首页 磁力链接怎么用

REcon

文件类型 收录时间 最后活跃 资源热度 文件大小 文件数量
视频 2024-2-28 22:14 2024-12-26 11:15 55 9.83 GB 241
二维码链接
REcon的二维码
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
文件列表
  1. REcon 2005/REcon 2005 presentations/recon2005_jonathan_westhues_practical_attacks_on_a_prox_card.mp4100.91MB
  2. REcon 2005/REcon 2005 presentations/recon2005_jose_nazario_introduction_to_network_programming_with_libevent_libdnet_and_libnids.mp4160.02MB
  3. REcon 2005/REcon 2005 videos/adam shostack anonymous blogging submission.mp454.9MB
  4. REcon 2005/REcon 2005 videos/andrew griffiths binary protection schemes.mp427.33MB
  5. REcon 2005/REcon 2005 videos/cedric blancher attacking wifi with traffic injection.mp446.33MB
  6. REcon 2005/REcon 2005 videos/fravia wizard searching the commercial web for fun and knowledge.mp454.44MB
  7. REcon 2005/REcon 2005 videos/jack whitsitt visual analysis 2d does it better in color.mp432.64MB
  8. REcon 2005/REcon 2005 videos/jonathan levin the dark side of winsock.mp448.94MB
  9. REcon 2005/REcon 2005 videos/kathy wang using honeyclients to discover new attacks.mp464.89MB
  10. REcon 2005/REcon 2005 videos/matt shelton passive asset detection system.mp441.25MB
  11. REcon 2005/REcon 2005 videos/pedram amini process stalking run time visual rce.mp429.44MB
  12. REcon 2005/REcon 2005 videos/reverse engineering panel.mp444.98MB
  13. REcon 2005/REcon 2005 videos/ryan russell and nicolas brulez malware analysis.mp462.13MB
  14. REcon 2005/REcon 2005 videos/ryan russell keynote.mp442.16MB
  15. REcon 2005/REcon 2005 videos/spoonm recent shell code developments.mp450.06MB
  16. REcon 2005/REcon 2005 videos/thorsten schneider hardening registration number protection schemes agains reverse engineering with multithread petri net.mp436.83MB
  17. REcon 2005/REcon 2005 videos/todd macdermid encrypted p2p and voip with cutlass.mp449.56MB
  18. REcon 2006/REcon 2006 presentations/msutton-comraider.mp45.3KB
  19. REcon 2006/REcon 2006 presentations/msutton-filefuzz-breadth.mp417.92KB
  20. REcon 2006/REcon 2006 presentations/msutton-filefuzz-depth.mp428.79KB
  21. REcon 2006/REcon 2006 presentations/msutton-webfuzz-overflow.mp44.16MB
  22. REcon 2006/REcon 2006 videos/Alex Ionescu-Subverting Windows2003SP1 kernel integrity protection 512kb.mp431.54MB
  23. REcon 2006/REcon 2006 videos/Alexander Stirov-Reverse Engineering Microsoft Binaries 512kb.mp457.43MB
  24. REcon 2006/REcon 2006 videos/Anthony De Almeida Lopes-Jack Louis-A plateform independant multicavity nop virus 512kb.mp442.48MB
  25. REcon 2006/REcon 2006 videos/Bunnie-Dissassembling and patching hardware 512kb.mp467.39MB
  26. REcon 2006/REcon 2006 videos/Chris Abad-Advancements In Anonymous e-Annoyance 512kb.mp449.02MB
  27. REcon 2006/REcon 2006 videos/David Hulton-Breaking wifi faster 512kb.mp449.53MB
  28. REcon 2006/REcon 2006 videos/Dennis Cox-Insiders View Network security devices 512kb.mp439.17MB
  29. REcon 2006/REcon 2006 videos/Fabrice Desclaux-Kostya Kortchinsky-Vanilla Skype-part1 512kb.mp448.62MB
