|
/
|
|
Hack In Paris logo.jpg
|
4.6 KB
|
|
|
|
Hack In Paris logo.png
|
27.3 KB
|
|
Hack In Paris thank you.txt
|
0.8 KB
|
|
/Slides/
|
|
02-LockingTheThroneRoom.pdf
|
307.7 KB
|
|
03-BeASmartCiso.pdf
|
4.6 MB
|
|
04-ProjectQuebec.pdf
|
5.8 MB
|
|
05-OffensiveXSLT.pdf
|
12.1 MB
|
|
06-Agnitio.pdf
|
6.2 MB
|
|
07-Pentesting_iPhone_iPad.pdf
|
1.9 MB
|
|
08-Skyrack.pdf
|
350.4 KB
|
|
09-TheForbiddenImage.pdf
|
465.2 KB
|
|
10-RogueAV.pdf
|
5.2 MB
|
|
11-ProactiveSecurity.pdf
|
4.1 MB
|
|
12-EscapingWindowsSandboxes.pdf
|
1.3 MB
|
|
/Video/
|
|
Alain Zidouema Acloselookatrogueantivirusprograms.mp4
|
34.9 MB
|
|
Bruno KEROUANTON - Be a smart CISO, learn about people.mp4
|
44.8 MB
|
|
David Rook AgnitionthesecuritycodereviewSwissarmyknife.mp4
|
66.8 MB
|
|
Gary Miliefsky Proactivenetworksecuritythroughvulnerabilitymanagement.mp4
|
58.6 MB
|
|
Jean Baptiste Aviat SkirackROPformasses.mp4
|
26.5 MB
|
|
Mario HEIDERICH - Locking the throne room.mp4
|
60.2 MB
|
|
Mario Heiderich Theforbiddenimage SecurityimpactofSVGontheWWW.mp4
|
22.4 MB
|
|
Nicolas Gregoire OffensiveXSLT.mp4
|
48.0 MB
|
|
Peter Van Eeckhoutte Project Quebecandwin32exploitdevelopmentwithpvefindaddr.mp4
|
67.7 MB
|
|
Tom Keetch EscapingWindowsSandboxes.mp4
|
17.7 MB
|
|
Winn SCHWARTAU - Cyberwar 4G.mp4
|
41.4 MB
|
|
/Slides/
|
|
Amol-SCADASecurityWhyIsItSoHard.pdf
|
5.3 MB
|
|
Andrei-PostScript Danger Ahead.pdf
|
2.4 MB
|
|
Ange-Aa bit more of PE.pdf.oypsskt.partial
|
1.6 MB
|
|
Chris.H-SocialEngineer-TheArtofHumanHacking.pdf
|
8.1 MB
|
|
Fernando-ipv6-security.pdf
|
315.6 KB
|
|
Georgia-androidpermissions.pdf
|
1.9 MB
|
|
Jayson-securing HIP.pdf
|
1.4 MB
|
|
Jorge-Weapons of Max Destruction V40.pdf
|
14.5 MB
|
|
Klaus Stonesoft_AET.pdf
|
1.5 MB
|
|
Krzysztof-html5-somethingwickedthiswaycomes.pdf
|
1.4 MB
|
|
Mario-got_ur_nose_hip12.pdf
|
2.7 MB
|
|
Mikko H-Keynote.pdf
|
2.0 MB
|
|
Nicolas-Attacking_XML_processing.pdf
|
11.1 MB
|
|
/Video/
|
|
Amol SARWATE - SCADA Security Why is it so hard.mp4
|
60.9 MB
|
|
Andrei COSTIN - Postscript Danger ahead!.mp4
|
358.1 MB
|
|
Ange ALBERTINI - A bit more of PE.mp4
|
46.2 MB
|
|
Chris HADNAGY - Nonverbal human hacking.mp4
|
42.4 MB
|
|
Fernando Gont Results of a Security Assessment of the Internet Protocol Version 6.mp4
|
59.8 MB
|
|
Georgia Weidman Bypassing the Android Permission Model.mp4
|
50.7 MB
|
|
Jayson E Street Securing The Internet YOU re Doing It Wrong.mp4
|
56.2 MB
|
|
Jorge Sebastiao Weapons of Max Destruction V4.mp4
|
35.8 MB
|
|
Klaus Majewski What are the Means for Cybercriminals to Bypass and Evade your Defenses.mp4
|
43.9 MB
|
|
Krzysztof Kotowicz HTML5 Something Wicked This Way Comes.mp4
|
46.3 MB
|
|
Mario Heiderich Got Your Nose How to Steal Your Precious Data Without Using Scripts.mp4
|
55.3 MB
|
|
Mikko H Hypponen Keynote Where are we and Where are we Going.mp4
|
55.9 MB
