BITCQ

DeepSec

Size: 30.3 GB
Magnet link

Name Size
DeepSec/DeepSec 2007/DeepSec 2007 A Discussion on Memory-Resident Backdoors in Oracle.mp4 102.1 MB
DeepSec/DeepSec 2007/DeepSec 2007 Are the vendors listening.mp4 88.1 MB
DeepSec/DeepSec 2007/DeepSec 2007 Attacking the Giants Exploiting SAP Internals.mp4 89.9 MB
DeepSec/DeepSec 2007/DeepSec 2007 Audit of the RFID ePassport and the concept.mp4 88.7 MB
DeepSec/DeepSec 2007/DeepSec 2007 Automated structural classification of malware.mp4 91.4 MB
DeepSec/DeepSec 2007/DeepSec 2007 Breaking and Securing Web Applications.mp4 79.4 MB
DeepSec/DeepSec 2007/DeepSec 2007 Browser Hijacking.mp4 103.9 MB
DeepSec/DeepSec 2007/DeepSec 2007 Carmen, Rogue Web Server.mp4 64.7 MB
DeepSec/DeepSec 2007/DeepSec 2007 Collecting and Managing Accumulated Malware Automatically.mp4 80.3 MB
DeepSec/DeepSec 2007/DeepSec 2007 Destructive Data - Designing Inputs That Make Software Fail.mp4 101.9 MB
DeepSec/DeepSec 2007/DeepSec 2007 Disruptive modernization of legacy systems.mp4 86.7 MB
DeepSec/DeepSec 2007/DeepSec 2007 Doppelganger - novel protection against unknown file format vulnerabilities.mp4 89.4 MB
DeepSec/DeepSec 2007/DeepSec 2007 Economics of Information Security.mp4 82.6 MB
DeepSec/DeepSec 2007/DeepSec 2007 Flash Security Basics.mp4 87.7 MB
DeepSec/DeepSec 2007/DeepSec 2007 Fuzzing and Exploiting Wireless Drivers.mp4 114.7 MB
DeepSec/DeepSec 2007/DeepSec 2007 Hijacking Virtual Machine Execution for Fun and Profit.mp4 79.7 MB
DeepSec/DeepSec 2007/DeepSec 2007 Intercepting GSM traffic.mp4 79.7 MB
DeepSec/DeepSec 2007/DeepSec 2007 Naked Security The State of the Application Security Industry.mp4 65.8 MB
DeepSec/DeepSec 2007/DeepSec 2007 New Security Model of Bluetooth 2.1.mp4 92.9 MB
DeepSec/DeepSec 2007/DeepSec 2007 Observing the Tidal Waves of Malware.mp4 86.3 MB
DeepSec/DeepSec 2007/DeepSec 2007 Oracle Security Orasploit.mp4 78.1 MB
DeepSec/DeepSec 2007/DeepSec 2007 Reasonable Disclosure.mp4 125.2 MB
DeepSec/DeepSec 2007/DeepSec 2007 Security -- an Obstacle for large-scale Projects and eGovernment.mp4 115.4 MB
DeepSec/DeepSec 2007/DeepSec 2007 The Business Case for removing your perimeter.mp4 125.1 MB
DeepSec/DeepSec 2007/DeepSec 2007 The RFID Guardian.mp4 140 MB
DeepSec/DeepSec 2007/DeepSec 2007 The Three Faces of CSRF.mp4 77.1 MB
DeepSec/DeepSec 2007/DeepSec 2007 Web 2.0 Application Kung-Fu - Securing Ajax & Web Services.mp4 109.3 MB
DeepSec/DeepSec 2007/DeepSec 2007 Windows Heap Protection Bypassing requires understanding.mp4 94.5 MB
DeepSec/DeepSec 2007/DeepSec 2007 kNAC! (2).mp4 86.2 MB
DeepSec/DeepSec 2007/DeepSec 2007 kNAC!.mp4 0 B
DeepSec/DeepSec 2007/DeepSec 2007 kNAC!.srt 77 KB
DeepSec/DeepSec 2007/DeepSec 2007 the many dimensions of security in eVoting.mp4 133 MB
DeepSec/DeepSec 2007/DeepSec 2007.m3u 2 KB
DeepSec/DeepSec 2009/DeepSec 2009 A Practical DoS Attack against the GSM Network.mp4 55.6 MB
DeepSec/DeepSec 2009/DeepSec 2009 A Proof-of-Concept Attack on SmartCard-secured Online-Banking.mp4 41.7 MB
DeepSec/DeepSec 2009/DeepSec 2009 Advanced MySQL Exploitation.mp4 48.5 MB
DeepSec/DeepSec 2009/DeepSec 2009 Attacking SMS.mp4 48.9 MB
DeepSec/DeepSec 2009/DeepSec 2009 Breaking TOR Sessions with HTML5.mp4 29.6 MB
DeepSec/DeepSec 2009/DeepSec 2009 Building the Next Generation IDS Engine.mp4 55.6 MB
DeepSec/DeepSec 2009/DeepSec 2009 Cloud Services - still too cloudy for take off.mp4 46 MB
DeepSec/DeepSec 2009/DeepSec 2009 Cracking GSM.mp4 56.1 MB
DeepSec/DeepSec 2009/DeepSec 2009 Dynamic Binary Instrumentation for Deobfuscation and Unpacking.mp4 50.4 MB
DeepSec/DeepSec 2009/DeepSec 2009 Exploiting Printers by Analyzing Their Firmware.mp4 49.4 MB
DeepSec/DeepSec 2009/DeepSec 2009 Hijacking Mobile Data Connections 2.0 Automated and Improved.mp4 58.4 MB
DeepSec/DeepSec 2009/DeepSec 2009 Internet Election for the German Bundestag.mp4 49.1 MB
DeepSec/DeepSec 2009/DeepSec 2009 Key Management Death Match Competing KM Standards Technical Deep Dive.mp4 54.2 MB
DeepSec/DeepSec 2009/DeepSec 2009 Keykeriki Universal Wireless Keyboard Sniffing For The Masses.mp4 63.5 MB
DeepSec/DeepSec 2009/DeepSec 2009 Ksplice Patch without disruption.mp4 28.2 MB
DeepSec/DeepSec 2009/DeepSec 2009 Malware Case Study The ZeuS Evolution.mp4 48.5 MB
DeepSec/DeepSec 2009/DeepSec 2009 Malware for SoHo Routers.mp4 45.9 MB
DeepSec/DeepSec 2009/DeepSec 2009 Night Talk The Threat Landscape The Reality vs. The Hype.mp4 55.2 MB
DeepSec/DeepSec 2009/DeepSec 2009 Ownage 2.0.mp4 49.3 MB
DeepSec/DeepSec 2009/DeepSec 2009 Results of Security Assessment of TCPIP Protocols and implementation Strategies.mp4 46.1 MB
