REcon/REcon 2015/video/recon2015-09-yuriy-bulygin-oleksandr-bazhaniuk-Attacking-and-Defending-BIOS-in-2015.mp4 |
377 MB |
REcon/REcon 2006/REcon 2006 presentations/msutton-filefuzz-depth.mp4 |
29 KB |
REcon/REcon 2006/REcon 2006 presentations/msutton-webfuzz-overflow.mp4 |
4.2 MB |
REcon/REcon 2006/REcon 2006 presentations/msutton-comraider.mp4 |
5 KB |
REcon/REcon 2006/REcon 2006 videos/T09-Recon2006-Fabrice_Desclaux-Kostya_Kortchinsky-Vanilla_Skype-part1_512kb.mp4 |
69.4 MB |
REcon/REcon 2006/REcon 2006 videos/T18-Recon2006-Sharon_Conheady-Social_Engineering_for_penetration_testers.avi-xvid_512kb.mp4 |
83.5 MB |
REcon/REcon 2006/REcon 2006 videos/T13-Recon2006-Woodmann-Legality_of_RCE_512kb.mp4 |
90.8 MB |
REcon/REcon 2006/REcon 2006 videos/T07-Recon2006-Ted_Unangst-Secure_development_with_static_analysis_512kb.mp4 |
99.9 MB |
REcon/REcon 2006/REcon 2006 videos/T15-Recon2006-Alex_Ionescu-Subverting_Windows2003SP1_kernel_integrity_protection_512kb.mp4 |
54.7 MB |
REcon/REcon 2006/REcon 2006 videos/T03-Recon2006-Fravia-Reversing_our_searching_habits_512kb.mp4 |
92 MB |
REcon/REcon 2006/REcon 2006 videos/T10-Recon2006-Fabrice_Desclaux-Kostya_Kortchinsky-Vanilla_Skype-part2_512kb.mp4 |
108.7 MB |
REcon/REcon 2006/REcon 2006 videos/T12-Recon2006-Spoonm-IDARub_512kb.mp4 |
78.8 MB |
REcon/REcon 2006/REcon 2006 videos/T14-Recon2006-Dennis_Cox-Insiders_View_Network_security_devices_512kb.mp4 |
73.6 MB |
REcon/REcon 2006/REcon 2006 videos/T19-Recon2006-Mathieu_Desnoyers-LTT_LinuxTraceToolkit_512kb.mp4 |
44.4 MB |
REcon/REcon 2006/REcon 2006 videos/T08-Recon2006-Anthony_De_Almeida_Lopes-Jack_Louis-A_plateform_independant_multicavity_nop_virus_512kb.mp4 |
75.6 MB |
REcon/REcon 2006/REcon 2006 videos/T01-Recon2006-Alexander_Stirov-Reverse_Engineering_Microsoft_Binaries_512kb.mp4 |
93.3 MB |
REcon/REcon 2006/REcon 2006 videos/T04-Recon2006-David_Hulton-Breaking_wifi_faster_512kb.mp4 |
92 MB |
REcon/REcon 2006/REcon 2006 videos/T17-Recon2006-Luis_Miras-FixBugsInBinaries-xvid_512kb.mp4 |
65.4 MB |
REcon/REcon 2006/REcon 2006 videos/T16-Recon2006-Joe_Stewart-OllyBonE_512kb.mp4 |
77.8 MB |
REcon/REcon 2006/REcon 2006 videos/T05-Recon2006-Pedram_Amini-PaiMei_512kb.mp4 |
114.7 MB |
REcon/REcon 2006/REcon 2006 videos/T02-Recon2006-Michael_Sutton-Fuzzing_512kb.mp4 |
71.5 MB |
REcon/REcon 2006/REcon 2006 videos/T06-Recon2006-Bunnie-Dissassembling_and_patching_hardware_512kb.mp4 |
125.8 MB |
REcon/REcon 2006/REcon 2006 videos/T11-Recon2006-Chris_Abad-Advancements_In_Anonymous_e-Annoyance_512kb.mp4 |
90.1 MB |
REcon/REcon 2015/presentations/recon2015-18-andrew-zonenberg-From-Silicon-to-Compiler.pdf |
3.1 MB |
REcon/REcon 2015/presentations/recon2015-05-peter-hlavaty-jihui-lu-This-Time-Font-hunt-you-down-in-4-bytes.pdf |
3.1 MB |
