FileMood

Download Hack In Paris

Hack In Paris

Name

Hack In Paris

 DOWNLOAD Copy Link

Total Size

17.5 GB

Total Files

249

Hash

151B2352A7D56ECED4CAACDEA3D0B130699E53F1

/Slides/

02-LockingTheThroneRoom.pdf

307.7 KB

03-BeASmartCiso.pdf

4.6 MB

04-ProjectQuebec.pdf

5.8 MB

05-OffensiveXSLT.pdf

12.1 MB

06-Agnitio.pdf

6.2 MB

07-Pentesting_iPhone_iPad.pdf

1.9 MB

08-Skyrack.pdf

350.4 KB

09-TheForbiddenImage.pdf

465.2 KB

10-RogueAV.pdf

5.2 MB

11-ProactiveSecurity.pdf

4.1 MB

12-EscapingWindowsSandboxes.pdf

1.3 MB

/Video/

01 - Winn SCHWARTAU - Cyberwar 4G.mp4

61.6 MB

02 - Mario HEIDERICH - Locking the throne room.bak.mp4

255.9 MB

03 - Bruno KEROUANTON - Be a smart CISO, learn about people.mp4

148.0 MB

04of12+ +Peter+Van+Eeckhoutte+ +Project+Quebec+and+win32+exploit+development+with+pvefindaddr.mp4

298.4 MB

05of12+ +Nicolas+Gregoire+ +Offensive+XSLT.mp4

207.3 MB

06of12+ +David+Rook+ +Agnition+the+security+code+review+Swiss+army+knife.mp4

238.0 MB

08of12+ +Jean Baptiste+Aviat+ +Skirack+ROP+for+masses.mp4

33.6 MB

09of12+ +Mario+Heiderich+ +The+forbidden+image+ +Security+impact+of+SVG+on+the+WWW.mp4

99.5 MB

10of12+ +Alain+Zidouema+ +A+close+look+at+rogue+antivirus+programs.mp4

163.3 MB

11of12+ +Gary+Miliefsky+ +Proactive+network+security+through+vulnerability+management.mp4

177.9 MB

12of12+ +Tom+Keetch+ +Escaping+Windows+Sandboxes.mp4

66.0 MB

Talks - HIP2K11.m3u

0.8 KB

/Slides/

Amol-SCADASecurityWhyIsItSoHard.pdf

5.3 MB

Andrei-PostScript Danger Ahead.pdf

2.4 MB

Ange-Aa bit more of PE.pdf.oypsskt.partial

1.6 MB

Chris.H-SocialEngineer-TheArtofHumanHacking.pdf

8.1 MB

Fernando-ipv6-security.pdf

315.6 KB

Georgia-androidpermissions.pdf

1.9 MB

Jayson-securing HIP.pdf

1.4 MB

Jorge-Weapons of Max Destruction V40.pdf

14.5 MB

Klaus Stonesoft_AET.pdf

1.5 MB

Krzysztof-html5-somethingwickedthiswaycomes.pdf

1.4 MB

Mario-got_ur_nose_hip12.pdf

2.7 MB

Mikko H-Keynote.pdf

2.0 MB

Nicolas-Attacking_XML_processing.pdf

11.1 MB

/Video/

Amol SARWATE - SCADA Security Why is it so hard.mp4

75.4 MB

Andrei COSTIN - Postscript Danger ahead!.mp4

113.6 MB

Ange ALBERTINI - A bit more of PE.mp4

87.6 MB

Chris HADNAGY - Nonverbal human hacking.mp4

69.6 MB

Fernando Gont Results of a Security Assessment of the Internet Protocol Version 6.mp4

114.1 MB

Georgia Weidman Bypassing the Android Permission Model.mp4

85.4 MB

Jayson E Street Securing The Internet YOU re Doing It Wrong.mp4

86.8 MB

Jorge Sebastiao Weapons of Max Destruction V4.mp4

69.0 MB

Klaus Majewski What are the Means for Cybercriminals to Bypass and Evade your Defenses.mp4

