Spartan.eng.lrc 44.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Scott Blake - Dog of War Attack Box Design.eng.txt 44.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Partial-Japanese.eng.srt 44.7 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Software Virtualization Based Rootkits - Sun Bing.eng.srt 44.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Mark Kadrich - Intrusion Detection in High Speed Networks.eng.text 44.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SensePost - A tale of two Proxies.eng.vtt 44.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Tao of Hardware the Te of Implants.eng.text 44.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ChaosDB How We Hacked Databases of Thousands of Azure Customers (rev).eng.vtt 44.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fight Against 1-Day Exploits - Jeongwook Oh.eng.srt 44.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Attacker s Day into Virology - Human vs Computer.eng.tsv 44.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mission mPOSsible by Nils - Jon Butler.eng.lrc 44.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Brian Snow - We Need Assurance.eng.srt 44.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/To dock or not to dock, that is the question.eng.vtt 44.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Canspy - A Platform for Auditing Can Devices.eng.txt 44.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwnie Awards 2016.eng.tsv 44.7 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Beddoe/PI-v0.01beta.tgz 44.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Contemporary Automatic Program Analysis.eng.lrc 44.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process.eng.txt 44.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.eng.srt 44.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ed Gerck - Overview of Certification systems x509, CA, PGP and SKIP.eng.tsv 44.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Configuring IP Access Lists.pdf 44.6 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Configuring IP Access Lists.pdf 44.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 1.eng.text 44.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/spoonm, scape - Beyond EIP.tsv 44.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Gadgets.eng.vtt 44.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grunwald - New Attack RFID Systems.eng.txt 44.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Building a Defensive Framework for Medical Device Security.eng.text 44.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Computrace Backdoor Revisited.eng.text 44.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking FIDO - Are Exploits in There.eng.vtt 44.6 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Mobius Band Explore Hyper-V Attack Interface through Vulnerabilities Internals.eng.srt 44.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.eng.srt 44.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).eng.srt 44.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Forging the USB Armory.eng.text 44.5 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Kernel Wars - Joel Eriksson.eng.txt 44.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HEIST - HTTP Encrypted Information can be Stolen Through TCP-Windows.eng.tsv 44.5 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Deception at Scale How Malware Abuses Trust.eng.srt 44.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-Japanese-with-english-questions.eng.txt 44.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Maximizing Home-field Advantage.eng.text 44.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Dynamic Flash Instrumentation for Fun and Profit.eng.tsv 44.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/DTM Components - Shadow Keys to the ICS Kingdom.eng.vtt 44.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.eng.tsv 44.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Design Approaches for Security Automation.eng.text 44.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Developments in Cisco iOS Forensics - Felix FX Linder.eng.tsv 44.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Using Online Activity as Digital DNA to Create a Better Spear Phisher.eng.tsv 44.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.eng.vtt 44.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dwivedi - Shoot Nxt Persn says VLANS.eng.txt 44.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/A Crushing Blow at the Heart of SAP’s J2EE Engine - Alexander Polyakov.eng.lrc 44.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Virtual Battlefield in 2022 Russia Ukraine War & Its Policy Implications.eng.srt 44.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Himanshu Dwivedi - Insecure IP Storage Networks.eng.srt 44.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Paul Knight - Dynamic Routing Inside IPsec VPNs.eng.vtt 44.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Lotus Domino - Penetration Through the Controller.eng.lrc 44.5 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/FPs are Cheap. Show me the CVEs.eng.srt 44.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crippling HTTPs With Unholy PAC.eng.vtt 44.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/These re Not Your Grand Daddy s CPU Performance Counters CPU Hardware Performa.eng.srt 44.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/ZigBee Exploited The Good, The Bad, And The Ugly.eng.srt 44.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Androbugs Framework - An Android Application Security Vilnerability Scanner.eng.lrc 44.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Embedding a Human Centric Approach Into a Global Cyber Security Program.eng.lrc 44.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Side-Channel Timing Attacks on MSP430 Microcontroller Firmware - Travis Goodspeed.eng.vtt 44.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Popping Shell on A(ndroid)RM Devices - Itzhak (Zuk) Avraham.eng.srt 44.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwning Your Java Messaging With Deserialization Vulnerabilities.eng.tsv 44.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Hacking Databases for Owning Your Data - Cesar Cerrudo & Esteban Martinez Fayo.eng.text 44.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neat New & Ridiculous Flash Hacks - Mike Bailey.eng.srt 44.4 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Japanese.eng.txt 44.4 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/kRX - Comprehensive Kernel Protection Against Just-In-Time Code Reuse.eng.lrc 44.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Ghost in the Air (Traffic).eng.text 44.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Merloni and Carettoni - Blue Bag.eng.txt 44.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Litchfield - Variations in Exploit Methods between Linux and Windows.eng.tsv 44.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pay No Attention to That Hacker Behind the Curtain - A Look Inside the Black Hat Network.eng.text 44.4 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Hackproofing Lotus Domino - David Litchfield.eng.txt 44.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Next Level Cheating and Leveling Up Mitigations.eng.text 44.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Energy Fraud and Orchestrated Blackouts - Issues with Wireless Metering Protocols.eng.srt 44.4 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Configuration Management - Best Practices.pdf 44.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Configuration Management - Best Practices.pdf 44.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BlackberryOS 10 From a Security Perspective.eng.srt 44.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Analyzing SPDY Getting to Know the New Web Protocol - Thomas Roth.eng.vtt 44.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.eng.text 44.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Scott Blake - Dog of War Attack Box Design.eng.lrc 44.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction.eng.tsv 44.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mandy Andress - Wireless LAN Security.eng.srt 44.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Gadgets.eng.lrc 44.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Windows 8.eng.lrc 44.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hands Off and Putting SLAB SLUB Feng Shui in a Blackbox.eng.srt 44.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Press ROOT to Continue - Detecting OSX and Windows Bootkits with RDFU.eng.tsv 44.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdoor Investigation and Incident Response From Zero to Profit.eng.srt 44.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Honey, I'm Home - Hacking Z-Wave Home Automation Systems.eng.tsv 44.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Invisibility Purge - Unmasking the Dormant Events of Invisible Web Controls.eng.srt 44.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Poacher Turned Gamekeeper - Lessons Learned from Eight Years of Breaking Hypervisors.eng.text 44.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Keynote.eng.txt 44.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mobile Device Mismanagement.eng.text 44.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Enhancing ZFS in the Kernel - Soy Christian Kendi.eng.text 44.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/David Litchfeild - All new 0day.eng.vtt 44.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Rick Smith - Masquerades,Tricking Modern Auth Systems.eng.text 44.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process.eng.lrc 44.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Kernel Wars - Joel Eriksson.eng.vtt 44.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Canspy - A Platform for Auditing Can Devices.eng.lrc 44.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Exploiting Kernel Races through Taming Thread Interleaving.eng.srt 44.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Hardware-Enforced Security With Hypervisors.eng.text 44.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure Password Managers and Military-Grade Encryption on Smartphones Oh Re.eng.tsv 44.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Weapons of Targeted Attack Modern Document Exploit Techniques - Sung-ting Tsai, Ming-Chieh Pan.eng.txt 44.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding TOCTTOU in the Windows Kernel Font Scaler Engine.eng.txt 44.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kornburst - Oracle rootkits 2.0.eng.txt 44.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Thomas Olofsson - Building a Blind IP Spoofed Portscanning Tool.eng.txt 44.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).eng.tsv 44.2 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Relationships Matter Reconstructing the Organizational and Social Structure of a Ransomware Gang.eng.srt 44.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Scala Security - Examining the Play and LiftWeb Frameworks.eng.text 44.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Weapons of Targeted Attack Modern Document Exploit Techniques - Sung-ting Tsai, Ming-Chieh Pan.eng.vtt 44.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Let's Play - Applanting.eng.srt 44.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Nightmare Behind The Cross Platform Mobile Apps Dream.eng.vtt 44.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/1000 Ways to Die in Mobile Oauth.eng.vtt 44.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard Clarke - Keynote National Strategy for Securing Cyberspace.eng.vtt 44.2 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Unveiling the Cracks in Virtualization, Mastering the Host System-VMware Workstation Escape.eng.srt 44.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Go Get My Vulnerabilities.eng.vtt 44.2 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Confusion Attacks Exploiting Hidden Semantic Ambiguity in Apache HTTP Server.eng.srt 44.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass.eng.tsv 44.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Japanese.eng.vtt 44.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/36 Views of Cyberspace.eng.tsv 44.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Aldora Louw - Notes on Domino.eng.srt 44.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Raggo - Steganography Steganalysis Cryptanalysis.eng.vtt 44.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluepilling the Xen Hypervisor - Joanna Rutkowska, Alexander Tereshkin.eng.vtt 44.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.eng.tsv 44.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking with WebSockets.eng.tsv 44.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Javascript Static Security Analysis Made Easy with JSPrime.eng.txt 44.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BinaryPig - Scalable Malware Analytics in Hadoop.eng.text 44.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/802.1x and Beyond.eng.srt 44.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Zen and the Art of Adversarial Machine Learning.eng.txt 44.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Long-Term Sessions - This Is Why We Can’t Have Nice Things - Steve Ocepek.eng.lrc 44.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/What the Fuzz.eng.text 44.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Relaying EMV Contactless Transactions Using Off-The-Self Android Devices.eng.tsv 44.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Capstone - Next Generation Disassembly Framework.eng.tsv 44.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.eng.txt 44.1 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Kernel Wars - Joel Eriksson.eng.lrc 44.1 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/A World-View of IP Spoofing in L4 Volumetric DoS Attacks - and a Call to Enable BCP38.eng.srt 44.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Joey - Advanced Windows NT and 2000 Security.eng.tsv 44.1 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/UNC1860 and The Temple of Oats - Iran's hidden hand in Middle Eastern Networks.eng.srt 44.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Bug Hunters Dump User Data. Can They Keep it Well They're Keeping it Anyway.eng.txt 44.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mactans - Injecting Malware Into iOS Devices via Malicious Chargers.eng.vtt 44.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Lotus Domino - Penetration Through the Controller.eng.vtt 44.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/caceres/SyscallProxying.html 44.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/MAC EFI Rootkits.eng.text 44.0 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/How Firefox Uses In - process Sandboxing To Protect Itself From Exploitable Libraries.eng.srt 44.0 KB
- Black Hat DC/Black Hat Federal 2006/Heuristic Vulnerability Analysis and Attack - Drew Copley.eng.srt 44.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/How To Break XML Encryption - Automatically.eng.srt 44.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Arthur Money - Closing Keynote.eng.tsv 44.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.eng.vtt 44.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Burdach - Physical memory Forensics.eng.srt 44.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Package Clone Detection.eng.vtt 44.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Trust, Security and Society.eng.text 44.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - Why We are Not Building a Defendable Internet.eng.tsv 44.0 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Hackproofing Lotus Domino - David Litchfield.eng.lrc 44.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grunwald - New Attack RFID Systems.eng.lrc 44.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/How to Detect that Your Domains are Being Abused for Phishing by Using DNS.eng.txt 44.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AMSI - How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It.eng.txt 44.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.eng.text 44.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Maynor - NX - How Well Does it Say NO.vtt 44.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Japanese.eng.lrc 44.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grossman - Hacking Intranet Outside.eng.text 44.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Mesh Stalkings-Penetration Testing with Small Networked Devices.eng.text 43.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Apple vs. Google Client Platforms.eng.text 43.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Adam Laurie - Martin Hurfurt - BlueSnarfing the Risk from Digital Pickpockets.eng.text 43.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The PWNIE Awards.eng.srt 43.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Segment Heap Internals.eng.txt 43.9 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Defending Your Network with Kerberos - Rooster & J.D. Glaser.eng.text 43.9 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Google Reimagined a Phone. It was Our Job to Red Team and Secure it.eng.srt 43.9 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeremiah-Grossman-Phishing-With-Super-Bait-English.eng.vtt 43.9 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Woke Hiring Won't Save Us An Actionable Approach to Diversity Hiring and Retention.eng.srt 43.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service.eng.vtt 43.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks.eng.txt 43.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jose Nazario - The Future of Network Worms.eng.tsv 43.9 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Trust Dies in Darkness Shedding Light on Samsung's TrustZone Keymaster Design.eng.srt 43.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Kelihos Botnet.eng.txt 43.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Dominique Brezinski - Building a Forensics Toolkit That Will Protect You from Evil Influences.eng.text 43.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pangu 9 Internals.eng.vtt 43.8 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/SMTP Information Gathering - Lluis Mora.eng.text 43.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Moritz - Proactive Defense Against Malicious Code.eng.txt 43.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-Japanese-with-english-questions.eng.lrc 43.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Columbus Rule and DHS.eng.tsv 43.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dwivedi - Shoot Nxt Persn says VLANS.eng.lrc 43.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Revealing Embedded Fingerprints - Deriving intelligence from USB stack interactions.eng.txt 43.8 KB
- Black Hat DC/Black Hat Federal 2006/Finding Digital Evidence in Physical Memory - Mariusz Burdach.eng.txt 43.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Adam Shostack - Towards a Taxonomy of Network Testing Techniques.eng.tsv 43.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fatal Fury on ESP32 Time to Release Hardware Exploits.eng.txt 43.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mike Pomraning - Injection Flaws.eng.srt 43.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Internet Explorer turns you personal computer into a public File Server - Jorge Luis Alvarez Medina.eng.txt 43.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Merloni and Carettoni - Blue Bag.eng.lrc 43.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Contemporary Automatic Program Analysis.eng.srt 43.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2021.eng.tsv 43.8 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/(Un)protected Broadcasts in Android 9 and 10.eng.srt 43.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to Build a SpyPhone.eng.tsv 43.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Javascript Static Security Analysis Made Easy with JSPrime.eng.lrc 43.8 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/DevSecOps - What, Why and How.eng.text 43.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Kelihos Botnet.eng.vtt 43.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Web Exploit Toolkits.eng.tsv 43.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways.eng.tsv 43.7 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Make My Day – Just Run a Web Scanner Countering The Faults of Typical Web Scanners Through Byte-code Injection - Toshinari Kureha & Dr. Brian Chess.eng.tsv 43.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Zen and the Art of Adversarial Machine Learning.eng.lrc 43.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.eng.text 43.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kornburst - Oracle rootkits 2.0.eng.srt 43.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Pin Pad Pwn.eng.text 43.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Can You Trust Me Now An Exploration Into the Mobile Threat Landscape.eng.text 43.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.eng.lrc 43.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Weapons of Targeted Attack Modern Document Exploit Techniques - Sung-ting Tsai, Ming-Chieh Pan.eng.lrc 43.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kornburst - Oracle rootkits 2.0.eng.lrc 43.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Thomas Olofsson - Building a Blind IP Spoofed Portscanning Tool.eng.lrc 43.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Bug Hunters Dump User Data. Can They Keep it Well They're Keeping it Anyway.eng.lrc 43.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bar-Mitzva Attack - Breaking SSL with 13-Year Old RC4 Weakness.eng.srt 43.7 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Finding Holes in Closed-source Software - Havlar Flake.eng.text 43.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Backdoors.eng.srt 43.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-eeye-Japanese.eng.srt 43.7 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha.tar.gz 43.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Adaptive Kernel Live Patching - An Open Collaborative Effort.eng.txt 43.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Keynote Blue to Red Traversing the Spectrum by Amanda Rousseau.eng.text 43.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Leviathan - Command and Control Communications on Planet Earth.eng.tsv 43.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/A Tale of One Software Bypass of Windows 8 Secure Boot.eng.tsv 43.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Keynote.eng.lrc 43.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/NIDS False Positive Reduction Through Anomaly Detection - Damiano Bolzoni.eng.txt 43.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Flash Sandboxes.eng.txt 43.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/New Exploit Technique In Java Deserialization Attack.eng.txt 43.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Router Exploitation - FX.eng.text 43.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/How to Detect that Your Domains are Being Abused for Phishing by Using DNS.eng.lrc 43.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Does Dropping USB Drives in Parking Lots and Other Places Really Work.eng.vtt 43.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AMSI - How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It.eng.lrc 43.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeffrey Hunker - Keynote Protecting Americas Cyberspace Version 1.0 of the National Plan.eng.srt 43.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Methods for Understanding Targeted Attacks with Office Documents - Bruce Dang.eng.srt 43.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SensePost - A tale of two Proxies.eng.tsv 43.6 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeremiah-Grossman-Phishing-With-Super-Bait-English.eng.txt 43.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding TOCTTOU in the Windows Kernel Font Scaler Engine.eng.lrc 43.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/David Litchfield-English.eng.srt 43.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Terry Losonky - National Information Assurance Partnership.eng.txt 43.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/JD Glaser - JDs Toolbox Fire and Ice.eng.srt 43.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AirBnBeware - Short Term Rentals Long Term Pwnage.eng.text 43.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Stop Sandboxing Exploitable Functions and Modules Using In-Kernel Machine Learning.eng.srt 43.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Segment Heap Internals.eng.lrc 43.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Moritz - Proactive Defense Against Malicious Code.eng.vtt 43.5 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/kRX - Comprehensive Kernel Protection Against Just-In-Time Code Reuse.eng.vtt 43.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Breaking Access Controls with Blekey.eng.text 43.5 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/E-Meet (or Emit) My Keystrokes How Benign Screen-sharing Meetings Could Leak Typing Behaviors.eng.vtt 43.5 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Bypassing ARM's Memory Tagging Extension with a Side-Channel Attack.eng.srt 43.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/GreatFET - Making GoodFET Great Again.eng.tsv 43.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Evading Deep Inspection for Fun and Shell.eng.srt 43.5 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Mind the Data Gap Privacy Challenges in Autonomous AI Agents.eng.srt 43.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dai Zovi - Hardware Virtualization.eng.text 43.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Ghost in the Wireless, iwlwifi Edition.eng.srt 43.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking the Corporare Mind.eng.text 43.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Breaking .NET Sandboxes.eng.tsv 43.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Rooting EVERY Android - From Extension to Exploitation.eng.srt 43.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Moritz - Proactive Defense Against Malicious Code.eng.lrc 43.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Intrusion Detection.eng.text 43.4 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Eternal War in XNU Kernel Objects.eng.srt 43.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SecSi Product Development.eng.srt 43.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Hal McConnell - Threats from Organized Crime and Terrorists.eng.tsv 43.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Litchfield - All New Oracle 0 - day Attacking and Defending Oracle.eng.txt 43.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fatal Fury on ESP32 Time to Release Hardware Exploits.eng.lrc 43.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Anti-Plugin - Don't Let Your App Play as an Android Plugin.eng.srt 43.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Internet Explorer turns you personal computer into a public File Server - Jorge Luis Alvarez Medina.eng.lrc 43.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Revealing Embedded Fingerprints - Deriving intelligence from USB stack interactions.eng.lrc 43.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Michael-Sutton-Adam-Green-The-Art-of-File-Format-Fuzzing-English.eng.text 43.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Subverting Apple Graphics - Practical Approaches to Remotely Gaining Root.eng.tsv 43.4 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems.eng.txt 43.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Decentralized Malware on The Blockchain.eng.text 43.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Exploiting USB IP in Linux.eng.srt 43.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Let s Get Physical - Breaking Home Security Systems and Bypassing Building Controls.eng.tsv 43.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Alexa, Hack My Server(less) Please.eng.txt 43.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/PWNIE AWARDS.eng.srt 43.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Brent Huston - Appliance Firewalls a detailed review.eng.text 43.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Null Sessions, MSRPC, and Windows 2000 - Todd Sabin.eng.tsv 43.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Peter Shipley and Tom Jackiewicz - Security Issues with Implementing and Deploying the LDAP Directory System.eng.text 43.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing.eng.text 43.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks.eng.lrc 43.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Unix Domain Socket A Hidden Door Leading to Privilege Escalation in the Android Ecosystem.eng.txt 43.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Web Exploit Toolkits.eng.vtt 43.3 KB
- Black Hat DC/Black Hat Federal 2006/Finding Digital Evidence in Physical Memory - Mariusz Burdach.eng.lrc 43.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Virtual Private Problems A Broken Dream - Loki.eng.tsv 43.3 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Indirect Prompt Injection Into LLMs Using Images and Sounds.eng.srt 43.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Johnny Long - Death of 1000 Cuts.eng.text 43.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Fried Apples - Jailbreak DIY.eng.vtt 43.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Franco - Case Studies Secure Dev IE7.eng.text 43.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Kelihos Botnet.eng.lrc 43.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/VoIP Wars - the Phreakers Awaken.eng.text 43.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices.eng.txt 43.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/AMF Testing.eng.text 43.3 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/The Other Side of Information Security - Wilco van Grinkel.eng.text 43.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hardening AWS Environments and Automating Incident Response for AWS Compromises.eng.text 43.3 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Voice Phishing Syndicates Unmasked An In-Depth Investigation and Exposure.eng.srt 43.3 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal.eng.vtt 43.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side..eng.tsv 43.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side._en.tsv 43.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Find Me in your Database.eng.srt 43.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exploiting Unpatched iOS Vulnerabilities for Fun and Profit.eng.srt 43.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel.eng.text 43.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Adaptive Kernel Live Patching - An Open Collaborative Effort.eng.lrc 43.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Brett Moore - Shoot the Messenger.eng.text 43.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/NIDS False Positive Reduction Through Anomaly Detection - Damiano Bolzoni.eng.lrc 43.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SAP, Credit Cards, and the Bird that Talks Too Much.eng.tsv 43.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hiding Behind Android Runtime (ART).eng.vtt 43.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Go Get My Vulnerabilities.eng.txt 43.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Flash Sandboxes.eng.lrc 43.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/New Exploit Technique In Java Deserialization Attack.eng.lrc 43.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet.eng.text 43.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/From Coordinated Disclosure to Cooperative Vulnerability When Dealing w - Critical Software Stacks.eng.text 43.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Attacking the Linux PRNG on Android.eng.tsv 43.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Smart Nest Thermostat - A Smart Spy in Your Home.eng.text 43.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/A Peek Under the Blue Coat.eng.text 43.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Out of Control - Demonstrating SCADA Device Exploitation.eng.vtt 43.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/APTs Go Teleworking The Rise of VPN Exploits.eng.srt 43.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Betting Against the House - Security and Stability When the Odds are Against You.eng.srt 43.2 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Design Pitfalls in Commercial Mini-Programs on Android and iOS.eng.srt 43.2 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Priest - Building the Business Case for Management for Increased Security.eng.tsv 43.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/VoIP Wars - Attack of the Cisco Phones.eng.text 43.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/NIDS False Positive Reduction Through Anomaly Detection - Damiano Bolzoni.eng.vtt 43.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Multiple Operation System Vurnarability.eng.text 43.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse Engineering Flash Memory for Fun and Benefit.eng.txt 43.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeremiah-Grossman-Phishing-With-Super-Bait-English.eng.lrc 43.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Kernel Pool Exploitation on Windows 7 - Tarjei Mandt.eng.vtt 43.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/I Know Where You've Been - Geo-Inference Attacks Via The Browser Cache.eng.srt 43.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Terry Losonky - National Information Assurance Partnership.eng.lrc 43.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Harnessing GPUs - Building Better Browser Based Botnets.eng.vtt 43.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Black-box Assessment of Pseudorandom Algorithms.eng.text 43.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Ret2page The Art of Exploiting Use - After - Free Vulnerabilities in the Dedicated Cache.eng.srt 43.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mission mPOSsible by Nils - Jon Butler.eng.vtt 43.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/No Such Thing as a Stupid Question Why Knowledge Shaming is Making Us Less Secure.eng.tsv 43.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mactans - Injecting Malware Into iOS Devices via Malicious Chargers.eng.tsv 43.1 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Diving into Spooler Discovering LPE and RCE Vulnerabilities in Windows Printer Driver.eng.srt 43.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CrowdSource - Open Source Crowd Trained Machine Learning Model for Malware Detection.eng.txt 43.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/DTM Components - Shadow Keys to the ICS Kingdom.eng.txt 43.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Pointers and Handlers - Alex Ionescu.eng.text 43.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Demystify AI Security Products With a Universal Pluggable XAI Translator.eng.srt 43.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Use-After-Use-After-Free - Exploit UAF by Generating Your Own.eng.srt 43.1 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/The Hole in Sandbox Escape Modern Web-Based App Sandbox From Site-Isolation Perspective.eng.srt 43.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/802.1x and Beyond.eng.tsv 43.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Mike Schiffmman - The Firewalk Tool.eng.text 43.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Abusing Web APIs Through Scripted Android Applications.eng.srt 43.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neat New & Ridiculous Flash Hacks - Mike Bailey.eng.tsv 43.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moyer - Defending BlackBox Web Apps.eng.txt 43.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process.eng.vtt 43.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking FIDO - Are Exploits in There.eng.txt 43.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/The Overlooked Attack Surface Diving into Windows Client Components for RCE Vulnerabilities.eng.srt 43.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/International Organized Crime and Terrorism - Hal Mcconnall.eng.srt 43.0 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems.eng.lrc 43.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Does Dropping USB Drives in Parking Lots and Other Places Really Work.eng.txt 43.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Hook, Line and Sinker Phishing Windows Hello for Business.eng.srt 43.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Alexa, Hack My Server(less) Please.eng.lrc 43.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/From Zero to Secure in One Minute.eng.text 43.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Break Out of The Truman Show - Active Detection and Escape of Dynamic Binary Instrumentation.eng.tsv 43.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Capturing 0Day Exploits With Perfectly Placed Hardware Traps.eng.text 43.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Rebecca Mercuri - Bev Harris - Managing Election Data The California Recall.eng.text 43.0 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/A New Attack Interface in Java Applications.eng.srt 43.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/I Know What You Saw Last Minute - The Chrome Browser Case.eng.srt 43.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Kevin Spett - Java Decompilation and Application Security.eng.txt 43.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Bruce Schneier - The Instrument and Death of Security.eng.srt 43.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Tim Newsham - Cracking WEP Keys.eng.tsv 43.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marcus Sachs - Building a Global Culture of Security(Luncheon Speaker).eng.tsv 43.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning.eng.tsv 43.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Internet Explorer turns you personal computer into a public File Server - Jorge Luis Alvarez Medina.eng.vtt 43.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The BEAST Wins Again - Why TLS Keeps Failing to Protect HTTP.eng.text 43.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse Engineering Flash Memory for Fun and Benefit.eng.vtt 42.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Advanced VBA Macros Attack & Defence.eng.vtt 42.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploiting Firefox.eng.text 42.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder.eng.tsv 42.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Butler - Exponential Growth Rootkit.eng.vtt 42.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Reflected File Download - A New Web Attack Vector.eng.txt 42.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Your Software IS NOT Vulnerable CSAF, VEX, and the Future of Advisories.eng.srt 42.9 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Will We Survive the Transitive Vulnerability Locusts.eng.srt 42.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/spoonm, scape - Beyond EIP.srt 42.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Go Get My Vulnerabilities.eng.lrc 42.9 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Honeypot That Can Bite - Reverse Penetration.eng.tsv 42.9 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Diving Into IE 10's Enhanced Protected Mode Sandbox by Mark Vincent Yason.eng.srt 42.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/USB - Undermining Security Barriers - Andy Davis.eng.tsv 42.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reflections on Trusting TrustZone.eng.vtt 42.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dan Kaminsky - the Black Ops of DNS.eng.text 42.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Litchfield - All New Oracle 0 - day Attacking and Defending Oracle.eng.lrc 42.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/End-to-end Analysis of Domain Generating Algorithm Malware Family.eng.text 42.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Cyber-Attacks & SAP systems - Is Our Business-Critical Infrastructure Expose.eng.text 42.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When the Cops Come A-Knocking - Handling Technical Assistance Demands from Law Enforcement.eng.text 42.8 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/0-days - u0026 Mitigations Roadways to Exploit and Secure Connected BMW Cars.eng.tsv 42.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/API s for improving Security.eng.txt 42.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Harnessing GPUs - Building Better Browser Based Botnets.eng.txt 42.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices.eng.lrc 42.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Heavy Metal That Poisoned the Droid.eng.text 42.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Botnets.eng.txt 42.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/With BIGDATA comes BIG responsibility - Practical exploiting of MDX injections.eng.srt 42.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cyberspace A Fragile Ecosystem - Robert Lentz.eng.tsv 42.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Unix Domain Socket A Hidden Door Leading to Privilege Escalation in the Android Ecosystem.eng.lrc 42.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.eng.vtt 42.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Out of Control - Demonstrating SCADA Device Exploitation.eng.txt 42.8 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal.eng.txt 42.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Psychotronica - Nitesh Dhanjani.eng.tsv 42.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Let's Play - Applanting.eng.txt 42.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluepilling the Xen Hypervisor - Joanna Rutkowska, Alexander Tereshkin.eng.tsv 42.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Drone Attacks on Industrial Wireless - A New Front in Cyber Security.eng.txt 42.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP Cookie Hijacking in the Wild - Security and Privacy Implications.eng.text 42.8 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Evans - Get - Rich - Money - BlackHat - way.jp.eng.text 42.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/KEYNOTE - Whitfield Diffie.eng.text 42.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/ARM Exploitation ROPmap - Long Le.eng.vtt 42.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/DTM Components - Shadow Keys to the ICS Kingdom.eng.lrc 42.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks.eng.vtt 42.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/ICSCorsair - How I Will PWN Your ERP Through 4-20 mA Current Loop.eng.vtt 42.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Security Testing Best Practiceson complex File Format Fuzzing - Qing Wang.eng.tsv 42.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hiding @ Depth - Exploring, Subverting, and Breaking NAND Flash Memory.eng.srt 42.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Cushman - MS Security fundamentals.eng.text 42.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.eng.srt 42.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/The Apple Sand Box - Dionysus Blazakis.eng.text 42.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bar-Mitzva Attack - Breaking SSL with 13-Year Old RC4 Weakness.eng.tsv 42.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking FIDO - Are Exploits in There.eng.lrc 42.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Does Dropping USB Drives in Parking Lots and Other Places Really Work.eng.lrc 42.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Tackling Privilege Escalation with Offense and Defense.eng.text 42.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Terry Losonky - National Information Assurance Partnership.eng.vtt 42.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ReCertifying Active Directory Certificate Services.eng.tsv 42.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bitcoin Transaction Malleability Theory in Practice.eng.tsv 42.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse Engineering Flash Memory for Fun and Benefit.eng.lrc 42.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Reflected File Download - A New Web Attack Vector.eng.lrc 42.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/CTX - Eliminating BREACH with Context Hiding.eng.srt 42.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hell on Earth - From Browser to System Compromise.eng.text 42.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Timing Attacks Have Never Been So Practical - Advanced Cross-Site Search Attacks.eng.text 42.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CrowdSource - Open Source Crowd Trained Machine Learning Model for Malware Detection.eng.srt 42.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Governments As Malware Authors - The Next Generation.eng.text 42.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CrowdSource - Open Source Crowd Trained Machine Learning Model for Malware Detection.eng.lrc 42.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/SADE Injecting Agents in to VM Guest OS - Matt Conover.eng.text 42.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/1000 Ways to Die in Mobile Oauth.eng.txt 42.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/No More 0-Days (or Code-Based Intrusion Detection by Korset) - Ohad Ben-Cohen.eng.text 42.6 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Auditing The Security of Applications - David Litchfield.eng.tsv 42.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hunting the Shadows - In-Depth Analysis of Escalated APT Attacks.eng.text 42.6 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Diving Into IE 10's Enhanced Protected Mode Sandbox by Mark Vincent Yason.eng.txt 42.6 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/DevSecOps What, Why and How.eng.vtt 42.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices.eng.vtt 42.6 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Paul Wouters - Deploying DNSSEC.eng.vtt 42.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crippling HTTPs With Unholy PAC.eng.tsv 42.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exposing Bootkits with BIOS Emulation.eng.tsv 42.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The UEFI Firmware Rootkits - Myths and Reality.eng.vtt 42.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unveiling the Underground World of Anti-Cheats.eng.tsv 42.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/dingledine-us-02.pdf 42.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/API s for improving Security.eng.srt 42.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with- API and Sysenter.eng.tsv 42.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/QMaster - Secure Implementations of ActiveX in a Corporate Environment.eng.srt 42.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Exploiting Curiosity and Context - How to Make People Click on a Dangerous Link.eng.srt 42.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Reverse Engineering Flash Exploits.eng.txt 42.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Internet Plumbing Gor Security Professionals The State Of BGP Security.eng.srt 42.5 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Event - based Fuzzing, Patch - based Research, and Comment Police Finding Bugs Through a Bug.eng.srt 42.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Zen and the Art of Adversarial Machine Learning.eng.vtt 42.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Segment Heap Internals.eng.vtt 42.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Web Application Firewalls - Analysis of Detection Logic.eng.srt 42.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Unmanned Aerial Vehicles - Exploit Automation with the Metasploit Framework - James Lee.eng.text 42.5 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Harnessing GPUs - Building Better Browser Based Botnets.eng.lrc 42.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Barnaby Jack - Kernel Exploitation.eng.vtt 42.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Devils Are in the File Descriptors It Is Time To Catch Them All.eng.srt 42.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Towards a Holistic Approach in Building Intelligence to Fight Crimeware.eng.text 42.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass the Hash and other credential theft and reuse - Preventing Lateral Movement.eng.tsv 42.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Understanding HL7 2.X Standards, Pen Testing, and Defending HL7 2.X Messages.eng.txt 42.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moyer - Defending BlackBox Web Apps.eng.lrc 42.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Out of Control - Demonstrating SCADA Device Exploitation.eng.lrc 42.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is That You, Baby, or Just a Bridge in the Sky.eng.tsv 42.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unraveling Unicode - Chris Weber.eng.tsv 42.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Ofir Arkin - Bypassing NAC Systems.eng.text 42.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Drone Attacks on Industrial Wireless - A New Front in Cyber Security.eng.lrc 42.4 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Straight Outta VMware Modern Exploitation of the SVGA Device for Guest-to-Host Escapes.eng.vtt 42.4 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Intel VISA Through the Rabbit Hole.eng.vtt 42.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal.eng.lrc 42.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Inconvenient Trust - User Attitudes Toward Security and Usability Tradeoffs.eng.srt 42.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The State of Incident Response by Bruce Schneier.eng.text 42.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Playing in a Satellite Environment 1.2 - Leonardo Nve Egea.eng.vtt 42.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/ePassports Reloaded - Jeroen van Beek.eng.tsv 42.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zambon and Bolzoni - NIDS False Pos.eng.srt 42.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang.srt 42.4 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/CodeQL Also a Powerful Binary Analysis Engine.eng.srt 42.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Fried Apples - Jailbreak DIY.eng.txt 42.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani-tagged.eng.tsv 42.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Detecting & Preventing the Xen Hypervisor Subversions - Joanna Rutkowska, Rafal Wojtczuk.eng.text 42.4 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/AEPIC Leak Architecturally Leaking Uninitialized Data from the Microarchitecture.eng.srt 42.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Reverse Engineering and Exploiting Builds in the Cloud.eng.text 42.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Kevin Spett - Java Decompilation and Application Security.eng.lrc 42.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AMSI & Bypass Review of Known AMSI Bypass Techniques and Introducing a New One.eng.srt 42.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Robert Morris - The Future of the History.eng.srt 42.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/API s for improving Security.eng.lrc 42.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Adam Shostack - Will People Ever Pay for Privacy.eng.text 42.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Interview with Neal Stephenson.eng.text 42.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding IMSI Privacy.eng.text 42.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Software Exploitation.eng.text 42.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Augmenting Static Analysis Using Pintool - Ablation.eng.srt 42.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/1000 Ways to Die in Mobile Oauth.eng.lrc 42.3 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems.eng.vtt 42.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Halvar Flake - Need New Tools.eng.text 42.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Reverse Engineering Flash Exploits.eng.vtt 42.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Panel - Meet the Feds.eng.text 42.3 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Google Reimagined a Phone. It was Our Job to Red Team and Secure it.eng.tsv 42.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Cyber Judo - Offensive Cyber Defense.eng.txt 42.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Oracle 11g (or has Oracle's security posture really changed - David Litchfield.eng.tsv 42.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Mobile Malware Madness, and How To Cap the Mad Hatters - Neil Daswani.eng.text 42.2 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/The B-MAD Approach to Threat Modeling.eng.srt 42.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Job De Haas - Getting Rooted and Never Knowing It.eng.tsv 42.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX.eng.tsv 42.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pangu 9 Internals.eng.tsv 42.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Nightmare Behind The Cross Platform Mobile Apps Dream.eng.tsv 42.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Botnets.eng.lrc 42.2 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Diving Into IE 10's Enhanced Protected Mode Sandbox by Mark Vincent Yason.eng.lrc 42.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Malware Classification With Machine Learning Enhanced by Windows Kernel Emulation.eng.srt 42.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Let's Play - Applanting.eng.lrc 42.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Gen PlugX ShadowPad A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT.eng.srt 42.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Breaking Samsung's Root of Trust Exploiting Samsung S10 Secure Boot.eng.srt 42.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Reverse Engineering Flash Exploits.eng.lrc 42.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Gyrophone - Eavesdropping Using a Gyroscope.eng.tsv 42.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Hypervisor IPS based on Hardware Assisted Virtualization Technology - Junichi Murakami.eng.srt 42.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hack Microsoft Using Microsoft Signed Binaries.eng.txt 42.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Data Mining a Mountain of Zero Day Vulnerabilities.eng.text 42.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hacking Next-Gen ATMs - From Capture to Cashout.eng.tsv 42.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Litchfield - All New 0 Day.eng.txt 42.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/James Foster - Managing Hackers.eng.txt 42.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/To dock or not to dock, that is the question.eng.tsv 42.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Flash Sandboxes.eng.vtt 42.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/International Organized Crime and Terrorism - Hal Mcconnall.eng.txt 42.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Revealing Embedded Fingerprints - Deriving intelligence from USB stack interactions.eng.vtt 42.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/w00w00-heap.html 42.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Cyber Judo - Offensive Cyber Defense.eng.vtt 42.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.eng.text 42.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Understanding HL7 2.X Standards, Pen Testing, and Defending HL7 2.X Messages.eng.lrc 42.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory.eng.srt 42.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory_en.srt 42.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Package Clone Detection.eng.tsv 42.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote Fireside Chat with U.S. National Cyber Director Chris Inglis.eng.text 42.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Popping Shell on A(ndroid)RM Devices - Itzhak (Zuk) Avraham.eng.tsv 42.0 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover.eng.srt 42.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Oracle Data Redaction is Broken by David Litchfield.eng.text 42.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobitex Network Security - olleB.eng.txt 42.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.jp.eng.text 42.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jose Nazario - The Future of Network Worms.eng.vtt 42.0 KB
- Black Hat DC/Black Hat Federal 2006/Finding Digital Evidence in Physical Memory - Mariusz Burdach.eng.vtt 42.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Clocking On.eng.srt 42.0 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Privacy Detective Sniffing Out Your Data Leaks for Android.eng.srt 42.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Fried Apples - Jailbreak DIY.eng.lrc 42.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Litchfield - Variations in Exploit Methods between Linux and Windows.eng.vtt 42.0 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild.eng.srt 42.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Playing in a Satellite Environment 1.2 - Leonardo Nve Egea.eng.txt 42.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Himanshu Dwivedi - Insecure IP Storage Networks.eng.txt 42.0 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Finding Bugs Compiler Knows but Doesn't Tell You-Dissecting Undefined Behavior Optimizations in LLVM.eng.srt 42.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reflections on Trusting TrustZone.eng.tsv 42.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/ARM Exploitation ROPmap - Long Le.eng.txt 42.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Fireside Chat - Debora Plunkett and Jeff Moss.eng.text 42.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Lights Off The Darkness of the Smart Meters.eng.text 42.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard George - Views On The Future Direction of Information Assurance.eng.tsv 42.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Unix Domain Socket A Hidden Door Leading to Privilege Escalation in the Android Ecosystem.eng.srt 42.0 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Paul Wouters - Deploying DNSSEC.eng.tsv 42.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Automated Detection of Firefox Extension Reuse Vulnerabilities.eng.text 41.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Breeding Sandworms - How To Fuzz Your Way Out of Adobe Reader s Sandbox.eng.txt 41.9 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bilby - Defeating Win Forensic - Japanese.eng.txt 41.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Advanced VBA Macros Attack & Defence.eng.txt 41.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking, Surveilling, and Deceiving victims on Smart TV.eng.vtt 41.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Keynote - Gen. Alexander.eng.tsv 41.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Welcome & Introduction to Black Hat USA 2013.eng.tsv 41.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/All Your Calls Are Still Belong to Us - How We Compromised the Cisco VoIP Cr.eng.tsv 41.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Cyber Judo - Offensive Cyber Defense.eng.lrc 41.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mandy Andress - Wireless LAN Security.eng.txt 41.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.eng.text 41.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Connection String Attack - Chema Alonso & Palako.eng.text 41.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Worth - Cryptographic Port Knocking.eng.tsv 41.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Stegospolit - Exploit Delivery With Steganography and Polyglots.eng.text 41.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Keynote.eng.srt 41.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/HTTP Desync Attacks Request Smuggling Reborn.eng.text 41.8 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Chinese APT A Master of Exploiting Edge Devices.eng.srt 41.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Authenticator Leakage Through Backup Channels on Android.eng.srt 41.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Black Hat USA 2004 - David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.tsv 41.8 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/WIFI-Important Remote Attack Surface Threat is Expanding.eng.srt 41.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Blended Web and Database Attacks on Real-Time, In-Memory Platforms.eng.text 41.8 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Distributing The Reconstruction Of High Level Intermediate Representation.eng.srt 41.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Complexity in Computer Security - a Risky Business - Jeff Moss, Ian Angell.eng.text 41.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HTTP 2 & Quic - Teaching Good Protocols to Do Bad Things.eng.text 41.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hack Microsoft Using Microsoft Signed Binaries.eng.lrc 41.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert J Hansen, Meredith L Patterson - Stopping Injection.text 41.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Dissecting CSRF Attacks and Countermeasures.eng.text 41.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Palante - Top 25 Overlooked Security Configuration on Your Switches and Routers.eng.tsv 41.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Trust in Apple's Secret Garden Exploring & Reversing Apple's Continuity Protocol.eng.vtt 41.8 KB
- Black Hat DC/Black Hat Federal 2006/Nematodes - Dave Aitel.eng.text 41.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Power of Data-Oriented Attacks.eng.tsv 41.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Trust in Apple's Secret Garden Exploring & Reversing Apple's Continuity Protocol.eng.txt 41.7 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Software Virtualization Based Rootkits - Sun Bing.eng.txt 41.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Cyber Effects Prediction - Shane Powell.eng.srt 41.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Android FakeID Vulnerability Walkthrough.eng.srt 41.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Gen PlugX ShadowPad A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT.eng.tsv 41.7 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/JD Glaser - JDs Toolbox Fire and Ice.eng.tsv 41.7 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Ops It is JTAG's Fault Journey to Unlocking Automotive Grade IC.eng.srt 41.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Aldora Louw - Notes on Domino.eng.txt 41.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Prevalent Characteristics in Modern Malware.eng.text 41.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/3G 4G Intranet Scanning and its Application on the WormHole Vulnerability.eng.srt 41.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/ICSCorsair - How I Will PWN Your ERP Through 4-20 mA Current Loop.eng.txt 41.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/APTs Way - Evading Your EBNIDS.eng.vtt 41.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/OptiSig - Semantic Signature for Metamorphic Malware.eng.tsv 41.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Litchfield - All New 0 Day.eng.lrc 41.7 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Design Flaws and Deployment Chaos in Cloud - based IoT Access Control Policies.eng.srt 41.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/USB - Undermining Security Barriers - Andy Davis.eng.vtt 41.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobitex Network Security - olleB.eng.lrc 41.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Evasion of High-End IDPS Devices at the IPv6 Era.eng.text 41.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Floating Car Data from Smartphones.eng.srt 41.6 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/RFIDIOts - Practical RFID hacking (without soldering irons) - Adam Laurie.eng.tsv 41.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/A Crushing Blow at the Heart of SAP’s J2EE Engine - Alexander Polyakov.eng.vtt 41.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.eng.txt 41.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Practical Attacks Against Attribute based Encryption.eng.srt 41.6 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/International Organized Crime and Terrorism - Hal Mcconnall.eng.lrc 41.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Litchfield - All New 0 Day.eng.vtt 41.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Moniz - XSSploitation - Japanese.eng.txt 41.6 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration (2).eng.srt 41.6 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration.eng.srt 41.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/ARM Exploitation ROPmap - Long Le.eng.lrc 41.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Hisamichi-Okamura-Cybercrime-Treaty-Japanese.eng.tsv 41.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Analyzing SPDY Getting to Know the New Web Protocol - Thomas Roth.eng.tsv 41.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobitex Network Security - olleB.eng.vtt 41.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/IVR Security- Internal Network Attack via Phone Lines.eng.tsv 41.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Attacking IPv6 Implementation Using Fragmentation.eng.text 41.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Advanced VBA Macros Attack & Defence.eng.lrc 41.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Understanding The Attack Surface & Attack Resilience Of Project Spartan.eng.srt 41.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - The Seven Axioms of Security.eng.text 41.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/James Foster - Managing Hackers.eng.lrc 41.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Geers - Cyberspace - Warfare.jp.eng.text 41.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-granick.pdf 41.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Padgett Peterson - Overlooked Local Attack Techniques.eng.text 41.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Remote Memory-Deduplication Attacks.eng.txt 41.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Tatum - Managing the External Environment.eng.text 41.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Michael Sutton, Adam Greene - Art Of File Format.text 41.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf.eng.srt 41.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Himanshu Dwivedi - Insecure IP Storage Networks.eng.lrc 41.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Teresa Lunt - Taxonomy of Intrusion Detection Systems.eng.text 41.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grunwald - New Attack RFID Systems.eng.vtt 41.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chad R Skipper - Polymorphism and Intrusion Detection Systems.eng.srt 41.5 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 1-2.eng.text 41.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Rooting EVERY Android - From Extension to Exploitation.eng.txt 41.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/knight/draft-knight-ppvpn-ipsec-dynrou 41.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mandy Andress - Wireless LAN Security.eng.lrc 41.4 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Crash & Pay How To Own And Clone Contactless Payment Devices.eng.srt 41.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Auger and Sima - 0day subscriptions.eng.text 41.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Stale pointers are the new black - Vincenzo Iozzo, Giovanni Gola.eng.text 41.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/VirtuallySecure - Oded Horovitz, Tal Garfinkel.eng.text 41.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Web Application Security -Jeremiah Grossman, Bill Pennington.eng.text 41.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Find Me in your Database.eng.txt 41.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Nmap Scanning the Internet - Fyodor Vaskovich.eng.tsv 41.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Trust in Apple's Secret Garden Exploring & Reversing Apple's Continuity Protocol.eng.lrc 41.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Timothy Mullen - Grabbing User Credentials via W2k ODBC Libraries.eng.txt 41.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Captain Hook - Pirating AVS to Bypass Exploit Mitigations.eng.srt 41.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Witchcraft Compiler Collection - Towards Self Aware Computer Programs.eng.tsv 41.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Ejovi-Nuwere-The-Art-of-SIP-Fuzzing-and-Vulnerabilities-Found-in-VoIP-English.eng.srt 41.4 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-eeye-Japanese.eng.txt 41.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Playing in a Satellite Environment 1.2 - Leonardo Nve Egea.eng.lrc 41.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.eng.tsv 41.4 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/The Evil of Spy Camera.eng.srt 41.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Saving Cyberspace by Jason Healey.eng.text 41.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Software Virtualization Based Rootkits - Sun Bing.eng.lrc 41.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Exploiting Network Surveillance Cameras Like a Hollywood Hacker.eng.txt 41.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/ICSCorsair - How I Will PWN Your ERP Through 4-20 mA Current Loop.eng.lrc 41.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/VOIP Wars - Destroying Jar Jar Lync.eng.text 41.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Marco Valleri and Alberto Ornaghi - Man In The Middle Attacks.eng.txt 41.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Mobile Network Hacking, IP Edition.eng.tsv 41.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Aldora Louw - Notes on Domino.eng.lrc 41.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Cracking the 5G Fortress Peering Into 5G's Vulnerability Abyss.eng.srt 41.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Next Generation Mobile Rootkits.eng.srt 41.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Advanced Heap Manipulation in Windows 8.eng.srt 41.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Breeding Sandworms - How To Fuzz Your Way Out of Adobe Reader s Sandbox.eng.lrc 41.3 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Back to the Roots Finding the Origin of CSP Security Bugs.eng.srt 41.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT.eng.tsv 41.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Iron Chef Fuzzing Challenge - 2-2 - Jacob West, Charlie Miller, Geoff Morrison, Jacob Honoroff, Sean Fay, Brian Chess.eng.text 41.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Reversing a Japanese Wireless SD Card - From Zero to Code Execution.eng.text 41.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools.eng.text 41.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Saumil Shah - Defeating Automated Web Assessment Tools.eng.text 41.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Evasion of Web Application.eng.text 41.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Ofir Arkin - Introducing X Playing Tricks with ICMP.eng.text 41.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Authenticator Leakage Through Backup Channels on Android.eng.tsv 41.3 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Mem2Img Memory-Resident Malware Detection via Convolution Neural Network.eng.srt 41.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Phillip Hallam - Baker - Phishing - commiting Fraud in Public.eng.text 41.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Sutton&Greene - The Art Of File Format Fuzz.eng.text 41.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The UEFI Firmware Rootkits - Myths and Reality.eng.tsv 41.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass.eng.vtt 41.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Stealthily Access Your Android Phones Bypass the Bluetooth Authentication.eng.srt 41.2 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bilby - Defeating Win Forensic - Japanese.eng.lrc 41.2 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Intel VISA Through the Rabbit Hole.eng.txt 41.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Assessing And Exploiting BigNum Vulnerabilities.eng.srt 41.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/I Know Your Filtering Policy Better than You Do.eng.text 41.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces.eng.text 41.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Manna from Heaven - Improving the State of Wireless Rogue AP Attacks.eng.text 41.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Software Virtualization Based Rootkits - Sun Bing.eng.vtt 41.2 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jeff Jonas - Non Obvious Relationship Awareness.eng.tsv 41.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/MoRE Shadow Walker - The Progression of TLB-Splitting on x86.eng.text 41.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.eng.lrc 41.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Side-Channel Timing Attacks on MSP430 Microcontroller Firmware - Travis Goodspeed.eng.txt 41.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Meet the Owner of a Real Hacked Company - Forensic Analysis - Mark Shelhart.eng.tsv 41.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Booting the iOS Kernel to an Interactive Bash Shell on QEMU.eng.tsv 41.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zambon and Bolzoni - NIDS False Pos.eng.txt 41.1 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/I Know You Want Me - Unplugging PlugX by Takahiro Haruyama & Hiroshi Suzuki.eng.txt 41.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bypassing Malware Detection Mechanisms in Online Banking.eng.srt 41.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/How To Break XML Encryption - Automatically.eng.txt 41.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using EMET to Disable EMET.eng.text 41.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.eng.txt 41.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Beyond Scanning - Automating Web Application Security Tests.eng.text 41.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Greetings from the '90s Exploiting the Design of Industrial Controllers in Modern Settings.eng.tsv 41.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Evading Deep Inspection for Fun and Shell.eng.txt 41.1 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Litchfield - All New Oracle 0 - day Attacking and Defending Oracle.eng.vtt 41.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Exploiting Network Surveillance Cameras Like a Hollywood Hacker.eng.srt 41.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/PeriScope An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.eng.srt 41.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Burdach - Physical memory Forensics.eng.txt 41.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Automated Malware Analysis.eng.text 41.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fact and Fiction - Defending Medical Device.eng.text 41.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Hidden RCE Surfaces That Control the Droids.eng.srt 41.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Kernel Pool Exploitation on Windows 7 - Tarjei Mandt.eng.tsv 41.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass-the-Hash 2 - The Admin's Revenge.eng.text 41.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Never Trust Your Inputs - Causing 'Catastrophic Physical Consequences' From The Sensor.eng.tsv 41.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Exploring Yosemite - Abusing Mac OS X 10.10.eng.tsv 41.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Rooting EVERY Android - From Extension to Exploitation.eng.lrc 41.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Timothy Mullen - Grabbing User Credentials via W2k ODBC Libraries.eng.lrc 41.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building Trust & Enabling Innovation for Voice Enabled IoT.eng.srt 41.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/PLC-Blaster - A Worm Living Solely in the PLC.eng.srt 41.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-Japanese-with-english-questions.eng.srt 41.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer - 1-2 - Eric Filiol.eng.tsv 41.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities.eng.srt 41.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neat New & Ridiculous Flash Hacks - Mike Bailey.eng.vtt 41.0 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bohm - Taming Bugs - English.eng.text 41.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Make My Day – Just Run a Web Scanner Countering The Faults of Typical Web Scanners Through Byte-code Injection - Toshinari Kureha & Dr. Brian Chess.eng.srt 41.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Web Application Firewalls - Analysis of Detection Logic.eng.txt 41.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Remote Memory-Deduplication Attacks.eng.lrc 41.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques.eng.text 41.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Demystifying the Secure Enclave Processor.eng.text 41.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1 2).eng.vtt 41.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Smashing the Font Scaler Engine in Windows Kernel.eng.srt 41.0 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/PageJack A Powerful Exploit Technique With Page-Level UAF.eng.srt 40.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Sotirov - HotPatching3rd Party Patch.eng.text 40.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.eng.vtt 40.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/IVR Security- Internal Network Attack via Phone Lines.eng.vtt 40.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/How to Break PDF Encryption.eng.tsv 40.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Find Me in your Database.eng.lrc 40.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency.eng.text 40.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/David Litchfield-English.eng.txt 40.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.eng.tsv 40.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Zero - The Funniest Number in Cryptography.eng.srt 40.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Exploiting Network Surveillance Cameras Like a Hollywood Hacker.eng.lrc 40.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/When Governments Attack - State Sponsored Malware Attacks Against Activists Lawyers and Journalists.eng.text 40.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Account Jumping Post Infection Persistency & Lateral Movement in AWS.eng.srt 40.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1 2).eng.txt 40.9 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/I Know You Want Me - Unplugging PlugX by Takahiro Haruyama & Hiroshi Suzuki.eng.vtt 40.9 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/On Trust Stories from the Front Lines.eng.srt 40.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BlackberryOS 10 From a Security Perspective.eng.vtt 40.9 KB
