/ZeroNights 2014/
|
Alexander 'Solar Designer' Peslyak - Is infosec a game.mp4
|
68.7 MB
|
Alexander Bolshev, Gleb Cherbov, Svetlana Cherkasova - DTM components - shadow keys.mp4
|
72.2 MB
|
Alexey Osipov, Timur Yunusov, Kirill Nesterov - 4x4G - from SIM to GGSN.mp4
|
58.3 MB
|
Dmitry Boomov - De-anonymization and total espionage.mp4
|
42.4 MB
|
Dmitry Schelkunov, Vasily Bukasov - Deobfuscation and beyond.mp4
|
70.2 MB
|
Ivan Novikov - Unexpected expected exception - think different about web-related vulnerabilities.mp4
|
51.9 MB
|
Jake McGinty - How to - really - piss off the surveillance state with your privacy tool.mp4
|
73.9 MB
|
Jean-Philippe Aumasson - Crypto coding v2.mp4
|
55.9 MB
|
Marco Grassi - Steroids for your App Security assessment.mp4
|
52.3 MB
|
Nicolas Gregoire - Hunting for top bounties.mp4
|
67.0 MB
|
Nikita Tarakanov - Data-only PWNing Microsoft Windows kernel - exploitation of.mp4
|
39.2 MB
|
Nikita Tarakanov - The past, the present and the future of software exploitation techniques.mp4
|
43.5 MB
|
Patroklos Argyroudis - Project Heapbleed.mp4
|
64.8 MB
|
Pavel Zhovner - Household RFID-based access tricks.mp4
|
53.6 MB
|
Peter Hlavaty - Racing with Droids.mp4
|
47.7 MB
|
Rene Freingruber - EMET 5.0 - armor or curtain.mp4
|
58.2 MB
|
Roman Bazhin - A pentesters view of Oracle Database Communication Protocol.mp4
|
47.2 MB
|
Sergey Soldatov, Mikhail Egorov - Non-cryptographic research of orthodox cryptographic media.mp4
|
62.1 MB
|
/ZeroNights 2015/
|
Alexander Asimov, Artyom Gavrichenkov - The [Real] State of BGP Security.mp4
|
75.0 MB
|
Alexander Ermolov - Modifying the firmwares of industrial switches.mp4
|
101.8 MB
|
Alexander Matrosov - Attacking hypervisors using firmware and hardware.mp4
|
103.8 MB
|
Alfonso De Gregorio - illusoryTLS - Nobody But Us Impersonate, Tamper, and Exploit.mp4
|
85.8 MB
|
Alfonso De Gregorio - illusoryTLS - Nobody But Us Impersonate, Tamper, and Exploit.srt
|
38.7 KB
|
Andrey Plastunov - S[c]rum is all around. How to stop continuous integration.mp4
|
104.8 MB
|
Anton Kochkov - ESIL - universal IL (Intermediate Language) for Radare2.mp4
|
96.6 MB
|
Daniel & Azure - Did you get your token.mp4
|
128.1 MB
|
George Nosenko - Cisco IOS shellcode - all-in-one.mp4
|
128.3 MB
|
Georgi Geshev - Warranty void if label removed - attacking MPLS networks.mp4
|
158.8 MB
|
Georgi Geshev - Warranty void if label removed - attacking MPLS networks.srt
|
59.6 KB
|
Ivan Novikov - Mathematical model of vulnerabilities and attacks input validation.mp4
|
146.3 MB
|
Jakub Kaluzny - Big problems with big data - Hadoop interfaces security.mp4
|
111.8 MB
|
Jeremy Brown - Awards ceremony.mp4
|
93.2 MB
|
Jeremy Brown - Browser Fuzzing with a Twist (and a Shake).mp4
|
102.8 MB
|
Jeremy Brown - Browser Fuzzing with a Twist (and a Shake).srt
|
54.3 KB
|
Jeremy Brown - Hacking virtual appliances.mp4
|
99.5 MB
|
Jeremy Brown - Hacking virtual appliances.srt
|
67.2 KB
|
Marina Krotofil - Hack like a movie star - Step-by-step guide to crafting SCADA payloads.mp4
|
129.6 MB
|
Matteo Beccaro, Matteo Collura - Extracting the painful (blue) tooth.mp4