85.0 MB

Krzysztof Kotowicz HTML5 Something Wicked This Way Comes.mp4

89.3 MB

Mario Heiderich Got Your Nose How to Steal Your Precious Data Without Using Scripts.mp4

106.2 MB

Mikko H Hypponen Keynote Where are we and Where are we Going.mp4

89.0 MB

Nicolas Gregoire Attacking XML Processing.mp4

100.8 MB

Winn Schwartau Georgia Weidman Mario Heiderich Panel Offensive Nature.mp4

307.4 MB

Winn Schwartau Jayson E Street Chris Hadnagy Panel Defensive Nature.mp4

329.9 MB

Winn Schwartau Keynote Measuring Risk with Time Based Security.mp4

292.1 MB

/Slides/

HiP2k13-Burp_Pro_Tips_and_Tricks.pdf

2.8 MB

MDM-HIP_2013.pdf

3.5 MB

Slidesthomasroth.pdf

6.0 MB

Windows-Phone-8-application-security-slides.pdf

993.4 KB

hack-in-paris-2013.htm

34.7 KB

hip-2013-slides.htm

2.3 MB

im-in-your-browser-pwning-your-stuff-attacking-google-chrome-extensions.htm

70.8 KB

slidesjensmuller.pdf

1.3 MB

slidesjuliawolf.pdf

5.5 MB

slidesmarioheiderich.pdf

2.1 MB

slidesricardorodriguez.pdf

2.8 MB

/Video/

HIP13 Analysis of a Windows Kernel vulnerability.mp4

121.7 MB

HIP13 Analysis of a Windows Kernel vulnerability.srt

76.1 KB

HIP13 Are we getting better.mp4

114.6 MB

HIP13 Are we getting better.srt

94.4 KB

HIP13 Attacking Google Chrome extensions.mp4

88.4 MB

HIP13 Attacking Google Chrome extensions.srt

57.1 KB

HIP13 BYOD The privacy and Compilance risks from bringing your own mobile device to work.mp4

111.6 MB

HIP13 BYOD The privacy and Compilance risks from bringing your own mobile device to work.srt

41.5 KB

HIP13 Burp Pro -- Real life tips and tricks.mp4

114.5 MB

HIP13 Burp Pro -- Real life tips and tricks.srt

71.3 KB

HIP13 DBI Frameworks applied to computer security.mp4

92.8 MB

HIP13 DBI Frameworks applied to computer security.srt

54.6 KB

HIP13 Malware vs Virtualization.mp4

93.7 MB

HIP13 Malware vs Virtualization.srt

53.9 KB

HIP13 Next generation rootkits dor ARM based devices.mp4

104.9 MB

HIP13 Next generation rootkits dor ARM based devices.srt

58.4 KB

HIP13 Origin policy enforcement in modern browsers.mp4

67.7 MB

HIP13 Origin policy enforcement in modern browsers.srt

47.2 KB

HIP13 Remoting Android applications for fun and profit.mp4

83.9 MB

HIP13 Remoting Android applications for fun and profit.srt

48.8 KB

HIP13 The Doctrine Classique of Websecurity and the inner HTML Apocalypse.mp4

105.7 MB

HIP13 The Doctrine Classique of Websecurity and the inner HTML Apocalypse.srt

84.3 KB

HIP13 The Control of technology by nation state Past, Present and Future.mp4

76.1 MB

HIP13 The Control of technology by nation state Past, Present and Future.srt

51.2 KB

HIP13 The Realex payments application security story, narrated by Security Ninja.mp4

117.2 MB

HIP13 The Realex payments application security story, narrated by Security Ninja.srt

88.0 KB

HIP13 The Security of MDM (Mobile Device Management) systems.mp4

85.8 MB

HIP13 The Security of MDM (Mobile Device Management) systems.srt

48.6 KB

HIP13 Web Applications forensics.mp4

95.1 MB

HIP13 Web Applications forensics.srt

57.2 KB

HIP13 Windows Phone 8 application security.mp4

75.5 MB

HIP13 Windows Phone 8 application security.srt

41.7 KB

/Video/

HIP14 C+11 metaprogramming technics applied to software obduscation.mp4

329.1 MB

HIP14 C+11 metaprogramming technics applied to software obduscation.srt

53.7 KB

HIP14 - Breaking through the bottleneck mobile malware is outbreak spreading like wildfire.mp4

