/
|
hack.lu logo.png
|
702.7 KB
|
hack.lu thank you.txt
|
1.1 KB
|
/Presentations/
|
2005-spyware-hacklu.pdf
|
1.5 MB
|
AdamJacobs.ppt
|
167.4 KB
|
Bacon-hack.lu.ppt
|
720.9 KB
|
Cyber_warfare_(zubair).ppt
|
602.6 KB
|
Fccu-hacklu-0.4.pdf
|
675.8 KB
|
HACK-2005-Conference_Usage-of-Internet-Content-Rating-Systems.pdf
|
156.6 KB
|
Hack-LU_2005_-_Kristof_Philipsen_-_WAVA_-_Full.pdf
|
1.3 MB
|
Hack-LU_2005_-_Kristof_Philipsen_-_WAVA_-_Scaled.pdf
|
825.9 KB
|
Hack-lu_cisco_ddos.ppt
|
1.5 MB
|
Hack-lu_cisco_ipt_security.ppt
|
325.1 KB
|
Hack_3.pdf
|
584.0 KB
|
Hack_lu_2005_Wolfgarten_-_Apache_Security_v0_3.ppt
|
1.0 MB
|
Hacklu-teuwen-wifi-security.pdf
|
762.5 KB
|
Hacklu2005-PHPSecurityWorkshop.pdf
|
75.0 KB
|
Hacklu_catch_the_key.ppt
|
151.6 KB
|
LuxMQschemes.pdf
|
433.8 KB
|
Rr0d.ppt
|
707.6 KB
|
Scapy_hack_lu_handout.pdf
|
1.6 MB
|
StateofTheArtWirelessHacking_Hack.lu.ppt
|
2.1 MB
|
The_human_factor.pps
|
601.6 KB
|
/Presentations/
|
AdeGre2006_Slides.pdf
|
3.3 MB
|
BehringerHackLuOperationalSecurity.pdf
|
914.7 KB
|
Claise-hack-lu.pdf
|
1.9 MB
|
Cryptochallenge.pdf
|
1.5 MB
|
Gcsec.pdf
|
250.5 KB
|
HACK.LU_HPP_compact.v.1.0_eng.pdf
|
2.0 MB
|
HACK_LU2006-IPTV_Security.pdf
|
1.1 MB
|
HackLU-InSPaceNobodyCanHearYouScream-NF-v1.pdf
|
247.4 KB
|
HackLU06-ButtiVeysset-WiFiAdvancedStealth-slides-3.pdf
|
1.1 MB
|
Hacklu_blancher.pdf
|
3.1 MB
|
Hacklu_metasploit_plugins_2006.ppt
|
725.5 KB
|
Hannes-Hacklu.pdf
|
221.7 KB
|
Lightning_blancher.pdf
|
285.8 KB
|
Nedap-hacklu.pdf
|
7.0 MB
|
Nfsen-hack.lu-06.pdf
|
3.4 MB
|
Renaud_Hack_Lu.pdf
|
1.0 MB
|
SandipHack_lu.zip
|
304.3 KB
|
Sensible_defence.0.2.ppt
|
172.0 KB
|
Venema.ppt
|
117.2 KB
|
Vh_thc-ipv6_attack.pdf
|
424.4 KB
|
VoIPhreaking-HiTB-2006.ppt
|
216.1 KB
|
Wifi-security_hacklu2006.pdf
|
1.0 MB
|
Xebek-HackDotLu06.pdf
|
1.9 MB
|
Zoller_hack_lu_2006.pdf
|
2.9 MB
|
/.../hack-lu-2007/
|
beamerthemeHaegar.sty
|
0.5 KB
|
hack-lu-ama.pdf
|
479.5 KB
|
hack-lu-ama.tex
|
18.8 KB
|
/.../hack-lu-2007/barcamp/
|
voip2p.pdf
|
1.1 MB
|
voip2p.tex
|
4.7 KB
|
/.../hack-lu-2007/barcamp/graphs/
|
et2.png
|
42.2 KB
|
fiw.png
|
66.9 KB
|
Hl2007banner.png
|
37.1 KB
|
index.html
|
2.0 KB
|
index.html@C=D;O=A
|
2.0 KB
|
index.html@C=D;O=D
|
2.0 KB
|
index.html@C=M;O=A
|
2.0 KB
|
index.html@C=M;O=D
|
2.0 KB
|
index.html@C=N;O=A
|
2.0 KB
|
index.html@C=N;O=D
|
2.0 KB
|
index.html@C=S;O=A
|
2.0 KB
|
index.html@C=S;O=D
|
2.0 KB
|
instfail.png
|
105.9 KB
|
login.png
