本站已收录 番号和无损神作磁力链接/BT种子 

REcon

种子简介

种子名称: REcon
文件类型: 视频
文件数目: 241个文件
文件大小: 9.83 GB
收录时间: 2024-2-28 22:14
已经下载: 3
资源热度: 16
最近下载: 2024-6-20 08:16

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:6b9360a7967884cff90309e6a1007e8b89474154&dn=REcon 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

REcon.torrent
  • REcon 2005/REcon 2005 presentations/recon2005_jonathan_westhues_practical_attacks_on_a_prox_card.mp4100.91MB
  • REcon 2005/REcon 2005 presentations/recon2005_jose_nazario_introduction_to_network_programming_with_libevent_libdnet_and_libnids.mp4160.02MB
  • REcon 2005/REcon 2005 videos/adam shostack anonymous blogging submission.mp454.9MB
  • REcon 2005/REcon 2005 videos/andrew griffiths binary protection schemes.mp427.33MB
  • REcon 2005/REcon 2005 videos/cedric blancher attacking wifi with traffic injection.mp446.33MB
  • REcon 2005/REcon 2005 videos/fravia wizard searching the commercial web for fun and knowledge.mp454.44MB
  • REcon 2005/REcon 2005 videos/jack whitsitt visual analysis 2d does it better in color.mp432.64MB
  • REcon 2005/REcon 2005 videos/jonathan levin the dark side of winsock.mp448.94MB
  • REcon 2005/REcon 2005 videos/kathy wang using honeyclients to discover new attacks.mp464.89MB
  • REcon 2005/REcon 2005 videos/matt shelton passive asset detection system.mp441.25MB
  • REcon 2005/REcon 2005 videos/pedram amini process stalking run time visual rce.mp429.44MB
  • REcon 2005/REcon 2005 videos/reverse engineering panel.mp444.98MB
  • REcon 2005/REcon 2005 videos/ryan russell and nicolas brulez malware analysis.mp462.13MB
  • REcon 2005/REcon 2005 videos/ryan russell keynote.mp442.16MB
  • REcon 2005/REcon 2005 videos/spoonm recent shell code developments.mp450.06MB
  • REcon 2005/REcon 2005 videos/thorsten schneider hardening registration number protection schemes agains reverse engineering with multithread petri net.mp436.83MB
  • REcon 2005/REcon 2005 videos/todd macdermid encrypted p2p and voip with cutlass.mp449.56MB
  • REcon 2006/REcon 2006 presentations/msutton-comraider.mp45.3KB
  • REcon 2006/REcon 2006 presentations/msutton-filefuzz-breadth.mp417.92KB
  • REcon 2006/REcon 2006 presentations/msutton-filefuzz-depth.mp428.79KB
  • REcon 2006/REcon 2006 presentations/msutton-webfuzz-overflow.mp44.16MB
  • REcon 2006/REcon 2006 videos/Alex Ionescu-Subverting Windows2003SP1 kernel integrity protection 512kb.mp431.54MB
  • REcon 2006/REcon 2006 videos/Alexander Stirov-Reverse Engineering Microsoft Binaries 512kb.mp457.43MB
  • REcon 2006/REcon 2006 videos/Anthony De Almeida Lopes-Jack Louis-A plateform independant multicavity nop virus 512kb.mp442.48MB
  • REcon 2006/REcon 2006 videos/Bunnie-Dissassembling and patching hardware 512kb.mp467.39MB
  • REcon 2006/REcon 2006 videos/Chris Abad-Advancements In Anonymous e-Annoyance 512kb.mp449.02MB
  • REcon 2006/REcon 2006 videos/David Hulton-Breaking wifi faster 512kb.mp449.53MB
  • REcon 2006/REcon 2006 videos/Dennis Cox-Insiders View Network security devices 512kb.mp439.17MB
  • REcon 2006/REcon 2006 videos/Fabrice Desclaux-Kostya Kortchinsky-Vanilla Skype-part1 512kb.mp448.62MB
  • REcon 2006/REcon 2006 videos/Fabrice Desclaux-Kostya Kortchinsky-Vanilla Skype-part2 512kb.mp457.58MB
  • REcon 2006/REcon 2006 videos/Fravia-Reversing our searching habits 512kb.mp449.52MB
  • REcon 2006/REcon 2006 videos/Joe Stewart-OllyBonE 512kb.mp441.22MB
