Name
Last modified
Size
Parent Directory
-
CLOSING KEYNOTE - Sophia D Antoine - Hardware Side Channels in Virtualized Environments.pdf
May-27-2016 18:40
2 Mo
D1 COMMSEC - Elisabeth de Leeuw - Unformation in the Era of Hyper Connectivity.pdf
May-26-2016 18:03
3 Mo
D1 COMMSEC - Marc Newlin - Applying Regulatory Data to IoT RF Reverse Engineering.pdf
May-26-2016 15:59
6 Mo
D1 COMMSEC - Martin Knobloch - Don't Feed the Hippos.pdf
May-26-2016 16:00
18 Mo
D1 COMMSEC - Melanie Rieback - Pentesting ChatOps.pdf
May-30-2016 10:06
3 Mo
D1 COMMSEC - Nadav Markus and Gal De Leon - Exploiting GLIBC - Hacking Everything.pdf
May-26-2016 18:18
1 Mo
D1T1 - Jacob Torrey - Using the Observer Effect and Cyber Fengshui.pdf
May-26-2016 15:37
5 Mo
D1T1 - Lin Huang - Forcing a Targeted LTE Cellphone into an Eavesdropping Network.pdf
May-26-2016 18:00
2 Mo
D1T1 - Nick Biasini - Exploit Kits - Hunting the Hunters .pdf
May-26-2016 17:05
45 Mo
D1T1 - Radu Caragea - Peering into the Depths of TLS Traffic in Real Time.pdf
May-26-2016 15:09
1 Mo
D1T1 - Shengping Wang and Xu Liu - Escape From The Docker-KVM-QEMU Machine.pdf
May-26-2016 12:16
2 Mo
D1T1 - Tang Qing Hao - Virtualization System Vulnerability Discovery Framework.pdf
May-26-2016 11:50
1 Mo
D1T2 - Broderick Aquilino and Wayne Low - Kernel Exploit Hunting and Mitigation.pdf
May-26-2016 15:10
1 Mo
D1T2 - Chilik Tamir - Profiting from iOS Malware.pdf
May-26-2016 15:37
27 Mo
D1T2 - Michele Spagnuolo and Lukas Weichselbaum - CSP Oddities.pdf
May-26-2016 12:31
2 Mo
D1T2 - Seunghun Han - Create Your Own Bad USB Device.pdf
May-26-2016 17:00
4 Mo
D1T2 - Tim Xia - Adaptive Android Kernel Live Patching.pdf
May-26-2016 18:20
2 Mo
D1T2 - Yann Allain and Julien Moinard - Hardsploit Project.pdf
May-26-2016 11:50
8 Mo
D1T3 - Gustavo Grieco - Vulnerability Discovery Using Machine Learning.pdf
May-27-2016 07:18
1 Mo
D1T3 LABS - Anto Joseph - Droid-FF.pdf
May-26-2016 12:31
30 Mo
D1T3 LABS - Tony Trummer and Tushar Dalvi - Mobile Application Security for iOS and Android.zip
May-26-2016 18:29
5 Mo
D2 COMMSEC - Antonio Martins - Inspecage - Android Pacakge Inspector.zip
May-30-2016 18:30
19 Mo
D2 COMMSEC - Barry van Kampen - Hack in The Class.pdf
May-30-2016 18:28
520 Ko
D2 COMMSEC - Mattijs van Ommeren - A Series Of Unfortunate Events - Where Malware Meets Murphy.pdf
May-27-2016 12:24
71 Mo
D2 COMMSEC - Paul Marinescu - Facebook Presents Capture the Flag.pdf
May-30-2016 10:17
6 Mo
D2T1 - Anders Fogh - Cache Side Channel Attacks.pdf
May-27-2016 13:52
432 Ko
D2T1 - Felix Wilhelm - Attacking Next Generation Firewalls.pdf
May-27-2016 15:59
3 Mo
D2T1 - Jun Li - CANSsee - An Automobile Intrusion Detection System.pdf
May-27-2016 18:39
6 Mo
D2T1 - Yuwei Zheng and Haoqi Shan - Forging a Wireless Time Signal to Attack NTP Servers.pdf
May-27-2016 12:26
7 Mo
D2T1 Itzik Kotler and Amit Klein - The Perfect Exfiltration Technique.pdf
May-27-2016 15:07
3 Mo
D2T2 - Mikhail Egorov and Sergey Soldatov - New Methods for Exploiting ORM Injections in Java Applications.pdf
May-27-2016 12:46
2 Mo
D2T2 - Peter blasty Geissler - Breaking Naive ESSID WPA2 Key Generation Algorithms.pdf
May-27-2016 18:39
8 Mo
D2T2 - Richard Johnson - Go Speed Tracer - Guided Fuzzing.pdf
May-27-2016 12:39
4 Mo
D2T2 - Shangcong Luan - Xen Hypervisor VM Escape.pdf
May-27-2016 15:37
2 Mo
D2T2 - Wish Wu - Perf - From Profiling to Kernel Exploiting.pdf
May-27-2016 15:06
315 Ko
D2T3 LABS - Matteo Beccaro - Electronic Access Control Security.pdf
May-27-2016 16:11
13 Mo
KEYNOTE 1 - John Adams - Beyond FBI v Apple.pdf
May-26-2016 09:40
6 Mo
Whitepapers
June-02-2016 10:40
-
This repository contains 1692 documents
Zenk-Security
Repository - 2009-2023 - report problems at support [at] zenk-security [dot] com