|
31.7 KB
|
skype_screen_shot.png
|
771.7 KB
|
sp1.png
|
42.1 KB
|
/.../hack-lu-2007/graphs/
|
arch.odg
|
14.3 KB
|
arch.pdf
|
151.1 KB
|
csrrt.png
|
11.0 KB
|
decision.odg
|
11.4 KB
|
decision.pdf
|
78.8 KB
|
diskio.odg
|
14.0 KB
|
diskio.pdf
|
150.2 KB
|
frelay.odg
|
15.0 KB
|
frelay.pdf
|
150.7 KB
|
Hl2007banner.png
|
37.1 KB
|
inria.png
|
34.9 KB
|
loria.png
|
23.9 KB
|
memlayout.odg
|
13.0 KB
|
memlayout.pdf
|
150.0 KB
|
nethow.odg
|
14.5 KB
|
nethow.pdf
|
150.3 KB
|
vexec.odg
|
16.4 KB
|
vexec.pdf
|
154.4 KB
|
/Presentations/
|
1020-hacklu-tlr.pdf
|
306.6 KB
|
crack_windows_access_control.zip
|
2.5 MB
|
cracking_windows_access_control.pdf
|
2.7 MB
|
cracking_windows_access_control.ppt
|
688.6 KB
|
dhanjani-hack.lu-2007.pdf
|
5.1 MB
|
hack-lu-2007.zip
|
3.7 MB
|
Hack-lu-nepenthes.odp
|
322.5 KB
|
HACK-presentation_Raphael_Frank.ppt
|
1.5 MB
|
hack.lu_2007.zip
|
3.3 MB
|
hacklu07_Remote_wiretapping.pdf
|
531.0 KB
|
hacklu07_VoIP.zip
|
1.5 MB
|
hacklu07_VoIP_workshop.pdf
|
1.1 MB
|
hacklu2007-quuxlabs-goodiff-hackcamp.pdf
|
546.7 KB
|
hacklu2007_barisani_bianco.pdf
|
14.1 MB
|
HackLu_FrankAckermann_VirtPanacea.pdf
|
401.0 KB
|
Malware Analysis.odp
|
677.5 KB
|
metasm.pdf
|
387.0 KB
|
saumil_escaping_captive_portals.pdf
|
1.2 MB
|
saumil_writing_exploits_msf3_print.pdf
|
283.7 KB
|
shadowservers-hl2007.ppt
|
4.9 MB
|
SQL Agent.pdf
|
3.5 MB
|
video_1.avi
|
11.0 MB
|
video_2.avi
|
17.5 MB
|
voip-1.avi
|
4.8 MB
|
voip-2.avi
|
7.8 MB
|
voip-3.avi
|
16.8 MB
|
voip2p.pdf
|
1.1 MB
|
what-do-they-think-theyre-doing-hacklu.pdf
|
1.6 MB
|
Zombie20.pdf
|
2.6 MB
|
/Presentations/Scificrypto/
|
decode
|
2.6 KB
|
encode
|
4.1 KB
|
force
|
0.2 KB
|
Scificrypto-scripts.tar
|
10.2 KB
|
/barcamp/
|
dulaunoy-honeybot-introduction.pdf
|
757.0 KB
|
various-hack-lu-uml.pdf
|
74.7 KB
|
/Presentations/
|
2008-hack.lu-aumaitre.pdf
|
805.8 KB
|
av2cid.pptx
|
526.8 KB
|
Client-Server collaborative scanning.pptx
|
1.4 MB
|
Craig_Hacking Kiosks.pdf
|
1.3 MB
|
Craig_lightning_The Moth Trojan.pdf
|
308.2 KB
|
gutesman-gfuzz.pdf
|
1.3 MB
|
Halvar_hacklu.next.attempt.odp
|
1.0 MB
|
Immersed Telco CN attack Philippe Langlois 2008 new v6.pdf
|
1.6 MB
|
lenoir_presentation.pdf
|
1.9 MB
|
Malware of the Future.pdf
|
2.2 MB
|
naxx_slides.pdf
|
2.5 MB
|
nufw-hacklu2008.pdf
|
2.3 MB
|
Pastor_cracking into embedded devices - Hack.lu2K8.pdf
|
925.8 KB
|
picviz-hacklu2008.pdf
|
1.0 MB
|
rootkits-navigateurs.pdf
|
