×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
D1 - Orange Tsai - A New Era of SSRF – Exploiting URL Parsers in Trending Programming Languages.pdf
Home
/
Discover
/
gsec.hitb.org
/
materials
/
sg2017
/
Parent Folder
D1 - Orange Tsai - A New Era of SSRF – Exploiting URL Parsers in Trending Programming Languages.pdf
PDF
6 years ago
5.18 MB
Copy Link
D2 - Qiang Li and ZhiBin Hu - QEMU Attack Surface and Security Internals.pdf
PDF
6 years ago
2.50 MB
Copy Link
WHITEPAPER - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf
PDF
6 years ago
519.31 kB
Copy Link
D1 - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf
PDF
6 years ago
11.01 MB
Copy Link
D1 - Dominic Chell and Vincent Yiu - A Year In The Red.pdf
PDF
6 years ago
34.78 MB
Copy Link
D2 - Ivan Novikov - NeuralFuzz - Neural Networks for Fuzzing Web Apps.pdf
PDF
6 years ago
1.24 MB
Copy Link
WHITEPAPER - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf
PDF
6 years ago
813.81 kB
Copy Link
D1 - Veronica Valeros and Sebastian Garcia - A Modern Study of Microphone Bugs.pdf
PDF
6 years ago
9.20 MB
Copy Link
D2 - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf
PDF
6 years ago
45.30 MB
Copy Link
WHITEPAPER - Veronica Valeros and Sebastian Garcia - A Modern Study of Microphone Bugs.pdf
PDF
6 years ago
7.61 MB
Copy Link
D2 - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf
PDF
6 years ago
25.43 MB
Copy Link
COMMSEC D1 - Stefan Esser - The Original Elevat0r.pdf
PDF
6 years ago
1.89 MB
Copy Link
WHITEPAPER - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf
PDF
6 years ago
99.54 kB
Copy Link
WHITEPAPER - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf
PDF
6 years ago
2.28 MB
Copy Link
D1 - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf
PDF
6 years ago
2.42 MB
Copy Link
COMMSEC D1 - Thomas Debize and Mahdi Braik - Hadoop Safari - Hunting for Vulnerabilities.pdf
PDF
6 years ago
2.44 MB
Copy Link
COMMSEC D2 - Fadli B. Sidek - Facebook - The Deep & Dark Web for Threat Actors in Asia.pdf
PDF
6 years ago
13.15 MB
Copy Link
COMMSEC D2 - Xinhua Cai - Security Crowdsourcing - Growing Network Security Specialists for the Enterprise.pdf
PDF
6 years ago
10.46 MB
Copy Link
COMMSEC D2 - Jim Geovedi - Unstructured Data is the New Gold - ML NLP is the New Shiz.pdf
PDF
6 years ago
24.86 MB
Copy Link
COMMSEC D2 - Vitaly Kamluk and Wayne Lee - Searching for a Needle in a Remote Haystack.pdf
PDF
6 years ago
1.59 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.