/Slides/
|
02-LockingTheThroneRoom.pdf
|
307.7 KB
|
03-BeASmartCiso.pdf
|
4.6 MB
|
04-ProjectQuebec.pdf
|
5.8 MB
|
05-OffensiveXSLT.pdf
|
12.1 MB
|
06-Agnitio.pdf
|
6.2 MB
|
07-Pentesting_iPhone_iPad.pdf
|
1.9 MB
|
08-Skyrack.pdf
|
350.4 KB
|
09-TheForbiddenImage.pdf
|
465.2 KB
|
10-RogueAV.pdf
|
5.2 MB
|
11-ProactiveSecurity.pdf
|
4.1 MB
|
12-EscapingWindowsSandboxes.pdf
|
1.3 MB
|
/Video/
|
01 - Winn SCHWARTAU - Cyberwar 4G.mp4
|
61.6 MB
|
02 - Mario HEIDERICH - Locking the throne room.bak.mp4
|
255.9 MB
|
03 - Bruno KEROUANTON - Be a smart CISO, learn about people.mp4
|
148.0 MB
|
04of12+ +Peter+Van+Eeckhoutte+ +Project+Quebec+and+win32+exploit+development+with+pvefindaddr.mp4
|
298.4 MB
|
05of12+ +Nicolas+Gregoire+ +Offensive+XSLT.mp4
|
207.3 MB
|
06of12+ +David+Rook+ +Agnition+the+security+code+review+Swiss+army+knife.mp4
|
238.0 MB
|
08of12+ +Jean Baptiste+Aviat+ +Skirack+ROP+for+masses.mp4
|
33.6 MB
|
09of12+ +Mario+Heiderich+ +The+forbidden+image+ +Security+impact+of+SVG+on+the+WWW.mp4
|
99.5 MB
|
10of12+ +Alain+Zidouema+ +A+close+look+at+rogue+antivirus+programs.mp4
|
163.3 MB
|
11of12+ +Gary+Miliefsky+ +Proactive+network+security+through+vulnerability+management.mp4
|
177.9 MB
|
12of12+ +Tom+Keetch+ +Escaping+Windows+Sandboxes.mp4
|
66.0 MB
|
Talks - HIP2K11.m3u
|
0.8 KB
|
/Slides/
|
Amol-SCADASecurityWhyIsItSoHard.pdf
|
5.3 MB
|
Andrei-PostScript Danger Ahead.pdf
|
2.4 MB
|
Ange-Aa bit more of PE.pdf.oypsskt.partial
|
1.6 MB
|
Chris.H-SocialEngineer-TheArtofHumanHacking.pdf
|
8.1 MB
|
Fernando-ipv6-security.pdf
|
315.6 KB
|
Georgia-androidpermissions.pdf
|
1.9 MB
|
Jayson-securing HIP.pdf
|
1.4 MB
|
Jorge-Weapons of Max Destruction V40.pdf
|
14.5 MB
|
Klaus Stonesoft_AET.pdf
|
1.5 MB
|
Krzysztof-html5-somethingwickedthiswaycomes.pdf
|
1.4 MB
|
Mario-got_ur_nose_hip12.pdf
|
2.7 MB
|
Mikko H-Keynote.pdf
|
2.0 MB
|
Nicolas-Attacking_XML_processing.pdf
|
11.1 MB
|
/Video/
|
Amol SARWATE - SCADA Security Why is it so hard.mp4
|
75.4 MB
|
Andrei COSTIN - Postscript Danger ahead!.mp4
|
113.6 MB
|
Ange ALBERTINI - A bit more of PE.mp4
|
87.6 MB
|
Chris HADNAGY - Nonverbal human hacking.mp4
|
69.6 MB
|
Fernando Gont Results of a Security Assessment of the Internet Protocol Version 6.mp4
|
114.1 MB
|
Georgia Weidman Bypassing the Android Permission Model.mp4
|
85.4 MB
|
Jayson E Street Securing The Internet YOU re Doing It Wrong.mp4
|
86.8 MB
|
Jorge Sebastiao Weapons of Max Destruction V4.mp4
|
69.0 MB
|
Klaus Majewski What are the Means for Cybercriminals to Bypass and Evade your Defenses.mp4
|
85.0 MB
|
Krzysztof Kotowicz HTML5 Something Wicked This Way Comes.mp4
|
89.3 MB
|
Mario Heiderich Got Your Nose How to Steal Your Precious Data Without Using Scripts.mp4
|
106.2 MB
|
Mikko H Hypponen Keynote Where are we and Where are we Going.mp4
|
89.0 MB
|
Nicolas Gregoire Attacking XML Processing.mp4
|
100.8 MB
|
Winn Schwartau Georgia Weidman Mario Heiderich Panel Offensive Nature.mp4
|
307.4 MB
|
Winn Schwartau Jayson E Street Chris Hadnagy Panel Defensive Nature.mp4