159.0 MB

HIP14 - Breaking through the bottleneck mobile malware is outbreak spreading like wildfire.srt

31.2 KB

HIP14 - Splinter the rat attack create your own botnet to exploit the network.mp4

339.5 MB

HIP14 - Splinter the rat attack create your own botnet to exploit the network.srt

80.6 KB

HIP14 Debate - Global Surveillance Security vs. Privacy.mp4

96.1 MB

HIP14 Debate - Global Surveillance Security vs. Privacy.srt

69.7 KB

HIP14- Energy fraud and orchestrated blackouts issues with wireless metering protocols(Wm-Bus).mp4

308.7 MB

HIP14- Energy fraud and orchestrated blackouts issues with wireless metering protocols(Wm-Bus).srt

49.8 KB

HIP14- KEYNOTE Around the world in 80 cons!.mp4

341.6 MB

HIP14- KEYNOTE Around the world in 80 cons!.srt

88.2 KB

HIP14-ARM AARCH64 writing exploits for the new arm architecture.mp4

195.1 MB

HIP14-ARM AARCH64 writing exploits for the new arm architecture.srt

36.6 KB

HIP14-Bitting into the forbidden fruit.Lessons froms trusting JavaScript crypto.mp4

323.4 MB

HIP14-Bitting into the forbidden fruit.Lessons froms trusting JavaScript crypto.srt