  30. REcon 2006/REcon 2006 videos/Fabrice Desclaux-Kostya Kortchinsky-Vanilla Skype-part2 512kb.mp457.58MB
  31. REcon 2006/REcon 2006 videos/Fravia-Reversing our searching habits 512kb.mp449.52MB
  32. REcon 2006/REcon 2006 videos/Joe Stewart-OllyBonE 512kb.mp441.22MB
  33. REcon 2006/REcon 2006 videos/Luis Miras-FixBugsInBinaries-xvid 512kb.mp434.63MB
  34. REcon 2006/REcon 2006 videos/Mathieu Desnoyers-LTT LinuxTraceToolkit 512kb.mp423.41MB
  35. REcon 2006/REcon 2006 videos/Michael Sutton-Fuzzing 512kb.mp446.97MB
  36. REcon 2006/REcon 2006 videos/Pedram Amini-PaiMei 512kb.mp464.73MB
  37. REcon 2006/REcon 2006 videos/Sharon Conheady-Social Engineering for penetration testers.avi-xvid 512kb.mp449.38MB
  38. REcon 2006/REcon 2006 videos/Spoonm-IDARub 512kb.mp449.63MB
  39. REcon 2006/REcon 2006 videos/Ted Unangst-Secure development with static analysis 512kb.mp452.09MB
  40. REcon 2006/REcon 2006 videos/Woodmann-Legality of RCE 512kb.mp447.25MB
  41. REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-heap.mp43.02MB
  42. REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-hids.mp4742.62KB
  43. REcon 2008/REcon 2008 presentations/Tiller_Beauchamp/retrace-stack.mp43.68KB
  44. REcon 2008/REcon 2008 videos/Aaron Portnoy and Ali Rizvi-Santiago-Reverse Engineering Dynamic Languages a Focus on Python.mp435.83MB
  45. REcon 2008/REcon 2008 videos/Alexander Sotirov-Blackbox Reversing Of XSS Filters.mp469.7MB
  46. REcon 2008/REcon 2008 videos/Anthony de Almeida Lopes-Bypassing Security Protections by Backdooring libc.mp425.84MB
  47. REcon 2008/REcon 2008 videos/Bruce Dang-Methods for analyzing malicious Office documents.mp426.87MB
  48. REcon 2008/REcon 2008 videos/Cameron Hotchkies-Under the iHood.mp431.58MB
  49. REcon 2008/REcon 2008 videos/Craig Smith-Creating Code Obfuscation Virtual Machines.mp440.19MB
  50. REcon 2008/REcon 2008 videos/Eric D Laspe-The Deobfuscator.mp424.91MB
  51. REcon 2008/REcon 2008 videos/Gera-Two very small reverse engineering tools.mp426.83MB
  52. REcon 2008/REcon 2008 videos/Ilfak Guilfanov-Building plugins for IDA Pro.mp445.94MB
  53. REcon 2008/REcon 2008 videos/Jason Raber-Helikaon Linux Debuger.mp441.02MB
  54. REcon 2008/REcon 2008 videos/Nicolas Brulez-Polymorphic Virus Analysis.mp422.58MB
  55. REcon 2008/REcon 2008 videos/Nicolas Pouvesle-NetWare kernel stack overflow exploitation.mp441.87MB
  56. REcon 2008/REcon 2008 videos/Pablo Sole-RE over Adobe Acrobat Reader using Immunity Debugger.mp422.95MB
  57. REcon 2008/REcon 2008 videos/Pierre-Marc Bureau-How I learned Reverse Engineering with Storm.mp446.87MB
  58. REcon 2008/REcon 2008 videos/Sebastien Doucet-64-bit Imports Rebuilding and Unpacking-Part1.mp447.6MB
  59. REcon 2008/REcon 2008 videos/Sebastien Doucet-64-bit Imports Rebuilding and Unpacking-Part2.mp447.42MB
  60. REcon 2008/REcon 2008 videos/Sharon Conheady and Alex Bayly-Social Engineering for the Socially Inept.mp452.17MB
  61. REcon 2008/REcon 2008 videos/Thomas Garnier-Windows privilege escalation through LPC and ALPC interfaces.mp436.21MB
