FileMood

Download Hack.lu

Hack lu

Name

Hack.lu

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

8.2 GB

Total Files

659

Hash

272B386EE6A0E2EBE614F4D4900A0747A8E2BA4E

/

hack.lu logo.png

702.7 KB

hack.lu thank you.txt

1.1 KB

/Presentations/

2005-spyware-hacklu.pdf

1.5 MB

AdamJacobs.ppt

167.4 KB

Bacon-hack.lu.ppt

720.9 KB

Cyber_warfare_(zubair).ppt

602.6 KB

Fccu-hacklu-0.4.pdf

675.8 KB

HACK-2005-Conference_Usage-of-Internet-Content-Rating-Systems.pdf

156.6 KB

Hack-LU_2005_-_Kristof_Philipsen_-_WAVA_-_Full.pdf

1.3 MB

Hack-LU_2005_-_Kristof_Philipsen_-_WAVA_-_Scaled.pdf

825.9 KB

Hack-lu_cisco_ddos.ppt

1.5 MB

Hack-lu_cisco_ipt_security.ppt

325.1 KB

Hack_3.pdf

584.0 KB

Hack_lu_2005_Wolfgarten_-_Apache_Security_v0_3.ppt

1.0 MB

Hacklu-teuwen-wifi-security.pdf

762.5 KB

Hacklu2005-PHPSecurityWorkshop.pdf

75.0 KB

Hacklu_catch_the_key.ppt

151.6 KB

LuxMQschemes.pdf

433.8 KB

Rr0d.ppt

707.6 KB

Scapy_hack_lu_handout.pdf

1.6 MB

StateofTheArtWirelessHacking_Hack.lu.ppt

2.1 MB

The_human_factor.pps

601.6 KB

/Presentations/

AdeGre2006_Slides.pdf

3.3 MB

BehringerHackLuOperationalSecurity.pdf

914.7 KB

Claise-hack-lu.pdf

1.9 MB

Cryptochallenge.pdf

1.5 MB

Gcsec.pdf

250.5 KB

HACK.LU_HPP_compact.v.1.0_eng.pdf

2.0 MB

HACK_LU2006-IPTV_Security.pdf

1.1 MB

HackLU-InSPaceNobodyCanHearYouScream-NF-v1.pdf

247.4 KB

HackLU06-ButtiVeysset-WiFiAdvancedStealth-slides-3.pdf

1.1 MB

Hacklu_blancher.pdf

3.1 MB

Hacklu_metasploit_plugins_2006.ppt

725.5 KB

Hannes-Hacklu.pdf

221.7 KB

Lightning_blancher.pdf

285.8 KB

Nedap-hacklu.pdf

7.0 MB

Nfsen-hack.lu-06.pdf

3.4 MB

Renaud_Hack_Lu.pdf

1.0 MB

SandipHack_lu.zip

304.3 KB

Sensible_defence.0.2.ppt

172.0 KB

Venema.ppt

117.2 KB

Vh_thc-ipv6_attack.pdf

424.4 KB

VoIPhreaking-HiTB-2006.ppt

216.1 KB

Wifi-security_hacklu2006.pdf

1.0 MB

Xebek-HackDotLu06.pdf

1.9 MB

Zoller_hack_lu_2006.pdf

2.9 MB

/.../hack-lu-2007/

beamerthemeHaegar.sty

0.5 KB

hack-lu-ama.pdf

479.5 KB

hack-lu-ama.tex

18.8 KB

/.../hack-lu-2007/barcamp/

voip2p.pdf

1.1 MB

voip2p.tex

4.7 KB

/.../hack-lu-2007/barcamp/graphs/

et2.png

42.2 KB

fiw.png

66.9 KB

Hl2007banner.png

37.1 KB

index.html

2.0 KB

index.html@C=D;O=A

2.0 KB

index.html@C=D;O=D

2.0 KB

index.html@C=M;O=A

2.0 KB

index.html@C=M;O=D

2.0 KB

index.html@C=N;O=A

2.0 KB

index.html@C=N;O=D

2.0 KB

index.html@C=S;O=A

2.0 KB

index.html@C=S;O=D

2.0 KB

instfail.png

105.9 KB

login.png

31.7 KB

skype_screen_shot.png

771.7 KB

sp1.png

42.1 KB

/.../hack-lu-2007/graphs/

arch.odg

14.3 KB

arch.pdf

151.1 KB

csrrt.png

11.0 KB

decision.odg

11.4 KB

decision.pdf

78.8 KB

diskio.odg

14.0 KB

diskio.pdf

150.2 KB

frelay.odg

15.0 KB

frelay.pdf

150.7 KB

Hl2007banner.png

37.1 KB

inria.png

34.9 KB

loria.png

23.9 KB

memlayout.odg

13.0 KB

memlayout.pdf

150.0 KB

nethow.odg

14.5 KB

nethow.pdf

150.3 KB

vexec.odg

16.4 KB

vexec.pdf

154.4 KB

/Presentations/

1020-hacklu-tlr.pdf

306.6 KB

crack_windows_access_control.zip

2.5 MB

cracking_windows_access_control.pdf

2.7 MB

cracking_windows_access_control.ppt

688.6 KB

dhanjani-hack.lu-2007.pdf

5.1 MB

hack-lu-2007.zip

3.7 MB

Hack-lu-nepenthes.odp

322.5 KB

HACK-presentation_Raphael_Frank.ppt

1.5 MB

hack.lu_2007.zip

3.3 MB

hacklu07_Remote_wiretapping.pdf

531.0 KB

hacklu07_VoIP.zip

1.5 MB

hacklu07_VoIP_workshop.pdf

1.1 MB

hacklu2007-quuxlabs-goodiff-hackcamp.pdf

546.7 KB

hacklu2007_barisani_bianco.pdf

14.1 MB

HackLu_FrankAckermann_VirtPanacea.pdf

401.0 KB

Malware Analysis.odp

677.5 KB

metasm.pdf

387.0 KB

saumil_escaping_captive_portals.pdf

1.2 MB

saumil_writing_exploits_msf3_print.pdf

283.7 KB

shadowservers-hl2007.ppt

4.9 MB

SQL Agent.pdf

3.5 MB

video_1.avi

11.0 MB

video_2.avi

17.5 MB

voip-1.avi

4.8 MB

voip-2.avi

7.8 MB

voip-3.avi

16.8 MB

voip2p.pdf

1.1 MB

what-do-they-think-theyre-doing-hacklu.pdf

1.6 MB

Zombie20.pdf

2.6 MB

/Presentations/Scificrypto/

decode

2.6 KB

encode

4.1 KB

force

0.2 KB

Scificrypto-scripts.tar

10.2 KB

/barcamp/

dulaunoy-honeybot-introduction.pdf

757.0 KB

various-hack-lu-uml.pdf

74.7 KB

/Presentations/

2008-hack.lu-aumaitre.pdf

805.8 KB

av2cid.pptx

526.8 KB

Client-Server collaborative scanning.pptx

1.4 MB

Craig_Hacking Kiosks.pdf

1.3 MB

Craig_lightning_The Moth Trojan.pdf

308.2 KB

gutesman-gfuzz.pdf

1.3 MB

Halvar_hacklu.next.attempt.odp

1.0 MB

