Index of /2018
Name
Last modified
Size
Description
Parent Directory
-
01-Mathy-Vanhoef-Advanded-WiFi-Attacks-Using-Commodity-Hardware.pdf
2018-10-03 15:36
1.5M
02-Zoz-Hacking-Driverless-Vehicles.pdf
2018-10-03 15:33
22M
03-Matt-Ryan-ReInvestigating-Powershell-Attacks.pdf
2018-10-03 16:40
5.9M
04-Mark-Hillick-Levelling-Up-Security-At-Riot-Games.pdf
2018-10-05 11:15
54M
05-Shanon-Conheady-Social-Engineering-For-Pentesters.pdf
2018-10-05 15:18
1.4M
06-Stefan-Friedli-The-99c-Heart-Surgeon-Dilemna.pdf
2018-10-03 16:39
2.7M
07-Haroon-Meer-Keynote.pdf
2018-10-04 13:46
43M
08-Quynh-Lau-Finding-0Days-In-Embedded-Systems.pdf
2018-10-04 13:12
7.7M
09-Daniel-Matthew-Signatures-Are-Dead.pdf
2018-10-04 13:49
3.8M
10-Nate-Warfield-All-Your-Cloud-Are-Belong-To-Us.pdf
2018-10-04 14:05
3.4M
11-Nikhil-Mittal-Forging-Trusts.pdf
2018-10-04 16:37
1.5M
12-Vineet-Bhatia-Disrupting-The-Killchain.pptx
2018-10-05 15:10
15M
13-Christopher-Leroy-Hunting-Android-Malware.pdf
2018-10-04 18:20
2.7M
14-Daniel-Cuthbert-Keynote.pdf
2018-10-05 11:56
25M
15-Robert-Sell-Exploits-In-Wetware.pdf
2018-10-05 11:29
12M
16-Craig-Etienne-Outside-THe-Box.pdf
2018-10-05 13:59
958K
17-Dani-Ido-Dissecting-Of-Non-Malicious-Artifect.pptx
2018-10-05 14:00
21M
18-Lilith-Wyatt-IoT-RCE.ppt
2018-10-05 15:04
3.2M
19-Mark-Marc-Mirror-On-The-Wall.pdf
2018-10-05 16:42
24M
20-Jared-Rittle-Process-Control-Through-Counterfeit-Comms.pptx
2018-10-09 14:11
78M
Workshop-Bro.pdf
2018-10-29 08:01
567K
Workshop-Distributed-Forensics.pdf
2018-11-12 11:07
2.7M
Workshop-Fuzzing.pdf
2018-10-22 09:43
4.1M
Workshop-Jedi-Tricks-To-Convince-Your-Boss-EP2.pptx
2018-10-05 15:15
53M