  62. REcon 2008/REcon 2008 videos/Tiller Beauchamp-RE Trace-Applied Reverse Engineering on OS X.mp447.54MB
  63. REcon 2010/REcon 2010 videos/Alex_Ionescu_web4.mp429.4MB
  64. REcon 2010/REcon 2010 videos/Bureau_Calvet_web.mp447.82MB
  65. REcon 2010/REcon 2010 videos/Carrera_Duart.mp442.69MB
  66. REcon 2010/REcon 2010 videos/Deviant_Ollam4.mp435.59MB
  67. REcon 2010/REcon 2010 videos/dino dai zovi.mp441.19MB
  68. REcon 2010/REcon 2010 videos/gynvael coldwind and unavowed.mp439.08MB
  69. REcon 2010/REcon 2010 videos/jonathan stuart.mp440.91MB
  70. REcon 2010/REcon 2010 videos/richard thieme.mp461.81MB
  71. REcon 2010/REcon 2010 videos/sean_heelan_w4.mp440.82MB
  72. REcon 2011/A Ionescu 2.mp426.39MB
  73. REcon 2011/Alexandre Gazet.mp46.95MB
  74. REcon 2011/Damien Aumaitre.mp48.08MB
  75. REcon 2011/G Kerr 1.mp417.2MB
  76. REcon 2011/Guillaume Delugre.mp49.3MB
  77. REcon 2011/Igor Skochinsky.mp49.21MB
  78. REcon 2011/J_Applebaum.mp468.96MB
  79. REcon 2011/Jesse d Aguanno.mp47.61MB
  80. REcon 2011/Milosch Meriac.mp48.41MB
  81. REcon 2011/Nathan Fain.mp46.71MB
  82. REcon 2011/S Ridley.mp420.17MB
  83. REcon 2011/Scott Dunlop.mp45.94MB
  84. REcon 2013/Aleksandr Matrosov and Eugene Rodionov- Reconstructing Gapz Position-Independent Code Analysis Problem.mp468.15MB
  85. REcon 2013/Alex Ionescu- I got 99 problems but a kernel pointer ain't one.mp476.25MB
  86. REcon 2013/Bacura- Just keep trying - Unorthodox ways to hack an old-school hardware.mp483.16MB
  87. REcon 2013/Christopher Domas aka the.delta.axiom- The Future of RE - Dynamic Binary Visualization.mp479.15MB
  88. REcon 2013/Christopher Hoder and Theodore Sumers.mp422.99MB
  89. REcon 2013/Craig Smith.mp416.42MB
  90. REcon 2013/Dmitry Nedospasov and Thorsten Schroder- Keep your tentacles off my bus- introducing Die Datenkrake.mp466.48MB
  91. REcon 2013/Elias Bachaalany- Inside EMET 4.0.mp465.06MB
  92. REcon 2013/Francois Chagnon- Python bindings for Hexrays Decompiler.mp423.41MB
  93. REcon 2013/Jesse D'Aguanno- XNU Spelunking or Fuzzing the kernel inside your kernel.mp439.03MB
  94. REcon 2013/Josh m0nk Thomas- Hiding @ Depth.mp433.25MB
  95. REcon 2013/Josh m0nk Thomas and Nathan Natron Keltner.mp458.21MB
  96. REcon 2013/Joshua J Drake aka jduck.mp464.41MB
  97. REcon 2013/Natalie Silvanovich- Many More Tamagotchis Were Harmed in the Making of this Presentation.mp445.53MB
  98. REcon 2013/Oleg Afonin- Apple iCloud services reversed inside out.mp450.99MB
  99. REcon 2013/Olivier Thomas- Hardware reverse engineering tools.mp478.66MB
  100. REcon 2013/Ruby feinstein Omri Ildis Yuval Ofir.mp457.75MB
  101. REcon 2014/alex-ionescu-Apple-SMC-The-place-to-be-definitely-For-an-implant.mp452.16MB
  102. REcon 2014/andrzej-dereszowski-FunCap.mp421.69MB
  103. REcon 2014/artem-dinaburg-andrew-ruef-Static-Translation-of-X86-Instruction-Semantics-to-LLVM-With-McSema.mp448.95MB
  104. REcon 2014/assaf-nativ-The-Making-of-the-Kosher-Phone.mp427.65MB
  105. REcon 2014/brendan-dolan-gavitt-Dynamic-Analysis-Kung-Fu-with-PANDA.mp450.74MB
