×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
KEYNOTE 1 - Mark Curphey - Finding Vulnerabilities and Malware in Open-Source Code at Scale.pdf
Home
/
Discover
/
gsec.hitb.org
/
materials
/
sg2017
/
Parent Folder
KEYNOTE 1 - Mark Curphey - Finding Vulnerabilities and Malware in Open-Source Code at Scale.pdf
PDF
5 years ago
5.29 MB
Copy Link
D2 - Qiang Li and ZhiBin Hu - QEMU Attack Surface and Security Internals.pdf
PDF
5 years ago
2.50 MB
Copy Link
WELCOME ADDRESS - Earl Carter - IoT - A Security Hole Without a Patch.pdf
PDF
5 years ago
862 bytes
Copy Link
D2 - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf
PDF
5 years ago
25.43 MB
Copy Link
WHITEPAPER - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - Ivan Novikov - NeuralFuzz - Neural Networks for Fuzzing Web Apps.pdf
PDF
5 years ago
Get Size
Copy Link
WHITEPAPER - Adam Donenfeld - Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf
PDF
5 years ago
45.30 MB
Copy Link
WHITEPAPER - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf
PDF
5 years ago
Get Size
Copy Link
D2 - Adam Donenfeld - Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.pdf
PDF
5 years ago
3.43 MB
Copy Link
WHITEPAPER - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf
PDF
5 years ago
519.31 kB
Copy Link
WHITEPAPER - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf
PDF
5 years ago
99.54 kB
Copy Link
D1 - Veronica Valeros and Sebastian Garcia - A Modern Study of Microphone Bugs.pdf
PDF
5 years ago
9.20 MB
Copy Link
D1 - Orange Tsai - A New Era of SSRF – Exploiting URL Parsers in Trending Programming Languages.pdf
PDF
5 years ago
5.18 MB
Copy Link
WHITEPAPER - Veronica Valeros and Sebastian Garcia - A Modern Study of Microphone Bugs.pdf
PDF
5 years ago
7.61 MB
Copy Link
D1 - Dominic Chell and Vincent Yiu - A Year In The Red.pdf
PDF
5 years ago
34.78 MB
Copy Link
D1 - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf
PDF
5 years ago
Get Size
Copy Link
D1 - Ashley Shen and Moonbeom Park - A Deep Dive into the Digital Weapons of the North Korean Cyber Army.pdf
PDF
5 years ago
23.73 MB
Copy Link
D1 - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf
PDF
5 years ago
2.42 MB
Copy Link
COMMSEC D2 - Xinhua Cai - Security Crowdsourcing - Growing Network Security Specialists for the Enterprise.pdf
PDF
5 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.