DeepSec/DeepSec 2009/DeepSec 2009 Reversing and Exploiting an Apple Firmware Update.mp4 58.7 MB
DeepSec/DeepSec 2009/DeepSec 2009 Stoned deja vu - again.mp4 40.2 MB
DeepSec/DeepSec 2009/DeepSec 2009 The Developmental Psychology of Intrusion Detection Systems.mp4 32.8 MB
DeepSec/DeepSec 2009/DeepSec 2009 The Kingdom of the Blind OS X Incident Response.mp4 49.9 MB
DeepSec/DeepSec 2009/DeepSec 2009 Top 10 Security Issues Developers Don t Know About.mp4 46.1 MB
DeepSec/DeepSec 2009/DeepSec 2009 TwitterRisks Bot CC, Data Loss, Intel Collection & More.mp4 62.5 MB
DeepSec/DeepSec 2009/DeepSec 2009 USB Device Drivers A Stepping Stone into your Kernel.mp4 45.1 MB
DeepSec/DeepSec 2009/DeepSec 2009 Weapons of Mass Pwnage Attacking Deployment Solutions.mp4 47.2 MB
DeepSec/DeepSec 2009/DeepSec 2009 Windows Secure Kernel Development.mp4 46.2 MB
DeepSec/DeepSec 2009/DeepSec 2009 Get your head out of the clouds Security in Software-plus-Services.mp4 48.9 MB
DeepSec/DeepSec 2009/DeepSec 2009 What if Simulation of a large-scale network under attack.mp4 48.8 MB
DeepSec/DeepSec 2009/DeepSec 2009; What if Simulation of a large-scale network under attack.mp4 109.8 MB
DeepSec/DeepSec 2009/DeepSec 2009_ What if Simulation of a large-scale network under attack.mp4 48.8 MB
DeepSec/DeepSec 2009/Deepsec 2009 eKimono Detecting Rootkits inside Virtual Machine.mp4 53 MB
DeepSec/DeepSec 2010/DeepSec 2010 All Your Baseband are belong to Us.mp4 133 MB
DeepSec/DeepSec 2010/DeepSec 2010 Android Reverse Engineering and Forensics.mp4 103.8 MB
DeepSec/DeepSec 2010/DeepSec 2010 Attacking SAP Users Using sapsploit extended.mp4 125.1 MB
DeepSec/DeepSec 2010/DeepSec 2010 Circumventing common Pitfalls when auditing sourcecode for Security Vulnerabilities.mp4 132.5 MB
DeepSec/DeepSec 2010/DeepSec 2010 Cyber Security in High-Speed Networks.mp4 115.9 MB
DeepSec/DeepSec 2010/DeepSec 2010 Cyberwar on the Horizon.mp4 123.4 MB
DeepSec/DeepSec 2010/DeepSec 2010 DYI Malware Analysis with Minibis.mp4 106.2 MB
DeepSec/DeepSec 2010/DeepSec 2010 Debugging GSM.mp4 130.5 MB
DeepSec/DeepSec 2010/DeepSec 2010 Detection of Hardware Keyloggers.mp4 152.8 MB
DeepSec/DeepSec 2010/DeepSec 2010 Electronic Locks - are really secure!.mp4 125 MB
DeepSec/DeepSec 2010/DeepSec 2010 LTE Radio Interface Structure and its Security Mechanism.mp4 196.5 MB
DeepSec/DeepSec 2010/DeepSec 2010 LTE Radio Interface Structure and its Security Mechanism.srt 53 KB
DeepSec/DeepSec 2010/DeepSec 2010 Malware World 2010 - Beware the Predators.mp4 171.3 MB
DeepSec/DeepSec 2010/DeepSec 2010 Malware goes to the Movies.mp4 152.6 MB
DeepSec/DeepSec 2010/DeepSec 2010 Mobile VoIP Steganography From Framework to Implementation.mp4 136.9 MB
DeepSec/DeepSec 2010/DeepSec 2010 Mobile privacy Tor on the iPhone and other unusual devices.mp4 151.2 MB
DeepSec/DeepSec 2010/DeepSec 2010 Off-Shore Development and Outsourcing - Information Security in Plato s Cave.mp4 187.3 MB
DeepSec/DeepSec 2010/DeepSec 2010 Off-Shore Development and Outsourcing - Information Security in Plato s Cave.srt 59 KB
DeepSec/DeepSec 2010/DeepSec 2010 OsmocomBB A tool for GSM protocol level security analysis of GSM networks.mp4 180.3 MB
DeepSec/DeepSec 2010/DeepSec 2010 OsmocomBB A tool for GSM protocol level security analysis of GSM networks.srt 66 KB
DeepSec/DeepSec 2010/DeepSec 2010 Passwords in the wild What kind of passwords do people use, and how do we crack them.mp4 162.2 MB
DeepSec/DeepSec 2010/DeepSec 2010 Passwords in the wild What kind of passwords do people use, and how do we crack them.srt 50 KB
DeepSec/DeepSec 2010/DeepSec 2010 Payload already inside data re-use for ROP exploits.mp4 134 MB
DeepSec/DeepSec 2010/DeepSec 2010 Payload already inside data re-use for ROP exploits.srt 60 KB
DeepSec/DeepSec 2010/DeepSec 2010 Recent advances in IPv6 Insecurities.mp4 65.2 MB
DeepSec/DeepSec 2010/DeepSec 2010 Recent advances in IPv6 Insecurities.srt 70 KB
DeepSec/DeepSec 2010/DeepSec 2010 Remote Binary Planting -- An Overlooked Vulnerability Affair.mp4 97.1 MB
DeepSec/DeepSec 2010/DeepSec 2010 Remote Binary Planting -- An Overlooked Vulnerability Affair.srt 77 KB
DeepSec/DeepSec 2010/DeepSec 2010 Targeted DOS Attack and various fun with GSM Um.mp4 92.3 MB
DeepSec/DeepSec 2010/DeepSec 2010 Targeted DOS Attack and various fun with GSM Um.srt 54 KB
DeepSec/DeepSec 2010/DeepSec 2010 The Future of Social Engineering.mp4 74.3 MB
DeepSec/DeepSec 2010/DeepSec 2010 The Future of Social Engineering.srt 66 KB
DeepSec/DeepSec 2011/DeepSec 2011 Advances in IDS and Suricata.mp4 133 MB
DeepSec/DeepSec 2011/DeepSec 2011 Advances in IDS and Suricata.srt 60 KB
