Общая информация
Название SyScan
Тип
Размер 3.89Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
(TOO MUCH) ACCESS POINTS - EXPLOITATION ROUNDUP.mp4 1.44Мб
2009 Syscan - Hacking Citrix.pptx 1.32Мб
20111117_SyScan2011_Visualizing the ghost in the network_en2.pdf 6.73Мб
AlexSyScan12.pdf 12.09Мб
A Link to the Past - Abusing Symbolic Links on Windows.mp4 55.28Мб
All About The Rpc, Lrpc, Alpc, And Lpc In Your Pc By Alex Ionescu.mp4 79.85Мб
All About The Rpc, Lrpc, Alpc, And Lpc In Your Pc By Alex Ionescu.srt 94.66Кб
A Million Little Tracking Devices.pdf 4.26Мб
Andrei Costin - SyScan2010_Taipei_HackingPrintersForFunAndProfit.pdf 1.10Мб
anthony bettini - Testing for vulnerabilities.pdf 333.33Кб
Attack And Defense Toolkits In High Or Low Frequency.mp4 40.30Мб
Attack And Defense Toolkits In High Or Low Frequency.srt 29.64Кб
Attacks on telecom operators and mobile subscribers using SS7.mp4 62.57Мб
AUTOMATED SQL OWNAGE TECHNIQUES.mp4 1.73Мб
Back to the Core.mp4 48.37Мб
BadXNU, a rotten apple.mp4 77.13Мб
BCE3.ppt 481.00Кб
beist_ryan_syscan_2012.pdf 17.80Мб
Ben - kernel.pdf 1.79Мб
Ben Naggy - kernel EN.pdf 1.72Мб
Breaking Anti virus Software By Joxean Koret.mp4 56.62Мб
BRETT MOORE - DEP IN DEPTH.pdf 878.43Кб
bugshop.pdf 1.01Мб
Building A Reasonably Safe Travel Burner Laptop.mp4 74.14Мб
Building A Reasonably Safe Travel Burner Laptop.srt 86.02Кб
Car Hacking for Poories Charlie Miller & Chirs Valasek.mp4 88.95Мб
Car Hacking for Poories Charlie Miller & Chirs Valasek.srt 105.08Кб
Caring Less - De-humanizing Human Vulnerability Assessment.mp4 40.58Мб
christofaro mune - Syscan_10_Taipei_- _Too _much_Access_Points_-_Exploitation_Roundup.pdf 989.53Кб
CLAUDIO CRISCIONE - STANDING ON THE CLOUDS.pdf 2.54Мб
Click And Dagger Denial And Deception On Android Smartphones.mp4 70.66Мб
Click And Dagger Denial And Deception On Android Smartphones.srt 87.57Кб
cmlh - googless - SyScan'09SG - Last Updated 25 June 2009.pdf 16.83Мб
code_signing.pdf 11.43Мб
Conference in Singapore.mp4 1.57Мб
Conference in Singapore (10).mp4 1.47Мб
Conference in Singapore (12).mp4 1.52Мб
Conference in Singapore (13).mp4 1.70Мб
Conference in Singapore (14).mp4 1.52Мб
Conference in Singapore (2).mp4 1.49Мб
Conference in Singapore (3).mp4 1.40Мб
Conference in Singapore (4).mp4 1.27Мб
Conference in Singapore (5).mp4 1.42Мб
Conference in Singapore (6).mp4 1.62Мб
Conference in Singapore (7).mp4 1.48Мб
Conference in Singapore (8).mp4 1.64Мб
Conference in Singapore (9).mp4 1.63Мб
Crash & Pay - Owning and Cloning NFC Payment cards.mp4 39.77Мб
Cryptographic backdooring.mp4 58.72Мб
David Thiel_RIA 900.18Кб
Deep submicron Backdoor By Alfredo Ortega.mp4 42.24Мб
Deep submicron Backdoor By Alfredo Ortega.srt 57.00Кб
De Mysteriis Dom Jobsivs - Syscan.pdf 2.18Мб
DETECTING MALICIOUS DOCUMENTATIONS.mp4 1.64Мб
Dinner Highlights.mp4 2.65Мб
DO NOT TOUCH MY WINNY.mp4 1.64Мб