|
93.2 MB
|
Matteo Beccaro, Matteo Collura - Extracting the painful (blue) tooth.srt
|
37.2 KB
|
Nikita Tarakanov - Direct X - direct way to Microsoft Windows kernel.mp4
|
58.9 MB
|
Nikolaj Schlej - Fix it yourself - resolving UEFI vulnerabilities single-handedly.mp4
|
138.8 MB
|
Nikolaos Naziridis, Zisis Sialveras - Choronzon - an approach to knowedgebased evolutionary fuzzing.mp4
|
112.2 MB
|
Sergey Belov - Samsung SmartTV - how-to to creating insecure device in today s world.mp4
|
99.6 MB
|
Sergey Shekyan - Getting The Most Out Of CSP - a Deep Dive.mp4
|
99.3 MB
|
Sergey Shekyan - Getting The Most Out Of CSP - a Deep Dive.srt
|
41.7 KB
|
Yegor Litvinov - KNX security or how to steal a skyscraper.mp4
|
95.2 MB
|
ZeroNights opening movie 2015.mp4
|
6.5 MB
|
[Intro - Keynote] Rodrigo Rubira Branco - A praise for hackers.mp4
|
241.2 MB
|
/ZeroNights 2016/
|
Alexander Asimov, Artyom Gavrichenkov - The [Real] State of BGP Security.mp4
|
72.8 MB
|
Alexander Ermolov - Modifying the firmwares of industrial switches.mp4
|
94.2 MB
|
Alexander Matrosov - Attacking hypervisors using firmware and hardware.mp4
|
102.7 MB
|
Alfonso De Gregorio - illusoryTLS Nobody But Us Impersonate, Tamper, and Exploit.mp4
|
83.0 MB
|
Alfonso De Gregorio - illusoryTLS Nobody But Us Impersonate, Tamper, and Exploit.srt
|
70.5 KB
|
Andrey Plastunov - S[c]rum is all around. How to stop continuous integration.mp4
|
104.0 MB
|
Anton Kochkov - ESIL - universal IL (Intermediate Language) for Radare2.mp4
|
92.2 MB
|
Daniel & Azure - Did you get your token.mp4
|
129.2 MB
|
George Nosenko - Cisco IOS shellcode - all-in-one.mp4
|
126.5 MB
|
Georgi Geshev - Warranty void if label removed - attacking MPLS networks.mp4
|
160.4 MB
|
Georgi Geshev - Warranty void if label removed - attacking MPLS networks.srt
|
98.5 KB
|
Jakub Kaluzny - Big problems with big data - Hadoop interfaces security.mp4
|
110.0 MB
|
Jeremy Brown - Awards ceremony.mp4
|
98.8 MB
|
Jeremy Brown - Browser Fuzzing with a Twist (and a Shake).mp4
|
102.3 MB
|
Jeremy Brown - Browser Fuzzing with a Twist (and a Shake).srt
|
98.4 KB
|
Jeremy Brown - Hacking virtual appliances.mp4
|
94.4 MB
|
Jeremy Brown - Hacking virtual appliances.srt
|
118.0 KB
|
Marina Krotofil - Hack like a movie star Step-by-step guide to crafting SCADA payloads.mp4
|
125.1 MB
|
Matteo Beccaro, Matteo Collura - Extracting the painful (blue) tooth.mp4
|
86.2 MB
|
Matteo Beccaro, Matteo Collura - Extracting the painful (blue) tooth.srt
|
66.6 KB
|
Nikita Tarakanov - Direct X - direct way to Microsoft Windows kernel.mp4
|
59.3 MB
|
Nikolaj Schlej - Fix it yourself resolving UEFI vulnerabilities single-handedly.mp4
|
149.1 MB
|
Nikolaos Naziridis, Zisis Sialveras - Choronzon an approach to knowedgebased evolutionary fuzzing.mp4
|
109.8 MB
|
Sergey Belov - Samsung SmartTV how-to to creating insecure device in todays world.mp4
|
98.8 MB
|
Sergey Shekyan - Getting The Most Out Of CSP a Deep Dive.mp4
|
98.6 MB
|
Sergey Shekyan - Getting The Most Out Of CSP a Deep Dive.srt
|
75.0 KB
|
Teaser ZeroNights 2016 - Struttura.mp4
|
1.7 MB
|
Yegor Litvinov - KNX security or how to steal a skyscraper.mp4