DeepSec/DeepSec 2011/DeepSec 2011 Armageddon Redux The Changing Face of the Infocalypse.mp4 85.3 MB
DeepSec/DeepSec 2011/DeepSec 2011 Armageddon Redux The Changing Face of the Infocalypse.srt 48 KB
DeepSec/DeepSec 2011/DeepSec 2011 Attack Vectors on mobile Devices.mp4 142.3 MB
DeepSec/DeepSec 2011/DeepSec 2011 Attack Vectors on mobile Devices.srt 51 KB
DeepSec/DeepSec 2011/DeepSec 2011 Behavioral Security 10 steps forward 5 steps backward.mp4 114.2 MB
DeepSec/DeepSec 2011/DeepSec 2011 Behavioral Security 10 steps forward 5 steps backward.srt 69 KB
DeepSec/DeepSec 2011/DeepSec 2011 Bond Tech - I Want More Than Movie Props.mp4 118.8 MB
DeepSec/DeepSec 2011/DeepSec 2011 Bond Tech - I Want More Than Movie Props.srt 57 KB
DeepSec/DeepSec 2011/DeepSec 2011 Conference US Experience - Laws, Compliance and real Life.mp4 123.4 MB
DeepSec/DeepSec 2011/DeepSec 2011 Do They Deliver - Practical Security and Load Testing of Cloud Service Providers.mp4 137.3 MB
DeepSec/DeepSec 2011/DeepSec 2011 Do They Deliver - Practical Security and Load Testing of Cloud Service Providers.srt 71 KB
DeepSec/DeepSec 2011/DeepSec 2011 Extending Scapy by a GSM Air Interface and Validating the Implementation.mp4 150.1 MB
DeepSec/DeepSec 2011/DeepSec 2011 Extending Scapy by a GSM Air Interface and Validating the Implementation.srt 55 KB
DeepSec/DeepSec 2011/DeepSec 2011 Ground BeEF Cutting, devouring and digesting the Legs off a Browser.mp4 143.9 MB
DeepSec/DeepSec 2011/DeepSec 2011 How To Rob An Online Bank And Get Away With It.mp4 114.7 MB
DeepSec/DeepSec 2011/DeepSec 2011 How To Rob An Online Bank And Get Away With It.srt 57 KB
DeepSec/DeepSec 2011/DeepSec 2011 Human Factors Engineering for IT Security.mp4 116.5 MB
DeepSec/DeepSec 2011/DeepSec 2011 Human Factors Engineering for IT Security.srt 56 KB
DeepSec/DeepSec 2011/DeepSec 2011 IT Security Compliance Management can be done right (and makes sense when done right).mp4 89.2 MB
DeepSec/DeepSec 2011/DeepSec 2011 IT Security Compliance Management can be done right (and makes sense when done right).srt 41 KB
DeepSec/DeepSec 2011/DeepSec 2011 Identity X.0 - Securing the Insecure.mp4 120.6 MB
DeepSec/DeepSec 2011/DeepSec 2011 Identity X.0 - Securing the Insecure.srt 64 KB
DeepSec/DeepSec 2011/DeepSec 2011 Intelligent Bluetooth Fuzzing - Why bother.mp4 113.9 MB
DeepSec/DeepSec 2011/DeepSec 2011 Intelligent Bluetooth Fuzzing - Why bother.srt 55 KB
DeepSec/DeepSec 2011/DeepSec 2011 Malware Trends 2011 - from Cybercrime to nation-sponsored Espionage.mp4 97 MB
DeepSec/DeepSec 2011/DeepSec 2011 On Cyber-Peace Towards an International Cyber Defense Strategy.mp4 106.1 MB
DeepSec/DeepSec 2011/DeepSec 2011 On Cyber-Peace Towards an International Cyber Defense Strategy.srt 59 KB
DeepSec/DeepSec 2011/DeepSec 2011 Patching Vehicle Insecurities.mp4 124.5 MB
DeepSec/DeepSec 2011/DeepSec 2011 Patching Vehicle Insecurities.srt 49 KB
DeepSec/DeepSec 2011/DeepSec 2011 Reassemble or GTFO! - IDS Evasion Strategies.mp4 100.2 MB
DeepSec/DeepSec 2011/DeepSec 2011 Reassemble or GTFO! - IDS Evasion Strategies.srt 52 KB
DeepSec/DeepSec 2011/DeepSec 2011 Results of a Security Assessment of the Internet Protocol Version 6 (IPv6).mp4 124.3 MB
DeepSec/DeepSec 2011/DeepSec 2011 Results of a Security Assessment of the Internet Protocol Version 6 (IPv6).srt 72 KB
DeepSec/DeepSec 2011/DeepSec 2011 Solving Social Engineering Attacks.mp4 103 MB
DeepSec/DeepSec 2011/DeepSec 2011 Solving Social Engineering Attacks.srt 48 KB
DeepSec/DeepSec 2011/DeepSec 2011 The Security of non-executable Files.mp4 132.1 MB
DeepSec/DeepSec 2011/DeepSec 2011 The Security of non-executable Files.srt 59 KB
DeepSec/DeepSec 2011/DeepSec 2011 Why the software we use is designed to violate our privacy.mp4 134 MB
DeepSec/DeepSec 2011/DeepSec 2011 Why the software we use is designed to violate our privacy.srt 60 KB
DeepSec/DeepSec 2011/DeepSec 2011 Windows Pwn 7 OEM - Owned Every Mobile.mp4 122.4 MB
DeepSec/DeepSec 2011/DeepSec 2011 Windows Pwn 7 OEM - Owned Every Mobile.srt 47 KB
DeepSec/DeepSec 2011/DeepSec 2011 Your crown jewels online Further Attacks to SAP Web Applications.mp4 138.7 MB
DeepSec/DeepSec 2011/DeepSec 2011 Your crown jewels online Further Attacks to SAP Web Applications.srt 68 KB
DeepSec/DeepSec 2013/DeepSec 2013 Applied Crypto Hardening (ACH) - Bettercrypto.org.mp4 53.2 MB
DeepSec/DeepSec 2013/DeepSec 2013 Auditing Virtual Appliances - An Untapped Source Of 0-days.mp4 40.3 MB
DeepSec/DeepSec 2013/DeepSec 2013 Building The First Android IDS On Network Level.mp4 38.4 MB
DeepSec/DeepSec 2013/DeepSec 2013 Cracking And Analyzing Apple iCloud Protocols.mp4 50.5 MB