|
|
Nicolas Gregoire Attacking XML Processing.mp4
|
53.0 MB
|
|
Winn Schwartau Georgia Weidman Mario Heiderich Panel Offensive Nature.mp4
|
50.5 MB
|
|
Winn Schwartau Jayson E Street Chris Hadnagy Panel Defensive Nature.mp4
|
53.7 MB
|
|
Winn Schwartau Keynote Measuring Risk with Time Based Security.mp4
|
47.4 MB
|
|
/Slides/
|
|
hack-in-paris-2013.htm
|
34.7 KB
|
|
hip-2013-slides.htm
|
2.3 MB
|
|
HiP2k13-Burp_Pro_Tips_and_Tricks.pdf
|
2.8 MB
|
|
im-in-your-browser-pwning-your-stuff-attacking-google-chrome-extensions.htm
|
70.8 KB
|
|
MDM-HIP_2013.pdf
|
3.5 MB
|
|
slidesjensmuller.pdf
|
1.3 MB
|
|
slidesjuliawolf.pdf
|
5.5 MB
|
|
slidesmarioheiderich.pdf
|
2.1 MB
|
|
slidesricardorodriguez.pdf
|
2.8 MB
|
|
Slidesthomasroth.pdf
|
6.0 MB
|
|
Windows-Phone-8-application-security-slides.pdf
|
993.4 KB
|
|
/Video/
|
|
Analysis of a Windows Kernel vulnerability.mp4
|
55.2 MB
|
|
Analysis of a Windows Kernel vulnerability.srt
|
76.1 KB
|
|
Are we getting better.mp4
|
51.9 MB
|
|
Are we getting better.srt
|
94.4 KB
|
|
Attacking Google Chrome extensions.mp4
|
39.5 MB
|
|
Attacking Google Chrome extensions.srt
|
57.1 KB
|
|
Burp Pro - Real life tips and tricks.mp4
|
51.9 MB
|
|
Burp Pro - Real life tips and tricks.srt
|
71.3 KB
|
|
BYOD - The privacy and Compilance risks from bringing your own mobile device to work.mp4
|
48.3 MB
|
|
BYOD - The privacy and Compilance risks from bringing your own mobile device to work.srt
|
41.5 KB
|
|
DBI Frameworks applied to computer security.mp4
|
41.8 MB
|
|
DBI Frameworks applied to computer security.srt
|
54.6 KB
|
|
Malware vs Virtualization.mp4
|
40.5 MB
|
|
Malware vs Virtualization.srt
|
53.9 KB
|
|
Next generation rootkits dor ARM based devices.mp4
|
37.9 MB
|
|
Next generation rootkits dor ARM based devices.srt
|
58.4 KB
|
|
Origin policy enforcement in modern browsers.mp4
|
29.8 MB
|
|
Origin policy enforcement in modern browsers.srt
|
47.2 KB
|
|
Remoting Android applications for fun and profit.mp4
|
43.9 MB
|
|
Remoting Android applications for fun and profit.srt
|
48.8 KB
|
|
The - Doctrine Classique - of Websecurity and the inner HTML Apocalypse.mp4
|
48.0 MB
|
|
The - Doctrine Classique - of Websecurity and the inner HTML Apocalypse.srt
|
84.3 KB
|
|
The Control of technology by nation state - Past, Present and Future.mp4
|
39.9 MB
|
|
The Control of technology by nation state - Past, Present and Future.srt
|
51.2 KB
|
|
The Realex payments application security story, narrated by Security Ninja.mp4
|
53.2 MB
|
|
The Realex payments application security story, narrated by Security Ninja.srt
|
88.0 KB
|
|
The Security of MDM (Mobile Device Management) systems.mp4
|
39.2 MB
|
|
The Security of MDM (Mobile Device Management) systems.srt
|
48.6 KB
|
|
Web Applications forensics.mp4
|
43.4 MB
|
|
Web Applications forensics.srt
|
57.2 KB
|
|