Immersed Telco CN attack Philippe Langlois 2008 new v6.pdf

1.6 MB

lenoir_presentation.pdf

1.9 MB

Malware of the Future.pdf

2.2 MB

naxx_slides.pdf

2.5 MB

nufw-hacklu2008.pdf

2.3 MB

Pastor_cracking into embedded devices - Hack.lu2K8.pdf

925.8 KB

picviz-hacklu2008.pdf

1.0 MB

rootkits-navigateurs.pdf

1.8 MB

Rustock.C - When a myth comes true.pdf

2.2 MB

smartcard-security_hacklu2008.pdf

92.8 KB

teflon_saumil_hacklu08.pdf

1.9 MB

Temmingh_HackLu2008.ppt

8.2 MB

/Presentations/

2009-10-28-Peeking-into-Pandoras-Bochs_RedTeam-Pentesting.pdf

2.2 MB

2009-Hack.lu-slides-WM6-rootkit.pdf

1.8 MB

davix.pdf

11.7 MB

exploiting_delphi.pptx

389.8 KB

filiol_keynote_hacklu09.pdf

1.4 MB

fuzzgrind.tar.bz2

1.1 MB

hack.lu_09-IpMorph.pdf

5.4 MB

HackLU_Firefox_Malware.pdf

3.5 MB

kaires.pdf

932.8 KB

moxie-marlinspike-some_tricks_for_defeating_ssl_in_practice.pdf

2.4 MB

New advances in Ms Office malware analysis.pdf

1.6 MB

PandorasBochs.pdf

5.1 MB

Penetration Document Format Slides.pdf

923.2 KB

perseus_slides_hacklu09.pdf

3.0 MB

Playing with SAT 1.2 - Hacklu.pdf

2.9 MB

stonesoft-ids-evasion-hacklu2009.pptx

6.2 MB

tmplab-HostileWRT-5-hacklu.pdf

227.9 KB

virus.pdf

641.2 KB

windows7-rot13-or-vigenere.pdf

521.6 KB

/video/

Hack.lu_Dinner.m4v

28.8 MB

Hack.lu_Impressiounen.m4v

28.3 MB

Hack.lu_Speakers.m4v

71.4 MB

/Presentations/

Aggarwal-Blackberry-Malicious-Applications-slides.pdf

3.3 MB

Bouillon-Stealing-credentials-for-impersonation.pdf

4.8 MB

Costin-HackingPrintersForFunAndProfit-slides.pdf

2.1 MB

Desnos_Dynamic_Metamorphic_Virtual_Machines-slides.pdf

1.1 MB

Filiol-Office-Documents-New-Weapons-of-Cyberwarfare-paper.pdf

485.0 KB

Filiol-Office-Documents-New-Weapons-of-Cyberwarfare-slides.pdf

581.2 KB

hacklu2010-planning.pdf

30.2 KB

Keetch-Escaping-from-Protected-Mode-Internet-Explorer-slides.ppt

854.0 KB

Mihailowitsch-Detecting-Hardware-Keyloggers-slides.pdf

1.2 MB

Nickerson-Real-World-Social-Engineering-CEO-Events-slides.pptx

7.4 MB

Saumil-Exploit-Delivery-slides.pdf

21.5 MB

Vinot-BGP-Ranking-slides.pdf

458.1 KB

Wagener-AHA-Adaptive-Honeypot-Alternative-slides.pdf

223.2 KB

Weinmann-All-Your-Baseband-Are-Belong-To-Us-slides.pdf

1.3 MB

/Presentations/

Binary Instrumentation for Hackers - hack.lu - Gal Diskin (final).pptx

3.2 MB

DBI_Workshop_Exmaples-final.zip

35.4 KB

fgont-hacklu2011-ip-security.pdf

274.6 KB

Hack.Lu CyberSecurity on Naval Information System v1.0.pdf

34.1 MB

hacklu2011-calendar_2011-09-19_2011-09-22-2.pdf

9.7 KB

Sniffjoke-HackLu-2011.pdf

1.1 MB

/Presentations/

basic-shodan.py

2.5 KB

Belgers-SocialEngineering.pdf

13.3 MB

draft.pdf

1.2 MB

Dropbox security.pdf

538.1 KB

Dropbox security.pptx

230.3 KB

Fuzzing_The_GSM_Protocol_Stack_-_Sebastien_Dudek_Guillaume_Delugre.pdf

806.7 KB

Hack.lu 2012 - Insecurity of security equipments - Eric Chassard & Maxime Clementz.pdf

4.3 MB

hack.lu-2012_Android-malware-forensics_Allix-Jerome.pdf

1.0 MB

Hack.lu-Philippe-Langlois-remote-HLR-crash.pptx.pdf

2.7 MB

Hacklu-2012-one-firmware-Andres-Blanco-Matias-Eissler.pdf

4.1 MB

HackLU-SDLTools.pptx

2.5 MB

hacklu_idascope_plohmann.pdf

1.1 MB

hynesimHackLu2012Workshop.pdf

1.7 MB

KillBot - Conspiracy Theories - hack.lu.pdf

671.0 KB

KillBot - Conspiracy Theories - hack.lu.pptx

1.9 MB

malware.lu-overview.pdf

1.5 MB

Mathieu RENARD - Hack.lu - Hacking iOS Applications v1.0 Slides.pdf

31.6 MB

menace-came-from-below.pdf

614.3 KB

minos.pdf

890.2 KB

SHODAN.pptx

301.3 KB

SinFP3-hacklu-v1.0.pdf

413.0 KB

VSF-hacklu2012.pdf

1.3 MB

vyncke - layer-2 security ipv6 hack lu.pptx.pdf

8.0 MB

when_malwares_target_smartcard_eID.pdf

136.6 KB

/Presentations/

20131023-Hack.lu Lightning Talk ACH project.pdf

60.6 KB

AbusingDalvikBeyondRecognition.pdf

931.3 KB

Adrian-Furtuna_Exploiting-Rounding-Vulnerabilities_Hack.lu2013.pdf

1.7 MB

Automated_vulnerability_scanning_and_exploitation.pdf

1.4 MB

BIOS_Chronomancy-Hack.lu_2013_v1.pptx

6.9 MB

dbongard_hacklu_2013.pdf

2.4 MB

Defensive strategies.pptx

1.2 MB

EMV-CAP_hacklu2013.pdf

5.8 MB

flux_ctf_award_ceremony.pdf

372.4 KB

Francisco_-_Wiretapping_an_entire_Cisco_VOIP_environment.pdf

1.4 MB

Hack.lu.2013-ExploitKitsKrawlerFramework.pdf

2.8 MB

Hack.lu2013-Pcap2bubblesProject-LT.pdf

1.9 MB

hack_lu_2013_David_Szili_Mihaly_Zagon_-_Time_to_evolve_Applying_red_and_blue_team_CTF_tactics_in_IT_Security.pdf