DeepSec/DeepSec 2013/DeepSec 2013 Effective IDS Testing -- The OSNIF s Top 5.mp4 59.1 MB
DeepSec/DeepSec 2013/DeepSec 2013 Finux s Historical Tour Of IDS Evasion, Insertions, and Other Oddities.mp4 67.9 MB
DeepSec/DeepSec 2013/DeepSec 2013 Hacking Medical Devices.mp4 72.7 MB
DeepSec/DeepSec 2013/DeepSec 2013 Keynote - Cultural Learning Of China To Make Benefit Glorious Profession Of Infosec.mp4 47.4 MB
DeepSec/DeepSec 2013/DeepSec 2013 Malware Datamining And Attribution.mp4 43.7 MB
DeepSec/DeepSec 2013/DeepSec 2013 Mobile Fail Cracking Open Secure Android Containers.mp4 59.7 MB
DeepSec/DeepSec 2013/DeepSec 2013 Psychology of Security a Research Programme.mp4 49.9 MB
DeepSec/DeepSec 2013/DeepSec 2013 Relax Everybody HTML5 Is Securer Than You Think.mp4 58.3 MB
DeepSec/DeepSec 2013/DeepSec 2013 The Boomerang Effect -- Using Session Puzzling To Attack Apps From The Backend.mp4 62.3 MB
DeepSec/DeepSec 2013/DeepSec 2013 Top 10 Security Mistakes In Software.mp4 65.8 MB
DeepSec/DeepSec 2013/DeepSec 2013 Trusted Friend Attack Guardian Angels Strike.mp4 50.4 MB
DeepSec/DeepSec 2013/DeepSec 2013 Uncovering your Trails -- Privacy Issues of Bluetooth Devices.mp4 60.7 MB
DeepSec/DeepSec 2013/DeepSec 2013 spin Static Instrumentation For Binary Reverse-Engineering.mp4 58.7 MB
DeepSec/DeepSec 2014/A Myth or Reality – BIOS-based Hypervisor Threat.mp4 212.8 MB
DeepSec/DeepSec 2014/A Myth or Reality &ndash_ BIOS-based Hypervisor Threat.mp4 102.5 MB
DeepSec/DeepSec 2014/A Tale of an Unbreakable, Context-specific XSS Sanitizer.mp4 69 MB
DeepSec/DeepSec 2014/Addressing the Skills Gap.mp4 66.6 MB
DeepSec/DeepSec 2014/Advanced Powershell Threat - Lethal Client Side Attacks using Powershell.mp4 86.9 MB
DeepSec/DeepSec 2014/An innovative and comprehensive Framework for Social Vulnerability Assessment.mp4 86.3 MB
DeepSec/DeepSec 2014/Bending and Twisting Networks.mp4 47.8 MB
DeepSec/DeepSec 2014/Build Yourself a Risk Assessment Tool.mp4 88.9 MB
DeepSec/DeepSec 2014/CERT.at - Daily Business in a Nutshell.mp4 88.7 MB
DeepSec/DeepSec 2014/Cloud-based Data Validation Patterns - We need a new approach.mp4 74 MB
DeepSec/DeepSec 2014/Cognitive Bias and Critical Thinking in Open Source Intelligence OSINT.mp4 88.7 MB
DeepSec/DeepSec 2014/Creating a kewl and simple Cheating Platform on Android.mp4 79.1 MB
DeepSec/DeepSec 2014/Cyber Security Information Sharing.mp4 79.4 MB
DeepSec/DeepSec 2014/DeepSec 2014 Closing.mp4 26.4 MB
DeepSec/DeepSec 2014/Introduction to and Survey of TLS Security.mp4 64.2 MB
DeepSec/DeepSec 2014/Java s SSLSocket How Bad APIs Compromise Security.mp4 83.1 MB
DeepSec/DeepSec 2014/MLD Considered Harmful - Breaking Another IPv6 Subprotocol.mp4 85.5 MB
DeepSec/DeepSec 2014/Memory Forensics and Security Analytics - Detecting Unknown Malware.mp4 94.2 MB
DeepSec/DeepSec 2014/Mobile SSL Failures.mp4 75.8 MB
DeepSec/DeepSec 2014/On the Effectiveness of Full-ASLR on 64-bit Linux.mp4 87.4 MB
DeepSec/DeepSec 2014/Political Solutions to Technical Challenges.mp4 85.6 MB
DeepSec/DeepSec 2014/Reliable EMET Exploitation.mp4 80.3 MB
DeepSec/DeepSec 2014/Revisiting SSL TLS Implementations - New Bleichenbacher Side Channels and Attacks.mp4 60.2 MB
DeepSec/DeepSec 2014/SAP BusinessObjects Attacks - Espionage and Poisoning of Business Intelligence Platforms.mp4 75 MB
DeepSec/DeepSec 2014/SENTER Sandman - Using Intel TXT to Attack BIOSes.mp4 90.9 MB
DeepSec/DeepSec 2014/Safer Six - IPv6 Security in a Nutshell.mp4 54.8 MB
DeepSec/DeepSec 2014/Security Operations - Moving to a Narrative-Driven Model.mp4 70.4 MB
DeepSec/DeepSec 2014/Social Authentication - Vulnerabilities, Mitigations, and Redesign.mp4 56.7 MB
DeepSec/DeepSec 2014/Suricata Intrusion Detection.mp4 67.4 MB
DeepSec/DeepSec 2014/TextSecure and RedPhone - bring them to iOS!.mp4 74.3 MB
DeepSec/DeepSec 2014/The IPv6 Snort Plugin.mp4 82.1 MB
DeepSec/DeepSec 2014/The Measured CSO.mp4 95.2 MB
DeepSec/DeepSec 2014/Trap a Spam-Bot for Fun and Profit.mp4 58.5 MB
DeepSec/DeepSec 2014/Trusting Your Cloud Provider - Protecting Private Virtual Machines.mp4 106.1 MB
DeepSec/DeepSec 2014/Why Antivirus Software fails.mp4 53.8 MB
DeepSec/DeepSec 2014/Why IT Security Is Fucked Up And What We Can Do About It.mp4 70.8 MB
DeepSec/DeepSec 2015/[DS15] 50 Shades of WAF Exemplified at Barracuda & Sucuri - Ashar Javed.mp4 51.9 MB
DeepSec/DeepSec 2015/[DS15] 50 Shades of WAF Exemplified at Barracuda & Sucuri - Ashar Javed.srt 29 KB
DeepSec/DeepSec 2015/[DS15] A Case Study on the Security of Application Whitelisting Rene Freingruber.mp4 76.8 MB
