Parent directory/ | - | - |
DefCamp 2023 captions/ | - | 2024 Oct 14 10:16 |
5.0 Shades of Java Exploitation.mp4 | 38.3 MiB | 2024 Oct 13 06:20 |
A deep-dive Into DLL Hijacking - Discovery, Automation and Impact.mp4 | 33.4 MiB | 2024 Oct 13 06:20 |
AI Powered Security Operation Center - SOC. Myth or reality.mp4 | 38.1 MiB | 2024 Oct 13 06:20 |
Abusing G*****W for lateral movement from local to cloud.mp4 | 20.9 MiB | 2024 Oct 13 06:20 |
Architectural challenges & solutions in creating a dynamic cyber range solution.mp4 | 31.7 MiB | 2024 Oct 13 06:20 |
Attacking Developer Environment Through Drive-by Localhost Attacks.mp4 | 27.9 MiB | 2024 Oct 13 06:20 |
Attacking Vehicle Fleet Management Systems.mp4 | 42.2 MiB | 2024 Oct 13 06:20 |
Backdooring an entire country’s 4 million modems with 6 bugs in a week.mp4 | 36.0 MiB | 2024 Oct 13 06:20 |
Bringing ***** to CyberSec in a CoderDojo Setting.mp4 | 41.2 MiB | 2024 Oct 13 06:20 |
Building a Resilient Red Team Infrastructure.mp4 | 46.8 MiB | 2024 Oct 13 06:20 |
ChatNMI & Beyond Pushing the ‘Easy Button’ in Home-based AI Deployment.mp4 | 48.2 MiB | 2024 Oct 13 06:20 |
Cloud-squatting the never-ending misery of deleted and forgotten cloud assets.mp4 | 31.2 MiB | 2024 Oct 13 06:20 |
Cloudy with a Chance of Exposures Dissecting Web Server Risks Across Top Cloud Providers.mp4 | 25.3 MiB | 2024 Oct 13 06:20 |
Conceal, Don’t Feel, Don’t Let Them Know.mp4 | 41.9 MiB | 2024 Oct 13 06:20 |
Cybersecurity in the Quantum Era.mp4 | 47.2 MiB | 2024 Oct 13 06:20 |
DefCamp 2023 Opening Speech.mp4 | 5.9 MiB | 2024 Oct 13 06:20 |
DefCamp 2023 Overview.mp4 | 15.4 MiB | 2024 Oct 13 06:20 |
Finding Vulnerabilities in Your Codebase Using Open Source Tools.mp4 | 34.4 MiB | 2024 Oct 13 06:20 |
Graph-oriented approach for SSTI payload optimization Usecase of jinja2.mp4 | 23.0 MiB | 2024 Oct 13 06:20 |
Hacking a magnetic lock - successes and failures.mp4 | 43.3 MiB | 2024 Oct 13 06:20 |
Hardware Backdooring an e-Scooter.mp4 | 30.9 MiB | 2024 Oct 13 06:20 |
Have you heard about DNS DR How this shifts security from responsive to proactive.mp4 | 39.8 MiB | 2024 Oct 13 06:20 |
How to build a successful Security Team.mp4 | 38.6 MiB | 2024 Oct 13 06:20 |
Hunting - Scraping with Favicons.mp4 | 16.8 MiB | 2024 Oct 13 06:20 |
I Still See Your AppSec Contractual Sins.mp4 | 35.8 MiB | 2024 Oct 13 06:20 |
ICI InnoLabs A safer approach to building research infrastructure.mp4 | 20.9 MiB | 2024 Oct 13 06:20 |
Kittens falling from the skies (OpRomania).mp4 | 34.7 MiB | 2024 Oct 13 06:20 |
MITM on PSTN - novel methods for intercepting phone calls.mp4 | 37.9 MiB | 2024 Oct 13 06:20 |
Monitoring malware behavior through kernel syscall tracing.mp4 | 23.4 MiB | 2024 Oct 13 06:20 |
Moving Target Defense.mp4 | 16.1 MiB | 2024 Oct 13 06:20 |
No Code Malware Windows 11 At Your Service.mp4 | 39.7 MiB | 2024 Oct 13 06:20 |
Nothing To Hide Privacy-Preserving Cryptographic Authentication In Practice.mp4 | 36.5 MiB | 2024 Oct 13 06:20 |
Party Time Building a Private Game Server by Reverse Engineering.mp4 | 23.7 MiB | 2024 Oct 13 06:20 |
Rough seas & ships in storms - A retrospective of 2023 from an MSSP perspective.mp4 | 28.7 MiB | 2024 Oct 13 06:20 |
Security on the Edge - Safeguarding Smart Homes.mp4 | 32.5 MiB | 2024 Oct 13 06:20 |
Sherlock, an OpenSource configurable platform for applying LLM to security use-cases.mp4 | 23.4 MiB | 2024 Oct 13 06:20 |
Supply Chain Shenanigans Evil npm & Shady NuGet.mp4 | 35.8 MiB | 2024 Oct 13 06:20 |
The C2 tool no one talks about AWS SSM - Run Command.mp4 | 26.8 MiB | 2024 Oct 13 06:20 |
The JARM’ing Adventures of a Weaponized Security Tool.mp4 | 49.0 MiB | 2024 Oct 13 06:20 |
The NIS2 Directive Europe’s Response to Cyber Shenanigans.mp4 | 40.0 MiB | 2024 Oct 13 06:20 |
The best of both worlds privacy and security.mp4 | 39.5 MiB | 2024 Oct 13 06:20 |
The nuts and bolts of vulnerability detection in multi-cloud environments.mp4 | 25.3 MiB | 2024 Oct 13 06:20 |
Using RPA for a fast, reliable and repeatable Incident Response process.mp4 | 34.8 MiB | 2024 Oct 13 06:20 |
Verkle based Post-quantum digital signature with lattices.mp4 | 38.8 MiB | 2024 Oct 13 06:20 |
Weaponized AI for cyber attacks.mp4 | 38.8 MiB | 2024 Oct 13 06:20 |
What are BadUSB attacks and how can you implement them.mp4 | 24.4 MiB | 2024 Oct 13 06:20 |
Wheels of Wonder Unveiling Car Hacking Poetry.mp4 | 21.8 MiB | 2024 Oct 13 06:20 |
macOS Red Teaming in 2023 [0-day edition].mp4 | 39.5 MiB | 2024 Oct 13 06:20 |