- Black Hat DC/Black Hat Federal 2006/Heuristic Vulnerability Analysis and Attack - Drew Copley.eng.txt 40.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Moniz - XSSploitation - Japanese.eng.lrc 40.8 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Marco Valleri and Alberto Ornaghi - Man In The Middle Attacks.eng.lrc 40.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Lessons From Defending The Indefensible.eng.srt 40.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Side-Channel Timing Attacks on MSP430 Microcontroller Firmware - Travis Goodspeed.eng.lrc 40.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Man in the Binder - He Who Controls IPC, Controls the Droid.eng.vtt 40.8 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Intel VISA Through the Rabbit Hole.eng.lrc 40.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits.eng.text 40.8 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Hacking a Capsule Hotel - Ghost in the Bedrooms.eng.srt 40.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bringing Software Defined Radio to the Penetration Testing Community.eng.srt 40.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Thomas Olofsson - Building a Blind IP Spoofed Portscanning Tool.eng.vtt 40.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 2.eng.vtt 40.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-eeye-Japanese.eng.lrc 40.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Bypassing Secure Boot Using Fault Injection.eng.text 40.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jeff Nathan and Kevin Depeugh - Layer 2 Attacks.eng.srt 40.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SATCOM Terminals - Hacking by Air, Sea, and Land by Ruben Santamarta.eng.srt 40.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zambon and Bolzoni - NIDS False Pos.eng.lrc 40.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Playing in the Reader X Sandbox - Paul Sabanal, Mark Yason.eng.srt 40.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/A Perfect CRIME Only TIME Will Tell.eng.srt 40.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The Devil Does Not Exist - The Role of Deception in Cyber.eng.text 40.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Your Scripts In My Page - What Could Possibly Go Wrong.eng.txt 40.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.eng.lrc 40.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Android FakeID Vulnerability Walkthrough.eng.txt 40.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/rootkit-backdoor/infecting-lkm.html 40.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AVLeak - Fingerprinting Antivirus Emulators for Advanced Malware Evasion.eng.vtt 40.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Viral Infections in Cisco iOS - Ariel Futoransky.eng.text 40.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Playing in the Reader X Sandbox - Paul Sabanal, Mark Yason.eng.tsv 40.7 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Vivisection of an Exploit Development Process - David Aitel.eng.text 40.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.eng.tsv 40.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SecSi Product Development.eng.txt 40.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Intra-Process Memory Protection for Applications on ARM and X86 - Leveraging the ELF ABI.eng.text 40.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Universal DDoS Mitigation Bypass.eng.tsv 40.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Virtual Battlefield in 2022 Russia Ukraine War & Its Policy Implications.eng.vtt 40.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Staying Persistent In Software Defined Networks.eng.srt 40.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/How To Break XML Encryption - Automatically.eng.lrc 40.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/James Bamford - Researching Secrets Part II.eng.text 40.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/iPhone Privacy - Nicolas Seriot.eng.text 40.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Burdach - Physical memory Forensics.eng.lrc 40.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Evading Deep Inspection for Fun and Shell.eng.lrc 40.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Welcome & Introduction to Black Hat USA 2011 Jeff Moss, Keynote Speaker Cofer Black.eng.text 40.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Hidden RCE Surfaces That Control the Droids.eng.txt 40.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.eng.text 40.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Abusing Bleeding Edge Web Standards for Appsec Glory.eng.text 40.6 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/I Know You Want Me - Unplugging PlugX by Takahiro Haruyama & Hiroshi Suzuki.eng.lrc 40.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure in 2010 Broken in 2011.eng.text 40.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Web Application Firewalls - Analysis of Detection Logic.eng.lrc 40.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jim Litchko - Total BS Security business - based systems security.eng.text 40.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.eng.txt 40.6 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Eliminating Triage Intermediaries for Zero - day Exploits Using a Decentralised Payout Protocol.eng.srt 40.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Raggo - Steganography Steganalysis Cryptanalysis.eng.tsv 40.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.eng.txt 40.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hands Off and Putting SLAB SLUB Feng Shui in a Blackbox.eng.vtt 40.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE.eng.srt 40.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An AI Approach to Malware Similarity Analysis - Mapping the Malware Genome With a Deep Neural Network.eng.srt 40.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Cisco IOS Shellcodes Backdoors - Gyan Chawdhary, Varun Uppal.eng.text 40.6 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Emerging Frontiers Insights from the Black Hat Asia Review Board.eng.tsv 40.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Jamie Butler - Greg Hoglund - VICE Catch the Hookers.eng.text 40.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Remote Web Application Dissassembly with ODBC Error Messages - David Litchfield.eng.tsv 40.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hands Off and Putting SLAB SLUB Feng Shui in a Blackbox.eng.txt 40.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/802.1x and Beyond.eng.vtt 40.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mifare - Little Security, Despite Obscurity - Karsten Nohl.eng.text 40.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Virtualization Under Attack Breaking Out of KVM - Nelson Elhage.eng.text 40.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/David Litchfield-English.eng.lrc 40.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Microsoft Kerberos - Sorry You Guys Don't Get It.eng.tsv 40.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Google Reimagined a Phone. It was Our Job to Red Team and Secure it.eng.vtt 40.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BlackberryOS 10 From a Security Perspective.eng.tsv 40.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/(In)Security of Mobile Banking.eng.srt 40.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Anti-Plugin - Don't Let Your App Play as an Android Plugin.eng.txt 40.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.text 40.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mission mPOSsible by Nils - Jon Butler.eng.tsv 40.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Renaud Deraison - The Nessus Project Reducing the Costs of Vulnerability Assessment.eng.text 40.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Simmonds - The Jericho Challenge.tsv 40.5 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/LinkDoor A Hidden Attack Surface in the Android Netlink Kernel Modules.eng.srt 40.5 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them.eng.text 40.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Policy Implications of Faulty Cyber Risk Models and How to Fix Them_en.text 40.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Paging All Windows Geeks - Finding Evil in Windows 10 Compressed Memory.eng.text 40.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/I Can Hear You Now - Traffic Interception and Remote Mobile Phone Cloning.eng.text 40.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Joey - Advanced Windows NT and 2000 Security.eng.text 40.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mandy Andress - Wireless LAN Security.eng.vtt 40.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Brian Snow - We Need Assurance.eng.vtt 40.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/tram-hack.png 40.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/They Ought to Know Better - Exploiting Security Gateways via Their Web Inter.eng.tsv 40.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Aldora Louw - Notes on Domino.eng.vtt 40.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Scott Blake - Dog of War Attack Box Design.eng.tsv 40.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm.eng.srt 40.4 KB
- Black Hat DC/Black Hat Federal 2006/Heuristic Vulnerability Analysis and Attack - Drew Copley.eng.lrc 40.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Embedding a Human Centric Approach Into a Global Cyber Security Program.eng.tsv 40.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Androbugs Framework - An Android Application Security Vilnerability Scanner.eng.tsv 40.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeffrey Hunker - Keynote Protecting Americas Cyberspace Version 1.0 of the National Plan.eng.vtt 40.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdoor Investigation and Incident Response From Zero to Profit.eng.vtt 40.3 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Attacking the WebAssembly Compiler of WebKit.eng.srt 40.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter.eng.text 40.3 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 2-2 - Chris Hadnagy.eng.txt 40.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Ah Universal Android Rooting Is Back.eng.srt 40.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.eng.text 40.3 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH_EU_05-Oudot.rar 40.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TLS - SECRETS.eng.text 40.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Leak a 100-Million-Node Social Graph in Just One Week.eng.srt 40.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Introducing Ring -3 Rootkits - Alexander Tereshkin & Rafal Wojtczuk.eng.text 40.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Memory Forensics Using Virtual Machine Introspection for Cloud Computing.eng.srt 40.3 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/DevSecOps What, Why and How.eng.txt 40.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/James Foster - Managing Hackers.eng.vtt 40.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process.eng.tsv 40.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/SMBv2 Sharing More Than Just Your Files.eng.srt 40.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hiding Behind Android Runtime (ART).eng.tsv 40.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Advanced Heap Manipulation in Windows 8.eng.txt 40.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Invisibility Purge - Unmasking the Dormant Events of Invisible Web Controls.eng.vtt 40.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MetaPhish pt. 1 - Val Smith, Colin Ames & David Kerb.eng.text 40.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Android FakeID Vulnerability Walkthrough.eng.lrc 40.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fight Against 1-Day Exploits - Jeongwook Oh.eng.vtt 40.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1 2).eng.lrc 40.3 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/A Survivor-Centric, Trauma-Informed Approach to Stalkerware.eng.srt 40.3 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Breach Detection At Scale With AWS Honey Tokens.eng.srt 40.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Java Exploitation.eng.text 40.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Hidden RCE Surfaces That Control the Droids.eng.lrc 40.2 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/kRX - Comprehensive Kernel Protection Against Just-In-Time Code Reuse.eng.tsv 40.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.eng.lrc 40.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SecSi Product Development.eng.lrc 40.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Exploiting Windows Hello for Business.eng.srt 40.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Analysis of the Attack Surface of Windows 10 Virtualization-Based Security.eng.text 40.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Robert Morris - The Future of the History.eng.txt 40.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Contemporary Automatic Program Analysis.eng.vtt 40.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Your Scripts In My Page - What Could Possibly Go Wrong.eng.lrc 40.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hands Off and Putting SLAB SLUB Feng Shui in a Blackbox.eng.lrc 40.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/(Long) Dragon Tails - Measuring Dependence on International Vulnerability Research.eng.srt 40.2 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Cross-Site Escape Pwning macOS Safari Sandbox the Unusual Way.eng.srt 40.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Canspy - A Platform for Auditing Can Devices.eng.tsv 40.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Burdach - Physical memory Forensics.eng.vtt 40.2 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Shadow-Box v2 The Practical and Omnipotent Sandbox for ARM.eng.srt 40.2 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/PMFault Voltage Fault Injection on Server Platforms Through the PMBus.eng.srt 40.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exploiting Unpatched iOS Vulnerabilities for Fun and Profit.eng.txt 40.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.eng.lrc 40.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Anti-Plugin - Don't Let Your App Play as an Android Plugin.eng.lrc 40.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fight Against 1-Day Exploits - Jeongwook Oh.eng.tsv 40.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/iOS Kernel.eng.text 40.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Ishiyama - FFR - EXCALOC.eng.text 40.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Virtual Battlefield in 2022 Russia Ukraine War & Its Policy Implications.eng.txt 40.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SATCOM Terminals - Hacking by Air, Sea, and Land by Ruben Santamarta.eng.txt 40.1 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/BBP - BSD Heap Smashing.eng.srt 40.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bar-Mitzva Attack - Breaking SSL with 13-Year Old RC4 Weakness.eng.vtt 40.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/A Sandbox Odyssey.eng.srt 40.1 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/IO in the Cyber Domain, Immunity Style - Sinan Eren & Dave Aitel.eng.text 40.1 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Dominique-Brezinsski-A-Paranoid-Perspective-of-an-Interpreted-Language-English.eng.text 40.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm.eng.txt 40.0 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Good Motive but Bad Design Pitfalls in MPU Usage in Embedded Systems in the Wild.eng.srt 40.0 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/JD Glaser - JDs Toolbox Fire and Ice.eng.vtt 40.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.eng.vtt 40.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Firmware Supply-Chain Security Is Broken Can We Fix It.eng.srt 40.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kevin Cardwell - Toolkits.eng.srt 40.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Anti-Plugin - Don't Let Your App Play as an Android Plugin.eng.vtt 40.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 2-2 - Chris Hadnagy.eng.lrc 40.0 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/DevSecOps What, Why and How.eng.lrc 40.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents.eng.text 40.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS.eng.text 40.0 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/To Flexibly Tame Kernel Execution With Onsite Analysis.eng.srt 40.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/How To Break XML Encryption - Automatically.eng.vtt 39.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device.eng.text 39.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Popping Shell on A(ndroid)RM Devices - Itzhak (Zuk) Avraham.eng.vtt 39.9 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Hackproofing Lotus Domino - David Litchfield.eng.tsv 39.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.eng.tsv 39.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/A Practical Attack Against VDI Solutions.eng.txt 39.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Paul Simmons - Welcome to Black Hat.eng.text 39.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Femtocells A Poisonous Needle in the Operator’s Hay Stack - Nico Golde, Kevin Redon.eng.text 39.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dominique Brezinski - Acting in Milliseconds - Why Defense Processes Need to Change.eng.json 39.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Protecting Data In-Use from Firmware and Physical Attacks.eng.txt 39.9 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/ZombieLoad Leaking Data on Intel CPUs.eng.srt 39.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Locknote Conclusions and Key Takeaways from Black Hat Asia 2022.eng.text 39.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Himanshu Dwivedi - Insecure IP Storage Networks.eng.vtt 39.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Physical Memory Forensics for Files and Cache - Jamie Butler, Justin Murdock.eng.text 39.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Bruce Schneier - Keynote, Following the Money Security Proxies and Agenda.eng.text 39.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Stoned Bootkit - Peter Kleissner.eng.text 39.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Exploiting Adobe Flash Player In The Era Of Control Flow Guard.eng.text 39.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/JD Glaser - Auditing NT Catching Greg Hoglund.eng.tsv 39.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Far Sides of Java Remote Protocols.eng.srt 39.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.eng.text 39.8 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Superman Powered by Kryptonite Turn the Adversarial Attack into Your Defense Weapon.eng.srt 39.8 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Diving Into IE 10's Enhanced Protected Mode Sandbox by Mark Vincent Yason.eng.vtt 39.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exploiting Unpatched iOS Vulnerabilities for Fun and Profit.eng.lrc 39.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Advanced Heap Manipulation in Windows 8.eng.lrc 39.8 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/See Like a Bat Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs.eng.srt 39.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding TOCTTOU in the Windows Kernel Font Scaler Engine.eng.srt 39.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.eng.tsv 39.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 2.eng.text 39.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exploiting Unpatched iOS Vulnerabilities for Fun and Profit.eng.vtt 39.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Robert Morris - The Future of the History.eng.lrc 39.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Reflected File Download - A New Web Attack Vector.eng.tsv 39.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Analyzing an Unknown RF Based Data Transmission (Aka Fun with 27Mhz Wireless Keyboards) - Max Moser.eng.text 39.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Energy Fraud and Orchestrated Blackouts - Issues with Wireless Metering Protocols.eng.vtt 39.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Virtual Battlefield in 2022 Russia Ukraine War & Its Policy Implications.eng.lrc 39.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/A New CVE 2015 0057 Exploit Technology.eng.srt 39.7 KB
- Black Hat DC/Black Hat Federal 2006/Heuristic Vulnerability Analysis and Attack - Drew Copley.eng.vtt 39.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Remote Memory-Deduplication Attacks.eng.vtt 39.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/SGX Secure Enclaves in Practice - Security and Crypto Review.eng.text 39.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Zen and the Art of Adversarial Machine Learning.eng.tsv 39.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Keynote #HackingDemocracy Will Our Societies Hold.eng.text 39.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Worst of the Best of the Best - Kevin Stadmeyer.eng.srt 39.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Evading Deep Inspection for Fun and Shell.eng.vtt 39.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Bug Hunters Dump User Data. Can They Keep it Well They're Keeping it Anyway.eng.tsv 39.7 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Straight Outta VMware Modern Exploitation of the SVGA Device for Guest-to-Host Escapes.eng.txt 39.7 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang.eng.txt 39.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Backdoors.eng.vtt 39.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Journey to Protect Points-of-Sale.eng.text 39.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Epidemiology of Software Vulnerabilities - A Study of Attack Surface Spread.eng.srt 39.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Javascript Static Security Analysis Made Easy with JSPrime.eng.tsv 39.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/spoonm, scape - Beyond EIP.vtt 39.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Philip Zimmermann - Keynote with Introduction by Jeff Moss.eng.text 39.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SATCOM Terminals - Hacking by Air, Sea, and Land by Ruben Santamarta.eng.lrc 39.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/How to Detect that Your Domains are Being Abused for Phishing by Using DNS.eng.tsv 39.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Rooting EVERY Android - From Extension to Exploitation.eng.vtt 39.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kornburst - Oracle rootkits 2.0.eng.vtt 39.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).eng.vtt 39.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alexander Kornbrust - Circumvent Oracle.tsv 39.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mike Pomraning - Injection Flaws.eng.txt 39.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/GS and ASLR in Windows Vista - Ollie Whitehouse.eng.text 39.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm.eng.lrc 39.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mike Pomraning - Injection Flaws.eng.vtt 39.6 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works.eng.srt 39.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AVLeak - Fingerprinting Antivirus Emulators for Advanced Malware Evasion.eng.txt 39.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Insane Detection of Insane Rootkits - Yuriy Bulygin.eng.text 39.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/David Litchfield-English.eng.vtt 39.6 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Election Security Securing America's Future.eng.srt 39.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Segment Heap Internals.eng.tsv 39.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fatal Fury on ESP32 Time to Release Hardware Exploits.eng.tsv 39.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/We Wait, Because We Know You - Inside the Ransomware Negotiation Economics.eng.srt 39.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AMSI - How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It.eng.tsv 39.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/I'm Not a Human - Breaking the Google Recaptcha.eng.srt 39.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Journey From JNDI LDAP Manipulation to Remote Code Execution Dream Land.eng.text 39.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Exploiting USB IP in Linux.eng.vtt 39.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Internet Explorer turns you personal computer into a public File Server - Jorge Luis Alvarez Medina.eng.tsv 39.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AMSI & Bypass Review of Known AMSI Bypass Techniques and Introducing a New One.eng.tsv 39.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Defensive Rewriting - Bryan Sullivan.eng.txt 39.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Botnets.eng.srt 39.5 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Straight Outta VMware Modern Exploitation of the SVGA Device for Guest-to-Host Escapes.eng.lrc 39.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Moritz - Proactive Defense Against Malicious Code.eng.tsv 39.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Richard Thieme - Defending the Information Web New Ways of Thinking About Security.eng.srt 39.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Web Application Firewalls - Analysis of Detection Logic.eng.vtt 39.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Betting Against the House - Security and Stability When the Odds are Against You.eng.vtt 39.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Protecting Data In-Use from Firmware and Physical Attacks.eng.lrc 39.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Fully Arbitrary 802.3 Packet Injection - Maximizing Ethernet Attack Surface.eng.text 39.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdoor Investigation and Incident Response From Zero to Profit.eng.txt 39.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Securing the Public, who is in Charge.eng.text 39.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Home Invasion v2.0 - Attacking Network-Controlled Hardware.eng.text 39.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/0-Knowledge Fuzzing - Vincenzo Iozzo.eng.text 39.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Use-After-Use-After-Free - Exploit UAF by Generating Your Own.eng.vtt 39.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang.eng.vtt 39.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/SQL Injections.eng.text 39.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/CTX - Eliminating BREACH with Context Hiding.eng.txt 39.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zambon and Bolzoni - NIDS False Pos.eng.vtt 39.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Let's Play - Applanting.eng.vtt 39.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Alternative Medicine The Malware Analyst’s Blue Pill - Paul Royal.eng.text 39.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Ultimate Dom Based XSS Detection Scanner on Cloud by Nera W. C. Liu & Albert Yu.eng.srt 39.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/PWNIE Awards at Black Hat USA 2014.eng.vtt 39.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Break the Wall from Bottom Automated Discovery of Protocol-Level Evasion Vulnerabilities.eng.srt 39.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/A Practical Attack Against VDI Solutions.eng.lrc 39.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Merloni and Carettoni - Blue Bag.eng.srt 39.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Flash Sandboxes.eng.tsv 39.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Revealing Embedded Fingerprints - Deriving intelligence from USB stack interactions.eng.tsv 39.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Probing The Mobile Operating Networks.eng.text 39.3 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/NIDS False Positive Reduction Through Anomaly Detection - Damiano Bolzoni.eng.tsv 39.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/New Exploit Technique In Java Deserialization Attack.eng.tsv 39.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Partial-Japanese.eng.txt 39.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/I Know Where You've Been - Geo-Inference Attacks Via The Browser Cache.eng.vtt 39.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Methods for Understanding Targeted Attacks with Office Documents - Bruce Dang.eng.vtt 39.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Adaptive Kernel Live Patching - An Open Collaborative Effort.eng.tsv 39.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Year in Flash.eng.text 39.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Decrypting DPAPI data - Jean-Michel Picod, Elie Bursztein.eng.text 39.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AVLeak - Fingerprinting Antivirus Emulators for Advanced Malware Evasion.eng.lrc 39.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/sOfT7 Revealing the Secrets of Siemens S7 PLCs.eng.srt 39.2 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Marco Valleri and Alberto Ornaghi - Man In The Middle Attacks.eng.srt 39.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Japanese.eng.tsv 39.2 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Nicolas Fischbach - DDoS Mitigation and Analysis at the Infrastructure Level.eng.text 39.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mike Pomraning - Injection Flaws.eng.lrc 39.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/A Crushing Blow at the Heart of SAP’s J2EE Engine - Alexander Polyakov.eng.tsv 39.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Creating a Spider Goat - Security with Intel CPU Transactional Memory Support.eng.text 39.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Using Zero to Attack Zero-Knowledge Proof (ZKP) PLONK.eng.srt 39.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hacking Video Conferencing Systems.eng.text 39.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Barnaby Jack - Kernel Exploitation.eng.tsv 39.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image0.png 39.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AMSI & Bypass Review of Known AMSI Bypass Techniques and Introducing a New One.eng.vtt 39.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/The Sandbox Roulette - Are You Ready For The Gamble.eng.text 39.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Inconvenient Trust - User Attitudes Toward Security and Usability Tradeoffs.eng.txt 39.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Find Me in your Database.eng.vtt 39.1 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/One Million ASUS Routers Under Control Exploiting ASUS DDNS to MITM Admin Credentials.eng.srt 39.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Horse Pill - A New Type of Linux Rootkit.eng.text 39.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/International Organized Crime and Terrorism - Hal Mcconnall.eng.vtt 39.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image4.png 39.1 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.eng.srt 39.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The PWNIE Awards.eng.vtt 39.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/CTX - Eliminating BREACH with Context Hiding.eng.vtt 39.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Securing Your Big Data Environment.eng.srt 39.1 KB
- Black Hat USA/Black Hat USA 2001/DEF CON 10 - dsc00004.jpg 39.1 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems.eng.tsv 39.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Cyber Effects Prediction - Shane Powell.eng.txt 39.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Understanding The Attack Surface & Attack Resilience Of Project Spartan.eng.tsv 39.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Cybersecurity Risk Assessment for Safety-Critical Systems.eng.srt 39.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdoor Investigation and Incident Response From Zero to Profit.eng.lrc 39.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Entrapment - Tricking Malware with Transparent, Scalable Malware Analysis.eng.text 39.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Next Generation Mobile Rootkits.eng.tsv 39.1 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Kernel Wars - Joel Eriksson.eng.tsv 39.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-English-Translated.eng.srt 39.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Alexa, Hack My Server(less) Please.eng.tsv 39.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hybrid Defense - How to Protect Yourself From Polymorphic 0-days.eng.srt 39.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Doors of Durin The Veiled Gate to Siemens S7 Silicon.eng.text 39.1 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/David-Maynor-Architecture-Flaws-in-Common-Security-Tools-English.eng.text 39.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Contemporary Automatic Program Analysis.eng.tsv 39.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Breaking Encryption in the Cloud - Cheap, GPU Accelerated Supercomputing for Everyone - Thomas Roth.eng.txt 39.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SecSi Product Development.eng.vtt 39.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/UART THOU MAD.eng.text 39.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/CTX - Eliminating BREACH with Context Hiding.eng.lrc 39.0 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang.eng.lrc 39.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/0i16743800.swf 39.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Inconvenient Trust - User Attitudes Toward Security and Usability Tradeoffs.eng.vtt 39.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Go Get My Vulnerabilities.eng.tsv 39.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE.eng.txt 39.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Biometric and Token-Based Access Control Systems - Zac Franken.eng.text 39.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-karnow.pdf 39.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Multiplayer Online Games Insecurity.eng.text 39.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Abusing Web APIs Through Scripted Android Applications.eng.vtt 39.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OptiROP - The Art of Hunting ROP Gadgets.eng.text 39.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CrowdSource - Open Source Crowd Trained Machine Learning Model for Malware Detection.eng.vtt 39.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/GDI Font Fuzzing in Windows Kernel For Fun.eng.srt 39.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Practical Attacks Against Attribute based Encryption.eng.txt 39.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Secure Password Managers and Military-Grade Encryption on Smartphones Oh Re.eng.text 39.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Stack-Smashing-Protection.html 39.0 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/The Key to Remote Vehicle Control Autonomous Driving Domain Controller.eng.srt 38.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Windows 8.eng.tsv 38.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 2.eng.txt 38.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Defensive Rewriting - Bryan Sullivan.eng.lrc 38.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeffrey Hunker - Keynote Protecting Americas Cyberspace Version 1.0 of the National Plan.eng.txt 38.9 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/A New Era of One-Click Attacks How to Break Install-Less Apps.eng.srt 38.9 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring.eng.srt 38.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Use-After-Use-After-Free - Exploit UAF by Generating Your Own.eng.txt 38.8 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Fuzzing and Breaking Security Functions of SIMATIC PLCs.eng.srt 38.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Predictable PRNG in the vulnerable Debian OpenSSL package, the What and the How - Luciano Bello and Maximiliano Bertacchini.eng.text 38.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Inconvenient Trust - User Attitudes Toward Security and Usability Tradeoffs.eng.lrc 38.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/JD Glaser - Auditing NT Catching Greg Hoglund.eng.srt 38.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Your Cloud Is In My Pocket - Matthieu Suiche.eng.srt 38.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Practical Attack Against VDI Solutions.eng.text 38.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking FIDO - Are Exploits in There.eng.tsv 38.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hackproofing Oracle Ebusiness Suite.eng.text 38.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/24 Techniques to Gather Threat Intel and Track Actors.eng.text 38.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Terry Losonky - National Information Assurance Partnership.eng.tsv 38.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Does Dropping USB Drives in Parking Lots and Other Places Really Work.eng.tsv 38.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/DTM Components - Shadow Keys to the ICS Kingdom.eng.tsv 38.8 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Is JavaScript Trustworthy in Cloud Computing.eng.srt 38.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Gen PlugX ShadowPad A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT.eng.vtt 38.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Clocking On.eng.txt 38.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Payment Points of Interaction (POI).eng.text 38.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.eng.vtt 38.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Attacking Intel Bios - Rafal Wojtczuk, Alexander Tereshkin.eng.text 38.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Cyber Effects Prediction - Shane Powell.eng.lrc 38.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/With BIGDATA comes BIG responsibility - Practical exploiting of MDX injections.eng.vtt 38.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Gadgets.eng.tsv 38.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Into the Core - In-Depth Exploration of Windows 10 IoT Core.eng.text 38.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SmartCard APDU Analysis - Ivan Buetler.eng.text 38.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Dominque Brezinski - Anatomy of Common Programming Security Issues.eng.srt 38.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Netscreen of the Dead - Graeme Neilson.eng.text 38.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Betting Against the House - Security and Stability When the Odds are Against You.eng.txt 38.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Protecting Data In-Use from Firmware and Physical Attacks.eng.srt 38.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Eugene Schultz - Security Issues with Configuring and Maintaining an IIS 4 Server.eng.text 38.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/API s for improving Security.eng.vtt 38.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hardware Backdooring.eng.text 38.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hiding @ Depth - Exploring, Subverting, and Breaking NAND Flash Memory.eng.vtt 38.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Exploiting Curiosity and Context - How to Make People Click on a Dangerous Link.eng.vtt 38.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/KeyNote - Dan - Kaminsky - End - of - Cache.jp.eng.text 38.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daniel VanBelleghem - Solving Network Mystries.eng.text 38.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE.eng.lrc 38.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Responsibility for the Harm and Risk of Security Security Flaws - Cassio Goldschmidt.eng.text 38.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exchanging Demands.eng.text 38.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Applied Machine Learning for Data Exfil and Other Fun Topics.eng.text 38.6 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Ejovi-Nuwere-The-Art-of-SIP-Fuzzing-and-Vulnerabilities-Found-in-VoIP-English.eng.txt 38.6 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/New Wine in an Old Bottle Attacking Chrome WebSQL.eng.srt 38.6 KB
- Black Hat USA/Black Hat USA 2006/presentations/Scholz/Scholz-src.zip 38.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Practical Attacks Against Attribute based Encryption.eng.lrc 38.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Rocking The Pocket Book Hacking Chemical Plant For Competition And Extortion.eng.text 38.6 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Oudot/wknock.tar.gz 38.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeffrey Hunker - Keynote Protecting Americas Cyberspace Version 1.0 of the National Plan.eng.lrc 38.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Padgett Peterson - Securing EMail Gateways from Attacks - What to do While Waiting for Vendors to Respond to the latest virus and worms.eng.text 38.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Nohl - Secret - Algorithms - from - Hardware.jp.eng.text 38.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Man in the Binder - He Who Controls IPC, Controls the Droid.eng.txt 38.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joukov-et_al-Kefence_files/xmalloc.png 38.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Understanding The Attack Surface & Attack Resilience Of Project Spartan.eng.vtt 38.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Brian Snow - We Need Assurance.eng.txt 38.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Clocking On.eng.vtt 38.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Harnessing GPUs - Building Better Browser Based Botnets.eng.tsv 38.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 2.eng.lrc 38.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Sniff Keystrokes with Lasers Voltmeters - Andrea Barisani, Daniele Bianco.eng.text 38.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Halvar Flake - Graph Based Binary Analysis.eng.text 38.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Backdoors.eng.txt 38.5 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-baker-WP.pdf 38.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Drone Attacks on Industrial Wireless - A New Front in Cyber Security.eng.tsv 38.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-eeye-Japanese.eng.vtt 38.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Out of Control - Demonstrating SCADA Device Exploitation.eng.tsv 38.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Jinx - Malware 2.0 - Itzik Kotler, Jonathan Rom.eng.text 38.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Use-After-Use-After-Free - Exploit UAF by Generating Your Own.eng.lrc 38.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/1000 Ways to Die in Mobile Oauth.eng.tsv 38.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Phil Zimmerman - My Next Big Project.text 38.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to grow a TREE (Taint-Enabled Reverse Engineering Environment) from a CBASS.eng.text 38.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Taking Kernel Hardening to the Next Level.eng.srt 38.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox.eng.srt 38.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Internet Scanning - Current State and Lessons Learned.eng.txt 38.5 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 2-2.eng.text 38.5 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory.eng.vtt 38.5 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory_en.vtt 38.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/SSO Wars The Token Menace.eng.srt 38.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jon David - Putting Intrusion Detection into Intrusion Detection Systems.eng.text 38.5 KB
- Black Hat DC/Black Hat Federal 2006/Finding Digital Evidence in Physical Memory - Mariusz Burdach.eng.tsv 38.5 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Breaking Encryption in the Cloud - Cheap, GPU Accelerated Supercomputing for Everyone - Thomas Roth.eng.lrc 38.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Mohney - Defend with Voice Analytics.eng.text 38.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Clocking On.eng.lrc 38.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Preventing Oh Shit Moments for 20 Euros or Less.eng.text 38.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/TCP Injection Attacks in the Wild - a Large Scale Study.eng.srt 38.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building a Product Security Incident Response Team - Learnings From the Hivemind.eng.srt 38.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Lotus Domino - Penetration Through the Controller.eng.tsv 38.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Authenticator Leakage Through Backup Channels on Android.eng.vtt 38.4 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeremiah-Grossman-Phishing-With-Super-Bait-English.eng.tsv 38.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/config/config.guess 38.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Exploiting USB IP in Linux.eng.txt 38.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Betting Against the House - Security and Stability When the Odds are Against You.eng.lrc 38.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Why Government Systems Fail at Security - Chey Cobb.eng.text 38.4 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Cyber Effects Prediction - Shane Powell.eng.vtt 38.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/I Know Where You've Been - Geo-Inference Attacks Via The Browser Cache.eng.txt 38.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tereshkin - Rootkits Attack Firewall.eng.srt 38.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory.eng.txt 38.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory_en.txt 38.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Base - Security (or lack thereof) and our Friends in Redmond.eng.text 38.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Rich Murphy - Locking Down Your FreeBSD Install.eng.text 38.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Partial-Japanese.eng.lrc 38.3 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/QMaster - Secure Implementations of ActiveX in a Corporate Environment.eng.vtt 38.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/PWNIE AWARDS.eng.vtt 38.3 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/{JS - ON Security - OFF} Abusing JSON - Based SQL Queries.eng.srt 38.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hey Man, Have You Forgotten To Intialize Your Memory.eng.srt 38.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Practical Attacks Against Attribute based Encryption.eng.vtt 38.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Patrick Miller - Spider(tool).eng.txt 38.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Thorsen Holz - Maximilliam Dornseif - NoSEBrEaK Defeating Honeypots.eng.text 38.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Man in the Binder - He Who Controls IPC, Controls the Droid.eng.lrc 38.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Bruce Schneier - The Instrument and Death of Security.eng.vtt 38.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Reverse Engineering Flash Exploits.eng.tsv 38.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Breaking the Security of Physical Devices by Silvio Cesare.eng.text 38.3 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Ejovi-Nuwere-The-Art-of-SIP-Fuzzing-and-Vulnerabilities-Found-in-VoIP-English.eng.lrc 38.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Robert Morris - The Future of the History.eng.vtt 38.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Brian Snow - We Need Assurance.eng.lrc 38.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Leviathan - Command and Control Communications on Planet Earth.eng.text 38.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jeff Nathan and Kevin Depeugh - Layer 2 Attacks.eng.tsv 38.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Slime - Automated Anti-Sandboxing Disarmament System.eng.srt 38.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/A Universal Way to Exploit Android PendingIntents in High profile and System Apps.eng.srt 38.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/HEIST - HTTP Encrypted Information can be Stolen Through TCP-Windows.eng.text 38.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Next Generation Mobile Rootkits.eng.vtt 38.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Backdoors.eng.lrc 38.2 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal.eng.tsv 38.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Methods for Understanding Targeted Attacks with Office Documents - Bruce Dang.eng.tsv 38.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Epidemiology of Software Vulnerabilities - A Study of Attack Surface Spread.eng.txt 38.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Mo’ Money Mo’ Problems - Jeremiah Grossman, Trey Ford.eng.text 38.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Richard Thieme - Defending the Information Web New Ways of Thinking About Security.eng.txt 38.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Remote Malicious Butler Did It.eng.text 38.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/All your Root Checks Belong To Us - The Sad State of Root Detection.eng.srt 38.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Automated Malware Similarity Analysis - Daniel Raygoza.eng.txt 38.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Fried Apples - Jailbreak DIY.eng.tsv 38.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/DHS_SYST1_300x250.gif 38.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/DHS_SYST1_300x250.gif 38.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Implementing Practical Electrical Glitching Attacks.eng.srt 38.1 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Operation PoisonedApple Tracing Credit Card Information Theft to Payment Fraud.eng.srt 38.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Killing the Myth of Cisco IOS Diversity Towards Large-Scale Exploitation of Cisco IOS - Ang Cui, Jatin Kataria, Salvatore Stolfo.eng.txt 38.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Understanding HL7 2.X Standards, Pen Testing, and Defending HL7 2.X Messages.eng.tsv 38.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Patrick Miller - Spider(tool).eng.srt 38.1 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Main Stage Let Me Tell You a Story Technology and the 4 Vs.eng.srt 38.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Cyber Judo - Offensive Cyber Defense.eng.tsv 38.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/All your Root Checks Belong To Us - The Sad State of Root Detection.eng.tsv 38.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking, Surveilling, and Deceiving victims on Smart TV.eng.txt 38.1 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/New Attack Surface in Safari Using Just One Web Audio Vulnerability to Rule Safari.eng.srt 38.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Exploiting USB IP in Linux.eng.lrc 38.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwning Your Java Messaging With Deserialization Vulnerabilities.eng.text 38.1 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/When Everyone's Dog is Named Fluffy.eng.srt 38.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Robert Morris Sr - Non-Cryptographic Ways.text 38.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Siemens Simatic S7 PLC Exploitation - Dillon Beresford.eng.text 38.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Internet Scanning - Current State and Lessons Learned.eng.lrc 38.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Let's See What's Out There - Mapping the Wireless IOT.eng.text 38.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSH as the Next Back Door. Are You Giving Hackers Root Access - Joe Skehan.eng.srt 38.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Exploiting Linux and Pax ASLR's Weaknesses on 32 Bit and 64 Bit Systems.eng.text 38.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hack Microsoft Using Microsoft Signed Binaries.eng.tsv 38.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Developments in Cisco iOS Forensics - Felix FX Linder.eng.text 38.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/I Know Where You've Been - Geo-Inference Attacks Via The Browser Cache.eng.lrc 38.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Unix Domain Socket A Hidden Door Leading to Privilege Escalation in the Android Ecosystem.eng.vtt 38.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Vulnerability Exploitation In Docker Container Environments.eng.text 38.0 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Diving Into IE 10's Enhanced Protected Mode Sandbox by Mark Vincent Yason.eng.tsv 38.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Floating Car Data from Smartphones.eng.vtt 38.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory.eng.lrc 38.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory_en.lrc 38.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/It Just (Net)works - The Truth About iOS 7 s Multipeer Connectivity Framework.eng.srt 38.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Patrick Miller - Spider(tool).eng.lrc 38.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction.eng.text 38.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Honey, I'm Home - Hacking Z-Wave Home Automation Systems.eng.text 38.0 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study.eng.srt 38.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/A Sandbox Odyssey.eng.txt 38.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Kelihos Botnet.eng.tsv 37.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/BBP - BSD Heap Smashing.eng.txt 37.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Breeding Sandworms - How To Fuzz Your Way Out of Adobe Reader s Sandbox.eng.srt 37.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/van - Beek - ePassports - Reloaded.jp.eng.text 37.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Firmware Supply-Chain Security Is Broken Can We Fix It.eng.txt 37.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Press ROOT to Continue - Detecting OSX and Windows Bootkits with RDFU.eng.text 37.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Blunting the Phisher's Spear - A Risk-Based Approach.eng.srt 37.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Hisamichi-Okamura-Cybercrime-Treaty-Japanese.eng.srt 37.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Android FakeID Vulnerability Walkthrough.eng.vtt 37.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Richard Thieme - Defending the Information Web New Ways of Thinking About Security.eng.lrc 37.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Keynote - Why We are Not Building a Defendable Internet.eng.text 37.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Hidden RCE Surfaces That Control the Droids.eng.vtt 37.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Using Online Activity as Digital DNA to Create a Better Spear Phisher.eng.text 37.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Exploiting Windows Hello for Business.eng.txt 37.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Hacking with WebSockets.eng.text 37.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Cracking GSM - David Hulton and Steve.eng.srt 37.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kornburst - Oracle rootkits 2.0.eng.tsv 37.8 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/QMaster - Secure Implementations of ActiveX in a Corporate Environment.eng.txt 37.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/kayproii.jpg 37.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Thomas Olofsson - Building a Blind IP Spoofed Portscanning Tool.eng.tsv 37.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Augmenting Static Analysis Using Pintool - Ablation.eng.vtt 37.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chad R Skipper - Polymorphism and Intrusion Detection Systems.eng.vtt 37.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.eng.srt 37.8 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Escalating Insider Threats Using VMware's API.eng.srt 37.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/GreatFET - Making GoodFET Great Again.eng.text 37.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Epidemiology of Software Vulnerabilities - A Study of Attack Surface Spread.eng.lrc 37.8 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication.eng.srt 37.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Halvar Flake - Diff Navigate Audit.eng.text 37.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking, Surveilling, and Deceiving victims on Smart TV.eng.lrc 37.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/(In)Security of Mobile Banking.eng.tsv 37.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Killing the Myth of Cisco IOS Diversity Towards Large-Scale Exploitation of Cisco IOS - Ang Cui, Jatin Kataria, Salvatore Stolfo.eng.lrc 37.7 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Ejovi-Nuwere-The-Art-of-SIP-Fuzzing-and-Vulnerabilities-Found-in-VoIP-English.eng.vtt 37.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/DirectX The New Hyper - V Attack Surface.eng.srt 37.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Investigating PowerShell Attacks.eng.txt 37.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf.eng.vtt 37.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Floating Car Data from Smartphones.eng.txt 37.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Locknote Conclusions and Key Takeaways from Black Hat Europe 2021.eng.text 37.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Advanced VBA Macros Attack & Defence.eng.tsv 37.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Compromising Industrial Facilities from 40 Miles Away.eng.srt 37.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Certifi gate Front Door Access To Pwning Millions Of Androids.eng.txt 37.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Practical Attacks Against MDM Solutions.eng.text 37.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways.eng.text 37.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/3G 4G Intranet Scanning and its Application on the WormHole Vulnerability.eng.vtt 37.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks.eng.tsv 37.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Geers - Eisen - IPv6 - Update - Japanese.eng.text 37.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities.eng.vtt 37.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Abusing Web APIs Through Scripted Android Applications.eng.txt 37.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/A Sandbox Odyssey.eng.lrc 37.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Certifi gate Front Door Access To Pwning Millions Of Androids.eng.srt 37.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantum Key Distribution and the Future of Encryption.eng.srt 37.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/ICSCorsair - How I Will PWN Your ERP Through 4-20 mA Current Loop.eng.tsv 37.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE.eng.vtt 37.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/How to Build a SpyPhone.eng.text 37.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Automated Malware Similarity Analysis - Daniel Raygoza.eng.lrc 37.6 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/BBP - BSD Heap Smashing.eng.lrc 37.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Firmware Supply-Chain Security Is Broken Can We Fix It.eng.lrc 37.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/John McDonald - Stateful Inspection of FireWall-1.eng.text 37.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities.eng.txt 37.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Vboot Kit Compromising Windows Vista Security - Nitin Kumar & Vipin Kumar.eng.text 37.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/New Botnets Trends and Threats - Augusto Paes de Barros, André Fucs & Victor Pereira.eng.text 37.6 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Len Sassaman - Forensic Dead - Ends.eng.text 37.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Trust in Apple's Secret Garden Exploring & Reversing Apple's Continuity Protocol.eng.tsv 37.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Side-Channel Timing Attacks on MSP430 Microcontroller Firmware - Travis Goodspeed.eng.tsv 37.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Exploiting Network Surveillance Cameras Like a Hollywood Hacker.eng.vtt 37.5 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Bad io uring A New Era of Rooting for Android.eng.srt 37.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.eng.text 37.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Bruce Schneier - The Instrument and Death of Security.eng.tsv 37.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Exploiting Windows Hello for Business.eng.lrc 37.5 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jamie-Butler-Sherri-Sparks-Rootkit-Detection-English.eng.text 37.5 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/International Problems Serialized Fuzzing for ICU Vulnerabilities.eng.srt 37.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobitex Network Security - olleB.eng.tsv 37.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Owning the Routing Table - Part II.eng.srt 37.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Adam A Young, Modi Yang - Building Robust Backdoors.eng.text 37.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.eng.text 37.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Merloni and Carettoni - Blue Bag.eng.tsv 37.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bypassing Malware Detection Mechanisms in Online Banking.eng.vtt 37.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building Trust & Enabling Innovation for Voice Enabled IoT.eng.vtt 37.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy.eng.srt 37.4 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/QMaster - Secure Implementations of ActiveX in a Corporate Environment.eng.lrc 37.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Long-Term Sessions - This Is Why We Can’t Have Nice Things - Steve Ocepek.eng.srt 37.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Hypervisor IPS based on Hardware Assisted Virtualization Technology - Junichi Murakami.eng.vtt 37.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/GPU Security Exposed.eng.srt 37.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Breaking .NET Sandboxes.eng.text 37.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Hypervisor IPS based on Hardware Assisted Virtualization Technology - Junichi Murakami.eng.txt 37.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Let s Get Physical - Breaking Home Security Systems and Bypassing Building Controls.eng.text 37.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Keynote.eng.vtt 37.4 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Straight Outta VMware Modern Exploitation of the SVGA Device for Guest-to-Host Escapes.eng.tsv 37.4 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/CertifiedDCOM The Privilege Escalation Journey to Domain Admin with DCOM.eng.srt 37.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Captain Hook - Pirating AVS to Bypass Exploit Mitigations.eng.vtt 37.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Floating Car Data from Smartphones.eng.lrc 37.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grunwald - New Attack RFID Systems.eng.tsv 37.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Web IS Vulnerable - XSS Defense on the BattleFront.eng.srt 37.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Playing in the Reader X Sandbox - Paul Sabanal, Mark Yason.eng.vtt 37.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/ARM Exploitation ROPmap - Long Le.eng.tsv 37.3 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.jp.eng.text 37.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Internet Scanning - Current State and Lessons Learned.eng.srt 37.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Compromising Industrial Facilities from 40 Miles Away.eng.txt 37.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bilar - Auto Malware Classification.eng.srt 37.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Adam Shostack - Towards a Taxonomy of Network Testing Techniques.eng.text 37.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Killing the Myth of Cisco IOS Diversity Towards Large-Scale Exploitation of Cisco IOS - Ang Cui, Jatin Kataria, Salvatore Stolfo.eng.srt 37.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/A Tale of One Software Bypass of Windows 8 Secure Boot.eng.text 37.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Abusing Web APIs Through Scripted Android Applications.eng.lrc 37.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Smashing the Font Scaler Engine in Windows Kernel.eng.vtt 37.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities.eng.lrc 37.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Investigating PowerShell Attacks.eng.lrc 37.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices.eng.tsv 37.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pulling Back the Curtain on Airport Security - Can a Weapon Get Past TSA.eng.text 37.3 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Wideshears Investigating and Breaking Widevine on QTEE.eng.srt 37.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/BypassingPaxASLR-p59-0x09.txt 37.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/No Such Thing as a Stupid Question Why Knowledge Shaming is Making Us Less Secure.eng.text 37.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Account Jumping Post Infection Persistency & Lateral Movement in AWS.eng.vtt 37.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Subverting Apple Graphics - Practical Approaches to Remotely Gaining Root.eng.text 37.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/A Perfect CRIME Only TIME Will Tell.eng.vtt 37.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Lessons From Defending The Indefensible.eng.vtt 37.2 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Hunting Vulnerabilities of gRPC Protocol Armed Mobile IoT Applications.eng.srt 37.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Certifi gate Front Door Access To Pwning Millions Of Androids.eng.lrc 37.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Worst of the Best of the Best - Kevin Stadmeyer.eng.txt 37.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse Engineering Flash Memory for Fun and Benefit.eng.tsv 37.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/config.guess 37.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/PLC Blaster - A worm Living Solely In The PLC.eng.text 37.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Ralf Spenneberg - IKE Testing IKE Implementations.eng.text 37.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Exploiting Curiosity and Context - How to Make People Click on a Dangerous Link.eng.txt 37.2 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/The Inside Story There are Apps in Apps and Here is How to Break Them.eng.srt 37.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An AI Approach to Malware Similarity Analysis - Mapping the Malware Genome With a Deep Neural Network.eng.vtt 37.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Unknown-English to Japanese.eng.text 37.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Advanced Heap Manipulation in Windows 8.eng.vtt 37.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Exploiting Windows Hello for Business.eng.vtt 37.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE.eng.srt 37.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels.eng.txt 37.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/A Perfect CRIME Only TIME Will Tell.eng.txt 37.1 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Aldora Louw - Notes on Domino.eng.tsv 37.1 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Intel VISA Through the Rabbit Hole.eng.tsv 37.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Timothy Mullen - Grabbing User Credentials via W2k ODBC Libraries.eng.tsv 37.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Page of Injections Book - Memcached Injections.eng.srt 37.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Weapons of Targeted Attack Modern Document Exploit Techniques - Sung-ting Tsai, Ming-Chieh Pan.eng.tsv 37.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Your Cloud Is In My Pocket - Matthieu Suiche.eng.txt 37.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zambon and Bolzoni - NIDS False Pos.eng.tsv 37.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tereshkin - Rootkits Attack Firewall.eng.txt 37.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CrowdSource - Open Source Crowd Trained Machine Learning Model for Malware Detection.eng.tsv 37.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SATCOM Terminals - Hacking by Air, Sea, and Land by Ruben Santamarta.eng.vtt 37.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/FileCry The New Age Of XXE.eng.srt 37.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.eng.srt 37.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Relaying EMV Contactless Transactions Using Off-The-Self Android Devices.eng.text 37.0 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bilby - Defeating Win Forensic - Japanese.eng.srt 37.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdooring of Real Time Automotive OS Devices.eng.srt 37.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.eng.tsv 37.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Psychotronica - Nitesh Dhanjani.eng.text 37.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Kevin Spett - Java Decompilation and Application Security.eng.srt 37.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hybrid Defense - How to Protect Yourself From Polymorphic 0-days.eng.txt 37.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Dynamic Process Isolation.eng.srt 37.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Compromising Industrial Facilities from 40 Miles Away.eng.lrc 37.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Attacking The XNU Kernel In El Capitain.eng.srt 37.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Make My Day – Just Run a Web Scanner Countering The Faults of Typical Web Scanners Through Byte-code Injection - Toshinari Kureha & Dr. Brian Chess.eng.vtt 37.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/The Data Distribution Service (DDS) Protocol is Critical Let's Use it Securely.eng.srt 37.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/I Came to Drop Bombs - Auditing the Compression Algorithm Weapon Cache.eng.txt 37.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/datek_netcraft.png 37.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Firmware Supply-Chain Security Is Broken Can We Fix It.eng.vtt 37.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Hypervisor IPS based on Hardware Assisted Virtualization Technology - Junichi Murakami.eng.lrc 37.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Software Virtualization Based Rootkits - Sun Bing.eng.tsv 36.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Attacker s Day into Virology - Human vs Computer.eng.text 36.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Web Application Firewalls - Analysis of Detection Logic.eng.tsv 36.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/BBP - BSD Heap Smashing.eng.vtt 36.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning.eng.text 36.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chad R Skipper - Polymorphism and Intrusion Detection Systems.eng.txt 36.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/free.html 36.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bringing Software Defined Radio to the Penetration Testing Community.eng.vtt 36.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/A Sandbox Odyssey.eng.vtt 36.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An AI Approach to Malware Similarity Analysis - Mapping the Malware Genome With a Deep Neural Network.eng.txt 36.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Exploiting Curiosity and Context - How to Make People Click on a Dangerous Link.eng.lrc 36.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mandy Andress - Wireless LAN Security.eng.tsv 36.8 KB
- Black Hat USA/Black Hat USA 2006/presentations/Bidou/Bidou-IPSTester.zip 36.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Litchfield - All New 0 Day.eng.tsv 36.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/data.c 36.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ReCertifying Active Directory Certificate Services.eng.text 36.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm.eng.vtt 36.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Your Cloud Is In My Pocket - Matthieu Suiche.eng.lrc 36.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Wikipedia_Buffer_overflow_files/wikibits.js 36.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Dangling_pointer_files/wikibits.js 36.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/wikibits.js 36.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Stack-Smashing-Protection_files/wikibits.js 36.8 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Heartbeat Havoc Unveiling Remote Vulnerabilities in Windows Network Load Balancing.eng.srt 36.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/A Perfect CRIME Only TIME Will Tell.eng.lrc 36.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/AI based Antivirus Can AlphaAV Win the Battle in which Man Has Failed.eng.srt 36.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/One-byte Modification for Breaking Memory Forensic Analysis.eng.srt 36.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Worst of the Best of the Best - Kevin Stadmeyer.eng.lrc 36.8 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/0-days - u0026 Mitigations Roadways to Exploit and Secure Connected BMW Cars.eng.text 36.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tereshkin - Rootkits Attack Firewall.eng.lrc 36.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/(In)Security of Mobile Banking.eng.vtt 36.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hiding @ Depth - Exploring, Subverting, and Breaking NAND Flash Memory.eng.txt 36.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Cyberspace A Fragile Ecosystem - Robert Lentz.eng.text 36.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels.eng.lrc 36.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Richard Thieme - Defending the Information Web New Ways of Thinking About Security.eng.vtt 36.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Attacking the Linux PRNG on Android.eng.text 36.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/PCIe Device Attacks Beyond DMA. Exploiting PCIe Switches, Messages and Errors.eng.srt 36.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hack Your ATM with Friend s Raspberry.Py.eng.srt 36.7 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Litchfield - All New Oracle 0 - day Attacking and Defending Oracle.eng.tsv 36.7 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Hideaki-Ihara-Forensics-in-Japan-Japanese.eng.text 36.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Kortti - Input Attack Trees - Japanese.eng.text 36.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hybrid Defense - How to Protect Yourself From Polymorphic 0-days.eng.lrc 36.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Adventures In Femtoland 350 Yuan For Invaluable Fun.eng.srt 36.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/API s for improving Security.eng.tsv 36.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Unix Domain Socket A Hidden Door Leading to Privilege Escalation in the Android Ecosystem.eng.tsv 36.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/With BIGDATA comes BIG responsibility - Practical exploiting of MDX injections.eng.txt 36.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Columbus Rule and DHS.eng.text 36.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exposing Bootkits with BIOS Emulation.eng.text 36.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unveiling the Underground World of Anti-Cheats.eng.text 36.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/It Just (Net)works - The Truth About iOS 7 s Multipeer Connectivity Framework.eng.txt 36.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Two Factor Failure.eng.txt 36.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chad R Skipper - Polymorphism and Intrusion Detection Systems.eng.lrc 36.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/ScarabMon - Automating Web Application Penetration Tests - Jonathan Wilkins.eng.srt 36.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An AI Approach to Malware Similarity Analysis - Mapping the Malware Genome With a Deep Neural Network.eng.lrc 36.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Dominque Brezinski - Anatomy of Common Programming Security Issues.eng.txt 36.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Memory Forensics Using Virtual Machine Introspection for Cloud Computing.eng.vtt 36.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Energy Fraud and Orchestrated Blackouts - Issues with Wireless Metering Protocols.eng.txt 36.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Maximiliano Caceres - Syscall Proxying.eng.text 36.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/ExplosION The Hidden Mines in the Android ION Driver.eng.txt 36.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE.eng.txt 36.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Hasegawa - Attacking - with - Character - Encoding.eng.text 36.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Far Sides of Java Remote Protocols.eng.txt 36.5 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Arthur Money - Closing Keynote.eng.text 36.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/International Organized Crime and Terrorism - Hal Mcconnall.eng.tsv 36.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/PLC-Blaster - A Worm Living Solely in the PLC.eng.vtt 36.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Bad for Enterprise - Attacking BYOD Enterprise Mobile Security Solutions.eng.srt 36.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/I Came to Drop Bombs - Auditing the Compression Algorithm Weapon Cache.eng.lrc 36.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/One Glitch to Rule Them All Fault Injection Attacks Against the AMD Secure Processor.eng.txt 36.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Eugene Tsyrklevich - Attacking Host Intrusion Prevention Systems.eng.text 36.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-Japanese-with-english-questions.eng.vtt 36.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.jp.eng.srt 36.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/The Data Distribution Service (DDS) Protocol is Critical Let's Use it Securely.eng.txt 36.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Anti-Plugin - Don't Let Your App Play as an Android Plugin.eng.tsv 36.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jeff Nathan and Kevin Depeugh - Layer 2 Attacks.eng.vtt 36.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Pwnie Awards.eng.text 36.4 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Peter Shipley - Securing your Network with Free Utilities.eng.text 36.4 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Breaking Payloads With Runtime Code Stripping And Image Freezing.eng.srt 36.4 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Next Generation Debuggers for Reverse Engineering - ERESI Team.eng.text 36.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/I'm Not a Human - Breaking the Google Recaptcha.eng.txt 36.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Burdach - Physical memory Forensics.eng.tsv 36.4 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Server Tailgating - A Chosen-PlainText Attack on RDP.eng.srt 36.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Implementing Practical Electrical Glitching Attacks.eng.txt 36.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/PPI-Geolocation The Next Generation of 802.11 Visualization and Geo-Location - Johnny Cache.eng.srt 36.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding TOCTTOU in the Windows Kernel Font Scaler Engine.eng.tsv 36.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Lightbulb Worm.eng.srt 36.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hiding @ Depth - Exploring, Subverting, and Breaking NAND Flash Memory.eng.lrc 36.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hands Off and Putting SLAB SLUB Feng Shui in a Blackbox.eng.tsv 36.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Moyer - Hamiel - Satan - is - on - MyFriends.jp.eng.text 36.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Your Scripts In My Page - What Could Possibly Go Wrong.eng.srt 36.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/PLC-Blaster - A Worm Living Solely in the PLC.eng.txt 36.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bypassing Malware Detection Mechanisms in Online Banking.eng.txt 36.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side..eng.text 36.3 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side._en.text 36.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.eng.tsv 36.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Hacking Oracle 11g (or has Oracle's security posture really changed - David Litchfield.eng.text 36.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Rooting EVERY Android - From Extension to Exploitation.eng.tsv 36.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Hacking Next-Gen ATMs - From Capture to Cashout.eng.text 36.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/With BIGDATA comes BIG responsibility - Practical exploiting of MDX injections.eng.lrc 36.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Vulnerability Extrapolation or Give Me More Bugs Like That, Please - Fabian Yamaguchi.eng.text 36.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Evading Deep Inspection for Fun and Shell.eng.tsv 36.3 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Defeating Samsung KNOX with Zero Privilege.eng.srt 36.3 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Apple Neural Engine Internal From ML Algorithm to HW Registers.eng.srt 36.3 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani-tagged.eng.text 36.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Is That You, Baby, or Just a Bridge in the Sky.eng.text 36.3 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Keynote.eng.tsv 36.3 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/DevSecOps What, Why and How.eng.tsv 36.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tyler Close - Shatter Proofing Windows.eng.srt 36.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Truncating TLS Connections to Violate Beliefs in Web Applications.eng.srt 36.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Pass the Hash and other credential theft and reuse - Preventing Lateral Movement.eng.text 36.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marcus Sachs - Building a Global Culture of Security(Luncheon Speaker).eng.text 36.2 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Dominque Brezinski - Anatomy of Common Programming Security Issues.eng.lrc 36.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Far Sides of Java Remote Protocols.eng.vtt 36.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/GDI Font Fuzzing in Windows Kernel For Fun.eng.txt 36.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Multipath TCP - Breaking Today s Networks with Tomorrow s Protocols.eng.text 36.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Energy Fraud and Orchestrated Blackouts - Issues with Wireless Metering Protocols.eng.lrc 36.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf.eng.txt 36.2 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/References/p61-0x0c_Fun_with_Spanning_Tree_Protocol.txt 36.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-Japanese-with-english-questions.eng.tsv 36.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Smashing the Font Scaler Engine in Windows Kernel.eng.txt 36.2 KB
