BITCQ

Black Hat

Size: 173.5 GB
Magnet link

Name Size
Black Hat/Black Hat Logo small.jpg 7 KB
Black Hat/Black Hat Logo wide.jpg 7 KB
Black Hat/Black Hat logo.png 2 KB
Black Hat/Black Hat thank you.txt 1 KB
Black Hat/Black Hat Abu Dhabi/bh-ad-10.rar 47.8 MB
Black Hat/Black Hat Abu Dhabi/bh-ad-11.rar 200 MB
Black Hat/Black Hat Abu Dhabi/bh-ad-12.rar 222.1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Black-Hat-AD-2010-android-sandcastle-slides.pdf 5.8 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Black-Hat-AD-2010-android-sandcastle-wp.pdf 493 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-FX-Blitzableiter-slides.pdf 1.5 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-FX-Blitzableiter-wp.pdf 125 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Grunwald-MRTD-eID-wp.pdf 36 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Gurgq-Base-Jumping-slides.pdf 1.4 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Blackhat-AD-2010-Hansen-Sokol-HTTPS-Can-Byte-Me-slides.pdf 4.2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Blackhat-AD-2010-Hansen-Sokol-HTTPS-Can-Byte-Me-wp.pdf 201 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Hoff-Cloudinomicon-v11.pdf 12.4 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-slides.pdf 849 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf 757 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Nohl-Attacking-Phone-Privacy-wp.pdf 128 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Oudot-Extrusion-and-Web-Hacking-slides.pdf 5.4 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Oudot-Extrusion-and-Web-Hacking-wp.pdf 550 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Pollet-RTS-Electricity-for-Free-slides.pdf 4.5 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Pollet-RTS-Electricity-for-Free-wp.pdf 1.1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Rad-International-Cyber-Jurisdiction-slides.pdf 1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Rad-International-Cyber-Jurisdiction-wp.pdf 45 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Ridley-Escaping-The-Sandbox-slides.pdf 2.6 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-slides.pdf 2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-wp-v1.pdf 312 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/BlackHat-AD-2010-Slaviero-Lifting-the-Fog-slides.pdf 3.2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2010/Dan Kaminski phreebird_suite_1.0.tar.gz 5.4 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Amol_SCADA_Code.zip 3 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Amol_SCADA_Slides.pdf 2.1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Amol_SCADA_WP.pdf 1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-AttendeeVideo.mp4 62.5 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Aumasson-CryptanalysisVSReality_Slides.pdf 4.6 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Aumasson-CryptanalysisVSReality_WP.pdf 168 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Bandukwala-Fun_w_Google_Custom_Searches_Slides.pdf 8.6 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Bandukwala-Fun_w_Google_Custom_Searches_WP.pdf 1.9 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Beek-Taming_Worms_RATS_Dragons-Slides.pdf 3.8 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Belenko-iOS_Data_Protection.pdf 2.6 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_Code.zip 6.2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_Slides.pdf 4.5 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_WP.pdf 845 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Drake-Exploiting_Java_Memory_Corruption-Code.zip 47 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Drake-Exploiting_Java_Memory_Corruption-Slides.pdf 25 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Drake-Exploiting_Java_Memory_Corruption-WP.pdf 3 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Ha-Check_Your_Zombie_Devices_Slides.pdf 2.6 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Ha-Check_Your_Zombie_Devices_WP.pdf 2.1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Lundeen-New_Ways_Hack_WebApp-Slides.pdf 7.8 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Lundeen-New_Ways_Hack_WebApp-WP.pdf 1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-MacJon-StealthAttacks_Code.zip 6 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-MacJon-StealthAttacks_Slides.pdf 8.7 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-MacJon-StealthAttacks_WP.pdf 1009 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Mittal-Kautilya_Teensy_Beyond_Shell-Code.zip 60 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Mittal-Kautilya_Teensy_Beyond_Shell-Slides.pdf 15.5 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Mittal-Kautilya_Teensy_Beyond_Shell-WP.pdf 365 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Oi-Android_Rootkit-Slides.pdf 1.3 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Oi-Android_Rootkit-WP.pdf 168 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Ortiz-Steganography-Slides.pdf 22.1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Ortiz-Steganography-WP.pdf 4 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Spitler-Software_Security_Goes_Mobile_Slides.pdf 5.3 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Spitler-Software_Security_Goes_Mobile_WP.pdf 291 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Sumner-Concerns_w_Facebook_WP.pdf 481 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Sutton_Embeded_Web_Servers_Slides.pdf 15.5 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Sutton_Embeded_Web_Servers_WP.pdf 1.3 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Vivek-Advanced_WiFi_Security_Code.zip 6.1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2011/bh-ad-11-Vivek-Advanced_WiFi_Security_Slides.pdf 11.7 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/AAtlasis_scripts.zip 6 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/ad-12-Dmitrienko-over-the-air-demo.mp4 29.6 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/ad-12-OFlynn.zip 42.2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/AFEv2-Gupta.zip 36.8 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/BH_AD_12_MWRI_LTE_Ruks_Slides.pdf 1.7 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/BH_AD_12_MWRI_LTE_Ruks_WP.pdf 492 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-androidmarcus_niemietz-slides.pdf 7 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-androidmarcus_niemietz-WP.pdf 667 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-art-of-cyberwar-geers-book.pdf 2.3 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-art-of-cyberwar-geers-slides.pdf 4.2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-art-of-cyberwar-geers-WP.pdf 229 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Cash-is-king-Eston-Slides.pdf 1.4 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Cash-is-king-Eston-WP.pdf 1.3 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-cybercrime-kill-chain-artes-slides.pdf 17.8 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-cybercrime-kill-chain-artes-wp.pdf 1.2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-droid-exploitation-saga-gupta-slides.pdf 8.9 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-droid-exploitation-saga-gupta-WP.pdf 1.1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Exploiting-Logical-Flaws-Siddharth-Slides.pdf 1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Exploiting-Logical-Flaws-Siddharth-WP.pdf 147 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-for-cheapskates-o'flynn-slides.pdf 3.4 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-for-cheapskates-o'flynn-WP.pdf 1.9 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-FX-Huawei-slides.pdf 2.9 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-HTML5_Top_10_Shah_Slides.pdf 3.2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-HTML5_Top_10_Shah_WP.pdf 1.4 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-inspection-of-windows-evdokimov-slides.pdf 1.2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-inspection-of-windows-evdokimov-WP.pdf 249 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-legal_aspects_of_cyverspace_clark_Slides.pdf 1.2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-lessons-from-history-healey-slides.pdf 3.8 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-lessons-from-history-healey-WP.pdf 262 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-malicious URI-Hamon-Slides.pdf 3.7 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-malicious URI-Hamon-WP.pdf 833 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-over-the-air-dmitrienko-slides.pdf 1.4 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-over-the-air-dmitrienko-WP.pdf 647 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Oyedata-Kalra-guide.pdf 547 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Oyedata-Kalra-slides.pdf 1.8 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Oyedata-Kalra-WP.pdf 1.2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-pokingserverswithFacebook-Walikar-slides.pdf 7.9 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-pokingserverswithFacebook-Walikar-WP.pdf 2 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-quanitfying-royal-slide.pdf 1.6 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-quanitfying-royal-WP.pdf 91 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-remediating-Aldridge-Slides.pdf 833 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-remediating-Aldridge-WP.pdf 686 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-reverse-and-simulate-guihery-slides.pdf 4 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-reverse-and-simulate-guihery-wp.pdf 1.1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-Searle-breaking-grid.pdf 4.1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-security-impacts-atlasis-slides.pdf 1.7 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-security-impacts-atlasis-wp.pdf 1.1 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-smartphone-penetration-Weidman-Slides.pdf 399 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-smartphone-penetration-Weidman-WP.pdf 280 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-social-engineering-threats-MacDougall-Slides.pdf 2.8 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-social-engineering-threats-MacDougall-WP.pdf 96 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-stealing-from-thieves-Saher-slides.pdf 239 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-the-endless-game-yang-slides.pdf 7.9 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/bh-ad-12-the-endless-game-yang-WP.pdf 133 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/Guihery-netzob-0.4-git.tar.gz 1001 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/port_scan_via_xspa.zip 2 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/source.zip 517 KB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/SPF-Weidman.zip 3.3 MB
Black Hat/Black Hat Abu Dhabi/Black Hat Abu Dhabi 2012/Tangerine.zip 1.1 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/Black Hat Japan 2004 speakers.txt 22 KB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Caezar-Scoring-CTF-Games-English.opus 13.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Charl-van-der-Walt-When-the-Tables-Turn-English.opus 14.1 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Charl-When-the-table-turn-Japanese.opus 14.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Chris-Eagle-IdaPro-English.opus 14.3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-David Litchfield-English.opus 8.5 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Gerhard-Escelbeck-Laws-of-vulnerbilities-English.opus 13 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Hisamichi-Okamura-Cybercrime-Treaty-Japanese.opus 7.5 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Jeff-Moss-Closing-Japanese-Translated.opus 1022 KB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Jeff-Moss-Thank-You-English.opus 935 KB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Joe-Grand-Hardware-Vulns-English.opus 14.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Joe-Grand-Hardware-Vulns-Japanese.opus 13.8 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Johnny-Long-Google-Hacking-Japanese-Translated.opus 14.5 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Johnny-Long-Google-Hacks-English.opus 12.6 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-keynote-Raisuke-Miyawaki-English-Translation.opus 7.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Panel-English.opus 10.3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Partial-Chris-Eagle-Japanese-Translated.opus 5.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Russ-Rogers-Covert-Channels-English done.opus 22.1 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Security-Friday-Japanese.opus 8.7 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Security-Friday-Partial-Japanese.opus 8.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Shunichi-Arai-Winny-English-Translated.opus 8.5 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Shunichi-Arai-Winny-Japanese.opus 8 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Unknown-English to Japanese.opus 11.6 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Yuji-Ukai-eeye-Japanese.opus 6.4 MB
Black Hat/Black Hat Asia/Black Hat Japan 2004/audio/BH-Tokyo-04-Yuji-Ukai-Japanese-with-english-questions.opus 7.1 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/Black Hat Japan 2005 speakers.txt 30 KB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Chris-Hurley-Identifying-and-Responding-to-Wireless-Attacks-English.opus 14 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Dan-Kaminsky-Black-Ops-tcp-ip-English.opus 14.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-David-Maynor-Architecture-Flaws-in-Common-Security-Tools-English.opus 13.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Dominique-Brezinsski-A-Paranoid-Perspective-of-an-Interpreted-Language-English.opus 13.4 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Ejovi-Nuwere-The-Art-of-SIP-Fuzzing-and-Vulnerabilities-Found-in-VoIP-English.opus 9.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Hideaki-Ihara-Forensics-in-Japan-Japanese.opus 14.3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Jamie-Butler-Sherri-Sparks-Rootkit-Detection-English.opus 11.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Jeff-Moss-Closing-English.opus 1.5 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Jeremiah-Grossman-Phishing-With-Super-Bait-English.opus 12.5 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Kenneth-Geers-Hacking-in-a-Foreign-Language-A-Network-Security-Guide-to-Russia-and-Beyond-English.opus 16.7 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Keynote-The-Day-After-Katsuya-Uchida-Japanese.opus 13.3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Michael-Sutton-Adam-Green-The-Art-of-File-Format-Fuzzing-English.opus 11.1 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Satoru-Koyama-Our-Security-Depends-on-Your-Security-Japanese.opus 16.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2005/audio/bh-05-asia-Saumil-Shah-David-Cole-Adware-Spyware-English.opus 16.3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/Black Hat Japan 2006 speakers.txt 28 KB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Bilby-Defeating_Win_Forensic-Japanese.opus 8.8 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Bohm-Taming_Bugs-English.opus 11.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Geers-Eisen-IPv6-Update-Japanese.opus 13.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Grossman-Hacking_Intranet-English.opus 13.6 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Holz-Catching_Malware-Japanese.opus 14.4 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Hoshizawa-online_Swindler-English.opus 13.3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Jeff_Moss-Welcome-English.opus 1.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Jeff_Moss-Welcome-Japanese.opus 1020 KB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Kortti-Input_Attack_Trees-Japanese.opus 13.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Moniz-XSSploitation-Japanese.opus 8.3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Okatani-Keynote-Japanese.opus 10.4 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Rutkowska-Subverting_Vista-English.opus 13.6 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Stamos-Breaking_AJAX-English.opus 14.6 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Stender-Attack_Internatl_SW-English.opus 15 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/audio/2006_BlackHat_Japan-Sugiura-Winny_Poo-Japanese.opus 16.4 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Bilby.pdf 218 KB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Boehm.pdf 377 KB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Geers-Eisen.pdf 3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Grossman.pdf 5.4 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Hoshizawa.pdf 4.3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Kortti.pdf 232 KB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Moniz.pdf 228 KB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/bh-jp-06-Okatani.pdf 2.8 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Rutkowska.pdf 519 KB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Stamos-Lackey.pdf 3.4 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Stender.pdf 239 KB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Sugiura.pdf 1.7 MB
Black Hat/Black Hat Asia/Black Hat Japan 2006/presentations/BH-JP-06-Wicherski-Holz.pdf 1.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2007/Black Hat Japan 2007 NHK coverage.VOB 483.4 MB
Black Hat/Black Hat Asia/Black Hat Japan 2007/Black Hat Japan 2007 NHK news coverage.mp4 14.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-amini-portnoy.pdf 4.3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-baker-WP.pdf 39 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-flake.pdf 374 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-geers.pdf 1.7 MB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-geers-WP.pdf 363 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-hoffman.pdf 438 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-kanatoko_en.pdf 590 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-kanatoko_jp.pdf 802 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-kolbitsch-keil.pdf 713 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-kolbitsch-keil-WP.pdf 179 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-laporte-kollmann.pdf 629 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-mcfeters-rios-carter.pdf 1.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-mcfeters-rios-carter-WP.pdf 1.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-quynh.pdf 1 MB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-quynh-WP.pdf 350 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-west.pdf 1.4 MB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-west-WP.pdf 520 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-ziegler.pdf 569 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-07-ziegler-WP.pdf 738 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-jp-baker.pdf 337 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/bh-references.pdf 115 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/Kanatoko.rar 12 KB
Black Hat/Black Hat Asia/Black Hat Japan 2007/presentations/Kolbitsch and Keil.rar 4.5 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Aiko-Reverse-Eng-with-API-and-Sysenter-en.opus 11.1 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Aiko-Reverse-Eng-with-API-and-Sysenter-jp.opus 11.1 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Dang-Understanding-Targeted-Attacks-with-Office-Docs-en.opus 8.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Dang-Understanding-Targeted-Attacks-with-Office-Docs-jp.opus 8.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Evans-Get-Rich-Money-BlackHat-way-en.opus 14.5 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Evans-Get-Rich-Money-BlackHat-way-jp.opus 14.4 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Geers-Cyberspace-Warfare-en.opus 14 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Geers-Cyberspace-Warfare-jp.opus 14.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Hasegawa-Attacking-with-Character-Encoding-en.opus 11.1 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Hasegawa-Attacking-with-Character-Encoding-jp.opus 11.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Ishiyama-FFR-EXCALOC-en.opus 22.8 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Ishiyama-FFR-EXCALOC-jp.opus 12.7 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Kawaguchi-Threats-to-Japanese-Landscape-en.opus 15 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Kawaguchi-Threats-to-Japanese-Landscape-jp.opus 15.1 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-KeyNote-Dan-Kaminsky-End-of-Cache-en.opus 10.7 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-KeyNote-Dan-Kaminsky-End-of-Cache-jp.opus 10.8 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-McFeters-Extreme-Client-side-Exploitation-en.opus 13.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-McFeters-Extreme-Client-side-Exploitation-jp.opus 13.3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Miller-Hacking-Mac-OSX-en.opus 12.1 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Miller-Hacking-Mac-OSX-jp.opus 12.2 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Moyer-Hamiel-Satan-is-on-MyFriends-en.opus 14.5 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Moyer-Hamiel-Satan-is-on-MyFriends-jp.opus 13.6 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Mulliner-Exploiting-SymbianOS-en.opus 13.3 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Mulliner-Exploiting-SymbianOS-jp.opus 6.7 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Murakami-Hypervisor-IPS-jp.opus 13.7 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Nohl-Secret-Algorithms-from-Hardware-en.opus 11 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-Nohl-Secret-Algorithms-from-Hardware-jp.opus 10.9 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-van-Beek-ePassports-Reloaded-en.opus 13.4 MB
Black Hat/Black Hat Asia/Black Hat Japan 2008/Audio/BlackHat-Japan-08-van-Beek-ePassports-Reloaded-jp.opus 13.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Black Hat Singapore 2000 speakers.txt 14 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-batz-audio.rm 63.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-caezar-audio.rm 70.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-greg-hoglund-audio.rm 61 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-jd-glaser-audio.rm 74.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-jennifer-granick-audio.rm 64.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-jeremy-rauch-audio.rm 79.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-joey-audio.rm 69.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-martin-khoo-audio.rm 72.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-mjr-audio.rm 59.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-panel-audio.rm 90.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-pierre-audio.rm 55.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Audio/bh-00-asia-wilfred-audio.rm 66 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-batz-video.rm 391.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-caezar-video.rm 434.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-greg-hoglund-video.rm 368.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-jd-glaser-video.rm 462.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-jennifer-granick-video.rm 401 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-jeremy-rauch-video.rm 493.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-joey-video.rm 430.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-martin-khoo-video.rm 448.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-mjr-video.rm 366.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-panel-video.rm 532.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-pierre-video.rm 341.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2000/Video/bh-00-asia-wilfred-video.rm 408.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/bh-archives-2003.html 219 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/0312190-surestream-16-28-56.rm 38.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/03121900-surestream-16-28-56.rm 17.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/03121901-surestream-16-28-56.rm 37.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/03121902-surestream-16-28-56.rm 25.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/03121903-surestream-16-28-56.rm 28.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-1/03121903-surestream-16-28-56_arch001.rm 28.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-1-16-28-56.rm 62 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-1-16-28-56_arch001.rm 702 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-2-16-28-56.rm 24.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-3-16-28-56.rm 36.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-4-16-28-56.rm 24.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-5-16-28-56.rm 21.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-1-day-2/bh-asia-03-day1-t2-6-16-28-56.rm 28.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-1/bh-asia-03-day2-t1-1-16-28-56.rm 24.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-1/bh-asia-03-day2-t1-2-16-28-56.rm 21.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-1/bh-asia-03-day2-t1-3-16-28-56.rm 28.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-1/bh-asia-03-day2-t1-4-16-28-56.rm 31.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-1/bh-asia-03-day2-t1-5-16-28-56.rm 19.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-2/bh-asia-03-day2-t2-1-16-28-56.rm 26.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-2/bh-asia-03-day2-t2-2-16-28-56.rm 32.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-2/bh-asia-03-day2-t2-4-16-28-56.rm 17.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-2/bh-asia-03-day2-t2-5-16-28-56.rm 42.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Audio/Track-2-day-2/Untitled 1.rpjf 9 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-aitel.pdf 388 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-chong.pdf 552 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-clowes.pdf 1.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-granick.pdf 47 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-grugq.pdf 325 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-grugq.rar 129 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-halvar.pdf 406 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-mullen.pdf 85 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-oudot.rar 1.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-paper-sensepost.pdf 336 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-rauch.pdf 2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-rogers.pdf 562 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-sensepost.pdf 3.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/bh-asia-03-shah.pdf 532 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2003/Presentations/shah-httprint_paper.pdf 407 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani.mp4 60.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani.srt 62 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Advanced JPEG Steganography and Detection by John Ortiz.mp4 26.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Advanced JPEG Steganography and Detection by John Ortiz.srt 86 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/AIS Exposed. Understanding Vulnerabilities and Attacks 2.0 by Marco Balduzzi.mp4 91.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/AIS Exposed. Understanding Vulnerabilities and Attacks 2.0 by Marco Balduzzi.srt 78 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Beyond Check The Box - Powering Intrusion Investigations by Jim Aldridge.mp4 94.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Beyond Check The Box - Powering Intrusion Investigations by Jim Aldridge.srt 100 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Black Hat Asia 2014 - Keynote by Dr. Steve Crocker.srt 72 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Building Trojan Hardware at Home by JP Dunning.mp4 91.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Building Trojan Hardware at Home by JP Dunning.srt 97 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Comprehensive Virtual Appliance Detection by Kang Li.mp4 81.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Comprehensive Virtual Appliance Detection by Kang Li.srt 74 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Disasters in the Making - How I Torture Open Government Data Systems for Fun, Profit, and Time Travel.mp4 75.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Disasters in the Making - How I Torture Open Government Data Systems for Fun, Profit, and Time Travel.srt 77 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Discovering Debug Interfaces with the JTAGulator Part 1 by Joe Grand.mp4 64.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Discovering Debug Interfaces with the JTAGulator Part 1 by Joe Grand.srt 72 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Discovering Debug Interfaces with the JTAGulator Part 2 by Joe Grand.mp4 66.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Discovering Debug Interfaces with the JTAGulator Part 2 by Joe Grand.srt 64 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Diving Into IE 10's Enhanced Protected Mode Sandbox by Mark Vincent Yason.mp4 69.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Dude, WTF in My CAN by Alberto Garcia Illera & Javier Vazquez Vidal.mp4 88.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Dude, WTF in My CAN by Alberto Garcia Illera & Javier Vazquez Vidal.srt 74 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/I Know You Want Me - Unplugging PlugX by Takahiro Haruyama & Hiroshi Suzuki.mp4 84.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/JS Suicide - Using JavaScript Security Features to Kill JS Security by Ahamed Nafeez.mp4 66 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/JS Suicide - Using JavaScript Security Features to Kill JS Security by Ahamed Nafeez.srt 65 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Keynote by Dr. Steve Crocker.mp4 36.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/OFFENSIVE - Exploiting DNS Servers Changes by Leonardo Nve.mp4 91.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/OFFENSIVE - Exploiting DNS Servers Changes by Leonardo Nve.srt 61 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Owning a Building - Exploiting Access Control and Facility Management Systems by Billy Rios.mp4 48.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Owning a Building - Exploiting Access Control and Facility Management Systems by Billy Rios.srt 112 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 1 by Jose Miguel Esparza.mp4 82.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 2 by Jose Miguel Esparza.mp4 98.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Persist It - Using and Abusing Microsoft's Fix It Patches by Jon Erickson.mp4 62.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Persist It - Using and Abusing Microsoft's Fix It Patches by Jon Erickson.srt 61 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Privacy-by-Design for the Security Practitioner by Richard Chow.mp4 66 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Privacy-by-Design for the Security Practitioner by Richard Chow.srt 67 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal.mp4 62.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Say It Ain't So - An Implementation of Deniable Encryption by Ari Trachtenberg.mp4 26.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Say It Ain't So - An Implementation of Deniable Encryption by Ari Trachtenberg.srt 28 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Scan All the Things - Project Sonar by Mark Schloesser.mp4 95.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Scan All the Things - Project Sonar by Mark Schloesser.srt 110 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Solutum Cumulus Mediocris by Eldar Marcussen.mp4 76.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Solutum Cumulus Mediocris by Eldar Marcussen.srt 65 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling.mp4 90.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/The Machines That Betrayed Their Masters by Glenn Wilkinson.mp4 89.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/The Machines That Betrayed Their Masters by Glenn Wilkinson.srt 84 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Tomorrow's News is Today's Intel - Journalists as Targets and Compromise Vectors by Shane Huntley.mp4 80.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Tomorrow's News is Today's Intel - Journalists as Targets and Compromise Vectors by Shane Huntley.srt 90 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/UI Redressing Attacks on Android Devices Revisited by Marcus Niemietz.mp4 55.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/UI Redressing Attacks on Android Devices Revisited by Marcus Niemietz.srt 45 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Ultimate Dom Based XSS Detection Scanner on Cloud by Nera W. C. Liu & Albert Yu.mp4 41.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Ultimate Dom Based XSS Detection Scanner on Cloud by Nera W. C. Liu & Albert Yu.srt 39 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/USB Attacks Need Physical Access Right Not Any More… by Andy Davis.mp4 67.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/USB Attacks Need Physical Access Right Not Any More… by Andy Davis.srt 53 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/You Can't See Me - A Mac OS X Rootkit Uses the Tricks You Haven't Known Yet.mp4 2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/You Can't See Me - A Mac OS X Rootkit Uses the Tricks You Haven't Known Yet.srt 49 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Z - Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang.mp4 60 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2014/Z - Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang.srt 42 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/(In)Security of Mobile Banking.mp4 61.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/API Deobfuscator - Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis.mp4 27 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Bar-Mitzva Attack - Breaking SSL with 13-Year Old RC4 Weakness.mp4 49.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Browsers Gone Wild.mp4 58.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Bypassing Malware Detection Mechanisms in Online Banking.mp4 46.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Client-Side Protection Against DOM-Based XSS Done Right (tm).mp4 53.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/DABiD - The Powerful Interactive Android Debugger for Android Malware Analysis.mp4 32 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Decentralized Malware on The Blockchain.mp4 48.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Exploiting Social Navigation.mp4 28.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Forging the USB Armory.mp4 49 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/From Zero to Secure in One Minute.mp4 51.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Hacking the Wireless World with Software Defined Radio - 2.0.mp4 66.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Hiding Behind Android Runtime (ART).mp4 39.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Hopping on the CAN Bus.mp4 31 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/I Know Where You've Been - Geo-Inference Attacks Via The Browser Cache.mp4 48.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Keynote - Information Technology Systems in a Post-Silcon World.mp4 61.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Locknote - Conclusions and Key Takeaways from Black Hat 2015.mp4 86.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Manna from Heaven - Improving the State of Wireless Rogue AP Attacks.mp4 43 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/MLD Considered Harmful - Breaking Another IPv6 Subprotocol.mp4 70.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Next Level Cheating and Leveling Up Mitigations.mp4 43.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Relaying EMV Contactless Transactions Using Off-The-Self Android Devices.mp4 49.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Resurrecting The Read Logs Permission on Samsung Devices.mp4 28.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring....mp4 29.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Slime - Automated Anti-Sandboxing Disarmament System.mp4 52 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/The Nightmare Behind The Cross Platform Mobile Apps Dream.mp4 52 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/The Underground Ecosystem of Credit Card Frauds.mp4 40.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Understanding SCADA's Modbus Protocol.mp4 117.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/We Can Still Crack You General Unpacking Method For Android Packer (no Root).mp4 28.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2015/Welcome and Introduction to Black Hat Asia 2015.mp4 5.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/A New CVE 2015 0057 Exploit Technology.mp4 68.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Android Commercial Spyware Disease and Medication.mp4 41.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Automated Detection of Firefox Extension Reuse Vulnerabilities.mp4 79.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Automated Dynamic Fireware Analysis At Scale - A Case Study on Embedded Web Interfaces.mp4 96.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Break Out of The Truman Show - Active Detection and Escape of Dynamic Binary Instrumentation.mp4 68.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Bypassing Browser Security Policies for Fun and Profit.mp4 39.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Cantact - An Open Tool for Automative Exploitation.mp4 70.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/DSCOMPROMISED - A Windows DSC Attack Framework.mp4 90.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Enterprise Apps - Bypassing the IOS Gatekeeper.mp4 56.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Exploiting Linux and Pax ASLR's Weaknesses on 32 Bit and 64 Bit Systems.mp4 90 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Hacking a Professional Drone.mp4 39.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Hey, Your Parcel Looks Bad - Fuzzing and Exploiting Parcel - Ization Vulnerabilties in Android.mp4 47.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/I'm Not a Human - Breaking the Google Recaptcha.mp4 40.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Incident Response @ Scale Building a Next Generation SOC.mp4 25.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Keynote - Devaluing Attack - Disincentivizing Threats Against The Next Billion Devices.mp4 93.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Let's See What's Out There - Mapping the Wireless IOT.mp4 75.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Locknote - Conclusions and Key Takeaways from Black Hat Asia 2016.mp4 80.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Multivariate Solutions To Emerging Passive DNS Challenges.mp4 74.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Never Trust Your Inputs - Causing 'Catastrophic Physical Consequences' From The Sensor....mp4 82.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Numchecker - A System Approach for Kernel Rootkit Detection.mp4 69.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/PLC Blaster - A worm Living Solely In The PLC.mp4 83.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Practical New Developments in The Breach Attack.mp4 82.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Rapid Radio Reversing.mp4 92.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/Su A Cyder - Homebrewing Malware for IOS Like a BO$$.mp4 244.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/The Kitchen's Finally Burned Down - DLP Security Bakeoff.mp4 83.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/The Perl Jam 2 - The Camel Strikes Back.mp4 35.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/The Security Wolf of Wall Street - Fighting Crime With High Frequency Classification and....mp4 81.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2016/The Tactical Application Security Program - Getting Stuff Done.mp4 87.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/3G 4G Intranet Scanning and its Application on the WormHole Vulnerability.mp4 33.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/24 Techniques to Gather Threat Intel and Track Actors.mp4 50.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/All Your Emails Belong to Us Exploiting Vulnerable Email Clients via Domain Name Collision.mp4 26.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Anti-Plugin Don't Let Your App Play as an Android Plugin.mp4 40.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Betting Against the House Security and Stability When the Odds are Against You.mp4 30.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Beyond the Blacklists Detecting Malicious URL Through Machine Learning.mp4 48.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging.mp4 18.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Cache Side Channel Attack Exploitability and Countermeasures.mp4 53.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge.mp4 33.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Daily-Life Peeper Bug Hunting and Exploit Techniques in IoT.mp4 38.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Delegate to the Top Abusing Kerberos for Arbitrary Impersonations and RCE.mp4 40.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Dig Into the Attack Surface of PDF and Gain 100+ CVEs in 1 Year.mp4 18.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Domo Arigato, Mr. Roboto Security Robots a la Unit-Testing.mp4 64 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Drop the ROP Fine-Grained Control-Flow Integrity for the Linux Kernel.mp4 39.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Exploiting USB IP in Linux.mp4 38.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Fried Apples Jailbreak DIY.mp4 40.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Go Get My Vulnerabilities.mp4 48.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Hack Microsoft Using Microsoft Signed Binaries.mp4 49.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Hacking HTTP 2 - New Attacks on the Internet's Next Generation Foundation.mp4 16 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Hello From the Other Side SSH Over Robust Cache Covert Channels in the Cloud.mp4 54.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Keynote The Seven Axioms of Security.mp4 43.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Keynote Why We are Not Building a Defendable Internet.mp4 30.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Locknote Conclusions & Key Takeaways from Black Hat Asia 2017.mp4 56.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Man-in-the-SCADA Anatomy of Data Integrity Attacks in Industrial Control Systems.mp4 43.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/MASHaBLE Mobile Applications of Secret Handshakes Over Bluetooth LE.mp4 36 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Mobile-Telephony Threats in Asia.mp4 49.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Myth and Truth About Hypervisor-Based Kernel Protector The Reason Why You Need Shadow-Box.mp4 31.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Never Let Your Guard Down Finding Unguarded Gates to Bypass Control Flow Guard with Big Data.mp4 32.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Open Sourcing Automotive Diagnostics.mp4 57 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Phishing for Funds Understanding Business Email Compromise.mp4 58.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox.mp4 28 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents.mp4 46.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/The Power of Data-Oriented Attacks.mp4 60.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/The UEFI Firmware Rootkits Myths and Reality.mp4 51.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/Welcome & Introduction to Black Hat Asia 2017.mp4 22.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2017/What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection.mp4 56.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/A Deal with the Devil - Breaking Smart Contracts.eng.srt 147 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/A Deal with the Devil Breaking Smart Contracts.mp4 25.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.srt 76 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4 23.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/All Your Payment Tokens Are Mine - Vulnerabilities of Mobile Payment Systems.eng.srt 45 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/All Your Payment Tokens Are Mine - Vulnerabilities of Mobile Payment Systems.mp4 11.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems.eng.srt 150 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems.mp4 32.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Breach Detection At Scale With AWS Honey Tokens.eng.srt 63 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Breach Detection At Scale With AWS Honey Tokens.mp4 14.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment.eng.srt 77 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment.mp4 16.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Counter Infiltration - Future Proof Counter Attacks Against Exploit Kit Infrastructure.eng.srt 102 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Counter Infiltration - Future Proof Counter Attacks Against Exploit Kit Infrastructure.mp4 35.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Day 1 Keynote - National Cyber Aggression and Private Sector Internet Infrastructure.eng.srt 101 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Day 1 Keynote - National Cyber Aggression and Private Sector Internet Infrastructure.mp4 53.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Day 2 Keynote - A Short Course in Cyber Warfare.eng.srt 129 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Day 2 Keynote - A Short Course in Cyber Warfare.mp4 27.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Death Profile - Now iOS Has Been Compromised to Suspected Ransomware.eng.srt 49 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Death Profile - Now iOS Has Been Compromised to Suspected Ransomware.mp4 21.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Detecting Security Hazards in SEAndroid Vendor Customizations via Large Scale Supervised ML.eng.srt 90 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Detecting Security Hazards in SEAndroid Vendor Customizations via Large Scale Supervised ML.mp4 27 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Hourglass Model 2.0 - Case Study of Southeast Asia Underground Services Abusing Global 2FA.mp4 26.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/International Problems - Serialized Fuzzing for ICU Vulnerabilities.eng.srt 58 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/International Problems - Serialized Fuzzing for ICU Vulnerabilities.mp4 21 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/KSMA - Breaking Android Kernel Isolation and Rooting with ARM MMU Features.eng.srt 74 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/KSMA - Breaking Android Kernel Isolation and Rooting with ARM MMU Features.mp4 22.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Mac A Mal - An Automated Platform for Mac Malware Hunting.eng.srt 39 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Mac A Mal - An Automated Platform for Mac Malware Hunting.mp4 11.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Nation State Moneymule's Hunting Season - APT Attacks Targeting Financial Institutions.eng.srt 114 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Nation State Moneymule's Hunting Season - APT Attacks Targeting Financial Institutions.mp4 36.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/New Compat Vulnerabilities in Linux Device Drivers.eng.srt 40 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/New Compat Vulnerabilities in Linux Device Drivers.mp4 15.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/return to csu - A New Method to Bypass 64 bit Linux ASLR.eng.srt 139 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/return to csu - A New Method to Bypass 64 bit Linux ASLR.mp4 38 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Securing Your In Ear Fitness Coach - Challenges in Hardening Next Generation Wearables.eng.srt 143 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Securing Your In Ear Fitness Coach - Challenges in Hardening Next Generation Wearables.mp4 44.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Server Tailgating - A Chosen PlainText Attack on RDP.mp4 24.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Tales from the NOC - Going Public in Asia.eng.srt 129 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/Tales from the NOC - Going Public in Asia.mp4 30.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins.eng.srt 138 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins.mp4 26.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/XOM switch - Hiding Your Code from Advanced Code Reuse Attacks In One Shot.eng.srt 124 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2018/XOM switch - Hiding Your Code from Advanced Code Reuse Attacks In One Shot.mp4 37.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Black Hat Asia 2019 Keynote The Next Arms Race.en.transcribed.srt 89 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Black Hat Asia 2019 Keynote The Next Arms Race.mp4 148.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/CQTools The New Ultimate Hacking Toolkit.en.transcribed.srt 111 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/CQTools The New Ultimate Hacking Toolkit.mp4 94.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/DevSecOps What, Why and How.mp4 56 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/How to Survive the Hardware Assisted Control-Flow Integrity Enforcement.en.transcribed.srt 79 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/How to Survive the Hardware Assisted Control-Flow Integrity Enforcement.mp4 57.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Intel VISA Through the Rabbit Hole.mp4 59.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Investigating Malware Using Memory Forensics - A Practical Approach.mp4 137.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/iOS Dual Booting Demystified.en.transcribed.srt 72 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/iOS Dual Booting Demystified.mp4 49.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Keep Everyone In Sync Effective Approaches Borrowed from Open Source Communities.en.transcribed.srt 60 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Keep Everyone In Sync Effective Approaches Borrowed from Open Source Communities.mp4 50.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Office in Wonderland.en.transcribed.srt 80 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Office in Wonderland.mp4 48 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/PASTA Portable Automotive Security Testbed with Adaptability.en.transcribed.srt 34 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/PASTA Portable Automotive Security Testbed with Adaptability.mp4 50.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Preloading Insecurity In Your Electron.en.transcribed.srt 71 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Preloading Insecurity In Your Electron.mp4 44.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Return of the Insecure Brazilian Voting Machines.en.transcribed.srt 156 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Return of the Insecure Brazilian Voting Machines.mp4 31.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/See Like a Bat Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs.en.transcribed.srt 40 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/See Like a Bat Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs.mp4 23.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Winter is Coming Back.en.transcribed.srt 58 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Winter is Coming Back.mp4 33.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Zombie POODLE, GOLDENDOODLE, and How TLSv1.3 Can Save Us All.en.transcribed.srt 110 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2019/Zombie POODLE, GOLDENDOODLE, and How TLSv1.3 Can Save Us All.mp4 40.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/3d Red Pill - A Guest-to-Host Escape on QEMU KVM Virtio Device.eng.srt 47 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/3d Red Pill - A Guest-to-Host Escape on QEMU KVM Virtio Device.mp4 43.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Adversary Detection Pipelines Finally Making Your Threat Intel Useful.eng.srt 65 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Adversary Detection Pipelines Finally Making Your Threat Intel Useful.mp4 84.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Attacking and Defending Machine Learning Applications of Public Cloud.eng.srt 35 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Attacking and Defending Machine Learning Applications of Public Cloud.mp4 30.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Back to the Future. Cross-Protocol Attacks in the Era of 5G.eng.srt 47 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Back to the Future. Cross-Protocol Attacks in the Era of 5G.mp4 57.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Biometrics & Privacy Time to Faceoff or is that FaceApp.eng.srt 78 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Biometrics & Privacy Time to Faceoff or is that FaceApp.mp4 72.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/BitLeaker Subverting BitLocker with One Vulnerability.eng.srt 54 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/BitLeaker Subverting BitLocker with One Vulnerability.mp4 57 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/CDPwn Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days.eng.srt 72 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/CDPwn Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days.mp4 60.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Complexity Killed Security.eng.srt 50 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Complexity Killed Security.mp4 53.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier.eng.srt 36 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier.mp4 36.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation.eng.srt 66 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation.mp4 49 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Engineering Cybersecurity for a Nation What Singapore is Learning from Cars and Sanitation.eng.srt 78 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Engineering Cybersecurity for a Nation What Singapore is Learning from Cars and Sanitation.mp4 130 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Escaping Virtualized Containers.eng.srt 88 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Escaping Virtualized Containers.mp4 49.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Faking a Factory Creating and Operating a Realistic Honeypot.eng.srt 51 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Faking a Factory Creating and Operating a Realistic Honeypot.mp4 45.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/First Contact - Vulnerabilities in Contactless Payments.eng.srt 64 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/First Contact - Vulnerabilities in Contactless Payments.mp4 59 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/From an URGENT 11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet.eng.srt 56 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/From an URGENT 11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet.mp4 49.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Hey Google, Activate Spyware - When Google Assistant Uses a Vulnerability as a Feature.mp4 54.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale.eng.srt 61 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale.mp4 48 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Kr00k How KRACKing Amazon Echo Exposed a Billion Vulnerable Wi-Fi Devices.eng.srt 60 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Kr00k How KRACKing Amazon Echo Exposed a Billion Vulnerable Wi-Fi Devices.mp4 51 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Locknote Conclusions and Key Takeaways from Day 1.eng.srt 78 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Locknote Conclusions and Key Takeaways from Day 1.mp4 88.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Locknote Conclusions and Key Takeaways from Day 2.eng.srt 69 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Locknote Conclusions and Key Takeaways from Day 2.mp4 107.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.mp4 60.