1.8 MB
|
Rustock.C - When a myth comes true.pdf
|
2.2 MB
|
smartcard-security_hacklu2008.pdf
|
92.8 KB
|
teflon_saumil_hacklu08.pdf
|
1.9 MB
|
Temmingh_HackLu2008.ppt
|
8.2 MB
|
/Presentations/
|
2009-10-28-Peeking-into-Pandoras-Bochs_RedTeam-Pentesting.pdf
|
2.2 MB
|
2009-Hack.lu-slides-WM6-rootkit.pdf
|
1.8 MB
|
davix.pdf
|
11.7 MB
|
exploiting_delphi.pptx
|
389.8 KB
|
filiol_keynote_hacklu09.pdf
|
1.4 MB
|
fuzzgrind.tar.bz2
|
1.1 MB
|
hack.lu_09-IpMorph.pdf
|
5.4 MB
|
HackLU_Firefox_Malware.pdf
|
3.5 MB
|
kaires.pdf
|
932.8 KB
|
moxie-marlinspike-some_tricks_for_defeating_ssl_in_practice.pdf
|
2.4 MB
|
New advances in Ms Office malware analysis.pdf
|
1.6 MB
|
PandorasBochs.pdf
|
5.1 MB
|
Penetration Document Format Slides.pdf
|
923.2 KB
|
perseus_slides_hacklu09.pdf
|
3.0 MB
|
Playing with SAT 1.2 - Hacklu.pdf
|
2.9 MB
|
stonesoft-ids-evasion-hacklu2009.pptx
|
6.2 MB
|
tmplab-HostileWRT-5-hacklu.pdf
|
227.9 KB
|
virus.pdf
|
641.2 KB
|
windows7-rot13-or-vigenere.pdf
|
521.6 KB
|
/video/
|
Hack.lu_Dinner.m4v
|
28.8 MB
|
Hack.lu_Impressiounen.m4v
|
28.3 MB
|
Hack.lu_Speakers.m4v
|
71.4 MB
|
/Presentations/
|
Aggarwal-Blackberry-Malicious-Applications-slides.pdf
|
3.3 MB
|
Bouillon-Stealing-credentials-for-impersonation.pdf
|
4.8 MB
|
Costin-HackingPrintersForFunAndProfit-slides.pdf
|
2.1 MB
|
Desnos_Dynamic_Metamorphic_Virtual_Machines-slides.pdf
|
1.1 MB
|
Filiol-Office-Documents-New-Weapons-of-Cyberwarfare-paper.pdf
|
485.0 KB
|
Filiol-Office-Documents-New-Weapons-of-Cyberwarfare-slides.pdf
|
581.2 KB
|
hacklu2010-planning.pdf
|
30.2 KB
|
Keetch-Escaping-from-Protected-Mode-Internet-Explorer-slides.ppt
|
854.0 KB
|
Mihailowitsch-Detecting-Hardware-Keyloggers-slides.pdf
|
1.2 MB
|
Nickerson-Real-World-Social-Engineering-CEO-Events-slides.pptx
|
7.4 MB
|
Saumil-Exploit-Delivery-slides.pdf
|
21.5 MB
|
Vinot-BGP-Ranking-slides.pdf
|
458.1 KB
|
Wagener-AHA-Adaptive-Honeypot-Alternative-slides.pdf
|
223.2 KB
|
Weinmann-All-Your-Baseband-Are-Belong-To-Us-slides.pdf
|
1.3 MB
|
/Presentations/
|
Binary Instrumentation for Hackers - hack.lu - Gal Diskin (final).pptx
|
3.2 MB
|
DBI_Workshop_Exmaples-final.zip
|
35.4 KB
|
fgont-hacklu2011-ip-security.pdf
|
274.6 KB
|
Hack.Lu CyberSecurity on Naval Information System v1.0.pdf
|
34.1 MB
|
hacklu2011-calendar_2011-09-19_2011-09-22-2.pdf
|
9.7 KB
|
Sniffjoke-HackLu-2011.pdf
|
1.1 MB
|
/Presentations/
|
basic-shodan.py
|
2.5 KB
|
Belgers-SocialEngineering.pdf
