..
|
|
2020-11-05 19:04 |
- |
|
A Code of Ethics for the Private Sector - Alfonso De Gregorio.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
ATMs and Their Dirty Little Secrets - Olga Kochetova & Alexey Osipov.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Abusing Smart Cities - Matteo Beccaro and Matteo Collura.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Alfonso De Gregorio - Extortion and Cooperation in the ZeroÂ-Day Market.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Attacking NVIDIA's Tegra Platform - Peter Pi.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Breaking Exploits with Practical Control Flow Integrity - Shlomi Oberman and Ron Shina.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Fatih Ozavci - Microsoft Skype for Business - Security Advisory - SOS-15-005.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Hacking Soft Tokens - Bernhard Mueller.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Julien Lenoir - Implementing Your Own Generic Unpacker.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Look Mom - I Don't Use Shellcode - Moritz Jodeit.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Lyon Yang - Advanced SOHO Router Exploitation.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Marco Balduzzi and Vincenzo Ciancaglini - Cybercrime In The DeepWeb.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Stumping The Mobile Chipset - Adam Donenfeld and Yaniv Modekhay.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Understanding Your Opponent - Attack Profiling - Moonbeom Park and Youngun Park.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Wen Xu - Root Hundreds and Thousands of Android Devices with One Generic Exploit.pdf
|
|
2020-05-28 19:03 |
14Kb |
|
Xeno Kovah - Thunderstrike 2 - Sith Strike.pdf
|
|
2020-05-28 19:03 |
14Kb |
|