0xploit.com

Course BlackHat Asia Training [2021]

A Prefix for video courses related to any topic of hacking
Joined
Aug 12, 2022
Messages
160
Location
Denmark
Hellcoins
♆1,150
Username Style (Gradient Colours)
40 Videos
Content List:-
1. BitLeaker- Subverting BitLocker with One Vulnerability
2. Complexity Killed Security
3. Engineering Cybersecurity for a Nation- What Singapore is Learning from Cars and Sanitation
4. The Black Hat NOC- Greatest Hits and Holy...Cows
5. Escaping Virtualized Containers
6. Patching Loopholes- Finding Backdoors in Applications
7. What the Log-! So Many Events, so Little Time
8. Securing the Next Version of HTTP- How QUIC and HTTP3 Compare to HTTP2
9. Misuse of DNS, the Second Most Used Protocol
10. Faking a Factory- Creating and Operating a Realistic Honeypot
11. Raiden Glitching Framework
12. First Contact - Vulnerabilities in Contactless Payments
13. The Evil Alt-Ego- (ab)using HTTP Alternative Services
14. The Evil of Spy Camera
15. Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities
16. CDPwn- Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days
17. WIFI-Important Remote Attack Surface- Threat is Expanding
18. Biometrics & Privacy- Time to Faceoff or is that FaceApp
19. Attacking and Defending Machine Learning Applications of Public Cloud
20. Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
21. Redback- Advanced Static Binary Injection
22. Store-to-Leak Forwarding- There and Back Again
23. ZombieLoad- Leaking Data on Intel CPUs
24. Back to the Future. Cross-Protocol Attacks in the Era of 5G
25. 3d Red Pill- A Guest-to-Host Escape on QEMUKVM Virtio Device
26. Page Cache Attacks- Microarchitectural Attacks on Flawless Hardware
27. Wi-Fi Brokering
28. May the Trust be with You- Empowering TrustZone-M with Multiple Trusted Environments
29. Kr00k- How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices
30. From an URGENT11 Vulnerability to a Full Take-Down of a Factory Using a Single Packet
31. Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature
32. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community
33. Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier
34. Win the 0-Day Racing Game Against Botnet in Public Cloud
35. Tracking the Criminal of Fake News Based on a Unified Embedding
36. The Inside Story- There are Apps in Apps and Here is How to Break Them
37. Adversary Detection Pipelines- Finally Making Your Threat Intel Useful
38. Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
39. Locknote- Conclusions and Key Takeaways from Day 1
40. Locknote- Conclusions and Key Takeaways from Day 2



Watch Or Download:-

You must reply before you can see the hidden data contained here.
 
Last edited by a moderator:

khan347

New member
Joined
Sep 19, 2022
Messages
1
Location
Tashkent
Hellcoins
♆27
40 Videos
Content List:-
1. BitLeaker- Subverting BitLocker with One Vulnerability
2. Complexity Killed Security
3. Engineering Cybersecurity for a Nation- What Singapore is Learning from Cars and Sanitation
4. The Black Hat NOC- Greatest Hits and Holy...Cows
5. Escaping Virtualized Containers
6. Patching Loopholes- Finding Backdoors in Applications
7. What the Log-! So Many Events, so Little Time
8. Securing the Next Version of HTTP- How QUIC and HTTP3 Compare to HTTP2
9. Misuse of DNS, the Second Most Used Protocol
10. Faking a Factory- Creating and Operating a Realistic Honeypot
11. Raiden Glitching Framework
12. First Contact - Vulnerabilities in Contactless Payments
13. The Evil Alt-Ego- (ab)using HTTP Alternative Services
14. The Evil of Spy Camera
15. Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities
16. CDPwn- Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days
17. WIFI-Important Remote Attack Surface- Threat is Expanding
18. Biometrics & Privacy- Time to Faceoff or is that FaceApp
19. Attacking and Defending Machine Learning Applications of Public Cloud
20. Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
21. Redback- Advanced Static Binary Injection
22. Store-to-Leak Forwarding- There and Back Again
23. ZombieLoad- Leaking Data on Intel CPUs
24. Back to the Future. Cross-Protocol Attacks in the Era of 5G
25. 3d Red Pill- A Guest-to-Host Escape on QEMUKVM Virtio Device
26. Page Cache Attacks- Microarchitectural Attacks on Flawless Hardware
27. Wi-Fi Brokering
28. May the Trust be with You- Empowering TrustZone-M with Multiple Trusted Environments
29. Kr00k- How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices
30. From an URGENT11 Vulnerability to a Full Take-Down of a Factory Using a Single Packet
31. Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature
32. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community
33. Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier
34. Win the 0-Day Racing Game Against Botnet in Public Cloud
35. Tracking the Criminal of Fake News Based on a Unified Embedding
36. The Inside Story- There are Apps in Apps and Here is How to Break Them
37. Adversary Detection Pipelines- Finally Making Your Threat Intel Useful
38. Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
39. Locknote- Conclusions and Key Takeaways from Day 1
40. Locknote- Conclusions and Key Takeaways from Day 2



Watch Or Download:-

[Hidden content]
???
 