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/May the Trust be with You Empowering TrustZone-M with Multiple Trusted Environments.eng.srt 52 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/May the Trust be with You Empowering TrustZone-M with Multiple Trusted Environments.mp4 39.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Misuse of DNS, the Second Most Used Protocol.eng.srt 47 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Misuse of DNS, the Second Most Used Protocol.mp4 44.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Page Cache Attacks Microarchitectural Attacks on Flawless Hardware.eng.srt 64 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Page Cache Attacks Microarchitectural Attacks on Flawless Hardware.mp4 62.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Patching Loopholes Finding Backdoors in Applications.eng.srt 34 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Patching Loopholes Finding Backdoors in Applications.mp4 31 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Raiden Glitching Framework.eng.srt 57 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Raiden Glitching Framework.mp4 56 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Redback Advanced Static Binary Injection.eng.srt 48 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Redback Advanced Static Binary Injection.mp4 57 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Securing the Next Version of HTTP How QUIC and HTTP 3 Compare to HTTP 2.eng.srt 62 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Securing the Next Version of HTTP How QUIC and HTTP 3 Compare to HTTP 2.mp4 40.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Store-to-Leak Forwarding There and Back Again.eng.srt 69 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Store-to-Leak Forwarding There and Back Again.mp4 59 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/The Black Hat NOC Greatest Hits and Holy...Cows.eng.srt 99 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/The Black Hat NOC Greatest Hits and Holy...Cows.mp4 69.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/The Evil Alt-Ego (ab)using HTTP Alternative Services.eng.srt 58 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/The Evil Alt-Ego (ab)using HTTP Alternative Services.mp4 67 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/The Evil of Spy Camera.eng.srt 41 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/The Evil of Spy Camera.mp4 53.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/The Inside Story There are Apps in Apps and Here is How to Break Them.eng.srt 37 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/The Inside Story There are Apps in Apps and Here is How to Break Them.mp4 31 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Tracking the Criminal of Fake News Based on a Unified Embedding.eng.srt 35 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Tracking the Criminal of Fake News Based on a Unified Embedding.mp4 32.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities.eng.srt 67 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities.mp4 52.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/What the Log So Many Events, so Little Time....eng.srt 55 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/What the Log So Many Events, so Little Time....mp4 90.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Wi-Fi Brokering.eng.srt 65 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Wi-Fi Brokering.mp4 53.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/WIFI-Important Remote Attack Surface Threat is Expanding.eng.srt 42 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/WIFI-Important Remote Attack Surface Threat is Expanding.mp4 33.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Win the 0-Day Racing Game Against Botnet in Public Cloud.eng.srt 31 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/Win the 0-Day Racing Game Against Botnet in Public Cloud.mp4 30.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2020/ZombieLoad Leaking Data on Intel CPUs.mp4 46.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/(Un)protected Broadcasts in Android 9 and 10.eng.srt 44 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/(Un)protected Broadcasts in Android 9 and 10.mp4 22.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/A General Approach to Bypassing Many Kernel Protections and its Mitigation.eng.srt 72 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/A General Approach to Bypassing Many Kernel Protections and its Mitigation.mp4 39.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/A Mirage of Safety Bug Finding & Exploit Techniques of Top Android Vendor's Privacy Protection Apps.eng.srt 26 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/A Mirage of Safety Bug Finding & Exploit Techniques of Top Android Vendor's Privacy Protection Apps.mp4 25.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/A New Era of One-Click Attacks How to Break Install-Less Apps.eng.srt 39 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/A New Era of One-Click Attacks How to Break Install-Less Apps.mp4 25.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices.eng.srt 45 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices.mp4 31 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet.eng.srt 61 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet.mp4 35.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Anti-Forensics Reverse Engineering a Leading Phone Forensic Tool.eng.srt 56 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Anti-Forensics Reverse Engineering a Leading Phone Forensic Tool.mp4 33.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Apple Neural Engine Internal From ML Algorithm to HW Registers.eng.srt 36 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Apple Neural Engine Internal From ML Algorithm to HW Registers.mp4 28.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Blackhat Asia 21Locknote Conclusions and Key Takeaways from Day 1 locknote.eng.srt 76 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Blackhat Asia 21Locknote Conclusions and Key Takeaways from Day 1 locknote.mp4 48.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Disappeared Coins Steal Hashrate in Stratum Secretly.eng.srt 33 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Disappeared Coins Steal Hashrate in Stratum Secretly.mp4 33.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Domain Borrowing Catch My C2 Traffic if You Can.eng.srt 45 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Domain Borrowing Catch My C2 Traffic if You Can.mp4 34.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Enter Sandbox.eng.srt 65 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Enter Sandbox.mp4 33.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Give Me a SQL Injection, I Shall PWN IIS and SQL Server.eng.srt 49 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Give Me a SQL Injection, I Shall PWN IIS and SQL Server.mp4 39.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Hey, You, Get off My Private Data Do Apps Respect Your Privacy as They Claim.eng.srt 51 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Hey, You, Get off My Private Data Do Apps Respect Your Privacy as They Claim.mp4 39.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Hiding Objects from Computer Vision by Exploiting Correlation Biases.eng.srt 47 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Hiding Objects from Computer Vision by Exploiting Correlation Biases.mp4 29.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover.eng.srt 42 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover.mp4 23.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/How I Can Unlock Your Smart Door Security Pitfalls in Cross-Vendor IoT Access Control.eng.srt 46 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/How I Can Unlock Your Smart Door Security Pitfalls in Cross-Vendor IoT Access Control.mp4 36.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Hunting Vulnerabilities of gRPC Protocol Armed Mobile IoT Applications.eng.srt 37 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Hunting Vulnerabilities of gRPC Protocol Armed Mobile IoT Applications.mp4 32.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor.mp4 31.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems.mp4 42.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Insights and Predictions What's Next in InfoSec.eng.srt 113 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Insights and Predictions What's Next in InfoSec.mp4 66.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Keynote Lessons From 11 Billion Breached Records.eng.srt 91 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Keynote Lessons From 11 Billion Breached Records.mp4 91 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Mem2Img Memory-Resident Malware Detection via Convolution Neural Network.eng.srt 41 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Mem2Img Memory-Resident Malware Detection via Convolution Neural Network.mp4 28 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Mining and Exploiting (Mobile) Payment Credential Leaks in the Wild.eng.srt 51 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Mining and Exploiting (Mobile) Payment Credential Leaks in the Wild.mp4 35.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/New Attack Surface in Safari Using Just One Web Audio Vulnerability to Rule Safari.eng.srt 38 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/New Attack Surface in Safari Using Just One Web Audio Vulnerability to Rule Safari.mp4 20.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Pre-built JOP Chains with the JOP ROCKET Bypassing DEP without ROP.eng.srt 67 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Pre-built JOP Chains with the JOP ROCKET Bypassing DEP without ROP.mp4 51.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Racing the Dark A New TOCTTOU Story From Apple's Core.eng.srt 51 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Racing the Dark A New TOCTTOU Story From Apple's Core.mp4 34.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Reverse Engineering Compliance.mp4 30.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Scavenger Misuse Error Handling Leading to Qemu KVM Escape.eng.srt 55 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Scavenger Misuse Error Handling Leading to Qemu KVM Escape.mp4 29.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The B-MAD Approach to Threat Modeling.eng.srt 42 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The B-MAD Approach to Threat Modeling.mp4 24.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The Cost of Complexity Different Vulnerabilities While Implementing the Same RFC.eng.srt 70 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The Cost of Complexity Different Vulnerabilities While Implementing the Same RFC.mp4 37.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The Motion Sensor Western The Good, the Bad, and the Ugly.eng.srt 54 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The Motion Sensor Western The Good, the Bad, and the Ugly.mp4 29.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The Price of Compatibility Defeating macOS Kernel Using Extended File Attributes.eng.srt 51 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The Price of Compatibility Defeating macOS Kernel Using Extended File Attributes.mp4 37.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The Rise of Potatoes Privilege Escalations in Windows Services.eng.srt 62 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The Rise of Potatoes Privilege Escalations in Windows Services.mp4 44.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The Tangled Webview - Javascriptinterface Once More.eng.srt 34 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/The Tangled Webview - Javascriptinterface Once More.mp4 19.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Threat Hunting in Active Directory Environment.eng.srt 68 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Threat Hunting in Active Directory Environment.mp4 34.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Vibe Check IDK About This. Why Students May Shy Away From Cyber in a Surveillance State.eng.srt 71 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Vibe Check IDK About This. Why Students May Shy Away From Cyber in a Surveillance State.mp4 40.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/We Are About to Land - How CloudDragon Turns a Nightmare Into Reality.eng.srt 50 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/We Are About to Land - How CloudDragon Turns a Nightmare Into Reality.mp4 30.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Wideshears Investigating and Breaking Widevine on QTEE.eng.srt 37 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/Wideshears Investigating and Breaking Widevine on QTEE.mp4 23.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/X-in-the-Middle Attacking Fast Charging Piles and Electric Vehicles.eng.srt 35 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2021/X-in-the-Middle Attacking Fast Charging Piles and Electric Vehicles.mp4 24.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/AMSI & Bypass Review of Known AMSI Bypass Techniques and Introducing a New One.mp4 40.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/AMSI & Bypass Review of Known AMSI Bypass Techniques and Introducing a New One.srt 66 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/AutoSpear Towards Automatically Bypassing and Inspecting Web Application Firewalls.mp4 38.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/AutoSpear Towards Automatically Bypassing and Inspecting Web Application Firewalls.srt 49 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Backdoor Investigation and Incident Response From Zero to Profit.mp4 47.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Backdoor Investigation and Incident Response From Zero to Profit.srt 70 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Backdooring of Real Time Automotive OS Devices.mp4 31.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Backdooring of Real Time Automotive OS Devices.srt 59 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Bypass CFG in Chrome.mp4 20.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Codema Attack Controlling Your Smart Home Through Dangling Management Channels.mp4 30.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Codema Attack Controlling Your Smart Home Through Dangling Management Channels.srt 39 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Cooper Knows the Shortest Stave Finding 134 Bugs in the Binding Code of Scripting Languages.mp4 26.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/DroidGuard A Deep Dive into SafetyNet.mp4 37.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/DroidGuard A Deep Dive into SafetyNet.srt 44 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Dynamic Process Isolation.mp4 27.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Dynamic Process Isolation.srt 50 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/ExplosION The Hidden Mines in the Android ION Driver.mp4 30.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/ExplosION The Hidden Mines in the Android ION Driver.srt 50 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Hunting and Exploiting Recursive MMIO Flaws in QEMU KVM.mp4 22.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Hunting and Exploiting Recursive MMIO Flaws in QEMU KVM.srt 34 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Keynote #HackingDemocracy Will Our Societies Hold.mp4 100.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Keynote #HackingDemocracy Will Our Societies Hold.srt 93 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Keynote Fireside Chat with U.S. National Cyber Director Chris Inglis.mp4 46.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Keynote Fireside Chat with U.S. National Cyber Director Chris Inglis.srt 89 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Keynote Measure Security Effectively.mp4 101.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Keynote Measure Security Effectively.srt 115 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Like Lightning From the Cloud Finding RCEs in an Embedded TLS Library.mp4 27.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Like Lightning From the Cloud Finding RCEs in an Embedded TLS Library.srt 50 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Locknote Conclusions and Key Takeaways from Black Hat Asia 2022.mp4 61.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Locknote Conclusions and Key Takeaways from Black Hat Asia 2022.srt 88 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/macOS Vulnerabilities Hiding in Plain Sight.mp4 48.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/macOS Vulnerabilities Hiding in Plain Sight.srt 59 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems.mp4 35 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems.srt 55 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Remote Memory-Deduplication Attacks.mp4 26.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Remote Memory-Deduplication Attacks.srt 56 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/SideWinder Uncoils to Strike.mp4 48.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/SideWinder Uncoils to Strike.srt 65 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets.mp4 48.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets.srt 58 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android.mp4 32.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android.srt 47 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Taking Kernel Hardening to the Next Level.mp4 43.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Taking Kernel Hardening to the Next Level.srt 57 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Firmware Supply-Chain Security Is Broken Can We Fix It.mp4 48.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Firmware Supply-Chain Security Is Broken Can We Fix It.srt 63 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Hidden RCE Surfaces That Control the Droids.mp4 41.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Hidden RCE Surfaces That Control the Droids.srt 65 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Little Seal Bug Optical Sound Recovery from Lightweight Reflective Objects.mp4 34.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Little Seal Bug Optical Sound Recovery from Lightweight Reflective Objects.srt 61 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Next Gen PlugX ShadowPad A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT.mp4 43.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Next Gen PlugX ShadowPad A Dive into the Emerging China-Nexus Modular Trojan, Pangolin8RAT.srt 66 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Next Generation of Windows Exploitation Attacking the Common Log File System.mp4 30.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Next Generation of Windows Exploitation Attacking the Common Log File System.srt 34 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Virtual Battlefield in 2022 Russia Ukraine War & Its Policy Implications.mp4 43.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/The Virtual Battlefield in 2022 Russia Ukraine War & Its Policy Implications.srt 66 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/To Loot or Not to Loot - That Is Not a Question When State Nexus APT Targets Online Entertainment.mp4 32.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/To Loot or Not to Loot - That Is Not a Question When State Nexus APT Targets Online Entertainment.srt 56 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Unix Domain Socket A Hidden Door Leading to Privilege Escalation in the Android Ecosystem.mp4 34.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Unix Domain Socket A Hidden Door Leading to Privilege Escalation in the Android Ecosystem.srt 58 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Using Zero to Attack Zero-Knowledge Proof (ZKP) PLONK.mp4 30.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/Using Zero to Attack Zero-Knowledge Proof (ZKP) PLONK.srt 62 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2022/USMA Share Kernel Code With Me.mp4 17.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/A New Attack Interface in Java Applications.eng.srt 43 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/A New Attack Interface in Java Applications.mp4 51.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/A Run a Day Won't Keep the Hacker Away Inference Attacks in Fitness Tracking Social Networks.eng.srt 71 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/A Run a Day Won't Keep the Hacker Away Inference Attacks in Fitness Tracking Social Networks.mp4 56.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Abusing Azure Active Directory From MFA Bypass to Listing Global Administrators.eng.srt 69 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Abusing Azure Active Directory From MFA Bypass to Listing Global Administrators.mp4 61.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Alice in Kernel Land Lessons Learned From the eBPF Rabbit Hole.eng.srt 69 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Alice in Kernel Land Lessons Learned From the eBPF Rabbit Hole.mp4 58.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Attacking the WebAssembly Compiler of WebKit.eng.srt 40 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Attacking the WebAssembly Compiler of WebKit.mp4 35.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Behind the Scenes How Criminal Enterprises Pre-infect Millions of Mobile Devices.eng.srt 73 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Behind the Scenes How Criminal Enterprises Pre-infect Millions of Mobile Devices.mp4 79.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Black Hat Asia 2023 Highlights.mp4 8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Breaking Managed Data Services in the Cloud.eng.srt 70 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Breaking Managed Data Services in the Cloud.mp4 51.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Breaking the Chain An Attacker's Perspective on Supply Chain Vulnerabilities and Flaws.eng.srt 69 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Breaking the Chain An Attacker's Perspective on Supply Chain Vulnerabilities and Flaws.mp4 49.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Bypassing Anti-Cheats & Hacking Competitive Games.eng.srt 57 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Bypassing Anti-Cheats & Hacking Competitive Games.mp4 49.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Cloudy With a Chance of Exploits Compromising Critical Infrastructure Through IIoT Cloud Solutions.eng.srt 66 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Cloudy With a Chance of Exploits Compromising Critical Infrastructure Through IIoT Cloud Solutions.mp4 56 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Deception at Scale How Malware Abuses Trust.eng.srt 45 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Deception at Scale How Malware Abuses Trust.mp4 33.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Dilemma in IoT Access Control Revealing Novel Attacks and Design Challenges in Mobile-as-a-Gateway.eng.srt 60 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Dilemma in IoT Access Control Revealing Novel Attacks and Design Challenges in Mobile-as-a-Gateway.mp4 54.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Dirty Bin Cache A New Code Injection Poisoning Binary Translation Cache.eng.srt 60 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Dirty Bin Cache A New Code Injection Poisoning Binary Translation Cache.mp4 53.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Dirty Stream Attack, Turning Android Share Targets Into Attack Vectors.eng.srt 61 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Dirty Stream Attack, Turning Android Share Targets Into Attack Vectors.mp4 44 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/E-Meet (or Emit) My Keystrokes How Benign Screen-sharing Meetings Could Leak Typing Behaviors.mp4 57.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Engaging the Next Generation of Cybersecurity Professionals The Power of Security Zines.eng.srt 51 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Engaging the Next Generation of Cybersecurity Professionals The Power of Security Zines.mp4 44.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Fireside Chat Jeff Moss and Gaurav Keerthi.eng.srt 92 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Fireside Chat Jeff Moss and Gaurav Keerthi.mp4 92.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/firmWar An Imminent Threat to the Foundation of Computing.eng.srt 73 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/firmWar An Imminent Threat to the Foundation of Computing.mp4 59.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Forward Focus - The Impact of Artificial Intelligence.eng.srt 75 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Forward Focus - The Impact of Artificial Intelligence.mp4 89.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Fuzzing the Native NTFS Read-Write Driver (NTFS3) in the Linux Kernel.eng.srt 55 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Fuzzing the Native NTFS Read-Write Driver (NTFS3) in the Linux Kernel.mp4 52.2 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Grand Theft House RF Lock Pick Tool to Unlock Smart Door Lock.eng.srt 56 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Grand Theft House RF Lock Pick Tool to Unlock Smart Door Lock.mp4 58 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Hacked on National Television.eng.srt 59 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Hacked on National Television.mp4 49.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Hand Me Your SECRET, MCU Microarchitectural Timing Attacks on Microcontrollers are Practical.eng.srt 64 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Hand Me Your SECRET, MCU Microarchitectural Timing Attacks on Microcontrollers are Practical.mp4 69.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Insider Threats Packing Their Bags With Corporate Data.eng.srt 51 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Insider Threats Packing Their Bags With Corporate Data.mp4 37.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Keynote - Preparing the Long Journey for Data Security.eng.srt 85 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Keynote - Preparing the Long Journey for Data Security.mp4 99.8 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Leveraging Streaming-Based Outlier Detection and SliceLine to Stop Heavily Distributed Bot Attacks.eng.srt 67 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Leveraging Streaming-Based Outlier Detection and SliceLine to Stop Heavily Distributed Bot Attacks.mp4 66.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Nakatomi Space Lateral Movement as L1 Post-exploitation in OT.eng.srt 89 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Nakatomi Space Lateral Movement as L1 Post-exploitation in OT.mp4 60.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/New Wine in an Old Bottle Attacking Chrome WebSQL.eng.srt 39 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/New Wine in an Old Bottle Attacking Chrome WebSQL.mp4 41 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Operation Clairvoyance How APT Groups Spy on the Media Industry.mp4 42.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Phoenix Domain Attack Vulnerable Links in Domain Name Delegation and Revocation.eng.srt 34 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Phoenix Domain Attack Vulnerable Links in Domain Name Delegation and Revocation.mp4 38.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/PMFault Voltage Fault Injection on Server Platforms Through the PMBus.eng.srt 40 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/PMFault Voltage Fault Injection on Server Platforms Through the PMBus.mp4 32.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/PPLdump Is Dead. Long Live PPLdump.eng.srt 57 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/PPLdump Is Dead. Long Live PPLdump.mp4 42.5 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Prototype Pollution Leads to RCE Gadgets Everywhere.eng.srt 54 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Prototype Pollution Leads to RCE Gadgets Everywhere.mp4 51.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Revisiting Stealthy Sensitive Information Collection from Android Apps.eng.srt 49 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Revisiting Stealthy Sensitive Information Collection from Android Apps.mp4 48.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Security Advocacy Shouldn't Be for Security Professionals How the Industry Misses the Mark.eng.srt 80 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Security Advocacy Shouldn't Be for Security Professionals How the Industry Misses the Mark.mp4 58.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Stealing With Style Using CSS to Exploit ProtonMail & Friends.eng.srt 73 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Stealing With Style Using CSS to Exploit ProtonMail & Friends.mp4 56.3 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Sweet Dreams Abusing Sleep Mode to Break Wi-Fi Encryption and Disrupt WPA2 3 Networks.eng.srt 66 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Sweet Dreams Abusing Sleep Mode to Break Wi-Fi Encryption and Disrupt WPA2 3 Networks.mp4 62.4 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/The Black Hat Asia NOC Report.eng.srt 80 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/The Black Hat Asia NOC Report.mp4 58.6 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/The Various Shades of Supply Chain SBOM, N-Days and Zero Trust.eng.srt 69 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/The Various Shades of Supply Chain SBOM, N-Days and Zero Trust.mp4 50 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Trends and Top Takeaways from Black Hat Asia.eng.srt 118 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Trends and Top Takeaways from Black Hat Asia.mp4 118 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Two Bugs With One PoC Rooting Pixel 6 From Android 12 to Android 13.mp4 47.7 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Weaponizing Mobile Infrastructure Are Politically Motivated Cyber Attacks a Threat to Democracy.eng.srt 71 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/Weaponizing Mobile Infrastructure Are Politically Motivated Cyber Attacks a Threat to Democracy.mp4 56.9 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/When Knowledge Graph Meets TTPs Automated & Adaptive Executable TTP Intelligence for Security.eng.srt 48 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/When Knowledge Graph Meets TTPs Automated & Adaptive Executable TTP Intelligence for Security.mp4 60.1 MB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/You Can Run, but You Can't Hide - Finding the Footprints of Hidden Shellcode.eng.srt 63 KB
Black Hat/Black Hat Asia/Black Hat Singapore 2023/You Can Run, but You Can't Hide - Finding the Footprints of Hidden Shellcode.mp4 43.2 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Audio/2007_BlackHat_DC-V1-Paget_and_ACLU-RFID.m4a 6.5 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Audio/Data Seepage How to Give Attackers a Roadmap to Your Network - David Maynor & Robert Graham.opus 9.8 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Arkin-ppt.pdf 2.6 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Arkin-WP.pdf 870 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Barnum-WP.pdf 123 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Broesch-ppt.pdf 312 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Broesch-WP.pdf 141 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Cerrudo-ppt.pdf 234 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Cerrudo-WP.pdf 447 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Heasman-WP.pdf 2.8 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Kendall_McMillan.pdf 3.4 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Kendall_McMillan-WP.pdf 1023 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Mandia.pdf 4 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Martin_Barnum_Christey.pdf 2.7 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Martin_Barnum_Christey-WP.pdf 558 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Maynor_Graham.pdf 8.1 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Nazario.pdf 615 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Nazario-WP.pdf 271 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Paget.pdf 848 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Paget-WP.pdf 652 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Rutkowska-ppt.pdf 721 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Sabanal_Yason.pdf 8.5 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Sabanal_Yason-WP.pdf 602 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Shulman.pdf 10.8 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Shulman-WP.pdf 334 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Sutton.pdf 1.2 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Walenstein.pdf 2.8 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Walters.pdf 75 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Whitehouse.pdf 1.8 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Whitehouse-WP.pdf 539 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Willis_Belani.pdf 4.6 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Willis_Belani-WP.pdf 95 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Zanero.pdf 606 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/bh-dc-07-Zanero-WP.pdf 279 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/Cerrudo.rar 3 KB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/grand_hh_training_dc2007.pdf 29.7 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Presentations/Joe Grand Hardware Hacking.rar 360 MB
Black Hat/Black Hat DC/Black Hat DC 2007/Video/2007_BlackHat_DC-V1-Paget_and_ACLU-RFID.mp4 136 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Beauchamp-Weston/Presentation/bh-dc-08-beauchamp-weston.pdf 6 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Beauchamp-Weston/Whitepaper/bh-dc-08-beauchamp-weston-WP.pdf 358 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Chess-West/Whitepaper/bh-dc-08-chess-west.pdf 648 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Chess-West/Whitepaper/bh-dc-08-chess-west-WP.pdf 210 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/DeHaas/Presentation/bh-dc-08-dehaas.pdf 1.5 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Dhanjani-Rios/Presentation/bh-dc-08-dhanjani-rios.pdf 26.7 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Eren-Aitel/Presentation/bh-dc-08-aitel.pdf 81 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Eren-Aitel/Presentation/bh-dc-08-eren.pdf 86 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Eren-Aitel/Presentation/bh-dc-08-eren-aitel.pdf 86 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Franken/Presentation/bh-dc-08-franken.pdf 2 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Friedrichs/Whitepaper/bh-dc-08-friedrichs.pdf 3.3 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Friedrichs/Whitepaper/bh-dc-08-friedrichs-WP.pdf 865 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/FX/Whitepaper/bh-dc-08-fx-WP.pdf 74 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Krawetz/Extra/jpegquality.c 9 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Krawetz/Presentation/bh-dc-08-krawetz.pdf 9.7 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Krawetz/Whitepaper/bh-dc-08-krawetz-WP.pdf 7.8 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Larsen/Presentation/bh-dc-08-larsen.pdf 831 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Laurie/Presentation/bh-dc-08-laurie.pdf 2 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/McFeters-Rios-Carter/Presentation/bh-dc-08-mcfeters-rios-carter.pdf 1.3 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/McFeters-Rios-Carter/Whitepaper/bh-dc-mcfeters-rios-carter-WP.pdf 1.4 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Moser/Whitepaper/bh-dc-08-moser-WP.pdf 155 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Moyer/Presentation/bh-dc-08-moyer.pdf 882 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Moyer/Whitepaper/bh-dc-08-moyer-WP.pdf 154 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Oberheide/Whitepaper/bh-dc-08-oberheide.pdf 596 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Oberheide/Whitepaper/bh-dc-08-oberheide-WP.pdf 124 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Sachin/Presentation/bh-dc-08-sachin-WP.pdf 249 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Shah/Presentation/bh-dc-08-shah.pdf 875 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Steve-DHulton/Presentation/bh-dc-08-steve-dhulton.pdf 502 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Steve-DHulton/Whitepaper/bh-dc-08-steve-dhulton-WP.pdf 72 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Tarnovsky/Presentation/bh-dc-08-tarnovsky.pdf 2.3 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Willis/Presentation/bh-dc-08-willis.pdf 313 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Willis/Whitepaper/bh-dc-08-willis-WP.pdf 143 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Wysopal-Eng/Presentation/bh-dc-08-wysopal.pdf 524 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Wysopal-Eng/Presentation/bh-dc-08-wysopal-eng.pdf 533 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Presentations/Wysopal-Eng/Whitepaper/bh-dc-08-wysopal-eng-WP.pdf 211 KB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/(un)Smashing the Stack Overflows, Countermeasures, and the Real World - Shawn Moyer.mp4 50.8 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/A Picture’s Worth Digital Image Analysis - Dr. Neal Krawetz.mp4 62.6 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Analyzing an Unknown RF Based Data Transmission (Aka Fun with 27Mhz Wireless Keyboards) - Max Moser.mp4 47.6 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Bad Sushi Beating Phishers at Their Own Game - Nitesh Dhanjani & Billy Rios.mp4 54.7 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Biometric and Token-Based Access Control Systems - Zac Franken.mp4 56 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Botnet Population and Intelligence Gathering Techniques - Christopher Davis & David Dagon.mp4 60.1 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Classification and Detection of Application Backdoors - Chris Wysopal.mp4 54.1 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Cracking GSM - David Hulton and Steve.mp4 43.9 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Day1.txt 894 B
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Day2.txt 946 B
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Developments in Cisco IOS Forensics - Felix FX Linder.mp4 60.1 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/DTRACE The Reverse Engineer’s Unexpected Swiss Army Knife - David Weston, Tiller Beauchamp.mp4 45 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Dynamic Taint Propagation Finding Vulnerabilities Without Attacking - Brian Chess & Jacob West.mp4 45.8 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Exploiting Live Virtual Machine Migration - Jon Oberheide.mp4 18.7 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/IO in the Cyber Domain, Immunity Style - Sinan Eren & Dave Aitel.mp4 44.5 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Keynote - Quest for the Holy Grail - Jerry Dixon.mp4 54.6 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Preparing for the Cross Site Request Forgery Defense - Chuck Willis.mp4 44.8 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/RFIDIOts -Practical RFID hacking (without soldering irons) - Adam Laurie.mp4 55.1 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/SCADA Security - Jason Larsen.mp4 60 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools - Shreeraj Shah.mp4 66 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Security Failures in Secure Devices - Christopher Tarnovsky.mp4 44 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Side Channel Analysis on Embedded Systems Impact and Countermeasures - Job de Haas.mp4 68.3 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Social Engineering and the CIA - Petet Earnest.mp4 173.1 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/Threats to the 2008 Presidential Election - Oliver Fredrichs.mp4 58.1 MB
Black Hat/Black Hat DC/Black Hat DC 2008/Video/URI Use and Abuse - Nathan McFeters and Rob Carter.mp4 57.4 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_as-1.mp4 88.4 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_as-2.mp4 50.1 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_as-3.mp4 90.8 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_as-4.mp4 67.7 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_as-5.mp4 74.4 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_as-6.mp4 57.6 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_as-7.mp4 45.1 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_as-8.mp4 70.7 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_as-9.mp4 89.3 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_as-10.mp4 90 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_as-11.mp4 92.4 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_bp-1.mp4 94.5 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_bp-2.mp4 69 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_bp-3.mp4 53.4 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_bp-4.mp4 47.3 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_bp-5.mp4 97.2 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_fp-1.mp4 80.7 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_fp-2.mp4 81 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_fp-3.mp4 51.6 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_fp-4.mp4 95.4 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_fp-5.mp4 101.8 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_fp-6.mp4 80.3 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_h-1.mp4 91.6 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_h-2.mp4 116.1 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_h-3.mp4 85.5 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_h-4.mp4 67.3 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_h-5.mp4 75.8 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_m-1.mp4 85.5 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_m-2.mp4 46.2 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_m-3.mp4 86.4 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_m-4.mp4 70.3 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_m-5.mp4 81 MB
Black Hat/Black Hat DC/Black Hat DC 2010/Video/10_bhb_dc_m-6.mp4 121.8 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_akw6.m4a 13.3 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_akw7.m4a 8.7 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_akw14.m4a 9.9 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_df1.m4a 13.1 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_df2.m4a 10 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_df3.m4a 13.7 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_df4.m4a 14.5 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_df5.m4a 12.1 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_key1.m4a 12.2 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao1.m4a 14.4 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao2.m4a 15.7 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao3.m4a 14 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao4.m4a 7.9 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao5.m4a 8.7 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oao6.m4a 11 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oit1.m4a 13.2 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oit2.m4a 14.1 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oit3.m4a 15 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oit4.m4a 13.6 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_oit5.m4a 15.9 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw1.m4a 11.1 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw2.m4a 12.7 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw3.m4a 9.9 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw4.m4a 12.2 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw5.m4a 14.5 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_otw6.m4a 9.8 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_ows1.m4a 12.6 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_ows2.m4a 11.7 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_ows3.m4a 11.4 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_ows4.m4a 12.7 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Audio/11_bhb_dc_ows5.m4a 11.5 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_akw6.mp4 98.4 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_akw7.mp4 61.6 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_akw14.mp4 79.4 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_df1.mp4 96 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_df2.mp4 74.6 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_df3.mp4 100.2 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_df4.mp4 107.4 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_df5.mp4 90.6 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_key1.mp4 96.8 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_oao1.mp4 75.5 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_oao2.mp4 81.3 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_oao3.mp4 101.9 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_oao4.mp4 38.8 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_oao5.mp4 62 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_oao6.mp4 66.7 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_oit1.mp4 64.1 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_oit2.mp4 96.8 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_oit3.mp4 80.5 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_oit4.mp4 59.6 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_oit5.mp4 109.5 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_otw1.mp4 81 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_otw2.mp4 60.9 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_otw3.mp4 73.8 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_otw4.mp4 83.1 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_otw5.mp4 103.8 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_otw6.mp4 71.2 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_ows1.mov 196.7 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_ows2.mp4 83.7 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_ows3.mp4 76.7 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_ows4.mp4 95 MB
Black Hat/Black Hat DC/Black Hat DC 2011/Video/11_bhb_dc_ows5.mp4 80.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Audio/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.opus 9.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Audio/Auditing The Security of Applications - David Litchfield.opus 6.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Audio/Defending Your Network with Kerberos - Rooster & J.D. Glaser.opus 8.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Audio/Finding Holes in Closed-source Software - Havlar Flake.opus 7.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Audio/Getting Rooted and Never Knowing It - Job De Haas.opus 14.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Audio/ICMP Usage In Scanning - Ofir Arkin.opus 10.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Audio/Issues Surrounding International Computer Crime Laws - Jennifer Granick.opus 13.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Audio/Plenty of Coppers in Change - Stuart Hyde.opus 9.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Audio/Strategies for Defeating Distributed Attacks - Simple Nomad.opus 13 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Audio/What Is Involved In a Forensic Effort - John Tan.opus 10.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Video/Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.mp4 59.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Video/Getting Rooted and Never Knowing It - Job De Haas.mp4 91.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Video/ICMP Usage In Scanning - Ofir Arkin.mp4 65 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Video/Issues Surrounding International Computer Crime Laws - Jennifer Granick.mp4 79.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2000/Video/What Is Involved In a Forensic Effort - John Tan.mp4 69.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Active Directory and Group Policy - Raymond Forbes.opus 9.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Decoding & Understanding Internet Worms - Dale Coddington & Ryan Permeh.opus 24.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Hackproofing Lotus Domino - David Litchfield.opus 7.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/How We Beat the 5th Argus Hacking Contest - LSD.opus 10.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/IDS Evasion Design Tricks for Buffer Overflow Exploits - Anders Ingeborn.opus 6.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/injectso Modifying and Spying on Running Processes Under Linux - Shaun Clowes.opus 21.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Mobile Security SMS and WAP - Jab De Haas.opus 11 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/One-Way SQL Hacking - JD Glaser & Saumil Udayan Shah.opus 10.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Politics of Vulnerability Reporting - Scott Blake.opus 9.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Protecting your IP Network Infrastructure - Nicolas Fischbach & Sebastian Lacoste-Seris.opus 11.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Routing Protocol Attacks - FX.opus 11.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Security Issues in the Infrastructure - Panel Discussion.opus 8.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Smart Card Security - Marc Witteman.opus 10.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/The Other Side of Information Security - Wilco van Ginkel.opus 7.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Third Generation Exploits on NTWin2k Platforms - Halvar Flake.opus 19.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Web Application Security - Jeremiah Grossman.opus 10.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen.opus 21.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Audio/X-Remote ICMP Based OS Fingerprinting Techniques - Ofir Arkin.opus 10.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Video/Hackproofing Lotus Domino - David Litchfield.mp4 45.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Video/injectso Modifying and Spying on Running Processes Under Linux - Shawn Clowes.mp4 52.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Video/One-Way SQL Hacking - JD Glaser & Saumil Udayan Shah.mp4 61.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Video/Politics of Vulnerability Reporting - Scott Blake.mp4 55.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Video/The Other Side of Information Security - Wilco van Grinkel.mp4 44.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Video/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 1-2.mp4 65.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Video/Third Generation Exploits on NTWin2k Platforms - Halvar Flake 2-2.mp4 56.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Video/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 1-2.mp4 77.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Video/Web Vulnerability & SQL Injection Countermeasures - Tim Mullen 2-2.mp4 54.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2001/Video/X-Remote ICMP Based OS Fingerprinting Techniqu es - Ofir Arkin.mp4 65.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/bh-archives-2003.html 219 KB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/Adam Shostack - Will People Ever Pay for Privacy.mp4 35.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/Andrey Malyshev and Serg Vasilenkov - Security Analysis of Microsoft Encrypted File System.mp4 17.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/BBP - BSD Heap Smashing.mp4 34.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/Charl van der Walt and Christoff Breytenbach - The Role of Non Obvious Relationships in the Foot Printing Process.mp4 58.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/David Aitel - Vivisection of an Exploit Development Process 1-2.mp4 46.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/David Aitel - Vivisection of an Exploit Development Process 2-2.mp4 2.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/David Litchfield - All New Oracle 0 - day Attacking and Defending Oracle.mp4 23.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/FX - Design and Software Vulnerabilities In Embedded Systems.mp4 36.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/Jaya Baloo - Lawful Interception of IP The European Context.mp4 53.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/Larry Leibrock - Digital Information, User Tokens, Privacy and Forensics Investigations The Case of Windows XP Platform.mp4 54.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/Marco Valleri and Alberto Ornaghi - Man In The Middle Attacks.mp4 39.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/Nicolas Fischbach - DDoS Mitigation and Analysis at the Infrastructure Level.mp4 40 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/Paul Wouters - Deploying DNSSEC.mp4 36.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/Richard Thieme - Masters of the Unseen The Art of Information Warfare.mp4 58 MB
Black Hat/Black Hat Europe/Black Hat Europe 2003/Video/Shaun Clowes - Generic Technical Defences.mp4 56.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05_zanero.ppt 437 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Callas.pdf 1.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-deHaas.pdf 3.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Evans.pdf 2.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Farrow.pdf 105 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Fischbach.pdf 120 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Flake.pdf 153 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Geers.pdf 3.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Grand.pdf 771 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kaminsky.pdf 399 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Klein_Sprundel.pdf 123 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Long.pdf 6.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Sensepost.pdf 2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Shah.pdf 150 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Wheeler_Mehta.pdf 32 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-callas-up.pdf 177 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-etisalat_invoice.pdf 249 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-evans-up.pdf 3.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-farrow.pdf 218 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-fischbach.pdf 2.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-geers-up.pdf 4.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-grugq.pdf 329 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-litchfield.pdf 238 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-sensepost.pdf 1.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-simmonds.pdf 225 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-wheeler-mehta-up.pdf 61 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/bh-eu-05-zanero.pdf 455 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/BH_EU_05_Berrueta_Andres.pdf 1.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/yersinia-0.5.1.tar.gz 265 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/Pictures/Alfredo.JPG 569 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/Pictures/David.JPG 594 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/Pictures/David-Alfredo.JPG 624 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/References/bh-us-02-convery-switches.pdf 751 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/References/CiscoCDP.txt 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/References/Marro_masters_thesis.pdf 1.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Berrueta_Andres/References/p61-0x0c_Fun_with_Spanning_Tree_Protocol.txt 36 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/BH_EU_05_Cerrudo.pdf 127 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.cpp 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.dsp 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.dsw 535 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.ncb 49 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.opt 53 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/DumpSS.plg 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/ReadMe.txt 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/StdAfx.cpp 293 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/DumpSS/StdAfx.h 667 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.cpp 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.dsp 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.dsw 535 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.ncb 49 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.opt 53 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ListSS.plg 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/ReadMe.txt 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/StdAfx.cpp 293 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/ListSS/StdAfx.h 667 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/StdAfx.cpp 293 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/StdAfx.h 667 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.cpp 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.dsp 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.dsw 535 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.ncb 49 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.opt 53 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Cerrudo/TestSS/TestSS.plg 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/BH_EU_05_Kornbrust.pdf 721 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/check.cmd 270 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/databases.dtd 593 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/databases.xml 439 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/dbencrypt.exe 80 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/exec.dtd 206 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/exec.xml 220 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/generate.cmd 260 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/repscan.exe 184 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/repscan.txt 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/rules.dtd 348 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/rules_db_check.xml 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/rules_default_users.xml 556 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/scanreport.xml 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/scanreport.xsl 10 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/archcorn.gif 856 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/btailtop.gif 896 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/flag_gre.gif 139 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/flag_red.gif 139 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/lend.gif 874 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/rds_logo.jpg 14 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/rend.gif 854 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Kornbrust/repscan_bh2005/images/toparch.gif 998 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Laurie_Herfurt_Holtmann/._bh-eu-05-trifinite-up.pdf 82 B
