REPOSITORY

 

The materials and videos from the previous editions of our events are now available for download and streaming on GitHub and YouTube. You can download them by clicking on the links.

 

Talk Title Author Download Video
Bypassing Trusted Boot thru microcode downgrade (H2HC) Alexander Ermolov
Launching feedback-driven fuzzing (H2HC) Andrey Akimov
Embedded Research & Automation (H2HC) Brian Butterly
Deconstructing the phishing campaigns that target Gmail users (H2HC) Bursztein & Oliveira
Modern Heap Exploitation The Poison NULL byte (H2HC) Daniel Medina
Keynote Thinking Outside the Box (H2HC) Dino Dai Zovi
Keynote OSS Security, here be dragons! (H2HC) Fermin Serna
Network Reconnaissance Adventures in IPv6 Land (H2HC) Fernando Gont
Crash Analysis with Reverse Taint (H2HC) Marek Zmyslowski
Oh Memset Where Did You Go (H2HC) Marion Marschalek
Trashing like its 1999 (H2HC) Matias Soler
Under Pressure (H2HC) Raz & Einhorn
Finding format strings with and in binary ninja (H2HC) Vasco Franco
Machete 9 Years of Cyber Espionage (H2HC) Veronica Valeros
Raspy on Aircraft (H2HC University) Bordini & Diego
Windows Objects Exploitation (H2HC University) Bruno Oliveira
Construindo Bootkits (H2HC University) Joao Victorino
Anti-Tamper em Maquinas de Cartao (H2HC University) Julio Della Flora
Como Detectar uma Bomba Atomica (H2HC University) Lucas Ferreira
Dissecting a Linux Kernel Exploit - QEMU Demo Capture (H2HC University) Scotti & Hamasaki
Dissecting a Linux Kernel Exploit (H2HC University) Scotti & Hamasaki
Keynote Securing Cyber-Physical Systems (H2HC University) Stefano Zanero
Talk Title Author Download Video
Sonic Attacks to Spinning HDs (H2HC) Alfredo Ortega
Embedded Fuzzing (H2HC) Anh Quynh & Lau
SMAPwn (H2HC) Artem Shishkin
DSL Dismantling Secret Layers (H2HC) Brian Butterly
Hacking the International RFQ (H2HC) Dino Covotsos
Constraint Solvers for Reverse Engineering (H2HC) Edgar Barbosa
Visualization (H2HC) Edmond Rogers
Evoting from Argentina to the World (H2HC) Ivan Oro
Keynote (H2HC) Jayson Street
Attacking VMware NSX (H2HC) Luft & Harrie
GCC is the New Pink (H2HC) Marion Marschalek
Kernel Rootkits (H2HC) Matveychikov & f0rb1dd3
All the Tiny Features (H2HC) Natalie Silvanovich
Abusando da Virtualizacao (H2HC University) Gabriel Barbosa
Cracking Craptcha (H2HC University) Gustavo Scotti
A little bit about Code Injection in Web App Frameworks (H2HC University) Joao Matos
Fault Injection Attacks (H2HC University) Julio Della Flora
SegDSP (H2HC University) Lucas Teske
Cyber Mercenaries (H2HC University) MIchelle Ribeiro
Internet of Sh1t (H2HC University) Maycon Vitali
Splitter Paper & Slides (H2HC University) Rener Silva
The path towards automated heap exploitation (H2HC University) Thais Moreira Hamasaki
Talk Title Author Download Video
Betraying the BIOS (H2HC) Alex Matrosov
Attacking Cellular Devices (H2HC) Butterly & Schmidt
UEFI BIOS Holes (H2HC) Ermolov & Zakirov
Hackig Smart Home Devices (H2HC) Fernando Gont
50 Shades of VisualStudio (H2HC) Marion Marschalek
Medical Records Black Market (H2HC) Matias Katz
Porosity (H2HC) Matt Suiche
Pentesting DevOps Environments (H2HC) Matthias Luft
Keynote Notes (H2HC) Mike Ossmann
