Parent directory/ | - | - |
A 2018 practical guide to hacking RFID NFC (Sławomir Jasek).eng.srt | 84.4 KiB | 2019 Oct 01 08:23 |
A 2018 practical guide to hacking RFID NFC (Sławomir Jasek).mp4 | 106.6 MiB | 2021 May 22 13:26 |
Attacking web servers via run time configuration (Eldar Marcussen).eng.srt | 104.7 KiB | 2019 Oct 01 08:23 |
Attacking web servers via run time configuration (Eldar Marcussen).mp4 | 77.1 MiB | 2021 May 22 13:26 |
Bezpieczeństwo przy tysiącach wdrożeń (Wojciech Lesicki, Paweł Czubachowski).mp4 | 40.4 MiB | 2021 May 22 13:26 |
Busting Advanced BotNet’s (Senad Aruc).eng.srt | 81.3 KiB | 2019 Oct 01 08:23 |
Busting Advanced BotNet’s (Senad Aruc).mp4 | 50.7 MiB | 2021 May 22 13:26 |
CREDS - new distributed certificate management system (Michal Jarmolkowicz).eng.srt | 48.5 KiB | 2019 Oct 01 08:23 |
CREDS - new distributed certificate management system (Michal Jarmolkowicz).mp4 | 40.6 MiB | 2021 May 22 13:26 |
Conference Recap.mp4 | 9.8 MiB | 2021 May 22 13:26 |
Darknet (Piotr Bazydło).eng.srt | 91.8 KiB | 2019 Oct 01 08:23 |
Darknet (Piotr Bazydło).mp4 | 72.0 MiB | 2021 May 22 13:26 |
Detecting Phishing from pDNS (Irena Damsky).eng.srt | 96.7 KiB | 2019 Oct 01 08:23 |
Detecting Phishing from pDNS (Irena Damsky).mp4 | 92.8 MiB | 2021 May 22 13:26 |
Everything’s Connected aka Threat Intelligence 102 (Marcin Siedlarz).eng.srt | 77.8 KiB | 2019 Oct 01 08:23 |
Everything’s Connected aka Threat Intelligence 102 (Marcin Siedlarz).mp4 | 71.7 MiB | 2021 May 22 13:26 |
Google's journey with CSP (Lukas Weichselbaum, Michele Spagnuolo).eng.srt | 109.4 KiB | 2019 Oct 01 08:23 |
Google's journey with CSP (Lukas Weichselbaum, Michele Spagnuolo).mp4 | 72.9 MiB | 2021 May 22 13:26 |
Hacking REST APIs - 20 cases (Michał Sajdak).eng.srt | 77.3 KiB | 2019 Oct 01 08:23 |
Hacking REST APIs - 20 cases (Michał Sajdak).mp4 | 82.1 MiB | 2021 May 22 13:26 |
Hacking Robots Before Skynet (Lucas Apa).mp4 | 91.4 MiB | 2021 May 22 13:26 |
Hunting for the secrets in a cloud forest (Paweł Rzepa).eng.srt | 84.3 KiB | 2019 Oct 01 08:23 |
Hunting for the secrets in a cloud forest (Paweł Rzepa).mp4 | 81.1 MiB | 2021 May 22 13:26 |
Intel ME Security keys Genealogy, Obfuscation (Dmitry Sklyarov, Maxim Goryachy).eng.srt | 81.9 KiB | 2019 Oct 01 08:23 |
Intel ME Security keys Genealogy, Obfuscation (Dmitry Sklyarov, Maxim Goryachy).mp4 | 31.1 MiB | 2021 May 22 13:26 |
Invoke-DOSfuscation (Daniel Bohannon).eng.srt | 150.8 KiB | 2019 Oct 01 08:23 |
Invoke-DOSfuscation (Daniel Bohannon).mp4 | 93.0 MiB | 2021 May 22 13:26 |
Jailbreak - dylematy hazardzisty w pentestach aplikacji iOS (Wojciech Reguła).mp4 | 85.1 MiB | 2021 May 22 13:26 |
Linux Kernel Runtime Guard (LKRG) under the hood (Adam pi3 Zabrocki).eng.srt | 148.3 KiB | 2019 Oct 01 08:23 |
Linux Kernel Runtime Guard (LKRG) under the hood (Adam pi3 Zabrocki).mp4 | 111.0 MiB | 2021 May 22 13:26 |