|
329.9 MB
|
Winn Schwartau Keynote Measuring Risk with Time Based Security.mp4
|
292.1 MB
|
/Slides/
|
HiP2k13-Burp_Pro_Tips_and_Tricks.pdf
|
2.8 MB
|
MDM-HIP_2013.pdf
|
3.5 MB
|
Slidesthomasroth.pdf
|
6.0 MB
|
Windows-Phone-8-application-security-slides.pdf
|
993.4 KB
|
hack-in-paris-2013.htm
|
34.7 KB
|
hip-2013-slides.htm
|
2.3 MB
|
im-in-your-browser-pwning-your-stuff-attacking-google-chrome-extensions.htm
|
70.8 KB
|
slidesjensmuller.pdf
|
1.3 MB
|
slidesjuliawolf.pdf
|
5.5 MB
|
slidesmarioheiderich.pdf
|
2.1 MB
|
slidesricardorodriguez.pdf
|
2.8 MB
|
/Video/
|
HIP13 Analysis of a Windows Kernel vulnerability.mp4
|
121.7 MB
|
HIP13 Analysis of a Windows Kernel vulnerability.srt
|
76.1 KB
|
HIP13 Are we getting better.mp4
|
114.6 MB
|
HIP13 Are we getting better.srt
|
94.4 KB
|
HIP13 Attacking Google Chrome extensions.mp4
|
88.4 MB
|
HIP13 Attacking Google Chrome extensions.srt
|
57.1 KB
|
HIP13 BYOD The privacy and Compilance risks from bringing your own mobile device to work.mp4
|
111.6 MB
|
HIP13 BYOD The privacy and Compilance risks from bringing your own mobile device to work.srt
|
41.5 KB
|
HIP13 Burp Pro -- Real life tips and tricks.mp4
|
114.5 MB
|
HIP13 Burp Pro -- Real life tips and tricks.srt
|
71.3 KB
|
HIP13 DBI Frameworks applied to computer security.mp4
|
92.8 MB
|
HIP13 DBI Frameworks applied to computer security.srt
|
54.6 KB
|
HIP13 Malware vs Virtualization.mp4
|
93.7 MB
|
HIP13 Malware vs Virtualization.srt
|
53.9 KB
|
HIP13 Next generation rootkits dor ARM based devices.mp4
|
104.9 MB
|
HIP13 Next generation rootkits dor ARM based devices.srt
|
58.4 KB
|
HIP13 Origin policy enforcement in modern browsers.mp4
|
67.7 MB
|
HIP13 Origin policy enforcement in modern browsers.srt
|
47.2 KB
|
HIP13 Remoting Android applications for fun and profit.mp4
|
83.9 MB
|
HIP13 Remoting Android applications for fun and profit.srt
|
48.8 KB
|
HIP13 The Doctrine Classique of Websecurity and the inner HTML Apocalypse.mp4
|
105.7 MB
|
HIP13 The Doctrine Classique of Websecurity and the inner HTML Apocalypse.srt
|
84.3 KB
|
HIP13 The Control of technology by nation state Past, Present and Future.mp4
|
76.1 MB
|
HIP13 The Control of technology by nation state Past, Present and Future.srt
|
51.2 KB
|
HIP13 The Realex payments application security story, narrated by Security Ninja.mp4
|
117.2 MB
|
HIP13 The Realex payments application security story, narrated by Security Ninja.srt
|
88.0 KB
|
HIP13 The Security of MDM (Mobile Device Management) systems.mp4
|
85.8 MB
|
HIP13 The Security of MDM (Mobile Device Management) systems.srt
|
48.6 KB
|
HIP13 Web Applications forensics.mp4
|
95.1 MB
|
HIP13 Web Applications forensics.srt
|
57.2 KB
|
HIP13 Windows Phone 8 application security.mp4
|
75.5 MB
|
HIP13 Windows Phone 8 application security.srt
|
41.7 KB
|
/Video/
|
HIP14 C+11 metaprogramming technics applied to software obduscation.mp4
|
329.1 MB
|
HIP14 C+11 metaprogramming technics applied to software obduscation.srt
|