  106. REcon 2014/colin-o-flynn-Power-Analysis-and-Clock-Glitching-with-the-Open-Source-ChipWhisperer-Platform.mp427.94MB
  107. REcon 2014/elad-shapira-Shall-we-play-a-game-Lessons-learned-while-playing-CoreWars8086.mp426.56MB
  108. REcon 2014/endre-bangerter-dominic-fischer-Memory-Tracing-Forensic-Reverse-Engineering.mp430.02MB
  109. REcon 2014/eva-galperin-Keynote.mp416.41MB
  110. REcon 2014/exide-Glitching-For-n00bs.mp432.93MB
  111. REcon 2014/francisco-falcon-Breaking-Out-of-VirtualBox-through-3D-Acceleration.mp429.16MB
  112. REcon 2014/igor-skochinsky-Intel-Management-Engine-Secrets.mp439.99MB
  113. REcon 2014/jason-jones-jasiel-spelman-Reversing-on-the-Edge.mp415.87MB
  114. REcon 2014/jason-jones-PIN-Point-Control-for-Analyzing-Malware.mp422.52MB
  115. REcon 2014/jonas-zaddach-Exploring-the-impact-of-a-hard-drive-backdoor.mp433.51MB
  116. REcon 2014/marta-janus-Going-gets-tough-a-tale-of-encounters-with-novel-evasive-malware.mp429.71MB
  117. REcon 2014/matt-oh-Reverse-Engineering-Flash-Memory-For-Fun-and-Benefit.mp437.77MB
  118. REcon 2014/michael-coppola-Performing-Open-Heart-Surgery-on-a-Furby.mp446.2MB
  119. REcon 2014/michael-ossmann-SDR-Tricks-with-HackRF.mp421.24MB
  120. REcon 2014/milan-bohacek-How-do-I-RE-object-oriented-code-and-you-should-too.mp436.72MB
  121. REcon 2014/mougey-camille-francis-gabriel-DRM-obfuscation-versus-auxiliary-attacks.mp431.52MB
  122. REcon 2014/nathan-keltner-charles-holmes-Here-be-Dragons-A-Bedtime-Tale-for-Sleepless-Nights.mp418.98MB
  123. REcon 2014/richard-johnson-Fuzzing-and-Patch-Analysis-SAGEly-Advice.mp453.94MB
  124. REcon 2014/wartortell-Rewriting-x86-Binaries-Many-PEs-Such-Secure-Wow.mp427.74MB
  125. REcon 2014/william-peteroy-Exploit-tips-and-techniques.mp423.63MB
  126. REcon 2015/REcon 2015 videos/alex-ionescu-Hooking-Nirvana.mp493.67MB
  127. REcon 2015/REcon 2015 videos/andrew-zonenberg-From-Silicon-to-Compiler.mp464.59MB
  128. REcon 2015/REcon 2015 videos/brian-gorenc-simon-zuckerbraun-abdul-aziz-hariri-Abusing-Silent-Mitigations.mp479.45MB
  129. REcon 2015/REcon 2015 videos/christopher-domas-The-movfuscator.mp462.76MB
  130. REcon 2015/REcon 2015 videos/colin-o-flynn-Glitching-and-Side-Channel-Analysis-for-All.mp435.85MB
  131. REcon 2015/REcon 2015 videos/exide-Finish-Him.mp454.81MB
  132. REcon 2015/REcon 2015 videos/j00ru-One-font-vulnerability-to-rule-them-all.mp482.57MB
  133. REcon 2015/REcon 2015 videos/jeffrey-crowell-julien-voisin-Radare2-building-a-new-IDA.mp430.66MB
  134. REcon 2015/REcon 2015 videos/joan-calvet-marion-marschalek-paul-rascagneres-Totally-Spies.mp473.8MB
  135. REcon 2015/REcon 2015 videos/mike-ryan-john-mcmaster-marshallh-Reversing-the-Nintendo-64-CIC.mp462.16MB
  136. REcon 2015/REcon 2015 videos/nitay-artenstein-shift-reduce-Pandora-s-Cash-Box-The-Ghost-Under-Your-POS.mp435.32MB
  137. REcon 2015/REcon 2015 videos/peter-hlavaty-jihui-lu-This-Time-Font-hunt-you-down-in-4-bytes.mp461.7MB