  • REcon 2006/REcon 2006 videos/Luis Miras-FixBugsInBinaries-xvid 512kb.mp434.63MB
  • REcon 2006/REcon 2006 videos/Mathieu Desnoyers-LTT LinuxTraceToolkit 512kb.mp423.41MB
  • REcon 2006/REcon 2006 videos/Michael Sutton-Fuzzing 512kb.mp446.97MB
  • REcon 2006/REcon 2006 videos/Pedram Amini-PaiMei 512kb.mp464.73MB
  • REcon 2006/REcon 2006 videos/Sharon Conheady-Social Engineering for penetration testers.avi-xvid 512kb.mp449.38MB
  • REcon 2006/REcon 2006 videos/Spoonm-IDARub 512kb.mp449.63MB
  • REcon 2006/REcon 2006 videos/Ted Unangst-Secure development with static analysis 512kb.mp452.09MB
  • REcon 2006/REcon 2006 videos/Woodmann-Legality of RCE 512kb.mp447.25MB
  • REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-heap.mp43.02MB
  • REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-hids.mp4742.62KB
  • REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-stack.mp43.68KB
  • REcon 2008/REcon 2008 videos/Aaron Portnoy and Ali Rizvi-Santiago-Reverse Engineering Dynamic Languages a Focus on Python.mp435.83MB
  • REcon 2008/REcon 2008 videos/Alexander Sotirov-Blackbox Reversing Of XSS Filters.mp469.7MB
  • REcon 2008/REcon 2008 videos/Anthony de Almeida Lopes-Bypassing Security Protections by Backdooring libc.mp425.84MB
  • REcon 2008/REcon 2008 videos/Bruce Dang-Methods for analyzing malicious Office documents.mp426.87MB
  • REcon 2008/REcon 2008 videos/Cameron Hotchkies-Under the iHood.mp431.58MB
  • REcon 2008/REcon 2008 videos/Craig Smith-Creating Code Obfuscation Virtual Machines.mp440.19MB
  • REcon 2008/REcon 2008 videos/Eric D Laspe-The Deobfuscator.mp424.91MB
  • REcon 2008/REcon 2008 videos/Gera-Two very small reverse engineering tools.mp426.83MB
  • REcon 2008/REcon 2008 videos/Ilfak Guilfanov-Building plugins for IDA Pro.mp445.94MB
  • REcon 2008/REcon 2008 videos/Jason Raber-Helikaon Linux Debuger.mp441.02MB
  • REcon 2008/REcon 2008 videos/Nicolas Brulez-Polymorphic Virus Analysis.mp422.58MB
  • REcon 2008/REcon 2008 videos/Nicolas Pouvesle-NetWare kernel stack overflow exploitation.mp441.87MB
  • REcon 2008/REcon 2008 videos/Pablo Sole-RE over Adobe Acrobat Reader using Immunity Debugger.mp422.95MB
  • REcon 2008/REcon 2008 videos/Pierre-Marc Bureau-How I learned Reverse Engineering with Storm.mp446.87MB
  • REcon 2008/REcon 2008 videos/Sebastien Doucet-64-bit Imports Rebuilding and Unpacking-Part1.mp447.6MB
  • REcon 2008/REcon 2008 videos/Sebastien Doucet-64-bit Imports Rebuilding and Unpacking-Part2.mp447.42MB
  • REcon 2008/REcon 2008 videos/Sharon Conheady and Alex Bayly-Social Engineering for the Socially Inept.mp452.17MB
  • REcon 2008/REcon 2008 videos/Thomas Garnier-Windows privilege escalation through LPC and ALPC interfaces.mp436.21MB
  • REcon 2008/REcon 2008 videos/Tiller Beauchamp-RE Trace-Applied Reverse Engineering on OS X.mp447.54MB
  • REcon 2010/REcon 2010 videos/Alex_Ionescu_web4.mp429.4MB
  • REcon 2010/REcon 2010 videos/Bureau_Calvet_web.mp447.82MB
  • REcon 2010/REcon 2010 videos/Carrera_Duart.mp442.69MB
  • REcon 2010/REcon 2010 videos/Deviant_Ollam4.mp435.59MB
  • REcon 2010/REcon 2010 videos/dino dai zovi.mp441.19MB
  • REcon 2010/REcon 2010 videos/gynvael coldwind and unavowed.mp439.08MB
  • REcon 2010/REcon 2010 videos/jonathan stuart.mp440.91MB
  • REcon 2010/REcon 2010 videos/richard thieme.mp461.81MB
  • REcon 2010/REcon 2010 videos/sean_heelan_w4.mp440.82MB
