OffensiveCon19 - Ned Williamson - Modern Source Fuzzing
OffensiveCon19 - Samuel Groß - FuzzIL: Guided Fuzzing for JavaScript Engines
OffensiveCon19 - Andrey Konovalov - Coverage-Guided USB Fuzzing with Syzkaller
OffensiveCon19 - Emeric Nasi - Bypass Windows Exploit Guard ASR
OffensiveCon19 - Alex Ionescu - Keynote - Reversing Without Reversing
OffensiveCon19 - Luc Reginato - Updated Analysis of PatchGuard on Windows RS4
OffensiveCon19 - Jason Matthyser - 3D Accelerated Exploitation
OffensiveCon19 - Lucian Cojocar - Reverse Engineering of Error-Correcting Codes
OffensiveCon19 - Alex Matrosov - Attacking Hardware Root of Trust from UEFI Firmware
OffensiveCon19 - Sergei Volokitin - Glitch in the Matrix: Exploiting Bitcoin Hardware Wallets
OffensiveCon19-Eloi Benoist-Vanderbeken -macOS: How to Gain Root with CVE-2018-4193 in less than 10s
OffensiveCon19 - Niklas Baumstark - IPC You Outside the Sandbox: One bug to Rule the Chrome Broker
OffensiveCon19 - Tyler Bohan - OSX XPC Revisited - 3rd Party Application Flaws
OffensiveCon19 - Daniel King, Shawn Denbow - Growing Hypervisor 0day with Hyperseed
OffensiveCon19 - Bruno Keith - Attacking Edge Through the JavaScript Just-In-Time compiler
OffensiveCon19 - Spelman, Gorenc, Hariri - Bugs so Nice they Patched them Twice!
Was ist ein Honeypot?
Concolic execution using River
Attacking ECMAScript Engines With Redefinition
OffensiveCon Trailer