×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
COMMSEC D1 - Florian Lukavsky and Wolfgang Ettlinger - Pwnrensics - How to Execute Code on a Forensic Workstation.pdf
Home
/
Discover
/
gsec.hitb.org
/
materials
/
sg2017
/
Parent Folder
COMMSEC D1 - Florian Lukavsky and Wolfgang Ettlinger - Pwnrensics - How to Execute Code on a Forensic Workstation.pdf
PDF
6 years ago
1.06 MB
Copy Link
KEYNOTE 1 - Mark Curphey - Finding Vulnerabilities and Malware in Open-Source Code at Scale.pdf
PDF
6 years ago
5.29 MB
Copy Link
COMMSEC D2 - Bai Guangdong and Zhang Qing - The Nightmare of Fragmentation - A Case Study of 200 Vulnerabilities in Android Phones.pdf
PDF
6 years ago
4.65 MB
Copy Link
D2 - Adam Donenfeld - Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.pdf
PDF
6 years ago
867 bytes
Copy Link
WHITEPAPER - Adam Donenfeld - Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.pdf
PDF
6 years ago
863 bytes
Copy Link
D1 - Ashley Shen and Moonbeom Park - A Deep Dive into the Digital Weapons of the North Korean Cyber Army.pdf
PDF
6 years ago
23.73 MB
Copy Link
COMMSEC D1 - Cesar Cerrudo and Lucas Apa - Hacking Robots Before Skynet.pdf
PDF
6 years ago
49.47 MB
Copy Link
COMMSEC D2 - Matteo Beccaro - Stealing PLC Intellectual Property - A Red Teaming Story.pdf
PDF
6 years ago
1.48 MB
Copy Link
WELCOME ADDRESS - Earl Carter - IoT - A Security Hole Without a Patch.pdf
PDF
6 years ago
10.38 MB
Copy Link
D1 - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf
PDF
6 years ago
2.42 MB
Copy Link
WHITEPAPER - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf
PDF
6 years ago
2.28 MB
Copy Link
WHITEPAPER - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf
PDF
6 years ago
99.54 kB
Copy Link
D2 - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf
PDF
6 years ago
25.43 MB
Copy Link
D2 - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf
PDF
6 years ago
45.30 MB
Copy Link
WHITEPAPER - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf
PDF
6 years ago
813.81 kB
Copy Link
D1 - Dominic Chell and Vincent Yiu - A Year In The Red.pdf
PDF
6 years ago
34.78 MB
Copy Link
D1 - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf
PDF
6 years ago
11.01 MB
Copy Link
WHITEPAPER - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf
PDF
6 years ago
519.31 kB
Copy Link
D1 - Orange Tsai - A New Era of SSRF – Exploiting URL Parsers in Trending Programming Languages.pdf
PDF
6 years ago
5.18 MB
Copy Link
D2 - Qiang Li and ZhiBin Hu - QEMU Attack Surface and Security Internals.pdf
PDF
6 years ago
2.50 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.