Bioinformatics in SP (H2HC) Nina Alli
Software Attacks on Different Type of System Firmware (H2HC) Oleksandr Bazhaniuk
Content Security Policy (H2HC) Sergey Shekyan
Keynote (H2HC) Shay Gueron
Chris & Daniel-Badge H2HC (H2HC) University
Leave Crypto Alone (H2HC University) Diego Aranha
Data Mining Using Tracing and Profiling Tools (H2HC University) Francisco Junior
Introdução à Virtualização (H2HC University) Gabriel Negreira Barbosa
IA para Web Attacks (H2HC University) Glaudson Ocampos
ParasiteOS (H2HC University) Gustavo Scotti
Overview of Deserialization Vulns in the Java VM (H2HC University) Joao Figueiredo
Cripto HW com FPGA (H2HC University) Luckas Farias
Keynote (H2HC University) Nelson Brito
Firmware is the new Black (H2HC University) Rodrigo Branco
SMT Solvers (H2HC University) Thais Hamasaki
Hacking Ultrasound Machines (H2HC University) Victor Pasknel
PenTest Evolution and Tricks (H2HC University) Ygor Parreira
Talk Title Author Download Video
Risk-based design for Evenchik & Zanero
Android Resiliency Defense Strategy Felipe Boeira
The intersection between virtualization and security Gabriel Barbosa
Voting Among Sharks Guasch & Choliz
Introduction to the Witchcraft Compiler Collection Jonathan Brossard
Lost your secure HDD PIN, We can help Lenoir & Rigo
Rogue Behavior Detection Marion Marschalek
UEFI Firmware Rootkits Myths and Reality Matrosov & Rodionov
Dumbster Driving Schmidt & Butterly
Keynote Shay Gueron
Breaking the bank Thiago Valverde
Talk Title Author Download Video
Talk Title Author Download Video
Talk Title Author Download Video
Talk Title Author Download Video
Talk Title Author Download Video
I know Kung-Fu - Analyzing Mobile Malware Alex Kirk
Some Research Directions in Automated Pentesting Carlos Sarraute
Anatomy of a Remote Kernel Exploit Dan Rosenberg
Control Flow Analysis Edgar Barbosa
How to take over the TOR network operationally Eric Filiol
The Science of Insecurity Len Sassman
Analyzing the attack surface of kernel registry files Matthieu Suiche
Talk Title Author Download Video
Detecting Obfuscated Malicious JavaScript with Snort and Razorback Alex Kirk
Urgente - Hackers causaram a eruopcao do vulcao Eyjafjallajokull Anchises de Paula
Strategies for Evolving Threats Andrew Cushman
Finding bugs and publishing advisories - the Core Security way Carlos Sarraute
Sandboxes Uncovered - Desmistificando sistemas de analise de malware Dario Filho
Malicious Cryptography Techniques for Unreversable binaries Eric Filiol
The EDB Project Fernando Merces
Generic exploitation of invalid memory writes Jonathan Brossard
Ainda quer tc Jordan Bonagura
Blue Screen of Death is Dead Matthieu Suiche
Hacking the Fast Lane - security issues in 802 Oliveira & Havelt
Realidade das Botnets Atuais Ranieri Romera
HTML5 Seguro ou Inseguro Wagner Elias
Talk Title Author Download Video
Life Cycle of a Snort Rule - From Vulnerability to Coverage Alex Kirk
Privacidade na era da internet Anderson Ramos
w3af Andres Riancho
Breaking the perimeter through human stupidity Bruno Oliveira
Probabilistic Attack Planning in Network + Webapps Scenarios Carlos Sarraute
Token Kidnapping's Revenge Cesar Cerrudo
Taint Analysis Edgar Barbosa
