[ICO]Name Last modified Size

[DIR]Parent Directory  -
[PDF]CLOSING KEYNOTE - Sophia D Antoine - Hardware Side Channels in Virtualized Environments.pdfMay-27-2016 18:40 2 Mo
[PDF]D1 COMMSEC - Elisabeth de Leeuw - Unformation in the Era of Hyper Connectivity.pdfMay-26-2016 18:03 3 Mo
[PDF]D1 COMMSEC - Marc Newlin - Applying Regulatory Data to IoT RF Reverse Engineering.pdfMay-26-2016 15:59 6 Mo
[PDF]D1 COMMSEC - Martin Knobloch - Don't Feed the Hippos.pdfMay-26-2016 16:00 18 Mo
[PDF]D1 COMMSEC - Melanie Rieback - Pentesting ChatOps.pdfMay-30-2016 10:06 3 Mo
[PDF]D1 COMMSEC - Nadav Markus and Gal De Leon - Exploiting GLIBC - Hacking Everything.pdfMay-26-2016 18:18 1 Mo
[PDF]D1T1 - Jacob Torrey - Using the Observer Effect and Cyber Fengshui.pdfMay-26-2016 15:37 5 Mo
[PDF]D1T1 - Lin Huang - Forcing a Targeted LTE Cellphone into an Eavesdropping Network.pdfMay-26-2016 18:00 2 Mo
[PDF]D1T1 - Nick Biasini - Exploit Kits - Hunting the Hunters .pdfMay-26-2016 17:05 45 Mo
[PDF]D1T1 - Radu Caragea - Peering into the Depths of TLS Traffic in Real Time.pdfMay-26-2016 15:09 1 Mo
[PDF]D1T1 - Shengping Wang and Xu Liu - Escape From The Docker-KVM-QEMU Machine.pdfMay-26-2016 12:16 2 Mo
[PDF]D1T1 - Tang Qing Hao - Virtualization System Vulnerability Discovery Framework.pdfMay-26-2016 11:50 1 Mo
[PDF]D1T2 - Broderick Aquilino and Wayne Low - Kernel Exploit Hunting and Mitigation.pdfMay-26-2016 15:10 1 Mo
[PDF]D1T2 - Chilik Tamir - Profiting from iOS Malware.pdfMay-26-2016 15:37 27 Mo
[PDF]D1T2 - Michele Spagnuolo and Lukas Weichselbaum - CSP Oddities.pdfMay-26-2016 12:31 2 Mo
[PDF]D1T2 - Seunghun Han - Create Your Own Bad USB Device.pdfMay-26-2016 17:00 4 Mo
[PDF]D1T2 - Tim Xia - Adaptive Android Kernel Live Patching.pdfMay-26-2016 18:20 2 Mo
[PDF]D1T2 - Yann Allain and Julien Moinard - Hardsploit Project.pdfMay-26-2016 11:50 8 Mo
[PDF]D1T3 - Gustavo Grieco - Vulnerability Discovery Using Machine Learning.pdfMay-27-2016 07:18 1 Mo
[PDF]D1T3 LABS - Anto Joseph - Droid-FF.pdfMay-26-2016 12:31 30 Mo
[PDF]D1T3 LABS - Tony Trummer and Tushar Dalvi - Mobile Application Security for iOS and Android.zipMay-26-2016 18:29 5 Mo
[PDF]D2 COMMSEC - Antonio Martins - Inspecage - Android Pacakge Inspector.zipMay-30-2016 18:30 19 Mo
[PDF]D2 COMMSEC - Barry van Kampen - Hack in The Class.pdfMay-30-2016 18:28 520 Ko
[PDF]D2 COMMSEC - Mattijs van Ommeren - A Series Of Unfortunate Events - Where Malware Meets Murphy.pdfMay-27-2016 12:24 71 Mo
[PDF]D2 COMMSEC - Paul Marinescu - Facebook Presents Capture the Flag.pdfMay-30-2016 10:17 6 Mo
[PDF]D2T1 - Anders Fogh - Cache Side Channel Attacks.pdfMay-27-2016 13:52 432 Ko
[PDF]D2T1 - Felix Wilhelm - Attacking Next Generation Firewalls.pdfMay-27-2016 15:59 3 Mo
[PDF]D2T1 - Jun Li - CANSsee - An Automobile Intrusion Detection System.pdfMay-27-2016 18:39 6 Mo
[PDF]D2T1 - Yuwei Zheng and Haoqi Shan - Forging a Wireless Time Signal to Attack NTP Servers.pdfMay-27-2016 12:26 7 Mo
[PDF]D2T1 Itzik Kotler and Amit Klein - The Perfect Exfiltration Technique.pdfMay-27-2016 15:07 3 Mo
[PDF]D2T2 - Mikhail Egorov and Sergey Soldatov - New Methods for Exploiting ORM Injections in Java Applications.pdfMay-27-2016 12:46 2 Mo
[PDF]D2T2 - Peter blasty Geissler - Breaking Naive ESSID WPA2 Key Generation Algorithms.pdfMay-27-2016 18:39 8 Mo
[PDF]D2T2 - Richard Johnson - Go Speed Tracer - Guided Fuzzing.pdfMay-27-2016 12:39 4 Mo
[PDF]D2T2 - Shangcong Luan - Xen Hypervisor VM Escape.pdfMay-27-2016 15:37 2 Mo
[PDF]D2T2 - Wish Wu - Perf - From Profiling to Kernel Exploiting.pdfMay-27-2016 15:06 315 Ko
[PDF]D2T3 LABS - Matteo Beccaro - Electronic Access Control Security.pdfMay-27-2016 16:11 13 Mo
[PDF]KEYNOTE 1 - John Adams - Beyond FBI v Apple.pdfMay-26-2016 09:40 6 Mo
[DIR]WhitepapersJune-02-2016 10:40 -


This repository contains 2088 documents
Zenk-Security Repository - 2009-2018 - report problems at support [at] zenk-security [dot] com