2021-10-06 | BYOI PayloadsFusing The Powah Of NET With A Scripting Language Of Your Choosing Marcello Salvati | 53:57 | 6 | |
|
2021-10-06 | Breaking Badge Tim Wilkes and Phyushin | 32:25 | 2 | |
|
2021-10-06 | Automating User Interaction With Sheepl Soup To Nuts Matt Lorentzen | 1:52:14 | 4 | |
|
2021-10-06 | Attacking Development Pipelines For Actual Profit Alex Chapman | 25:08 | 6 | |
|
2021-10-06 | Logging Made Easy Workshop NCSC Representatives and Duncan Atkin | 19:26 | 19 | Vlog |
|
2021-10-06 | Introduction To GLIBC Heap Exploitation Max Kamper | 1:29:31 | 50 | |
|
2021-10-06 | IBM Trusteer Rapport Does IBM Intentionally Backdoor Machines Neil Kettle | 36:08 | 32 | |
|
2021-10-06 | Hunting For Bugs, Catching Dragons Nicolas Joly | 47:11 | 2 | |
|
2021-10-06 | Human Side Channels And Their Implications For Security And Privacy Matt Wixey | 45:51 | 3 | |
|
2021-10-06 | Here Be Dragons… The AWS S3 Logging Minefields Kieren Nicholas Lovell | 32:20 | 4 | Vlog |
|
2021-10-06 | Dial V For Vulnerable Attacking VoIP Phones Phillip Roskosch and Stephan Huber | 40:44 | 4 | |
|
2021-10-06 | They're All Scorpions Successful SecOps in a Hostile Workplace Pete Herzog | 37:37 | 7 | |
|
2021-10-06 | Weak Analogies make Poor Realities Charl Van Der Walt | 1:00:18 | 6 | Vlog |
|
2021-10-06 | Using SmartNICs to Provide Better Data Center Security Jack Matheson | 1:07:05 | 8 | |
|
2021-10-06 | Ghost in the Locks Timo Hirvonen & Tomi Tuominen | 44:12 | 10 | |
|
2021-10-06 | For the Love of Money Leighanne Galloway & Tim Yunusov | 42:15 | 3 | |
|
2021-10-06 | Exploits with Scratch Kev Sheldrake | 52:14 | 1 | |
|
2021-10-06 | Code of Practice for Security in Consumer IoT Products and Services David Rogers | 47:56 | 3 | |
|
2021-10-06 | Catch Me If You Can Shubham Shah & Michael Gianarakis | 30:45 | 11 | |
|
2021-10-06 | Bypassing Port Security In 2018 Defeating MacSEC and 802 1x 2010 Gabriel Ryan | 47:51 | 5 | |
|
2021-10-06 | Automating myself out of a job Jay Harris | 42:36 | 3 | |
|
2021-10-06 | So You Want to Red Team Lawrence Munro & Matt Lorentzen | 51:39 | 4 | |
|
2021-10-06 | Security Module for PHP7 Julien Voisin & Thibault Koechlin | 34:55 | 3 | |
|
2021-10-06 | Reverse Engineering and Bug Hunting on KMDF Drivers Enrique Nissim | 44:59 | 17 | |
|
2021-10-06 | Pwning the 44CON Nerf gun PTP | 24:46 | 2 | |
|
2021-10-06 | Make ARM Shellcode Great Again Saumil Shah | 56:01 | 12 | |
|
2021-10-06 | Kill All Humans Bugs Philippe Arteau | 50:53 | 2 | |
|
2021-10-06 | JARVIS never saw it coming Guy Barnhart Magen & Ezra Caltum | 56:56 | 2 | |
|
2021-10-06 | How to Explain Post Quantum Cryptography to a Middle School Student Klaus Schmeh | 54:16 | 25 | Guide |
|
2021-10-06 | So You Want to Hack Radios Marc Newlin and Matt Knight | 48:34 | 1 | |
|
2021-10-06 | See no evil, hear no evil Matt Wixey | 42:57 | 7 | |
|
2021-10-06 | Secrets Of The Motherboard Shit My Chipset Says Graham Sutherland | 41:53 | 6 | |
|
2021-10-06 | Reverse Engineering Windows Malware 101 Workshop Amanda Rousseau Workshop | 1:25:44 | 197 | |
|
2021-10-06 | Red Team Revenge Attacking Microsoft ATA Nikhil Mittal | 52:47 | 9 | |
|