DeepSec/DeepSec 2015/[DS15] A Case Study on the Security of Application Whitelisting Rene Freingruber.srt 55 KB
DeepSec/DeepSec 2015/[DS15] A Death in Athens The inherent Vulnerability of Lawful Intercept Programs James Bamford.mp4 59.8 MB
DeepSec/DeepSec 2015/[DS15] A Death in Athens The inherent Vulnerability of Lawful Intercept Programs James Bamford.srt 37 KB
DeepSec/DeepSec 2015/[DS15] Advanced SOHO Router Exploitation - Lyon Yang.mp4 42.2 MB
DeepSec/DeepSec 2015/[DS15] Advanced SOHO Router Exploitation - Lyon Yang.srt 16 KB
DeepSec/DeepSec 2015/[DS15] Agile Security The Good, The Bad, and mostly the Ugly - Daniel Liber.mp4 52.5 MB
DeepSec/DeepSec 2015/[DS15] Agile Security The Good, The Bad, and mostly the Ugly - Daniel Liber.srt 35 KB
DeepSec/DeepSec 2015/[DS15] Bridging the Air Gap Data Exfiltration from Air Gap Networks.mp4 55.9 MB
DeepSec/DeepSec 2015/[DS15] Bridging the Air Gap Data Exfiltration from Air Gap Networks.srt 42 KB
DeepSec/DeepSec 2015/[DS15] Building a Better Honeypot Network - Josh Pyorre.mp4 57.4 MB
DeepSec/DeepSec 2015/[DS15] Building a Better Honeypot Network - Josh Pyorre.srt 47 KB
DeepSec/DeepSec 2015/[DS15] Chw00t How To Break Out from Various Chroot Solutions - Balazs Bucsay.mp4 66.1 MB
DeepSec/DeepSec 2015/[DS15] Continuous Intrusion Why CI Tools Are an Attacker s Best Friends - Nikhil Mittal.mp4 73.2 MB
DeepSec/DeepSec 2015/[DS15] Cryptographic Enforcement of Segregation of Duty within Work Flows - Thomas Maus.mp4 64.6 MB
DeepSec/DeepSec 2015/[DS15] Cryptographic Enforcement of Segregation of Duty within Work Flows - Thomas Maus.srt 36 KB
DeepSec/DeepSec 2015/[DS15] Cryptography Tools, Identity Vectors for Djihadists - Julie Gommes.mp4 51.8 MB
DeepSec/DeepSec 2015/[DS15] Cryptography Tools, Identity Vectors for Djihadists - Julie Gommes.srt 15 KB
DeepSec/DeepSec 2015/[DS15] Cyber Cyber Cyber Warfare Mistakes from the MoDs - Raoul Chiesa.mp4 66.7 MB
DeepSec/DeepSec 2015/[DS15] DDoS Barbarians at the Gateway - Dave Lewis.mp4 63 MB
DeepSec/DeepSec 2015/[DS15] DDoS Barbarians at the Gateway - Dave Lewis.srt 60 KB
DeepSec/DeepSec 2015/[DS15] Deactivating Endpoint Protection Software in an Unauthorized Manner Matthias Deeg.mp4 60.5 MB
DeepSec/DeepSec 2015/[DS15] Deactivating Endpoint Protection Software in an Unauthorized Manner Matthias Deeg.srt 43 KB
DeepSec/DeepSec 2015/[DS15] Extending a Legacy Platform Providing a Minimalistic, Secure Single Sign On Library.mp4 37.7 MB
DeepSec/DeepSec 2015/[DS15] Extending a Legacy Platform Providing a Minimalistic, Secure Single Sign On Library.srt 21 KB
DeepSec/DeepSec 2015/[DS15] File Format Fuzzing in Android Giving a Stagefright to the Android Installer.mp4 66.6 MB
DeepSec/DeepSec 2015/[DS15] File Format Fuzzing in Android Giving a Stagefright to the Android Installer.srt 47 KB
DeepSec/DeepSec 2015/[DS15] HORNET High speed Onion Routing at the Network Layer - Chen Chen.mp4 44 MB
DeepSec/DeepSec 2015/[DS15] HORNET High speed Onion Routing at the Network Layer - Chen Chen.srt 25 KB
DeepSec/DeepSec 2015/[DS15] Hacking Cookies in Modern Web Applications and Browsers - Dawid Czagan.mp4 63.6 MB
DeepSec/DeepSec 2015/[DS15] Hacking Cookies in Modern Web Applications and Browsers - Dawid Czagan.srt 45 KB
DeepSec/DeepSec 2015/[DS15] HackingTeam - How They Infected Your Android Device By 0days - Attila Marosi.mp4 62.7 MB
DeepSec/DeepSec 2015/[DS15] HackingTeam - How They Infected Your Android Device By 0days - Attila Marosi.srt 33 KB
DeepSec/DeepSec 2015/[DS15] Have We Penetrated Yet - Johnny Deutsch.mp4 59.6 MB
DeepSec/DeepSec 2015/[DS15] Have We Penetrated Yet - Johnny Deutsch.srt 49 KB
DeepSec/DeepSec 2015/[DS15] How to Break XML Encryption - Automatically -- Juraj Somorovsky.mp4 56.8 MB
DeepSec/DeepSec 2015/[DS15] How to Break XML Encryption - Automatically -- Juraj Somorovsky.srt 39 KB
DeepSec/DeepSec 2015/[DS15] IntelMQ - Sebastian Wagner.mp4 34.1 MB
DeepSec/DeepSec 2015/[DS15] Keynote Can Societies manage the SIGINT Monster - Duncan Campbell.mp4 75.5 MB
DeepSec/DeepSec 2015/[DS15] Keynote Can Societies manage the SIGINT Monster - Duncan Campbell.srt 44 KB
DeepSec/DeepSec 2015/[DS15] Legal Responses Against Cyber Incidents - Oscar Serrano.mp4 55.8 MB
DeepSec/DeepSec 2015/[DS15] Legal Responses Against Cyber Incidents - Oscar Serrano.srt 46 KB
DeepSec/DeepSec 2015/[DS15] Measuring the TOR Network - Jens Kubieziel.mp4 71.6 MB
DeepSec/DeepSec 2015/[DS15] Measuring the TOR Network - Jens Kubieziel.srt 48 KB
DeepSec/DeepSec 2015/[DS15] Not so Smart - On Smart TV Apps - Marcus Niemietz.mp4 54.3 MB
DeepSec/DeepSec 2015/[DS15] Not so Smart - On Smart TV Apps - Marcus Niemietz.srt 31 KB
