/
|
Ekoparty logo.png
|
84.8 KB
|
Ekoparty thank you.txt
|
1.4 KB
|
/Ekoparty 3 2007/
|
Esteban Martinez Fayo - Oracle Security.mp4
|
44.2 MB
|
Joao Batista Correa - Hacking the Big Brother.mp4
|
54.3 MB
|
Julio Auto Next-Generation Debuggers For Reverse Engineering.mp4
|
36.5 MB
|
Julio Cesar Fort ekoparty 07 - The wayback machine - Old Schools Hacking.mp4
|
33.9 MB
|
Mariano Nunez di Croze - SAP Penetration Testing & Defense In-Depth.mp4
|
19.2 MB
|
Rodrigo Branco - K.I.D.S.mp4
|
37.3 MB
|
/Ekoparty 4 2008/
|
A Domain Specific Language For Static Binary Analysis.mp4
|
48.8 MB
|
Attacking RSA Using A New Method Of Integer Factorization.mp4
|
52.2 MB
|
Blackbox Reversing Of XSS Filters.mp4
|
54.9 MB
|
Bs.As Libre2008.mp4
|
10.7 MB
|
Code Injection On Virtual Machines.mp4
|
29.3 MB
|
Console Hacking.mp4
|
50.4 MB
|
Economies Of Scale In Hacking.mp4
|
38.0 MB
|
Ekoparty Security Conference 4th Edition.mp4
|
1.1 MB
|
Exploring Novelty Ways In Building Botnets.mp4
|
48.4 MB
|
New Tool For Monitoring WiFi - Beholder.mp4
|
48.7 MB
|
Predictive Pseudo-Random Numbers Generator In Debian.mp4
|
55.0 MB
|
SAP Penetration Testing & Defense In-Depth.mp4
|
57.5 MB
|
Secure The Planet - New Strategic Initiatives From Microsoft To Rock Your World.mp4
|
17.1 MB
|
Smartphones (In)Security.mp4
|
53.6 MB
|
TCP IP Protocols Security Results Analisys.mp4
|
19.3 MB
|
Tell How You Attack And I Will Tell You Who You Are.mp4
|
56.0 MB
|
The Computer Forensics Challenge And Anti-Forensics.mp4
|
44.8 MB
|
Unleashing Adobe Javascript.mp4
|
44.1 MB
|
/Ekoparty 5 2009/
|
Building Hackerspaces.mp4
|
36.3 MB
|
Connection String Attacks.mp4
|
28.2 MB
|
Desactivando Rootkits.mp4
|
55.0 MB
|
Diez Cosas Que Todos Deberian Saber Son Lockpicking Y Seguridad Fisica.mp4
|
49.9 MB
|
Ekoparty 2009 Clarin Review.mp4
|
6.5 MB
|
Heurísticas Aplicadas A La Comparacion ( Diffeo ) De Binarios.mp4
|
53.8 MB
|
IPhone Hacking - Fuzzing And Payloads.mp4
|
55.4 MB
|
More Tricks For Defeating SSL In Practice.mp4
|
51.9 MB
|
Mostrame La Guita Adventures In Buying Vulnerabilities.mp4
|
53.2 MB
|
Number Stations.mp4
|
32.1 MB
|
Playing In A Satellite Environment 1.2.mp4
|
52.7 MB
|
POSIX Meterpreter.mp4
|
35.1 MB
|
SCCP Hacking, Attacking The SS7 & SIGTRAN Applications.mp4
|
62.6 MB
|
WiFi Power Save DoS.mp4
|
22.8 MB
|
/Ekoparty 6 2010/
|
2x1 Microsoft Bugs Virtual PC Hyper-Hole-Visor - - Windows Creation Vulnerability (MS10-048) - - Ekoparty Security Conference 6.mp4
|
59.5 MB
|
Atacando VoIP Un Paraiso.mp4
|
27.6 MB
|
Distinguishing Lockpicks - Raking Vs Lifting Vs Jiggling And More.mp4
|
24.7 MB
|
Exploiting Digital Cameras.mp4
|
23.9 MB
|
Faraday - A Tool To Share Knowledge.mp4
|
21.0 MB
|
Hacking An Activity Of Public Interest.mp4
|
23.4 MB
|
Hanging On A ROPe.mp4
|
31.2 MB
|
Historias De 0days, Disclosing Y Otras Yerbas.mp4
|
37.6 MB
|
IPhone Rootkit There S An App For That.mp4
|
34.0 MB
|
Network-Based Detection Of PE Structural Anomalies And Linker Characteristics.mp4
|
23.2 MB
|
Padding Oracles Everywhere.mp4
|
42.9 MB
|
Pentesting Driven By FOCA.mp4
|
30.5 MB
|
Sandboxing Based On SECCOMP For Linux Kernel.mp4
|
36.4 MB
|
SAP Backdoors - A Ghost At The Heart Of Your Business.mp4
|
40.4 MB
|
Token Kidnappings Revenge.mp4
|
51.1 MB
|
Transfering Files On Isolated Remote Desktop Environments.mp4
|
18.4 MB
|
Understanding The Low Fragmentation Heap - From Allocation To Exploitation.mp4
|
43.4 MB
|
Understanding The Win SMB NTLM Weak Nonce Vulnerability.mp4
|
37.8 MB
|
Virtually Pwned - Pentesting VMware.mp4
|
45.5 MB
|
Web Application Security Payloads.mp4
|
17.6 MB
|
WPA Migration Mode - WEP Is Back To Haunt You....mp4
|
30.1 MB
|
/Ekoparty 7 2011/
|
Aaron Portnoy.mp4
|
32.5 MB
|
Agustin Gianni - Seab Heelan - Attacking the WebKit Heap.mp4
|
50.2 MB
|
Alex Kirk.mp4
|
16.2 MB
|
Ariel Futoransky.mp4
|
36.6 MB
|
Cesar Cerrudo.mp4
|
72.7 MB
|
Chema Alonso.mp4
|
55.9 MB
|
Hojung Song.mp4
|
59.8 MB
|
Jaime Restrepo.mp4
|
33.5 MB
|
Luis Miras.mp4
|
46.4 MB
|
Manuel Aristaran.mp4
|
51.9 MB
|
Marcos Nieto.mp4
|
20.4 MB
|
Mariano nunez.mp4
|
62.3 MB
|
Rhuss - Varangott.mp4
|
54.7 MB
|
Ruben Santamarta.mp4
|
95.0 MB
|
Ryan Mc Arthur.mp4
|
48.3 MB
|
Thai Duong.mp4
|
89.6 MB
|
Tobias Muller.mp4
|
74.0 MB
|
Tom Ritter.mp4
|
52.3 MB
|
/Ekoparty 8 2012/
|
Alfredo Ortega y Sebastian Muñiz - Satellite baseband mods - Taking control of the InmarSat GMR-2 phone terminal.mp4
|
62.8 MB
|
Cesar Cerrudo - Cyberwar para todos.mp4
|
69.2 MB
|
Esteban Fayo - Defectos criptograficos en el protocolo de autenticacion de bases de datos Oracle.mp4
|
50.9 MB
|
Esteban Guillardoy - Panico y Locura en Java.mp4
|
44.6 MB
|
Juan Perez Etchegoyen - Inception of the SAP platform.mp4
|
52.7 MB
|
Keith Howell and Babak Javadi - 4140 Ways Your Alarm System Can Fail.mp4
|
67.4 MB
|
Matias Katz y Maxi Soler - HTExploit.mp4
|
21.8 MB
|
OPSEC for hackers.mp4
|
50.5 MB
|
PIN para todos.mp4
|
42.9 MB
|
Roberto Martinez - Live response to random targeted attacks.mp4
|
85.5 MB
|
SINFP3.mp4
|
42.0 MB
|
The Crime Attack.mp4
|
98.2 MB
|
Trace surfing.mp4
|
42.1 MB
|
VGA persistent Rootkit.mp4
|
53.5 MB
|
/Ekoparty 9 2013/
|
02 Kallenberg.mp4
|
56.2 MB
|
18 Kallenberg.mp4
|
41.5 MB
|
Alonso.mp4
|
38.7 MB
|
Apa Penagos.mp4
|
70.2 MB
|
Chavez Rinaudo.mp4
|
26.7 MB
|
Economou.mp4
|
71.3 MB
|
Falcon Riva.mp4
|
56.1 MB
|
Garcia Valeros.mp4
|
55.8 MB
|
Gianni Soles.mp4
|
43.3 MB
|
Gutesman Santansieri.mp4
|
55.0 MB
|
Heitman.mp4
|
33.3 MB
|
Hursti.mp4
|
42.5 MB
|
Lerner.mp4
|
49.4 MB
|
Lucangeli.mp4
|
49.8 MB
|
Manzano.mp4
|
38.2 MB
|
Michael Coppola - Weighing in on Issues with Cloud Scale.mp4
|
42.1 MB
|
Pacheco.mp4
|
32.4 MB
|
ReMedina Palladino.mp4
|
25.6 MB
|
Richarte.mp4
|
59.3 MB
|
Rowley.mp4
|
34.4 MB
|
Valasek.mp4
|
28.3 MB
|
/Ekoparty 10 2014/
|
Alex Rad - Pointer Subterfuge In The Browser Address Space.mp4
|
60.2 MB
|
Alexander Matrosov y Yuriy Bulygin - BERserk - New RSA signature forgery attack.mp4
|
33.1 MB
|
Alexander Matrosov y Yuriy Bulygin - BIOS and Secure Boot Attacks Uncovered.mp4
|
66.8 MB
|
Alfredo Ortega - Deep-submicron CPU backdoors.mp4
|
68.4 MB
|
Braden Thomas - Reverse Engineering the Supra iBox Yes.mp4
|
66.1 MB
|
Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems.mp4
|
97.3 MB
|
Christian Heitman - BARFing Gadgets.mp4
|
51.4 MB
|
Cristian Borghello, Marcelo Temperini y Maximiliano Macedo - La cifra negra de los delitos informaticos.mp4
|
45.8 MB
|
CSI - Madrid - Lorenzo Martinez.mp4
|
153.3 MB
|
Drew Suarez - Making Androids Bootable Recovery Work For You.mp4
|
74.4 MB
|
Federico Muttis y Anibal Sacco - IDA Synergy Collaborative Reverse Engineering.mp4
|
33.9 MB
|
Gerardo Richarte - Tita, update rapido de nuestro 3er satelite - Dime si estas online y te dire con quien hablas.mp4
|
55.5 MB
|
Hernan Costante y Juan Berner - Security Monitoring like the NSA (con precios cuidados).mp4
|
68.9 MB
|
Javier Aguinaga - Shellcode s map with locks in exports.mp4
|
19.5 MB
|
Lorenzo Martinez - Cooking an APT in the paranoid way.mp4
|
83.3 MB
|
Lorenzo Martinez Rodriguez - Cooking an APT in the paranoid way.mp4
|
83.3 MB
|
Luciano Martins - Privacidad - Una historia de desencuentros.mp4
|
79.2 MB
|
Luis Colunga - Explotacion practica de senales de radio con Software Defined Radio.mp4
|
58.7 MB
|
Marcio Almeida Macedo & Bruno Goncalves de Oliveira - - Bypassing Secure Desktop Protections.mp4
|
72.1 MB
|
Marcio Almeida Macedo - Hacking RFID Billing Schemes For Fun and Free Rides.mp4
|
48.7 MB
|
Martin Balao y Martin Fernandez - 2 threads, 1 app (Inyeccion en Dalvik VM).mp4
|
56.1 MB
|
Nahuel D. Sanchez y Sergio Abraham - Dissecting and Attacking RMI Frameworks.mp4
|
78.9 MB
|
Panel - Pasado y presente de la seguridad..mp4
|
137.4 MB
|
Paul McMillan - Practical String Comparison Timing Attacks.mp4
|
56.6 MB
|
Rahul Sasi - Security vulnerabilities in DVB-C networks - Hacking Cable tV network part 2.mp4
|
72.9 MB
|
Thiago Bordini - Monitoring malicious domains on the Internet in real time for forensics purposes.mp4
|
39.7 MB
|
/Ekoparty 11 2015/
|
[Panel] Voto Electronico - Pensando El Futuro De La Democracia Desde Una Perspectiva Tecnologica..mp4
|
124.6 MB
|
Abusing Gdi For Ring0 Exploit Primitives - Diego Juarez.mp4
|
30.6 MB
|
Arm Disassembling With A Twist.mp4
|
43.0 MB
|
Breaking Vault - Fernando Russ.mp4
|
86.4 MB
|
Crozono - Cracking The Security Perimeter With Drones - Pablo Romanos & Sheila Berta.mp4
|
65.4 MB
|
Direct X - Direct Way To Microsoft Windows Kernel X - Nikita Tarakanov.mp4
|
50.3 MB
|
Exploiting Gsm And Rf To Pwn You Phone - Manuel Moreno & Francisco Cortes.mp4
|
60.6 MB
|
Faux Disk Encryption - Realities Of Secure Storage On Mobile Devices - Drew Suarez & Daniel Mayer.mp4
|
80.7 MB
|
Flash Talks.mp4
|
60.1 MB
|
Fuzzing Browsers For Finding Exploitable Bugs - Nicolas Trippar.mp4
|
32.3 MB
|
Hackeando Carros En Latinoamerica - Jaime Restrepo.mp4
|
106.4 MB
|
IR Transformation Synthesis For Assembly Instructions - Sebastian N. Fernandez.mp4
|
67.0 MB
|
Learn About The Enemy - Moonbeom Park.mp4
|
65.6 MB
|
New Age Phreaking - T&acticas Y Trucos Para Fraudes En Wholesale - David Batanero.mp4
|
78.4 MB
|
Recovering Sap Rfc Credentials From Network Traffic - Emiliano Fausto.mp4
|
29.8 MB
|
Satellite Tv Receivers - From Remote Control To Root Shell - Sofiane Talmat.mp4
|
57.1 MB
|
Security Devops Is Possible - How Osquery Is Built - Teddy Reed & Javier Marcos.mp4
|
82.4 MB
|
SSL Certificate Massive Analysis.. - And Medical Aplications Fingerprinting - Bertin Bervis & James Jara.mp4
|
55.5 MB
|
Stick That In Your (Root)Pipe & Smoke It - Patrick Wardle.mp4
|
91.2 MB
|
System Updates, Attack And Defense - Sofiane Talmat.mp4
|
32.2 MB
|
