项目作者: comaeio

项目描述 :
OPCDE Cybersecurity Conference Materials
高级语言: C++
项目地址: git://github.com/comaeio/OPCDE.git
创建时间: 2017-04-25T06:24:41Z
项目社区:https://github.com/comaeio/OPCDE

开源协议:

下载


OPCDE

OPCDE Materials (2017-2019)

OPCDE started in 2017 and had the pleasure to welcome to below speakers since its creation.

2019

U.A.E.

  • Automated Reverse Engineering of Industrial Control Systems Binaries - Mihalis Maniatakos (@realmomalab)
  • Using Symbolic Execution to Root Routers - Mathy Vanhoef (@vanhoefm)
  • Evolving Attacker Techniques in Account Takeover - Philip Martin (@securityguyphil)
  • Lions at the watering hole - Andrei Boz (@dekeneas)
  • Next Gen IoT Botnets - owning 450.000 devices from a single vendor - Alex “Jay” Balan (@jaymzu)
  • Danger of using fully homomorphic encryption,a look at Microsoft SEAL - Zhiniang Peng (@edwardzpeng)
  • (SAP) Gateway to Heaven - Mathieu Geli & Dmitry Chastuhin (@gelim, @_chipik)
  • NTLM Relay Is Dead,NO, this is impossible - sanr, Yang Zhang (@by_sanr, @izykw)
  • Modern Secure Boot Attacks: Bypassing Hardware Root of Trust from Software - Alex Matrosov (@matrosov)
  • Practical Uses for Memory Visualization - Ulf Frisk (@UlfFrisk)
  • Trade War: Shellcode’s Wielding of Imports and Exports - Willi Ballenthin (@williballenthin)
  • WhatsApp Digger - Deemah A Alotaibi, Lamyaa S Alsaleem, Malak F Aldakheel, Sarah A Alqhtani (@_Saraque @Lamya_Alsleem @DeemaAlotaibi5 @Malakfsd)

2018

U.A.E.

  • Keynote 1 - Dan Cuthbert (@dcuthbert)
  • DPRK’s eyes on mobile Spying on North Korean Defectors - Inhee Han & Jaewon Min (@boinya & @binerdd)
  • Getting Cozy with Auditing on MacOS … The Good, the Bad, & the Ugly - Patrick Wardle (@patrickwardle)
  • Improved KRACK Attacks Against WPA2 Implementations - Mathy Vanhoef (@vanhoefm)
  • Revisiting the Security of NVIDIA Tegra Platform - nforest (@nforest_)
  • Security Response in Todays Ecosystem - Philip Misner (@phillip_misner)
  • Skorpio Advanced Binary Instrumentation Framework - Nguyen Anh Quynh (@capstone_engine)
  • Surprise Supplies - Warren Mercer & Paul Rascagneres (@SecurityBeard & @r00tbsd)
  • The Life & Death of Kernel Object Abuse by Type Isolation - Saif ElSheri Ian Kronquist (@IanKronquist )
  • UEFI BIOS firmware analysis at scale - Oleksandr Bazhaniuk (@ABazhaniuk)

Kenya

  • Program Analysis on Smart Contracts - JP Smith, Trail Of Bits (@japesinator)
  • A Walk With Shannon: A walkthrough of a PWN2OWN Baseband exploit - Amat Cama, Independant (@amatcama)
  • Reversing the Octagon: Next-Gen Windows Security - Alex Ionescu, Dave Weston (@aionescu & @dwizzzleMSFT)
  • The Baseband Basics: Understanding, Debugging and Pwning the Mediatek Communication Processor - Nitay Artenstein, Charles Muiruri (@nitayart & @icrackthecode)
  • You and your research - Saif ElSherei (@Saif_Sherei)

2017

U.A.E.

