Index of /2018

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]01-Mathy-Vanhoef-Advanded-WiFi-Attacks-Using-Commodity-Hardware.pdf2018-10-03 15:36 1.5M 
[   ]02-Zoz-Hacking-Driverless-Vehicles.pdf2018-10-03 15:33 22M 
[   ]03-Matt-Ryan-ReInvestigating-Powershell-Attacks.pdf2018-10-03 16:40 5.9M 
[   ]04-Mark-Hillick-Levelling-Up-Security-At-Riot-Games.pdf2018-10-05 11:15 54M 
[   ]05-Shanon-Conheady-Social-Engineering-For-Pentesters.pdf2018-10-05 15:18 1.4M 
[   ]06-Stefan-Friedli-The-99c-Heart-Surgeon-Dilemna.pdf2018-10-03 16:39 2.7M 
[   ]07-Haroon-Meer-Keynote.pdf2018-10-04 13:46 43M 
[   ]08-Quynh-Lau-Finding-0Days-In-Embedded-Systems.pdf2018-10-04 13:12 7.7M 
[   ]09-Daniel-Matthew-Signatures-Are-Dead.pdf2018-10-04 13:49 3.8M 
[   ]10-Nate-Warfield-All-Your-Cloud-Are-Belong-To-Us.pdf2018-10-04 14:05 3.4M 
[   ]11-Nikhil-Mittal-Forging-Trusts.pdf2018-10-04 16:37 1.5M 
[   ]12-Vineet-Bhatia-Disrupting-The-Killchain.pptx2018-10-05 15:10 15M 
[   ]13-Christopher-Leroy-Hunting-Android-Malware.pdf2018-10-04 18:20 2.7M 
[   ]14-Daniel-Cuthbert-Keynote.pdf2018-10-05 11:56 25M 
[   ]15-Robert-Sell-Exploits-In-Wetware.pdf2018-10-05 11:29 12M 
[   ]16-Craig-Etienne-Outside-THe-Box.pdf2018-10-05 13:59 958K 
[   ]17-Dani-Ido-Dissecting-Of-Non-Malicious-Artifect.pptx2018-10-05 14:00 21M 
[   ]18-Lilith-Wyatt-IoT-RCE.ppt2018-10-05 15:04 3.2M 
[   ]19-Mark-Marc-Mirror-On-The-Wall.pdf2018-10-05 16:42 24M 
[   ]20-Jared-Rittle-Process-Control-Through-Counterfeit-Comms.pptx2018-10-09 14:11 78M 
[   ]Workshop-Jedi-Tricks-To-Convince-Your-Boss-EP2.pptx2018-10-05 15:15 53M