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Laurie_Herfurt_Holtmann/BH_EU_05_Laurie_Herfurt_Holtmann.pdf 274 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Laurie_Herfurt_Holtmann/bh-eu-05-trifinite-up.pdf 468 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Laurie_Herfurt_Holtmann/Whitepaper_Blueprinting_Mulliner_Herfurt.pdf 381 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Oudot/BH_EU_05-Oudot.pdf 160 KB
Black Hat/Black Hat Europe/Black Hat Europe 2005/Presentations/BH_EU_05-Oudot/wknock.tar.gz 39 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/360 Anomaly Based Unsupervised Intrusion Detection - Stefano Zanero.opus 12.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/Advanced Oracle Attack Techniques - David Litchfield.opus 21.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/GS and ASLR in Windows Vista - Ollie Whitehouse.opus 8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/Hacking Databases for Owning Your Data - Cesar Cerrudo & Esteban Martinez Fayo.opus 13.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/Heap Feng Shui in JavaScript - Alexander Sotirov.opus 11.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/How can the Security Researcher Community Work Better for the Common Good - Jeff Moss, Roger Cumming.opus 9.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/Kernel Wars - Joel Eriksson.opus 8.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/Make My Day – Just Run a Web Scanner Countering The Faults of Typical Web Scanners Through Byte-code Injection - Toshinari Kureha & Dr. Brian Chess.opus 5.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/Making Windows Exploits More Reliable - Kostya Kortchinsky.opus 12.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/New Botnets Trends and Threats - Augusto Paes de Barros, André Fucs & Victor Pereira.opus 8.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/Next Generation Debuggers for Reverse Engineering - ERESI Team.opus 9.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/NIDS False Positive Reduction Through Anomaly Detection - Damiano Bolzoni.opus 7.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/RFIDIOts!!! - Practical RFID hacking (without soldering irons) - Adam Laurie.opus 8.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/ScarabMon - Automating Web Application Penetration Tests - Jonathan Wilkins.opus 7.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/SCTPscan - Finding Entry Points to SS7 Networks & Telecommunication Backbones - Philippe Langlois.opus 11.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/SMTP Information Gathering - Lluis Mora.opus 9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/Software Virtualization Based Rootkits - Sun Bing.opus 11.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/Vboot Kit Compromising Windows Vista Security - Nitin Kumar & Vipin Kumar.opus 10.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Audio/Wi-Fi Advanced Fuzzing - Laurent Butti.opus 13 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-barros.pdf 529 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-barros-WP.pdf 254 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bhalla-WP.pdf 626 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bing.pdf 2.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bing-WP.pdf 519 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bolzoni.pdf 1.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bolzoni-WP-APHRODITE.pdf 301 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-bolzoni-WP-POSEIDON.pdf 221 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-Butti.pdf 2.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-butti-handouts.pdf 1.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-cerrudo.pdf 556 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-chess-kureha.pdf 122 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-dror.pdf 7.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-dror-WP.pdf 1.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-eriksson.pdf 356 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-eriksson-WP.pdf 193 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-kortchinsky.pdf 273 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-kortchinsky-WP.pdf 507 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-kumar.pdf 165 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-Kumar-WP.pdf 627 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-langlois.pdf 724 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-langlois-WP.pdf 151 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-laurie.pdf 1.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-luiz-ramos.pdf 365 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-luiz-ramos-References.txt 783 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-luiz-ramos-WP.pdf 162 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-maynor-graham.pdf 810 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-maynor-graham-WP.pdf 84 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-mora.pdf 303 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-mora-WP.pdf 133 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-nunez di croce.pdf 673 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-nunez di croce-WP.pdf 3.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-rios.pdf 1.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-rios-WP.pdf 2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-sotirov-WP.pdf 170 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-vanegue.pdf 273 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-vanegue-WP.pdf 298 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-whitehouse.pdf 1.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-whitehouse-WP-1.pdf 512 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-whitehouse-WP-2.pdf 957 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-wilkins-WP.pdf 248 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-zanero.pdf 373 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/bh-eu-07-zanero-WP.pdf 290 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Bhalla-Kazerooni/Whitepaper/bh-eu-07-bhalla-WP.pdf 626 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Bing/Presentation/bh-eu-07-bing.pdf 2.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Bing/Whitepaper/bh-eu-07-bing-WP.pdf 522 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Bolzoni-Zambon/Presentation/bh-eu-07-bolzoni.pdf 1.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Bolzoni-Zambon/Whitepapers/bh-eu-07-bolzoni-WP-APHRODITE.pdf 301 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Bolzoni-Zambon/Whitepapers/bh-eu-07-bolzoni-WP-POSEIDON.pdf 221 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Butti/Presentation/bh-eu-07-Butti.pdf 2.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Butti/Presentation/bh-eu-07-butti-handouts.ppt 1.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Butti/Whitepaper/bh-eu-07-Butti.pdf 616 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Butti/Whitepaper/bh-eu-07-butti-handouts.pdf 1.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/CleanOracleBackdoor.sql 327 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/CleanOracleRootkit.sql 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/CleanSQLBackdoor.sql 367 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/CleanSQLRootkit.sql 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/export_and_zip.sql 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/OracleBackdoor.sql 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/OracleRootkit.sql 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/send_zip.sql 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/SQLServerBackdoor.sql 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/SQLServerRootkit.sql 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Data Thief V1(Beta) Help.doc 132 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Data Thief.vbp 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Data Thief.vbw 130 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/FrmHtml.frm 937 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/FrmHtml.frx 130 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Main.bas 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Main.frm 17 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/Main.frx 155 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo- Tools/DataThief/search.asp 370 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/CleanOracleBackdoor.sql 327 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/CleanOracleRootkit.sql 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/CleanSQLBackdoor.sql 367 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/CleanSQLRootkit.sql 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/export_and_zip.sql 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/OracleBackdoor.sql 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/OracleRootkit.sql 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/send_zip.sql 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/SQLServerBackdoor.sql 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/SQLServerRootkit.sql 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Data Thief V1(Beta) Help.doc 132 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Data Thief.vbp 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Data Thief.vbw 130 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/FrmHtml.frm 937 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/FrmHtml.frx 130 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Main.bas 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Main.frm 17 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/Main.frx 155 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/DataThief/search.asp 370 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/Maguro/cli.py 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/Maguro/MAGURO-README.txt 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Additional Materials/Maguro/maguro-v2.py 22 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Presentation/bh-eu-07-cerrudo.pdf 430 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Cerrudo/Whitepaper/bh-eu-07-cerrudo-WP.pdf 541 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Chess-Kureha/Presentation/bh-eu-07-chess-kureha.pdf 122 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Chess-Kureha/Whitepaper/bh-eu-07-chess-kureha-WP.pdf 326 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Dror-Thumann/Extras/CiscoHostPP.zip 159 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Dror-Thumann/Presentation/bh-eu-07-dror.pdf 7.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Dror-Thumann/Presentation/bh-eu-07-dror.ppt 4.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Dror-Thumann/Whitepaper/bh-eu-07-dror-WP.pdf 1.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Dube-Rios/Presentation/bh-eu-07-rios.pdf 1.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Dube-Rios/Whitepaper/bh-eu-07-rios-WP.pdf 2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Butti/Presentation/bh-eu-07-butti-handouts.pdf 2.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Dror-Thumann=/Extras/CiscoHostPP.zip 159 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Dror-Thumann=/Presentation/bh-eu-07-dror.ppt 4.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Dror-Thumann=/Whitepaper/bh-eu-07-dror-WP.pdf 1.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Kureha=/Presentation/bh-eu-07-chess-kureha.ppt 1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Kureha=/Whitepaper/bh-eu-07-chess-kureha-WP.pdf 326 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Langlois=/Presentation/bh-eu-07-langlois.ppt 1.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Langlois=/Whitepaper/bh-eu-07-langlois-WP.pdf 184 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Sotirov/Presentation/bh-eu-07-sotirov.pdf 208 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Sotirov/Source Code/LICENSE 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Sotirov/Source Code/test.html 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Sotirov/Source Code/exploits/ms06-067-keyframe.html 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Sotirov/Whitepaper/bh-eu-07-sotirov-WP.pdf 164 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Presentation/bh-eu-07-vanegue.ppt 1.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/configure 25 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/INSTALL 512 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/README.FIRST 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/wordswap 452 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/AUTHOR 39 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/cerberus2.txt 125 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/Changelog 18 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/CREDITS 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/elfsh.1 14 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/elfsh-draft.txt 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/elfsh-network-0.3.txt 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/elfshrc.example 855 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/elfsh-ref.txt 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/ERESI-coding_style-README.txt 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/graphers.txt 147 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/HOWTO-port-elfsh-0.7a2.txt 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/libasm_TODO.txt 949 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/libelfsh.i 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/libelfsh-ref.txt 17 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/LICENSE 18 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/rtld-multiarch.txt 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/TODO 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/doc/VERSION 7 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/e2dbg/main.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/e2dbg/Makefile 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/e2dbg/include/e2dbg.h 375 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/e2dbg/include/libe2dbg.h 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/cleanup.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/main.c 589 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/Makefile 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/misc.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/rlheap.c 527 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/run.c 817 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/tables.c 745 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/include/elfsh.h 710 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elfsh/include/elfsh-help.h 500 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elibc/Makefile 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elibc/memcpy.c 437 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elibc/strlen.c 379 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/elibc/include/elfsh-libc.h 335 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/cleanup.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/main.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/Makefile 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/misc.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/rlheap.c 530 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/run.c 820 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/tables.c 747 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/include/etrace.h 879 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/etrace/include/etrace-help.h 504 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/aproxy_arena.c 25 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/aproxy_hooks.c 18 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/aproxy_malloc.c 173 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/aproxy_strdup.c 506 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/elfsh_hooks.c 18 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/Makefile 529 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/README 681 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/include/aproxy.h 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/liballocproxy/include/aproxy-machine.h 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/configure 291 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/Makefile 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/README.FIRST 226 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm.h 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-i386.h 22 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-int.h 23 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-mips.h 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-mips-structs.h 865 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-sparc.h 21 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-sparc-decode.h 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/include/libasm-structs.h 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/error.c 948 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/generic.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/instr_table.c 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/instruction.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/operand.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/operand_ia32.c 21 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/output.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/output_operand.c 565 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/register.c 36 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/vectors.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-0.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-1.c 263 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-2.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-3.c 682 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-4.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-6.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-7.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-8.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-9.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-a.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-b.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-c.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-d.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/ei386-e.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-0.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-1.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-2.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-3.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-4.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-5.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-6.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-7.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-8.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-9.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-a.c 10 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-b.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-c.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-d.c 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-e.c 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/i386-f.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/init_i386.c 16 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/operand_ia32.c 17 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/output_ia32.c 10 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/tables_i386.c 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_bsf.c 425 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_bsr_rv_rmb.c 455 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_bswap.c 864 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_bt_rm_r.c 947 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_btrl.c 507 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_bts.c 438 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmova.c 440 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovae.c 443 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovb.c 439 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovbe.c 443 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmove.c 440 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovl.c 440 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovle.c 444 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovne.c 443 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovnl.c 444 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovnle.c 448 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovno.c 443 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovnp.c 444 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovns.c 444 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovo.c 440 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovp.c 440 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cmovs.c 440 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_cpuid.c 353 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_emms.c 342 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_group12.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_group14.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_group15.c 1021 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_imul_rv_rmv.c 540 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_ja.c 537 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jae.c 545 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jb.c 533 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jbe.c 543 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_je.c 533 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jg.c 500 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jge.c 546 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jl.c 534 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jle.c 547 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jne.c 540 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jnp.c 523 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jns.c 541 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_jp.c 516 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_js.c 534 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_mov_cr_rm.c 644 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_mov_dr_rm.c 645 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_mov_rm_cr.c 644 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movd_pd_qd.c 589 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movq_pq_qq.c 589 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movq_qq_pq.c 589 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movsbl_rv_rmb.c 530 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movswl_rv_rm2.c 528 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movzbl_rv_rmb.c 617 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_movzwl_rv_rm2.c 460 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_packuswb_pq_qq.c 640 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_paddusb_pq_qq.c 632 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_paddusw_pq_qq.c 636 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_pand_pq_qq.c 624 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_pmullw_pq_qq.c 632 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_pop_fs.c 558 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_por_pq_qq.c 620 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_punpckhbw_pq_qq.c 638 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_punpcklbw_pq_qd.c 644 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_push_fs.c 609 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_pxor_pq_qq.c 624 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_rdmsr.c 346 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_rdtsc.c 343 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_shld.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_shld_rmv_rv_cl.c 742 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_shrd_rmv_rv_cl.c 741 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_shrd_rmv_rv_ib.c 842 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_wbinvd.c 271 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_xadd.c 711 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/i386_xstorenrg.c 584 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_386sp.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_aaa.c 335 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_aad.c 334 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_aam.c 331 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_aas.c 339 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_al_ib.c 792 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_eax_iv.c 728 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_rb_rmb.c 544 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_rmb_rb.c 542 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_rmv_rv.c 546 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_adc_rv_rmv.c 605 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_al_ib.c 801 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_eax_iv.c 874 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_rb_rmb.c 638 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_rmb_rb.c 641 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_rmv_rv.c 663 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_add_rv_rmv.c 558 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_addsize.c 634 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_al_ib.c 749 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_eax_iv.c 907 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_rb_rmb.c 479 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_rmb_rb.c 478 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_rmv_rv.c 479 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_and_rv_rmv.c 478 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_arpl_ew_rw.c 516 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_bound_gv_ma.c 701 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_btr_rmv_rv.c 452 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_call_iv.c 609 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_clc.c 335 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cld.c 331 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cli.c 335 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cltd.c 397 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmc.c 331 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_al_ib.c 742 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_eax_iv.c 799 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_rb_rmb.c 479 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_rmb_rb.c 479 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_rmv_rv.c 479 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_rv_rmv.c 479 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmp_xchg.c 447 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmpsb.c 758 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cmpsd.c 734 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_cwtl.c 404 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_daa.c 335 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_das.c 336 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_dec_reg.c 975 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_enter.c 539 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc0.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc1.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc2.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc3.c 919 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc4.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc5.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc6.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_esc7.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_fwait.c 344 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_group6.c 770 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_group7.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_hlt.c 331 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_immed_rmb_ib.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_immed_rmv_ib.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_immed_rmv_iv.c 985 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_imul_gv_ev_ib.c 830 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_imul_rv_rmv_iv.c 689 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_in_al_dx.c 679 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_in_al_ref_ib.c 657 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_in_eax_dx.c 690 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_in_eax_ref_ib.c 661 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_inc_reg.c 977 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_incdec_rmb.c 734 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_indir_rmv.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_insb.c 747 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_insw.c 888 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_int_3.c 342 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_int_ib.c 645 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_int1.c 335 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_into.c 339 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_iret.c 364 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_ja.c 615 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jae.c 625 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jb.c 613 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jbe.c 619 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_je.c 612 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_je_cxz.c 725 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jg.c 615 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jge.c 624 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jl.c 612 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jle.c 621 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jmp_ap.c 675 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jmp_ib.c 641 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jmp_iv.c 578 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jne.c 630 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jno.c 656 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jnp.c 619 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jns.c 619 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jo.c 614 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_jp.c 612 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_js.c 612 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lahf.c 335 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lds_rm_rmp.c 356 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lea_rv_m.c 511 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_leave.c 374 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_les_rm_rmp.c 356 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lock.c 405 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lodsb.c 709 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lodsd.c 632 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_loop.c 684 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_loope.c 705 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_loopne.c 709 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_lss_rv_rmv.c 447 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_al_ref_iv.c 748 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_eax_ref_iv.c 779 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rb_rmb.c 546 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_ref_iv_al.c 657 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_ref_iv_eax.c 814 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_reg_iv.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rm_segr.c 734 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rmb_ib.c 546 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rmb_rb.c 546 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rmv_iv.c 550 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rmv_rv.c 548 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_rv_rmv.c 548 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_segr_rm.c 806 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_mov_subreg_ib.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_movsb.c 756 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_movsd.c 866 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_nop.c 346 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_opsize.c 621 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_al_ib.c 747 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_eax_iv.c 866 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_rb_rmb.c 508 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_rmb_rb.c 544 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_rmv_rv.c 542 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_or_rv_rmv.c 539 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_out_dx_al.c 683 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_out_dx_eax.c 688 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_out_ref_ib_al.c 661 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_out_ref_ib_eax.c 697 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_outsb.c 743 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_outsw.c 824 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pop_ds.c 559 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pop_es.c 540 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pop_reg.c 998 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pop_rmv.c 461 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pop_ss.c 535 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_popa.c 343 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_popf.c 383 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_cs.c 423 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_ds.c 400 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_es.c 423 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_fs.c 424 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_gs.c 424 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_prefix_ss.c 406 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_cs.c 531 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_ds.c 521 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_es.c 540 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_ib.c 638 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_iv.c 525 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_reg.c 1010 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_push_ss.c 488 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pusha.c 345 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_pushf.c 390 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_repnz.c 409 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_repz.c 405 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_ret.c 364 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_ret_i2.c 574 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_retf.c 368 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_retf_i2.c 668 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sahf.c 338 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_al_ib.c 792 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_eax_iv.c 800 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_rb_rmb.c 526 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_rmb_rb.c 526 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_rmv_rv.c 531 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sbb_rv_rmv.c 593 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_scasb.c 687 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_scasd.c 770 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_seta_rmb.c 435 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setae_rmb.c 444 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setb_rmb.c 432 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setbe_rmb.c 441 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sete_rmb.c 431 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setg_rmb.c 435 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setge_rmb.c 444 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setl_rmb.c 432 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setle_rmb.c 441 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setne_rmb.c 438 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setno_rmb.c 442 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setnp_rmb.c 439 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setns_rmb.c 439 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_seto_rmb.c 433 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_setp_rmb.c 432 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sets_rmb.c 432 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shift_rmb_1.c 654 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shift_rmb_cl.c 777 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shift_rmv_1.c 863 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shift_rmv_cl.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shr_rmb_ib.c 862 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_shr_rmv_ib.c 881 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_stc.c 335 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_std.c 333 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sti.c 335 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_stosb.c 739 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_stosd.c 856 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_al_ib.c 739 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_eax_iv.c 820 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_rb_rmb.c 478 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_rmb_rb.c 478 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_rmv_rv.c 478 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_sub_rv_rmv.c 479 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_test_al_rb.c 703 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_test_eax_iv.c 836 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_test_rmb_rb.c 548 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_test_rmv_rv.c 553 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_ud2a.c 259 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_unary_rmb.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_unary_rmv.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xchg_eax_reg.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xchg_rmb_rb.c 552 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xchg_rmv_rv.c 556 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xlatb.c 341 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_al_ib.c 810 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_eax_iv.c 872 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_rb_rmb.c 544 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_rmb_rb.c 546 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_rmv_rv.c 548 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/ia32/handlers/op_xor_rv_rmv.c 551 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/mips/init_mips.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/mips/mips_convert.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/mips/mips_decode.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/mips/output_mips.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/mips/tables_mips.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/init_sparc.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/output_sparc.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/sparc_convert.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/tables_sparc.c 16 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_add.c 986 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_addc.c 787 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_addcc.c 995 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_addccc.c 789 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_and.c 783 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_andcc.c 909 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_andn.c 890 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_andncc.c 789 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_bicc.c 564 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_bpcc.c 851 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_bpr.c 654 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_call.c 479 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_casa.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_casxa.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_done.c 600 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fbfcc.c 563 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fbpfcc.c 650 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmpd.c 719 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmped.c 722 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmpeq.c 722 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmpes.c 722 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmpq.c 719 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fcmps.c 719 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_flush.c 668 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_flushw.c 422 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovdcc.c 1022 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovdr.c 757 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovqcc.c 1022 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovqr.c 757 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovscc.c 1022 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fmovsr.c 757 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_fpop1.c 885 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_illegal.c 231 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_illtrap.c 442 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_impdep1.c 423 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_impdep2.c 423 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_jmpl.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldd.c 746 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldda.c 821 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lddf.c 747 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lddfa.c 818 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldf.c 744 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldfa.c 822 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldfsr.c 928 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldqf.c 747 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldqfa.c 818 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldsb.c 749 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldsba.c 817 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldsh.c 751 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldsha.c 819 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldstub.c 748 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldstuba.c 823 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldsw.c 749 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldswa.c 817 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldub.c 749 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lduba.c 817 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lduh.c 749 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lduha.c 817 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lduw.c 749 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_lduwa.c 817 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldx.c 746 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_ldxa.c 821 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_movcc.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_movr.c 838 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_mulscc.c 789 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_mulx.c 785 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_or.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_orcc.c 989 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_orn.c 782 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_orncc.c 786 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_popc.c 833 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_prefetch.c 749 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_prefetcha.c 827 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_rd.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_rdpr.c 713 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_restore.c 791 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_return.c 673 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_save.c 785 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_saved.c 574 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sdiv.c 785 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sdivcc.c 791 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sdivx.c 787 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sethi.c 611 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sll.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_smul.c 785 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_smulcc.c 789 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sra.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_srl.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stb.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stba.c 822 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_std.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stda.c 822 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stdf.c 748 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stdfa.c 819 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stf.c 745 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stfa.c 823 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stfsr.c 934 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sth.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stha.c 822 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stqf.c 748 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stqfa.c 819 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stw.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stwa.c 822 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stx.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_stxa.c 822 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_sub.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_subc.c 785 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_subcc.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_subccc.c 789 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_swap.c 750 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_swapa.c 818 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_taddcc.c 789 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_taddcctv.c 793 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_tcc.c 888 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_tsubcc.c 789 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_tsubcctv.c 793 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_udiv.c 785 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_udivcc.c 789 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_udivx.c 787 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_umul.c 785 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_umulcc.c 789 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_wr.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_wrpr.c 884 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_xnor.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_xnorcc.c 789 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_xor.c 888 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/src/arch/sparc/handlers/asm_sparc_xorcc.c 789 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libasm/tools/mydisasm.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/config.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/init.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/libbtree.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/libhash.c 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/Makefile 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/profiler.c 12 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/types.c 10 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/vectors.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/include/libaspect.h 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/include/libaspect-btree.h 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/include/libaspect-hash.h 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libaspect/include/libaspect-profiler.h 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/dump.c 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/dump_main.c 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/Makefile 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/recv.c 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/send.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/doc/DUMP-draft 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/doc/TODO 738 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libdump/include/libdump.h 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/backtrace.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/breakpoints.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/continue.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/delete.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/display.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/dumpregs.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/e2dbg.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/e2dbg-misc.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/entry.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/linkmap.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/Makefile 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/mode.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/mutex.c 817 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/resolv.c 20 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/signal.c 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/stack.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/step.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/threads.c 10 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/vmhooks.c 32 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/xmalloc.c 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libe2dbg/include/libe2dbg.h 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/api.c 20 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/dwarf2.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/dwarf2-abbrev.c 28 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/dwarf2-cfa.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/dwarf2-trans.c 16 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/dwarf2-utils.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/edfmt.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/edfmt-utils.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/Makefile 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/stabs.c 28 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/stabs-trans.c 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/stabs-utils.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/include/libedfmt.h 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/include/libedfmt-api.h 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/include/libedfmt-dwarf2.h 25 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libedfmt/include/libedfmt-stabs.h 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/alpha64.c 18 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/altgot.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/altplt.c 17 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/bp.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/bss.c 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/bt.c 155 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/comment.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/copy.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/ctors.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/debug.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/dtors.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/dumpregs.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/dynamic.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/dynsym.c 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/elf.c 20 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/extplt.c 10 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/fixup.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/got.c 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/hash.c 10 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/hijack.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/hooks.c 53 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/ia32.c 24 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/ia64.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/inject.c 30 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/interp.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/linkmap.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/Makefile 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/map.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/mips32.c 19 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/mips64.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/notes.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/obj.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/pax.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/pht.c 16 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/plt.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/raw.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/reginfo.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/relinject.c 19 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/reloc.c 14 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/remap.c 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/rpht.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/runtime.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sanitize.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/save.c 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/search.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/section.c 30 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sht.c 31 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sht_rebuild.c 14 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sort.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sparc32.c 10 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sparc64.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/stab.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/state.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/strip.