REcon/REcon 2005/REcon 2005 presentations/recon2005_jonathan_westhues_practical_attacks_on_a_prox_card.mp4 |
100.9 MB |
REcon/REcon 2005/REcon 2005 presentations/recon2005_jose_nazario_introduction_to_network_programming_with_libevent_libdnet_and_libnids.mp4 |
160 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_adam_shostack_anonymous_blogging_submission.mp4 |
167.5 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_andrew_griffiths_binary_protection_schemes.mp4 |
36.2 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_cedric_blancher_attacking_wifi_with_traffic_injection.mp4 |
66.8 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_fravia_wizard_searching_the_commercial_web_for_fun_and_knowledge.mp4 |
142.6 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_jack_whitsitt_visual_analysis_2d_does_it_better_in_color.mp4 |
105.5 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_jonathan_levin_the_dark_side_of_winsock.mp4 |
141.1 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_kathy_wang_using_honeyclients_to_discover_new_attacks.mp4 |
140.2 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_matt_shelton_passive_asset_detection_system.mp4 |
55.6 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_pedram_amini_process_stalking_run_time_visual_rce.mp4 |
51.3 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_reverse_engineering_panel.mp4 |
91.1 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_ryan_russell_and_nicolas_brulez_malware_analysis.mp4 |
200.8 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_ryan_russell_keynote.mp4 |
97.5 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_spoonm_recent_shell_code_developments.mp4 |
154.8 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_thorsten_schneider_hardening_registration_number_protection_schemes_agains_reverse_engineering_with_multithread_petri_net.mp4 |
90.8 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_todd_macdermid_encrypted_p2p_and_voip_with_cutlass.mp4 |
139 MB |
REcon/REcon 2006/REcon 2006 presentations/msutton-comraider.mp4 |
5 KB |
REcon/REcon 2006/REcon 2006 presentations/msutton-filefuzz-breadth.mp4 |
18 KB |
REcon/REcon 2006/REcon 2006 presentations/msutton-filefuzz-depth.mp4 |
29 KB |
REcon/REcon 2006/REcon 2006 presentations/msutton-webfuzz-overflow.mp4 |
4.2 MB |
REcon/REcon 2006/REcon 2006 videos/T01-Recon2006-Alexander_Stirov-Reverse_Engineering_Microsoft_Binaries_512kb.mp4 |
93.3 MB |
REcon/REcon 2006/REcon 2006 videos/T02-Recon2006-Michael_Sutton-Fuzzing_512kb.mp4 |
71.5 MB |
REcon/REcon 2006/REcon 2006 videos/T03-Recon2006-Fravia-Reversing_our_searching_habits_512kb.mp4 |
92 MB |
REcon/REcon 2006/REcon 2006 videos/T04-Recon2006-David_Hulton-Breaking_wifi_faster_512kb.mp4 |
92 MB |
REcon/REcon 2006/REcon 2006 videos/T05-Recon2006-Pedram_Amini-PaiMei_512kb.mp4 |
114.7 MB |
REcon/REcon 2006/REcon 2006 videos/T06-Recon2006-Bunnie-Dissassembling_and_patching_hardware_512kb.mp4 |
125.8 MB |
REcon/REcon 2006/REcon 2006 videos/T07-Recon2006-Ted_Unangst-Secure_development_with_static_analysis_512kb.mp4 |
99.9 MB |
REcon/REcon 2006/REcon 2006 videos/T08-Recon2006-Anthony_De_Almeida_Lopes-Jack_Louis-A_plateform_independant_multicavity_nop_virus_512kb.mp4 |
75.6 MB |
REcon/REcon 2006/REcon 2006 videos/T09-Recon2006-Fabrice_Desclaux-Kostya_Kortchinsky-Vanilla_Skype-part1_512kb.mp4 |
69.4 MB |
REcon/REcon 2006/REcon 2006 videos/T10-Recon2006-Fabrice_Desclaux-Kostya_Kortchinsky-Vanilla_Skype-part2_512kb.mp4 |
108.7 MB |
REcon/REcon 2006/REcon 2006 videos/T11-Recon2006-Chris_Abad-Advancements_In_Anonymous_e-Annoyance_512kb.mp4 |
90.1 MB |
REcon/REcon 2006/REcon 2006 videos/T12-Recon2006-Spoonm-IDARub_512kb.mp4 |
78.8 MB |
REcon/REcon 2006/REcon 2006 videos/T13-Recon2006-Woodmann-Legality_of_RCE_512kb.mp4 |
90.8 MB |
REcon/REcon 2006/REcon 2006 videos/T14-Recon2006-Dennis_Cox-Insiders_View_Network_security_devices_512kb.mp4 |
73.6 MB |
REcon/REcon 2006/REcon 2006 videos/T15-Recon2006-Alex_Ionescu-Subverting_Windows2003SP1_kernel_integrity_protection_512kb.mp4 |