DeepSec/DeepSec 2015/[DS15] Remote Browser Based Fingerprinting of Local Network Devices - Manfred Kaiser.mp4 47 MB
DeepSec/DeepSec 2015/[DS15] Revisiting SOHO Router Attacks.mp4 64.6 MB
DeepSec/DeepSec 2015/[DS15] Temet Nosce - Know thy Endpoint Through and Through - Processes to Data - Thomas Fischer.mp4 75.1 MB
DeepSec/DeepSec 2015/[DS15] Temet Nosce - Know thy Endpoint Through and Through - Processes to Data - Thomas Fischer.srt 40 KB
DeepSec/DeepSec 2015/[DS15] The German Data Privacy Laws and IT Security - Stefan Schumacher.mp4 69.9 MB
DeepSec/DeepSec 2015/[DS15] The German Data Privacy Laws and IT Security - Stefan Schumacher.srt 51 KB
DeepSec/DeepSec 2015/[DS15] Visualizing Wi Fi Packets the Hacker s Way - Milan Gabor.mp4 61.9 MB
DeepSec/DeepSec 2015/[DS15] Visualizing Wi Fi Packets the Hacker s Way - Milan Gabor.srt 35 KB
DeepSec/DeepSec 2015/[DS15] Yes, Now YOU Can Patch That Vulnerability Too! Mitja Kolsek.mp4 70.7 MB
DeepSec/DeepSec 2015/[DS15] Yes, Now YOU Can Patch That Vulnerability Too! Mitja Kolsek.srt 50 KB
DeepSec/DeepSec 2015/[DS15] ZigBee Smart Homes - A Hacker s Open House - Tobias Zillner, Florian Eichelberger.mp4 71 MB
DeepSec/DeepSec 2015/[DS15] ZigBee Smart Homes - A Hacker s Open House - Tobias Zillner, Florian Eichelberger.srt 41 KB
DeepSec/DeepSec 2015/[DS15] illusoryTLS Nobody But Us Impersonate,Tamper and Exploit - Alfonso De Gregorio.mp4 45.7 MB
DeepSec/DeepSec 2015/[DS15] illusoryTLS Nobody But Us Impersonate,Tamper and Exploit - Alfonso De Gregorio.srt 31 KB
DeepSec/DeepSec 2016/DeepSec 2016 - 802.11 Complexity. An Introduction to 802.11 Protocol Chaos.mp4 451.1 MB
DeepSec/DeepSec 2016/DeepSec 2016 - AMSI How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That.mp4 174.3 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Abusing LUKS to Hack the System.mp4 276.6 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Advanced Concepts for SMM Malware.mp4 211.6 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Advanced SSH.mp4 133.7 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Assessing the Hacking Capabilities of Institutional and Non-institutional Players.mp4 395.9 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Behavioral Analysis from DNS and Network Traffic.mp4 138.7 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Brace Yourselves, Exploit Automation is Coming.mp4 149 MB
DeepSec/DeepSec 2016/DeepSec 2016 - COVER YOUR SAAS Protecting Your Cloud With Analytics and Machine Learning.mp4 140.3 MB
DeepSec/DeepSec 2016/DeepSec 2016 - CSP Is Dead, Long Live Strict CSP!.mp4 426.4 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Closing Ceremony.mp4 31.4 MB
DeepSec/DeepSec 2016/DeepSec 2016 - DROWN Breaking TLS using SSLv2.mp4 357.1 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Exploiting First Hop Protocols to Own the Network.mp4 128.7 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Fuzzing Remote Interfaces for System Services in Android.mp4 309.1 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Go Hack Yourself&hellip_ Or Someone Else Will.mp4 419.6 MB
DeepSec/DeepSec 2016/DeepSec 2016 - HSTS and Cookie Side-Channels Stealing Browser History.mp4 175.2 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Human vs Artificial intelligence &ndash_ Battle of Trust.mp4 338.2 MB
DeepSec/DeepSec 2016/DeepSec 2016 - I Thought I Saw a - 4&gt_.mp4 232.7 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Inside Stegosploit.mp4 212.3 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Java Deserialization Vulnerabilities - The Forgotten Bug Class.mp4 425.7 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Keynote Security in my Rear-View Mirror (Marcus Ranum).mp4 198.3 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Machine Duping Pwning Deep Learning Systems.mp4 182.8 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Malicious Hypervisor Threat &ndash_ Phase Two How to Catch the Hypervisor.mp4 481.2 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Opening &amp_ Welcome.mp4 10.7 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Security and Privacy in the Current E-Mobility Charging Infrastructure.mp4 192.8 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Smart Sheriff, Dumb Idea The Wild West of Government Assisted Parenting.mp4 168.2 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Social Engineering The Most Underestimated APT &ndash_ Hacking the Human Operating System.mp4 177.5 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Systematic Fuzzing and Testing of TLS Libraries.mp4 313.2 MB