REcon/REcon 2015/presentations/recon2015-01-joan-calvet-marion-marschalek-paul-rascagneres-Totally-Spies.pdf |
3.6 MB |
REcon/REcon 2015/presentations/recon2015-21-j00ru-One-font-vulnerability-to-rule-them-all.pdf |
7.8 MB |
REcon/REcon 2015/presentations/recon2015-04-jeffrey-crowell-julien-voisin-Radare2-building-a-new-IDA.pdf |
1.1 MB |
REcon/REcon 2015/presentations/recon2015-17-nitay-artenstein-shift-reduce-Pandora-s-Cash-Box-The-Ghost-Under-Your-POS.pdf |
19.6 MB |
REcon/REcon 2015/presentations/recon2015-19-mike-ryan-john-mcmaster-marshallh-Reversing-the-Nintendo-64-CIC.pdf |
15.1 MB |
REcon/REcon 2015/presentations/recon2015-03-exide-Finish-Him.zip |
9.6 MB |
REcon/REcon 2015/presentations/recon2015-13-colin-o-flynn-Glitching-and-Side-Channel-Analysis-for-All.pdf |
2.6 MB |
REcon/REcon 2015/presentations/recon2015-07-travis-goodspeed-sergey-bratus-Polyglots-and-Chimeras-in-Digital-Radio-Modes.pdf |
6.3 MB |
REcon/REcon 2015/presentations/recon2015-14-christopher-domas-The-movfuscator.pdf |
4.6 MB |
REcon/REcon 2015/presentations/recon2015-16-yong-chuan-koh-Understaning-the-Microsoft-Office-Protected-View-Sandbox.pdf |
1.6 MB |
REcon/REcon 2015/presentations/recon2015-09-yuriy-bulygin-oleksandr-bazhaniuk-Attacking-and-Defending-BIOS-in-2015.pdf |
2.4 MB |
REcon/REcon 2015/presentations/recon2015-06-sophia-d-antoine-Exploiting-Out-of-Order-Execution.pdf |
12 MB |
REcon/REcon 2015/presentations/recon2015-20-steven-vittitoe-Reverse-Engineering-Windows-AFD-sys.pdf |
432 KB |
REcon/REcon 2015/presentations/recon2015-10-yaniv-balmas-0x3E9-Ways-to-DIE.PDF |
3.7 MB |
REcon/REcon 2015/video/recon2015-10-yaniv-balmas-0x3E9-Ways-to-DIE.mp4 |
293.3 MB |
REcon/REcon 2015/video/recon2015-07-travis-goodspeed-sergey-bratus-Polyglots-and-Chimeras-in-Digital-Radio-Modes.mp4 |
242.7 MB |
REcon/REcon 2015/video/recon2015-05-peter-hlavaty-jihui-lu-This-Time-Font-hunt-you-down-in-4-bytes.mp4 |
158.2 MB |
REcon/REcon 2015/video/recon2015-14-christopher-domas-The-movfuscator.mp4 |
277.5 MB |
REcon/REcon 2015/video/recon2015-06-sophia-d-antoine-Exploiting-Out-of-Order-Execution.mp4 |
130.1 MB |
REcon/REcon 2015/video/recon2015-20-steven-vittitoe-Reverse-Engineering-Windows-AFD-sys.mp4 |
131.6 MB |
REcon/REcon 2015/video/recon2015-18-andrew-zonenberg-From-Silicon-to-Compiler.mp4 |
254.1 MB |
REcon/REcon 2006/REcon 2006 presentations/msutton-filefuzz-breadth.mp4 |
18 KB |
REcon/REcon 2015/video/recon2015-01-joan-calvet-marion-marschalek-paul-rascagneres-Totally-Spies.mp4 |
294.3 MB |
REcon/REcon 2015/video/recon2015-04-jeffrey-crowell-julien-voisin-Radare2-building-a-new-IDA.mp4 |
89.1 MB |
REcon/REcon 2015/video/recon2015-12-alex-ionescu-Hooking-Nirvana.mp4 |
368.5 MB |
REcon/REcon 2015/video/recon2015-02-brian-gorenc-simon-zuckerbraun-abdul-aziz-hariri-Abusing-Silent-Mitigations.mp4 |
239.8 MB |
