Para visualizar el sitio de manera óptima actualice el navegador. ×



(In)security of e-voting in Brazil
The Bicho: An Advanced Car Backdoor Maker
Get to the Money: Hacking POS and POP Systems
Abusing GDI for ring0 exploit primitives: Evolution
Inseguridad en alarmas para vehiculos
Pwned in Translation - from Subtitles to RCE
The "Bird" That Killed Arbitrary Code Guard
Unbox Your Phone - Exploring and Breaking Samsung's TrustZone Sandboxes
Industroyer: biggest threat to industrial control systems since Stuxnet
Automatic bugfinding for the blockchain
Inside Android’s SafetyNet Attestation: Attack and Defense
How to cook Cisco: Exploit Development for Cisco IOS.
Turning hard disk drives into accidental microphones
The Java soothsayer: A practical application for insecure randomness vulnerabilities.
FIESTA: an HTTPS side-channel party
The Apple of your EFI: An analysis of the state of Apple’s EFI Security Support


Encryption out of LINE: Reverse engineering end-to-end encrypted messaging
Exploiting A/B Testing for Fun and Profit
#KillTheHashes - El Gran Libro para Colorear Malware
Multiple Vulnerabilities in Schneider-Electric PLC
Let Me GitHub That For You (2016 Argentinian Edition)
Juegos Online, Sociedad y Privacidad: un recorrido socio-histórico
Backdooring CAN Bus for Remote Car Hacking
SAP HANA under the hood: Attacks and countermeasures
I Know Where Your Page Lives: De-randomizing the Windows 10 Kernel
Stratosphere IPS. The free machine learning malware detection for the community
Strolling into Ring-0 via I/O Kit Drivers
Abusing GDI for ring0 exploit primitives: Reloaded
Do-it-Yourself Spy Program: Abusing Apple's Call Relay Protocol
Don't Be a Dummy: A Crash Course in Automotive Security
Genetic Malware: Designing Payloads for Specific Targets
Strolling into Ring-0 via I/O Kit Drivers
Synesthesia: Automated Generation of Encoding-Restricted Machine Code Programs via Bernays-Schönfinkel TQBF
Lost your "secure" HDD PIN? We can help!
Samsung Pay: Numeros Tokenizados y sus Fallas
Look Mom, I don't use Shellcode: Browser Exploitation for Internet Explorer 11


New Age Phreaking: Tácticas y trucos para fraudes en Wholesale
ssl certificate massive analysis..and medical applications fingerprinting
Recovering SAP RFC Credentials from Network Traffic
IR transformation synthesis for assembly instructions
Warranty Void If Label Removed - Attacking MPLS Networks
Abusing GDI for ring0 exploit primitives
Secure DevOps is possible: How osquery is built
Learn about the enemy
Hackeando Carros en Latinoamerica
Crozono: cracking the security perimeter with drones
Faux Disk Encryption: Realities of Secure Storage on Mobile Devices
Satellite TV Receivers: from remote control to root shell
System updates, Attack and Defense
Direct X – direct way to Microsoft Windows kernel
Fuzzing browsers for finding exploitable bugs
Stick That In Your (root)Pipe & Smoke It


Tita, update rápido de nuestro 3er satélite/Dime si estás online y te diré con quien hablas
Hacking RFID Billing Schemes For Fun and Free Rides
Security Monitoring like the NSA (con precios cuidados)
Hacking US (and UK, Australia, France, etc.) traffic control systems
Cooking an APT in the paranoid way
Pointer Subterfuge In The Browser Address Space
IDA Synergy - Collaborative Reverse Engineering
Dissecting and Attacking RMI Frameworks
Explotación práctica de señales de radio con Software Defined Radio
Exploitation of a Hardened MSP430-Based Device
Deep-submicron CPU backdoors
Privacidad: Una historia de desencuentros
Practical String Comparison Timing Attacks
Monitoring malicious domains on the Internet in real time for forensics purposes
Making Android's Bootable Recovery Work For You
Shellcode's map with locks in exports
2 threads, 1 app (Inyección en Dalvik VM)
Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2