Vot.Ar - Una Mala Elecci&on - Ivan Ariel Barrera Oro & Javier Smaldone.mp4
|
95.0 MB
|
Warranty Void If Label Removed - Attacking Mpls Networks - Georgi Geshev.mp4
|
105.2 MB
|
Windows Smep Bypass - U=s - Nicolas Economou & Enrique Nissim.mp4
|
88.4 MB
|
Winter Is Coming - Ivan Arce.mp4
|
90.3 MB
|
Workshop - Rfid Nfc For The Masses (Version Ultra-Comprimida) - Nahuel Grisolia.mp4
|
138.0 MB
|
/Ekoparty 12 2016/
|
Andrew Robbins y Rohan Vazarkar - Six Degrees of Domain Admin.mp4
|
70.5 MB
|
Drew Suarez y Daniel Mayer - Don't Be a Dummy - A Crash Course in Automotive Security.mp4
|
77.7 MB
|
Enrique Nissim - I Know Where Your Page Lives - De-randomizing the Windows 10 Kernel.mp4
|
77.6 MB
|
Entrega de premios y cierre.mp4
|
108.8 MB
|
Ezequiel Fernandez y Sergio Viera - Multiple Vulnerabilities in SE PLC.mp4
|
75.0 MB
|
Javier Smaldone y Ivan Ariel Barrera Oro - Una mala eleccion (actualizada).mp4
|
53.6 MB
|
Joernchen - Let Me GitHub That For You (2016 Argentinian Edition).mp4
|
37.8 MB
|
Juan Berner - Exploiting A B Testing for Fun and Profit.mp4
|
61.4 MB
|
Julien Lenoir y Raphael Rigo - Lost your - secure - HDD PIN We can help.mp4
|
84.3 MB
|
Martin Gendler - Juegos Online, Sociedad y Privacidad - un recorrido socio-historico.mp4
|
52.1 MB
|
Martin Vigo - Do-it-Yourself Spy Program - Abusing Apple Call Relay Protocol.mp4
|
93.2 MB
|
Moritz Jodeit - Look Mom, I don't use Shellcode - Browser Exploitation for IE 11.mp4
|
101.1 MB
|
Nahuel Cayetano Riva - Getting fun with Frida.mp4
|
52.1 MB
|
Nahuel Sanchez y Sergio Abraham - SAP HANA under the hood.mp4
|
85.6 MB
|
Nicolas Economou y Diego Juarez - Abusing GDI for ring0 exploit primitives - Reloaded.mp4
|
86.9 MB
|
Patrick Wardle - Strolling into Ring-0 via I O Kit Drivers.mp4
|
89.8 MB
|
Rodrigo Cetera y Javier Bassi - #KillTheHashes - El Gran Libro para Colorear Malware.mp4
|
50.8 MB
|
Rolf Rolles - Synesthesia - Automated Generation of Encoding-Restricted Machine....mp4
|
118.1 MB
|
Sebastian Garcia - Stratosphere IPS. The free machine learning malware detection.mp4
|
79.4 MB
|
Sheila Berta y Claudio Caracciolo - Backdooring CAN Bus for Remote Car Hacking.mp4
|
88.9 MB
|
Travis Morrow y Josh Pitts - Genetic Malware - Designing Payloads for Specific Targets.mp4
|
76.7 MB
|
Tyler Curtis - Encryption out of LINE.mp4
|
75.0 MB
|
/Ekoparty 13 2017/
|
Alejo Popovici - The Java soothsayer.mp4
|
66.5 MB
|
Alex Ionescu - The - Bird - That Killed Arbitrary Code Guard.mp4
|
87.4 MB
|
Alfredo Ortega - Turning hard disk drives into accidental microphones.mp4
|
46.8 MB
|
Andres Blanco - 802.11 Protocol Chaos.mp4
|
75.2 MB
|
Cierre ekoparty security conference #13.mp4
|
169.4 MB
|
Collin Mulliner - Inside Android’s SafetyNet Attestation - Attack and Defense.mp4
|
91.1 MB
|
Daniel Komaromy - Unbox Your Phone - Exploring and Breaking Samsung's TS.mp4
|
54.9 MB
|
Diego Aranha - (In)security of e-voting in Brazil.mp4
|
88.8 MB
|
Dmitry Chastuhin - Get to the Money - Hacking POS and POP Systems.mp4
|
50.4 MB
|
Etienne Stalmans - Ruler - From Exchange to DA.mp4
|
78.7 MB
|
Felipe Manzano & Josselin Feist - Automatic bugfinding for the blockchain.mp4
|
62.8 MB
|
George Nosenko - How to cook Cisco - Exploit Development for Cisco IOS.mp4
|
49.4 MB
|
Jose Selvi - FIESTA - an HTTPS side-channel party.mp4
|
47.5 MB
|
Leandro Ferrari - Inseguridad en alarmas para vehiculos.mp4
|
83.1 MB
|
Lucas Apa & Cesar Cerrudo - Hacking Robots Before Skynet.mp4
|
88.5 MB
|
Luciano Martins & Ruth Barbacil - Rusos, chinos, y todos los que se vengan.mp4
|
67.6 MB
|
Marcelo Romero - Bypass Android Hack.mp4
|
40.8 MB
|
N. Corvalan, J. Couchet & E. Casanovas - SeND IPv6 to Graphical Machine Learning.mp4
|
61.8 MB
|
Nicolas Economou - Abusing GDI for ring0 exploit primitives - Evolution.mp4
|
105.9 MB
|
No es una impresora, es una maquina de voto HD.mp4
|
17.4 MB
|
Oleksandr Bazhaniuk - Blue Pill for your phone.mp4
|
53.9 MB
|
Omri Herscovici & Omer Gull - Pwned in Translation - from Subtitles to RCE.mp4
|
50.0 MB
|
Panel Voto Electronico.mp4
|
163.5 MB
|
Rich Smith & Pepijn Bruienne - The Apple of your EFI.mp4
|
70.3 MB
|
Robert Lipovsky - Industroyer - biggest threat to ICS since Stuxnet.mp4
|
43.5 MB
|
Rodrigo Iglesias & HackanCuba - TOR Exit Nodes en la justicia Argentina.mp4
|
47.6 MB
|
Sheila Berta & Claudio Caracciolo - The Bicho - An Advanced Car Backdoor Maker.mp4
|
67.5 MB
|
/Ekoparty 14 2018/
|
Abusing Insecure WCF Endpoints Fabius Artrel.eng.srt
|
103.5 KB
|
Abusing Insecure WCF Endpoints Fabius Artrel.mp4
|
36.2 MB
|
AFL, QBDI And KSE Are on a Boat... Gabrielle Viala.eng.srt
|
44.2 KB
|
AFL, QBDI And KSE Are on a Boat... Gabrielle Viala.mp4
|
24.6 MB
|
Bricking or Implanting Servers Not as Hard as You.eng.srt
|
130.6 KB
|
Bricking or Implanting Servers Not as Hard as You.mp4
|
54.7 MB
|
Crafting PDF Readers with Floating Points Javier A.mp4
|
42.4 MB
|
Don't Trust the NIC Attacking Windows NDIS Drivers.mp4
|
43.1 MB
|
Dynamic Callbacks for Persistence xtr4nge.mp4
|
28.0 MB
|
ekoparty 2018 dia 3 - MDM Me Maybe by James Barcla.eng.srt
|
101.4 KB
|
ekoparty 2018 dia 3 - MDM Me Maybe by James Barcla.mp4
|
53.0 MB
|
ekoparty Dia 1 - How To Hack SD-WAN And Keep Your.mp4
|
68.5 MB
|
Finding and Exploiting Vulnerabilities in Mobile P.eng.srt
|
130.5 KB
|
Finding and Exploiting Vulnerabilities in Mobile P.mp4
|
42.3 MB
|
How To Hack SD-WAN And Keep Your Sanity Sergei Gor.mp4
|
67.5 MB
|
iOS JB Present and Future Jonathan Levin.eng.srt
|
141.2 KB
|
iOS JB Present and Future Jonathan Levin.mp4
|
53.4 MB
|
Knocking Down the Big Door Nahuel Grisolía.mp4
|
54.6 MB
|
MAME 20 Years of Reverse-Engineering for the Sake.mp4
|
58.7 MB
|
MDM Me Maybe James Barclay.eng.srt
|
74.9 KB
|
MDM Me Maybe James Barclay.mp4
|
42.4 MB
|
Old New Things An Examination of the Philips TriMe.mp4
|
67.3 MB
|
Out of the (v)Box Josué Rojas.mp4
|
41.8 MB
|
Panel introducción a la seguridad 2018 Preguntas f.mp4
|
164.5 MB
|
PHP Object Injection Revival Claudio Salazar.mp4
|
49.6 MB
|
Pwning Google Earth Fabián Cuchietti.mp4
|
24.0 MB
|
Remotely Attacking System Firmware Jesse Michael.eng.srt
|
131.6 KB
|
Remotely Attacking System Firmware Jesse Michael.mp4
|
57.5 MB
|
ROP Chain Execution Detection Using Intel PT Diego.mp4
|
49.4 MB
|
Sleeping with the Enemy Compiler Software Vulnerab.mp4
|
28.6 MB
|
Smart Contract Honeypots for Profit (and probably.eng.srt
|
70.4 KB
|
Smart Contract Honeypots for Profit (and probably.mp4
|
35.8 MB
|
The Unbearable Lightness of BMCs Matias Soler & Ni.mp4
|
47.6 MB
|
To Execute or Not to Execute. How to Build a Malwa.mp4
|
54.0 MB
|
/Ekoparty 15 2019/
|
20 devices in 45 seconds Automated Bug Hunting in IoT Devices.eng.srt
|
72.9 KB
|
20 devices in 45 seconds Automated Bug Hunting in IoT Devices.mp4
|
57.0 MB
|
A un bit de ir en cana. Hacking e ingeniería social al límite de la ley.mp4
|
148.2 MB
|
Arbitrary Code Mitigations and Remote Procedure Code Reuse Attacks.mp4
|
34.0 MB
|
Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers.mp4
|
77.2 MB
|
Ekoparty Security Conference 2019 #eko15 - Flash Review.mp4
|
16.9 MB
|
Free rides SUBE, REDBUS, SATBUS and others.mp4
|
56.8 MB
|
Hacking and auditing LoRaWAN networks.mp4
|
72.6 MB
|
Harnessing Weapons of Mac Destruction.eng.srt
|
99.4 KB
|
Harnessing Weapons of Mac Destruction.mp4
|
75.8 MB
|
Internet-Scale analysis of AWS Cognito Security.mp4
|
62.9 MB
|
Introduction to reverse engineering of radio signals.mp4
|
85.8 MB
|
Modern Secure Boot Attacks Bypassing Hardware Root of Trust from Software.eng.srt
|
47.5 KB
|
Modern Secure Boot Attacks Bypassing Hardware Root of Trust from Software.mp4
|
55.3 MB
|
OSINT e Ingeniería Social aplicada a las investigaciones.mp4
|
170.1 MB
|
Pwning Oracle EBS for Real Profit a.k.a. Show Me The Money.mp4
|
85.7 MB
|
Receta Práctica y Económica de un Implante de Hardware.mp4
|
76.0 MB
|
Resumen ekoparty 2019.mp4
|
5.3 MB
|
Synthetically Breaking macOS.eng.srt
|
77.3 KB
|
Synthetically Breaking macOS.mp4
|
59.1 MB
|
The Advanced Threats Evolution REsearchers Arm Race.eng.srt
|
69.2 KB
|
The quest to memory safety.mp4
|
45.0 MB
|
Trashing like it’s 1999 - Unsolicited forensics on GPS trackers.mp4
|
63.2 MB
|
Unveiling the underground world of Anti-Cheats.mp4
|
70.6 MB
|
/Ekoparty 16 2020/
|
Avoiding Jail - Marcelo Temperini Hackeando dentro de los límites legales.mp4
|
31.7 MB
|
Avoiding Jail - Panel de debate con CISOs.mp4
|
95.1 MB
|
Avoiding Jail - Panel de debate legalidad y seguridad.mp4
|
104.6 MB
|
Avoiding Jail - Temperini Macedo Caire Borghello - Panel Debate Actividades de Seguridad.mp4
|
100.3 MB
|
Blue Space - Francis Guibernau Pandemic Lurkers.mp4
|
29.1 MB
|
Blue Space - Matias Dulce New Matrix, Same MITRE - Preparando la defensa con MITRE Shield.mp4
|
32.3 MB
|
Blue Space - Roberto y Jose Luis Rodriguez Open Threat Research (Keynote).mp4
|
55.5 MB
|
BlueSpace - Ayelen Torello & Fernanda Billordo Zini Yet Another Talk About Yara.mp4
|
37.6 MB
|
BlueSpace - Blue Team Generando visibilidad y respondiendo ante ciberamenazas desde un SOC.mp4
|
84.6 MB
|
BlueSpace - Diego Osorio Reina Emulación de adversarios con Mitre ATT&CK y Caldera.mp4
|
67.7 MB
|
BlueSpace - Gabriela Nicolao & Luciano Martins Prevención de fuga de información.mp4
|
40.8 MB
|
BlueSpace - Juan José Benitez Operaciones en el Ciberespacio.mp4
|
92.6 MB
|
BlueSpace - Luciano Sebastianelli Analizando piezas maliciosas de Android en Smali y Linux.mp4
|
91.3 MB
|
BlueSpace - Matias Dulce New Matrix, Same MITRE Preparando la defensa con Mitre SHIELD.mp4
|
20.6 MB
|
BlueSpace - Ruben Lencina Automatizando la respuesta ante incidentes.mp4
|
58.3 MB
|
BLUESPACE - Valentina Palacin & Fernanda B. Zini Mapeando con ATT&CK.mp4