REcon/REcon 2015/video/recon2015-16-yong-chuan-koh-Understaning-the-Microsoft-Office-Protected-View-Sandbox.mp4 |
124.9 MB |
REcon/REcon 2015/video/recon2015-21-j00ru-One-font-vulnerability-to-rule-them-all.mp4 |
223.3 MB |
REcon/REcon 2015/video/recon2015-17-nitay-artenstein-shift-reduce-Pandora-s-Cash-Box-The-Ghost-Under-Your-POS.mp4 |
137.4 MB |
REcon/REcon 2015/video/recon2015-13-colin-o-flynn-Glitching-and-Side-Channel-Analysis-for-All.mp4 |
101.4 MB |
REcon/REcon 2015/video/recon2015-03-exide-Finish-Him.mp4 |
141.8 MB |
REcon/REcon 2011/11_Milosch_Meriac.mp4 |
24.5 MB |
REcon/REcon 2011/06_Damien_Aumaitre.mp4 |
23.2 MB |
REcon/REcon 2011/01_A_Ionescu_2.mp4 |
154.9 MB |
REcon/REcon 2011/15_Scott_Dunlop.mp4 |
18.8 MB |
REcon/REcon 2011/16_Jesse_d_Aguanno.mp4 |
22.1 MB |
REcon/REcon 2011/10_Alexandre_Gazet.mp4 |
19.9 MB |
REcon/REcon 2011/J_Applebaum.mp4 |
94.1 MB |
REcon/REcon 2011/12_Igor_Skochinsky.mp4 |
26.6 MB |
REcon/REcon 2011/20_Nathan_Fain.mp4 |
19.2 MB |
REcon/REcon 2011/03_G_Kerr_1.mp4 |
116.8 MB |
REcon/REcon 2011/02_S_Ridley.mp4 |
156.8 MB |
REcon/REcon 2011/14_Guillaume_Delugre.mp4 |
26.9 MB |
REcon/REcon Logo.jpg |
16 KB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T10-Nicolas_Brulez-Polymorphic_Virus_Analysis.mp4 |
65.9 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T06-Cameron_Hotchkies-Under_the_iHood.mp4 |
44.1 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T05-Nicolas_Pouvesle-NetWare_kernel_stack_overflow_exploitation.mp4 |
69.4 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T12-Anthony_de_Almeida_Lopes-Bypassing_Security_Protections_by_Backdooring_libc.mp4 |
35.7 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T16-Pablo_Sole-RE_over_Adobe_Acrobat_Reader_using_Immunity_Debugger.mp4 |
53.1 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T03-Ilfak_Guilfanov-Building_plugins_for_IDA_Pro.mp4 |
117.4 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T18-Tiller_Beauchamp-RE_Trace-Applied_Reverse_Engineering_on_OS_X.mp4 |
99.6 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T07-Jason_Raber-Helikaon_Linux_Debuger.mp4 |
76 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T14-Aaron_Portnoy_and_Ali_Rizvi-Santiago-Reverse_Engineering_Dynamic_Languages_a_Focus_on_Python.mp4 |
58.2 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T19-Sebastien_Doucet-64-bit_Imports_Rebuilding_and_Unpacking-Part2.mp4 |
57.4 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T09-Eric_D_Laspe-The_Deobfuscator.mp4 |
40.7 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T15-Sharon_Conheady_and_Alex_Bayly-Social_Engineering_for_the_Socially_Inept.mp4 |
96.7 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T19-Sebastien_Doucet-64-bit_Imports_Rebuilding_and_Unpacking-Part1.mp4 |
