|
/
|
|
Hack In Paris logo.jpg
|
4.6 KB
|
|
|
|
Hack In Paris logo.png
|
27.3 KB
|
|
Hack In Paris thank you.txt
|
0.8 KB
|
|
HEADER.md
|
0.3 KB
|
|
/Slides/
|
|
02-LockingTheThroneRoom.pdf
|
307.7 KB
|
|
03-BeASmartCiso.pdf
|
4.6 MB
|
|
04-ProjectQuebec.pdf
|
5.8 MB
|
|
05-OffensiveXSLT.pdf
|
12.1 MB
|
|
06-Agnitio.pdf
|
6.2 MB
|
|
07-Pentesting_iPhone_iPad.pdf
|
1.9 MB
|
|
08-Skyrack.pdf
|
350.4 KB
|
|
09-TheForbiddenImage.pdf
|
465.2 KB
|
|
10-RogueAV.pdf
|
5.2 MB
|
|
11-ProactiveSecurity.pdf
|
4.1 MB
|
|
12-EscapingWindowsSandboxes.pdf
|
1.3 MB
|
|
/Video/
|
|
AlainZidouema Acloselookatrogueantivirusprograms.mp4
|
18.8 MB
|
|
Bruno KEROUANTON - Be a smart CISO, learn about people.mp4
|
27.6 MB
|
|
DavidRook AgnitionthesecuritycodereviewSwissarmyknife.mp4
|
35.7 MB
|
|
GaryMiliefsky Proactivenetworksecuritythroughvulnerabilitymanagement.mp4
|
31.3 MB
|
|
Jean BaptisteAviat SkirackROPformasses.mp4
|
15.1 MB
|
|
Mario HEIDERICH - Locking the throne room.mp4
|
32.8 MB
|
|
MarioHeiderich Theforbiddenimage SecurityimpactofSVGontheWWW.mp4
|
12.1 MB
|
|
NicolasGregoire OffensiveXSLT.mp4
|
28.8 MB
|
|
PeterVanEeckhoutte ProjectQuebecandwin32exploitdevelopmentwithpvefindaddr.mp4
|
40.0 MB
|
|
TomKeetch EscapingWindowsSandboxes.mp4
|
10.6 MB
|
|
Winn SCHWARTAU - Cyberwar 4G.mp4
|
25.7 MB
|
|
/.../Hack In Paris 2011 captions/
|
|
AlainZidouema Acloselookatrogueantivirusprograms.eng.json
|
1.5 MB
|
|
AlainZidouema Acloselookatrogueantivirusprograms.eng.lrc
|
35.3 KB
|
|
AlainZidouema Acloselookatrogueantivirusprograms.eng.srt
|
38.9 KB
|
|
AlainZidouema Acloselookatrogueantivirusprograms.eng.text
|
27.1 KB
|
|
AlainZidouema Acloselookatrogueantivirusprograms.eng.tsv
|
31.9 KB
|
|
AlainZidouema Acloselookatrogueantivirusprograms.eng.txt
|
35.6 KB
|
|
AlainZidouema Acloselookatrogueantivirusprograms.eng.vtt
|
35.6 KB
|
|
Bruno KEROUANTON - Be a smart CISO, learn about people.eng.json
|
2.2 MB
|
|
Bruno KEROUANTON - Be a smart CISO, learn about people.eng.lrc
|
55.7 KB
|
|
Bruno KEROUANTON - Be a smart CISO, learn about people.eng.srt
|
63.3 KB
|
|
Bruno KEROUANTON - Be a smart CISO, learn about people.eng.text
|
39.1 KB
|
|
Bruno KEROUANTON - Be a smart CISO, learn about people.eng.tsv
|
48.9 KB
|
|
Bruno KEROUANTON - Be a smart CISO, learn about people.eng.txt
|
56.4 KB
|
|
Bruno KEROUANTON - Be a smart CISO, learn about people.eng.vtt
|
56.4 KB
|
|
DavidRook AgnitionthesecuritycodereviewSwissarmyknife.eng.json
|
3.3 MB
|
|
DavidRook AgnitionthesecuritycodereviewSwissarmyknife.eng.lrc
|
81.1 KB
|
|
DavidRook AgnitionthesecuritycodereviewSwissarmyknife.eng.srt
|
89.1 KB
|
|
DavidRook AgnitionthesecuritycodereviewSwissarmyknife.eng.text
|
62.2 KB
|
|
DavidRook AgnitionthesecuritycodereviewSwissarmyknife.eng.tsv
|
73.3 KB
|
|
DavidRook AgnitionthesecuritycodereviewSwissarmyknife.eng.txt
|
81.8 KB
|
|
DavidRook AgnitionthesecuritycodereviewSwissarmyknife.eng.vtt
|
81.8 KB
|
|
GaryMiliefsky Proactivenetworksecuritythroughvulnerabilitymanagement.eng.json
|
2.4 MB
|
|
GaryMiliefsky Proactivenetworksecuritythroughvulnerabilitymanagement.eng.lrc
|
68.4 KB
|
|
GaryMiliefsky Proactivenetworksecuritythroughvulnerabilitymanagement.eng.srt
|
79.4 KB
|
|
GaryMiliefsky Proactivenetworksecuritythroughvulnerabilitymanagement.eng.text
|
44.1 KB
|
|
GaryMiliefsky Proactivenetworksecuritythroughvulnerabilitymanagement.eng.tsv
|
58.4 KB
|
|
GaryMiliefsky Proactivenetworksecuritythroughvulnerabilitymanagement.eng.txt
|
69.3 KB
|
|
GaryMiliefsky Proactivenetworksecuritythroughvulnerabilitymanagement.eng.vtt
|
69.3 KB
|
|
Jean BaptisteAviat SkirackROPformasses.eng.json
|
1.5 MB
|
|
Jean BaptisteAviat SkirackROPformasses.eng.lrc
|
37.0 KB
|
|
Jean BaptisteAviat SkirackROPformasses.eng.srt
|
41.8 KB
|
|
Jean BaptisteAviat SkirackROPformasses.eng.text
|
26.5 KB
|
|
Jean BaptisteAviat SkirackROPformasses.eng.tsv
|
32.6 KB
|
|
Jean BaptisteAviat SkirackROPformasses.eng.txt
|
37.4 KB
|
|
Jean BaptisteAviat SkirackROPformasses.eng.vtt
|
37.4 KB
|
|
Mario HEIDERICH - Locking the throne room.eng.json
|
4.2 MB
|
|
Mario HEIDERICH - Locking the throne room.eng.lrc
|
103.5 KB
|
|
Mario HEIDERICH - Locking the throne room.eng.srt
|
115.3 KB
|
|
Mario HEIDERICH - Locking the throne room.eng.text
|
75.3 KB
|
|
Mario HEIDERICH - Locking the throne room.eng.tsv
|
91.7 KB
|
|
Mario HEIDERICH - Locking the throne room.eng.txt
|
104.6 KB
|
|
Mario HEIDERICH - Locking the throne room.eng.vtt
|
104.6 KB
|
|
MarioHeiderich Theforbiddenimage SecurityimpactofSVGontheWWW.eng.json
|
1.5 MB
|
|
MarioHeiderich Theforbiddenimage SecurityimpactofSVGontheWWW.eng.lrc
|
31.6 KB
|
|
MarioHeiderich Theforbiddenimage SecurityimpactofSVGontheWWW.eng.srt
|
34.9 KB
|
|
MarioHeiderich Theforbiddenimage SecurityimpactofSVGontheWWW.eng.text
|
24.3 KB
|
|
MarioHeiderich Theforbiddenimage SecurityimpactofSVGontheWWW.eng.tsv
|
28.3 KB
|
|
MarioHeiderich Theforbiddenimage SecurityimpactofSVGontheWWW.eng.txt
|
31.9 KB
|
|
MarioHeiderich Theforbiddenimage SecurityimpactofSVGontheWWW.eng.vtt
|
31.9 KB
|
|
NicolasGregoire OffensiveXSLT.eng.json
|
1.5 MB
|
|
NicolasGregoire OffensiveXSLT.eng.lrc
|
39.7 KB
|
|
NicolasGregoire OffensiveXSLT.eng.srt
|
45.1 KB
|
|
NicolasGregoire OffensiveXSLT.eng.text
|
27.6 KB
|
|
NicolasGregoire OffensiveXSLT.eng.tsv
|
34.7 KB
|
|
NicolasGregoire OffensiveXSLT.eng.txt
|
40.1 KB
|
|
NicolasGregoire OffensiveXSLT.eng.vtt
|
40.1 KB
|
|
PeterVanEeckhoutte ProjectQuebecandwin32exploitdevelopmentwithpvefindaddr.eng.json
|
3.6 MB
|
|
PeterVanEeckhoutte ProjectQuebecandwin32exploitdevelopmentwithpvefindaddr.eng.lrc
|
76.9 KB
|
|
PeterVanEeckhoutte ProjectQuebecandwin32exploitdevelopmentwithpvefindaddr.eng.srt
|
86.1 KB
|
|
PeterVanEeckhoutte ProjectQuebecandwin32exploitdevelopmentwithpvefindaddr.eng.text
|
54.6 KB
|
|
PeterVanEeckhoutte ProjectQuebecandwin32exploitdevelopmentwithpvefindaddr.eng.tsv
|
67.4 KB
|
|
PeterVanEeckhoutte ProjectQuebecandwin32exploitdevelopmentwithpvefindaddr.eng.txt