- Black Hat USA/Black Hat USA 2010/Black Hat USA 2010 captions/SprayPAL - Patrick Engebretson, Josh Pauli, Kyle Cronin.eng.srt 36.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Account Jumping Post Infection Persistency & Lateral Movement in AWS.eng.txt 36.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE.eng.lrc 36.2 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 2-2 - Chris Hadnagy.eng.tsv 36.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/To dock or not to dock, that is the question.eng.text 36.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Far Sides of Java Remote Protocols.eng.lrc 36.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Two Factor Failure.eng.lrc 36.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).eng.text 36.2 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/ZombieLoad Leaking Data on Intel CPUs.eng.vtt 36.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/One Glitch to Rule Them All Fault Injection Attacks Against the AMD Secure Processor.eng.lrc 36.2 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Server Tailgating - A Chosen-PlainText Attack on RDP.eng.txt 36.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/2021 A Titan M Odyssey.eng.srt 36.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX.eng.text 36.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/It Just (Net)works - The Truth About iOS 7 s Multipeer Connectivity Framework.eng.lrc 36.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries.eng.srt 36.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Hal McConnell - Threats from Organized Crime and Terrorists.eng.text 36.1 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Marco Valleri and Alberto Ornaghi - Man In The Middle Attacks.eng.vtt 36.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/How To Break XML Encryption - Automatically.eng.tsv 36.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Virtual Battlefield in 2022 Russia Ukraine War & Its Policy Implications.eng.tsv 36.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/The Nightmare Behind The Cross Platform Mobile Apps Dream.eng.text 36.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/I Came to Drop Bombs - Auditing the Compression Algorithm Weapon Cache.eng.srt 36.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Implementing Practical Electrical Glitching Attacks.eng.lrc 36.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/The Data Distribution Service (DDS) Protocol is Critical Let's Use it Securely.eng.lrc 36.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reflections on Trusting TrustZone.eng.text 36.1 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/The Mummy 2018 - Microsoft Accidentally Summons Back Ugly Attacks from the Past.eng.srt 36.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Merloni and Carettoni - Blue Bag.eng.vtt 36.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Enterprise Apps - Bypassing the IOS Gatekeeper.eng.srt 36.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Lessons From Defending The Indefensible.eng.txt 36.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exploiting Unpatched iOS Vulnerabilities for Fun and Profit.eng.tsv 36.1 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Grunwald-MRTD-eID-wp.pdf 36.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Job De Haas - Getting Rooted and Never Knowing It.eng.text 36.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bypassing Malware Detection Mechanisms in Online Banking.eng.lrc 36.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/I'm Not a Human - Breaking the Google Recaptcha.eng.lrc 36.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/ExplosION The Hidden Mines in the Android ION Driver.eng.lrc 36.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/DataThief Folder/DataThiefV1.0.exe 36.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/TCP Injection Attacks in the Wild - a Large Scale Study.eng.txt 36.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/HDMI - Hacking Displays Made Interesting.eng.text 36.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dwivedi - Shoot Nxt Persn says VLANS.eng.tsv 36.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Your Cloud Is In My Pocket - Matthieu Suiche.eng.vtt 36.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Practical Side-Channel Attacks Against WPA-TKIP.eng.srt 36.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/ubizen_netcraft.png 35.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/PLC-Blaster - A Worm Living Solely in the PLC.eng.lrc 35.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.eng.tsv 35.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf.eng.lrc 35.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2 2).eng.text 35.9 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/From Finding New Type of Logical Flaw at Linux Kernel To Developing New Heap Exploitation Technique.eng.srt 35.9 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Let's Play - Applanting.eng.tsv 35.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Leak a 100-Million-Node Social Graph in Just One Week.eng.vtt 35.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Smashing the Font Scaler Engine in Windows Kernel.eng.lrc 35.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Epidemiology of Software Vulnerabilities - A Study of Attack Surface Spread.eng.vtt 35.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Account Jumping Post Infection Persistency & Lateral Movement in AWS.eng.lrc 35.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/David Litchfield-English.eng.tsv 35.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/GDI Font Fuzzing in Windows Kernel For Fun.eng.lrc 35.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Long-Term Sessions - This Is Why We Can’t Have Nice Things - Steve Ocepek.eng.tsv 35.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Reflected File Download - A New Web Attack Vector.eng.text 35.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gutterman - Vulns Linux Random Num.eng.text 35.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Hidden RCE Surfaces That Control the Droids.eng.tsv 35.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Partial-Japanese.eng.vtt 35.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Gyrophone - Eavesdropping Using a Gyroscope.eng.text 35.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/One Glitch to Rule Them All Fault Injection Attacks Against the AMD Secure Processor.eng.srt 35.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding TOCTTOU in the Windows Kernel Font Scaler Engine.eng.vtt 35.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeffrey Hunker - Keynote Protecting Americas Cyberspace Version 1.0 of the National Plan.eng.tsv 35.8 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Server Tailgating - A Chosen-PlainText Attack on RDP.eng.lrc 35.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Little Seal Bug Optical Sound Recovery from Lightweight Reflective Objects.eng.txt 35.8 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Java Library Hole Allowing Multiplatform Denial-Of-Service - Marc Schoenefeld.eng.srt 35.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Himanshu Dwivedi - Insecure IP Storage Networks.eng.tsv 35.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Ed Gerck - Overview of Certification systems x509, CA, PGP and SKIP.eng.text 35.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Find Me in your Database.eng.tsv 35.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Lessons From Defending The Indefensible.eng.lrc 35.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Issues with Embedded Device Disclosures - Helping the Vendors and Recognizin.eng.text 35.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Botnets.eng.vtt 35.7 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/port80software_netcraft.png 35.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BlueMaster Bypassing and Fixing Bluetooth-based Proximity Authentication.eng.srt 35.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Nmap Scanning the Internet - Fyodor Vaskovich.eng.text 35.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The Power of Data-Oriented Attacks.eng.text 35.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Dominque Brezinski - Anatomy of Common Programming Security Issues.eng.vtt 35.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/All Your Calls Are Still Belong to Us - How We Compromised the Cisco VoIP Cr.eng.text 35.7 KB
- Black Hat Europe/Black Hat Europe 2000/Audio/Black Hat Europe 2000 captions/Auditing The Security of Applications - David Litchfield.eng.text 35.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Practical Side-Channel Attacks Against WPA-TKIP.eng.txt 35.7 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Cloud-Native Sandboxes for Microservices Understanding New Threats and Attacks.eng.srt 35.7 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.eng.vtt 35.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Botnets.eng.tsv 35.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-English-Translated.eng.vtt 35.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/register.c 35.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/TCP Injection Attacks in the Wild - a Large Scale Study.eng.lrc 35.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Analyzing SPDY Getting to Know the New Web Protocol - Thomas Roth.eng.text 35.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Dynamic Flash Instrumentation for Fun and Profit.eng.text 35.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Patrick Miller - Spider(tool).eng.vtt 35.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Exploiting Network Surveillance Cameras Like a Hollywood Hacker.eng.tsv 35.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Worst of the Best of the Best - Kevin Stadmeyer.eng.vtt 35.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Crippling HTTPs With Unholy PAC.eng.text 35.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hybrid Defense - How to Protect Yourself From Polymorphic 0-days.eng.vtt 35.6 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier.eng.srt 35.6 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Tom_Parker/BlackHat_EU_2011_Parker_Finger_Pointing_4_FunProfitWar-WP.pdf 35.6 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Defeating Samsung KNOX with Zero Privilege.eng.txt 35.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Write Once, Pwn Anywhere.eng.srt 35.6 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Marco Valleri and Alberto Ornaghi - Man In The Middle Attacks.eng.tsv 35.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Witchcraft Compiler Collection - Towards Self Aware Computer Programs.eng.text 35.6 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Keynote-The-Day-After-Katsuya-Uchida-Japanese.eng.text 35.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Numchecker - A System Approach for Kernel Rootkit Detection.eng.text 35.6 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/RFIDIOts - Practical RFID hacking (without soldering irons) - Adam Laurie.eng.text 35.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Protecting Data In-Use from Firmware and Physical Attacks.eng.vtt 35.6 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Jack-in-the-Cache A New Code injection Technique through Modifying X86-to-ARM Translation Cache.eng.srt 35.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moyer - Defending BlackBox Web Apps.eng.srt 35.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dwivedi - Shoot Nxt Persn says VLANS.eng.srt 35.5 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/GDI Font Fuzzing in Windows Kernel For Fun.eng.vtt 35.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Beware of Serialized GUI Objects Bearing Data - David Byrne, Rohini Sulatycki.eng.text 35.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/3G 4G Intranet Scanning and its Application on the WormHole Vulnerability.eng.txt 35.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/I'm Not a Human - Breaking the Google Recaptcha.eng.vtt 35.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Fingerprints On Mobile Devices Abusing And Leaking.eng.srt 35.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Oracle Security II - David Litchfield.eng.text 35.5 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/OptiSig - Semantic Signature for Metamorphic Malware.eng.text 35.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels.eng.srt 35.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kevin Cardwell - Toolkits.eng.txt 35.5 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Paul Knight - Dynamic Routing Inside IPsec VPNs.eng.text 35.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/I Know You Want Me - Unplugging PlugX by Takahiro Haruyama & Hiroshi Suzuki.eng.tsv 35.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/A New CVE 2015 0057 Exploit Technology.eng.vtt 35.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Richard Theime - Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the Board is Disappearing.eng.srt 35.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tereshkin - Rootkits Attack Firewall.eng.vtt 35.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdoor Investigation and Incident Response From Zero to Profit.eng.tsv 35.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Using Zero to Attack Zero-Knowledge Proof (ZKP) PLONK.eng.vtt 35.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Little Seal Bug Optical Sound Recovery from Lightweight Reflective Objects.eng.lrc 35.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/JD Glaser - Auditing NT Catching Greg Hoglund.eng.vtt 35.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool.eng.srt 35.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Practical Side-Channel Attacks Against WPA-TKIP.eng.lrc 35.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Daily-Life Peeper - Bug Hunting and Exploit Techniques in IoT.eng.text 35.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Unraveling Unicode - Chris Weber.eng.text 35.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Performance Optimization Weaknesses to Bypass ASLR.eng.text 35.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/TCP Injection Attacks in the Wild - a Large Scale Study.eng.vtt 35.4 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/PCIe Device Attacks Beyond DMA. Exploiting PCIe Switches, Messages and Errors.eng.txt 35.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BlueMaster Bypassing and Fixing Bluetooth-based Proximity Authentication.eng.txt 35.4 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Quantum Security and Cryptography You Are (Probably) Doing it Wrong.eng.srt 35.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AVLeak - Fingerprinting Antivirus Emulators for Advanced Malware Evasion.eng.tsv 35.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Litchfield - All New 0 Day.eng.txt 35.4 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Partial-Chris-Eagle-Japanese-Translated.eng.srt 35.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Little Seal Bug Optical Sound Recovery from Lightweight Reflective Objects.eng.srt 35.3 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Tracking the Criminal of Fake News Based on a Unified Embedding.eng.srt 35.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bypassing HTTP Strict Transport Security.eng.srt 35.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Captain Hook - Pirating AVS to Bypass Exploit Mitigations.eng.txt 35.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.eng.text 35.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/CTX - Eliminating BREACH with Context Hiding.eng.tsv 35.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Exploring Yosemite - Abusing Mac OS X 10.10.eng.text 35.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Booting the iOS Kernel to an Interactive Bash Shell on QEMU.eng.text 35.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Web IS Vulnerable - XSS Defense on the BattleFront.eng.txt 35.3 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study.eng.vtt 35.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Palante - Top 25 Overlooked Security Configuration on Your Switches and Routers.eng.text 35.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.eng.text 35.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).eng.txt 35.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Watching Commodity Malware Get Sold to a Targeted Actor.eng.srt 35.3 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Richard Theime - Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the Board is Disappearing.eng.txt 35.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.eng.text 35.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer 2-2 - Eric Filiol.eng.srt 35.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.eng.tsv 35.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Implementing Practical Electrical Glitching Attacks.eng.vtt 35.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daji Sanai - Promiscuous Node Detection Using ARP Packets.eng.srt 35.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder.eng.text 35.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Breaking HTTPS With BGP Hijacking.eng.srt 35.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kevin Cardwell - Toolkits.eng.vtt 35.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Mobile Network Hacking, IP Edition.eng.text 35.2 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Defeating Samsung KNOX with Zero Privilege.eng.lrc 35.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moyer - Defending BlackBox Web Apps.eng.tsv 35.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ben Laurie - CaPerl.eng.text 35.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/3G 4G Intranet Scanning and its Application on the WormHole Vulnerability.eng.lrc 35.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Never Trust Your Inputs - Causing 'Catastrophic Physical Consequences' From The Sensor.eng.text 35.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Inconvenient Trust - User Attitudes Toward Security and Usability Tradeoffs.eng.tsv 35.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Taking Kernel Hardening to the Next Level.eng.vtt 35.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems.eng.srt 35.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tyler Close - Shatter Proofing Windows.eng.txt 35.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Blunting the Phisher's Spear - A Risk-Based Approach.eng.txt 35.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bilar - Auto Malware Classification.eng.txt 35.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ChaosDB How We Hacked Databases of Thousands of Azure Customers (rev).eng.text 35.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Pwnage Saga Continues.eng.srt 35.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/How to Break PDF Encryption.eng.text 35.1 KB
- Black Hat DC/Black Hat Federal 2006/Heuristic Vulnerability Analysis and Attack - Drew Copley.eng.tsv 35.1 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.jp.eng.tsv 35.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Null Sessions, MSRPC, and Windows 2000 - Todd Sabin.eng.text 35.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/The UEFI Firmware Rootkits - Myths and Reality.eng.text 35.1 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Attacking and Defending Machine Learning Applications of Public Cloud.eng.srt 35.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Android FakeID Vulnerability Walkthrough.eng.tsv 35.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/All your Root Checks Belong To Us - The Sad State of Root Detection.eng.vtt 35.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/PWNIE Awards at Black Hat USA 2014.eng.txt 35.1 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard Clarke - Keynote National Strategy for Securing Cyberspace.eng.text 35.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets.eng.txt 35.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Beyond the Blacklists - Detecting Malicious URL Through Machine Learning.eng.text 35.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Web Exploit Toolkits.eng.text 35.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/PCIe Device Attacks Beyond DMA. Exploiting PCIe Switches, Messages and Errors.eng.lrc 35.1 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study.eng.txt 35.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE.eng.tsv 35.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Remote Memory-Deduplication Attacks.eng.tsv 35.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/cnet.js 35.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/cnet.js 35.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Captain Hook - Pirating AVS to Bypass Exploit Mitigations.eng.lrc 35.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/ScarabMon - Automating Web Application Penetration Tests - Jonathan Wilkins.eng.txt 35.0 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Cyber Effects Prediction - Shane Powell.eng.tsv 35.0 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Kevin Spett - Java Decompilation and Application Security.eng.tsv 35.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Investigating PowerShell Attacks.eng.srt 35.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox.eng.vtt 35.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.eng.txt 35.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kevin Cardwell - Toolkits.eng.lrc 35.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SecSi Product Development.eng.tsv 35.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Capstone - Next Generation Disassembly Framework.eng.text 35.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Compromising Industrial Facilities from 40 Miles Away.eng.vtt 35.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.eng.text 35.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Practical Attacks Against Attribute based Encryption.eng.tsv 35.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building a Product Security Incident Response Team - Learnings From the Hivemind.eng.vtt 35.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).eng.lrc 35.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows Kernel Exploitation.eng.srt 35.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Robert Morris - The Future of the History.eng.tsv 35.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BlueMaster Bypassing and Fixing Bluetooth-based Proximity Authentication.eng.lrc 35.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Richard Theime - Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the Board is Disappearing.eng.lrc 35.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/ECMO Rehost Embedded Linux Kernels via Peripheral Transplantation.eng.srt 34.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 2.eng.tsv 34.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Use-After-Use-After-Free - Exploit UAF by Generating Your Own.eng.tsv 34.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Web IS Vulnerable - XSS Defense on the BattleFront.eng.lrc 34.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Universal DDoS Mitigation Bypass.eng.text 34.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/challenge-response-1.pdf 34.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Litchfield - All New 0 Day.eng.lrc 34.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The PWNIE Awards.eng.txt 34.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Memory Forensics Using Virtual Machine Introspection for Cloud Computing.eng.txt 34.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/James Foster - Managing Hackers.eng.tsv 34.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Exploiting Social Navigation.eng.srt 34.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bilar - Auto Malware Classification.eng.lrc 34.9 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.eng.txt 34.9 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/An Assortment of Database Goodies.eng.text 34.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Litchfield - All New 0 Day.eng.srt 34.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Playing in a Satellite Environment 1.2 - Leonardo Nve Egea.eng.tsv 34.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hey, Your Parcel Looks Bad - Fuzzing and Exploiting Parcel - Ization Vulnerabilties in Android.eng.txt 34.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets.eng.srt 34.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Clocking On.eng.tsv 34.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Augmenting Static Analysis Using Pintool - Ablation.eng.txt 34.8 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study.eng.lrc 34.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Wojtczuk_Subverting_the_Xen_Hypervisor/xen-subvert-0.8.2.tgz 34.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Mission mPOSsible by Nils - Jon Butler.eng.text 34.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows 7 Phone Hacking & Exploitation.eng.srt 34.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Blunting the Phisher's Spear - A Risk-Based Approach.eng.lrc 34.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mike Pomraning - Injection Flaws.eng.tsv 34.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tyler Close - Shatter Proofing Windows.eng.lrc 34.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Betting Against the House - Security and Stability When the Odds are Against You.eng.tsv 34.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process.eng.text 34.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets.eng.lrc 34.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Taking Kernel Hardening to the Next Level.eng.txt 34.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/PWNIE Awards at Black Hat USA 2014.eng.lrc 34.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hey Man, Have You Forgotten To Intialize Your Memory.eng.vtt 34.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Greetings from the '90s Exploiting the Design of Industrial Controllers in Modern Settings.eng.text 34.7 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.eng.lrc 34.7 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/X-in-the-Middle Attacking Fast Charging Piles and Electric Vehicles.eng.srt 34.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bringing Software Defined Radio to the Penetration Testing Community.eng.txt 34.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Man in the Binder - He Who Controls IPC, Controls the Droid.eng.tsv 34.7 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/ScarabMon - Automating Web Application Penetration Tests - Jonathan Wilkins.eng.lrc 34.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Human or Not Can You Really Detect the Fake Voices.eng.srt 34.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Skeletons in the App Sandbox 5 Ways to Escape.eng.srt 34.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SATCOM Terminals - Hacking by Air, Sea, and Land by Ruben Santamarta.eng.tsv 34.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Scott Blake - Dog of War Attack Box Design.eng.text 34.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/PWNIE AWARDS.eng.txt 34.7 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/ZombieLoad Leaking Data on Intel CPUs.eng.txt 34.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Embedding a Human Centric Approach Into a Global Cyber Security Program.eng.text 34.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android.eng.txt 34.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The PWNIE Awards.eng.lrc 34.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Memory Forensics Using Virtual Machine Introspection for Cloud Computing.eng.lrc 34.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Meet the Owner of a Real Hacked Company - Forensic Analysis - Mark Shelhart.eng.text 34.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSH as the Next Back Door. Are You Giving Hackers Root Access - Joe Skehan.eng.vtt 34.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pwnie Awards 2016.eng.text 34.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SAP, Credit Cards, and the Bird that Talks Too Much.eng.text 34.6 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Cracking GSM - David Hulton and Steve.eng.vtt 34.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Brian Snow - We Need Assurance.eng.tsv 34.6 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.eng.lrc 34.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Androbugs Framework - An Android Application Security Vilnerability Scanner.eng.text 34.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Breeding Sandworms - How To Fuzz Your Way Out of Adobe Reader s Sandbox.eng.tsv 34.6 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Straight Outta VMware Modern Exploitation of the SVGA Device for Guest-to-Host Escapes.eng.text 34.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-Japanese.eng.txt 34.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer - 1-2 - Eric Filiol.eng.text 34.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-eeye-Japanese.eng.tsv 34.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Killing the Myth of Cisco IOS Diversity Towards Large-Scale Exploitation of Cisco IOS - Ang Cui, Jatin Kataria, Salvatore Stolfo.eng.vtt 34.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm.eng.tsv 34.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Repurposing OnionDuke A Single Case Study Around Reusing Nation State Malware.eng.srt 34.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Exploiting USB IP in Linux.eng.tsv 34.5 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/kRX - Comprehensive Kernel Protection Against Just-In-Time Code Reuse.eng.text 34.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Two Factor Failure.eng.srt 34.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Morana - Sec Into Software LifeCycle.eng.txt 34.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mactans - Injecting Malware Into iOS Devices via Malicious Chargers.eng.text 34.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Augmenting Static Analysis Using Pintool - Ablation.eng.lrc 34.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/ePassports Reloaded - Jeroen van Beek.eng.text 34.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bilar - Auto Malware Classification.eng.vtt 34.5 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Patching Loopholes Finding Backdoors in Applications.eng.srt 34.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why You Need to Detect More Than PtH.eng.txt 34.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Skeletons in the App Sandbox 5 Ways to Escape.eng.txt 34.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SensePost - A tale of two Proxies.eng.text 34.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Remote Web Application Dissassembly with ODBC Error Messages - David Litchfield.eng.text 34.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hey, Your Parcel Looks Bad - Fuzzing and Exploiting Parcel - Ization Vulnerabilties in Android.eng.lrc 34.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Patrick Miller - Spider(tool).eng.tsv 34.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Exploiting DCOM - Yoshiaki Komoriya, Hidenobu Sekiu.eng.srt 34.4 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/E-Meet (or Emit) My Keystrokes How Benign Screen-sharing Meetings Could Leak Typing Behaviors.eng.text 34.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Taking Kernel Hardening to the Next Level.eng.lrc 34.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/I Know Where You've Been - Geo-Inference Attacks Via The Browser Cache.eng.tsv 34.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bringing Software Defined Radio to the Penetration Testing Community.eng.lrc 34.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Canspy - A Platform for Auditing Can Devices.eng.text 34.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Richard Thieme - Defending the Information Web New Ways of Thinking About Security.eng.tsv 34.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory.eng.tsv 34.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory_en.tsv 34.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Honeypot That Can Bite - Reverse Penetration.eng.text 34.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy.eng.vtt 34.4 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/TuDoor Attack Systematically Exploring and Exploiting Logic Vulnerabilities.eng.srt 34.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE.eng.vtt 34.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Clickjacking Revisted - A Perceptual View of UI Security.eng.srt 34.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Backdoors.eng.tsv 34.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantum Key Distribution and the Future of Encryption.eng.vtt 34.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Shawn Moyer - Owning The C-Suite.txt 34.4 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Priest - Building the Business Case for Management for Increased Security.eng.text 34.4 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/ZombieLoad Leaking Data on Intel CPUs.eng.lrc 34.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Owning the Routing Table - Part II.eng.vtt 34.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hand in Your Pocket Without You Noticing Current State of Mobile Wallet Security.eng.srt 34.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy.eng.txt 34.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building Trust & Enabling Innovation for Voice Enabled IoT.eng.txt 34.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Brute-Forcing Lockdown Harddrive Pin Codes.eng.txt 34.3 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/COPYING.txt 34.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/PWNIE AWARDS.eng.lrc 34.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/C11 Metaprogramming Applied to Software Obfuscation.eng.srt 34.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Protecting Data In-Use from Firmware and Physical Attacks.eng.tsv 34.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdooring of Real Time Automotive OS Devices.eng.txt 34.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Bad for Enterprise - Attacking BYOD Enterprise Mobile Security Solutions.eng.txt 34.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bitcoin Transaction Malleability Theory in Practice.eng.text 34.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.eng.vtt 34.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Internet Scanning - Current State and Lessons Learned.eng.vtt 34.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/A Practical Attack Against VDI Solutions.eng.srt 34.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Java Library Hole Allowing Multiplatform Denial-Of-Service - Marc Schoenefeld.eng.txt 34.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.eng.vtt 34.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/APTs Way - Evading Your EBNIDS.eng.text 34.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Advanced Heap Manipulation in Windows 8.eng.tsv 34.3 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Granick.pdf 34.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cyber War in Perspective - Analysis From the Crisis in Ukraine.eng.srt 34.3 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Ejovi-Nuwere-The-Art-of-SIP-Fuzzing-and-Vulnerabilities-Found-in-VoIP-English.eng.tsv 34.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking, Surveilling, and Deceiving victims on Smart TV.eng.tsv 34.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Slime - Automated Anti-Sandboxing Disarmament System.eng.vtt 34.2 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Shield with Hole New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy.eng.srt 34.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Owning the Routing Table - Part II.eng.txt 34.2 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Hackproofing Lotus Domino - David Litchfield.eng.text 34.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/include/revm.h 34.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.eng.text 34.2 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 2 by Jose Miguel Esparza.eng.text 34.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/It Just (Net)works - The Truth About iOS 7 s Multipeer Connectivity Framework.eng.vtt 34.1 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Bug Hunters Dump User Data. Can They Keep it Well They're Keeping it Anyway.eng.text 34.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Bluepilling the Xen Hypervisor - Joanna Rutkowska, Alexander Tereshkin.eng.text 34.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Most Ransomware Isn t As Complex As You Might Think.eng.srt 34.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android.eng.lrc 34.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Breeding Sandworms - How To Fuzz Your Way Out of Adobe Reader s Sandbox.eng.vtt 34.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building Trust & Enabling Innovation for Voice Enabled IoT.eng.lrc 34.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Certifi gate Front Door Access To Pwning Millions Of Androids.eng.vtt 34.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdooring of Real Time Automotive OS Devices.eng.vtt 34.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Hisamichi-Okamura-Cybercrime-Treaty-Japanese.eng.vtt 34.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-Japanese.eng.lrc 34.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why You Need to Detect More Than PtH.eng.lrc 34.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Blunting the Phisher's Spear - A Risk-Based Approach.eng.vtt 34.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Firmware Supply-Chain Security Is Broken Can We Fix It.eng.tsv 34.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Skeletons in the App Sandbox 5 Ways to Escape.eng.lrc 34.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Zen and the Art of Adversarial Machine Learning.eng.text 34.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy.eng.lrc 34.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/One Packer to Rule Them All.eng.srt 34.0 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/PCIe Device Attacks Beyond DMA. Exploiting PCIe Switches, Messages and Errors.eng.vtt 34.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/McFeters - Extreme - Client - side - Exploitation.jp.eng.text 34.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Paul Simmonds - The Jericho Challenge.text 34.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdooring of Real Time Automotive OS Devices.eng.lrc 34.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Michael Raggo - Steganography Steganalysis Cryptanalysis.eng.text 34.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Exploiting Windows Hello for Business.eng.tsv 34.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Bad for Enterprise - Attacking BYOD Enterprise Mobile Security Solutions.eng.lrc 34.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fatal Fury on ESP32 Time to Release Hardware Exploits.eng.text 34.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/The Data Distribution Service (DDS) Protocol is Critical Let's Use it Securely.eng.vtt 34.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/How Vulnerable Are We To Scams.eng.srt 34.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Morana - Sec Into Software LifeCycle.eng.lrc 34.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/2021 A Titan M Odyssey.eng.txt 34.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Pivoting in Amazon Clouds.eng.text 34.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Aiko - Reverse with- API and Sysenter.eng.text 34.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Tim Newsham - Cracking WEP Keys.eng.text 34.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/How to Detect that Your Domains are Being Abused for Phishing by Using DNS.eng.text 34.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/A Sandbox Odyssey.eng.tsv 34.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Greg Hoglund - 1000 Hackers in a box Failings of Security Scanners.eng.text 33.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Windows 10 Segment Heap Internals.eng.text 33.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Brute-Forcing Lockdown Harddrive Pin Codes.eng.lrc 33.9 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Ron Moritz - Proactive Defense Against Malicious Code.eng.text 33.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Long-Term Sessions - This Is Why We Can’t Have Nice Things - Steve Ocepek.eng.vtt 33.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Your Scripts In My Page - What Could Possibly Go Wrong.eng.tsv 33.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1 2).eng.tsv 33.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Owning the Routing Table - Part II.eng.lrc 33.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Windows Hibernation File for Fun And Profit - Matthieu Suiche.eng.txt 33.9 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Cops and Robbers - Cheating Las Vegas - Jeff Jonas.eng.srt 33.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Partial-Chris-Eagle-Japanese-Translated.eng.txt 33.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Cooper Knows the Shortest Stave Finding 134 Bugs in the Binding Code of Scripting Languages.eng.srt 33.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Dynamic Process Isolation.eng.txt 33.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Java Library Hole Allowing Multiplatform Denial-Of-Service - Marc Schoenefeld.eng.lrc 33.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities.eng.tsv 33.8 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/BBP - BSD Heap Smashing.eng.tsv 33.8 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Bridging the Gap Between Research and Practice in Intelligently Bypassing WAF.eng.srt 33.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hey Man, Have You Forgotten To Intialize Your Memory.eng.txt 33.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Cracking GSM - David Hulton and Steve.eng.txt 33.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Floating Car Data from Smartphones.eng.tsv 33.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Internet Explorer turns you personal computer into a public File Server - Jorge Luis Alvarez Medina.eng.text 33.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Shawn Moyer - Owning The C-Suite.lrc 33.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Robert Hansen - htaccess Scripts in Apache Environments.eng.text 33.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AMSI - How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It.eng.text 33.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.eng.srt 33.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hey, Your Parcel Looks Bad - Fuzzing and Exploiting Parcel - Ization Vulnerabilties in Android.eng.srt 33.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abusing Microsoft Kerberos - Sorry You Guys Don't Get It.eng.text 33.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantum Key Distribution and the Future of Encryption.eng.txt 33.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Keynote - Gen. Alexander.eng.text 33.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Welcome & Introduction to Black Hat USA 2013.eng.text 33.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Jeff Jonas - Non Obvious Relationship Awareness.eng.text 33.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building a Product Security Incident Response Team - Learnings From the Hivemind.eng.txt 33.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Brute-Forcing Lockdown Harddrive Pin Codes.eng.srt 33.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Flash Sandboxes.eng.text 33.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox.eng.txt 33.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/They Ought to Know Better - Exploiting Security Gateways via Their Web Inter.eng.text 33.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Javascript Static Security Analysis Made Easy with JSPrime.eng.text 33.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/2021 A Titan M Odyssey.eng.lrc 33.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Web IS Vulnerable - XSS Defense on the BattleFront.eng.vtt 33.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box.eng.srt 33.7 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Package Clone Detection.eng.text 33.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hand in Your Pocket Without You Noticing Current State of Mobile Wallet Security.eng.txt 33.7 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/The Tangled Webview - Javascriptinterface Once More.eng.srt 33.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service.eng.text 33.7 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Phoenix Domain Attack Vulnerable Links in Domain Name Delegation and Revocation.eng.srt 33.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Attacking The XNU Kernel In El Capitain.eng.vtt 33.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Simple Nomad and Todd Sabin - The RAZOR Warez.eng.text 33.6 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems.eng.text 33.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Hiding Behind Android Runtime (ART).eng.text 33.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/ScarabMon - Automating Web Application Penetration Tests - Jonathan Wilkins.eng.vtt 33.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/New Exploit Technique In Java Deserialization Attack.eng.text 33.6 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/NIDS False Positive Reduction Through Anomaly Detection - Damiano Bolzoni.eng.text 33.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Bad for Enterprise - Attacking BYOD Enterprise Mobile Security Solutions.eng.vtt 33.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rooster - DNS Security Issues.eng.srt 33.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why You Need to Detect More Than PtH.eng.srt 33.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SideWinder Uncoils to Strike.eng.srt 33.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Butler - Exponential Growth Rootkit.eng.text 33.6 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Kevin Spett - Java Decompilation and Application Security.eng.vtt 33.6 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/PASTA Portable Automotive Security Testbed with Adaptability.eng.srt 33.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Revealing Embedded Fingerprints - Deriving intelligence from USB stack interactions.eng.text 33.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/CrackLord Maximizing Password Cracking Boxes.eng.srt 33.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Cracking GSM - David Hulton and Steve.eng.lrc 33.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Attacking The XNU Kernel In El Capitain.eng.txt 33.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Practical Side-Channel Attacks Against WPA-TKIP.eng.vtt 33.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hey Man, Have You Forgotten To Intialize Your Memory.eng.lrc 33.5 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Server Tailgating - A Chosen-PlainText Attack on RDP.eng.vtt 33.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Exploiting Curiosity and Context - How to Make People Click on a Dangerous Link.eng.tsv 33.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hot Knives Through Butter - Bypassing Automated Analysis Systems.eng.srt 33.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Abusing Web APIs Through Scripted Android Applications.eng.tsv 33.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Dynamic Process Isolation.eng.lrc 33.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Local Windows Authentication To Defeat Full Disk Encryption.eng.txt 33.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Does Dropping USB Drives in Parking Lots and Other Places Really Work.eng.text 33.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Alexa, Hack My Server(less) Please.eng.text 33.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantum Key Distribution and the Future of Encryption.eng.lrc 33.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image2.png 33.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Adaptive Kernel Live Patching - An Open Collaborative Effort.eng.text 33.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building a Product Security Incident Response Team - Learnings From the Hivemind.eng.lrc 33.5 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Miller - Hacking - Mac - OSX.jp.eng.text 33.5 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/QMaster - Secure Implementations of ActiveX in a Corporate Environment.eng.tsv 33.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Windows Hibernation File for Fun And Profit - Matthieu Suiche.eng.lrc 33.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-Japanese.eng.srt 33.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/New Solution Deployment - Best Practices.pdf 33.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/New Solution Deployment - Best Practices.pdf 33.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox.eng.lrc 33.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Go Get My Vulnerabilities.eng.text 33.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Using Zero to Attack Zero-Knowledge Proof (ZKP) PLONK.eng.txt 33.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Breaking FIDO - Are Exploits in There.eng.text 33.4 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bilby - Defeating Win Forensic - Japanese.eng.tsv 33.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Lightbulb Worm.eng.txt 33.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Defensive Rewriting - Bryan Sullivan.eng.srt 33.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/One Glitch to Rule Them All Fault Injection Attacks Against the AMD Secure Processor.eng.vtt 33.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Lightbulb Worm.eng.vtt 33.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hand in Your Pocket Without You Noticing Current State of Mobile Wallet Security.eng.lrc 33.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Killing the Myth of Cisco IOS Diversity Towards Large-Scale Exploitation of Cisco IOS - Ang Cui, Jatin Kataria, Salvatore Stolfo.eng.tsv 33.4 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Your Cloud Is In My Pocket - Matthieu Suiche.eng.tsv 33.4 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Partial-Chris-Eagle-Japanese-Translated.eng.lrc 33.3 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Richard George - Views On The Future Direction of Information Assurance.eng.text 33.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Breaking Big Data - Evading Analysis of the Metadata of Your Life.eng.text 33.3 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Disappeared Coins Steal Hashrate in Stratum Secretly.eng.srt 33.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/OpenStack Cloud at Yahoo Scale - How to Avoid Disaster.eng.srt 33.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Your Scripts In My Page - What Could Possibly Go Wrong.eng.vtt 33.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Dynamic Process Isolation.eng.vtt 33.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/2021 A Titan M Odyssey.eng.vtt 33.3 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/I Trust My Zombies - A Trust-Enabled Botnet.eng.srt 33.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Compromising Industrial Facilities from 40 Miles Away.eng.tsv 33.3 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/John Bailey - SOCKS, PPTP & IPSec Implementation & Futures.eng.srt 33.2 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Marcus Ranum - How to REALLY Secure the Internet.eng.srt 33.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Remote Physical Damage 101 Bread And Butter Attacks.eng.srt 33.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/A Perfect CRIME Only TIME Will Tell.eng.tsv 33.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Attacking The XNU Kernel In El Capitain.eng.lrc 33.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chad R Skipper - Polymorphism and Intrusion Detection Systems.eng.tsv 33.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Enterprise Apps - Bypassing the IOS Gatekeeper.eng.txt 33.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Point of Sale System Architecture and Security.eng.srt 33.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/To Loot or Not to Loot - That Is Not a Question When State Nexus APT Targets Online Entertainment.eng.srt 33.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/1000 Ways to Die in Mobile Oauth.eng.text 33.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/DTM Components - Shadow Keys to the ICS Kingdom.eng.text 33.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Local Windows Authentication To Defeat Full Disk Encryption.eng.srt 33.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Page of Injections Book - Memcached Injections.eng.txt 33.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Using Zero to Attack Zero-Knowledge Proof (ZKP) PLONK.eng.lrc 33.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Lightbulb Worm.eng.lrc 33.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Drone Attacks on Industrial Wireless - A New Front in Cyber Security.eng.text 33.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Out of Control - Demonstrating SCADA Device Exploitation.eng.text 33.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSH as the Next Back Door. Are You Giving Hackers Root Access - Joe Skehan.eng.txt 33.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/USB - Undermining Security Barriers - Andy Davis.eng.text 33.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tereshkin - Rootkits Attack Firewall.eng.tsv 33.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Local Windows Authentication To Defeat Full Disk Encryption.eng.lrc 33.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Neerumalla - SQL Inject.eng.txt 33.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Harnessing GPUs - Building Better Browser Based Botnets.eng.text 33.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Page of Injections Book - Memcached Injections.eng.vtt 33.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Enterprise Apps - Bypassing the IOS Gatekeeper.eng.vtt 33.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Like Lightning From the Cloud Finding RCEs in an Embedded TLS Library.eng.txt 33.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries.eng.vtt 33.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/tim_berners_lee_97X72.jpe 33.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Internet Scanning - Current State and Lessons Learned.eng.tsv 33.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/FYI - You ve Got LFI.eng.srt 33.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Richard Theime - Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the Board is Disappearing.eng.vtt 33.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An AI Approach to Malware Similarity Analysis - Mapping the Malware Genome With a Deep Neural Network.eng.tsv 33.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/One-byte Modification for Breaking Memory Forensic Analysis.eng.vtt 33.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Defeating the Transparency Feature of DBI.eng.txt 33.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Joe Klein - Soc Engineering Methodology.text 33.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Esteban Martinez - Advanced SQL Injection.eng.srt 33.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SideWinder Uncoils to Strike.eng.txt 33.0 KB
- Black Hat DC/Black Hat Federal 2006/Implementing and Detecting An ACPI BIOS Rootkit - John Heasman (bad audio quality).eng.text 33.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries.eng.txt 33.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Black Hat USA 2004 - David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.text 33.0 KB
- Black Hat USA/Black Hat USA 2006/Black Hat USA 2006.jpg 33.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Access Keys Will Kill You Before You Kill the Password.eng.srt 33.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.eng.text 33.0 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Defeating Samsung KNOX with Zero Privilege.eng.vtt 33.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/With BIGDATA comes BIG responsibility - Practical exploiting of MDX injections.eng.tsv 33.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Like Lightning From the Cloud Finding RCEs in an Embedded TLS Library.eng.srt 33.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hiding @ Depth - Exploring, Subverting, and Breaking NAND Flash Memory.eng.tsv 32.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Side-Channel Timing Attacks on MSP430 Microcontroller Firmware - Travis Goodspeed.eng.text 32.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Windows Hibernation File for Fun And Profit - Matthieu Suiche.eng.srt 32.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Enterprise Apps - Bypassing the IOS Gatekeeper.eng.lrc 32.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Larry Leibrock - Digital Information, User Tokens, Privacy and Forensics Investigations The Case of Windows XP Platform.eng.text 32.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Kernel Pool Exploitation on Windows 7 - Tarjei Mandt.eng.text 32.9 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Reverse Engineering Compliance.eng.srt 32.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hack Your ATM with Friend s Raspberry.Py.eng.vtt 32.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSH as the Next Back Door. Are You Giving Hackers Root Access - Joe Skehan.eng.lrc 32.9 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bilby - Defeating Win Forensic - Japanese.eng.vtt 32.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Epidemiology of Software Vulnerabilities - A Study of Attack Surface Spread.eng.tsv 32.8 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control....eng.srt 32.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/OpenStack Cloud at Yahoo Scale - How to Avoid Disaster.eng.txt 32.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tyler Close - Shatter Proofing Windows.eng.vtt 32.8 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH_EU_05-Cerrudo.rar 32.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/A Practical Attack Against VDI Solutions.eng.tsv 32.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/How Economics and Information Security Affects Cyber Crime - Peter Guerra.eng.srt 32.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Art of Reverse Engineering Flash Exploits.eng.text 32.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Cyber Judo - Offensive Cyber Defense.eng.text 32.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Energy Fraud and Orchestrated Blackouts - Issues with Wireless Metering Protocols.eng.tsv 32.8 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Moniz - XSSploitation - Japanese.eng.tsv 32.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Page of Injections Book - Memcached Injections.eng.lrc 32.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/I Came to Drop Bombs - Auditing the Compression Algorithm Weapon Cache.eng.vtt 32.8 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Dominque Brezinski - Anatomy of Common Programming Security Issues.eng.tsv 32.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Fried Apples - Jailbreak DIY.eng.text 32.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dwivedi - Shoot Nxt Persn says VLANS.eng.vtt 32.8 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Paul Wouters - Deploying DNSSEC.eng.text 32.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SideWinder Uncoils to Strike.eng.lrc 32.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jose Nazario - The Future of Network Worms.eng.text 32.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moyer - Defending BlackBox Web Apps.eng.vtt 32.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hack Microsoft Using Microsoft Signed Binaries.eng.text 32.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries.eng.lrc 32.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bypassing Malware Detection Mechanisms in Online Banking.eng.tsv 32.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Like Lightning From the Cloud Finding RCEs in an Embedded TLS Library.eng.lrc 32.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Neerumalla - SQL Inject.eng.lrc 32.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/macOS Vulnerabilities Hiding in Plain Sight.eng.srt 32.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels.eng.vtt 32.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Implementing Practical Electrical Glitching Attacks.eng.tsv 32.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/One Packer to Rule Them All.eng.txt 32.7 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Reverse Engineering WhatsApp Encryption for Chat Manipulation and More.eng.srt 32.7 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Neat New & Ridiculous Flash Hacks - Mike Bailey.eng.text 32.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Wear Your Password.eng.srt 32.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/36 Views of Cyberspace.eng.text 32.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Defeating the Transparency Feature of DBI.eng.lrc 32.6 KB
- Black Hat Europe/Black Hat Europe 2001/video/Black Hat Europe 2001 captions/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 2-2.eng.text 32.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf.eng.tsv 32.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Smashing the Font Scaler Engine in Windows Kernel.eng.tsv 32.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Little Seal Bug Optical Sound Recovery from Lightweight Reflective Objects.eng.vtt 32.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge.eng.srt 32.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Understanding HL7 2.X Standards, Pen Testing, and Defending HL7 2.X Messages.eng.text 32.5 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Death Profile Now iOS Has Been Compromised to Suspected Ransomware.eng.srt 32.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Account Jumping Post Infection Persistency & Lateral Movement in AWS.eng.tsv 32.5 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hybrid Defense - How to Protect Yourself From Polymorphic 0-days.eng.tsv 32.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/PPI-Geolocation The Next Generation of 802.11 Visualization and Geo-Location - Johnny Cache.eng.vtt 32.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Japanese.eng.text 32.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE.eng.tsv 32.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Side Channel Attacks in 4G and 5G Cellular Networks.eng.srt 32.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cyber War in Perspective - Analysis From the Crisis in Ukraine.eng.txt 32.5 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/I Trust My Zombies - A Trust-Enabled Botnet.eng.txt 32.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Investigating PowerShell Attacks.eng.vtt 32.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/OpenStack Cloud at Yahoo Scale - How to Avoid Disaster.eng.lrc 32.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Side Channel Attacks in 4G and 5G Cellular Networks.eng.txt 32.4 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Through the Looking Glass How Open Source Projects See Vulnerability Disclosure.eng.srt 32.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/One Packer to Rule Them All.eng.lrc 32.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Lessons From Defending The Indefensible.eng.tsv 32.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BlueMaster Bypassing and Fixing Bluetooth-based Proximity Authentication.eng.vtt 32.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Investigating PowerShell Attacks.eng.tsv 32.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Belani_and_Jones/Whitepaper/bh-usa-07-belani_and_jones-WP.pdf 32.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/One Glitch to Rule Them All Fault Injection Attacks Against the AMD Secure Processor.eng.tsv 32.4 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Terry Losonky - National Information Assurance Partnership.eng.text 32.4 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal.eng.text 32.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Far Sides of Java Remote Protocols.eng.tsv 32.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/ICSCorsair - How I Will PWN Your ERP Through 4-20 mA Current Loop.eng.text 32.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Neerumalla - SQL Inject.eng.srt 32.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/TCP Injection Attacks in the Wild - a Large Scale Study.eng.tsv 32.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pangu 9 Internals.eng.text 32.3 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Wheeler_Mehta.pdf 32.2 KB
- Black Hat Europe/Black Hat Europe 2015/presentations/BH EU 05-Wheeler Mehta.pdf 32.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Hypervisor IPS based on Hardware Assisted Virtualization Technology - Junichi Murakami.eng.tsv 32.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/PWNIE AWARDS.eng.srt 32.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Leak a 100-Million-Node Social Graph in Just One Week.eng.txt 32.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Trust in Apple's Secret Garden Exploring & Reversing Apple's Continuity Protocol.eng.text 32.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Truncating TLS Connections to Violate Beliefs in Web Applications.eng.vtt 32.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems.eng.vtt 32.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cyber War in Perspective - Analysis From the Crisis in Ukraine.eng.lrc 32.2 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/I Trust My Zombies - A Trust-Enabled Botnet.eng.lrc 32.2 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Two Bugs With One PoC Rooting Pixel 6 From Android 12 to Android 13.eng.srt 32.2 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Make KSMA Great Again The Art of Rooting Android Devices by GPU MMU Features.eng.srt 32.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Automated Malware Similarity Analysis - Daniel Raygoza.eng.srt 32.2 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 1 by Jose Miguel Esparza.eng.text 32.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Certifi gate Front Door Access To Pwning Millions Of Androids.eng.tsv 32.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Watching Commodity Malware Get Sold to a Targeted Actor.eng.vtt 32.2 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study.eng.tsv 32.2 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Google Reimagined a Phone. It was Our Job to Red Team and Secure it.eng.text 32.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Side Channel Attacks in 4G and 5G Cellular Networks.eng.lrc 32.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets.eng.vtt 32.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Deactivate the Rootkit - Alfredo Ortega.eng.txt 32.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/BlackberryOS 10 From a Security Perspective.eng.text 32.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/vmhooks.c 32.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Hurley - WorldWide War Drive.eng.txt 32.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Break Out of The Truman Show - Active Detection and Escape of Dynamic Binary Instrumentation.eng.text 32.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Advanced VBA Macros Attack & Defence.eng.text 32.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Maynor - NX - How Well Does it Say NO.text 32.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Java Library Hole Allowing Multiplatform Denial-Of-Service - Marc Schoenefeld.eng.vtt 32.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Resurrecting The Read Logs Permission on Samsung Devices.eng.srt 32.1 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/GDI Font Fuzzing in Windows Kernel For Fun.eng.tsv 32.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Viral Video - Exploiting SSRF in Video Converters.eng.srt 32.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Resting on Feet of Clay Securely Bootstrapping OPC UA Deployments.eng.srt 32.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/The Data Distribution Service (DDS) Protocol is Critical Let's Use it Securely.eng.tsv 32.1 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang.eng.tsv 32.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hand in Your Pocket Without You Noticing Current State of Mobile Wallet Security.eng.vtt 32.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeffrey Hunker - Keynote Protecting Americas Cyberspace Version 1.0 of the National Plan.eng.text 32.0 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Diving Into IE 10's Enhanced Protected Mode Sandbox by Mark Vincent Yason.eng.text 32.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Attacking ECMAScript Engines With Redefinition.eng.srt 32.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows Kernel Exploitation.eng.vtt 32.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Patton/Whitepaper/bh-usa-07-patton-WP.pdf 32.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Snyder_and_Shaver/Whitepaper/bh-usa-07-snyder_and_shaver-WP.pdf 32.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/One-byte Modification for Breaking Memory Forensic Analysis.eng.txt 32.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Practical Side-Channel Attacks Against WPA-TKIP.eng.tsv 32.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-English-Translated.eng.txt 32.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Point of Sale System Architecture and Security.eng.txt 32.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Kernel Wars - Joel Eriksson.eng.text 31.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Leak a 100-Million-Node Social Graph in Just One Week.eng.lrc 31.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dungeons Dragons and Security.eng.srt 31.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bypassing HTTP Strict Transport Security.eng.vtt 31.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels.eng.tsv 31.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/3G 4G Intranet Scanning and its Application on the WormHole Vulnerability.eng.tsv 31.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Two Factor Failure.eng.vtt 31.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SQL Injection Worms for Fun and Profit - Justin Clarke.eng.srt 31.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Defensive Rewriting - Bryan Sullivan.eng.tsv 31.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer 2-2 - Eric Filiol.eng.vtt 31.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/802.1x and Beyond.eng.text 31.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/David Litchfeild - All new 0day.eng.text 31.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Breaking Encryption in the Cloud - Cheap, GPU Accelerated Supercomputing for Everyone - Thomas Roth.eng.tsv 31.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.jp.eng.vtt 31.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/spoonm, scape - Beyond EIP.text 31.8 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/PCIe Device Attacks Beyond DMA. Exploiting PCIe Switches, Messages and Errors.eng.tsv 31.8 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/The Last Line of Defense Understanding and Attacking Apple File System on iOS.eng.srt 31.8 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/A Framework for Evaluating and Patching the Human Factor in Cybersecurity.eng.srt 31.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/ExplosION The Hidden Mines in the Android ION Driver.eng.srt 31.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems.eng.txt 31.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Zambon and Bolzoni - NIDS False Pos.eng.text 31.8 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Real-Time Detection of Attacks Leveraging Domain Administrator Privilege.eng.srt 31.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-English-Translated.eng.lrc 31.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Esteban Martinez - Advanced SQL Injection.eng.txt 31.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.eng.text 31.8 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines-tagged.eng.srt 31.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadWPAD.eng.srt 31.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cyber War in Perspective - Analysis From the Crisis in Ukraine.eng.vtt 31.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool.eng.vtt 31.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Web Application Firewalls - Analysis of Detection Logic.eng.text 31.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Rafal_Wojtczuk-DefeatingSolarNoExecPatch.html 31.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).eng.tsv 31.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Worst of the Best of the Best - Kevin Stadmeyer.eng.tsv 31.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Security Through Design - Making Security Better By Designing for People.eng.srt 31.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Breaking Encryption in the Cloud - Cheap, GPU Accelerated Supercomputing for Everyone - Thomas Roth.eng.srt 31.7 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/Intel VISA Through the Rabbit Hole.eng.text 31.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Deactivate the Rootkit - Alfredo Ortega.eng.lrc 31.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/One-byte Modification for Breaking Memory Forensic Analysis.eng.lrc 31.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Captain Hook - Pirating AVS to Bypass Exploit Mitigations.eng.tsv 31.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Bypassing Browser Security Policies for Fun and Profit.eng.txt 31.7 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Server Tailgating - A Chosen-PlainText Attack on RDP.eng.tsv 31.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Alexander Kornbrust - Circumvent Oracle.text 31.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Moniz - XSSploitation - Japanese.eng.srt 31.6 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeremiah-Grossman-Phishing-With-Super-Bait-English.eng.text 31.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Hurley - WorldWide War Drive.eng.lrc 31.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Richard Theime - Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the Board is Disappearing.eng.tsv 31.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks.eng.srt 31.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/macOS Vulnerabilities Hiding in Plain Sight.eng.txt 31.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Point of Sale System Architecture and Security.eng.lrc 31.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer 2-2 - Eric Filiol.eng.txt 31.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Bruce Schneier - Paradigms Lost Engineering vs Risk Management.eng.srt 31.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Timothy Mullen - Grabbing User Credentials via W2k ODBC Libraries.eng.text 31.6 KB