  138. REcon 2015/REcon 2015 videos/sophia-d-antoine-Exploiting-Out-of-Order-Execution.mp431.24MB
  139. REcon 2015/REcon 2015 videos/steven-vittitoe-Reverse-Engineering-Windows-AFD-sys.mp432.31MB
  140. REcon 2015/REcon 2015 videos/travis-goodspeed-sergey-bratus-Polyglots-and-Chimeras-in-Digital-Radio-Modes.mp487.82MB
  141. REcon 2015/REcon 2015 videos/yaniv-balmas-0x3E9-Ways-to-DIE.mp471.57MB
  142. REcon 2015/REcon 2015 videos/yong-chuan-koh-Understaning-the-Microsoft-Office-Protected-View-Sandbox.mp448.5MB
  143. REcon 2015/REcon 2015 videos/yuriy-bulygin-oleksandr-bazhaniuk-Attacking-and-Defending-BIOS-in-2015.mp495.88MB
  144. REcon 2016/REcon 2016 videos/alex-ionescu-Abusing-the-NT-Kernel-Shim-Engine.mp467.21MB
  145. REcon 2016/REcon 2016 videos/ang-cui-francois-charbonneau-jatin-kataria-A-Monitor-Darkly-Reversing-and-Exploiting-Ubiquitous-On-Screen-Display-Controllers-in-Modern-Monitors.mp430.07MB
  146. REcon 2016/REcon 2016 videos/chris-gerlinsky-How-Do-I-Crack-Satellite-and-Cable-Pay-TV.mp463.14MB
  147. REcon 2016/REcon 2016 videos/cooper-quintin-eva-galperin-When-Governments-Attack.mp447.65MB
  148. REcon 2016/REcon 2016 videos/david-carne-Black-box-reverse-engineering-for-unknown-custom-instruction-sets.mp432.83MB
  149. REcon 2016/REcon 2016 videos/derek-soeder-paul-mehta-BBS-Era-Exploitation-for-Fun-and-Anachronism.mp432.39MB
  150. REcon 2016/REcon 2016 videos/james-forshaw-Process-Failure-Modes.mp444.85MB
  151. REcon 2016/REcon 2016 videos/jason-geffner-JavaJournal.mp419.99MB
  152. REcon 2016/REcon 2016 videos/jessy-diamond-exum-Reverse-Engineering-ISC-controllers.mp463.78MB
  153. REcon 2016/REcon 2016 videos/joan-calvet-jessy-campos-thomas-dupuy-Visiting-The-Bear-Den.mp451.9MB
  154. REcon 2016/REcon 2016 videos/julian-kirsch-clemens-jonischkeit-Movfuscator-Be-Gone.mp425.44MB
  155. REcon 2016/REcon 2016 videos/liang-chen-qidan-he-Shooting-the-OS-X-El-Capitan-Kernel-Like-a-Sniper.mp451.43MB
  156. REcon 2016/REcon 2016 videos/markus-gaasedelen-nick-burnett-SolIDArity.mp433.96MB
  157. REcon 2016/REcon 2016 videos/matt-spisak-Hardware-Assisted-Rootkits-and-Instrumentation-ARM-Edition.mp460.89MB
  158. REcon 2016/REcon 2016 videos/natalie-silvanovich-More-Flash-More-Fun.mp441.89MB
  159. REcon 2016/REcon 2016 videos/nguyen-anh-quynh-Keystone-the-last-missing-framework-of-Reverse-Engineering.mp429.58MB
  160. REcon 2016/REcon 2016 videos/nico-golde-daniel-komaromy-Breaking-Band.mp441.99MB
  161. REcon 2016/REcon 2016 videos/richard-johnson-Go-Speed-Tracer.mp455.75MB
  162. REcon 2016/REcon 2016 videos/robert-c-seacord-Dangerous-Optimizations-and-the-Loss-of-Causality.mp442.25MB
  163. REcon 2016/REcon 2016 videos/satoshi-tanda-Monitoring-controlling-kernel-mode-events-by-HyperPlatform.mp422.97MB
  164. REcon 2017 Brussels/REcon 2017 Brussels videos/Analyzing iOS apps road from AppStore to security analysis report.mp435.65MB
  165. REcon 2017 Brussels/REcon 2017 Brussels videos/Breaking Code Read Protection on the NXP LPC family Microcontroller.mp459.55MB
  166. REcon 2017 Brussels/REcon 2017 Brussels videos/Contributor analysis.mp425.69MB