elson-RIA SECURITY TECHNOLOGY.pdf 1010.93Кб
Embracing The New Threat Towards Automatically Self diversifying Malware.mp4 40.78Мб
Embracing The New Threat Towards Automatically Self diversifying Malware.srt 51.76Кб
Escaping_The_Sandbox_Stephen_A_Ridley_2010.pdf 3.16Мб
Expressing Your Heart s True Desire With Lldb Expressions By @miaubiz.mp4 38.29Мб
Expressing Your Heart s True Desire With Lldb Expressions By @miaubiz.srt 22.31Кб
Fear & Loathing in the Dark Net.mp4 83.67Мб
Finding and exploiting novel flaws in Java software.mp4 55.26Мб
framework.pptx 241.66Кб
From New Zealand With Fail By Dean Carter And Shahn Harris.mp4 48.08Мб
From New Zealand With Fail By Dean Carter And Shahn Harris.srt 26.43Кб
Fuzz in Black Box like a Merlion.mp4 41.18Мб
Getting User Credentials Is Not Only Admin Privilege By Anton Sapozhnikov.mp4 21.30Мб
Getting User Credentials Is Not Only Admin Privilege By Anton Sapozhnikov.srt 14.75Кб
Got Root - Compromising OSX.mp4 44.12Мб
HACKING PRINTERS FOR FUN AND PROFIT.mp4 1.43Мб
Haifei Li - Flash Security Past Present Future.pdf 1.31Мб
Haifei Li - Flash Security Past Present Future CN.pdf 1.34Мб
HARES - Hardened Anti Reverse Engineering System.mp4 65.15Мб
heaps_of_doom.pdf 632.12Кб
HERMES LEI LI & ULYSSES WANG - RIA_security.pdf 1.11Мб
How to own any windows network via group policy hijacking attacks.mp4 78.47Мб
how-to-own-any-windows-network-with-group-policy-hijacking-attacks.htm 29.87Кб
How To Train Your Snapdragon Exploring Power Regulation Frameworks.mp4 37.52Мб
How To Train Your Snapdragon Exploring Power Regulation Frameworks.srt 50.90Кб
INTERCEPTION AND ANALYSIS OF MALICIOUS TRAFFIC.mp4 1.62Мб
IO_You_Own_Presentation.pdf 975.47Кб
iOS 678 Security - A Study in Fail.mp4 75.37Мб
JamesBurton_SycanSG12_Entomology.pdf 2.00Мб
Kevin Stadmeyer CN.pdf 1.11Мб
Kevin Stadmeyer EN.pdf 1005.26Кб
Key value injections here.mp4 29.24Мб
Key value injections here.srt 15.80Кб
KICKING THE VULNERABILITIES OUT OF MICROSOFT PATCHES.mp4 1.70Мб
LAURENT OUDOT - IMPROVING THE STEALTHINESS OF WEB HACKING.pdf 3.59Мб
LAURENT OUDOT - STRIKING BACK WEB ATTACKERS.pdf 3.22Мб
LAURENT OUDOT - STRIKING BACK WEB ATTACKERS.pdf 3.22Мб
LEE LING CHUAN - INTERCEPTION AND ANALYSIS OF MALICIOUS TRAFFIC BASED ON NDIS INTERMEDIATE DRIVER.pdf 4.39Мб
Linux Memory Forensics A Real life Case Study By Georg Wicherski.mp4 49.35Мб
Linux Memory Forensics A Real life Case Study By Georg Wicherski.srt 71.20Кб
LogicCloudMobile 10132011.pdf 3.60Мб
Looking_In_The_Eye_Of_The_Bits.pdf 3.29Мб
LOOK INSIDE MAC OS X - IS IT AS SECURE AS WE EXPECTED.mp4 1.56Мб
Lora The Explorer Attacking And Defending Lora Systems.mp4 45.81Мб
Lora The Explorer Attacking And Defending Lora Systems.srt 58.79Кб
Lucky Draw and Best Speaker by Thomas Lim.mp4 6.17Мб
Lucky Draw and Best Speaker by Thomas Lim.srt 2.74Кб
Lukas - Open Sesame _ SyScan China.pdf 1.53Мб