53.7 KB
|
HIP14 - Breaking through the bottleneck mobile malware is outbreak spreading like wildfire.mp4
|
159.0 MB
|
HIP14 - Breaking through the bottleneck mobile malware is outbreak spreading like wildfire.srt
|
31.2 KB
|
HIP14 - Splinter the rat attack create your own botnet to exploit the network.mp4
|
339.5 MB
|
HIP14 - Splinter the rat attack create your own botnet to exploit the network.srt
|
80.6 KB
|
HIP14 Debate - Global Surveillance Security vs. Privacy.mp4
|
96.1 MB
|
HIP14 Debate - Global Surveillance Security vs. Privacy.srt
|
69.7 KB
|
HIP14- Energy fraud and orchestrated blackouts issues with wireless metering protocols(Wm-Bus).mp4
|
308.7 MB
|
HIP14- Energy fraud and orchestrated blackouts issues with wireless metering protocols(Wm-Bus).srt
|
49.8 KB
|
HIP14- KEYNOTE Around the world in 80 cons!.mp4
|
341.6 MB
|
HIP14- KEYNOTE Around the world in 80 cons!.srt
|
88.2 KB
|
HIP14-ARM AARCH64 writing exploits for the new arm architecture.mp4
|
195.1 MB
|
HIP14-ARM AARCH64 writing exploits for the new arm architecture.srt
|
36.6 KB
|
HIP14-Bitting into the forbidden fruit.Lessons froms trusting JavaScript crypto.mp4
|
323.4 MB
|
HIP14-Bitting into the forbidden fruit.Lessons froms trusting JavaScript crypto.srt
|
60.6 KB
|
HIP14-Defeating UEFI WIN8 secureboot.mp4
|
252.6 MB
|
HIP14-Defeating UEFI WIN8 secureboot.srt
|
49.0 KB
|
HIP14-Digital Energy - BPT.mp4
|
267.1 MB
|
HIP14-Digital Energy - BPT.srt
|
57.2 KB
|
HIP14-Extreme forensics reloaded 2Q 2014.mp4
|
252.2 MB
|
HIP14-Extreme forensics reloaded 2Q 2014.srt
|
64.1 KB
|
HIP14-Fuzzing reversing and maths.mp4
|
328.7 MB
|
HIP14-Fuzzing reversing and maths.srt
|
59.8 KB
|
HIP14-KEYNOTE Beyond information ware; hacking the future of security.srt
|
58.7 KB
|
HIP14-KEYNOTE Beyond information ware_ hacking the future of security.mp4
|
324.8 MB
|
HIP14-Pentesting NoSQL exploitation framework.mp4
|
249.5 MB
|
HIP14-Pentesting NoSQL exploitation framework.srt
|
48.2 KB
|
HIP14-Plunder,pillage and print.mp4
|
370.6 MB
|
HIP14-Plunder,pillage and print.srt
|
75.5 KB
|
HIP14-To sternly look at JavaScript MVC and templating frameworks.mp4
|
306.3 MB
|
HIP14-To sternly look at JavaScript MVC and templating frameworks.srt
|
97.3 KB
|
/Video/
|
HIP15-DEBATE The right to self defense in Cyberspace.mp4
|
321.2 MB
|
HIP15-KEYNOTE Analogue Network Security.mp4
|
190.4 MB
|
HIP15-KEYNOTE Analogue Network Security.srt
|
58.4 KB
|
HIP15-KEYNOTE Backdooring X11.mp4
|
149.5 MB
|
HIP15-KEYNOTE Backdooring X11.srt
|
42.5 KB
|
HIP15-KEYNOTE Copy & Pest.mp4
|
138.1 MB
|
HIP15-KEYNOTE Copy & Pest.srt
|
57.1 KB
|
HIP15-KEYNOTE DDoS Mitigation EPIC FAIL collection.mp4
|
154.1 MB
|
HIP15-KEYNOTE DDoS Mitigation EPIC FAIL collection.srt
|
59.1 KB
|
HIP15-KEYNOTE Root via SMS.mp4
|
143.6 MB
|
HIP15-KEYNOTE Root via SMS.srt
|
30.4 KB
|
HIP15-TALK You don t hear me but your phone s voice interface does.mp4
|
140.3 MB
|
HIP15-TALK You don t hear me but your phone s voice interface does.srt
|
34.5 KB
|
/Hack In Paris 2016/
