2024-02-10 | nguyen anh quynh Keystone the last missing framework of Reverse Engineering | 32:26 | 0 | |
|
2024-02-10 | natalie silvanovich More Flash More Fun | 47:42 | 1 | |
|
2024-02-10 | nico golde daniel komaromy Breaking Band | 58:57 | 0 | |
|
2024-02-10 | alex ionescu Abusing the NT Kernel Shim Engine | 59:49 | 1 | |
|
2024-02-10 | richard johnson Go Speed Tracer | 58:44 | 0 | |
|
2024-02-10 | robert c seacord Dangerous Optimizations and the Loss of Causality | 52:15 | 0 | |
|
2024-02-10 | ang cui francois charbonneau jatin kataria A Monitor Darkly Reversing and Exploiting Ubiquitous On S | 43:27 | 0 | |
|
2024-02-10 | chris gerlinsky How Do I Crack Satellite and Cable Pay TV | 57:44 | 5 | |
|
2024-02-10 | cooper quintin eva galperin When Governments Attack | 46:45 | 0 | |
|
2024-02-10 | david carne Black box reverse engineering for unknown custom instruction sets | 34:18 | 0 | Tutorial |
|
2024-02-10 | derek soeder paul mehta BBS Era Exploitation for Fun and Anachronism | 29:21 | 1 | |
|
2024-02-10 | james forshaw Process Failure Modes | 1:00:20 | 1 | |
|
2024-02-10 | jason geffner JavaJournal | 21:44 | 1 | |
|
2024-02-10 | jessy diamond exum Reverse Engineering ISC controllers | 59:39 | 4 | |
|
2024-02-10 | joan calvet jessy campos thomas dupuy Visiting The Bear Den | 57:48 | 0 | |
|
2024-02-10 | julian kirsch clemens jonischkeit Movfuscator Be Gone | 27:25 | 1 | |
|
2024-02-10 | liang chen qidan he Shooting the OS X El Capitan Kernel Like a Sniper | 55:52 | 0 | |
|
2024-02-10 | markus gaasedelen nick burnett SolIDArity | 34:26 | 0 | |
|
2024-02-10 | r2m2 Guillaume “guedou” Valadon | 39:10 | 0 | |
|
2024-02-10 | Your Chakra Is Not Aligned | 19:34 | 0 | |
|
2024-02-10 | Reverse Engineering Satellite Based IP Content Distribution | 37:59 | 1 | |
|
2024-02-10 | Teaching Old Shellcode New Tricks Josh Pitts | 35:01 | 0 | |
|
2024-02-10 | Transforming Open Source to Open Access in Closed Applications | 40:38 | 0 | |
|
2024-02-10 | Analyzing iOS apps road from AppStore to security analysis report | 38:32 | 0 | |
|
2024-02-10 | When your firewall turns against you Rene Freingruber | 21:16 | 2 | |
|
2024-02-10 | Breaking Code Read Protection on the NXP LPC family Microcontroller | 55:39 | 0 | |
|
2024-02-10 | Embedded devices reverse engineering | 42:08 | 2 | |
|
2024-02-10 | filetributor analysis | 25:27 | 0 | |
|
2024-02-10 | Getting Physical with USB Type C Windows 10 RAM Forensics and UEFI Attacks | 1:05:04 | 0 | |
|
2024-02-10 | GRAP define and match graph patterns within binaries | 49:03 | 0 | |
|
2024-02-10 | Hackable Security Modules Reversing and exploiting a FIPS | 40:56 | 0 | |
|
2024-02-10 | Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis | 55:22 | 1 | |
|
2024-02-10 | Keeping your tools safe IDA | 23:08 | 0 | |
|
2024-02-10 | Legacy Crypto Never Dies | 22:12 | 2 | |
|
2024-02-10 | miLazyCracker Kevin Larson | 17:06 | 1 | |
|
2024-02-10 | New vulnerabilities in SMM of Coreboot and UEFI based systems | 1:05:44 | 0 | |
|
2024-02-10 | Poutine Dusting Forgotten Lore Yannick Lamarre | 18:21 | 0 | |
|
2024-02-10 | artem dinaburg andrew ruef Static Translation of X86 Instruction Semantics to LLVM With McSema | 1:04:06 | 1 | Tutorial |
|
2024-02-10 | william peteroy Exploit tips and techniques | 34:33 | 0 | |
|
2024-02-10 | marta janus Going gets tough a tale of encounters with novel evasive malware | 42:00 | 0 | |
|
2024-02-10 | assaf nativ The Making of the Kosher Phone | 37:58 | 1 | |
|
2024-02-10 | matt oh Reverse Engineering Flash Memory For Fun and Benefit | 55:02 | 0 | |
|
2024-02-10 | brendan dolan gavitt Dynamic Analysis Kung Fu with PANDA | 1:04:05 | 0 | |
|
2024-02-10 | michael coppola Performing Open Heart Surgery on a Furby | 1:04:29 | 1 | |
|
2024-02-10 | colin o flynn Power Analysis and Clock Glitching with the Open Source ChipWhisperer Platform | 35:52 | 0 | |
|
2024-02-10 | michael ossmann SDR Tricks with HackRF | 28:59 | 3 | |
|
2024-02-10 | elad shapira Shall we play a game Lessons learned while playing CoreWars8086 | 41:17 | 1 | |