60.6 KB

HIP14-Defeating UEFI WIN8 secureboot.mp4

252.6 MB

HIP14-Defeating UEFI WIN8 secureboot.srt

49.0 KB

HIP14-Digital Energy - BPT.mp4

267.1 MB

HIP14-Digital Energy - BPT.srt

57.2 KB

HIP14-Extreme forensics reloaded 2Q 2014.mp4

252.2 MB

HIP14-Extreme forensics reloaded 2Q 2014.srt

64.1 KB

HIP14-Fuzzing reversing and maths.mp4

328.7 MB

HIP14-Fuzzing reversing and maths.srt

59.8 KB

HIP14-KEYNOTE Beyond information ware; hacking the future of security.srt

58.7 KB

HIP14-KEYNOTE Beyond information ware_ hacking the future of security.mp4

324.8 MB

HIP14-Pentesting NoSQL exploitation framework.mp4

249.5 MB

HIP14-Pentesting NoSQL exploitation framework.srt

48.2 KB

HIP14-Plunder,pillage and print.mp4

370.6 MB

HIP14-Plunder,pillage and print.srt

75.5 KB

HIP14-To sternly look at JavaScript MVC and templating frameworks.mp4

306.3 MB

HIP14-To sternly look at JavaScript MVC and templating frameworks.srt

97.3 KB

/Video/

HIP15-DEBATE The right to self defense in Cyberspace.mp4

321.2 MB

HIP15-KEYNOTE Analogue Network Security.mp4

190.4 MB

HIP15-KEYNOTE Analogue Network Security.srt

58.4 KB

HIP15-KEYNOTE Backdooring X11.mp4

149.5 MB

HIP15-KEYNOTE Backdooring X11.srt

42.5 KB

HIP15-KEYNOTE Copy & Pest.mp4

138.1 MB

HIP15-KEYNOTE Copy & Pest.srt

57.1 KB

HIP15-KEYNOTE DDoS Mitigation EPIC FAIL collection.mp4

154.1 MB

HIP15-KEYNOTE DDoS Mitigation EPIC FAIL collection.srt

59.1 KB

HIP15-KEYNOTE Root via SMS.mp4

143.6 MB

HIP15-KEYNOTE Root via SMS.srt

30.4 KB

HIP15-TALK You don t hear me but your phone s voice interface does.mp4

140.3 MB

HIP15-TALK You don t hear me but your phone s voice interface does.srt

34.5 KB

/Hack In Paris 2016/

HIP16 TALK HARDSPLOIT TOOL The next Hardware Hacking Laboratory.mp4

172.0 MB

HIP16-DEBATE.mp4

365.4 MB

HIP16-KEYNOTE 3 APIS 1000 LINES OF CODE EQUALS SUPER PRETTY OSINT.mp4

197.4 MB

HIP16-KEYNOTE Voting between sharks.mp4

125.9 MB

HIP16-TALK Abusing Software Ddefined Networks (part 2).mp4

171.7 MB

HIP16-TALK All Your Door Belong To Me - Attacking Physical Access Systems.mp4

186.6 MB

HIP16-TALK Because of the advancements in prosthetics.mp4

176.6 MB

HIP16-TALK DIFFDroid Dynamic Analysis Made Easier for Android.mp4

150.6 MB

HIP16-TALK From zero to SYSTEM on full disk encrypted Windows system.mp4

216.2 MB

HIP16-TALK How to successfully execute a professional Social Engineering attacks.mp4

