/GreHack 2015/
|
(Invited talk) Draw me a Local Kernel Debugger - Samuel Chevet and Clément Rouault.mp4
|
39.0 MB
|
(Keynote) Failure is not an Option - - Philippe Biondi.mp4
|
51.7 MB
|
Corrupted GOOSE Detector.mp4
|
25.9 MB
|
Hacking a Sega Whitestar Pinball - Focussing on the audio board.mp4
|
34.6 MB
|
Industrial Control Systems Dynamic Code Injection.mp4
|
36.6 MB
|
Linnea - Detecting blacklist-evading malware with SQL rules.mp4
|
25.8 MB
|
New Results for the PTB-PTS Attack on Tunnelling Gateways.mp4
|
21.9 MB
|
Similarities and anomalies analysis of network mapping results.mp4
|
35.7 MB
|
/.pad/
|
28148980
|
28.1 MB
|
15414156
|
15.4 MB
|
7664245
|
7.7 MB
|
32534136
|
32.5 MB
|
30530228
|
30.5 MB
|
7786837
|
7.8 MB
|
11651257
|
11.7 MB
|
31370874
|
31.4 MB
|
1592303
|
1.6 MB
|
25876714
|
25.9 MB
|
19850885
|
19.9 MB
|
13365598
|
13.4 MB
|
28654745
|
28.7 MB
|
21190318
|
21.2 MB
|
30704873
|
30.7 MB
|
16930807
|
16.9 MB
|
29041589
|
29.0 MB
|
30512800
|
30.5 MB
|
25364383
|
25.4 MB
|
26492225
|
26.5 MB
|
28985933
|
29.0 MB
|
28975309
|
29.0 MB
|
27295709
|
27.3 MB
|
11744955
|
11.7 MB
|
26672402
|
26.7 MB
|
22334301
|
22.3 MB
|
27864661
|
27.9 MB
|
12400183
|
12.4 MB
|
5152763
|
5.2 MB
|
12519756
|
12.5 MB
|
11286204
|
11.3 MB
|
28352244
|
28.4 MB
|
23632655
|
23.6 MB
|
15764007
|
15.8 MB
|
31394751
|
31.4 MB
|
12904756
|
12.9 MB
|
33476348
|
33.5 MB
|
29328494
|
29.3 MB
|
33487079
|
33.5 MB
|
12455636
|
12.5 MB
|
33500147
|
33.5 MB
|
11019395
|
11.0 MB
|
33551846
|
33.6 MB
|
32536569
|
32.5 MB
|
33503021
|
33.5 MB
|
12187415
|
12.2 MB
|
33503487
|
33.5 MB
|
12652965
|
12.7 MB
|
33550330
|
33.6 MB
|
32124133
|
32.1 MB
|
32562319
|
32.6 MB
|
33482658
|
33.5 MB
|
10026994
|
10.0 MB
|
33517367
|
33.5 MB
|
20328563
|
20.3 MB
|
33474971
|
33.5 MB
|
4329072
|
4.3 MB
|
32679250
|
32.7 MB
|
33452125
|
33.5 MB
|
24734898
|
24.7 MB
|
33551891
|
33.6 MB
|
32017794
|
32.0 MB
|
8863357
|
8.9 MB
|
33494269
|
33.5 MB
|
32469446
|
32.5 MB
|
33520272
|
33.5 MB
|
817774
|
817.8 KB
|
33482004
|
33.5 MB
|
22418669
|
22.4 MB
|
33546289
|
33.5 MB
|
28872430
|
28.9 MB
|
25229454
|
25.2 MB
|
33544688
|
33.5 MB
|
27160346
|
27.2 MB
|
29472178
|
29.5 MB
|
33546648
|
33.5 MB
|
27932707
|
27.9 MB
|
33515378
|
33.5 MB
|
32643007
|
32.6 MB
|
33490926
|
33.5 MB
|
25961049
|
26.0 MB
|
31493393
|
31.5 MB
|
15148490
|
15.1 MB
|
7383106
|
7.4 MB
|
7380517
|
7.4 MB
|
32738972
|
32.7 MB
|
33499050
|
33.5 MB
|
13676191
|
13.7 MB
|
1151684
|
1.2 MB
|
33506842
|
33.5 MB
|
10266521
|
10.3 MB
|
3651092
|
3.7 MB
|
14792412
|
14.8 MB