14.0 MB

Hack_lu_2013_Yarochkin_Kropotov_Pearls_of_Cybercrime_v20_to_publish_cutted.pdf

6.0 MB

HackLu2k13_GTA_Phishing_with_permission.pdf

6.2 MB

hacklu2013_hbootdbg.pdf

1.2 MB

hidex-hacklu.pdf

1.8 MB

Interactive deobfuscation.ppt

2.0 MB

ipcams-research-falcon-riva.pdf

5.1 MB

MalwareFairytale.pdf

5.1 MB

spin.pdf

657.3 KB

tcp_idle_scans_ipv6.pdf

8.4 MB

/Presentations/

Atlasis Rey Schaefer Evasion of HighEnd IPS Devices.pdf

2.1 MB

Atlasis-Rey-Schaefer-briefings-Evasion-of-HighEnd-IPS-Devices-wp.pdf

1.1 MB

Botnets Behavioral Patterns in the Network - Garcia Sebastian.pdf

1.1 MB

Bypasss sandboxes for fun.pdf

2.3 MB

cars.pdf

1.9 MB

CyberAttacksInUkraine.pdf

1.4 MB

DetectingBleedingEdgeMalware.pdf

4.6 MB

Falcon-Breaking Out of VirtualBox through 3D Acceleration.pdf

1.8 MB

hacking with pictures.pdf

7.6 MB

hacklu-joker-presentation.pdf

681.8 KB

I-hunt-TR-069-admins-shahar-tal-hacklu.pdf

3.6 MB

inside spying v1.4.pdf

2.0 MB

internet scanning mschloesser.pdf

916.9 KB

irma-slides.pdf

3.8 MB

merely keeping up hacklu.pdf

7.4 MB

Microsoft Vulnerability Research - How to be a Finder as a Vendor.pdf

872.3 KB

MobileInSecurity.pdf

16.0 MB

offline bruteforce attack on wps.pdf

2.9 MB

sherlock-slides.pdf

24.6 MB

slides fuzzing.pdf

2.0 MB

TSNOFORN.pdf

5.8 MB

viper.pdf

1.1 MB

WiHawk.pptx

5.2 MB

/Presentations/

2015-10-20-SEKOIA-Keynote Internet of Tchotchke-v1.0.pdf

41.0 MB

2015-10-21-Keynote-Hack-lu-Marie-Moe.pdf

4.4 MB

Albertini - Trusting files.pdf

7.9 MB

AutomaticExploitGeneration.pdf

2.3 MB

crema-hacklu.pdf

939.5 KB

Crowdsourced_Malware_Triage_-_Workshop.pdf

9.1 MB

Dr.Honeypots_Worskhop_Hack.lu2015_Rist_Arcas .pdf

2.0 MB

Draw-me-a-LocalKernelDebuger.pdf

568.1 KB

fitbit-hacklu-slides.pdf

8.0 MB

forging_the_usb_armory.pdf

9.7 MB

FredericJacobs-Annotated.pdf

4.2 MB

FredericJacobs.pdf

4.1 MB

hacklu15_enovella_reversing_routers.pdf

10.1 MB

Hacklu2015-SecurityDesignAndHigh-RiskUsers-4.3.pdf

1.3 MB

hacklu2015_ecbkids.pdf

2.9 MB

hacklu2015_ecbpaper.pdf

64.1 KB

hacklu2015_qkaiser_hownottobuildanevotingsystem.pdf

2.5 MB

key-logger-video-mouse.pdf

9.0 MB

keys_where_we_re_going_we_dont_need_keys.zip

10.2 MB

logo.svg

129.5 KB

logo2015.png

470.8 KB

MahsaAlimardani-MobileApplicationsinIran.pdf

1.3 MB

malcom-workshop.zip

23.2 MB

metabrik-framework.pdf

314.7 KB

noneedforblackchambers.pdf

1.6 MB

nos-oignons_hacklu.pdf

225.9 KB

Practical_Spear_Phishing.pdf

2.7 MB

radare2-workshop-slides.pdf

598.8 KB

Security_of_Virtual_Desktop_Infrastructures-Maxime_Clementz-Simon_Petitjean.pdf

1.5 MB

stegosploit_hacklu2015.pdf

34.7 MB

They Hate Us Cause They Ain't Us.pdf

1.3 MB

TotallySpies.pdf

3.7 MB

When threat intel met DFIR.pdf

33.4 MB

Why Johnny can’t Unpack-22.10.2015_lu_edition.key

14.2 MB

/Hack.lu 2016/

logo.pdf

106.7 KB

logo.png

958.3 KB

/Presentations/

2016-10-18_RM INFRA security HACKLU.pdf

3.7 MB

161019_hacklu_badgpo_kraft-willi_oneconsult.pdf

2.3 MB

20161020-HackLu-Lightening-Stirparo-iOS_Forensics.pdf

2.6 MB

An easy way into your SAP systems_V3.0.pdf

3.2 MB

Attila_Marosi_where_should_host_v.1.0.pptx.pdf

18.6 MB

centr-conf-fuzzing.pdf

543.5 KB

Dr.Honeypots-Hack.lu-2016-v2.pdf

4.1 MB

Exploit generation and JavaScript analysis automation with WinDBG_lu.pdf

51.6 MB

hacklu2016-jacob-torrey.pdf

877.5 KB

Intercoms_Hacking-hacklu_2016.pdf

6.0 MB

JamesJara-hacklu2016.pdf

3.6 MB

lightning-metabrik-hacklu-2016.pdf

26.4 KB

lightning-sisyphe-hacklu-2016.pdf

42.0 KB

metabrik-hacklu-2016.pdf

224.0 KB

Of_Mice_and_Keyboards-Hack.lu_2016.pdf

7.5 MB

Wavestone - Hack.lu 2016 - Hadoop safari - Hunting for vulnerabilities - v1.0.pdf

2.6 MB

/Videos/

A Network of Sorrows - Small Adversaries and Small Allies by Quinn Norton.mp4

68.6 MB

A Network of Sorrows - Small Adversaries and Small Allies by Quinn Norton.srt

89.4 KB

badGPO - Using GPOs for Persistence and Lateral Movement.mp4

48.2 MB

Bootstrapping an Architectural Research Platform by Jacob I. Torrey.mp4

57.2 MB

Bootstrapping an Architectural Research Platform by Jacob I. Torrey.srt

80.3 KB

Bridging political gaps with code by Okhin.mp4

61.8 MB

BtleJuice - the Bluetooth Smart Man In The Middle Framework by Damiel Cauquil.mp4