|
32.7 MB
|
Bounty Hunters - Adrian Pedrazzoli XSS de -1 a 0.mp4
|
40.5 MB
|
Bounty Hunters - Arsenio Aguirre Docker ofensivo para CTF, pentesting y bug bounty.mp4
|
47.9 MB
|
Bounty Hunters - Ben Sadehipour Closing Keynote by Nahamsec.eng.srt
|
32.0 KB
|
Bounty Hunters - Ben Sadehipour Closing Keynote by Nahamsec.mp4
|
22.7 MB
|
Bounty Hunters - Ben Sadehipour Knock knock, who's there Identifying assets in the cloud.eng.srt
|
85.7 KB
|
Bounty Hunters - Ben Sadehipour Knock knock, who's there Identifying assets in the cloud.mp4
|
85.2 MB
|
Bounty Hunters - Eduardo Garcia Melia Burp Bounty - Scan Check Builder.mp4
|
50.3 MB
|
Bounty Hunters - Eduardo Nuri Increasing your ROI at Hunting.mp4
|
52.6 MB
|
Bounty Hunters - Jaime Restrepo Lo que nadie te dijo antes de dedicarte al Bug Bounty.mp4
|
108.6 MB
|
Bounty Hunters - Juan Bonino Lemon Booster - Automatizando desde la UI.mp4
|
40.5 MB
|
Bounty Hunters - Leandro Pintos Bug Bounty Automation from noob to beginner [Kick Start].mp4
|
46.1 MB
|
Bounty Hunters - Luis Lopez ¿Cuál es la mejor herramienta para tu recon.mp4
|
43.0 MB
|
Bounty Hunters - Mauro Soria Explotación de deserializaciones en Aplicaciones Web.mp4
|
80.8 MB
|
Bounty Hunters - Stök Fredrik Successful Habits for Bug Hunters.eng.srt
|
22.9 KB
|
Bounty Hunters - Stök Fredrik Successful Habits for Bug Hunters.mp4
|
30.1 MB
|
DevSecOps - From Void to Monje Newbie Containers no son Docker pero Docker es un container.mp4
|
77.8 MB
|
DevSecOps - Madhu Akula Kubernetes Goat - Vulnerable by Design Kubernetes Environment.mp4
|
90.6 MB
|
DevSecOps Space - Agustín Celano AppSec VulnMgmt Pipelines.mp4
|
64.0 MB
|
DevSecOps Space - Ezequiel Grondona & Ignacio Fiandrino Whac-A-Snake, hitting security in Python.mp4
|
69.8 MB
|
DevSecOps Space - Facundo de la Cruz Building the next generation cloud infrastructure.mp4
|
81.2 MB
|
DevSecOps Space - Filipi Pires Pivoting and Exploitation in Docker Environment.mp4
|
81.5 MB
|
DevSecOps Space - Francisco Bobadilla Manejo de secretos en modelos GitOps en la nube.mp4
|
63.3 MB
|
DevSecOps Space - Kevin Frachtenberg Security Enhanced on Groups Automation (AKA SEGA).mp4
|
38.5 MB
|
DevSecOps Space - Luciano Moreira & Christian Ibiri Estado del Arte DevSecOps en Latam.mp4
|
79.1 MB
|
DevSecOps Space - Patching the CISOs.mp4
|
75.0 MB
|
DevSecOps Space - Spencer Krum Falco.mp4
|
66.8 MB
|
DevSecOps Space - ¿Cómo se monetiza la seguridad en aplicaciones.mp4
|
50.6 MB
|
Ekoparty 2020 Day 3 Recap.mp4
|
4.5 MB
|
Ekoparty 2020 Flash Review.mp4
|
5.2 MB
|
LockpickAr - Francisco Canteli Hacking RF for physical security.mp4
|
40.7 MB
|
LockpickAR Space - Agustin Lombardo Introducción al lockpicking clásico.mp4
|
44.3 MB
|
Main Track - A Walk Through Historical Correlations Between Security Issues & Stock Prices.mp4
|
35.7 MB
|
Main Track - Alex Useche Anatomy of a Gopher - Binary Analysis of Go Binaries.eng.srt
|
71.4 KB
|
Main Track - Alex Useche Anatomy of a Gopher - Binary Analysis of Go Binaries.mp4
|
56.1 MB
|
Main Track - Andres Riancho Step by step AWS Cloud Hacking.mp4
|
65.5 MB
|
Main Track - AudioNet A deep learning convolutional approach to audio spoofing detection.mp4
|
48.5 MB
|
Main Track - Barbacil, Martins, Palacin Nmap me & you are dead Ethics, attribution & bias.mp4
|
68.3 MB
|
Main Track - Carlos Benitez & Luciano Bello Keep calm and play with qubits.mp4
|
97.3 MB
|
Main Track - Chloé Messdaghi Gotta Catchem All - Bug Bounty.mp4
|
44.2 MB
|
Main Track - Corentin Bayet & Bruno Pujos SpeedPwning VMware Workstation.mp4
|
67.7 MB
|
Main Track - Dan Borgogno Hacking the Digital DNI.mp4
|
67.0 MB
|
Main Track - Dr. Alfonso Muñoz Your polyglot belongs to me. Steganography in modern APTs.mp4
|
77.7 MB
|
Main Track - Emmanuel Seoane Strategies for Linux firmware porting. Create your own Frankenstein.mp4
|
49.8 MB
|
Main Track - Fabio Assolini & Thiago Marques Opening up the ‘Tétrade’ Umbrella.mp4
|
73.5 MB
|
Main Track - Martín Abbatemarco Anatomy of Smart Contract Exploits in the Wild.mp4
|
56.1 MB
|
Main Track - Nicolas Correia SF30th Hacking Edition.mp4
|
72.0 MB
|
Main Track - Patrick Wardle - Breaking, Entering, and Staying. Adventures in hacking macOS.eng.srt
|
94.3 KB
|
Main Track - Patrick Wardle - Breaking, Entering, and Staying. Adventures in hacking macOS.mp4
|
73.1 MB
|
Main Track - Pawel Rzepa Serverless security attack & defense.mp4
|
81.9 MB
|
Main Track - Static analysis-based recovery of service function calls in UEFI firmware.eng.srt
|
82.1 KB
|
Main Track - Static analysis-based recovery of service function calls in UEFI firmware.mp4
|
66.7 MB
|
Main Track - SungHyoun Song Deep dive into Android RunTime for dynamic binary analysis.eng.srt
|
67.6 KB
|
Main Track - SungHyoun Song Deep dive into Android RunTime for dynamic binary analysis.mp4
|
80.8 MB
|
Main Track - This is how an attacker may become root in a Company’s Software Servers.mp4
|
69.8 MB
|
Main Track - Tomas Coiro Breaking SmartScreen With Whatever I Have On Hand.mp4
|
39.1 MB
|
Main Track - Xena Olsen Every Breath You Take - A CTI Review of Stalkerware.mp4
|
73.4 MB
|
Main Track - Óscar Toledo G. Cómo mi curiosidad revitalizó una comunidad.mp4
|
32.8 MB
|
Media Chicas - Yas Garcia Mujeres en Data Science.mp4
|
33.1 MB
|
Mobile Hacking - Apertura y bienvenida al Mobile Hacking Space de Ekoparty.mp4
|
18.7 MB
|
Mobile Hacking - César Calderón Cómo armar tu laboratorio para análisis de APK.mp4
|
164.9 MB
|
Mobile Hacking - Dan Borgogno & Ileana Barrionuevo Malware injection on Android apps.mp4
|
89.3 MB
|
Mobile Hacking - Fernando Conislla Murguia Hackeando Aplicaciones móviles de ¿Seguridad.mp4
|
44.8 MB
|
Mobile Hacking - Gustavo - Puky - Sorondo Mobile Hacking Tips.mp4
|
38.9 MB
|
Mobile Hacking - Juan Urbano Stordeur iOS App Analysis, ¿por dónde empiezo.mp4
|
52.8 MB
|
Mobile Hacking - Kyle Benac Exploting Android deep links and exported components.mp4
|
43.4 MB
|
Mobile Hacking - Lukáš Štefanko Android COVID-19 threats.mp4
|
40.4 MB
|
Mobile Hacking - M. Marsicano OWASP Mobile Project and how to use it for white hat hacking.mp4
|
66.9 MB
|
Radio Experimentación - Cecilia Pastorino & Dan Borgogno Bluetooth Low Energy Hacking 101.mp4
|
187.8 MB
|
Radio Experimentación - Daniel Ulloa Telemetría de un CANSAT. Enlace redundante con SDR.mp4
|
47.3 MB
|
Radio Experimentación - Guillermo Riva & Carlos Zerbini Introducción a GNU radio.mp4
|
95.7 MB
|
Radio Experimentación - Pagos contacless El transporte público de São Paulo.mp4
|
37.7 MB
|
Radio Experimentation - Andres Tarantini Experimentación con globos.mp4
|
80.8 MB
|
Radio Experimentation - Federico La Rocca TEMPEST en VGA.mp4
|
72.6 MB
|
Radio Experimentation - Guillermo Riva & Carlos Zerbini Medición de celdas LTE con SDR.mp4
|
85.1 MB
|
Radio Experimentation - Luis Lubeck Dispositivos inteligentes, ¿decisiones inteligentes.mp4
|
62.0 MB
|
Radio Experimentation - Sequeira & Marino Practical LoRaWAN Auditing And Exploitation.mp4
|
54.9 MB
|
Radio Experimentation Space - Salvador Mendoza Hunter Cat.mp4
|
57.9 MB
|
Social Engineering - Carlos Gandara Taller Arduino RubberDucky Attack.mp4
|
76.4 MB
|
Social Engineering - Denise Gross Legal Social Engineering.mp4
|
79.4 MB
|
Social Engineering - Emiliano Piscitelli & Martin Vila Bienvenida e introducción al Space.mp4
|
29.5 MB
|
Social Engineering - Emiliano Piscitelli Pretextos y el Metodo P.I.C.O.mp4
|
32.7 MB
|
Social Engineering - Jorge Martin Vila Lateral Phishing Attack.mp4
|
50.9 MB
|
Social Engineering - Marcos Russo Herramientas de ingeniería social desde Docker.mp4
|
102.4 MB
|
Social Engineering - Matias Choren Comunicación No Verbal Aplicada a la Ingenieria Social.mp4
|
67.8 MB
|
Social Engineering - Oscar Murillo Ingeniería Social al Alcance de Todos.mp4
|
117.4 MB
|
Social Engineering - Sandra Zilla Phishing Donde la ingeniería social es protagonista.mp4
|
53.0 MB
|
Social Engineering - Satriano Baltasar The dark forest of the cybercrime industry.mp4
|
74.2 MB
|
Social Engineering - Web Scraping con Python para la recolección de información.mp4
|
72.6 MB
|
Social Engineering Space - Daniel Schulman Psicología aplicada al Phishing.mp4
|
58.2 MB
|
Wardriving - Tomas Giordano y Agustin Osorio Do drink and wardrive.mp4
|
73.4 MB
|
Zona - Red - Team - César Cuadra & Hernán Parodi Red Teaming en entornos industriales.mp4
|
52.8 MB
|
Zona - Red - Team - Diego Bruno Basic Introduction to Red Team Operations.mp4
|
71.2 MB
|
Zona - Red - Team - Emilio Couto CIRCO v2 [Cisco Implant Raspberry Controlled Operations].mp4
|
67.2 MB
|
Zona - Red - Team - Israel Aráoz Severiche Exploit Development 101, sin miedo al Overflow.mp4
|
137.5 MB
|
Zona - Red - Team - Jorge Orchilles Adversary Emulation - don't get stung by a Honeybee.eng.srt
|
111.4 KB
|
Zona - Red - Team - Jorge Orchilles Adversary Emulation - don't get stung by a Honeybee.mp4
|
90.8 MB
|
Zona - Red - Team - Pablo González ATTPwn Adversarial emulation & offensive techniques.mp4
|
132.3 MB
|
/Ekoparty 17 2021/
|
1-click to infiltrate your organization via vulnerable VS Code extensions -.eng.srt
|
51.8 KB
|
1-click to infiltrate your organization via vulnerable VS Code extensions -.mp4
|
44.8 MB
|
20 años desarrollando software - Catalina Salvati - Patagon Aerospace.mp4
|
93.9 MB
|
99% Coraje, 1% Know How - Ivana Bernabela Mlinarevic (AKA Trini) - Patagon Aerospace.mp4
|
46.9 MB
|
A practical guide to fuzz testing - Dennis Kengo Oka - Hardware Hacking Space.eng.srt
|
50.5 KB
|
A practical guide to fuzz testing - Dennis Kengo Oka - Hardware Hacking Space.mp4
|
40.0 MB
|
A Study on Android Pre-Tests - Anísio Santos - Mobile Hacking.eng.srt
|
47.3 KB
|
A Study on Android Pre-Tests - Anísio Santos - Mobile Hacking.mp4