|
33516126
|
33.5 MB
|
16030678
|
16.0 MB
|
19093507
|
19.1 MB
|
31384903
|
31.4 MB
|
26777449
|
26.8 MB
|
33496394
|
33.5 MB
|
2122008
|
2.1 MB
|
33502338
|
33.5 MB
|
3239182
|
3.2 MB
|
33545811
|
33.5 MB
|
24249166
|
24.2 MB
|
33512652
|
33.5 MB
|
13794414
|
13.8 MB
|
33493288
|
33.5 MB
|
32173306
|
32.2 MB
|
31934007
|
31.9 MB
|
33496779
|
33.5 MB
|
5096193
|
5.1 MB
|
33550733
|
33.6 MB
|
28340175
|
28.3 MB
|
33551002
|
33.6 MB
|
28984655
|
29.0 MB
|
33548568
|
33.5 MB
|
23943064
|
23.9 MB
|
33484434
|
33.5 MB
|
3191564
|
3.2 MB
|
33502175
|
33.5 MB
|
15926825
|
15.9 MB
|
33507517
|
33.5 MB
|
3820283
|
3.8 MB
|
33481768
|
33.5 MB
|
13109254
|
13.1 MB
|
33506684
|
33.5 MB
|
6998717
|
7.0 MB
|
33549432
|
33.5 MB
|
28372554
|
28.4 MB
|
33551838
|
33.6 MB
|
30583104
|
30.6 MB
|
29882241
|
29.9 MB
|
33507381
|
33.5 MB
|
30342666
|
30.3 MB
|
33547172
|
33.5 MB
|
12491556
|
12.5 MB
|
33550014
|
33.6 MB
|
28727938
|
28.7 MB
|
33534976
|
33.5 MB
|
33553644
|
33.6 MB
|
33531023
|
33.5 MB
|
/GreHack 2016/
|
Arybo - Make expression simplification great again - Marion Videau.mp4
|
32.0 MB
|
BtleJuice - the Bluetooth Smart Man In The Middle Framework - Damien Cauquil.mp4
|
41.2 MB
|
Gorille - Another approach to binary code analysis - Jean Yves Marion.mp4
|
47.3 MB
|
Improving dm-crypt performance for XTS-AES mode - Levent Demir.mp4
|
20.2 MB
|
M - 'etamorphose.univ-nantes.fr - Rémi Lehn.mp4
|
38.5 MB
|
Old Memories Requiem - Fabien Périgaud.mp4
|
12.4 MB
|
Protecting Data on Smartphones & Tablets using Trusted Computing - Stefan Saroiu.mp4
|
70.0 MB
|
Scapy in 15 minutes - Guillaume Valadon.mp4
|
16.6 MB
|
[Rump] CNN For Everyone - Camille Mougey.mp4
|
4.5 MB
|
[Rump] Don't always trust your debugger blindly - 0xMitsurugi.mp4
|
3.0 MB
|
[Rump] Fuzzing - Nicolas Ruff.mp4
|
8.2 MB
|
[Rump] R2M2 - Guillaume Valadon.mp4
|
7.1 MB
|
[Rump] Tigress challenges - Jonathan Salwan.mp4
|
4.6 MB
|
[Rump] White Paper - Write (super) CTF Challs - Frky.mp4
|
4.6 MB
|
[Rump] XSS without parenthesis - Yohann Gely.mp4
|
6.3 MB
|
/GreHack 2017/
|
Attack ARM TrustZone using Rowhammer.mp4
|
21.8 MB
|
Automation Attacks at Scale.mp4
|
40.4 MB
|
Code Protection - Promises and Limits of Symbolic Deobfuscation.mp4
|
44.8 MB
|
Detection of cryptographic algorithms with grap.mp4
|
39.2 MB
|
Down The Rabbit Hole - How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets.mp4
|
21.2 MB
|
Efficient Defenses against Adversarial Examples for Deep Neural Networks.mp4
|
28.4 MB
|
Get the (Spider)monkey off your back.mp4
|
21.0 MB
|