54.7 MB |
REcon/REcon 2006/REcon 2006 videos/T16-Recon2006-Joe_Stewart-OllyBonE_512kb.mp4 |
77.8 MB |
REcon/REcon 2006/REcon 2006 videos/T17-Recon2006-Luis_Miras-FixBugsInBinaries-xvid_512kb.mp4 |
65.4 MB |
REcon/REcon 2006/REcon 2006 videos/T18-Recon2006-Sharon_Conheady-Social_Engineering_for_penetration_testers.avi-xvid_512kb.mp4 |
83.5 MB |
REcon/REcon 2006/REcon 2006 videos/T19-Recon2006-Mathieu_Desnoyers-LTT_LinuxTraceToolkit_512kb.mp4 |
44.4 MB |
REcon/REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-heap.mp4 |
3 MB |
REcon/REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-hids.mp4 |
743 KB |
REcon/REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-stack.mp4 |
4 KB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T01_Pierre-Marc_Bureau-How_I_learned_Reverse_Engineering_with_Storm.mp4 |
80.3 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T02-Bruce_Dang-Methods_for_analyzing_malicious_Office_documents.mp4 |
69.1 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T03-Ilfak_Guilfanov-Building_plugins_for_IDA_Pro.mp4 |
117.4 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T04-Thomas_Garnier-Windows_privilege_escalation_through_LPC_and_ALPC_interfaces.mp4 |
60.2 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T05-Nicolas_Pouvesle-NetWare_kernel_stack_overflow_exploitation.mp4 |
69.4 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T06-Cameron_Hotchkies-Under_the_iHood.mp4 |
44.1 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T07-Jason_Raber-Helikaon_Linux_Debuger.mp4 |
76 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T08-Craig_Smith-Creating_Code_Obfuscation_Virtual_Machines.mp4 |
56.4 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T09-Eric_D_Laspe-The_Deobfuscator.mp4 |
40.7 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T10-Nicolas_Brulez-Polymorphic_Virus_Analysis.mp4 |
65.9 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T12-Anthony_de_Almeida_Lopes-Bypassing_Security_Protections_by_Backdooring_libc.mp4 |
35.7 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T13-Alexander_Sotirov-Blackbox_Reversing_Of_XSS_Filters.mp4 |
98.6 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T14-Aaron_Portnoy_and_Ali_Rizvi-Santiago-Reverse_Engineering_Dynamic_Languages_a_Focus_on_Python.mp4 |
58.2 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T15-Sharon_Conheady_and_Alex_Bayly-Social_Engineering_for_the_Socially_Inept.mp4 |
96.7 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T16-Pablo_Sole-RE_over_Adobe_Acrobat_Reader_using_Immunity_Debugger.mp4 |
53.1 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T17-Gera-Two_very_small_reverse_engineering_tools.mp4 |
56 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T18-Tiller_Beauchamp-RE_Trace-Applied_Reverse_Engineering_on_OS_X.mp4 |
99.6 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T19-Sebastien_Doucet-64-bit_Imports_Rebuilding_and_Unpacking-Part1.mp4 |
107.3 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T19-Sebastien_Doucet-64-bit_Imports_Rebuilding_and_Unpacking-Part2.mp4 |
57.4 MB |
REcon/REcon 2010/REcon 2010 videos/Alex_Ionescu_web4.mp4 |
174.7 MB |
REcon/REcon 2010/REcon 2010 videos/Bureau_Calvet_web.mp4 |
209.5 MB |
REcon/REcon 2010/REcon 2010 videos/Carrera_Duart.mp4 |
203.3 MB |
REcon/REcon 2010/REcon 2010 videos/Deviant_Ollam4.mp4 |
189.3 MB |
REcon/REcon 2010/REcon 2010 videos/recon_2010_dino_dai_zovi.mp4 |
162.7 MB |
REcon/REcon 2010/REcon 2010 videos/recon_2010_gynvael_coldwind_and_unavowed.mp4 |
132.6 MB |
REcon/REcon 2010/REcon 2010 videos/recon_2010_jonathan_stuart.mp4 |
127.2 MB |
REcon/REcon 2010/REcon 2010 videos/recon_2010_richard_thieme.mp4 |
127.1 MB |
REcon/REcon 2010/REcon 2010 videos/sean_heelan_w4.mp4 |
180.8 MB |
REcon/REcon 2011/01_A_Ionescu_2.mp4 |
154.9 MB |
REcon/REcon 2011/02_S_Ridley.mp4 |
156.8 MB |
REcon/REcon 2011/03_G_Kerr_1.mp4 |
116.8 MB |
REcon/REcon 2011/06_Damien_Aumaitre.mp4 |
23.2 MB |
REcon/REcon 2011/10_Alexandre_Gazet.mp4 |
