Parent directory/ | - | - |
Hacktivity 12 2015 captions/ | - | 2024 Oct 24 10:18 |
Balazs Bucsay - Chw00t - Breaking Unices - chroot solutions.mp4 | 75.1 MiB | 2024 Oct 22 08:36 |
Axelle Apvrille - Fitness Tracker - Hack in Progress.mp4 | 86.7 MiB | 2024 Oct 22 08:36 |
Boldizsár Bencsáth - BAB0 - A custom sample that bypassed cutting-edge APT attack detection tools.mp4 | 67.8 MiB | 2024 Oct 22 08:36 |
Fabian Yamaguchi - Mining for Bugs with Graph Database Queries.mp4 | 61.2 MiB | 2024 Oct 22 08:36 |
Felix - FX - Lindner - keynote speaker.mp4 | 99.6 MiB | 2024 Oct 22 08:36 |
Fehér András, Kapitány Sándor, Martinkovics Dániel, Otti Csaba - Kézben a biztonság ().mp4 | 99.8 MiB | 2024 Oct 22 08:36 |
Bíro László Miklós - Titkosítás és visszafejtés a fizikai réteg szintjén.mp4 | 67.9 MiB | 2024 Oct 22 08:36 |
Glenn Ten Cate - OWASP Security knowledge Framework - Survival is not mandatory.mp4 | 86.6 MiB | 2024 Oct 22 08:36 |
Jason Zhang - Make Invisible Visible - Case Studies in PDF Malware.mp4 | 87.4 MiB | 2024 Oct 22 08:36 |
Levente Buttyán, András Szijj, Zsolt Szalay - Hacking cars in the style of Stuxnet.mp4 | 66.2 MiB | 2024 Oct 22 08:36 |
Jos Weyers - Post-its, post-its, post-its everywhere (and how they relate to physical keys).mp4 | 117.7 MiB | 2024 Oct 22 08:36 |
Gábor Szappanos - Comparing the incomparables.mp4 | 95.4 MiB | 2024 Oct 22 08:36 |
joernchen of Phenoelit - Your Web app, those hackers & you.mp4 | 70.5 MiB | 2024 Oct 22 08:36 |
Jochanan Sommerfeld - DDoS protection technology is far from being install & forget.mp4 | 108.0 MiB | 2024 Oct 22 08:36 |
Norbert Tihanyi - Modification of the prime generation method of the OpenSSL library.mp4 | 48.5 MiB | 2024 Oct 22 08:36 |
Marosi Attila - A Hacking Team rosszindulatú programjai.mp4 | 87.8 MiB | 2024 Oct 22 08:36 |
Micha Borrmann - Attacking all your IPv4 devices at home from the Internet via Dual-Stack Lite.mp4 | 91.1 MiB | 2024 Oct 22 08:36 |
Marina Krotofil - Rocking the pocket book - hacking chemical plant for competition and extortion.mp4 | 97.2 MiB | 2024 Oct 22 08:36 |
Martin Knobloch - Secure software, start appreciating your developers.mp4 | 77.9 MiB | 2024 Oct 22 08:36 |
Mark Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.mp4 | 77.0 MiB | 2024 Oct 22 08:36 |
Tamás Szakály - Shall we play a game.mp4 | 72.8 MiB | 2024 Oct 22 08:36 |
Váradi Tamás- Tárcsás zárak nyitásának eszközei és módszerei.mp4 | 57.5 MiB | 2024 Oct 22 08:36 |
*****sook Kornkitichai - Defend PowerShell Attacks When All Else Fails.mp4 | 74.1 MiB | 2024 Oct 22 08:36 |
Sebastian Garcia - The Network Behavior of Targeted Attacks.mp4 | 126.6 MiB | 2024 Oct 22 08:36 |
Zoltán Balázs - Sandbox detection for the masses - leak, *****, test.mp4 | 90.2 MiB | 2024 Oct 22 08:36 |
Zoltán L. Németh - Memory corruption vulnerabilities, runtime mitigations and their bypasses.mp4 | 60.3 MiB | 2024 Oct 22 08:36 |
Omer Coskun - Why nation-state malwares target Telco Networks - Regin and its counterparts.mp4 | 72.4 MiB | 2024 Oct 22 08:36 |
Áron Szabó - Post-kvantumkriptográfia - prím kérdések = príma kérdések.mp4 | 69.7 MiB | 2024 Oct 22 08:36 |
Zsombor Kovács - Semi-automated mapping of iOS binaries.mp4 | 67.3 MiB | 2024 Oct 22 08:36 |