246.7 MB

HIP16-TALK Machine learning based ML techniques.mp4

208.8 MB

HIP16-TALK Security offense and defense strategies.mp4

103.4 MB

HIP16-TALK The titanic methodologie.mp4

204.3 MB

HIP16-TALK Type5 Code1 or Lady In The Middle.mp4

212.0 MB

HIP16-TALK What could have derailed the Northeast Regional no 188.mp4

168.1 MB

HIP16-TALK Whisper in the Wire Voice Command Injection Reloaded.mp4

194.3 MB

/Hack In Paris 2018/

#HIP18.en.transcribed.srt

3.6 KB

#HIP18.mp4

4.0 MB

HIP18 - DEBATE - To Serve Man AI, Machine Learning.en.transcribed.srt

189.7 KB

HIP18 - DEBATE - To Serve Man AI, Machine Learning.mp4

134.3 MB

HIP18 - Talk 01- Drones the new weapon of choice -.en.transcribed.srt

125.3 KB

HIP18 - Talk 01- Drones the new weapon of choice -.mp4

72.1 MB

HIP18 - Talk 02 - Building Systems On Shaky Ground.en.transcribed.srt

122.4 KB

HIP18 - Talk 02 - Building Systems On Shaky Ground.mp4

62.4 MB

HIP18 - Talk 03 -Silent wire hacking by Erwan Broq.en.transcribed.srt

54.7 KB

HIP18 - Talk 03 -Silent wire hacking by Erwan Broq.mp4

30.4 MB

HIP18 - Talk 04 - Auditd for the Masses by Philipp.en.transcribed.srt

121.1 KB

HIP18 - Talk 04 - Auditd for the Masses by Philipp.mp4

57.8 MB

HIP18 - Talk 05 - From printed circuit boards to e.en.transcribed.srt

109.7 KB

HIP18 - Talk 05 - From printed circuit boards to e.mp4

56.1 MB

HIP18 - Talk 06 - Mobile operators vs. Hackers new.mp4

44.5 MB

HIP18 - Talk 07 - Invoke-DOSfuscation Techniques F.en.transcribed.srt

152.7 KB

HIP18 - Talk 07 - Invoke-DOSfuscation Techniques F.mp4

62.0 MB

HIP18 - Talk 09 - The Insecure Software Developmen.en.transcribed.srt

122.4 KB

HIP18 - Talk 09 - The Insecure Software Developmen.mp4

64.8 MB

HIP18 - Talk 10 - Knockin' on IPv6's doors by Fern.en.transcribed.srt

82.4 KB

HIP18 - Talk 10 - Knockin' on IPv6's doors by Fern.mp4

57.4 MB

HIP18 - Talk 11 - The Bicho An Advanced Car Backdo.en.transcribed.srt

86.7 KB

HIP18 - Talk 11 - The Bicho An Advanced Car Backdo.mp4

60.9 MB

HIP18 - Talk 12 The Past, Present & Future of Ente.en.transcribed.srt

125.2 KB

HIP18 - Talk 12 The Past, Present & Future of Ente.mp4

65.7 MB

HIP18 - Talk 13 - Hunting PBX for Vulnerabilities.mp4

26.9 MB

HIP18 - Talk 14 - No Win32_Process Needed Expandin.en.transcribed.srt

94.4 KB

HIP18 - Talk 14 - No Win32_Process Needed Expandin.mp4

60.6 MB

HIP18 - Talk 15 - How To Bring HID Attacks To The.en.transcribed.srt

117.5 KB

HIP18 - Talk 15 - How To Bring HID Attacks To The.mp4

93.1 MB

HIP8 - Talk 16 - NFC Payments The Art of Relay & R.en.transcribed.srt

68.3 KB

HIP8 - Talk 16 - NFC Payments The Art of Relay & R.mp4

43.0 MB

/Hack In Paris 2019/

HIP19 Abusing Google Play Billing for fun and unlimited credits! - G. Lopes.en.transcribed.srt

44.2 KB

HIP19 Abusing Google Play Billing for fun and unlimited credits! - G. Lopes.mp4

43.6 MB

HIP19 All your GPS Trackers belong to US - C. Kasmi, P. Barre.en.transcribed.srt

52.4 KB

HIP19 All your GPS Trackers belong to US - C. Kasmi, P. Barre.mp4

48.9 MB

HIP19 BMS is destroyed by smart button - E. Litvinov.en.transcribed.srt

33.0 KB

HIP19 BMS is destroyed by smart button - E. Litvinov.mp4

39.2 MB

HIP19 Cracking the Perimeter with SharpShooter - D. Chell.en.transcribed.srt

71.8 KB

HIP19 Cracking the Perimeter with SharpShooter - D. Chell.mp4

46.5 MB

HIP19 DPAPI and DPAPI-NG Decrypting All Users' Secrets and PFX Passwords - P. Januskiewicz.en.transcribed.srt

95.0 KB

HIP19 DPAPI and DPAPI-NG Decrypting All Users' Secrets and PFX Passwords - P. Januskiewicz.mp4

59.5 MB

HIP19 Exploits in Wetware - R. Sell.en.transcribed.srt

76.6 KB

HIP19 Exploits in Wetware - R. Sell.mp4

49.8 MB

HIP19 HACKER JEOPARDY.en.transcribed.srt

92.2 KB

HIP19 HACKER JEOPARDY.mp4

211.6 MB

HIP19 In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll.en.transcribed.srt

72.7 KB

HIP19 In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll.mp4

50.9 MB

HIP19 Introduction to IoT Reverse Engineering - V. Di Giampietro.en.transcribed.srt

66.5 KB

HIP19 Introduction to IoT Reverse Engineering - V. Di Giampietro.mp4

63.5 MB

HIP19 IronPython... OMFG - M. Salvati.en.transcribed.srt

87.6 KB

HIP19 IronPython... OMFG - M. Salvati.mp4

81.3 MB

HIP19 RHme3 Hacking through failure - B. Gardiner, J. Beverley, C. Dewinter.en.transcribed.srt

75.8 KB

HIP19 RHme3 Hacking through failure - B. Gardiner, J. Beverley, C. Dewinter.mp4

48.2 MB

HIP19 Sneaking Past Device Guard - P. Tsukerman.en.transcribed.srt

68.1 KB

HIP19 Sneaking Past Device Guard - P. Tsukerman.mp4

58.5 MB

HIP19 Social Forensication A Multidisciplinary Approach to Successful Social Engineering - J.Gray.en.transcribed.srt

74.1 KB

HIP19 Social Forensication A Multidisciplinary Approach to Successful Social Engineering - J.Gray.mp4

47.8 MB

HIP19 Using Machines to exploit Machines - G. Barnhart Magen, E. Caltum.en.transcribed.srt

81.0 KB

HIP19 Using Machines to exploit Machines - G. Barnhart Magen, E. Caltum.mp4

68.1 MB

HIP19 Who watches the watchmen - M. Bergman, M. Smeets.mp4

50.5 MB

HIP19 You « try » to detect mimikatz - V. Le Toux.mp4

56.3 MB

HIP19 whoami priv - show me your privileges and I will lead you to SYSTEM - A. Pierini.en.transcribed.srt