19.9 MB |
REcon/REcon 2011/11_Milosch_Meriac.mp4 |
24.5 MB |
REcon/REcon 2011/12_Igor_Skochinsky.mp4 |
26.6 MB |
REcon/REcon 2011/14_Guillaume_Delugre.mp4 |
26.9 MB |
REcon/REcon 2011/15_Scott_Dunlop.mp4 |
18.8 MB |
REcon/REcon 2011/16_Jesse_d_Aguanno.mp4 |
22.1 MB |
REcon/REcon 2011/20_Nathan_Fain.mp4 |
19.2 MB |
REcon/REcon 2011/J_Applebaum.mp4 |
94.1 MB |
REcon/REcon 2013/Recon2013-Aleksandr Matrosov and Eugene Rodionov- Reconstructing Gapz Position-Independent Code Analysis Problem.mp4 |
135.1 MB |
REcon/REcon 2013/Recon2013-Alex Ionescu- I got 99 problems but a kernel pointer ain't one.mp4 |
148.4 MB |
REcon/REcon 2013/Recon2013-Bacura- Just keep trying - Unorthodox ways to hack an old-school hardware.mp4 |
147 MB |
REcon/REcon 2013/Recon2013-Christopher Domas aka the.delta.axiom- The Future of RE - Dynamic Binary Visualization.mp4 |
269.3 MB |
REcon/REcon 2013/Recon2013-Christopher Hoder and Theodore Sumers.mp4 |
114.6 MB |
REcon/REcon 2013/Recon2013-Craig Smith.mp4 |
84.4 MB |
REcon/REcon 2013/Recon2013-Dmitry Nedospasov and Thorsten Schroder- Keep your tentacles off my bus- introducing Die Datenkrake.mp4 |
310.4 MB |
REcon/REcon 2013/Recon2013-Elias Bachaalany- Inside EMET 4.0.mp4 |
119.5 MB |
REcon/REcon 2013/Recon2013-Francois Chagnon- Python bindings for Hexrays Decompiler.mp4 |
49.8 MB |
REcon/REcon 2013/Recon2013-Jesse D'Aguanno- XNU Spelunking or Fuzzing the kernel inside your kernel.mp4 |
168.4 MB |
REcon/REcon 2013/Recon2013-Josh _m0nk_ Thomas- Hiding @ Depth.mp4 |
115.5 MB |
REcon/REcon 2013/Recon2013-Josh m0nk Thomas and Nathan Natron Keltner.mp4 |
113 MB |
REcon/REcon 2013/Recon2013-Joshua J Drake aka jduck.mp4 |
99.6 MB |
REcon/REcon 2013/Recon2013-Natalie Silvanovich- Many More Tamagotchis Were Harmed in the Making of this Presentation.mp4 |
183.5 MB |
REcon/REcon 2013/Recon2013-Oleg Afonin- Apple iCloud services reversed inside out.mp4 |
104.2 MB |
REcon/REcon 2013/Recon2013-Olivier Thomas- Hardware reverse engineering tools.mp4 |
152.8 MB |
REcon/REcon 2013/Recon2013-Ruby feinstein Omri Ildis Yuval Ofir.mp4 |
268.1 MB |
REcon/REcon 2014/recon2014-01-eva-galperin-Keynote.mp4 |
78.7 MB |
REcon/REcon 2014/recon2014-02-igor-skochinsky-Intel-Management-Engine-Secrets.mp4 |
180.2 MB |
REcon/REcon 2014/recon2014-03-michael-ossmann-SDR-Tricks-with-HackRF.mp4 |
121.4 MB |
REcon/REcon 2014/recon2014-04-exide-Glitching-For-n00bs.mp4 |
146 MB |
REcon/REcon 2014/recon2014-05-jason-jones-jasiel-spelman-Reversing-on-the-Edge.mp4 |
100.6 MB |
REcon/REcon 2014/recon2014-06-francisco-falcon-Breaking-Out-of-VirtualBox-through-3D-Acceleration.mp4 |
163.6 MB |
REcon/REcon 2014/recon2014-07-marta-janus-Going-gets-tough-a-tale-of-encounters-with-novel-evasive-malware.mp4 |
59.5 MB |
REcon/REcon 2014/recon2014-08-matt-oh-Reverse-Engineering-Flash-Memory-For-Fun-and-Benefit.mp4 |
166.4 MB |
REcon/REcon 2014/recon2014-10-artem-dinaburg-andrew-ruef-Static-Translation-of-X86-Instruction-Semantics-to-LLVM-With-McSema.mp4 |
235.5 MB |
REcon/REcon 2014/recon2014-11-nathan-keltner-charles-holmes-Here-be-Dragons-A-Bedtime-Tale-for-Sleepless-Nights.mp4 |
100.6 MB |
REcon/REcon 2014/recon2014-12-assaf-nativ-The-Making-of-the-Kosher-Phone.mp4 |
147.9 MB |
REcon/REcon 2014/recon2014-13-richard-johnson-Fuzzing-and-Patch-Analysis-SAGEly-Advice.mp4 |
268.2 MB |
REcon/REcon 2014/recon2014-14-jason-jones-PIN-Point-Control-for-Analyzing-Malware.mp4 |
38.7 MB |
REcon/REcon 2014/recon2014-15-alex-ionescu-Apple-SMC-The-place-to-be-definitely-For-an-implant.mp4 |
109 MB |
REcon/REcon 2014/recon2014-16-endre-bangerter-dominic-fischer-Memory-Tracing-Forensic-Reverse-Engineering.mp4 |
134.2 MB |
REcon/REcon 2014/recon2014-17-milan-bohacek-How-do-I-RE-object-oriented-code-and-you-should-too.mp4 |
173.1 MB |
REcon/REcon 2014/recon2014-18-michael-coppola-Performing-Open-Heart-Surgery-on-a-Furby.mp4 |
232.5 MB |
REcon/REcon 2014/recon2014-19-elad-shapira-Shall-we-play-a-game-Lessons-learned-while-playing-CoreWars8086.mp4 |
124.8 MB |
REcon/REcon 2014/recon2014-20-andrzej-dereszowski-FunCap.mp4 |
