OffensiveCon23 - Guillaume Teissier and Quentin Minster
OffensiveCon23 - Dave Aitel - Information Security Is an Ecology of Horrors and You Are the Solution
OffensiveCon23 - Pietro Borrello - CustomProcessingUnit
OffensiveCon23 - Alex Matrosov & Alex Ermolov - A Dark Side of UEFI: Cross-Silicon Exploitation
OffensiveCon23 - Natalie Silvanovich - How to Hack Shannon Baseband (from a Phone)
OffensiveCon23 - Yarden Shafir - Your Mitigations Are My Opportunities
OffensiveCon23 - Hao Xu - Keynote - Changing and Unchanged Things in Vulnerability Research
OffensiveCon23 - Moshe Kol - Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel
OffensiveCon23 - Amat Cama - ASN.1 and Done: A Journey of Exploiting ASN.1 Parsers in the Baseband.
OffensiveCon23 - Alex Plaskett & Cedric Halbronn - Exploit Engineering – Attacking the Linux Kernel
OffensiveCon23 - Ian Beer - MacDirtyCow – Auditing and Exploiting XNU Virtual Memory
OffensiveCon23 - Pan Zhenpeng - Unearthing Vulnerabilities in the Apple Ecosystem
OffensiveCon23 - Mark Brand - What’s in a Name?
OffensiveCon23 - Markus Vervier - Embedded Threats
OffensiveCon23 - Samuel Groß & Carl Smith - Advancements in JavaScript Engine Fuzzing
OffensiveCon23- Maddie Stone & James Forshaw- The Print Spooler Bug that Wasn’t in the Print Spooler
OffensiveCon23 - Martijn Bogaard - New Phones, Software & Chips = New Bugs?
OffensiveCon23 - Stacksmashing- Inside Apple’s Lightning: JTAGging the iPhone for Fuzzing and Profit
31. OffensiveCon 23: il racconto #offensivecon23 #cybersecurity
OffensiveCon Trailer