Random Memories writeup.mp4
|
22.3 MB
|
Rump - Hacking in 2017.mp4
|
5.2 MB
|
Rump - Overengineered making-of.mp4
|
9.9 MB
|
TSIGKILL - Bypassing dynamic DNS updates authentication through signature forgery.mp4
|
17.8 MB
|
The Black Art of Wireless Post-Exploitation.mp4
|
35.7 MB
|
The Making of a Secure Open Source Hardware Password Keeper.mp4
|
20.6 MB
|
/GreHack 2018/
|
Abusing Privileged File Manipulation - Clement Lavoillotte.eng.srt
|
78.1 KB
|
Abusing Privileged File Manipulation - Clement Lavoillotte.mp4
|
37.8 MB
|
Analyzing Ultrasound-Based Physical Tracking Systems - Mathieu Cunche.eng.srt
|
67.4 KB
|
Analyzing Ultrasound-Based Physical Tracking Systems - Mathieu Cunche.mp4
|
21.1 MB
|
Bridging The Gap Between Secure Hardware And Open Source - Charles Guillemet.eng.srt
|
54.3 KB
|
Bridging The Gap Between Secure Hardware And Open Source - Charles Guillemet.mp4
|
22.5 MB
|
Closing Speech - Nics.eng.srt
|
2.6 KB
|
Closing Speech - Nics.mp4
|
1.0 MB
|
Corrupted Memories Requiem - - Anonymous Pwners.eng.srt
|
51.4 KB
|
Corrupted Memories Requiem - - Anonymous Pwners.mp4
|
21.4 MB
|
Detecting All Type Of Illegal Access Points On Enterprise Networks - Yunfei Yang.eng.srt
|
50.9 KB
|
Detecting All Type Of Illegal Access Points On Enterprise Networks - Yunfei Yang.mp4
|
20.9 MB
|
Opening Speech - Jean-Guillaume Dumas.eng.srt
|
4.1 KB
|
Opening Speech - Jean-Guillaume Dumas.mp4
|
1.4 MB
|
Pwn A SAP System... Then What - Yvan Genuer.mp4
|
34.5 MB
|
ROPGenerator - Practical Automated ROP-Chain Generation - Boyan Milanov.eng.srt
|
71.8 KB
|
ROPGenerator - Practical Automated ROP-Chain Generation - Boyan Milanov.mp4
|
23.5 MB
|
RUMP Session - Various.eng.srt
|
37.1 KB
|
RUMP Session - Various.mp4
|
13.2 MB
|
The Evolution Of GandCrab Ransomware - Tamas Boczan.eng.srt
|
79.5 KB
|
The Evolution Of GandCrab Ransomware - Tamas Boczan.mp4
|
29.2 MB
|
Trap Your Keyboard 101 - Marion Lafon.mp4
|
34.4 MB
|
When Electromagnetic Side Channels Meet Radio Transceivers - Marius Muench.eng.srt
|
102.3 KB
|
When Electromagnetic Side Channels Meet Radio Transceivers - Marius Muench.mp4
|
42.4 MB
|
/GreHack 2019/
|
Closing Speech - Xarkes.eng.srt
|
2.5 KB
|
Closing Speech - Xarkes.mp4
|
1.5 MB
|
Delayed Memories Requiem - - Anonymous Pwners.mp4
|
24.7 MB
|
Hunting For Bugs, Catching Dragons - Nicolas Joly.eng.srt
|
60.2 KB
|
Hunting For Bugs, Catching Dragons - Nicolas Joly.mp4
|
34.6 MB
|
IOT Security Hack The Damn Vulnerable IoT Device - Arnaud Courty.eng.srt
|
34.2 KB
|
IOT Security Hack The Damn Vulnerable IoT Device - Arnaud Courty.mp4