106.9 MB |
REcon/REcon 2014/recon2014-21-mougey-camille-francis-gabriel-DRM-obfuscation-versus-auxiliary-attacks.mp4 |
162 MB |
REcon/REcon 2014/recon2014-22-wartortell-Rewriting-x86-Binaries-Many-PEs-Such-Secure-Wow.mp4 |
134 MB |
REcon/REcon 2014/recon2014-23-brendan-dolan-gavitt-Dynamic-Analysis-Kung-Fu-with-PANDA.mp4 |
242.8 MB |
REcon/REcon 2014/recon2014-24-colin-o-flynn-Power-Analysis-and-Clock-Glitching-with-the-Open-Source-ChipWhisperer-Platform.mp4 |
169.4 MB |
REcon/REcon 2014/recon2014-25-william-peteroy-Exploit-tips-and-techniques.mp4 |
124.6 MB |
REcon/REcon 2014/recon2014-26-jonas-zaddach-Exploring-the-impact-of-a-hard-drive-backdoor.mp4 |
185 MB |
REcon/REcon 2015/presentations/recon2015-01-joan-calvet-marion-marschalek-paul-rascagneres-Totally-Spies.pdf |
3.6 MB |
REcon/REcon 2015/presentations/recon2015-03-exide-Finish-Him.zip |
9.6 MB |
REcon/REcon 2015/presentations/recon2015-04-jeffrey-crowell-julien-voisin-Radare2-building-a-new-IDA.pdf |
1.1 MB |
REcon/REcon 2015/presentations/recon2015-05-peter-hlavaty-jihui-lu-This-Time-Font-hunt-you-down-in-4-bytes.pdf |
3.1 MB |
REcon/REcon 2015/presentations/recon2015-06-sophia-d-antoine-Exploiting-Out-of-Order-Execution.pdf |
12 MB |
REcon/REcon 2015/presentations/recon2015-07-travis-goodspeed-sergey-bratus-Polyglots-and-Chimeras-in-Digital-Radio-Modes.pdf |
6.3 MB |
REcon/REcon 2015/presentations/recon2015-09-yuriy-bulygin-oleksandr-bazhaniuk-Attacking-and-Defending-BIOS-in-2015.pdf |
2.4 MB |
REcon/REcon 2015/presentations/recon2015-10-yaniv-balmas-0x3E9-Ways-to-DIE.PDF |
3.7 MB |
REcon/REcon 2015/presentations/recon2015-13-colin-o-flynn-Glitching-and-Side-Channel-Analysis-for-All.pdf |
2.6 MB |
REcon/REcon 2015/presentations/recon2015-14-christopher-domas-The-movfuscator.pdf |
4.6 MB |
REcon/REcon 2015/presentations/recon2015-16-yong-chuan-koh-Understaning-the-Microsoft-Office-Protected-View-Sandbox.pdf |
1.6 MB |
REcon/REcon 2015/presentations/recon2015-17-nitay-artenstein-shift-reduce-Pandora-s-Cash-Box-The-Ghost-Under-Your-POS.pdf |
19.6 MB |
REcon/REcon 2015/presentations/recon2015-18-andrew-zonenberg-From-Silicon-to-Compiler.pdf |
3.1 MB |
REcon/REcon 2015/presentations/recon2015-19-mike-ryan-john-mcmaster-marshallh-Reversing-the-Nintendo-64-CIC.pdf |
15.1 MB |
REcon/REcon 2015/presentations/recon2015-20-steven-vittitoe-Reverse-Engineering-Windows-AFD-sys.pdf |
432 KB |
REcon/REcon 2015/presentations/recon2015-21-j00ru-One-font-vulnerability-to-rule-them-all.pdf |
7.8 MB |
REcon/REcon 2015/video/recon2015-01-joan-calvet-marion-marschalek-paul-rascagneres-Totally-Spies.mp4 |
294.3 MB |
REcon/REcon 2015/video/recon2015-02-brian-gorenc-simon-zuckerbraun-abdul-aziz-hariri-Abusing-Silent-Mitigations.mp4 |
239.8 MB |
REcon/REcon 2015/video/recon2015-03-exide-Finish-Him.mp4 |
141.8 MB |
REcon/REcon 2015/video/recon2015-04-jeffrey-crowell-julien-voisin-Radare2-building-a-new-IDA.mp4 |
89.1 MB |
REcon/REcon 2015/video/recon2015-05-peter-hlavaty-jihui-lu-This-Time-Font-hunt-you-down-in-4-bytes.mp4 |
158.2 MB |
REcon/REcon 2015/video/recon2015-06-sophia-d-antoine-Exploiting-Out-of-Order-Execution.mp4 |
130.1 MB |
REcon/REcon 2015/video/recon2015-07-travis-goodspeed-sergey-bratus-Polyglots-and-Chimeras-in-Digital-Radio-Modes.mp4 |
242.7 MB |
REcon/REcon 2015/video/recon2015-09-yuriy-bulygin-oleksandr-bazhaniuk-Attacking-and-Defending-BIOS-in-2015.mp4 |
377 MB |
REcon/REcon 2015/video/recon2015-10-yaniv-balmas-0x3E9-Ways-to-DIE.mp4 |
293.3 MB |
REcon/REcon 2015/video/recon2015-12-alex-ionescu-Hooking-Nirvana.mp4 |
368.5 MB |
REcon/REcon 2015/video/recon2015-13-colin-o-flynn-Glitching-and-Side-Channel-Analysis-for-All.mp4 |
101.4 MB |
REcon/REcon 2015/video/recon2015-14-christopher-domas-The-movfuscator.mp4 |
277.5 MB |
REcon/REcon 2015/video/recon2015-16-yong-chuan-koh-Understaning-the-Microsoft-Office-Protected-View-Sandbox.mp4 |
124.9 MB |
REcon/REcon 2015/video/recon2015-17-nitay-artenstein-shift-reduce-Pandora-s-Cash-Box-The-Ghost-Under-Your-POS.mp4 |