  • REcon 2011/A Ionescu 2.mp426.39MB
  • REcon 2011/Alexandre Gazet.mp46.95MB
  • REcon 2011/Damien Aumaitre.mp48.08MB
  • REcon 2011/G Kerr 1.mp417.2MB
  • REcon 2011/Guillaume Delugre.mp49.3MB
  • REcon 2011/Igor Skochinsky.mp49.21MB
  • REcon 2011/J_Applebaum.mp468.96MB
  • REcon 2011/Jesse d Aguanno.mp47.61MB
  • REcon 2011/Milosch Meriac.mp48.41MB
  • REcon 2011/Nathan Fain.mp46.71MB
  • REcon 2011/S Ridley.mp420.17MB
  • REcon 2011/Scott Dunlop.mp45.94MB
  • REcon 2013/Aleksandr Matrosov and Eugene Rodionov- Reconstructing Gapz Position-Independent Code Analysis Problem.mp468.15MB
  • REcon 2013/Alex Ionescu- I got 99 problems but a kernel pointer ain't one.mp476.25MB
  • REcon 2013/Bacura- Just keep trying - Unorthodox ways to hack an old-school hardware.mp483.16MB
  • REcon 2013/Christopher Domas aka the.delta.axiom- The Future of RE - Dynamic Binary Visualization.mp479.15MB
  • REcon 2013/Christopher Hoder and Theodore Sumers.mp422.99MB
  • REcon 2013/Craig Smith.mp416.42MB
  • REcon 2013/Dmitry Nedospasov and Thorsten Schroder- Keep your tentacles off my bus- introducing Die Datenkrake.mp466.48MB
  • REcon 2013/Elias Bachaalany- Inside EMET 4.0.mp465.06MB
  • REcon 2013/Francois Chagnon- Python bindings for Hexrays Decompiler.mp423.41MB
  • REcon 2013/Jesse D'Aguanno- XNU Spelunking or Fuzzing the kernel inside your kernel.mp439.03MB
  • REcon 2013/Josh m0nk Thomas- Hiding @ Depth.mp433.25MB
  • REcon 2013/Josh m0nk Thomas and Nathan Natron Keltner.mp458.21MB
  • REcon 2013/Joshua J Drake aka jduck.mp464.41MB
  • REcon 2013/Natalie Silvanovich- Many More Tamagotchis Were Harmed in the Making of this Presentation.mp445.53MB
  • REcon 2013/Oleg Afonin- Apple iCloud services reversed inside out.mp450.99MB
  • REcon 2013/Olivier Thomas- Hardware reverse engineering tools.mp478.66MB
  • REcon 2013/Ruby feinstein Omri Ildis Yuval Ofir.mp457.75MB
  • REcon 2014/alex-ionescu-Apple-SMC-The-place-to-be-definitely-For-an-implant.mp452.16MB
  • REcon 2014/andrzej-dereszowski-FunCap.mp421.69MB
  • REcon 2014/artem-dinaburg-andrew-ruef-Static-Translation-of-X86-Instruction-Semantics-to-LLVM-With-McSema.mp448.95MB
  • REcon 2014/assaf-nativ-The-Making-of-the-Kosher-Phone.mp427.65MB
  • REcon 2014/brendan-dolan-gavitt-Dynamic-Analysis-Kung-Fu-with-PANDA.mp450.74MB
  • REcon 2014/colin-o-flynn-Power-Analysis-and-Clock-Glitching-with-the-Open-Source-ChipWhisperer-Platform.mp427.94MB
  • REcon 2014/elad-shapira-Shall-we-play-a-game-Lessons-learned-while-playing-CoreWars8086.mp426.56MB
  • REcon 2014/endre-bangerter-dominic-fischer-Memory-Tracing-Forensic-Reverse-Engineering.mp430.02MB
  • REcon 2014/eva-galperin-Keynote.mp416.41MB
  • REcon 2014/exide-Glitching-For-n00bs.mp432.93MB
  • REcon 2014/francisco-falcon-Breaking-Out-of-VirtualBox-through-3D-Acceleration.mp429.16MB
  • REcon 2014/igor-skochinsky-Intel-Management-Engine-Secrets.mp439.99MB
  • REcon 2014/jason-jones-jasiel-spelman-Reversing-on-the-Edge.mp415.87MB
  • REcon 2014/jason-jones-PIN-Point-Control-for-Analyzing-Malware.mp422.52MB
  • REcon 2014/jonas-zaddach-Exploring-the-impact-of-a-hard-drive-backdoor.mp433.51MB
  • REcon 2014/marta-janus-Going-gets-tough-a-tale-of-encounters-with-novel-evasive-malware.mp429.71MB
  • REcon 2014/matt-oh-Reverse-Engineering-Flash-Memory-For-Fun-and-Benefit.mp437.77MB