72.6 MB

Credential Assessment - Mapping Privilege Escalation at Scale by Matt Weeks.mp4

73.1 MB

Credential Assessment - Mapping Privilege Escalation at Scale by Matt Weeks.srt

96.4 KB

CTF Prize Ceremony by Fluxfingers.mp4

10.6 MB

CTF Prize Ceremony by Fluxfingers.srt

9.3 KB

Cyber Grand Shellphish - Shellphish and the DARPA Cyber Grand Challenge.mp4

103.3 MB

Cyber Grand Shellphish - Shellphish and the DARPA Cyber Grand Challenge.srt

131.7 KB

Enhancing infrastructure cybersecurity in Europe by Rosella Mattioli.mp4

77.6 MB

Exploit generation and JavaScript analysis automation with WinDBG.mp4

59.8 MB

Exploit generation and JavaScript analysis automation with WinDBG.srt

53.0 KB

Exploiting and attacking seismological networks remotely by James Jara.mp4

53.4 MB

Exploiting and attacking seismological networks remotely by James Jara.srt

39.2 KB

Exploiting new default accounts in SAP systems by Joris Van De Vis.mp4

81.2 MB

Exploiting new default accounts in SAP systems by Joris Van De Vis.srt

71.0 KB

Fraud detection and forensics on telco networks.mp4

64.7 MB

Hadoop safari - Hunting for vulnerabilities by Mahdi Braik and Thomas Debize.mp4

92.7 MB

House intercoms attacks - when frontdoors become backdoors by Sébastien Dudek.mp4

61.1 MB

Interesting Malware - No, Im not kidding... by Marion Marschalek.mp4

72.4 MB

Interesting Malware - No, Im not kidding... by Marion Marschalek.srt

95.9 KB

KillTheHashes 30 million Malware DNA profiling exercise by Luciano Martins.mp4

75.9 MB

KillTheHashes 30 million Malware DNA profiling exercise by Luciano Martins.srt

70.4 KB

Lightning Talk - 0Patch - Be Your Own Software Doctor by Mitja Kolsek.mp4

16.3 MB

Lightning Talk - 0Patch - Be Your Own Software Doctor by Mitja Kolsek.srt

19.5 KB

Lightning Talk - Cracking An Egg And Cooking The Chicken by Jacob Torrey.mp4

18.5 MB

Lightning Talk - Cracking An Egg And Cooking The Chicken by Jacob Torrey.srt

24.4 KB

Lightning Talk - EmailMadeIn.lu by Martin Bosslet.mp4

6.9 MB

Lightning Talk - EmailMadeIn.lu by Martin Bosslet.srt

10.4 KB

Lightning Talk - Geeks Without Bounds by Chris Kebecka.mp4

7.9 MB

Lightning Talk - Geeks Without Bounds by Chris Kebecka.srt

7.0 KB

Lightning Talk - Hardware Shredder by Stefan Chorus.mp4

7.2 MB

Lightning Talk - Illusions And Reality Of CERT Business by Sascha Rommelfangen.mp4

19.4 MB

Lightning Talk - Illusions And Reality Of CERT Business by Sascha Rommelfangen.srt

17.4 KB

Lightning Talk - iOS Forensics by Pasquale Stirparo.mp4

12.2 MB

Lightning Talk - iOS Forensics by Pasquale Stirparo.srt

14.3 KB

Lightning Talk - Lama Project by Valentin Giannini.mp4

8.3 MB

Lightning Talk - Lama Project by Valentin Giannini.srt

6.3 KB

Lightning Talk - Metabrik Meets CVE-Search by GomoR.mp4

17.3 MB

Lightning Talk - Metabrik Meets CVE-Search by GomoR.srt

12.9 KB

Lightning Talk - Sisyphe, All IP Data In One Place by GomoR.mp4

10.1 MB

Lightning Talk - Sisyphe, All IP Data In One Place by GomoR.srt

9.8 KB

Lightning Talk - Start-up Pitch - redowl.com by Peter Heim.mp4

18.7 MB

Lightning Talk - Start-up Pitch - redowl.com by Peter Heim.srt

21.0 KB

Lightning Talk - Start-up Pitch - securityscorecard.io by Chris Meidinger.mp4

18.9 MB

Lightning Talk - Start-up Pitch - securityscorecard.io by Chris Meidinger.srt

19.5 KB

Lightning Talk - When Your Firewall Turns Against You by Rene Freingruber.mp4

17.3 MB

Machine Duping - Pwning Deep Learning Systems by Clarence Chio.mp4

63.6 MB

Machine Duping - Pwning Deep Learning Systems by Clarence Chio.srt

81.6 KB

Of Mice and Keyboards - On the Security of Modern Wireless Desktop Sets.mp4

81.8 MB

Of Mice and Keyboards - On the Security of Modern Wireless Desktop Sets.srt

83.7 KB

Secrets in Soft Token - A security study of HID Global Soft Token by Mouad Abouhali.mp4

56.8 MB

Secrets in Soft Token - A security study of HID Global Soft Token by Mouad Abouhali.srt

66.7 KB

Stressed out Denial of service attacks from the providers perspective.mp4

53.9 MB

Stressed out Denial of service attacks from the providers perspective.srt

56.7 KB

The Infosec Crossroads by Saumil Shah.mp4

74.9 MB

The Infosec Crossroads by Saumil Shah.srt

82.2 KB

The Legend of Windows - A Link to the Hash by m4xk and sıx.mp4

34.5 MB

The Metabrik Platform - Rapid Development of Reusable Security Tools by Patrice Auffret.mp4

62.0 MB

The Metabrik Platform - Rapid Development of Reusable Security Tools by Patrice Auffret.srt

62.8 KB

Unveiling the attack chain of Russian-speaking cybercriminals.mp4

71.1 MB

Unveiling the attack chain of Russian-speaking cybercriminals.srt

63.6 KB

When Crypto Fails by Yaniv Balmas and Ben Herzog.mp4

74.3 MB

When Crypto Fails by Yaniv Balmas and Ben Herzog.srt

82.0 KB

Where should I host my malware by Attila Marosi.mp4

48.1 MB

Where should I host my malware by Attila Marosi.srt

41.8 KB

WiFi Exploitation - How passive interception leads to active exploitation.mp4

120.0 MB

WiFi Exploitation - How passive interception leads to active exploitation.srt

128.9 KB

Windows systems & code signing protection by Paul Rascagnères.mp4

63.5 MB

/Hack.lu 2017/

Hack.lu logo.png

702.7 KB

logo.png

7.4 MB

logo.svg

359.7 KB

/Presentations/

barbie_slides.pdf

3.1 MB

crng-presentation.pdf

367.9 KB

Digital-Vengeance-updated.pdf

4.6 MB

Dr.Honeypots-Hack.lu-2017.pdf

4.7 MB

hack.lu-2017 logo.png

702.7 KB

Hacklu-BrokenTIP.pptx

4.2 MB

HackLU_2017_Malicious_use_LAPS_Clementz_Goichot.pdf

1.3 MB

Hacklu_POST_TIDS_framework.pdf

1.5 MB

randori-a-low-interaction-honeypot.pdf

13.8 MB

Sigma-20171018-Hack.lu.pdf

849.1 KB

the-untold-stories-of-hackers-in-detention.pdf

73.4 KB

/Videos/

A view into ALPC-RPC by Clement Rouault and Thomas Imbert.mp4

96.0 MB

API design for cryptography by Frank Denis.mp4

54.0 MB

Applying bug hunters methodologies to your organisation, lessons from the field.mp4