  167. REcon 2017 Brussels/REcon 2017 Brussels videos/Embedded devices reverse engineering.mp443.37MB
  168. REcon 2017 Brussels/REcon 2017 Brussels videos/Getting Physical with USB Type-C Windows 10 RAM Forensics and UEFI Attacks.mp484.21MB
  169. REcon 2017 Brussels/REcon 2017 Brussels videos/GRAP define and match graph patterns within binaries.mp450.47MB
  170. REcon 2017 Brussels/REcon 2017 Brussels videos/Hackable Security Modules Reversing and exploiting a FIPS.mp442.5MB
  171. REcon 2017 Brussels/REcon 2017 Brussels videos/Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis.mp458.92MB
  172. REcon 2017 Brussels/REcon 2017 Brussels videos/Keeping your tools safe IDA.mp425.25MB
  173. REcon 2017 Brussels/REcon 2017 Brussels videos/Legacy Crypto Never Dies.mp419.97MB
  174. REcon 2017 Brussels/REcon 2017 Brussels videos/miLazyCracker - Kevin Larson.mp416.42MB
  175. REcon 2017 Brussels/REcon 2017 Brussels videos/New vulnerabilities in SMM of Coreboot and UEFI based systems.mp467.07MB
  176. REcon 2017 Brussels/REcon 2017 Brussels videos/Poutine Dusting Forgotten Lore - Yannick Lamarre.mp413.77MB
  177. REcon 2017 Brussels/REcon 2017 Brussels videos/r2m2 - Guillaume “guedou” Valadon.mp428.79MB
  178. REcon 2017 Brussels/REcon 2017 Brussels videos/Reverse Engineering Satellite Based IP Content Distribution.mp446.02MB
  179. REcon 2017 Brussels/REcon 2017 Brussels videos/Teaching Old Shellcode New Tricks - Josh Pitts.mp432.62MB
  180. REcon 2017 Brussels/REcon 2017 Brussels videos/Transforming Open Source to Open Access in Closed Applications.mp439.76MB
  181. REcon 2017 Brussels/REcon 2017 Brussels videos/When your firewall turns against you - Rene Freingruber.mp421.98MB
  182. REcon 2017 Brussels/REcon 2017 Brussels videos/Your Chakra Is Not Aligned.mp415.24MB
  183. REcon 2017 Montreal/REcon 2017 Montreal videos/adam-schwalm-Exporting-IDA-Debug-Information.mp424.17MB
  184. REcon 2017 Montreal/REcon 2017 Montreal videos/alex-ionescu-Fun-with-Sam-Inside-the-Surface-Aggregator-Module.mp462.56MB
  185. REcon 2017 Montreal/REcon 2017 Montreal videos/andrea-allievi-The-HyperV-Architecture-and-its-Memory-Manager.mp451.05MB
  186. REcon 2017 Montreal/REcon 2017 Montreal videos/david-carne-HDI-PCB-Netlist-Recovery-a-new-old-technique.mp427.91MB
  187. REcon 2017 Montreal/REcon 2017 Montreal videos/fabrice-desclaux-camille-mougey-Miasm-reverse-engineering-framework.mp449.32MB
  188. REcon 2017 Montreal/REcon 2017 Montreal videos/j00ru-Bochspwn-Reloaded-Detecting-Kernel-Memory-Disclosure-with-x86-Emulation-and-Tain't-Tracking.mp465.06MB
  189. REcon 2017 Montreal/REcon 2017 Montreal videos/julia-karpin-anna-dorfman-Crypton-Exposing-malware-s-deepest-secrets.mp433.21MB
  190. REcon 2017 Montreal/REcon 2017 Montreal videos/keegan-ryan-Hacking-Cell-Phone-Embedded-Systems.mp425.22MB
  191. REcon 2017 Montreal/REcon 2017 Montreal videos/LT-frederic-marmond-REVEN-Axion-Talk.mp420.09MB
  192. REcon 2017 Montreal/REcon 2017 Montreal videos/LT-jeff-dileo-AssetHook.mp48.73MB