Military style tactics in the fight against Cybercrime (TJ Campana).eng.srt | 36.5 KiB | 2019 Oct 01 08:23 |
Military style tactics in the fight against Cybercrime (TJ Campana).mp4 | 29.6 MiB | 2021 May 22 13:26 |
Myth Busters The DLP Edition (Ido Naor, Dani Goland).eng.srt | 66.7 KiB | 2019 Oct 01 08:23 |
Myth Busters The DLP Edition (Ido Naor, Dani Goland).mp4 | 52.9 MiB | 2021 May 22 13:26 |
Network security monitoring on a massive scale (Michał Purzyński).eng.srt | 102.8 KiB | 2019 Oct 01 08:23 |
Network security monitoring on a massive scale (Michał Purzyński).mp4 | 83.8 MiB | 2021 May 22 13:26 |
Outsmarting smart contracts (Damian Rusinek).eng.srt | 106.4 KiB | 2019 Oct 01 08:23 |
Outsmarting smart contracts (Damian Rusinek).mp4 | 98.3 MiB | 2021 May 22 13:26 |
Pentesting Voice Biometrics Solutions (Jakub Kałużny).eng.srt | 108.0 KiB | 2019 Oct 01 08:23 |
Pentesting Voice Biometrics Solutions (Jakub Kałużny).mp4 | 86.0 MiB | 2021 May 22 13:26 |
Polskie kampanie malware w 2017 (Adam Haertle, Adam Lange).mp4 | 62.6 MiB | 2021 May 22 13:26 |
Practical intelligence-driven defense (Igor Ivanov, Daniil Yugoslavskiy).eng.srt | 64.6 KiB | 2019 Oct 01 08:23 |
Practical intelligence-driven defense (Igor Ivanov, Daniil Yugoslavskiy).mp4 | 79.4 MiB | 2021 May 22 13:26 |
Remote detection of low and medium interaction honeypots (Julio C. Fort).eng.srt | 71.9 KiB | 2019 Oct 01 08:23 |
Remote detection of low and medium interaction honeypots (Julio C. Fort).mp4 | 37.6 MiB | 2021 May 22 13:26 |
Security Awareness for VIPs. Piece of cake or a tough nut to crack (Piotr Peszko).eng.srt | 111.8 KiB | 2019 Oct 01 08:23 |
Security Awareness for VIPs. Piece of cake or a tough nut to crack (Piotr Peszko).mp4 | 76.5 MiB | 2021 May 22 13:26 |
Spear phishing - jak się bronić Case studies (Borys Łącki).mp4 | 55.4 MiB | 2021 May 22 13:26 |
Splunk - bezpieczeństwo pracy użytkowników w Office 365 (Jakub Goral).mp4 | 34.7 MiB | 2021 May 22 13:26 |
Surfin on you CAN-bus (Thomas Fischer).mp4 | 105.9 MiB | 2021 May 22 13:26 |
The new era of Digital Investigations past, present and future (Selene Giupponi).eng.srt | 43.3 KiB | 2019 Oct 01 08:23 |
The new era of Digital Investigations past, present and future (Selene Giupponi).mp4 | 41.4 MiB | 2021 May 22 13:26 |
V4GR4 Cyber-Crime, Enlarged (Koby Kilimnik).mp4 | 52.4 MiB | 2021 May 22 13:26 |
Who and why should fear hardware trojans (Adam Kostrzewa).eng.srt | 105.4 KiB | 2019 Oct 01 08:23 |
Who and why should fear hardware trojans (Adam Kostrzewa).mp4 | 76.2 MiB | 2021 May 22 13:26 |
XSS in Google's application and bypassing CSP (Michał Bentkowski).eng.srt | 60.7 KiB | 2019 Oct 01 08:23 |
XSS in Google's application and bypassing CSP (Michał Bentkowski).mp4 | 54.2 MiB | 2021 May 22 13:26 |
XSS is dead. We just don't get it (Mario Heiderich).eng.srt | 159.2 KiB | 2019 Oct 01 08:23 |
XSS is dead. We just don't get it (Mario Heiderich).mp4 | 87.2 MiB | 2021 May 22 13:26 |