mac_syscan(2).pdf 3.06Мб
Malware_Classification.pdf 352.76Кб
Meltstorm - lhkf_syscan.odp 1.54Мб
Memory Corruption Is For Wussies.mp4 93.61Мб
Memory Corruption Is For Wussies.srt 67.27Кб
Metafuzz.pptx 302.43Кб
Mission Mpossible By Nils And Jon Butler.mp4 41.08Мб
Mission Mpossible By Nils And Jon Butler.srt 52.21Кб
Mobile money is not ringtones.pdf 6.93Мб
ModernLFHExploitation.pdf 21.52Мб
MOONSOLS WINDOWS MEMORY TOOLKIT.mp4 1.72Мб
Moti Joseph.pdf 1.25Мб
Moti Joseph - Memory corruption exploitation in internet explorer.pdf 1.31Мб
moti joseph - Winny_P2P_Zero_Day.pdf 933.94Кб
Navigating A Sea Of Pwn Windows Phone 8 Appsec By Alex Plaskett And Nick Walker.mp4 45.88Мб
Navigating A Sea Of Pwn Windows Phone 8 Appsec By Alex Plaskett And Nick Walker.srt 52.24Кб
Neyolov Evgeny CN.pdf 1.13Мб
Neyolov Evgeny EN.pdf 1.04Мб
Nguyen Anh Quynh-Syscan09.pdf 661.46Кб
Nguyen - UFO - Syscan Taipei.pdf 335.63Кб
Opening and Welcome Address.mp4 17.95Мб
Opening And Welcome Address By Thomas Lim.mp4 13.57Мб
Opening And Welcome Address By Thomas Lim.srt 15.13Кб
OSX El Capitan Sinking The Ship.mp4 72.81Мб
OSX El Capitan Sinking The Ship.srt 65.92Кб
P1 Security - Telecom Security from SS7 to all-IP all-open LTE and 3G - Philippe Langlois.pdf 9.79Мб
PACKER GENETICS - THE SELFISH CODE.mp4 1.58Мб
PAYLOAD ALREADY INSIDE - DATA RE-USE FOR ROP EXPLOITS.mp4 1.68Мб
Persistent BIOS Infection.pdf 298.58Кб
Practical Smep Bypass Techniques.mp4 54.84Мб
Practical Smep Bypass Techniques.srt 48.59Кб
ProgrammingTheWeirdMachine.pdf 1.09Мб
Pwning Adobe Reader.mp4 61.65Мб
Pwning Adobe Reader.srt 52.64Кб
ReconstructingDalvikApps.pdf 1.16Мб
Remote code execution via Java native deserialization.mp4 53.98Мб
Remote code execution via Java native deserialization.srt 52.81Кб
Renhuan - Chrome.pdf 602.62Кб
Renhuan - The evolution of Chrome security architecture.pdf 505.59Кб
Rfidler By Adam Laurie.mp4 61.31Мб
Rfidler By Adam Laurie.srt 60.57Кб
RIA_presentation.pdf 1.01Мб
Ring 0 to Ring -1 Exploitation with Hyper-V IPC.mp4 87.26Мб
SADE.pptx 473.33Кб
Scientific Best Practices For Recurrent Problems In Computer Security R&d.mp4 45.38Мб
Scientific Best Practices For Recurrent Problems In Computer Security R&d.srt 71.96Кб
Setup For Failure Defeating Secureboot.mp4 33.30Мб
Setup For Failure Defeating Secureboot.srt 46.83Кб
Shooting Elephants.mp4 60.19Мб
SHREERAJ SHAH - RE-RIA.pdf 571.67Кб
SILENT STEPS - IMPROVING THE STEALTHINESS OF WEB HACKING.mp4 1.79Мб
Singapore.mp4 1.11Мб
Singapore (10).mp4 1.20Мб
Singapore (11).mp4 1.05Мб
Singapore (12).mp4 1.20Мб
Singapore (13).mp4 1.21Мб
Singapore (14).mp4 1.13Мб
Singapore (2).mp4 1.05Мб
Singapore (3).mp4 1.06Мб
Singapore (4).mp4 1.05Мб
Singapore (5).mp4 1.18Мб
Singapore (7).mp4 1.08Мб
Singapore (8).mp4 1.18Мб
Singapore (9).mp4 1.03Мб
Smash the Slack.pdf 3.87Мб
Sophail.pdf 993.08Кб