2021-10-06 | Persisting with Microsoft Office Abusing Extensibility Options William Knowles | 42:42 | 3 | |
|
2021-10-06 | The Internet of Us Don A Bailey | 47:16 | 1 | |
|
2021-10-06 | The Black Art of Wireless Post Exploitation Gabriel Ryan | 38:53 | 20 | |
|
2021-10-06 | Subgraph OS Hardening a Linux Desktop David Mirza Ahmad | 54:48 | 195 | |
|
2021-10-06 | Inside Android's SafetyNet Attestation Colin Mulliner | 1:06:08 | 17 | |
|
2021-10-06 | Lessons Learned Hunting IoT Malware Olivier Bilodeau | 49:09 | 15 | |
|
2021-10-06 | A Hands On Introduction To Software Defined Radio Didier Stevens Workshop | 1:50:09 | 16 | |
|
2021-10-06 | ARM Assembly and Shellcode Basics Saumil Shah Workshop | 2:15:47 | 12 | |
|
2021-10-06 | BaRMIe Poking Java's Back Door Nicky Bloor | 42:10 | 11 | |
|
2021-10-06 | Biting the Apple that feeds you Alex Plaskett and James Loureiro | 40:35 | 3 | |
|
2021-10-06 | Breaking Historical Ciphers with Modern Algorithms Klaus Schmeh | 58:26 | 23 | |
|
2021-10-06 | Checking BIOS protections offline with just the firmware updates Yuriy Bulygin | 44:15 | 2 | Vlog |
|
2021-10-06 | Chkrootkit Eating APTs for breakfast since 1997 Nelson Murilo | 35:18 | 1 | |
|
2021-10-06 | Cisco ASA Episode 2 Striking back Internals and Mitigations Cedric Halbronn | 51:27 | 2 | |
|
2021-10-06 | Cracking HiTag2 Crypto Kevin Sheldrake Workshop | 1:36:07 | 19 | |
|
2021-10-06 | Hypervisor Assisted Ring0 Debugging with radare2 Lars Haukli | 43:30 | 21 | |
|
2021-10-06 | How to Hack Radios RF Physical Layers Matt Knight and Marc Newlin Workshop | 2:09:49 | 2 | Guide |
|
2021-10-06 | Hide Yo Keys, Hide Yo Car Aaron Guzman | 37:08 | 2 | |
|
2021-10-06 | Cracking HiTag2 Crypto Kevin Sheldrake | 44:39 | 7 | |
|
2021-10-05 | Reverse engineering and exploiting font rasterizers the OpenType saga Presented By Mateusz Jurczyk | 2:09:30 | 10 | |
|
2021-10-05 | Smart Muttering a story and toolset for smart meter platform Presented By Ian de Villiers | 51:26 | 4 | |
|
2021-10-05 | Software Defined Networking SDN Security Presented By David Jorm | 37:21 | 17 | |
|
2021-10-05 | Stegosploit Drive by Browser Exploits using only Images Presented By Saumil Shah | 51:26 | 104 | |
|
2021-10-05 | Windows 10 2 Steps Forward 1 Step Back Presented By James Forshaw | 49:47 | 11 | |
|
2021-10-05 | MITMf Bringing Man In The Middle attacks to the 21st century Presented ByMarcello Salvati | 2:09:30 | 9 | |
|
2021-10-05 | NCC | 14:22 | 2 | |
|
2021-10-05 | Old Dog New Tricks Forensics With PowerShell Presented By Jared Atkinson | 2:09:30 | 8 | |
|
2021-10-05 | Phil Huggins | 14:46 | 4 | |
|
2021-10-05 | Quentyn Taylor | 14:46 | 5 | |
|
2021-10-05 | Responsible disclosure who cares Presented By OJ Reeves and Dan Tentler | 35:26 | 27 | |
|
2021-10-05 | Frictionless Security Presented by Jerry Gamblin | 24:49 | 2 | |
|
2021-10-05 | Jittery MacGyver Lessons Learned from Building a Bionic Hand out of a Coffee Maker Presented By | 56:45 | 2 | |
|
2021-10-05 | Light at the End of the Tunnel Hope for Team Defence Presented by Haroon Meer | 42:43 | 2 | |
|
2021-10-05 | Managing Incidents with CyberCPR Presented By Steve Armstrong | 46:10 | 35 | |
|
2021-10-05 | Saving Nostalgia Modding an Old Z80 Computer Presented By Graham Sutherland | 51:09 | 295 | |