DeepSec/DeepSec 2016/DeepSec 2016 - TLS 1.3 Lessons Learned from Implementing and Deploying the Latest Protocol.mp4 355.3 MB
DeepSec/DeepSec 2016/DeepSec 2016 - The Perfect Door and The Ideal Padlock.mp4 178.5 MB
DeepSec/DeepSec 2016/DeepSec 2016 - When your Firewall turns against you.mp4 407 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Where Should I Host My Malware.mp4 141.8 MB
DeepSec/DeepSec 2016/DeepSec 2016 - Why Companies Must Control Their Data in the Era of IoT - and How To.mp4 386.4 MB
DeepSec/DeepSec 2016/DeepSec 2016 - badGPO - Using GPOs for Persistence and Lateral Movement.mp4 328.1 MB
DeepSec/DeepSec 2016/DeepSec 2016 Obfuscated Financial Fraud Android Malware Detection And Behavior Tracking.mp4 143.6 MB
DeepSec/DeepSec 2016/DeepSec 2016 Of Mice and Keyboards On the Security of Modern Wireless Desktop Sets.mp4 391.2 MB
DeepSec/DeepSec 2016/DeepSec 2016 Protecting Against Tomorrow's Adversaries - Post-Quantum Cryptography.mp4 136.2 MB
DeepSec/DeepSec 2017/DeepSec 2017 - A Song of Botnets and Power - Blackout is coming Online Vimeo On Demand.mp4 97.8 MB
DeepSec/DeepSec 2017/DeepSec 2017 - A Story Of A Vulnerability How To Execute Code On A Forensic Workstation Online Vimeo On Demand.mp4 58.1 MB
DeepSec/DeepSec 2017/DeepSec 2017 - BITSInject - Control Your BITS, Get SYSTEM Online Vimeo On Demand.mp4 99.9 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Behavior Based Secure And Resilient System Development Online Vimeo On Demand.mp4 140 MB
DeepSec/DeepSec 2017/DeepSec 2017 - BitCracker BitLocker Meets GPUs Online Vimeo On Demand.mp4 56.4 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Building Security Teams Online Vimeo On Demand.mp4 97 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Bypassing Web Application Firewalls Online Vimeo On Demand.mp4 181 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Cloud Of Suspicion Scaling Up Phishing Campaigns Using Google Apps Scripts Online Vimeo On Demand.mp4 94 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Don't Let The Cuteness Fool You - Exploiting IoT's MQTT Protocol Online Vimeo On Demand.mp4 97 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Essential Infrastructure Interdependencies Would We Be Prepared For Significant Interruptions Online Vimeo On Demand.mp4 108.2 MB
DeepSec/DeepSec 2017/DeepSec 2017 - How I Rob Banks Online Vimeo On Demand.mp4 127.8 MB
DeepSec/DeepSec 2017/DeepSec 2017 - How Secure Are Your VoLTE And VoWiFi Calls Online Vimeo On Demand.mp4 96.2 MB
DeepSec/DeepSec 2017/DeepSec 2017 - How To (Not) Design_Your_Own_Protocol Online Vimeo On Demand.mp4 55 MB
DeepSec/DeepSec 2017/DeepSec 2017 - How To Hide Your Browser 0-days Free Offense And Defense Tips Included Online Vimeo On Demand.mp4 109.3 MB
DeepSec/DeepSec 2017/DeepSec 2017 - I Wrote my Own Ransomware_ Did Not Make 1 Iota Of A Bitcoin Online Vimeo On Demand.mp4 137 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Insecurity In Information Technology Online Vimeo On Demand.mp4 174.6 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Lock, Stock And Two Smoking Apples - XNU Kernel Security Online Vimeo On Demand.mp4 105.3 MB
DeepSec/DeepSec 2017/DeepSec 2017 - PeopleSoft Hack The Planet's Universities Online Vimeo On Demand.mp4 57.8 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Securing the Darknet Online Vimeo On Demand.mp4 97.9 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Skip Tracing For Fun And Profit Online Vimeo On Demand.mp4 70.9 MB
DeepSec/DeepSec 2017/DeepSec 2017 - The Future of the Internet Online Vimeo On Demand.mp4 97.1 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Uncovering And Visualizing Botnet Infrastructure And Behavior Online Vimeo On Demand.mp4 92.6 MB
DeepSec/DeepSec 2017/DeepSec 2017 - Who Hid My Desktop &ndash_ Deep Dive Into hVNC Online Vimeo On Demand.mp4 91.1 MB
DeepSec/DeepSec 2017/DeepSec 2017 - XFLTReaT A New Dimension In Tunnelling Online Vimeo On Demand.mp4 110.3 MB
DeepSec/DeepSec 2017/DeepSec 2017- Hacking The Brain For Fun And Profit Online Vimeo On Demand.mp4 81.6 MB
DeepSec/DeepSec 2017/DeepSec 2017- Intel AMT Using &amp_ Abusing The Ghost In The Machine Online Vimeo On Demand.mp4 90.9 MB
DeepSec/DeepSec 2017/DeepSec 2017- OpenDXL In Active Response Scenarios Online Vimeo On Demand.mp4 92.2 MB
DeepSec/DeepSec 2019/500000 Recalled Pacemakers, 2 Billion $ Stock Value Loss The Story Behind - Tobias Zillner.mp4 56.8 MB
DeepSec/DeepSec 2019/A Threat-based Security Monitoring Approach Using Mitre ATT&CK Matrix - Patrick Bareiszlig.mp4 59.5 MB