  • REcon 2014/michael-coppola-Performing-Open-Heart-Surgery-on-a-Furby.mp446.2MB
  • REcon 2014/michael-ossmann-SDR-Tricks-with-HackRF.mp421.24MB
  • REcon 2014/milan-bohacek-How-do-I-RE-object-oriented-code-and-you-should-too.mp436.72MB
  • REcon 2014/mougey-camille-francis-gabriel-DRM-obfuscation-versus-auxiliary-attacks.mp431.52MB
  • REcon 2014/nathan-keltner-charles-holmes-Here-be-Dragons-A-Bedtime-Tale-for-Sleepless-Nights.mp418.98MB
  • REcon 2014/richard-johnson-Fuzzing-and-Patch-Analysis-SAGEly-Advice.mp453.94MB
  • REcon 2014/wartortell-Rewriting-x86-Binaries-Many-PEs-Such-Secure-Wow.mp427.74MB
  • REcon 2014/william-peteroy-Exploit-tips-and-techniques.mp423.63MB
  • REcon 2015/REcon 2015 videos/alex-ionescu-Hooking-Nirvana.mp493.67MB
  • REcon 2015/REcon 2015 videos/andrew-zonenberg-From-Silicon-to-Compiler.mp464.59MB
  • REcon 2015/REcon 2015 videos/brian-gorenc-simon-zuckerbraun-abdul-aziz-hariri-Abusing-Silent-Mitigations.mp479.45MB
  • REcon 2015/REcon 2015 videos/christopher-domas-The-movfuscator.mp462.76MB
  • REcon 2015/REcon 2015 videos/colin-o-flynn-Glitching-and-Side-Channel-Analysis-for-All.mp435.85MB
  • REcon 2015/REcon 2015 videos/exide-Finish-Him.mp454.81MB
  • REcon 2015/REcon 2015 videos/j00ru-One-font-vulnerability-to-rule-them-all.mp482.57MB
  • REcon 2015/REcon 2015 videos/jeffrey-crowell-julien-voisin-Radare2-building-a-new-IDA.mp430.66MB
  • REcon 2015/REcon 2015 videos/joan-calvet-marion-marschalek-paul-rascagneres-Totally-Spies.mp473.8MB
  • REcon 2015/REcon 2015 videos/mike-ryan-john-mcmaster-marshallh-Reversing-the-Nintendo-64-CIC.mp462.16MB
  • REcon 2015/REcon 2015 videos/nitay-artenstein-shift-reduce-Pandora-s-Cash-Box-The-Ghost-Under-Your-POS.mp435.32MB
  • REcon 2015/REcon 2015 videos/peter-hlavaty-jihui-lu-This-Time-Font-hunt-you-down-in-4-bytes.mp461.7MB
  • REcon 2015/REcon 2015 videos/sophia-d-antoine-Exploiting-Out-of-Order-Execution.mp431.24MB
  • REcon 2015/REcon 2015 videos/steven-vittitoe-Reverse-Engineering-Windows-AFD-sys.mp432.31MB
  • REcon 2015/REcon 2015 videos/travis-goodspeed-sergey-bratus-Polyglots-and-Chimeras-in-Digital-Radio-Modes.mp487.82MB
  • REcon 2015/REcon 2015 videos/yaniv-balmas-0x3E9-Ways-to-DIE.mp471.57MB
  • REcon 2015/REcon 2015 videos/yong-chuan-koh-Understaning-the-Microsoft-Office-Protected-View-Sandbox.mp448.5MB
  • REcon 2015/REcon 2015 videos/yuriy-bulygin-oleksandr-bazhaniuk-Attacking-and-Defending-BIOS-in-2015.mp495.88MB
  • REcon 2016/REcon 2016 videos/alex-ionescu-Abusing-the-NT-Kernel-Shim-Engine.mp467.21MB
  • REcon 2016/REcon 2016 videos/ang-cui-francois-charbonneau-jatin-kataria-A-Monitor-Darkly-Reversing-and-Exploiting-Ubiquitous-On-Screen-Display-Controllers-in-Modern-Monitors.mp430.07MB
  • REcon 2016/REcon 2016 videos/chris-gerlinsky-How-Do-I-Crack-Satellite-and-Cable-Pay-TV.mp463.14MB
  • REcon 2016/REcon 2016 videos/cooper-quintin-eva-galperin-When-Governments-Attack.mp447.65MB
  • REcon 2016/REcon 2016 videos/david-carne-Black-box-reverse-engineering-for-unknown-custom-instruction-sets.mp432.83MB
  • REcon 2016/REcon 2016 videos/derek-soeder-paul-mehta-BBS-Era-Exploitation-for-Fun-and-Anachronism.mp432.39MB
  • REcon 2016/REcon 2016 videos/james-forshaw-Process-Failure-Modes.mp444.85MB
  • REcon 2016/REcon 2016 videos/jason-geffner-JavaJournal.mp419.99MB
  • REcon 2016/REcon 2016 videos/jessy-diamond-exum-Reverse-Engineering-ISC-controllers.mp463.78MB