64.6 MB

Are your VoLTE and VoWiFi calls secure by Sreepriya Chalakkal.mp4

65.0 MB

Automation Attacks at Scale by Will Glazier and Mayank Dhiman.mp4

65.5 MB

Bug hunting using symbolic virtual machines by Anto Joseph.mp4

92.8 MB

Digital Vengeance - Exploiting Notorious C&C Toolkits by Waylon Grange.mp4

68.2 MB

Hospitals and infosec (the consequences of bad security in health care) by J. Milosevic.mp4

100.0 MB

How Ive Broken Every Threat Intel Platform Ive Ever Had (And Settled on MISP).mp4

77.0 MB

Information Flows and Leaks in Social Media by Vladimir Kropotov and Fyodor Yarochkin.mp4

99.6 MB

Infosec and failure by Ange Albertini.mp4

95.4 MB

Intel AMT - Using & Abusing the Ghost in the Machine by Parth Shukla.mp4

89.2 MB

Keynterceptor - Press any key to continue by Niels van Dijkhuizen.mp4

63.2 MB

Lets Play with WinDBG & .NET by Paul Rascagneres.mp4

59.7 MB

Lightning Talk - Fancy Remediation Tracking Tool by Daniel Nguyen.mp4

19.7 MB

Lightning Talk - Finding The Bad Guys by Eric Leblond.mp4

14.4 MB

Lightning Talk - Gigatron DIY TTL Computer by Walker Belgers.mp4

16.3 MB

Lightning Talk - Peerlyst 3 Years In by Claus Houmann.mp4

6.6 MB

Lightning Talk - RetDec - An Open-Source Machine-Code Decompiler by Peter Matula.mp4

9.8 MB

Lightning Talk - Secure Physical Data Destruction by Johan Huurman.mp4

12.4 MB

Lightning Talk - Things That Go Dump In The Night by Janusz Urbanowicz.mp4

11.3 MB

Lightning Talk - Twitter Settings by Aaron K.mp4

5.7 MB

Malicious use of Microsoft Local Administrator Password Solution.mp4

64.6 MB

ManaTI - Web Assistance for the Threat Analyst, supported by Domain Similarity.mp4

59.6 MB

Myths And Realities Of Attribution Manipulation by Félix Aimé and Ronan Mouchoux.mp4

66.5 MB

On Strategy by Eleanor Saitta.mp4

80.9 MB

Queer Privacy & Building Consensual Systems by Sarah Jamie Lewis.mp4

103.4 MB

Randori, a low interaction honeypot with a vengeance by Bouke van Laethem.mp4

57.2 MB

Sigma - Generic Signatures for Log Events by Thomas Patzke.mp4

64.1 MB

SMT Solvers in the IT Security - deobfuscating binary code with logic by Thaís Hamasaki.mp4

51.1 MB

Snuffleupagus - Killing bugclasses in PHP 7, virtual-patching the rest.mp4

55.3 MB

The Bicho - An Advanced Car Backdoor Maker by Sheila Ayelen Berta and Claudio Caracciolo.mp4

46.7 MB

The Struggle - dealing with language designers & main'tainers on proper use of CSPRNGs.mp4

60.8 MB

TIDS - A Framework for Detecting Threats in Telecom Networks.mp4

56.9 MB

Vulnerability Disclosure, Governments and You by Jeroen van der Ham - YouTube.mp4

87.6 MB

What is the max Reflected Distributed Denial of Service (rDDoS) potential of IPv4.mp4

93.5 MB

WTFrance Cryptography and legislation in France by Okhin.mp4

59.8 MB

/Presentations/

A_Cervoise-Backdoor_Bash_on_Windows.pdf

0.0 KB

A_Cervoise-Backdoor_Bash_on_Windows.pdf.wc5854l.partial

2.8 MB

ail-training.pdf

0.0 KB

ail-training.pdf.1o3yc5h.partial

2.2 MB

dc26 - Csaba Fitzl - DSE Bypass Workshop - VM Setup.pdf

0.0 KB

dc26 - Csaba Fitzl - DSE Bypass Workshop - VM Setup.pdf.h2hugnk.partial

985.3 KB

Education___communication.pdf

0.0 KB

Education___communication.pdf.zb2s9ms.partial

6.7 MB

Hypervisor-Level Debugger Benefits & Challenges - Hack.lu 2018.pdf

0.0 KB

Hypervisor-Level Debugger Benefits & Challenges - Hack.lu 2018.pdf.dabl5qz.partial

669.1 KB

misp42splunk_app.pdf

0.0 KB

misp42splunk_app.pdf.qzoy7vw.partial

444.4 KB

mwri_hacklu_2018_samdb_z3_final.pdf

0.0 KB

mwri_hacklu_2018_samdb_z3_final.pdf.ga66nmd.partial

1.2 MB

no_profit_automated_barbie_final.pdf

0.0 KB

no_profit_automated_barbie_final.pdf.0yv7xpl.partial

3.7 MB

Sigma_Workshop-201810-Hack.lu.pdf

264.5 KB

Slides_Fuzzing_Workshop_Hack.lu_v1.0.pdf

0.0 KB

Slides_Fuzzing_Workshop_Hack.lu_v1.0.pdf.isecgfw.partial

4.3 MB

Unpacking for dummies CheatSheet.pdf

0.0 KB

Unpacking for dummies CheatSheet.pdf.rldb9k2.partial

131.8 KB

Unpacking for dummies Presentation.pdf

0.0 KB

Unpacking for dummies Presentation.pdf.y1h4nnb.partial

2.5 MB

/Videos/

14 Easy Lessons For Thinking About Complex Adversarial Systems - Eleanor Saitta.mp4

31.1 MB

Abusing Bash For Windows - Antoine Cervoise.eng.srt

45.1 KB

Abusing Bash For Windows - Antoine Cervoise.mp4

17.4 MB

Bettercrypto Is Not Dead - Aaron and David.eng.srt

10.3 KB

Bettercrypto Is Not Dead - Aaron and David.mp4

4.4 MB

Building With Privacy By Design - Naomi Freeman.eng.srt

70.3 KB

Building With Privacy By Design - Naomi Freeman.mp4

26.5 MB

Bypassing ISP And Enterprise Anti-DDoS With 90's Technology - Dennis Rand.eng.srt

51.2 KB

Bypassing ISP And Enterprise Anti-DDoS With 90's Technology - Dennis Rand.mp4

22.1 MB

CTF Prize Ceremony - Fluxfingers.eng.srt

11.2 KB

CTF Prize Ceremony - Fluxfingers.mp4

7.6 MB

Digital Safety For Politically Vulnerable Organizations - Matt - Mateo - Mitchell.eng.srt