  • Keynote 1 - Revisiting the state - Maarten Van Horenbeeck (@maartenvhb)
  • Keynote 2 - Wim Remes (@wimremes)
  • The Blackbox of DPAPI: the gift that keeps on giving - Bartosz Inglot (@BartInglot)
  • Transforming Open Source to Open Access in Closed Applications: Finding Vulnerabilities in Adobe Reader’s XSLT Engine - Abdul-Aziz Hariri (@abdhariri), Jasiel Spelman (@WanderingGlitch), Brian Gorence
  • From mimikatz to kekeo, passing by new Microsoft security technologies - Benjamin Delpy (@gentilkiwi)
  • Agentless Post Exploitation on Device Guarded Systems - Christopher Truncer (@ChrisTruncer)
  • Security Research and Development with LLVM - Andrew Reiter (@andrew_opcde)
  • Supply Chainsaw: Practical software supply chain attacks - Matt Weeks (@scriptjunkie1)
  • Hacking wireless SCADA systems - Elena Feldman
  • Exploring Your System Deeper - Oleksandr Bazhaniuk (@ABazhaniuk)
  • Windows Operating System Archaeology - Matt Nelson (@enigma0x3)
  • Blinded Random Block Corruption - Rodrigo Branco (@bsdaemon)
  • Practical attacks against Digital Wallet - Loic Falletta (@zavidan)
  • 15 ways to break RSA security - Renaud Lifchitz (@nono2357)
  • Stranger Danger - Mohamed Saher (@halsten), Ahmed Garhy (@9ee1), Nikita Tarakanov (@NTarakanov)
  • Lighting Talk
    • Our Financial System is under Attack - Matt Suiche (@msuiche) & @x0rz
opcde2017-ds-lifchitz-break_rsa_1648319993607.pdf
Agentless Post-Exploitation on Device Guarded Systems_1648319993683.pdf
Opcde_2017_04_v2-Blinded-Random-Block-Corruption_1648319993883.pdf
opcde_ExploringYourSystemDeeper_updated_1648319994113.pdf
OPCDE-2017-From Mimikatz to Kekeo Passing by New Microsoft Security Tech..._1648319994414.pdf
hack wireless scada_1648319994949.pdf
OPCDE Maarten Van Horenbeeck - Revisiting the state (final)_1648319995386.pdf
Wim_1648319996276.pdf
OPCDE-Lighting-Talk-SWIFT_1648319996379.pdf
opcde_sol_halsten_1648319996554.pdf
2017_OPCDE_LoicFalletta-YINKOZI-PracticalAttacksAgainstDigitalWallet_1648319996773.pdf
ExtraNonsense_1648319998202.pdf
MainDeck_1648319998315.pdf
SecurityRDprojectsLLVM_1648319998595.pdf
stranger_danger_msaher_agarhy_ntarakanov_1648319998679.pdf
Supply Chainsaw_1648319998860.pdf
The Blackbox of DPAPI - Bart Inglot_1648319999352.pdf
OSTOA-Gorenc_Hariri_Spelman_1648319999517.pdf
Windows Operating System Archaeology_1648319999893.pdf
OPCDE_Wardle_1648320000380.pdf
Improved KRACK Attacks Against WPA2 Implementations - Mathy Vanhoef_1648320001248.pdf
OPCDE Keynote April 2018 - Dan Cuthbert_1648320001508.pdf
beyond-webshells-dan-caban_1648320001803.pdf
bitcoin-anonymous_1648320002125.pdf
do-they-know-alsuwayi_1648320002312.pdf
typosquatting-x0rz_1648320002922.pdf
Revisiting_the_Security_of_NVIDIA_Tegra_Platform_1648320003158.pdf
Security Response in Todays Ecosystem-MISNER_OPCDE2018_1648320003358.pdf
Opcde2018-skorpio_1648320003590.pdf
Surprise Supplies_OPCDE_Public_1648320003899.pdf
The Life & Death of Kernel Object Abuse by Type Isolation_1648320004825.pdf
opcde2018-bazhaniuk_1648320005043.pdf
0xabd0_1648320005258.pdf
5yx_1648320005362.pdf
Alenazi_90_1648320005467.pdf
THE_BOSSz_1648320005691.pdf
iabuabat_1648320005761.pdf
mazen160_1648320005936.pdf
sasukeOurad_1648320006082.pdf
Alex Ionescu, David Weston - Inside the Octagon Analyzing System Guard Runtime Attestation_1648320006572.pdf
Amat Cama - A Walk With Shannon- A walkthrough of a PWN2OWN Baseband exploit_1648320006866.pdf
Charles Nitay Anna - The Baseband Basics_1648320007193.pdf
JP Smith - Smart Contract Program Analysis_1648320007399.pdf
Saif ElSherei - You and your research_1648320007620.pdf
(SAP) Gateway to Heaven_1648320007717.pdf
Automated Reverse Engineering of Industrial Control Systems Binaries - Mihalis Maniatakos_1648320008588.pdf
Danger of using fully homomorphic encryption,a look at Microsoft SEAL - Zhiniang Peng_1648320008907.pdf
Evolving Attacker Techniques in Cryptocurrency User Targeting - Philip Martin_1648320009081.pdf
Lions at the watering hole - Andrei Boz_1648320009342.pdf
Modern Secure Boot Attacks - Matrosov_1648320009732.pdf
NTLM_Relay_Is_Dead_1648320010155.pdf
Practical Uses for Memory Visualization - Ulf Frisk_1648320010464.pdf
Trade War Shellcode Wielding of Imports and Exports - Willi Ballenthin_1648320010685.pdf
Using Symbolic Execution to Root Routers - Mathy Vanhoef_1648320011039.pdf
WhatsApp Digger - Deemah, Lamyaa, Malak, Sarah_1648320011354.pdf
Shower-thoughts-Keynote-Ryan-Naraine_1648320012096.pdf
Tap-Your-Home-Costin Craiu_1648320012152.pdf
mlwr_com_proto_mfmokbel_slides_v1_1648320012551.pdf
mlwr_http_comm_spect_mfmokbel_paper_v1_1648320012623.pdf
Red Team Handcuffs - OPCDE_1648320012878.pdf
Decoding And Interpreting IntelPT Traces For Vulnerability Analysis_1648320013033.pdf
silvo-la-porta-antonio-villani-the-penquin-is-in-da-house_1648320013299.pdf
yarden-shafir-windbg_keynote_1648320013579.pdf
cleanly_escaping_the_chrome_sandbox_1648320020955.pdf
re_purebasic_compilers_mfmokbel_1648320021090.pdf
OPCDEx-SAS2019_1648320021302.pdf
Hold My Catnip, I'm Pouncing Over APTs for Purple Teaming_1648320014032.pptx
Using Serverless to Build Pentesting Toolset - OPCDE - 25-March-2020_1648320016765.pptx
china_s_cheap_xiaomis_are_low_on_privacy_1648320017642.pptx
mediatek-baseband-charles-muiruri_1648320002724.pptx