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/strtab.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/sym_common.c 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/symbol.c 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/traces.c 24 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/version.c 29 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh.h 64 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-alpha.h 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-bsd.h 18 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-compat.h 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-cray.h 295 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-hppa.h 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-ia32.h 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-ia64.h 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-internal.h 415 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-irix.h 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-mips.h 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-ppc.h 340 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-sparc.h 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libelfsh/include/libelfsh/libelfsh-sunos.h 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/Makefile 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/bin/elfThor.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/include/libmjollnir.h 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/include/libmjollnir-blocks.h 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/include/libmjollnir-container.h 544 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/include/libmjollnir-fprint.h 902 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/include/libmjollnir-int.h 601 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/blocks.c 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/container.c 181 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/control.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/core.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/display.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/fingerprint.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/function.c 14 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/history.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/init.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/symtab.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/src/types.c 12 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/tools/desDiff.pl 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/tools/mjollnirUnitTest.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libmjollnir/tools/mkDb.sh 300 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/Makefile 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/atomic.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/commands.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/doswitch.c 746 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/edfmt.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/filter.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/implicit.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/job.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/Makefile 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/misc.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/modlist.c 931 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/screen.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/api/stringtable.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/atomic.c 12 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/cat.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/color.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/configure.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/debug.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/exec.c 911 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/fcthijack.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/fileops.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/flow.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/flowjack.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/foreach.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/graph.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/hammer.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/hashes.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/help.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/info.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/inform.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/insert.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/inspect.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/jmp.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/job.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/list.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/load.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/log.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/Makefile 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/modules.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/net.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/prefixes.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/print.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/profile.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/quit.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/reladd.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/remove.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/save.c 698 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/script.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/source.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/switch.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/trace.c 17 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/types.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/unload.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/utils.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/vectors.c 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/cmd/vlist.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/api.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/comment.c 948 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/core.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/ctors.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/data.c 37 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/deps.c 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/disasm.c 22 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/dtors.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/dyn.c 10 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/findrel.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/flush.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/got.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/hash.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/hdr.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/interp.c 587 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/Makefile 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/notes.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/pht.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/rel.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/sht.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/sym.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/elf/version.c 14 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/include/librevm-color.h 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/include/revm.h 34 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/include/revm-help.h 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/include/revm-io.h 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/color.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/curjob.c 802 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/input.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/io.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/log.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/Makefile 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/network.c 26 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/output.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/prompt.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/io/select.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/access.c 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/convert.c 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/grammar.c 17 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/lookup.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/lts.c 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/Makefile 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/objects.c 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/options.c 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/parser.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/scanner.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/lang/variables.c 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/edfmt.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/init.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/loop.c 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/Makefile 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/misc-revm.c 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/librevm/vm/tables.c 46 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libui/color.c 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libui/Makefile 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libui/readln.c 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/libui/include/libui.h 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/modules/Makefile 865 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/modules/modremap.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/modules/modtest.c 902 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/Makefile 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/README 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/ctors_hijack/ctors_hijack.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/ctors_hijack/hijacked.c 385 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/ctors_hijack/Makefile 663 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/dtors_hijack/dtors_hijack.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/dtors_hijack/hijacked.c 296 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/dtors_hijack/Makefile 713 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg/e2dbg 792 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg/host.c 855 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg/Makefile 751 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg_multithreads/libtest.c 776 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg_multithreads/Makefile 328 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg_multithreads/test2.c 201 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/e2dbg_multithreads/test-threads.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/Makefile 946 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/et_rel2static/host.c 644 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/et_rel2static/Makefile 620 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/et_rel2static/rel.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/et_rel2static/relinject.esh 226 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_e2dbg/e2dbginject.esh 225 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/debug.esh 171 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/etrel_inject.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/gdb.script 132 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/host.c 644 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/Makefile 1000 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/rel.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_extplt/relinject.esh 138 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/.elfsh_history 10 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/etrelmem.esh 103 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/host.c 901 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/Makefile 879 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/myputs.c 167 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_memory/script.sh 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/.elfsh_history 48 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/debug.esh 171 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/etrel_inject.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/gdb.script 132 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/host.c 664 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/Makefile 781 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/rel.c 994 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_original/relinject.esh 163 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_pie-ssp/host.c 644 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_pie-ssp/Makefile 493 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_pie-ssp/relinject.esh 348 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_pie-ssp/simple.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_static/host.c 375 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_static/Makefile 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_static/rel2.c 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel_static/relinject.esh 234 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel4alpha/gdb.script 292 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel4alpha/host1.c 507 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel4alpha/host2.c 517 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/etrel_inject/etrel4alpha/host3.c 626 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/flowjack/infected.c 287 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/flowjack/patch.esh 332 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/flowjack/recursivite.c 365 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/flowjack/target 11 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/flowjack/target.c 459 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/got_hijack/got_hijack.c 1011 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/got_hijack/hijacked.c 176 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/got_hijack/Makefile 658 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/hash_retreive/hash_read.c 795 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/hash_retreive/main.c 130 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/hash_retreive/Makefile 654 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/mjollnir/simple-test.esh 98 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_fillbss_injection/main.c 430 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_fillbss_injection/Makefile 660 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_fillbss_injection/section_inject.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_index_injection/main.c 88 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_index_injection/Makefile 741 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_index_injection/section_inject.c 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_top_injection/main.c 524 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_top_injection/Makefile 706 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_top_injection/section_inject.c 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_unmapped_injection/main.c 408 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_unmapped_injection/Makefile 660 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sct_unmapped_injection/section_inject.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_rebuild/Makefile 623 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_rebuild/README 93 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_rebuild/sht_rebuild.c 989 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_stripping/main.c 408 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_stripping/Makefile 682 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/sht_stripping/sht_removing.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/symbolic_tracing/Makefile 465 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/symtab_extend/execve.s 591 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/symtab_extend/main.c 126 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/symtab_extend/Makefile 731 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/symtab_extend/symtab_extend.c 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/doublevar.esh 205 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/endian.esh 134 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/flush.esh 185 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/foreach-ending.esh 399 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/foreach-tests.esh 842 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/graph-tests.esh 94 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/insert_tests.esh 171 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/loop.esh 684 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/myparams.esh 322 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/params.esh 314 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/params2.esh 118 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/regression-tests.esh 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/remap_script.esh 123 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/script-tables.esh 620 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/script-types.esh 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/strings_tests.esh 948 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/test-multidim-arrays.c 349 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Source Code/elfsh/elfsh/testsuite/testscripts/trace.esh 328 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vanegue-Panel=/Whitepaper/bh-eu-07-vanegue-WP.pdf 325 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vipin-Nitin Kumar/Presentation/bh-eu-07-kumar.pdf 165 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Vipin-Nitin Kumar/Whitepaper/bh-eu-07-Kumar-WP.pdf 608 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Whitehouse/Presentation/bh-eu-07-whitehouse.pdf 1.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Whitehouse/Whitepaper/bh-eu-07-whitehouse-WP-1.pdf 525 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Whitehouse/Whitepaper/bh-eu-07-whitehouse-WP-2.pdf 976 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/ChangeLog 81 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/LICENSE 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/Makefile 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/pmcheck.py 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/pmdata.py 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/pmproxy.py 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/pmutil.py 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/proxmon.py 16 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/README 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/setup.nsi 9 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/setup.py 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/transaction.py 8 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/urltesting.py 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/doc/Makefile 759 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/doc/proxmon.pdf 248 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/bad_directories.cfg 61 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/bad_directories.py 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/bad_files.cfg 311 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/bad_files.py 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/comment_warn.cfg 221 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/comment_warn.py 737 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/cookie_sent_on_qs.py 776 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/cookie_summary.py 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/dir_listing.py 961 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/http_auth.py 486 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/id_framework_passive.cfg 514 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/id_framework_passive.py 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/js_warn.cfg 423 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/js_warn.py 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/nop.py 63 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/offsite_redirect.py 623 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/query_summary.py 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/secure_cookies_sent_clear.py 527 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/ssl_config.py 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/ssl_val_sent_clear.py 545 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/value_sent_thirdparty.py 613 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/modules/writable_dir.py 1005 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/proxmon-1.0.14/proxies/webscarab.py 6 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Source Code/win32 ver/proxmon-1.0.14.exe 3.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Wilkins/Whitepaper/bh-eu-07-wilkins-WP.pdf 251 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Zanero/Presentation/bh-eu-07-zanero.pdf 373 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/EUROPE Updated Materials/Zanero/Whitepaper/bh-eu-07-zanero-WP.pdf 281 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Fucs, Paes de Barros, Pereira/Presentation/bh-eu-07-barros.pdf 526 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Fucs, Paes de Barros, Pereira/Whitepaper/bh-eu-07-barros-WP.pdf 259 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Kortchinsky/Presentation/bh-eu-07-kortchinsky.pdf 274 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Kortchinsky/Whitepaper/bh-eu-07-kortchinsky-WP.pdf 510 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Kureha/Presentation/bh-eu-07-chess-kureha.ppt 1012 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Kureha/Whitepaper/bh-eu-07-chess-kureha-WP.pdf 326 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Langlois/Presentation/bh-eu-07-langlois.pdf 724 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Langlois/Presentation/bh-eu-07-langlois.ppt 1.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Langlois/Whitepaper/bh-eu-07-langlois-WP.pdf 184 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Laurie/Presentation/bh-eu-07-laurie.pdf 1.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Luiz_Ramos/Presentation/bh-eu-07-luiz_ramos.pdf 364 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Luiz_Ramos/Whitepaper/bh-eu-07-luiz_ramos-References.txt 783 B
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Luiz_Ramos/Whitepaper/bh-eu-07-luiz_ramos-WP.pdf 162 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Maynor-Graham/Presentation/bh-eu-07-maynor-graham.pdf 811 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Maynor-Graham/Whitepaper/bh-eu-07-maynor-graham-WP.pdf 84 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Mora/Presentation/bh-eu-07-mora.pdf 303 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Mora/Whitepaper/bh-eu-07-mora-WP.pdf 133 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Nunez Di Croce/sapyto-0.9.rar 86 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Sotirov/Sotirov-source code.rar 4 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Sotirov/Presentation/bh-eu-07-sotirov.pdf 203 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Sotirov/Whitepaper/bh-eu-07-sotirov-WP.pdf 164 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Vanegue-Panel/elfsh.rar 1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Vanegue-Panel/Presentation/bh-eu-07-vanegue.pdf 343 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Vanegue-Panel/Presentation/bh-eu-07-vanegue.ppt 1.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Vanegue-Panel/Whitepaper/bh-eu-07-vanegue-WP.pdf 321 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Vipin-Nitin Kumar/Presentation/bh-eu-07-kumar.pdf 165 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Vipin-Nitin Kumar/Whitepaper/bh-eu-07-Kumar-WP.pdf 608 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Whitehouse/Presentation/bh-eu-07-whitehouse.pdf 1.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Whitehouse/Whitepaper/bh-eu-07-whitehouse-WP-1.pdf 525 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Whitehouse/Whitepaper/bh-eu-07-whitehouse-WP-2.pdf 976 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Wilkins/wilkins- Source Code.rar 3.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Wilkins/Whitepaper/bh-eu-07-wilkins-WP.pdf 251 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Zanero/Presentation/bh-eu-07-zanero.pdf 373 KB
Black Hat/Black Hat Europe/Black Hat Europe 2007/Presentations/Zanero/Whitepaper/bh-eu-07-zanero-WP.pdf 281 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 1 8.mp4 6.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 1 8.srt 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 2 8.mp4 7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 2 8.srt 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 3 8.mp4 7.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 4 8.mp4 6.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 4 8.srt 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 5 8.mp4 7.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 6 8.mp4 7.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 6 8.srt 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 7 8.mp4 6.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 7 8.srt 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/An Attack Tool for Launching Attacks against Sensor Networks 8 8.mp4 6.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 1 7.mp4 5.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 1 7.srt 14 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 2 7.mp4 5.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 2 7.srt 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 3 7.mp4 5.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 3 7.srt 16 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 4 7.mp4 5.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 4 7.srt 16 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 5 7.mp4 5.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 5 7.srt 16 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 6 7.mp4 6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 6 7.srt 14 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 7 7.mp4 1.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Changing Threats To Privacy - From TIA to Google 7 7.srt 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 1 7.mp4 6.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 1 7.srt 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 2 7.mp4 6.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 2 7.srt 14 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 3 7.mp4 6.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 3 7.srt 14 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 4 7.mp4 5.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 4 7.srt 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 5 7.mp4 8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 5 7.srt 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 6 7.mp4 7.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 6 7.srt 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 7 7.mp4 548 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Next Generation Clickjacking 7 7.srt 821 B
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 1 7.mp4 5.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 1 7.srt 17 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 2 7.mp4 6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 2 7.srt 16 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 3 7.mp4 6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 3 7.srt 16 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 4 7.mp4 6.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 4 7.srt 16 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 5 7.mp4 6.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 5 7.srt 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 6 7.mp4 6.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 6 7.srt 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 7 7.mp4 710 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Security the Facebook Way 7 7.srt 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 1 8.mp4 6.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 1 8.srt 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 2 8.mp4 6.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 2 8.srt 14 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 3 8.mp4 6.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 3 8.srt 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 4 8.mp4 7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 4 8.srt 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 5 8.mp4 7.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 5 8.srt 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 6 8.mp4 7.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 6 8.srt 12 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 7 8.mp4 6.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 7 8.srt 13 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 8 8.mp4 725 KB
Black Hat/Black Hat Europe/Black Hat Europe 2010/Video/Steganography and Vulnerabilities in Popular Archives Formats 8 8.srt 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Andreas_Wiegenstein/BlackHat_EU_2011_Wiegenstein_The_ABAP_Underverse-Slides.pdf 770 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Andreas_Wiegenstein/BlackHat_EU_2011_Wiegenstein_The_ABAP_Underverse-WP.pdf 559 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Andres_Riancho/BlackHat_EU_2011_Riancho_Web_App-Slides.pdf 1.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Andres_Riancho/BlackHat_EU_2011_Riancho_Web_App-WP.pdf 638 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Claudio_Criscione/BlackHat_EU_2011_Criscione_VirtualizationFailures-Slides.pdf 4.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Claudio_Criscione/BlackHat_EU_2011_Criscione_VirtualizationFailures-WP.pdf 295 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Damir_Rajnovic/BlackHat_EU_2011_Rajnovic_Monoculture-WP.pdf 255 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/George_Hedfors/BlackHat_EU_2011_Hedfors_Owning_the_datacenter-Slides.pdf 10.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/George_Hedfors/BlackHat_EU_2011_Hedfors_Owning_the_datacenter-WP.pdf 99 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Jason_Geffner/BlackHat_EU_2011_Geffner_Exporting_RSA_Keys-Slides.pdf 1.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Jason_Geffner/BlackHat_EU_2011_Geffner_Exporting_RSA_Keys-WP.pdf 821 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Justin_Searle/BlackHat_EU_2011_Searle_Infrastructure_attack-Slides.pdf 3.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Justin_Searle/BlackHat_EU_2011_Searle_Infrastructure_attack-WP.pdf 14.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Marco_Balduzzi/BlackHat_EU_2011_Balduzzi_HTTP_Parameter-Slides.pdf 3.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Marco_Balduzzi/BlackHat_EU_2011_Balduzzi_HTTP_Parameter-WP.pdf 496 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/BlackHat_EU_2011_Neely_EAPeak-Slides.pdf 2.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/BlackHat_EU_2011_Neely_EAPeak-WP.pdf 766 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/eapeak 5 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/INSTALL 123 B
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/README 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/setup.py 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/data/man/eapeak.1 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/data/man/eapeak.1.gz 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/lib/eapeak/clients.py 2 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/lib/eapeak/misc.py 7 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Matt_Neely/EAPeak-v0.0.4_BH_Europe/lib/eapeak/networks.py 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/BlackHat_EU_2011_Chiriac_Rootkit_detection-Slides.pdf 1.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/BlackHat_EU_2011_Chiriac_Rootkit_detection-WP.pdf 195 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/Tool/KLUP.sys 18 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/Tool/read.me 159 B
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/Tool/test4.exe 52 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/Tool/w2k_lib.dll 48 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Mihai_Chiriac/Tool/w2k_load.exe 20 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Nitesh_Dhanjani/BlackHat_EU_2011_Dhanjani_Attacks_Against_Apples_iOS-WP.pdf 2.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Patroklos_Argyroudis/BlackHat_EU_2011_ArgyroudisGlynos_Kernel_exploitation-Slides.pdf 3.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Patroklos_Argyroudis/BlackHat_EU_2011_ArgyroudisGlynos_Kernel_exploitation-WP.pdf 314 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Rafal_Los/BlackHat_EU_2011_Los_Defying_Logic-Slides.pdf 1.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Rafal_Los/BlackHat_EU_2011_Los_Defying_Logic-WP.pdf 465 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Raul_Siles/BlackHat_EU_2011_Siles_SAP_Session-Slides.pdf 5.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Raul_Siles/BlackHat_EU_2011_Siles_SAP_Session-WP.pdf 4.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Sebastian_Muniz/BlackHat_EU_2011_MunizOrtega_Cisco_iOS-Slides 722 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Sebastian_Muniz/BlackHat_EU_2011_MunizOrtega_Cisco_iOS-WP.pdf 207 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Thomas_Roth/BlackHat_EU_2011_Roth_Breaking_encryptions-Slides.pdf 2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Thomas_Roth/BlackHat_EU_2011_Roth_Breaking_encryptions-WP.pdf 134 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Tom_Keetch/BlackHat_EU_2011_Keetch_Sandboxes-Slides.pdf 476 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Tom_Keetch/BlackHat_EU_2011_Keetch-Sandboxes-WP.pdf 156 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Tom_Parker/BlackHat_EU_2011_Parker_Finger_Pointing_4_FunProfitWar-WP.pdf 36 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Wim_Remes/BlackHat_EU_2011_Remes_Blind_Squinter_rules-Slides.pdf 14 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Wim_Remes/BlackHat_EU_2011_Remes_Blind_Squinter_rules-WP.pdf 134 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/BlackHat_EU_2011_GushinBehar_Building_Floodgates-Slides.pdf 7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/COPYING.txt 34 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/nginx.conf-example 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/README.txt 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/Roboo.pm 22 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/INSTRUCTIONS.txt 213 B
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/SWFCookie.as3proj 3 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/bin/cookie.flr 699 B
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/bin/cookie.fws.swf 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/bin/cookie.swf 956 B
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/obj/SWFCookieConfig.old 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/obj/SWFCookieConfig.xml 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/src/GET.as 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Presentations/Yuri_Gushin/Roboo-0.50-BH/helper-tools/SWFCookie/src/POST.as 1 KB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Video/BlackHat EU 2011 - Keynote - Bruce Schneier.mp4 87.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2011/Video/BlackHat EU 2011 - Keynote - Bruce Schneier.srt 98 KB
Black Hat/Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Andrey Labunets on Windbgshark.mp4 2.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Didier Stevens on PDF Tools.mp4 4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Frank Breedijk on Seccubus.mp4 8.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with James Forshaw on CANAPE.mp4 2.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Jose Esparza on Peepdf.mp4 3.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Serkan Ozkan on CVEdetails.mp4 3.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Sumit Siddarth on Hacking XPath 2.mp4 3.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Tom Forbes on XCAT Xpath Injection.mp4 2.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/ToolsTube/ToolsTube with Xavier Mertens (xme) on Pastemon.mp4 6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/36 Views of Cyberspace.mp4 28.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/A Sandbox Odyssey.mp4 32.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/All Your Calls Are Still Belong to Us - How We Compromised the Cisco VoIP Cr.mp4 32.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/An Assortment of Database Goodies.mp4 9.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/An Attacker s Day into Virology - Human vs Computer.mp4 35.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Apple vs. Google Client Platforms.mp4 42.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Attacking IPv6 Implementation Using Fragmentation.mp4 37.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Beyond Scanning - Automating Web Application Security Tests.mp4 34.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Breeding Sandworms - How To Fuzz Your Way Out of Adobe Reader s Sandbox.mp4 28 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/CANAPE - Bytes Your Bits.mp4 44.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Cyber-Attacks & SAP systems - Is Our Business-Critical Infrastructure Expose.mp4 37.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Data Mining a Mountain of Zero Day Vulnerabilities.mp4 37.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Defending Privacy at the U.S. Border - A Guide for Travelers Carrying Digita.mp4 33.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Dissecting Smart Meters.mp4 37.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Entrapment - Tricking Malware with Transparent, Scalable Malware Analysis.mp4 17.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Finding Needles in Haystacks (The Size of Countries).mp4 54.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/FYI - You ve Got LFI.mp4 28.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/GDI Font Fuzzing in Windows Kernel For Fun.mp4 35.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/GDI Font Fuzzing in Windows Kernel For Fun.srt 51 KB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Hacking XPATH 2.0.mp4 35.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/HDMI - Hacking Displays Made Interesting.mp4 37.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits.mp4 41.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Issues with Embedded Device Disclosures - Helping the Vendors and Recognizin.mp4 28.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/IVR Security- Internal Network Attack via Phone Lines.mp4 36.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/KEYNOTE.mp4 45.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Lotus Domino - Penetration Through the Controller.mp4 36.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Malicious PDF Analysis.mp4 90.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Offensive Threat Modeling for Attackers - Turning Threat Modeling on its Hea.mp4 34.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/One-byte Modification for Breaking Memory Forensic Analysis.mp4 36.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/One-byte Modification for Breaking Memory Forensic Analysis.srt 50 KB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Preventing Oh Shit Moments for 20 Euros or Less.mp4 38.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Secure in 2010 Broken in 2011.mp4 28.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Secure Password Managers and Military-Grade Encryption on Smartphones Oh Re.mp4 35.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Smartphone s Apps Are Not That Smart - Insecure Development Practices.mp4 43.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/SSL TLS Interception Proxies and Transitive Trust.mp4 35.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/The Heavy Metal That Poisoned the Droid.mp4 38 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/The IETF & The Future of Security Protocols - All The Signal, None of the No.mp4 42.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/The Kelihos Botnet.mp4 36.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/The Mobile Exploit Intelligence Project.mp4 47.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/The Pwnage Saga Continues.mp4 46.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/They Ought to Know Better - Exploiting Security Gateways via Their Web Inter.mp4 29.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Workshop - Mobile Network Forensics.mp4 84.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Workshop - SamuraiWTF.mp4 153.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Workshop - Teensy Programming for Everyone.mp4 102.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2012/Video/Workshop - Understanding Botnets By Building One.mp4 73.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/A Perfect CRIME Only TIME Will Tell.mp4 40.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Advanced Heap Manipulation in Windows 8.mp4 48.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Building a Defensive Framework for Medical Device Security.mp4 45.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/DropSmack - How Cloud Synchronization Services Render Your Corporate Firewall.mp4 53.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Dude, Where's My Laptop.mp4 52.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Floating Car Data from Smartphones.mp4 46.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Hacking Appliances - Ironic exploitation of security products.mp4 59.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Hacking Video Conferencing Systems.mp4 44.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Hardening Windows 8 apps for the Windows Store.mp4 53.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Harnessing GPUs - Building Better Browser Based Botnets.mp4 36.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Honeypot That Can Bite - Reverse Penetration.mp4 40.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Huawei - From China with Love.mp4 25.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Hybrid Defense - How to Protect Yourself From Polymorphic 0-days.mp4 44 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Invisibility Purge - Unmasking the Dormant Events of Invisible Web Controls.mp4 34.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Let's Play - Applanting.mp4 39.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Mesh Stalkings-Penetration Testing with Small Networked Devices.mp4 54.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Multiplayer Online Games Insecurity.mp4 47 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Next Generation Mobile Rootkits.mp4 39 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Off Grid communications with Android - Meshing the mobile world.mp4 51.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/OptiSig - Semantic Signature for Metamorphic Malware.mp4 50.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Power Analysis Attacks for Cheapskates.mp4 53.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Practical Attacks Against MDM Solutions.mp4 27.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Practical Exploitation Using A Malicious Service Set Identifier (SSID).mp4 55.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Shelters or Windmills - The Struggle For Power and Information Advantage.mp4 63.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/The Deputies Are Still Confused.mp4 49.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/The M2M Risk Assessment Guide, a Cyber Fast Track Project.mp4 53.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/The Sandbox Roulette - Are You Ready For The Gamble.mp4 49.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/To dock or not to dock, that is the question.mp4 44.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Using D-Space to Open Doors.mp4 46 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/Who's Really Attacking Your ICS Devices.mp4 43.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2013/Video/XML Out-of-Band Data Retrieval.mp4 27.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/A Practical Attack Against VDI Solutions.mp4 27.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Abusing Software Defined Networks.mp4 41.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Abusing Software Defined Networks.srt 68 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.mp4 57.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Analyzing UEFI BIOSes from Attacker & Defender Viewpoints.srt 109 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Android Kernel and OS Security Assessment with Iron Crow.mp4 17.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Android Kernel and OS Security Assessment with Iron Crow.srt 30 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/APTs Way - Evading Your EBNIDS.mp4 36.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Attacking the Linux PRNG on Android.mp4 52.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Attacking the Linux PRNG on Android.srt 68 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Blended Web and Database Attacks on Real-Time, In-Memory Platforms.mp4 51.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Blended Web and Database Attacks on Real-Time, In-Memory Platforms.srt 78 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Bringing a Machete to the Amazon.mp4 48.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Bringing a Machete to the Amazon.srt 78 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Bypassing HTTP Strict Transport Security.mp4 40.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/C11 Metaprogramming Applied to Software Obfuscation.mp4 25.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/C11 Metaprogramming Applied to Software Obfuscation.srt 46 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol.mp4 50.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Charge Your Device with the Latest Malware.mp4 19.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).mp4 44.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Counterfeiting the Pipes with FakeNet 2.0 (Part 1 2).srt 82 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).mp4 16.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Counterfeiting the Pipes with FakeNet 2.0 (Part 2 2).srt 24 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Don t Trust Your USB How to Find Bugs in USB Device Drivers.mp4 25.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/DTM Components - Shadow Keys to the ICS Kingdom.mp4 49.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/DTM Components - Shadow Keys to the ICS Kingdom.srt 65 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Endrun - Secure Digital Communications for Our Modern Dystopia.mp4 51.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Evasion of High-End IDPS Devices at the IPv6 Era.mp4 57.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Evasion of High-End IDPS Devices at the IPv6 Era.srt 77 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Exploring Yosemite - Abusing Mac OS X 10.10.mp4 52.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Exploring Yosemite - Abusing Mac OS X 10.10.srt 64 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service.mp4 41.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Freeze Drying for Capturing Environment-Sensitive Malware Alive.mp4 35.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Freeze Drying for Capturing Environment-Sensitive Malware Alive.srt 44 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Gyrophone - Eavesdropping Using a Gyroscope.mp4 44 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Hack Your ATM with Friend s Raspberry.Py.mp4 35.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Hacking the Wireless World with Software Defined Radio - 2.0.mp4 61.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Hadoop Security - Seven Ways to Kill an Elephant.mp4 58.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Hadoop Security - Seven Ways to Kill an Elephant.srt 127 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Hide Android Applications in Images.mp4 20.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).mp4 52.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Industrial Control Systems - Pentesting PLCs 101 (Part 1 2).srt 69 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).mp4 47.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Industrial Control Systems - Pentesting PLCs 101 (Part 2 2).srt 52 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Lessons Learned from Eight Years of Breaking Hypervisors.mp4 36.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Lights Off The Darkness of the Smart Meters.mp4 58.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Man in the Binder - He Who Controls IPC, Controls the Droid.mp4 32.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Network Attached Shell - N.A.S.ty Systems that Store Network Accessible Shells.mp4 57.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Next Level Cheating and Leveling Up Mitigations.mp4 42.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Next Level Cheating and Leveling Up Mitigations.srt 76 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 1 2).mp4 33.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/PDF Attack - A Journey from the Exploit Kit to the Shellcode (Part 2 2).mp4 43.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare.mp4 49.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Quantum Key Distribution and the Future of Encryption.mp4 28.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Reflected File Download - A New Web Attack Vector.mp4 55 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Reflected File Download - A New Web Attack Vector.srt 65 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/ret2dir - Deconstructing Kernel Isolation.mp4 45 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/ret2dir - Deconstructing Kernel Isolation.srt 94 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Revisiting XSS Sanitization.mp4 65.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Revisiting XSS Sanitization.srt 87 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass.mp4 43.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Scala Security - Examining the Play and LiftWeb Frameworks.mp4 37.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Scala Security - Examining the Play and LiftWeb Frameworks.srt 79 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.mp4 55.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers.srt 87 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/SSL Validation Checking vs. Go(ing) to Fail.mp4 21.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/SSL Validation Checking vs. Go(ing) to Fail.srt 36 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.mp4 29.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/The Power of Pair - One Template that Reveals 100 UAF IE Vulnerabilities.srt 38 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Two Factor Failure.mp4 16.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Two Factor Failure.srt 41 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/WebKit Everywhere - Secure or Not.mp4 26 MB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/WebKit Everywhere - Secure or Not.srt 43 KB