|
2024-02-10 | milan bohacek How do I RE object oriented code and you should too | 38:21 | 1 | |
|
2024-02-10 | endre bangerter dominic fischer Memory Tracing Forensic Reverse Engineering | 46:52 | 0 | |
|
2024-02-10 | mougey camille francis gabriel DRM obfuscation versus auxiliary attacks | 46:23 | 0 | |
|
2024-02-10 | eva galperin Keynote | 33:09 | 0 | |
|
2024-02-10 | exide Glitching For n00bs | 53:38 | 0 | |
|
2024-02-10 | nathan keltner charles holmes Here be Dragons A Bedtime Tale for Sleepless Nights | 27:37 | 0 | |
|
2024-02-10 | richard johnson Fuzzing and Patch Analysis SAGEly Advice | 1:12:07 | 2 | |
|
2024-02-10 | francisco falcon Breaking Out of VirtualBox through 3D Acceleration | 36:49 | 0 | |
|
2024-02-10 | igor skochinsky Intel Management Engine Secrets | 55:14 | 1 | |
|
2024-02-10 | wartortell Rewriting x86 Binaries Many PEs Such Secure Wow | 40:08 | 2 | |
|
2024-02-10 | jason jones jasiel spelman Reversing on the Edge | 27:15 | 0 | |
|
2024-02-10 | jason jones PIN Point Control for Analyzing Malware | 23:34 | 2 | |
|
2024-02-09 | Thomas Garnier Windows privilege escalation through LPC and ALPC interfaces | 37:36 | 1 | |
|
2024-02-09 | Anthony de Almeida Lopes Bypassing Security Protections by Backdooring libc | 26:02 | 0 | |
|
2024-02-09 | Bruce Dang Methods for analyzing malicious Office documents | 27:01 | 0 | |
|
2024-02-09 | Cameron Hotchkies Under the iHood | 31:59 | 2 | |
|
2024-02-09 | Craig Smith Creating Code Obfuscation Virtual Machines | 40:31 | 0 | |
|
2024-02-09 | Eric D Laspe The Deobfuscator | 25:34 | 1 | |
|
2024-02-09 | Gera Two very small reverse engineering tools | 27:46 | 0 | |
|
2024-02-09 | Ilfak Guilfanov Building plugins for IDA Pro | 45:54 | 0 | |
|
2024-02-09 | Jason Raber Helikaon Linux Debuger | 42:06 | 0 | |
|
2024-02-09 | Nicolas Brulez Polymorphic Virus Analysis | 23:18 | 1 | |
|
2024-02-09 | Nicolas Pouvesle NetWare kernel stack overflow exploitation | 43:50 | 2 | |
|
2024-02-09 | Pablo Sole RE over Adobe Acrobat Reader using Immunity Debugger | 23:50 | 0 | |
|
2024-02-09 | sean heelan w4 | 46:17 | 1 | |
|
2024-02-09 | Alex Ionescu web4 | 34:59 | 1 | |
|
2024-02-09 | Bureau Calvet web | 52:12 | 0 | |
|
2024-02-09 | Carrera Duart | 47:51 | 0 | |
|
2024-02-09 | Deviant Ollam4 | 41:11 | 0 | |
|
2024-02-09 | dino dai zovi | 46:21 | 1 | |
|
2024-02-09 | gynvael coldwind and unavowed | 45:39 | 4 | |
|
2024-02-09 | jonathan stuart | 46:46 | 0 | |
|
2024-02-09 | richard thieme | 58:14 | 0 | |
|
2024-02-09 | A Ionescu 2 | 58:17 | 0 | |
|
2024-02-09 | G Kerr 1 | 42:51 | 0 | |
|
2024-02-09 | J Applebaum | 1:14:39 | 6 | |
|
2024-02-09 | Jesse d Aguanno | 47:15 | 0 | |
|
2024-02-09 | S Ridley | 42:25 | 2 | |
|
2024-02-09 | Alex Ionescu I got 99 problems but a kernel pointer ain't one | 1:03:23 | 1 | |
|
2024-02-09 | Ruby feinstein Omri Ildis Yuval Ofir | 1:02:09 | 0 | |
|
2024-02-09 | Bacura Just keep trying Unorthodox ways to hack an old school hardware | 59:45 | 1 | |
|
2024-02-09 | Olivier Thomas Hardware reverse engineering tools | 1:07:00 | 11 | |
|
2024-02-09 | Christopher Domas aka the delta axiom The Future of RE Dynamic Binary Visualization | 1:03:22 | 1 | |
|
2024-02-09 | Christopher Hoder and Theodore Sumers | 25:19 | 0 | |
|
2024-02-09 | Craig Smith | 21:06 | 1 | |
|
2024-02-09 | Dmitry Nedospasov and Thorsten Schroder Keep your tentacles off my bus introducing Die Datenkrake | 1:11:29 | 0 | |
|
2024-02-09 | Elias Bachaalany Inside EMET 4 0 | 56:23 | 2 | |
|
2024-02-09 | Francois Chagnon Python bindings for Hexrays Decompiler | 23:34 | 0 | |
|
2024-02-09 | Jesse D'Aguanno XNU Spelunking or Fuzzing the kernel inside your kernel | 46:14 | 1 | |
|
2024-02-09 | Josh m0nk Thomas Hiding @ Depth | 39:51 | 3 | |
|
2024-02-09 | Josh m0nk Thomas and Nathan Natron Keltner | 57:17 | 1 | |
|
2024-02-09 | Joshua J Drake aka jduck | 1:03:34 | 2 | |
|
2024-02-09 | Natalie Silvanovich Many More Tamagotchis Were Harmed in the Making of this Presentation | 43:39 | 0 | |
|