- DocumentMoabi - Hardware Backdooring is Practical - Blackhat 2012uploaded byMoabi
- DocumentMoabi - WCC Internal Documentationuploaded byMoabi
- DocumentMoabi - Bruteforcing PreBoot authentication - TELECOMIX 2009uploaded byMoabi
- DocumentMoabi - Breaking Sandboxing - Syscan 2013uploaded byMoabi
- DocumentMoabi - Silent Protest - Shakacon 2017uploaded byMoabi
- DocumentMoabi - Breaking Virtualization (Chinese) - SYSCAN 2013 Beijinguploaded byMoabi
- DocumentMoabi - Reverse Engineering Proprietary Protocols - Ruxmon 2012uploaded byMoabi
- DocumentMoabi - Breaking Sandboxing - RUXCON 2013uploaded byMoabi
- DocumentMoabi - Hardware Backdooring is Practical - RUXCON 2012uploaded byMoabi
- DocumentMoabi - Post Memory Corruption Memory Analysis - Ruxcon 2011uploaded byMoabi
- DocumentJonathan Brossard - Breaking Virtualization 8088 Mode - Ruxcon 2010uploaded byMoabi
- DocumentMoabi - Hardware Backdooring is Practical - NoSuchCon Conferenceuploaded byMoabi
- DocumentMoabi - Hardware Backdooring is Practical - NULLCON Goa 2019uploaded byMoabi
- DocumentMoabi - Hardware Backdooring is Practical - NULLCON Goa 2012uploaded byMoabi
- DocumentMoabi - Post Memory Corruption Memory Analysis - Kiwicon Conference 2011uploaded byMoabi
- DocumentMoabi - Introduction to the Witchcraft Compiler Collection - INTEL iSEC 2016uploaded byMoabi
- DocumentMoabi - Hardware Backdooring is Practical - INTEL iSEC 2012uploaded byMoabi
- DocumentMoabi - Hardware Backdooring is Practical - Hackito Ergo Sum 2012uploaded byMoabi
- DocumentJonathan Brossard - Breaking Virtualization 8088 Mode - Hackito Ergo Sum conferenceuploaded byMoabi
- DocumentJonathan Brossard - Breaking Virtualization 8088 Mode - Hackito Ergo Sum conferenceuploaded byMoabi
- DocumentMoabi - Post Memory Corruption Memory Analysis - Hack in the Box Conferenceuploaded byMoabi
- DocumentJonathan Brossard - Breaking Virtualization 8088 Mode - HITB 2011uploaded byMoabi
- DocumentMoabi - Post Memory Corruption Memory Analysis - Hack in the Box Conference 2011uploaded byMoabi
- DocumentMoabi - Breaking Virtualization - HITB 2010 Kuala Lumpuruploaded byMoabi
- DocumentMoabi - Breaking Virtualization - HITB 2010 Amsterdamuploaded byMoabi
- DocumentMoabi - Breaking Preboot Authentication - H2HC 2009uploaded byMoabi
- DocumentJonathan Brossard - H2HC 2013 - Sandboxinguploaded byMoabi
- DocumentJonathan Brossard - H2HC 2013uploaded byMoabi
- DocumentJonathan Brossard - H2HC 2010uploaded byMoabi
- DocumentJonathan Brossard - H2HC 2009uploaded byMoabi
- DocumentMoabi - Witchcraft Compiler Collection - DEFCON 24 (2016)uploaded byMoabi
- DocumentMoabi - Introduction to the Witchcraft Compiler Collection - DEF CON 24uploaded byMoabi
- DocumentMoabi - Hardware Backdooring is Practical - DEFCON 2012uploaded byMoabi
- DocumentJonathan Brossard - DEFCON 16 Bitlockeruploaded byMoabi
- DocumentJonathan Brossard - DEFCON 16 BIOS Whitepaperuploaded byMoabi
- DocumentJonathan Brossard - ClubHack 2008uploaded byMoabi
- DocumentMoabi - Post Memory Corruption Memory Analysis - Chaos Communication Congress 28c3uploaded byMoabi
- DocumentMoabi - Hardware Backdooring is Practical - Blackhat 2012uploaded byMoabi
- DocumentMoabi - Post Memory Corruption Memory Analysis (PMCMA) - Blackhat 2011 - Whitepaperuploaded byMoabi
- DocumentMoabi - Witchcraft Compiler Collection-Towards Self Aware Computer Programs - Blackhat Europe 2016uploaded byMoabi
- DocumentMoabi - Witchcraft-Compiler-Collection User Manualuploaded byMoabi
- DocumentJonathan Brossard - XXE Defenseless JDK XML Parsers JAVA - Blackhat 2015uploaded byMoabi
- DocumentJonathan Brossard - SMBv2 Sharing More Than Just Your Files - Blackhat 2015uploaded byMoabi
- DocumentJonathan Brossard - SMB Sharing More Than Your Files - Blackhat 2015uploaded byMoabi
- DocumentJonathan Brossard - Filecry the New Age of Xxe - Blackhat 2015uploaded byMoabi
- DocumentMoabi - Post Memory Corruption Memory Analysis Whitepaper - Blackhat 2011uploaded byMoabi
- DocumentMoabi - Post Memory Corruption Memory Analysis - Blackhat 2011 - Whitepaper - Jonathan Brossarduploaded byMoabi
- DocumentMoabi - Witchcraft Compiler Collection - BSides San Francisco 2016uploaded byMoabi
- DocumentMoabi - Hardware Backdooring is Practical - AusCERT 2013uploaded byMoabi