|
13.3 MB
|
draft.pdf
|
1.2 MB
|
Dropbox security.pdf
|
538.1 KB
|
Dropbox security.pptx
|
230.3 KB
|
Fuzzing_The_GSM_Protocol_Stack_-_Sebastien_Dudek_Guillaume_Delugre.pdf
|
806.7 KB
|
Hack.lu 2012 - Insecurity of security equipments - Eric Chassard & Maxime Clementz.pdf
|
4.3 MB
|
hack.lu-2012_Android-malware-forensics_Allix-Jerome.pdf
|
1.0 MB
|
Hack.lu-Philippe-Langlois-remote-HLR-crash.pptx.pdf
|
2.7 MB
|
Hacklu-2012-one-firmware-Andres-Blanco-Matias-Eissler.pdf
|
4.1 MB
|
HackLU-SDLTools.pptx
|
2.5 MB
|
hacklu_idascope_plohmann.pdf
|
1.1 MB
|
hynesimHackLu2012Workshop.pdf
|
1.7 MB
|
KillBot - Conspiracy Theories - hack.lu.pdf
|
671.0 KB
|
KillBot - Conspiracy Theories - hack.lu.pptx
|
1.9 MB
|
malware.lu-overview.pdf
|
1.5 MB
|
Mathieu RENARD - Hack.lu - Hacking iOS Applications v1.0 Slides.pdf
|
31.6 MB
|
menace-came-from-below.pdf
|
614.3 KB
|
minos.pdf
|
890.2 KB
|
SHODAN.pptx
|
301.3 KB
|
SinFP3-hacklu-v1.0.pdf
|
413.0 KB
|
VSF-hacklu2012.pdf
|
1.3 MB
|
vyncke - layer-2 security ipv6 hack lu.pptx.pdf
|
8.0 MB
|
when_malwares_target_smartcard_eID.pdf
|
136.6 KB
|
/Presentations/
|
20131023-Hack.lu Lightning Talk ACH project.pdf
|
60.6 KB
|
AbusingDalvikBeyondRecognition.pdf
|
931.3 KB
|
Adrian-Furtuna_Exploiting-Rounding-Vulnerabilities_Hack.lu2013.pdf
|
1.7 MB
|
Automated_vulnerability_scanning_and_exploitation.pdf
|
1.4 MB
|
BIOS_Chronomancy-Hack.lu_2013_v1.pptx
|
6.9 MB
|
dbongard_hacklu_2013.pdf
|
2.4 MB
|
Defensive strategies.pptx
|
1.2 MB
|
EMV-CAP_hacklu2013.pdf
|
5.8 MB
|
flux_ctf_award_ceremony.pdf
|
372.4 KB
|
Francisco_-_Wiretapping_an_entire_Cisco_VOIP_environment.pdf
|
1.4 MB
|
Hack.lu.2013-ExploitKitsKrawlerFramework.pdf
|
2.8 MB
|
Hack.lu2013-Pcap2bubblesProject-LT.pdf
|
1.9 MB
|
hack_lu_2013_David_Szili_Mihaly_Zagon_-_Time_to_evolve_Applying_red_and_blue_team_CTF_tactics_in_IT_Security.pdf
|
14.0 MB
|
Hack_lu_2013_Yarochkin_Kropotov_Pearls_of_Cybercrime_v20_to_publish_cutted.pdf
|
6.0 MB
|
HackLu2k13_GTA_Phishing_with_permission.pdf
|
6.2 MB
|
hacklu2013_hbootdbg.pdf
|
1.2 MB
|
hidex-hacklu.pdf
|
1.8 MB
|
Interactive deobfuscation.ppt
|
2.0 MB
|
ipcams-research-falcon-riva.pdf
|
5.1 MB
|
MalwareFairytale.pdf
|
5.1 MB
|
spin.pdf
|
657.3 KB
|
tcp_idle_scans_ipv6.pdf
|
8.4 MB
|
/Presentations/
|
Atlasis Rey Schaefer Evasion of HighEnd IPS Devices.pdf
|
2.1 MB
|
Atlasis-Rey-Schaefer-briefings-Evasion-of-HighEnd-IPS-Devices-wp.pdf
|
1.1 MB
|
