Blackhat

Results: 880



#Item
61

A Binary Fuzzer in JavaScript http://dinaburg.org/binfuzz Artem Dinaburg Blackhat Arsenal 2013

Add to Reading List

Source URL: media.blackhat.com

- Date: 2013-07-31 03:50:17
    62

    Sparty : A Frontpage and Sharepoint Auditing Tool Aditya K Sood (@AdityaKSood) BlackHat Arsenal USASecNiche Security Labs

    Add to Reading List

    Source URL: media.blackhat.com

    - Date: 2013-07-31 04:05:56
      63

      A Visual Study of Primitive Binary Fragment Types Gregory Conti∗, Sergey Bratus, Anna Shubina†, Andrew Lichtenberg‡, Roy Ragsdale, Robert Perez-Alemany, Benjamin Sangster, and Matthew Supan∗ July 4, 2010

      Add to Reading List

      Source URL: media.blackhat.com

      - Date: 2012-04-07 14:53:10
        64

        Offensive  Threat  Modeling  for  Attackers   Turning  Threat  Modeling  on  its  Head   Black  Hat  Europe  2012     Rafal  Los   Shane  MacDougall  

        Add to Reading List

        Source URL: media.blackhat.com

        - Date: 2012-04-07 15:31:47
          65

          PSUDP: A Passive Approach to Network-Wide Covert Communication Kenton Born Black Hat USA 2010

          Add to Reading List

          Source URL: media.blackhat.com

          - Date: 2012-04-07 14:53:10
            66

            Voyage of the Reverser A Visual Study of Binary Species Sergey Bratus // Dartmouth // Greg Conti // West Point //

            Add to Reading List

            Source URL: media.blackhat.com

            - Date: 2012-04-07 14:52:47
              67

              Base Jumping Attacking the GSM baseband and base station Tuesday, 20 July 2010

              Add to Reading List

              Source URL: media.blackhat.com

              - Date: 2012-04-07 14:52:52
                68

                ioc_writer OpenIOC 1.1 and tools for creating them PRESENTED BY: William Gibb (william.gibb AT mandiant.com) © Mandiant Corporation. All rights reserved.

                Add to Reading List

                Source URL: media.blackhat.com

                - Date: 2013-07-31 03:52:09
                  69

                  Microsoft Word - HarderBetterFasterStronger - rjlg - final.docx

                  Add to Reading List

                  Source URL: media.blackhat.com

                  - Date: 2012-04-07 14:53:11
                    70

                    Understanding the heap by breaking it A case study of the heap as a persistent data structure through nontraditional exploitation techniques Abstract: Traditional exploitation techniques of overwriting heap metadata has

                    Add to Reading List

                    Source URL: www.blackhat.com

                    - Date: 2015-05-28 15:51:43
                      UPDATE