  • REcon 2016/REcon 2016 videos/joan-calvet-jessy-campos-thomas-dupuy-Visiting-The-Bear-Den.mp451.9MB
  • REcon 2016/REcon 2016 videos/julian-kirsch-clemens-jonischkeit-Movfuscator-Be-Gone.mp425.44MB
  • REcon 2016/REcon 2016 videos/liang-chen-qidan-he-Shooting-the-OS-X-El-Capitan-Kernel-Like-a-Sniper.mp451.43MB
  • REcon 2016/REcon 2016 videos/markus-gaasedelen-nick-burnett-SolIDArity.mp433.96MB
  • REcon 2016/REcon 2016 videos/matt-spisak-Hardware-Assisted-Rootkits-and-Instrumentation-ARM-Edition.mp460.89MB
  • REcon 2016/REcon 2016 videos/natalie-silvanovich-More-Flash-More-Fun.mp441.89MB
  • REcon 2016/REcon 2016 videos/nguyen-anh-quynh-Keystone-the-last-missing-framework-of-Reverse-Engineering.mp429.58MB
  • REcon 2016/REcon 2016 videos/nico-golde-daniel-komaromy-Breaking-Band.mp441.99MB
  • REcon 2016/REcon 2016 videos/richard-johnson-Go-Speed-Tracer.mp455.75MB
  • REcon 2016/REcon 2016 videos/robert-c-seacord-Dangerous-Optimizations-and-the-Loss-of-Causality.mp442.25MB
  • REcon 2016/REcon 2016 videos/satoshi-tanda-Monitoring-controlling-kernel-mode-events-by-HyperPlatform.mp422.97MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Analyzing iOS apps road from AppStore to security analysis report.mp435.65MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Breaking Code Read Protection on the NXP LPC family Microcontroller.mp459.55MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Contributor analysis.mp425.69MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Embedded devices reverse engineering.mp443.37MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Getting Physical with USB Type-C Windows 10 RAM Forensics and UEFI Attacks.mp484.21MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/GRAP define and match graph patterns within binaries.mp450.47MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Hackable Security Modules Reversing and exploiting a FIPS.mp442.5MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis.mp458.92MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Keeping your tools safe IDA.mp425.25MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Legacy Crypto Never Dies.mp419.97MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/miLazyCracker - Kevin Larson.mp416.42MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/New vulnerabilities in SMM of Coreboot and UEFI based systems.mp467.07MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Poutine Dusting Forgotten Lore - Yannick Lamarre.mp413.77MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/r2m2 - Guillaume “guedou” Valadon.mp428.79MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Reverse Engineering Satellite Based IP Content Distribution.mp446.02MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Teaching Old Shellcode New Tricks - Josh Pitts.mp432.62MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Transforming Open Source to Open Access in Closed Applications.mp439.76MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/When your firewall turns against you - Rene Freingruber.mp421.98MB