|
45.5 MB
|
Accesos, alternativas y consecuencias en - Edorta Echave - OT - IIOT - IOT Space.mp4
|
72.2 MB
|
All your Ether are belong to us - Luis Quispe Gonzales -.mp4
|
71.2 MB
|
AMA (ask me anything) - Gerardo Richarte - Patagon Aerospace.mp4
|
101.9 MB
|
An Introduction to Container Hacking - Rory McCune - DevSecOps Space.eng.srt
|
86.0 KB
|
An Introduction to Container Hacking - Rory McCune - DevSecOps Space.mp4
|
57.5 MB
|
An Introduction to Container Hacking ▪ Rory McCune ▪ Ekoparty 2021 DevSecOps Space.eng(transcribed) (2).eng(transcribed).srt
|
86.0 KB
|
Apertura de la EKO 2021 - Ekoparty to the Moon - Cortometraje completo.mp4
|
36.8 MB
|
Assessing IOT whit EXPLIoT Framework - Aseem Jakhar - Hardware Hacking Space.mp4
|
53.5 MB
|
Automating Incident Response - Tomás Rambaud & Ignacio Rodríguez Páez - BlueSpace.mp4
|
44.2 MB
|
Aventuras en FintechLand - Gustavo - Puky - Sorondo - CyberFinance by Galicia.mp4
|
42.1 MB
|
Blockchain Desde su origen - Nicolás Colombo - CyberFinance by Galicia.mp4
|
32.6 MB
|
Breaking the security barrier of a major infusion pump - D. McKee & P. Laulheret -.eng.srt
|
90.6 KB
|
Breaking the security barrier of a major infusion pump - D. McKee & P. Laulheret -.mp4
|
61.5 MB
|
Bring a catsniffer to your IOT Home - E. Contreras & P. Calderon - Radio Space.mp4
|
74.9 MB
|
Bsides Chile - Ewald Hollstein - Community Space.mp4
|
17.2 MB
|
Bug Bounty Behind Scene - Bruno Limoni & Fabri Faggiani - Bug Bounty Space.mp4
|
66.1 MB
|
Bundles of Joy Breaking macOS via Subverted Applications Bundles - Patrick Wardle -.eng.srt
|
75.3 KB
|
Bundles of Joy Breaking macOS via Subverted Applications Bundles - Patrick Wardle -.mp4
|
57.8 MB
|
C2Centipede APT level C2 - Jose Garduño - Red Zone Space.mp4
|
93.5 MB
|
Ciberamenazas al usar criptomonedas - Hellis Leiva - CyberFinance by Galicia.mp4
|
48.3 MB
|
Cibercirujanos análisis forense de equipos móviles - M. Romero - Mobile Hacking.mp4
|
46.5 MB
|
Ciberespacio como - nuevo dominio del conflicto - Juan José Benitez - BlueSpace.mp4
|
82.4 MB
|
Cloud is easy Try to manage misconfigurations - Carlos M. Gaona & Claudio Rosa -.mp4
|
59.6 MB
|
Cloudtopolis Zero Infrastructure - Joel Gámez - Red Zone Space.mp4
|
40.9 MB
|
Comunicaciones Asincrónicas para una Internet Espacial - Juan Fraire - EKO 2021 Patagon Aerospace.mp4
|
100.5 MB
|
Conceptos de OT para Blue Teamers - Santiago Abastante & Matias Manassero - BlueSpace.mp4
|
42.0 MB
|
Cortemos con el Fraude - M. Temperini, M. Macedo & C. Borghello - Avoiding Jail Space.mp4
|
46.4 MB
|
Criptografía Post-Cuántica integrada en HTTPS - Diego Córdoba -.mp4
|
56.9 MB
|
Crymen La Crónica del Crypto Crimen - Francis Guibernau -.mp4
|
65.9 MB
|
Crónica de un incidente anunciado - Lucas Paus - CyberFinance by Galicia.mp4
|
52.1 MB
|
Cyber Resilience - Guillermo Carrasco - CyberFinance by Galicia.mp4
|
68.0 MB
|
Cyber Stopper vs Cyber Enabler - Walter Ariel Risi - CyberFinance by Galicia.mp4
|
46.0 MB
|
CyberFraud Evolution - E. Invernón, C. Gehmlich & S. Wilke - CyberFinance by Galicia.mp4
|
49.8 MB
|
CyberRisk IT the roadmap to secure InfoSec - Flor Vilardel - CyberFinance by Galicia.mp4
|
33.0 MB
|
Código de día, Hacking de noche - Damian Gambacorta - Bug Bounty Space.mp4
|
47.1 MB
|
De 0 a millones de dólares en un par de paquetes - P. Artuso & I. Favro -.mp4
|
56.9 MB
|
De TIAB & Space Shielding a trabajar en la industria espacial - Patagon Aerospace.mp4
|
104.3 MB
|
Del monitoreo al SOC, digo al Socless - Santiago Fernandez - DevSecOps Space.mp4
|
42.5 MB
|
Democratising silicon - Rodrigo Jaramillo - Hardware Hacking Space.mp4
|
34.2 MB
|
Demystifying Mobile Security with a COVID App - Jasmine Jackson - Mobile Hacking.eng.srt
|
74.1 KB
|
Demystifying Mobile Security with a COVID App - Jasmine Jackson - Mobile Hacking.mp4
|
72.4 MB
|
DeployAr - Ariel Ruiz - Community Space.mp4
|
28.4 MB
|
Descontrol en las líneas de SAFETY - D. Espitia & C. Avila - OT - IIOT - IOT Space.mp4
|
50.4 MB
|
Detección automatizada de phishing - Emiliano Piscitelli - CyberFinance by Galicia.mp4
|
28.6 MB
|
Detecting phishing on mobile devices - Santiago Rodríguez - Mobile Hacking.eng.srt
|
42.4 KB
|
Detecting phishing on mobile devices - Santiago Rodríguez - Mobile Hacking.mp4
|
45.9 MB
|
Detection and Reaction to threats in Kubern - Thomas Labarussias - DevSecOps Space.eng.srt
|
26.7 KB
|
Detection and Reaction to threats in Kubern - Thomas Labarussias - DevSecOps Space.mp4
|
25.3 MB
|
DIAL Did I just alert Lambda - Saransh Rana, Divyanshu Mehta & Harsh Varagiya -.mp4
|
34.5 MB
|
Digital Identity from zero to trust - Gastón Rodríguez - CyberFinance by Galicia.mp4
|
46.7 MB
|
Dissecting common android game hacking techniques - Lautaro Fain - Mobile Hacking.mp4
|
75.3 MB
|
Escalando con guisantes - Carlos Polop - Red Zone Space.mp4
|
59.6 MB
|
Esteganografia y CTF - Marcos Pablo Russo -.mp4
|
67.3 MB
|
Experiencias en Google VRP - Yesenia Trejo y Adrián Pedrazzoli - Bug Bounty Space.mp4
|
61.7 MB
|
Extracting all the azure passwords - Karl Fosaaen - Red Zone Space.eng.srt
|
92.6 KB
|
Extracting all the azure passwords - Karl Fosaaen - Red Zone Space.mp4
|
39.9 MB
|
Fake you Stoping The Spread of Fake News - Roberto E. González -.mp4
|
68.5 MB
|
From Zero to Trello - Gabriel Tarsia (TrelloBoy) - Bug Bounty Space.mp4
|
30.6 MB
|
Fuzzing Finding your own bugs and 0days - Rodolpho Concurde - Red Zone Space.mp4
|
50.9 MB
|
Gestionar y responder a incidentes de CyberSec sin morir en el intento - BlueSpace.mp4
|
61.1 MB
|
Gestión de cibercrisis - Diego Taich & Viviana Basso - CyberFinance by Galicia.mp4
|
53.9 MB
|
Gotham City SSH from zero to trust - Lucas Calisi - DevSecOps.mp4
|
38.8 MB
|
HackAda Mujeres en Ciberseguridad - Natalia Pérez & Jennifer Nilo - Community Space.mp4
|
24.3 MB
|
Hacking Airplanes the reality vs the hype - Ken Munro - Patagon Aerospace.eng.srt
|
59.5 KB
|
Hacking Airplanes the reality vs the hype - Ken Munro - Patagon Aerospace.mp4
|
50.0 MB
|
Hacking Android & iOS apps with Deep Links & XSS - Abraham Aranguren - Mobile Hacking.eng.srt
|
136.2 KB
|
Hacking Android & iOS apps with Deep Links & XSS - Abraham Aranguren - Mobile Hacking.mp4
|
59.0 MB
|
Hacking Blockchain - Camilo Rodríguez & Fiore Scantamburlo - CyberFinance by Galicia.mp4
|
39.7 MB
|
Hacking Desktop Applications - Héctor Peralta - Bug Bounty Space.mp4
|
55.5 MB
|
Hacking the pandemic's most popular software Zoom - Thijs Alkemade -.mp4
|
58.7 MB
|
Historias de vulnerabilidades de un Bug Hunter - Jesús Espinoza - Bug Bounty Space.mp4
|
68.9 MB
|
How to do Code Review - Shubham - Shubs - Shah - Bug Bounty Space.eng.srt
|
41.4 KB
|
How to do Code Review - Shubham - Shubs - Shah - Bug Bounty Space.mp4
|
27.2 MB
|
I'm not pink, I prefer purple - Melissa Nole Soto - CyberFinance by Galicia.mp4
|
55.7 MB
|
ICS Cyber Kill Chain - Javier Perez & Juan Escobar - Red Zone Space.mp4
|
76.0 MB
|
IIoT, data infrastructure, smart factory - Sarka Pekarova - OT - IIOT - IOT Space.eng.srt
|
72.6 KB
|
IIoT, data infrastructure, smart factory - Sarka Pekarova - OT - IIOT - IOT Space.mp4
|
67.0 MB
|
Instituto Argentino de Radio Astronomia 101 - Martin Salibe - Patagon Aerospace.mp4
|
51.5 MB
|
Introducción a la captura de amenazas en entornos industriales - OT IIOT IOT Space.mp4
|
65.8 MB
|
Introducción y Bienvenida - M. Temperini, M. Macedo & R. Caire - Avoiding Jail Space.mp4
|
51.1 MB
|
Introducción a SPIFFE y SPIRE - A. Martínez Fayó & M. Yacob - DevSecOps Space.mp4
|
66.9 MB
|
Introduction to ATM Penetration Testing - Héctor Cuevas - CyberFinance by Galicia.mp4
|
50.3 MB
|
Investigando transacciones sospechosas de bitcoins con OSINT - Euler Neto - BlueSpace.mp4
|
39.5 MB
|
Istio Service Mesh Security - Diego Chavez - DevSecOps Space.mp4
|
93.2 MB
|
Jaime Restrepo I AKA Dragonjar - Keynote - Bug Bounty Space.mp4
|
53.7 MB
|
Kernel Pwning with eBPF a Love Story - Chompie -.eng.srt
|
73.0 KB
|
Kernel Pwning with eBPF a Love Story - Chompie -.mp4
|
59.7 MB
|
Kubernetes Native Policy Management - Jim Bugwadia - DevSecOps Space.eng.srt
|
83.0 KB
|
Kubernetes Native Policy Management - Jim Bugwadia - DevSecOps Space.mp4
|
70.4 MB
|
L4tin~HTB (Hack the box) - Community Space.mp4
|
25.0 MB
|
La administración y gestión del fraude - Manuel Giraldo - CyberFinance by Galicia.mp4
|
50.6 MB
|
Lluvia de riesgos y amenazas - Paola Rodrigues & Janice Ricco - BlueSpace.mp4
|
45.6 MB
|
Location latency analyzer - Esteban Rivera - CyberFinance by Galicia.mp4
|
21.9 MB
|
Machine Learning vs. Hardware - Dominik Sisejkovic - Hardware Hacking Space.eng.srt
|
62.0 KB
|
Machine Learning vs. Hardware - Dominik Sisejkovic - Hardware Hacking Space.mp4
|
41.4 MB
|
MagicRecon - Agustín Doménech - Bug Bounty Space.mp4
|
45.1 MB
|
Mainframe - Juan Aguayo & Carlos Pose - CyberFinance by Galicia.mp4
|
34.6 MB
|
Malware Hunting Using python as attack weapon - Filipi Pires - Red Zone Space.mp4
|
55.9 MB
|
Matrioshka SIGINT Análisis de señales ocultas - David Marugán - Radio Space.mp4
|
65.7 MB
|
My app is running with Kubernetes - Carol Valencia - DevSecOps Space.mp4
|
57.7 MB
|
Offensive Azure Security - Sergey Chubarov - Red Zone Space.eng.srt
|
82.4 KB
|
Offensive Azure Security - Sergey Chubarov - Red Zone Space.mp4
|
62.6 MB
|
Open Blockchain - Camilo Rodríguez - CyberFinance by Galicia.mp4
|
89.0 MB
|
Operationalized Purple Teaming - Jorge Orchilles - Red Zone Space.mp4
|
68.6 MB
|
Packagedna Escaneando el ADN de tu código - Diego S. Espitia - DevSecOps Space.mp4
|
33.3 MB
|
Pain't it, blue (Keynote) - Xena Olsen - BlueSpace.eng.srt
|
33.6 KB
|
Pain't it, blue (Keynote) - Xena Olsen - BlueSpace.mp4
|
26.6 MB
|