|
HIP16 TALK HARDSPLOIT TOOL The next Hardware Hacking Laboratory.mp4
|
172.0 MB
|
HIP16-DEBATE.mp4
|
365.4 MB
|
HIP16-KEYNOTE 3 APIS 1000 LINES OF CODE EQUALS SUPER PRETTY OSINT.mp4
|
197.4 MB
|
HIP16-KEYNOTE Voting between sharks.mp4
|
125.9 MB
|
HIP16-TALK Abusing Software Ddefined Networks (part 2).mp4
|
171.7 MB
|
HIP16-TALK All Your Door Belong To Me - Attacking Physical Access Systems.mp4
|
186.6 MB
|
HIP16-TALK Because of the advancements in prosthetics.mp4
|
176.6 MB
|
HIP16-TALK DIFFDroid Dynamic Analysis Made Easier for Android.mp4
|
150.6 MB
|
HIP16-TALK From zero to SYSTEM on full disk encrypted Windows system.mp4
|
216.2 MB
|
HIP16-TALK How to successfully execute a professional Social Engineering attacks.mp4
|
246.7 MB
|
HIP16-TALK Machine learning based ML techniques.mp4
|
208.8 MB
|
HIP16-TALK Security offense and defense strategies.mp4
|
103.4 MB
|
HIP16-TALK The titanic methodologie.mp4
|
204.3 MB
|
HIP16-TALK Type5 Code1 or Lady In The Middle.mp4
|
212.0 MB
|
HIP16-TALK What could have derailed the Northeast Regional no 188.mp4
|
168.1 MB
|
HIP16-TALK Whisper in the Wire Voice Command Injection Reloaded.mp4
|
194.3 MB
|
/Hack In Paris 2018/
|
#HIP18.en.transcribed.srt
|
3.6 KB
|
#HIP18.mp4
|
4.0 MB
|
HIP18 - DEBATE - To Serve Man AI, Machine Learning.en.transcribed.srt
|
189.7 KB
|
HIP18 - DEBATE - To Serve Man AI, Machine Learning.mp4
|
134.3 MB
|
HIP18 - Talk 01- Drones the new weapon of choice -.en.transcribed.srt
|
125.3 KB
|
HIP18 - Talk 01- Drones the new weapon of choice -.mp4
|
72.1 MB
|
HIP18 - Talk 02 - Building Systems On Shaky Ground.en.transcribed.srt
|
122.4 KB
|
HIP18 - Talk 02 - Building Systems On Shaky Ground.mp4
|
62.4 MB
|
HIP18 - Talk 03 -Silent wire hacking by Erwan Broq.en.transcribed.srt
|
54.7 KB
|
HIP18 - Talk 03 -Silent wire hacking by Erwan Broq.mp4
|
30.4 MB
|
HIP18 - Talk 04 - Auditd for the Masses by Philipp.en.transcribed.srt
|
121.1 KB
|
HIP18 - Talk 04 - Auditd for the Masses by Philipp.mp4
|
57.8 MB
|
HIP18 - Talk 05 - From printed circuit boards to e.en.transcribed.srt
|
109.7 KB
|
HIP18 - Talk 05 - From printed circuit boards to e.mp4
|
56.1 MB
|
HIP18 - Talk 06 - Mobile operators vs. Hackers new.mp4
|
44.5 MB
|
HIP18 - Talk 07 - Invoke-DOSfuscation Techniques F.en.transcribed.srt
|
152.7 KB
|
HIP18 - Talk 07 - Invoke-DOSfuscation Techniques F.mp4
|
62.0 MB
|
HIP18 - Talk 09 - The Insecure Software Developmen.en.transcribed.srt
|
122.4 KB
|
HIP18 - Talk 09 - The Insecure Software Developmen.mp4
|
64.8 MB
|
HIP18 - Talk 10 - Knockin' on IPv6's doors by Fern.en.transcribed.srt
|
82.4 KB
|
HIP18 - Talk 10 - Knockin' on IPv6's doors by Fern.mp4
|
57.4 MB
|
HIP18 - Talk 11 - The Bicho An Advanced Car Backdo.en.transcribed.srt
|
86.7 KB
|
HIP18 - Talk 11 - The Bicho An Advanced Car Backdo.mp4
|
60.9 MB
|
HIP18 - Talk 12 The Past, Present & Future of Ente.en.transcribed.srt
|
125.2 KB
|
HIP18 - Talk 12 The Past, Present & Future of Ente.mp4
|
65.7 MB
|
HIP18 - Talk 13 - Hunting PBX for Vulnerabilities.mp4
