Parent directory/ | - | - |
(Not) All Quiet on the Eastern Front, Maliciarogue.mp4 | 85.4 MiB | 2021 Nov 02 08:27 |
A story of metadata, Alexandre Pujol.mp4 | 31.7 MiB | 2021 Nov 02 08:27 |
Breaking privacy in software, Maria Christofi.mp4 | 77.2 MiB | 2021 Nov 02 08:27 |
From corrupted memory dump to rootkit detection, Stéfan Le Berre.mp4 | 72.4 MiB | 2021 Nov 02 08:27 |
Hardware Slashing, Smashing, Deconstructing and Reconstruction for root access, Deral Heiland.eng.srt | 110.4 KiB | 2019 Oct 01 08:28 |
Hardware Slashing, Smashing, Deconstructing and Reconstruction for root access, Deral Heiland.mp4 | 85.9 MiB | 2021 Nov 02 08:27 |
How to borrow a car in 60,000 millisecond, Robert Leale.eng.srt | 141.5 KiB | 2019 Oct 01 08:28 |
How to borrow a car in 60,000 millisecond, Robert Leale.mp4 | 91.0 MiB | 2021 Nov 02 08:27 |
Keynote, Gaël Delalleau.mp4 | 68.0 MiB | 2021 Nov 02 08:27 |
La surprise du chef, Team HZV.mp4 | 8.7 MiB | 2021 Nov 02 08:27 |
Qu'est-ce que le hacking social - Gull et Viciss.mp4 | 80.7 MiB | 2021 Nov 02 08:27 |
Serrurerie forensics - Techniques avancées, MrJack.mp4 | 92.9 MiB | 2021 Nov 02 08:27 |
Side-channel Attack of a Quantum Key Distribution System, Martina Bodini.eng.srt | 95.9 KiB | 2019 Oct 01 08:28 |
Side-channel Attack of a Quantum Key Distribution System, Martina Bodini.mp4 | 73.9 MiB | 2021 Nov 02 08:27 |
Smart backdooring 2.0, Paul Daher.mp4 | 66.8 MiB | 2021 Nov 02 08:27 |
USB-HID l'ami de la Red Team, Jérôme Poggi.mp4 | 44.8 MiB | 2021 Nov 02 08:27 |
Virtualization InApp sous Android afin de maitriser l'exécution des applications, Julien Thomas.mp4 | 39.5 MiB | 2021 Nov 02 08:27 |