|
77.8 KB
|
|
PeterVanEeckhoutte ProjectQuebecandwin32exploitdevelopmentwithpvefindaddr.eng.vtt
|
77.8 KB
|
|
TomKeetch EscapingWindowsSandboxes.eng.json
|
904.6 KB
|
|
TomKeetch EscapingWindowsSandboxes.eng.lrc
|
23.6 KB
|
|
TomKeetch EscapingWindowsSandboxes.eng.srt
|
25.8 KB
|
|
TomKeetch EscapingWindowsSandboxes.eng.text
|
18.6 KB
|
|
TomKeetch EscapingWindowsSandboxes.eng.tsv
|
21.4 KB
|
|
TomKeetch EscapingWindowsSandboxes.eng.txt
|
23.8 KB
|
|
TomKeetch EscapingWindowsSandboxes.eng.vtt
|
23.8 KB
|
|
Winn SCHWARTAU - Cyberwar 4G.eng.json
|
2.1 MB
|
|
Winn SCHWARTAU - Cyberwar 4G.eng.lrc
|
54.0 KB
|
|
Winn SCHWARTAU - Cyberwar 4G.eng.srt
|
62.0 KB
|
|
Winn SCHWARTAU - Cyberwar 4G.eng.text
|
36.5 KB
|
|
Winn SCHWARTAU - Cyberwar 4G.eng.tsv
|
46.8 KB
|
|
Winn SCHWARTAU - Cyberwar 4G.eng.txt
|
54.7 KB
|
|
Winn SCHWARTAU - Cyberwar 4G.eng.vtt
|
54.7 KB
|
|
/Slides/
|
|
Amol-SCADASecurityWhyIsItSoHard.pdf
|
5.3 MB
|
|
Andrei-PostScript Danger Ahead.pdf
|
2.4 MB
|
|
Ange-Aa bit more of PE.pdf.oypsskt.partial
|
1.6 MB
|
|
Chris.H-SocialEngineer-TheArtofHumanHacking.pdf
|
8.1 MB
|
|
Fernando-ipv6-security.pdf
|
315.6 KB
|
|
Georgia-androidpermissions.pdf
|
1.9 MB
|
|
Jayson-securing HIP.pdf
|
1.4 MB
|
|
Jorge-Weapons of Max Destruction V40.pdf
|
14.5 MB
|
|
Klaus Stonesoft_AET.pdf
|
1.5 MB
|
|
Krzysztof-html5-somethingwickedthiswaycomes.pdf
|
1.4 MB
|
|
Mario-got_ur_nose_hip12.pdf
|
2.7 MB
|
|
Mikko H-Keynote.pdf
|
2.0 MB
|
|
Nicolas-Attacking_XML_processing.pdf
|
11.1 MB
|
|
/Video/
|
|
Amol SARWATE - SCADA Security - Why is it so hard.mp4
|
34.9 MB
|
|
Andrei COSTIN - Postscript - Danger ahead.mp4
|
30.3 MB
|
|
Ange ALBERTINI - A bit more of PE.mp4
|
25.6 MB
|
|
Chris HADNAGY - Nonverbal human hacking.mp4
|
23.8 MB
|
|
Fernando Gont Results of a Security Assessment of the Internet Protocol Version 6.mp4
|
31.8 MB
|
|
Georgia Weidman Bypassing the Android Permission Model.mp4
|
28.5 MB
|
|
Jayson E Street Securing The Internet YOU re Doing It Wrong.mp4
|
28.3 MB
|
|
Jorge Sebastiao Weapons of Max Destruction V4.mp4
|
19.5 MB
|
|
Klaus Majewski What are the Means for Cybercriminals to Bypass and Evade your Defenses.mp4
|
23.5 MB
|
|
Krzysztof Kotowicz HTML5 Something Wicked This Way Comes.mp4
|
24.0 MB
|
|
Mario Heiderich Got Your Nose How to Steal Your Precious Data Without Using Scripts.mp4
|
31.3 MB
|
|
Mikko H Hypponen Keynote Where are we and Where are we Going.mp4
|
31.3 MB
|
|
Nicolas Gregoire Attacking XML Processing.mp4
|
31.8 MB
|
|
Winn Schwartau Georgia Weidman Mario Heiderich Panel Offensive Nature.mp4
|
34.9 MB
|
|
Winn Schwartau Jayson E Street Chris Hadnagy Panel Defensive Nature.mp4
|
35.0 MB
|
|
Winn Schwartau Keynote Measuring Risk with Time Based Security.mp4
|
27.7 MB
|
|
/.../Hack In Paris 2012 captions/
|
|
Amol SARWATE - SCADA Security - Why is it so hard.eng.json
|
2.3 MB
|
|
Amol SARWATE - SCADA Security - Why is it so hard.eng.lrc
|
51.6 KB
|
|
Amol SARWATE - SCADA Security - Why is it so hard.eng.srt
|
56.5 KB
|
|
Amol SARWATE - SCADA Security - Why is it so hard.eng.text
|
40.6 KB
|
|
Amol SARWATE - SCADA Security - Why is it so hard.eng.tsv
|
47.1 KB
|
|
Amol SARWATE - SCADA Security - Why is it so hard.eng.txt
|
52.0 KB
|
|
Amol SARWATE - SCADA Security - Why is it so hard.eng.vtt
|
52.0 KB
|
|
Andrei COSTIN - Postscript - Danger ahead.eng.json
|
2.2 MB
|
|
Andrei COSTIN - Postscript - Danger ahead.eng.lrc
|
57.8 KB
|
|
Andrei COSTIN - Postscript - Danger ahead.eng.srt
|
65.3 KB
|
|
Andrei COSTIN - Postscript - Danger ahead.eng.text
|
41.3 KB
|
|
Andrei COSTIN - Postscript - Danger ahead.eng.tsv
|
51.1 KB
|
|
Andrei COSTIN - Postscript - Danger ahead.eng.txt
|
58.4 KB
|
|
Andrei COSTIN - Postscript - Danger ahead.eng.vtt
|
58.4 KB
|
|
Ange ALBERTINI - A bit more of PE.eng.json
|
2.2 MB
|
|
Ange ALBERTINI - A bit more of PE.eng.lrc
|
44.4 KB
|
|
Ange ALBERTINI - A bit more of PE.eng.srt
|
48.2 KB
|
|
Ange ALBERTINI - A bit more of PE.eng.text
|
35.7 KB
|
|
Ange ALBERTINI - A bit more of PE.eng.tsv
|
40.7 KB
|
|
Ange ALBERTINI - A bit more of PE.eng.txt
|
44.7 KB
|
|
Ange ALBERTINI - A bit more of PE.eng.vtt
|
44.7 KB
|
|
Chris HADNAGY - Nonverbal human hacking.eng.json
|
2.2 MB
|
|
Chris HADNAGY - Nonverbal human hacking.eng.lrc
|
56.5 KB
|
|
Chris HADNAGY - Nonverbal human hacking.eng.srt
|
64.3 KB
|
|
Chris HADNAGY - Nonverbal human hacking.eng.text
|
39.3 KB
|
|
Chris HADNAGY - Nonverbal human hacking.eng.tsv
|
49.3 KB
|
|
Chris HADNAGY - Nonverbal human hacking.eng.txt
|
57.2 KB
|
|
Chris HADNAGY - Nonverbal human hacking.eng.vtt
|
57.2 KB
|
|
Fernando Gont Results of a Security Assessment of the Internet Protocol Version 6.eng.json
|
2.7 MB
|
|
Fernando Gont Results of a Security Assessment of the Internet Protocol Version 6.eng.lrc
|
59.0 KB
|
|
Fernando Gont Results of a Security Assessment of the Internet Protocol Version 6.eng.srt
|
63.8 KB
|
|
Fernando Gont Results of a Security Assessment of the Internet Protocol Version 6.eng.text
|
48.2 KB
|
|
Fernando Gont Results of a Security Assessment of the Internet Protocol Version 6.eng.tsv
|
54.6 KB
|
|
Fernando Gont Results of a Security Assessment of the Internet Protocol Version 6.eng.txt
|
59.4 KB
|
|
Fernando Gont Results of a Security Assessment of the Internet Protocol Version 6.eng.vtt
|
59.4 KB
|
|
Georgia Weidman Bypassing the Android Permission Model.eng.json
|
3.1 MB
|
|
Georgia Weidman Bypassing the Android Permission Model.eng.lrc
|
65.9 KB
|
|
Georgia Weidman Bypassing the Android Permission Model.eng.srt
|
74.0 KB
|
|
Georgia Weidman Bypassing the Android Permission Model.eng.text
|
48.1 KB
|
|
Georgia Weidman Bypassing the Android Permission Model.eng.tsv
|
58.5 KB
|
|
Georgia Weidman Bypassing the Android Permission Model.eng.txt
|
66.6 KB
|
|
Georgia Weidman Bypassing the Android Permission Model.eng.vtt
|
66.6 KB
|
|
Jayson E Street Securing The Internet YOU re Doing It Wrong.eng.json
|
3.3 MB