  • REcon 2017 Brussels/REcon 2017 Brussels videos/Your Chakra Is Not Aligned.mp415.24MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/adam-schwalm-Exporting-IDA-Debug-Information.mp424.17MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/alex-ionescu-Fun-with-Sam-Inside-the-Surface-Aggregator-Module.mp462.56MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/andrea-allievi-The-HyperV-Architecture-and-its-Memory-Manager.mp451.05MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/david-carne-HDI-PCB-Netlist-Recovery-a-new-old-technique.mp427.91MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/fabrice-desclaux-camille-mougey-Miasm-reverse-engineering-framework.mp449.32MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/j00ru-Bochspwn-Reloaded-Detecting-Kernel-Memory-Disclosure-with-x86-Emulation-and-Tain't-Tracking.mp465.06MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/julia-karpin-anna-dorfman-Crypton-Exposing-malware-s-deepest-secrets.mp433.21MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/keegan-ryan-Hacking-Cell-Phone-Embedded-Systems.mp425.22MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/LT-frederic-marmond-REVEN-Axion-Talk.mp420.09MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/LT-jeff-dileo-AssetHook.mp48.73MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/LT-john-mcmaster-Silicon-Photonics-Talk.mp48.13MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/maddie-stone-The-Life-Changing-Magic-of-IDAPython-Embedded-Device-Edition.mp421.78MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/mariano-graziano-jonas-zaddach-BASS-Automated-Signature-Synthesizer.mp427.57MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/marion-marschalek-Bubble-Struggle-Call-Graph-Visualization-with-Radare2.mp460.52MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/michael-atlas-SGX-Enclave-programming-common-mistakes.mp437.92MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/michael-ossmann-Reverse-Engineering-DSSS.mp445.72MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/mychaela-falconia-FreeCalypso-a-fully-liberated-GSM-baseband.mp446.01MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/philippe-biondi-xavier-mehrenberger-raphael-rigo-sarah-zennou-BinCAT-purrfecting-binary-static-analysis.mp433.96MB
  • REcon 2017 Montreal/REcon 2017 Montreal videos/vlad-sabaka-You-can-run-but-you-cant-hide.mp420.41MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Alex Ionescu.The Last Generic Win32K KASLR Defeat in Windows-uXzcEpxt54ybs.mp472.62MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Alex Radocea.Snow Crashing Virtual Reality. 2019 Edition-a45zewC5K1XGs.mp451.34MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Bill DemirKapi.The Unseen Dangers of Bloatware-SWuxeYIcvlfia.mp441.3MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Brandon Falk.Vectorized Emulation Putting it all together-kFn8Kr6lsNZQZ.mp471.75MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Chris Gerlinsky.The ROM matric revolution Unscrambling bits-K0W7zZQDK9lQQ.mp447.46MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Colin O'Flynn.MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection-5qYAlMcGKMoEb.mp433MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Dimitrios Tatsis.Attacking Hexagon Security Analysis of Qualcomm's ADSP-lxNbsl2gW7w0e.mp441.55MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Evan Jensen.The Backdoor Foundry A Tool-chain for Building Application Specific Implants-TU4e6qaSW6HZK.mp434.58MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/George Tarnovsky.X-Ray Reverse Engineering-uj9LDNtRWRwUG.mp428.49MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Guy.Burned