![]() Jimi jimi2x Allee - Chromebook Breakout Escaping Jail with your friends using a Pico Ducky.pdf Jeffrey (jeffssh) Hofmann - PreAuth RCE Chains on an MDM KACE SMA.pdf Jeffrey (jeffssh) Hofmann - PreAuth RCE Chains on an MDM KACE SMA - preauth-rce_v1.0.0.py Jay Lagorio - Tear Down this Zywall Breaking Open Zyxel Encrypted Firmware.pdf James Kettle - Browser-Powered Desync Attacks A New Frontier in HTTP Request Smuggling.pdf Jake Labelle - Doing the Impossible How I Found Mainframe Buffer Overflows.pdf Jacob Baines - Do Not Trust the ASA Trojans!.pdf Jacob Baines - Do Not Trust the ASA Trojans! - Source Code.zip Ionut Cernica - Deanonymization of TOR HTTP hidden services.pdf ![]() Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE).pdf James Pavur - Space Jam Exploring Radio Frequency Attacks in Outer Space.pdfĮmma Best Xan North - Leak The Planet Veritatem cognoscere non pereat mundus.pdfĮran Segal - The COW (Container On Windows) Who Escaped the Silo.pdfĮugene Lim - You Have One New Appwntment - Hacking Proprietary iCalendar Properties - paper.pdfĮugene Lim - You Have One New Appwntment - Hacking Proprietary iCalendar Properties.pdf DEF CON 30/DEF CON 30 presentations/ File Name ↓Īaditya Purani - ElectroVolt Pwning popular desktop apps while uncovering new attack surface on Electron.pdfĪdam Zabrocki Alex Tereshkin - Exploitation in the era of formal verification a peek at a new frontier with AdaCore-SPARK.pdfĪndrew Logan - Tracking Military Ghost Helicopters over Washington DC.pdfĪrik Atar - Why did you lose the last ps5 restock to a bot.pdfĪsaf Gilboa - LSASS Shtinkering Abusing Windows Error Reporting to Dump LSASS.pdfĪtlas - Emulation-driven reverse-engineering for finding vulns.mp4Īviv Sasson - The Journey From an Isolated Container to Cluster Admin in Service Fabric.pdfīen Barnea Ophir Harpaz - Exploring Ancient Ruins to Find Modern Bugs Discovering a 0-Day in an MS-RPC Service.pdfīen Gardiner Chris Poore - Trailer Shouting Talking PLC4TRUCKS Remotely with an SDR.pdfīill Graydon - Defeating Moving Elements in High Security Keys.pdfīill Woodcock - The Internets role in sanctions enforcement.pdfīilly Jheng Muhammad Alifa Ramdhan - All Roads leads to GKEs Host 4+ Ways to Escape.pdfĬesare Pizzi - Old Malware New tools Ghidra and Commodore 64 why understanding old malicious software still matters.pdfĬhristopher Panayi - Pulling Passwords out of Configuration Manager Practical Attacks against Microsofts Endpoint Management Software.pdfĬolwaterQ - Backdooring Pickles A decade only made things worse.pdfĭagan Henderson Will Kline - The Call is Coming From Inside The Cluster Mistakes that Lead to Whole Cluster Pwnership.pdfĭaniel (dozer) Jensen - Hunting Bugs in The Tropics V1.0.pdfĭongsung Kim - The CSRF Resurrections! Starring the Unholy Trinity Service Worker of PWA SameSite of HTTP Cookie and Fetch.pdfĭr.
0 Comments
Leave a Reply. |