155.4 KB

Digital Safety For Politically Vulnerable Organizations - Matt - Mateo - Mitchell.mp4

36.4 MB

Don't Leave Parts Unknown - A Recipe For Ethical Documentation - Noah Berman.eng.srt

13.4 KB

Don't Leave Parts Unknown - A Recipe For Ethical Documentation - Noah Berman.mp4

4.4 MB

Education And Communication - Ange Albertini.eng.srt

109.3 KB

Education And Communication - Ange Albertini.mp4

36.4 MB

Finding The Best TI Provider For A Specific Purpose - A. Hickey and D. Roecher.eng.srt

100.7 KB

Finding The Best TI Provider For A Specific Purpose - A. Hickey and D. Roecher.mp4

36.9 MB

GNUNet - You Broke The Internet Let's Make A GNU One - sva.mp4

5.6 MB

Hack.lu 2018 - 14 Easy Lessons For Thinking About Complex Adversarial Systems - Eleanor Saitta.eng.srt

111.0 KB

Hack.lu 2018 Improving Internet Security Through Cooperation - SIE Europe In 2018 - Paul Vixie.eng.srt

89.2 KB

Hack.lu 2018 Improving Internet Security Through Cooperation - SIE Europe In 2018 - Paul Vixie.mp4

21.9 MB

How To Hack A Yacht - Swimming IoT - Stephan Gerling.eng.srt

111.7 KB

How To Hack A Yacht - Swimming IoT - Stephan Gerling.mp4

45.1 MB

How We Trained The DragonW Classified APKs Via ANNs - Roman Graf and Aaron Kaplan.eng.srt

57.7 KB

How We Trained The DragonW Classified APKs Via ANNs - Roman Graf and Aaron Kaplan.mp4

21.0 MB

Hypervisor-Level Debugger - Benefits And Challenges - Mathieu Tarral.eng.srt

47.9 KB

Hypervisor-Level Debugger - Benefits And Challenges - Mathieu Tarral.mp4

19.5 MB

IPC - The Broken Dream Of Inherent Security - Thanh Bui and Siddharth - Sid - Rao.eng.srt

77.3 KB

IPC - The Broken Dream Of Inherent Security - Thanh Bui and Siddharth - Sid - Rao.mp4

23.6 MB

Junior CTF - Cryptax.eng.srt

9.4 KB

Junior CTF - Cryptax.mp4

4.1 MB

Karta - Fast Bin Diffing - Eyal.eng.srt

15.0 KB

Karta - Fast Bin Diffing - Eyal.mp4

6.8 MB

Let Me Yara That For You - Dan Demeter.eng.srt

73.3 KB

Let Me Yara That For You - Dan Demeter.mp4

33.4 MB

Make ARM Shellcode Great Again - Saumil Udayan Shah.eng.srt

96.7 KB

Make ARM Shellcode Great Again - Saumil Udayan Shah.mp4

35.7 MB

Mind The (Air)Gap - Erez Yalon and Pedro Umbelino.eng.srt

77.5 KB

Mind The (Air)Gap - Erez Yalon and Pedro Umbelino.mp4

32.0 MB

Modern Pentest Tricks For Faster, Wider, Greater Engagements - Thomas Debize.eng.srt

109.7 KB

Modern Pentest Tricks For Faster, Wider, Greater Engagements - Thomas Debize.mp4

34.1 MB

Modify RO Data - Michael Hamm.eng.srt

8.1 KB

Modify RO Data - Michael Hamm.mp4

5.6 MB

Not So Random - Guenaelle De Julis.mp4

13.2 MB

Only An Electron Away From Code Execution - Silvia Väli.eng.srt

76.5 KB

Only An Electron Away From Code Execution - Silvia Väli.mp4

29.8 MB

PKI Demo With Physical Locks - Gunstick.mp4

7.1 MB

Practical And Affordable Side-Channel Attacks - Francois Durvaux.eng.srt

57.2 KB

Practical And Affordable Side-Channel Attacks - Francois Durvaux.mp4

22.1 MB

p≡p - Pretty Easy Privacy For Everyone - Sva.eng.srt

115.8 KB

p≡p - Pretty Easy Privacy For Everyone - Sva.mp4

38.7 MB

Radical Insurance Groups And Ransomware. - E. Leverett and A. Gangwal.eng.srt

139.7 KB

Radical Insurance Groups And Ransomware. - E. Leverett and A. Gangwal.mp4

37.6 MB

Real World - Threat Intelligence - Elle Armageddon.eng.srt

122.2 KB

Real World - Threat Intelligence - Elle Armageddon.mp4

42.6 MB

Risk Assessment Optimisation With MONARC - Fabien Mathey.eng.srt

59.5 KB

Risk Assessment Optimisation With MONARC - Fabien Mathey.mp4

26.5 MB

Serial-Killer - Security Analysis Of Industrial Serial Device Servers - Florian Adamsky.eng.srt

95.5 KB

Serial-Killer - Security Analysis Of Industrial Serial Device Servers - Florian Adamsky.mp4

32.0 MB

Simple Analysis Using pDNS - Irena Damsky ft. A. Dulaunoy, A. Kaplan & P. Vixie.mp4

53.6 MB

Take Your Path Normalization Off And Pop 0days Out - Orange Tsai.mp4

35.2 MB

Terms Of Service Didn't Read - Piks3l.mp4

5.8 MB

The Path Towards Automated Heap Exploitation - Thaís Moreira Hamasaki.eng.srt

73.0 KB

The Path Towards Automated Heap Exploitation - Thaís Moreira Hamasaki.mp4

29.0 MB

The Science Behind Social Engineering And An Effective Security Culture - E. Nicaise.eng.srt

91.8 KB

The Science Behind Social Engineering And An Effective Security Culture - E. Nicaise.mp4

42.0 MB

The Snake Keeps Reinventing Itself - Jean-Ian Boutin and Matthieu Faou.eng.srt

120.4 KB

The Snake Keeps Reinventing Itself - Jean-Ian Boutin and Matthieu Faou.mp4

45.2 MB

Trojans In SS7 - How They Bypass All Security Measures - Sergey Puzankov.eng.srt

55.0 KB

Trojans In SS7 - How They Bypass All Security Measures - Sergey Puzankov.mp4

30.2 MB

Unicorn Stuff From Pastes - Sami.eng.srt

12.8 KB

Unicorn Stuff From Pastes - Sami.mp4

6.2 MB

War - DNS Resolution Path - Paul Vixie.eng.srt

13.2 KB

War - DNS Resolution Path - Paul Vixie.mp4

5.0 MB

What The Fax - Eyal Itkin and Yaniv Balmas.eng.srt

127.9 KB

What The Fax - Eyal Itkin and Yaniv Balmas.mp4

45.2 MB

Worms That Turn - Nematodes And Neotodes - Matt Wixey.eng.srt

104.6 KB

Worms That Turn - Nematodes And Neotodes - Matt Wixey.mp4

31.2 MB

/Hack.lu 2023/

ACME Benefits Of An Internet Security Protocol In Your Network - Christophe Brocas.eng.srt