|
91.6 MB
|
ZERONIGHTS 2016.mp4
|
7.3 MB
|
ZERONIGHTS 2016.srt
|
3.1 KB
|
[Intro - Keynote] Rodrigo Rubira Branco - A praise for hackers.mp4
|
250.8 MB
|
/ZeroNights 2017/
|
Abdul Aziz Hariri, Brian Gorenc, Jasiel Spelman - For the Greater Good Leveraging VMware's RPC Inter.mp4
|
64.6 MB
|
Aleksey Tiurin - MITM Attacks on HTTPS Another Perspective.mp4
|
80.8 MB
|
Alex Matrosov - Betraying the BIOS Where the Guardians of the BIOS are Failing.mp4
|
51.0 MB
|
Alexey Pertsev, Egor Karbutov - Chat with hacker.mp4
|
64.1 MB
|
James Forshaw - Abusing Access Tokens for UAC Bypasses.mp4
|
62.9 MB
|
James Lee - Playing with IE11 ActiveX 0days.mp4
|
16.1 MB
|
Jiashui Wang, Tianxiang Li - Gain remote code execution in your smart devices.mp4
|
35.1 MB
|
Lucas Apa - Hacking Robots Before Skynet.mp4
|
64.1 MB
|
Matt Oh - Recent Exploit Trend and Mitigation, detection Tactics.mp4
|
54.7 MB
|
Maxwell Koh, Keith Lee - Bypass 2FA, Stealing Private Keys without Social Engineering, and the Intro.mp4
|
46.5 MB
|
Nguyen Anh Quynh - Building Advanced Coverage guided Fuzzer for Program Binaries.mp4
|
69.8 MB
|
Nicolas Alejandro Economou - Abusing GDI for ring0 exploit primitives Evolution.mp4
|
67.0 MB
|
Ralf Philipp Weinmann - Hardware based tracing on ARM.mp4
|
69.3 MB
|
Saplt, Nikolay Kolintsev - Gone in Sixty Seconds.mp4
|
46.4 MB
|
Shay Gueron - Attacks on encrypted memory Beyond the single bit conditionals.mp4
|
77.9 MB
|
Stephan Gerling - Front door nightmare.mp4
|
45.4 MB
|
Thomas Dullien - Machine learning, offense, and the future of automation.mp4
|
56.0 MB
|
Vladimir Dashchenko, Sergey Temnikov - Silver bullet vulnerabilities and backdoor Hunting 30K vend.mp4
|
46.8 MB
|
[Fast Track] Andrey Biryukov - Creating Backdoors Using Legal Applications.mp4
|
20.4 MB
|
[Fast Track] Nikolay Klendar - Exploiting e mail sandbox backdoor it with one evil e mail.mp4
|
22.4 MB
|
[FastTrack] Aleksey Busygin - Legacy of Heartbleed MITM and Revoked Certificates.mp4
|
32.0 MB
|
[FastTrack] Aleksey Mescheryakov - Vulnerability in Apps on React.mp4
|
26.6 MB
|
[FastTrack] Alexey Sintsov, Maxim Andreyanov - Reverse DNS tunnel extension for Meterpreter.mp4
|
37.8 MB
|
[FastTrack] Mikhail Yegorov - Tricks for Bypassing CSRF Protection.mp4
|
36.2 MB
|
[FastTrack] Tatiana Mikhailova - Play by Your Own Rules.mp4
|
18.4 MB
|
[Workshop] Krassimir Tzvetanov - Fundamentals of DDoS mitigation.mp4
|
206.5 MB
|
/ZeroNights 2018/
|
Alexandre Gazet, Fabien Perigaud 0xf4b, Joffrey Czarny - Turning your BMC into a revolving door..eng.srt
|
102.0 KB
|
Alexandre Gazet, Fabien Perigaud 0xf4b, Joffrey Czarny - Turning your BMC into a revolving door.mp4
|
38.8 MB
|
Anton Nikolaev, Denis Kolegov, Oleg Broslavsky - SD WAN Internet Census.mp4
|
24.8 MB
|
Dryagunov M., Khodukina N., Loginov N. - Automated approach to the analysis of network devices sec.mp4
|
12.5 MB
|
Eric Sesterhenn, Luis Merino, Markus Vervier - Zero Fax given.mp4
|
44.5 MB
|
Fedotkin Zakhar - Reveal the unseen - Getting access to data with graphic file editing libraries.mp4
|
18.2 MB
|
HC MA - Massive Scale USB Device Driver Fuzz WITHOUT device.eng.srt