|
|
Jayson E Street Securing The Internet YOU re Doing It Wrong.eng.lrc
|
68.2 KB
|
|
Jayson E Street Securing The Internet YOU re Doing It Wrong.eng.srt
|
78.0 KB
|
|
Jayson E Street Securing The Internet YOU re Doing It Wrong.eng.text
|
46.7 KB
|
|
Jayson E Street Securing The Internet YOU re Doing It Wrong.eng.tsv
|
59.4 KB
|
|
Jayson E Street Securing The Internet YOU re Doing It Wrong.eng.txt
|
69.0 KB
|
|
Jayson E Street Securing The Internet YOU re Doing It Wrong.eng.vtt
|
69.1 KB
|
|
Jorge Sebastiao Weapons of Max Destruction V4.eng.json
|
1.3 MB
|
|
Jorge Sebastiao Weapons of Max Destruction V4.eng.lrc
|
33.6 KB
|
|
Jorge Sebastiao Weapons of Max Destruction V4.eng.srt
|
36.6 KB
|
|
Jorge Sebastiao Weapons of Max Destruction V4.eng.text
|
26.8 KB
|
|
Jorge Sebastiao Weapons of Max Destruction V4.eng.tsv
|
30.7 KB
|
|
Jorge Sebastiao Weapons of Max Destruction V4.eng.txt
|
33.8 KB
|
|
Jorge Sebastiao Weapons of Max Destruction V4.eng.vtt
|
33.9 KB
|
|
Klaus Majewski What are the Means for Cybercriminals to Bypass and Evade your Defenses.eng.json
|
1.6 MB
|
|
Klaus Majewski What are the Means for Cybercriminals to Bypass and Evade your Defenses.eng.lrc
|
38.9 KB
|
|
Klaus Majewski What are the Means for Cybercriminals to Bypass and Evade your Defenses.eng.srt
|
44.0 KB
|
|
Klaus Majewski What are the Means for Cybercriminals to Bypass and Evade your Defenses.eng.text
|
27.8 KB
|
|
Klaus Majewski What are the Means for Cybercriminals to Bypass and Evade your Defenses.eng.tsv
|
34.2 KB
|
|
Klaus Majewski What are the Means for Cybercriminals to Bypass and Evade your Defenses.eng.txt
|
39.4 KB
|
|
Klaus Majewski What are the Means for Cybercriminals to Bypass and Evade your Defenses.eng.vtt
|
39.4 KB
|
|
Krzysztof Kotowicz HTML5 Something Wicked This Way Comes.eng.json
|
1.5 MB
|
|
Krzysztof Kotowicz HTML5 Something Wicked This Way Comes.eng.lrc
|
38.3 KB
|
|
Krzysztof Kotowicz HTML5 Something Wicked This Way Comes.eng.srt
|
42.8 KB
|
|
Krzysztof Kotowicz HTML5 Something Wicked This Way Comes.eng.text
|
28.3 KB
|
|
Krzysztof Kotowicz HTML5 Something Wicked This Way Comes.eng.tsv
|
34.2 KB
|
|
Krzysztof Kotowicz HTML5 Something Wicked This Way Comes.eng.txt
|
38.7 KB
|
|
Krzysztof Kotowicz HTML5 Something Wicked This Way Comes.eng.vtt
|
38.7 KB
|
|
Mario Heiderich Got Your Nose How to Steal Your Precious Data Without Using Scripts.eng.json
|
3.4 MB
|
|
Mario Heiderich Got Your Nose How to Steal Your Precious Data Without Using Scripts.eng.lrc
|
77.0 KB
|
|
Mario Heiderich Got Your Nose How to Steal Your Precious Data Without Using Scripts.eng.srt
|
88.1 KB
|
|
Mario Heiderich Got Your Nose How to Steal Your Precious Data Without Using Scripts.eng.text
|
52.7 KB
|
|
Mario Heiderich Got Your Nose How to Steal Your Precious Data Without Using Scripts.eng.tsv
|
67.0 KB
|
|
Mario Heiderich Got Your Nose How to Steal Your Precious Data Without Using Scripts.eng.txt
|
77.9 KB
|
|
Mario Heiderich Got Your Nose How to Steal Your Precious Data Without Using Scripts.eng.vtt
|
77.9 KB
|
|
Mikko H Hypponen Keynote Where are we and Where are we Going.eng.json
|
2.3 MB
|
|
Mikko H Hypponen Keynote Where are we and Where are we Going.eng.lrc
|
61.3 KB
|
|
Mikko H Hypponen Keynote Where are we and Where are we Going.eng.srt
|
69.4 KB
|
|
Mikko H Hypponen Keynote Where are we and Where are we Going.eng.text
|
43.7 KB
|
|
Mikko H Hypponen Keynote Where are we and Where are we Going.eng.tsv
|
54.2 KB
|
|
Mikko H Hypponen Keynote Where are we and Where are we Going.eng.txt
|
62.0 KB
|
|
Mikko H Hypponen Keynote Where are we and Where are we Going.eng.vtt
|
62.0 KB
|
|
Nicolas Gregoire Attacking XML Processing.eng.json
|
1.6 MB
|
|
Nicolas Gregoire Attacking XML Processing.eng.lrc
|
41.2 KB
|
|
Nicolas Gregoire Attacking XML Processing.eng.srt
|
47.3 KB
|
|
Nicolas Gregoire Attacking XML Processing.eng.text
|
27.7 KB
|
|
Nicolas Gregoire Attacking XML Processing.eng.tsv
|
35.7 KB
|
|
Nicolas Gregoire Attacking XML Processing.eng.txt
|
41.7 KB
|
|
Nicolas Gregoire Attacking XML Processing.eng.vtt
|
41.7 KB
|
|
Winn Schwartau Georgia Weidman Mario Heiderich Panel Offensive Nature.eng.json
|
2.2 MB
|
|
Winn Schwartau Georgia Weidman Mario Heiderich Panel Offensive Nature.eng.lrc
|
50.7 KB
|
|
Winn Schwartau Georgia Weidman Mario Heiderich Panel Offensive Nature.eng.srt
|
56.5 KB
|
|
Winn Schwartau Georgia Weidman Mario Heiderich Panel Offensive Nature.eng.text
|
37.7 KB
|
|
Winn Schwartau Georgia Weidman Mario Heiderich Panel Offensive Nature.eng.tsv
|
45.3 KB
|
|
Winn Schwartau Georgia Weidman Mario Heiderich Panel Offensive Nature.eng.txt
|
51.2 KB
|
|
Winn Schwartau Georgia Weidman Mario Heiderich Panel Offensive Nature.eng.vtt
|
51.2 KB
|
|
Winn Schwartau Jayson E Street Chris Hadnagy Panel Defensive Nature.eng.json
|
2.3 MB
|
|
Winn Schwartau Jayson E Street Chris Hadnagy Panel Defensive Nature.eng.lrc
|
59.1 KB
|
|
Winn Schwartau Jayson E Street Chris Hadnagy Panel Defensive Nature.eng.srt
|
66.9 KB
|
|
Winn Schwartau Jayson E Street Chris Hadnagy Panel Defensive Nature.eng.text
|
42.1 KB
|
|
Winn Schwartau Jayson E Street Chris Hadnagy Panel Defensive Nature.eng.tsv
|
52.2 KB
|
|
Winn Schwartau Jayson E Street Chris Hadnagy Panel Defensive Nature.eng.txt
|
59.8 KB
|
|
Winn Schwartau Jayson E Street Chris Hadnagy Panel Defensive Nature.eng.vtt
|
59.8 KB
|
|
Winn Schwartau Keynote Measuring Risk with Time Based Security.eng.json
|
1.7 MB
|
|
Winn Schwartau Keynote Measuring Risk with Time Based Security.eng.lrc
|
45.4 KB
|
|
Winn Schwartau Keynote Measuring Risk with Time Based Security.eng.srt
|
52.4 KB
|
|
Winn Schwartau Keynote Measuring Risk with Time Based Security.eng.text
|
30.2 KB
|
|
Winn Schwartau Keynote Measuring Risk with Time Based Security.eng.tsv
|
39.0 KB
|
|
Winn Schwartau Keynote Measuring Risk with Time Based Security.eng.txt
|
46.0 KB
|
|
Winn Schwartau Keynote Measuring Risk with Time Based Security.eng.vtt