Windows Phone 8 application security.mp4
|
34.4 MB
|
|
Windows Phone 8 application security.srt
|
41.7 KB
|
|
/Video/
|
|
11 metaprogramming technics applied to software obduscation.mp4
|
59.4 MB
|
|
11 metaprogramming technics applied to software obduscation.srt
|
53.7 KB
|
|
ARM AARCH64 writing exploits for the new arm architecture.mp4
|
26.7 MB
|
|
ARM AARCH64 writing exploits for the new arm architecture.srt
|
36.6 KB
|
|
Bitting into the forbidden fruit.Lessons froms trusting JavaScript crypto.mp4
|
54.2 MB
|
|
Bitting into the forbidden fruit.Lessons froms trusting JavaScript crypto.srt
|
60.6 KB
|
|
Breaking through the bottleneck - mobile malware is outbreak spreading like wildfire.mp4
|
30.6 MB
|
|
Breaking through the bottleneck - mobile malware is outbreak spreading like wildfire.srt
|
31.2 KB
|
|
Debate - Global Surveillance - Security vs. Privacy.mp4
|
75.1 MB
|
|
Debate - Global Surveillance - Security vs. Privacy.srt
|
69.7 KB
|
|
Defeating UEFI WIN8 secureboot.mp4
|
43.2 MB
|
|
Defeating UEFI WIN8 secureboot.srt
|
49.0 KB
|
|
Digital Energy - BPT.mp4
|
47.1 MB
|
|
Digital Energy - BPT.srt
|
57.2 KB
|
|
Energy fraud and orchestrated blackouts issues with wireless metering protocols(Wm-Bus).mp4
|
51.1 MB
|
|
Energy fraud and orchestrated blackouts issues with wireless metering protocols(Wm-Bus).srt
|
49.8 KB
|
|
Extreme forensics reloaded 2Q 2014.mp4
|
58.4 MB
|
|
Extreme forensics reloaded 2Q 2014.srt
|
64.1 KB
|
|
Fuzzing reversing and maths.mp4
|
62.4 MB
|
|
Fuzzing reversing and maths.srt
|
59.8 KB
|
|
KEYNOTE - Around the world in 80 cons.mp4
|
73.2 MB
|
|
KEYNOTE - Around the world in 80 cons.srt
|
88.2 KB
|
|
KEYNOTE - Beyond information ware hacking the future of security.mp4
|
55.8 MB
|
|
KEYNOTE - Beyond information ware hacking the future of security.srt
|
58.7 KB
|
|
Pentesting NoSQL exploitation framework.mp4
|
54.6 MB
|
|
Pentesting NoSQL exploitation framework.srt
|
48.2 KB
|
|
Plunder,pillage and print.mp4
|
74.9 MB
|
|
Plunder,pillage and print.srt
|
75.5 KB
|
|
Splinter the rat attack - create your own botnet to exploit the network.mp4
|
63.2 MB
|
|
Splinter the rat attack - create your own botnet to exploit the network.srt
|
80.6 KB
|
|
To sternly look at JavaScript MVC and templating frameworks.mp4
|
59.1 MB
|
|
To sternly look at JavaScript MVC and templating frameworks.srt
|
97.3 KB
|
|
Hack In Paris 2015/
|
|
DEBATE The right to self defense in Cyberspace.mp4
|
103.7 MB
|
|
KEYNOTE Analogue Network Security.mp4
|
49.2 MB
|
|
KEYNOTE Analogue Network Security.srt
|
58.4 KB
|
|
KEYNOTE Backdooring X11.mp4
|
51.8 MB
|
|
KEYNOTE Backdooring X11.srt
|
42.5 KB
|
|
KEYNOTE Copy & Pest.mp4
|
40.1 MB
|
|
KEYNOTE Copy & Pest.srt
|
57.1 KB
|
|
KEYNOTE DDoS Mitigation EPIC FAIL collection.mp4
|
46.2 MB
|
|
KEYNOTE DDoS Mitigation EPIC FAIL collection.srt
|
59.1 KB
|
