Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
D3 - Wen Xu - Root Hundreds and Thousands of Android Devices with One Generic Exploit.pdf
Home
/
Discover
/
gsec.hitb.org
/
materials
/
sg2015
/
Parent Folder
D3 - Wen Xu - Root Hundreds and Thousands of Android Devices with One Generic Exploit.pdf
PDF
6 years ago
2.43 MB
Copy Link
D2 - Fatih Ozavci - VoIP Wars - Destroying Jar Jar Lync.pdf
PDF
6 years ago
Get Size
Copy Link
D2 - Eleanor Saitta - Security Design and High Risk Users.pdf
PDF
6 years ago
Get Size
Copy Link
D2 - Marco Balduzzi and Vincenzo Ciancaglini - Cybercrime in the Deep Web.pdf
PDF
6 years ago
Get Size
Copy Link
D1 - Chris Rouland - Understanding the IoT from DC to 10Ghz.pdf
PDF
6 years ago
21.96 MB
Copy Link
D1 - Julien Lenoir - Implementing Your Own Generic Unpacker.pdf
PDF
6 years ago
Get Size
Copy Link
D3 - Marc Heuse - Hiding in Complexity.pdf
PDF
6 years ago
822.52 kB
Copy Link
D1 - Marina Krotofil - Hacking Chemical Plants for Competition and Extortion.pdf
PDF
6 years ago
19.03 MB
Copy Link
D1 - Lyon Yang - Advanced SOHO Router Exploitation.pdf
PDF
6 years ago
Get Size
Copy Link
D1 - Alfonso De Gregorio - Extortion and Cooperation in the ZeroΒ-Day Market.pdf
PDF
6 years ago
Get Size
Copy Link
Alfonso De Gregorio - Extortion and Cooperation in the ZeroΒ-Day Market.pdf
PDF
6 years ago
Get Size
Copy Link
Xeno Kovah - Thunderstrike 2 - Sith Strike.pdf
PDF
6 years ago
Get Size
Copy Link
D2 - Xeno Kovah - Thunderstrike 2 - Sith Strike.pdf
PDF
6 years ago
Get Size
Copy Link
Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.pdf
PDF
6 years ago
Get Size
Copy Link
D1 - Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.pdf
PDF
6 years ago
75.35 kB
Copy Link
D3 - Dmitry Chastuhin - SAP Afaria - One SMS to Hack a Company.pdf
PDF
6 years ago
Get Size
Copy Link
D3 - Katie Kleemola and Anthony Lai - Case Study of Targeted Attacks in Asia.pdf
PDF
6 years ago
Get Size
Copy Link
D2 - Ryan Welton and Marco Grassi - Current State of Android Privilege Escalation.pdf
PDF
6 years ago
4.29 MB
Copy Link
D2 - Valerie Thomas - Attacking Physical Access Systems.pdf
PDF
6 years ago
Get Size
Copy Link
KEYNOTE 4 (CLOSING) - Barry Greene - Can Vendors Ever Provide Secure Solutions?.pdf
PDF
6 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.