Panel sobre Persecución de investigador@s de InfoSec en LATAM - Avoiding Jail Space.mp4
|
57.6 MB
|
Panel sobre Reconocimiento Facial 1 - O.D.I.A. asociación - Avoiding Jail Space.mp4
|
54.8 MB
|
Panel sobre Reconocimiento Facial 2 - O.D.I.A. asociación - Avoiding Jail Space.mp4
|
50.6 MB
|
PenTesting vs Red Teaming - David Probinsky - Red Zone Space.mp4
|
55.6 MB
|
PGSharp Analysis of a Cheat Engine on Android - Romain Thomas - Mobile Hacking.eng.srt
|
31.5 KB
|
PGSharp Analysis of a Cheat Engine on Android - Romain Thomas - Mobile Hacking.mp4
|
28.2 MB
|
Phish like an APT - Sanne Maasakkers - Red Zone Space.eng.srt
|
83.7 KB
|
Phish like an APT - Sanne Maasakkers - Red Zone Space.mp4
|
64.7 MB
|
PINATA PIN Automatic Try Attack - Salvador Mendoza -.mp4
|
59.7 MB
|
Planning a fleet of satellites at Satellogic - Juan Pedro Fisanotti - EKO 2021 Patagon Aerospace.mp4
|
103.0 MB
|
Practical IoT Hacking Detras de las cortinas - Paulino Calderon - Radio Space.mp4
|
51.4 MB
|
Practical Mobile App Attacks By Example - Abraham Aranguren - Mobile Hacking.eng.srt
|
119.3 KB
|
Practical Mobile App Attacks By Example - Abraham Aranguren - Mobile Hacking.mp4
|
62.5 MB
|
Principios y recursos para el pentesting de apps iOS - Mario Micucci - Mobile Hacking.mp4
|
74.9 MB
|
Privacidad, Intimidad, Anonimato ¿estamos perdiendo - Kennbro -.mp4
|
64.1 MB
|
Propulsión de Satélites 101 - Marco Luis Miretti - Patagon Aerospace.mp4
|
103.4 MB
|
Protegiendo nuestra privacidad frente al capitalismo de vigilancia - BlueSpace.mp4
|
62.2 MB
|
Providing Reliability to GCP with Security Chaos - Yuri Niño - DevSecOps Space.mp4
|
62.0 MB
|
Prueba otra vez. Fracasa otra vez. Fracasa mejor - Julieta Luz Porta - EKO 2021 Patagon Aerospace.mp4
|
61.8 MB
|
Racketeer Prototyping Ransomware Operations - Dimitry Snezhkov - Red Zone Space.eng.srt
|
85.1 KB
|
Racketeer Prototyping Ransomware Operations - Dimitry Snezhkov - Red Zone Space.mp4
|
62.0 MB
|
Reconocimineto de funciones modbus - Ezequiel Fernández - OT IIOT IOT Space.mp4
|
75.0 MB
|
Reflexiones de una hacker latina - Maggie Jauregui -.mp4
|
73.9 MB
|
Response Smuggling Exploiting HTTP 1.1 Connections - Martin Doyhenard -.mp4
|
69.5 MB
|
Revisiting ring3 API hooks tricks to defeat analysis tools - Rafael Salema Marquez -.eng.srt
|
64.7 KB
|
Revisiting ring3 API hooks tricks to defeat analysis tools - Rafael Salema Marquez -.mp4
|
60.5 MB
|
Rompiendo con las finanzas tradicionales - Camilo Rodríguez - CyberFinance by Galicia.mp4
|
63.6 MB
|
Seguridad Jurídica para - M. Temperini, M. Macedo & R. Caire - Avoiding Jail Space.mp4
|
47.6 MB
|
Sleight of ARM Demystifying Intel Houdini - Brian Hong - Hardware Hacking Space.eng.srt
|
66.9 KB
|
Sleight of ARM Demystifying Intel Houdini - Brian Hong - Hardware Hacking Space.mp4
|
47.4 MB
|
Smart Contracts - Rodrigo Valdivia - CyberFinance by Galicia.mp4
|
9.8 MB
|
Son los Electrodomésticos la próxima - Cristian Borghello - OT - IIOT - IOT Space.mp4
|
51.3 MB
|
Staying sane doing Bug Bounties - Sean zseano - Bug Bounty Space.eng.srt
|
65.3 KB
|
Staying sane doing Bug Bounties - Sean zseano - Bug Bounty Space.mp4
|
40.6 MB
|
Steps and Thoughts The journey towards phishing takedown - BlueSpace.mp4
|
46.0 MB
|
System for Deepfake Detection - DeepAudioDetector -.mp4
|
72.4 MB
|
Talking to Hackers - Steve Luczynski - Patagon Aerospace.eng.srt
|
39.5 KB
|
Talking to Hackers - Steve Luczynski - Patagon Aerospace.mp4
|
34.9 MB
|
The art of Securing Webviews - Imdadullah Mohammed & Shiv Sahni - Mobile Hacking.mp4
|
66.2 MB
|
The art of war of Browser Fingerprinting - Florencia Rao & Leandro Cuozzo - BlueSpace.mp4
|
51.7 MB
|
The Kerberos Key List attack The return of the Read Only Domain Controllers -.mp4
|
62.6 MB
|
The making of an Aerospace Village Badge - Dan Allen - Patagon Aerospace.eng.srt
|
52.9 KB
|
The making of an Aerospace Village Badge - Dan Allen - Patagon Aerospace.mp4
|
47.5 MB
|
The Mooltipass Open Source - Mathieu Stephan - Hardware Hacking Space.eng.srt
|
47.7 KB
|
The Mooltipass Open Source - Mathieu Stephan - Hardware Hacking Space.mp4
|
36.4 MB
|
The silent partners - Carlos Benitez & Luciano Bello.mp4
|
61.7 MB
|
The Unbelievable Insecurity of the Big Data Stack - Sheila A. Berta -.mp4
|
65.1 MB
|
Threats are clear in any - K. Frachtenberg Goldsmit & F. Alarcón - DevSecOps Space.mp4
|
40.4 MB
|
Tu propia emisora de números espía - Simon Roses Femerling - Radio Space.mp4
|
139.7 MB
|
TutorSec - Community Space.mp4
|
19.4 MB
|
Vulnerabilities discovered in Android stalkerware - Lukas Stefanko - Mobile Hacking.eng.srt
|
36.9 KB
|
Vulnerabilities discovered in Android stalkerware - Lukas Stefanko - Mobile Hacking.mp4
|
32.4 MB
|
Vulnerando Sistemas de Salud - Javier Bernardo - Bug Bounty Space.mp4
|
81.6 MB
|
Who needs JS when you’ve got Turing complete fonts - O. Gianatiempo & J. Aguinaga -.mp4
|
27.4 MB
|
¿Cómo aplicar IA en ciberseguridad - F. Lisotto & P. Casas - CyberFinance by Galicia.mp4
|
38.6 MB
|
/Ekoparty 18 2022/
|
Akila Srinivasan - Keynote Speaker.eng.srt
|
90.8 KB
|
Akila Srinivasan - Keynote Speaker.mp4
|
70.5 MB
|
Alberto Daniel Hill - To hell and back.eng.srt
|
82.0 KB
|
Alberto Daniel Hill - To hell and back.mp4
|
83.5 MB
|
Alex Matrosov - Breaking Firmware Trust From Pre-EFI Exploiting Early Boot Phases.eng.srt
|
53.8 KB
|
Alex Matrosov - Breaking Firmware Trust From Pre-EFI Exploiting Early Boot Phases.mp4
|
67.7 MB
|
Andy Robbins (RedZone) - Azure Backdoors How to Hide Them, How to Find Them.eng.srt
|
82.5 KB
|
Andy Robbins (RedZone) - Azure Backdoors How to Hide Them, How to Find Them.mp4
|
75.4 MB
|
Carlos Benitez - Playing with qubits III - Quantum Cybersecurity.eng.srt
|
90.3 KB
|
Carlos Benitez - Playing with qubits III - Quantum Cybersecurity.mp4
|
78.5 MB
|
Carol Valencia - Fileless Attack in Containers.eng.srt
|
61.6 KB
|
Carol Valencia - Fileless Attack in Containers.mp4
|
70.8 MB
|
Claudiu Teodorescu - Blinding Endpoint Security Solutions WMI attack vectors.eng.srt
|
59.6 KB
|
Claudiu Teodorescu - Blinding Endpoint Security Solutions WMI attack vectors.mp4
|
75.1 MB
|
Damiano Melotti - Attack on Titan M, Reloaded Vulnerability Research on a Modern Security Chip.eng.srt
|
56.4 KB
|
Damiano Melotti - Attack on Titan M, Reloaded Vulnerability Research on a Modern Security Chip.mp4
|
61.7 MB
|
Dan Borgogno & Ileana Barrionuevo - Turning my phone into a scamming device.eng.srt
|
105.9 KB
|
Dan Borgogno & Ileana Barrionuevo - Turning my phone into a scamming device.mp4
|
100.2 MB
|
Daniel Isler Krarup - Social Engineering Space - Drag us to Wonder Bad.eng.srt
|
45.5 KB
|
Daniel Isler Krarup - Social Engineering Space - Drag us to Wonder Bad.mp4
|
57.2 MB
|
Diego Freijo - Short Talk Hominoid An anti-phishing plugin proof of concept.eng.srt
|
48.6 KB
|
Diego Freijo - Short Talk Hominoid An anti-phishing plugin proof of concept.mp4
|
34.4 MB
|
Dimitry Snezhkov (CyberFinance) - ELFPack - ELF Binary Section.eng.srt
|
75.1 KB
|
Dimitry Snezhkov (CyberFinance) - ELFPack - ELF Binary Section.mp4
|
80.7 MB
|
Eduardo Contreras & Andrés Sabas - BomberCat hardware abierto para pruebas a terminales bancarias.eng.srt
|
62.8 KB
|
Eduardo Contreras & Andrés Sabas - BomberCat hardware abierto para pruebas a terminales bancarias.mp4
|
60.7 MB
|
Entrega de premios.eng.srt
|
80.3 KB
|
Entrega de premios.mp4
|
138.2 MB
|
Fede Pacheco-Democratizando los ejercicios de simulación de respuesta a incidentes de ciberseguridad.eng.srt
|
47.9 KB
|
Fede Pacheco-Democratizando los ejercicios de simulación de respuesta a incidentes de ciberseguridad.mp4
|
37.4 MB
|
Gastón Aznarez - Not Yet Another Fuzzer.eng.srt
|
67.2 KB
|
Gastón Aznarez - Not Yet Another Fuzzer.mp4
|
64.4 MB
|
Gerardo Fernandez Navarrete - Engaño a escala técnicas de camuflaje en malware.eng.srt
|
34.4 KB
|
Gerardo Fernandez Navarrete - Engaño a escala técnicas de camuflaje en malware.mp4
|
28.5 MB
|
Hector Peralta - Bugbounty Space - Rompiendo Microsoft Teams y Electron por 150k.eng.srt
|
98.7 KB
|
Hector Peralta - Bugbounty Space - Rompiendo Microsoft Teams y Electron por 150k.mp4
|
85.7 MB
|
Javan Rasokat - A race against time - How to exploit race conditions in web apps.eng.srt
|
51.9 KB
|
Javan Rasokat - A race against time - How to exploit race conditions in web apps.mp4
|
51.4 MB
|
Josué Rojas - The game (life) and how hack it.eng.srt
|
74.8 KB
|
Josué Rojas - The game (life) and how hack it.mp4
|
62.5 MB
|
José Luiz Oliveira - Exec ASLR Abusing intel branch predictors to bypass ASLR.eng.srt
|
72.8 KB
|
José Luiz Oliveira - Exec ASLR Abusing intel branch predictors to bypass ASLR.mp4
|
66.8 MB
|
Juan Andrés Guerrero Saade - La Punta del Iceberg Ciberespionaje en Amércia Latina.eng.srt
|
86.9 KB
|
Juan Andrés Guerrero Saade - La Punta del Iceberg Ciberespionaje en Amércia Latina.mp4
|
86.3 MB
|
Juan Pedro Fisanotti (Patagon Space) - Haciendo acrobacias con satélites espaciales.eng.srt
|
110.2 KB
|
Juan Pedro Fisanotti (Patagon Space) - Haciendo acrobacias con satélites espaciales.mp4
|
91.4 MB
|
KennBro - PoorSKeme (El esquema de los pobres).eng.srt
|
50.4 KB
|
KennBro - PoorSKeme (El esquema de los pobres).mp4
|
55.0 MB
|
Lanzamiento Ekoparty 2022.eng.srt
|
4.4 KB
|
Lanzamiento Ekoparty 2022.mp4
|
11.0 MB
|
Lautaro Lombardi - Short Talk Integrating FLOSS plugins to Ghidra.eng.srt
|
33.8 KB
|
Lautaro Lombardi - Short Talk Integrating FLOSS plugins to Ghidra.mp4
|
27.9 MB
|
Maddie Stone - Exploiting Samsung Analysis of an in-the-wild Samsung Exploit Chain.eng.srt
|
79.7 KB
|
Maddie Stone - Exploiting Samsung Analysis of an in-the-wild Samsung Exploit Chain.mp4
|
101.6 MB
|
Mariano Nuñez - Romper para Crear De Hacker a CEO.eng.srt
|
105.0 KB
|