|
71.4 KB
|
HC MA - Massive Scale USB Device Driver Fuzz WITHOUT device.mp4
|
50.1 MB
|
Jianing Wang, Junyu Zhou - Ntlm Relay Reloaded - Attack methods you do not know.eng.srt
|
65.9 KB
|
Jianing Wang, Junyu Zhou - Ntlm Relay Reloaded - Attack methods you do not know.mp4
|
41.8 MB
|
Joxean Koret - Diffing C source codes to binaries.eng.srt
|
88.2 KB
|
Joxean Koret - Diffing C source codes to binaries.mp4
|
36.7 MB
|
Junyu Zhou, Wenxu Wu - Attack surfaces against Git web servers used by thousands of developers.eng.srt
|
44.6 KB
|
Junyu Zhou, Wenxu Wu - Attack surfaces against Git web servers used by thousands of developers.mp4
|
33.4 MB
|
Nesterov I., Shekyan S.- Unveiling the cloak A look at what happens when you click that link.eng.srt
|
68.0 KB
|
Nesterov I., Shekyan S.- Unveiling the cloak A look at what happens when you click that link.mp4
|
33.3 MB
|
Pavel Toporkov - Redis post-exploitation.mp4
|
39.4 MB
|
Rancho Han - From Graphic Mode To God Mode, Discovery Vulnerabilities of GPU Virtualization.eng.srt
|
49.8 KB
|
Rancho Han - From Graphic Mode To God Mode, Discovery Vulnerabilities of GPU Virtualization.mp4
|
30.3 MB
|
Vladimir Dashchenko - Denial, anger, bargaining, depression, acceptance - reporting 0days to vendors.mp4
|
42.3 MB
|
Yuriy Gurkin - SCADA projects from the point of view of hackers.mp4
|
23.6 MB
|
ZeroNights 2018 intro cinematics.mp4
|
2.7 MB
|
dump stack() - Ways to automate testing Linux kernel exploits.mp4
|
13.0 MB
|
/ZeroNights 2019/
|
Alex Kovrizhnykh - crauEmu - your IDE for code-reuse attacks.mp4
|
20.7 MB
|
Alex Matrosov - Hardware Security is Hard how hardware boundaries define platform security.mp4
|
76.1 MB
|
An Trinh - Dark sides of Java remote protocols.eng.srt
|
58.4 KB
|
An Trinh - Dark sides of Java remote protocols.mp4
|
38.3 MB
|
Andrey Akimov - Launching feedback-driven fuzzing on TrustZone TEE.mp4
|
31.3 MB
|
CiscoPangPang - Cisco to Disco.eng.srt
|
34.2 KB
|
CiscoPangPang - Cisco to Disco.mp4
|
22.9 MB
|
Emil Lerner - Single byte write to RCE exploiting a bug in php-fpm.mp4
|
15.0 MB
|
Ilya Shaposhnikov - Oldschool way of hacking MicroDigital ip-cameras.mp4
|
35.7 MB
|
Jakub Vrana, Krzysztof Kotowicz - Trusted Types & the end of DOM XSS.eng.srt
|
54.3 KB
|
Jakub Vrana, Krzysztof Kotowicz - Trusted Types & the end of DOM XSS.mp4
|
32.9 MB
|
Jayson E. Street - I PWN thee, I PWN thee not.eng.srt
|
86.9 KB
|
Jayson E. Street - I PWN thee, I PWN thee not.mp4
|
83.3 MB
|
Juho Nurminen - app setAsDefaultRCE Client Electron, scheme handlers and stealthy security patches.eng.srt
|
52.3 KB
|
Juho Nurminen - app setAsDefaultRCE Client Electron, scheme handlers and stealthy security patches.mp4
|
48.1 MB
|
Kai Jern Lau, Nguyen Anh Quynh - qiling.io Advanced Binary Emulation framework.eng.srt
|
64.4 KB
|
Kai Jern Lau, Nguyen Anh Quynh - qiling.io Advanced Binary Emulation framework.mp4
|
46.2 MB
|
Ke Liu - Two Bytes to Rule Adobe Reader Twice The Black Magic Behind the Byte Order Mark.eng.srt
|
50.6 KB
|
Ke Liu - Two Bytes to Rule Adobe Reader Twice The Black Magic Behind the Byte Order Mark.mp4
|
55.9 MB
|