137.4 MB |
REcon/REcon 2015/video/recon2015-18-andrew-zonenberg-From-Silicon-to-Compiler.mp4 |
254.1 MB |
REcon/REcon 2015/video/recon2015-20-steven-vittitoe-Reverse-Engineering-Windows-AFD-sys.mp4 |
131.6 MB |
REcon/REcon 2015/video/recon2015-21-j00ru-One-font-vulnerability-to-rule-them-all.mp4 |
223.3 MB |
REcon/REcon 2016/presentations/RECON-0xA-A_Monitor_Darkly.pdf |
125.1 MB |
REcon/REcon 2016/presentations/RECON-0xA-Audible-DRM-scheme.pdf |
1.3 MB |
REcon/REcon 2016/presentations/RECON-0xA-Diamondman.pdf |
3.2 MB |
REcon/REcon 2016/presentations/RECON-0xA-Hardware-assisted-rootkits-ARM-Spisak.pdf |
5.5 MB |
REcon/REcon 2016/presentations/RECON-0xA-How_Do_I_Crack_Satellite_and_Cable_Pay_TV.pdf |
11.4 MB |
REcon/REcon 2016/presentations/RECON-0xA-HyperPlatform-Satoshi.pdf |
386 KB |
REcon/REcon 2016/presentations/RECON-0xA-Keystone.pdf |
1.4 MB |
REcon/REcon 2016/presentations/RECON-0xA-Process_Failure_Modes.7z |
1.2 MB |
REcon/REcon 2016/presentations/RECON-0xA-Shooting_the_OSX_El_Capitan_Kernel_Like_A_Sniper_Chen_He.pdf |
13.9 MB |
REcon/REcon 2016/presentations/RECON-0xA-The-Remote-Metamorphic-Engine.pdf |
2.5 MB |
REcon/REcon 2016/video/recon2016-01-matt-spisak-Hardware-Assisted-Rootkits-and-Instrumentation-ARM-Edition.mp4 |
74.2 MB |
REcon/REcon 2016/video/recon2016-02-david-carne-Black-box-reverse-engineering-for-unknown-custom-instruction-sets.mp4 |
49.6 MB |
REcon/REcon 2016/video/recon2016-03-joan-calvet-jessy-campos-thomas-dupuy-Visiting-The-Bear-Den.mp4 |
72.5 MB |
REcon/REcon 2016/video/recon2016-04-liang-chen-qidan-he-Shooting-the-OS-X-El-Capitan-Kernel-Like-a-Sniper.mp4 |
68.1 MB |
REcon/REcon 2016/video/recon2016-05-jason-geffner-JavaJournal.mp4 |
29.1 MB |
REcon/REcon 2016/video/recon2016-07-derek-soeder-paul-mehta-BBS-Era-Exploitation-for-Fun-and-Anachronism.mp4 |
41.4 MB |
REcon/REcon 2016/video/recon2016-08-robert-c-seacord-Dangerous-Optimizations-and-the-Loss-of-Causality.mp4 |
60.7 MB |
REcon/REcon 2016/video/recon2016-09-nico-golde-daniel-komaromy-Breaking-Band.mp4 |
66.6 MB |
REcon/REcon 2016/video/recon2016-10-james-forshaw-Process-Failure-Modes.mp4 |
71.9 MB |
REcon/REcon 2016/video/recon2016-11-chris-gerlinsky-How-Do-I-Crack-Satellite-and-Cable-Pay-TV.mp4 |
73.3 MB |
REcon/REcon 2016/video/recon2016-12-satoshi-tanda-Monitoring-controlling-kernel-mode-events-by-HyperPlatform.mp4 |
33.2 MB |
REcon/REcon 2016/video/recon2016-13-natalie-silvanovich-More-Flash-More-Fun.mp4 |
58.8 MB |
REcon/REcon 2016/video/recon2016-14-ang-cui-francois-charbonneau-jatin-kataria-A-Monitor-Darkly-Reversing-and-Exploiting-Ubiquitous-On-Screen-Display-Controllers-in-Modern-Monitors.mp4 |
49.8 MB |
REcon/REcon 2016/video/recon2016-15-markus-gaasedelen-nick-burnett-SolIDArity.mp4 |
46.5 MB |
REcon/REcon 2016/video/recon2016-16-nguyen-anh-quynh-Keystone-the-last-missing-framework-of-Reverse-Engineering.mp4 |
40.6 MB |
REcon/REcon 2016/video/recon2016-17-cooper-quintin-eva-galperin-When-Governments-Attack.mp4 |
58.5 MB |
REcon/REcon 2016/video/recon2016-18-jessy-diamond-exum-Reverse-Engineering-ISC-controllers.mp4 |
74.2 MB |
REcon/REcon 2016/video/recon2016-19-alex-ionescu-Abusing-the-NT-Kernel-Shim-Engine.mp4 |
84.1 MB |
REcon/REcon 2016/video/recon2016-20-julian-kirsch-clemens-jonischkeit-Movfuscator-Be-Gone.mp4 |
36.1 MB |
REcon/REcon 2016/video/recon2016-21-richard-johnson-Go-Speed-Tracer.mp4 |
75.8 MB |
REcon/REcon 2017 Brussels/Analyzing iOS apps road from AppStore to security analysis report.mp4 |
45.4 MB |
REcon/REcon 2017 Brussels/Breaking Code Read Protection on the NXP LPC family Microcontroller.mp4 |
72 MB |
REcon/REcon 2017 Brussels/Breaking Code Read Protection on the NXP LPC family Microcontroller.srt |
142 KB |
REcon/REcon 2017 Brussels/Contributor analysis.mp4 |
32.3 MB |
REcon/REcon 2017 Brussels/Embedded devices reverse engineering.mp4 |
53 MB |
REcon/REcon 2017 Brussels/Embedded devices reverse engineering.srt |
111 KB |
REcon/REcon 2017 Brussels/GRAP define and match graph patterns within binaries.mp4 |
72.3 MB |