  193. REcon 2017 Montreal/REcon 2017 Montreal videos/LT-john-mcmaster-Silicon-Photonics-Talk.mp48.13MB
  194. REcon 2017 Montreal/REcon 2017 Montreal videos/maddie-stone-The-Life-Changing-Magic-of-IDAPython-Embedded-Device-Edition.mp421.78MB
  195. REcon 2017 Montreal/REcon 2017 Montreal videos/mariano-graziano-jonas-zaddach-BASS-Automated-Signature-Synthesizer.mp427.57MB
  196. REcon 2017 Montreal/REcon 2017 Montreal videos/marion-marschalek-Bubble-Struggle-Call-Graph-Visualization-with-Radare2.mp460.52MB
  197. REcon 2017 Montreal/REcon 2017 Montreal videos/michael-atlas-SGX-Enclave-programming-common-mistakes.mp437.92MB
  198. REcon 2017 Montreal/REcon 2017 Montreal videos/michael-ossmann-Reverse-Engineering-DSSS.mp445.72MB
  199. REcon 2017 Montreal/REcon 2017 Montreal videos/mychaela-falconia-FreeCalypso-a-fully-liberated-GSM-baseband.mp446.01MB
  200. REcon 2017 Montreal/REcon 2017 Montreal videos/philippe-biondi-xavier-mehrenberger-raphael-rigo-sarah-zennou-BinCAT-purrfecting-binary-static-analysis.mp433.96MB
  201. REcon 2017 Montreal/REcon 2017 Montreal videos/vlad-sabaka-You-can-run-but-you-cant-hide.mp420.41MB
  202. REcon 2019 Montreal/REcon 2019 Montreal videos/Alex Ionescu.The Last Generic Win32K KASLR Defeat in Windows-uXzcEpxt54ybs.mp472.62MB
  203. REcon 2019 Montreal/REcon 2019 Montreal videos/Alex Radocea.Snow Crashing Virtual Reality. 2019 Edition-a45zewC5K1XGs.mp451.34MB
  204. REcon 2019 Montreal/REcon 2019 Montreal videos/Bill DemirKapi.The Unseen Dangers of Bloatware-SWuxeYIcvlfia.mp441.3MB
  205. REcon 2019 Montreal/REcon 2019 Montreal videos/Brandon Falk.Vectorized Emulation Putting it all together-kFn8Kr6lsNZQZ.mp471.75MB
  206. REcon 2019 Montreal/REcon 2019 Montreal videos/Chris Gerlinsky.The ROM matric revolution Unscrambling bits-K0W7zZQDK9lQQ.mp447.46MB
  207. REcon 2019 Montreal/REcon 2019 Montreal videos/Colin O'Flynn.MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection-5qYAlMcGKMoEb.mp433MB
  208. REcon 2019 Montreal/REcon 2019 Montreal videos/Dimitrios Tatsis.Attacking Hexagon Security Analysis of Qualcomm's ADSP-lxNbsl2gW7w0e.mp441.55MB
  209. REcon 2019 Montreal/REcon 2019 Montreal videos/Evan Jensen.The Backdoor Foundry A Tool-chain for Building Application Specific Implants-TU4e6qaSW6HZK.mp434.58MB
  210. REcon 2019 Montreal/REcon 2019 Montreal videos/George Tarnovsky.X-Ray Reverse Engineering-uj9LDNtRWRwUG.mp428.49MB
  211. REcon 2019 Montreal/REcon 2019 Montreal videos/Guy.Burned in AshesBaseband Fairy Tale Stories-WXoRdFBuXytGB.mp441.31MB
  212. REcon 2019 Montreal/REcon 2019 Montreal videos/Jiska - Dennis Mantz.Reversing and Exploiting Broadcom Bluetooth-dEpC4S0krzxuc.mp472.47MB
  213. REcon 2019 Montreal/REcon 2019 Montreal videos/Joan Calvet.The (long) journey To A MultiArchitecture Disassembler-fgmt6TlB2UkKi.mp472.1MB
  214. REcon 2019 Montreal/REcon 2019 Montreal videos/Joel Noguera.Unveiling the Underground world of Anti-Cheats-XU7k7Iwba695M.mp467.06MB