Mariano Nuñez - Romper para Crear De Hacker a CEO.mp4
|
85.2 MB
|
Martin Doyhenard - Exploiting Inter-Process Communication in SAP’s HTTP Server.eng.srt
|
104.4 KB
|
Martin Doyhenard - Exploiting Inter-Process Communication in SAP’s HTTP Server.mp4
|
72.6 MB
|
Nate Warfield - I am become loadbalancer, owner of your network.eng.srt
|
105.8 KB
|
Nate Warfield - I am become loadbalancer, owner of your network.mp4
|
76.8 MB
|
Octavio Gianatiempo - Exploring the hidden attack surface of OEM routers.eng.srt
|
84.9 KB
|
Octavio Gianatiempo - Exploring the hidden attack surface of OEM routers.mp4
|
60.0 MB
|
Pedro Cabrera - Odisea Telco 5G SUCI-Cracker y SCTP-Hijacker.eng.srt
|
86.0 KB
|
Pedro Cabrera - Odisea Telco 5G SUCI-Cracker y SCTP-Hijacker.mp4
|
77.7 MB
|
Richard Johnson - eBPF ELFs JMPing Through the Windows.eng.srt
|
75.5 KB
|
Richard Johnson - eBPF ELFs JMPing Through the Windows.mp4
|
78.0 MB
|
Robert Lipovsky - Ukraine's Past & Present Cyberwar.eng.srt
|
75.6 KB
|
Robert Lipovsky - Ukraine's Past & Present Cyberwar.mp4
|
66.2 MB
|
Roberto Fresca - Ingeniería Inversa.eng.srt
|
79.5 KB
|
Roberto Fresca - Ingeniería Inversa.mp4
|
89.0 MB
|
Ryan Naraine - Keynote speaker.eng.srt
|
99.5 KB
|
Ryan Naraine - Keynote speaker.mp4
|
101.1 MB
|
Salvador Mendoza - Spy-wear Misuse of Apple AirTags.eng.srt
|
76.0 KB
|
Salvador Mendoza - Spy-wear Misuse of Apple AirTags.mp4
|
75.9 MB
|
Sebastián Garcia Vero Valeros - Análisis global de la privacidad en tráfico celular.eng.srt
|
89.4 KB
|
Sebastián Garcia Vero Valeros - Análisis global de la privacidad en tráfico celular.mp4
|
95.8 MB
|
Silvio Cesare - Case Studies in Embedded VR.eng.srt
|
102.9 KB
|
Silvio Cesare - Case Studies in Embedded VR.mp4
|
71.6 MB
|
Tony Lauro - A deep dive into attacker obfuscation techniques.eng.srt
|
62.0 KB
|
Tony Lauro - A deep dive into attacker obfuscation techniques.mp4
|
48.2 MB
|
Varnavas - Windows Segment Heap Attacking the VS Allocator.eng.srt
|
72.3 KB
|
Varnavas - Windows Segment Heap Attacking the VS Allocator.mp4
|
77.9 MB
|
Wendel Guglielmetti Henrique & Filipe Balestra - Demystifying ATM jackpot $ (ړײ) $.eng.srt
|
70.8 KB
|
Wendel Guglielmetti Henrique & Filipe Balestra - Demystifying ATM jackpot $ (ړײ) $.mp4
|
104.9 MB
|
/Ekoparty 19 2023/
|
7 cosas que aprendí haciendo ciberseguridad en Startups - Agustin Celano - DevSecOps.eng.srt
|
64.1 KB
|
7 cosas que aprendí haciendo ciberseguridad en Startups - Agustin Celano - DevSecOps.mp4
|
52.2 MB
|
A journey finding pre and postauth d-link router 0days - Josue Rojas.eng.srt
|
62.2 KB
|
A journey finding pre and postauth d-link router 0days - Josue Rojas.mp4
|
60.7 MB
|
Agile Roadmap for Cybersecurity Maturity - Fabiola Oliveros - BlueSpace.eng.srt
|
36.9 KB
|
Agile Roadmap for Cybersecurity Maturity - Fabiola Oliveros - BlueSpace.mp4
|
36.5 MB
|
All cops are broadcasting Breaking TETRA after decades in the shadows - Wetzels, Meijer & Bokslag.eng.srt
|
78.3 KB
|
All cops are broadcasting Breaking TETRA after decades in the shadows - Wetzels, Meijer & Bokslag.mp4
|
75.1 MB
|
Amacame qué me Duremo, Workshop de Introducción a la detección de mentiras con CNV. M. Choren Ruiz.eng.srt
|
38.2 KB
|
Amacame qué me Duremo, Workshop de Introducción a la detección de mentiras con CNV. M. Choren Ruiz.mp4
|
84.1 MB
|
Analisis de contratos inteligentes (estafas) - Kennbro - Blockchain Security.eng.srt
|
61.5 KB
|
Analisis de contratos inteligentes (estafas) - Kennbro - Blockchain Security.mp4
|
77.1 MB
|
Analizando Blind Eagle como un Infante de Marina - Pontiroli & Sanchez - BlueSpace.eng.srt
|
85.3 KB
|
Analizando Blind Eagle como un Infante de Marina - Pontiroli & Sanchez - BlueSpace.mp4
|
72.9 MB
|
Apertura - Leo Pigñer.eng.srt
|
8.9 KB
|
Apertura - Leo Pigñer.mp4
|
13.4 MB
|
Aprender sobre temática espacial en Argentina - Maximiliano Pisano - Patagon Space.eng.srt
|
35.8 KB
|
Aprender sobre temática espacial en Argentina - Maximiliano Pisano - Patagon Space.mp4
|
34.0 MB
|
Attractive directory & Deceptive - Mohamed Nasisi - Red Team.eng.srt
|
60.7 KB
|
Attractive directory & Deceptive - Mohamed Nasisi - Red Team.mp4
|
86.4 MB
|
Automatización Efectiva Scripting como Aliado clave - E. Reyes - Bug Bounty Village.eng.srt
|
23.3 KB
|
Automatización Efectiva Scripting como Aliado clave - E. Reyes - Bug Bounty Village.mp4
|
20.6 MB
|
Becoming a Dark Knight Adversary Emulation Demonstration for ATT&CK Evaluations -K. Esprit - C. Self.eng.srt
|
56.8 KB
|
Becoming a Dark Knight Adversary Emulation Demonstration for ATT&CK Evaluations -K. Esprit - C. Self.mp4
|
93.2 MB
|
Bitcoin PoW as the last defense mechanism - Julian drangosch - Blockchain Security.eng.srt
|
126.0 KB
|
Bitcoin PoW as the last defense mechanism - Julian drangosch - Blockchain Security.mp4
|
112.2 MB
|
Breaking Secure Boot on the Silicon Labs Gecko platform - Sami Babigeon.eng.srt
|
61.2 KB
|
Breaking Secure Boot on the Silicon Labs Gecko platform - Sami Babigeon.mp4
|
54.6 MB
|
Buscando de manera incorrecta en el lugar equivocado. E. Piscitelli - Cyberfinance.eng.srt
|
78.8 KB
|
Buscando de manera incorrecta en el lugar equivocado. E. Piscitelli - Cyberfinance.mp4
|
54.8 MB
|
Button Combo Crash - Alexis Albert - Bug Bounty Village.eng.srt
|
48.8 KB
|
Button Combo Crash - Alexis Albert - Bug Bounty Village.mp4
|
40.9 MB
|
C2 descentralizado mediante LogDrop - Arturo 'Buanzo' Busleiman - Red Team.eng.srt
|
42.4 KB
|
C2 descentralizado mediante LogDrop - Arturo 'Buanzo' Busleiman - Red Team.mp4
|
48.3 MB
|
Casos reales de fraude financiero en Latinoamérica. Camilo Fernández - Cyberfinance.eng.srt
|
73.6 KB
|
Casos reales de fraude financiero en Latinoamérica. Camilo Fernández - Cyberfinance.mp4
|
60.0 MB
|
Charla Badge con Electronic Cats.eng.srt
|
67.5 KB
|
Charla Badge con Electronic Cats.mp4
|
62.4 MB
|
Ciberespacio como nuevo dominio de conflicto - Juan Jose Benitez - Blue Space.eng.srt
|
64.1 KB
|
Ciberespacio como nuevo dominio de conflicto - Juan Jose Benitez - Blue Space.mp4
|
52.1 MB
|
Ciberinteligencia, DFIR y CSIRT en Acción - BlueSpace.eng.srt
|
67.2 KB
|
Ciberinteligencia, DFIR y CSIRT en Acción - BlueSpace.mp4
|
69.0 MB
|
Closing Keynote - Mariana Segulin.eng.srt
|
97.5 KB
|
Closing Keynote - Mariana Segulin.mp4
|
113.3 MB
|
Common Android Deep Links & WebViews Exploitations . J Urbano Stordeur & J M Blanco - Mobile Hacking.eng.srt
|
61.2 KB
|
Common Android Deep Links & WebViews Exploitations . J Urbano Stordeur & J M Blanco - Mobile Hacking.mp4
|
55.6 MB
|
Construye tu propia Smart Wallet . Sebastian Leo Perez - Blockchain Security.eng.srt
|
77.0 KB
|
Construye tu propia Smart Wallet . Sebastian Leo Perez - Blockchain Security.mp4
|
55.7 MB
|
Counter Offensive Social Engineering . Leonardo Chiodin, Juan Iturrioz.eng.srt
|
54.5 KB
|
Counter Offensive Social Engineering . Leonardo Chiodin, Juan Iturrioz.mp4
|
43.1 MB
|
CyberRisk This is The Way - Florencia Vilardel - BlueSpace.mp4
|
48.7 MB
|
Debate abierto A7724, Tesis UTN . Facundo Lisotto - Cyberfinance.eng.srt
|
77.4 KB
|
Debate abierto A7724, Tesis UTN . Facundo Lisotto - Cyberfinance.mp4
|
70.9 MB
|
DeepThreats la influencia de la IA en el mundo del cibercrimen- Fede Seijo - BlueSpace.eng.srt
|
59.2 KB
|
DeepThreats la influencia de la IA en el mundo del cibercrimen- Fede Seijo - BlueSpace.mp4
|
47.1 MB
|
Descubriendo tesoros ocultos en el mundo Java - Andrés Gómez - Bug Bounty Village.eng.srt
|
73.7 KB
|
Descubriendo tesoros ocultos en el mundo Java - Andrés Gómez - Bug Bounty Village.mp4
|
72.5 MB
|
DevSec-Oops - Los casos de no éxito en DevSecOps - 2.0 - Luciano Moreira - DevSecOps.eng.srt
|
88.1 KB
|
DevSec-Oops - Los casos de no éxito en DevSecOps - 2.0 - Luciano Moreira - DevSecOps.mp4
|
76.5 MB
|
Ekoparty 2023 - Entrega de premios y cierre.eng.srt
|
102.8 KB
|
Ekoparty 2023 - Entrega de premios y cierre.mp4
|
179.6 MB
|
Estrategia de ZTNA La mejor barrera ante la democratización del Malware y Ransomware. G. Ferrari.eng.srt
|
61.2 KB
|
Estrategia de ZTNA La mejor barrera ante la democratización del Malware y Ransomware. G. Ferrari.mp4
|
59.0 MB
|
Estrategias de Detección de Cyber-Amenazas - Alejandro Houspanossian - BlueSpace.eng.srt
|
75.6 KB
|
Estrategias de Detección de Cyber-Amenazas - Alejandro Houspanossian - BlueSpace.mp4
|
79.3 MB
|
Explorando apps a través de sus Javascripts - Genaro Franceschelli - BugBounty Village.eng.srt
|
48.8 KB
|
Explorando apps a través de sus Javascripts - Genaro Franceschelli - BugBounty Village.mp4
|
40.7 MB
|
Garantías procesales y licencias de software Los nuevos Jueces sin rostro - T. Pomar y E. Quaine.eng.srt
|
118.7 KB
|
Garantías procesales y licencias de software Los nuevos Jueces sin rostro - T. Pomar y E. Quaine.mp4
|
66.4 MB
|
Google y Phishing Cuando el Gigante se Hace Cómplice - Irina Puebla - Southax.eng.srt
|
21.6 KB
|
Google y Phishing Cuando el Gigante se Hace Cómplice - Irina Puebla - Southax.mp4
|
24.8 MB
|
Haciendo el camino Mis 2 primeros Bounties - Bronxxi - Bug Bounty Village.eng.srt
|
30.4 KB
|
Haciendo el camino Mis 2 primeros Bounties - Bronxxi - Bug Bounty Village.mp4
|
27.9 MB
|
HackCafé Literario by Ekobooks con Fede Bustos Reyes I En vivo desde Lado B I Daniel Monastersky.eng.srt
|
38.3 KB
|
HackCafé Literario by Ekobooks con Fede Bustos Reyes I En vivo desde Lado B I Daniel Monastersky.mp4
|
42.9 MB
|
Hackeá tu primer banco - P. Grandoli, F. Lisotto, A. Merlo, C. Gehmlich - Cyberfinance.eng.srt
|
51.3 KB
|
Hackeá tu primer banco - P. Grandoli, F. Lisotto, A. Merlo, C. Gehmlich - Cyberfinance.mp4
|
52.3 MB
|
Hacking e inteligencia artificial - Christian Urcuqui López - Red Team.eng.srt
|
92.6 KB
|
Hacking e inteligencia artificial - Christian Urcuqui López - Red Team.mp4