Botnets Behavioral Patterns in the Network - Garcia Sebastian.pdf
|
1.1 MB
|
Bypasss sandboxes for fun.pdf
|
2.3 MB
|
cars.pdf
|
1.9 MB
|
CyberAttacksInUkraine.pdf
|
1.4 MB
|
DetectingBleedingEdgeMalware.pdf
|
4.6 MB
|
Falcon-Breaking Out of VirtualBox through 3D Acceleration.pdf
|
1.8 MB
|
hacking with pictures.pdf
|
7.6 MB
|
hacklu-joker-presentation.pdf
|
681.8 KB
|
I-hunt-TR-069-admins-shahar-tal-hacklu.pdf
|
3.6 MB
|
inside spying v1.4.pdf
|
2.0 MB
|
internet scanning mschloesser.pdf
|
916.9 KB
|
irma-slides.pdf
|
3.8 MB
|
merely keeping up hacklu.pdf
|
7.4 MB
|
Microsoft Vulnerability Research - How to be a Finder as a Vendor.pdf
|
872.3 KB
|
MobileInSecurity.pdf
|
16.0 MB
|
offline bruteforce attack on wps.pdf
|
2.9 MB
|
sherlock-slides.pdf
|
24.6 MB
|
slides fuzzing.pdf
|
2.0 MB
|
TSNOFORN.pdf
|
5.8 MB
|
viper.pdf
|
1.1 MB
|
WiHawk.pptx
|
5.2 MB
|
/Presentations/
|
2015-10-20-SEKOIA-Keynote Internet of Tchotchke-v1.0.pdf
|
41.0 MB
|
2015-10-21-Keynote-Hack-lu-Marie-Moe.pdf
|
4.4 MB
|
Albertini - Trusting files.pdf
|
7.9 MB
|
AutomaticExploitGeneration.pdf
|
2.3 MB
|
crema-hacklu.pdf
|
939.5 KB
|
Crowdsourced_Malware_Triage_-_Workshop.pdf
|
9.1 MB
|
Dr.Honeypots_Worskhop_Hack.lu2015_Rist_Arcas .pdf
|
2.0 MB
|
Draw-me-a-LocalKernelDebuger.pdf
|
568.1 KB
|
fitbit-hacklu-slides.pdf
|
8.0 MB
|
forging_the_usb_armory.pdf
|
9.7 MB
|
FredericJacobs-Annotated.pdf
|
4.2 MB
|
FredericJacobs.pdf
|
4.1 MB
|
hacklu15_enovella_reversing_routers.pdf
|
10.1 MB
|
Hacklu2015-SecurityDesignAndHigh-RiskUsers-4.3.pdf
|
1.3 MB
|
hacklu2015_ecbkids.pdf
|
2.9 MB
|
hacklu2015_ecbpaper.pdf
|
64.1 KB
|
hacklu2015_qkaiser_hownottobuildanevotingsystem.pdf
|
2.5 MB
|
key-logger-video-mouse.pdf
|
9.0 MB
|
keys_where_we_re_going_we_dont_need_keys.zip
|
10.2 MB
|
logo.svg
|
129.5 KB
|
logo2015.png
|
470.8 KB
|
MahsaAlimardani-MobileApplicationsinIran.pdf
|
1.3 MB
|
malcom-workshop.zip
|
23.2 MB
|
metabrik-framework.pdf
|
314.7 KB
|
noneedforblackchambers.pdf
|
1.6 MB
|
nos-oignons_hacklu.pdf
|
225.9 KB
|
Practical_Spear_Phishing.pdf
|
2.7 MB
|
radare2-workshop-slides.pdf
|
598.8 KB
|
Security_of_Virtual_Desktop_Infrastructures-Maxime_Clementz-Simon_Petitjean.pdf
|
1.5 MB
|
stegosploit_hacklu2015.pdf
|
34.7 MB
|
They Hate Us Cause They Ain't Us.pdf
|
1.3 MB
|
TotallySpies.pdf
|
3.7 MB
|
When threat intel met DFIR.pdf
|
33.4 MB
|
Why Johnny can’t Unpack-22.10.2015_lu_edition.key
|
14.2 MB
|
/Hack.lu 2016/
|
logo.pdf