107.3 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T01_Pierre-Marc_Bureau-How_I_learned_Reverse_Engineering_with_Storm.mp4 |
80.3 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T08-Craig_Smith-Creating_Code_Obfuscation_Virtual_Machines.mp4 |
56.4 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T02-Bruce_Dang-Methods_for_analyzing_malicious_Office_documents.mp4 |
69.1 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T04-Thomas_Garnier-Windows_privilege_escalation_through_LPC_and_ALPC_interfaces.mp4 |
60.2 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T17-Gera-Two_very_small_reverse_engineering_tools.mp4 |
56 MB |
REcon/REcon 2008/REcon 2008 videos/RECON2008-T13-Alexander_Sotirov-Blackbox_Reversing_Of_XSS_Filters.mp4 |
98.6 MB |
REcon/REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-stack.mp4 |
4 KB |
REcon/REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-hids.mp4 |
743 KB |
REcon/REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-heap.mp4 |
3 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_pedram_amini_process_stalking_run_time_visual_rce.mp4 |
51.3 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_jonathan_levin_the_dark_side_of_winsock.mp4 |
141.1 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_thorsten_schneider_hardening_registration_number_protection_schemes_agains_reverse_engineering_with_multithread_petri_net.mp4 |
90.8 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_reverse_engineering_panel.mp4 |
91.1 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_kathy_wang_using_honeyclients_to_discover_new_attacks.mp4 |
140.2 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_spoonm_recent_shell_code_developments.mp4 |
154.8 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_fravia_wizard_searching_the_commercial_web_for_fun_and_knowledge.mp4 |
142.6 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_jack_whitsitt_visual_analysis_2d_does_it_better_in_color.mp4 |
105.5 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_todd_macdermid_encrypted_p2p_and_voip_with_cutlass.mp4 |
139 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_cedric_blancher_attacking_wifi_with_traffic_injection.mp4 |
66.8 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_ryan_russell_and_nicolas_brulez_malware_analysis.mp4 |
200.8 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_andrew_griffiths_binary_protection_schemes.mp4 |
36.2 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_adam_shostack_anonymous_blogging_submission.mp4 |
167.5 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_matt_shelton_passive_asset_detection_system.mp4 |
55.6 MB |
REcon/REcon 2005/REcon 2005 videos/recon2005_ryan_russell_keynote.mp4 |
97.5 MB |
REcon/REcon 2005/REcon 2005 presentations/recon2005_jonathan_westhues_practical_attacks_on_a_prox_card.mp4 |
100.9 MB |