|
46.0 KB
|
|
/Slides/
|
|
hack-in-paris-2013.htm
|
34.7 KB
|
|
HiP2k13-Burp_Pro_Tips_and_Tricks.pdf
|
2.8 MB
|
|
hip-2013-slides.htm
|
2.3 MB
|
|
im-in-your-browser-pwning-your-stuff-attacking-google-chrome-extensions.htm
|
70.8 KB
|
|
MDM-HIP_2013.pdf
|
3.5 MB
|
|
slidesjensmuller.pdf
|
1.3 MB
|
|
slidesjuliawolf.pdf
|
5.5 MB
|
|
slidesmarioheiderich.pdf
|
2.1 MB
|
|
slidesricardorodriguez.pdf
|
2.8 MB
|
|
Slidesthomasroth.pdf
|
6.0 MB
|
|
Windows-Phone-8-application-security-slides.pdf
|
993.4 KB
|
|
/Video/
|
|
Analysis of a Windows Kernel vulnerability.mp4
|
34.8 MB
|
|
Are we getting better.mp4
|
33.9 MB
|
|
Attacking Google Chrome extensions.mp4
|
22.7 MB
|
|
Burp Pro - Real life tips and tricks.mp4
|
29.2 MB
|
|
BYOD - The privacy and Compilance risks from bringing your own mobile device to work.mp4
|
31.0 MB
|
|
DBI Frameworks applied to computer security.mp4
|
23.3 MB
|
|
Malware vs Virtualization.mp4
|
23.1 MB
|
|
Next generation rootkits dor ARM based devices.mp4
|
21.1 MB
|
|
Origin policy enforcement in modern browsers.mp4
|
16.5 MB
|
|
Remoting Android applications for fun and profit.mp4
|
26.1 MB
|
|
The - Doctrine Classique - of Websecurity and the inner HTML Apocalypse.mp4
|
26.3 MB
|
|
The Control of technology by nation state - Past, Present and Future.mp4
|
24.0 MB
|
|
The Realex payments application security story, narrated by Security Ninja.mp4
|
30.7 MB
|
|
The Security of MDM (Mobile Device Management) systems.mp4
|
21.9 MB
|
|
Web Applications forensics.mp4
|
22.8 MB
|
|
Windows Phone 8 application security.mp4
|
20.8 MB
|
|
/.../Hack In Paris 2013 captions/
|
|
Analysis of a Windows Kernel vulnerability.eng.srt
|
76.1 KB
|
|
Are we getting better.eng.srt
|
94.4 KB
|
|
Attacking Google Chrome extensions.eng.srt
|
57.1 KB
|
|
Burp Pro - Real life tips and tricks.eng.srt
|
71.3 KB
|
|
BYOD - The privacy and Compilance risks from bringing your own mobile device to work.eng.srt
|
41.5 KB
|
|
DBI Frameworks applied to computer security.eng.srt
|
54.6 KB
|
|
Malware vs Virtualization.eng.srt
|
53.9 KB
|
|
Next generation rootkits dor ARM based devices.eng.srt
|
58.4 KB
|
|
Origin policy enforcement in modern browsers.eng.srt
|
47.2 KB
|
|
Remoting Android applications for fun and profit.eng.srt
|
48.8 KB
|
|
The - Doctrine Classique - of Websecurity and the inner HTML Apocalypse.eng.srt
|
84.3 KB
|
|
The Control of technology by nation state - Past, Present and Future.eng.srt
|
51.2 KB
|
|
The Realex payments application security story, narrated by Security Ninja.eng.srt
|
88.0 KB
|
|
The Security of MDM (Mobile Device Management) systems.eng.srt
|
48.6 KB
|
|
Web Applications forensics.eng.srt
|
57.2 KB
|
|
Windows Phone 8 application security.eng.srt
|
41.7 KB
|
|
Hack In Paris 2014/
|
|
11 metaprogramming technics applied to software obduscation.mp4
|
29.9 MB
|
|
ARM AARCH64 writing exploits for the new arm architecture.mp4
|
15.0 MB
|
|
Bitting into the forbidden fruit.Lessons froms trusting JavaScript crypto.mp4
|
26.4 MB
|
|
Breaking through the bottleneck - mobile malware is outbreak spreading like wildfire.mp4
|
15.1 MB
|
|
Debate - Global Surveillance - Security vs. Privacy.mp4
|
93.2 MB
|
|
Defeating UEFI WIN8 secureboot.mp4
|
20.9 MB
|
|
Digital Energy - BPT.mp4
|
21.6 MB
|
|
Energy fraud and orchestrated blackouts issues with wireless metering protocols(Wm-Bus).mp4
|
25.6 MB
|
|
Extreme forensics reloaded 2Q 2014.mp4
|
30.2 MB
|
|
Fuzzing reversing and maths.mp4
|
32.0 MB
|
|
KEYNOTE - Around the world in 80 cons.mp4
|
37.0 MB
|
|
KEYNOTE - Beyond information ware hacking the future of security.mp4
|
27.4 MB
|
|
Pentesting NoSQL exploitation framework.mp4
|
27.6 MB
|
|
Plunder,pillage and print.mp4
|
38.8 MB
|
|
Splinter the rat attack - create your own botnet to exploit the network.mp4
|
32.3 MB
|
|
To sternly look at JavaScript MVC and templating frameworks.mp4
|
31.7 MB
|
|
/.../Hack In Paris 2014 captions/
|
|
11 metaprogramming technics applied to software obduscation.eng.srt
|
53.7 KB
|
|
ARM AARCH64 writing exploits for the new arm architecture.eng.srt
|
36.6 KB
|
|
Bitting into the forbidden fruit.Lessons froms trusting JavaScript crypto.eng.srt
|
60.6 KB
|
|
Breaking through the bottleneck - mobile malware is outbreak spreading like wildfire.eng.srt
|
31.2 KB
|
|
Debate - Global Surveillance - Security vs. Privacy.eng.srt
|
69.7 KB
|
|
Defeating UEFI WIN8 secureboot.eng.srt
|
49.0 KB
|
|
Digital Energy - BPT.eng.srt
|
57.2 KB
|
|
Energy fraud and orchestrated blackouts issues with wireless metering protocols(Wm-Bus).eng.srt
|
49.8 KB
|
|
Extreme forensics reloaded 2Q 2014.eng.srt
|
64.1 KB
|
|
Fuzzing reversing and maths.eng.srt
|
59.8 KB
|
|
KEYNOTE - Around the world in 80 cons.eng.srt
|
88.2 KB
|
|
KEYNOTE - Beyond information ware hacking the future of security.eng.srt
|
58.7 KB
|
|
Pentesting NoSQL exploitation framework.eng.srt
|
48.2 KB
|
|
Plunder,pillage and print.eng.srt
|
75.5 KB
|
|
Splinter the rat attack - create your own botnet to exploit the network.eng.srt
|
80.6 KB
|
|
To sternly look at JavaScript MVC and templating frameworks.eng.srt
|
97.3 KB
|
|
Hack In Paris 2015/
|
|
DEBATE - The right to self defense in Cyberspace.mp4
|
79.9 MB
|
|
KEYNOTE Analogue Network Security.mp4
|
36.9 MB
|
|
KEYNOTE Backdooring X11.mp4
|
38.0 MB
|
|
KEYNOTE Copy & Pest.mp4
|
27.7 MB
|
|
KEYNOTE DDoS Mitigation EPIC FAIL collection.mp4
|
34.6 MB
|
|
KEYNOTE Root via SMS.mp4
|
33.2 MB
|
|
You don't hear me but your phone s voice interface does.mp4
|
27.7 MB
|
|
/.../Hack In Paris 2015 captions/
|
|
DEBATE - The right to self defense in Cyberspace.eng.json
|
5.2 MB
|
|
DEBATE - The right to self defense in Cyberspace.eng.lrc
|
105.0 KB
|
|
DEBATE - The right to self defense in Cyberspace.eng.srt
|
115.4 KB
|
|
DEBATE - The right to self defense in Cyberspace.eng.text
|
75.0 KB
|
|
DEBATE - The right to self defense in Cyberspace.eng.tsv
|
91.6 KB
|
|