46.7 KB

ACME Benefits Of An Internet Security Protocol In Your Network - Christophe Brocas.mp4

48.8 MB

Are Leaked Credentials Dumps Used By Attackers - Xavier Mertens.eng.srt

7.8 KB

Are Leaked Credentials Dumps Used By Attackers - Xavier Mertens.mp4

7.3 MB

Avoiding The Basilisk's Fangs State-of-the-art In AI LLM Detection - Jacob Torrey.eng.srt

87.0 KB

Avoiding The Basilisk's Fangs State-of-the-art In AI LLM Detection - Jacob Torrey.mp4

59.6 MB

Belgian Cyber Reserve Forces - Christophe Vandeplas.eng.srt

9.8 KB

Belgian Cyber Reserve Forces - Christophe Vandeplas.mp4

7.8 MB

Building An Evil Phone Charging Station - Stef Van Dop and Tomás Philippart.eng.srt

36.8 KB

Building An Evil Phone Charging Station - Stef Van Dop and Tomás Philippart.mp4

31.8 MB

Case Management by Cruciani.eng.srt

6.5 KB

Case Management by Cruciani.mp4

5.2 MB

Cerebrate - Learning To Run - Andras Iklody.eng.srt

24.6 KB

Cerebrate - Learning To Run - Andras Iklody.mp4

16.5 MB

Cloaking Malicious Web Content Delivery by Jeroen Pinoy.eng.srt

9.3 KB

Cloaking Malicious Web Content Delivery by Jeroen Pinoy.mp4

6.6 MB

Cobalt Striked - Vincent Hinderer.eng.srt

7.0 KB

Cobalt Striked - Vincent Hinderer.mp4

6.6 MB

Cratos Use Your Bloody Indicators - Dennis Rand.en.srt

38.7 KB

Cratos Use Your Bloody Indicators - Dennis Rand.mp4

37.0 MB

CTI Is Dead, Long Live CTI by David.eng.srt

47.6 KB

CTI Is Dead, Long Live CTI by David.mp4

24.6 MB

Defeating VPN Always-On - Maxime Clementz.eng.srt

43.2 KB

Defeating VPN Always-On - Maxime Clementz.mp4

30.7 MB

Deming - ISMS Open Source - Didier Barzin.eng.srt

7.9 KB

Deming - ISMS Open Source - Didier Barzin.mp4

8.0 MB

DER Editing, Easy-Peasy With asn1template - William Robinet.eng.srt

7.9 KB

DER Editing, Easy-Peasy With asn1template - William Robinet.mp4

8.2 MB

Detecting VPNs Proxies By Analyzing Their Attack Patterns Over Time by Emanuel Seemann.eng.srt

30.2 KB

Detecting VPNs Proxies By Analyzing Their Attack Patterns Over Time by Emanuel Seemann.mp4

26.9 MB

Do's And Don'ts In File Formats - Ange Albertini.eng.srt

35.5 KB

Do's And Don'ts In File Formats - Ange Albertini.mp4

31.1 MB

Embedded Threats A Deep Dive Into The ESIM World - Markus Vervier.eng.srt

46.0 KB

Embedded Threats A Deep Dive Into The ESIM World - Markus Vervier.mp4

36.7 MB

Ensuring IoC Quality At CERT-FR by Victor Barrault.eng.srt

33.3 KB

Ensuring IoC Quality At CERT-FR by Victor Barrault.mp4

25.3 MB

Exploring Data Collection, Analysis & Security - P. Ventuzelo & T. Laucournet.eng.srt

42.3 KB

Exploring Data Collection, Analysis & Security - P. Ventuzelo & T. Laucournet.mp4

32.4 MB

FOSStering An ISAC Enabling A Community With Open-Source Tools by JJ Josing.eng.srt

64.5 KB

FOSStering An ISAC Enabling A Community With Open-Source Tools by JJ Josing.mp4

42.9 MB

GeoOpen And MMDB-Server An Open Source Solution For IP Address Geoloc. by A. Dulaunoy.eng.srt

6.2 KB

GeoOpen And MMDB-Server An Open Source Solution For IP Address Geoloc. by A. Dulaunoy.mp4

4.8 MB

He Is Everywhere A Tale Of Lazarus And His Family - JeongGak Lyu and @lazarusholic.eng.srt

39.9 KB

He Is Everywhere A Tale Of Lazarus And His Family - JeongGak Lyu and @lazarusholic.mp4

26.7 MB

How Digital Technologies Are Redefining Warfare And Why It Matters - Mauro Vignati.eng.srt

38.7 KB

How Digital Technologies Are Redefining Warfare And Why It Matters - Mauro Vignati.mp4

34.3 MB

How We Build A Collaborative, Trustable, And Crowdsourced CTI - Matthieu Mazzolini.eng.srt

28.4 KB

How We Build A Collaborative, Trustable, And Crowdsourced CTI - Matthieu Mazzolini.mp4

22.8 MB

Identity In The Era Of Deepfakes, AI And Mass Biometrics Exposure - Vladimir Kropotov.eng.srt

42.7 KB

Identity In The Era Of Deepfakes, AI And Mass Biometrics Exposure - Vladimir Kropotov.mp4

37.0 MB

Introduction To Cyberwarfare Theory And Practice - Lukasz Olejnik.eng.srt

59.7 KB

Introduction To Cyberwarfare Theory And Practice - Lukasz Olejnik.mp4

50.9 MB

JTAN - Data Sharing Network - Paweł Pawliński and Alexandre Dulaunoy.eng.srt

50.4 KB

JTAN - Data Sharing Network - Paweł Pawliński and Alexandre Dulaunoy.mp4

37.5 MB

Kunai Your New Threat Hunting Tool For Linux by Quentin Jerome.eng.srt

36.5 KB

Kunai Your New Threat Hunting Tool For Linux by Quentin Jerome.mp4

38.4 MB

Lessons Learned From Sharing Intel About Potential Fraud - Compomise - Jeroen Pinoy.eng.srt

10.0 KB

Lessons Learned From Sharing Intel About Potential Fraud - Compomise - Jeroen Pinoy.mp4

5.7 MB

Liberate The CSAM Hashsets - Andras Iklody.eng.srt

10.3 KB

Liberate The CSAM Hashsets - Andras Iklody.mp4

7.9 MB

Malware AV Evasion Tricks Cryptography In Malware by Cocomelonc.eng.srt

24.8 KB

Malware AV Evasion Tricks Cryptography In Malware by Cocomelonc.mp4

29.5 MB

MISP Updates by Andras Iklody.eng.srt

42.5 KB

MISP Updates by Andras Iklody.mp4

24.4 MB

MISP ↔️ LLM - Automating Free Form CTI Reports - S. Mokkadem, A. Iklody and A. Kaplan.eng.srt

6.6 KB

MISP ↔️ LLM - Automating Free Form CTI Reports - S. Mokkadem, A. Iklody and A. Kaplan.mp4

