TorBT - Torrents and Magnet Links Search Engine
BLACK HAT ASIA 2021
- Date: 2024-12-15
- Size: 323 MB
- Files: 44
File Name
Size
Brizendine Babcock Prebuilt Jop Chains With The Jop Rocket-wp.pdf
49 MB
Bassat Alarm Disarm Remotely Exploiting and Disarming Popular Physical Security System.pdf
6.5 MB
Bergin Anti Forensics Reverse Engineering A Leading Phone Forensic Tool.pdf
6.2 MB
Bai Zhang Hey You Get Off My Private Data Do Apps Respect Your Privacy As They Claim.pdf
5.3 MB
Brizendine Babcock Prebuilt Jop Chains With The Jop Rocket.pdf
37 MB
Canella Enter Sandbox wp.pdf
11 MB
Canella Enter Sandbox.pdf
4.7 MB
Chen-A-General-Approach-To-Bypassing-Many-Kernel-Protections-And-Its-Mitigation.pdf
2.4 MB
Cocomazzi-The-Rise-of-Potatoes-Privilege-Escalations-in-Windows-Services.pdf
5.5 MB
Devonshire-Vibe-check-IDK-about-this.pdf
2.9 MB
Ding-Domain-Borrowing-Catch-My-C2-Traffic-If-You-Can.pdf
4.8 MB
dosSantos-The-Cost-of-Complexity-Different-Vulnerabilities-While-Implementing-the-Same-RFC-wp.pdf
7.4 MB
dosSantos-The-Cost-of-Complexity-Different-Vulnerabilities-While-Implementing-the-Same-RFC.pdf
3.2 MB
Fan-The-Price-Of-Compatibility-Defeating-MacOS-Kernel-Using-Extended-File-Attributes.pdf
5.2 MB
Hernandez-A-Walk-Through-Historical-Correlations-Between-Security-Issues-And-Stock-Prices.pdf
8.1 MB
Hunting-Vulnerabilities-of-Grpc-Protocol-Armed-Mobileiot-Applications.pdf
5.5 MB
In-Depth-Analyzing-Fuzzing-Qualcomm-Hexagon-Processor.pdf
2.0 MB
Johnson-Unprotected-Broadcasts-In-Android-9-and-10-wp.pdf
8.5 MB
Johnson-Unprotected-Broadcasts-In-Android-9-and-10.pdf
4.1 MB
Khanna-Threat-Hunting-In-Active-Directory-Environment.pdf
6.6 MB
Kuo-We-Are-About-To-Land-How-CloudDragon-Turns-A-Nightmare-Into-Reality.pdf
5.0 MB
Liu-Disappeared-Coins-Steal-Hashrate-In-Stratum-Secretly.pdf
8.6 MB
Nassi-The-Motion-Sensor-Western.pdf
12 MB
Pan-Scavenger-Misuse-Error-Handling-Leading-To-QEMU-KVM-Escape.pdf
9.1 MB
PaPa-Ziegler-Hiding-Objects-From-Computer-Vision-By-Exploiting-Correlation-Biases.pdf
6.0 MB
Qin-The-Tangled-WebView-JavascriptInterface-Once-More.pdf
4.2 MB
Shi-Mining-And-Exploiting-Mobile-Payment-Credential-Leaks-In-The-Wild-wp.pdf
2.9 MB
Shi-Mining-And-Exploiting-Mobile-Payment-Credential-Leaks-In-The-Wild.pdf
3.4 MB
Shostack-Reverse-Engineering-Compliance.pdf
3.3 MB
Shostack-The-B-MAD-Approach-To-Threat-Modeling.pdf
2.7 MB
Taniguchi-How-Did-The-Adversaries-Abusing-The-Bitcoin-Blockchain-Evade-Our-Takeover.pdf
1.9 MB
Tseng-Mem2Img-Memory-Resident-Malware-Detection-via-Convolution-Neural-Network.pdf
7.5 MB
Tychalas-Stuxnet-In-A-Box-In-Field-Emulation-and-Fuzzing.pdf
3.3 MB
Wang-Racing-The-Dark-A-New-Tocttou-Story-From-Apples-Core.pdf
8.9 MB
Wu-Apple-Neural_Engine.pdf
4.0 MB
Wu-X-In-The-Middle-Attacking-Fast-Charging-Piles-And-Electric-Vehicles.pdf
3.8 MB
Xie-New-Attack-Surface-In-Safari-Use-Just-One-WebAudio-Vulnerability-To-Rule-Safari-wp.pdf
4.3 MB
Xie-New-Attack-Surface-In-Safari-Use-Just-One-WebAudio-Vulnerability-To-Rule-Safari.pdf
4.4 MB
Yan-Give-Me-a-Sql-Injection-I-Shall-Pwn-IIS-and-Sql-Server.pdf
16 MB
Yuan-How-I-Can-Unlock-Your-Smart-Door-Security-Pitfalls-In-Cross-Vendor-IoT-Access-Control.pdf
5.4 MB
Zeng-A-New-Era-Of-One-Click.pdf
5.1 MB
Zhang-A-Mirage-Of-Safety-Bug-Finding-And-Exploit-Techniques-Of-Top-Android-Vendors-Privacy-Protection-Apps.pdf
4.1 MB
Zhao-Wideshears-Investigating-And-Breaking-Widevine-On-QTEE-wp.pdf
6.9 MB
Zhao-Wideshears-Investigating-And-Breaking-Widevine-On-QTEE.pdf
4.1 MB