DEBATE - The right to self defense in Cyberspace.eng.txt
|
106.1 KB
|
|
DEBATE - The right to self defense in Cyberspace.eng.vtt
|
106.1 KB
|
|
KEYNOTE Analogue Network Security.eng.srt
|
58.4 KB
|
|
KEYNOTE Backdooring X11.eng.srt
|
42.5 KB
|
|
KEYNOTE Copy & Pest.eng.srt
|
57.1 KB
|
|
KEYNOTE DDoS Mitigation EPIC FAIL collection.eng.srt
|
59.1 KB
|
|
KEYNOTE Root via SMS.eng.srt
|
30.4 KB
|
|
You don't hear me but your phone s voice interface does.eng.srt
|
34.5 KB
|
|
Hack In Paris 2016/
|
|
Abusing Software Ddefined Networks (part 2).mp4
|
26.5 MB
|
|
All Your Door Belong To Me - Attacking Physical Access Systems.mp4
|
27.6 MB
|
|
Because of the advancements in prosthetics.mp4
|
35.2 MB
|
|
DEBATE.mp4
|
91.9 MB
|
|
DIFFDroid Dynamic Analysis Made Easier for Android.mp4
|
30.3 MB
|
|
From zero to SYSTEM on full disk encrypted Windows system.mp4
|
39.3 MB
|
|
How to successfully execute a professional Social Engineering attacks.mp4
|
42.4 MB
|
|
KEYNOTE 3 APIS 1000 LINES OF CODE EQUALS SUPER PRETTY OSINT.mp4
|
34.1 MB
|
|
KEYNOTE Voting between sharks.mp4
|
37.4 MB
|
|
Machine learning based ML techniques.mp4
|
36.5 MB
|
|
Security offense and defense strategies.mp4
|
23.0 MB
|
|
TALK HARDSPLOIT TOOL The next Hardware Hacking Laboratory.mp4
|
34.7 MB
|
|
The titanic methodologie.mp4
|
39.4 MB
|
|
Type5 Code1 or Lady In The Middle.mp4
|
33.3 MB
|
|
What could have derailed the Northeast Regional no 188.mp4
|
36.3 MB
|
|
Whisper in the Wire Voice Command Injection Reloaded.mp4
|
43.8 MB
|
|
/.../Hack In Paris 2016 captions/
|
|
Abusing Software Ddefined Networks (part 2).eng.json
|
2.0 MB
|
|
Abusing Software Ddefined Networks (part 2).eng.lrc
|
45.5 KB
|
|
Abusing Software Ddefined Networks (part 2).eng.srt
|
51.3 KB
|
|
Abusing Software Ddefined Networks (part 2).eng.text
|
32.5 KB
|
|
Abusing Software Ddefined Networks (part 2).eng.tsv
|
40.1 KB
|
|
Abusing Software Ddefined Networks (part 2).eng.txt
|
46.0 KB
|
|
Abusing Software Ddefined Networks (part 2).eng.vtt
|
46.0 KB
|
|
All Your Door Belong To Me - Attacking Physical Access Systems.eng.json
|
2.2 MB
|
|
All Your Door Belong To Me - Attacking Physical Access Systems.eng.lrc
|
51.3 KB
|
|
All Your Door Belong To Me - Attacking Physical Access Systems.eng.srt
|
57.3 KB
|
|
All Your Door Belong To Me - Attacking Physical Access Systems.eng.text
|
38.0 KB
|
|
All Your Door Belong To Me - Attacking Physical Access Systems.eng.tsv
|
45.8 KB
|
|
All Your Door Belong To Me - Attacking Physical Access Systems.eng.txt
|
51.8 KB
|
|
All Your Door Belong To Me - Attacking Physical Access Systems.eng.vtt
|
51.8 KB
|
|
Because of the advancements in prosthetics.eng.json
|
2.3 MB
|
|
Because of the advancements in prosthetics.eng.lrc
|
53.8 KB
|
|
Because of the advancements in prosthetics.eng.srt
|
62.3 KB
|
|
Because of the advancements in prosthetics.eng.text
|
35.0 KB
|
|
Because of the advancements in prosthetics.eng.tsv
|
46.0 KB
|
|
Because of the advancements in prosthetics.eng.txt
|
54.5 KB
|
|
Because of the advancements in prosthetics.eng.vtt
|
54.5 KB
|
|
DEBATE.eng.json
|
5.0 MB
|
|
DEBATE.eng.lrc
|
109.9 KB
|
|
DEBATE.eng.srt
|
120.2 KB
|
|
DEBATE.eng.text
|
81.2 KB
|
|
DEBATE.eng.tsv
|
97.3 KB
|
|
DEBATE.eng.txt
|
111.0 KB
|
|
DEBATE.eng.vtt
|
111.0 KB
|
|
DIFFDroid Dynamic Analysis Made Easier for Android.eng.json
|
1.8 MB
|
|
DIFFDroid Dynamic Analysis Made Easier for Android.eng.lrc
|
46.8 KB
|
|
DIFFDroid Dynamic Analysis Made Easier for Android.eng.srt
|
55.0 KB
|
|
DIFFDroid Dynamic Analysis Made Easier for Android.eng.text
|
28.8 KB
|
|
DIFFDroid Dynamic Analysis Made Easier for Android.eng.tsv
|
39.4 KB
|
|
DIFFDroid Dynamic Analysis Made Easier for Android.eng.txt
|
47.5 KB
|
|
DIFFDroid Dynamic Analysis Made Easier for Android.eng.vtt
|
47.5 KB
|
|
From zero to SYSTEM on full disk encrypted Windows system.eng.json
|
2.1 MB
|
|
From zero to SYSTEM on full disk encrypted Windows system.eng.lrc
|
50.6 KB
|
|
From zero to SYSTEM on full disk encrypted Windows system.eng.srt
|
55.9 KB
|
|
From zero to SYSTEM on full disk encrypted Windows system.eng.text
|
38.9 KB
|
|
From zero to SYSTEM on full disk encrypted Windows system.eng.tsv
|
45.7 KB
|
|
From zero to SYSTEM on full disk encrypted Windows system.eng.txt
|
51.1 KB
|
|
From zero to SYSTEM on full disk encrypted Windows system.eng.vtt
|
51.1 KB
|
|
How to successfully execute a professional Social Engineering attacks.eng.json
|
2.7 MB
|
|
How to successfully execute a professional Social Engineering attacks.eng.lrc
|
63.1 KB
|
|
How to successfully execute a professional Social Engineering attacks.eng.srt
|
72.0 KB
|
|
How to successfully execute a professional Social Engineering attacks.eng.text
|
43.5 KB
|
|
How to successfully execute a professional Social Engineering attacks.eng.tsv
|
55.0 KB
|
|
How to successfully execute a professional Social Engineering attacks.eng.txt
|
63.8 KB
|
|
How to successfully execute a professional Social Engineering attacks.eng.vtt
|
63.8 KB
|
|
KEYNOTE 3 APIS 1000 LINES OF CODE EQUALS SUPER PRETTY OSINT.eng.json
|
2.0 MB
|
|
KEYNOTE 3 APIS 1000 LINES OF CODE EQUALS SUPER PRETTY OSINT.eng.lrc
|
46.7 KB
|
|
KEYNOTE 3 APIS 1000 LINES OF CODE EQUALS SUPER PRETTY OSINT.eng.srt
|
52.5 KB
|
|
KEYNOTE 3 APIS 1000 LINES OF CODE EQUALS SUPER PRETTY OSINT.eng.text
|
33.8 KB
|
|
KEYNOTE 3 APIS 1000 LINES OF CODE EQUALS SUPER PRETTY OSINT.eng.tsv
|
41.4 KB
|
|
KEYNOTE 3 APIS 1000 LINES OF CODE EQUALS SUPER PRETTY OSINT.eng.txt
|
47.2 KB
|
|
KEYNOTE 3 APIS 1000 LINES OF CODE EQUALS SUPER PRETTY OSINT.eng.vtt
|
47.2 KB
|
|
KEYNOTE Voting between sharks.eng.json
|
2.1 MB
|
|
KEYNOTE Voting between sharks.eng.lrc
|
53.2 KB
|
|
KEYNOTE Voting between sharks.eng.srt
|
58.7 KB
|
|
KEYNOTE Voting between sharks.eng.text
|
40.9 KB
|
|
KEYNOTE Voting between sharks.eng.tsv
|
48.1 KB
|
|
KEYNOTE Voting between sharks.eng.txt
|
53.6 KB
|
|
KEYNOTE Voting between sharks.eng.vtt
|
53.7 KB
|
|