REcon/REcon 2005/REcon 2005 presentations/recon2005_jose_nazario_introduction_to_network_programming_with_libevent_libdnet_and_libnids.mp4 |
160 MB |
REcon/REcon 2016/presentations/RECON-0xA-How_Do_I_Crack_Satellite_and_Cable_Pay_TV.pdf |
11.4 MB |
REcon/REcon 2016/presentations/RECON-0xA-Audible-DRM-scheme.pdf |
1.3 MB |
REcon/REcon 2016/presentations/RECON-0xA-A_Monitor_Darkly.pdf |
125.1 MB |
REcon/REcon 2016/presentations/RECON-0xA-Process_Failure_Modes.7z |
1.2 MB |
REcon/REcon 2016/presentations/RECON-0xA-Shooting_the_OSX_El_Capitan_Kernel_Like_A_Sniper_Chen_He.pdf |
13.9 MB |
REcon/REcon 2016/presentations/RECON-0xA-The-Remote-Metamorphic-Engine.pdf |
2.5 MB |
REcon/REcon 2016/presentations/RECON-0xA-Hardware-assisted-rootkits-ARM-Spisak.pdf |
5.5 MB |
REcon/REcon 2016/presentations/RECON-0xA-Keystone.pdf |
1.4 MB |
REcon/REcon 2016/presentations/RECON-0xA-HyperPlatform-Satoshi.pdf |
386 KB |
REcon/REcon 2016/presentations/RECON-0xA-Diamondman.pdf |
3.2 MB |
REcon/REcon 2016/video/recon2016-07-derek-soeder-paul-mehta-BBS-Era-Exploitation-for-Fun-and-Anachronism.mp4 |
41.4 MB |
REcon/REcon 2016/video/recon2016-17-cooper-quintin-eva-galperin-When-Governments-Attack.mp4 |
58.5 MB |
REcon/REcon 2016/video/recon2016-04-liang-chen-qidan-he-Shooting-the-OS-X-El-Capitan-Kernel-Like-a-Sniper.mp4 |
68.1 MB |
REcon/REcon 2016/video/recon2016-02-david-carne-Black-box-reverse-engineering-for-unknown-custom-instruction-sets.mp4 |
49.6 MB |
REcon/REcon 2016/video/recon2016-12-satoshi-tanda-Monitoring-controlling-kernel-mode-events-by-HyperPlatform.mp4 |
33.2 MB |
REcon/REcon 2016/video/recon2016-01-matt-spisak-Hardware-Assisted-Rootkits-and-Instrumentation-ARM-Edition.mp4 |
74.2 MB |
REcon/REcon 2016/video/recon2016-13-natalie-silvanovich-More-Flash-More-Fun.mp4 |
58.8 MB |
REcon/REcon 2016/video/recon2016-05-jason-geffner-JavaJournal.mp4 |
29.1 MB |
REcon/REcon 2016/video/recon2016-08-robert-c-seacord-Dangerous-Optimizations-and-the-Loss-of-Causality.mp4 |
60.7 MB |
REcon/REcon 2016/video/recon2016-19-alex-ionescu-Abusing-the-NT-Kernel-Shim-Engine.mp4 |
84.1 MB |
REcon/REcon 2016/video/recon2016-03-joan-calvet-jessy-campos-thomas-dupuy-Visiting-The-Bear-Den.mp4 |
72.5 MB |
REcon/REcon 2016/video/recon2016-15-markus-gaasedelen-nick-burnett-SolIDArity.mp4 |
46.5 MB |
REcon/REcon 2016/video/recon2016-14-ang-cui-francois-charbonneau-jatin-kataria-A-Monitor-Darkly-Reversing-and-Exploiting-Ubiquitous-On-Screen-Display-Controllers-in-Modern-Monitors.mp4 |
49.8 MB |
REcon/REcon 2016/video/recon2016-21-richard-johnson-Go-Speed-Tracer.mp4 |
75.8 MB |
REcon/REcon 2016/video/recon2016-20-julian-kirsch-clemens-jonischkeit-Movfuscator-Be-Gone.mp4 |
36.1 MB |
REcon/REcon 2016/video/recon2016-18-jessy-diamond-exum-Reverse-Engineering-ISC-controllers.mp4 |
74.2 MB |