in AshesBaseband Fairy Tale Stories-WXoRdFBuXytGB.mp441.31MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Jiska - Dennis Mantz.Reversing and Exploiting Broadcom Bluetooth-dEpC4S0krzxuc.mp472.47MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Joan Calvet.The (long) journey To A MultiArchitecture Disassembler-fgmt6TlB2UkKi.mp472.1MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Joel Noguera.Unveiling the Underground world of Anti-Cheats-XU7k7Iwba695M.mp467.06MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Juan Andres Guerrero-Saade.Mining Disputed territories Studying Attacker Signatures for Improved Situational Awarness-KnNCs3pp.mp458.3MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Maddie Stone.The path to the payload Android Edition-J3ZnNl2GYjEfa.mp446.54MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Matt Graeber.Using WPP and TraceLogging Tracing to Facilitate Dynamic and Static Windows RE-4wrctkSIN0JmX.mp465.19MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Natalie Silvanovitch.Seeing Inside the Encrypted Envelope-M8rga9e8H27Ee.mp471.75MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Rolf Rolles.Automation Techniques in C Reverse Engineering-8jKapmZP0gND6.mp478.57MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Slava Makkaveev.The Road to Qualcomm Trust-Zone apps fuzzing-IyiuvOcbuGOAP.mp432.75MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Takahiro Haruyama.Defeating APT10 Compiler-level Obfuscation-a36qtx5lpBQnE.mp435.05MB
  • REcon 2019 Montreal/REcon 2019 Montreal videos/Thomas Roth - Dmitry Nedospasov.Hacking the most popular cryptocurrency hardware wallets-90dZWqWdV43I1.mp453.77MB
  • REcon 2023/& Pete Markowsky.mp4563.94KB
  • REcon 2023/bold - Cracking the final frontier Reverse engineering and exploiting LEO satellites.mp447.98MB
  • REcon 2023/Colin O'Flynn - Adventures of My Oven (Pinocchio) with ChipWhisperer.mp436MB
  • REcon 2023/Daniel Wegemer - Enabling Security Research On Qualcomm Wifi Chips.mp438.36MB
  • REcon 2023/Erik Egsgard - The Hunt for Red October - One Ping Too Many.mp435.72MB
  • REcon 2023/Ice Ice Baby Coppin' RAM With DIY Cryo-Mechanical Robot.mp448MB
  • REcon 2023/Mathilde Venault - Press Play To Restart Under the Hood of the Windows Restart Manager.mp427.34MB
  • REcon 2023/Maxime Rossi and Damiano Melotti - Dissecting the Modern Android Data Encryption Scheme.mp446.86MB
  • REcon 2023/Michael Harbison - Hello 1994Abusing Windows Explorer via Component Object Model in 2023.mp428.05MB
  • REcon 2023/Natalie Silvanovich How To Hack Shannon Baseband.mp433.39MB
  • REcon 2023/Nick Gregory & Pete Markowsky Be Kind Please Rewind.mp431.21MB
  • REcon 2023/Nika Korchok - Portrait of the artist as a young vx-er This painting is an MBR bootkit.mp434.52MB
  • REcon 2023/Olivia Locca Fraser - Backdoor Lockpick.mp478.68MB
  • REcon 2023/Simon Scannell Remotely Exploiting An Antivirus Engine.mp423.08MB
  • REcon 2023/Tal Lossos NVMe.mp427.52MB
  • REcon 2023/Tim Blazytko - Unveiling Secrets In Binaries using Code Detection Strategies.mp419.94MB
  • REcon 2023/Travis Goodspeed Recent Experiments with Mask ROMs.mp457.84MB
  • REcon 2023/Vitor Ventura & Holger Unterbringe Reversing NIM Binaries.mp453.13MB
  • REcon 2023/Willy R. Vasquez - The Most Dangerous Codec In The World Vulnerabilities in H.264.mp426.74MB