Joined
Sep 24, 2022
Messages
42
Location
USA
Hellcoins
♆628
40 Videos
Content List:-
1. BitLeaker- Subverting BitLocker with One Vulnerability
2. Complexity Killed Security
3. Engineering Cybersecurity for a Nation- What Singapore is Learning from Cars and Sanitation
4. The Black Hat NOC- Greatest Hits and Holy...Cows
5. Escaping Virtualized Containers
6. Patching Loopholes- Finding Backdoors in Applications
7. What the Log-! So Many Events, so Little Time
8. Securing the Next Version of HTTP- How QUIC and HTTP3 Compare to HTTP2
9. Misuse of DNS, the Second Most Used Protocol
10. Faking a Factory- Creating and Operating a Realistic Honeypot
11. Raiden Glitching Framework
12. First Contact - Vulnerabilities in Contactless Payments
13. The Evil Alt-Ego- (ab)using HTTP Alternative Services
14. The Evil of Spy Camera
15. Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities
16. CDPwn- Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days
17. WIFI-Important Remote Attack Surface- Threat is Expanding
18. Biometrics & Privacy- Time to Faceoff or is that FaceApp
19. Attacking and Defending Machine Learning Applications of Public Cloud
20. Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
21. Redback- Advanced Static Binary Injection
22. Store-to-Leak Forwarding- There and Back Again
23. ZombieLoad- Leaking Data on Intel CPUs
24. Back to the Future. Cross-Protocol Attacks in the Era of 5G
25. 3d Red Pill- A Guest-to-Host Escape on QEMUKVM Virtio Device
26. Page Cache Attacks- Microarchitectural Attacks on Flawless Hardware
27. Wi-Fi Brokering
28. May the Trust be with You- Empowering TrustZone-M with Multiple Trusted Environments
29. Kr00k- How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices
30. From an URGENT11 Vulnerability to a Full Take-Down of a Factory Using a Single Packet
31. Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature
32. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community
33. Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier
34. Win the 0-Day Racing Game Against Botnet in Public Cloud
35. Tracking the Criminal of Fake News Based on a Unified Embedding
36. The Inside Story- There are Apps in Apps and Here is How to Break Them
37. Adversary Detection Pipelines- Finally Making Your Threat Intel Useful
38. Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
39. Locknote- Conclusions and Key Takeaways from Day 1
40. Locknote- Conclusions and Key Takeaways from Day 2



Watch Or Download:-

[Hidden content]
wow
 

Aadi

New member
Joined
Feb 5, 2023
Messages
6
Location
Indian
Hellcoins
♆47
40 Videos
Content List:-
1. BitLeaker- Subverting BitLocker with One Vulnerability
2. Complexity Killed Security
3. Engineering Cybersecurity for a Nation- What Singapore is Learning from Cars and Sanitation
4. The Black Hat NOC- Greatest Hits and Holy...Cows
5. Escaping Virtualized Containers
6. Patching Loopholes- Finding Backdoors in Applications
7. What the Log-! So Many Events, so Little Time
8. Securing the Next Version of HTTP- How QUIC and HTTP3 Compare to HTTP2
9. Misuse of DNS, the Second Most Used Protocol
10. Faking a Factory- Creating and Operating a Realistic Honeypot
11. Raiden Glitching Framework
12. First Contact - Vulnerabilities in Contactless Payments
13. The Evil Alt-Ego- (ab)using HTTP Alternative Services
14. The Evil of Spy Camera
15. Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities
16. CDPwn- Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days
17. WIFI-Important Remote Attack Surface- Threat is Expanding
18. Biometrics & Privacy- Time to Faceoff or is that FaceApp
19. Attacking and Defending Machine Learning Applications of Public Cloud
20. Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
21. Redback- Advanced Static Binary Injection
22. Store-to-Leak Forwarding- There and Back Again
23. ZombieLoad- Leaking Data on Intel CPUs
24. Back to the Future. Cross-Protocol Attacks in the Era of 5G
25. 3d Red Pill- A Guest-to-Host Escape on QEMUKVM Virtio Device
26. Page Cache Attacks- Microarchitectural Attacks on Flawless Hardware
27. Wi-Fi Brokering
28. May the Trust be with You- Empowering TrustZone-M with Multiple Trusted Environments
29. Kr00k- How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices
30. From an URGENT11 Vulnerability to a Full Take-Down of a Factory Using a Single Packet
31. Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature
32. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community
33. Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier
34. Win the 0-Day Racing Game Against Botnet in Public Cloud
35. Tracking the Criminal of Fake News Based on a Unified Embedding
36. The Inside Story- There are Apps in Apps and Here is How to Break Them
37. Adversary Detection Pipelines- Finally Making Your Threat Intel Useful
38. Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
39. Locknote- Conclusions and Key Takeaways from Day 1
40. Locknote- Conclusions and Key Takeaways from Day 2



Watch Or Download:-

[Hidden content]
Gn
 
Top