![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | Andrea Pompili - Anonymous Fraudster of the New Age.pdf | 2019-03-07 13:10 | 4.4M | |
![[ ]](/icons/layout.gif) | BlackHat DC 2011 - Forgotten World - Corporate Business Application Systems.pdf | 2019-03-07 15:24 | 407K | |
![[ ]](/icons/layout.gif) | BlackHat DC 2011 Grand Workshop.pdf | 2016-05-31 01:01 | 4.1M | |
![[ ]](/icons/layout.gif) | Black Hat SEO.pdf | 2019-03-07 13:10 | 14K | |
![[ ]](/icons/layout.gif) | Black Hat Search Engine Optimisation.pdf | 2019-03-07 13:10 | 558K | |
![[DIR]](/icons/folder.gif) | BlackHole Exploit Kit/ | 2021-04-19 18:01 | - | |
![[ ]](/icons/layout.gif) | Caffeine Monkey - Automated Collection, Detection and Analysis of Malicious JavaScript.pdf | 2019-03-07 13:10 | 390K | |
![[ ]](/icons/layout.gif) | CrowdSource - Applying machine learning to web technical documents to automatically identify malware capabilities.pdf | 2019-03-07 13:10 | 2.6M | |
![[ ]](/icons/layout.gif) | Deactivate the Rootkit: Attacks on BIOS anti-theft Technologies.pdf | 2019-03-07 13:10 | 164K | |
![[ ]](/icons/layout.gif) | Defending BlackBox Web Applications.pdf | 2019-03-07 13:10 | 882K | |
![[ ]](/icons/layout.gif) | Defending your DNS in a post-Kaminsky World.pdf | 2019-03-07 13:10 | 2.6M | |
![[ ]](/icons/layout.gif) | Deobfuscator - An Automated Approach to the Identification and Removal of Code Obfuscation.pdf | 2019-03-07 13:10 | 2.7M | |
![[ ]](/icons/layout.gif) | Exploring the NFC Attack Surface.pdf | 2019-03-07 13:10 | 5.6M | |
![[ ]](/icons/layout.gif) | Finding the Linchpins of the Dark Web: A Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.pdf | 2019-03-07 13:10 | 1.0M | |
![[ ]](/icons/layout.gif) | Gizmo - A Lightweight Open Source Web Proxy.pdf | 2019-03-07 13:10 | 335K | |
![[ ]](/icons/layout.gif) | Hacking Without Re-Inventing the Wheel.pdf | 2019-03-07 13:10 | 222K | |
![[ ]](/icons/layout.gif) | How to Get Your Website Found.pdf | 2019-03-07 13:10 | 1.1M | |
![[ ]](/icons/layout.gif) | How to unwrap PLSQL.pdf | 2019-03-07 13:10 | 1.0M | |
![[ ]](/icons/layout.gif) | Investigating Individuals and Organizations using Open Source Intelligence.pdf | 2019-03-07 13:10 | 7.8M | |
![[ ]](/icons/layout.gif) | Neat, New, and Ridiculous Flash Hacks.pdf | 2019-03-07 13:10 | 2.0M | |
![[ ]](/icons/layout.gif) | Over the Air Cross Platform Infection for Breaking mTAN-based Online Banking Authentication.pdf | 2019-03-07 13:10 | 1.4M | |
![[ ]](/icons/layout.gif) | PDF Attack - A Journey from the Exploit Kit to the Shellcode.pdf | 2019-03-07 13:10 | 1.2M | |
![[ ]](/icons/layout.gif) | Physical Memory Forensics.pdf | 2019-03-07 13:10 | 446K | |
![[ ]](/icons/layout.gif) | The Black Hat Bible.pdf | 2019-03-07 13:24 | 210K | |
![[ ]](/icons/layout.gif) | US13 Wroblewski - The Web is Vulnerable - XSS Defense on the Battlefront.pdf | 2019-03-07 16:02 | 12M | |
![[ ]](/icons/layout.gif) | Universal DDoS Mitigation Bypass.pdf | 2019-03-07 13:10 | 4.2M | |
|