|
KEYNOTE Root via SMS.mp4
|
44.6 MB
|
|
KEYNOTE Root via SMS.srt
|
30.4 KB
|
|
You don't hear me but your phone's voice interface does.mp4
|
42.3 MB
|
|
You don't hear me but your phone's voice interface does.srt
|
34.5 KB
|
|
Hack In Paris 2016/
|
|
Abusing Software Ddefined Networks (part 2).mp4
|
42.4 MB
|
|
All Your Door Belong To Me - Attacking Physical Access Systems.mp4
|
42.9 MB
|
|
Because of the advancements in prosthetics.mp4
|
54.9 MB
|
|
DEBATE.mp4
|
112.2 MB
|
|
DIFFDroid Dynamic Analysis Made Easier for Android.mp4
|
51.7 MB
|
|
From zero to SYSTEM on full disk encrypted Windows system.mp4
|
55.7 MB
|
|
How to successfully execute a professional Social Engineering attacks.mp4
|
60.8 MB
|
|
KEYNOTE 3 APIS 1000 LINES OF CODE EQUALS SUPER PRETTY OSINT.mp4
|
50.0 MB
|
|
KEYNOTE Voting between sharks.mp4
|
51.3 MB
|
|
Machine learning based ML techniques.mp4
|
52.3 MB
|
|
Security offense and defense strategies.mp4
|
37.7 MB
|
|
TALK HARDSPLOIT TOOL The next Hardware Hacking Laboratory.mp4
|
52.9 MB
|
|
The titanic methodologie.mp4
|
54.8 MB
|
|
Type5 Code1 or Lady In The Middle.mp4
|
51.6 MB
|
|
What could have derailed the Northeast Regional no 188.mp4
|
50.6 MB
|
|
Whisper in the Wire Voice Command Injection Reloaded.mp4
|
58.2 MB
|
|
Hack in Paris 2017/
|
|
802.1x Network access control & Bypass Techniques by VALERIAN LEGRAND.eng.srt
|
71.4 KB
|
|
802.1x Network access control & Bypass Techniques by VALERIAN LEGRAND.mp4
|
36.7 MB
|
|
Are you watching TV now Is it real by LEE JONGHO & KIM MINGEUN.eng.srt
|
54.9 KB
|
|
Are you watching TV now Is it real by LEE JONGHO & KIM MINGEUN.mp4
|
45.5 MB
|
|
Beyond OWASP Top 10 by AARON HNATIW.eng.srt
|
148.7 KB
|
|
Beyond OWASP Top 10 by AARON HNATIW.mp4
|
52.7 MB
|
|
DEBATE - Hackers, the Media, Truth, Trust & Alternative Facts.eng.srt
|
280.8 KB
|
|
DEBATE - Hackers, the Media, Truth, Trust & Alternative Facts.mp4
|
114.9 MB
|
|
Dissecting a ransomware-infected MBR by RAUL ALVAREZ.eng.srt
|
92.5 KB
|
|
Dissecting a ransomware-infected MBR by RAUL ALVAREZ.mp4
|
42.6 MB
|
|
Hackers Do we shoot or do we hug by EDWIN VAN ANDEL.eng.srt
|
112.7 KB
|
|
Hackers Do we shoot or do we hug by EDWIN VAN ANDEL.mp4
|
48.4 MB
|
|
How to measure your security by WINN SCHWARTAU.eng.srt
|
106.5 KB
|
|
How to measure your security by WINN SCHWARTAU.mp4
|
49.7 MB
|
|
Injecting security into web apps by AJIN ABRAHAM.eng.srt
|
128.5 KB
|
|
Injecting security into web apps by AJIN ABRAHAM.mp4
|
52.8 MB
|
|
Internet of Compromised Things - Methodology & Tools by DAMIEN CAUQUIL.eng.srt
|
67.0 KB
|
|
Internet of Compromised Things - Methodology & Tools by DAMIEN CAUQUIL.mp4
|
30.5 MB
|
|
Popping a shell on a mainframe, is that even possible by AYOUB ELAASAL.mp4
|
39.7 MB
|
|
Social Engineering setting people into debug mode by Dominique Brack.eng.srt
|
103.1 KB