REcon/REcon 2017 Brussels/GRAP define and match graph patterns within binaries.srt |
112 KB |
REcon/REcon 2017 Brussels/Getting Physical with USB Type-C Windows 10 RAM Forensics and UEFI Attacks.mp4 |
106.3 MB |
REcon/REcon 2017 Brussels/Getting Physical with USB Type-C Windows 10 RAM Forensics and UEFI Attacks.srt |
194 KB |
REcon/REcon 2017 Brussels/Hackable Security Modules Reversing and exploiting a FIPS.mp4 |
48.5 MB |
REcon/REcon 2017 Brussels/Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis.mp4 |
80.6 MB |
REcon/REcon 2017 Brussels/Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis.srt |
134 KB |
REcon/REcon 2017 Brussels/Keeping your tools safe IDA.mp4 |
32.7 MB |
REcon/REcon 2017 Brussels/Keeping your tools safe IDA.srt |
64 KB |
REcon/REcon 2017 Brussels/Legacy Crypto Never Dies.mp4 |
24.2 MB |
REcon/REcon 2017 Brussels/Legacy Crypto Never Dies.srt |
61 KB |
REcon/REcon 2017 Brussels/New vulnerabilities in SMM of Coreboot and UEFI based systems.mp4 |
75.9 MB |
REcon/REcon 2017 Brussels/New vulnerabilities in SMM of Coreboot and UEFI based systems.srt |
146 KB |
REcon/REcon 2017 Brussels/Poutine Dusting Forgotten Lore - Yannick Lamarre.mp4 |
21.4 MB |
REcon/REcon 2017 Brussels/Poutine Dusting Forgotten Lore - Yannick Lamarre.srt |
30 KB |
REcon/REcon 2017 Brussels/Reverse Engineering Satellite Based IP Content Distribution.mp4 |
73.5 MB |
REcon/REcon 2017 Brussels/Reverse Engineering Satellite Based IP Content Distribution.srt |
119 KB |
REcon/REcon 2017 Brussels/Teaching Old Shellcode New Tricks - Josh Pitts.mp4 |
45.7 MB |
REcon/REcon 2017 Brussels/Teaching Old Shellcode New Tricks - Josh Pitts.srt |
84 KB |
REcon/REcon 2017 Brussels/Transforming Open Source to Open Access in Closed Applications.mp4 |
55.9 MB |
REcon/REcon 2017 Brussels/Transforming Open Source to Open Access in Closed Applications.srt |
111 KB |
REcon/REcon 2017 Brussels/When your firewall turns against you - Rene Freingruber.mp4 |
23.7 MB |
REcon/REcon 2017 Brussels/Your Chakra Is Not Aligned.mp4 |
23 MB |
REcon/REcon 2017 Brussels/Your Chakra Is Not Aligned.srt |
56 KB |
REcon/REcon 2017 Brussels/miLazyCracker - Kevin Larson.mp4 |
21.7 MB |
REcon/REcon 2017 Brussels/miLazyCracker - Kevin Larson.srt |
41 KB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-Analysing_ios_Apps.pdf |
1.3 MB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-Analyzing_Mifare_Classic_Cracking.ppt |
1.1 MB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-Breaking_CRP_on_NXP_LPC_Microcontrollers_slides.pdf |
11 MB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-Contributor_Analysis.zip |
2.9 MB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-FreeRTOS_Embedded_Reversing.pdf |
3.8 MB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-GRAP.pdf |
1.9 MB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-Harnessing_Intel_Processor_Trace_on_Windows_for_Vulnerability_Discovery.zip |
2.5 MB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-Legacy_Crypto_Never_Dies.pdf |
3.9 MB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-Reverse_Engineering_Satellite_Based_IP_Content_Distribution.pdf |
986 KB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-Teaching_Old_Shellcode_New_Tricks.pdf |
3.4 MB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-Your_Chakra_Is_Not_Aligned.pdf |
325 KB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-r2m2.pdf |
9.9 MB |
REcon/REcon 2017 Brussels/presentations/RECON-BRX-2017-reversinghsms2.pdf |
2.8 MB |
REcon/REcon 2017 Brussels/r2m2 - Guillaume “guedou” Valadon.mp4 |
42.6 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Breaking-state-of-the-art-binary-code-obfuscation.pdf |
4.1 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-DIY-ARM-Debugger-for-Wi-Fi-Chips.pdf |
8.9 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Decompiler-internals-microcode.pdf |
346 KB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Dissecting-QNX.pdf |
6.1 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Hacking-Toshiba-Laptops.pdf |