Black Hat/Black Hat Europe/Black Hat Europe 2014/Video/Welcome & Introduction to Black Hat Europe 2014.mp4 62.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05 Berrueta Andres.pdf 1.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05 Cerrudo.pdf 127 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05 Kornbrust.pdf 721 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05 Laurie Herfurt Holtmann.pdf 274 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05 zanero.ppt 437 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Callas.pdf 1.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-deHaas.pdf 3.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Evans.pdf 2.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Farrow.pdf 105 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Fischbach.pdf 120 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Flake.pdf 153 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Geers.pdf 3.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Grand.pdf 771 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Kaminsky.pdf 399 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Klein Sprundel.pdf 123 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Long.pdf 6.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Oudot.pdf 160 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Sensepost.pdf 2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Shah.pdf 150 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH EU 05-Wheeler Mehta.pdf 32 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH_EU_05-Berrueta_Andres.rar 4.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH_EU_05-Cerrudo.rar 33 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH_EU_05-Kornbrust.rar 198 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/BH_EU_05-Oudot.rar 40 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-callas-up.pdf 177 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-etisalat invoice.pdf 249 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-evans-up.pdf 3.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-farrow.pdf 218 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-fischbach.pdf 2.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-geers-up.pdf 4.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-grugq.pdf 329 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-litchfield.pdf 238 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-sensepost.pdf 1.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-simmonds.pdf 225 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-trifinite-up.pdf 468 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-wheeler-mehta-up.pdf 61 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/bh-eu-05-zanero.pdf 455 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Presentations/Whitepaper Blueprinting Mulliner Herfurt.pdf 381 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/(In-)Security of Backend-As-A-Service.mp4 52.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/(In-)Security of Backend-As-A-Service.srt 68 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/A Peek Under the Blue Coat.mp4 54.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/A Peek Under the Blue Coat.srt 62 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/All your Root Checks Belong To Us - The Sad State of Root Detection.mp4 21.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/All your Root Checks Belong To Us - The Sad State of Root Detection.srt 39 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Androbugs Framework - An Android Application Security Vilnerability Scanner.mp4 56.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Androbugs Framework - An Android Application Security Vilnerability Scanner.srt 41 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Attacking The XNU Kernel In El Capitain.mp4 36 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Attacking The XNU Kernel In El Capitain.srt 35 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Authenticator Leakage Through Backup Channels on Android.mp4 29.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Authenticator Leakage Through Backup Channels on Android.srt 40 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Automating Linux Malware Analysis Using Limon Sandbox.mp4 65.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Breaking Access Controls with Blekey.mp4 45.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Breaking Access Controls with Blekey.srt 57 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Bypassing Local Windows Authentication To Defeat Full Disk Encryption.mp4 26.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Bypassing Local Windows Authentication To Defeat Full Disk Encryption.srt 34 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.mp4 63.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Bypassing Self-Encrypting Drives (SED) in Enterprise Environments.srt 79 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Commix - Detecting and Exploiting Command Injection Flaws.mp4 19.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Commix - Detecting and Exploiting Command Injection Flaws.srt 18 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.mp4 72.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Continuous Intrusion - Why CI Tools Are An Attacker s Best Friends.srt 49 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Cybercrime in The Deep Web.mp4 55.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Cybercrime in The Deep Web.srt 58 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.mp4 56.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Cybersecurity for Oil and Gas Industries - How Hackers Can Manipulate Oil Stocks.srt 51 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Defending Against Malicious Application Compatibility Shims.mp4 38.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Even The Lastpass Will Be Stolen, Deal With It.mp4 52.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Even The Lastpass Will Be Stolen, Deal With It.srt 61 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Exploiting Adobe Flash Player In The Era Of Control Flow Guard.mp4 38.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Exploiting Adobe Flash Player In The Era Of Control Flow Guard.srt 59 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.mp4 38.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Faux Disk Encryption - Realities of Secure Storage On Mobile Devices.srt 77 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.mp4 35.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Fuzzing Android - A Recipe For Uncovering Vulnerabilities Inside System Components In Android.srt 46 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Going Auth The Rails On A Crazy Train.mp4 50.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Going Auth The Rails On A Crazy Train.srt 76 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Hey Man, Have You Forgotten To Intialize Your Memory.mp4 38.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Hey Man, Have You Forgotten To Intialize Your Memory.srt 34 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Hiding In Plain Sight - Advances In Malware Covert Communication Channels.mp4 50.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Hiding In Plain Sight - Advances In Malware Covert Communication Channels.srt 68 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/How To Break XML Encryption - Automatically.mp4 32.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/How To Break XML Encryption - Automatically.srt 15 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Implementing Practical Electrical Glitching Attacks.mp4 26.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Implementing Practical Electrical Glitching Attacks.srt 39 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Is Your Timespace Safe - Time and Position Spoofing Opensourcely.mp4 27.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Is Your Timespace Safe - Time and Position Spoofing Opensourcely.srt 28 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Keynote - What Got Us Here Wont Get Us There.mp4 97.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Keynote - What Got Us Here Wont Get Us There.srt 74 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Lessons From Defending The Indefensible.mp4 19.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Lessons From Defending The Indefensible.srt 39 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.mp4 97.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2015.srt 53 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/LTE & IMSI Catcher Myths.mp4 44.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/LTE & IMSI Catcher Myths.srt 72 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.mp4 43.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/New (And Newly - Changed) Fully Qualified Doman Names - A View of Worldwide Changes to DNS.srt 73 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.mp4 10.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels.srt 10 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.mp4 84.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Panel - What You Need To Know About The Changing Regulatory Landscape In Information Security.srt 70 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Self-Driving and Connected Cars - Fooling Sensors and Tracking Drivers.mp4 70.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Silently Breaking ASLR In The Cloud.mp4 45.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Stegospolit - Exploit Delivery With Steganography and Polyglots.mp4 69.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Stegospolit - Exploit Delivery With Steganography and Polyglots.srt 58 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Triaging Crashed With Backward Taint Analysis For Arm Architecture.mp4 17.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Triaging Crashed With Backward Taint Analysis For Arm Architecture.srt 18 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.mp4 56.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Unboxing The White-Box - Practical Attacks Against Obfuscated Ciphers.srt 54 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/VOIP Wars - Destroying Jar Jar Lync.mp4 65.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Vulnerability Exploitation In Docker Container Environments.mp4 42.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Vulnerability Exploitation In Docker Container Environments.srt 52 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.mp4 64.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Watching The Watchdog - Protecting Kerberos Authentication With Network Monitoring.srt 50 KB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Your Scripts In My Page - What Could Possibly Go Wrong.mp4 31.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2015/Videos/Your Scripts In My Page - What Could Possibly Go Wrong.srt 34 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Abbasi-Ghost-In-The-PLC-Designing-An-Undetectable-Programmable-Logic-Controller-Rootkit.pdf 151.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Abbasi-Ghost-In-The-PLC-Designing-An-Undetectable-Programmable-Logic-Controller-Rootkit-wp.pdf 800 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Ahlberg-Chasing-Foxes-By-The-Numbers-Patterns-Of-Life-And-Activity-In-Hacker-Forums.pdf 22.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Argyros-Another-Brick-Off-The-Wall-Deconstructing-Web-Application-Firewalls-Using-Automata-Learning.pdf 10.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Argyros-Another-Brick-Off-The-Wall-Deconstructing-Web-Application-Firewalls-Using-Automata-Learning-wp.pdf 1.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Bazaliy-Mobile-Espionage-in-the-Wild-Pegasus-and-Nation-State-Level-Attacks.pdf 33.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Beery-Grady-Cyber-Judo-Offensive-Cyber-Defense.pdf 7.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Brossard-Witchcraft-Compiler-Collection-Towards-Self-Aware-Computer-Programs-wp.pdf 1.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-David-Code-Deobfuscation-Intertwining-Dynamic-Static-And-Symbolic-Approaches.pdf 1.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Donenfeld-Stumping-The-Mobile-Chipset-wp.pdf 1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Dubin-I-Know-What-You-Saw-Last-Minute-The-Chrome-Browser-Case.pdf 1.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Dubin-I-Know-What-You-Saw-Last-Minute-The-Chrome-Browser-Case-WP.pdf 1.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Goktas-Bypassing-Clangs-SafeStack.pdf 2.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Gonzalez-How-To-Fool-An-ADC-Part-II-Or-Hiding-Destruction-Of-Turbine-With-A-Little-Help-Of-Signal-Processing.pdf 16.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Holtmanns-Detach-Me-Not.pdf 3.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Hovor-Automating-Incident-Investigations-Sit-Back-And-Relax-Bots-Are-Taking-Over.pdf 6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Jurczyk-Effective-File-Format-Fuzzing-Thoughts-Techniques-And-Results.pdf 6.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Karakostas-Ctx-Eliminating-BREACH-With-Context-Hiding.pdf 2.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Karakostas-Ctx-Eliminating-BREACH-With-Context-Hiding-wp.pdf 151 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes.pdf 3.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes-wp.pdf 1.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Lewman-Narcos-Counterfeiters-And-Scammers-An-Approach-To-Visualize-Illegal-Markets.pdf 10.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Liang-Attacking-Windows-By-Windows.pdf 606 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy.pdf 1.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf 764 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Li-When-Virtualization-Encounters-AFL-A-Portable-Virtual-Device-Fuzzing-Framework-With-AFL.pdf 2.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Li-When-Virtualization-Encounters-AFL-A-Portable-Virtual-Device-Fuzzing-Framework-With-AFL-wp.pdf 677 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Maggi-Pocket-Sized-Badness-Why-Ransomware-Comes-As-A-Plot-Twist-In-The-Cat-Mouse-Game.pdf 6.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Mavroudis-Talking-Behind-Your-Back-Attacks-And-Countermeasures-Of-Ultrasonic-Cross-Device-Tracking.pdf 4.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-OHanlon-WiFi-IMSI-Catcher.pdf 2.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Paquet-Clouston-Ego-Market_When-Greed-for-Fame-Benefits-Large-Scale-Botnets.pdf 4.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Paquet-Clouston-Ego-Market_When-Greed-for-Fame-Benefits-Large-Scale-Botnets-wp.pdf 1.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Razavi-Flip-Feng-Shui-Rowhammering-The-VMs-Isolation.pdf 14.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Razavi-Flip-Feng-Shui-Rowhammering-The-VMs-Isolation-wp.pdf 176 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Reshetova-Randomization-Can't-Stop-BPF-JIT-Spray-wp.pdf 317 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem.pdf 3.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-wp.pdf 1.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf 2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Sintsov-Pen-Testing-Vehicles-With-Cantoolz.pdf 10 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Sullivan-Towards-A-Policy-Agnostic-Control-Flow-Integrity-Implementation.pdf 3.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Taft-GPU-Security-Exposed.pdf 134 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Tenaglia-Breaking-Bhad-Abusing-Belkin-Home-Automation-Devices.pdf 13.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Timmers-Bypassing-Secure-Boot-Using-Fault-Injection.pdf 4.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Valeros-50-Thousand-Needles-In-5-Million-Haystacks-Understanding-Old-Malware-Tricks-To-Find-New-Malware-Families.pdf 8.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Venable-Breaking-Big-Data-Evading-Analysis-Of-The-Metadata-Of-Your-Life.pdf 14.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Wang-AI-Based-Antivirus-Can-Alphaav-Win-The-Battle-In-Which-Man-Has-Failed.pdf 5.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Wen-Use-After-Use-After-Free-Exploit-UAF-By-Generating-Your-Own.pdf 6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Wen-Use-After-Use-After-Free-Exploit-UAF-By-Generating-Your-Own-wp.pdf 1.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Yang-Signing-Into-Billion-Mobile-Apps-Effortlessly-With-OAuth20.pdf 2.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/presentations/eu-16-Yang-Signing-Into-Billion-Mobile-Apps-Effortlessly-With-OAuth20-wp.pdf 374 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/(Pen)Testing Vehicles with CANToolz.eng.srt 96 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/(Pen)Testing Vehicles with CANToolz.mp4 65.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.eng.srt 77 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/50 Thousand Needles in 5 Million Haystacks - Understanding Old Malware Tricks.mp4 62.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.eng.srt 37 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/AI based Antivirus - Can AlphaAV Win the Battle in which Man Has Failed.mp4 31.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Another Brick Off the Wall - Deconstructing Web Application Firewalls Using Automata Learning.mp4 35.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.eng.srt 70 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/ARMageddon - How Your Smartphone CPU Breaks Software-Level Security and Privacy.mp4 39.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Attacking Windows by Windows.eng.srt 45 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Attacking Windows by Windows.mp4 40.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Automating Incident Response.mp4 65.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.eng.srt 71 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Backslash Powered Scanning - Hunting Unknown Vulnerability Classes.mp4 35.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Breaking BHAD - Abusing Belkin Home Automation Devices.eng.srt 100 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Breaking BHAD - Abusing Belkin Home Automation Devices.mp4 63.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Breaking Big Data - Evading Analysis of the Metadata of Your Life.eng.srt 66 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Breaking Big Data - Evading Analysis of the Metadata of Your Life.mp4 32.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Bypassing Clang's SafeStack for Fun and Profit.eng.srt 52 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Bypassing Clang's SafeStack for Fun and Profit.mp4 34.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Bypassing Secure Boot Using Fault Injection.mp4 29.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.eng.srt 50 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Chasing Foxes by the Numbers - Patterns of Life and Activity in Hacker Forums.mp4 29.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.eng.srt 70 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches.mp4 38 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/CTX - Eliminating BREACH with Context Hiding.eng.srt 62 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/CTX - Eliminating BREACH with Context Hiding.mp4 35.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Cyber Judo - Offensive Cyber Defense.mp4 41.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Cyber Judo Offensive Cyber Defense.eng.srt 66 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk.eng.srt 83 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk.mp4 70.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/DRAMA - How Your DRAM Becomes a Security Problem.eng.srt 85 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/DRAMA - How Your DRAM Becomes a Security Problem.mp4 35.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Effective File Format Fuzzing - Thoughts, Techniques and Results.eng.srt 82 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Effective File Format Fuzzing - Thoughts, Techniques and Results.mp4 48.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.eng.srt 92 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/EGO MARKET - When People's Greed for Fame Benefits Large-Scale Botnets.mp4 41.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Flip Feng Shui - Rowhammering the VM's Isolation.eng.srt 93 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Flip Feng Shui - Rowhammering the VM's Isolation.mp4 42.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.eng.srt 88 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Ghost in the PLC - Designing an Undetectable Programmable Logic Controller Rootkit.mp4 59.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/GPU Security Exposed.eng.srt 37 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/GPU Security Exposed.mp4 26.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing.eng.srt 83 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing.mp4 52 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/I Know What You Saw Last Minute - The Chrome Browser Case.eng.srt 43 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/I Know What You Saw Last Minute - The Chrome Browser Case.mp4 23.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Inside Web Attacks - The Real Payloads.eng.srt 29 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Inside Web Attacks - The Real Payloads.mp4 13.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Locknote - Conclusions and Key Takeaways from Black Hat Europe 2016.mp4 99.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Locknote Conclusions and Key Takeaways from Black Hat Europe 2016.eng.srt 90 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.eng.srt 84 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Mobile Espionage in the Wild - Pegasus and Nation-State Level Attacks.mp4 56.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.eng.srt 57 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Narcos, Counterfeiters and Scammers - An Approach to Visualize Illegal Markets.mp4 29.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.eng.srt 89 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game.mp4 38 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Randomization Can't Stop BPF JIT Spray.eng.srt 48 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Randomization Can't Stop BPF JIT Spray.mp4 29.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.eng.srt 88 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Real-World Post-Quantum Cryptography - Introducing the OpenQuantumSafe Software Project.mp4 51.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Rooting EVERY Android - From Extension to Exploitation.eng.srt 62 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Rooting EVERY Android - From Extension to Exploitation.mp4 38.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0.mp4 26 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Stumping the Mobile Chipset.eng.srt 55 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Stumping the Mobile Chipset.mp4 47.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.eng.srt 97 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Talking Behind Your Back - Attacks and Countermeasures of Ultrasonic Cross-Device Tracking.mp4 65.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Towards a Policy-Agnostic Control-Flow Integrity Implementation.eng.srt 81 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Towards a Policy-Agnostic Control-Flow Integrity Implementation.mp4 61.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Use-After-Use-After-Free - Exploit UAF by Generating Your Own.eng.srt 60 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Use-After-Use-After-Free - Exploit UAF by Generating Your Own.mp4 35.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.eng.srt 33 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/When Virtualization Encounter AFL - A Portable Virtual Device Fuzzing Framework with AFL.mp4 27.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/WiFi-Based IMSI Catcher.eng.srt 96 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/WiFi-Based IMSI Catcher.mp4 56.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Witchcraft Compiler Collection - Towards Self Aware Computer Programs.eng.srt 73 KB
Black Hat/Black Hat Europe/Black Hat Europe 2016/videos/Witchcraft Compiler Collection - Towards Self Aware Computer Programs.mp4 56.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Ablon-Zero-Days-Thousands-Of-Nights-The-Life-And-Times-Of-Zero-Day-Vulnerabilities-And-Their-Exploits.pdf 2.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Arnaboldi-Exposing-Hidden-Exploitable-Behaviors-In-Programming-Languages-Using-Differential-Fuzzing.pdf 8.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Arnaboldi-Exposing-Hidden-Exploitable-Behaviors-In-Programming-Languages-Using-Differential-Fuzzing-wp.pdf 1.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Atch-Exfiltrating-Reconnaissance-Data-From-Air-Gapped-Ics-Scada-Networks.pdf 3.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Atkinson-A-Process-Is-No-One-Hunting-For-Token-Manipulation.pdf 24.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Atkinson-A-Process-Is-No-One-Hunting-For-Token-Manipulation-wp.pdf 2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Bazaliy-Jailbreaking-Apple-Watch.pdf 3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Berta-Breaking-Out-HSTS-And-HPKP-On-Firefox-IE-Edge-And-Possibly-Chrome.pdf 4.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Blanco-WI-FI-Direct-To-Hell-Attacking-WI-FI-Direct-Protocol-Implementations.pdf 5.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Blanco-WI-FI-Direct-To-Hell-Attacking-WI-FI-Direct-Protocol-Implementations-wp.pdf 77 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Burney-Becoming-You-A-Glimpse-Into-Credential-Abuse.pdf 977 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Chen-Self-Verifying-Authentication-A-Framework-For-Safer-Integrations-Of-Single-Sign-On-Services.pdf 1.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Corina-Difuzzing-Android-Kernel-Drivers.pdf 2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Corina-Difuzzing-Android-Kernel-Drivers-wp.pdf 1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu17-Crumbaugh-How-To-Rob-A-Bank-Over-The-Phone.pdf 17.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Donenfeld-Rooten-Apples-Vulnerability-Heaven-In-The-IOS-Sandbox.pdf 3.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Donenfeld-Rooten-Apples-Vulnerability-Heaven-In-The-IOS-Sandbox-wp.pdf 459 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Elaassal-Dealing-The-Perfect-Hand-Shuffling-Memory-Blocks-On-ZOS.pdf 2.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Filiol-By-Design-Backdooring-Of-Encryption-System-Can-We-Trust-Foreign-Encryption-Algorithms.pdf 2.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine.pdf 1.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine-wp.pdf 1010 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Grushcovski-GDPR-And-Third-Party-JS-Can-It-Be-Done.pdf 1.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Harit-Breaking-Bad-Stealing-Patient-Data-Through-Medical-Devices.pdf 38.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Heelan-Heap-Layout-Optimisation-For-Exploitation.pdf 2.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Heelan-Heap-Layout-Optimisation-For-Exploitation-wp.pdf 289 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Kropotov-Enraptured-Minds-Strategic-Gaming-Of-Cognitive-Mindhacks.pdf 7.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Lei-The-Spear-To-Break -The-Security-Wall-Of-S7CommPlus.pdf 1.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Lei-The-Spear-To-Break -The-Security-Wall-Of-S7CommPlus-wp.pdf 1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Levomaki-Automatic-Discovery-Of-Evasion-Vulnerabilities-Using-Targeted-Protocol-Fuzzing.pdf 1.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Levomaki-Automatic-Discovery-Of-Evasion-Vulnerabilities-Using-Targeted-Protocol-Fuzzing-wp.pdf 91 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf 1.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Ma-How-Samsung-Secures-Your-Wallet-And-How-To-Break-It.pdf 3.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Mandal-The-Great-Escapes-Of-Vmware-A-Retrospective-Case-Study-Of-Vmware-G2H-Escape-Vulnerabilities.pdf 5.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Meyer-Attacks-Against-GSMAS-M2M-Remote-Provisioning.pdf 2.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Meyer-Attacks-Against-GSMAS-M2M-Remote-Provisioning-wp.pdf 296 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Miller-CALDERA-Automating-Adversary-Emulation.pdf 4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Mulliner-Inside-Androids-SafetyNet-Attestation.pdf 1.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Mulliner-Inside-Androids-SafetyNet-Attestation-wp.pdf 55 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Polino-Hiding-Pins-Artifacts-To-Defeat-Evasive-Malware.pdf 1.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Rouch-A-Universal-Controller-To-Take-Over-A-Z-Wave-Network.pdf 4.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Rouch-A-Universal-Controller-To-Take-Over-A-Z-Wave-Network-wp.pdf 293 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Rutkowska-Security-Through-Distrusting.pdf 9.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Schmidt-Attacking-Next-Gen-Roaming-Networks.pdf 5.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Seri-BlueBorne-A-New-Class-Of-Airborne-Attacks-Compromising-Any-Bluetooth-Enabled-Linux-IoT-Device.pdf 3.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Seri-BlueBorne-A-New-Class-Of-Airborne-Attacks-Compromising-Any-Bluetooth-Enabled-Linux-IoT-Device-wp.pdf 2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Shen-Nation-State Moneymules-Hunting-Season-APT-Attacks-Targeting-Financial-Institutions.pdf 2.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Shuster-Passive-Fingerprinting-Of-HTTP2-Clients.pdf 25.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Shuster-Passive-Fingerprinting-Of-HTTP2-Clients-wp.pdf 833 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Sklyarov-Intel-ME-Flash-File-System-Explained.pdf 2.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Sklyarov-Intel-ME-Flash-File-System-Explained-wp.pdf 470 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Smith-The-Apple-Of-Your-EFI-An-Updated-Analysis-Of-The-State-Of-Apples-EFI-Security-Support.pdf 8.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Smith-The-Apple-Of-Your-EFI-An-Updated-Analysis-Of-The-State-Of-Apples-EFI-Security-Support-wp.pdf 1000 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Tang-Clkscrew-Exposing-The-Perils-Of-Security-Oblivious-Energy-Management.pdf 20.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Tang-Clkscrew-Exposing-The-Perils-Of-Security-Oblivious-Energy-Management-wp.pdf 1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Thompson-Red-Team-Techniques-For-Evading-Bypassing-And-Disabling-MS-Advanced-Threat-Protection-And-Advanced-Threat-Analytics.pdf 6.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Vanhoef-Key-Reinstallation-Attacks-Breaking-The-WPA2-Protocol.pdf 1.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Vanhoef-Key-Reinstallation-Attacks-Breaking-The-WPA2-Protocol-wp.pdf 155 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Vasilomanolakis-I-Trust-My-Zombies-A-Trust-Enabled-Botnet.pdf 2.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Vasilomanolakis-I-Trust-My-Zombies-A-Trust-Enabled-Botnet-wp.pdf 16.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/presentations/eu-17-Wong-Fed-Up-Getting-Shattered-And-Log-Jammed-A-New-Generation-Of-Crypto-Is-Coming.pdf 4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/A Process is No One - Hunting for Token Manipulation.eng.srt 175 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/A Process is No One - Hunting for Token Manipulation.mp4 34.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities.eng.srt 151 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities.mp4 38.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/A Universal Controller to Take Over a Z-Wave Network.eng.srt 47 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/A Universal Controller to Take Over a Z-Wave Network.mp4 12.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Attacking NextGen Roaming Networks.eng.srt 129 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Attacking NextGen Roaming Networks.mp4 35.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Attacks Against GSMA's M2M Remote Provisioning.eng.srt 61 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Attacks Against GSMA's M2M Remote Provisioning.mp4 20.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing.eng.srt 90 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing.mp4 35.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Becoming You - A Glimpse Into Credential Abuse.eng.srt 82 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Becoming You - A Glimpse Into Credential Abuse.mp4 23.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux IoT Device.eng.srt 141 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux IoT Device.mp4 59.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Breaking Bad - Stealing Patient Data Through Medical Devices.eng.srt 155 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Breaking Bad - Stealing Patient Data Through Medical Devices.mp4 47.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Breaking Out HSTS (and HPKP) On Firefox, IE Edge and (Possibly) Chrome.eng.srt 98 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Breaking Out HSTS (and HPKP) On Firefox, IE Edge and (Possibly) Chrome.mp4 33.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms.eng.srt 106 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms.mp4 50.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/CALDERA - Automating Adversary Emulation.eng.srt 143 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/CALDERA - Automating Adversary Emulation.mp4 35.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/CLKscrew - Exposing The Perils of Security-Oblivious Energy Management.eng.srt 157 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/CLKscrew - Exposing The Perils of Security-Oblivious Energy Management.mp4 35.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Day 1 Keynote - Diplomacy and Combating Evolving International Cyber Threats.eng.srt 186 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Day 1 Keynote - Diplomacy and Combating Evolving International Cyber Threats.mp4 96.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Day 2 Keynote - Security Through Distrusting.eng.srt 118 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Day 2 Keynote - Security Through Distrusting.mp4 65.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Dealing The Perfect Hand - Shuffling Memory Blocks On z OS.eng.srt 143 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Dealing The Perfect Hand - Shuffling Memory Blocks On z OS.mp4 29.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/DIFUZE - Android Kernel Driver Fuzzing.eng.srt 154 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/DIFUZE - Android Kernel Driver Fuzzing.mp4 26.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Enraptured Minds - Strategic Gaming of Cognitive Mindhacks.eng.srt 122 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Enraptured Minds - Strategic Gaming of Cognitive Mindhacks.mp4 51.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Exfiltrating Reconnaissance Data from Air-Gapped ICS SCADA Networks.eng.srt 104 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Exfiltrating Reconnaissance Data from Air-Gapped ICS SCADA Networks.mp4 31.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing.eng.srt 66 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing.mp4 17.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming.eng.srt 138 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming.mp4 26.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/GDPR and Third Party JS - Can It Be Done.eng.srt 70 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/GDPR and Third Party JS - Can It Be Done.mp4 17.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Heap Layout Optimisation for Exploitation.eng.srt 117 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Heap Layout Optimisation for Exploitation.mp4 20.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Hiding PIN's Artifacts to Defeat Evasive Malware.eng.srt 119 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Hiding PIN's Artifacts to Defeat Evasive Malware.mp4 34.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/How Samsung Secures Your Wallet and How To Break It.eng.srt 106 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/How Samsung Secures Your Wallet and How To Break It.mp4 38.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine.eng.srt 72 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine.mp4 34.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement.eng.srt 121 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/How to Rob a Bank over the Phone - Lessons Learned from an Actual Social Engineering Engagement.mp4 43.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/I Trust My Zombies - A Trust-Enabled Botnet.mp4 19.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Inside Android's SafetyNet Attestation.mp4 35.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Intel ME - Flash File System Explained.eng.srt 102 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Intel ME - Flash File System Explained.mp4 36 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Jailbreaking Apple Watch.eng.srt 69 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Jailbreaking Apple Watch.mp4 19.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Key Reinstallation Attacks - Breaking the WPA2 Protocol.eng.srt 122 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Key Reinstallation Attacks - Breaking the WPA2 Protocol.mp4 23.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017.eng.srt 118 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Locknote - Conclusions and Key Takeaways From Black Hat Europe 2017.mp4 45.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Lost in Transaction - Process Doppelgänging.eng.srt 125 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Lost in Transaction - Process Doppelgänging.mp4 33.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Nation-State Moneymule's Hunting Season - APT Attacks Targeting Financial Institutions.eng.srt 128 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Nation-State Moneymule's Hunting Season - APT Attacks Targeting Financial Institutions.mp4 40.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Passive Fingerprinting of HTTP 2 Clients.eng.srt 123 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Passive Fingerprinting of HTTP 2 Clients.mp4 29.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Red Team Techniques for Evading, Bypassing & Disabling MS.eng.srt 138 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Red Team Techniques for Evading, Bypassing & Disabling MS.mp4 33.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.eng.srt 117 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.mp4 43.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Self-Verifying Authentication - A Framework For Safer Integrations of Single-Sign-On Services.eng.srt 100 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Self-Verifying Authentication - A Framework For Safer Integrations of Single-Sign-On Services.mp4 41.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/The Apple of Your EFI - An Updated Study of EFI Security.eng.srt 180 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/The Apple of Your EFI - An Updated Study of EFI Security.mp4 35.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/The Spear to Break the Security Wall of S7Commplus.eng.srt 46 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/The Spear to Break the Security Wall of S7Commplus.mp4 21.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations.eng.srt 143 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Wi-Fi Direct To Hell - Attacking Wi-Fi Direct Protocol Implementations.mp4 30.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Zero Days, Thousands of Nights - The Life & Times of Zero-Day Vulns and Their Exploits.eng.srt 131 KB
Black Hat/Black Hat Europe/Black Hat Europe 2017/videos/Zero Days, Thousands of Nights - The Life & Times of Zero-Day Vulns and Their Exploits.mp4 36.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/A Measured Response to a Grain of Rice.eng.srt 103 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/A Measured Response to a Grain of Rice.mp4 75.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace.eng.srt 48 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace.mp4 20.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Attacking and Defending Blockchains From Horror Stories to Secure Wallets.eng.srt 86 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Attacking and Defending Blockchains From Horror Stories to Secure Wallets.mp4 28.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Attacking Hardware Systems Using Resonance and the Laws of Physics.eng.srt 97 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Attacking Hardware Systems Using Resonance and the Laws of Physics.mp4 36.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 Keynote.eng.srt 67 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Black Hat Europe 2018 Keynote.mp4 60.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/BLEEDINGBIT Your APs Belong to Us.eng.srt 79 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/BLEEDINGBIT Your APs Belong to Us.mp4 22.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Broken Links Emergence and Future of Software-Supply Chain Compromises.eng.srt 62 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Broken Links Emergence and Future of Software-Supply Chain Compromises.mp4 17.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Cloud-Native Sandboxes for Microservices Understanding New Threats and Attacks.eng.srt 36 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Cloud-Native Sandboxes for Microservices Understanding New Threats and Attacks.mp4 11.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Container Attack Surface Reduction Beyond Name Space Isolation.eng.srt 84 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Container Attack Surface Reduction Beyond Name Space Isolation.mp4 32.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Cutting Edge Microsoft Browser Security - From People Who Owned It.eng.srt 58 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Cutting Edge Microsoft Browser Security - From People Who Owned It.mp4 27.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.eng.srt 82 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.mp4 28.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Deep Impact Recognizing Unknown Malicious Activities from Zero Knowledge.eng.srt 58 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Deep Impact Recognizing Unknown Malicious Activities from Zero Knowledge.mp4 33.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/DeepPhish Simulating Malicious AI.eng.srt 70 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/DeepPhish Simulating Malicious AI.mp4 41.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces.eng.srt 61 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces.mp4 58.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Drill Apple Core Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit.eng.srt 55 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Drill Apple Core Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit.mp4 11.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Eternal War in XNU Kernel Objects.eng.srt 43 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Eternal War in XNU Kernel Objects.mp4 25.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Evolving Security Experts Among Teenagers.eng.srt 76 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Evolving Security Experts Among Teenagers.mp4 34.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/How to Build Synthetic Persons in Cyberspace.eng.srt 94 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/How to Build Synthetic Persons in Cyberspace.mp4 29.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/I Block You Because I Love You Social Account Identification Attack Against a Website Visitor.mp4 23.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild.eng.srt 42 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild.mp4 13 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Keeping Secrets Emerging Practice in Database Encryption.eng.srt 68 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Keeping Secrets Emerging Practice in Database Encryption.mp4 17.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Level Up Your Security Mindset.eng.srt 85 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Level Up Your Security Mindset.mp4 34.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Locknote Conclusions and Key Takeaways from Black Hat Europe 2018.eng.srt 90 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Locknote Conclusions and Key Takeaways from Black Hat Europe 2018.mp4 58.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild.eng.srt 85 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild.mp4 24.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM.eng.srt 107 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM.mp4 49.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/No Free Charge Theorem 2.0 How to Steal Private Information from a Mobile Device Using a Powerbank.eng.srt 52 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/No Free Charge Theorem 2.0 How to Steal Private Information from a Mobile Device Using a Powerbank.mp4 25.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Off-Path Attacks Against PKI.eng.srt 53 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Off-Path Attacks Against PKI.mp4 16.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Perception Deception Physical Adversarial Attack Challenges.eng.srt 79 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Perception Deception Physical Adversarial Attack Challenges.mp4 55 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Perfectly Deniable Steganographic Disk Encryption.eng.srt 104 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Perfectly Deniable Steganographic Disk Encryption.mp4 50.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Real-Time Detection of Attacks Leveraging Domain Administrator Privilege.eng.srt 32 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Real-Time Detection of Attacks Leveraging Domain Administrator Privilege.mp4 18.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/RustZone Writing Trusted Applications in Rust.eng.srt 93 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/RustZone Writing Trusted Applications in Rust.mp4 28.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/SDL at Scale Growing Security Champions.eng.srt 96 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/SDL at Scale Growing Security Champions.mp4 48.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses.mp4 31.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Straight Outta VMware Modern Exploitation of the SVGA Device for Guest-to-Host Escapes.mp4 34.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/The Last Line of Defense Understanding and Attacking Apple File System on iOS.eng.srt 32 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/The Last Line of Defense Understanding and Attacking Apple File System on iOS.mp4 16.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/The Mummy 2018 - Microsoft Accidentally Summons Back Ugly Attacks from the Past.eng.srt 36 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/The Mummy 2018 - Microsoft Accidentally Summons Back Ugly Attacks from the Past.mp4 14.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/The Undeniable Truth.eng.srt 84 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/The Undeniable Truth.mp4 23.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Thermanator and the Thermal Residue Attack.eng.srt 30 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Thermanator and the Thermal Residue Attack.mp4 17.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Under the SEA - A Look at the Syrian Electronic Army's Mobile Tooling.eng.srt 51 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Under the SEA - A Look at the Syrian Electronic Army's Mobile Tooling.mp4 19.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Video Killed the Text Star OSINT Approach.eng.srt 47 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Video Killed the Text Star OSINT Approach.mp4 30.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/When Everyone's Dog is Named Fluffy.eng.srt 38 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/When Everyone's Dog is Named Fluffy.mp4 14.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/When Machines Can't Talk.eng.srt 69 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/When Machines Can't Talk.mp4 36.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Where 2 Worlds Collide Bringing Mimikatz et al to UNIX.eng.srt 75 KB
Black Hat/Black Hat Europe/Black Hat Europe 2018/Where 2 Worlds Collide Bringing Mimikatz et al to UNIX.mp4 24 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Advanced VBA Macros Attack & Defence.mp4 43.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Alexa, Hack My Server(less) Please.mp4 52.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 Highlights.mp4 5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Black Hat Europe 2019 Keynote Blue to Red Traversing the Spectrum by Amanda Rousseau.mp4 56.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/BlueMaster Bypassing and Fixing Bluetooth-based Proximity Authentication.mp4 38.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/BluePill Neutralizing Anti-Analysis Behavior in Malware Dissection.mp4 17.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Booting the iOS Kernel to an Interactive Bash Shell on QEMU.mp4 37.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Breaking Bootloaders on the Cheap.mp4 19.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing.mp4 51.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction.mp4 33.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Chain of Fools An Exploration of Certificate Chain Validation Mishaps.mp4 33.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/ClusterFuzz Fuzzing at Google Scale.mp4 51.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Conducting a Successful False Flag Cyber Operation (Blame it on China).mp4 41.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Decisions and Revisions - The Ever Evolving Face of the Black Hat NOC.mp4 63.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries.mp4 23.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Doors of Durin The Veiled Gate to Siemens S7 Silicon.mp4 55.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Exploiting Windows Hello for Business.mp4 43.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Far Sides of Java Remote Protocols.mp4 28.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Fatal Fury on ESP32 Time to Release Hardware Exploits.mp4 32.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit.mp4 43.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Hackers, Journalists and the Ethical Swamp.mp4 68.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Hands Off and Putting SLAB SLUB Feng Shui in a Blackbox.mp4 44.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/How to Break PDF Encryption.mp4 34.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/HTTP Desync Attacks Request Smuggling Reborn.mp4 30.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Implementing the Lessons Learned From a Major Cyber Attack.mp4 56 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Inside Out - The Cloud has Never been so Close.mp4 23.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Is Your Mental Health for Sale.mp4 48.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Locknote Conclusions and Key Takeaways from Black Hat Europe 2019.mp4 95.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Mobile Network Hacking, IP Edition.mp4 47.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet.mp4 48.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/New Exploit Technique In Java Deserialization Attack.mp4 48.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/OEM Finder Hunting Vulnerable OEM IoT Devices at Scale.mp4 22.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Practical Side-Channel Attacks Against WPA-TKIP.mp4 38 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Reverse Engineering and Exploiting Builds in the Cloud.mp4 36 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds.mp4 38 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Side Channel Attacks in 4G and 5G Cellular Networks.mp4 19.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Simple Spyware Androids Invisible Foreground Services and How to (Ab)use Them.mp4 25.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Tackling Privilege Escalation with Offense and Defense.mp4 44.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Thinking Outside the JIT Compiler.mp4 13.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Trust in Apple's Secret Garden Exploring & Reversing Apple's Continuity Protocol.mp4 30.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Understanding the IoT Threat Landscape.mp4 36.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Unleashing the Power of My 20 Years Old Car.mp4 22.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/Unveiling the Underground World of Anti-Cheats.mp4 41.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2019/What the Fuzz.mp4 35.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/A New Hope The One Last Chance to Save Your SSD Data.eng.srt 57 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/A New Hope The One Last Chance to Save Your SSD Data.mp4 45.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/BinTyper Type Confusion Detection for C Binaries.eng.srt 26 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/BinTyper Type Confusion Detection for C Binaries.mp4 24.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Bypassing NGAV for Fun and Profit.eng.srt 58 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Bypassing NGAV for Fun and Profit.mp4 35.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Cross-Site Escape Pwning macOS Safari Sandbox the Unusual Way.eng.srt 40 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Cross-Site Escape Pwning macOS Safari Sandbox the Unusual Way.mp4 26.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Debug Resurrection on Nordic nRF52 Series.eng.srt 28 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Debug Resurrection on Nordic nRF52 Series.mp4 33.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Design Pitfalls in Commercial Mini-Programs on Android and iOS.eng.srt 43 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Design Pitfalls in Commercial Mini-Programs on Android and iOS.mp4 26.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel.eng.srt 24 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel.mp4 25.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Effective Vulnerability Discovery with Machine Learning.eng.srt 49 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Effective Vulnerability Discovery with Machine Learning.mp4 31 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/efiXplorer Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis.eng.srt 83 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/efiXplorer Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis.mp4 55.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Finding Bugs Compiler Knows but Doesn't Tell You-Dissecting Undefined Behavior Optimizations in LLVM.eng.srt 42 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Finding Bugs Compiler Knows but Doesn't Tell You-Dissecting Undefined Behavior Optimizations in LLVM.mp4 31.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Fingerprint-Jacking Practical Fingerprint Authorization Hijacking in Android Apps.eng.srt 59 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Fingerprint-Jacking Practical Fingerprint Authorization Hijacking in Android Apps.mp4 35.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/FPs are Cheap. Show me the CVEs.eng.srt 44 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/FPs are Cheap. Show me the CVEs.mp4 29.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/From Zero to Sixty The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower (2).eng.srt 87 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/From Zero to Sixty The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower (2).mp4 36.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/From Zero to Sixty The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower.eng.srt 87 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/From Zero to Sixty The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower.mp4 36.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control....eng.srt 33 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control....mp4 26 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Hacking Government Cybersecurity.eng.srt 80 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Hacking Government Cybersecurity.mp4 41.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Hermes Attack Steal DNN Models In AI Privatization Deployment Scenarios.eng.srt 46 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Hermes Attack Steal DNN Models In AI Privatization Deployment Scenarios.mp4 32.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/How Embedded TCP IP Stacks Breed Critical Vulnerabilities.eng.srt 73 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/How Embedded TCP IP Stacks Breed Critical Vulnerabilities.mp4 42.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration (2).eng.srt 42 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration (2).mp4 23.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration.eng.srt 42 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration.mp4 23.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/How to Better Fuzz Windows 10 Directx Kernel at Present.eng.srt 27 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/How to Better Fuzz Windows 10 Directx Kernel at Present.mp4 21 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/IAM Concerned OAuth Token Hijacking in Google Cloud (GCP).eng.srt 64 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/IAM Concerned OAuth Token Hijacking in Google Cloud (GCP).mp4 43.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/It's not FINished The Evolving Maturity in Ransomware Operations.eng.srt 78 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/It's not FINished The Evolving Maturity in Ransomware Operations.mp4 39.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Jack-in-the-Cache A New Code injection Technique through Modifying X86-to-ARM Translation Cache.eng.srt 36 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Jack-in-the-Cache A New Code injection Technique through Modifying X86-to-ARM Translation Cache.mp4 28.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/LadderLeak Breaking ECDSA with Less than One Bit of Nonce Leakage.eng.srt 66 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/LadderLeak Breaking ECDSA with Less than One Bit of Nonce Leakage.mp4 33.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Light Commands Hacking Voice Assistants with Lasers.eng.srt 49 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Light Commands Hacking Voice Assistants with Lasers.mp4 47.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Manufacturing Hardware Implants from Idea to Mass Production A Hacker's Journey.eng.srt 46 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Manufacturing Hardware Implants from Idea to Mass Production A Hacker's Journey.mp4 31.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/My Ticks Don't Lie New Timing Attacks for Hypervisor Detection.eng.srt 57 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/My Ticks Don't Lie New Timing Attacks for Hypervisor Detection.mp4 40.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Permission Mining in GCP.eng.srt 57 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Permission Mining in GCP.mp4 22.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Please Make a Dentist Appointment ASAP Attacking IOBluetoothFamily HCI and Vendor-Specific Commands.eng.srt 49 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Please Make a Dentist Appointment ASAP Attacking IOBluetoothFamily HCI and Vendor-Specific Commands.mp4 41.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Portable Data exFiltration XSS for PDFs.eng.srt 54 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Portable Data exFiltration XSS for PDFs.mp4 28.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/POSWorld. Should You be Afraid of Hands-On Payment Devices.eng.srt 54 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/POSWorld. Should You be Afraid of Hands-On Payment Devices.mp4 30.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Precursor Towards Evidence-Based Trust in Hardware.eng.srt 105 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Precursor Towards Evidence-Based Trust in Hardware.mp4 57.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Quantum Security and Cryptography You Are (Probably) Doing it Wrong.eng.srt 35 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Quantum Security and Cryptography You Are (Probably) Doing it Wrong.mp4 32.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Shield with Hole New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy.eng.srt 34 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Shield with Hole New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy.mp4 43.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Story of Jailbreaking iOS 13.eng.srt 73 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/Story of Jailbreaking iOS 13.mp4 27.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/The Hunt for Major League IoT-ICS Threats A Deep Dive into IoT Threat Terrain.eng.srt 54 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/The Hunt for Major League IoT-ICS Threats A Deep Dive into IoT Threat Terrain.mp4 41.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study.mp4 35.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2020/This is for the Pwners Exploiting a WebKit 0-day in PlayStation 4.eng.srt 49 KB