|
2021-10-05 | The Frugal Girl's Guide to Threat Intelligence Presented By Rebekah Brown | 54:49 | 4 | Guide |
|
2021-10-05 | Three decades in security What's changed, and what hasn't Presented by Robert Schifreen | 1:02:37 | 3 | |
|
2021-10-05 | Trusts you might have missed Presented by Will Schroeder | 48:15 | 4 | |
|
2021-10-05 | Universal Serial aBUSe Remote Physical Access Attacks Presented By Rogan Dawes & Dominic Whit | 39:43 | 6 | |
|
2021-10-05 | 2016 The Infosec Crossroads Presented By Saumil Shah | 47:16 | 3 | |
|
2021-10-05 | Effortless, Agentless Breach Detection in the Enterprise Token all the Things Presented By Azhar D | 49:02 | 2 | |
|
2021-10-05 | Indicators of Compromise From malware analysis to eradication Presented By Michael Boman Workshop | 1:24:16 | 2 | |
|
2021-10-05 | Hunting Asynchronous Vulnerabilities Presented By James Kettle | 2:09:30 | 13 | |
|
2021-10-05 | Meterpreter Understanding the New Shiny Presented By OJ Reeves | 1:21:20 | 7 | |
|
2021-10-05 | Jtagsploitation 5 wires 5 ways to root Presented By Joe FitzPatrick and Matt King | 2:09:30 | 2 | |
|
2021-10-05 | Is there an EFI monster inside your apple Presented By Pedro Vila | 1:06:29 | 2 | |
|
2021-10-05 | Introduction to Reverse Engineering C Presented By Angel M Villegas Workshop | 2:09:30 | 2 | |
|
2021-10-05 | Exploiting 64 bit IE on Windows 8 1 and The Pwn2Own Case Study Presented By Yuki Chen and Linan Ha | 40:25 | 5 | |
|
2021-10-05 | DDoS mitigation EPIC FAIL collection Presented By Moshe Zioni | 51:26 | 5 | |
|
2021-10-05 | Dark Fairytales from a Phisherman Vol II Presented By Michele Orru | 51:26 | 4 | |
|
2021-10-05 | Checksec | 14:46 | 4 | |
|
2021-10-05 | Barbarians At The Gateway An Examination Of The Attacker Tool Box Presented By Dave Lewis | 44:28 | 0 | |
|
2021-10-05 | Attacking VxWorks from Stone Age to Interstellar Presented By Yannick Formaggio | 40:52 | 23 | |
|
2021-10-05 | Analyzing Malicious Office Documents Presented By Didier Stevens Workshop | 2:15:38 | 3 | |
|
2021-10-05 | How to drive a malware analyst crazy Presented By Michael Boman | 49:46 | 6 | Guide |
|
2021-10-05 | Hackers in the Wire and Drones Oh My Presented By Philip Polstra | 2:09:30 | 1 | |
|
2021-10-05 | Going AUTH the Rails on a Crazy Train Presented By Tomek Rabczak and Jeff Jarmoc | 1:03:38 | 2 | |
|
2021-10-05 | Get in the Ring0 &ndash Understanding Windows drivers Presented By Graham Sutherland | 51:26 | 5 | |
|
2021-10-05 | F Secure | 14:22 | 6 | |
|
2021-10-05 | F Secure party Mikko | 14:46 | 2 | |
|
2021-10-05 | Forging the USB armory Presented By Andrea Barisani in 44CON London 2015 | 1:24:16 | 7 | |
|
2021-10-05 | When Documents Bite Vlad Ovtchinikov | 48:26 | 7 | |
|
2021-10-05 | What Did You Just Say To Me Jerry Gamblin | 26:11 | 2 | |
|
2021-10-05 | Pentesting NoSQL DB s Using NoSQL Exploitation Framework Francis Alexander | 28:24 | 2 | |
|
2021-10-05 | Payment applications handle lots of money No really lots of it Alberto Revelli and Mark Swift | 28:24 | 1 | |
|
2021-10-05 | Pandas Bears and Goldern Hamsters Automating malware triage and recent campaign analysis David Can | 26:11 | 1 | |
|