5.3 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Linux-Vulnerabilities_Windows-Exploits--Escalating-Privileges-with-WSL.pdf |
1.3 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Mess-with-the-best-die-like-the-rest_(mode).pdf |
5.5 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Reverse-Engineering-Windows-Defender-s-JavaScript-Engine.pdf |
9.2 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Reversing-IoT-Xiaomi-ecosystem.pdf |
4.5 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Robin-Hood-vs-Cisco-ASA-AnyConnect.PDF |
1.2 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Starcraft-Emulating-a-buffer-overflow-for-fun-and-profit.pdf |
9.8 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Starcraft-Emulating-a-buffer-overflow-for-fun-and-profit.pdf.aacsad8.partial |
9.8 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Subverting-your-server-through-its-BMC-the-HPE-iLO4-case.pdf |
6.4 MB |
REcon/REcon 2018 Brussels/presentations/RECON-BRX-2018-Visiting-The-Snake-Nest.pdf |
3.6 MB |
REcon/REcon 2018 Montreal/0.pdf |
70 KB |
REcon/REcon 2018 Montreal/1.pdf |
78 KB |
REcon/REcon 2018 Montreal/2.pdf |
71 KB |
REcon/REcon 2019 Montreal/video/Session.001.Joan_Calvet.The_(long)_journey_To_A_MultiArchitecture_Disassembler-fgmt6TlB2UkKi.mp4 |
81.4 MB |
REcon/REcon 2019 Montreal/video/Session.002.Chris_Gerlinsky.The_ROM_matric_revolution_Unscrambling_bits-K0W7zZQDK9lQQ.mp4 |
53 MB |
REcon/REcon 2019 Montreal/video/Session.003.Natalie_Silvanovitch.Seeing_Inside_the_Encrypted_Envelope-M8rga9e8H27Ee.mp4 |
73 MB |
REcon/REcon 2019 Montreal/video/Session.004.Brandon_Falk.Vectorized_Emulation_Putting_it_all_together-kFn8Kr6lsNZQZ.mp4 |
73 MB |
REcon/REcon 2019 Montreal/video/Session.005.Maddie_Stone.The_path_to_the_payload_Android_Edition-J3ZnNl2GYjEfa.mp4 |
48.5 MB |
REcon/REcon 2019 Montreal/video/Session.006.Takahiro_Haruyama.Defeating_APT10_Compiler-level_Obfuscation-a36qtx5lpBQnE.mp4 |
30.2 MB |
REcon/REcon 2019 Montreal/video/Session.007.Evan_Jensen.The_Backdoor_Foundry_A_Tool-chain_for_Building_Application_Specific_Implants-TU4e6qaSW6HZK.mp4 |
36.1 MB |
REcon/REcon 2019 Montreal/video/Session.008.Rolf_Rolles.Automation_Techniques_in_C++_Reverse_Engineering-8jKapmZP0gND6.mp4 |
85.8 MB |
REcon/REcon 2019 Montreal/video/Session.009.Jiska_-_Dennis_Mantz.Reversing_and_Exploiting_Broadcom_Bluetooth-dEpC4S0krzxuc.mp4 |
70.8 MB |
REcon/REcon 2019 Montreal/video/Session.010.Dimitrios_Tatsis.Attacking_Hexagon_Security_Analysis_of_Qualcomm's_ADSP-lxNbsl2gW7w0e.mp4 |
40.4 MB |
REcon/REcon 2019 Montreal/video/Session.011.Joel_Noguera.Unveiling_the_Underground_world_of_Anti-Cheats-XU7k7Iwba695M.mp4 |
65.2 MB |
REcon/REcon 2019 Montreal/video/Session.012.Alex_Ionescu.The_Last_Generic_Win32K_KASLR_Defeat_in_Windows-uXzcEpxt54ybs.mp4 |
71.3 MB |
REcon/REcon 2019 Montreal/video/Session.014.Colin_O'Flynn.MINimum_Failure_-_Stealing_Bitcoins_with_Electromagnetic_Fault_Injection-5qYAlMcGKMoEb.mp4 |
32.3 MB |
REcon/REcon 2019 Montreal/video/Session.015.Slava_Makkaveev.The_Road_to_Qualcomm_Trust-Zone_apps_fuzzing-IyiuvOcbuGOAP.mp4 |
32.3 MB |
REcon/REcon 2019 Montreal/video/Session.016.Bill_DemirKapi.The_Unseen_Dangers_of_Bloatware-SWuxeYIcvlfia.mp4 |
40.2 MB |
REcon/REcon 2019 Montreal/video/Session.017.Juan_Andres_Guerrero-Saade.Mining_Disputed_territories_Studying_Attacker_Signatures_for_Improved_Situational_Awarness-KnNCs3pp.mp4 |
56.5 MB |
REcon/REcon 2019 Montreal/video/Session.018.George_Tarnovsky.X-Ray_Reverse_Engineering-uj9LDNtRWRwUG.mp4 |
34.8 MB |
REcon/REcon 2019 Montreal/video/Session.019.Thomas_Roth_-_Dmitry_Nedospasov.Hacking_the_most_popular_cryptocurrency_hardware_wallets-90dZWqWdV43I1.mp4 |
54 MB |
REcon/REcon 2019 Montreal/video/Session.020.Alex_Radocea.Snow_Crashing_Virtual_Reality._2019_Edition-a45zewC5K1XGs.mp4 |
52.5 MB |
REcon/REcon 2019 Montreal/video/Session.022.Guy.Burned_in_AshesBaseband_Fairy_Tale_Stories-WXoRdFBuXytGB.mp4 |
37.4 MB |