REcon/REcon 2016/video/recon2016-11-chris-gerlinsky-How-Do-I-Crack-Satellite-and-Cable-Pay-TV.mp4 |
73.3 MB |
REcon/REcon 2016/video/recon2016-10-james-forshaw-Process-Failure-Modes.mp4 |
71.9 MB |
REcon/REcon 2016/video/recon2016-16-nguyen-anh-quynh-Keystone-the-last-missing-framework-of-Reverse-Engineering.mp4 |
40.6 MB |
REcon/REcon 2016/video/recon2016-09-nico-golde-daniel-komaromy-Breaking-Band.mp4 |
66.6 MB |
REcon/REcon 2014/recon2014-15-alex-ionescu-Apple-SMC-The-place-to-be-definitely-For-an-implant.mp4 |
109 MB |
REcon/REcon 2014/recon2014-12-assaf-nativ-The-Making-of-the-Kosher-Phone.mp4 |
147.9 MB |
REcon/REcon 2014/recon2014-01-eva-galperin-Keynote.mp4 |
78.7 MB |
REcon/REcon 2014/recon2014-20-andrzej-dereszowski-FunCap.mp4 |
106.9 MB |
REcon/REcon 2014/recon2014-03-michael-ossmann-SDR-Tricks-with-HackRF.mp4 |
121.4 MB |
REcon/REcon 2014/recon2014-21-mougey-camille-francis-gabriel-DRM-obfuscation-versus-auxiliary-attacks.mp4 |
162 MB |
REcon/REcon 2014/recon2014-11-nathan-keltner-charles-holmes-Here-be-Dragons-A-Bedtime-Tale-for-Sleepless-Nights.mp4 |
100.6 MB |
REcon/REcon 2014/recon2014-05-jason-jones-jasiel-spelman-Reversing-on-the-Edge.mp4 |
100.6 MB |
REcon/REcon 2014/recon2014-14-jason-jones-PIN-Point-Control-for-Analyzing-Malware.mp4 |
38.7 MB |
REcon/REcon 2014/recon2014-13-richard-johnson-Fuzzing-and-Patch-Analysis-SAGEly-Advice.mp4 |
268.2 MB |
REcon/REcon 2014/recon2014-04-exide-Glitching-For-n00bs.mp4 |
146 MB |
REcon/REcon 2014/recon2014-16-endre-bangerter-dominic-fischer-Memory-Tracing-Forensic-Reverse-Engineering.mp4 |
134.2 MB |
REcon/REcon 2014/recon2014-18-michael-coppola-Performing-Open-Heart-Surgery-on-a-Furby.mp4 |
232.5 MB |
REcon/REcon 2014/recon2014-08-matt-oh-Reverse-Engineering-Flash-Memory-For-Fun-and-Benefit.mp4 |
166.4 MB |
REcon/REcon 2014/recon2014-25-william-peteroy-Exploit-tips-and-techniques.mp4 |
124.6 MB |
REcon/REcon 2014/recon2014-02-igor-skochinsky-Intel-Management-Engine-Secrets.mp4 |
180.2 MB |
REcon/REcon 2014/recon2014-22-wartortell-Rewriting-x86-Binaries-Many-PEs-Such-Secure-Wow.mp4 |
134 MB |
REcon/REcon 2014/recon2014-10-artem-dinaburg-andrew-ruef-Static-Translation-of-X86-Instruction-Semantics-to-LLVM-With-McSema.mp4 |
235.5 MB |
REcon/REcon 2014/recon2014-24-colin-o-flynn-Power-Analysis-and-Clock-Glitching-with-the-Open-Source-ChipWhisperer-Platform.mp4 |
169.4 MB |
REcon/REcon 2014/recon2014-26-jonas-zaddach-Exploring-the-impact-of-a-hard-drive-backdoor.mp4 |
185 MB |
REcon/REcon 2014/recon2014-07-marta-janus-Going-gets-tough-a-tale-of-encounters-with-novel-evasive-malware.mp4 |
59.5 MB |
REcon/REcon 2014/recon2014-06-francisco-falcon-Breaking-Out-of-VirtualBox-through-3D-Acceleration.mp4 |
163.6 MB |
REcon/REcon 2014/recon2014-17-milan-bohacek-How-do-I-RE-object-oriented-code-and-you-should-too.mp4 |
