BITCQ

RuhrSec

Size: 2.1 GB
Magnet link

Name Size
RuhrSec/RuhrSec 2016/RuhrSec 2016 An Abusive Relationship with AngularJS v2 , Mario Heiderich.en.transcribed.srt 152 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 An Abusive Relationship with AngularJS v2 , Mario Heiderich.mp4 48 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Automatic Extraction of Indicators of Compromise for Web App. , Marco Balduzzi.en.transcribed.srt 72 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Automatic Extraction of Indicators of Compromise for Web App. , Marco Balduzzi.mp4 56 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Cache Side-Channel Attacks and the case of Rowhammer , Daniel Gruss.en.transcribed.srt 91 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Cache Side-Channel Attacks and the case of Rowhammer , Daniel Gruss.mp4 41.9 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Code-Reuse Attacks and Beyond , Thorsten Holz.en.transcribed.srt 90 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Code-Reuse Attacks and Beyond , Thorsten Holz.mp4 41.6 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Eavesdropping on WebRTC Communication with Funny Cat Pictures , Martin Johns.mp4 41.2 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Hacking with Unicode in 2016 , Mathias Bynens.en.transcribed.srt 141 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Hacking with Unicode in 2016 , Mathias Bynens.mp4 52.6 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Java deserialization vulnerabilities - The forgotten bug class , Matthias Kaiser.en.transcribed.srt 107 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Java deserialization vulnerabilities - The forgotten bug class , Matthias Kaiser.mp4 46.7 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 On Securing Legacy Software Against Code-Reuse Attacks , Lucas Vincenzo Davi.en.transcribed.srt 73 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 On Securing Legacy Software Against Code-Reuse Attacks , Lucas Vincenzo Davi.mp4 41.2 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 On the Security of Browser Extensions , Nicolas Golubovic.en.transcribed.srt 61 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 On the Security of Browser Extensions , Nicolas Golubovic.mp4 48 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 The DROWN Attack , Sebastian Schinzel.en.transcribed.srt 110 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 The DROWN Attack , Sebastian Schinzel.mp4 46.5 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 The beast within - Evading dynamic malware analysis using Microsoft COM , Ralf Hund.mp4 56.1 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Transport Layer Security – TLS 1.3 and backwards security issues , Jörg Schwenk.en.transcribed.srt 84 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Transport Layer Security – TLS 1.3 and backwards security issues , Jörg Schwenk.mp4 50.6 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Closing by Marcus Niemietz - YouTube.en.transcribed.srt 7 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Closing by Marcus Niemietz - YouTube.mp4 5.7 MB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Opening by Marcus Niemietz.en.transcribed.srt 21 KB
RuhrSec/RuhrSec 2016/RuhrSec 2016 Opening by Marcus Niemietz.mp4 11.4 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 0-RTT Key Exchange with Full Forward Secrecy , Prof. Dr. Tibor Jager.mp4 38.8 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 A new categorization system for Side-channel attacks on mo... , Dr. Veelasha Moonsamy.en.transcribed.srt 87 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 A new categorization system for Side-channel attacks on mo... , Dr. Veelasha Moonsamy.mp4 42 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Advanced SSL TLS Deployment Strategies , Frederik Braun.en.transcribed.srt 47 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Advanced SSL TLS Deployment Strategies , Frederik Braun.mp4 24.2 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Black-Box Security Analysis of State Machine Implementations , Dr. Joeri de Ruiter.en.transcribed.srt 106 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Black-Box Security Analysis of State Machine Implementations , Dr. Joeri de Ruiter.mp4 61.6 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Breaking and Fixing a Cryptocurrency , Martin Grothe.en.transcribed.srt 107 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Breaking and Fixing a Cryptocurrency , Martin Grothe.mp4 63.8 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Five Years of Android Security Research the Good, the Bad... , Dr. Sven Bugiel.en.transcribed.srt 120 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Five Years of Android Security Research the Good, the Bad... , Dr. Sven Bugiel.mp4 59.1 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 How to Build Hardware Trojans , Prof. Dr. Christof Paar.en.transcribed.srt 132 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 How to Build Hardware Trojans , Prof. Dr. Christof Paar.mp4 61.7 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 How to Hack Your Printer , Jens Müller.en.transcribed.srt 91 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 How to Hack Your Printer , Jens Müller.mp4 46.8 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Opening , Marcus Niemietz.mp4 12.4 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Rowhammer Attacks A Walkthrough Guide , Dr. Clémentine Maurice & Daniel Gruss.en.transcribed.srt 110 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Rowhammer Attacks A Walkthrough