Machine learning based ML techniques.eng.json
|
2.4 MB
|
|
Machine learning based ML techniques.eng.lrc
|
51.9 KB
|
|
Machine learning based ML techniques.eng.srt
|
56.3 KB
|
|
Machine learning based ML techniques.eng.text
|
42.3 KB
|
|
Machine learning based ML techniques.eng.tsv
|
47.9 KB
|
|
Machine learning based ML techniques.eng.txt
|
52.3 KB
|
|
Machine learning based ML techniques.eng.vtt
|
52.3 KB
|
|
Security offense and defense strategies.eng.json
|
1.2 MB
|
|
Security offense and defense strategies.eng.lrc
|
29.1 KB
|
|
Security offense and defense strategies.eng.srt
|
32.1 KB
|
|
Security offense and defense strategies.eng.text
|
22.5 KB
|
|
Security offense and defense strategies.eng.tsv
|
26.4 KB
|
|
Security offense and defense strategies.eng.txt
|
29.4 KB
|
|
Security offense and defense strategies.eng.vtt
|
29.4 KB
|
|
TALK HARDSPLOIT TOOL The next Hardware Hacking Laboratory.eng.json
|
2.0 MB
|
|
TALK HARDSPLOIT TOOL The next Hardware Hacking Laboratory.eng.lrc
|
53.7 KB
|
|
TALK HARDSPLOIT TOOL The next Hardware Hacking Laboratory.eng.srt
|
63.5 KB
|
|
TALK HARDSPLOIT TOOL The next Hardware Hacking Laboratory.eng.text
|
32.3 KB
|
|
TALK HARDSPLOIT TOOL The next Hardware Hacking Laboratory.eng.tsv
|
45.1 KB
|
|
TALK HARDSPLOIT TOOL The next Hardware Hacking Laboratory.eng.txt
|
54.6 KB
|
|
TALK HARDSPLOIT TOOL The next Hardware Hacking Laboratory.eng.vtt
|
54.6 KB
|
|
The titanic methodologie.eng.json
|
2.7 MB
|
|
The titanic methodologie.eng.lrc
|
61.0 KB
|
|
The titanic methodologie.eng.srt
|
69.0 KB
|
|
The titanic methodologie.eng.text
|
43.4 KB
|
|
The titanic methodologie.eng.tsv
|
53.7 KB
|
|
The titanic methodologie.eng.txt
|
61.6 KB
|
|
The titanic methodologie.eng.vtt
|
61.6 KB
|
|
Type5 Code1 or Lady In The Middle.eng.json
|
1.6 MB
|
|
Type5 Code1 or Lady In The Middle.eng.lrc
|
38.5 KB
|
|
Type5 Code1 or Lady In The Middle.eng.srt
|
43.4 KB
|
|
Type5 Code1 or Lady In The Middle.eng.text
|
27.5 KB
|
|
Type5 Code1 or Lady In The Middle.eng.tsv
|
34.0 KB
|
|
Type5 Code1 or Lady In The Middle.eng.txt
|
38.9 KB
|
|
Type5 Code1 or Lady In The Middle.eng.vtt
|
38.9 KB
|
|
What could have derailed the Northeast Regional no 188.eng.json
|
1.9 MB
|
|
What could have derailed the Northeast Regional no 188.eng.lrc
|
46.1 KB
|
|
What could have derailed the Northeast Regional no 188.eng.srt
|
51.1 KB
|
|
What could have derailed the Northeast Regional no 188.eng.text
|
35.1 KB
|
|
What could have derailed the Northeast Regional no 188.eng.tsv
|
41.6 KB
|
|
What could have derailed the Northeast Regional no 188.eng.txt
|
46.6 KB
|
|
What could have derailed the Northeast Regional no 188.eng.vtt
|
46.6 KB
|
|
Whisper in the Wire Voice Command Injection Reloaded.eng.json
|
1.6 MB
|
|
Whisper in the Wire Voice Command Injection Reloaded.eng.lrc
|
41.4 KB
|
|
Whisper in the Wire Voice Command Injection Reloaded.eng.srt
|
45.4 KB
|
|
Whisper in the Wire Voice Command Injection Reloaded.eng.text
|
32.4 KB
|
|
Whisper in the Wire Voice Command Injection Reloaded.eng.tsv
|
37.8 KB
|
|
Whisper in the Wire Voice Command Injection Reloaded.eng.txt
|
41.7 KB
|
|
Whisper in the Wire Voice Command Injection Reloaded.eng.vtt
|
41.7 KB
|
|
Hack in Paris 2017/
|
|
802.1x Network access control & Bypass Techniques by VALERIAN LEGRAND.mp4
|
27.5 MB
|
|
Are you watching TV now Is it real by LEE JONGHO & KIM MINGEUN.mp4
|
30.4 MB
|
|
Beyond OWASP Top 10 by AARON HNATIW.mp4
|
37.7 MB
|
|
DEBATE - Hackers, the Media, Truth, Trust & Alternative Facts.mp4
|
76.4 MB
|
|
Dissecting a ransomware-infected MBR by RAUL ALVAREZ.mp4
|
30.6 MB
|
|
Hackers Do we shoot or do we hug by EDWIN VAN ANDEL.mp4
|
38.4 MB
|
|
How to measure your security by WINN SCHWARTAU.mp4
|
38.2 MB
|
|
Injecting security into web apps by AJIN ABRAHAM.mp4
|
36.4 MB
|
|
Internet of Compromised Things - Methodology & Tools by DAMIEN CAUQUIL.mp4
|
23.6 MB
|
|
Popping a shell on a mainframe, is that even possible by AYOUB ELAASAL.mp4
|
28.5 MB
|
|
Social Engineering setting people into debug mode by Dominique Brack.mp4
|
34.4 MB
|
|
The forgotten interface - Windows named pipes by GIL COHEN.mp4
|
25.9 MB
|
|
The interet of vulnerabilities by DERAL HEILAND.mp4
|
32.6 MB
|
|
VentriLock - Exploring voice-based authentication systems.mp4
|
50.5 MB
|
|
/.../Hack In Paris 2017 captions/
|
|
802.1x Network access control & Bypass Techniques by VALERIAN LEGRAND.eng.srt
|
71.4 KB
|
|
Are you watching TV now Is it real by LEE JONGHO & KIM MINGEUN.eng.srt
|
54.9 KB
|
|
Beyond OWASP Top 10 by AARON HNATIW.eng.srt
|
148.7 KB
|
|
DEBATE - Hackers, the Media, Truth, Trust & Alternative Facts.eng.srt
|
280.8 KB
|
|
Dissecting a ransomware-infected MBR by RAUL ALVAREZ.eng.srt
|
92.5 KB
|
|
Hackers Do we shoot or do we hug by EDWIN VAN ANDEL.eng.srt
|
112.7 KB
|
|
How to measure your security by WINN SCHWARTAU.eng.srt
|
106.5 KB
|
|
Injecting security into web apps by AJIN ABRAHAM.eng.srt
|
128.5 KB
|
|
Internet of Compromised Things - Methodology & Tools by DAMIEN CAUQUIL.eng.srt
|
67.0 KB
|
|
Popping a shell on a mainframe, is that even possible by AYOUB ELAASAL.eng.json
|
2.2 MB
|
|
Popping a shell on a mainframe, is that even possible by AYOUB ELAASAL.eng.lrc
|
47.4 KB
|
|
Popping a shell on a mainframe, is that even possible by AYOUB ELAASAL.eng.srt
|
52.9 KB
|
|
Popping a shell on a mainframe, is that even possible by AYOUB ELAASAL.eng.text
|
35.3 KB
|
|
Popping a shell on a mainframe, is that even possible by AYOUB ELAASAL.eng.tsv
|
42.2 KB
|
|
Popping a shell on a mainframe, is that even possible by AYOUB ELAASAL.eng.txt
|
47.9 KB
|
|
Popping a shell on a mainframe, is that even possible by AYOUB ELAASAL.eng.vtt
|
47.9 KB
|
|
Social Engineering setting people into debug mode by Dominique Brack.eng.srt
|
103.1 KB
|
|
The forgotten interface - Windows named pipes by GIL COHEN.eng.srt
|
57.9 KB
|
|
The interet of vulnerabilities by DERAL HEILAND.eng.srt
|
109.2 KB
|
|