|
|
Social Engineering setting people into debug mode by Dominique Brack.mp4
|
45.9 MB
|
|
The forgotten interface - Windows named pipes by GIL COHEN.eng.srt
|
57.9 KB
|
|
The forgotten interface - Windows named pipes by GIL COHEN.mp4
|
31.1 MB
|
|
The interet of vulnerabilities by DERAL HEILAND.eng.srt
|
109.2 KB
|
|
The interet of vulnerabilities by DERAL HEILAND.mp4
|
45.7 MB
|
|
VentriLock - Exploring voice-based authentication systems.eng.srt
|
106.9 KB
|
|
VentriLock - Exploring voice-based authentication systems.mp4
|
63.7 MB
|
|
Hack In Paris 2018/
|
|
Auditd for the Masses by Philipp.eng.srt
|
121.1 KB
|
|
Auditd for the Masses by Philipp.mp4
|
53.7 MB
|
|
Building Systems On Shaky Ground.eng.srt
|
122.4 KB
|
|
Building Systems On Shaky Ground.mp4
|
58.5 MB
|
|
DEBATE - To Serve Man AI, Machine Learning.eng.srt
|
189.7 KB
|
|
DEBATE - To Serve Man AI, Machine Learning.mp4
|
131.4 MB
|
|
Drones the new weapon of choice.eng.srt
|
125.3 KB
|
|
Drones the new weapon of choice.mp4
|
71.6 MB
|
|
From printed circuit boards to e.eng.srt
|
109.7 KB
|
|
From printed circuit boards to e.mp4
|
64.3 MB
|
|
he Past, Present & Future of Ente.eng.srt
|
125.2 KB
|
|
he Past, Present & Future of Ente.mp4
|
67.7 MB
|
|
HIP18.eng.srt
|
3.6 KB
|
|
HIP18.mp4
|
4.1 MB
|
|
How To Bring HID Attacks To The.eng.srt
|
117.5 KB
|
|
How To Bring HID Attacks To The.mp4
|
71.9 MB
|
|
Hunting PBX for Vulnerabilities.mp4
|
31.0 MB
|
|
Invoke-DOSfuscation Techniques F.eng.srt
|
152.7 KB
|
|
Invoke-DOSfuscation Techniques F.mp4
|
63.5 MB
|
|
Knockin' on IPv6's doors by Fern.eng.srt
|
82.4 KB
|
|
Knockin' on IPv6's doors by Fern.mp4
|
51.6 MB
|
|
Mobile operators vs. Hackers new.mp4
|
48.5 MB
|
|
NFC Payments The Art of Relay & R.eng.srt
|
68.3 KB
|
|
NFC Payments The Art of Relay & R.mp4
|
41.1 MB
|
|
No Win32 Process Needed Expandin.eng.srt
|
94.4 KB
|
|
No Win32 Process Needed Expandin.mp4
|
64.8 MB
|
|
Silent wire hacking by Erwan Broq.eng.srt
|
54.7 KB
|
|
Silent wire hacking by Erwan Broq.mp4
|
31.7 MB
|
|
The Bicho An Advanced Car Backdo.eng.srt
|
86.7 KB
|
|
The Bicho An Advanced Car Backdo.mp4
|
65.1 MB
|
|
The Insecure Software Developmen.eng.srt
|
122.4 KB
|
|
The Insecure Software Developmen.mp4
|
65.1 MB
|
|
Hack In Paris 2019/
|
|
Abusing Google Play Billing for fun and unlimited credits - G. Lopes.eng.srt
|
44.2 KB
|
|
Abusing Google Play Billing for fun and unlimited credits - G. Lopes.mp4
|
42.6 MB
|
|
All your GPS Trackers belong to US - C. Kasmi, P. Barre.eng.srt
|
52.4 KB
|
|
All your GPS Trackers belong to US - C. Kasmi, P. Barre.mp4
|
48.2 MB
|
|
BMS is destroyed by - smart button - E. Litvinov.eng.srt
|
33.0 KB
|
|
BMS is destroyed by - smart button - E. Litvinov.mp4
|
37.7 MB
|
|
Cracking the Perimeter with SharpShooter - D. Chell.eng.srt
|
71.8 KB
|
|
Cracking the Perimeter with SharpShooter - D. Chell.mp4