|
26.9 MB
|
HIP18 - Talk 14 - No Win32_Process Needed Expandin.en.transcribed.srt
|
94.4 KB
|
HIP18 - Talk 14 - No Win32_Process Needed Expandin.mp4
|
60.6 MB
|
HIP18 - Talk 15 - How To Bring HID Attacks To The.en.transcribed.srt
|
117.5 KB
|
HIP18 - Talk 15 - How To Bring HID Attacks To The.mp4
|
93.1 MB
|
HIP8 - Talk 16 - NFC Payments The Art of Relay & R.en.transcribed.srt
|
68.3 KB
|
HIP8 - Talk 16 - NFC Payments The Art of Relay & R.mp4
|
43.0 MB
|
/Hack In Paris 2019/
|
HIP19 Abusing Google Play Billing for fun and unlimited credits! - G. Lopes.en.transcribed.srt
|
44.2 KB
|
HIP19 Abusing Google Play Billing for fun and unlimited credits! - G. Lopes.mp4
|
43.6 MB
|
HIP19 All your GPS Trackers belong to US - C. Kasmi, P. Barre.en.transcribed.srt
|
52.4 KB
|
HIP19 All your GPS Trackers belong to US - C. Kasmi, P. Barre.mp4
|
48.9 MB
|
HIP19 BMS is destroyed by smart button - E. Litvinov.en.transcribed.srt
|
33.0 KB
|
HIP19 BMS is destroyed by smart button - E. Litvinov.mp4
|
39.2 MB
|
HIP19 Cracking the Perimeter with SharpShooter - D. Chell.en.transcribed.srt
|
71.8 KB
|
HIP19 Cracking the Perimeter with SharpShooter - D. Chell.mp4
|
46.5 MB
|
HIP19 DPAPI and DPAPI-NG Decrypting All Users' Secrets and PFX Passwords - P. Januskiewicz.en.transcribed.srt
|
95.0 KB
|
HIP19 DPAPI and DPAPI-NG Decrypting All Users' Secrets and PFX Passwords - P. Januskiewicz.mp4
|
59.5 MB
|
HIP19 Exploits in Wetware - R. Sell.en.transcribed.srt
|
76.6 KB
|
HIP19 Exploits in Wetware - R. Sell.mp4
|
49.8 MB
|
HIP19 HACKER JEOPARDY.en.transcribed.srt
|
92.2 KB
|
HIP19 HACKER JEOPARDY.mp4
|
211.6 MB
|
HIP19 In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll.en.transcribed.srt
|
72.7 KB
|
HIP19 In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll.mp4
|
50.9 MB
|
HIP19 Introduction to IoT Reverse Engineering - V. Di Giampietro.en.transcribed.srt
|
66.5 KB
|
HIP19 Introduction to IoT Reverse Engineering - V. Di Giampietro.mp4
|
63.5 MB
|
HIP19 IronPython... OMFG - M. Salvati.en.transcribed.srt
|
87.6 KB
|
HIP19 IronPython... OMFG - M. Salvati.mp4
|
81.3 MB
|
HIP19 RHme3 Hacking through failure - B. Gardiner, J. Beverley, C. Dewinter.en.transcribed.srt
|
75.8 KB
|
HIP19 RHme3 Hacking through failure - B. Gardiner, J. Beverley, C. Dewinter.mp4
|
48.2 MB
|
HIP19 Sneaking Past Device Guard - P. Tsukerman.en.transcribed.srt
|
68.1 KB
|
HIP19 Sneaking Past Device Guard - P. Tsukerman.mp4
|
58.5 MB
|
HIP19 Social Forensication A Multidisciplinary Approach to Successful Social Engineering - J.Gray.en.transcribed.srt
|
74.1 KB
|
HIP19 Social Forensication A Multidisciplinary Approach to Successful Social Engineering - J.Gray.mp4
|
47.8 MB
|
HIP19 Using Machines to exploit Machines - G. Barnhart Magen, E. Caltum.en.transcribed.srt
|
81.0 KB
|
HIP19 Using Machines to exploit Machines - G. Barnhart Magen, E. Caltum.mp4
|
68.1 MB
|
HIP19 Who watches the watchmen - M. Bergman, M. Smeets.mp4
|
50.5 MB
|
HIP19 You « try » to detect mimikatz - V. Le Toux.mp4
|