Stefan Esser -UtilizingCodeReuseOrReturnOrientedProgrammingInPHPApplicationExploits.pdf 886.50Кб
Stegosploit - Hacking with Pictures.mp4 71.57Мб
STRIKING BACK WEB ATTACKERS.mp4 1.74Мб
Syscan_Shreeraj_Shah.pdf 481.31Кб
SysCan_Singapore2009_Ridley.ppt 2.08Мб
syscan-09_charles-miller.pdf 10.55Мб
SyScan09-StateOfTheArtPostExploitationInHardenedPHPEnvironments.pdf 5.77Мб
SyScan 11 Singapore A Million Little Tracking Devices.mp4 58.14Мб
SyScan 11 Singapore Fine-Gerained Tracing Without Binary Instrumentation.mp4 26.64Мб
SyScan 11 Singapore Fuzzing and Debugging Cisco IOS.mp4 51.77Мб
SyScan 11 Singapore Gold or Amalgam, how to find weak fixes.mp4 36.33Мб
SyScan 11 Singapore Inglourious Hackerds Targetting Web Clients.mp4 52.69Мб
SyScan 11 Singapore Looking into the Eye of the Bits - Memory Analysis.mp4 42.11Мб
SyScan 11 Singapore Malware Classification Using Call Graphs.mp4 30.54Мб
SyScan 11 Singapore Mobile Money is not a Ringtone.mp4 27.83Мб
SyScan 11 Singapore Opening and Welcome Address.mp4 14.79Мб
SyScan 11 Singapore PassWindow - your secure window on the internet.mp4 14.61Мб
SyScan 11 Singapore Securing the World of Avatar.mp4 8.44Мб
SyScan 11 Singapore Targeting the iOS Kernel.mp4 10.38Мб
SyScan 11 Singapore Telecom Singaling attacks on 3G and LTE networks from SS7 to all-IP,all open.mp4 35.03Мб
SyScan 11 Singapore The Exploit Shop Bugs as Business.mp4 30.02Мб
SyScan 11 Singapore The road of a bug hunter.mp4 37.57Мб
syscan-12.pdf 1.22Мб
syscan12-exploitinglinux.pdf 1.23Мб
SyScan15 Alex Ionescu - Ring 0 to Ring -1 Attacks.pdf 2.31Мб
SyScan15 David Jorm - Finding and exploiting novel flaws in Java software.pdf 620.41Кб
SyScan15 Dmitry Kurbatov - Attacks on telecom operators and mobile subscribers using SS7.pdf 2.51Мб
SyScan15 Fabien Duchene - Fuzz in Black Box Like a Merlion.pdf 4.47Мб
SyScan15 Ian Beer - got root Compromising OS X.pdf 164.56Кб
SyScan15 Jacob Torrey - Hardened Anti-Reverse Engineering System.pdf 3.02Мб
SyScan15 James Forshaw - A Link to the Past.pdf 2.73Мб
SyScan15 JP Aumasson - Cryptographic Backdooring.pdf 4.49Мб
SyScan15 Laura Bell - Caring Less - De-humanizing Human Vulnerability Assessment.pdf 1.02Мб
SyScan15 Pedro Vilaca - BadXNU a rotten apple 37.04Мб
SyScan15 Peter Fillmore - Crash and Pay_ Owning and Cloning NFC Payment cards.pdf 13.48Мб
SyScan15 Peter Hlavaty - Back To The CORE.pdf 2.23Мб
SyScan15 Raphael Rigo - The challenges in designing a secure hard drive.pdf 760.22Кб
SyScan15 Saumil Shah - STEGOSPLOIT - HACKING WITH PICTURES.pdf 8.59Мб
SyScan15 Stefan Esser - iOS 678 Security - A Study in Fail.pdf 4.38Мб
SyScan15 Yuki Chen - The Birth of a Complete IE11 Exploit Under the New Exploit Mitigations.pdf 1.50Мб
Syscan-2009-Singapore Berne Campbell Ghost Recon - Subverting Local Networks pdf 1.63Мб
SyScan2011_Amalgam_Gold_Schoenefeld.pdf 2.12Мб
Syscan2011-CiscoIOS-Aortega-Smuniz.pdf 721.53Кб
Syscan2012_BrettMoore.pdf 1.31Мб