VentriLock - Exploring voice-based authentication systems.eng.srt
|
106.9 KB
|
|
Hack In Paris 2018/
|
|
#HIP18.mp4
|
3.8 MB
|
|
Auditd for the Masses by Philipp.mp4
|
28.3 MB
|
|
Building Systems On Shaky Ground.mp4
|
32.7 MB
|
|
DEBATE - To Serve Man AI, Machine Learning.mp4
|
70.2 MB
|
|
Drones the new weapon of choice -.mp4
|
38.9 MB
|
|
From printed circuit boards to e.mp4
|
31.3 MB
|
|
he Past, Present & Future of Ente.mp4
|
35.2 MB
|
|
How To Bring HID Attacks To The.mp4
|
36.7 MB
|
|
Hunting PBX for Vulnerabilities.mp4
|
15.1 MB
|
|
Invoke-DOSfuscation Techniques F.mp4
|
34.4 MB
|
|
Knockin' on IPv6's doors by Fern.mp4
|
28.8 MB
|
|
Mobile operators vs. Hackers new.mp4
|
24.6 MB
|
|
NFC Payments The Art of Relay & R.mp4
|
22.5 MB
|
|
No Win32 Process Needed Expandin.mp4
|
33.4 MB
|
|
Silent wire hacking by Erwan Broq.mp4
|
16.9 MB
|
|
The Bicho An Advanced Car Backdo.mp4
|
33.3 MB
|
|
The Insecure Software Developmen.mp4
|
35.2 MB
|
|
/.../Hack In Paris 2018 captions/
|
|
#HIP18.eng.srt
|
3.6 KB
|
|
Auditd for the Masses by Philipp.eng.srt
|
121.1 KB
|
|
Building Systems On Shaky Ground.eng.srt
|
122.4 KB
|
|
DEBATE - To Serve Man AI, Machine Learning.eng.srt
|
189.7 KB
|
|
Drones the new weapon of choice -.eng.srt
|
125.3 KB
|
|
From printed circuit boards to e.eng.srt
|
109.7 KB
|
|
he Past, Present & Future of Ente.eng.srt
|
125.2 KB
|
|
How To Bring HID Attacks To The.eng.srt
|
117.5 KB
|
|
Hunting PBX for Vulnerabilities.eng.json
|
803.0 KB
|
|
Hunting PBX for Vulnerabilities.eng.lrc
|
20.4 KB
|
|
Hunting PBX for Vulnerabilities.eng.srt
|
22.6 KB
|
|
Hunting PBX for Vulnerabilities.eng.text
|
15.4 KB
|
|
Hunting PBX for Vulnerabilities.eng.tsv
|
18.2 KB
|
|
Hunting PBX for Vulnerabilities.eng.txt
|
20.6 KB
|
|
Hunting PBX for Vulnerabilities.eng.vtt
|
20.6 KB
|
|
Invoke-DOSfuscation Techniques F.eng.srt
|
152.7 KB
|
|
Knockin' on IPv6's doors by Fern.eng.srt
|
82.4 KB
|
|
Mobile operators vs. Hackers new.eng.json
|
917.3 KB
|
|
Mobile operators vs. Hackers new.eng.lrc
|
26.1 KB
|
|
Mobile operators vs. Hackers new.eng.srt
|
30.1 KB
|
|
Mobile operators vs. Hackers new.eng.text
|
17.4 KB
|
|
Mobile operators vs. Hackers new.eng.tsv
|
22.4 KB
|
|
Mobile operators vs. Hackers new.eng.txt
|
26.5 KB
|
|
Mobile operators vs. Hackers new.eng.vtt
|
26.5 KB
|
|
NFC Payments The Art of Relay & R.eng.srt
|
68.3 KB
|
|
No Win32 Process Needed Expandin.eng.srt
|
94.4 KB
|
|
Silent wire hacking by Erwan Broq.eng.srt
|
54.7 KB
|
|
The Bicho An Advanced Car Backdo.eng.srt
|
86.7 KB
|
|
The Insecure Software Developmen.eng.srt
|
122.4 KB
|
|
Hack In Paris 2019/
|
|
Abusing Google Play Billing for fun and unlimited credits - G. Lopes.mp4
|
22.3 MB
|
|
All your GPS Trackers belong to US - C. Kasmi, P. Barre.mp4
|
25.1 MB
|
|
BMS is destroyed by - smart button - E. Litvinov.mp4
|
20.0 MB
|
|
Cracking the Perimeter with SharpShooter - D. Chell.mp4
|
24.1 MB
|
|
DPAPI and DPAPI-NG Decrypting All Users' Secrets and PFX Passwords - P. Januskiewicz.mp4
|
29.5 MB
|
|
Exploits in Wetware - R. Sell.mp4
|
25.7 MB
|
|
HACKER JEOPARDY.mp4
|
101.7 MB
|
|
In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll.mp4
|
27.0 MB
|
|
Introduction to IoT Reverse Engineering - V. Di Giampietro.mp4
|
31.9 MB
|
|
IronPython OMFG - M. Salvati.mp4
|
39.2 MB
|
|
RHme3 Hacking through failure - B. Gardiner, J. Beverley, C. Dewinter.mp4
|
25.4 MB
|
|
Sneaking Past Device Guard - P. Tsukerman.mp4
|
30.7 MB
|
|
Social Forensication A Multidisciplinary Approach to Successful Social Engineering - J.Gray.mp4
|
25.7 MB
|
|
Using Machines to exploit Machines - G. Barnhart Magen, E. Caltum.mp4
|
34.6 MB
|
|
Who watches the watchmen - M. Bergman, M. Smeets.mp4
|
27.3 MB
|
|
whoami priv - show me your privileges and I will lead you to SYSTEM - A. Pierini.mp4
|
33.2 MB
|
|
You « try » to detect mimikatz - V. Le Toux.mp4
|
27.8 MB
|
|
/.../Hack In Paris 2019 captions/
|
|
Abusing Google Play Billing for fun and unlimited credits - G. Lopes.eng.srt
|
44.2 KB
|
|
All your GPS Trackers belong to US - C. Kasmi, P. Barre.eng.srt
|
52.4 KB
|
|
BMS is destroyed by - smart button - E. Litvinov.eng.srt
|
33.0 KB
|
|
Cracking the Perimeter with SharpShooter - D. Chell.eng.srt
|
71.8 KB
|
|
DPAPI and DPAPI-NG Decrypting All Users' Secrets and PFX Passwords - P. Januskiewicz.eng.srt
|
95.0 KB
|
|
Exploits in Wetware - R. Sell.eng.srt
|
76.6 KB
|
|
HACKER JEOPARDY.eng.srt
|
92.2 KB
|
|
In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll.eng.srt
|
72.7 KB
|
|
Introduction to IoT Reverse Engineering - V. Di Giampietro.eng.srt
|
66.5 KB
|
|
IronPython OMFG - M. Salvati.eng.srt
|
87.6 KB
|
|
RHme3 Hacking through failure - B. Gardiner, J. Beverley, C. Dewinter.eng.srt
|
75.8 KB
|
|
Sneaking Past Device Guard - P. Tsukerman.eng.srt
|
68.1 KB
|
|
Social Forensication A Multidisciplinary Approach to Successful Social Engineering - J.Gray.eng.srt
|
74.1 KB
|
|
Using Machines to exploit Machines - G. Barnhart Magen, E. Caltum.eng.srt
|
81.0 KB
|
|
Who watches the watchmen - M. Bergman, M. Smeets.eng.json
|
2.3 MB
|
|
Who watches the watchmen - M. Bergman, M. Smeets.eng.lrc
|
66.2 KB
|
|
Who watches the watchmen - M. Bergman, M. Smeets.eng.srt
|
78.8 KB
|
|
Who watches the watchmen - M. Bergman, M. Smeets.eng.text
|
38.7 KB
|
|
Who watches the watchmen - M. Bergman, M. Smeets.eng.tsv
|
54.7 KB
|
|
Who watches the watchmen - M. Bergman, M. Smeets.eng.txt
|
67.2 KB
|
|
Who watches the watchmen - M. Bergman, M. Smeets.eng.vtt
|
67.2 KB
|
|
whoami priv - show me your privileges and I will lead you to SYSTEM - A. Pierini.eng.srt
|
62.6 KB
|
|
You « try » to detect mimikatz - V. Le Toux.eng.json
|
1.7 MB
|
|
You « try » to detect mimikatz - V. Le Toux.eng.lrc
|
40.2 KB
|
|
You « try » to detect mimikatz - V. Le Toux.eng.srt
|
46.0 KB
|
|
You « try » to detect mimikatz - V. Le Toux.eng.text
|
27.2 KB
|
|
You « try » to detect mimikatz - V. Le Toux.eng.tsv
|
34.8 KB
|
|
