![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | D2T2 - Take a Picture of Your App Code – Android MRI Interpreter - Sunghyoun Song.pdf | 2023-08-28 04:34 | 5.5M | |
![[ ]](/icons/layout.gif) | D2T2 - TSSHOCK – Breaking MPC Wallets and Digital Custodians - Huu Giap Nguyen & Anh Khoa Nguyen.pdf | 2023-08-28 04:34 | 386K | |
![[ ]](/icons/layout.gif) | D2T2 - NVMe - New Vulnerabilities Made Easy - Tal Lossos.pdf | 2023-08-28 04:58 | 6.9M | |
![[ ]](/icons/layout.gif) | D2T2 - GPTHound – Your Active Directory Security Assistant - John Jiang.pdf | 2023-08-28 04:34 | 4.6M | |
![[ ]](/icons/layout.gif) | D2T2 - From Unknown Parameter to Root - A Story of Unexpected Intrusion Testing Results - Yvan Genuer.pdf | 2023-08-28 09:21 | 6.2M | |
![[ ]](/icons/layout.gif) | D2T2 - Breaking ML Services - Finding 0-days in Azure Machine Learning - NItesh Surana.pdf | 2023-08-28 04:34 | 7.1M | |
![[ ]](/icons/layout.gif) | D2T1 - Windows Kernel Security - A Deep Dive into Two Exploits Demonstrated at Pwn2Own - Thomas Imbert.pdf | 2023-08-28 04:34 | 1.6M | |
![[ ]](/icons/layout.gif) | D2T1 - Scarlet OT – OT Adversary Emulation for Fun and Profit- Vic Huang & Sol Yang.pdf | 2023-08-28 04:34 | 2.4M | |
![[ ]](/icons/layout.gif) | D2T1 - Locate Vulnerabilities of Ethereum Smart Contracts with Semi-Automated Analysis - Boik Su.pdf | 2023-08-28 04:34 | 6.0M | |
![[ ]](/icons/layout.gif) | D2T1 - KeyBleed - Attacking the OneKey Mini - Eric Michaud.pdf | 2023-09-08 01:15 | 24M | |
![[ ]](/icons/layout.gif) | D2T1 - Hunting for Amazon Cognito Security Misconfigurations - Yassine Aboukir.pdf | 2023-08-28 04:40 | 4.5M | |
![[ ]](/icons/layout.gif) | D2T1 - Hacking into iOS VOLTE implementation - Hardik Mehta & Rajanish Pathak.pdf | 2023-08-29 01:37 | 6.4M | |
![[ ]](/icons/layout.gif) | D2 COMMSEC - Unveiling the Covert Trails of Infostealer Malware Ecosystems - Pavvan Karthick.pdf | 2023-08-31 00:20 | 2.7M | |
![[ ]](/icons/layout.gif) | D2 COMMSEC - The Tragedy of Bluetooth Low Energy - Linfeng Xiao & Dalin Yang.pdf | 2023-08-28 04:34 | 11M | |
![[ ]](/icons/layout.gif) | D2 COMMSEC - The Future of Hacking - Unleashing the Power of OpenAIs GPT-4 Code Interpreter - Dexter Ng.pdf | 2023-08-31 00:19 | 11M | |
![[ ]](/icons/layout.gif) | D2 COMMSEC - B(l)utter – Reversing Flutter Applications by using Dart Runtime - Worawit Wangwarunyoo.pdf | 2023-08-28 04:34 | 1.5M | |
![[ ]](/icons/layout.gif) | D2 COMMSEC - A Practical Method of Finding Vulnerabilities in Internet of Things - IeckChae Euom.pdf | 2023-08-28 04:34 | 4.4M | |
![[ ]](/icons/layout.gif) | D1T2 - gVisor - Modern Linux Sandboxing Technology - Li Qiang.pdf | 2023-08-25 01:23 | 1.2M | |
![[ ]](/icons/layout.gif) | D1T2 - Timekiller - Leveraging Asynchronous Clock to Escape from QEMU KVM - Jia, Lei, Tao & Pan.pdf | 2023-08-25 01:23 | 3.4M | |
![[ ]](/icons/layout.gif) | D1T2 - Rogue CDB Escaping from VMware Workstation Through the Disk Controller - Wenxu Yin.pdf | 2023-08-25 01:23 | 3.7M | |
![[ ]](/icons/layout.gif) | D1T2 - Lazarus Groups Undercover Operations - Large-Scale Infection Campaigns 2022 – 2023 - Lee Taewoo, Seulgi Lee, Dongwook Kim.pdf | 2023-08-25 00:59 | 7.5M | |
![[ ]](/icons/layout.gif) | D1T2 - How to Design Your Own Electronic Attack Device - Shupeng Gao.pdf | 2023-08-25 00:59 | 19M | |
![[ ]](/icons/layout.gif) | D1T1 - It Was Harder to Sniff Bluetooth Through My Mask During The Pandemic - Xeno Kovah.pdf | 2023-08-28 04:34 | 96M | |
![[ ]](/icons/layout.gif) | D1T1 - How NTLM Relay Ruins Your Exchange Servers - Tianze Ding - pdf.pdf | 2023-08-25 00:59 | 8.2M | |
![[ ]](/icons/layout.gif) | D1T1 - Hakuin - Injecting Brains Into Blind SQL Injection - Jakub Pruzinec & Quynh Anh Nguyen.pdf | 2023-08-28 04:29 | 1.0M | |
![[ ]](/icons/layout.gif) | D1T1 - FrankeNAND – Extracting Info From Automotive Internet Units - Alexey Kondikov.pdf | 2023-08-25 00:59 | 11M | |
![[ ]](/icons/layout.gif) | D1T1 - Exploiting the Lexmark PostScript Stack - Aaron Adams.pdf | 2023-08-25 00:59 | 20M | |
![[ ]](/icons/layout.gif) | D1T1 - Cracking the Shield - Analyzing and Reverse Engineering Antivirus Signatures - Dobin Rutishauser.pdf | 2023-08-28 04:40 | 3.9M | |
![[ ]](/icons/layout.gif) | D1T1 - An Ode to Rabbit Holes - Writing a New Decompiler Just for a Security Audit - Dominic Couture.pdf | 2023-08-25 01:23 | 3.5M | |
![[ ]](/icons/layout.gif) | D1 LAB - Bring Your Own SOAR Automated Incident Response - Valentine Mairet & Harjeet Sharma.pdf | 2023-08-25 01:23 | 3.4M | |
![[ ]](/icons/layout.gif) | D1 COMMSEC Big Match - How I Learned to Stop Reversing and Love the Strings - Paolo Montesel.pdf | 2023-08-25 01:23 | 3.3M | |
![[ ]](/icons/layout.gif) | D1 COMMSEC - Shining a Light On Solar System Cyber Security - Sick Codes.pdf | 2023-08-25 00:59 | 18M | |
![[ ]](/icons/layout.gif) | D1 COMMSEC - Building a Full-Speed Anti-Censorship Router - Kaijern Lau.pdf | 2023-08-31 02:24 | 3.9M | |
![[ ]](/icons/layout.gif) | D1 COMMSEC - Bugs In Blocks - Karsten Nohl.pdf | 2023-08-25 00:59 | 3.3M | |
![[ ]](/icons/layout.gif) | D1 COMMSEC - ALPChecker – Detecting Spoofing and Blinding Attacks - Anastasiia Kropova & Igor Korkin.pdf | 2023-08-25 01:06 | 2.1M | |
|