Guide , Dr. Clémentine Maurice & Daniel Gruss.mp4 54.8 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 SSH Beyond Confidentiality and Integrity in Practice , Prof Dr. Kenny Paterson.en.transcribed.srt 137 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 SSH Beyond Confidentiality and Integrity in Practice , Prof Dr. Kenny Paterson.mp4 81.6 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Secrets of the Google Vulnerability Reward Program , Krzysztof Kotowicz.en.transcribed.srt 97 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Secrets of the Google Vulnerability Reward Program , Krzysztof Kotowicz.mp4 49.5 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Teach a Man to Phish and You Feed Him for a Lifetime , Armin Buescher.en.transcribed.srt 86 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Teach a Man to Phish and You Feed Him for a Lifetime , Armin Buescher.mp4 88.4 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 The (In)Security of Automotive Remote Keyless Entry Systems..., Dr. David Oswald.en.transcribed.srt 111 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 The (In)Security of Automotive Remote Keyless Entry Systems..., Dr. David Oswald.mp4 58.8 MB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Using Microarchitectural Design to Break KASLR and More , Anders Fogh.en.transcribed.srt 102 KB
RuhrSec/RuhrSec 2017/RuhrSec 2017 Using Microarchitectural Design to Break KASLR and More , Anders Fogh.mp4 55.3 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 Conseq. of Compl. in G. Instant Messaging u. the E. of WhatsApp & Signal - P. Rosler.mp4 40.3 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 Don't trust the DOM Breaking XSS mitigations via Script Gadgets - Sebastian Lekies.mp4 35.9 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 Efail Breaking S MIME and OpenPGP Email Encryption - D. Poddebniak & C. Dresen.mp4 33.2 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 Exploring ROCA Fun & troubles with RSA keypairs - Dr. Petr Svenda.mp4 88.8 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 Finding security vulnerabilities with modern fuzzing techniques - Rene Freingruber.mp4 35.5 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 From Discovering Vulnerabilities to Getting Them Fixed At Scale - Dr. Ben Stock.mp4 34.5 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 How client-side compilers help attackers to gain code execution - Dr. Robert Gawlik.mp4 21.2 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 Is there any Security (and Privacy) in the Internet of Things - Dr. David Oswald.mp4 36.9 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 Keynote Securing the Dev. Lifecycle in Prod. Systems Engineering - Dr. Edgar Weippl.mp4 27.9 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 Keynote Weird machines, exploitability and unexploitability - Thomas Dullien.mp4 30.8 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 Opening - Marcus Niemietz.mp4 10.8 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 Revisiting the X.509 Certification Path Validation - Dr. Falko Strenzke.mp4 28 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 The ROBOT Attack - Hanno Bock.mp4 27.8 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 The Story of Meltdown and Spectre - Dr. Daniel Gruss & Jann Horn.mp4 30.3 MB
RuhrSec/RuhrSec 2018/RuhrSec 2018 Vulnerability handling process at Joomla - David Jardin.mp4 43.7 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 1 Trillion Dollar Refund - How To Spoof PDF Signatures , Dr.-Ing. Vladislav Mladenov.mp4 9.6 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Are Microarchitectural Attacks still possible on ... , Erik Kraft & Michael Schwarz.mp4 10.9 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Artifical Intelligence in Cyber Security Threat ... , Tobias Burri & Elias Hazboun.mp4 5.6 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Automate the generation of security documentation , Andreas Kuehne & Jens Neuhalfen.mp4 5.2 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Browser fingerprinting past, present and possible future , Dr. Pierre Laperdrix.mp4 9.4 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Content-Security-Policies in mass-distributed web apps - doing the ... , David Jardin.mp4 18.2 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Don't Trust The Locals Exploiting Persistent ... , Marius Steffens & Dr. Ben Stock.mp4 8.7 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Greybox Automatic Exploit Generation for Heap Overflows , Sean Heelan.mp4 9.9 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Johnny, you are fired! - Spoofing OpenPGP... , Marcus Brinkmann & Damian Poddebniak.mp4 16.5 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Keynote How to statically detect insecure uses of crypto... , Prof. Dr. Eric Bodden.mp4 17.5 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Keynote Publish-and-Forget Longitudinal Privacy... , Ass.Prof. Dr. Christina Pöpper.mp4 52.7 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Opening , Marcus Niemietz.mp4 5.2 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Reversing Fraudulent Apps , Abdullah Joseph.mp4 25.7 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 Social Engineering through Social Media profiling, scanning ... , Christina Lekati.mp4 14.7 MB
RuhrSec/RuhrSec 2019/RuhrSec 2019 The Bicho backdooring CAN bus for remote car hacking , Sheila Berta.mp4 13.4 MB
RuhrSec/RuhrSec logo.jpg 11 KB
RuhrSec/RuhrSec thank you.txt 927 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
RuhrSec Video 2.1 GB 3
RuhrSec Video 1.9 GB 3

Loading...