Ring 0x64 Gustavo Scotti
Brute-forcing HD Encryption Systems Jonathan Brossard
Netifera platform demo Juliano Rizzo
The Departed Exploit Next Generation Nelson Brito
The Departed Exploit Next Generation Nelson Brito
Abusing Bitmask Nicolas Waisman
Ciber-Terrorismo, Hacktivismo religioso Paulo Roizman
Toward the HLR, attacking the SS7 & SIGTRAN Philippe Langlois
The Reverse Engineering Intermediate Language REIL and its Applications Sebastian Porst
Anti-Anti-Forense Tony Rodrigues
Playing Web Fuzzer Wagner Elias
Kernel do Windows - Historia, Evolucao e Debug Weber Ress
Talk Title Author Download Video
Hypervisor Framework Edgar Barbosa
Analise de Seguranca do Protocolo Wireless USB Felipe Zimmerle
Raising GPRS Security Awareness by Observing Real World Security Guto Motta
Playing with Web Application Firewalls Henrique & Gauci
Practical Introduction to Reverse Engineering Julio Auto
PCI Rootkits Lopes & Correa
Apology of 0days Nicolas Waisman
Defeating DEP, the Immunity Debugger way Pablo Sole
Hacking into Samba Rodrigo Costa
Onde estao as ferramentas de seguranca do Brasil Ronaldo Vasconcelos
Secure The Planet! New Strategic Initiatives from Microsoft to Rock your World Steve Adegbite
Extreme Web Hacking Wagner Elias
Talk Title Author Download Video
Hacking well-protected databases Alexander Kornbrust
DNS Amplification Attack Bruno Oliveira
The Computer Forensics Challenge and Anti-Forensics Techniques Domingo Montanaro
Detecting Blue Pill Edgar Barbosa
Capture the Flag Results Intruders Tiger Team
Next-Generation Debuggers for Reverse Engineering Julio Auto
Hacking iPod Touch & iPhone Marcos Azevedo
PE Binary Infection Maycon Vitali
Hacking the big brother Moreira & Fort
KIDS - Kernel Intrusion Detection System Rodrigo Branco
Hacking into Apache Rodrigo Costa
Call for Papers The Bug Magazine
REST Insecurity Wagner Elias
Malwares x AntiVirus Wendel Henrique
Talk Title Author Download Video
Syscall Proxying or Pivoting Balestra & Branco
Process Infection Carlos Barros
Polutin sys_execve Federico Kirschbaum
Lock Picking Fleury & Souza
Shellcode Evolution Itzik Kotler
Rootkits kernel 2 Julio Auto
Rootkits kernel 2 Julio Auto
Old School Hacking Julio Cesar Fort
Hostile Wireless Ambients Luiz Eduardo
VoIP Insecurity Luiz Eduardo
Introducao a Engenharia Reversa Maycon Vitali
Windows Driver Development Kit (Driver Exploitation) Rodrigo Costa
Talk Title Author Download Video
Dog Crawler x PHP_GUARD Bruno Ramos
Anti-Forensics Domingo Montanaro
Fun with Assembly Everson Tavares
Linux Kernel Exploiting Nash & dum_dum
Vulnerabilidades em Aplicacoes Bluetooth Nelson Rufino
Backdoors x Firewalls de Applicacao - Praticando em Kernel Linux Rodrigo Branco
Discovering Vulnerabilities Rodrigo Costa
Breaking PaX ASLR in the Wild Tiago Assumpcao
Talk Title Author Download Video
OSSTMM-br Eduardo Neves
OSSTMM-en Eduardo Neves
Deteccao e Ataques a HoneyPots-br Felix Junior
Deteccao e Ataques a HoneyPots-en Felix Junior
Ataques em redes Wi-Fi-br Nelson Rufino
Ataques em redes Wi-Fi-en Nelson Rufino
Assinaturas de Ataques-br Rodrigo Branco
Assinaturas de Ataques-en Rodrigo Branco
Cryptography and Clusters-br Rodrigo Costa
Cryptography and Clusters-en Rodrigo Costa