|
32.7 MB
|
Implementation Pitfalls Of OAuth 2.0 - Samit Anwer.eng.srt
|
72.4 KB
|
Implementation Pitfalls Of OAuth 2.0 - Samit Anwer.mp4
|
44.7 MB
|
Opening Speech - Roland Groz.eng.srt
|
8.1 KB
|
Opening Speech - Roland Groz.mp4
|
4.7 MB
|
Optimize Your Way To RCE Chakra - Bruno Keith.mp4
|
41.9 MB
|
Rump Session Access Granted.eng.srt
|
9.7 KB
|
Rump Session Access Granted.mp4
|
6.4 MB
|
Rump Session Aperi'Solved.mp4
|
4.1 MB
|
Rump Session Solving 'The Grid' In Three Different Ways.eng.srt
|
7.8 KB
|
Rump Session Solving 'The Grid' In Three Different Ways.mp4
|
5.6 MB
|
The Rise Of Evil HID Devices - Franck Bitsch and Arthur Villeneuve.eng.srt
|
39.1 KB
|
The Rise Of Evil HID Devices - Franck Bitsch and Arthur Villeneuve.mp4
|
34.5 MB
|
VBA For The Masses - Jonas Zaddach.eng.srt
|
63.5 KB
|
VBA For The Masses - Jonas Zaddach.mp4
|
41.1 MB
|
Wombat, One More Bleichenbacher Attack TK - Olivier Levillain & Aina T. Rasoamanana.mp4
|
35.6 MB
|
/GreHack 2020/
|
8-bit edition - Conference - unedited full day stream-tagged.mp4
|
18.4 MB
|
A full chained exploit from IT network to PLCs unconstrained code execution.mp4
|
26.2 MB
|
Anti-debugging tricks for Cortex-M chips - Nicolas Oberli.mp4
|
26.2 MB
|
Closing Speech - Jules Maselbas.mp4
|
815.5 KB
|
Discontinued Privacy - Mathieu Cunche and Guillaume Celosia.eng.srt
|
55.4 KB
|
Discontinued Privacy - Mathieu Cunche and Guillaume Celosia.mp4
|
19.9 MB
|
No lightsaber is needed to break the Wookey - David Berard.mp4
|
32.4 MB
|
RF Shadow games - Sebastien Dudek.eng.srt
|
47.6 KB
|
RF Shadow games - Sebastien Dudek.mp4
|
23.3 MB
|
Reverse Engineering archeology - Shlomi Oberman, Moshe Kol and Ariel Schön.mp4
|
29.9 MB
|
Short break - Musics by Confipop.mp4
|
52.3 MB
|
Sneak into buildings with KNXnet IP - Claire Vacherot.eng.srt
|
38.3 KB
|
Sneak into buildings with KNXnet IP - Claire Vacherot.mp4
|
17.5 MB
|
The Great Hotel Hack - Etizaz Mohsin.mp4
|
14.5 MB
|
/GreHack 2021/
|
Closing Speech.mp4
|
2.2 MB
|
DNSpooq - Does DNS cache poisoning still matter - Moshe Kol.mp4
|
40.3 MB
|
Exploiting CSP in WebKit - Prakash Sharma & Sachin Thakuri.eng.srt
|
58.0 KB
|
Exploiting CSP in WebKit - Prakash Sharma & Sachin Thakuri.mp4
|
31.4 MB
|
GUI-Mimic - Vincent Raulin.eng.srt
|
52.1 KB
|
GUI-Mimic - Vincent Raulin.mp4
|
30.3 MB
|
Opening Speech.eng.srt
|
8.6 KB
|
Opening Speech.mp4
|
9.3 MB
|
Optimizing Server Side Template Injection Payloads for jinja2 - Remi Gascou.eng.srt
|
41.8 KB
|
Optimizing Server Side Template Injection Payloads for jinja2 - Remi Gascou.mp4