56.3 MB
|
HIP19 whoami priv - show me your privileges and I will lead you to SYSTEM - A. Pierini.en.transcribed.srt
|
62.6 KB
|
HIP19 whoami priv - show me your privileges and I will lead you to SYSTEM - A. Pierini.mp4
|
68.4 MB
|
/
|
Hack In Paris logo.png
|
27.3 KB
|
Hack In Paris thank you.txt
|
0.7 KB
|
/Hack in Paris 2017/
|
HIP17 - Talk 02 - VentriLock Exploring voice-based authentication systems.en.transcribed.srt
|
106.9 KB
|
HIP17 - Talk 02 - VentriLock Exploring voice-based authentication systems.mp4
|
104.1 MB
|
HIP17 - Talk 03 - Internet of Compromised Things Methodology & Tools by DAMIEN CAUQUIL.en.transcribed.srt
|
67.0 KB
|
HIP17 - Talk 03 - Internet of Compromised Things Methodology & Tools by DAMIEN CAUQUIL.mp4
|
48.6 MB
|
HIP17 - Talk 04 - The forgotten interface Windows named pipes by GIL COHEN.en.transcribed.srt
|
57.9 KB
|
HIP17 - Talk 04 - The forgotten interface Windows named pipes by GIL COHEN.mp4
|
51.6 MB
|
HIP17 - Talk 05 - Beyond OWASP Top 10 by AARON HNATIW.en.transcribed.srt
|
148.7 KB
|
HIP17 - Talk 05 - Beyond OWASP Top 10 by AARON HNATIW.mp4
|
81.5 MB
|
HIP17 - Talk 06 - Dissecting a ransomware-infected MBR by RAUL ALVAREZ.en.transcribed.srt
|
92.5 KB
|
HIP17 - Talk 06 - Dissecting a ransomware-infected MBR by RAUL ALVAREZ.mp4
|
63.4 MB
|
HIP17 - Talk 07 - The interet of vulnerabilities by DERAL HEILAND.en.transcribed.srt
|
109.2 KB
|
HIP17 - Talk 07 - The interet of vulnerabilities by DERAL HEILAND.mp4
|
64.8 MB
|
HIP17 - Talk 08 - DEBATE Hackers, the Media, Truth, Trust & Alternative Facts.en.transcribed.srt
|
280.8 KB
|
HIP17 - Talk 08 - DEBATE Hackers, the Media, Truth, Trust & Alternative Facts.mp4
|
141.6 MB
|
HIP17 - Talk 09 - How to measure your security by WINN SCHWARTAU.en.transcribed.srt
|
106.5 KB
|
HIP17 - Talk 09 - How to measure your security by WINN SCHWARTAU.mp4
|
82.0 MB
|
HIP17 - Talk 10 - Social Engineering setting people into debug mode by Dominique Brack.en.transcribed.srt
|
103.1 KB
|
HIP17 - Talk 10 - Social Engineering setting people into debug mode by Dominique Brack.mp4
|
75.8 MB
|
HIP17 - Talk 11 - Are you watching TV now Is it real by LEE JONGHO & KIM MINGEUN.en.transcribed.srt
|
54.9 KB
|
HIP17 - Talk 11 - Are you watching TV now Is it real by LEE JONGHO & KIM MINGEUN.mp4
|
75.5 MB
|
HIP17 - Talk 12 - 802.1x Network access control & Bypass Techniques by VALERIAN LEGRAND.en.transcribed.srt
|
71.4 KB
|
HIP17 - Talk 12 - 802.1x Network access control & Bypass Techniques by VALERIAN LEGRAND.mp4
|
60.2 MB
|
HIP17 - Talk 13 - Hackers! Do we shoot or do we hug by EDWIN VAN ANDEL.en.transcribed.srt
|
112.7 KB
|
HIP17 - Talk 13 - Hackers! Do we shoot or do we hug by EDWIN VAN ANDEL.mp4
|
85.5 MB
|
HIP17 - Talk 14 - Popping a shell on a mainframe, is that even possible by AYOUB ELAASAL.mp4
|
65.1 MB
|
HIP17 - Talk 15 - Injecting security into web apps by AJIN ABRAHAM.en.transcribed.srt
|
128.5 KB
|
HIP17 - Talk 15 - Injecting security into web apps by AJIN ABRAHAM.mp4
|
86.8 MB
|
Total files 249
|