SyScan2012_StefanEsser_iOS_Kernel_Heap_Armageddon.pdf 2.25Мб
Syscan 2012 - iOS Applications and the Lion City - Presso.pdf 2.97Мб
SyScan2013_DAY1_SPEAKER02_HALVAR_FLAKE_Checking_the_boundaries_of static_analysis.pdf 108.01Кб
SyScan2013_DAY1_SPEAKER03_Nguyen_Anh_Quynh_Opticode.pdf 541.04Кб
SyScan2013_DAY1_SPEAKER04_Mario_Heiderich_innerhtml_apocalypse.pdf 1.98Мб
SyScan2013 DAY1 SPEAKER05 Georg WIcherski Taming ROP ON SANDY BRIDGE syscan pdf 686.71Кб
SyScan2013 DAY1 SPEAKER06 Hubert iSniff GPS-Virtual Wardriving-Syscan 2013 Slides pdf 12.59Мб
SyScan2013_DAY2_SPEAKER08_Alex_Ionescu_Hotpatching_the_HotPatcher.pdf 13.63Мб
SyScan2013 DAY2 SPEAKER09 j00ru Coldwind Exploiting Kernel Race Conditions Found via Memory Access Patterns pdf 3.02Мб
SyScan2013 DAY2 SPEAKER10 Pedro Vilaca Revisiting Mac OSX Kernel Rootkits pdf 3.31Мб
SyScan2013_DAY2_SPEAKER11_Miaubiz_Coaching_A_Squad_of_Allwinners.pdf 6.03Мб
SyScan2013 DAY2 SPEAKER12 Stefan Esser Mountain Lion iOS Vulnerabilities Garage Sale pdf 8.64Мб
SyScan2014_AdamLaurie_RFIDler.pdf 8.83Мб
SyScan2014_AlexIonescu_AllabouttheRPCLRPCALPCandLPCinyourPC.pdf 1.09Мб
SyScan2014_AlexPlaskett_NavigatingaseaofPwnWindowsPhone8AppSec_WP.pdf 1.26Мб
SyScan2014_AlexPlaskett_NavigatingaseaofPwnWindowsPhone8AppSec.pdf 931.12Кб
SyScan2014_AlfredoOrtega_DeepSubmicronBackdoor_WP.pdf 854.88Кб
SyScan2014_AlfredoOrtega_DeepSubmicronBackdoor.pdf 2.18Мб
SyScan2014 AntonSapozhnikov GettingUserCredentialsisnotonlyAdminsPrivilege WP pdf 775.78Кб
SyScan2014 AntonSapozhnikov GettingUserCredentialsisnotonlyAdminsPrivilege pdf 862.25Кб
SyScan2014_CharlieMiller_CarHackingforPoories_WP.pdf 6.89Мб
SyScan2014_CharlieMiller_CarHackingforPoories.pdf 10.46Мб
SyScan2014_CoreyKallenberg_SetupforFailureDefeatingSecureBoot_WP.pdf 88.99Кб
SyScan2014_CoreyKallenberg_SetupforFailureDefeatingSecureBoot.pptx 5.44Мб
SyScan2014 DanielBilar ScientificBestPracticesforRecurrentProblemsinComputerSecurityRD WP pdf 374.98Кб
SyScan2014 DanielBilar ScientificBestPracticesforRecurrentProblemsinComputerSecurityRD pdf 3.70Мб
SyScan2014_DeanCarter_FromNZWithFail.pdf 20.43Мб
SyScan2014_GeorgWicherski_LinuxMemoryForensicsARealLifeCaseStudy.pdf 965.29Кб
SyScan2014 JoshThomas HowtoTrainyourSnapDragonExploringPowerRegulationFrameworksonAndroid WP pdf 1.05Мб
SyScan2014 JoshThomas HowtoTrainyourSnapDragonExploringPowerRegulationFrameworksonAndroid pdf 15.62Мб
SyScan2014_JoxeanKoret_BreakingAntivirusSoftware.pdf 1.30Мб
SyScan2014 MathiasPayer EmbracingtheNewThreatTowardsAutomaticallySelfDiversifyingMalware WP pdf 147.42Кб
SyScan2014 MathiasPayer EmbracingtheNewThreatTowardsAutomaticallySelfDiversifyingMalware pdf 2.59Мб
SyScan2014_Snare_ThunderboltsandLightningVeryVeryFrightening.pdf 10.27Мб
SYSCAN-SG-2011_TEHTRI-Security_v2.pdf 3.84Мб
SyScanTaipei2011_StefanEsser_iOS_Kernel_Exploitation_IOKit_Edition.pdf 4.07Мб
SyScan thank you.txt 1018б