- Black Hat DC/Black Hat Federal 2006/Finding Digital Evidence in Physical Memory - Mariusz Burdach.eng.text 31.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Worth - Cryptographic Port Knocking.eng.srt 31.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bilar - Auto Malware Classification.eng.tsv 31.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/One Packer to Rule Them All.eng.vtt 31.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Resurrecting The Read Logs Permission on Samsung Devices.eng.txt 31.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows Kernel Exploitation.eng.txt 31.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building Trust & Enabling Innovation for Voice Enabled IoT.eng.tsv 31.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobitex Network Security - olleB.eng.text 31.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision.eng.txt 31.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems.eng.lrc 31.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Skeletons in the App Sandbox 5 Ways to Escape.eng.vtt 31.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protecting Vulnerable Applications with IIS7 - Brian Holyfield.eng.txt 31.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Password Hashing - The Future is Now.eng.srt 31.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/bairdlynn-bhus-02-adv80211.ppt 31.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/A New CVE 2015 0057 Exploit Technology.eng.txt 31.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/I'm Not a Human - Breaking the Google Recaptcha.eng.tsv 31.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Litchfield - All New 0 Day.eng.vtt 31.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Esteban Martinez - Advanced SQL Injection.eng.lrc 31.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/TeamTNT Explosive Cryptomining.eng.srt 31.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass.eng.text 31.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/A Practical Attack Against VDI Solutions.eng.vtt 31.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/ARM Exploitation ROPmap - Long Le.eng.text 31.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/PLC-Blaster - A Worm Living Solely in the PLC.eng.tsv 31.4 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.eng.tsv 31.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The PWNIE Awards.eng.tsv 31.4 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/JD Glaser - JDs Toolbox Fire and Ice.eng.text 31.4 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/A Glimpse Into The Protocol Fuzz Windows RDP Client For Fun And Profit.eng.srt 31.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AMSI & Bypass Review of Known AMSI Bypass Techniques and Introducing a New One.eng.text 31.4 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Back - connect to the Connected Car. Search for Vulnerabilities in the VW Electric Car.eng.srt 31.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Two Factor Failure.eng.tsv 31.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Invisibility Purge - Unmasking the Dormant Events of Invisible Web Controls.eng.text 31.4 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.eng.tsv 31.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Automated Malware Similarity Analysis - Daniel Raygoza.eng.tsv 31.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/How Economics and Information Security Affects Cyber Crime - Peter Guerra.eng.txt 31.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Contemporary Automatic Program Analysis.eng.text 31.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bar-Mitzva Attack - Breaking SSL with 13-Year Old RC4 Weakness.eng.text 31.3 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Win the 0-Day Racing Game Against Botnet in Public Cloud.eng.srt 31.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Memory Forensics Using Virtual Machine Introspection for Cloud Computing.eng.tsv 31.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/macOS Vulnerabilities Hiding in Plain Sight.eng.lrc 31.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Understanding The Attack Surface & Attack Resilience Of Project Spartan.eng.text 31.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/I Came to Drop Bombs - Auditing the Compression Algorithm Weapon Cache.eng.tsv 31.3 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows Kernel Exploitation.eng.lrc 31.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Resurrecting The Read Logs Permission on Samsung Devices.eng.lrc 31.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Bypassing Browser Security Policies for Fun and Profit.eng.lrc 31.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Exploiting Social Navigation.eng.vtt 31.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer 2-2 - Eric Filiol.eng.lrc 31.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SideWinder Uncoils to Strike.eng.vtt 31.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Watching Commodity Malware Get Sold to a Targeted Actor.eng.txt 31.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Anti-Plugin - Don't Let Your App Play as an Android Plugin.eng.text 31.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protecting Vulnerable Applications with IIS7 - Brian Holyfield.eng.lrc 31.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Slime - Automated Anti-Sandboxing Disarmament System.eng.txt 31.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Simple Spyware Androids Invisible Foreground Services and How to (Ab)use Them.eng.srt 31.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daji Sanai - Promiscuous Node Detection Using ARP Packets.eng.vtt 31.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Learn How to Control Every Room at a Luxury Hotel Remotely.eng.srt 31.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Deactivate the Rootkit - Alfredo Ortega.eng.srt 31.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision.eng.lrc 31.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rob Karas - Open Source Monitoring.eng.srt 31.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows 7 Phone Hacking & Exploitation.eng.vtt 31.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/A New CVE 2015 0057 Exploit Technology.eng.lrc 31.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bringing Software Defined Radio to the Penetration Testing Community.eng.tsv 31.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Little Seal Bug Optical Sound Recovery from Lightweight Reflective Objects.eng.tsv 31.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/It Just (Net)works - The Truth About iOS 7 s Multipeer Connectivity Framework.eng.tsv 31.2 KB
- Black Hat Asia/Black Hat Singapore 2019/Black Hat Singapore 2019 captions/DevSecOps What, Why and How.eng.text 31.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Taking Kernel Hardening to the Next Level.eng.tsv 31.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/A Crushing Blow at the Heart of SAP’s J2EE Engine - Alexander Polyakov.eng.text 31.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Clickjacking Revisted - A Perceptual View of UI Security.eng.vtt 31.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data.eng.srt 31.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/ScarabMon - Automating Web Application Penetration Tests - Jonathan Wilkins.eng.tsv 31.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Virtual Private Problems A Broken Dream - Loki.eng.text 31.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Augmenting Static Analysis Using Pintool - Ablation.eng.tsv 31.1 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Threat Hunting with LLM From Discovering APT SAAIWC to Tracking APTs with AI.eng.srt 31.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Security Testing Best Practiceson complex File Format Fuzzing - Qing Wang.eng.text 31.1 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/ZombieLoad Leaking Data on Intel CPUs.eng.tsv 31.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Virtual Battlefield in 2022 Russia Ukraine War & Its Policy Implications.eng.text 31.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Hands Off and Putting SLAB SLUB Feng Shui in a Blackbox.eng.text 31.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Gadgets.eng.text 31.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Exploit Windows 8.eng.text 31.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hey, Your Parcel Looks Bad - Fuzzing and Exploiting Parcel - Ization Vulnerabilties in Android.eng.vtt 31.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/John_Wilander-avtp.c 31.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.eng.text 31.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OPSEC Failures of Spies.eng.srt 31.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Watching Commodity Malware Get Sold to a Targeted Actor.eng.lrc 31.0 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Cunningham/blackhatbibliographymorganandcunningham.doc 31.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/How Economics and Information Security Affects Cyber Crime - Peter Guerra.eng.lrc 31.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protecting Vulnerable Applications with IIS7 - Brian Holyfield.eng.srt 31.0 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rooster - DNS Security Issues.eng.txt 31.0 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Software Virtualization Based Rootkits - Sun Bing.eng.text 31.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Legal Considerations for Cellular Research.eng.srt 31.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Slime - Automated Anti-Sandboxing Disarmament System.eng.lrc 31.0 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/I Trust My Zombies - A Trust-Enabled Botnet.eng.vtt 31.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/d_services.h 31.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy.eng.tsv 30.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Barnaby Jack - Kernel Exploitation.eng.text 30.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Brute-Forcing Lockdown Harddrive Pin Codes.eng.vtt 30.9 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Return To Where You Can t Exploit What You Can t Find.eng.srt 30.9 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Aldora Louw - Notes on Domino.eng.text 30.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/What's the DFIRence for ICS.eng.srt 30.9 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows 7 Phone Hacking & Exploitation.eng.txt 30.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Cooper Knows the Shortest Stave Finding 134 Bugs in the Binding Code of Scripting Languages.eng.vtt 30.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hacking a Professional Drone.eng.srt 30.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Exploiting DCOM - Yoshiaki Komoriya, Hidenobu Sekiu.eng.vtt 30.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Exploiting Unpatched iOS Vulnerabilities for Fun and Profit.eng.text 30.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Partial-Chris-Eagle-Japanese-Translated.eng.vtt 30.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdooring of Real Time Automotive OS Devices.eng.tsv 30.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Pwnage Saga Continues.eng.vtt 30.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sht.c 30.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why You Need to Detect More Than PtH.eng.vtt 30.8 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor.eng.srt 30.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hot Knives Through Butter - Bypassing Automated Analysis Systems.eng.vtt 30.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision.eng.srt 30.8 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/I Block You Because I Love You Social Account Identification Attack Against a Website Visitor.eng.srt 30.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SQL Injection Worms for Fun and Profit - Justin Clarke.eng.txt 30.8 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/How To Hack Companiesand Make Millions- Part 2-2 - Chris Hadnagy.eng.text 30.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/C11 Metaprogramming Applied to Software Obfuscation.eng.vtt 30.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets.eng.tsv 30.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hot Knives Through Butter - Bypassing Automated Analysis Systems.eng.txt 30.7 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Defeating Samsung KNOX with Zero Privilege.eng.tsv 30.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Owning the Routing Table - Part II.eng.tsv 30.7 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/The Kali Linux Dojo Workshop #2 Kali USB Setups With Persistent Stores & LUKS N.eng.srt 30.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/PWNIE AWARDS.eng.tsv 30.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Bad for Enterprise - Attacking BYOD Enterprise Mobile Security Solutions.eng.tsv 30.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Pwnage Saga Continues.eng.txt 30.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Next Generation Mobile Rootkits.eng.text 30.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rooster - DNS Security Issues.eng.lrc 30.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Untwining Twine.eng.srt 30.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Access Keys Will Kill You Before You Kill the Password.eng.txt 30.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/David Litchfield - Variations in Exploit Methods between Linux and Windows.eng.text 30.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/FYI - You ve Got LFI.eng.vtt 30.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/PWNIE Awards at Black Hat USA 2014.eng.tsv 30.6 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/FYI - You ve Got LFI.eng.txt 30.6 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Operation MIDAS - Tracking Fraudulent Financial Program Organizations.eng.srt 30.6 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows 7 Phone Hacking & Exploitation.eng.lrc 30.6 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Mandy Andress - Wireless LAN Security.eng.text 30.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Write Once, Pwn Anywhere.eng.vtt 30.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Gen PlugX ShadowPad A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT.eng.text 30.5 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rooster - DNS Security Issues.eng.vtt 30.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Wibbly Wobbly, Timey Wimey - What's Really Inside Apple's U1 Chip.eng.srt 30.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hot Knives Through Butter - Bypassing Automated Analysis Systems.eng.lrc 30.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/To Loot or Not to Loot - That Is Not a Question When State Nexus APT Targets Online Entertainment.eng.vtt 30.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Burdach - Physical memory Forensics.eng.text 30.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Freeze Drying for Capturing Environment-Sensitive Malware Alive.eng.srt 30.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Cooper Knows the Shortest Stave Finding 134 Bugs in the Binding Code of Scripting Languages.eng.txt 30.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BlueMaster Bypassing and Fixing Bluetooth-based Proximity Authentication.eng.tsv 30.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Web IS Vulnerable - XSS Defense on the BattleFront.eng.tsv 30.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Local Windows Authentication To Defeat Full Disk Encryption.eng.vtt 30.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SQL Injection Worms for Fun and Profit - Justin Clarke.eng.lrc 30.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Bypassing Browser Security Policies for Fun and Profit.eng.srt 30.4 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Cracking GSM - David Hulton and Steve.eng.tsv 30.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An Inconvenient Trust - User Attitudes Toward Security and Usability Tradeoffs.eng.text 30.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Access Keys Will Kill You Before You Kill the Password.eng.lrc 30.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Access Keys Will Kill You Before You Kill the Password.eng.vtt 30.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Defensive Rewriting - Bryan Sullivan.eng.vtt 30.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/2021 A Titan M Odyssey.eng.tsv 30.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bypassing HTTP Strict Transport Security.eng.txt 30.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Side Channel Attacks in 4G and 5G Cellular Networks.eng.vtt 30.4 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/keynote-Raisuke-Miyawaki-English-Translation.eng.srt 30.4 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/One Flip is All It Takes Identifying Syscall-Guard Variables for Data-Only Attacks.eng.srt 30.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks.eng.txt 30.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox.eng.tsv 30.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/FYI - You ve Got LFI.eng.lrc 30.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hand in Your Pocket Without You Noticing Current State of Mobile Wallet Security.eng.tsv 30.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Exploiting Live Virtual Machine Migration - Jon Oberheide.eng.txt 30.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/OpenStack Cloud at Yahoo Scale - How to Avoid Disaster.eng.vtt 30.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Pwnage Saga Continues.eng.lrc 30.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/AVLeak - Fingerprinting Antivirus Emulators for Advanced Malware Evasion.eng.text 30.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building a Product Security Incident Response Team - Learnings From the Hivemind.eng.tsv 30.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Blunting the Phisher's Spear - A Risk-Based Approach.eng.tsv 30.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Esteban Martinez - Advanced SQL Injection.eng.vtt 30.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hey Man, Have You Forgotten To Intialize Your Memory.eng.tsv 30.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdoor Investigation and Incident Response From Zero to Profit.eng.text 30.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/obj/binviz_0.05.csproj.FileListAbsolute.txt 30.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantum Key Distribution and the Future of Encryption.eng.tsv 30.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Kelihos Botnet.eng.text 30.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-Japanese.eng.vtt 30.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/ExplosION The Hidden Mines in the Android ION Driver.eng.tsv 30.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Trainor - The Statue of Liberty.eng.srt 30.2 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Cops and Robbers - Cheating Las Vegas - Jeff Jonas.eng.vtt 30.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Cooper Knows the Shortest Stave Finding 134 Bugs in the Binding Code of Scripting Languages.eng.lrc 30.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box.eng.vtt 30.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/CTX - Eliminating BREACH with Context Hiding.eng.text 30.1 KB
- Black Hat Asia/Black Hat Japan 2005/Black Hat Japan 2005 speakers.txt 30.1 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Black Hat Japan 2005 speakers.txt 30.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AutoSpear Towards Automatically Bypassing and Inspecting Web Application Firewalls.eng.srt 30.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/David Litchfield - All New 0 Day.eng.text 30.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/macOS Vulnerabilities Hiding in Plain Sight.eng.vtt 30.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hey, Your Parcel Looks Bad - Fuzzing and Exploiting Parcel - Ization Vulnerabilties in Android.eng.tsv 30.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tyler Close - Shatter Proofing Windows.eng.tsv 30.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bypassing HTTP Strict Transport Security.eng.lrc 30.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Evading Deep Inspection for Fun and Shell.eng.text 30.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks.eng.lrc 30.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Authenticator Leakage Through Backup Channels on Android.eng.text 30.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Point of Sale System Architecture and Security.eng.vtt 30.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Delegate to the Top - Abusing Kerberos for Arbitrary Impersonations and RCE.eng.text 30.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices.eng.text 30.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Using Zero to Attack Zero-Knowledge Proof (ZKP) PLONK.eng.tsv 30.1 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/John Bailey - SOCKS, PPTP & IPSec Implementation & Futures.eng.txt 30.0 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Marcus Ranum - How to REALLY Secure the Internet.eng.txt 30.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hack Your ATM with Friend s Raspberry.Py.eng.txt 30.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Chris Evans, Thompson - Self-defending.srt 30.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Use-After-Use-After-Free - Exploit UAF by Generating Your Own.eng.text 30.0 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/Thermanator and the Thermal Residue Attack.eng.srt 30.0 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Exploiting Live Virtual Machine Migration - Jon Oberheide.eng.lrc 30.0 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Cops and Robbers - Cheating Las Vegas - Jeff Jonas.eng.txt 30.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/section.c 30.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Digging for IE11 Sandbox Escapes Part 2.eng.text 30.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Biometric Authentication Under Threat Liveness Detection Hacking.eng.srt 30.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadWPAD.eng.txt 30.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Like Lightning From the Cloud Finding RCEs in an Embedded TLS Library.eng.vtt 30.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/exploit-strncpy.html 30.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Resurrecting The Read Logs Permission on Samsung Devices.eng.vtt 29.9 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Practical Attacks Against Attribute based Encryption.eng.text 29.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Lightbulb Worm.eng.tsv 29.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data.eng.txt 29.9 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Hacking Your Documentation Who Should WTFM.eng.srt 29.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Man in the Binder - He Who Controls IPC, Controls the Droid.eng.text 29.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Rooting EVERY Android - From Extension to Exploitation.eng.text 29.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Windows Hibernation File for Fun And Profit - Matthieu Suiche.eng.vtt 29.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Betting Against the House - Security and Stability When the Odds are Against You.eng.text 29.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Cyber Effects Prediction - Shane Powell.eng.text 29.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/How Economics and Information Security Affects Cyber Crime - Peter Guerra.eng.vtt 29.9 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Reverse Engineering Compliance.eng.vtt 29.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Trainor - The Statue of Liberty.eng.txt 29.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CrowdSource - Open Source Crowd Trained Machine Learning Model for Malware Detection.eng.text 29.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Attacking The XNU Kernel In El Capitain.eng.tsv 29.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization.eng.txt 29.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Affiliate Programs Legitimate Business or Fueling Cybercrime - Bradley Anstis.eng.txt 29.8 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/John Bailey - SOCKS, PPTP & IPSec Implementation & Futures.eng.vtt 29.8 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Marcus Ranum - How to REALLY Secure the Internet.eng.vtt 29.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Litchfield - All New 0 Day.eng.tsv 29.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.eng.vtt 29.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hack Your ATM with Friend s Raspberry.Py.eng.lrc 29.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks.eng.text 29.8 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Breaking Theoretical Limits The Gap Between Virtual NICs and Physical Network Cards.eng.srt 29.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Enterprise Apps - Bypassing the IOS Gatekeeper.eng.tsv 29.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSH as the Next Back Door. Are You Giving Hackers Root Access - Joe Skehan.eng.tsv 29.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Keynote Clocking On.eng.text 29.8 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Hey Google, Activate Spyware - When Google Assistant Uses a Vulnerability as a Feature.eng.srt 29.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Lotus Domino - Penetration Through the Controller.eng.text 29.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kevin Cardwell - Toolkits.eng.tsv 29.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-English-Translated.eng.tsv 29.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Wear Your Password.eng.txt 29.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/inject.c 29.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadWPAD.eng.lrc 29.7 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/John Bailey - SOCKS, PPTP & IPSec Implementation & Futures.eng.lrc 29.7 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Marcus Ranum - How to REALLY Secure the Internet.eng.lrc 29.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Clickjacking Revisted - A Perceptual View of UI Security.eng.txt 29.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/How To Break XML Encryption - Automatically.eng.text 29.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data.eng.lrc 29.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Hidden RCE Surfaces That Control the Droids.eng.text 29.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C Foster - BlackHat Standup.eng.srt 29.7 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Richard Thieme - Defending the Information Web New Ways of Thinking About Security.eng.text 29.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Cops and Robbers - Cheating Las Vegas - Jeff Jonas.eng.lrc 29.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SideWinder Uncoils to Strike.eng.tsv 29.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why You Need to Detect More Than PtH.eng.tsv 29.6 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Brian Snow - We Need Assurance.eng.text 29.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Automated Malware Similarity Analysis - Daniel Raygoza.eng.vtt 29.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Understanding the IoT Threat Landscape.eng.srt 29.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Exploiting USB IP in Linux.eng.text 29.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Privacy Do as I Say Not as I Do.eng.srt 29.6 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/All Your Payment Tokens Are Mine Vulnerabilities of Mobile Payment Systems.eng.srt 29.6 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0.eng.txt 29.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Trainor - The Statue of Liberty.eng.lrc 29.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool.eng.txt 29.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/cert_absolute.gif 29.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/rootkit-backdoor/kmem-patching.html 29.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge.eng.vtt 29.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Patrick Miller - Spider(tool).eng.text 29.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Brute-Forcing Lockdown Harddrive Pin Codes.eng.tsv 29.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/akin-bh-us-02-cisco/ExampleCustofyForm.xls 29.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Readme.doc 29.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Big Data for Web Application Security.eng.srt 29.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries.eng.tsv 29.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Wear Your Password.eng.vtt 29.5 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Make KSMA Great Again The Art of Rooting Android Devices by GPU MMU Features.eng.vtt 29.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Clickjacking Revisted - A Perceptual View of UI Security.eng.lrc 29.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/David Litchfield-English.eng.text 29.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Wear Your Password.eng.lrc 29.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Fight Against 1-Day Exploits - Jeongwook Oh.eng.text 29.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Unleash the Infection Monkey - A Modern Alternative to Pen-Tests.eng.srt 29.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Affiliate Programs Legitimate Business or Fueling Cybercrime - Bradley Anstis.eng.lrc 29.4 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/IVR Security- Internal Network Attack via Phone Lines.eng.text 29.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Reverse Engineering Flash Memory for Fun and Benefit.eng.text 29.4 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Exploiting DCOM - Yoshiaki Komoriya, Hidenobu Sekiu.eng.txt 29.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Legal Considerations for Cellular Research.eng.txt 29.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Is Your Timespace Safe - Time and Position Spoofing Opensourcely.eng.srt 29.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization.eng.lrc 29.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kornburst - Oracle rootkits 2.0.eng.text 29.4 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/International Organized Crime and Terrorism - Hal Mcconnall.eng.text 29.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks.eng.vtt 29.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Skeletons in the App Sandbox 5 Ways to Escape.eng.tsv 29.4 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Back - connect to the Connected Car. Search for Vulnerabilities in the VW Electric Car.eng.txt 29.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory.eng.text 29.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Black-Box Laser Fault Injection on a Secure Memory_en.text 29.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/I Know Where You've Been - Geo-Inference Attacks Via The Browser Cache.eng.text 29.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/TeamTNT Explosive Cryptomining.eng.txt 29.3 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Java Library Hole Allowing Multiplatform Denial-Of-Service - Marc Schoenefeld.eng.tsv 29.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Dynamic Process Isolation.eng.tsv 29.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Neerumalla - SQL Inject.eng.vtt 29.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/SSL Validation Checking vs. Go(ing) to Fail.eng.txt 29.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadWPAD.eng.vtt 29.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/43544vas-small.jpg 29.3 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Two Bugs With One PoC Rooting Pixel 6 From Android 12 to Android 13.eng.vtt 29.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Thomas Olofsson - Building a Blind IP Spoofed Portscanning Tool.eng.text 29.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Benninger - Find gold Browser Cache.eng.srt 29.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool.eng.lrc 29.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Don t Trust Your USB How to Find Bugs in USB Device Drivers.eng.txt 29.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/One Packer to Rule Them All.eng.tsv 29.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hacking, Surveilling, and Deceiving victims on Smart TV.eng.text 29.3 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Make KSMA Great Again The Art of Rooting Android Devices by GPU MMU Features.eng.txt 29.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Firmware Supply-Chain Security Is Broken Can We Fix It.eng.text 29.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/PPI-Geolocation The Next Generation of 802.11 Visualization and Geo-Location - Johnny Cache.eng.txt 29.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cyber War in Perspective - Analysis From the Crisis in Ukraine.eng.tsv 29.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/version.c 29.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dungeons Dragons and Security.eng.txt 29.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Exploiting Windows Hello for Business.eng.text 29.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Security Through Design - Making Security Better By Designing for People.eng.txt 29.2 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Emerging Frontiers Insights from the Black Hat Asia Review Board.eng.text 29.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring.eng.srt 29.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Conficker Mystery - Mikko Hypponen.eng.txt 29.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Panel-English.eng.srt 29.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Security Through Design - Making Security Better By Designing for People.eng.vtt 29.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Legal Considerations for Cellular Research.eng.lrc 29.2 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/I Trust My Zombies - A Trust-Enabled Botnet.eng.tsv 29.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Mobile Point Of Scam Attacking The Square Reader.eng.srt 29.1 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Breaking Encryption in the Cloud - Cheap, GPU Accelerated Supercomputing for Everyone - Thomas Roth.eng.vtt 29.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0.eng.lrc 29.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-Japanese.eng.tsv 29.1 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Exploiting DCOM - Yoshiaki Komoriya, Hidenobu Sekiu.eng.lrc 29.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/TeamTNT Explosive Cryptomining.eng.lrc 29.1 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/API s for improving Security.eng.text 29.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/ExplosION The Hidden Mines in the Android ION Driver.eng.vtt 29.1 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities.eng.text 29.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protecting Vulnerable Applications with IIS7 - Brian Holyfield.eng.vtt 29.1 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rob Karas - Open Source Monitoring.eng.txt 29.0 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Back - connect to the Connected Car. Search for Vulnerabilities in the VW Electric Car.eng.lrc 29.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/New Ways of IPV6 Scanning.eng.srt 29.0 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Popping Shell on A(ndroid)RM Devices - Itzhak (Zuk) Avraham.eng.text 29.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/DroidGuard A Deep Dive into SafetyNet.eng.txt 29.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Viral Video - Exploiting SSRF in Video Converters.eng.vtt 29.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OPSEC Failures of Spies.eng.txt 29.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Backdoors.eng.text 29.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/SSL Validation Checking vs. Go(ing) to Fail.eng.lrc 29.0 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Make KSMA Great Again The Art of Rooting Android Devices by GPU MMU Features.eng.lrc 29.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/PPI-Geolocation The Next Generation of 802.11 Visualization and Geo-Location - Johnny Cache.eng.lrc 29.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Playing in the Reader X Sandbox - Paul Sabanal, Mark Yason.eng.text 29.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Lauren Oudot - Digital Active Self Defence.eng.txt 29.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Side Channel Attacks in 4G and 5G Cellular Networks.eng.tsv 29.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Security Through Design - Making Security Better By Designing for People.eng.lrc 29.0 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Detecting Malicious Files with YARA Rules as They Traverse the Network.eng.srt 29.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Windows Hibernation File for Fun And Profit - Matthieu Suiche.eng.tsv 28.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Mike Pomraning - Injection Flaws.eng.text 28.9 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/TeamTNT Explosive Cryptomining.eng.vtt 28.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data.eng.vtt 28.9 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Richard Thieme - Keynote.eng.txt 28.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dungeons Dragons and Security.eng.lrc 28.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-riley-wireless/bh-win-03-riley-notes.pdf 28.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines-tagged.eng.vtt 28.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Local Windows Authentication To Defeat Full Disk Encryption.eng.tsv 28.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/injectso.c 28.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.eng.text 28.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SQL Injection Worms for Fun and Profit - Justin Clarke.eng.vtt 28.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/BBP - BSD Heap Smashing.eng.text 28.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dungeons Dragons and Security.eng.vtt 28.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Exploiting Curiosity and Context - How to Make People Click on a Dangerous Link.eng.text 28.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Don t Trust Your USB How to Find Bugs in USB Device Drivers.eng.lrc 28.8 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Exploiting Out of Order Execution For Covert Cross VM Communication.eng.srt 28.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Wikipedia_Buffer_overflow_files/index.php 28.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Dangling_pointer_files/index.php 28.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/index_002.php 28.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Stack-Smashing-Protection_files/index.php 28.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Floating Car Data from Smartphones.eng.text 28.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/A Sandbox Odyssey.eng.text 28.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Conficker Mystery - Mikko Hypponen.eng.lrc 28.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AutoSpear Towards Automatically Bypassing and Inspecting Web Application Firewalls.eng.txt 28.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Leak a 100-Million-Node Social Graph in Just One Week.eng.tsv 28.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abuse of CPE Devices and Recommended Fixes.eng.srt 28.8 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Find Me in your Database.eng.text 28.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rob Karas - Open Source Monitoring.eng.lrc 28.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/OAuth - Securing the Insecure - Khash Kiani.eng.srt 28.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OPSEC Failures of Spies.eng.lrc 28.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/DroidGuard A Deep Dive into SafetyNet.eng.srt 28.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision.eng.vtt 28.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Page of Injections Book - Memcached Injections.eng.tsv 28.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/DroidGuard A Deep Dive into SafetyNet.eng.lrc 28.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Legal Considerations for Cellular Research.eng.vtt 28.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SVG - Exploiting Browsers without Image Parsing Bugs.eng.txt 28.7 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hacking a Professional Drone.eng.txt 28.7 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Your Cloud Is In My Pocket - Matthieu Suiche.eng.text 28.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Password Hashing - The Future is Now.eng.vtt 28.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Exploiting Network Surveillance Cameras Like a Hollywood Hacker.eng.text 28.6 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Dance Like Nobodys Watching Encrypt Like Everyone Is A Peek Inside The BlackHat.eng.srt 28.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/To Loot or Not to Loot - That Is Not a Question When State Nexus APT Targets Online Entertainment.eng.txt 28.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Lauren Oudot - Digital Active Self Defence.eng.lrc 28.6 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Richard Thieme - Keynote.eng.lrc 28.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Moniz - XSSploitation - Japanese.eng.vtt 28.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Exploiting Social Navigation.eng.txt 28.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Abusing Web APIs Through Scripted Android Applications.eng.text 28.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OPSEC Failures of Spies.eng.vtt 28.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rob Karas - Open Source Monitoring.eng.vtt 28.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Mac OS X Physical Memory Analysis - Matthieu Suiche.eng.txt 28.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems.eng.tsv 28.6 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Two Bugs With One PoC Rooting Pixel 6 From Android 12 to Android 13.eng.txt 28.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/OAuth - Securing the Insecure - Khash Kiani.eng.txt 28.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Andrew Stevens - How Next Generation Application Proxies Protect Against the Latest Attacks and Intrusions.eng.txt 28.5 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study.eng.text 28.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AutoSpear Towards Automatically Bypassing and Inspecting Web Application Firewalls.eng.lrc 28.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hacking a Professional Drone.eng.vtt 28.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Methods for Understanding Targeted Attacks with Office Documents - Bruce Dang.eng.text 28.5 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Ejovi-Nuwere-The-Art-of-SIP-Fuzzing-and-Vulnerabilities-Found-in-VoIP-English.eng.text 28.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android.eng.tsv 28.5 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Reverse Engineering Compliance.eng.txt 28.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/With BIGDATA comes BIG responsibility - Practical exploiting of MDX injections.eng.text 28.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/An AI Approach to Malware Similarity Analysis - Mapping the Malware Genome With a Deep Neural Network.eng.text 28.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/We Can Still Crack You General Unpacking Method For Android Packer (no Root).eng.srt 28.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hacking a Professional Drone.eng.lrc 28.4 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows Kernel Exploitation.eng.tsv 28.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Marco Valleri and Alberto Ornaghi - Man In The Middle Attacks.eng.text 28.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/A New CVE 2015 0057 Exploit Technology.eng.tsv 28.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/To Loot or Not to Loot - That Is Not a Question When State Nexus APT Targets Online Entertainment.eng.lrc 28.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Chad R Skipper - Polymorphism and Intrusion Detection Systems.eng.text 28.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Weapons of Targeted Attack Modern Document Exploit Techniques - Sung-ting Tsai, Ming-Chieh Pan.eng.text 28.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Truncating TLS Connections to Violate Beliefs in Web Applications.eng.txt 28.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Himanshu Dwivedi - Insecure IP Storage Networks.eng.text 28.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/dwarf2-abbrev.c 28.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Shawn Moyer - Owning The C-Suite.srt 28.4 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.eng.text 28.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SVG - Exploiting Browsers without Image Parsing Bugs.eng.lrc 28.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hiding @ Depth - Exploring, Subverting, and Breaking NAND Flash Memory.eng.text 28.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Exploiting Social Navigation.eng.lrc 28.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Worth - Cryptographic Port Knocking.eng.vtt 28.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/pageexec.old.txt 28.3 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/One-byte Modification for Breaking Memory Forensic Analysis.eng.tsv 28.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Partial-Japanese.eng.tsv 28.3 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Two Bugs With One PoC Rooting Pixel 6 From Android 12 to Android 13.eng.lrc 28.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/C11 Metaprogramming Applied to Software Obfuscation.eng.txt 28.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building Trust & Enabling Innovation for Voice Enabled IoT.eng.text 28.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Unix Domain Socket A Hidden Door Leading to Privilege Escalation in the Android Ecosystem.eng.text 28.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denying Service to DDoS Protection Services.eng.srt 28.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TOR ALL-THE-THINGS.eng.srt 28.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Resurrecting The Read Logs Permission on Samsung Devices.eng.tsv 28.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Simple Spyware Androids Invisible Foreground Services and How to (Ab)use Them.eng.vtt 28.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Learn How to Control Every Room at a Luxury Hotel Remotely.eng.txt 28.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/OAuth - Securing the Insecure - Khash Kiani.eng.lrc 28.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Android FakeID Vulnerability Walkthrough.eng.text 28.3 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Reverse Engineering Compliance.eng.lrc 28.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/OpenStack Cloud at Yahoo Scale - How to Avoid Disaster.eng.tsv 28.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Like Lightning From the Cloud Finding RCEs in an Embedded TLS Library.eng.tsv 28.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/A Perfect CRIME Only TIME Will Tell.eng.text 28.2 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Debug Resurrection on Nordic nRF52 Series.eng.srt 28.2 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Back - connect to the Connected Car. Search for Vulnerabilities in the VW Electric Car.eng.vtt 28.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Mac OS X Physical Memory Analysis - Matthieu Suiche.eng.lrc 28.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Compromising Industrial Facilities from 40 Miles Away.eng.text 28.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SVG - Exploiting Browsers without Image Parsing Bugs.eng.srt 28.2 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/I Block You Because I Love You Social Account Identification Attack Against a Website Visitor.eng.vtt 28.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Truncating TLS Connections to Violate Beliefs in Web Applications.eng.lrc 28.2 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Bruce Schneier - Paradigms Lost Engineering vs Risk Management.eng.vtt 28.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Watching Commodity Malware Get Sold to a Targeted Actor.eng.tsv 28.1 KB
- Black Hat Asia/Black Hat Japan 2006/Black Hat Japan 2006 speakers.txt 28.1 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Say It Ain't So - An Implementation of Deniable Encryption by Ari Trachtenberg.eng.srt 28.1 KB
- Black Hat DC/Black Hat Federal 2006/Heuristic Vulnerability Analysis and Attack - Drew Copley.eng.text 28.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protecting Vulnerable Applications with IIS7 - Brian Holyfield.eng.tsv 28.1 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit - Advanced command injection exploitation - cmd.exe in the 00's - David D Rude.eng.srt 28.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Andrew Stevens - How Next Generation Application Proxies Protect Against the Latest Attacks and Intrusions.eng.lrc 28.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Bypassing Malware Detection Mechanisms in Online Banking.eng.text 28.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Grunwald - New Attack RFID Systems.eng.text 28.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Cloning 3G4G SIM Cards With A PC And An Oscilloscope Lessons Learned.eng.srt 28.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/macOS Vulnerabilities Hiding in Plain Sight.eng.tsv 28.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Robert Morris - The Future of the History.eng.text 28.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Merloni and Carettoni - Blue Bag.eng.text 28.0 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Dominque Brezinski - Anatomy of Common Programming Security Issues.eng.text 28.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Slime - Automated Anti-Sandboxing Disarmament System.eng.tsv 28.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/C11 Metaprogramming Applied to Software Obfuscation.eng.lrc 28.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge.eng.txt 28.0 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/I Block You Because I Love You Social Account Identification Attack Against a Website Visitor.eng.txt 28.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SecSi Product Development.eng.text 28.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf.eng.text 28.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Account Jumping Post Infection Persistency & Lateral Movement in AWS.eng.text 28.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Esteban Martinez - Advanced SQL Injection.eng.tsv 28.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/What's the DFIRence for ICS.eng.vtt 28.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds.eng.srt 28.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Neerumalla - SQL Inject.eng.tsv 28.0 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Defeating a Secure Element with Multiple Laser Fault Injections.eng.srt 28.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Hypponen/Whitepaper/Whitepaper/bh-usa-07-hypponen-WP.pdf 28.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Morana - Sec Into Software LifeCycle.eng.tsv 28.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Energy Fraud and Orchestrated Blackouts - Issues with Wireless Metering Protocols.eng.text 28.0 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/I Know You Want Me - Unplugging PlugX by Takahiro Haruyama & Hiroshi Suzuki.eng.text 28.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Lessons From Defending The Indefensible.eng.text 28.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tereshkin - Rootkits Attack Firewall.eng.text 28.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Learn How to Control Every Room at a Luxury Hotel Remotely.eng.vtt 28.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer 2-2 - Eric Filiol.eng.tsv 28.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Untwining Twine.eng.vtt 28.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/keynote-Raisuke-Miyawaki-English-Translation.eng.vtt 27.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Attacking Mobile Broadband Modems Like a Criminal Would.eng.srt 27.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Learn How to Control Every Room at a Luxury Hotel Remotely.eng.lrc 27.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/MDSCLogo28.5P.jpg 27.9 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Commercial Mobile Spyware Detecting The Undetectable.eng.srt 27.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Smashing the Font Scaler Engine in Windows Kernel.eng.text 27.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Deactivate the Rootkit - Alfredo Ortega.eng.vtt 27.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Implementing Practical Electrical Glitching Attacks.eng.text 27.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Side-Channel Attacks on Everyday Applications.eng.srt 27.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android.eng.srt 27.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/SSL Validation Checking vs. Go(ing) to Fail.eng.srt 27.9 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines-tagged.eng.txt 27.9 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision.eng.tsv 27.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Morana - Sec Into Software LifeCycle.eng.srt 27.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.eng.srt 27.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/My Google Glass Sees Your Passwords.eng.txt 27.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Bypassing Browser Security Policies for Fun and Profit.eng.vtt 27.8 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/FYI - You ve Got LFI.eng.tsv 27.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacking the Smart Grid - Tony Flick.eng.srt 27.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gallagher - Preventing CrossSite Req.eng.txt 27.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge.eng.lrc 27.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/WebKit Everywhere - Secure or Not.eng.srt 27.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Trainor - The Statue of Liberty.eng.vtt 27.8 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/I Block You Because I Love You Social Account Identification Attack Against a Website Visitor.eng.lrc 27.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/stabs.c 27.8 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dario Forte (Luncheon) - International Hacking When the cooperation is the only cure.eng.srt 27.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Password Hashing - The Future is Now.eng.txt 27.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SATCOM Terminals - Hacking by Air, Sea, and Land by Ruben Santamarta.eng.text 27.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm.eng.text 27.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/All your Root Checks Belong To Us - The Sad State of Root Detection.eng.text 27.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Protecting Data In-Use from Firmware and Physical Attacks.eng.text 27.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/QMaster - Secure Implementations of ActiveX in a Corporate Environment.eng.text 27.7 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Litchfield - All New Oracle 0 - day Attacking and Defending Oracle.eng.text 27.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hot Knives Through Butter - Bypassing Automated Analysis Systems.eng.tsv 27.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines-tagged.eng.lrc 27.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/TCP Injection Attacks in the Wild - a Large Scale Study.eng.text 27.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Conficker Mystery - Mikko Hypponen.eng.srt 27.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Killing the Myth of Cisco IOS Diversity Towards Large-Scale Exploitation of Cisco IOS - Ang Cui, Jatin Kataria, Salvatore Stolfo.eng.text 27.6 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Hey Google, Activate Spyware - When Google Assistant Uses a Vulnerability as a Feature.eng.txt 27.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AutoSpear Towards Automatically Bypassing and Inspecting Web Application Firewalls.eng.vtt 27.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/deepbraindep-small.jpg 27.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Defeating the Transparency Feature of DBI.eng.srt 27.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Partial-Chris-Eagle-Japanese-Translated.eng.tsv 27.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Access Keys Will Kill You Before You Kill the Password.eng.tsv 27.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Affiliate Programs Legitimate Business or Fueling Cybercrime - Bradley Anstis.eng.srt 27.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/My Google Glass Sees Your Passwords.eng.srt 27.5 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/Make My Day – Just Run a Web Scanner Countering The Faults of Typical Web Scanners Through Byte-code Injection - Toshinari Kureha & Dr. Brian Chess.eng.text 27.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Password Hashing - The Future is Now.eng.lrc 27.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/My Google Glass Sees Your Passwords.eng.lrc 27.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Badger - The Networked Security State Estimation Toolkit.eng.srt 27.5 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor.eng.vtt 27.5 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/One Flip is All It Takes Identifying Syscall-Guard Variables for Data-Only Attacks.eng.vtt 27.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Exploiting Live Virtual Machine Migration - Jon Oberheide.eng.srt 27.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/MASHaBLE - Mobile Applications of Secret Handshakes Over Bluetooth LE.eng.text 27.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Inside Out - The Cloud has Never been so Close.eng.srt 27.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Shawn Moyer - Owning The C-Suite.tsv 27.4 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Orchestrate This Kubernetes Rootkit.eng.srt 27.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Point of Sale System Architecture and Security.eng.tsv 27.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Dangling_pointer.html 27.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/(In)Security of Mobile Banking.eng.text 27.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gallagher - Preventing CrossSite Req.eng.lrc 27.4 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/PCIe Device Attacks Beyond DMA. Exploiting PCIe Switches, Messages and Errors.eng.text 27.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/.aware alpha zine - Adjacent memory overflows.html 27.3 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Hey Google, Activate Spyware - When Google Assistant Uses a Vulnerability as a Feature.eng.lrc 27.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Practical Side-Channel Attacks Against WPA-TKIP.eng.text 27.3 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/One Flip is All It Takes Identifying Syscall-Guard Variables for Data-Only Attacks.eng.txt 27.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box.eng.txt 27.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/3G 4G Intranet Scanning and its Application on the WormHole Vulnerability.eng.text 27.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Defeating the Transparency Feature of DBI.eng.tsv 27.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/One Glitch to Rule Them All Fault Injection Attacks Against the AMD Secure Processor.eng.text 27.3 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.eng.text 27.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Bilar - Auto Malware Classification.eng.text 27.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Let's Play - Applanting.eng.text 27.3 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/A Manufacturer's Post-Shipment Approach to Fend-Off IoT Malware in Home Appliances.eng.srt 27.3 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/New Compat Vulnerabilities in Linux Device Drivers.eng.srt 27.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Frei and May - Speed of Insecurity.eng.srt 27.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Certificate Bypass - Hiding and Executing Malware from a Digitally Signed Executable.eng.srt 27.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bypassing HTTP Strict Transport Security.eng.tsv 27.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks.eng.tsv 27.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/config.sub 27.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/How Economics and Information Security Affects Cyber Crime - Peter Guerra.eng.tsv 27.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/JD Glaser - Auditing NT Catching Greg Hoglund.eng.text 27.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Cooper Knows the Shortest Stave Finding 134 Bugs in the Binding Code of Scripting Languages.eng.tsv 27.2 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rooster - DNS Security Issues.eng.tsv 27.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Untwining Twine.eng.txt 27.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Viral Video - Exploiting SSRF in Video Converters.eng.txt 27.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Freeze Drying for Capturing Environment-Sensitive Malware Alive.eng.vtt 27.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Over the Edge - Silently Owning Windows 10's Secure Browser.eng.srt 27.1 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Richard Theime - Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the Board is Disappearing.eng.text 27.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/TrustKit Code Injection On IOS 8 For The Greater Good.eng.srt 27.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Remote Memory-Deduplication Attacks.eng.text 27.1 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Richard Thieme - Keynote.eng.srt 27.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daji Sanai - Promiscuous Node Detection Using ARP Packets.eng.txt 27.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box.eng.lrc 27.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Captain Hook - Pirating AVS to Bypass Exploit Mitigations.eng.text 27.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Far Sides of Java Remote Protocols.eng.text 27.1 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/One Flip is All It Takes Identifying Syscall-Guard Variables for Data-Only Attacks.eng.lrc 27.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hack Your ATM with Friend s Raspberry.Py.eng.tsv 27.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/New Trends in FastFlux Networks.eng.srt 27.1 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Hey Google, Activate Spyware - When Google Assistant Uses a Vulnerability as a Feature.eng.vtt 27.1 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/How to Better Fuzz Windows 10 Directx Kernel at Present.eng.srt 27.0 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows 7 Phone Hacking & Exploitation.eng.tsv 27.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Restrict Anonmyous Readme.doc 27.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).eng.text 27.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Chris Evans - Thompson - Self - defending.eng.vtt 27.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data.eng.tsv 27.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Hybrid Defense - How to Protect Yourself From Polymorphic 0-days.eng.text 27.0 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.eng.text 27.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-English-Translated.eng.text 27.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/config/config.sub 26.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Memory Forensics Using Virtual Machine Introspection for Cloud Computing.eng.text 26.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Untwining Twine.eng.lrc 26.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Viral Video - Exploiting SSRF in Video Converters.eng.lrc 26.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Bypassing Browser Security Policies for Fun and Profit.eng.tsv 26.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Unleash the Infection Monkey - A Modern Alternative to Pen-Tests.eng.vtt 26.9 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Who Did It - How We Attributed Campaigns of a Cyber Mercenary.eng.srt 26.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Mac OS X Physical Memory Analysis - Matthieu Suiche.eng.srt 26.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daji Sanai - Promiscuous Node Detection Using ARP Packets.eng.lrc 26.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Privacy Do as I Say Not as I Do.eng.vtt 26.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The PWNIE Awards.eng.text 26.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Bringing Software Defined Radio to the Penetration Testing Community.eng.text 26.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/procdbg.c 26.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/theme-files/White_horizontal.jpg 26.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadWPAD.eng.tsv 26.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Big Data for Web Application Security.eng.vtt 26.8 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Operation Clairvoyance How APT Groups Spy on the Media Industry.eng.srt 26.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Benninger - Find gold Browser Cache.eng.vtt 26.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/What's the DFIRence for ICS.eng.txt 26.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Advanced Heap Manipulation in Windows 8.eng.text 26.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/GDI Font Fuzzing in Windows Kernel For Fun.eng.text 26.7 KB
- Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 captions/Bruce Schneier - The Instrument and Death of Security.eng.text 26.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Internet Scanning - Current State and Lessons Learned.eng.text 26.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Taking Kernel Hardening to the Next Level.eng.text 26.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Simple Spyware Androids Invisible Foreground Services and How to (Ab)use Them.eng.txt 26.7 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/ZombieLoad Leaking Data on Intel CPUs.eng.text 26.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Backdooring of Real Time Automotive OS Devices.eng.text 26.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Lauren Oudot - Digital Active Self Defence.eng.srt 26.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/DroidGuard A Deep Dive into SafetyNet.eng.vtt 26.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Bulba_Kil3r-BypassingStackguard-p56-0x05.txt 26.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy.eng.text 26.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Privacy Do as I Say Not as I Do.eng.txt 26.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Evasion of High-End IPS Devices in the Age of IPv6.eng.srt 26.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Clickjacking Revisted - A Perceptual View of UI Security.eng.tsv 26.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Deactivate the Rootkit - Alfredo Ortega.eng.tsv 26.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ken Hines - Using Causal Analysis.eng.srt 26.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Javascript Botnets.eng.text 26.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Is Your Timespace Safe - Time and Position Spoofing Opensourcely.eng.vtt 26.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/The Data Distribution Service (DDS) Protocol is Critical Let's Use it Securely.eng.text 26.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/What's the DFIRence for ICS.eng.lrc 26.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Perl Jam 2 - The Camel Strikes Back.eng.srt 26.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Readme.doc 26.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Who Did It - How We Attributed Campaigns of a Cyber Mercenary.eng.txt 26.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/James Foster - Managing Hackers.eng.text 26.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Commix - Detecting and Exploiting Command Injection Flaws.eng.srt 26.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Epidemiology of Software Vulnerabilities - A Study of Attack Surface Spread.eng.text 26.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Simple Spyware Androids Invisible Foreground Services and How to (Ab)use Them.eng.lrc 26.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/OAuth - Securing the Insecure - Khash Kiani.eng.vtt 26.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abuse of CPE Devices and Recommended Fixes.eng.txt 26.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abuse of CPE Devices and Recommended Fixes.eng.vtt 26.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/network.c 26.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Unleash the Infection Monkey - A Modern Alternative to Pen-Tests.eng.txt 26.4 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Exploiting XXE Vulnerabilities In File Parsing Functionality.eng.srt 26.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Understanding the IoT Threat Landscape.eng.vtt 26.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Owning the Routing Table - Part II.eng.text 26.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SQL Injection Worms for Fun and Profit - Justin Clarke.eng.tsv 26.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Augmenting Static Analysis Using Pintool - Ablation.eng.text 26.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool.eng.tsv 26.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/William Cheswick - Keynote.eng.text 26.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Legal Considerations for Cellular Research.eng.tsv 26.4 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Mac-A-Mal An Automated Platform for Mac Malware Hunting.eng.srt 26.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring.eng.vtt 26.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Freeze Drying for Capturing Environment-Sensitive Malware Alive.eng.txt 26.3 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/A Mirage of Safety Bug Finding & Exploit Techniques of Top Android Vendor's Privacy Protection Apps.eng.srt 26.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Privacy Do as I Say Not as I Do.eng.lrc 26.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Frei and May - Speed of Insecurity.eng.txt 26.3 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Cracking GSM - David Hulton and Steve.eng.text 26.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/New Trends in FastFlux Networks.eng.txt 26.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CMX - IEEE Clean File Metadata Exchange.eng.srt 26.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Benninger - Find gold Browser Cache.eng.txt 26.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/To Loot or Not to Loot - That Is Not a Question When State Nexus APT Targets Online Entertainment.eng.tsv 26.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_12.jpe 26.3 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/TeamTNT Explosive Cryptomining.eng.tsv 26.3 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/minewt.c 26.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Akshay Aggarwal - Rapid Threat Modeling.srt 26.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Bad for Enterprise - Attacking BYOD Enterprise Mobile Security Solutions.eng.text 26.2 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Analysis of Microsoft Office password protection systems, and survey of encryption holes in other MS Windows applications - Andrey Malyshev.eng.srt 26.2 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Make KSMA Great Again The Art of Rooting Android Devices by GPU MMU Features.eng.tsv 26.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Panel-English.eng.txt 26.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abuse of CPE Devices and Recommended Fixes.eng.lrc 26.2 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Exploiting Live Virtual Machine Migration - Jon Oberheide.eng.tsv 26.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Who Did It - How We Attributed Campaigns of a Cyber Mercenary.eng.lrc 26.2 KB
- Black Hat Asia/Black Hat Singapore 2018/Black Hat Singapore 2018 captions/Server Tailgating - A Chosen-PlainText Attack on RDP.eng.text 26.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Security Through Design - Making Security Better By Designing for People.eng.tsv 26.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Unleash the Infection Monkey - A Modern Alternative to Pen-Tests.eng.lrc 26.2 KB
- Black Hat Europe/Black Hat Europe 2007/Audio/Black Hat Europe 2007 captions/ScarabMon - Automating Web Application Penetration Tests - Jonathan Wilkins.eng.text 26.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hand in Your Pocket Without You Noticing Current State of Mobile Wallet Security.eng.text 26.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Building a Product Security Incident Response Team - Learnings From the Hivemind.eng.text 26.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/PPI-Geolocation The Next Generation of 802.11 Visualization and Geo-Location - Johnny Cache.eng.tsv 26.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/WebKit Everywhere - Secure or Not.eng.txt 26.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Panel-English.eng.vtt 26.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Investigating PowerShell Attacks.eng.text 26.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Welcome & Introduction to Black Hat Asia 2017.eng.srt 26.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Understanding TOCTTOU in the Windows Kernel Font Scaler Engine.eng.text 26.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Dwivedi - Shoot Nxt Persn says VLANS.eng.text 26.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox.eng.text 26.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Benninger - Find gold Browser Cache.eng.lrc 26.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Freeze Drying for Capturing Environment-Sensitive Malware Alive.eng.lrc 26.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Quantum Key Distribution and the Future of Encryption.eng.text 26.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Frei and May - Speed of Insecurity.eng.lrc 26.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Is Your Timespace Safe - Time and Position Spoofing Opensourcely.eng.txt 26.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Pwnage Saga Continues.eng.tsv 26.0 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Exploiting DCOM - Yoshiaki Komoriya, Hidenobu Sekiu.eng.tsv 26.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.eng.text 26.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Trainor - The Statue of Liberty.eng.tsv 26.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Familiarity Breeds Contempt The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities - Sandy Clark, Matt Blaze.eng.srt 26.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/New Trends in FastFlux Networks.eng.lrc 26.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Wear Your Password.eng.tsv 26.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android.eng.vtt 26.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit.eng.txt 26.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Badger - The Networked Security State Estimation Toolkit.eng.txt 25.9 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Jeff Nathan and Kevin Depeugh - Layer 2 Attacks.eng.text 25.9 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/2021 A Titan M Odyssey.eng.text 25.9 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/foundstone_netcraft.png 25.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Shawn Moyer - Owning The C-Suite.vtt 25.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Panel-English.eng.lrc 25.9 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/John Bailey - SOCKS, PPTP & IPSec Implementation & Futures.eng.tsv 25.9 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Marcus Ranum - How to REALLY Secure the Internet.eng.tsv 25.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Over the Edge - Silently Owning Windows 10's Secure Browser.eng.txt 25.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OPSEC Failures of Spies.eng.tsv 25.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/WebKit Everywhere - Secure or Not.eng.lrc 25.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Don t Trust Your USB How to Find Bugs in USB Device Drivers.eng.srt 25.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/keynote-Raisuke-Miyawaki-English-Translation.eng.txt 25.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick Chambert - Managing MSIE Security in Corporate Networks by Creating Custom Internet Zones.eng.srt 25.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Moyer - Defending BlackBox Web Apps.eng.text 25.8 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/The Node js Highway Attacks Are At Full Throttle.eng.srt 25.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hacking a Professional Drone.eng.tsv 25.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SVG - Exploiting Browsers without Image Parsing Bugs.eng.vtt 25.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Chris Evans, Thompson - Self-defending.txt 25.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/jay_beale/stupid-protocols.html 25.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Big Data for Web Application Security.eng.txt 25.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Vulnerability Intelligence.eng.srt 25.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/A Lightbulb Worm.eng.text 25.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.eng.txt 25.8 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Is Your Timespace Safe - Time and Position Spoofing Opensourcely.eng.lrc 25.8 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Exploiting Live Virtual Machine Migration - Jon Oberheide.eng.vtt 25.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Using Zero to Attack Zero-Knowledge Proof (ZKP) PLONK.eng.text 25.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/SSH as the Next Back Door. Are You Giving Hackers Root Access - Joe Skehan.eng.text 25.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels.eng.text 25.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/SSL Validation Checking vs. Go(ing) to Fail.eng.vtt 25.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C Foster - BlackHat Standup.eng.vtt 25.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rob Karas - Open Source Monitoring.eng.tsv 25.7 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/BinTyper Type Confusion Detection for C Binaries.eng.srt 25.7 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Cops and Robbers - Cheating Las Vegas - Jeff Jonas.eng.tsv 25.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-eeye-Japanese.eng.text 25.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denying Service to DDoS Protection Services.eng.vtt 25.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Your Scripts In My Page - What Could Possibly Go Wrong.eng.text 25.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Akshay Aggarwal - Rapid Threat Modeling.txt 25.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/keynote-Raisuke-Miyawaki-English-Translation.eng.lrc 25.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Morana - Sec Into Software LifeCycle.eng.vtt 25.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Over the Edge - Silently Owning Windows 10's Secure Browser.eng.lrc 25.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Badger - The Networked Security State Estimation Toolkit.eng.lrc 25.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Exploiting Social Navigation.eng.tsv 25.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TOR ALL-THE-THINGS.eng.vtt 25.6 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Two Bugs With One PoC Rooting Pixel 6 From Android 12 to Android 13.eng.tsv 25.6 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Reverse Engineering Compliance.eng.tsv 25.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/We Can Still Crack You General Unpacking Method For Android Packer (no Root).eng.vtt 25.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Big Data for Web Application Security.eng.lrc 25.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Defeating the Transparency Feature of DBI.eng.vtt 25.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit.eng.lrc 25.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Chris Evans, Thompson - Self-defending.lrc 25.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.eng.lrc 25.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Enterprise Apps - Bypassing the IOS Gatekeeper.eng.text 25.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Hey Man, Have You Forgotten To Intialize Your Memory.eng.text 25.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Little Seal Bug Optical Sound Recovery from Lightweight Reflective Objects.eng.text 25.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/PWNIE AWARDS.eng.text 25.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit - Advanced command injection exploitation - cmd.exe in the 00's - David D Rude.eng.vtt 25.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Hurley - WorldWide War Drive.eng.srt 25.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Battle of Windows Service A Silver Bullet to Discover File Privilege Escalation Bugs Automatically.eng.srt 25.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Side-Channel Attacks on Everyday Applications.eng.vtt 25.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Hypervisor IPS based on Hardware Assisted Virtualization Technology - Junichi Murakami.eng.text 25.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/We Can Still Crack You General Unpacking Method For Android Packer (no Root).eng.txt 25.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Hurley - WorldWide War Drive.eng.tsv 25.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kismet and MSF - Mike Kershaw.eng.srt 25.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Worst of the Best of the Best - Kevin Stadmeyer.eng.text 25.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Playing in a Satellite Environment 1.2 - Leonardo Nve Egea.eng.text 25.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keystone Engine - Next Generation Assembler Framework.eng.srt 25.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/WebKit Everywhere - Secure or Not.eng.vtt 25.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-cerrudo/Examples/CTShell.ocx 25.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/DroidGuard A Deep Dive into SafetyNet.eng.tsv 25.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Long-Term Sessions - This Is Why We Can’t Have Nice Things - Steve Ocepek.eng.text 25.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Akshay Aggarwal - Rapid Threat Modeling.lrc 25.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dungeons Dragons and Security.eng.tsv 25.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/DABiD - The Powerful Interactive Android Debugger for Android Malware Analysis.eng.srt 25.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AutoSpear Towards Automatically Bypassing and Inspecting Web Application Firewalls.eng.tsv 25.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Charge Your Device with the Latest Malware.eng.txt 25.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Truncating TLS Connections to Violate Beliefs in Web Applications.eng.tsv 25.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization.eng.srt 25.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Inside Out - The Cloud has Never been so Close.eng.txt 25.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets.eng.text 25.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/I'm Not a Human - Breaking the Google Recaptcha.eng.text 25.4 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dario Forte (Luncheon) - International Hacking When the cooperation is the only cure.eng.vtt 25.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Certificate Bypass - Hiding and Executing Malware from a Digitally Signed Executable.eng.txt 25.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/SideWinder Uncoils to Strike.eng.text 25.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/rootkit-backdoor/kernel-patching.html 25.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Certifi gate Front Door Access To Pwning Millions Of Androids.eng.text 25.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denying Service to DDoS Protection Services.eng.txt 25.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/C11 Metaprogramming Applied to Software Obfuscation.eng.tsv 25.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Yuji-Ukai-Japanese-with-english-questions.eng.text 25.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Two Factor Failure.eng.text 25.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Generation of Windows Exploitation Attacking the Common Log File System.eng.txt 25.3 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor.eng.txt 25.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds.eng.vtt 25.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Cyber War in Perspective - Analysis From the Crisis in Ukraine.eng.text 25.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Affiliate Programs Legitimate Business or Fueling Cybercrime - Bradley Anstis.eng.vtt 25.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries.eng.text 25.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/include/libedfmt-dwarf2.h 25.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Commix - Detecting and Exploiting Command Injection Flaws.eng.txt 25.3 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco IOS Firewall Feature Set Frequently Asked Questions.pdf 25.3 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Cisco IOS Firewall Feature Set Frequently Asked Questions.pdf 25.3 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Kevin Spett - Java Decompilation and Application Security.eng.text 25.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Unicorn Next Generation CPU Emulator Framework.eng.srt 25.3 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/TsuKing Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.eng.srt 25.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Conficker Mystery - Mikko Hypponen.eng.vtt 25.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/We Can Still Crack You General Unpacking Method For Android Packer (no Root).eng.lrc 25.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Attacking The XNU Kernel In El Capitain.eng.text 25.2 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Back - connect to the Connected Car. Search for Vulnerabilities in the VW Electric Car.eng.tsv 25.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/MadHat, Simple Nomad - SPA.srt 25.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Inside Out - The Cloud has Never been so Close.eng.vtt 25.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge.eng.tsv 25.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/SSL Validation Checking vs. Go(ing) to Fail.eng.tsv 25.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/PLC-Blaster - A Worm Living Solely in the PLC.eng.text 25.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Hisamichi-Okamura-Cybercrime-Treaty-Japanese.eng.text 25.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/One Packer to Rule Them All.eng.text 25.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/THIS IS DeepERENT Tracking App Behaviors With Nothing Changed Phone.eng.srt 25.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Inside Out - The Cloud has Never been so Close.eng.lrc 25.2 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/I Block You Because I Love You Social Account Identification Attack Against a Website Visitor.eng.tsv 25.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Certificate Bypass - Hiding and Executing Malware from a Digitally Signed Executable.eng.lrc 25.1 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/XML Out-of-Band Data Retrieval.eng.srt 25.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Attacking Mobile Broadband Modems Like a Criminal Would.eng.vtt 25.1 KB