|
93.3 MB
|
How to hijack a VoLTE network - Pavel Novikov.eng.srt
|
66.2 KB
|
How to hijack a VoLTE network - Pavel Novikov.mp4
|
64.6 MB
|
Ignite An Open Source Tool for AWS credential gathering - Santi Abastante - Red Team.eng.srt
|
44.1 KB
|
Ignite An Open Source Tool for AWS credential gathering - Santi Abastante - Red Team.mp4
|
55.4 MB
|
Incidentes de ciberseguridad y los desafíos de la regulación -Marcela Pallero - A 1 bit de ir en cana.eng.srt
|
100.6 KB
|
Incidentes de ciberseguridad y los desafíos de la regulación -Marcela Pallero - A 1 bit de ir en cana.mp4
|
78.0 MB
|
Indirect Prompt Injections in the Wild - Real World exploits and mitigations - Johann Rehberger.eng.srt
|
85.9 KB
|
Indirect Prompt Injections in the Wild - Real World exploits and mitigations - Johann Rehberger.mp4
|
71.4 MB
|
Ingeniería Social Más allá de las risas, la realidad de nuestra vulnerabilidad digital..eng.srt
|
94.8 KB
|
Ingeniería Social Más allá de las risas, la realidad de nuestra vulnerabilidad digital.mp4
|
72.5 MB
|
Intent-Based Exploits The Dark Side of Android IPC. Esteban Echandia - Mobile hacking.eng.srt
|
28.3 KB
|
Intent-Based Exploits The Dark Side of Android IPC. Esteban Echandia - Mobile hacking.mp4
|
27.0 MB
|
Introduction to Beacon Object Files in the context of red-teaming operations - Rafael Felix -EKO2023.eng.srt
|
46.5 KB
|
Introduction to Beacon Object Files in the context of red-teaming operations - Rafael Felix -EKO2023.mp4
|
53.4 MB
|
I’m High - Nicolas Economou.eng.srt
|
54.4 KB
|
I’m High - Nicolas Economou.mp4
|
57.7 MB
|
JASM - Julián Mérida Renny & Daniel Gutson - BlueSpace.eng.srt
|
27.0 KB
|
JASM - Julián Mérida Renny & Daniel Gutson - BlueSpace.mp4
|
23.6 MB
|
KeyNote - Javo - 100 Vulnerabilities in 30 Days - Alan Levy - Bug Bounty Village.eng.srt
|
104.7 KB
|
KeyNote - Javo - 100 Vulnerabilities in 30 Days - Alan Levy - Bug Bounty Village.mp4
|
100.5 MB
|
La AlquimIA de los Modelos de Lenguaje - Marian Basti - Southax.eng.srt
|
76.0 KB
|
La AlquimIA de los Modelos de Lenguaje - Marian Basti - Southax.mp4
|
71.9 MB
|
La radioastronomia y el proyecto LLAMA - Mariela Corti - Starh4ck Village.eng.srt
|
78.8 KB
|
La radioastronomia y el proyecto LLAMA - Mariela Corti - Starh4ck Village.mp4
|
90.5 MB
|
Lado B I Con Alan Levy I EKO 2023.eng.srt
|
32.1 KB
|
Lado B I Con Alan Levy I EKO 2023.mp4
|
38.2 MB
|
Lado B I Con Andrés Blanco I EKO 2023.eng.srt
|
51.5 KB
|
Lado B I Con Andrés Blanco I EKO 2023.mp4
|
41.7 MB
|
Lado B I Con César Cerrudo I EKO 2023.eng.srt
|
35.9 KB
|
Lado B I Con César Cerrudo I EKO 2023.mp4
|
39.6 MB
|
Lado B I Con Electronic Cats I EKO 2023.eng.srt
|
32.6 KB
|
Lado B I Con Electronic Cats I EKO 2023.mp4
|
38.9 MB
|
Lado B I Con Fede Kirschbaum, Fede Pacheco y Fede Bustos I EKO 2023.eng.srt
|
41.5 KB
|
Lado B I Con Fede Kirschbaum, Fede Pacheco y Fede Bustos I EKO 2023.mp4
|
44.5 MB
|
Lado B I Con Iván Arce I EKO 2023.eng.srt
|
33.9 KB
|
Lado B I Con Iván Arce I EKO 2023.mp4
|
44.4 MB
|
Lado B I Con Jerónimo Basaldúa I EKO 2023.eng.srt
|
26.9 KB
|
Lado B I Con Jerónimo Basaldúa I EKO 2023.mp4
|
26.9 MB
|
Lado B I Con Joel Noguera AKA Niemand y Diego Jurado I EKO 2023.eng.srt
|
30.0 KB
|
Lado B I Con Joel Noguera AKA Niemand y Diego Jurado I EKO 2023.mp4
|
30.4 MB
|
Lado B I Con Kate Espirit y Cat Self I EKO 2023.eng.srt
|
17.6 KB
|
Lado B I Con Kate Espirit y Cat Self I EKO 2023.mp4
|
34.8 MB
|
Lado B I Con Leonardo Pigñer I EKO 2023.eng.srt
|
23.7 KB
|
Lado B I Con Leonardo Pigñer I EKO 2023.mp4
|
26.9 MB
|
Lado B I Con Octavio Gianatiempo I EKO 2023.eng.srt
|
16.6 KB
|
Lado B I Con Octavio Gianatiempo I EKO 2023.mp4
|
18.5 MB
|
Lado B I Con Paulino Calderón I EKO 2023.eng.srt
|
40.8 KB
|
Lado B I Con Paulino Calderón I EKO 2023.mp4
|
48.2 MB
|
Lado B I Con Sabrina Pagnotta I EKO 2023.eng.srt
|
28.6 KB
|
Lado B I Con Sabrina Pagnotta I EKO 2023.mp4
|
29.4 MB
|
Lado B I Con Sebastián Davidovsky I EKO 2023.eng.srt
|
30.1 KB
|
Lado B I Con Sebastián Davidovsky I EKO 2023.mp4
|
32.9 MB
|
Lado B I Con Sheila A. Bertha I EKO 2023.eng.srt
|
32.3 KB
|
Lado B I Con Sheila A. Bertha I EKO 2023.mp4
|
34.6 MB
|
Lado B I Con STOK I EKO 2023.eng.srt
|
37.0 KB
|
Lado B I Con STOK I EKO 2023.mp4
|
84.5 MB
|
Lado B I Lockpicking en vivo I EKO 2023.eng.srt
|
50.1 KB
|
Lado B I Lockpicking en vivo I EKO 2023.mp4
|
84.9 MB
|
Let’s talk about malvertising - Leandro Cuozzo & Lisandro Ubiedo - BlueSpace.eng.srt
|
74.4 KB
|
Let’s talk about malvertising - Leandro Cuozzo & Lisandro Ubiedo - BlueSpace.mp4
|
66.4 MB
|
macOS Red Teaming 101 - Ricardo Logan - Red Team.eng.srt
|
37.5 KB
|
macOS Red Teaming 101 - Ricardo Logan - Red Team.mp4
|
51.6 MB
|
Making Privacy Work production engineering applied to privacy infrastructure - Juan Pablo Borgna.eng.srt
|
90.7 KB
|
Making Privacy Work production engineering applied to privacy infrastructure - Juan Pablo Borgna.mp4
|
85.5 MB
|
Manejo de Ciberincidente 101 - Alberto Herrera - BlueSpace.eng.srt
|
69.4 KB
|
Manejo de Ciberincidente 101 - Alberto Herrera - BlueSpace.mp4
|
67.9 MB
|
MEET THE HACKER I En vivo desde Lado B I Pedro Adamović.eng.srt
|
50.3 KB
|
MEET THE HACKER I En vivo desde Lado B I Pedro Adamović.mp4
|
50.5 MB
|
Mi camino a los 2500 puntos de reputación en Hackerone - LemonOfTroy - BugBountyARG.eng.srt
|
74.8 KB
|
Mi camino a los 2500 puntos de reputación en Hackerone - LemonOfTroy - BugBountyARG.mp4
|
59.2 MB
|
Mobile Hacking 101 A Cross-Platform Audit Journey - Cesar Calderon - Mobile Hacking.eng.srt
|
47.4 KB
|
Mobile Hacking 101 A Cross-Platform Audit Journey - Cesar Calderon - Mobile Hacking.mp4
|
50.4 MB
|
O.MG, your device is pwned . Jonathan Maturana - Mobile Hacking.eng.srt
|
28.4 KB
|
O.MG, your device is pwned . Jonathan Maturana - Mobile Hacking.mp4
|
27.1 MB
|
Oh no, Winnie that’s not honey-Uncovering Honeypot’s Flawed Logic for Counter-Intelligence -S Berta.eng.srt
|
95.0 KB
|
Oh no, Winnie that’s not honey-Uncovering Honeypot’s Flawed Logic for Counter-Intelligence -S Berta.mp4
|
81.9 MB
|
Opening Keynote Ekoparty 2023 - Ivan Arce.eng.srt
|
108.3 KB
|
Opening Keynote Ekoparty 2023 - Ivan Arce.mp4
|
99.2 MB
|
OWASP SAMM approach - Martin Boratto - DevSecOps Space.eng.srt
|
72.3 KB
|
OWASP SAMM approach - Martin Boratto - DevSecOps Space.mp4
|
84.4 MB
|
P4CHAINS Encapsulating P4 in SSL to full compromise SAP systems over the Internet - Pablo Artuso.eng.srt
|
96.5 KB
|
P4CHAINS Encapsulating P4 in SSL to full compromise SAP systems over the Internet - Pablo Artuso.mp4
|
79.5 MB
|
Pablo Palazzi- Bounty hunting y pen testing desafíos y riesgos - A 1 bit de ir en Cana.eng.srt
|
104.6 KB
|
Pablo Palazzi- Bounty hunting y pen testing desafíos y riesgos - A 1 bit de ir en Cana.mp4
|
69.3 MB
|
Panel Sponsors by Ripio (Special Guest STOK) - Bug Bounty Village.eng.srt
|
45.1 KB
|
Panel Sponsors by Ripio (Special Guest STOK) - Bug Bounty Village.mp4
|
55.5 MB
|
Path traversal attacks on Android - Anderson Valencia - Mobile Hacking Village.eng.srt
|
41.6 KB
|
Path traversal attacks on Android - Anderson Valencia - Mobile Hacking Village.mp4
|
44.7 MB
|
Quick and Dirty Cloud Ransomware Detection and Response - Santi Abastante - BlueSpace.eng.srt
|
68.7 KB
|
Quick and Dirty Cloud Ransomware Detection and Response - Santi Abastante - BlueSpace.mp4
|
74.6 MB
|
Race Conditions - La fábula de la liebre y - Gustavo - Puky - Sorondo - Cyberfinance.eng.srt
|
75.0 KB
|
Race Conditions - La fábula de la liebre y - Gustavo - Puky - Sorondo - Cyberfinance.mp4
|
67.3 MB
|
Redes Neuronales de Grafos para la prevención de fraude. P. Zangara, M. Pona - Cyberfinance.eng.srt
|
47.6 KB
|
Redes Neuronales de Grafos para la prevención de fraude. P. Zangara, M. Pona - Cyberfinance.mp4
|
40.8 MB
|
RedTeaming from Basics Emplo[leaks]yees information for the win - G. Franco - Red Team.eng.srt
|
58.8 KB
|
RedTeaming from Basics Emplo[leaks]yees information for the win - G. Franco - Red Team.mp4
|
50.8 MB
|
Removing OPSEC from Cyber Predators and Threat Actors - Thiago Bordini.eng.srt
|
45.5 KB
|
Removing OPSEC from Cyber Predators and Threat Actors - Thiago Bordini.mp4
|
71.5 MB
|
Revelando el SSN de cualquiera y como hackee reddit - Cryptex - Bug Bounty Village.eng.srt
|
42.2 KB
|
Revelando el SSN de cualquiera y como hackee reddit - Cryptex - Bug Bounty Village.mp4
|
40.1 MB
|
Reverse Engineering for Enhanced Windows Visibility - Marcos Oviedo - BlueSpace.eng.srt
|
80.9 KB
|
Reverse Engineering for Enhanced Windows Visibility - Marcos Oviedo - BlueSpace.mp4
|
66.8 MB
|
RFID Badge Hacking - Physical Security Village.eng.srt
|
58.0 KB
|
RFID Badge Hacking - Physical Security Village.mp4
|
80.2 MB
|
Rocking Kubernetes Security - Facundo Alarcon & Juan Manuel Minú - BlueSpace.eng.srt
|
62.1 KB
|
Rocking Kubernetes Security - Facundo Alarcon & Juan Manuel Minú - BlueSpace.mp4
|
48.3 MB
|
Rocking Kubernetes Security - Facundo Alarcon - DevSecOps Space.eng.srt
|
60.0 KB
|
Rocking Kubernetes Security - Facundo Alarcon - DevSecOps Space.mp4
|
59.4 MB
|
Roles y responsabilidades en el fraude transaccional. Leandro Maldonado - Cyberfinance.eng.srt
|
48.7 KB
|
Roles y responsabilidades en el fraude transaccional. Leandro Maldonado - Cyberfinance.mp4
|
32.8 MB
|
Rompiendos los miedos - Santiago Miqueo - Bug Bounty Village.eng.srt
|
56.5 KB
|
Rompiendos los miedos - Santiago Miqueo - Bug Bounty Village.mp4
|
59.8 MB
|
Résumen EKO 2023.mp4
|
8.7 MB
|
SADProtocol goes to Hollywood Hijacking an IP camera stream as seen in movies-Gianatiempo - Aguinaga.eng.srt
|
61.6 KB
|
SADProtocol goes to Hollywood Hijacking an IP camera stream as seen in movies-Gianatiempo - Aguinaga.mp4
|
62.6 MB
|
Scarlet OT - OT adversary emulation for fun and profit - Vic Huang.eng.srt
