Parent directory/ | - | - |
Hacktivity 18 2021 captions/ | - | 2024 Oct 24 10:18 |
#Hacktivity2021 - Summary of the 18th Edition - 8 October 2021.mp4 | 9.6 MiB | 2024 Oct 23 00:32 |
Mobile App Security Testing is Also Essential.mp4 | 13.6 MiB | 2024 Oct 23 00:32 |
Security Issues of an Apartment Intercom and Door Lock System.mp4 | 13.9 MiB | 2024 Oct 23 00:32 |
Detection Engineering Building Custom Detection Controls for Cloud Environments.mp4 | 14.5 MiB | 2024 Oct 23 00:32 |
Secure by Design Microservice Application Architecture Assessment.mp4 | 14.5 MiB | 2024 Oct 23 00:32 |
Investigating the Exploitability of Trusted Execution Environments.mp4 | 17.2 MiB | 2024 Oct 23 00:32 |
How to Use Cheated Cryptography to Overload Your Server.mp4 | 24.1 MiB | 2024 Oct 23 00:32 |
GhostEmperor From ProxyLogon to Kernel Mode, Story of a Modern Day Rootkit.mp4 | 24.2 MiB | 2024 Oct 23 00:32 |
GALILEO In GPS We Trust.mp4 | 25.5 MiB | 2024 Oct 23 00:32 |
Cloud Security Monitoring and Evasion Techniques.mp4 | 26.4 MiB | 2024 Oct 23 00:32 |
Penetration Testing Management Problems in Large Corporations.mp4 | 28.8 MiB | 2024 Oct 23 00:32 |
Hackers Deserve Rights.mp4 | 29.1 MiB | 2024 Oct 23 00:32 |
Security Awareness in Development.mp4 | 30.5 MiB | 2024 Oct 23 00:32 |
A Common Bypass Pattern to Exploit Modern Web Apps.mp4 | 32.0 MiB | 2024 Oct 23 00:32 |
How to Upgrade Enterprise Security Using Numeric Technique.mp4 | 32.0 MiB | 2024 Oct 23 00:32 |
CSS Keylogger in 2021 - The Hubris of the Security Community.mp4 | 32.9 MiB | 2024 Oct 23 00:32 |
Mount(ain) of Bugs.mp4 | 34.5 MiB | 2024 Oct 23 00:32 |
Malware Hunting - Using Python as Attack Weapon.mp4 | 36.5 MiB | 2024 Oct 23 00:32 |
Vulnerabilities When Securing Your Own Environment is No Longer Enough.mp4 | 37.3 MiB | 2024 Oct 23 00:32 |
4 Weird Google VRP Bugs in 40 Minutes.mp4 | 41.8 MiB | 2024 Oct 23 00:32 |
Millions for Nothing and Clicks for Free.mp4 | 42.6 MiB | 2024 Oct 23 00:32 |
The Key to an - Entire Kingdom - Pandora FMS - Chained Exploit (CVE-2021-34074).mp4 | 45.1 MiB | 2024 Oct 23 00:32 |
How to Bypass Data Exfiltration Detection with Malicious Cryptography Techniques.mp4 | 46.1 MiB | 2024 Oct 23 00:32 |
MIPS-X The Next IoT Frontier.mp4 | 48.0 MiB | 2024 Oct 23 00:32 |
C2Centipede APT Level C2 Communications for Common Reverse HTTP Shell Tools.mp4 | 48.1 MiB | 2024 Oct 23 00:32 |
The History of Hacking AI Systems.mp4 | 54.4 MiB | 2024 Oct 23 00:32 |
Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones.mp4 | 60.6 MiB | 2024 Oct 23 00:32 |
DNS in Offensive Techniques.mp4 | 63.1 MiB | 2024 Oct 23 00:32 |