- Black Hat Europe/Black Hat Europe 2017/videos/Black Hat Europe 2017 captions/I Trust My Zombies - A Trust-Enabled Botnet.eng.text 25.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Attacking Mobile Broadband Modems Like a Criminal Would.eng.txt 25.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Certificate Bypass - Hiding and Executing Malware from a Digitally Signed Executable.eng.vtt 25.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denying Service to DDoS Protection Services.eng.lrc 25.1 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Richard Thieme - Keynote.eng.vtt 25.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/My Google Glass Sees Your Passwords.eng.vtt 25.1 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor.eng.lrc 25.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Graphic Content Ahead Towards Auto Scalable Analysis Of Graphical Images Emb.eng.srt 25.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/API Deobfuscator Resolving Obfuscated API Functions In Modern Packers.eng.srt 25.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denial of Service as a Service - Asymmetrical Warfare at its Finest.eng.srt 25.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joukov-et_al-Kefence_files/postmark.png 25.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0.eng.srt 25.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Affiliate Programs Legitimate Business or Fueling Cybercrime - Bradley Anstis.eng.tsv 25.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Over the Edge - Silently Owning Windows 10's Secure Browser.eng.vtt 25.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.eng.vtt 25.0 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines-tagged.eng.tsv 25.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Bruce Schneier - Paradigms Lost Engineering vs Risk Management.eng.txt 25.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/configure 25.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Generation of Windows Exploitation Attacking the Common Log File System.eng.lrc 25.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Charge Your Device with the Latest Malware.eng.lrc 25.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1 2).eng.text 24.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Commix - Detecting and Exploiting Command Injection Flaws.eng.lrc 24.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/OAuth - Securing the Insecure - Khash Kiani.eng.tsv 24.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Side Channel Attacks in 4G and 5G Cellular Networks.eng.text 24.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Side-Channel Attacks on Everyday Applications.eng.txt 24.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/MadHat, Simple Nomad - SPA.txt 24.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/pacemaker-guts.jpg 24.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/network-security/ip-spoofing.html 24.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Badger - The Networked Security State Estimation Toolkit.eng.vtt 24.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/PWNIE Awards at Black Hat USA 2014.eng.text 24.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Attacking Mobile Broadband Modems Like a Criminal Would.eng.lrc 24.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/aproxy_arena.c 24.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Frei and May - Speed of Insecurity.eng.vtt 24.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Password Hashing - The Future is Now.eng.tsv 24.8 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/HODOR Reducing Attack Surface on Node.js via System Call Limitation.eng.srt 24.8 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Bruce Schneier - Paradigms Lost Engineering vs Risk Management.eng.lrc 24.8 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring.eng.txt 24.7 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Richard Thieme - Keynote.eng.tsv 24.7 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dario Forte (Luncheon) - International Hacking When the cooperation is the only cure.eng.txt 24.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.eng.txt 24.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/Breeding Sandworms - How To Fuzz Your Way Out of Adobe Reader s Sandbox.eng.text 24.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Side-Channel Attacks on Everyday Applications.eng.lrc 24.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit.eng.srt 24.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Who Did It - How We Attributed Campaigns of a Cyber Mercenary.eng.vtt 24.7 KB
- Black Hat USA/Black Hat USA 2017/Black Hat USA 2017 captions/Defeating Samsung KNOX with Zero Privilege.eng.text 24.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems.eng.text 24.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Leak a 100-Million-Node Social Graph in Just One Week.eng.text 24.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Overcoming iOS Data Protection to Re-enable iPhone Forensic - Andrey Belenko.eng.txt 24.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TOR ALL-THE-THINGS.eng.txt 24.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SVG - Exploiting Browsers without Image Parsing Bugs.eng.tsv 24.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ken Hines - Using Causal Analysis.eng.txt 24.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Lock-and-Key - Dynamic Access Lists.pdf 24.6 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Lock-and-Key - Dynamic Access Lists.pdf 24.6 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Mac OS X Physical Memory Analysis - Matthieu Suiche.eng.vtt 24.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/MadHat, Simple Nomad - SPA.lrc 24.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Gizmo - Rachel Engel.eng.srt 24.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/New Trends in FastFlux Networks.eng.vtt 24.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box.eng.tsv 24.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring.eng.lrc 24.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/The Web IS Vulnerable - XSS Defense on the BattleFront.eng.text 24.5 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dario Forte (Luncheon) - International Hacking When the cooperation is the only cure.eng.lrc 24.5 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows Kernel Exploitation.eng.text 24.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.eng.srt 24.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/It Just (Net)works - The Truth About iOS 7 s Multipeer Connectivity Framework.eng.text 24.5 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit - Advanced command injection exploitation - cmd.exe in the 00's - David D Rude.eng.txt 24.5 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daji Sanai - Promiscuous Node Detection Using ARP Packets.eng.tsv 24.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Conficker Mystery - Mikko Hypponen.eng.tsv 24.5 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.eng.lrc 24.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/I Came to Drop Bombs - Auditing the Compression Algorithm Weapon Cache.eng.text 24.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Viral Video - Exploiting SSRF in Video Converters.eng.tsv 24.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/A New CVE 2015 0057 Exploit Technology.eng.text 24.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CMX - IEEE Clean File Metadata Exchange.eng.txt 24.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Blunting the Phisher's Spear - A Risk-Based Approach.eng.text 24.4 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Secure Intrusion Detection System Frequently Asked Qu.pdf 24.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Cisco Secure Intrusion Detection System Frequently Asked Qu.pdf 24.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TOR ALL-THE-THINGS.eng.lrc 24.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Resurrecting The Read Logs Permission on Samsung Devices.eng.text 24.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/ia32.c 24.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/A Practical Attack Against VDI Solutions.eng.text 24.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Lauren Oudot - Digital Active Self Defence.eng.vtt 24.4 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Subverting Satellite Receivers For Botnet And Profit.eng.srt 24.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hide Android Applications in Images.eng.txt 24.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ken Hines - Using Causal Analysis.eng.lrc 24.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/APT Attribution and DNS Profiling.eng.txt 24.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization.eng.tsv 24.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Overcoming iOS Data Protection to Re-enable iPhone Forensic - Andrey Belenko.eng.lrc 24.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Watching Commodity Malware Get Sold to a Targeted Actor.eng.text 24.3 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Operation Clairvoyance How APT Groups Spy on the Media Industry.eng.vtt 24.3 KB
- Black Hat Europe/Black Hat Europe 2020/Black Hat Europe 2020 captions/Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel.eng.srt 24.3 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit - Advanced command injection exploitation - cmd.exe in the 00's - David D Rude.eng.lrc 24.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BluePill Neutralizing Anti-Analysis Behavior in Malware Dissection.eng.srt 24.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gregory S Miles - Travis Schack - Introduction to Global Security Syndicate.eng.srt 24.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Untwining Twine.eng.tsv 24.3 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0.eng.tsv 24.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Lauren Oudot - Digital Active Self Defence.eng.tsv 24.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CMX - IEEE Clean File Metadata Exchange.eng.lrc 24.2 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Hey Google, Activate Spyware - When Google Assistant Uses a Vulnerability as a Feature.eng.tsv 24.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Learn How to Control Every Room at a Luxury Hotel Remotely.eng.tsv 24.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Evasion of High-End IPS Devices in the Age of IPv6.eng.vtt 24.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CMX - IEEE Clean File Metadata Exchange.eng.vtt 24.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Review And Exploit Neglected Attack Surfaces In IOS 8.eng.srt 24.2 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/FYI - You ve Got LFI.eng.text 24.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hey, Your Parcel Looks Bad - Fuzzing and Exploiting Parcel - Ization Vulnerabilties in Android.eng.text 24.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Tyler Close - Shatter Proofing Windows.eng.text 24.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Protecting Vulnerable Applications with IIS7 - Brian Holyfield.eng.text 24.2 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Mac OS X Physical Memory Analysis - Matthieu Suiche.eng.tsv 24.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/dkom/HideProc/HideProc/proc_internal.h 24.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Overcoming iOS Data Protection to Re-enable iPhone Forensic - Andrey Belenko.eng.srt 24.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobile Phone Messaging Anti-Forensics - Zane Lackey, Luis Miras.eng.srt 24.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mobile Malware - Why the Traditional AV Paradigm is Doomed.eng.srt 24.1 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Operation Clairvoyance How APT Groups Spy on the Media Industry.eng.txt 24.1 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/One Flip is All It Takes Identifying Syscall-Guard Variables for Data-Only Attacks.eng.tsv 24.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-USNAnalysis.html 24.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/format-string/format-bug.html 24.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/dkom/HideProc/HideProc/HideProc-1.moved-aside/proc_internal.h 24.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacking the Smart Grid - Tony Flick.eng.txt 24.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ken Hines - Using Causal Analysis.eng.vtt 24.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Akshay Aggarwal - Rapid Threat Modeling.vtt 24.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/keynote-Raisuke-Miyawaki-English-Translation.eng.tsv 24.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BlueMaster Bypassing and Fixing Bluetooth-based Proximity Authentication.eng.text 24.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/APT Attribution and DNS Profiling.eng.lrc 24.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hide Android Applications in Images.eng.lrc 24.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Don t Trust Your USB How to Find Bugs in USB Device Drivers.eng.tsv 24.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Perl Jam 2 - The Camel Strikes Back.eng.vtt 24.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Slime - Automated Anti-Sandboxing Disarmament System.eng.text 23.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Understanding the IoT Threat Landscape.eng.txt 23.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Dynamic Process Isolation.eng.text 23.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tom Beardsley - Monkeyspaw.eng.txt 23.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/What's the DFIRence for ICS.eng.tsv 23.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Simple Spyware Androids Invisible Foreground Services and How to (Ab)use Them.eng.tsv 23.9 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Operation Clairvoyance How APT Groups Spy on the Media Industry.eng.lrc 23.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Brute-Forcing Lockdown Harddrive Pin Codes.eng.text 23.9 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds.eng.txt 23.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Why You Need to Detect More Than PtH.eng.text 23.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_08.jpe 23.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Android Kernel and OS Security Assessment with Iron Crow.eng.srt 23.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Breaking Bootloaders on the Cheap.eng.srt 23.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Welcome & Introduction to Black Hat Asia 2017.eng.vtt 23.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Hot Knives Through Butter - Bypassing Automated Analysis Systems.eng.text 23.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobile Phone Messaging Anti-Forensics - Zane Lackey, Luis Miras.eng.txt 23.8 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Android Commercial Spyware Disease and Medication.eng.srt 23.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Familiarity Breeds Contempt The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities - Sandy Clark, Matt Blaze.eng.vtt 23.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Access Keys Will Kill You Before You Kill the Password.eng.text 23.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Unleash the Infection Monkey - A Modern Alternative to Pen-Tests.eng.tsv 23.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/traces.c 23.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Understanding the IoT Threat Landscape.eng.lrc 23.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/My Google Glass Sees Your Passwords.eng.tsv 23.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Next-Generation of Exploit Kit Detection By Building Simulated Obfuscators.eng.srt 23.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.eng.txt 23.7 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/One-byte Modification for Breaking Memory Forensic Analysis.eng.text 23.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds.eng.lrc 23.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/pax-future.txt 23.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks.eng.text 23.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abuse of CPE Devices and Recommended Fixes.eng.tsv 23.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Familiarity Breeds Contempt The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities - Sandy Clark, Matt Blaze.eng.txt 23.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacking the Smart Grid - Tony Flick.eng.lrc 23.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Don t Trust Your USB How to Find Bugs in USB Device Drivers.eng.vtt 23.6 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Skeletons in the App Sandbox 5 Ways to Escape.eng.text 23.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/APT Attribution and DNS Profiling.eng.srt 23.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pindemonium - A DBI-Based Generic Unpacker for Windows Executable.eng.srt 23.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tom Beardsley - Monkeyspaw.eng.lrc 23.5 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Bypassing the Maginot Line Remotely Exploit the Hardware Decoder on Smartphone.eng.txt 23.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/macOS Vulnerabilities Hiding in Plain Sight.eng.text 23.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Bypassing Local Windows Authentication To Defeat Full Disk Encryption.eng.text 23.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobile Phone Messaging Anti-Forensics - Zane Lackey, Luis Miras.eng.lrc 23.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/All Your Emails Belong to Us - Exploiting Vulnerable Email Clients via Domain Name Collision.eng.text 23.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/sassaman/draft-moeller-mixmaster2-protoc 23.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Context-Based Access Control - Introduction and Configuration.pdf 23.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Context-Based Access Control - Introduction and Configuratio.pdf 23.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-int.h 23.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/To Loot or Not to Loot - That Is Not a Question When State Nexus APT Targets Online Entertainment.eng.text 23.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Optimized Fuzzing IOKit In IOS.eng.srt 23.5 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Analysis of Microsoft Office password protection systems, and survey of encryption holes in other MS Windows applications - Andrey Malyshev.eng.vtt 23.5 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/IEEE Software Taggant System - Mark Kennedy, Igor Muttik.eng.txt 23.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.eng.lrc 23.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Hurley - WorldWide War Drive.eng.vtt 23.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Commix - Detecting and Exploiting Command Injection Flaws.eng.vtt 23.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Benninger - Find gold Browser Cache.eng.tsv 23.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Familiarity Breeds Contempt The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities - Sandy Clark, Matt Blaze.eng.lrc 23.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Privacy Do as I Say Not as I Do.eng.tsv 23.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick Chambert - Managing MSIE Security in Corporate Networks by Creating Custom Internet Zones.eng.txt 23.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Write Once, Pwn Anywhere.eng.txt 23.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Evasion of High-End IPS Devices in the Age of IPv6.eng.txt 23.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Probabilistic Spying on Encrypted Tunnels.eng.txt 23.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Automated Malware Similarity Analysis - Daniel Raygoza.eng.text 23.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Passive and Active Leakage of Secret Data from Non-Networked Computer 2-2 - Eric Filiol.eng.text 23.3 KB
- Black Hat USA/Black Hat USA 2002/presentations/jay_beale/suid-audit.html 23.3 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Winning The Online Banking War.eng.srt 23.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Esteban Martinez - Advanced SQL Injection.eng.text 23.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization.eng.vtt 23.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hack Your ATM with Friend s Raspberry.Py.eng.text 23.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Hacker_Court/Extras/BHCIndictment2007.pdf 23.3 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Never Let Your Guard Down - Finding Unguarded Gates to Bypass Control Flow Guard with Big Data.eng.text 23.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Cooper Knows the Shortest Stave Finding 134 Bugs in the Binding Code of Scripting Languages.eng.text 23.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/html/bh-css/lib/smooshed.css 23.2 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Bypassing the Maginot Line Remotely Exploit the Hardware Decoder on Smartphone.eng.lrc 23.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gregory S Miles - Travis Schack - Introduction to Global Security Syndicate.eng.txt 23.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unleashing the Power of My 20 Years Old Car.eng.srt 23.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacking the Smart Grid - Tony Flick.eng.vtt 23.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/IEEE Software Taggant System - Mark Kennedy, Igor Muttik.eng.lrc 23.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Kevin Cardwell - Toolkits.eng.text 23.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Bypassing HTTP Strict Transport Security.eng.text 23.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Write Once, Pwn Anywhere.eng.lrc 23.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Function Rerouting from Kernel Land with Hades - Jason Raber.eng.srt 23.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Evasion of High-End IPS Devices in the Age of IPv6.eng.lrc 23.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/WebKit Everywhere - Secure or Not.eng.tsv 23.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Who Did It - How We Attributed Campaigns of a Cyber Mercenary.eng.tsv 23.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadWPAD.eng.text 23.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick Chambert - Managing MSIE Security in Corporate Networks by Creating Custom Internet Zones.eng.lrc 23.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Analysis of Microsoft Office password protection systems, and survey of encryption holes in other MS Windows applications - Andrey Malyshev.eng.txt 23.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0.eng.vtt 23.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Over the Edge - Silently Owning Windows 10's Secure Browser.eng.tsv 23.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SQUIRE - Project Cowbird.eng.txt 23.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/The New Page of Injections Book - Memcached Injections.eng.text 23.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Probabilistic Spying on Encrypted Tunnels.eng.lrc 23.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/akin-bh-us-02-cisco/CiscoRouterForensicCheck.doc 23.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Freeze Drying for Capturing Environment-Sensitive Malware Alive.eng.tsv 23.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.eng.tsv 23.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/monkey_jack.c 23.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Is Your Timespace Safe - Time and Position Spoofing Opensourcely.eng.tsv 23.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Defensive Rewriting - Bryan Sullivan.eng.text 23.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Big Data for Web Application Security.eng.tsv 23.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/pace1-front.jpg 23.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gregory S Miles - Travis Schack - Introduction to Global Security Syndicate.eng.lrc 23.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Litchfield - All New 0 Day.eng.text 23.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gallagher - Preventing CrossSite Req.eng.srt 23.0 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/XML Out-of-Band Data Retrieval.eng.vtt 23.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Clickjacking Revisted - A Perceptual View of UI Security.eng.text 23.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Attacking SDN Infrastructure - Are We Ready for the Next-Gen Networking.eng.srt 23.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/frame-pointer.html 23.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/format-string/technique.html 23.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Andrew Stevens - How Next Generation Application Proxies Protect Against the Latest Attacks and Intrusions.eng.tsv 22.9 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Java Library Hole Allowing Multiplatform Denial-Of-Service - Marc Schoenefeld.eng.text 22.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Hunting and Exploiting Recursive MMIO Flaws in QEMU KVM.eng.srt 22.9 KB
- Black Hat DC/Black Hat DC 2011/Video/Black Hat DC 2011 captions/Breaking Encryption in the Cloud - Cheap, GPU Accelerated Supercomputing for Everyone - Thomas Roth.eng.text 22.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Winning the Race to Bare Metal - UEFI Hypervisors - Don Bailey, Martin Mocko.eng.txt 22.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kismet and MSF - Mike Kershaw.eng.vtt 22.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MSF & Telephony - Druid.eng.srt 22.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/intercept.c 22.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keystone Engine - Next Generation Assembler Framework.eng.vtt 22.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Legal Considerations for Cellular Research.eng.text 22.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pindemonium - A DBI-Based Generic Unpacker for Windows Executable.eng.txt 22.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Analysis of Microsoft Office password protection systems, and survey of encryption holes in other MS Windows applications - Andrey Malyshev.eng.lrc 22.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Welcome & Introduction to Black Hat Asia 2017.eng.txt 22.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick Chambert - Managing MSIE Security in Corporate Networks by Creating Custom Internet Zones.eng.vtt 22.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MSF & Telephony - Druid.eng.txt 22.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/OpenStack Cloud at Yahoo Scale - How to Avoid Disaster.eng.text 22.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Frei and May - Speed of Insecurity.eng.tsv 22.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/MadHat, Simple Nomad - SPA.vtt 22.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SQUIRE - Project Cowbird.eng.lrc 22.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Certificate Bypass - Hiding and Executing Malware from a Digitally Signed Executable.eng.tsv 22.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Chris Evans, Thompson - Self-defending.tsv 22.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Fox in the Hen House (UPnP IGD) - Jonathan Squire.eng.srt 22.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Detecting Vulnerabilities in Virtual Devices with Conformance Testing.eng.txt 22.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denial of Service as a Service - Asymmetrical Warfare at its Finest.eng.vtt 22.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/DABiD - The Powerful Interactive Android Debugger for Android Malware Analysis.eng.vtt 22.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hacking HTTP 2 - New Attacks on the Internet's Next Generation Foundation.eng.srt 22.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Ultimate Study of Real-Life SSL Issues - Ivan Ristic.eng.txt 22.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pindemonium - A DBI-Based Generic Unpacker for Windows Executable.eng.lrc 22.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Welcome & Introduction to Black Hat Asia 2017.eng.lrc 22.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gallagher - Preventing CrossSite Req.eng.tsv 22.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/PPI-Geolocation The Next Generation of 802.11 Visualization and Geo-Location - Johnny Cache.eng.text 22.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Bilby - Defeating Win Forensic - Japanese.eng.text 22.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Security Through Design - Making Security Better By Designing for People.eng.text 22.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/IEEE Software Taggant System - Mark Kennedy, Igor Muttik.eng.srt 22.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rooster - DNS Security Issues.eng.text 22.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/XML Out-of-Band Data Retrieval.eng.txt 22.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Inside Out - The Cloud has Never been so Close.eng.tsv 22.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/Picture 1-5.png 22.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Winning the Race to Bare Metal - UEFI Hypervisors - Don Bailey, Martin Mocko.eng.lrc 22.5 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor.eng.tsv 22.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/TeamTNT Explosive Cryptomining.eng.text 22.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/New Trends in FastFlux Networks.eng.tsv 22.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denying Service to DDoS Protection Services.eng.tsv 22.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Gizmo - Rachel Engel.eng.txt 22.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MSF & Telephony - Druid.eng.lrc 22.5 KB
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Make KSMA Great Again The Art of Rooting Android Devices by GPU MMU Features.eng.text 22.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Probabilistic Spying on Encrypted Tunnels.eng.srt 22.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/disasm.c 22.5 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Bypass Control Flow Guard Comprehensively.eng.srt 22.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/Maguro/maguro-v2.py 22.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Detecting Vulnerabilities in Virtual Devices with Conformance Testing.eng.srt 22.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Perl Jam 2 - The Camel Strikes Back.eng.txt 22.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hardware Security Module - Executing Unsigned Code in HSM TEE.eng.srt 22.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Like Lightning From the Cloud Finding RCEs in an Embedded TLS Library.eng.text 22.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Generation of Windows Exploitation Attacking the Common Log File System.eng.srt 22.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/How Economics and Information Security Affects Cyber Crime - Peter Guerra.eng.text 22.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Detecting Vulnerabilities in Virtual Devices with Conformance Testing.eng.lrc 22.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Shattering Illusions in Lock-Free Worlds - Compiler Hardware Behaviors in OS and VMs.eng.srt 22.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool.eng.text 22.4 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.eng.vtt 22.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Bypassing the Maginot Line Remotely Exploit the Hardware Decoder on Smartphone.eng.srt 22.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mobile Malware - Why the Traditional AV Paradigm is Doomed.eng.txt 22.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Hacking a Professional Drone.eng.text 22.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/XML Out-of-Band Data Retrieval.eng.lrc 22.4 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Ultimate Study of Real-Life SSL Issues - Ivan Ristic.eng.lrc 22.4 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Bruce Schneier - Paradigms Lost Engineering vs Risk Management.eng.tsv 22.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/BitTorrent Hacks - Michael Brooks.eng.txt 22.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/ExplosION The Hidden Mines in the Android ION Driver.eng.text 22.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Panel-English.eng.tsv 22.3 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).eng.srt 22.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Akshay Aggarwal - Rapid Threat Modeling.tsv 22.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/BitTorrent Hacks - Michael Brooks.eng.srt 22.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Windows Hibernation File for Fun And Profit - Matthieu Suiche.eng.text 22.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/OPSEC Failures of Spies.eng.text 22.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Side-Channel Attacks on Everyday Applications.eng.tsv 22.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Huawei - From China with Love.eng.srt 22.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Perl Jam 2 - The Camel Strikes Back.eng.lrc 22.3 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Network Security Policy - Best Practices.pdf 22.3 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Network Security Policy - Best Practices.pdf 22.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Wikipedia_Buffer_overflow_files/handheld.css 22.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Dangling_pointer_files/handheld.css 22.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/handheld.css 22.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Stack-Smashing-Protection_files/handheld.css 22.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Badger - The Networked Security State Estimation Toolkit.eng.tsv 22.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gregory S Miles - Travis Schack - Introduction to Global Security Syndicate.eng.vtt 22.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Attacking SDN Infrastructure - Are We Ready for the Next-Gen Networking.eng.txt 22.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/We Can Still Crack You General Unpacking Method For Android Packer (no Root).eng.tsv 22.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unleashing the Power of My 20 Years Old Car.eng.txt 22.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Incident Response @ Scale Building a Next Generation SOC.eng.srt 22.2 KB
- Black Hat USA/Black Hat USA 2012/video/Black Hat USA 2012 captions/Windows 7 Phone Hacking & Exploitation.eng.text 22.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dario Forte (Luncheon) - International Hacking When the cooperation is the only cure.eng.tsv 22.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Point of Sale System Architecture and Security.eng.text 22.2 KB
- Black Hat Asia/Black Hat Singapore 2014/Black Hat Singapore 2014 captions/Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang.eng.text 22.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BluePill Neutralizing Anti-Analysis Behavior in Malware Dissection.eng.vtt 22.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Gizmo - Rachel Engel.eng.lrc 22.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Active 802.11 Fingerprinting - Sergey Bratus, Daniel Peebles, Cory Cornelius, Axel Hansen.eng.srt 22.2 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hide Android Applications in Images.eng.srt 22.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mobile Malware - Why the Traditional AV Paradigm is Doomed.eng.lrc 22.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Metamorphic - Polymorphic Malware DNA - Chet Hosmer.eng.txt 22.2 KB
- Black Hat Asia/Black Hat Japan 2004/Black Hat Japan 2004 speakers.txt 22.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Black Hat Japan 2004 speakers.txt 22.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Overcoming iOS Data Protection to Re-enable iPhone Forensic - Andrey Belenko.eng.vtt 22.1 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Incident Response @ Scale Building a Next Generation SOC.eng.txt 22.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring.eng.tsv 22.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tom Beardsley - Monkeyspaw.eng.srt 22.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/BitTorrent Hacks - Michael Brooks.eng.lrc 22.1 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/Reverse Engineering Compliance.eng.text 22.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Exploiting Social Navigation.eng.text 22.1 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Shunichi-Arai-Winny-Japanese.eng.text 22.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Attacking SDN Infrastructure - Are We Ready for the Next-Gen Networking.eng.lrc 22.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Android Kernel and OS Security Assessment with Iron Crow.eng.txt 22.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mobile Malware - Why the Traditional AV Paradigm is Doomed.eng.vtt 22.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit.eng.vtt 22.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unleashing the Power of My 20 Years Old Car.eng.lrc 22.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/AIModel Mutator Finding Vulnerabilities in TensorFlow.eng.srt 22.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Metamorphic - Polymorphic Malware DNA - Chet Hosmer.eng.lrc 22.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TOR ALL-THE-THINGS.eng.tsv 22.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Owfuzz WiFi Nightmare.eng.srt 21.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Caezar Cerrudo - Demystifying SQL - Oracle.srt 21.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C Foster - BlackHat Standup.eng.txt 21.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobile Phone Messaging Anti-Forensics - Zane Lackey, Luis Miras.eng.vtt 21.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit - Advanced command injection exploitation - cmd.exe in the 00's - David D Rude.eng.tsv 21.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Android Kernel and OS Security Assessment with Iron Crow.eng.vtt 21.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pindemonium - A DBI-Based Generic Unpacker for Windows Executable.eng.vtt 21.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Incident Response @ Scale Building a Next Generation SOC.eng.lrc 21.9 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/Roboo.pm 21.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Truncating TLS Connections to Violate Beliefs in Web Applications.eng.text 21.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Neerumalla - SQL Inject.eng.text 21.9 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Two Bugs With One PoC Rooting Pixel 6 From Android 12 to Android 13.eng.text 21.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Android Kernel and OS Security Assessment with Iron Crow.eng.lrc 21.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CMX - IEEE Clean File Metadata Exchange.eng.tsv 21.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Attacking Mobile Broadband Modems Like a Criminal Would.eng.tsv 21.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Waldron - VOIP Security Essentials.eng.txt 21.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-i386.h 21.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/network-security/dns-id-hacking.html 21.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Inside Web Attacks - The Real Payloads.eng.srt 21.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Rob Karas - Open Source Monitoring.eng.text 21.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Darrin Barrall - Shakespearean Shellcode.srt 21.8 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Is WebAssembly Really Safe - Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way.eng.srt 21.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Ultimate Study of Real-Life SSL Issues - Ivan Ristic.eng.srt 21.7 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/README.html 21.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Samsung Pay - Tokenized Numbers Flaws and Issues.eng.srt 21.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C Foster - BlackHat Standup.eng.lrc 21.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Trainor - The Statue of Liberty.eng.text 21.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Next-Generation of Exploit Kit Detection By Building Simulated Obfuscators.eng.vtt 21.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge.eng.text 21.7 KB
- Black Hat USA/Black Hat USA 2002/presentations/sassaman/chaum-acm-1981.txt 21.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BluePill Neutralizing Anti-Analysis Behavior in Malware Dissection.eng.txt 21.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_05.jpe 21.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Gizmo - Rachel Engel.eng.vtt 21.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/keynote-Raisuke-Miyawaki-English-Translation.eng.text 21.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Breaking Bootloaders on the Cheap.eng.vtt 21.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/API Deobfuscator - Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis.eng.txt 21.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Yuan Fan - MatriXay.eng.srt 21.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Brosch - Runtime Packers Hidden Prob.eng.txt 21.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/C11 Metaprogramming Applied to Software Obfuscation.eng.text 21.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Waldron - VOIP Security Essentials.eng.lrc 21.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Data-Only Pwning Microsoft Windows Kernel.eng.txt 21.6 KB
- Black Hat USA/Black Hat USA 2018/Black Hat USA 2018 captions/Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines-tagged.eng.text 21.5 KB
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Exploiting Live Virtual Machine Migration - Jon Oberheide.eng.text 21.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Next-Generation of Exploit Kit Detection By Building Simulated Obfuscators.eng.txt 21.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/How to Wear Your Password.eng.text 21.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BluePill Neutralizing Anti-Analysis Behavior in Malware Dissection.eng.lrc 21.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Darrin Barrall - Shakespearean Shellcode.txt 21.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Android Commercial Spyware Disease and Medication.eng.vtt 21.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Triaging Crashed With Backward Taint Analysis For Arm Architecture.eng.srt 21.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unleashing the Power of My 20 Years Old Car.eng.vtt 21.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Waldron - VOIP Security Essentials.eng.srt 21.5 KB
- Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 captions/I Block You Because I Love You Social Account Identification Attack Against a Website Visitor.eng.text 21.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Metamorphic - Polymorphic Malware DNA - Chet Hosmer.eng.srt 21.5 KB
- Black Hat Windows/Black Hat Windows 2003/Video/Black Hat Windows 2003 captions/Exploiting DCOM - Yoshiaki Komoriya, Hidenobu Sekiu.eng.text 21.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ken Hines - Using Causal Analysis.eng.tsv 21.4 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hardware Security Module - Executing Unsigned Code in HSM TEE.eng.txt 21.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds.eng.tsv 21.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/APT Attribution and DNS Profiling.eng.vtt 21.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denial of Service as a Service - Asymmetrical Warfare at its Finest.eng.txt 21.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Data-Only Pwning Microsoft Windows Kernel.eng.lrc 21.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Next-Generation of Exploit Kit Detection By Building Simulated Obfuscators.eng.lrc 21.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Attacking SDN Infrastructure - Are We Ready for the Next-Gen Networking.eng.vtt 21.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/API Deobfuscator - Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis.eng.lrc 21.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Bypassing Browser Security Policies for Fun and Profit.eng.text 21.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android.eng.text 21.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Understanding the IoT Threat Landscape.eng.tsv 21.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Brosch - Runtime Packers Hidden Prob.eng.lrc 21.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Password Hashing - The Future is Now.eng.text 21.3 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Operation Clairvoyance How APT Groups Spy on the Media Industry.eng.tsv 21.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/SQL Injection Worms for Fun and Profit - Justin Clarke.eng.text 21.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/David Worth - Cryptographic Port Knocking.eng.text 21.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/operand_ia32.c 21.2 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Moniz - XSSploitation - Japanese.eng.text 21.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gallagher - Preventing CrossSite Req.eng.vtt 21.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hardware Security Module - Executing Unsigned Code in HSM TEE.eng.lrc 21.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Darrin Barrall - Shakespearean Shellcode.lrc 21.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denial of Service as a Service - Asymmetrical Warfare at its Finest.eng.lrc 21.2 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.eng.tsv 21.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Troika of E-Discovery Ethics, ESI, and Expertise in a Web 2.0 World - Richard Costa.eng.srt 21.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/DroidGuard A Deep Dive into SafetyNet.eng.text 21.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit.eng.tsv 21.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Function Rerouting from Kernel Land with Hades - Jason Raber.eng.vtt 21.2 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/AutoSpear Towards Automatically Bypassing and Inspecting Web Application Firewalls.eng.text 21.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Renaud Bidou - Dirty BlackMail DoS Story.txt 21.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Viral Video - Exploiting SSRF in Video Converters.eng.text 21.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kismet and MSF - Mike Kershaw.eng.txt 21.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Overcoming iOS Data Protection to Re-enable iPhone Forensic - Andrey Belenko.eng.tsv 21.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Hunting and Exploiting Recursive MMIO Flaws in QEMU KVM.eng.txt 21.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box.eng.text 21.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Function Rerouting from Kernel Land with Hades - Jason Raber.eng.txt 21.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/vmmirror.txt 21.1 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Hunting and Exploiting Recursive MMIO Flaws in QEMU KVM.eng.vtt 21.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dungeons Dragons and Security.eng.text 21.1 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/John Bailey - SOCKS, PPTP & IPSec Implementation & Futures.eng.text 21.0 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Marcus Ranum - How to REALLY Secure the Internet.eng.text 21.0 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Daji Sanai - Promiscuous Node Detection Using ARP Packets.eng.text 21.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Untwining Twine.eng.text 21.0 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Codema Attack Controlling Your Smart Home Through Dangling Management Channels.eng.srt 21.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/David_LeBlanc-Whats-Exploitable.aspx_files/WebResource.js 21.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.eng.tsv 21.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/My Bro The ELK Obtaining Context From Security Events.eng.srt 21.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Active 802.11 Fingerprinting - Sergey Bratus, Daniel Peebles, Cory Cornelius, Axel Hansen.eng.txt 20.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kismet and MSF - Mike Kershaw.eng.lrc 20.9 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Commix - Detecting and Exploiting Command Injection Flaws.eng.tsv 20.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Hunting and Exploiting Recursive MMIO Flaws in QEMU KVM.eng.lrc 20.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Familiarity Breeds Contempt The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities - Sandy Clark, Matt Blaze.eng.tsv 20.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Function Rerouting from Kernel Land with Hades - Jason Raber.eng.lrc 20.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Evasion of High-End IPS Devices in the Age of IPv6.eng.tsv 20.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Renaud Bidou - Dirty BlackMail DoS Story.lrc 20.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kimball Code Integrate Vunl audit.eng.txt 20.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Write Once, Pwn Anywhere.eng.tsv 20.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Yuan Fan - SQL Injection Detection.eng.txt 20.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keystone Engine - Next Generation Assembler Framework.eng.txt 20.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MSF & Telephony - Druid.eng.vtt 20.8 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/IEEE Software Taggant System - Mark Kennedy, Igor Muttik.eng.vtt 20.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/MadHat, Simple Nomad - SPA.tsv 20.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Charge Your Device with the Latest Malware.eng.srt 20.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Using the Cisco IOS Firewall to Allow Java Applets From Kno.pdf 20.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Using the Cisco IOS Firewall to Allow Java Applets From Kno.pdf 20.8 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Cops and Robbers - Cheating Las Vegas - Jeff Jonas.eng.text 20.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Defeating the Transparency Feature of DBI.eng.text 20.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Generation of Windows Exploitation Attacking the Common Log File System.eng.tsv 20.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Probabilistic Spying on Encrypted Tunnels.eng.vtt 20.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Dang - Understanding - Targeted - Attacks - with - Office - Docs.jp.eng.text 20.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/format-string/bruteforce.html 20.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Active 802.11 Fingerprinting - Sergey Bratus, Daniel Peebles, Cory Cornelius, Axel Hansen.eng.lrc 20.7 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hardware Security Module - Executing Unsigned Code in HSM TEE.eng.vtt 20.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keystone Engine - Next Generation Assembler Framework.eng.lrc 20.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Codema Attack Controlling Your Smart Home Through Dangling Management Channels.eng.txt 20.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Harbour/Whitepaper/bh-usa-07-harbour-WP.pdf 20.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Breaking Bootloaders on the Cheap.eng.txt 20.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/USMA Share Kernel Code With Me.eng.txt 20.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-sparc.h 20.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Andrew Stevens - How Next Generation Application Proxies Protect Against the Latest Attacks and Intrusions.eng.srt 20.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/What's the DFIRence for ICS.eng.text 20.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/AlephOne_Smashing_The_Stack_files/urchin.js 20.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/urchin.js 20.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-USNAnalysis_files/urchin.js 20.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Murat_buffer-overflows-demystified_files/urchin.js 20.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/OAuth - Securing the Insecure - Khash Kiani.eng.text 20.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Detecting Vulnerabilities in Virtual Devices with Conformance Testing.eng.vtt 20.6 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Simple Spyware Androids Invisible Foreground Services and How to (Ab)use Them.eng.text 20.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SQUIRE - Project Cowbird.eng.srt 20.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hacking HTTP 2 - New Attacks on the Internet's Next Generation Foundation.eng.vtt 20.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kimball Code Integrate Vunl audit.eng.lrc 20.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Yuan Fan - SQL Injection Detection.eng.lrc 20.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Brosch - Runtime Packers Hidden Prob.eng.srt 20.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Renaud Bidou - Dirty BlackMail DoS Story.srt 20.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Shattering Illusions in Lock-Free Worlds - Compiler Hardware Behaviors in OS and VMs.eng.vtt 20.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/elf.c 20.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/USMA Share Kernel Code With Me.eng.vtt 20.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils-bh.tar.gz 20.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Breaking Bootloaders on the Cheap.eng.lrc 20.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Codema Attack Controlling Your Smart Home Through Dangling Management Channels.eng.lrc 20.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/api.c 20.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/USMA Share Kernel Code With Me.eng.lrc 20.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/David_LeBlanc-Whats-Exploitable.aspx_files/WebResource_002.js 20.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Generation of Windows Exploitation Attacking the Common Log File System.eng.vtt 20.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick - Chambet - Google Attacks.eng.srt 20.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds.eng.srt 20.4 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds_en.srt 20.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/APT Attribution and DNS Profiling.eng.tsv 20.4 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/README.txt 20.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Morana - Sec Into Software LifeCycle.eng.text 20.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Ptacek_Newsham-Initial_StackGuard_Weaknesses.html 20.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pindemonium - A DBI-Based Generic Unpacker for Windows Executable.eng.tsv 20.4 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Welcome & Introduction to Black Hat Asia 2017.eng.tsv 20.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Unleash the Infection Monkey - A Modern Alternative to Pen-Tests.eng.text 20.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/perl-exploit.html 20.4 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/DABiD - The Powerful Interactive Android Debugger for Android Malware Analysis.eng.txt 20.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Abuse of CPE Devices and Recommended Fixes.eng.text 20.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/SSL Validation Checking vs. Go(ing) to Fail.eng.text 20.4 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Huawei - From China with Love.eng.vtt 20.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/David_LeBlanc-Whats-Exploitable.aspx_files/Telligent_Modal.js 20.3 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Incident Response @ Scale Building a Next Generation SOC.eng.vtt 20.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/BitTorrent Hacks - Michael Brooks.eng.vtt 20.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Benninger - Find gold Browser Cache.eng.text 20.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Thinking Outside the JIT Compiler.eng.srt 20.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gregory S Miles - Travis Schack - Introduction to Global Security Syndicate.eng.tsv 20.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/s_code.js 20.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/s_code.js 20.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Metamorphic - Polymorphic Malware DNA - Chet Hosmer.eng.vtt 20.2 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Perl Jam 2 - The Camel Strikes Back.eng.tsv 20.2 KB
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Back - connect to the Connected Car. Search for Vulnerabilities in the VW Electric Car.eng.text 20.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/DABiD - The Powerful Interactive Android Debugger for Android Malware Analysis.eng.lrc 20.2 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/XML Out-of-Band Data Retrieval.eng.tsv 20.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Owfuzz WiFi Nightmare.eng.vtt 20.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Troika of E-Discovery Ethics, ESI, and Expertise in a Web 2.0 World - Richard Costa.eng.txt 20.1 KB
- Black Hat Asia/Black Hat Singapore 2020/Black Hat Singapore 2020 captions/Hey Google, Activate Spyware - When Google Assistant Uses a Vulnerability as a Feature.eng.text 20.1 KB
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/One Flip is All It Takes Identifying Syscall-Guard Variables for Data-Only Attacks.eng.text 20.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobile Phone Messaging Anti-Forensics - Zane Lackey, Luis Miras.eng.tsv 20.1 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Bypassing the Maginot Line Remotely Exploit the Hardware Decoder on Smartphone.eng.vtt 20.1 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Shattering Illusions in Lock-Free Worlds - Compiler Hardware Behaviors in OS and VMs.eng.txt 20.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Fox in the Hen House (UPnP IGD) - Jonathan Squire.eng.vtt 20.1 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Bypass Control Flow Guard Comprehensively.eng.vtt 20.1 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Richard Thieme - Keynote.eng.text 20.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/IEEE Software Taggant System - Mark Kennedy, Igor Muttik.eng.tsv 20.1 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Analysis of Microsoft Office password protection systems, and survey of encryption holes in other MS Windows applications - Andrey Malyshev.eng.tsv 20.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Ultimate Study of Real-Life SSL Issues - Ivan Ristic.eng.vtt 20.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Android Commercial Spyware Disease and Medication.eng.txt 20.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hide Android Applications in Images.eng.vtt 20.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Active 802.11 Fingerprinting - Sergey Bratus, Daniel Peebles, Cory Cornelius, Axel Hansen.eng.vtt 20.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/addlibrary.c 20.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).eng.vtt 20.0 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/Tool/w2k_load.exe 20.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Perry/Extras/Cited_Work/115-two-hop-paths.txt 20.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Owfuzz WiFi Nightmare.eng.txt 20.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Data-Only Pwning Microsoft Windows Kernel.eng.srt 20.0 KB
- Black Hat Europe/Black Hat Europe 2012/Video/Black Hat Europe 2012 captions/The Pwnage Saga Continues.eng.text 20.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Troika of E-Discovery Ethics, ESI, and Expertise in a Web 2.0 World - Richard Costa.eng.lrc 20.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/AIModel Mutator Finding Vulnerabilities in TensorFlow.eng.txt 20.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Probabilistic Spying on Encrypted Tunnels.eng.tsv 20.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/From Redmond with Love - Katie Moussouris.eng.srt 19.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Shattering Illusions in Lock-Free Worlds - Compiler Hardware Behaviors in OS and VMs.eng.lrc 19.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Sarah Gordon - Privacy Do as I Say Not as I Do.eng.text 19.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Shawn Moyer - Owning The C-Suite.text 19.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).eng.txt 19.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Android Commercial Spyware Disease and Medication.eng.lrc 19.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Unbreakable Oracle with Metasploit - Chris Gates.eng.srt 19.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Heap Spray Detection with Heap Inspector - Aaron LeMasters.eng.srt 19.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/SVG - Exploiting Browsers without Image Parsing Bugs.eng.text 19.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Inside Web Attacks - The Real Payloads.eng.vtt 19.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Attacking SDN Infrastructure - Are We Ready for the Next-Gen Networking.eng.tsv 19.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Charge Your Device with the Latest Malware.eng.tsv 19.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Owfuzz WiFi Nightmare.eng.lrc 19.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Free-space Quantum Key Distribution at GHz Transmission Rates - Joshua Bienfang.eng.srt 19.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Big Data for Web Application Security.eng.text 19.8 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hide Android Applications in Images.eng.tsv 19.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Waldron - VOIP Security Essentials.eng.vtt 19.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/AIModel Mutator Finding Vulnerabilities in TensorFlow.eng.vtt 19.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Caezar Cerrudo - Demystifying SQL - Oracle.txt 19.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Caezar Cerrudo - Demystifying SQL - Oracle.vtt 19.8 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/AIModel Mutator Finding Vulnerabilities in TensorFlow.eng.lrc 19.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mobile Malware - Why the Traditional AV Paradigm is Doomed.eng.tsv 19.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tom Beardsley - Monkeyspaw.eng.vtt 19.7 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Huawei - From China with Love.eng.txt 19.7 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unleashing the Power of My 20 Years Old Car.eng.tsv 19.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Winning the Race to Bare Metal - UEFI Hypervisors - Don Bailey, Martin Mocko.eng.srt 19.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/html/headbak2.jpg 19.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Samsung Pay - Tokenized Numbers Flaws and Issues.eng.vtt 19.7 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Is WebAssembly Really Safe - Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way.eng.txt 19.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).eng.lrc 19.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Affiliate Programs Legitimate Business or Fueling Cybercrime - Bradley Anstis.eng.text 19.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Bypass CFG in Chrome.eng.srt 19.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/obj/Debug/ResolveAssemblyReference.cache 19.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/resolv.c 19.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Learn How to Control Every Room at a Luxury Hotel Remotely.eng.text 19.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Certificate Bypass - Hiding and Executing Malware from a Digitally Signed Executable.eng.text 19.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Deactivate the Rootkit - Alfredo Ortega.eng.text 19.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Troika of E-Discovery Ethics, ESI, and Expertise in a Web 2.0 World - Richard Costa.eng.vtt 19.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Yuan Fan - MatriXay.eng.vtt 19.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hacking HTTP 2 - New Attacks on the Internet's Next Generation Foundation.eng.txt 19.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Partial-Chris-Eagle-Japanese-Translated.eng.text 19.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Android Kernel and OS Security Assessment with Iron Crow.eng.tsv 19.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Metamorphic - Polymorphic Malware DNA - Chet Hosmer.eng.tsv 19.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Caezar Cerrudo - Demystifying SQL - Oracle.lrc 19.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MD5 Collisions - Marc Bevand.eng.srt 19.6 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Huawei - From China with Love.eng.lrc 19.6 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.eng.text 19.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick Chambert - Managing MSIE Security in Corporate Networks by Creating Custom Internet Zones.eng.tsv 19.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Codema Attack Controlling Your Smart Home Through Dangling Management Channels.eng.vtt 19.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Is WebAssembly Really Safe - Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way.eng.vtt 19.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Over the Edge - Silently Owning Windows 10's Secure Browser.eng.text 19.5 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Is WebAssembly Really Safe - Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way.eng.lrc 19.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Andrew Stevens - How Next Generation Application Proxies Protect Against the Latest Attacks and Intrusions.eng.vtt 19.5 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/WebKit Everywhere - Secure or Not.eng.text 19.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hacking HTTP 2 - New Attacks on the Internet's Next Generation Foundation.eng.lrc 19.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Darrin Barrall - Shakespearean Shellcode.vtt 19.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Inside Out - The Cloud has Never been so Close.eng.text 19.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BluePill Neutralizing Anti-Analysis Behavior in Malware Dissection.eng.tsv 19.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Detecting Vulnerabilities in Virtual Devices with Conformance Testing.eng.tsv 19.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MSF & Telephony - Druid.eng.tsv 19.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Ultimate Study of Real-Life SSL Issues - Ivan Ristic.eng.tsv 19.3 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/Bruce Schneier - Paradigms Lost Engineering vs Risk Management.eng.text 19.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Side-Channel Attacks on Everyday Applications.eng.text 19.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Free-space Quantum Key Distribution at GHz Transmission Rates - Joshua Bienfang.eng.txt 19.3 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Bypassing the Maginot Line Remotely Exploit the Hardware Decoder on Smartphone.eng.tsv 19.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tom Beardsley - Monkeyspaw.eng.tsv 19.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/relinject.c 19.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Fuzzing Proprietary SCADA Protocols - Sergey Bratus.eng.srt 19.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/mips32.c 19.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/The Conficker Mystery - Mikko Hypponen.eng.text 19.2 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/From Redmond with Love - Katie Moussouris.eng.txt 19.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Triaging Crashed With Backward Taint Analysis For Arm Architecture.eng.vtt 19.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Dig Into the Attack Surface of PDF and Gain 100 CVEs in 1 Year.eng.srt 19.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/David_LeBlanc-Whats-Exploitable.aspx.html 19.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Next-Generation of Exploit Kit Detection By Building Simulated Obfuscators.eng.tsv 19.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denying Service to DDoS Protection Services.eng.text 19.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Bypass Control Flow Guard Comprehensively.eng.txt 19.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/jay_beale/obscurity-revisited.html 19.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Is Your Timespace Safe - Time and Position Spoofing Opensourcely.eng.text 19.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds.eng.txt 19.2 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds_en.txt 19.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Chris Evans, Thompson - Self-defending.text 19.2 KB
- Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 captions/Dario Forte (Luncheon) - International Hacking When the cooperation is the only cure.eng.text 19.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Free-space Quantum Key Distribution at GHz Transmission Rates - Joshua Bienfang.eng.lrc 19.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Yuan Fan - SQL Injection Detection.eng.srt 19.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/80211.h 19.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/80211.h 19.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Who Did It - How We Attributed Campaigns of a Cyber Mercenary.eng.text 19.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/From Redmond with Love - Katie Moussouris.eng.lrc 19.0 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring.eng.text 19.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Macsploitation with Metasploit - Dino Dai Zovi.eng.srt 19.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denial of Service as a Service - Asymmetrical Warfare at its Finest.eng.tsv 19.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds.eng.lrc 19.0 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds_en.lrc 19.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hardware Security Module - Executing Unsigned Code in HSM TEE.eng.tsv 19.0 KB
- Black Hat Asia/Black Hat Singapore 2021/Black Hat Singapore 2021 captions/In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor.eng.text 19.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Bypass Control Flow Guard Comprehensively.eng.lrc 19.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Inside Web Attacks - The Real Payloads.eng.txt 19.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Temporal Reverse Engineering - Danny Quist, Colin Ames.eng.srt 18.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/pk-1.0_pre1/minewt.c 18.9 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Metasploit - Advanced command injection exploitation - cmd.exe in the 00's - David D Rude.eng.text 18.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C Foster - BlackHat Standup.eng.tsv 18.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/My Google Glass Sees Your Passwords.eng.text 18.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/BitTorrent Hacks - Michael Brooks.eng.tsv 18.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadTunnel - How Do I Get Big Brother Power.eng.srt 18.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/TOR ALL-THE-THINGS.eng.text 18.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Hunting and Exploiting Recursive MMIO Flaws in QEMU KVM.eng.tsv 18.9 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Incident Response @ Scale Building a Next Generation SOC.eng.tsv 18.8 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds.eng.vtt 18.8 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds_en.vtt 18.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MD5 Collisions - Marc Bevand.eng.txt 18.8 KB