REcon/REcon 2019 Montreal/video/Session.023.Matt_Graeber.Using_WPP_and_TraceLogging_Tracing_to_Facilitate_Dynamic_and_Static_Windows_RE-4wrctkSIN0JmX.mp4 |
63.7 MB |
REcon/REcon Logo.jpg |
16 KB |
REcon/REcon thank you.txt |
830 B |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-BADFET.pdf |
6.2 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-BASS.pdf |
1.7 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-Bochspwn-Reloaded.pdf |
6.5 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-Bubble_Struggle.pdf |
6 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-Cant-hide.pdf |
3.2 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-DSSS.pdf |
484 KB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-DiggingIntoTheCoreOfBoot.pdf |
1.3 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-Exporting-IDA-Debug-Information.pdf |
1.1 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-Hacking_Cell_Phone_Embedded_Systems.pdf |
1.3 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-IDAPython.pdf |
1.9 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-MazeWalker.pdf |
3.6 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-SGX_Enclave_Programming-Common Mistakes.pdf |
5.2 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-bincat.pdf |
2.5 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-crypton.pdf |
2.7 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-evolution_of_pirpi.pdf |
3 MB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-freecalypso.pdf |
53 KB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-freecalypso.ps |
133 KB |
REcon/Recon 2017 Montreal/presentations/RECON-MTL-2017-miasm.pdf |
1.9 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-02-vlad-sabaka-You-can-run-but-you-cant-hide.mp4 |
19.6 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-03-j00ru-Bochspwn-Reloaded-Detecting-Kernel-Memory-Disclosure-with-x86-Emulation-and-Taint-Tracking.mp4 |
54.7 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-04-alex-ionescu-Fun-with-Sam-Inside-the-Surface-Aggregator-Module.mp4 |
75.9 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-05-philippe-biondi-xavier-mehrenberger-raphael-rigo-sarah-zennou-BinCAT-purrfecting-binary-static-analysis.mp4 |
36.7 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-07-keegan-ryan-Hacking-Cell-Phone-Embedded-Systems.mp4 |
24.3 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-08-adam-schwalm-Exporting-IDA-Debug-Information.mp4 |
30.7 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-09-mariano-graziano-jonas-zaddach-BASS-Automated-Signature-Synthesizer.mp4 |
29.4 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-10-andrea-allievi-The-HyperV-Architecture-and-its-Memory-Manager.mp4 |
59.4 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-11-marion-marschalek-Bubble-Struggle-Call-Graph-Visualization-with-Radare2.mp4 |
50.1 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-13-david-carne-HDI-PCB-Netlist-Recovery-a-new-old-technique.mp4 |
38.5 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-14-fabrice-desclaux-camille-mougey-Miasm-reverse-engineering-framework.mp4 |
69.1 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-15-mychaela-falconia-FreeCalypso-a-fully-liberated-GSM-baseband.mp4 |
41.4 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-17-julia-karpin-anna-dorfman-Crypton-Exposing-malware-s-deepest-secrets.mp4 |
43.7 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-18-michael-atlas-SGX-Enclave-programming-common-mistakes.mp4 |
42.3 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-20-maddie-stone-The-Life-Changing-Magic-of-IDAPython-Embedded-Device-Edition.mp4 |
19.1 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-22-michael-ossmann-Reverse-Engineering-DSSS.mp4 |
60.9 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-90-LT-jeff-dileo-AssetHook.mp4 |
7.9 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-91-LT-frederic-marmond-REVEN-Axion-Talk.mp4 |
17.9 MB |
REcon/Recon 2017 Montreal/video/recon2017-mtl-92-LT-john-mcmaster-Silicon-Photonics-Talk.mp4 |
7.7 MB |