You « try » to detect mimikatz - V. Le Toux.eng.txt
|
40.7 KB
|
|
You « try » to detect mimikatz - V. Le Toux.eng.vtt
|
40.7 KB
|
|
Hack In Paris 2021/
|
|
{Internet of Things or Threats} Anatomizing the Structure of IoT Botnets - Aditya K Sood.mp4
|
21.8 MB
|
|
All Roads Lead to OpenVPN Pwning Industrial Remote Access Clients - Sharon BRIZINOV.mp4
|
29.6 MB
|
|
Cannibal Hacking, from Zero the hero to hammer smashed host - Kevin DENIS.mp4
|
14.7 MB
|
|
Dissecting PDF Files to Malware Analysis - Filipi PIRES.mp4
|
32.2 MB
|
|
Easy mobile penetration testing with Brida - Federico Dotta & Piergiovanni Cipolloni.mp4
|
26.3 MB
|
|
Fuzzing Apache HTTP Server for fun and CVEs - Antonio Morales.mp4
|
18.3 MB
|
|
Holding The Stick at Both Ends Fuzzing RDP Client and Server - Shaked Reiner & Or Ben Porath.mp4
|
15.7 MB
|
|
Monsters in the enterprise dungeon - finding and fixing severe 0 day vulnerabilities - Egor & Mikhail.mp4
|
13.8 MB
|
|
Software Incident Preparedness - An emergency Medical Response Perspective - Jake Byman.mp4
|
11.1 MB
|
|
Steganography and malware from Scratch - Juan Araya.mp4
|
22.6 MB
|
|
Unlimited Sherlock Deep Dive into Forensics Operations to track Down Hackers - Paula Januszliewicz.mp4
|
34.5 MB
|
|
/.../Hack In Paris 2021 captions/
|
|
{Internet of Things or Threats} Anatomizing the Structure of IoT Botnets - Aditya K Sood.eng.srt
|
72.6 KB
|
|
All Roads Lead to OpenVPN Pwning Industrial Remote Access Clients - Sharon BRIZINOV.eng.srt
|
83.5 KB
|
|
Cannibal Hacking, from Zero the hero to hammer smashed host - Kevin DENIS.eng.srt
|
68.1 KB
|
|
Dissecting PDF Files to Malware Analysis - Filipi PIRES.eng.json
|
1.9 MB
|
|
Dissecting PDF Files to Malware Analysis - Filipi PIRES.eng.lrc
|
48.2 KB
|
|
Dissecting PDF Files to Malware Analysis - Filipi PIRES.eng.srt
|
54.6 KB
|
|
Dissecting PDF Files to Malware Analysis - Filipi PIRES.eng.text
|
34.1 KB
|
|
Dissecting PDF Files to Malware Analysis - Filipi PIRES.eng.tsv
|
42.3 KB
|
|
Dissecting PDF Files to Malware Analysis - Filipi PIRES.eng.txt
|
48.7 KB
|
|
Dissecting PDF Files to Malware Analysis - Filipi PIRES.eng.vtt
|
48.7 KB
|
|
Easy mobile penetration testing with Brida - Federico Dotta & Piergiovanni Cipolloni.eng.json
|
1.4 MB
|
|
Easy mobile penetration testing with Brida - Federico Dotta & Piergiovanni Cipolloni.eng.lrc
|
37.2 KB
|
|
Easy mobile penetration testing with Brida - Federico Dotta & Piergiovanni Cipolloni.eng.srt
|
41.7 KB
|
|
Easy mobile penetration testing with Brida - Federico Dotta & Piergiovanni Cipolloni.eng.text
|
27.2 KB
|
|
Easy mobile penetration testing with Brida - Federico Dotta & Piergiovanni Cipolloni.eng.tsv
|
33.1 KB
|
|
Easy mobile penetration testing with Brida - Federico Dotta & Piergiovanni Cipolloni.eng.txt
|
37.5 KB
|
|
Easy mobile penetration testing with Brida - Federico Dotta & Piergiovanni Cipolloni.eng.vtt
|
37.6 KB
|
|
Fuzzing Apache HTTP Server for fun and CVEs - Antonio Morales.eng.json
|
1.0 MB
|
|
Fuzzing Apache HTTP Server for fun and CVEs - Antonio Morales.eng.lrc
|
26.9 KB
|
|
Fuzzing Apache HTTP Server for fun and CVEs - Antonio Morales.eng.srt
|
30.0 KB
|
|
Fuzzing Apache HTTP Server for fun and CVEs - Antonio Morales.eng.text
|
19.9 KB
|
|
Fuzzing Apache HTTP Server for fun and CVEs - Antonio Morales.eng.tsv
|
23.9 KB
|
|
Fuzzing Apache HTTP Server for fun and CVEs - Antonio Morales.eng.txt
|
27.2 KB
|
|
Fuzzing Apache HTTP Server for fun and CVEs - Antonio Morales.eng.vtt
|
27.2 KB
|
|
Holding The Stick at Both Ends Fuzzing RDP Client and Server - Shaked Reiner & Or Ben Porath.eng.srt
|
63.4 KB
|
|
Monsters in the enterprise dungeon - finding and fixing severe 0 day vulnerabilities - Egor & Mikhail.eng.srt
|
43.4 KB
|
|
Software Incident Preparedness - An emergency Medical Response Perspective - Jake Byman.eng.srt
|
53.3 KB
|
|
Steganography and malware from Scratch - Juan Araya.eng.srt
|
96.9 KB
|
|
Unlimited Sherlock Deep Dive into Forensics Operations to track Down Hackers - Paula Januszliewicz.eng.srt
|
91.7 KB
|
|
Hack In Paris 2022/
|
|
Biohacker The Invisible Threat by Len NOE.mp4
|
28.2 MB
|
|
Exploiting Volatile Memory Analysis Challenges for Fun & Profit by Solomon Sonya.mp4
|
53.7 MB
|
|
Hack In Paris 2022 - conferences highlights.mp4
|
11.6 MB
|
|
How to measure the security of your network protection devices by Winn SCHWARTAU.mp4
|
52.4 MB
|
|
I know what your 'Microsoft Mainframe' did last summer.. - by Yossi SASSI.mp4
|
46.3 MB
|
|
If descartes applied counter deception in cyberspace by Gregory CARPENTER.mp4
|
34.7 MB
|
|
NetflOSINT taking an often-overlooked data source and operationalizing it by Joe GRAY.mp4
|
35.5 MB
|
|
Offensive Hunting - Using Blue Team techniques in Red Team ops by Marc SMEETS & Mark BERGMAN.mp4
|
38.6 MB
|
|
Pinata PIN Automatic Try Attack by Salvador MENDOZA.mp4
|
25.1 MB
|
|
Strong Story to Tell Top 10 Mistakes by Administrators about Remote Work by Paula JANUSZKIEWICZ.mp4
|
45.7 MB
|
|
/.../Hack In Paris 2022 captions/
|
|
Biohacker The Invisible Threat by Len NOE.eng.srt
|
74.6 KB
|
|
Exploiting Volatile Memory Analysis Challenges for Fun & Profit by Solomon Sonya.eng.srt
|
112.1 KB
|
|
Hack In Paris 2022 - conferences highlights.eng.srt
|
3.6 KB
|
|
How to measure the security of your network protection devices by Winn SCHWARTAU.eng.srt
|
66.8 KB
|
|
I know what your 'Microsoft Mainframe' did last summer.. - by Yossi SASSI.eng.srt
|
86.2 KB
|
|
If descartes applied counter deception in cyberspace by Gregory CARPENTER.eng.srt
|
60.3 KB
|
|
NetflOSINT taking an often-overlooked data source and operationalizing it by Joe GRAY.eng.srt
|
74.3 KB
|
|
Offensive Hunting - Using Blue Team techniques in Red Team ops by Marc SMEETS & Mark BERGMAN.eng.srt
|
84.4 KB
|
|
Pinata PIN Automatic Try Attack by Salvador MENDOZA.eng.srt
|
60.0 KB
|
|
Strong Story to Tell Top 10 Mistakes by Administrators about Remote Work by Paula JANUSZKIEWICZ.eng.srt
|
112.4 KB
|
|
Total files 653
|