|
45.3 MB
|
|
DPAPI and DPAPI-NG Decrypting All Users' Secrets and PFX Passwords - P. Januskiewicz.eng.srt
|
95.0 KB
|
|
DPAPI and DPAPI-NG Decrypting All Users' Secrets and PFX Passwords - P. Januskiewicz.mp4
|
49.8 MB
|
|
Exploits in Wetware - R. Sell.eng.srt
|
76.6 KB
|
|
Exploits in Wetware - R. Sell.mp4
|
49.6 MB
|
|
HACKER JEOPARDY.eng.srt
|
92.2 KB
|
|
HACKER JEOPARDY.mp4
|
137.3 MB
|
|
In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll.eng.srt
|
72.7 KB
|
|
In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll.mp4
|
51.8 MB
|
|
Introduction to IoT Reverse Engineering - V. Di Giampietro.eng.srt
|
66.5 KB
|
|
Introduction to IoT Reverse Engineering - V. Di Giampietro.mp4
|
59.2 MB
|
|
IronPython... OMFG - M. Salvati.eng.srt
|
87.6 KB
|
|
IronPython... OMFG - M. Salvati.mp4
|
66.6 MB
|
|
RHme3 Hacking through failure - B. Gardiner, J. Beverley, C. Dewinter.eng.srt
|
75.8 KB
|
|
RHme3 Hacking through failure - B. Gardiner, J. Beverley, C. Dewinter.mp4
|
49.4 MB
|
|
Sneaking Past Device Guard - P. Tsukerman.eng.srt
|
68.1 KB
|
|
Sneaking Past Device Guard - P. Tsukerman.mp4
|
60.7 MB
|
|
Social Forensication A Multidisciplinary Approach to Successful Social Engineering - J.Gray.eng.srt
|
74.1 KB
|
|
Social Forensication A Multidisciplinary Approach to Successful Social Engineering - J.Gray.mp4
|
51.8 MB
|
|
Using Machines to exploit Machines - G. Barnhart Magen, E. Caltum.eng.srt
|
81.0 KB
|
|
Using Machines to exploit Machines - G. Barnhart Magen, E. Caltum.mp4
|
65.9 MB
|
|
Who watches the watchmen - M. Bergman, M. Smeets.mp4
|
53.0 MB
|
|
whoami priv - show me your privileges and I will lead you to SYSTEM - A. Pierini.eng.srt
|
62.6 KB
|
|
whoami priv - show me your privileges and I will lead you to SYSTEM - A. Pierini.mp4
|
58.5 MB
|
|
You try to detect mimikatz - V. Le Toux.mp4
|
56.4 MB
|
|
Hack In Paris 2021/
|
|
All Roads Lead to OpenVPN Pwning Industrial Remote Access Clients - Sharon BRIZINOV.eng.srt
|
83.5 KB
|
|
All Roads Lead to OpenVPN Pwning Industrial Remote Access Clients - Sharon BRIZINOV.mp4
|
47.8 MB
|
|
Cannibal Hacking, from Zero the hero to hammer smashed host - Kevin DENIS.eng.srt
|
68.1 KB
|
|
Cannibal Hacking, from Zero the hero to hammer smashed host - Kevin DENIS.mp4
|
22.8 MB
|
|
Dissecting PDF Files to Malware Analysis - Filipi PIRES.mp4
|
48.6 MB
|
|
Easy mobile penetration testing with Brida - Federico Dotta & Piergiovanni Cipolloni.mp4
|
49.8 MB
|
|
Fuzzing Apache HTTP Server for fun and CVEs - Antonio Morales.mp4
|
30.6 MB
|
|
Holding The Stick at Both Ends Fuzzing RDP Client and Server - Shaked Reiner & Or Ben Porath.eng.srt
|
63.4 KB
|
|
Holding The Stick at Both Ends Fuzzing RDP Client and Server - Shaked Reiner & Or Ben Porath.mp4
|
23.4 MB
|
|
Monsters in the enterprise dungeon - finding and fixing severe 0 day vulnerabilities - Egor & Mikhail.eng.srt