- Black Hat DC/Black Hat DC 2010/Black Hat DC 2010 captions/Mac OS X Physical Memory Analysis - Matthieu Suiche.eng.text 18.8 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Inside Web Attacks - The Real Payloads.eng.lrc 18.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/CMX - IEEE Clean File Metadata Exchange.eng.text 18.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Renaud Bidou - Dirty BlackMail DoS Story.vtt 18.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Waldron - VOIP Security Essentials.eng.tsv 18.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SQUIRE - Project Cowbird.eng.vtt 18.7 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Fingerprinting Web Application Platforms by Variations in PNG Implementations.eng.srt 18.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Lauren Oudot - Digital Active Self Defence.eng.text 18.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Charge Your Device with the Latest Malware.eng.vtt 18.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SQUIRE - Project Cowbird.eng.tsv 18.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Frei and May - Speed of Insecurity.eng.text 18.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kismet and MSF - Mike Kershaw.eng.tsv 18.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Samsung Pay - Tokenized Numbers Flaws and Issues.eng.txt 18.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Freeze Drying for Capturing Environment-Sensitive Malware Alive.eng.text 18.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MD5 Collisions - Marc Bevand.eng.lrc 18.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Function Rerouting from Kernel Land with Hades - Jason Raber.eng.tsv 18.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keystone Engine - Next Generation Assembler Framework.eng.tsv 18.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Data-Only Pwning Microsoft Windows Kernel.eng.vtt 18.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Brosch - Runtime Packers Hidden Prob.eng.vtt 18.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Heap Spray Detection with Heap Inspector - Aaron LeMasters.eng.txt 18.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Gizmo - Rachel Engel.eng.tsv 18.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Data-Only Pwning Microsoft Windows Kernel.eng.tsv 18.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Veysset and Butti - Wifi Adv Stealth.eng.txt 18.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Yuan Fan - MatriXay.eng.txt 18.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Samsung Pay - Tokenized Numbers Flaws and Issues.eng.lrc 18.5 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Breaking Bootloaders on the Cheap.eng.tsv 18.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Free-space Quantum Key Distribution at GHz Transmission Rates - Joshua Bienfang.eng.vtt 18.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/Changelog 18.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Winning the Race to Bare Metal - UEFI Hypervisors - Don Bailey, Martin Mocko.eng.tsv 18.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/elfsh_hooks.c 18.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Akshay Aggarwal - Rapid Threat Modeling.text 18.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Codema Attack Controlling Your Smart Home Through Dangling Management Channels.eng.tsv 18.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/USMA Share Kernel Code With Me.eng.tsv 18.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Yuan Fan - MatriXay.eng.lrc 18.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds.eng.text 18.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Heap Spray Detection with Heap Inspector - Aaron LeMasters.eng.lrc 18.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/aproxy_hooks.c 18.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/neGlobal_100106.js 18.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/neGlobal_100106.js 18.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/We Can Still Crack You General Unpacking Method For Android Packer (no Root).eng.text 18.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick - Chambet - Google Attacks.eng.txt 18.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Thinking Outside the JIT Compiler.eng.vtt 18.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta.eng.srt 18.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta_en.srt 18.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacking the Smart Grid - Tony Flick.eng.tsv 18.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Hurley - WorldWide War Drive.eng.text 18.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/From Redmond with Love - Katie Moussouris.eng.vtt 18.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Veysset and Butti - Wifi Adv Stealth.eng.lrc 18.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/Picture 2.png 18.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-bsd.h 18.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/format-string/alpha.html 18.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Understanding the IoT Threat Landscape.eng.text 18.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/New Trends in FastFlux Networks.eng.text 18.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Badger - The Networked Security State Estimation Toolkit.eng.text 18.1 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0.eng.text 18.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick - Chambet - Google Attacks.eng.vtt 18.1 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/DABiD - The Powerful Interactive Android Debugger for Android Malware Analysis.eng.tsv 18.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick - Chambet - Google Attacks.eng.lrc 18.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MD5 Collisions - Marc Bevand.eng.vtt 18.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Unbreakable Oracle with Metasploit - Chris Gates.eng.vtt 18.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Charles Edge - Attacking Apples Xsan.eng.srt 18.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Evasion of High-End IPS Devices in the Age of IPv6.eng.text 18.0 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Android Commercial Spyware Disease and Medication.eng.tsv 18.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization.eng.text 18.0 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/Tool/KLUP.sys 18.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/alpha64.c 18.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Winning the Race to Bare Metal - UEFI Hypervisors - Don Bailey, Martin Mocko.eng.vtt 18.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Troika of E-Discovery Ethics, ESI, and Expertise in a Web 2.0 World - Richard Costa.eng.tsv 18.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Owfuzz WiFi Nightmare.eng.tsv 18.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Heap Spray Detection with Heap Inspector - Aaron LeMasters.eng.vtt 17.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/OpenQVis/GPL.LICENCE 17.9 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Darren Manners.eng.json 17.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Attacking Mobile Broadband Modems Like a Criminal Would.eng.text 17.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Familiarity Breeds Contempt The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities - Sandy Clark, Matt Blaze.eng.text 17.9 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Operation Clairvoyance How APT Groups Spy on the Media Industry.eng.text 17.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Shattering Illusions in Lock-Free Worlds - Compiler Hardware Behaviors in OS and VMs.eng.tsv 17.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Don t Trust Your USB How to Find Bugs in USB Device Drivers.eng.text 17.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/API Deobfuscator - Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis.eng.srt 17.9 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Renaud Bidou - Dirty BlackMail DoS Story.tsv 17.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Brosch - Runtime Packers Hidden Prob.eng.tsv 17.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Active 802.11 Fingerprinting - Sergey Bratus, Daniel Peebles, Cory Cornelius, Axel Hansen.eng.tsv 17.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Hacker_Court/Extras/Getta_statement.pdf 17.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Bypass CFG in Chrome.eng.txt 17.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Bypass CFG in Chrome.eng.vtt 17.8 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Huawei - From China with Love.eng.tsv 17.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Ken Hines - Using Causal Analysis.eng.text 17.7 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Welcome & Introduction to Black Hat Asia 2017.eng.text 17.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.eng.text 17.7 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Bypass CFG in Chrome.eng.lrc 17.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/API Deobfuscator - Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis.eng.tsv 17.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/LICENSE 17.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/LICENSE 17.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Darrin Barrall - Shakespearean Shellcode.tsv 17.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Fuzzing Proprietary SCADA Protocols - Sergey Bratus.eng.vtt 17.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Pindemonium - A DBI-Based Generic Unpacker for Windows Executable.eng.text 17.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dark Side of the DNS Force.eng.srt 17.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Panel-English.eng.text 17.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Patton/Extras/code/COPYING 17.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Write Once, Pwn Anywhere.eng.text 17.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/COPYING 17.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/COPYING 17.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Triaging Crashed With Backward Taint Analysis For Arm Architecture.eng.txt 17.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Dig Into the Attack Surface of PDF and Gain 100 CVEs in 1 Year.eng.vtt 17.5 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/The Perl Jam 2 - The Camel Strikes Back.eng.text 17.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Temporal Reverse Engineering - Danny Quist, Colin Ames.eng.txt 17.5 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hacking HTTP 2 - New Attacks on the Internet's Next Generation Foundation.eng.tsv 17.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Playing by Virtual Security Rules How Virtualization Changes Everything and What to Do about It - Steve Pate.eng.srt 17.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kimball Code Integrate Vunl audit.eng.srt 17.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/buffer-overrun.html 17.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Unbreakable Oracle with Metasploit - Chris Gates.eng.txt 17.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Macsploitation with Metasploit - Dino Dai Zovi.eng.vtt 17.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Temporal Reverse Engineering - Danny Quist, Colin Ames.eng.vtt 17.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Fox in the Hen House (UPnP IGD) - Jonathan Squire.eng.txt 17.4 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Triaging Crashed With Backward Taint Analysis For Arm Architecture.eng.lrc 17.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Temporal Reverse Engineering - Danny Quist, Colin Ames.eng.lrc 17.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/grammar.c 17.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/XML Out-of-Band Data Retrieval.eng.text 17.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Fuzzing Proprietary SCADA Protocols - Sergey Bratus.eng.txt 17.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Yuan Fan - SQL Injection Detection.eng.vtt 17.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Unbreakable Oracle with Metasploit - Chris Gates.eng.lrc 17.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Squire_Fox_in_the_Hen_House/UPnPwn-0.8.0-bh.tgz 17.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Fox in the Hen House (UPnP IGD) - Jonathan Squire.eng.lrc 17.2 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S5.windows2003.Utility.Lock.1 17.2 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/AIModel Mutator Finding Vulnerabilities in TensorFlow.eng.tsv 17.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Macsploitation with Metasploit - Dino Dai Zovi.eng.txt 17.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Fuzzing Proprietary SCADA Protocols - Sergey Bratus.eng.lrc 17.1 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Caezar Cerrudo - Demystifying SQL - Oracle.tsv 17.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Free-space Quantum Key Distribution at GHz Transmission Rates - Joshua Bienfang.eng.tsv 17.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Attacking SDN Infrastructure - Are We Ready for the Next-Gen Networking.eng.text 17.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Main.frm 17.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Main.frm 17.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds.eng.tsv 17.1 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds_en.tsv 17.1 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Overcoming iOS Data Protection to Re-enable iPhone Forensic - Andrey Belenko.eng.text 17.1 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).eng.tsv 17.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta.eng.txt 17.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta_en.txt 17.1 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android.eng.txt 17.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Unleashing the Power of My 20 Years Old Car.eng.text 17.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Yuan Fan - SQL Injection Detection.eng.tsv 17.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs.eng.srt 17.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Gregory S Miles - Travis Schack - Introduction to Global Security Syndicate.eng.text 17.0 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Is WebAssembly Really Safe - Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way.eng.tsv 17.0 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.eng.text 17.0 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Macsploitation with Metasploit - Dino Dai Zovi.eng.lrc 17.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/altplt.c 17.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Thinking Outside the JIT Compiler.eng.txt 17.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Dig Into the Attack Surface of PDF and Gain 100 CVEs in 1 Year.eng.txt 16.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Ouroboros - Tearing Xen Hypervisor With the Snake.eng.srt 16.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta.eng.lrc 16.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta_en.lrc 16.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/__utm.js 16.9 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/The Applications Of Deep Learning On Traffic Identification.eng.srt 16.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kimball Code Integrate Vunl audit.eng.tsv 16.9 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Android Kernel and OS Security Assessment with Iron Crow.eng.text 16.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Gallagher - Preventing CrossSite Req.eng.text 16.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Beyond the Application - Cellular Privacy Regulatory Space.eng.srt 16.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Fingerprinting Web Application Platforms by Variations in PNG Implementations.eng.vtt 16.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android.eng.lrc 16.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Metamorphic - Polymorphic Malware DNA - Chet Hosmer.eng.text 16.9 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Inside Web Attacks - The Real Payloads.eng.tsv 16.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta.eng.vtt 16.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta_en.vtt 16.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Thinking Outside the JIT Compiler.eng.lrc 16.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/s_code_remote.js 16.8 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/ROPInjector Using Return Oriented Programming For Polymorphism & Antivirus Evas.eng.srt 16.8 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Dig Into the Attack Surface of PDF and Gain 100 CVEs in 1 Year.eng.lrc 16.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/BluePill Neutralizing Anti-Analysis Behavior in Malware Dissection.eng.text 16.8 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Bypass Control Flow Guard Comprehensively.eng.tsv 16.8 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Malicious File for Exploiting Forensic Software.eng.srt 16.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image1.png 16.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/operand_ia32.c 16.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Andrew Stevens - How Next Generation Application Proxies Protect Against the Latest Attacks and Intrusions.eng.text 16.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Beyond the Application - Cellular Privacy Regulatory Space.eng.txt 16.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Mobile Malware - Why the Traditional AV Paradigm is Doomed.eng.text 16.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/trace.c 16.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Samsung Pay - Tokenized Numbers Flaws and Issues.eng.tsv 16.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MD5 Collisions - Marc Bevand.eng.tsv 16.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadTunnel - How Do I Get Big Brother Power.eng.vtt 16.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/From Redmond with Love - Katie Moussouris.eng.tsv 16.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Playing by Virtual Security Rules How Virtualization Changes Everything and What to Do about It - Steve Pate.eng.txt 16.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/libelfsh-ref.txt 16.6 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S5.windows2003.Utility.Lockdown 16.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/elffile.c 16.6 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S5.windows2003.Utility.Lock.2 16.6 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Yuan Fan - MatriXay.eng.tsv 16.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/evideo-scroller.js 16.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Next-Generation of Exploit Kit Detection By Building Simulated Obfuscators.eng.text 16.5 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 1 7.srt 16.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/DataThief Folder/Main.frm 16.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Denial of Service as a Service - Asymmetrical Warfare at its Finest.eng.text 16.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/rb-global.css 16.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/rb-global.css 16.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Charles Edge - Attacking Apples Xsan.eng.vtt 16.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Beyond the Application - Cellular Privacy Regulatory Space.eng.lrc 16.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Playing by Virtual Security Rules How Virtualization Changes Everything and What to Do about It - Steve Pate.eng.lrc 16.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/API Deobfuscator - Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis.eng.vtt 16.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/MadHat, Simple Nomad - SPA.text 16.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs.eng.txt 16.4 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/hfa384x.c 16.4 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/addspace.c 16.3 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Hunting and Exploiting Recursive MMIO Flaws in QEMU KVM.eng.text 16.3 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Mobile Phone Messaging Anti-Forensics - Zane Lackey, Luis Miras.eng.text 16.3 KB
- Black Hat Windows/Black Hat Windows 2001/Audio/Black Hat Windows 2001 captions/Analysis of Microsoft Office password protection systems, and survey of encryption holes in other MS Windows applications - Andrey Malyshev.eng.text 16.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Veysset and Butti - Wifi Adv Stealth.eng.srt 16.3 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/IEEE Software Taggant System - Mark Kennedy, Igor Muttik.eng.text 16.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/proxmon.py 16.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/Javascript.js 16.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Probabilistic Spying on Encrypted Tunnels.eng.text 16.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs.eng.lrc 16.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/OEM Finder Hunting Vulnerable OEM IoT Devices at Scale.eng.srt 16.2 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android.eng.srt 16.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/dwarf2-trans.c 16.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Playing by Virtual Security Rules How Virtualization Changes Everything and What to Do about It - Steve Pate.eng.vtt 16.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kimball Code Integrate Vunl audit.eng.vtt 16.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/pht.c 16.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Kismet and MSF - Mike Kershaw.eng.text 16.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dark Side of the DNS Force.eng.vtt 16.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Keystone Engine - Next Generation Assembler Framework.eng.text 16.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Function Rerouting from Kernel Land with Hades - Jason Raber.eng.text 16.0 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 4 7.srt 16.0 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Ouroboros - Tearing Xen Hypervisor With the Snake.eng.txt 16.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Breaking Bootloaders on the Cheap.eng.text 16.0 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 4 7.srt 16.0 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Hardware Security Module - Executing Unsigned Code in HSM TEE.eng.text 16.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deobfuscator An Automated Approach to the Identification and Removal of Code Obfuscation - Eric Laspe, Jason Raber.eng.srt 16.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deobfuscator An Automated Approach to the Identification and Removal of Code Obfuscation - Eric Laspe, Jason Raber.eng.txt 16.0 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Charles Edge - Attacking Apples Xsan.eng.txt 15.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Ouroboros - Tearing Xen Hypervisor With the Snake.eng.lrc 15.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Heap Spray Detection with Heap Inspector - Aaron LeMasters.eng.tsv 15.9 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 3 7.srt 15.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/APT Attribution and DNS Profiling.eng.text 15.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deobfuscator An Automated Approach to the Identification and Removal of Code Obfuscation - Eric Laspe, Jason Raber.eng.lrc 15.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Charles Edge - Attacking Apples Xsan.eng.lrc 15.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Vista and ActiveX Controls - Su Yong Kim.eng.txt 15.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dark Side of the DNS Force.eng.txt 15.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/tables_sparc.c 15.8 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Codema Attack Controlling Your Smart Home Through Dangling Management Channels.eng.text 15.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Detecting Vulnerabilities in Virtual Devices with Conformance Testing.eng.text 15.7 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/James C Foster - BlackHat Standup.eng.text 15.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Ouroboros - Tearing Xen Hypervisor With the Snake.eng.vtt 15.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced MySQL Exploitation - Muhaimin Dzulfakar.eng.srt 15.7 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 2 7.srt 15.7 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Ultimate Study of Real-Life SSL Issues - Ivan Ristic.eng.text 15.7 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Commix - Detecting and Exploiting Command Injection Flaws.eng.text 15.7 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MSF & Telephony - Druid.eng.text 15.6 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/USMA Share Kernel Code With Me.eng.text 15.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dark Side of the DNS Force.eng.lrc 15.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/init_i386.c 15.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/jay_beale/how-do-I-tighten.html 15.6 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 3 7.srt 15.6 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/The Troika of E-Discovery Ethics, ESI, and Expertise in a Web 2.0 World - Richard Costa.eng.text 15.6 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 5 7.srt 15.6 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Android Commercial Spyware Disease and Medication.eng.text 15.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/_42281018_pancreas_inf_203.png 15.6 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Triaging Crashed With Backward Taint Analysis For Arm Architecture.eng.tsv 15.5 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Bypass CFG in Chrome.eng.tsv 15.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Vista and ActiveX Controls - Su Yong Kim.eng.lrc 15.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Temporal Reverse Engineering - Danny Quist, Colin Ames.eng.tsv 15.5 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/Owfuzz WiFi Nightmare.eng.text 15.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/DABiD - The Powerful Interactive Android Debugger for Android Malware Analysis.eng.text 15.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Shattering Illusions in Lock-Free Worlds - Compiler Hardware Behaviors in OS and VMs.eng.text 15.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs.eng.vtt 15.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00015.idx.jpg 15.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/ICD-xray-cropped.jpg 15.4 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick - Chambet - Google Attacks.eng.tsv 15.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Unbreakable Oracle with Metasploit - Chris Gates.eng.tsv 15.4 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Fingerprinting Web Application Platforms by Variations in PNG Implementations.eng.txt 15.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Fox in the Hen House (UPnP IGD) - Jonathan Squire.eng.tsv 15.4 KB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 4 8.srt 15.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Waldron - VOIP Security Essentials.eng.text 15.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00014.idx.jpg 15.4 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/The Next Generation of Windows Exploitation Attacking the Common Log File System.eng.text 15.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Andrey Malyshev and Serg Vasilenkov - Security Analysis of Microsoft Encrypted File System.eng.srt 15.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Beyond the Application - Cellular Privacy Regulatory Space.eng.vtt 15.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-d.c 15.4 KB
- Black Hat Asia/Black Hat Singapore 2016/Black Hat Singapore 2016 captions/Incident Response @ Scale Building a Next Generation SOC.eng.text 15.4 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit.eng.text 15.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Fuzzing Proprietary SCADA Protocols - Sergey Bratus.eng.tsv 15.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Fingerprinting Web Application Platforms by Variations in PNG Implementations.eng.lrc 15.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00037.idx.jpg 15.3 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/pk-1.0_pre1/scanrand.c 15.3 KB
- Black Hat Europe/Black Hat Europe 2013/Black Hat Europe 2013 captions/Huawei - From China with Love.eng.text 15.3 KB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 7 8.srt 15.3 KB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 1 8.srt 15.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Macsploitation with Metasploit - Dino Dai Zovi.eng.tsv 15.2 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.eng.txt 15.2 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Welcome and Introduction to Black Hat Asia 2015.eng.srt 15.2 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Thinking Outside the JIT Compiler.eng.tsv 15.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Hacking HTTP 2 - New Attacks on the Internet's Next Generation Foundation.eng.text 15.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Dig Into the Attack Surface of PDF and Gain 100 CVEs in 1 Year.eng.tsv 15.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Veysset and Butti - Wifi Adv Stealth.eng.tsv 15.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta.eng.tsv 15.1 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta_en.tsv 15.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/LICENSE 15.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/OEM Finder Hunting Vulnerable OEM IoT Devices at Scale.eng.txt 15.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/BitTorrent Hacks - Michael Brooks.eng.text 15.1 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 2 7.srt 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st1.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st1-1.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st2-5.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st2-7.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st3-4.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st3-14.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st4-1.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st4-4.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st4-12.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st5-5.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st6-2.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st6-13.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st6-14.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st7-2.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st7-7.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st7-8.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st9.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st10-1.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st10-12.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st11-1.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st11-2.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st11-10.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st12-6.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st12-7.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st13-3.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st13-11.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st13-12.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st15-4.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st17-7.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st18-3.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st19-1.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st19-5.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st20-7.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st21-3.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st21-9.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st21-10.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st22-2.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st23-5.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st24-9.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st24-10.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st24-11.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st25-5.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st28-5.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st28-6.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st31-2.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st32-3.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st33-3.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st36-2.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st42-2.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st51-1.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st51-2.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st78.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st78-1.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st91.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st30-3.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st16-2.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st20-3.tiff 15.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st29-9.tiff 15.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Malicious File for Exploiting Forensic Software.eng.txt 15.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/html/bh-css/lib/typography.css 15.0 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 3 8.srt 15.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st5-3.tiff 15.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.eng.lrc 15.0 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Malicious File for Exploiting Forensic Software.eng.vtt 15.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Data-Only Pwning Microsoft Windows Kernel.eng.text 15.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android.eng.vtt 15.0 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/OEM Finder Hunting Vulnerable OEM IoT Devices at Scale.eng.lrc 15.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 2-2 - Lukas Grunwald.eng.txt 15.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/kmalloc-overflow.html 14.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Veysset and Butti - Wifi Adv Stealth.eng.vtt 14.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/symbol.c 14.9 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick Chambert - Managing MSIE Security in Corporate Networks by Creating Custom Internet Zones.eng.text 14.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st17-1.tiff 14.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Free-space Quantum Key Distribution at GHz Transmission Rates - Joshua Bienfang.eng.text 14.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Malicious File for Exploiting Forensic Software.eng.lrc 14.9 KB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 2 8.srt 14.8 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/OEM Finder Hunting Vulnerable OEM IoT Devices at Scale.eng.vtt 14.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st23-6.tiff 14.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st37-5.tiff 14.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st37-6.tiff 14.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deobfuscator An Automated Approach to the Identification and Removal of Code Obfuscation - Eric Laspe, Jason Raber.eng.vtt 14.8 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 5 7.srt 14.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st20-9.tiff 14.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds.eng.text 14.7 KB
- Black Hat USA/Black Hat USA 2020/Black Hat USA 2020 captions/Experimenting with Real-Time Event Feeds_en.text 14.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Playing by Virtual Security Rules How Virtualization Changes Everything and What to Do about It - Steve Pate.eng.tsv 14.7 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/bh-fed-06-masthead.jpg 14.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st14.tiff 14.7 KB
- Black Hat Europe/Black Hat Europe 2016/videos/Black Hat Europe 2016 captions/Inside Web Attacks - The Real Payloads.eng.text 14.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 2-2 - Lukas Grunwald.eng.lrc 14.7 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Hide Android Applications in Images.eng.text 14.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00025.idx.jpg 14.6 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 1 7.srt 14.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st8-4.tiff 14.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/vibration-through-meat.pdf 14.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Hardware and VPN Clients Supporting IPSec - PPTP - L2TP.pdf 14.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/Cisco Hardware and VPN Clients Supporting IPSec - PPTP - L2T.pdf 14.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st29-6.tiff 14.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st22-5.tiff 14.5 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 1 8.srt 14.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android.eng.tsv 14.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/version.c 14.5 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 2 8.srt 14.5 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Active 802.11 Fingerprinting - Sergey Bratus, Daniel Peebles, Cory Cornelius, Axel Hansen.eng.text 14.5 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced MySQL Exploitation - Muhaimin Dzulfakar.eng.vtt 14.5 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.eng.srt 14.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/Makefile.in 14.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st4-3.tiff 14.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced MySQL Exploitation - Muhaimin Dzulfakar.eng.txt 14.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Samsung Pay - Tokenized Numbers Flaws and Issues.eng.text 14.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Renaud Bidou - Dirty BlackMail DoS Story.text 14.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Ouroboros - Tearing Xen Hypervisor With the Snake.eng.tsv 14.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmMain.Designer.cs 14.4 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Yuan Fan - MatriXay.eng.text 14.4 KB
- Black Hat USA/Black Hat USA 2019/Black Hat USA 2019 captions/Bypassing the Maginot Line Remotely Exploit the Hardware Decoder on Smartphone.eng.text 14.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Andrey Malyshev and Serg Vasilenkov - Security Analysis of Microsoft Encrypted File System.eng.txt 14.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced MySQL Exploitation - Muhaimin Dzulfakar.eng.lrc 14.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Gizmo - Rachel Engel.eng.text 14.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image8.png 14.2 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.jp.eng.srt 14.2 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 1 7.srt 14.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sht_rebuild.c 14.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/pacemaker1.jpg 14.2 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Beyond the Application - Cellular Privacy Regulatory Space.eng.tsv 14.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00026.idx.jpg 14.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/format-string/heap-sparc.html 14.2 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Andrey Malyshev and Serg Vasilenkov - Security Analysis of Microsoft Encrypted File System.eng.lrc 14.2 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Charles Edge - Attacking Apples Xsan.eng.tsv 14.2 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Caezar Cerrudo - Demystifying SQL - Oracle.text 14.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/MD5 Collisions - Marc Bevand.eng.text 14.1 KB
- Black Hat Europe/Black Hat Europe 2021/Black Hat Europe 2021 captions/AIModel Mutator Finding Vulnerabilities in TensorFlow.eng.text 14.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st20-8.tiff 14.1 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/SQUIRE - Project Cowbird.eng.text 14.1 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/rds_logo.jpg 14.1 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 6 7.srt 14.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st18-1.tiff 14.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dark Side of the DNS Force.eng.tsv 14.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/essid_jack.c 14.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st1-2.tiff 14.0 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).eng.text 14.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/_httprint.gif 14.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/elfsh.1 14.0 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Andrey Malyshev and Serg Vasilenkov - Security Analysis of Microsoft Encrypted File System.eng.vtt 14.0 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 3 7.srt 13.9 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs.eng.tsv 13.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st22-4.tiff 13.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deobfuscator An Automated Approach to the Identification and Removal of Code Obfuscation - Eric Laspe, Jason Raber.eng.tsv 13.9 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Bypass Control Flow Guard Comprehensively.eng.text 13.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Security-Friday-Partial-Japanese.eng.text 13.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st21-11.tiff 13.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st14-3.tiff 13.9 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/From Redmond with Love - Katie Moussouris.eng.text 13.9 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Tom Beardsley - Monkeyspaw.eng.text 13.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadTunnel - How Do I Get Big Brother Power.eng.txt 13.8 KB
- Black Hat USA/Black Hat USA 2022/Black Hat USA 2022 captions/Is WebAssembly Really Safe - Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way.eng.text 13.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Fingerprinting Web Application Platforms by Variations in PNG Implementations.eng.tsv 13.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/reloc.c 13.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadTunnel - How Do I Get Big Brother Power.eng.lrc 13.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Welcome and Introduction to Black Hat Asia 2015.eng.vtt 13.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hbx.js 13.7 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Brosch - Runtime Packers Hidden Prob.eng.text 13.7 KB
- Black Hat Asia/Black Hat Singapore 2000/Black Hat Singapore 2000 speakers.txt 13.7 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/scanrand.c 13.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Winning the Race to Bare Metal - UEFI Hypervisors - Don Bailey, Martin Mocko.eng.text 13.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/function.c 13.6 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 2 7.srt 13.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st23-7.tiff 13.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging.eng.srt 13.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00008.idx.jpg 13.5 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Welcome and Introduction to Black Hat Asia 2015.eng.txt 13.5 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Georgia Weidman about SPF.eng.json 13.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Darrin Barrall - Shakespearean Shellcode.text 13.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st46.tiff 13.4 KB
- Black Hat Europe/Black Hat Europe 2014/Video/Black Hat Europe 2014 captions/Charge Your Device with the Latest Malware.eng.text 13.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Vista and ActiveX Controls - Su Yong Kim.eng.srt 13.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Breaking the Unbreakable Oracle with Metasploit - Chris Gates.eng.text 13.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Temporal Reverse Engineering - Danny Quist, Colin Ames.eng.text 13.4 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/airjack.h 13.4 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/A Fox in the Hen House (UPnP IGD) - Jonathan Squire.eng.text 13.3 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Welcome and Introduction to Black Hat Asia 2015.eng.lrc 13.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/atexit.html 13.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/OEM Finder Hunting Vulnerable OEM IoT Devices at Scale.eng.tsv 13.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/Triaging Crashed With Backward Taint Analysis For Arm Architecture.eng.text 13.3 KB
- Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 6 8.srt 13.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/network-security/portscan.html 13.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/scanrand_logs.txt 13.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/docs/scanrand_logs.txt 13.2 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Macsploitation with Metasploit - Dino Dai Zovi.eng.text 13.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/David_LeBlanc-Whats-Exploitable.aspx_files/global.js 13.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Fuzzing Proprietary SCADA Protocols - Sergey Bratus.eng.text 13.2 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 4 7.srt 13.1 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Thinking Outside the JIT Compiler.eng.text 13.1 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Dig Into the Attack Surface of PDF and Gain 100 CVEs in 1 Year.eng.text 13.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/O-Checker - Detection of Malicious Documents Through Deviation From File Format Specifications.eng.srt 13.1 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 4 8.srt 13.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta.eng.text 13.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Got Citrix, Hack It - Shanit Gupta_en.text 13.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/ERESI-coding_style-README.txt 13.0 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.jp.eng.txt 13.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-hppa.h 13.0 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 5 8.srt 13.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00013.idx.jpg 13.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/e2dbg/include/libe2dbg.h 13.0 KB
- Black Hat USA/Black Hat USA 2011/video/Black Hat USA 2011 captions/Heap Spray Detection with Heap Inspector - Aaron LeMasters.eng.text 13.0 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.eng.vtt 12.9 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 7 8.srt 12.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/HOWTO-port-elfsh-0.7a2.txt 12.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/wisper-meat.pdf 12.9 KB
- Black Hat Asia/Black Hat Singapore 2022/Black Hat Singapore 2022 captions/Bypass CFG in Chrome.eng.text 12.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.jp.eng.lrc 12.9 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Malicious File for Exploiting Forensic Software.eng.tsv 12.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00006.idx.jpg 12.9 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/API Deobfuscator - Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis.eng.text 12.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Johnny Long - Google Hacking for Pen Test.srt 12.8 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced MySQL Exploitation - Muhaimin Dzulfakar.eng.tsv 12.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/include/libe2dbg.h 12.8 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 6 7.srt 12.8 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Risk From Power Lines - How to Sniff the G3 and Prime Data and Detect the Interfere Attack.eng.srt 12.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/scanutil.c 12.8 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Kimball Code Integrate Vunl audit.eng.text 12.8 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Yuan Fan - SQL Injection Detection.eng.text 12.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/deps.c 12.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/Picture 1.png 12.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st29-8.tiff 12.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Ptacek_Newsham-Initial_StackGuard_Weaknesses_files/gfi_120x60_1.gif 12.7 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Playing by Virtual Security Rules How Virtualization Changes Everything and What to Do about It - Steve Pate.eng.text 12.7 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.jp.eng.vtt 12.7 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 6 7.srt 12.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/README.FIRST 12.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/Maguro/MAGURO-README.txt 12.7 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 5 7.srt 12.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/dump.c 12.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/include/revm-help.h 12.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Risk From Power Lines - How to Sniff the G3 and Prime Data and Detect the Interfere Attack.eng.txt 12.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Vista and ActiveX Controls - Su Yong Kim.eng.tsv 12.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/got.c 12.6 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Johnny Long - Google Hacking for Pen Test.txt 12.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/convert.c 12.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/lts.c 12.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/index.xml 12.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Ouroboros - Tearing Xen Hypervisor With the Snake.eng.text 12.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Risk From Power Lines - How to Sniff the G3 and Prime Data and Detect the Interfere Attack.eng.lrc 12.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/lc.c 12.4 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Johnny Long - Google Hacking for Pen Test.lrc 12.4 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Andrey Malyshev and Serg Vasilenkov - Security Analysis of Microsoft Encrypted File System.eng.tsv 12.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00016.idx.jpg 12.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadTunnel - How Do I Get Big Brother Power.eng.tsv 12.3 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Charles Edge - Attacking Apples Xsan.eng.text 12.3 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 6 8.srt 12.3 KB
- Black Hat Asia/Black Hat Japan 2007/presentations/Kanatoko.rar 12.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/profiler.c 12.3 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.eng.tsv 12.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00031.idx.jpg 12.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00030.idx.jpg 12.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/PPTP Frequently Asked Questions.pdf 12.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/Information-White-Papers/PPTP Frequently Asked Questions.pdf 12.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Patrick - Chambet - Google Attacks.eng.text 12.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Vista and ActiveX Controls - Su Yong Kim.eng.vtt 12.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st21-12.tiff 12.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/rootkit-backdoor/kernel-mod.html 12.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging.eng.vtt 12.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/show_ads.js 12.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/show_ads.js 12.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/show_ads.js 12.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Ptacek_Newsham-Initial_StackGuard_Weaknesses_files/show_ads.js 12.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Rafal_Wojtczuk-DefeatingSolarNoExecPatch_files/show_ads.js 12.1 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/Dark Side of the DNS Force.eng.text 12.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st0.tiff 12.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st3.tiff 12.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Fingerprinting Web Application Platforms by Variations in PNG Implementations.eng.text 12.0 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/BGP Stream.eng.srt 12.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/aslr.txt 11.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00007.idx.jpg 11.9 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/O-Checker - Detection of Malicious Documents Through Deviation From File Format Specifications.eng.vtt 11.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st0.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st2-3.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st4-11.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st4-17.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st12-8.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st13-17.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st13-18.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st15-14.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st19-6.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st19-7.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st20-10.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st23-8.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st29-7.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st32-4.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st41-5.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st41-7.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st43-11.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st44.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st70.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st122.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st124.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st43-7.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st6-18.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st11-18.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/sync_EL.jpg 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st42-7.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android.eng.text 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st5-1.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Deobfuscator An Automated Approach to the Identification and Removal of Code Obfuscation - Eric Laspe, Jason Raber.eng.text 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st8.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st134.tiff 11.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/gw.js 11.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/gw.js 11.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Risk From Power Lines - How to Sniff the G3 and Prime Data and Detect the Interfere Attack.eng.vtt 11.6 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Welcome and Introduction to Black Hat Asia 2015.eng.tsv 11.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Hacking the Smart Grid - Tony Flick.eng.text 11.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/types.c 11.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/atomic.c 11.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st16-6.tiff 11.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st17-9.tiff 11.5 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Johnny Long - Google Hacking for Pen Test.vtt 11.5 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Beyond the Application - Cellular Privacy Regulatory Space.eng.text 11.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/mt1-0.tiff 11.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/Makefile.in 11.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/blocks.c 11.5 KB
- Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 captions/Veysset and Butti - Wifi Adv Stealth.eng.text 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st44-3.tiff 11.4 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/O-Checker - Detection of Malicious Documents Through Deviation From File Format Specifications.eng.txt 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-92.tiff 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-85.tiff 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-87.tiff 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-88.tiff 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-96.tiff 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-86.tiff 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-89.tiff 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-93.tiff 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-95.tiff 11.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/recv.c 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-90.tiff 11.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00017.idx.jpg 11.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-83.tiff 11.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-84.tiff 11.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-91.tiff 11.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs.eng.text 11.3 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/bh-fed-06-sponsor-animate.gif 11.3 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/O-Checker - Detection of Malicious Documents Through Deviation From File Format Specifications.eng.lrc 11.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-94.tiff 11.3 KB
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/OEM Finder Hunting Vulnerable OEM IoT Devices at Scale.eng.text 11.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st4-13.tiff 11.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st43-8.tiff 11.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/code-stack-exploits.html 11.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/remap.c 11.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st34.tiff 11.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/0296650sid1400.js 11.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/network-security/passive-fingerprint.html 11.2 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging.eng.txt 11.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libui/readln.c 11.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st26.tiff 11.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Advanced MySQL Exploitation - Muhaimin Dzulfakar.eng.text 11.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/signal.c 11.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st4-2.tiff 11.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging.eng.lrc 11.0 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 2-2 - Lukas Grunwald.eng.tsv 11.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/image7.png 11.0 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matt Bergin about PHPMap.eng.json 11.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st6-17.tiff 11.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sym_common.c 11.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/bss.c 11.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/include/libaspect.h 11.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmMain.cs 11.0 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Jonathan Chittenden.eng.json 10.9 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/David Mirza Ahmad.eng.json 10.9 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.jp.eng.tsv 10.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st23.tiff 10.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/dtors.html 10.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00018.idx.jpg 10.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/libhash.c 10.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/300px-Aslr_stack_smash.png 10.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00004.idx.jpg 10.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/dm_client_CNET.js 10.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/dm_client_CNET.js 10.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/paratrace.c 10.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st4-16.tiff 10.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00010.idx.jpg 10.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00021.idx.jpg 10.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st25.tiff 10.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/tables_i386.c 10.7 KB
- Black Hat USA/Black Hat USA 2006/presentations/Bidou/Bidou-http-fun-suite.zip 10.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/BadTunnel - How Do I Get Big Brother Power.eng.text 10.7 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Risk From Power Lines - How to Sniff the G3 and Prime Data and Detect the Interfere Attack.eng.tsv 10.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00009.idx.jpg 10.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/save.c 10.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/flowjack/target 10.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st7-10.tiff 10.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/readargs.c 10.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/ICD-xray-cropped-labels.jpg 10.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/news_story.css 10.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/news_story.css 10.5 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/GoogleDiggity Crew.eng.json 10.5 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Gursev Kalra.eng.json 10.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00003.idx.jpg 10.5 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Dan Cornell.eng.json 10.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S5.windows2000.Utility.Lockdown 10.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00029.idx.jpg 10.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st6-4.tiff 10.4 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Malicious File for Exploiting Forensic Software.eng.text 10.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st26.tiff 10.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/searchSecuritywin.css 10.3 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Johnny Long - Google Hacking for Pen Test.tsv 10.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00028.idx.jpg 10.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/types.c 10.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-a.c 10.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-USNAnalysis_files/screen.css 10.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00005.idx.jpg 10.2 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/Andrey Malyshev and Serg Vasilenkov - Security Analysis of Microsoft Encrypted File System.eng.text 10.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/wlan_jack.c 10.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/paketto.c 10.2 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/O-Checker - Detection of Malicious Documents Through Deviation From File Format Specifications.eng.tsv 10.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Sotirov_Dowd_Bypassing_Memory_Protections/bh08-sotirov-dowd-exploits.zip 10.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/RonDufrense_MorrisWormToNimda.html 10.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st6-3.tiff 10.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/dyn.c 10.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/ecgdemo-1.pdf 10.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/output_ia32.c 10.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00024.idx.jpg 10.0 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging.eng.tsv 9.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Thomas_Lopatic_NCSA_Overflow_Bugtraq.html 9.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/threads.c 9.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 2-2 - Lukas Grunwald.eng.srt 9.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/extplt.c 9.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Ptacek_Newsham-Initial_StackGuard_Weaknesses_files/acunetix_120x60.gif 9.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/offbyone-infoleak.html 9.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/hash.c 9.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sparc32.c 9.7 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/scanreport.xsl 9.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/index.xml 9.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00020.idx.jpg 9.7 KB
- Black Hat Asia/Black Hat Singapore 2015/Black Hat Singapore 2015 captions/Welcome and Introduction to Black Hat Asia 2015.eng.text 9.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/brw1.gif 9.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00002.idx.jpg 9.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00032.idx.jpg 9.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/artificial_pancreas.jpg 9.6 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/pk-1.0_pre1/md4.c 9.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/medtronic_soletra.jpg 9.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-mips.h 9.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Krawetz/Extras/jpegquality.c 9.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/binviz_0.05.csproj 9.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/dump_main.c 9.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/David_LeBlanc-Whats-Exploitable.aspx_files/style.css 9.4 KB
- Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-2/Untitled 1.rpjf 9.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/xmalloc.c 9.3 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Tribute to Barnaby Jack.eng.srt 9.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/setup.nsi 9.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/objects.c 9.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00027.idx.jpg 9.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Ptacek_Newsham-Initial_StackGuard_Weaknesses_files/1_120x60.gif 9.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/elfsh-ref.txt 9.2 KB
- Black Hat DC/Black Hat DC 2008/Presentations/Krawetz/Extra/jpegquality.c 9.2 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Vista and ActiveX Controls - Su Yong Kim.eng.text 9.2 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/The Kali Linux Dojo Workshop #1 Rolling Your Own Generating Custom Kali Linux 2.eng.srt 9.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/access.c 9.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/stabs-trans.c 9.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/misc-revm.c 9.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st21.tiff 9.1 KB
- Black Hat Europe/Black Hat Europe 2015/videos/Black Hat Europe 2015 captions/New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.eng.text 9.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/pageexec.txt 9.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st25.tiff 9.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/vectors.c 8.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/INSTALL 8.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/instr_table.c 8.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/include/libedfmt-stabs.h 8.9 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 2-2 - Lukas Grunwald.eng.vtt 8.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-e.c 8.9 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/rules_db_check.xml 8.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00019.idx.jpg 8.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00034.idx.jpg 8.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/01425i18023300.jpe 8.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/dynsym.c 8.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-ia64.h 8.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Ptacek_Newsham-Initial_StackGuard_Weaknesses_files/Insecurelogo-eye-90x168.gif 8.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Rafal_Wojtczuk-DefeatingSolarNoExecPatch_files/Insecurelogo-eye-90x168.gif 8.7 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/SQLscripts Folder/BUFFER OVERFLOW XP_MAKEWEBTASK 8.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/site.css 8.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Tribute to Barnaby Jack.eng.txt 8.6 KB
- Black Hat Asia/Black Hat Japan 2008/Audio/Black Hat Japan 2008 captions/Mulliner - Exploiting - SymbianOS.jp.eng.text 8.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st40-2.tiff 8.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Tribute to Barnaby Jack.eng.vtt 8.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st9-13.tiff 8.6 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/O-Checker - Detection of Malicious Documents Through Deviation From File Format Specifications.eng.text 8.6 KB
- Black Hat Asia/Black Hat Singapore 2017/Black Hat Singapore 2017 captions/Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging.eng.text 8.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00033.idx.jpg 8.6 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Tribute to Barnaby Jack.eng.lrc 8.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/inter1.gif 8.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/pt.js 8.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/pt.js 8.5 KB
- Black Hat USA/Black Hat USA 2016/Black Hat USA 2016 captions/The Risk From Power Lines - How to Sniff the G3 and Prime Data and Detect the Interfere Attack.eng.text 8.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/lookup.c 8.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-7.c 8.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/dkom/HideProc/HideProc/HideProc.xcodeproj/project.pbxproj 8.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-8.c 8.4 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Konrads Smelkovs.eng.json 8.4 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Route - TCPIP Insecurities - partial.eng.srt 8.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-0.c 8.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/pax.txt 8.4 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Welcome and Introduction to Black Hat USA 2009 - Jeff Moss.eng.srt 8.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/fixup.c 8.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00036.idx.jpg 8.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/hooking/KeyLogger/keyLogger/keyLogger.xcodeproj/project.pbxproj 8.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/hooking/tcphook/tcphook.xcodeproj/project.pbxproj 8.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/Humhrt2.jpg 8.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/0i17601000.gif 8.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00012.idx.jpg 8.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-sunos.h 8.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/net.c 8.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st40.tiff 8.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/transaction.py 8.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00022.idx.jpg 8.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st2-2.tiff 8.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/color.c 8.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libui/color.c 8.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st37-1.tiff 8.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-6.c 8.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Perry/Extras/linux-tor-prio.sh 8.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/kernel_performance.gif 8.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/randexec.txt 8.0 KB
- Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 captions/Johnny Long - Google Hacking for Pen Test.text 7.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st0-1.tiff 7.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/index.html 7.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/dwarf2.c 7.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st1-3.tiff 7.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeff Moss - Remarks Before the keynote.eng.srt 7.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st30-2.tiff 7.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st15-15.tiff 7.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/pk-1.0_pre1/paketto.c 7.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/phentropy.c 7.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/include/revm-io.h 7.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-1.c 7.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/include/aproxy.h 7.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/breakpoints.c 7.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Kornbrust/kornbrust_dbms_crypto_intercept.sql 7.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st5-2.tiff 7.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/include/libaspect-profiler.h 7.7 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Andreas Schmidt.eng.json 7.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-f.c 7.7 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Over the Air Baseband Exploit Gaining Remote Code Execution on 5G Smartphones.eng.srt 7.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st18.tiff 7.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Tribute to Barnaby Jack.eng.tsv 7.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st38-1.tiff 7.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/operand.c 7.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st9-4.tiff 7.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st35-2.tiff 7.6 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Welcome and Introduction to Black Hat USA 2009 - Jeff Moss.eng.vtt 7.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/types.c 7.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/misc.c 7.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st11-1.tiff 7.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/zap.pdf 7.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st7-4.tiff 7.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st33-2.tiff 7.4 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/codepatchadd.c 7.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00038.idx.jpg 7.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/generic.c 7.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st13.tiff 7.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st12-1.tiff 7.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kotler_Rom_Jinx_Malware/Jinx_zero_dot_one/Client/hiddenWindow.html 7.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st36-1.tiff 7.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st9-3.tiff 7.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-100.tiff 7.3 KB
- Black Hat Logo small.jpg 7.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st10-13.tiff 7.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/html/bh-css/lib/grid.css 7.3 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Route - TCPIP Insecurities - partial.eng.vtt 7.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/select.c 7.2 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Over the Air Baseband Exploit Gaining Remote Code Execution on 5G Smartphones.eng.txt 7.2 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Route - TCPIP Insecurities - partial.eng.txt 7.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/intercept.h 7.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/Program_datacode.png 7.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/paketto.h 7.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/Vmem_aslr.png 7.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st31-2.tiff 7.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st5-3.tiff 7.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st8-10.tiff 7.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st32-2.tiff 7.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st4-5.tiff 7.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/init.c 7.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Over the Air Baseband Exploit Gaining Remote Code Execution on 5G Smartphones.eng.lrc 7.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st14.tiff 7.1 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Route - TCPIP Insecurities - partial.eng.lrc 7.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/application_performance.gif 7.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st34-2.tiff 7.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-3.c 7.0 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/lib/eapeak/misc.py 7.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/dwarf2-cfa.c 7.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st7-5.tiff 7.0 KB
- Black Hat Logo wide.jpg 7.0 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeff-Moss-Closing-English.eng.srt 7.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st43-13.tiff 7.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/format-string/format-bugs.html 7.0 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Yaniv Karta.eng.json 7.0 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Highlights.eng.json 6.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st8-11.tiff 6.9 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeff Moss - Remarks Before the keynote.eng.vtt 6.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st39.tiff 6.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Welcome and Introduction to Black Hat USA 2009 - Jeff Moss.eng.txt 6.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/pht.c 6.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st14-1.tiff 6.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st43-12.tiff 6.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st12.tiff 6.9 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Welcome and Introduction to Black Hat USA 2009 - Jeff Moss.eng.lrc 6.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st6-2.tiff 6.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/loop.c 6.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/edfmt.c 6.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/edfmt.c 6.9 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Over the Air Baseband Exploit Gaining Remote Code Execution on 5G Smartphones.eng.vtt 6.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-99.tiff 6.8 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeff Moss - Remarks Before the keynote.eng.txt 6.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st22.tiff 6.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st24.tiff 6.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-a.c 6.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st3-6.tiff 6.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-2.c 6.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/DG.css 6.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st6-3.tiff 6.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmNavigator.Designer.cs 6.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-USNAnalysis_files/common.css 6.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st10-14.tiff 6.7 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeff Moss - Remarks Before the keynote.eng.lrc 6.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/inform.c 6.7 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - English.eng.srt 6.7 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/FishNet Team.eng.json 6.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/fileops.c 6.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/atomic.c 6.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st4-2.tiff 6.7 KB
- Black Hat USA/Black Hat USA 2013/video/Black Hat USA 2013 captions/Tribute to Barnaby Jack.eng.text 6.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st2-1.tiff 6.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/pax.c 6.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/dynamic.c 6.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/hdr.c 6.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st4-4.tiff 6.6 KB