173.1 MB |
REcon/REcon 2014/recon2014-23-brendan-dolan-gavitt-Dynamic-Analysis-Kung-Fu-with-PANDA.mp4 |
242.8 MB |
REcon/REcon 2014/recon2014-19-elad-shapira-Shall-we-play-a-game-Lessons-learned-while-playing-CoreWars8086.mp4 |
124.8 MB |
REcon/REcon thank you.txt |
531 B |
REcon/REcon 2013/Recon2013-Craig Smith.mp4 |
84.4 MB |
REcon/REcon 2013/Recon2013-Josh m0nk Thomas and Nathan Natron Keltner.mp4 |
113 MB |
REcon/REcon 2013/Recon2013-Aleksandr Matrosov and Eugene Rodionov- Reconstructing Gapz Position-Independent Code Analysis Problem.mp4 |
135.1 MB |
REcon/REcon 2013/Recon2013-Ruby feinstein Omri Ildis Yuval Ofir.mp4 |
268.1 MB |
REcon/REcon 2013/Recon2013-Joshua J Drake aka jduck.mp4 |
99.6 MB |
REcon/REcon 2013/Recon2013-Josh _m0nk_ Thomas- Hiding @ Depth.mp4 |
115.5 MB |
REcon/REcon 2013/Recon2013-Jesse D'Aguanno- XNU Spelunking or Fuzzing the kernel inside your kernel.mp4 |
168.4 MB |
REcon/REcon 2013/Recon2013-Olivier Thomas- Hardware reverse engineering tools.mp4 |
152.8 MB |
REcon/REcon 2013/Recon2013-Francois Chagnon- Python bindings for Hexrays Decompiler.mp4 |
49.8 MB |
REcon/REcon 2013/Recon2013-Bacura- Just keep trying - Unorthodox ways to hack an old-school hardware.mp4 |
147 MB |
REcon/REcon 2013/Recon2013-Oleg Afonin- Apple iCloud services reversed inside out.mp4 |
104.2 MB |
REcon/REcon 2013/Recon2013-Natalie Silvanovich- Many More Tamagotchis Were Harmed in the Making of this Presentation.mp4 |
183.5 MB |
REcon/REcon 2013/Recon2013-Alex Ionescu- I got 99 problems but a kernel pointer ain't one.mp4 |
148.4 MB |
REcon/REcon 2013/Recon2013-Christopher Domas aka the.delta.axiom- The Future of RE - Dynamic Binary Visualization.mp4 |
269.3 MB |
REcon/REcon 2013/Recon2013-Dmitry Nedospasov and Thorsten Schroder- Keep your tentacles off my bus- introducing Die Datenkrake.mp4 |
310.4 MB |
REcon/REcon 2013/Recon2013-Elias Bachaalany- Inside EMET 4.0.mp4 |
119.5 MB |
REcon/REcon 2013/Recon2013-Christopher Hoder and Theodore Sumers.mp4 |
114.6 MB |
REcon/REcon 2017 Brussels/Poutine Dusting Forgotten Lore - Yannick Lamarre.srt |
30 KB |
REcon/REcon 2017 Brussels/Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis.mp4 |
80.6 MB |
REcon/REcon 2017 Brussels/New vulnerabilities in SMM of Coreboot and UEFI based systems.mp4 |
75.9 MB |
REcon/REcon 2017 Brussels/Contributor analysis.mp4 |
32.3 MB |
REcon/REcon 2017 Brussels/Keeping your tools safe IDA.mp4 |
32.7 MB |
REcon/REcon 2017 Brussels/Breaking Code Read Protection on the NXP LPC family Microcontroller.srt |
142 KB |
REcon/REcon 2017 Brussels/miLazyCracker - Kevin Larson.mp4 |
21.7 MB |
REcon/REcon 2017 Brussels/GRAP define and match graph patterns within binaries.mp4 |
72.3 MB |
REcon/REcon 2017 Brussels/Reverse Engineering Satellite Based IP Content Distribution.srt |
119 KB |