DeepSec/DeepSec 2019/Abusing Google Play Billing for Fun and Unlimited Credits - Guillaume Lopes.mp4 35.3 MB
DeepSec/DeepSec 2019/Android Malware Adventures - Krsat Oguzhan Akinci and Mert Can Coskuner.mp4 49.7 MB
DeepSec/DeepSec 2019/Beyond Windows Forensics with Built-in Microsoft Tooling - Thomas Fischer.mp4 100 MB
DeepSec/DeepSec 2019/Chinese Police and CloudPets - Abraham Aranguren.mp4 104.1 MB
DeepSec/DeepSec 2019/Comparing GnuPG With Signal is like Comparing Apples with Smart Light Bulbs_Hans Freitag.mp4 82.2 MB
DeepSec/DeepSec 2019/DeepSec2019 Opening.mp4 3 MB
DeepSec/DeepSec 2019/DeepSec2019_Keynote.mp4 67.1 MB
DeepSec/DeepSec 2019/Demystifying Hardware Security Modules - How to Protect Keys in Hardware - Michael Walser.mp4 56.1 MB
DeepSec/DeepSec 2019/How To Create a Botnet of GSM-devices - Aleksandr Kolchanov.mp4 56.4 MB
DeepSec/DeepSec 2019/IPFS As a Distributed Alternative to Logs Collection - Fabio Nigi.mp4 40.7 MB
DeepSec/DeepSec 2019/Lauschgert - Gets in the Way of Your Victim's Traffic and Out of Yours - Adrian Vollmer.mp4 46.4 MB
DeepSec/DeepSec 2019/Lost in (DevOps) Practical Approach for Lightway Threat Modeling as a Code - Vitaly Davidoff.mp4 49.6 MB
DeepSec/DeepSec 2019/Mastering AWS Pentesting and Methodology - Ankit Giri.mp4 67.6 MB
DeepSec/DeepSec 2019/Mobile Network Hacking, All-over-IP Edition - Luca Melette, Sina Yazdanmehr.mp4 50.5 MB
DeepSec/DeepSec 2019/New Tales of Wireless Input Devices - Matthias Deeg.mp4 122.8 MB
DeepSec/DeepSec 2019/Once Upon a Time in the West - A story on DNS Attacks - Valentina Palacin, Ruth Esmeralda Barbacil.mp4 56.8 MB
DeepSec/DeepSec 2019/Overcoming the Limitations of TLS Fingerprinting for Malware Detection - Blake Anderson.mp4 48.5 MB
DeepSec/DeepSec 2019/Practical Security Awareness - Lessons Learnt and Best Practices - Stefan Schumacher.mp4 67.4 MB
DeepSec/DeepSec 2019/S.C.A.R.E. - Static Code Analysis Recognition Evasion - Andreas Wiegenstein.mp4 43 MB
DeepSec/DeepSec 2019/SD-WAN Secure Communications Design and Vulnerabilities - Denis Kolegov.mp4 66 MB
DeepSec/DeepSec 2019/Saving Private Brian - Michael Burke.mp4 55.6 MB
DeepSec/DeepSec 2019/Setting Up an Opensource Threat Detection Program - Lance Buttars.mp4 50.5 MB
DeepSec/DeepSec 2019/Still Secure. We Empower What We Harden Because We Can Conceal - Yury Chemerkin.mp4 45.5 MB
DeepSec/DeepSec 2019/Techniques and Tools for Becoming an Intelligence Operator - Robert Sell.mp4 55 MB
DeepSec/DeepSec 2019/The Daily Malware Grind - Looking Beyond the Cybers - Tim Berghoff, Hauke Gierow.mp4 56 MB
DeepSec/DeepSec 2019/The Future Is Here - Modern Attack Surface On Automotive - Lior Yaari.mp4 98.9 MB
DeepSec/DeepSec 2019/The Turtle Gone Ninja - Investigation of an Unusual Crypto-Mining Campaign - Ophir Harpaz and Daniel Goldberg.mp4 57.8 MB
DeepSec/DeepSec 2019/Well, That Escalated Quickly - A Penetration Tester's Approach to Windows Privilege Escalation - Khalil Bijjou.mp4 56.9 MB
DeepSec/DeepSec 2019/What Has Data Science Got To Do With It - Thordis Thorsteins.mp4 51.8 MB
DeepSec/DeepSec 2019/Whats Wrong with WebSocket APIs - Unveiling Vulnerabilities in WebSocket APIs - Mikhail Egorov.mp4 41.2 MB
DeepSec/DeepSec logo.png 3 KB
DeepSec/DeepSec thank you.txt 1 KB
DeepSec/ROOTS 2017/ROOTS 2017 - Enhancing Control Flow Graph Based Binary Function Identification.mp4 85.9 MB
DeepSec/ROOTS 2017/ROOTS 2017 - Keynote Automatic Exploitation - The DARPA Cyber Grand Challenge, what came after, and what is next.mp4 53.5 MB
DeepSec/ROOTS 2017/ROOTS 2017 - On The (In-)Security Of JavaScript Object Signing and Encryption.mp4 40.7 MB
DeepSec/ROOTS 2017/ROOTS 2017 - Out-Of-Order Execution As A Cross-VM Side Channel And Other Applications.mp4 119.3 MB
DeepSec/ROOTS 2017/ROOTS 2017 - Paying The Price For Disruption A FinTech Allowed Account Takeover.mp4 130.7 MB
DeepSec/ROOTS 2017/ROOTS 2017 - Reverse Engineering a Code without the Code.mp4 133.6 MB
DeepSec/ROOTS 2018/ROOTS 2018 - How Android's UI Security is Undermined by Accessibility.mp4 52.5 MB
DeepSec/ROOTS 2018/ROOTS 2018 - Kernel-Assisted Debugging of Linux Applications.mp4 39.8 MB
DeepSec/ROOTS 2018/ROOTS 2018 - Keynote Automatic Exploitation - The DARPA Cyber Grand Challenge, what came after, and what is next.mp4 56.7 MB
DeepSec/ROOTS 2018/ROOTS 2018 - Library and Function Identification by Optimized Pattern Matching on Compressed Databases.mp4 34.1 MB
DeepSec/ROOTS 2018/ROOTS 2018 - The Swift Language from a Reverse Engineering Perspective.mp4 17.9 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
DeepSec Video 25.1 GB 6
DeepSec Video 30.3 GB 4
DeepSec Video 28.5 GB 6

Loading...