|
19.8 MB
|
Rooting Samsung Q60T Smart TV - Jérémie Boutoille and Vincent Fargues.eng.srt
|
61.1 KB
|
Rooting Samsung Q60T Smart TV - Jérémie Boutoille and Vincent Fargues.mp4
|
34.9 MB
|
Windows kernel snapshot based fuzzing the good, the bad and the ugly - Damien Aumaitre.mp4
|
35.2 MB
|
WooKey Episode VII The Force Awakens - Phil Teuwen.eng.srt
|
57.7 KB
|
WooKey Episode VII The Force Awakens - Phil Teuwen.mp4
|
28.5 MB
|
/GreHack 2022/
|
BlueTeam vs SMB by Florian Martin.eng.srt
|
3.7 KB
|
BlueTeam vs SMB by Florian Martin.mp4
|
5.2 MB
|
CTF Cafe by Oscar Gomez (Raxo).eng.srt
|
3.4 KB
|
CTF Cafe by Oscar Gomez (Raxo).mp4
|
4.6 MB
|
Closing speech.eng.srt
|
5.9 KB
|
Closing speech.mp4
|
9.6 MB
|
Generic Remote Exploit Techniques For The PHP Allocator, And 0days by Charles Fol.eng.srt
|
70.0 KB
|
Generic Remote Exploit Techniques For The PHP Allocator, And 0days by Charles Fol.mp4
|
63.9 MB
|
Intergalactic Travels Of A Ransomware Crew by James Niven and Lindsay Kaye.eng.srt
|
52.3 KB
|
Intergalactic Travels Of A Ransomware Crew by James Niven and Lindsay Kaye.mp4
|
51.2 MB
|
Online Voting System Must Be Secure, Right by Emmanuel Leblond.eng.srt
|
46.9 KB
|
Online Voting System Must Be Secure, Right by Emmanuel Leblond.mp4
|
63.3 MB
|
Php Introspection Applied To 0-Day Research by L Jacques-Chevallier and M Coutant.eng.srt
|
72.7 KB
|
Php Introspection Applied To 0-Day Research by L Jacques-Chevallier and M Coutant.mp4
|
87.6 MB
|
Quokka A Fast And Accurate Binary Exporter by A. Challande, R. David and G. Renault.eng.srt
|
47.7 KB
|
Quokka A Fast And Accurate Binary Exporter by A. Challande, R. David and G. Renault.mp4
|
60.1 MB
|
RUMP BPF by Tristan Pourcelot.eng.srt
|
5.0 KB
|
RUMP BPF by Tristan Pourcelot.mp4
|
5.2 MB
|
RUMP Books by Pascal Lafourcade.eng.srt
|
2.6 KB
|
RUMP Books by Pascal Lafourcade.mp4
|
3.0 MB
|
RUMP REDOCS by Pascal Lafourcade.mp4
|
3.7 MB
|
Reverse Engineering Of RISC-V MCU With USB3 & Hi Speed Peripherals by Benjamin Vernoux.eng.srt
|
47.1 KB
|
Reverse Engineering Of RISC-V MCU With USB3 & Hi Speed Peripherals by Benjamin Vernoux.mp4
|
70.3 MB
|
WHID Elite II - Keystroke Injection Over GPRS by Cyprien De La Vergne De Cerval.eng.srt
|
7.3 KB
|
WHID Elite II - Keystroke Injection Over GPRS by Cyprien De La Vergne De Cerval.mp4
|
54.6 MB
|
Zandatsu by Salim El Bakraoui.eng.srt
|
4.4 KB
|
Zandatsu by Salim El Bakraoui.mp4
|
4.8 MB
|
/
|
GreHack Logo.png
|
19.5 KB
|
GreHack thank you.txt
|
0.8 KB
|
greHack logo.jpg
|
23.4 KB
|
Total files 282
|