LimitedResults - Fatal Fury on ESP32 Time to release Hardware Exploits.eng.srt
|
64.2 KB
|
LimitedResults - Fatal Fury on ESP32 Time to release Hardware Exploits.mp4
|
46.5 MB
|
Maria Nedyak - Hacking Medical Imaging with DICOM.mp4
|
14.0 MB
|
Matias Sequeira, Esteban Martinez Fayo, Cesar Cerrudo - Practical LoRaWAN auditing and exploitation.eng.srt
|
61.3 KB
|
Matias Sequeira, Esteban Martinez Fayo, Cesar Cerrudo - Practical LoRaWAN auditing and exploitation.mp4
|
37.4 MB
|
Pavel Cheremushkin - Opwnsource VNC vulnerability research.mp4
|
45.9 MB
|
Roman Palkin - Malign Machine Learning Models.mp4
|
11.3 MB
|
ZN 201'9 edition. Grand Opening.mp4
|
4.1 MB
|
ZeroNights 2019.mp4
|
843.5 KB
|
md4 - CiscoASA From Zero to ID=0.eng.srt
|
42.3 KB
|
md4 - CiscoASA From Zero to ID=0.mp4
|
29.6 MB
|
/ZeroNights 2021 X/
|
Aleksandr Kolchanov - Thank you for using URL shorteners I know everything about your clients now.mp4
|
13.0 MB
|
Aleksei Tiurin - Weird proxies 2 and a bit of magic.mp4
|
38.4 MB
|
Alex Kovrizhnykh - Exploiting checkm8 with unknown SecureROM for the T2 chip.mp4
|
41.1 MB
|
Alex Savelyev - Server exploitation of Prototype Pollution vulnerability.mp4
|
12.4 MB
|
Alexander Barabanov - Attacking the microservice applications methods and practical tips.mp4
|
41.6 MB
|
Alexander Ermolov, Dmitry Frolov - Data-only attacks against UEFI BIOS.mp4
|
74.1 MB
|
Alexander Popov - Improving the exploit for CVE-2021-26708 in the Linux kernel to bypass LKRG.mp4
|
57.0 MB
|
Alexander Tarasikov - Exploring the Galaxy. Building emulators to find vulns in modern phones.mp4
|
59.0 MB
|
Alexey Morozov - Hacker adventures on dating websites.mp4
|
24.5 MB
|
Andrey Zhukov - Lateral movement automation.mp4
|
15.4 MB
|
Company wide SAST - Aleksei Meshcheriakov, Alexander Kaleda, Evgenii Protsenko.mp4
|
46.2 MB
|
Denis Efremov - CVEhound check Linux sources for known CVEs.mp4
|
21.3 MB
|
Denis Rybin - Metrics in practice.mp4
|
30.1 MB
|
Dima Turchenkov - LPE in Ring -3 - Intel ME.mp4
|
37.6 MB
|
Dmitriy Evdokimov - Container escapes Kubernetes edition.mp4
|
57.3 MB
|
Dmitriy Teryoshin - The invisible hand of AppSec in release builds.mp4
|
17.9 MB
|
Emil Lerner - HotPics 2021.mp4
|
24.6 MB
|
Ilya Zuev - IPMI backdoor not with your own hands.mp4
|
21.0 MB
|
Ivan Agarkov - 8 ways to spy on your consoles.mp4
|
32.2 MB
|
Max Dmitriev - Apache 0day bug, which still nobody knows of, and which was fixed accidentally.mp4
|
18.8 MB
|
Maxim Goryachy, Dmitry Sklyarov - How we achieved to execute arbitrary code inside Intel Atom CPUs.mp4
|
41.7 MB
|
Nikita Stupin, Sergey Bobrov - New ways to alert Prototype Pollution.mp4
|
30.8 MB
|
Paul Axe - JVMyachni Otake.mp4
|
16.3 MB
|
Pavel Sorokin - PD%00.mp4
|
17.7 MB
|
Taras Ivaschenko - 2011 APP SECURITY 2021.mp4
|
56.3 MB
|
Unnamed user, ValdikSS - Trojans and backdoors in feature phones sold in Russia.mp4
|
36.2 MB
|
Valeriy Shevchenko - Fantastic bugs and where to find them.mp4
|
40.3 MB
|
Vatclav Dovnar - Open Source DevSecOps Tempest in a teapot.mp4
|
29.2 MB
|
/
|
ZeroNights logo.png
|
244.0 KB
|
ZeroNights thank you.txt
|
0.7 KB
|
Total files 188
|