Black Hat Courses
Black Hat via YouTube A Universal Way to Exploit Android PendingIntents in High-profile and System Apps
Black Hat via YouTube New Ways of IPv6 Scanning
Black Hat via YouTube A Titan M Odyssey
Black Hat via YouTube How Your E-book Might Be Reading You - Exploiting EPUB Reading Systems
Black Hat via YouTube One Glitch to Rule Them All - Fault Injection Attacks Against the AMD Secure Processor
Black Hat via YouTube Lost in the Loader - The Many Faces of the Windows PE File Format
Black Hat via YouTube Hand in Your Pocket Without You Noticing - Current State of Mobile Wallet Security
Black Hat via YouTube The Art of Exploiting UAF by Ret2bpf in Android Kernel
Black Hat via YouTube Achieving Linux Kernel Code Execution Through a Malicious USB Device
Black Hat via YouTube