7.3 MB

MISP42 Connecting CTI And SOC Teams - Remi Seguy.eng.srt

21.5 KB

MISP42 Connecting CTI And SOC Teams - Remi Seguy.mp4

18.6 MB

Modern IOCs Matching With Suricata - Eric Leblond and Peter Manev.eng.srt

51.3 KB

Modern IOCs Matching With Suricata - Eric Leblond and Peter Manev.mp4

42.8 MB

Non Vulnerable Package Dependency Resolution - Philippe Ombredanne.eng.srt

9.6 KB

Non Vulnerable Package Dependency Resolution - Philippe Ombredanne.mp4

11.3 MB

Ongoing EvilEye Campaigns Targeting CCP Adversaries - Rascagneres Paul.eng.srt

51.8 KB

Ongoing EvilEye Campaigns Targeting CCP Adversaries - Rascagneres Paul.mp4

40.7 MB

Open Wounds The Last 5 Years Have Left Bluetooth To Bleed - Xeno Kovah.eng.srt

70.3 KB

Open Wounds The Last 5 Years Have Left Bluetooth To Bleed - Xeno Kovah.mp4

37.2 MB

Operation Duck Hunt A Peak Behind The Curtain Of DuckTail - Pol Thill.eng.srt

24.6 KB

Operation Duck Hunt A Peak Behind The Curtain Of DuckTail - Pol Thill.mp4

18.7 MB

Permissionless Universal Overlays - Dimitrios Valsamaras (1).eng.srt

60.2 KB

Permissionless Universal Overlays - Dimitrios Valsamaras (1).mp4

40.7 MB

Permissionless Universal Overlays - Dimitrios Valsamaras.eng.srt

60.7 KB

Permissionless Universal Overlays - Dimitrios Valsamaras.mp4

40.7 MB

PHP Filter Chains How To Use It - Rémi Matasse (@ remsio ).eng.srt

47.0 KB

PHP Filter Chains How To Use It - Rémi Matasse (@ remsio ).mp4

32.1 MB

Pyrrha Navigate Easily Into Your System Binaries - Eloïse Brocas.eng.srt

38.3 KB

Pyrrha Navigate Easily Into Your System Binaries - Eloïse Brocas.mp4

25.4 MB

Raiders Of The Lost Arts - Stefan Hager.eng.srt

49.7 KB

Raiders Of The Lost Arts - Stefan Hager.mp4

42.8 MB

SBOMs Are They A Threat Or A Menace by Philippe Ombredanne.eng.srt

45.9 KB

SBOMs Are They A Threat Or A Menace by Philippe Ombredanne.mp4

39.4 MB

Sbud Infovis In Infosec by Ange Albertini.eng.srt

50.5 KB

Sbud Infovis In Infosec by Ange Albertini.mp4

41.1 MB

Sigma Project News - Thomas Patzke.eng.srt

7.9 KB

Sigma Project News - Thomas Patzke.mp4

6.8 MB

SLP DoS Amplification Someone Is Having Fun - Pedro Umbelino.eng.srt

9.1 KB

SLP DoS Amplification Someone Is Having Fun - Pedro Umbelino.mp4

8.2 MB

Supply Chain Resilience Challenges & Solutions - Saâd Kadhi.eng.srt

12.9 KB

Supply Chain Resilience Challenges & Solutions - Saâd Kadhi.mp4

8.7 MB

Suricata Language Server - Eric Leblond.eng.srt

4.7 KB

Suricata Language Server - Eric Leblond.mp4

5.7 MB

The Composition Analysis Of Binary Java, ELF, Go, And JavaScript Apps by P. Ombredanne.eng.srt

8.4 KB

The Composition Analysis Of Binary Java, ELF, Go, And JavaScript Apps by P. Ombredanne.mp4

7.8 MB

The Renaissance Of Cyber Physical Offensive Capabilities - Daniel Kapellmann Zafra.eng.srt

64.5 KB

The Renaissance Of Cyber Physical Offensive Capabilities - Daniel Kapellmann Zafra.mp4

48.3 MB

The Rise Of Malicious MSIX File - Rintaro Koike and Shogo Hayashi.eng.srt

34.2 KB

The Rise Of Malicious MSIX File - Rintaro Koike and Shogo Hayashi.mp4

32.0 MB

TIDeMEC - A Detection Engineering Platform Homegrown At The EC - Amine Besson.eng.srt

8.7 KB

TIDeMEC - A Detection Engineering Platform Homegrown At The EC - Amine Besson.mp4

7.5 MB

Token Smart Contract Analyzer - Thierry Grandjean.eng.srt

6.7 KB

Token Smart Contract Analyzer - Thierry Grandjean.mp4

6.2 MB

Token Smart Contract Analyzer by Thierry Grandjean.eng.srt

7.9 KB

Token Smart Contract Analyzer by Thierry Grandjean.mp4

8.4 MB

Turbocharging IOC Validation Become A More Efficient CTI Analyst - Arwa Alomari.eng.srt

33.2 KB

Turbocharging IOC Validation Become A More Efficient CTI Analyst - Arwa Alomari.mp4

33.9 MB

Unraveling The Cyber Battle Between Ukraine And Russia- Ondrej Nekovar and Jan Pohl.eng.srt

41.2 KB

Unraveling The Cyber Battle Between Ukraine And Russia- Ondrej Nekovar and Jan Pohl.mp4

43.3 MB

Using Apple Sysdiagnose For Mobile Forensics & Integrity Checks - D Durvaux & A Kaplan.eng.srt

48.9 KB

Using Apple Sysdiagnose For Mobile Forensics & Integrity Checks - D Durvaux & A Kaplan.mp4

38.6 MB

Using Bayesian Inference To Detect Cyber Attacks - Emanuel Seemann.eng.srt

35.4 KB

Using Bayesian Inference To Detect Cyber Attacks - Emanuel Seemann.mp4

31.3 MB

Velocity Raptor Accelerating Velociraptor Hunting With Tenzir - Matthias Vallentin.eng.srt

5.9 KB

Velocity Raptor Accelerating Velociraptor Hunting With Tenzir - Matthias Vallentin.mp4

5.8 MB

Why Does The CTI Industry Struggle With Communicating Uncertainties by Ondra Rojcik.eng.srt

35.9 KB

Why Does The CTI Industry Struggle With Communicating Uncertainties by Ondra Rojcik.mp4

27.9 MB

Wintermute An LLM Pen-Testing Buddy - Aaron Kaplan.eng.srt

6.6 KB

Wintermute An LLM Pen-Testing Buddy - Aaron Kaplan.mp4

5.6 MB

Yeti Old Dog, New Tricks - Sébastien Larinier and Thomas Chopitea.eng.srt

48.1 KB

Yeti Old Dog, New Tricks - Sébastien Larinier and Thomas Chopitea.mp4

25.1 MB

You Can Learn Anything - Cookie.eng.srt

6.4 KB

You Can Learn Anything - Cookie.mp4

3.8 MB

 

Total files 659


Copyright © 2025 FileMood.com