Publications

DEFCON 24 Witchcraft Compiler Collection

DEFCON 24 Witchcraft Compiler Collection

DEFCON 24 Witchcraft Compiler Collection

Bypassing Preboot Authentication Passwords

DEFCON 16 - BIOS: Bypassing Preboot Authentication Passwords

DEFCON 16 - BIOS: Bypassing Preboot Authentication Passwords

28c3 Chaos Computer Conference

28c3 Chaos Computer Conference

28c3 Chaos Computer Conference

BIOS Information leakage

BIOS Information leakage

BIOS Information leakage

Blackhat 2015 SMB Sharing More than your files

Blackhat 2015 SMB Sharing More than your files

Blackhat 2015 SMB Sharing More than your files

INTEL iSEC 2016

INTEL iSEC 2016

INTEL iSEC 2016

Blackhat 2015 SMBv2 Sharing More Than Just Your Files

Blackhat 2015 SMBv2 Sharing More Than Just Your Files

Blackhat 2015 SMBv2 Sharing More Than Just Your Files

INTEL iSEC 2012

INTEL iSEC 2012

INTEL iSEC 2012

Ruxmon 2012 Reverse Engineering Proprietary Protocols

Ruxmon 2012 Reverse Engineering Proprietary Protocols

Ruxmon 2012 Reverse Engineering Proprietary Protocols

SYSCAN 2013

SYSCAN 2013

SYSCAN 2013

Shakacon 2017 Silent Protest

Shakacon 2017 Silent Protest

Shakacon 2017 Silent Protest

Blackhat 2015 XXE Defenseless JDK XML Parsers JAVA

Blackhat 2015 XXE Defenseless JDK XML Parsers JAVA

Blackhat 2015 XXE Defenseless JDK XML Parsers JAVA

Blackhat Europe 2016 Witchcraft Compiler Collection-Towards Self Aware Computer Programs-wp

Blackhat Europe 2016 Witchcraft Compiler Collection-Towards Self Aware Computer Programs-wp

Blackhat Europe 2016 Witchcraft Compiler Collection-Towards Self Aware Computer Programs-wp

Blackhat USA 2011 Post Memory Corruption Memory Analysis PMCMA

Blackhat USA 2011 Post Memory Corruption Memory Analysis PMCMA

Blackhat USA 2011 Post Memory Corruption Memory Analysis PMCMA

Blackhat USA 2012 Hardware Backdooring is Practical

Blackhat USA 2012 Hardware Backdooring is Practical

Blackhat USA 2012 Hardware Backdooring is Practical

CCC 2012

CCC 2012

CCC 2012

Blackhat 2011 Post Memory Corruption Memory Analysis Whitepaper

Blackhat 2011 Post Memory Corruption Memory Analysis Whitepaper

Blackhat 2011 Post Memory Corruption Memory Analysis Whitepaper

Blackhat 2015 Filecry the new age of xxe

Blackhat 2015 Filecry the new age of xxe

Blackhat 2015 Filecry the new age of xxe

DEFCON 16 Bitlocker

DEFCON 16 Bitlocker

DEFCON 16 Bitlocker

DEFCON 20 Hardware Backdooring is Practical

DEFCON 20 Hardware Backdooring is Practical

DEFCON 20 Hardware Backdooring is Practical

DEFCON 24 Introduction-to-the-Witchcraft-Compiler-Collection

DEFCON 24 Introduction-to-the-Witchcraft-Compiler-Collection

DEFCON 24 Introduction-to-the-Witchcraft-Compiler-Collection

Blackhat 2011.WP

Blackhat 2011.WP

Blackhat 2011.WP

H2HC 2009

H2HC 2009

H2HC 2009

HackitoErgoSum 2010

HackitoErgoSum 2010

HackitoErgoSum 2010

H2HC 2010

H2HC 2010

H2HC 2010

H2HC 2013

H2HC 2013

H2HC 2013

HITB 2010 Amsterdam

HITB 2010 Amsterdam

HITB 2010 Amsterdam

TELECOMX 2009

TELECOMX 2009

TELECOMX 2009

HITB 2010 KualaLumpur

HITB 2010 KualaLumpur

HITB 2010 KualaLumpur

Auscert 2013 Hardware Backdooring

Auscert 2013 Hardware Backdooring

Auscert 2013 Hardware Backdooring

BSides San Francisco 2016 Witchcraft Compiler Collection

BSides San Francisco 2016 Witchcraft Compiler Collection

BSides San Francisco 2016 Witchcraft Compiler Collection

HITB 2011

HITB 2011

HITB 2011

HITB 2011 Breaking Virtualization 8088 mode

HITB 2011 Breaking Virtualization 8088 mode

HITB 2011 Breaking Virtualization 8088 mode

HackitoErgoSum 2010 Breaking Virtualization 8088 mode

HackitoErgoSum 2010 Breaking Virtualization 8088 mode

HackitoErgoSum 2010 Breaking Virtualization 8088 mode

H2HC 2013 Sandboxing

H2HC 2013 Sandboxing

H2HC 2013 Sandboxing

H2HC Breaking Preboot Authentication

H2HC Breaking Preboot Authentication

H2HC Breaking Preboot Authentication

Kiwicon 2011

Kiwicon 2011

Kiwicon 2011

NULLCON 2012

NULLCON 2012

NULLCON 2012

HITB 2011 PMCMA

HITB 2011 PMCMA

HITB 2011 PMCMA

NULLCON 2019

NULLCON 2019

NULLCON 2019

Syscan 2013 Sandboxing

Syscan 2013 Sandboxing

Syscan 2013 Sandboxing

WCC internal documentation

WCC internal documentation

WCC internal documentation

NoSuchCon Hardware Backdooring Is Practical

NoSuchCon Hardware Backdooring Is Practical

NoSuchCon Hardware Backdooring Is Practical

RUXCON 2010

RUXCON 2010

RUXCON 2010

Blackhat 2016 Witchcraft-Compiler-Collection User Manual

Blackhat 2016 Witchcraft-Compiler-Collection User Manual

Blackhat 2016 Witchcraft-Compiler-Collection User Manual

RUXCON 2011

RUXCON 2011

RUXCON 2011

HackitoErgoSum 2012

HackitoErgoSum 2012

HackitoErgoSum 2012

RUXCON 2012

RUXCON 2012

RUXCON 2012

RUXCON 2013

RUXCON 2013

RUXCON 2013

ClubHack 2008

ClubHack 2008

ClubHack 2008

blackhat2012

blackhat2012

blackhat2012

Associated Tools

Tools index

Index of all tools available for download

Index of miscellaneous low level tools (BIOS, debuggers, kernel code, exploits).

Witchcraft Compiler Collection (WCC) Repository

Witchcraft Compiler Collection (WCC) github repository

Latest codebase of the Witchcraft Compiler Collection.

PMCMA Repository

PMCMA github repository

Latest codebase of the Post Memory Corruption Memory Analyzer (PMCMA).

Witchcraft Compiler Collection (WCC) archive

Witchcraft Compiler Collection (WCC) zip archive

Local copy of the Witchcraft Compiler Collection.

PMCMA archive

PMCMA zip archive

Local copy of the Post Memory Corruption Memory Analyzer (PMCMA).

DEFCON 16 archive

DEFCON 16 zip archive

Local copy of the exploits and tools presented at DEFCON 16.