Black Hat/Black Hat Europe/Black Hat Europe 2020/This is for the Pwners Exploiting a WebKit 0-day in PlayStation 4.mp4 23.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/2021 A Titan M Odyssey.mp4 30.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/A Deep Dive into Privacy Dashboard of Top Android Vendors.eng.srt 45 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/A Deep Dive into Privacy Dashboard of Top Android Vendors.mp4 34.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/A Universal Way to Exploit Android PendingIntents in High profile and System Apps.eng.srt 38 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/A Universal Way to Exploit Android PendingIntents in High profile and System Apps.mp4 29.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Achieving Linux Kernel Code Execution Through a Malicious USB Device.eng.srt 63 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Achieving Linux Kernel Code Execution Through a Malicious USB Device.mp4 28.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/AIModel Mutator Finding Vulnerabilities in TensorFlow.mp4 22 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/APTs Go Teleworking The Rise of VPN Exploits.eng.srt 43 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/APTs Go Teleworking The Rise of VPN Exploits.mp4 28.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/BadMesher New Attack Surfaces of Wi Fi Mesh Network.eng.srt 45 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/BadMesher New Attack Surfaces of Wi Fi Mesh Network.mp4 35.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Building Better CSIRTs Using Behavioral Psychology.eng.srt 76 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Building Better CSIRTs Using Behavioral Psychology.mp4 45.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Burning Bridges - Stopping Lateral Movement via the RPC Firewall.eng.srt 66 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Burning Bridges - Stopping Lateral Movement via the RPC Firewall.mp4 32.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/ChaosDB How We Hacked Databases of Thousands of Azure Customers (rev).mp4 39.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/ECMO Rehost Embedded Linux Kernels via Peripheral Transplantation.eng.srt 35 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/ECMO Rehost Embedded Linux Kernels via Peripheral Transplantation.mp4 25.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Exploiting CSP in WebKit to Break Authentication and Authorization.eng.srt 47 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Exploiting CSP in WebKit to Break Authentication and Authorization.mp4 32.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/From Coordinated Disclosure to Cooperative Vulnerability When Dealing w - Critical Software Stacks.mp4 78.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/From Logic to Memory Winning the Solitaire in Reparse Points.eng.srt 56 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/From Logic to Memory Winning the Solitaire in Reparse Points.mp4 39.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Greetings from the '90s Exploiting the Design of Industrial Controllers in Modern Settings.mp4 67.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Hand in Your Pocket Without You Noticing Current State of Mobile Wallet Security.mp4 33.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Hardware Security Module - Executing Unsigned Code in HSM TEE.mp4 56.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/How We Can Power Real Security Machine Learning Progress Through Open Algorithms and Benchmarks.eng.srt 70 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/How We Can Power Real Security Machine Learning Progress Through Open Algorithms and Benchmarks.mp4 36.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/How Your E book Might Be Reading You Exploiting EPUB Reading Systems.eng.srt 57 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/How Your E book Might Be Reading You Exploiting EPUB Reading Systems.mp4 33.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/HTTP 2 The Sequel is Always Worse.eng.srt 65 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/HTTP 2 The Sequel is Always Worse.mp4 52.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Is This My Domain Controller A New Class of Active Directory Protocol Injection Attacks.eng.srt 46 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Is This My Domain Controller A New Class of Active Directory Protocol Injection Attacks.mp4 31.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Keynote Clocking On.mp4 78.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Keynote Embedding a Human Centric Approach Into a Global Cyber Security Program.mp4 81.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Locknote Conclusions and Key Takeaways from Black Hat Europe 2021.mp4 70.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Lost in the Loader The Many Faces of the Windows PE File Format.eng.srt 46 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Lost in the Loader The Many Faces of the Windows PE File Format.mp4 21.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Message in a Broken Bottle Exploring the Linux IPC Attack Surface.eng.srt 61 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Message in a Broken Bottle Exploring the Linux IPC Attack Surface.mp4 35.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/New Ways of IPV6 Scanning.eng.srt 29 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/New Ways of IPV6 Scanning.mp4 38.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/No Such Thing as a Stupid Question Why Knowledge Shaming is Making Us Less Secure.mp4 55.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/One Glitch to Rule Them All Fault Injection Attacks Against the AMD Secure Processor.mp4 36.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Owfuzz WiFi Nightmare.mp4 28.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Picking Lockfiles Attacking & Defending Your Supply Chain.eng.srt 58 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Picking Lockfiles Attacking & Defending Your Supply Chain.mp4 51.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Practical Attacks Against Attribute based Encryption.mp4 40.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Practical HTTP Header Smuggling Sneaking Past Reverse Proxies to Attack AWS and Beyond.eng.srt 53 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Practical HTTP Header Smuggling Sneaking Past Reverse Proxies to Attack AWS and Beyond.mp4 23.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/ReCertifying Active Directory Certificate Services.mp4 80.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Resting on Feet of Clay Securely Bootstrapping OPC UA Deployments.eng.srt 32 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Resting on Feet of Clay Securely Bootstrapping OPC UA Deployments.mp4 47.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Securing the Public, who is in Charge.mp4 96.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Security Industry Call to Action We Need a Cloud Vulnerability Database.eng.srt 88 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Security Industry Call to Action We Need a Cloud Vulnerability Database.mp4 105.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Skeletons in the App Sandbox 5 Ways to Escape.mp4 21.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/TeamTNT Explosive Cryptomining.mp4 37.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/The Art of Exploiting UAF by Ret2bpf in Android Kernel.eng.srt 58 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/The Art of Exploiting UAF by Ret2bpf in Android Kernel.mp4 33 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/The Bad Guys Win - Analysis of 10,000 Magecart Vulnerabilities.eng.srt 64 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/The Bad Guys Win - Analysis of 10,000 Magecart Vulnerabilities.mp4 41.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/The Black Hat Europe NOC (Network Operations Center) Report.eng.srt 83 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/The Black Hat Europe NOC (Network Operations Center) Report.mp4 71.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/The Data Distribution Service (DDS) Protocol is Critical Let's Use it Securely.mp4 62 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/They Hacked Thousands of Cloud Accounts Then Sent Us Weird GIFs.eng.srt 68 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/They Hacked Thousands of Cloud Accounts Then Sent Us Weird GIFs.mp4 37.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Veni, No Vidi, No Vici Attacks on ETW Blind EDR Sensors.eng.srt 49 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Veni, No Vidi, No Vici Attacks on ETW Blind EDR Sensors.mp4 55.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Vulnerability Intelligence.eng.srt 26 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Vulnerability Intelligence.mp4 26.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/We Wait, Because We Know You - Inside the Ransomware Negotiation Economics.eng.srt 40 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/We Wait, Because We Know You - Inside the Ransomware Negotiation Economics.mp4 20.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Who Did It - How We Attributed Campaigns of a Cyber Mercenary.mp4 31.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Windows Defender - Demystifying and Bypassing ASR by Understanding the AV's Signatures.eng.srt 61 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Windows Defender - Demystifying and Bypassing ASR by Understanding the AV's Signatures.mp4 38.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Your Trash Kernel Bug, My Precious 0 day.eng.srt 46 KB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Your Trash Kernel Bug, My Precious 0 day.mp4 25.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2021/Zen and the Art of Adversarial Machine Learning.mp4 43.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/{JS - ON Security - OFF} Abusing JSON - Based SQL Queries.eng.srt 38 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/{JS - ON Security - OFF} Abusing JSON - Based SQL Queries.mp4 31.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Abusing CNC Technologies.eng.srt 69 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Abusing CNC Technologies.mp4 46.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Aikido Turning EDRs to Malicious Wipers Using 0 - day Exploits.eng.srt 52 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Aikido Turning EDRs to Malicious Wipers Using 0 - day Exploits.mp4 45.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Android Parcels The Bad, the Good and the Better - Introducing Android's Safer Parcel.eng.srt 70 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Android Parcels The Bad, the Good and the Better - Introducing Android's Safer Parcel.mp4 41.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Back - connect to the Connected Car. Search for Vulnerabilities in the VW Electric Car.mp4 37 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 - Speaker Orientation Call.eng.srt 54 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 - Speaker Orientation Call.mp4 32.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 Virtual Process for Speakers.eng.srt 54 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022 Virtual Process for Speakers.mp4 31.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022, ExCel London.en.srt 185 B
Black Hat/Black Hat Europe/Black Hat Europe 2022/Black Hat Europe 2022, ExCel London.mp4 1.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Breaking Kerberos' RC4 Cipher and Spoofing Windows PACs.eng.srt 72 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Breaking Kerberos' RC4 Cipher and Spoofing Windows PACs.mp4 46 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Bridging the Gap Between Research and Practice in Intelligently Bypassing WAF.eng.srt 34 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Bridging the Gap Between Research and Practice in Intelligently Bypassing WAF.mp4 25.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Choo Choo, Network Train - The One to Rule Your Perimeter.eng.srt 57 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Choo Choo, Network Train - The One to Rule Your Perimeter.mp4 45.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Confidence in Chaos Strategies for World - Class Security Operations.eng.srt 60 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Confidence in Chaos Strategies for World - Class Security Operations.mp4 36.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Cross - Contract Ricochet Attacks & Off - Chain - On - Chain Manipulation of Billion Dollar NFT Collections.eng.srt 50 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Cross - Contract Ricochet Attacks & Off - Chain - On - Chain Manipulation of Billion Dollar NFT Collections.mp4 34 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/CSIRowhammer Closing the Case of Half - Double and Beyond.eng.srt 75 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/CSIRowhammer Closing the Case of Half - Double and Beyond.mp4 34.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/DataBinding2Shell Novel Pathways to RCE Web Frameworks.eng.srt 56 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/DataBinding2Shell Novel Pathways to RCE Web Frameworks.mp4 34.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Deep into Android Bluetooth Bug Hunting New Attack Surfaces and Weak Code Patterns.eng.srt 50 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Deep into Android Bluetooth Bug Hunting New Attack Surfaces and Weak Code Patterns.mp4 40.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Design Flaws and Deployment Chaos in Cloud - based IoT Access Control Policies.eng.srt 42 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Design Flaws and Deployment Chaos in Cloud - based IoT Access Control Policies.mp4 39.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Dirty Vanity A New Approach to Code Injection & EDR Bypass.eng.srt 70 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Dirty Vanity A New Approach to Code Injection & EDR Bypass.mp4 41.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/DnD Decompiling Deep Neural Network Compiled Binary.eng.srt 48 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/DnD Decompiling Deep Neural Network Compiled Binary.mp4 32.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Event - based Fuzzing, Patch - based Research, and Comment Police Finding Bugs Through a Bug.eng.srt 43 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Event - based Fuzzing, Patch - based Research, and Comment Police Finding Bugs Through a Bug.mp4 28.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Exploring a New Class of Kernel Exploit Primitive.eng.srt 65 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Exploring a New Class of Kernel Exploit Primitive.mp4 34.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Fail Harder Finding Critical 0 - Days in Spite of Ourselves.eng.srt 82 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Fail Harder Finding Critical 0 - Days in Spite of Ourselves.mp4 41.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/From Finding New Type of Logical Flaw at Linux Kernel To Developing New Heap Exploitation Technique.eng.srt 36 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/From Finding New Type of Logical Flaw at Linux Kernel To Developing New Heap Exploitation Technique.mp4 21.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Fuzzing and Breaking Security Functions of SIMATIC PLCs.eng.srt 39 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Fuzzing and Breaking Security Functions of SIMATIC PLCs.mp4 38.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Good Motive but Bad Design Pitfalls in MPU Usage in Embedded Systems in the Wild.eng.srt 40 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Good Motive but Bad Design Pitfalls in MPU Usage in Embedded Systems in the Wild.mp4 41.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Grand Theft Drone Reaching Breaking Point in Drone Proprietary RF Link Security.eng.srt 54 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Grand Theft Drone Reaching Breaking Point in Drone Proprietary RF Link Security.mp4 47.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/How We Organize Large - Scale DDoS Exercises in the Netherlands.eng.srt 46 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/How We Organize Large - Scale DDoS Exercises in the Netherlands.mp4 34.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Keynote - Cybersecurity The Next Generation.eng.srt 90 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Keynote - Cybersecurity The Next Generation.mp4 103.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Keynote - Our Kryptonite A Defendable Internet.eng.srt 116 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Keynote - Our Kryptonite A Defendable Internet.mp4 121.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Knockout Win Against TCC - 20 NEW Ways to Bypass Your MacOS Privacy Mechanisms.eng.srt 57 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Knockout Win Against TCC - 20 NEW Ways to Bypass Your MacOS Privacy Mechanisms.mp4 48.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/LCDPwn Breaking Enterprise - Things with Layer 2 Discovery Protocol Vulnerabilities Again.eng.srt 47 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/LCDPwn Breaking Enterprise - Things with Layer 2 Discovery Protocol Vulnerabilities Again.mp4 34.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Locknote Conclusions and Key Takeaways from Day 1.eng.srt 55 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Locknote Conclusions and Key Takeaways from Day 1.mp4 64.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Locknote Conclusions and Key Takeaways from Day 2.eng.srt 58 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Locknote Conclusions and Key Takeaways from Day 2.mp4 70.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Microsoft Defender for Office 365 Evasion - The Story of Confirmed Vulnerability.eng.srt 48 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Microsoft Defender for Office 365 Evasion - The Story of Confirmed Vulnerability.mp4 41.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Practically - exploitable Cryptographic - Vulnerabilities in Matrix.eng.srt 67 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Practically - exploitable Cryptographic - Vulnerabilities in Matrix.mp4 36.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Real - World Detection Evasion Techniques in the Cloud.eng.srt 65 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Real - World Detection Evasion Techniques in the Cloud.mp4 31.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Scammers Who Scam Scammers, Hackers Who Hack Hackers Exploring a Sub - economy on Cybercrime Forums.eng.srt 83 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Scammers Who Scam Scammers, Hackers Who Hack Hackers Exploring a Sub - economy on Cybercrime Forums.mp4 42.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Searching for RPC Functions to Coerce Authentications in Microsoft Protocols.eng.srt 53 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Searching for RPC Functions to Coerce Authentications in Microsoft Protocols.mp4 33.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Select Bugs From Binary Where Pattern Like CVE - 1337 - Days.eng.srt 63 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Select Bugs From Binary Where Pattern Like CVE - 1337 - Days.mp4 41.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Strengthening Cyber Resiliency in a Time of Geopolitical Crises.eng.srt 56 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Strengthening Cyber Resiliency in a Time of Geopolitical Crises.mp4 44.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/The Aftermath of a Social Engineering Pentest - Are We Being Ethically Responsible.eng.srt 60 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/The Aftermath of a Social Engineering Pentest - Are We Being Ethically Responsible.mp4 34.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/The Black Hat Europe NOC Report.eng.srt 66 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/The Black Hat Europe NOC Report.mp4 43.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/The Hacker's Guide to Policyland.eng.srt 85 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/The Hacker's Guide to Policyland.mp4 59 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Thresholds Are for Old Threats Demystifying AI and Machine Learning to Enhance SOC Detection.eng.srt 50 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Thresholds Are for Old Threats Demystifying AI and Machine Learning to Enhance SOC Detection.mp4 27.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Unwinding the Stack for Fun and Profit.eng.srt 59 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Unwinding the Stack for Fun and Profit.mp4 33.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Vlind Glitch Blind VCC Glitching Technique to Bypass the Secure Boot of Qualcomm MSM8916 Mobile SoC.eng.srt 64 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Vlind Glitch Blind VCC Glitching Technique to Bypass the Secure Boot of Qualcomm MSM8916 Mobile SoC.mp4 42.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Writing Your Own Ticket to the Cloud Like APT A Dive to AD FS Attacks, Detections, and Mitigations.eng.srt 77 KB
Black Hat/Black Hat Europe/Black Hat Europe 2022/Writing Your Own Ticket to the Cloud Like APT A Dive to AD FS Attacks, Detections, and Mitigations.mp4 52.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/A Decade After Stuxnet How Siemens S7 is Still an Attacker's Heaven.eng.srt 68 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/A Decade After Stuxnet How Siemens S7 is Still an Attacker's Heaven.mp4 47.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/A Security RISC The State of Microarchitectural Attacks on RISC-V.eng.srt 86 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/A Security RISC The State of Microarchitectural Attacks on RISC-V.mp4 66.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/A World-View of IP Spoofing in L4 Volumetric DoS Attacks - and a Call to Enable BCP38.eng.srt 44 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/A World-View of IP Spoofing in L4 Volumetric DoS Attacks - and a Call to Enable BCP38.mp4 41.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Attacking NPUs of Multiple Platforms.eng.srt 57 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Attacking NPUs of Multiple Platforms.mp4 47.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/AutoSpill Zero Effort Credential Stealing from Mobile Password Managers.eng.srt 64 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/AutoSpill Zero Effort Credential Stealing from Mobile Password Managers.mp4 50.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 Highlights (1).mp4 8.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 Highlights.mp4 2.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Black Hat Europe 2023 Why Attend the World's Premier Technical Cybersecurity Conference.mp4 2.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Breaching the Perimeter via Cloud Synchronized Browser Settings.eng.srt 73 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Breaching the Perimeter via Cloud Synchronized Browser Settings.mp4 57.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Breaking Theoretical Limits The Gap Between Virtual NICs and Physical Network Cards.eng.srt 30 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Breaking Theoretical Limits The Gap Between Virtual NICs and Physical Network Cards.mp4 27 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/CollidePower The Evolution of Software-based Power Side-Channels Attacks.eng.srt 61 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/CollidePower The Evolution of Software-based Power Side-Channels Attacks.mp4 44 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Deleting Your Domain Preventing Data Leaks at TLD Scale.eng.srt 65 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Deleting Your Domain Preventing Data Leaks at TLD Scale.mp4 50.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Evils in the Sparse Texture Memory Exploit Kernel Based on Undefined Behaviors of Graphic APIs.eng.srt 66 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Evils in the Sparse Texture Memory Exploit Kernel Based on Undefined Behaviors of Graphic APIs.mp4 49.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Hacking Your Documentation Who Should WTFM.eng.srt 30 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Hacking Your Documentation Who Should WTFM.mp4 22.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Hiding in the Clouds Abusing Azure DevOps Services to Bypass Microsoft Sentinel Analytic Rules.eng.srt 73 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Hiding in the Clouds Abusing Azure DevOps Services to Bypass Microsoft Sentinel Analytic Rules.mp4 67.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/HODOR Reducing Attack Surface on Node.js via System Call Limitation.eng.srt 25 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/HODOR Reducing Attack Surface on Node.js via System Call Limitation.mp4 28.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/How I Learned to Stop Worrying and Build a Modern Detection & Response Program.eng.srt 68 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/How I Learned to Stop Worrying and Build a Modern Detection & Response Program.mp4 43.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/How We Taught ChatGPT-4 to Break mbedTLS AES With Side-Channel Attacks.eng.srt 57 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/How We Taught ChatGPT-4 to Break mbedTLS AES With Side-Channel Attacks.mp4 55.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Illegitimate Data Protection Requests - To Delete or to Address.eng.srt 70 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Illegitimate Data Protection Requests - To Delete or to Address.mp4 57.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Indirect Prompt Injection Into LLMs Using Images and Sounds.eng.srt 43 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Indirect Prompt Injection Into LLMs Using Images and Sounds.mp4 37.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Keynote Industrialising Cyber Defence in an Asymmetric World.eng.srt 84 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Keynote Industrialising Cyber Defence in an Asymmetric World.mp4 55.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Keynote My Lessons from the Uber Case.eng.srt 118 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Keynote My Lessons from the Uber Case.mp4 119.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Kidnapping Without Hostages Virtual Kidnapping and the Dark Road Ahead.eng.srt 49 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Kidnapping Without Hostages Virtual Kidnapping and the Dark Road Ahead.mp4 38.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Locknote Conclusions and Key Takeaways from Day 1.eng.srt 95 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Locknote Conclusions and Key Takeaways from Day 1.mp4 102.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Locknote Conclusions and Key Takeaways from Day 2.eng.srt 91 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Locknote Conclusions and Key Takeaways from Day 2.mp4 102.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/LogoFAIL Security Implications of Image Parsing During System Boot.eng.srt 67 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/LogoFAIL Security Implications of Image Parsing During System Boot.mp4 69.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Millions of Patient Records at Risk The Perils of Legacy Protocols.eng.srt 58 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Millions of Patient Records at Risk The Perils of Legacy Protocols.mp4 47.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/My Invisible Adversary Burnout.eng.srt 83 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/My Invisible Adversary Burnout.mp4 64.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/New Techniques for Split-Second DNS Rebinding.eng.srt 62 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/New Techniques for Split-Second DNS Rebinding.mp4 41.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Off The Record - Weaponizing DHCP DNS Dynamic Updates.eng.srt 69 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Off The Record - Weaponizing DHCP DNS Dynamic Updates.mp4 56.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/One Million ASUS Routers Under Control Exploiting ASUS DDNS to MITM Admin Credentials.eng.srt 39 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/One Million ASUS Routers Under Control Exploiting ASUS DDNS to MITM Admin Credentials.mp4 42.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Orchestrate This Kubernetes Rootkit.eng.srt 27 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Orchestrate This Kubernetes Rootkit.mp4 18.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/REDIScovering HeadCrab - A Technical Analysis of a Novel Malware and the Mind Behind It.eng.srt 67 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/REDIScovering HeadCrab - A Technical Analysis of a Novel Malware and the Mind Behind It.mp4 55.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Reviving JIT Vulnerabilities Unleashing the Power of Maglev Compiler Bugs on Chrome Browser.eng.srt 48 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Reviving JIT Vulnerabilities Unleashing the Power of Maglev Compiler Bugs on Chrome Browser.mp4 47.1 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Security Through Transparency Scaling Your Customer Trust Program.eng.srt 71 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Security Through Transparency Scaling Your Customer Trust Program.mp4 64 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Something Rotten in the State of Data Centers.eng.srt 80 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Something Rotten in the State of Data Centers.mp4 49.7 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Sweet QuaDreams or Nightmare Before Christmas Dissecting an iOS 0-Day.eng.srt 76 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Sweet QuaDreams or Nightmare Before Christmas Dissecting an iOS 0-Day.mp4 60.4 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/The Black Hat Europe Network Operations Center (NOC) Report.eng.srt 78 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/The Black Hat Europe Network Operations Center (NOC) Report.mp4 68.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/The Magnetic Pull of Mutable Protection Worked Examples in Cryptographic Agility.eng.srt 85 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/The Magnetic Pull of Mutable Protection Worked Examples in Cryptographic Agility.mp4 62.9 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/The Pool Party You Will Never Forget New Process Injection Techniques Using Windows Thread Pools.eng.srt 67 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/The Pool Party You Will Never Forget New Process Injection Techniques Using Windows Thread Pools.mp4 48.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Through the Looking Glass How Open Source Projects See Vulnerability Disclosure.eng.srt 32 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Through the Looking Glass How Open Source Projects See Vulnerability Disclosure.mp4 42.8 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/TsuKing Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.eng.srt 25 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/TsuKing Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.mp4 29.3 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/TunnelCrack Leaking VPN Traffic by Manipulating Routing Tables.eng.srt 63 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/TunnelCrack Leaking VPN Traffic by Manipulating Routing Tables.mp4 51.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Unmasking APTs An Automated Approach for Real-World Threat Attribution.eng.srt 83 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Unmasking APTs An Automated Approach for Real-World Threat Attribution.mp4 58.2 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/VoBERT Unstable Log Sequence Anomaly Detection Introducing Vocabulary-Free BERT.eng.srt 64 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/VoBERT Unstable Log Sequence Anomaly Detection Introducing Vocabulary-Free BERT.mp4 58.5 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Vulnerabilities in Old Third-Party Software Components- Importance of Having SBoM for IoT OT Devices.eng.srt 68 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/Vulnerabilities in Old Third-Party Software Components- Importance of Having SBoM for IoT OT Devices.mp4 56.6 MB
Black Hat/Black Hat Europe/Black Hat Europe 2023/When The Front Door Becomes a Backdoor The Security Paradox of OSDP.eng.srt 59 KB
Black Hat/Black Hat Europe/Black Hat Europe 2023/When The Front Door Becomes a Backdoor The Security Paradox of OSDP.mp4 39.4 MB
Black Hat/Black Hat USA/Black Hat USA 1997/bh-archives-97-98-99.html 100 KB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-bruce-s-audio.rm 78.3 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-chris-audio.rm 100.4 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-dominique-audio.rm 86.9 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-hobbit-audio.rm 82.8 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-ira-winkler-audio.rm 45.2 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-jeremy-audio.rm 89 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-mudge-audio.rm 68.6 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-priest-audio.rm 45.8 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-q-master-audio.rm 41.4 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-rayk-audio.rm 72.6 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-richard-audio.rm 21.5 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-route-partial-audio.rm 6.1 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-shipley-audio.rm 50.4 MB
Black Hat/Black Hat USA/Black Hat USA 1997/audio/bh-usa-97-sluggo-audio.rm 71.4 MB
Black Hat/Black Hat USA/Black Hat USA 1998/bh-archives-97-98-99.html 100 KB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/bh-usa-98-bruce-marshall-audio.rm 82.8 MB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/bh-usa-98-dom-audio.rm 98.5 MB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/bh-usa-98-ian-goldberg-audio.rm 91 MB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/bh-usa-98-jennifer-granick-audio.rm 85.3 MB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/bh-usa-98-john-bailey-audio.rm 55.6 MB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/bh-usa-98-mjr-audio.rm 44.1 MB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/bh-usa-98-patrick-richard-audio.rm 81.6 MB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/mudge-bh2-28k-isdn.rm 38.9 MB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/richard-bh2-28k-isdn.rm 45.4 MB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/schneier-bh2-28k-isdn.rm 36.1 MB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/thieme-bh2-28k-isdn.rm 24.4 MB
Black Hat/Black Hat USA/Black Hat USA 1998/audio/tom-bh2-28k-isdn.rm 37.4 MB
Black Hat/Black Hat USA/Black Hat USA 1998/pictures/00000065.JPG 55 KB
Black Hat/Black Hat USA/Black Hat USA 1998/pictures/00000066.JPG 60 KB
Black Hat/Black Hat USA/Black Hat USA 1998/pictures/00000067.JPG 62 KB
Black Hat/Black Hat USA/Black Hat USA 1998/pictures/00000068.JPG 60 KB
Black Hat/Black Hat USA/Black Hat USA 1998/pictures/00000074.JPG 57 KB
Black Hat/Black Hat USA/Black Hat USA 1998/pictures/00000077.JPG 68 KB
Black Hat/Black Hat USA/Black Hat USA 1998/pictures/00000083.JPG 57 KB
Black Hat/Black Hat USA/Black Hat USA 1998/pictures/00000086.JPG 58 KB
Black Hat/Black Hat USA/Black Hat USA 1998/pictures/00000089.JPG 58 KB
Black Hat/Black Hat USA/Black Hat USA 1998/pictures/00000093.JPG 56 KB
Black Hat/Black Hat USA/Black Hat USA 1998/pictures/00000099.JPG 61 KB
Black Hat/Black Hat USA/Black Hat USA 1998/video/bh-usa-98-bruce-marshall-video.rm 413.8 MB
Black Hat/Black Hat USA/Black Hat USA 1998/video/bh-usa-98-dom-video.rm 610.2 MB
Black Hat/Black Hat USA/Black Hat USA 1998/video/bh-usa-98-ian-goldberg-video.rm 561 MB
Black Hat/Black Hat USA/Black Hat USA 1998/video/bh-usa-98-jennifer-granick-video.rm 527.1 MB
Black Hat/Black Hat USA/Black Hat USA 1998/video/bh-usa-98-john-bailey-video.rm 272.5 MB
Black Hat/Black Hat USA/Black Hat USA 1998/video/bh-usa-98-mjr-video.rm 272.5 MB
Black Hat/Black Hat USA/Black Hat USA 1998/video/bh-usa-98-patrick-richard-video.rm 405.4 MB
Black Hat/Black Hat USA/Black Hat USA 1999/bh-archives-97-98-99.html 100 KB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V01-Jeffrey_Hunker-Keynote_Protecting_Americas_Cyberspace_Version_1.0_of_the_National_Plan.opus 13.8 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V02-William_Cheswick-Keynote.opus 10.5 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V03-Bruce_Schneier-A_hacker_looks_at_cryptography.opus 23.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V04-Davis,_Ozier,_Nebel,_and_Migues-Panel_Discussion.opus 21.7 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V05-Simple_Nomad-Modern_NetWare_Hacking.opus 20.4 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V06-Sarah_Gordon-Viruses_in_the_Information_Age.opus 21.1 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V07-Rob_Karas-Open_Source_Monitoring.opus 8.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V08-Rooster-DNS_Security_Issues.opus 9.7 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V09-Marcus_Ranum-Burglar_Alarms_and_Booby_Traps.opus 18.4 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V10-Jon_David-Putting_Intrusion_Detection_into_Intrusion_Detection_Systems.opus 18.5 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V11-Brent_Huston-Appliance_Firewalls_a_detailed_review.opus 19.5 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V12-Greg_Hoglund-1000_Hackers_in_a_box_Failings_of_Security_Scanners.opus 14.8 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V13-Jim_Litchko-Total_BS_Security_business-based_systems_security.opus 16.1 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V14-Eric_Schultze_and_George_Kurtz-Over_the_Router,_Through_the_Firewall,_to_Grandma's_House_We_Go.opus 20.6 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V15-Larry_Korba-Hope_Hype_and_Horrors_E-Commerce_Explored.opus 21.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V16-Jennifer_Grannick-Forensic_Issues_in_Hacker_Prosecutions.opus 19.6 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V17-Dr_Mudge-Keynote.opus 24.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V18-Dominique_Brezinski-Building_a_Forensics_Toolkit_That_Will_Protect_You_from_Evil_Influences.opus 19.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V19-Panel-Competitive_Intelligence.opus 18.5 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V20-Padgett_Peterson-Overlooked_Local_Attack_Techniques.opus 20 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V21-JD_Glaser-Auditing_NT_Catching_Greg_Hoglund.opus 13 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V22-Mike_Schiffmman-The_Firewalk_Tool.opus 17.3 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V23-Teresa_Lunt-Taxonomy_of_Intrusion_Detection_Systems.opus 16 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V24-Batz-Security_Issues_Affecting_Internet_Transit_Points_and_Backbone_Providers.opus 21.3 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V25-Adam_Shostack-Towards_a_Taxonomy_of_Network_Testing_Techniques.opus 17.1 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V27-Peter_Shipley_and_Tom_Jackiewicz-Security_Issues_with_Implementing_and_Deploying_the_LDAP_Directory_System.opus 16.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V28-Eugene_Schultz-Security_Issues_with_Configuring_and_Maintaining_an_IIS_4_Server.opus 15.7 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V29-Scott_Culp-Building_a_Security_Response_Process.opus 19.6 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V30-Ed_Gerck-Overview_of_Certification_systems_x509,_CA,_PGP_and_SKIP.opus 16.8 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V31-Peter_Stephenson-Introduction_to_Cyber_Forensic_Analysis.opus 21.6 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V32-Base-Security_(or_lack_thereof)_and_our_Friends_in_Redmond.m4a 68.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V32-Base-Security_(or_lack_thereof)_and_our_Friends_in_Redmond.opus 16 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V33-David_Bovee-VPN_Architectures_Looking_at_the_Complete_Picture.m4a 86.1 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V33-David_Bovee-VPN_Architectures_Looking_at_the_Complete_Picture.opus 19.8 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V34-Jeremy_Rauch-How_Responsive_are_Vendors_to_Security_Problems_When_They_Aren't_Being_Pressured.m4a 85.3 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V34-Jeremy_Rauch-How_Responsive_are_Vendors_to_Security_Problems_When_They_Aren't_Being_Pressured.opus 20.3 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V35-Tatum-Managing_the_External_Environment.m4a 80 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V35-Tatum-Managing_the_External_Environment.opus 18.1 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V36-William_Cheswick-Closing_Session.m4a 81.7 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V36-William_Cheswick-Closing_Session.opus 18.1 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V37-Ira_Winkler-The_Road_to_Riches.m4a 93.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas_V37-Ira_Winkler-The_Road_to_Riches.opus 21.5 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas-Jeff_Moss_Remarks_Before_the_keynote.m4a 8 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/1999_Black_Hat_Vegas-Jeff_Moss_Remarks_Before_the_keynote.opus 1.9 MB
Black Hat/Black Hat USA/Black Hat USA 1999/audio/Cyphercon 2016 Badge Walkthrough.mp4 172.4 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Adam Shostack - Towards a Taxonomy of Network Testing Techniques.mp4 57.4 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Base - Security (or lack thereof) and our Friends in Redmond.mp4 54.3 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Batz - Security Issues Affecting Internet Transit Points and Backbone Providers.mp4 75 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Brent Huston - Appliance Firewalls a detailed review.mp4 64.1 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Bruce Schneier - A hacker looks at cryptography.mp4 76.1 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - David Bovee - VPN Architectures Looking at the Complete Picture.mp4 69.4 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Davis, Ozier, Nebel, and Migues - Panel Discussion.mp4 73.3 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Dominique Brezinski - Building a Forensics Toolkit That Will Protect You from Evil Influences.mp4 63.3 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Dr Mudge - Keynote.mp4 80.7 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Ed Gerck - Overview of Certification systems x509, CA, PGP and SKIP.mp4 58.4 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Eric Schultze and George Kurtz - Over the Router, Through the Firewall, to Grandma's House We Go.mp4 71 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Eugene Schultz - Security Issues with Configuring and Maintaining an IIS 4 Server.mp4 51.8 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Greg Hoglund - 1000 Hackers in a box Failings of Security Scanners.mp4 48.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Ira Winkler - The Road to Riches.mp4 74.9 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - JD Glaser - Auditing NT Catching Greg Hoglund.mp4 44.4 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Jeff Moss Remarks Before the keynote.mp4 6.5 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Jeffrey Hunker - Keynote Protecting Americas Cyberspace Version 1.0 of the National Plan.mp4 46.8 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Jennifer Grannick - Forensic Issues in Hacker Prosecutions.mp4 63.8 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Jeremy Rauch - How Responsive are Vendors to Security Problems When They Aren't Being Pressured.mp4 68.5 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Jim Litchko - Total BS Security business - based systems security.mp4 52.8 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Jon David - Putting Intrusion Detection into Intrusion Detection Systems.mp4 65.8 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Larry Korba - Hope Hype and Horrors E - Commerce Explored.mp4 70.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Marcus Ranum - Burglar Alarms and Booby Traps.mp4 60.5 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Mike Schiffmman - The Firewalk Tool.mp4 59.5 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Padgett Peterson - Overlooked Local Attack Techniques.mp4 69 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Panel - Competitive Intelligence.mp4 61.5 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Peter Shipley and Tom Jackiewicz - Security Issues with Implementing and Deploying the LDAP Directory System.mp4 54.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Peter Stephenson - Introduction to Cyber Forensic Analysis.mp4 71.3 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Rob Karas - Open Source Monitoring.mp4 28.3 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Rooster - DNS Security Issues.mp4 32.5 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Sarah Gordon - Viruses in the Information Age.mp4 68.1 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Scott Culp - Building a Security Response Process.mp4 67 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Simple Nomad - Modern NetWare Hacking.mp4 69 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Tatum - Managing the External Environment.mp4 64.2 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - Teresa Lunt - Taxonomy of Intrusion Detection Systems.mp4 52.7 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - William Cheswick - Closing Session.mp4 64.8 MB
Black Hat/Black Hat USA/Black Hat USA 1999/video/Black Hat USA 1999 - William Cheswick - Keynote.mp4 34.5 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Arthur Money - Closing Keynote.opus 8.5 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Brian Snow - We Need Assurance.opus 5.5 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Bruce Schneier - The Instrument and Death of Security.opus 4.9 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - David LeBlanc - Real World Techniques in Network Security Management.opus 11.6 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - David Litchfield - Compromising web Servers and Defensive Techniques.opus 11.4 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Diana Kelly - Translasting US Privacy Regulations for Implementation.opus 9.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Dominque Brezinski - Anatomy of Common Programming Security Issues.opus 5.4 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Edward G Schwartz and Diana Kelly - Data Privacy What should the CIO and CISO be doing.opus 12.3 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Gordon Reichard Jr - Trust, Security, Partnership Strategies in Selecting a Managed Service Provider.opus 10 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Greg Hoglund - Advanced Buffer Overflow Techniques.opus 11 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Hal McConnell - Threats from Organized Crime and Terrorists.opus 7.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Ian Poynter and Diana Kelly - The Truth About ASPs.opus 11.6 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Jason Garms - Defending Windows 2000 on the Internet.opus 8.9 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Jeff Thompson - Making Unix Secure for the Internet with Trusted Operating Systems.opus 11.1 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Jennifer Granick and Mark Eckenwiler - What Internet Service Providers Need to Know About the Law.opus 14.3 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Jeremy Rauch - The Security of Network Devices.opus 10.8 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Jericho and Munge - Hard Core Web Defacement Statistics Trends and Analysis.opus 10 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Job De Haas - Getting Rooted and Never Knowing It.opus 9 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Joey - Advanced Windows NT and 2000 Security.opus 8.6 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - John McDonald - Group Talk.opus 11.1 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - John McDonald - Stateful Inspection of FireWall-1.opus 7.1 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Kingpin and Brian Oblivian - Secure Hardware Design.opus 11.6 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Lee Kushner - The State of Employment in the Information Security Industry.opus 9.6 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Marcus Ranum - Full Disclosure and Open Source 1-2.opus 18.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Marcus Ranum - Full Disclosure and Open Source 2-2.opus 29 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Mark Kadrich - Intrusion Detection in High Speed Networks.opus 8.4 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices.opus 9.9 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Mudge - Analysis of Tactis used in discovering passive monitoring devices - continuation of 25.opus 12.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Padgett Peterson - Securing EMail Gateways from Attacks - What to do While Waiting for Vendors to Respond to the latest virus and worms.opus 9 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Richard Theime - Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the Board is Disappearing.opus 5.4 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Ron Gula - Bypassing Intrusion Detection Systems.opus 10.5 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Ron Moritz - Proactive Defense Against Malicious Code.opus 6.8 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Rooster and JD Glaser - Defending Your Network With Active Directory Services.opus 17.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Scott Blake - The Pros and Cons of Hiring Hackers.opus 9.2 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Simple Nomad - Strategies for Defeating Distributed Attacks.opus 9.3 MB
Black Hat/Black Hat USA/Black Hat USA 2000/audio/Black Hat USA 2000 - Terry Losonky - National Information Assurance Partnership.opus 6.5 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Arthur Money - Closing Keynote.mp4 61.6 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Brian Snow - We Need Assurance.mp4 38.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Bruce Schneier - The Instrument and Death of Security.mp4 34.8 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - David LeBlanc - Real World Techniques in Network Security Management.mp4 84.1 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - David Litchfield - Compromising web Servers and Defensive Techniques.mp4 84.6 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Diana Kelly - Translasting US Privacy Regulations for Implementation.mp4 69.1 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Dominque Brezinski - Anatomy of Common Programming Security Issues.mp4 39.3 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Edward G Schwartz and Diana Kelly - Data Privacy What should the CIO and CISO be doing.mp4 88.4 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Gordon Reichard Jr - Trust, Security, Partnership Strategies in Selecting a Managed Service Provider.mp4 72.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Greg Hoglund - Advanced Buffer Overflow Techniques.mp4 78.5 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Hal McConnell - Threats from Organized Crime and Terrorists.mp4 55.5 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Ian Poynter and Diana Kelly - The Truth About ASPs.mp4 82.9 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Jason Garms - Defending Windows 2000 on the Internet.mp4 62.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Jeff Thompson - Making Unix Secure for the Internet with Trusted Operating Systems.mp4 81.4 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Jennifer Granick and Mark Eckenwiler - What Internet Service Providers Need to Know About the Law.mp4 108.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Jeremy Rauch - The Security of Network Devices.mp4 79.5 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Jericho and Munge - Hard Core Web Defacement Statistics Trends and Analysis.mp4 74.6 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Job De Haas - Getting Rooted and Never Knowing It.mp4 65.9 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Joey - Advanced Windows NT and 2000 Security.mp4 63.2 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - John McDonald - Group Talk.mp4 82.6 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - John McDonald - Stateful Inspection of FireWall-1.mp4 53.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Kingpin and Brian Oblivian - Secure Hardware Design.mp4 83.3 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Lee Kushner - The State of Employment in the Information Security Industry.mp4 69.4 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Marcus Ranum - Full Disclosure and Open Source.mp4 132.8 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Mark Kadrich - Intrusion Detection in High Speed Networks.mp4 60.8 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Mudge - An Analysis of Tactics Used in Discovering Passive Monitoring Devices.mp4 71 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Mudge - Analysis of Tactis used in discovering passive monitoring devices - continuation of 25.mp4 91.5 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Padgett Peterson - Securing EMail Gateways from Attacks - What to do While Waiting for Vendors to Respond to the latest virus and worms.mp4 64.9 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Richard Theime - Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the Board is Disappearing.mp4 37.5 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Ron Gula - Bypassing Intrusion Detection Systems.mp4 76.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Ron Moritz - Proactive Defense Against Malicious Code.mp4 48.7 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Rooster and JD Glaser - Defending Your Network With Active Directory Services.mp4 129.3 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Scott Blake - The Pros and Cons of Hiring Hackers.mp4 69.3 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Simple Nomad - Strategies for Defeating Distributed Attacks.mp4 65.9 MB
Black Hat/Black Hat USA/Black Hat USA 2000/video/Black Hat USA 2000 - Terry Losonky - National Information Assurance Partnership.mp4 47 MB
Black Hat/Black Hat USA/Black Hat USA 2001/DEF CON 10 - dsc00004.jpg 39 KB
Black Hat/Black Hat USA/Black Hat USA 2001/dsc00001.jpg 52 KB
Black Hat/Black Hat USA/Black Hat USA 2001/dsc00002.jpg 55 KB