SysScan-Singapore-Targeting_The_IOS_Kernel.pdf 8.01Мб
Taipei.mp4 1.21Мб
Taipei (2).mp4 1.19Мб
Taipei (3).mp4 1.20Мб
take2talk.pdf 5.07Мб
TarjeiMandt-whod_syscan.pdf 4.84Мб
TESTING FOR VULNERABILITIES WITHOUT TRIGGERING IPS SIGNATURES.mp4 1.56Мб
The Birth of a Complete IE11 Exploit Under the New Exploit Mitigations.mp4 65.97Мб
The challenges of designing a secure encrypted hard drive.mp4 55.81Мб
THE WEB BROWSER TESTING SYSTEM.mp4 1.60Мб
Thunderbolts And Lightning Very Very Frightening By Snare And Rzn.mp4 46.81Мб
Thunderbolts And Lightning Very Very Frightening By Snare And Rzn.srt 63.02Кб
TOM GALLAGHER & DAVID CONGER - Office 2010 Engineering.pptx 643.63Кб
TOM GALLAGHER & DAVID CONGER - Office 2010 Engineering.pptx 643.63Кб
Tora - ReCon2010.pdf 627.04Кб
travis goodspeed_syscan10sing2.pdf 5.95Мб
TT DARK - Smashing iOS apps for fun and profit CN.pdf 2.96Мб
TT DARK - Smashing iOS apps for fun and profit EN.pdf 2.88Мб
Tu Yan Hui - syscan.ppt 3.44Мб
UFO - OPERATING SYSTEM FINGERPRINTING FOR VIRTUAL MACHINES.mp4 1.64Мб
UTILIZING CODE REUSE RETURN ORIENTED PROGRAMMING IN PHP WEB APPLICATION EXPLOITS.mp4 1.43Мб
Virtualization System Vulnerability Discovery Technology.mp4 41.46Мб
Virtualization System Vulnerability Discovery Technology.srt 16.54Кб
Vote for the Best Speaker and Lucky Draw.mp4 15.58Мб
Wang Yu - font.pdf 1.27Мб
Wang Yu - font EN.pdf 1.08Мб
Wayne - SYSCAN12.pdf 1.53Мб
Wayne - SYSCAN12 EN.pdf 1.50Мб
Web Application Security and Database Audit Miscs.ppt 1.88Мб
Whiskey Con Speaker 1.mp4 6.03Мб
Whiskey Con Speaker 2.mp4 8.23Мб
Whiskey Con Speaker 2.srt 10.43Кб
Whiskey Con Speaker 3.mp4 17.90Мб
Whiskey Con Speaker 3.srt 20.50Кб
Whiskey Con Speaker 4.mp4 4.23Мб
Whiskey Con Speaker 4.srt 4.87Кб
Whiskey Con Speaker 5.mp4 12.21Мб
Whiskey Con Speaker 5.srt 9.80Кб
Whiskey Con Speaker 6.mp4 4.47Мб
Whiskey Con Speaker 6.srt 4.10Кб
Whiskey Con Speaker 7.mp4 2.17Мб
Whiskey Con Speaker 7.srt 1.59Кб
Whiskey Con Speaker 8.mp4 9.94Мб
Whiskey Con Speaker 8.srt 11.12Кб
Whiskey Con Speaker 9.mp4 757.03Кб
Whiskey Con Speaker 9.srt 565б
WhiskyCon #1.mp4 14.90Мб
WhiskyCon #2.mp4 26.46Мб
WhiskyCon #3.mp4 8.06Мб
WhiskyCon #4.mp4 15.12Мб
WhiskyCon #5.mp4 6.57Мб
WhiskyCon #6.mp4 12.56Мб
WhiskyCon #7.mp4 10.80Мб
WhiskyCon #8.mp4 18.36Мб
WhiskyCon #9.mp4 16.78Мб
Windows Systems & Code Signing Protection.mp4 31.70Мб
Xenpwn Breaking Paravirtualized Devices.mp4 60.81Мб
Xenpwn Breaking Paravirtualized Devices.srt 67.55Кб
XuHao Chen Xiaobo - Find Your Own iOS Kernel Bug CN.pdf 3.75Мб
XuHao Chen Xiaobo - Find Your Own iOS Kernel Bug EN.pdf 3.78Мб
XU HAO - Look_inside_Mac_OS_X_v2.pdf 9.09Мб
Похожие торрент-файлы
3.56Гб
12.50Гб
4.21Гб
1.64Гб
1.40Гб
5.39Гб
9.37Гб
15.01Гб
1.04Гб
23.87Гб
Статистика распространения по странам
США (US) 5
Турция (TR) 2
Сингапур (SG) 1
Всего 8
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент