Hack.lu 2018: The Path Towards Automated Heap Exploitation - Thaís Moreira Hamasaki
Thaís Moreira Hamasaki - The (not so profitable) Path towards Automated Heap Exploitation
The Path Towards Automated Heap Exploitation Thaís Moreira Hamasaki
USENIX Security '18 - Automatic Heap Layout Manipulation for Exploitation
Hack.lu 2018: Abusing Bash For Windows - Antoine Cervoise
The Path Towards Automated Heap Exploitation Thais Hamasaki
Hack.lu 2018: Real World: Threat Intelligence - Elle Armageddon
Hack.lu 2018: Hypervisor-Level Debugger: Benefits And Challenges - Mathieu Tarral
Hack.lu 2018: Only An Electron Away From Code Execution - Silvia Väli
Hack.lu 2018: Make ARM Shellcode Great Again - Saumil Udayan Shah
Hack.lu 2018: Bypassing ISP And Enterprise Anti-DDoS With 90's Technology - Dennis Rand
Hack.lu 2018: What The Fax?! - Eyal Itkin and Yaniv Balmas
Hack.lu 2018 LT: PKI Demo With Physical Locks - Gunstick
Hack.lu 2018: Modern Pentest Tricks For Faster, Wider, Greater Engagements - Thomas Debize
Hack.lu 2018: The Snake Keeps Reinventing Itself - Jean-Ian Boutin and Matthieu Faou
Introduction To GLIBC Heap Exploitation - Max Kamper
Hack.lu 2018: p≡p - Pretty Easy Privacy For Everyone! - Sva
Hack.lu 2018 LT: Modify RO Data - Michael Hamm
Automatic Runtime Analysis : tcache poisoning [heap exploitation]
Hack.lu 2018: How To Hack A Yacht - Swimming IoT - Stephan Gerling