Black Hat/Black Hat USA/Black Hat USA 2001/dsc00003.jpg 54 KB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Andrew van der Stock - Alternatives to Honeypots.opus 9.5 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Brian Martin and B K DeLong - Lessons Learned From attrition.org.opus 12.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Bruce Schneier - Paradigms Lost Engineering vs Risk Management.opus 4 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Chad R Skipper - Polymorphism and Intrusion Detection Systems.opus 6.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Chip Andrews - SQL Security Revisited.opus 12.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Cory Scott - Systems Management in an Untrusted Network.opus 11.6 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Daji Sanai - Promiscuous Node Detection Using ARP Packets.opus 7.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Daniel VanBelleghem - Solving Network Mystries.opus 6.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Gregory S Miles - Computer Forensics a Critical Process in Your Incident Response Plan.opus 12.2 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 1.opus 9.8 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 2.opus 9.6 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Ian Goldberg - Breaking 80211 WEP.opus 12.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - James Bamford - Researching Secrets Part II.opus 7.2 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Jay Beale - Attacking and Defending BIND DJBDNS DNS Servers.opus 9.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Jeff Nathan and Kevin Depeugh - Layer 2 Attacks.opus 5.5 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Job de Haas - GSM WAP and SMS Security.opus 14.5 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Jose Nazario - The Future of Network Worms.opus 6.7 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Kevin McPeake and Chris Goggins - Falling Dominos.opus 14.2 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Lance Spitzner - The Honey Net Project.opus 12.8 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Last Stage Of Delirium Research Group - UNIX Assembly Codes Development for Vulnerabilities.opus 13.7 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Mandy Andress - Wireless LAN Security.opus 5.4 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Marshall Beddoe and Chris Abad - The Siphon Project.opus 11 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Martin Roesch - Snort.opus 11.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Mike Beekey - ARP Vulnerabilities Indefensible Local Network Attacks.opus 9.8 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Ofir Arkin - Introducing X Playing Tricks with ICMP.opus 10 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Palante - Top 25 Overlooked Security Configuration on Your Switches and Routers.opus 9.1 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Rain Forest Puppy - TBD.opus 11.5 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Renaud Deraison - The Nessus Project Reducing the Costs of Vulnerability Assessment.opus 10.7 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Richard Thieme - Defending the Information Web New Ways of Thinking About Security.opus 5.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Robert Hansen - htaccess Scripts in Apache Environments.opus 6.1 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Scott Blake - Dog of War Attack Box Design.opus 7.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Simple Nomad and Todd Sabin - The RAZOR Warez.opus 7.5 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Steven Christey - CVE Behind the Scenes The Complexity of Being Simple.opus 9.3 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Thomas Olofsson - Building a Blind IP Spoofed Portscanning Tool.opus 7.1 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Tim Newsham - Cracking WEP Keys.opus 6.7 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Timothy Mullen - Grabbing User Credentials via W2k ODBC Libraries.opus 6.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/audio/Black Hat USA 2001 - Walter Gary Sharp - Key Legal Implications of Computer Network Defense.opus 11.1 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Andrew van der Stock - Alternatives to Honeypots.mp4 69.8 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Brian Martin and B K DeLong - Lessons Learned From attrition.org.mp4 90.6 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Bruce Schneier - Paradigms Lost Engineering vs Risk Management.mp4 28.7 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Chad R Skipper - Polymorphism and Intrusion Detection Systems.mp4 50.7 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Chip Andrews - SQL Security Revisited.mp4 90.7 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Cory Scott - Systems Management in an Untrusted Network.mp4 81.6 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Daji Sanai - Promiscuous Node Detection Using ARP Packets.mp4 59.3 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Daniel VanBelleghem - Solving Network Mystries.mp4 50.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Gregory S Miles - Computer Forensics a Critical Process in Your Incident Response Plan.mp4 89 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 1.mp4 71 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Halvar Flake - Hit Them Where It Hurts Finding Holes in COTS Software Part 2.mp4 70.5 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Ian Goldberg - Breaking 80211 WEP.mp4 92.8 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - James Bamford - Researching Secrets Part II.mp4 54 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Jay Beale - Attacking and Defending BIND DJBDNS DNS Servers.mp4 70.6 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Jeff Nathan and Kevin Depeugh - Layer 2 Attacks.mp4 39 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Job de Haas - GSM WAP and SMS Security.mp4 105.2 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Jose Nazario - The Future of Network Worms.mp4 48.5 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Kevin McPeake and Chris Goggins - Falling Dominos.mp4 104 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Lance Spitzner - The Honey Net Project.mp4 92.8 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Last Stage Of Delirium Research Group - UNIX Assembly Codes Development for Vulnerabilities.mp4 98.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Mandy Andress - Wireless LAN Security.mp4 38.7 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Marshall Beddoe and Chris Abad - The Siphon Project.mp4 80.1 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Martin Roesch - Snort.mp4 84.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Mike Beekey - ARP Vulnerabilities Indefensible Local Network Attacks.mp4 72.5 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Ofir Arkin - Introducing X Playing Tricks with ICMP.mp4 72.6 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Palante - Top 25 Overlooked Security Configuration on Your Switches and Routers.mp4 67 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Rain Forest Puppy - TBD.mp4 79.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Renaud Deraison - The Nessus Project Reducing the Costs of Vulnerability Assessment.mp4 75.3 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Richard Thieme - Defending the Information Web New Ways of Thinking About Security.mp4 41.3 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Robert Hansen - htaccess Scripts in Apache Environments.mp4 43.8 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Scott Blake - Dog of War Attack Box Design.mp4 58.3 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Simple Nomad and Todd Sabin - The RAZOR Warez.mp4 53.7 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Steven Christey - CVE Behind the Scenes The Complexity of Being Simple.mp4 66.9 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Thomas Olofsson - Building a Blind IP Spoofed Portscanning Tool.mp4 50.3 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Tim Newsham - Cracking WEP Keys.mp4 48.2 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Timothy Mullen - Grabbing User Credentials via W2k ODBC Libraries.mp4 50 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/Black Hat USA 2001 - Walter Gary Sharp - Key Legal Implications of Computer Network Defense.mp4 82.6 MB
Black Hat/Black Hat USA/Black Hat USA 2001/video/filelist.txt 3 KB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Aaron Higbee and Chris Davis - DC Phone Home.opus 9.8 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Bruce Potter - 802.11X.opus 9.1 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Cean Convery - Hacking Layer Two.opus 13 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dan Kaminsky - Black Ops of TCPIP.opus 12.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dan Veeneman - Vulnerabilities of Cellular and Satellite - based Voice and Data Networks.opus 11 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dan Veeneman - Wireless Overview - Protocols and Threat Models.opus 10.6 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dave Aitel - An Introduction to Spike.opus 9.2 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dennis Groves and Bill Pennington - Web Application Security.opus 11.5 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Diana Kelly and Ian Poynter - Single Sign On 101.opus 11.7 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Dow Herath Mehta Spencer and Flake - Professional Source Code Auditing.opus 13 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Fischbach and Lacoste - Seris - IP Backbone Security.opus 11.8 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Goldman and Marotta - Securing Your Computing Environment to Conform to Privacy Regulations.opus 9.6 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Halvar Flake - Graph Based Binary Analysis.opus 7.7 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - ian Goldberg - Off the Record Messaging.opus 12.6 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Jay Beale - Attacking and Securing UNIX FTP Servers.opus 8.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - JD Glaser - JDs Toolbox Fire and Ice.opus 6.6 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Jed Haile - Hogwash.opus 10.2 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Jeff Jonas - Non Obvious Relationship Awareness.opus 5.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Len Sassaman - Forensic Dead - Ends.opus 8.2 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Mark Eckenwiler - USA Patriot Act and Criminal Investigations.opus 10.1 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Maximiliano Caceres - Syscall Proxying.opus 10 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Mike Schiffman - The Need for an 802.11b Toolkit.opus 11.4 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Ofir Arkin - Cracking VoIP Architecture.opus 12.6 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Panel - Hacker Court.opus 17.7 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Panel - Vulnerability Disclosure What the Feds Think.opus 15 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Paul Knight - Dynamic Routing Inside IPsec VPNs.opus 7.4 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Rain Forest Puppy - Novell The Forgotten OS.opus 12.1 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Rich Murphy - Locking Down Your FreeBSD Install.opus 11 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Richard Clarke - Keynote National Strategy for Securing Cyberspace.opus 7.4 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Richard George - Views On The Future Direction of Information Assurance.opus 6.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Rick Smith - The Biometrics Dilemma.opus 10.9 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Robert Baird and Mike Lynn - Advanced 80211b Attack.opus 10.5 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Roelof Temmingh and Haroon Meer - Setiri.opus 10.1 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Roger Dingledine - Why is Anonymity So Hard.opus 12.6 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Scott Blake - Politics of Vulnerabilities.opus 8.1 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Shaun Clowes - Fixing and Making Holes in Binaries.opus 11 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Sutton & Greene - The Art Of File Format Fuzz.opus 6.8 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - The Honeynet Project - 2nd Generation Honeynet Technologies.opus 14.1 MB
Black Hat/Black Hat USA/Black Hat USA 2002/audio/Black Hat USA 2002 - Tim Mullen - Neutralizing Nimda Automated Strikeback.opus 11 MB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/aitel-bh-us-02-spike.ppt 214 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/blake-bh-us-02-flaws.ppt 192 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caldwell-bh-us-02-event.ppt 537 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/convrey-bh-us-02-layer2.ppt 999 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/dingledine-us-02.pdf 43 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/dugan-us-02-layer.ppt 204 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/eckinwiler-us-02-patriotact.ppt 672 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/fischbach-us-02-ipbackbone.ppt 493 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/goldberg-us-02-messaging.pdf 51 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/goldman-bh-us-02-privacy-.ppt 376 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/groves-bh-us-02-webapps.ppt 2.9 MB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/haile-bh-us-02-hogwash.ppt 79 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/halvar-bh-us-02-binary.ppt 146 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/hoglund-bh-us-02-apsecurity.ppt 2.6 MB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/holman-bh-us-02-email.pdf 120 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/honeynet-bh-us-02-honeynet.ppt 807 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/kaminsky-bh-us-02-blackops.ppt 207 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/litchfield-bh-us-02.pdf 66 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/mullen-us-02-nimda.ppt 282 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/phenoelit-bh-us-02-network.pdf 312 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/potter-bh-us-02-8021x.ppt 248 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/poynter-bh-us-02-sso.ppt 74 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/schiffman-bh-us-02-wireless.ppt 2.8 MB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/schonefeld-bh-us-02-java.ppt 559 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/sensepost-bh-us-02-setiri.ppt 491 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/shinder-bh-us-02-cybercrime.ppt 266 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/smith-bh-us-02-biometric.ppt 770 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/akin-bh-us-02-cisco/CiscoRouterForensicCheck.doc 23 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/akin-bh-us-02-cisco/CiscoRouterForensics.ppt 198 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/akin-bh-us-02-cisco/ExampleCustofyForm.xls 30 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/akin-bh-us-02-cisco/ExampleEvidenceLabels.doc 96 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/arkin/arkin-bh-us-02-voip.ppt 8.7 MB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha.tar 210 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha.tar.gz 44 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/bairdlynn-bhus-02-adv80211.ppt 32 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/80211.h 19 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/airjack.c 53 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/airjack.h 13 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/hfa384x.c 16 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/LICENSE 18 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/Makefile 855 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/VERSION 36 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/80211.h 19 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/dump_core.c 796 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/essid_jack.c 14 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/monkey_jack.c 23 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/set_channel.c 5 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/baird_lynn/airjack-v0.5.1-alpha/tools/wlan_jack.c 10 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/caceres-bh-us-02-syscall.ppt 685 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/SyscallProxying.html 44 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/SyscallProxying.pdf 91 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/buffer_marshall.png 4 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/fatclient_thinserver.png 6 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/local_process.png 2 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/local_process_server.png 3 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/remote_process_server.png 5 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/figures/rpc_model.png 5 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/1.gif 968 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/1.png 329 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/2.gif 968 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/2.png 353 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/3.gif 968 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/3.png 350 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/4.gif 968 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/4.png 345 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/5.gif 968 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/5.png 348 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/6.gif 968 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/6.png 355 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/7.gif 968 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/7.png 344 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/8.gif 968 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/8.png 357 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/9.gif 968 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/9.png 357 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/10.gif 968 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/caceres/images/callouts/10.png 361 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/clowes-bh-us-02-binaries.ppt 169 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils-bh.tar 90 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils-bh.tar.gz 20 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2.tar 350 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2.tar.gz 79 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/addlibrary.c 20 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/addspace.c 16 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/changesegment.c 3 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/codepatch.h 595 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/codepatchadd.c 7 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/codepatchapply.c 3 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/codepatchcore.c 5 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/codepatchlist.c 2 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/COPYING 18 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/Makefile 271 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/README 2 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/elfutils/stripsections.c 2 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/acconfig.h 461 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/ChangeLog 422 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/config.guess 37 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/config.h.in 613 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/config.sub 27 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/configure 55 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/configure.in 2 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/COPYING 18 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/elffile.c 17 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/elffile.h 2 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/errorlog.c 4 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/errorlog.h 2 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/injectso.c 29 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/injectso.h 2 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/install-sh 5 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/intercept.c 23 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/intercept.h 7 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/libtest.c 2 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/Makefile.in 817 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/pidof 66 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/procdbg.c 27 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/procdbg.h 5 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/readargs.c 11 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/readargs.h 3 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/README 193 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/README.html 22 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/README.txt 20 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/clowes/injectso-0.2/TODO 263 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/endler/endler-us-02-webapps101.ppt 2.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE SessionIDs.pdf 483 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/endler/idefense.zip 4.7 MB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor.zip 2.1 MB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor Folder/LICENSE.txt 3 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor Folder/README.txt 4 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor Folder/Sessions.CAB 2.1 MB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor Folder/setup.exe 138 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/endler/iDEFENSE_Session_Auditor Folder/SETUP.LST 4 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/higbee_davis/DCPH_X86.ISO 20.4 MB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/higbee_davis/higbeedavis-bh-us-02-phone.ppt 2.9 MB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/An Introduction to IP Security (IPSec) Encryption.pdf 148 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Baseline Process - Best Practices.pdf 709 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Benefits and Limitations of Context-Based Access Control.pdf 49 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Best Practices for Catalyst 4000, 5000 and 6000 Series Swit.pdf 190 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Building a Perimeter Security Solution.pdf 164 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Capacity and Performance Management - Best Practices.pdf 71 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Change Management - Best Practices.pdf 47 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Choosing and Upgrading Software for Cisco IOS Firewall.pdf 53 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Express Forwarding (CEF).pdf 60 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Hardware and VPN Clients Supporting IPSec - PPTP - L2TP.pdf 15 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco IOS Firewall Feature Set Frequently Asked Questions.pdf 25 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco IOS Reference Guide.pdf 442 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Packet Telephony Center - A Novel Approach for the Ma.pdf 302 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Secure Intrusion Detection System Frequently Asked Qu.pdf 24 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Unified VPN Suite.pdf 90 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Unity Data and the Directory.pdf 132 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco Unity Data Architecture and How Cisco Unity Works.pdf 84 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco VPN Solution Center 2.2.pdf 302 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Cisco's PIX Firewall and Stateful Firewall Security.pdf 82 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Configuration Management - Best Practices.pdf 44 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Configuring IP Access Lists.pdf 45 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Context-Based Access Control - Introduction and Configuration.pdf 23 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Deploying Cisco Unity in Diverse Messaging Environments.pdf 65 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Disaster Recovery - Best Practices.pdf 53 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/GPRS.pdf 260 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/How NAT Works.pdf 752 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/How Virtual Private Networks Work.pdf 61 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Improving Security on Cisco Routers.pdf 59 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Lock-and-Key - Dynamic Access Lists.pdf 25 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Maintaining a Cisco Unity System (with Microsoft Exchange a.pdf 176 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Measuring Delay, Jitter, and Packet Loss with Cisco IOS SAA.pdf 113 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Metro IP Technology.pdf 187 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Network Management System - Best Practices.pdf 61 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Network Security Policy - Best Practices.pdf 22 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Network Time Protocol - Best Practice.pdf 105 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/New Solution Deployment - Best Practices.pdf 33 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/OSPF Configuration Management with SNMP.pdf 69 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Performance Management - Best Practices.pdf 67 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/PPTP Frequently Asked Questions.pdf 12 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/SAFE - A Security Blueprint for Enterprise Networks.pdf 868 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/SAFE - Wireless LAN Security in Depth.pdf 882 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Security Best Practices for Cisco Unity 3.0.pdf 203 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Service Level Management - Best Practices.pdf 74 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/Info-white papers/Using the Cisco IOS Firewall to Allow Java Applets From Kno.pdf 21 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/jay_beale/beale-bh-us-02-unixftp.ppt 106 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/jay_beale/how-do-I-tighten.html 16 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/jay_beale/obscurity-revisited.html 19 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/jay_beale/stupid-protocols.html 26 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/jay_beale/suid-audit.html 23 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/knight/draft-knight-ppvpn-ipsec-dynrou 41 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/knight/knight-bh-us-02-vpn.ppt 560 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/murphey/murphey-bh-us-o2-freebsd.ppt 394 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/murphey/README 910 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/murphey/systrace-for-FreeBSD4.5.tgz 278 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/sassaman/bibliography.txt 893 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/sassaman/chaum-acm-1981.txt 22 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/sassaman/draft-moeller-mixmaster2-protoc 23 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/sassaman/mixmaster-2.9b34.tar.gz 400 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/sassaman/mixmaster-2.9b34.tar.gz.sig 155 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/sassaman/nilsimsa-0.2.4.tar.gz 53 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/sassaman/nilsimsa-0.2.4.tar.gz.sig 232 B
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/sassaman/sassaman-bh-us-02-forensic.ppt 55 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/sassaman/sassaman-blackhat02.tar.gz 1 493 KB
Black Hat/Black Hat USA/Black Hat USA 2002/presentations/sassaman/sassaman-blackhat02.tar.gz.ungz 610 KB
Black Hat/Black Hat USA/Black Hat USA 2002/video/bh - archives - 2002.html 148 KB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Aaron Higbee and Chris Davis - DC Phone Home.mp4 74.4 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Bruce Potter - 802.11X.mp4 64 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Cean Convery - Hacking Layer Two.mp4 94.2 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Dan Kaminsky - Black Ops of TCPIP.mp4 90.4 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Dan Veeneman - Vulnerabilities of Cellular and Satellite - based Voice and Data Networks.mp4 77.9 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Dan Veeneman - Wireless Overview - Protocols and Threat Models.mp4 74.9 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Dave Aitel - An Introduction to Spike.mp4 49 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Dennis Groves and Bill Pennington - Web Application Security.mp4 83.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Diana Kelly and Ian Poynter - Single Sign On 101.mp4 84.4 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Dow Herath Mehta Spencer and Flake - Professional Source Code Auditing.mp4 96.9 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Fischbach and Lacoste - Seris - IP Backbone Security.mp4 84 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Goldman and Marotta - Securing Your Computing Environment to Conform to Privacy Regulations.mp4 72.6 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Halvar Flake - Graph Based Binary Analysis.mp4 62.2 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - ian Goldberg - Off the Record Messaging.mp4 95.9 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Jay Beale - Attacking and Securing UNIX FTP Servers.mp4 70.9 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - JD Glaser - JDs Toolbox Fire and Ice.mp4 48.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Jed Haile - Hogwash.mp4 72.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Jeff Jonas - Non Obvious Relationship Awareness.mp4 38.6 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Len Sassaman - Forensic Dead - Ends.mp4 61.9 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Mark Eckenwiler - USA Patriot Act and Criminal Investigations.mp4 83.6 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Maximiliano Caceres - Syscall Proxying.mp4 75.8 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Mike Schiffman - The Need for an 802.11b Toolkit.mp4 82.2 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Ofir Arkin - Cracking VoIP Architecture.mp4 89.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Panel - Hacker Court.mp4 135.8 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Panel - Vulnerability Disclosure What the Feds Think.mp4 111.6 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Paul Knight - Dynamic Routing Inside IPsec VPNs.mp4 55.9 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Rain Forest Puppy - Novell The Forgotten OS.mp4 85.5 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Rich Murphy - Locking Down Your FreeBSD Install.mp4 83.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Richard Clarke - Keynote National Strategy for Securing Cyberspace.mp4 52.8 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Richard George - Views On The Future Direction of Information Assurance.mp4 44.9 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Rick Smith - The Biometrics Dilemma.mp4 78.1 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Robert Baird and Mike Lynn - Advanced 80211b Attack.mp4 79.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Roelof Temmingh and Haroon Meer - Setiri.mp4 72.2 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Roger Dingledine - Why is Anonymity So Hard.mp4 91.4 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Scott Blake - Politics of Vulnerabilities.mp4 58 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Shaun Clowes - Fixing and Making Holes in Binaries.mp4 82.3 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Sutton&Greene - The Art Of File Format Fuzz.mp4 49.7 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - The Honeynet Project - 2nd Generation Honeynet Technologies.mp4 96 MB
Black Hat/Black Hat USA/Black Hat USA 2002/video/Black Hat USA 2002 - Tim Mullen - Neutralizing Nimda Automated Strikeback.mp4 83.1 MB
Black Hat/Black Hat USA/Black Hat USA 2003/bh-archives-2003.html 219 KB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/bh-archives-2003.html 219 KB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Adam Shostack - Identity,Economics,Security,and Terrorism.opus 12.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Aldora Louw - Notes on Domino.opus 7.9 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Andrea Matwyshyn - Introduction to Corporate Information Security Law.opus 12.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Brandon Wiley - The Superworm Manifesto.opus 11.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Bruce Potter - Java Card 101.opus 9.9 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Bruce Schneier - Keynote,Following the Money Security Proxies and Agenda.opus 7.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Chris Paget - Click to Continue Shatter Attacks on Win32.opus 9.9 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Chuck Willis - Forensics with Linux 101.opus 13.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Curtis E Karnow - Running the Matrix.opus 9.9 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Dan Kaminsky - Stack Black Ops.opus 12.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Dario Forte (Luncheon) - International Hacking When the cooperation is the only cure.opus 4.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - David Litchfield - Variations in Exploit Methods between Linux and Windows.opus 6.9 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - David Maynor - Leave the Theory Behind and Embrace the Code.opus 13.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Drew Miller - .Net from the hackers perspective Part 2 .opus 13 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Eric Goldman - Criminal Copyright infringement and warez trading.opus 11 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Fredric Bret - Mounet - Automated Detection of COM Vulnerabilities.opus 12 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - FX - More Embedded Systems.opus 11.9 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Gerardo Richarte - Modern Intrusion Practices.opus 13.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Gerhard Eschelbeck - Law Vulnerabilities.opus 10.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Greg Hoglund - Runtime Decompilation.opus 7.3 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks.opus 11.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Honey Project - Latest Advances in Honeynet Technologies.opus 11.5 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Jan K Rutkowski - Advance Windows 2000 Rootkits Detection.opus 15 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Jay Beale - Locking Down Mac OS X.opus 13.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Jaya Baloo - Lawful Interception of IP the European Context.opus 11.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Jeffrey Prusan - Technical Security Countermeasures.opus 8.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Jennifer Granick - The Law of 'Sploits.opus 11.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Josh Daymont - Hardening Windows CE.opus 14.1 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Kevin Spett - Java Decompilation and Application Security.opus 4.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Lance Spitzner - Honey Topics.opus 11.3 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Lance Spitzner - Honeypots.opus 10 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Larry Leibrock - Digital Information,User Tokens,Privacy and Forensics Investigation.opus 9.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems(Theory).opus 13.1 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems.opus 10.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks.opus 9.5 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Marcus Sachs - Building a Global Culture of Security(Luncheon Speaker).opus 5.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Matthew Franz and Sean Convery - BGP Vulnerability Testing.opus 14 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Neel Mehta - Advanced in ELF runtime binary encryption - Shiva.opus 9.5 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Ofir Arkin - Revolutionizing Operating System Fingerprinting.opus 11.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Panel - Adversary Characterization and Scoring System.opus 11.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Panel - Hacker Court.opus 12.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Panel - Hiring Trends in InfoSec.opus 11.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Panel - Proposed Vulnerability Handling.opus 10.9 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Patrick Miller - Spider(tool).opus 6.3 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Paul Wouters - IPSEC Opportunistic Encryption using DNSSEC.opus 9.5 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Philip Zimmermann - Keynote with Introduction by Jeff Moss.opus 8.1 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Rick Smith - Masquerades,Tricking Modern Auth Systems.opus 8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques.opus 9.3 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - SensePost - Putting Tea back into CyberTerrorism.opus 9.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Silvio Cesare - Opensource Kernel Auditing and Exploitation.opus 11.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Simple Nomad - Covering Your Tracks.opus 9 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Sutterfield - Enterprise security for converging technologies.opus 10.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Thomas Akin - WebMail Forensics.opus 11.3 MB
Black Hat/Black Hat USA/Black Hat USA 2003/audio/Black Hat USA 2003 - Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder.opus 7.3 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Adam Shostack - Identity, Economics, Security, and Terrorism.mp4 95.3 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Aldora Louw - Notes on Domino.mp4 59.5 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Andrea Matwyshyn - Introduction to Corporate Information Security Law.mp4 96.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Brandon Wiley - The Superworm Manifesto.mp4 84.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Bruce Potter - Java Card 101.mp4 70.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Chris Paget - Click to Continue Shatter Attacks on Win32.mp4 73 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Chuck Willis - Forensics with Linux 101.mp4 100.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Curtis E Karnow - Running the Matrix.mp4 72.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Dan Kaminsky - Stack Black Ops.mp4 94.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Dario Forte (Luncheon) - International Hacking When the cooperation is the only cure.mp4 31.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - David Litchfield - Variations in Exploit Methods between Linux and Windows.mp4 50.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - David Maynor - Leave the Theory Behind and Embrace the Code.mp4 99.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Drew Miller - .Net from the hackers perspective Part 2 .mp4 95.9 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Eric Goldman - Criminal Copyright infringement and warez trading.mp4 81.5 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Fredric Bret - Mounet - Automated Detection of COM Vulnerabilities.mp4 90.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - FX - More Embedded Systems.mp4 86.9 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Gerardo Richarte - Modern Intrusion Practices.mp4 104 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Gerhard Eschelbeck - Law Vulnerabilities.mp4 78.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Greg Hoglund - Runtime Decompilation.mp4 52.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks.mp4 85.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Honey Project - Latest Advances in Honeynet Technologies.mp4 83.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Jan K Rutkowski - Advance Windows 2000 Rootkits Detection.mp4 111.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Jay Beale - Locking Down Mac OS X.mp4 103.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Jaya Baloo - Lawful Interception of IP the European Context.mp4 87.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Jeffrey Prusan - Technical Security Countermeasures.mp4 62.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Jennifer Granick - The Law of 'Sploits.mp4 88.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Josh Daymont - Hardening Windows CE.mp4 104.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Kevin Spett - Java Decompilation and Application Security.mp4 34.5 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Lance Spitzner - Honey Topics.mp4 80.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Lance Spitzner - Honeypots.mp4 80.3 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Larry Leibrock - Digital Information,User Tokens,Privacy and Forensics Investigation.mp4 70.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems(Theory).mp4 97.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems.mp4 81.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks.mp4 76.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Marcus Sachs - Building a Global Culture of Security(Luncheon Speaker).mp4 41.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Matthew Franz and Sean Convery - BGP Vulnerability Testing.mp4 102.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Neel Mehta - Advanced in ELF runtime binary encryption - Shiva.mp4 70.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Ofir Arkin - Revolutionizing Operating System Fingerprinting.mp4 85.1 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Panel - Adversary Characterization and Scoring System.mp4 87 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Panel - Hacker Court.mp4 89.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Panel - Hiring Trends in InfoSec.mp4 90.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Panel - Proposed Vulnerability Handling.mp4 82 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Patrick Miller - Spider(tool).mp4 46.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Paul Wouters - IPSEC Opportunistic Encryption using DNSSEC.mp4 74.1 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Philip Zimmermann - Keynote with Introduction by Jeff Moss.mp4 59.8 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Rick Smith - Masquerades,Tricking Modern Auth Systems.mp4 58.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - ruce Schneier - Keynote,Following the Money Security Proxies and Agenda.mp4 57.4 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques.mp4 69 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - SensePost - Putting Tea back into CyberTerrorism.mp4 72.7 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Silvio Cesare - Opensource Kernel Auditing and Exploitation.mp4 85.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Simple Nomad - Covering Your Tracks.mp4 66.9 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Sutterfield - Enterprise security for converging technologies.mp4 77.2 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Thomas Akin - WebMail Forensics.mp4 85.6 MB
Black Hat/Black Hat USA/Black Hat USA 2003/video/Black Hat USA 2003 - Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder.mp4 52.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-k1-Paul_Simmons-Welcom_to_BlackHat.m4a 22.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v1-Sarah_Gordon-Antivirus_Security_Softwear_Tests.m4a 25.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v3-JD_Glaser-Hacking_With_Executives.m4a 24.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v4-David_Litchfield-All_New_0_Day.m4a 17.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v5-Tzi-cker_Chiueh-Program_Semantics_Aware_Intrusion_Detection.m4a 27.5 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v8-Jennifer_Granick-Legal_Liability_and_Security_Incident_Investigation.m4a 31.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v10-Halvar_Flake-Diff_Navigate_Audit.m4a 22.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v11-Seth_Fogie-Pocket_PC_Abuse.m4a 25 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v12-Joe_Grand-Introduction_to_Embedded_Security.m4a 38.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v13-Gerard_Eschelbeck-The_laws_of_Vulnerabilities_for_Internal_Networks.m4a 25.5 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v14-Saumil_Shah-Defeating_Automated_Web_Assessment_Tools.m4a 23.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v15-David_Maynor-Trust_NoOne_Not_Even_Yourself_or_the_Weak_Link_may_be_Your_Build_Tools.m4a 19.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v16-Michael_Sherma-Web_Application_Session_Strength.m4a 36.2 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v17-Spoonm-Metasploit_Hacking_Like_in_the_Movies.m4a 26.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v18-Brad_Bolin-Information_Security_Law_Update.m4a 33.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v19-Thorsen_Holz-Maximilliam_Dornseif-NoSEBrEaK_Defeating_Honeypots.m4a 27.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v20-Chris_Egale-Attacking_Obfuscated_Code_with_IDA_pro.m4a 713 KB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v21-Nitesh_Dhanjani-Justin_Clark.m4a 28.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v22-Joe_Grand-A_Historical_Look_at_Hardware_Token_Compromises.m4a 36.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v23-Hacker_Court_04_Pirates_of_the_Potomac.m4a 55.5 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v24-Eugene_Tsyrklevich-Attacking_Host_Intrusion_Prevention_Systems.m4a 19.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v25-FX-Vulnerability_Finding_in_Win32A_Comparison.m4a 34.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v26-Panel-The_BlackHat_Testimonies.m4a 24.4 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v27-Rebecca_Mercuri-Bev_Harris-Managing_Election_Data_The_California_Recall.m4a 22.2 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v28-Adam_Laurie-Martin_Hurfurt-BlueSnarfing_the_Risk_from_Digital_Pickpockets.m4a 26.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v29-Richard_Thieme-Saying_Whatever_he_Wants.m4a 25.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v30-Robert_Morris-The_Future_of_the_History.m4a 20.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v31-Dan_Kaminsky-the_Black_Ops_of_DNS.m4a 23.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v32-Michael_Raggo-Steganography_Steganalysis_Cryptanalysis.m4a 21.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v33-Roger_Dingledine-Putting_the_P_back_in_VPN.m4a 30.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v34-Sensepost-When_The_Tables_Turn.m4a 29.1 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v35-Phillip_Hallam-Baker-Phishing-commiting_Fraud_in_Public.m4a 26.5 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v36-Panel-Application_Security_Crossfire.m4a 35 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v37-K_K_Mookhey-Evasion_and_Detection_of_Web_Application_Tactics.m4a 24.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v38-Alessandro_Acquisti-Privacy_Economics_and_Immediate_Gratification.m4a 38.4 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v39-Jamie_Butler-Greg_Hoglund-VICE_Catch_the_Hookers.m4a 27.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v40-Patrick-Chambet-Google_Attacks.m4a 10.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v41-Andrew_Stevens-How_Next_Generation_Application_Proxies_Protect_Against_the_Latest_Attacks_and_Intrusions.m4a 11.4 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v42-Chris_Hurley-WorldWide_War_Drive.m4a 9.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v43-Brett_Moore-Shoot_the_Messenger.m4a 26 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v44-Peter_Feaver-Kenneth_Greers-Cyber_Jihad_and_the_Globalization_of_Warfare.m4a 33.4 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v45-Johnny_Long-You_Got_That_With_Google.m4a 1.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v46-Stefano_Zanero-Detecting_0_Day_Attacks_with_Learning_IDS.m4a 32.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v47-James_Foster-Managing_Hackers.m4a 12.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v48-Himanshu_Dwivedi-Insecure_IP_Storage_Networks.m4a 13.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v50-Ralf_Spenneberg-IKE_Testing_IKE_Implementations.m4a 29.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v51-Chris_Kret-Nobodys_Anonymous-Tracking_Spam_and_Covert_Channels.m4a 28.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v52-Len_Sassman-The_Anonymity_Toolkit.m4a 34.1 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v53-Peter_Siberman_Richard_Johnson-Comparison_Buffer_Overflow_Prevention_Implementations_and_Weaknesses.m4a 26.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v54-David_Worth-Cryptographic_Port_Knocking.m4a 11.2 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v55-Sarah_Gordon-Privacy_Do_as_I_Say_Not_as_I_Do.m4a 8.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v56-Lauren_Oudot-Digital_Active_Self_Defence.m4a 12.5 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v57-Cameron_Hotchkies-Blind_Injection_Automation_Techniques.m4a 28.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v58-Kevin_Madi-Evolution_of_Incident_Response.av.m4a 32.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v59-Bruce_Potter-and-Brian_Wotring.m4a 35.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v60-Dominique_Brezinski-Acting_in_Milliseconds-Why_Defense_Processes_Need_to_Change.m4a 477 KB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v61-Gregory_S_Miles-Travis_Schack-Introduction_to_Global_Security_Syndicate.m4a 10.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/audio/2004-BlackHat_Vegas-v62-Patrick_Chambert-Managing_MSIE_Security_in_Corporate_Networks_by_Creating_Custom_Internet_Zones.m4a 14.2 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Adam Laurie - Martin Hurfurt - BlueSnarfing the Risk from Digital Pickpockets.mp4 62 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Alessandro Acquisti - Privacy Economics and Immediate Gratification.mp4 90.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Andrew Stevens - How Next Generation Application Proxies Protect Against the Latest Attacks and Intrusions.mp4 24.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Brad Bolin - Information Security Law Update.mp4 80.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Brett Moore - Shoot the Messenger.mp4 61.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Bruce Potter - and - Brian Wotring.mp4 84.4 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Cameron Hotchkies - Blind Injection Automation Techniques.mp4 66.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Chris Egale - Attacking Obfuscated Code with IDA pro.mp4 1.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Chris Hurley - WorldWide War Drive.mp4 21.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Chris Kret - Nobodys Anonymous - Tracking Spam and Covert Channels.mp4 65.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Dan Kaminsky - the Black Ops of DNS.mp4 55.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - David Litchfield - All New 0 Day.mp4 42.4 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - David Maynor - Trust NoOne Not Even Yourself or the Weak Link may be Your Build Tools.mp4 46.1 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - David Worth - Cryptographic Port Knocking.mp4 25.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Dominique Brezinski - Acting in Milliseconds - Why Defense Processes Need to Change.mp4 1.1 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Eugene Tsyrklevich - Attacking Host Intrusion Prevention Systems.mp4 47.2 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - FX - Vulnerability Finding in Win32A Comparison.mp4 82 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Gerard Eschelbeck - The laws of Vulnerabilities for Internal Networks.mp4 60.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Gregory S Miles - Travis Schack - Introduction to Global Security Syndicate.mp4 25.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Hacker Court 04 Pirates of the Potomac.mp4 131.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Halvar Flake - Diff Navigate Audit.mp4 53.5 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Himanshu Dwivedi - Insecure IP Storage Networks.mp4 32.2 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - James Foster - Managing Hackers.mp4 28.4 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Jamie Butler - Greg Hoglund - VICE Catch the Hookers.mp4 63.4 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - JD Glaser - Hacking With Executives.mp4 58.4 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Jennifer Granick - Legal Liability and Security Incident Investigation.mp4 74.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Joe Grand - A Historical Look at Hardware Token Compromises.mp4 82.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Joe Grand - Introduction to Embedded Security.mp4 87.5 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Johnny Long - You Got That With Google.mp4 3.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - K K Mookhey - Evasion and Detection of Web Application Tactics.mp4 58.1 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Kevin Madi - Evolution of Incident Response.av.mp4 75.2 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Lauren Oudot - Digital Active Self Defence.mp4 29 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Len Sassman - The Anonymity Toolkit.mp4 80.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Michael Raggo - Steganography Steganalysis Cryptanalysis.mp4 50.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Michael Sherma - Web Application Session Strength.mp4 83.3 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Nitesh Dhanjani - Justin Clark.mp4 67.4 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Panel - Application Security Crossfire.mp4 84.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Panel - The Black Hat Testimonies.mp4 45.2 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Patrick - Chambet - Google Attacks.mp4 24.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Patrick Chambert - Managing MSIE Security in Corporate Networks by Creating Custom Internet Zones.mp4 32.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Paul Simmons - Welcome to Black Hat.mp4 54.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Peter Feaver - Kenneth Greers - Cyber Jihad and the Globalization of Warfare.mp4 80 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Peter Siberman Richard Johnson - Comparison Buffer Overflow Prevention Implementations and Weaknesses.mp4 63.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Phillip Hallam - Baker - Phishing - commiting Fraud in Public.mp4 62 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Ralf Spenneberg - IKE Testing IKE Implementations.mp4 68.7 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Rebecca Mercuri - Bev Harris - Managing Election Data The California Recall.mp4 52.1 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Richard Thieme - Saying Whatever he Wants.mp4 59.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Robert Morris - The Future of the History.mp4 48 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Roger Dingledine - Putting the P back in VPN.mp4 73.6 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Sarah Gordon - Antivirus Security Softwear Tests.mp4 57.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Sarah Gordon - Privacy Do as I Say Not as I Do.mp4 20.5 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Saumil Shah - Defeating Automated Web Assessment Tools.mp4 56.4 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Sensepost - When The Tables Turn.mp4 67.5 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Seth Fogie - Pocket PC Abuse.mp4 44.9 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Spoonm - Metasploit Hacking Like in the Movies.mp4 46 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Stefano Zanero - Detecting 0 Day Attacks with Learning IDS.mp4 77.8 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Thorsen Holz - Maximilliam Dornseif - NoSEBrEaK Defeating Honeypots.mp4 62 MB