62.6 KB

HIP19 whoami priv - show me your privileges and I will lead you to SYSTEM - A. Pierini.mp4

68.4 MB

/

Hack In Paris logo.png

27.3 KB

Hack In Paris thank you.txt

0.7 KB

/Hack in Paris 2017/

HIP17 - Talk 02 - VentriLock Exploring voice-based authentication systems.en.transcribed.srt

106.9 KB

HIP17 - Talk 02 - VentriLock Exploring voice-based authentication systems.mp4

104.1 MB

HIP17 - Talk 03 - Internet of Compromised Things Methodology & Tools by DAMIEN CAUQUIL.en.transcribed.srt

67.0 KB

HIP17 - Talk 03 - Internet of Compromised Things Methodology & Tools by DAMIEN CAUQUIL.mp4

48.6 MB

HIP17 - Talk 04 - The forgotten interface Windows named pipes by GIL COHEN.en.transcribed.srt

57.9 KB

HIP17 - Talk 04 - The forgotten interface Windows named pipes by GIL COHEN.mp4

51.6 MB

HIP17 - Talk 05 - Beyond OWASP Top 10 by AARON HNATIW.en.transcribed.srt

148.7 KB

HIP17 - Talk 05 - Beyond OWASP Top 10 by AARON HNATIW.mp4

81.5 MB

HIP17 - Talk 06 - Dissecting a ransomware-infected MBR by RAUL ALVAREZ.en.transcribed.srt

92.5 KB

HIP17 - Talk 06 - Dissecting a ransomware-infected MBR by RAUL ALVAREZ.mp4

63.4 MB

HIP17 - Talk 07 - The interet of vulnerabilities by DERAL HEILAND.en.transcribed.srt

109.2 KB

HIP17 - Talk 07 - The interet of vulnerabilities by DERAL HEILAND.mp4

64.8 MB

HIP17 - Talk 08 - DEBATE Hackers, the Media, Truth, Trust & Alternative Facts.en.transcribed.srt

280.8 KB

HIP17 - Talk 08 - DEBATE Hackers, the Media, Truth, Trust & Alternative Facts.mp4

141.6 MB

HIP17 - Talk 09 - How to measure your security by WINN SCHWARTAU.en.transcribed.srt

106.5 KB

HIP17 - Talk 09 - How to measure your security by WINN SCHWARTAU.mp4

82.0 MB

HIP17 - Talk 10 - Social Engineering setting people into debug mode by Dominique Brack.en.transcribed.srt

103.1 KB

HIP17 - Talk 10 - Social Engineering setting people into debug mode by Dominique Brack.mp4

75.8 MB

HIP17 - Talk 11 - Are you watching TV now Is it real by LEE JONGHO & KIM MINGEUN.en.transcribed.srt

54.9 KB

HIP17 - Talk 11 - Are you watching TV now Is it real by LEE JONGHO & KIM MINGEUN.mp4

75.5 MB

HIP17 - Talk 12 - 802.1x Network access control & Bypass Techniques by VALERIAN LEGRAND.en.transcribed.srt

71.4 KB

HIP17 - Talk 12 - 802.1x Network access control & Bypass Techniques by VALERIAN LEGRAND.mp4

60.2 MB

HIP17 - Talk 13 - Hackers! Do we shoot or do we hug by EDWIN VAN ANDEL.en.transcribed.srt

112.7 KB

HIP17 - Talk 13 - Hackers! Do we shoot or do we hug by EDWIN VAN ANDEL.mp4

85.5 MB

HIP17 - Talk 14 - Popping a shell on a mainframe, is that even possible by AYOUB ELAASAL.mp4

65.1 MB

HIP17 - Talk 15 - Injecting security into web apps by AJIN ABRAHAM.en.transcribed.srt

128.5 KB

HIP17 - Talk 15 - Injecting security into web apps by AJIN ABRAHAM.mp4

86.8 MB

 

Total files 249


Copyright © 2024 FileMood.com