  215. REcon 2019 Montreal/REcon 2019 Montreal videos/Juan Andres Guerrero-Saade.Mining Disputed territories Studying Attacker Signatures for Improved Situational Awarness-KnNCs3pp.mp458.3MB
  216. REcon 2019 Montreal/REcon 2019 Montreal videos/Maddie Stone.The path to the payload Android Edition-J3ZnNl2GYjEfa.mp446.54MB
  217. REcon 2019 Montreal/REcon 2019 Montreal videos/Matt Graeber.Using WPP and TraceLogging Tracing to Facilitate Dynamic and Static Windows RE-4wrctkSIN0JmX.mp465.19MB
  218. REcon 2019 Montreal/REcon 2019 Montreal videos/Natalie Silvanovitch.Seeing Inside the Encrypted Envelope-M8rga9e8H27Ee.mp471.75MB
  219. REcon 2019 Montreal/REcon 2019 Montreal videos/Rolf Rolles.Automation Techniques in C Reverse Engineering-8jKapmZP0gND6.mp478.57MB
  220. REcon 2019 Montreal/REcon 2019 Montreal videos/Slava Makkaveev.The Road to Qualcomm Trust-Zone apps fuzzing-IyiuvOcbuGOAP.mp432.75MB
  221. REcon 2019 Montreal/REcon 2019 Montreal videos/Takahiro Haruyama.Defeating APT10 Compiler-level Obfuscation-a36qtx5lpBQnE.mp435.05MB
  222. REcon 2019 Montreal/REcon 2019 Montreal videos/Thomas Roth - Dmitry Nedospasov.Hacking the most popular cryptocurrency hardware wallets-90dZWqWdV43I1.mp453.77MB
  223. REcon 2023/& Pete Markowsky.mp4563.94KB
  224. REcon 2023/bold - Cracking the final frontier Reverse engineering and exploiting LEO satellites.mp447.98MB
  225. REcon 2023/Colin O'Flynn - Adventures of My Oven (Pinocchio) with ChipWhisperer.mp436MB
  226. REcon 2023/Daniel Wegemer - Enabling Security Research On Qualcomm Wifi Chips.mp438.36MB
  227. REcon 2023/Erik Egsgard - The Hunt for Red October - One Ping Too Many.mp435.72MB
  228. REcon 2023/Ice Ice Baby Coppin' RAM With DIY Cryo-Mechanical Robot.mp448MB
  229. REcon 2023/Mathilde Venault - Press Play To Restart Under the Hood of the Windows Restart Manager.mp427.34MB
  230. REcon 2023/Maxime Rossi and Damiano Melotti - Dissecting the Modern Android Data Encryption Scheme.mp446.86MB
  231. REcon 2023/Michael Harbison - Hello 1994Abusing Windows Explorer via Component Object Model in 2023.mp428.05MB
  232. REcon 2023/Natalie Silvanovich How To Hack Shannon Baseband.mp433.39MB
  233. REcon 2023/Nick Gregory & Pete Markowsky Be Kind Please Rewind.mp431.21MB
  234. REcon 2023/Nika Korchok - Portrait of the artist as a young vx-er This painting is an MBR bootkit.mp434.52MB
  235. REcon 2023/Olivia Locca Fraser - Backdoor Lockpick.mp478.68MB
  236. REcon 2023/Simon Scannell Remotely Exploiting An Antivirus Engine.mp423.08MB
  237. REcon 2023/Tal Lossos NVMe.mp427.52MB
  238. REcon 2023/Tim Blazytko - Unveiling Secrets In Binaries using Code Detection Strategies.mp419.94MB
  239. REcon 2023/Travis Goodspeed Recent Experiments with Mask ROMs.mp457.84MB
  240. REcon 2023/Vitor Ventura & Holger Unterbringe Reversing NIM Binaries.mp453.13MB
  241. REcon 2023/Willy R. Vasquez - The Most Dangerous Codec In The World Vulnerabilities in H.264.mp426.74MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!

违规内容投诉邮箱:[email protected]

概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统