Black Hat/Black Hat USA/Black Hat USA 2004/video/Black Hat USA 2004 - Tzi-cker Chiueh - Program Semantics Aware Intrusion Detection.mp4 64.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - A Aggarwal-Rapid Threat Modeling.opus 4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - A Kornbrust-Circumvent Oracle.opus 8.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - A Youn-Building Robust Backdoors.opus 7.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Adam Boileau-Trust Transcience.opus 9.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Ansanelli-Future of Personal info.opus 11.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Barnaby Jack-Kernel Exploitation.opus 5.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Barrall-Dewey-Plug_and_Root.opus 4.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Beetle Potter-Evil Twins 802.11.opus 9.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Ben Laurie-CaPerl.opus 7.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Bidou-Dirty BlackMail DoS Story.opus 2.6 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - C Cerrudo-Demystifying SQL-Oracle.opus 3.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Clarke-Sandberg-Scalable searches.opus 9.6 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Cunningham w Morgan-US Natl Sec.opus 14.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - D Barrall-Shakespearean Shellcode.opus 2.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - D Maynor-NX-How Well Does it Say NO.opus 5.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - David Litchfield-All New 0 Day.opus 5.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Eugene Tsyrkievich-Ozone.opus 12.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Evans-Thompson-Self-defending.opus 3.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Foster Liu-Catch Me if You Can.opus 8.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Gilman_Louie_keynote_audio.mp3 12.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Gilman_Louie_keynote_audio.opus 8.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Grand-Sec Problems HWare Devices.opus 11.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Greg Conti-Crafting a Tivo.opus 10.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Grugq-Defeating Forensic Analysis.opus 10.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Hansen-Patterson-Stopping Injection.opus 7.6 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Harper and Balas-The Birth of roo.opus 8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Himanshu Dwivedi-iSCI Insecure SCSI.opus 11.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - J Grossman-Phishing with Super Bait.opus 8.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - J Klein-Soc Engineering Methodology.opus 6.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - J Long-Google Hacking for Pen Test.opus 1.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - J Moss G Louie-Welcome Keynote.opus 8.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - James C Foster-BlackHat Standup.opus 2.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Jennifer Granick-Top 10 Issues.opus 11.6 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Jim Christy-The Defense Cyber Crime.opus 10.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - K Maffey w others-Long Range RFID.opus 10.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Ken Hines-Using Causal Analysis.opus 3.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Kenneth Geers-Hacking in a Foreign.opus 9.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Kevin Cardwell-Toolkits.opus 3.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Kevin_Mandia-Effective_Incident_Response.opus 8.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - MadHat Simple Nomad-SPA.opus 3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Martinez-Advanced SQL Injection.opus 7.6 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Mike Pomraning-Injection Flaws.opus 4.6 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Morris-Non-Cryptographic Ways.opus 9.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Mortman Others-National ID Debate.opus 11.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Moss and Panel-CISO QA.opus 8.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Mudge-Economics Physics Psycology.opus 10.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Nuwere-SIP Format Fuzz in Voip.opus 8.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Ofir Arkin-Infrastructure Discovery.opus 11.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - P Simmonds-The Jericho Challenge.opus 6.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - P Zimmerman-My Next Big Project.opus 7.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Paul Vixie-Preventing Child Neglect.opus 11.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - R W Clark-Legal Aspects.opus 11.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - S Moyer-Owning The C-Suite.opus 2.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Sensepost-Deus ex Machina.opus 10.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Soeder Permeh-eYe Bootroot.opus 11.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Sparks and Butler-Shadow Walker.opus 11.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - spoonm scape-Beyond EIP.opus 4.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Stamos-Stender-Attacking web Service.opus 11 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Sutton-Greene-Art_Of_File_Format.opus 6.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - T Chiueh-Checking Array Bound.opus 9.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - T Close-Shatter Proofing Windows.opus 4.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Van der Stock-OWASP Guide.opus 7.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Wheeler Mehta-Owning Anti-virus.opus 10.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/audio/Black Hat USA 2005 - Yuan Fan-SQL Injection Detection.opus 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Aggarwal.pdf 69 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Arkin.pdf 2.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Barrall.pdf 394 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Barrall-Dewey.pdf 251 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Beetle-Potter.pdf 1.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Bidou.pdf 3.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Cardwell.pdf 2.6 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Cerrudo.pdf 252 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Chiueh.pdf 113 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Clarke-Sandberg.pdf 968 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Dwivedi.pdf 1.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Evans.pdf 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fan.pdf 232 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Foster-Liu.pdf 202 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Geers.pdf 6.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Grand.pdf 813 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Granick.pdf 34 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Grossman.pdf 1.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Grugq.pdf 313 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Harper-Balas.pdf 1.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Hines.pdf 1.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Klein.pdf 131 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Long.pdf 4.6 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-MadHatUnspecific-SimpleNomad.pdf 816 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Mandia.pdf 2.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Maynor.pdf 1.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Moyer.pdf 71 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Mudge.pdf 484 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Pomraning.pdf 86 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Sensepost.pdf 2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Soeder-Permeh.pdf 162 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Sparks-Butler.pdf 484 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-SpoonM-Skape.pdf 103 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Stamos-Stender.pdf 336 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Sutton-Greene.pdf 763 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Tsyrklevich.pdf 99 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Tzi-Cker.pdf 103 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-van_der_Stock.pdf 1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Wheeler-Mehta.pdf 71 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Young.pdf 255 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Beddoe/BH_US_05-Beddoe.pdf 612 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Beddoe/PI-v0.01beta.tgz 45 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Boileau/BH_US_05-Boileau.pdf 1.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Boileau/metlstorms_sshjack-1.02.tar.gz 747 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Clark/BH_US_05-Clark.pdf 608 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Clark/Black Hat USA 2005 DoJ Prosecutions July 2004 to June 2005 Complied by Major Clark.doc 101 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Clark/Black Hat USA 2005 Legal Precedents- Major Clark.doc 244 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Close/BH_US_05-Close.pdf 258 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Close/tylerclose_whitepaper_US05.pdf 602 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Conti/BH_US_05_Conti.pdf 1.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Conti/papers/20050301_CACM_HackingConferences_Conti.pdf 50 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Conti/papers/20050515_SOUPS_Malviz_Conti.pdf 621 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Conti/papers/CACM_HackingConferences_Note.txt 252 B
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Conti/software/fileconversion/pcap2rumint.c 4 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Conti/software/rumint/license.txt 5 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Conti/software/rumint/readme.txt 3 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Conti/software/rumint/rumint_172.zip 5.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Conti/software/rumint/scan21.rum 298 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Conti/software/secvis/readme.txt 2 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Conti/software/secvis/secvis_v1.11.tar.gz 70 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Cunningham/BH_US_05-Cunningham.pdf 535 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Cunningham/blackhatbibliographymorganandcunningham.doc 31 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fayo/BH_US-05-Fayo.pdf 145 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fayo/Supporting Files/BOF_BindShell.sql 4 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fayo/Supporting Files/BOF_CreatingSYSDBAUser.sql 2 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fayo/Supporting Files/BOF_GettingOSAdmin.sql 2 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fayo/Supporting Files/BOF_SDO_CODE_SIZE_10g.sql 1 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fayo/Supporting Files/SQLI_BecomingDBA.sql 711 B
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fayo/Supporting Files/SQLI_BecomingSYS.sql 2 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fayo/Supporting Files/SQLI_Limitation.sql 442 B
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fayo/Supporting Files/SQLI_OSCommand.sql 2 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fayo/Supporting Files/SQLI_UploadingAFile.sql 2 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Fayo/Supporting Files/TableEmp.asp 2 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Hansen-Patterson/BH_US_05-Hansen-Patterson.pdf 135 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Hansen-Patterson/HP2005.pdf 152 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Jack/BH_US_05-Jack.pdf 663 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Jack/BH_US_05-Jack_White_Paper.pdf 173 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Kornbrust/BH_US_05-Kornbrust.pdf 258 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Kornbrust/kornbrust_circumvent_oracle_encryption_101.zip 1.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Kornbrust/kornbrust_dbms_crypto_intercept.sql 8 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Mahaffey/BH_US_05-Mahaffey.pdf 201 KB
Black Hat/Black Hat USA/Black Hat USA 2005/conference cd/BH_US_05-Mahaffey/BH_US_05-Mahaffey.rtf 59 KB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - A Aggarwal-Rapid Threat Modeling.mp4 29.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - A Youn-Building Robust Backdoors.mp4 55.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Adam Boileau-Trust Transcience.mp4 68.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Alex Stamos-Stender-Attacking web Service.mp4 82.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Alex Wheeler, Neil Mehta-Owning Anti-virus.mp4 75.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Alexander Kornbrust-Circumvent Oracle.mp4 68.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Ansanelli-Future of Personal info.mp4 84.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Barnaby Jack-Kernel Exploitation.mp4 41.6 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Beetle Potter-Evil Twins 802.11.mp4 69.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Ben Laurie-CaPerl.mp4 53.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Bidou-Dirty BlackMail DoS Story.mp4 18.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Caesar Cerrudo-Demystifying SQL-Oracle.mp4 24.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Clarke-Sandberg-Scalable searches.mp4 70 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Cunningham w Morgan-US Natl Sec.mp4 104.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - D Barrall-Shakespearean Shellcode.mp4 18.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - David Litchfield-All New 0 Day.mp4 45.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - David Maynor-NX-How Well Does it Say NO.mp4 41.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - David Mortman Others-National ID Debate.mp4 81.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Eugene Tsyrkievich-Ozone.mp4 88.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Evans-Thompson-Self-defending.mp4 24 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Foster Liu-Catch Me if You Can.mp4 65.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Greg Conti-Crafting a Tivo.mp4 79.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Grugq-Defeating Forensic Analysis.mp4 79.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Hansen-Patterson-Stopping Injection.mp4 55.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Harper and Balas-The Birth of roo.mp4 58 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Himanshu Dwivedi-iSCI Insecure SCSI.mp4 82.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - J Grossman-Phishing with Super Bait.mp4 66.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - James C Foster-BlackHat Standup.mp4 17.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Jeff Moss and Panel-CISO QA.mp4 69.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Jeff Moss, Gilman Louie-Welcome Keynote.mp4 63.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Jennifer Granick-Top 10 Issues.mp4 83.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Jim Christy-The Defense Cyber Crime.mp4 72.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Joe Grand-Sec Problems HWare Devices.mp4 82.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Joe Klein-Soc Engineering Methodology.mp4 46.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Johnny Long-Google Hacking for Pen Test.mp4 9.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Ken Hines-Using Causal Analysis.mp4 28.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Kenneth Geers-Hacking in a Foreign.mp4 71.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Kevin Cardwell-Toolkits.mp4 26.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - MadHat Simple Nomad-SPA.mp4 21.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Martinez-Advanced SQL Injection.mp4 59.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Mike Pomraning-Injection Flaws.mp4 33.7 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Morris-Non-Cryptographic Ways.mp4 72.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Mudge-Economics Physics Psycology.mp4 81 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Nuwere-SIP Format Fuzz in Voip.mp4 74.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Ofir Arkin-Infrastructure Discovery.mp4 83.3 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Paul Simmonds-The Jericho Challenge.mp4 46.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Paul Vixie-Preventing Child Neglect.mp4 84.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Phil Zimmerman-My Next Big Project.mp4 57.5 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - R W Clark-Legal Aspects.mp4 86.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Sensepost-Deus ex Machina.mp4 77.1 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Shawn Moyer-Owning The C-Suite.mp4 21.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Sherri Sparks and Jamie Butler-Shadow Walker.mp4 86 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Soeder Permeh-eYe Bootroot.mp4 85.2 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - spoonm scape-Beyond EIP.mp4 34.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Sutton-Greene-Art Of File Format.mp4 50 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - T Chiueh-Checking Array Bound.mp4 71.8 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - T Close-Shatter Proofing Windows.mp4 29.9 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Van der Stock-OWASP Guide.mp4 61.4 MB
Black Hat/Black Hat USA/Black Hat USA 2005/video/Black Hat USA 2005 - Yuan Fan-SQL Injection Detection.mp4 22.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/Black Hat USA 2006.jpg 33 KB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Auger and Sima - 0day subscriptions.opus 6.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Benninger - Find gold Browser Cache.opus 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - BIDOU - IPS Shortcomings.opus 10.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Bilar - Auto Malware Classification.opus 4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Bruce Potter - Bluetooth Defense Kit.opus 10.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Burdach - Physical memory Forensics.opus 7.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Butler - Exponential Growth Rootkit.opus 6.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Cache and Maynor - Device Drivers.opus 9.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Caswell and Moore - Thermoptic Camo.opus 13.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Charles Edge - Attacking Apples Xsan.opus 2.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Chris Eng - Breaking Crypto.opus 9.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Cushman - MS Security fundamentals.opus 9.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Dai Zovi - Hardware Virtualization.opus 8.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - David Litchfeild - All new 0day.opus 7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Dwivedi - Shoot Nxt Persn says VLANS.opus 3.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Endler and Collier - Hacking VOIP.opus 12.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Finnigan - How to Unwrap Oracle.opus 8.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Fischbach - Carrier VOIP Security.opus 10.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Franco - Case Studies Secure Dev IE7.opus 7.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Frei and May - Speed of Insecurity.opus 3.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - FX - The Blackberry Case.opus 10.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Gallagher - Preventing CrossSite Req.opus 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Gbadegesin - TCPIP in WIN Vista.opus 9.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Grossman - Hacking Intranet Outside.opus 9.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Grunwald - New Attack RFID Systems.opus 6.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Gutterman - Vulns Linux Random Num.opus 8.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Halvar Flake - Need New Tools.opus 7.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Hoffman - AJAX Insecurity.opus 11.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Hoffman - Analysis of Web App worms.opus 13.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Hoglund - Hacking WOW Adv rootkit.opus 7.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Hulton and Moniz - Faster pwning.opus 10.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Jesse Burns - Fuzzing Win32.opus 9.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Johnny Long - Death of 1000 Cuts.opus 9.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Johnny Long - Hacking Hollywood.opus 10.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Kaminsky - BlackOPS 2006.opus 12.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Kimball Code Integrate Vunl audit.opus 2.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Kornburst - Oracle rootkits 2.0.opus 7.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Lambert - Sec Engineering in win Vista.opus 7.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Mandia - State of Incident Response.opus 12 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Marinescu - WIN Vista Heap Mgmt.opus 10.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Merloni and Carettoni - Blue Bag.opus 8.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Mohney - Defend with Voice Analytics.opus 9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Moniz and Moore - 6 Degrees XSSploit.opus 6.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Moore - Metasploit Reloaded.opus 18.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Morana - Sec Into Software LifeCycle.opus 4.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Moyer - Defending BlackBox Web Apps.opus 3.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Neal Krawetz - You are what you type.opus 7.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Neerumalla - SQL Inject.opus 3.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Noel Anderseon - Wifi in WIN Vista.opus 9.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - O'Connor - Vunls not So Embedded Sys.opus 9.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Ofir Arkin - Bypassing NAC Systems.opus 7.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Panel - Anti - spyware Coalition.opus 21.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Panel - Disclosure Public.opus 11.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Panel - Hacker Court.opus 26.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Panel - Jericho Forum.opus 21.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Panel - Meet the Feds.opus 8.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Paul Bohm - Taming Bugs.opus 14.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Potter - Trusted Computing Revolution.opus 7.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Ptacek and Goldsmith - Elec Sheep.opus 13.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Rauch - PDB - The Protocal Debugger.opus 14.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Rieback - RFID Malware Demystified.opus 9.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Rutkowska - Subverting Vista Kernel.opus 12.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - S Stender - Attacking Inatl Software.opus 7.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Saumil Shah - Metasploit Plugins.opus 12 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Schulman - Phishing with Asterisk.opus 10.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - SensePost - A tale of two Proxies.opus 6.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Silberman and Butler - RAIDEv1.0.opus 8.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Sotirov - HotPatching3rd Party Patch.opus 9.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Sparks and Others - Sidewinder.opus 12.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Spradlin - Auditing data Access.opus 9.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - SQUIRE - Project Cowbird.opus 3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Stamos and lackey - Breakin Ajax web.opus 12 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Sutton and MacManus - Punk 0de.opus 10.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Tereshkin - Rootkits Attack Firewall.opus 7.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Tom Beardsley - Monkeyspaw.opus 3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Trainor - The Statue of Liberty.opus 3.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - V9-Scholz-SIP_Stack_Fingerprinting.opus 9.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Veysset and Butti - Wifi Adv Stealth.opus 2.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - VK1-Larkin-Fight_org_Cyber_crime.mp3.opus 9.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Waldron - VOIP Security Essentials.opus 2.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Willis and Belani - Web App Incident.opus 11.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Yuan Fan - MatriXay.opus 3.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Zambon and Bolzoni - NIDS False Pos.opus 7.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/audio/Black Hat USA 2006 - Zanero - HostBased Anomaly Detection.opus 10.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/002_Squire.pdf 9.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/003_Hoffman.pdf 6.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/005_FX.pdf 21.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/006_Hoffman_web.pdf 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/007_Edge.pdf 2.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/008_Stender.pdf 1.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/009_Spradlin.pdf 2.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/010_Bilar.pdf 12.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/013_Merloni.pdf 8.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/014_Potter.pdf 3.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/016_Eng.pdf 2.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/017_Morana.pdf 2.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/018_Arkin.pdf 8.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/019_Fishbach.pdf 1.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/021_Kimball.pdf 6.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/023_Mohney.pdf 10.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/024_Moyer.pdf 4.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/025_Cache.pdf 1.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/026_Ptacek.pdf 13.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/027_Moniz-Hulton.pdf 5.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/028_Gallagher.pdf 5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/029_Benninger.pdf 8.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/030_Burns.pdf 356 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/031_Hacker.pdf 97 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/033_Grossman.pdf 5.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/034_Endler.pdf 17.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/036_Zovi.pdf 10.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/037_Zanero.pdf 6.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/038_Sotirov.pdf 208 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/039_Finnigan.pdf 2.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/040_Beardsley.pdf 1.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/041_Dwivedi.pdf 9.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/042_Bidou.pdf 942 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/043_Fan-Rong.pdf 9.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/044_Moore.pdf 22.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/045_Cushman.pdf 3.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/046_Gbadegesin.pdf 25 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/047_Grunwald.pdf 792 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/049_Zambon.pdf 1.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/050_Gutterman.pdf 15 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/051_Kornbrust.pdf 1.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/052_Rauch.pdf 10.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/053_Schulman.pdf 14.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/054_Burdach.pdf 491 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/055_Sutton.pdf 4.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/056_Butler.pdf 3.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/057_Silberman.pdf 392 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/059_Rieback.pdf 17.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/060_Tereshkin.pdf 472 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/061_Morgenstern.pdf 4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/062_Lambert.pdf 8.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/063_Embleton.pdf 24.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/064_Scholz.pdf 15.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/066_Frei-May.pdf 4.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/067_Neerumalla.pdf 354 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/068_Mandia.pdf 6.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/069_Trainor.pdf 6.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/070_Rutkowska.pdf 6.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/072_Boehm.pdf 17.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/073_Caswell.pdf 6.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/074_Potter.pdf 3.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/075_Waldron.pdf 3.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/076_OConnor.pdf 13.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/077_Willis.pdf 6.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/078_Veyssett.pdf 10.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/080_Marinescu.pdf 4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/081_Shah.pdf 1.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/082_Krawetz.pdf 3.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Benninger/Benninger-dumpAutoComplete.zip 1.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Bidou/._Bidou-http-fun-suite.zip 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Bidou/._Bidou-IPSTester.zip 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Bidou/Bidou-http-fun-suite.zip 11 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Bidou/Bidou-IPSTester.zip 37 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Finnigan/Finnigan-pl_sql_unwrap.zip 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Grossman/Grossman-PoCsamples_key.zip 8.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/._LEVI 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/Kimball_LEVI.zip 538 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/._license.txt 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/._README.txt 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/disasm.dll 216 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/ImportsDB.dat 332 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/InterceptImports.dll 144 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/InterceptInlinesCI.dll 140 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/InterceptInlinesEPO.dll 140 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/LEVI.exe 168 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/license.txt 2 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/README.txt 3 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kimball/LEVI/source.zip 142 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Kornbrust/Kornrust_install_rootkit.zip 2 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Morgenstern-Brosch/Morgenstern-Addl_Materials.zip 60 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/OConnor/OConnor_README 381 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/OConnor/OConnor_xerox_exploit_BH06.pl.zip 2 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Scholz/._Scholz-src.zip 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Scholz/Scholz-src.zip 39 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Schulman/Schulman_extensions_custom.conf.zip 784 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH213 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH224 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH256 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH409 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH413 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH418 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH422 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH426 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH433 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH1156 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/._.BAH1160 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/Squire-cowbird-0.9.0-bh-wma11b.tgz 5.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/Squire-cowbird-0.9.0-bh-wma11b.zip 5.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/._cowbird-0.9.0-bh-wma11b 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/changelog 135 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH213/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/._cowbird-0.9.0-bh-wma11b 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/changelog 135 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH224/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/._cowbird-0.9.0-bh-wma11b 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/changelog 135 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH256/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/._cowbird-0.9.0-bh-wma11b 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/changelog 135 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH409/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/._cowbird-0.9.0-bh-wma11b 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/changelog 135 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH413/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/._cowbird-0.9.0-bh-wma11b 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/changelog 135 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH418/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/._cowbird-0.9.0-bh-wma11b 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/changelog 135 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH422/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/._cowbird-0.9.0-bh-wma11b 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/changelog 135 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH426/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/._cowbird-0.9.0-bh-wma11b 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/changelog 135 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH433/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/._cowbird-0.9.0-bh-wma11b 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/changelog 135 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1156/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/._cowbird-0.9.0-bh-wma11b 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/._cowbird-fs 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/build_cramfs.bash 114 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/changelog 135 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-0.9.0-bh_wma11b.cramfs 3.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/._hack 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/cowbird-RELEASE 93 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/._bin 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/conf_kismet.ash 292 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_demo.ash 120 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/cowbird_nest.ash 91 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Squire/.BAH1160/cowbird-0.9.0-bh-wma11b/cowbird-fs/hack/bin/kismet 24 B
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Trainor/._Trainor_Whitepaper_US06.pdf 4 KB
Black Hat/Black Hat USA/Black Hat USA 2006/presentations/Trainor/Trainor_Whitepaper_US06.pdf 112 KB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Auger and Sima - 0day subscriptions.mp4 43.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Benninger - Find gold Browser Cache.mp4 20.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - BIDOU - IPS Shortcomings.mp4 70 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Bilar - Auto Malware Classification.mp4 29 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Brosch - Runtime Packers Hidden Prob.mp4 21.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Bruce Potter - Bluetooth Defense Kit.mp4 68.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Burdach - Physical memory Forensics.mp4 51.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Butler - Exponential Growth Rootkit.mp4 42.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Cache and Maynor - Device Drivers.mp4 61 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Caswell and Moore - Thermoptic Camo.mp4 87.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Charles Edge - Attacking Apples Xsan.mp4 19.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Chris Eng - Breaking Crypto.mp4 61.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Cushman - MS Security fundamentals.mp4 57.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Dai Zovi - Hardware Virtualization.mp4 44.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - David Litchfeild - All new 0day.mp4 47 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Dwivedi - Shoot Nxt Persn says VLANS.mp4 26.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Finnigan - How to Unwrap Oracle.mp4 56.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Fischbach - Carrier VOIP Security.mp4 64.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Franco - Case Studies Secure Dev IE7.mp4 47 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Frei and May - Speed of Insecurity.mp4 24.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - FX - The Blackberry Case.mp4 59.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Gallagher - Preventing CrossSite Req.mp4 22.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Gbadegesin - TCPIP in WIN Vista.mp4 58.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Grossman - Hacking Intranet Outside.mp4 56.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Grunwald - New Attack RFID Systems.mp4 43.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Gutterman - Vulns Linux Random Num.mp4 60.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Halvar Flake - Need New Tools.mp4 46.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Hoffman - AJAX Insecurity.mp4 80 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Hoffman - Analysis of Web App worms.mp4 90.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Hoglund - Hacking WOW Adv rootkit.mp4 53.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Hulton and Moniz - Faster pwning.mp4 72.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Jesse Burns - Fuzzing Win32.mp4 67.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Johnny Long - Death of 1000 Cuts.mp4 66.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Johnny Long - Hacking Hollywood.mp4 71 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Kaminsky - BlackOPS 2006.mp4 64.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Kimball Code Integrate Vunl audit.mp4 17.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Kornburst - Oracle rootkits 2.0.mp4 42.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Lambert - Sec Engineer in win Vista.mp4 47.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Mandia - State of Incident Response.mp4 70.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Marinescu - WIN Vista Heap Mgmt.mp4 75.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Merloni and Carettoni - Blue Bag.mp4 51.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Mohney - Defend with Voice Analytics.mp4 46.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Moniz and Moore - 6 Degrees XSSploit.mp4 46.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Moore - Metasploit Reloaded.mp4 85.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Morana - Sec Into Software LifeCycle.mp4 26.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Moyer - Defending BlackBox Web Apps.mp4 27.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Neerumalla - SQL Inject.mp4 29 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Noel Anderseon - Wifi in WIN Vista.mp4 64.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - O'Connor - Vunls not So Embedded Sys.mp4 59.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Ofir Arkin - Bypassing NAC Systems.mp4 53.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Panel - Anti - spyware Coalition.mp4 92.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Panel - Disclosure Public.mp4 51.1 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Panel - Hacker Court - Part2.mp4 103.3 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Panel - Hacker Court.mp4 75.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Panel - Jericho Forum.mp4 156.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Panel - Meet the Feds.mp4 59.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Paul Bohm - Taming Bugs.mp4 73.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Potter - Trusted Computing Revolution.mp4 38.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Ptacek and Goldsmith - Elec Sheep.mp4 54.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Rauch - PDB - The Protocal Debugger.mp4 73 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Rieback - RFID Malware Demystified.mp4 53.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Rutkowska - Subverting Vista Kernel.mp4 86.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - S Stender - Attacking Inatl Software.mp4 50.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Saumil Shah - Metasploit Plugins.mp4 85.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Schulman - Phishing with Asterisk.mp4 51.7 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - SensePost - A tale of two Proxies.mp4 40.6 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Silberman and Butler - RAIDEv1.0.mp4 61.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Sotirov - HotPatching3rd Party Patch.mp4 61.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Sparks and Others - Sidewinder.mp4 74.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Spradlin - Auditing data Access.mp4 68.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - SQUIRE - Project Cowbird.mp4 18.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Stamos and lackey - Breakin Ajax web.mp4 77 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Sutton and MacManus - Punk 0de.mp4 63 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Tereshkin - Rootkits Attack Firewall.mp4 54.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Tom Beardsley - Monkeyspaw.mp4 25.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Trainor - The Statue of Liberty.mp4 23.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - V9-Scholz-SIP_Stack_Fingerprinting.mp4 56.8 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Veysset and Butti - Wifi Adv Stealth.mp4 20 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - VK1-Larkin-Fight_org_Cyber_crime.mp4 58.4 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Waldron - VOIP Security Essentials.mp4 20.9 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Willis and Belani - Web App Incident.mp4 68 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Yuan Fan - MatriXay.mp4 26.5 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Zambon and Bolzoni - NIDS False Pos.mp4 48.2 MB
Black Hat/Black Hat USA/Black Hat USA 2006/video/Black Hat USA 2006 - Zanero - HostBased Anomaly Detection.mp4 80 MB
Black Hat/Black Hat USA/Black Hat USA 2007/Black Hat USA 2007 pictures.rar 467.9 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/README.txt 4 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Afek/Presentation/bh-usa-07-afek.pdf 291 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Afek/Whitepaper/bh-usa-07-afek-WP.pdf 547 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Amini_and_Portnoy/Whitepaper/bh-usa-07-amini_and_portnoy-WP.pdf 352 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Baker/Presentation/bh-usa-07-baker.pdf 999 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Barisani_and_Bianco/Extras/2.avi 10.5 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Barisani_and_Bianco/Extras/3.avi 16.7 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Barisani_and_Bianco/Presentation/bh-usa-07-barisani_and_Bianco.pdf 13.7 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Barisani_and_Bianco/Whitepaper/bh-usa-07-barisani_and_Bianco-WP.pdf 63 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Belani_and_Jones/Presentation/bh-usa-07-belani_and_jones.pdf 2.4 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Belani_and_Jones/Whitepaper/bh-usa-07-belani_and_jones-WP.pdf 32 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Bolzoni_and_Zambon/Presentation/bh-usa-07-bolzoni_and_zambon.pdf 728 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Bolzoni_and_Zambon/Whitepaper/bh-usa-07-bolzoni_and_zambon-WP.pdf 139 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Bulygin/Presentation/bh-usa-07-bulygin.pdf 1004 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Bulygin/Whitepaper/bh-usa-07-bulygin-WP.pdf 661 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Butler_and_Kendall/Presentation/bh-usa-07-butler_and_kendall.pdf 958 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Byrne/Presentation/bh-usa-07-byrne.pdf 884 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Byrne/Whitepaper/bh-usa-07-byrne-WP.pdf 72 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Callas_Alder_Bettati_and_Matthewson/Presentation/bh-usa-07-callas_alder_bettati_matthewson.pdf 128 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Chenette_and_Joseph/Presentation/bh-usa-07-chenette_and_joseph.pdf 777 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Chess_West_Fay_and_Kureha/Presentation/bh-usa-07-chess_west_fay_and_kureha.pdf 351 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Chess_West_Fay_and_Kureha/Whitepaper/bh-usa-07-chess_west_fay_and_kureha-WP.pdf 666 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Christey/Presentation/bh-usa-07-christey.pdf 84 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Christey/Whitepaper/bh-usa-07-christey-WP.pdf 82 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Clark/Presentation/bh-usa-07-clark.pdf 388 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Coffey/Presentation/bh-usa-07-coffey_and_viega.pdf 493 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Coffey/Whitepaper/bh-usa-07-coffey_and_viega-WP.pdf 153 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Cowen/Presentation/bh-usa-07-cowen.pdf 1.6 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/De_Haas/Presentation/bh-usa-07-de_haas.pdf 1.2 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Del_Moral_Talabis/Extras/del_moral_talabis-demo_movie.zip 848 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Del_Moral_Talabis/Presentation/bh-usa-07-del_moral_talabis.pdf 1.2 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Del_Moral_Talabis/Whitepaper/bh-usa-07-del_moral_talabis-WP.pdf 782 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/DeMott_Enbody_and_Punch/Presentation/bh-usa-07-demott_enbody_and_punch.pdf 1.1 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/DeMott_Enbody_and_Punch/Whitepaper/bh-usa-07-demott_enbody_and_punch-WP.pdf 531 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Dempster/Presentation/bh-usa-07-dempster.pdf 223 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Dempster/Whitepaper/bh-usa-07-Dempster-WP.pdf 930 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Dhamankar_and_King/Presentation/bh-usa-07-dhamankar_and_king.pdf 649 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Dhamankar_and_King/Whitepaper/bh-usa-07-dhamankar_and_king-WP.pdf 578 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Dingledine_and_Mathewson/Presentation/bh-usa-07-dingledine_and_mathewson.pdf 376 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Dwivedi_and_Lackey/Presentation/bh-usa-07-dwivedi_and_lackey.pdf 2.1 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Dwivedi_and_Lackey/Whitepaper/bh-usa-07-dwivedi_and_lackey-WP.pdf 508 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Eriksson_Oberg_Nyberg_and_Jammar/Presentation/bh-usa-07-eriksson_oberg_nyberg_and_jammar.pdf 285 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Eriksson_Oberg_Nyberg_and_Jammar/Whitepaper/bh-usa-07-eriksson_oberg_nyberg_and_jammar-WP.pdf 161 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Feinstien_and_Peck/Extras/smime.p7s 3 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Feinstien_and_Peck/Presentation/bh-usa-07-feinstien_and_peck.pdf 56 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Feinstien_and_Peck/Whitepaper/bh-usa-07-feinstien_and_peck-WP.pdf 171 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Ferguson/Whitepaper/bh-usa-07-ferguson-WP.pdf 311 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Fowler/Presentation/bh-usa-07-fowler.pdf 444 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Fowler/Whitepaper/bh-usa-07-fowler-WP.pdf 1 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Geers/Greetz from Room 101.pdf 361 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Grossman/Whitepaper/bh-usa-07-grossman-WP.pdf 708 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Gutman_Waissbein_and_Futoransky/Whitepaper/bh-usa-07-gutman_futoransky_and_waissbein-WP.pdf 169 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Hacker_Court/Extras/BHCIndictment2007.pdf 23 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Hacker_Court/Extras/Getta_statement.pdf 18 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Hacker_Court/Extras/Hacker_Court_Summary_2007.pdf 46 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Hacker_Court/Extras/JI-0.4.pdf 54 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Harbour/Presentation/bh-usa-07-harbour.pdf 365 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Harbour/Whitepaper/bh-usa-07-harbour-WP.pdf 21 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Hasse/Presentation/bh-usa-07-hasse.pdf 160 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Hill/Presentation/bh-usa-07-hill.pdf 1.6 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Hill/Whitepaper/bh-usa-07-hill-WP.pdf 307 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Hoagland/Whitepaper/bh-usa-07-hoagland-WP.pdf 328 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Hoagland/Whitepaper/bh-usa-07-hoagland-WP2.pdf 6.2 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Hoffman_and_Terrill/Whitepaper/bh-usa-07-hoffman_and_terril-WP.pdf 260 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Hypponen/Whitepaper/Whitepaper/bh-usa-07-hypponen-WP.pdf 28 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Joglekar/Presentation/bh-usa-07-joglekar.pdf 384 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Joglekar/Whitepaper/bh-usa-07-joglekar-WP.pdf 200 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Krawetz/Extras/jpegquality.c 9 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Krawetz/Presentation/bh-usa-07-krawetz.pdf 44.6 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Krawetz/Whitepaper/bh-usa-07-krawetz-WP.pdf 6 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Lackey_and_Garbutt/Presentation/bh-usa-07-lackey_and_garbutt.pdf 238 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Laurie/Presentation/bh-usa-07-laurie.pdf 2 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Lindell/Whitepaper/bh-usa-07-lindell-WP.pdf 248 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Lindsay/Presentation/bh-usa-07-lindsay.pdf 234 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Lindsay/Whitepaper/bh-usa-07-lindsay-WP.pdf 290 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Litchfield/Presentation/bh-usa-07-litchfield.pdf 341 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Maynor_and_Graham/Whitepaper/bh-usa-07-maynor_and_graham-WP.pdf 1.2 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Maynor_and_Graham/Whitepaper/bh-usa-07-maynor_and_graham-WP2.pdf 127 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Meer_and_Slaviero/Whitepaper/bh-usa-07-meer_and_slaviero-WP.pdf 429 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Miller/Whitepaper/bh-usa-07-miller-WP.pdf 1015 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Miras/Presentation/bh-usa-07-mira.pdf 1.8 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Miras/Whitepaper/bh-usa-07-miras-WP.pdf 275 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moore_and_Valsmith/Presentation/bh-usa-07-moore_and_valsmith.pdf 136 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moore_and_Valsmith/Whitepaper/bh-usa-07-moore_and_valsmith-WP.pdf 192 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Morin/Presentation/bh-usa-07-morin.pdf 241 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Morin/Whitepaper/bh-usa-07-morin-WP.pdf 80 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/bh-dc-07-Whitehouse-WP.pdf 539 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/bh-us-04-silberman-paper.pdf 364 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/BH-US-06-Lambert.pdf 7 MB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Brad_Spengler-PaX-presentation.pdf 243 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Bulba_Kil3r-BypassingStackguard-p56-0x05.txt 27 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/BypassingPaxASLR-p59-0x09.txt 37 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Hiroaki_Etoh-ProPolice-CanSecWest2005.pdf 159 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/John_Wilander-avtp.c 31 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/NateSmith-StackSmashingPaper.txt 65 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Piromposa_Embody-Defeating_Buffer_Oveflow_Prevention_Hardwar.pdf 319 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Piromposa_Embody-Defeating_Buffer_Oveflow_Prevention_Hardware.pdf 319 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/SANS_Inside_The_Buffer_Overflow_Attack.pdf 165 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Shacham_et_al-AttacksOnASLR.pdf 195 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Shacham-Ret2LibcWithoutFunctionCalls.pdf 227 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Skape-Reducing_Entropy_of_gs_Cookies.pdf 380 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Spafford-MorrisWormAnalysis.pdf 128 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Symantec-GS_Protections_in_Vista.pdf 838 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Symantec-MacOSX_DeepSight_Report.pdf 333 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/Younan-et_al-Heap_Protection_Paper.pdf 280 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/index.html 4 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/index.xml 13 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/stylea87f.css 2 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/stylec81e.css 2 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/advanced-malloc-exploits.html 97 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/atexit.html 13 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/buffer-overflows.html 54 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/buffer-overrun.html 17 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/code-stack-exploits.html 11 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/cpp-vptrs.html 59 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/dtors.html 11 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/exploit-strncpy.html 30 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/frame-pointer.html 23 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/free.html 37 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/heap-corruption.html 128 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/index.html 8 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/index.xml 10 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/kernel-stack.html 67 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/kmalloc-overflow.html 15 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/offbyone-infoleak.html 10 KB
Black Hat/Black Hat USA/Black Hat USA 2007/presentations/Moyer/Extras/doc.bughunter.net/buffer-overflow/perl-exploit.html 0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
Name
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Black Hat Bureau - Hailey Edwards Audio 3.4 GB 55
Hailey Edwards - Black Hat Bureau 05 - Gray Witch Audio 244 MB 5
[ DevCourseWeb.com ] Udemy - Wifi Hacking Course Method 2022 ~ Black Hat Hacker Video 550.8 MB 4
Black Hat - NEXT-LEVEL BUG HUNTING - CODE EDITION 2024-2 Video 19.6 GB 1
Black Hat Video 173.5 GB 0
Black Hat Python Python Programming For Hackers And Pentesters Application 5 MB 22
Black Hat Video 156 GB 0
Seitz. Black Hat Python.pdf Application 4.6 MB 87
[ FreeCourseWeb.com ] Udemy - WiFi Hacking with Raspberry Pi - Black Hat Hackers Special!.zip Application 335.1 MB 44
WiFi Hacking with Raspberry Pi - Black Hat Hackers Special! Video 339.1 MB 11
[ FreeCourseWeb.com ] Black Hat Python - Python Programming for Hackers and Pentesters, 2nd Edition (Early Access).zip Application 6.3 MB 8
BLACK HAT ASIA 2021 Application 322.6 MB 5
Black Hat Go Go Programming For Hackers and Pentesters Application 5.1 MB 145
[ FreeCourseWeb.com ] Udemy - Learn the Basics of BLACK Hat Hacking secrets in Ethical Way.zip Application 136.2 MB 38
black-hat-go-programming-pentesters.pdf Application 7.2 MB 30
See.No.Evil.S05E04.The.Man.in.the.Black.Hat.WEB.h264-CAFFEiNE[TGx] Video 348.8 MB 17
[ FreeCourseWeb.com ] Udemy - Black Hat Approach to Hacking.zip Application 1.9 GB 13
Black Hat Go. Go Programming For Hackers and Pentesters (Final Version).pdf Application 3.7 MB 11
15. I WEAR THE BLACK HAT - Chuck Klosterman Ebook 695 KB 10
[NulledPremium.com] Black Hat Go Application 5.1 MB 10

Loading...