Droid Rage: Android exploitation on steroids
Modification to the Android operating system´s resource control
Compromising industrial facilities from 40 miles away
Atacando IPv6 con Evil FOCA
String allocations in Internet Explorer
Defeating Signed BIOS Enforcement
ERP Security: how hackers can open the box and take the jewels
A symbolic execution engine for amd64 binaries
Ahí va el capitán Beto por el espacio
Sandboxing Linux code to mitigate exploiattion
Debbugers are really powerful - Pwning all of the Android things
Wighing in on issues with "Cloud Scale": Hacking the Withings WS-30
Uncovering your trails. Privacy issues of Bluetooth devices
A mystery trip to the origin of Bitcoin


Inception of the SAP Platform's Brain: Attacks to SAP Solution Manager
HTExploit - Bypaseando tu htaccess y más!
Literacy for Integrated Circuit Reverse Engineering.
Bitcoin, MavePay and the future of cryptocurrencies
Cryptographic flaws in Oracle Database authentication protocol
Satellite baseband mods: Taking control of the InmarSat GMR-2 phone terminal
OPSEC: Because Jail is for wuftpd
Welcome to your secure /home, $user
SinFP3: More Than A Complete Framework for Operating System Fingerprinting
Cyberwar para todos
4140 ways your alarm system can fail
Pánico y locura en Java


Bosses love Excel, Hackers too.
Reversing the State:
Exprimiendo la web: obteniendo datos de a gotas para ownear a cualquier argentino
BEAST: Surprising crypto attack against HTTPS
Setting The Evil Bit: Malicious Traffic Hiding In Plain Sight
Leveraging MSR's for Fun and for Profit
The Baseband Playground
Virtualised USB Fuzzing using QEMU and Scapy
Your crown jewels online: Attacks to SAP Web Applications
Experiments using IDA Pro as a data store
iOS Code Injection and Function Hooking
Análisis Forense en dispositivos iOS
Cloud and Control: Factoring and Cracking
Virtual Cash, Show Me The Money
Snakes on a Payload: Bundling Python with your shellcode
SCADA Trojans: Attacking the grid
Open Source Satellite Initiative


Token Kidnapping's Revenge
Pentesting Driven by FOCA es una herramienta gratuita que permite realizar tareas de fingerprinting utilizando
Understanding the Low Fragmentation Heap: From Allocation to Exploitation
Virtually Pwned: Pentesting VMware
Distinguishing Lockpicks: Raking vs Lifting vs Jiggling and More
iPhone Rootkit? There's an App for That!
Atacando VoIP....un paraiso
Understanding the Windows SMB NTLM Weak Nonce Vulnerability
SAP Backdoors: A ghost at the heart of your business
Sandboxing based on SECCOMP for Linux kernel
2x1 Microsoft Bugs: 'Virtual PC hyper-hole-visor' + 'Windows Creation Vulnerability (MS10-048)'
Your life online: No more secrets Marty
Padding Oracles Everywhere


Diez cosas que todos deberían saber son lockpicking y seguridad física
Heurísticas aplicadas a la comparación ( diffeo ) de binarios -
Playing in a Satellite Environment 1.2
Opening Intranets to Attacks by Using Internet Explorer
SCCP hacking, attacking the SS7 & SIGTRAN applications one step further and mapping the phone system
iPhone Hacking: Fuzzing and Payloads
More Tricks For Defeating SSL in Practice


Economies of Scale in Hacking
SAP Penetration Testing & Defense In-Depth
Blackbox Reversing of XSS Filters
Exploring Novelty Ways in Building Botnets
New Tool for Monitoring WiFi: Beholder
(light talk) TCP/IP Protocols security results analisys
A domain specific language for static binary analysis
Unleashing Adobe javascript
In-Depth Anti-Forensics - Challeges of Steganography on Discovery Hidden Data
Tell how you attack and I will tell you who you are
Attacking RSA using a new method of Integer Factorization
Predictive pseudo-random numbers generator in Debian
Code Injection On Virtual Machines


The wayback machine:Old school hacking
NG Debuggers For Reverse Engineering
Attacking the Giants: Explotiting SAP Internals
Evilgrade, "you have pending upgrades..."
KIDS - Kernek Intrusion Detection System
VulnDev as Intelligent debugging
w3af a framwork to own the Web
The Computer Forensics Challenge and Anti-Forensics Techniques