- Black Hat USA/Black Hat USA 2008/video/Black Hat USA 2008 captions/Hacking and Injecting Federal Trojans - 2-2 - Lukas Grunwald.eng.text 6.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/mprotect.txt 6.6 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeff-Moss-Closing-English.eng.txt 6.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st1-2.tiff 6.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st20.tiff 6.5 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeff-Moss-Closing-English.eng.lrc 6.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/altgot.c 6.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00035.idx.jpg 6.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmFrequency.cs 6.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st16.tiff 6.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-c.c 6.4 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - English.eng.txt 6.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st15.tiff 6.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/dgwin.css 6.3 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/config/missing 6.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st17.tiff 6.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/options.c 6.3 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - English.eng.lrc 6.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/ssl_config.py 6.3 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Frank Breedijk on Seccubus.eng.srt 6.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00023.idx.jpg 6.2 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - English.eng.vtt 6.2 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeff-Moss-Closing-English.eng.vtt 6.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st11.tiff 6.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/graph.c 6.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/map.c 6.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/st7-6.tiff 6.2 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-MacJon-StealthAttacks_Code.zip 6.1 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Welcome and Introduction to Black Hat USA 2009 - Jeff Moss.eng.tsv 6.1 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Over the Air Baseband Exploit Gaining Remote Code Execution on 5G Smartphones.eng.tsv 6.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/global_021407.js 6.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/global_021407.js 6.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/output_sparc.c 6.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/load.c 6.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmMain.resx 6.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/proxies/webscarab.py 6.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/01425i5190800.jpe 6.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/control.c 6.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-8.c 6.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/findrel.c 6.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/scanrand.1 6.0 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/References/CiscoCDP.txt 6.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/dumpregs.c 6.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmMemoryMap.cs 5.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/log.c 5.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/elfsh-network-0.3.txt 5.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/sym.c 5.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmFrequency.resx 5.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmStrings.resx 5.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmNavigator.resx 5.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Carlson_Stadmeyer_FLEX_AMF3_and_BlazeDS/thumbs/mt0-0.tiff 5.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-109.tiff 5.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmText.resx 5.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00011.idx.jpg 5.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmAddFilter.Designer.cs 5.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Wikipedia_Buffer_overflow_files/index_002.php 5.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Dangling_pointer_files/index_002.php 5.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/index.php 5.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Stack-Smashing-Protection_files/index_002.php 5.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Main.bas 5.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Main.bas 5.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/libbtree.c 5.7 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/DataThief Folder/Main.bas 5.7 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-polak/Delphi/BlackHatNP.dpr 5.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/exploit2.gif 5.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/cnet_iphone_150x150.swf 5.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/cnet_iphone_150x150.swf 5.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmRGBPlot.resx 5.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/debug.c 5.7 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - English.eng.tsv 5.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/sparc_convert.c 5.6 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Frank Breedijk on Seccubus.eng.vtt 5.6 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/AAtlasis_scripts.zip 5.6 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeff Moss - Remarks Before the keynote.eng.tsv 5.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/fatclient_thinserver.png 5.6 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Route - TCPIP Insecurities - partial.eng.tsv 5.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st11-11.tiff 5.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/source.c 5.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/common_util_js.js 5.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00001.idx.jpg 5.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_footer_bg.gif 5.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/rel.c 5.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/bin/Debug/binviz_0.01.vshost.exe 5.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/remote_process_server.png 5.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/Properties/Resources.resx 5.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/procdbg.h 5.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/obsesity-np.png 5.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/config/install-sh 5.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Timur Duehr on RagWeed.eng.srt 5.4 KB
- Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/rpc_model.png 5.4 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Frank Breedijk on Seccubus.eng.txt 5.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/entry.c 5.4 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Conti/software/rumint/license.txt 5.4 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/other/kern_control/client.dSYM/Contents/Resources/DWARF/client 5.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/0i17927300.gif 5.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt0-101.tiff 5.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/strtab.c 5.3 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Frank Breedijk on Seccubus.eng.lrc 5.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-4.c 5.3 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeff-Moss-Closing-English.eng.tsv 5.3 KB
- Black Hat USA/Black Hat USA 2009/video/Black Hat USA 2009 captions/Welcome and Introduction to Black Hat USA 2009 - Jeff Moss.eng.text 5.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-9.c 5.3 KB
- Black Hat DC/Black Hat Federal 2006/Breakable - David Litchfield (partial).eng.srt 5.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/modules.c 5.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm.h 5.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/config.c 5.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmRGBPlot.cs 5.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/hijack.c 5.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st27-8.tiff 5.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/include/libedfmt.h 5.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Wikipedia_Buffer_overflow_files/commonPrint.css 5.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Dangling_pointer_files/commonPrint.css 5.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/commonPrint.css 5.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Stack-Smashing-Protection_files/commonPrint.css 5.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/edfmt-utils.c 5.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/sht.c 5.1 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/README 5.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st9-9.tiff 5.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmRGBPlot.Designer.cs 5.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Johnny Long - You Got That With Google.eng.srt 5.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/exploit1.gif 5.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/invite.js 5.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Timur Duehr on RagWeed.eng.txt 5.0 KB
- Black Hat DC/Black Hat Federal 2006/Breakable - David Litchfield (partial).eng.txt 5.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/insert.c 5.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/dtors.c 5.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Patton/Extras/code/myspaceminer_scrape.pl 5.0 KB
- Black Hat DC/Black Hat Federal 2006/Breakable - David Litchfield (partial).eng.lrc 5.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Timur Duehr on RagWeed.eng.vtt 5.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/pmcheck.py 5.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Timur Duehr on RagWeed.eng.lrc 5.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/vectors.c 5.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/RFC1135_files/library.jpe 4.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/ctors.c 4.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/minewt.1 4.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-compat.h 4.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st9-10.tiff 4.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/include/libmjollnir.h 4.9 KB
- Black Hat USA/Black Hat USA 2015/video/Black Hat USA 2015 captions/Taxonomic Modeling Of Security Threats In Software Defined Networking.eng.srt 4.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st17-8.tiff 4.9 KB
- Black Hat DC/Black Hat Federal 2006/Breakable - David Litchfield (partial).eng.vtt 4.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/exploit3.gif 4.9 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - English.eng.text 4.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/m4/Makefile.in 4.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/analytics.js 4.8 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/eapeak 4.8 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/disguised.html 4.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/TODO 4.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Thank-You-English.eng.txt 4.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/hashes.c 4.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/st13-14.tiff 4.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/codepatchcore.c 4.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/parser.c 4.8 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Thank-You-English.eng.lrc 4.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Sotirov/Source Code/test.html 4.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/eweek-logo.gif 4.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/runtime.c 4.7 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/lc.1 4.7 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Thank-You-English.eng.srt 4.7 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmBytePlot.cs 4.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/script.c 4.7 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/install-sh 4.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/plt.c 4.7 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/config/Makefile.in 4.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/set_channel.c 4.6 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Frank Breedijk on Seccubus.eng.tsv 4.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/pmdata.py 4.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/emutramp.txt 4.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/variables.c 4.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/regression-tests.esh 4.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Johnny Long - You Got That With Google.eng.vtt 4.5 KB
- Black Hat USA/Black Hat USA 2021/Black Hat USA 2021 captions/Over the Air Baseband Exploit Gaining Remote Code Execution on 5G Smartphones.eng.text 4.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/obj/Debug/TempPE/Properties.Resources.Designer.cs.dll 4.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/hash.c 4.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/format-string/index.xml 4.5 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.dsp 4.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Alejandro Hernaandez on DotDotPwn.eng.srt 4.5 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Closing-Japanese-Translated.eng.srt 4.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/index.html 4.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/fcthijack.c 4.5 KB
- Black Hat DC/Black Hat Federal 2006/Breakable - David Litchfield (partial).eng.tsv 4.4 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.dsp 4.4 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.dsp 4.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/randkstack.txt 4.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/core.c 4.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-polak/VisualC++/BlackHatNP.dsp 4.4 KB
- Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 captions/Jeff Moss - Remarks Before the keynote.eng.text 4.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/elfsh-draft.txt 4.3 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Timur Duehr on RagWeed.eng.tsv 4.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/display.c 4.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Vertical Reel.eng.json 4.3 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Short Reel.eng.json 4.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Thank-You-English.eng.vtt 4.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Wikipedia_Buffer_overflow_files/ajax.js 4.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Dangling_pointer_files/ajax.js 4.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/ajax.js 4.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Stack-Smashing-Protection_files/ajax.js 4.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmStrings.cs 4.3 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chris Schimdt on OWASP ESAPI Project.eng.srt 4.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/tt_footer_logo.gif 4.3 KB
- Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor Folder/SETUP.LST 4.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/SQLServerBackdoor.sql 4.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/SQLServerBackdoor.sql 4.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/scanner.c 4.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/storypage_100106.js 4.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/storypage_100106.js 4.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sparc64.c 4.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/index.html 4.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chris Schimdt on OWASP ESAPI Project.eng.txt 4.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Ptacek_Newsham-Initial_StackGuard_Weaknesses_files/purple.gif 4.2 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Johnny Long - You Got That With Google.eng.txt 4.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/noexec.txt 4.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/e2dbg.c 4.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmBitPlot.cs 4.1 KB
- Black Hat logo.png 4.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/hooking/tcphook/structures.h 4.1 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chris Schimdt on OWASP ESAPI Project.eng.lrc 4.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Thomas_Lopatic_NCSA_Overflow_Bugtraq_files/logo_archives.gif 4.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Johnny Long - You Got That With Google.eng.lrc 4.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor Folder/README.txt 4.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-alpha.h 4.1 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Xavier Mertens (xme) on Pastemon.eng.srt 4.1 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fayo/Supporting Files/BOF_BindShell.sql 4.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-irix.h 4.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/rootkit-backdoor/index.xml 4.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Royal_Malware_Analyst's_Blue_Pill/azure.tar.gz 4.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmEncode.Designer.cs 4.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/070329_CNET_nowOn_h.jpe 4.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/070329_CNET_nowOn_h.jpe 4.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Fyodor on Mastering Nmap.eng.txt 4.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/job.c 4.0 KB
- Black Hat Asia/Black Hat Japan 2005/audio/Black Hat Japan 2005 captions/Jeff-Moss-Closing-English.eng.text 4.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Alejandro Hernaandez on DotDotPwn.eng.vtt 4.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/header_logo2.gif 4.0 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Conti/software/fileconversion/pcap2rumint.c 4.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Thank-You-English.eng.tsv 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Bidou/._Bidou-http-fun-suite.zip 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Bidou/._Bidou-IPSTester.zip 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/._LEVI 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/._license.txt 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/._README.txt 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Scholz/._Scholz-src.zip 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH213 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH224 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH256 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH409 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH413 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH418 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH422 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH426 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH433 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH1156 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH1160 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/._cowbird-0.9.0-bh-wma11b 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/._cowbird-0.9.0-bh-wma11b 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/._cowbird-0.9.0-bh-wma11b 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/._cowbird-0.9.0-bh-wma11b 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/._cowbird-0.9.0-bh-wma11b 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/._cowbird-0.9.0-bh-wma11b 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/._cowbird-0.9.0-bh-wma11b 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/._cowbird-0.9.0-bh-wma11b 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/._cowbird-0.9.0-bh-wma11b 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/._cowbird-0.9.0-bh-wma11b 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/._cowbird-0.9.0-bh-wma11b 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/Trainor/._Trainor_Whitepaper_US06.pdf 4.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/README.txt 4.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/html/bh-css/lib/._smooshed.css 4.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/html/bh-css/lib/._typography.css 4.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Alejandro Hernaandez on DotDotPwn.eng.txt 4.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/send.c 4.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/dkom/HideProc/HideProc/HideProc.c 4.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Fyodor on Mastering Nmap.eng.lrc 4.0 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Closing-Japanese-Translated.eng.vtt 4.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Fyodor on Mastering Nmap.eng.srt 4.0 KB
- Black Hat USA/Black Hat USA 1997/Black Hat USA 1997 captions/Route - TCPIP Insecurities - partial.eng.text 4.0 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/errorlog.c 4.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Alejandro Hernaandez on DotDotPwn.eng.lrc 4.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_index_injection/section_inject.c 4.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chris Schimdt on OWASP ESAPI Project.eng.vtt 3.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/linkmap.c 3.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Closing-Japanese-Translated.eng.txt 3.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Patton/Extras/code/comment_converse.pl 3.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/buffer_marshall.png 3.9 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Closing-Japanese-Translated.eng.lrc 3.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/help.c 3.9 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Frank Breedijk on Seccubus.eng.text 3.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/index.html 3.8 KB
- Black Hat USA/Black Hat USA 2006/presentations/Finnigan/Finnigan-pl_sql_unwrap.zip 3.8 KB
- Black Hat DC/Black Hat Federal 2006/Breakable - David Litchfield (partial).eng.text 3.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/stabs-utils.c 3.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/urltesting.py 3.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-b.c 3.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/searchSecurity.css 3.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/backtrace.c 3.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-ia32.h 3.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-sparc.h 3.8 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Xavier Mertens (xme) on Pastemon.eng.vtt 3.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/segmexec.txt 3.7 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/lc_logs.txt 3.7 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/docs/lc_logs.txt 3.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/fingerprint.c 3.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Fyodor on Mastering Nmap.eng.vtt 3.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/eweek_header_styles.css 3.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Sotirov/Sotirov-source code.rar 3.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/search.c 3.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Timur Duehr on RagWeed.eng.text 3.7 KB
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Why Attend the World's Premier Technical Cybersecurity Conference.eng.json 3.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/libelfsh.i 3.6 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Xavier Mertens (xme) on Pastemon.eng.txt 3.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_fillbss_injection/section_inject.c 3.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/display.c 3.6 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Xavier Mertens (xme) on Pastemon.eng.lrc 3.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/hooking/KeyLogger/keyLogger/keyLogger.c 3.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/mips/init_mips.c 3.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chris Schimdt on OWASP ESAPI Project.eng.tsv 3.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmMemoryMap.Designer.cs 3.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/hooking/tcphook/tcphook.c 3.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/pmutil.py 3.6 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/phentropy.1 3.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/format-string/index.html 3.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/rootkit-backdoor/index.html 3.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sanitize.c 3.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Johnny Long - You Got That With Google.eng.tsv 3.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/copy.c 3.5 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - Japanese.eng.srt 3.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Willem Mouton on YETI Tool.eng.srt 3.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Patton/Extras/code/myspaceminer_comment.pl 3.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/paratrace.1 3.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/edfmt.c 3.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/local_process_server.png 3.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/debug.c 3.5 KB
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Black Hat Asia 2023 Highlights.eng.json 3.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/hd-site-3.gif 3.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/hd-site-3.gif 3.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/foreach.c 3.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Fyodor on Mastering Nmap.eng.tsv 3.4 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/README.txt 3.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/list.c 3.4 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Didier Stevens on PDF Tools.eng.srt 3.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/flowjack.c 3.4 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/m4/dxp_pcap.m4 3.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Alejandro Hernaandez on DotDotPwn.eng.tsv 3.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-9.c 3.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/include/libedfmt-api.h 3.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/output.c 3.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/core.c 3.3 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Closing-Japanese-Translated.eng.tsv 3.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/other/kern_control/kern_control.kext/Contents/MacOS/kern_control 3.3 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.cpp 3.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/tools/mydisasm.c 3.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/network-security/index.xml 3.2 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Xavier Mertens (xme) on Pastemon.eng.tsv 3.2 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.cpp 3.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/jmp.c 3.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/codepatchapply.c 3.2 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Thank-You-English.eng.text 3.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/Makefile 3.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Willem Mouton on YETI Tool.eng.vtt 3.1 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - Japanese.eng.vtt 3.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/include/libdump.h 3.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/implicit.c 3.1 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Living off Microsoft Copilot- DEMO- invoice manipulation.eng.srt 3.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc1.c 3.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/stack.c 3.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/io.c 3.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/include/aproxy-machine.h 3.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/raw.c 3.1 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - Japanese.eng.txt 3.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/profile.c 3.1 KB
- Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 captions/filelist.txt 3.1 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Didier Stevens on PDF Tools.eng.txt 3.1 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chris Schimdt on OWASP ESAPI Project.eng.text 3.0 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Didier Stevens on PDF Tools.eng.vtt 3.0 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - Japanese.eng.lrc 3.0 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Didier Stevens on PDF Tools.eng.lrc 3.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-7.c 3.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/cookie_summary.py 3.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/minewt_logs.txt 3.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/docs/minewt_logs.txt 3.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/hooking/tcphook/tcphook.xcodeproj/TemplateIcon.tiff 3.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmBytePlot.Designer.cs 3.0 KB
- Black Hat DC/Black Hat DC 2007/Presentations/Cerrudo.rar 3.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Johnny Long - You Got That With Google.eng.text 3.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/job.c 2.9 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Sumit Siddarth on Hacking XPath 2.eng.txt 2.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/OpenQVis/README 2.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 2-2.eng.srt 2.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Patton/Extras/code/profile_comments.pl 2.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/e2dbg/Makefile 2.9 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Armin Buescher on ReplayProxy.eng.srt 2.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/network-security/index.html 2.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/redball.gif 2.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/redball.gif 2.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/SQLServerRootkit.sql 2.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/SQLServerRootkit.sql 2.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/info.c 2.9 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Sumit Siddarth on Hacking XPath 2.eng.lrc 2.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/modules/modremap.c 2.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/init.c 2.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/CleanSQLRootkit.sql 2.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/CleanSQLRootkit.sql 2.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/init_sparc.c 2.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/color.c 2.9 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Fyodor on Mastering Nmap.eng.text 2.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Conti/software/rumint/readme.txt 2.8 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.cpp 2.8 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Willem Mouton on YETI Tool.eng.txt 2.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmNavigator.cs 2.8 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chuck Willis on OWASP Broken Web Applications Project.eng.srt 2.8 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Willem Mouton on YETI Tool.eng.lrc 2.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/readargs.h 2.8 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Xavier Mertens (xme) on Pastemon.eng.text 2.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/01425i17260100.jpe 2.8 KB
- Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 captions/Black Hat USA 2002.txt 2.8 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Mario Vuksan on TitanEngine.eng.srt 2.8 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/Properties/Resources.Designer.cs 2.8 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Sumit Siddarth on Hacking XPath 2.eng.srt 2.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/input.c 2.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-structs.h 2.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/stab.c 2.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_09.jpe 2.7 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 2-2.eng.txt 2.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/vlist.c 2.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_13.jpe 2.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Alejandro Hernaandez on DotDotPwn.eng.text 2.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chuck Willis on OWASP Broken Web Applications Project.eng.txt 2.7 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 2-2.eng.lrc 2.7 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/icons2-cfp2.jpg 2.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chuck Willis on OWASP Broken Web Applications Project.eng.lrc 2.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/flow.c 2.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/mips/output_mips.c 2.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/Makefile 2.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Feinstien_and_Peck/Extras/smime.p7s 2.7 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matias Katz & Maxi Soler.eng.srt 2.7 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Raphael Mudge.eng.srt 2.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Patton/Extras/code/strip.pm 2.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/header_ism.gif 2.7 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 2-2.eng.vtt 2.7 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/icons2-speaker2.jpg 2.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/notes.c 2.7 KB
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Calling all Cybersecurity Pros Join Us at Black Hat USA 2024 at the Mandalay Bay.eng.json 2.7 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Raphael Mudge.eng.txt 2.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Armin Buescher on ReplayProxy.eng.txt 2.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/doc/DUMP-draft 2.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/html/rssfeed.gif 2.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/README 2.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chuck Willis on OWASP Broken Web Applications Project.eng.vtt 2.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/Makefile 2.6 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/SWFCookie.as3proj 2.6 KB
- Black Hat Asia/Black Hat Japan 2004/audio/Black Hat Japan 2004 captions/Jeff-Moss-Closing-Japanese-Translated.eng.text 2.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-6.c 2.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/randustack.txt 2.6 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Raphael Mudge.eng.lrc 2.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Christian Martorella on Wfuzz & WebSlayer v2.0.eng.srt 2.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Armin Buescher on ReplayProxy.eng.lrc 2.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_top_injection/section_inject.c 2.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Armin Buescher on ReplayProxy.eng.vtt 2.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Stephan Chenette on FireShark v2.eng.srt 2.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor Folder/LICENSE.txt 2.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Ferruh Mavituna on Netsparker.eng.srt 2.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/Makefile 2.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmStrings.Designer.cs 2.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/getBigPic_101706.js 2.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/getBigPic_101706.js 2.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmText.cs 2.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/inspect.c 2.6 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/README.txt 2.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Ferruh Mavituna on Netsparker.eng.txt 2.6 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Amol_SCADA_Code.zip 2.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Mario Vuksan on TitanEngine.eng.vtt 2.6 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/nginx.conf-example 2.6 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - Japanese.eng.tsv 2.6 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/BadUSB - On Accessories that Turn Evil by Karsten Nohl - Jakob Lell.eng.srt 2.5 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/lib/eapeak/networks.py 2.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/changesegment.c 2.5 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/m4/dxp_libnet.m4 2.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Ferruh Mavituna on Netsparker.eng.lrc 2.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_10.jpe 2.5 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Didier Stevens on PDF Tools.eng.tsv 2.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Sotirov/Source Code/exploits/ms06-067-keyframe.html 2.5 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Sumit Siddarth on Hacking XPath 2.eng.vtt 2.5 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 7 7.srt 2.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/OracleBackdoor.sql 2.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmText.Designer.cs 2.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-mips.h 2.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-b.c 2.5 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Serkan Ozkan on CVEdetails.eng.srt 2.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/randmmap.txt 2.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sort.c 2.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmFrequency.Designer.cs 2.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/redball-ft.gif 2.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/redball-ft.gif 2.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/OracleBackdoor.sql 2.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Willem Mouton on YETI Tool.eng.tsv 2.4 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matias Katz & Maxi Soler.eng.vtt 2.4 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/bh-speakers.css 2.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Isaac Dawson on The Web Browser Testing System (WBTS).eng.srt 2.4 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Raphael Mudge.eng.vtt 2.4 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kornbrust/Kornrust_install_rootkit.zip 2.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with David SecurityNinja Rook on Agnitio v2.eng.srt 2.4 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/repscan.txt 2.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/include/librevm-color.h 2.4 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/icons2-schedule.jpg 2.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chuck Willis on OWASP Broken Web Applications Project.eng.tsv 2.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Mario Vuksan on TitanEngine.eng.txt 2.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/prefixes.c 2.4 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/icons2-registration2.jpg 2.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Mario Vuksan on TitanEngine.eng.lrc 2.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Christian Martorella on Wfuzz & WebSlayer v2.0.eng.vtt 2.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Stephan Chenette on FireShark v2.eng.txt 2.4 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matias Katz & Maxi Soler.eng.txt 2.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/utils.c 2.4 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/lib/eapeak/clients.py 2.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Stephan Chenette on FireShark v2.eng.vtt 2.3 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Byoungyoung Lee on DarunGrim.eng.srt 2.3 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Stephan Chenette on FireShark v2.eng.lrc 2.3 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matias Katz & Maxi Soler.eng.lrc 2.3 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Ferruh Mavituna on Netsparker.eng.vtt 2.3 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Christian Martorella on Wfuzz & WebSlayer v2.0.eng.txt 2.3 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Sumit Siddarth on Hacking XPath 2.eng.tsv 2.3 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with David SecurityNinja Rook on Agnitio v2.eng.txt 2.3 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 2-2.eng.tsv 2.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/newsmap_100806.js 2.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/newsmap_100806.js 2.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libui/Makefile 2.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/PaX docs/emusigrt.txt 2.3 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Christian Martorella on Wfuzz & WebSlayer v2.0.eng.lrc 2.3 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/BadUSB - On Accessories that Turn Evil by Karsten Nohl - Jakob Lell.eng.vtt 2.3 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with David SecurityNinja Rook on Agnitio v2.eng.lrc 2.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/linkmap.c 2.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_07.jpe 2.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmDotPlot.cs 2.3 KB
- Black Hat logo-1.png 2.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmDotPlot.Designer.cs 2.3 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/icons2-trainer2.jpg 2.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/mips/tables_mips.c 2.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-0.c 2.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/quit.c 2.3 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fayo/Supporting Files/SQLI_OSCommand.sql 2.3 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/data/man/eapeak.1 2.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/reladd.c 2.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/stripsections.c 2.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/01425i17260300.jpe 2.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with David SecurityNinja Rook on Agnitio v2.eng.vtt 2.2 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/scanreport.xml 2.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/local_process.png 2.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/frmAttractor.Designer.cs 2.2 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Tom Forbes on XCAT Xpath Injection.eng.srt 2.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/OracleRootkit.sql 2.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/OracleRootkit.sql 2.2 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/icons2-sponsors.jpg 2.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/flush.c 2.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Isaac Dawson on The Web Browser Testing System (WBTS).eng.txt 2.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-d.c 2.2 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Serkan Ozkan on CVEdetails.eng.vtt 2.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/paratrace_logs.txt 2.2 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/docs/paratrace_logs.txt 2.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Isaac Dawson on The Web Browser Testing System (WBTS).eng.vtt 2.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/prompt.c 2.2 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Raphael Mudge.eng.tsv 2.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Isaac Dawson on The Web Browser Testing System (WBTS).eng.lrc 2.2 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/elffile.h 2.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/rpht.c 2.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmBitPlot.Designer.cs 2.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/got.c 2.1 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Armin Buescher on ReplayProxy.eng.tsv 2.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/include/libaspect-hash.h 2.1 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S5.windows2000.disable.services 2.1 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Mario Vuksan on TitanEngine.eng.tsv 2.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmByteCloud.Designer.cs 2.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_tb.gif 2.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmPresence.Designer.cs 2.1 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-cerrudo/Examples/Microsoft Windows Report Contro 2.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/symtab.c 2.1 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/README 2.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/frmAttractor.cs 2.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_15.jpe 2.1 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Willem Mouton on YETI Tool.eng.text 2.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kohno_Fu_Vulnerabilties_in_Wireless_Medical_Devices/thumbs/mt3-0-2.tiff 2.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/evideo-mod.css 2.1 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Chuck Willis on OWASP Broken Web Applications Project.eng.text 2.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/html/viewers.html 2.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/obj.c 2.1 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Byoungyoung Lee on DarunGrim.eng.vtt 2.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc6.c 2.1 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Ferruh Mavituna on Netsparker.eng.tsv 2.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_14.jpe 2.1 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S5.windows2000.DC.disable.servi 2.1 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Tom Forbes on XCAT Xpath Injection.eng.txt 2.0 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matias Katz & Maxi Soler.eng.tsv 2.0 KB
- Black Hat Asia/Black Hat Japan 2006/audio/Black Hat Japan 2006 captions/Jeff Moss - Welcome - Japanese.eng.text 2.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/BadUSB - On Accessories that Turn Evil by Karsten Nohl - Jakob Lell.eng.txt 2.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/setup.py 2.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/include/libmjollnir-blocks.h 2.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/e2dbg-misc.c 2.0 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Tom Forbes on XCAT Xpath Injection.eng.lrc 2.0 KB
- Black Hat USA/Black Hat USA 2006/presentations/OConnor/OConnor_xerox_exploit_BH06.pl.zip 2.0 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Didier Stevens on PDF Tools.eng.text 2.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmByteCloud.cs 2.0 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/BadUSB - On Accessories that Turn Evil by Karsten Nohl - Jakob Lell.eng.lrc 2.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/Makefile 2.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/Makefile 2.0 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Serkan Ozkan on CVEdetails.eng.txt 2.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Marcus Carey on Vsploit..eng.srt 2.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmEncode.cs 2.0 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Tom Forbes on XCAT Xpath Injection.eng.vtt 2.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/comment.c 2.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/main.c 2.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-5.c 2.0 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with James Forshaw on CANAPE.eng.srt 2.0 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Serkan Ozkan on CVEdetails.eng.lrc 2.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/print.c 2.0 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/rss-black.jpg 2.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Patton/Extras/code/myspaceminer_login.pl 2.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/Makefile 2.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Christian Martorella on Wfuzz & WebSlayer v2.0.eng.tsv 2.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with David SecurityNinja Rook on Agnitio v2.eng.tsv 2.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Stephan Chenette on FireShark v2.eng.tsv 2.0 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/icons2-main2.jpg 1.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/bin/elfThor.c 1.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-4.c 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/eweek_header_new.html 1.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/obj/Debug/binviz_0.05.csproj.GenerateResource.Cache 1.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmStats.Designer.cs 1.9 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Maxi Soler on FireCAT.eng.srt 1.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/unload.c 1.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/mach/kalloc.c 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/logo_nabble_forums.png 1.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-2.c 1.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/CleanOracleRootkit.sql 1.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/CleanOracleRootkit.sql 1.9 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/pk_crypt.c 1.9 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/configure.in 1.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg_multithreads/test-threads.c 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/image_6193881_88x66.jpe 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/image_6193881_88x66.jpe 1.9 KB
- Black Hat Europe/Black Hat Europe 2003/Video/Black Hat Europe 2003 captions/David Aitel - Vivisection of an Exploit Development Process 2-2.eng.text 1.9 KB
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/license.txt 1.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kotler_Rom_Jinx_Malware/Jinx_zero_dot_one/Server/cgi-bin/control.py 1.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/Makefile 1.9 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fayo/Supporting Files/SQLI_UploadingAFile.sql 1.9 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmProgressBar.Designer.cs 1.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/commands.c 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Wikipedia_Buffer_overflow_files/poweredby_mediawiki_88x31.png 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Dangling_pointer_files/poweredby_mediawiki_88x31.png 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/poweredby_mediawiki_88x31.png 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Stack-Smashing-Protection_files/poweredby_mediawiki_88x31.png 1.9 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/icons2-hotel2.jpg 1.9 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Mario Vuksan on TitanEngine.eng.text 1.9 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fayo/Supporting Files/BOF_CreatingSYSDBAUser.sql 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/stylea87f.css 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/stylec81e.css 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/AlephOne_Smashing_The_Stack_files/style.css 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Murat_buffer-overflows-demystified_files/style.css 1.9 KB
- Black Hat USA/Black Hat USA 2007/presentations/Patton/Extras/code/readme.txt 1.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/continue.c 1.9 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_static/rel2.c 1.9 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.plg 1.8 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.plg 1.8 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.plg 1.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/zd-logo.gif 1.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/32465595-320-0_88x66.jpe 1.8 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Byoungyoung Lee on DarunGrim.eng.txt 1.8 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/libtest.c 1.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/pk-1.0_pre1/md4.h 1.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/01425i7472400.gif 1.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/hammer.c 1.8 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Marcus Carey on Vsploit..eng.vtt 1.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fayo/Supporting Files/SQLI_BecomingSYS.sql 1.8 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Egale - Attacking Obfuscated Code with IDA pro.eng.srt 1.8 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Byoungyoung Lee on DarunGrim.eng.lrc 1.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/query_summary.py 1.8 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with James Forshaw on CANAPE.eng.txt 1.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-sparc-decode.h 1.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/id_framework_passive.py 1.8 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/m4/dxp_libtc.m4 1.8 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Conti/software/secvis/readme.txt 1.8 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with James Forshaw on CANAPE.eng.vtt 1.8 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S1.windows2003.User.Rights.cmd 1.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/log.c 1.8 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with James Forshaw on CANAPE.eng.lrc 1.8 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/BadUSB - On Accessories that Turn Evil by Karsten Nohl - Jakob Lell.eng.tsv 1.8 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Sumit Siddarth on Hacking XPath 2.eng.text 1.8 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Isaac Dawson on The Web Browser Testing System (WBTS).eng.tsv 1.8 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/interp.c 1.8 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/.aware alpha zine - Adjacent memory overflows_files/item.css 1.8 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matias Katz & Maxi Soler.eng.text 1.8 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Marcus Carey on Vsploit..eng.txt 1.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/configure.c 1.7 KB
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/topbutton.gif 1.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/remove.c 1.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/screen.c 1.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Marcus Carey on Vsploit..eng.lrc 1.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/filter.c 1.7 KB
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Raphael Mudge.eng.text 1.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/header_tagline2.gif 1.7 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/errorlog.h 1.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_pie-ssp/simple.c 1.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/Makefile 1.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Maxi Soler on FireCAT.eng.vtt 1.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Pedro Joaquin on Routerpwn.eng.srt 1.7 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Tom Forbes on XCAT Xpath Injection.eng.tsv 1.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/Maguro/cli.py 1.7 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Egale - Attacking Obfuscated Code with IDA pro.eng.vtt 1.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/output.c 1.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_indir_rmv.c 1.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/01425i15501400.gif 1.7 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Armin Buescher on ReplayProxy.eng.text 1.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/reginfo.c 1.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00020.txt 1.7 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Serkan Ozkan on CVEdetails.eng.tsv 1.7 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/Makefile 1.7 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/manciniPic_88x66.jpe 1.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/manciniPic_88x66.jpe 1.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Egale - Attacking Obfuscated Code with IDA pro.eng.txt 1.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/Makefile 1.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Christian Martorella on Wfuzz & WebSlayer v2.0.eng.text 1.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/html/bh-css/lib/forms.css 1.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/ia64.c 1.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/28px-Portal.png 1.6 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Egale - Attacking Obfuscated Code with IDA pro.eng.lrc 1.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/ctors.c 1.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with David SecurityNinja Rook on Agnitio v2.eng.text 1.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/mips64.c 1.6 KB
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Dominique Brezinski - Penetrating NT Networks Through Information Leaks and Policy Weaknesses.eng.json 1.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/dtors.c 1.6 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fayo/Supporting Files/BOF_GettingOSAdmin.sql 1.6 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/pk-1.0_pre1/paketto.h 1.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/ebay2go_88x66.jpe 1.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/ebay2go_88x66.jpe 1.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Stephan Chenette on FireShark v2.eng.text 1.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/David_LeBlanc-Whats-Exploitable.aspx_files/print.html 1.6 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/injectso.h 1.6 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Ferruh Mavituna on Netsparker.eng.text 1.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/Makefile 1.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/MadUCat.js 1.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/MadUCat.js 1.6 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S2.windows2000.registry.domain 1.6 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S2.windows2000.registry.member 1.6 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S2.windows2000.registry.termina 1.6 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S2.windows2000.registry.web.ser 1.6 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Jose Esparza on Peepdf.eng.srt 1.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Sotirov/Source Code/LICENSE 1.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/Makefile 1.6 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Andrey Labunets on Windbgshark.eng.srt 1.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/mips/mips_decode.c 1.6 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc5.c 1.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/news_matrix.css 1.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/news_matrix.css 1.6 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/front.js 1.6 KB
- Black Hat USA/Black Hat USA 2008/conference cd/html/archive_link.html 1.5 KB
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/codepatchlist.c 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/Makefile 1.5 KB
- Black Hat USA/Black Hat USA 2014/video/Black Hat USA 2014 captions/BadUSB - On Accessories that Turn Evil by Karsten Nohl - Jakob Lell.eng.text 1.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/subscribe-to.gif 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-c.c 1.5 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/setup.py 1.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmAddFilter.cs 1.5 KB
- Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/port_scan_via_xspa.zip 1.5 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fayo/Supporting Files/TableEmp.asp 1.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Byoungyoung Lee on DarunGrim.eng.tsv 1.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Pedro Joaquin on Routerpwn.eng.vtt 1.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/google_logo.gif 1.5 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmPresence.cs 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_group12.c 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/instruction.c 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/script-types.esh 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_casa.c 1.5 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/bin/cookie.fws.swf 1.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S1.windows2000.User.Rights.cmd 1.5 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/bin/eventlognt2k3DC.kix 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_casxa.c 1.5 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with James Forshaw on CANAPE.eng.tsv 1.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Maxi Soler on FireCAT.eng.txt 1.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Marcus Carey on Vsploit..eng.tsv 1.5 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 7 7.srt 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sll.c 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sra.c 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_srl.c 1.5 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Thomas_Lopatic_NCSA_Overflow_Bugtraq_files/neohapsis_logo.gif 1.5 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Maxi Soler on FireCAT.eng.lrc 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/state.c 1.5 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/Makefile 1.5 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Egale - Attacking Obfuscated Code with IDA pro.eng.tsv 1.4 KB
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fayo/Supporting Files/BOF_SDO_CODE_SIZE_10g.sql 1.4 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Jose Esparza on Peepdf.eng.vtt 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc0.c 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_jmpl.c 1.4 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12.eng.json 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/mode.c 1.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/zz.S6.windows2000.OS2POSIX.subs 1.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Brad TheNurse Smith on BH Arsenal 2011.eng.srt 1.4 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Andrey Labunets on Windbgshark.eng.vtt 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_unary_rmb.c 1.4 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Jose Esparza on Peepdf.eng.txt 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/symtab_extend/symtab_extend.c 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_unmapped_injection/section_inject.c 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/README 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/vectors.c 1.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Isaac Dawson on The Web Browser Testing System (WBTS).eng.text 1.4 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Jose Esparza on Peepdf.eng.lrc 1.4 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Tom Forbes on XCAT Xpath Injection.eng.text 1.4 KB
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12 Sizzle Reel.eng.json 1.4 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/sitefooter_securitydecisions.gif 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/dwarf2-utils.c 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libui/include/libui.h 1.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Pedro Joaquin on Routerpwn.eng.txt 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/bp.c 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/dumpregs.c 1.4 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Pedro Joaquin on Routerpwn.eng.lrc 1.4 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-polak/VisualC++/BlackHatNP.cpp 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/e2dbg/main.c 1.4 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/stringtable.c 1.3 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S3.windows2000.Registry.Permiss 1.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/search_go_off.gif 1.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/search_go_off.gif 1.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/hooking/KeyLogger/keyLogger/structures.h 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_unary_rmv.c 1.3 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Serkan Ozkan on CVEdetails.eng.text 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/switch.c 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/step.c 1.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kotler_Rom_Jinx_Malware/Jinx_zero_dot_one/Server/cgi-bin/command.py 1.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_subscription_subhead.gif 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/export_and_zip.sql 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_reg_iv.c 1.3 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S4.windows2000.Filesystem.Lockd 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/include/libaspect-btree.h 1.3 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Andrey Labunets on Windbgshark.eng.txt 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/delete.c 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_wr.c 1.3 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Andrey Labunets on Windbgshark.eng.lrc 1.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/sitefooter_searchsecurity.gif 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/ctors_hijack/ctors_hijack.c 1.3 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Chris Egale - Attacking Obfuscated Code with IDA pro.eng.text 1.3 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_reprint_icon2.gif 1.3 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/Windows.2000.Member.Server.cmd 1.3 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Brad TheNurse Smith on BH Arsenal 2011.eng.vtt 1.3 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/Windows.2000.Web.Server.cmd 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/Makefile 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/init.c 1.3 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/free regacl for section 3 regis 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/etrel_inject.c 1.3 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/etrel_inject.c 1.3 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Byoungyoung Lee on DarunGrim.eng.text 1.3 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/Properties/AssemblyInfo.cs 1.2 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S2.windows2003.registry.domain 1.2 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S2.windows2003.registry.member 1.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/highimpact.gif 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/mips/mips_convert.c 1.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Brad TheNurse Smith on BH Arsenal 2011.eng.txt 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/tools/desDiff.pl 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/notes.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stw.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc7.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stb.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_std.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sth.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stx.c 1.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Marcus Carey on Vsploit..eng.text 1.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Maxi Soler on FireCAT.eng.tsv 1.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_subscription_services.gif 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_386sp.c 1.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Brad TheNurse Smith on BH Arsenal 2011.eng.lrc 1.2 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Jose Esparza on Peepdf.eng.tsv 1.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/.aware alpha zine - Adjacent memory overflows_files/alpha.gif 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/history.c 1.2 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/Windows.2000.Terminal.server.cm 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/rtld-multiarch.txt 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xchg_eax_reg.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with James Forshaw on CANAPE.eng.text 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc4.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-e.c 1.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/.aware alpha zine - Adjacent memory overflows_files/omega.gif 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elibc/Makefile 1.2 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/ReadMe.txt 1.2 KB
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ReadMe.txt 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/tools/mjollnirUnitTest.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_group14.c 1.2 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/01425i12501200.gif 1.2 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/obj/Debug/binviz_0.01.csproj.GenerateResource.Cache 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sub.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/js_warn.py 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_rd.c 1.2 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Pedro Joaquin on Routerpwn.eng.tsv 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc2.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/Makefile 1.2 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/data/man/eapeak.1.gz 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/et_rel2static/rel.c 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/bad_files.py 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/export_and_zip.sql 1.2 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_subreg_ib.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/rel.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/misc.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/send_zip.sql 1.1 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/src/POST.as 1.1 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dominique Brezinski - Acting in Milliseconds - Why Defense Processes Need to Change.eng.srt 1.1 KB
- Black Hat thank you.txt 1.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/0s701ss701mrc5astBREAKING%20NEWSdt100.html 1.1 KB
- Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 8 8.srt 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/CREDITS 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/api.c 1.1 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/SQLscripts Folder/ELEVATING PRIVILEGES 2.sql 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/dtors_hijack/dtors_hijack.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/send_zip.sql 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_movcc.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Andrey Labunets on Windbgshark.eng.tsv 1.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_16.jpe 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_subcc.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_or.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/cat.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/misc.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/bad_directories.py 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Data Thief.vbp 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Data Thief.vbp 1.1 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/securityvernt2k.kix 1.1 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/bin/securityvernt2k3.kix 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_immed_rmb_ib.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/cleanup.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/cleanup.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/obj/SWFCookieConfig.old 1.1 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/obj/SWFCookieConfig.xml 1.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/html/bh-css/lib/reset.css 1.1 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/Properties/Settings.Designer.cs 1.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/xml_sm.gif 1.1 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/xml_sm.gif 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_group7.c 1.1 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/src/GET.as 1.1 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/strip.c 1.0 KB
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/DataThief Folder/Data Thief.vbp 1.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/Makefile 1.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/Windows.2000.Domain.Controller 1.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/pmproxy.py 1.0 KB
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/S12.Windows2000.MDAC.RDS.Remova 1.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/script.sh 1.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_immed_rmv_ib.c 1.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dominique Brezinski - Acting in Milliseconds - Why Defense Processes Need to Change.eng.vtt 1.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_static/Makefile 1.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Kotler_Rom_Jinx_Malware/Jinx_zero_dot_one/Server/Jinx/savefile.php 1.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_stripping/sht_removing.c 1.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dominique Brezinski - Acting in Milliseconds - Why Defense Processes Need to Change.eng.txt 1.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shift_rmv_cl.c 1.0 KB
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmProgressBar.cs 1.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_xnor.c 1.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/sitefooter_infosecurity.gif 1.0 KB
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Jose Esparza on Peepdf.eng.text 1.0 KB
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dominique Brezinski - Acting in Milliseconds - Why Defense Processes Need to Change.eng.lrc 1.0 KB
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-USNAnalysis_files/u-www.png 1.0 KB
- Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/README 1.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_shld.c 1.0 KB
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Brad TheNurse Smith on BH Arsenal 2011.eng.tsv 1.0 KB
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovdcc.c 1022 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovqcc.c 1022 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovscc.c 1022 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_group15.c 1021 bytes
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Maxi Soler on FireCAT.eng.text 1020 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/got_hijack/got_hijack.c 1011 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_reg.c 1010 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/writable_dir.py 1005 bytes
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Pedro Joaquin on Routerpwn.eng.text 1004 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/Makefile 1000 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/toparch.gif 998 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pop_reg.c 998 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_addcc.c 995 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/rel.c 994 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_orcc.c 989 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_rebuild/sht_rebuild.c 989 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_add.c 986 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_immed_rmv_iv.c 985 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_inc_reg.c 977 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_dec_reg.c 975 bytes
- Black Hat Europe/Black Hat Europe 2012/ToolsTube/Black Hat Europe 2012 captions/ToolsTube with Andrey Labunets on Windbgshark.eng.text 974 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/1.gif 968 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/2.gif 968 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/3.gif 968 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/4.gif 968 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/5.gif 968 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/6.gif 968 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/7.gif 968 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/8.gif 968 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/9.gif 968 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/10.gif 968 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/ProcessMemory.cs 964 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/dir_listing.py 961 bytes
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/bin/cookie.swf 956 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/libasm_TODO.txt 949 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/error.c 948 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/comment.c 948 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/strings_tests.esh 948 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_bt_rm_r.c 947 bytes
- Black Hat DC/Black Hat DC 2008/Video/Day2.txt 946 bytes
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Day2.txt 946 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/Makefile 946 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/FrmHtml.frm 937 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/FrmHtml.frm 937 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stfsr.c 934 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/modlist.c 931 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldfsr.c 928 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01.sln 922 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc3.c 919 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/exec.c 911 bytes
- Black Hat USA/Black Hat USA 2002/presentations/murphey/README 910 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_andcc.c 909 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_eax_iv.c 907 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/DataThief Folder/FrmHtml.frm 907 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/include/libmjollnir-fprint.h 902 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/modules/modtest.c 902 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/host.c 901 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/html/bh-css/lib/ie.css 900 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/smallleft.gif 899 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/btailtop.gif 896 bytes
- Black Hat DC/Black Hat DC 2008/Video/Day1.txt 894 bytes
- Black Hat DC/Black Hat DC 2008/Video/Black Hat DC 2008 captions/Day1.txt 894 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/FrmStats.cs 894 bytes
- Black Hat USA/Black Hat USA 2002/presentations/sassaman/bibliography.txt 893 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/feed-icon-10x10.jpe 893 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/feed-icon-10x10.jpe 893 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/COPYING 892 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_andn.c 890 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Wikipedia_Buffer_overflow_files/wikimedia-button.png 890 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Dangling_pointer_files/wikimedia-button.png 890 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/wikimedia-button.png 890 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_Stack-Smashing-Protection_files/wikimedia-button.png 890 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_insw.c 888 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_tcc.c 888 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_xor.c 888 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fpop1.c 885 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_wrpr.c 884 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shr_rmv_ib.c 881 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/include/etrace.h 879 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/Makefile 879 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/lend.gif 874 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_eax_iv.c 874 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_eax_iv.c 872 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_movsd.c 866 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_eax_iv.c 866 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-mips-structs.h 865 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/modules/Makefile 865 bytes
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dominique Brezinski - Acting in Milliseconds - Why Defense Processes Need to Change.eng.tsv 865 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_bswap.c 864 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shift_rmv_1.c 863 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/Windows.2003.Terminal.Server.cm 863 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/Windows.2003.Web.Server.cmd 863 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shr_rmb_ib.c 862 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-USNAnalysis_files/smile2.png 861 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/epodDynamicMPU.js 860 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/Windows.2003.Member.Server.cmd 859 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/archcorn.gif 856 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_stosd.c 856 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/elfshrc.example 855 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg/host.c 855 bytes