|
43.4 KB
|
|
Monsters in the enterprise dungeon - finding and fixing severe 0 day vulnerabilities - Egor & Mikhail.mp4
|
22.7 MB
|
|
Software Incident Preparedness - An emergency Medical Response Perspective - Jake Byman.eng.srt
|
53.3 KB
|
|
Software Incident Preparedness - An emergency Medical Response Perspective - Jake Byman.mp4
|
13.1 MB
|
|
Steganography and malware from Scratch - Juan Araya.eng.srt
|
96.9 KB
|
|
Steganography and malware from Scratch - Juan Araya.mp4
|
28.6 MB
|
|
Unlimited Sherlock Deep Dive into Forensics Operations to track Down Hackers - Paula Januszliewicz.eng.srt
|
91.7 KB
|
|
Unlimited Sherlock Deep Dive into Forensics Operations to track Down Hackers - Paula Januszliewicz.mp4
|
55.9 MB
|
|
{Internet of Things or Threats} Anatomizing the Structure of IoT Botnets - Aditya K Sood.eng.srt
|
72.6 KB
|
|
{Internet of Things or Threats} Anatomizing the Structure of IoT Botnets - Aditya K Sood.mp4
|
37.1 MB
|
|
Hack In Paris 2022/
|
|
Biohacker The Invisible Threat by Len NOE.mp4
|
48.5 MB
|
|
Biohacker The Invisible Threat by Len NOE.srt
|
74.6 KB
|
|
Exploiting Volatile Memory Analysis Challenges for Fun & Profit by Solomon Sonya.mp4
|
80.2 MB
|
|
Exploiting Volatile Memory Analysis Challenges for Fun & Profit by Solomon Sonya.srt
|
112.1 KB
|
|
Hack In Paris 2022 - conferences highlights.mp4
|
8.8 MB
|
|
Hack In Paris 2022 - conferences highlights.srt
|
3.6 KB
|
|
How to measure the security of your network protection devices by Winn SCHWARTAU.mp4
|
76.3 MB
|
|
How to measure the security of your network protection devices by Winn SCHWARTAU.srt
|
66.8 KB
|
|
I know what your 'Microsoft Mainframe' did last summer.. - by Yossi SASSI.mp4
|
71.7 MB
|
|
I know what your 'Microsoft Mainframe' did last summer.. - by Yossi SASSI.srt
|
86.2 KB
|
|
If descartes applied counter deception in cyberspace by Gregory CARPENTER.mp4
|
56.7 MB
|
|
If descartes applied counter deception in cyberspace by Gregory CARPENTER.srt
|
60.3 KB
|
|
NetflOSINT taking an often-overlooked data source and operationalizing it by Joe GRAY.mp4
|
58.3 MB
|
|
NetflOSINT taking an often-overlooked data source and operationalizing it by Joe GRAY.srt
|
74.3 KB
|
|
Offensive Hunting - Using Blue Team techniques in Red Team ops by Marc SMEETS & Mark BERGMAN.mp4
|
62.9 MB
|
|
Offensive Hunting - Using Blue Team techniques in Red Team ops by Marc SMEETS & Mark BERGMAN.srt
|
84.4 KB
|
|
Pinata PIN Automatic Try Attack by Salvador MENDOZA.mp4
|
42.3 MB
|
|
Pinata PIN Automatic Try Attack by Salvador MENDOZA.srt
|
60.0 KB
|
|
Strong Story to Tell Top 10 Mistakes by Administrators about Remote Work by Paula JANUSZKIEWICZ.mp4
|
74.4 MB
|
|
Strong Story to Tell Top 10 Mistakes by Administrators about Remote Work by Paula JANUSZKIEWICZ.srt
|
112.4 KB
|
|
Total files 288
|