REcon/REcon 2017 Brussels/Hackable Security Modules Reversing and exploiting a FIPS.mp4 |
48.5 MB |
REcon/REcon 2017 Brussels/Legacy Crypto Never Dies.mp4 |
24.2 MB |
REcon/REcon 2017 Brussels/Teaching Old Shellcode New Tricks - Josh Pitts.mp4 |
45.7 MB |
REcon/REcon 2017 Brussels/Embedded devices reverse engineering.srt |
111 KB |
REcon/REcon 2017 Brussels/Transforming Open Source to Open Access in Closed Applications.mp4 |
55.9 MB |
REcon/REcon 2017 Brussels/Getting Physical with USB Type-C Windows 10 RAM Forensics and UEFI Attacks.srt |
194 KB |
REcon/REcon 2017 Brussels/Your Chakra Is Not Aligned.srt |
56 KB |
REcon/REcon 2017 Brussels/Your Chakra Is Not Aligned.mp4 |
23 MB |
REcon/REcon 2017 Brussels/Transforming Open Source to Open Access in Closed Applications.srt |
111 KB |
REcon/REcon 2017 Brussels/Embedded devices reverse engineering.mp4 |
53 MB |
REcon/REcon 2017 Brussels/Getting Physical with USB Type-C Windows 10 RAM Forensics and UEFI Attacks.mp4 |
106.3 MB |
REcon/REcon 2017 Brussels/Legacy Crypto Never Dies.srt |
61 KB |
REcon/REcon 2017 Brussels/Teaching Old Shellcode New Tricks - Josh Pitts.srt |
84 KB |
REcon/REcon 2017 Brussels/GRAP define and match graph patterns within binaries.srt |
112 KB |
REcon/REcon 2017 Brussels/Reverse Engineering Satellite Based IP Content Distribution.mp4 |
73.5 MB |
REcon/REcon 2017 Brussels/Analyzing iOS apps road from AppStore to security analysis report.mp4 |
45.4 MB |
REcon/REcon 2017 Brussels/miLazyCracker - Kevin Larson.srt |
41 KB |
REcon/REcon 2017 Brussels/When your firewall turns against you - Rene Freingruber.mp4 |
23.7 MB |
REcon/REcon 2017 Brussels/r2m2 - Guillaume “guedou” Valadon.mp4 |
42.6 MB |
REcon/REcon 2017 Brussels/Breaking Code Read Protection on the NXP LPC family Microcontroller.mp4 |
72 MB |
REcon/REcon 2017 Brussels/New vulnerabilities in SMM of Coreboot and UEFI based systems.srt |
146 KB |
REcon/REcon 2017 Brussels/Keeping your tools safe IDA.srt |
64 KB |
REcon/REcon 2017 Brussels/Poutine Dusting Forgotten Lore - Yannick Lamarre.mp4 |
21.4 MB |
REcon/REcon 2017 Brussels/Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis.srt |
134 KB |
REcon/REcon 2010/REcon 2010 videos/Bureau_Calvet_web.mp4 |
209.5 MB |
REcon/REcon 2010/REcon 2010 videos/Deviant_Ollam4.mp4 |
189.3 MB |
REcon/REcon 2010/REcon 2010 videos/Carrera_Duart.mp4 |
203.3 MB |
REcon/REcon 2010/REcon 2010 videos/recon_2010_dino_dai_zovi.mp4 |
162.7 MB |
REcon/REcon 2010/REcon 2010 videos/sean_heelan_w4.mp4 |
180.8 MB |
REcon/REcon 2010/REcon 2010 videos/recon_2010_jonathan_stuart.mp4 |
127.2 MB |
REcon/REcon 2010/REcon 2010 videos/recon_2010_gynvael_coldwind_and_unavowed.mp4 |
132.6 MB |
REcon/REcon 2010/REcon 2010 videos/Alex_Ionescu_web4.mp4 |
174.7 MB |
REcon/REcon 2010/REcon 2010 videos/recon_2010_richard_thieme.mp4 |
127.1 MB |