|
54.4 KB
|
Scarlet OT - OT adversary emulation for fun and profit - Vic Huang.mp4
|
64.1 MB
|
Silent steps in Windows using Syscalls - Mauricio Jara - Red Team.eng.srt
|
56.9 KB
|
Silent steps in Windows using Syscalls - Mauricio Jara - Red Team.mp4
|
51.2 MB
|
Smashing the TLB for fun and profit - Daniel Fernández Kuehr & Gottfrid Svartholm.eng.srt
|
65.6 KB
|
Smashing the TLB for fun and profit - Daniel Fernández Kuehr & Gottfrid Svartholm.mp4
|
79.5 MB
|
SSRF Desatado - Eduardo - Debsec - Bug Bounty Village.eng.srt
|
20.3 KB
|
SSRF Desatado - Eduardo - Debsec - Bug Bounty Village.mp4
|
22.3 MB
|
The windows is our friend Windows Event Log Persistence - Fabricio Gimenes.eng.srt
|
42.6 KB
|
The windows is our friend Windows Event Log Persistence - Fabricio Gimenes.mp4
|
64.1 MB
|
Those Beauty medium-risk vulns to be exploited - Mateo Martinez - Red Team.eng.srt
|
98.0 KB
|
Those Beauty medium-risk vulns to be exploited - Mateo Martinez - Red Team.mp4
|
85.9 MB
|
Trabajar en una Misión Espacial Argentina - Araceli Romina Barrera - Patagon Space.eng.srt
|
35.3 KB
|
Trabajar en una Misión Espacial Argentina - Araceli Romina Barrera - Patagon Space.mp4
|
33.8 MB
|
UNConventional Cybercrime How a Bad Anti-Hacking Treaty is Becoming a Law - A 1 bit de ir en cana.eng.srt
|
136.6 KB
|
UNConventional Cybercrime How a Bad Anti-Hacking Treaty is Becoming a Law - A 1 bit de ir en cana.mp4
|
128.1 MB
|
Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare -STOK.eng.srt
|
84.8 KB
|
Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare -STOK.mp4
|
90.0 MB
|
Web3 Lecciones del Pasado, Desafíos del Presente y Soluciones para el Futuro - Blockchain Security.eng.srt
|
77.1 KB
|
Web3 Lecciones del Pasado, Desafíos del Presente y Soluciones para el Futuro - Blockchain Security.mp4
|
86.5 MB
|
Windows Agentless C2 (Ab)using the MDM Client Stack - Marcos Oviedo.eng.srt
|
92.4 KB
|
Windows Agentless C2 (Ab)using the MDM Client Stack - Marcos Oviedo.mp4
|
67.6 MB
|
WORKSHOP DevSecOps Endgame - Leonardo Rosso y Luciano Moreira - DevSecOps.eng.srt
|
198.8 KB
|
WORKSHOP DevSecOps Endgame - Leonardo Rosso y Luciano Moreira - DevSecOps.mp4
|
161.9 MB
|
¿Cómo gestionar las vulnerabilidades en ambientes OT y no hacer enemigos BlueSpace.eng.srt
|
96.4 KB
|
¿Cómo gestionar las vulnerabilidades en ambientes OT y no hacer enemigos BlueSpace.mp4
|
85.7 MB
|
/EkoTV/
|
Andres Riancho Cómo Asegurar El Pipeline De DevSecops.mp4
|
34.9 MB
|
Avoiding Jail Creación De Un Proyecto De Ley Para Hackear Dentro De Los Límites Legales.mp4
|
32.1 MB
|
Che Sandoval La Construcción Del Hacker En El Cine.mp4
|
74.8 MB
|
Ciro Cavalotti Música Con Tablets Y Asignar Sonido Al Movimiento.mp4
|
30.8 MB
|
Custom MIDI Controllers Con Mateo Ferley De #Yaeltex.mp4
|
61.2 MB
|
CyberCirujas Compus Recicladas Versus Obsolescencia Programada.mp4
|
93.5 MB
|
Dan Etenberg - El Loco Turbina - Lia Aerospace Y El Desarrollo De Cohetes Espaciales.mp4
|
32.4 MB
|
Dating, Hacking Y Sexting Seguro Con Aurorita Luna.mp4
|
74.9 MB
|
EkoKIDS Live Repensando El Hacking Desde La Niñez.mp4
|
166.4 MB
|
EKOTV Signal Y Las Vulnerabilidades De Cellebrite Con Valentín Muro..mp4
|
47.3 MB
|
El Bug De La Semana - - Dependency Confusion Con Joel Noguera.mp4
|
63.9 MB
|
El Bug De La Semana - - Vulnerabilidades En Redes #wifi.mp4
|
46.7 MB
|
El Bug De La Semana - Con Joel Noguera.mp4
|
32.8 MB
|
Especial - A Un Bit De Ir En Cana - Buscando Amparo Legal Para Hackers.mp4
|
127.2 MB
|
Especial - A Un Bit De Ir En Cana - Buscando Un Mejor Amparo Legal Para Hackers.mp4
|
135.1 MB
|
Follow The R00ts Un CTF Inmersivo Sin Precedentes En Ekoparty 2020.mp4
|
19.7 MB
|
Informática Forense Con Gustavo Presman.mp4
|
98.0 MB
|
Inteligencia Artificial Y Relaciones De Poder Con Valentín Muro..mp4
|
51.2 MB
|
Javier Smaldone Ciberpatrullaje Y La Parte Difícil De Reportar Vulnerabilidades.mp4
|
98.5 MB
|
Joaquín Vismara Streaming En La Nueva Normalidad Sin Morir En El Intento.mp4
|
50.1 MB
|
Jorge Crowe Educación Y Pensar Haciendo.mp4
|
44.4 MB
|
Juan Brodersen El Rol Del Periodismo En La Ciberseguridad.mp4
|
49.6 MB
|
Panel Multidisciplinario Actualidad Del Ransomware.mp4
|
99.3 MB
|
Practical Threat Intelligence And Data-Driven Threat Hunting - Con Valentina Palacin.mp4
|
89.4 MB
|
Sebastián Davidovsky - Engaños Digitales, Víctimas Reales.mp4
|
62.0 MB
|
The Geekers Especial Hacklloween.mp4
|
58.0 MB
|
Valentin Muro Y Jorge Crowe Cultura Hacker Y Aprender Haciendo.mp4
|
52.1 MB
|
Valentin Muro Ética Hacker Y Educación.mp4
|
48.4 MB
|
¿Cuál Fue La Mejor Ekoparty Los Fundadores Responden.mp4
|
32.3 MB
|
/Summer Workshops 2021/
|
Active Directory Post Exploitation Attacks.Eng.srt
|
120.0 KB
|
Active Directory Post Exploitation Attacks.mp4
|
132.9 MB
|
Entendiendo La Dinámica De Una Verdadera Botnet.mp4
|
82.3 MB
|
Infraestructura Ofensiva Para Red Teams Y Pentesters.mp4
|
101.5 MB
|
Introducción A Burp Suite Con Web Security Academy.mp4
|
197.8 MB
|
Keep Calm And Play With Qubits.mp4
|
150.5 MB
|
Threat Intelligence, The Malware Analysis Way.Eng.srt
|
187.6 KB
|
Threat Intelligence, The Malware Analysis Way.mp4
|
253.6 MB
|
Técnicas OSINT Para La Generación De Inteligencia.mp4
|
206.0 MB
|
/Unitalks Chile 2021/
|
Diseño De Un Microcomputador De 8 Bits Moderno.mp4
|
66.4 MB
|
El Negocio Del CriptoScam En YouTube.mp4
|
74.3 MB
|
Extended, Detection And Response (XDR), Una Aplicación Práctica.mp4
|
31.9 MB
|
Hackeando Humanos, Una Carrera Profesional.mp4
|
74.0 MB
|
OSINT For A Threat Intelligence Flow.mp4
|
47.8 MB
|
/UniTalks Córdoba 2020/
|
Alan Levy Cazarrecompensas Digital - Ganando Dinero Reportando Bugs.Eng.srt
|
87.6 KB
|
Alan Levy Cazarrecompensas Digital - Ganando Dinero Reportando Bugs.mp4
|
72.3 MB
|
Alfredo Pardo Defensa En Profundidad Para Aplicaciones En Contenedores.Eng.srt
|
67.0 KB
|
Alfredo Pardo Defensa En Profundidad Para Aplicaciones En Contenedores.mp4
|
64.3 MB
|
Arancibia, March, Santos Empowering Juniors With Data-Driven Approaches.Eng.srt
|
62.1 KB
|
Arancibia, March, Santos Empowering Juniors With Data-Driven Approaches.mp4
|
47.6 MB
|
Emiliano Piscitelli Hacking HumanOS.mp4
|
44.5 MB
|
Ileana Barrionuevo A Day In The Life Of A Pentester - I’m Up To Mischief.Eng.srt
|
69.1 KB
|
Ileana Barrionuevo A Day In The Life Of A Pentester - I’m Up To Mischief.mp4
|
54.7 MB
|
Juan Urbano Stordeur IOS App Analysis, ¿por Dónde Empiezo.Eng.srt
|
67.8 KB
|
Juan Urbano Stordeur IOS App Analysis, ¿por Dónde Empiezo.mp4
|
53.7 MB
|
Mariano Marino Radio Definida Por Software (SDR).Eng.srt
|
59.1 KB
|
Mariano Marino Radio Definida Por Software (SDR).mp4
|
54.1 MB
|
María Emilia Torino El Arte Detrás De La Seguridad En Ubuntu.Eng.srt
|
71.3 KB
|
María Emilia Torino El Arte Detrás De La Seguridad En Ubuntu.mp4
|
51.4 MB
|
Presentación Ekoparty, Córdoba Hacker Space Y UTN Córdoba.Eng.srt
|
67.4 KB
|
Presentación Ekoparty, Córdoba Hacker Space Y UTN Córdoba.mp4
|
97.6 MB
|
/Unitalks Córdoba 2021/
|
Analizando Programas Dinámicamente A Través De Sus Syscalls.mp4
|
11.4 MB
|
Desmitificando Los Troyanos Bancarios En Latinoamérica.mp4
|
44.8 MB
|
Exponiendo Las Vulnerabilidades De La BIOS Desde El Kernel De Linux.mp4
|
32.0 MB
|
Gestión De Respuesta A Incidentes.mp4
|
17.5 MB
|
Let's Play With Objection.mp4
|
35.9 MB
|
/UniTalks Panamá & Guatemala 2020/
|
Amilcar De León Cómo Hackear Personas En Guatemala Con Ingeniería Social.Eng.srt
|
69.7 KB
|
Amilcar De León Cómo Hackear Personas En Guatemala Con Ingeniería Social.mp4
|
50.7 MB
|
Federico Bossi Defeating IoT Devices Security.mp4
|
42.4 MB
|
Hubert Demercado C2, El Maestro De Las Mascotas.Eng.srt
|
32.3 KB
|
Hubert Demercado C2, El Maestro De Las Mascotas.mp4
|
22.9 MB
|
OAuth Seguridad Para El Usuario.Eng.srt
|
14.6 KB
|
OAuth Seguridad Para El Usuario.mp4
|
14.8 MB
|
Sheila Perez Improve Your Security Posture With CIS Controls And Awareness.Eng.srt
|
31.1 KB
|
Sheila Perez Improve Your Security Posture With CIS Controls And Awareness.mp4
|
45.9 MB
|
Sheyla Leacock Intrusiones En La Red - ¿Mi IDS Está Listo Para Detectarlas.Eng.srt
|
27.1 KB
|
Sheyla Leacock Intrusiones En La Red - ¿Mi IDS Está Listo Para Detectarlas.mp4
|
18.2 MB
|
Staycy Guevara Compilando Ciberseguridad En La Continuidad Del Negocio.Eng.srt
|
25.1 KB
|
Staycy Guevara Compilando Ciberseguridad En La Continuidad Del Negocio.mp4
|
17.0 MB
|
Víctor Orozco Seguridad De Aplicaciones Java JakartaEE Con OWASP Top 10.Eng.srt
|
53.1 KB
|
Víctor Orozco Seguridad De Aplicaciones Java JakartaEE Con OWASP Top 10.mp4
|
51.7 MB
|
/UniTalks Perú 2020/
|
Alonso Caballero Forense Digital A Sistemas Windows.mp4
|
83.7 MB
|
Bruno Guzman Road To EJPT.Eng.srt
|
35.3 KB
|
Bruno Guzman Road To EJPT.mp4
|
52.1 MB
|
César Farro ¿Sabes Si Tu Casa Recibe Ciberataques ¡Honeypots.mp4
|
77.0 MB
|
Erick Olortegui Init 1 - Buffer Overflow.Eng.srt
|
29.3 KB
|
Erick Olortegui Init 1 - Buffer Overflow.mp4
|
44.1 MB
|
Panel Apertura Con Bsides Perú, UPC, CySecByWomen Y Ekoparty.Eng.srt
|
39.4 KB
|
Panel Apertura Con Bsides Perú, UPC, CySecByWomen Y Ekoparty.mp4
|
55.4 MB
|
Paola Garcia Juarez Evaluación De Riesgos De Un Proveedor Cloud.mp4
|
94.1 MB
|
Rafael Huaman Implementando Purple Team.Eng.srt
|
60.7 KB
|
Rafael Huaman Implementando Purple Team.mp4
|
85.5 MB
|
/Unitalks Tandil 2021/
|
AWS Well-Architected Framework - Security Pillar.mp4
|
38.2 MB
|
De Low A - Medium Como Elevar El Riesgo De Tu Inyección De HTML.mp4
|
28.3 MB
|
Detectando RAT Malware En Teléfonos Celulares Usando El IDS Slips.mp4
|
38.2 MB
|
Introducción A La Seguridad Informática.mp4
|
66.3 MB
|
Panel De Apertura.mp4
|
54.5 MB
|
¿Quién Tiene Mi Contraseña.mp4
|
55.9 MB
|
Total files 956
|