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/Makefile 855 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/rend.gif 854 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_bpcc.c 851 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-polak/VisualC++/StdAfx.h 847 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_shrd_rmv_rv_ib.c 842 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/foreach-tests.esh 842 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/TopicDumpJs.js 839 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_movr.c 838 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_test_eax_iv.c 836 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/hooking/KeyLogger/keyLogger/Info.plist 835 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-cerrudo/Examples/WTHoster Class.html 835 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/dkom/HideProc/HideProc/Info.plist 834 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/dont cheat look at TEST2.cpp 834 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-blight/Trusted Computing/trusted.htm 834 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_popc.c 833 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/hooking/tcphook/Info.plist 833 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/S11.Windows2000.Remove.Default 831 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_imul_gv_ev_ib.c 830 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00030.html 828 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_prefetcha.c 827 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00031.html 826 bytes
- Black Hat USA/Black Hat USA 2011/ToolsTube/Black Hat USA 2011 ToolsTube captions/ToolsTube with Brad TheNurse Smith on BH Arsenal 2011.eng.text 826 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_outsw.c 824 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldstuba.c 823 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stfa.c 823 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldfa.c 822 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stba.c 822 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stda.c 822 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stha.c 822 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stwa.c 822 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stxa.c 822 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldda.c 821 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldxa.c 821 bytes
- Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 7 7.srt 821 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/run.c 820 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_eax_iv.c 820 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00006.html 820 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00024.html 820 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldsha.c 819 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stdfa.c 819 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stqfa.c 819 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00023.html 819 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00029.html 819 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lddfa.c 818 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldqfa.c 818 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_swapa.c 818 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/run.c 817 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldsba.c 817 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldswa.c 817 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lduba.c 817 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lduha.c 817 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lduwa.c 817 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/mutex.c 817 bytes
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/Makefile.in 817 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00011.html 817 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00013.html 817 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_ref_iv_eax.c 814 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00014.html 814 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00037.txt 812 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00012.html 811 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_al_ib.c 810 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00015.html 810 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00016.html 810 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-polak/VisualC++/BlackHatNP.h 810 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00036.html 809 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_segr_rm.c 806 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00007.html 805 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00008.html 805 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/curjob.c 802 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00021.html 802 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_al_ib.c 801 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00025.html 801 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_eax_iv.c 800 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00027.html 800 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_eax_iv.c 799 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00037.html 799 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/mach/changeseclvl.c 798 bytes
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/dump_core.c 796 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00005.html 796 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/hash_retreive/hash_read.c 795 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00018.html 794 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_taddcctv.c 793 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_tsubcctv.c 793 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_al_ib.c 792 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_al_ib.c 792 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg/e2dbg 792 bytes
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/briefingssubh.gif 791 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_restore.c 791 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sdivcc.c 791 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00026.html 791 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/Place a copy of RegDACL.exe her 791 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_addccc.c 789 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_andncc.c 789 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_mulscc.c 789 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_smulcc.c 789 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_subccc.c 789 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_taddcc.c 789 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_tsubcc.c 789 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_udivcc.c 789 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_umulcc.c 789 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_xnorcc.c 789 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_xorcc.c 789 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00034.html 788 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_addc.c 787 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sdivx.c 787 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_udivx.c 787 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00033.html 787 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_orncc.c 786 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00010.html 786 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_mulx.c 785 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_save.c 785 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sdiv.c 785 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_smul.c 785 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_subc.c 785 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_udiv.c 785 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_umul.c 785 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00020.html 785 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00032.html 785 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Schulman/Schulman_extensions_custom.conf.zip 784 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00002.html 784 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00009.html 784 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-luiz-ramos-References.txt 783 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_and.c 783 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Luiz_Ramos/Whitepaper/bh-eu-07-luiz_ramos-References.txt 783 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00019.html 783 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_orn.c 782 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00017.html 782 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/Makefile 781 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00004.html 781 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/html/bh-css/screen.css 781 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/other/kern_control/kern_control.kext/Contents/Info.plist 781 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00022.html 780 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00028.html 780 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_eax_ref_iv.c 779 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shift_rmb_cl.c 777 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg_multithreads/libtest.c 776 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/cookie_sent_on_qs.py 776 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00003.html 774 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00035.html 771 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_group6.c 770 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_scasd.c 770 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/other/kern_control/client.dSYM/Contents/Info.plist 767 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/doc/Makefile 759 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmpsb.c 758 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovdr.c 757 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovqr.c 757 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovsr.c 757 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S5.windows2003.DC.disable.servi 757 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S5.windows2003.disable.services 757 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_movsb.c 756 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/S11.Windows2000.Remove.IIS.Samp 752 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldsh.c 751 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg/Makefile 751 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/SNMPStringChanges/bin/W2K/Windows2000.SNMP.String.Change 751 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_swap.c 750 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/IISHardeningScripts/S11.Windows2003.Remove.IIS.Samp 750 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_al_ib.c 749 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldsb.c 749 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldsw.c 749 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldub.c 749 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lduh.c 749 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lduw.c 749 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_prefetch.c 749 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_al_ref_iv.c 748 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldstub.c 748 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stdf.c 748 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stqf.c 748 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/tables.c 747 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_insb.c 747 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_al_ib.c 747 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lddf.c 747 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldqf.c 747 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldd.c 746 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldx.c 746 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/doswitch.c 746 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/tables.c 745 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stf.c 745 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldf.c 744 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_outsb.c 743 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_shld_rmv_rv_cl.c 742 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_al_ib.c 742 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/obj/binviz_0.05.csproj.FileList.txt 742 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_shrd_rmv_rv_cl.c 741 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_index_injection/Makefile 741 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00001.html 741 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_stosb.c 739 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_al_ib.c 739 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/doc/TODO 738 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/comment_warn.py 737 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/bin/eventlognt2k3.kix 736 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmpsd.c 734 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_incdec_rmb.c 734 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rm_segr.c 734 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/symtab_extend/Makefile 731 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/eventlog.kix 731 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_eax_iv.c 728 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Patton/Extras/code/profile_links.pl 727 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_je_cxz.c 725 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmped.c 722 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmpeq.c 722 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmpes.c 722 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00038.html 722 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/config/mkinstalldirs 722 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmpd.c 719 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmpq.c 719 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmps.c 719 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/icon_my_yahoo.gif 719 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/Makefile.am 718 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/01425i16591900.gif 717 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-USNAnalysis_files/print.css 717 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/html/bg.jpg 716 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_rdpr.c 713 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/dtors_hijack/Makefile 713 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_xadd.c 711 bytes
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fayo/Supporting Files/SQLI_BecomingDBA.sql 711 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/include/elfsh.h 710 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lodsb.c 709 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_loopne.c 709 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/01425i8585000.gif 709 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_top_injection/Makefile 706 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/IISHardeningScripts/S10.windows2003.iis.registry.ed 706 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/S10.windows2000.iis.registry.ed 706 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_loope.c 705 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/html/masthead.jpg 704 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_test_al_rb.c 703 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Startup Spotlight Competition at Black Hat.eng.srt 703 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_bound_gv_ma.c 701 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/icon_google.gif 701 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/add-to-google-104x17.gif 701 bytes
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/bin/cookie.flr 699 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/save.c 698 bytes
- Black Hat USA/Black Hat USA 2004/Black Hat USA 2004 captions/Dominique Brezinski - Acting in Milliseconds - Why Defense Processes Need to Change.eng.text 698 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_out_ref_ib_eax.c 697 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/LinkFA-star.png 697 bytes
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Black Hat USA 2023 Highlights.eng.srt 696 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S1.windows2000.CreateAdmin.cmd 693 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_in_eax_dx.c 690 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S1.windows2000.CreateAdmin.cmd 690 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_imul_rv_rmv_iv.c 689 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S5.windows2000.Stop.Services.cm 689 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_out_dx_eax.c 688 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/SQLscripts Folder/UNCOVERING REPLICATION PASSWORD 688 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_scasb.c 687 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Darren Manners.eng.srt 686 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_loop.c 684 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/loop.esh 684 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/icon_my_msn.gif 684 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_out_dx_al.c 683 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-3.c 682 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_stripping/Makefile 682 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/README 681 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_in_al_dx.c 679 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jmp_ap.c 675 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S5.windows2000.DC.Stop.Services 675 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_return.c 673 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/login-x.gif 670 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/login-x.gif 670 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_retf_i2.c 668 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_flush.c 668 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/StdAfx.h 667 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/StdAfx.h 667 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/StdAfx.h 667 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/host.c 664 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_rmv_rv.c 663 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/ctors_hijack/Makefile 663 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/S11.Windows2000.Disable.Parent 663 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_in_eax_ref_ib.c 661 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_out_ref_ib_al.c 661 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_fillbss_injection/Makefile 660 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_unmapped_injection/Makefile 660 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/got_hijack/Makefile 658 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_in_al_ref_ib.c 657 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_ref_iv_al.c 657 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/SQLscripts Folder/ELEVATING PRIVILEGES.sql 657 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jno.c 656 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/reconfig 656 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shift_rmb_1.c 654 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_bpr.c 654 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/hash_retreive/Makefile 654 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fbpfcc.c 650 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_mov_dr_rm.c 645 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_int_ib.c 645 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_mov_cr_rm.c 644 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_mov_rm_cr.c 644 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_punpcklbw_pq_qd.c 644 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/et_rel2static/host.c 644 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/host.c 644 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_pie-ssp/host.c 644 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_rmb_rb.c 641 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jmp_ib.c 641 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_packuswb_pq_qq.c 640 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_punpckhbw_pq_qq.c 638 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_rb_rmb.c 638 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_ib.c 638 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_paddusw_pq_qq.c 636 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_addsize.c 634 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_paddusb_pq_qq.c 632 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_pmullw_pq_qq.c 632 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lodsd.c 632 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jne.c 630 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/Windows.2003.Domain.Controller 628 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/README.TXT 627 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel4alpha/host3.c 626 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jae.c 625 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_pand_pq_qq.c 624 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_pxor_pq_qq.c 624 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jge.c 624 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/your_connection.gif 624 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_rebuild/Makefile 623 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/offsite_redirect.py 623 bytes
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/details.gif 622 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/SNMPStringChanges/Windows2000.SNMP.Change.cmd 622 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jle.c 621 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_opsize.c 621 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S5.windows2003.DC.stop.services 621 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S5.windows2003.stop.services.cm 621 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_por_pq_qq.c 620 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/et_rel2static/Makefile 620 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/script-tables.esh 620 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jbe.c 619 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jnp.c 619 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jns.c 619 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00031.txt 619 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movzbl_rv_rmb.c 617 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_ja.c 615 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jg.c 615 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jo.c 614 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-shah/httprint_paper 1 Folder/_netsquare.gif 614 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jb.c 613 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/value_sent_thirdparty.py 613 bytes
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/config.h.in 613 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_je.c 612 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jl.c 612 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jp.c 612 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_js.c 612 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sethi.c 611 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_push_fs.c 609 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_call_iv.c 609 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_rv_rmv.c 605 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Darren Manners.eng.vtt 605 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_02.jpe 602 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/include/libmjollnir-int.h 601 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_done.c 600 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/site_securitymedia.gif 599 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/SQLscripts Folder/FILLING UP TEMPDB.sql 599 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00010.txt 598 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S5.windows2003.DC.Stop.and.Disa 597 bytes
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/codepatch.h 595 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S5.windows2000.DC.Stop.and.Disa 595 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/zzz.S6.windows2000.OS2POSIX.sub 594 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/databases.dtd 593 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_rv_rmv.c 593 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/symtab_extend/execve.s 591 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S5.windows2003.Stop.and.Disable 591 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/main.c 589 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movd_pd_qd.c 589 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movq_pq_qq.c 589 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movq_qq_pq.c 589 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S5.windows2000.Stop.and.Disable 589 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/S11.Windows2000.Set.IIS.UseHost 588 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/interp.c 587 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_xstorenrg.c 584 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/IISHardeningScripts/S11.Windows2003.Disable.Interne 583 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/S11.Windows2000.Disable.Interne 582 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jmp_iv.c 578 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S1.windows2003.Audit.Policy.cmd 577 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S1.windows2000.Audit.Policy.cmd 576 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_ret_i2.c 574 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_saved.c 574 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00008.txt 574 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00007.txt 571 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/S13.Windows2000.Set.FTP.Logging 571 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/0a11526p0s70100.html 568 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/output_operand.c 565 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_bicc.c 564 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fbfcc.c 563 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pop_ds.c 559 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_pop_fs.c 558 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_rv_rmv.c 558 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00032.txt 557 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xchg_rmv_rv.c 556 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_test_rmv_rv.c 553 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xchg_rmb_rb.c 552 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_rv_rmv.c 551 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rmv_iv.c 550 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rmv_rv.c 548 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rv_rmv.c 548 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_test_rmb_rb.c 548 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_rmv_rv.c 548 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-cerrudo/Examples/Symantec Registry Information C 548 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jle.c 547 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jge.c 546 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_rmv_rv.c 546 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rb_rmb.c 546 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rmb_ib.c 546 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rmb_rb.c 546 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_rmb_rb.c 546 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jae.c 545 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/ssl_val_sent_clear.py 545 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/icon_clear_rating.png 545 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/configure.in 545 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_rb_rmb.c 544 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_rmb_rb.c 544 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_rb_rmb.c 544 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/include/libmjollnir-container.h 544 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jbe.c 543 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/Makefile.am 543 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_rmb_rb.c 542 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_rmv_rv.c 542 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jns.c 541 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00021.txt 541 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_imul_rv_rmv.c 540 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jne.c 540 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pop_es.c 540 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_es.c 540 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S9.windows2000.Delete.TSInterne 540 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_enter.c 539 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_rv_rmv.c 539 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_ja.c 537 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.dsw 535 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.dsw 535 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.dsw 535 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pop_ss.c 535 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jl.c 534 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_js.c 534 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jb.c 533 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_je.c 533 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/SQLscripts Folder/USING OLEDB PROVIDER TO EXECUTE 532 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_cs.c 531 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_rmv_rv.c 531 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/rlheap.c 530 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movsbl_rv_rmb.c 530 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/SQLscripts Folder/DETERMINIG SQL SERVICE ACCOUNT 530 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/Makefile 529 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movswl_rv_rm2.c 528 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/iisbin/FTP.Logging.kix 528 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/rlheap.c 527 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/secure_cookies_sent_clear.py 527 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_rb_rmb.c 526 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_rmb_rb.c 526 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_iv.c 525 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-polak/VisualC++/readme.txt 525 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_top_injection/main.c 524 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jnp.c 523 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/S12Windows2000.MDAC.Samples.Rem 522 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_ds.c 521 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S1.windows2000.RenameAdmin.cmd 518 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S5.windows2003.Passprop.cmd 518 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel4alpha/host2.c 517 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S1.windows2000.RenameAdmin.cmd 517 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S5.windows2000.Passprop.cmd 517 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jp.c 516 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_arpl_ew_rw.c 516 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/id_framework_passive.cfg 514 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/INSTALL 512 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lea_rv_m.c 511 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00018.txt 511 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_rb_rmb.c 508 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/0a11526s70100.html 508 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_btrl.c 507 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel4alpha/host1.c 507 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/aproxy_strdup.c 506 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/include/etrace-help.h 504 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_04.jpe 502 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/icon_star_blue.png 502 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/include/elfsh-help.h 500 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jg.c 500 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00025.txt 500 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_01.jpe 498 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_pie-ssp/Makefile 493 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00029.txt 491 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_ss.c 488 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S1.windows2003.DC.ConfigureEven 487 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/http_auth.py 486 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00034.txt 485 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S1.windows2003.ConfigureEventLo 485 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00003.txt 483 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00004.txt 483 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/Program.cs 480 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_rb_rmb.c 479 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_rmv_rv.c 479 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_rb_rmb.c 479 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_rmb_rb.c 479 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_rmv_rv.c 479 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_rv_rmv.c 479 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_rv_rmv.c 479 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_call.c 479 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_rmb_rb.c 478 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_rv_rmv.c 478 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_rb_rmb.c 478 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_rmb_rb.c 478 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_rmv_rv.c 478 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S1.windows2000.ConfigureEventLo 478 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-USNAnalysis_files/projection.css 477 bytes
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/copyrighthead.gif 475 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00024.txt 475 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00014.txt 474 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/S5.windows2003.SetSecurityVersi 471 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00028.txt 470 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00009.txt 468 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/S5.windows2000.SetSecurityVersi 468 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/html/ppt.gif 466 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/html/ppt-off.gif 466 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/symbolic_tracing/Makefile 465 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pop_rmv.c 461 bytes
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/acconfig.h 461 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/icon_tri.png 461 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movzwl_rv_rm2.c 460 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/flowjack/target.c 459 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/SQLscripts Folder/DTS PACKAGE PASSWORD.sql 459 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/scanutil.h 458 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_bsr_rv_rmb.c 455 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/smallabout.gif 453 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/S1.windows2000.ChangeScreenSave 453 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/wordswap 452 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_btr_rmv_rv.c 452 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Georgia Weidman about SPF.eng.srt 450 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovnle.c 448 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_xchg.c 447 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lss_rv_rmv.c 447 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/TODO 445 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovle.c 444 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovnl.c 444 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovnp.c 444 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovns.c 444 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setae_rmb.c 444 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setge_rmb.c 444 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovae.c 443 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovbe.c 443 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovne.c 443 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovno.c 443 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setno_rmb.c 442 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_illtrap.c 442 bytes
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Fayo/Supporting Files/SQLI_Limitation.sql 442 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00002.txt 442 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setbe_rmb.c 441 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setle_rmb.c 441 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmova.c 440 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmove.c 440 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovl.c 440 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovo.c 440 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovp.c 440 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovs.c 440 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Windows2000.OS2 Posix scripst u 440 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/databases.xml 439 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovb.c 439 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setnp_rmb.c 439 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setns_rmb.c 439 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/David Mirza Ahmad.eng.srt 439 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_bts.c 438 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setne_rmb.c 438 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00013.txt 438 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/SQLscripts Folder/UNCOVERING SQL AGENT PASSWORD.s 438 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elibc/memcpy.c 437 bytes
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/sponsorsbt.gif 436 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_seta_rmb.c 435 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setg_rmb.c 435 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matt Bergin about PHPMap.eng.srt 434 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_seto_rmb.c 433 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setb_rmb.c 432 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setl_rmb.c 432 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setp_rmb.c 432 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sets_rmb.c 432 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sete_rmb.c 431 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_fillbss_injection/main.c 430 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/01425i1942000.gif 429 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_xml_orange.gif 429 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00030.txt 428 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00005.txt 427 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Darren Manners.eng.txt 427 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_bsf.c 425 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/obj/binviz_0.01.csproj.FileList.txt 425 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_fs.c 424 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_gs.c 424 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_cs.c 423 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_es.c 423 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_impdep1.c 423 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_impdep2.c 423 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/js_warn.cfg 423 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Darren Manners.eng.lrc 423 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_flushw.c 422 bytes
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/ChangeLog 422 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/icon_star_grey.png 418 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hn_whitepapers.gif 416 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-internal.h 415 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/config.h 414 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_repnz.c 409 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Jonathan Chittenden.eng.srt 409 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_unmapped_injection/main.c 408 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_stripping/main.c 408 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00026.txt 408 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_ss.c 406 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Georgia Weidman about SPF.eng.vtt 406 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lock.c 405 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_repz.c 405 bytes
- Black Hat DC/Black Hat Federal 2006/Black Hat Federal 2006 Topics and Speakers_files/spkrsm.gif 404 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cwtl.c 404 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/icon_blocked_gray.png 401 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_ds.c 400 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/foreach-ending.esh 399 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00027.txt 398 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cltd.c 397 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00006.txt 393 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00019.txt 392 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Gursev Kalra.eng.srt 392 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pushf.c 390 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/ctors_hijack/hijacked.c 385 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_popf.c 383 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/John_Richard_Moser-Edgy-and-Proactive-Security_files/icon_unflagged.png 382 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Darren Manners.eng.tsv 382 bytes
- Black Hat USA/Black Hat USA 2006/presentations/OConnor/OConnor_README 381 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matt Bergin about PHPMap.eng.vtt 381 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_advertisement_banner.gif 380 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elibc/strlen.c 379 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/David Mirza Ahmad.eng.vtt 377 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/e2dbg/include/e2dbg.h 375 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_static/host.c 375 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_leave.c 374 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Jonathan Chittenden.eng.vtt 374 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hn_webcasts.gif 372 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/search.asp 370 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/search.asp 370 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_retf.c 368 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/CleanSQLBackdoor.sql 367 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/CleanSQLBackdoor.sql 367 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/flowjack/recursivite.c 365 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_iret.c 364 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_ret.c 364 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/smallmembership.gif 364 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/icon_digg.gif 364 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-cerrudo/Examples/CTShell - Dangerous methods.htm 362 bytes
- HEADER.md 361 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/10.png 361 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00033.txt 359 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/8.png 357 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/9.png 357 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lds_rm_rmp.c 356 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_les_rm_rmp.c 356 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/README 356 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/6.png 355 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/SQLscripts Folder/DTS PACKAGE PASSWORD 2.sql 354 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cpuid.c 353 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/2.png 353 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00017.txt 353 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_06.jpe 352 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/3.png 350 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/test-multidim-arrays.c 349 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/rules.dtd 348 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_pie-ssp/relinject.esh 348 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/5.png 348 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Gursev Kalra.eng.vtt 348 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hn_magazine.gif 347 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_rdmsr.c 346 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_nop.c 346 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pusha.c 345 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/4.png 345 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_fwait.c 344 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/7.png 344 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Andreas Schmidt.eng.srt 344 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_rdtsc.c 343 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_popa.c 343 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/smallpublications.gif 343 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_emms.c 342 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_int_3.c 342 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xlatb.c 341 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_email_icon.gif 341 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-ppc.h 340 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_aas.c 339 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_into.c 339 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00015.txt 339 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sahf.c 338 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_das.c 336 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elibc/include/elfsh-libc.h 335 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_aaa.c 335 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_clc.c 335 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cli.c 335 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_daa.c 335 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_int1.c 335 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lahf.c 335 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_stc.c 335 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sti.c 335 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-cerrudo/Examples/SDKInstall Class - Information 335 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_aad.c 334 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_std.c 333 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/flowjack/patch.esh 332 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/ImportsDB.dat 332 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_aam.c 331 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cld.c 331 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmc.c 331 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_hlt.c 331 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Dan Cornell.eng.srt 331 bytes
- Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/1.png 329 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Yaniv Karta.eng.srt 329 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg_multithreads/Makefile 328 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/trace.esh 328 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/CleanOracleBackdoor.sql 327 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/CleanOracleBackdoor.sql 327 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Highlights.eng.srt 327 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/config.h.in 327 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/GoogleDiggity Crew.eng.srt 325 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hn_learning.gif 323 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/myparams.esh 322 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Darren Manners.eng.text 319 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/params.esh 314 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hn_aboutUs.gif 312 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Georgia Weidman about SPF.eng.txt 312 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/bad_files.cfg 311 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00016.txt 310 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Georgia Weidman about SPF.eng.lrc 309 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_print_icon.gif 308 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Jonathan Chittenden.eng.txt 308 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/m4/Makefile.am 308 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/features_11.jpe 306 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Jonathan Chittenden.eng.lrc 305 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/tools/mkDb.sh 300 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Andreas Schmidt.eng.vtt 300 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00022.txt 299 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/GoogleDiggity Crew.eng.vtt 299 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-polak/VisualC++/StdAfx.cpp 297 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/dtors_hijack/hijacked.c 296 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/smallstudents.gif 296 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Dan Cornell.eng.vtt 296 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-cray.h 295 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/StdAfx.cpp 293 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/StdAfx.cpp 293 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/StdAfx.cpp 293 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/smalltop.gif 293 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel4alpha/gdb.script 292 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/platinum_site_sponsor.gif 292 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/configure 291 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/SNMPStringChanges/bin/W2K/Windows2000.SNMP.String.Cha.1 289 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/html/presentation.gif 288 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/html/presentation-off.gif 288 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/flowjack/infected.c 287 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Konrads Smelkovs.eng.srt 287 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Yaniv Karta.eng.vtt 285 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-cerrudo/Examples/Enumerating initialization para 285 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Highlights.eng.vtt 283 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/David Mirza Ahmad.eng.txt 283 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Georgia Weidman about SPF.eng.tsv 282 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hn_advice.gif 278 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/David Mirza Ahmad.eng.lrc 278 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Jonathan Chittenden.eng.tsv 278 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_sponsors_header.gif 276 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-cerrudo/Examples/Adobe - File system access.html 275 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_wbinvd.c 271 bytes
- Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/Makefile 271 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/check.cmd 270 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hn_events.gif 269 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_right_ad.gif 269 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-cerrudo/Examples/Adobe - DOS.html 269 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/icon_slashdot.png 268 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/WikiPedia_PaX_files/magnify-clip.png 267 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Ptacek_Newsham-Initial_StackGuard_Weaknesses_files/topleftcurve.gif 266 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/S1.windows2003.ChangeScreenSave 266 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-1.c 263 bytes
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/TODO 263 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hn_topics.gif 262 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/GoogleDiggity Crew.eng.txt 261 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Konrads Smelkovs.eng.vtt 261 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/m4/dxp_ioccom.m4 261 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/generate.cmd 260 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_ud2a.c 259 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/GoogleDiggity Crew.eng.lrc 258 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/digg_16x16.gif 256 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/digg_16x16.gif 256 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 Highlights.eng.srt 256 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/pk-1.0_pre1/compile.sh 256 bytes
- Black Hat USA/Black Hat USA 2005/presentations/BH_US_05-Conti/papers/CACM_HackingConferences_Note.txt 252 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hn_news.gif 252 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00023.txt 250 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/Properties/Settings.settings 249 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/smallevents.gif 242 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hn_home.gif 236 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_static/relinject.esh 234 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/docs/CVS/Entries 234 bytes
- Black Hat USA/Black Hat USA 2002/presentations/sassaman/nilsimsa-0.2.4.tar.gz.sig 232 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_illegal.c 231 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/David Mirza Ahmad.eng.tsv 231 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Georgia Weidman about SPF.eng.text 231 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/GoogleDiggity Crew.eng.tsv 231 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matt Bergin about PHPMap.eng.txt 231 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/AUTHORS 231 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Dan Cornell.eng.txt 230 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matt Bergin about PHPMap.eng.lrc 229 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00012.txt 228 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Dan Cornell.eng.lrc 227 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Jonathan Chittenden.eng.text 227 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/README.FIRST 226 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/et_rel2static/relinject.esh 226 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Gursev Kalra.eng.txt 226 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_e2dbg/e2dbginject.esh 225 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Gursev Kalra.eng.lrc 224 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Konrads Smelkovs.eng.txt 223 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/comment_warn.cfg 221 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/FishNet Team.eng.srt 221 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/exec.xml 220 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/delicious.gif 220 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Konrads Smelkovs.eng.lrc 220 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/smallhome.gif 218 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matt Bergin about PHPMap.eng.tsv 216 bytes
- Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/INSTRUCTIONS.txt 213 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Gursev Kalra.eng.tsv 211 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/exec.dtd 206 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/doublevar.esh 205 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/FishNet Team.eng.vtt 204 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg_multithreads/test2.c 201 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Dan Cornell.eng.tsv 200 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/pk_crypt.h 199 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Konrads Smelkovs.eng.tsv 195 bytes
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/README 193 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Yaniv Karta.eng.txt 191 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Highlights.eng.txt 189 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Yaniv Karta.eng.lrc 188 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Highlights.eng.lrc 186 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/flush.esh 185 bytes
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Black Hat Europe 2022, ExCel London.en.srt 185 bytes
- Black Hat USA/Black Hat USA 2023/Black Hat USA 2023 captions/Black Hat USA 2023 Preview Video.eng.srt 183 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00038.txt 182 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/container.c 181 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/Conti_Dean_Visual_Forensic_Analysis/binviz_0.36/binviz_0.01/obj/Debug/binviz_0._1.Properties.Resources.resources 180 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/GoogleDiggity Crew.eng.text 180 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Calling all Cybersecurity Pros Join Us at Black Hat USA 2024 at the Mandalay Bay..eng.srt 180 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Andreas Schmidt.eng.txt 178 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Matt Bergin about PHPMap.eng.text 177 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/got_hijack/hijacked.c 176 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Andreas Schmidt.eng.lrc 176 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/talkbackred_15x13.gif 174 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/talkbackred_15x13.gif 174 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/copyright_small.gif 173 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Gursev Kalra.eng.text 172 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/debug.esh 171 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/debug.esh 171 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/insert_tests.esh 171 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/myputs.c 167 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/FishNet Team.eng.txt 166 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Highlights.eng.tsv 164 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/FishNet Team.eng.lrc 164 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/relinject.esh 163 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Andreas Schmidt.eng.tsv 163 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00036.txt 161 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Yaniv Karta.eng.tsv 161 bytes
- Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/Tool/read.me 159 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/advertisement.gif 159 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/advertisement.gif 159 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00011.txt 159 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/emailred_15x13.gif 157 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/emailred_15x13.gif 157 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/printred_15x13.gif 156 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/printred_15x13.gif 156 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Main.frx 155 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Main.frx 155 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/bt.c 155 bytes
- Black Hat USA/Black Hat USA 2002/presentations/sassaman/mixmaster-2.9b34.tar.gz.sig 155 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/DataThief Folder/Main.frx 155 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/gray_ad_sideHeader_728_90.gif 152 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/FishNet Team.eng.tsv 151 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Dan Cornell.eng.text 149 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/David Mirza Ahmad.eng.text 148 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/IISHardeningScripts/iisbin/disable.internet.printing.reg 148 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/iisbin/disable.internet.printing.reg 148 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/graphers.txt 147 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/S11.windows2000.Disable.WebDAV 147 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Short Reel.eng.srt 145 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Vertical Reel.eng.srt 145 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Konrads Smelkovs.eng.text 142 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/bin/Place a copy of CryptPwd.exe he 141 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/Place a copy of CryptPwd.exe he 141 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/icon_delicious.gif 140 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/flag_gre.gif 139 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/flag_red.gif 139 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/relinject.esh 138 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Calling all Cybersecurity Pros Join Us at Black Hat USA 2024 at the Mandalay Bay.eng.srt 138 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_submit_wht.gif 137 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Short Reel.eng.vtt 137 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Vertical Reel.eng.vtt 137 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/changelog 135 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/changelog 135 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/changelog 135 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/changelog 135 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/changelog 135 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/changelog 135 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/changelog 135 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/changelog 135 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/changelog 135 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/changelog 135 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/changelog 135 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/endian.esh 134 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Why Attend the World's Premier Technical Cybersecurity Conference.eng.srt 134 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/gdb.script 132 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/gdb.script 132 bytes
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Black Hat Asia 2023 Highlights.eng.srt 131 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Data Thief.vbw 130 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/FrmHtml.frx 130 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Data Thief.vbw 130 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/FrmHtml.frx 130 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/hash_retreive/main.c 130 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/DataThief Folder/FrmHtml.frx 130 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 Short Reel.eng.srt 127 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/symtab_extend/main.c 126 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Why Attend the World's Premier Technical Cybersecurity Conference.eng.vtt 126 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/DeMott_AppSec_A-Z/test.c 126 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Short Reel.eng.txt 126 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Vertical Reel.eng.txt 126 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Andreas Schmidt.eng.text 124 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Short Reel.eng.lrc 124 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Vertical Reel.eng.lrc 124 bytes
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Black Hat Asia 2023 Highlights.eng.vtt 123 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/remap_script.esh 123 bytes
- Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/INSTALL 123 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-cerrudo/DataThief Folder/Data Thief.vbw 122 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Calling all Cybersecurity Pros Join Us at Black Hat USA 2024 at the Mandalay Bay.eng.vtt 121 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/params2.esh 118 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00001.txt 117 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Why Attend the World's Premier Technical Cybersecurity Conference.eng.txt 116 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Why Attend the World's Premier Technical Cybersecurity Conference.eng.lrc 114 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 bytes
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Black Hat Asia 2023 Highlights.eng.txt 113 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/iisbin/Place a copy of ADSUTIL.VBS her 113 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/FishNet Team.eng.text 112 bytes
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Black Hat Asia 2023 Highlights.eng.lrc 111 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Calling all Cybersecurity Pros Join Us at Black Hat USA 2024 at the Mandalay Bay.eng.txt 111 bytes
- Black Hat USA/Black Hat USA 2012/tools tube/Black Hat USA 2012 ToolsTube captions/Yaniv Karta.eng.text 110 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Ptacek_Newsham-Initial_StackGuard_Weaknesses_files/white-purple-bullet.gif 109 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Highlights.eng.text 108 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Short Reel.eng.tsv 108 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Vertical Reel.eng.tsv 108 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Calling all Cybersecurity Pros Join Us at Black Hat USA 2024 at the Mandalay Bay.eng.lrc 108 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/search-button.gif 104 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/files/New.Administrator.txt 104 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/New.Administrator.txt 104 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/etrelmem.esh 103 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_subscription_arrow.gif 103 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/photo2_icon.gif 102 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/photo2_icon.gif 102 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/delicious_14x14.gif 99 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/delicious_14x14.gif 99 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/mjollnir/simple-test.esh 98 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Why Attend the World's Premier Technical Cybersecurity Conference.eng.tsv 98 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/graph-tests.esh 94 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/icon_mottInfo.gif 94 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_rebuild/README 93 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 bytes
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Black Hat Asia 2023 Highlights.eng.tsv 92 bytes
- Black Hat USA/Black Hat USA 2008/conference cd/speakers/D'Auganno_OS_X_Rootkits/Examples/other/kern_control/kern_control.kext/Contents/Resources/English.lproj/InfoPlist.strings 92 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_index_injection/main.c 88 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/divider16.gif 86 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/01425i12501300.gif 84 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Thomas_Lopatic_NCSA_Overflow_Bugtraq_files/at.gif 84 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/README 84 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/docs/README 84 bytes
- Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Laurie_Herfurt_Holtmann/._bh-eu-05-trifinite-up.pdf 82 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/ChangeLog 81 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/envelope_small.gif 78 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Calling all Cybersecurity Pros Join Us at Black Hat USA 2024 at the Mandalay Bay.eng.tsv 75 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/smallright16.gif 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/bin/Place a copy of addusers.exe he 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/bin/Place a copy of auditpol.exe he 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/bin/Place a copy of cusrmgr.exe her 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/bin/Place a copy of ntrights.exe he 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/bin/Place a copy of passprop here.t 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/bin/Place a copy of xcacls.exe here 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/SNMPStringChanges/bin/W2K/Place a copy of reg.exe here.tx 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/Place a copy of addusers.exe he 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/Place a copy of auditpol.exe he 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/Place a copy of cusrmgr.exe her 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/Place a copy of ntrights.exe he 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/Place a copy of passprop here.t 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/Place a copy of reg.exe here.tx 73 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/Place a copy of xcacls.exe here 73 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Short Reel.eng.text 72 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Black Hat USA 2024 - Vertical Reel.eng.text 72 bytes
- Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/pidof 66 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/ChangeLog 65 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/nop.py 63 bytes
- Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 captions/Black Hat Europe 2023 Why Attend the World's Premier Technical Cybersecurity Conference.eng.text 62 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/bad_directories.cfg 61 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2K3Hardening Folder/Lockdown/W2K3/bin/Place a copy of kix32.exe here 61 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/bin/Place a copy of kix32.exe here 61 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/IISHardeningScripts/iisbin/Place a copy of kix32.exe here 61 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-polak/VisualC++/BlackHatNP.DEF 61 bytes
- Black Hat Asia/Black Hat Singapore 2023/Black Hat Singapore 2023 captions/Black Hat Asia 2023 Highlights.eng.text 59 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12 Sizzle Reel.eng.vtt 59 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12.eng.vtt 59 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12 Sizzle Reel.eng.srt 58 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12.eng.srt 58 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/search_arrow.gif 58 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/hn_separator.gif 56 bytes
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Dominique Brezinski - Penetrating NT Networks Through Information Leaks and Policy Weaknesses.eng.vtt 55 bytes
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Dominique Brezinski - Penetrating NT Networks Through Information Leaks and Policy Weaknesses.eng.srt 54 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/TheoTalkOnExploitMitigationInOBSD/mgp00035.txt 54 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/bullet_square_999999.gif 53 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_tb_arrow.gif 50 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12 Sizzle Reel.eng.txt 49 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12.eng.txt 49 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/.elfsh_history 48 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12 Sizzle Reel.eng.lrc 48 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12 Sizzle Reel.eng.tsv 48 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12.eng.lrc 48 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12.eng.tsv 48 bytes
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Dominique Brezinski - Penetrating NT Networks Through Information Leaks and Policy Weaknesses.eng.tsv 48 bytes
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Dominique Brezinski - Penetrating NT Networks Through Information Leaks and Policy Weaknesses.eng.txt 45 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/docs/CVS/Root 45 bytes
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Dominique Brezinski - Penetrating NT Networks Through Information Leaks and Policy Weaknesses.eng.lrc 44 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/buy_now.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Baratloo_Singh_Tsai-StackSmashingDefenseUsenix2000_files/dot_clear.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/spacer.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/spacer_002.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/spacer_003.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/spacer_004.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_grey_pixel.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/ew_spacer.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/s13272481743644.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/spacer.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/spacer_002.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/c.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/dotclear.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/dotclear_002.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/dotclear_003.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/dotclear_004.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/dotclear_005.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/redir.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/c_002.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/dotclear.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/dotclear_002.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/dotclear_003.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/dotclear_004.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/dotclear_005.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/redir.gif 43 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/a.gif 42 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/a_002.gif 42 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/a_003.gif 42 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/B2100571.gif 42 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/c_002.gif 42 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/c.gif 42 bytes
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Black Hat Asia 2024 Highlights.eng.json 41 bytes
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Highlights.eng.json 41 bytes
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Black Hat Europe 2022, ExCel London.eng.json 41 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/AUTHOR 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/origcontent.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/origcontent_002.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EdHurley_OverflowsLikelyForAnother10years_files/origcontent_003.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/news.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/news_002.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/news_003.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/news_004.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/news_005.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/EWeekMorrisWormArticle_files/news_006.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/a.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Joris_Evers-DHS_Coverity_files/search.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Ptacek_Newsham-Initial_StackGuard_Weaknesses_files/ad.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Rafal_Wojtczuk-DefeatingSolarNoExecPatch_files/ad.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/a.html 39 bytes
- Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/HTML/Robert_Lemos-CodeReviewTools_files/search.html 39 bytes
- Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/VERSION 36 bytes
- Black Hat Windows/Black Hat Windows 2004/Presentations/bh-win-04-milroy/W2KHardening Folder/Lockdown/W2K/files/Delete.TSInternet.User.txt 32 bytes
- Black Hat USA/Black Hat USA 2024/Black Hat USA 2024 captions/Calling all Cybersecurity Pros Join Us at Black Hat USA 2024 at the Mandalay Bay.eng.text 30 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 bytes
- Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12 Sizzle Reel.eng.text 22 bytes
- Black Hat Europe/Black Hat Europe 2024/Black Hat Europe 2024 captions/Black Hat Europe 2024 at the ExCel, London December 9-12.eng.text 22 bytes
- Black Hat USA/Black Hat USA 1998/video/Black Hat USA 1998 captions/Dominique Brezinski - Penetrating NT Networks Through Information Leaks and Policy Weaknesses.eng.text 18 bytes
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Black Hat Asia 2024 Highlights.eng.tsv 16 bytes
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Highlights.eng.tsv 16 bytes
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Black Hat Europe 2022, ExCel London.eng.tsv 16 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/docs/docs/CVS/Repository 12 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/config/Makefile.am 11 bytes
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Black Hat Asia 2024 Highlights.eng.vtt 10 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/.elfsh_history 10 bytes
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Highlights.eng.vtt 10 bytes
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Black Hat Europe 2022, ExCel London.eng.vtt 10 bytes
- Black Hat Windows/Black Hat Windows 2003/Presentations/bh-win-03-kaminsky/paketto-1.0/src/stamp-h.in 10 bytes
- Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/VERSION 7 bytes
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Black Hat Asia 2024 Highlights.eng.lrc 0 bytes
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Black Hat Asia 2024 Highlights.eng.srt 0 bytes
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Black Hat Asia 2024 Highlights.eng.text 0 bytes
- Black Hat Asia/Black Hat Singapore 2024/Black Hat Singapore 2024 captions/Black Hat Asia 2024 Highlights.eng.txt 0 bytes
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Highlights.eng.lrc 0 bytes
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Highlights.eng.srt 0 bytes
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Highlights.eng.text 0 bytes
- Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 captions/Black Hat Europe 2019 Highlights.eng.txt 0 bytes
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Black Hat Europe 2022, ExCel London.eng.lrc 0 bytes
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Black Hat Europe 2022, ExCel London.eng.srt 0 bytes
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Black Hat Europe 2022, ExCel London.eng.text 0 bytes
- Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 captions/Black Hat Europe 2022, ExCel London.eng.txt 0 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.