|
106.7 KB
|
logo.png
|
958.3 KB
|
/Presentations/
|
2016-10-18_RM INFRA security HACKLU.pdf
|
3.7 MB
|
161019_hacklu_badgpo_kraft-willi_oneconsult.pdf
|
2.3 MB
|
20161020-HackLu-Lightening-Stirparo-iOS_Forensics.pdf
|
2.6 MB
|
An easy way into your SAP systems_V3.0.pdf
|
3.2 MB
|
Attila_Marosi_where_should_host_v.1.0.pptx.pdf
|
18.6 MB
|
centr-conf-fuzzing.pdf
|
543.5 KB
|
Dr.Honeypots-Hack.lu-2016-v2.pdf
|
4.1 MB
|
Exploit generation and JavaScript analysis automation with WinDBG_lu.pdf
|
51.6 MB
|
hacklu2016-jacob-torrey.pdf
|
877.5 KB
|
Intercoms_Hacking-hacklu_2016.pdf
|
6.0 MB
|
JamesJara-hacklu2016.pdf
|
3.6 MB
|
lightning-metabrik-hacklu-2016.pdf
|
26.4 KB
|
lightning-sisyphe-hacklu-2016.pdf
|
42.0 KB
|
metabrik-hacklu-2016.pdf
|
224.0 KB
|
Of_Mice_and_Keyboards-Hack.lu_2016.pdf
|
7.5 MB
|
Wavestone - Hack.lu 2016 - Hadoop safari - Hunting for vulnerabilities - v1.0.pdf
|
2.6 MB
|
/Videos/
|
A Network of Sorrows - Small Adversaries and Small Allies by Quinn Norton.mp4
|
68.6 MB
|
A Network of Sorrows - Small Adversaries and Small Allies by Quinn Norton.srt
|
89.4 KB
|
badGPO - Using GPOs for Persistence and Lateral Movement.mp4
|
48.2 MB
|
Bootstrapping an Architectural Research Platform by Jacob I. Torrey.mp4
|
57.2 MB
|
Bootstrapping an Architectural Research Platform by Jacob I. Torrey.srt
|
80.3 KB
|
Bridging political gaps with code by Okhin.mp4
|
61.8 MB
|
BtleJuice - the Bluetooth Smart Man In The Middle Framework by Damiel Cauquil.mp4
|
72.6 MB
|
Credential Assessment - Mapping Privilege Escalation at Scale by Matt Weeks.mp4
|
73.1 MB
|
Credential Assessment - Mapping Privilege Escalation at Scale by Matt Weeks.srt
|
96.4 KB
|
CTF Prize Ceremony by Fluxfingers.mp4
|
10.6 MB
|
CTF Prize Ceremony by Fluxfingers.srt
|
9.3 KB
|
Cyber Grand Shellphish - Shellphish and the DARPA Cyber Grand Challenge.mp4
|
103.3 MB
|
Cyber Grand Shellphish - Shellphish and the DARPA Cyber Grand Challenge.srt
|
131.7 KB
|
Enhancing infrastructure cybersecurity in Europe by Rosella Mattioli.mp4
|
77.6 MB
|
Exploit generation and JavaScript analysis automation with WinDBG.mp4
|
59.8 MB
|
Exploit generation and JavaScript analysis automation with WinDBG.srt
|
53.0 KB
|
Exploiting and attacking seismological networks remotely by James Jara.mp4
|
53.4 MB
|
Exploiting and attacking seismological networks remotely by James Jara.srt
|
39.2 KB
|
Exploiting new default accounts in SAP systems by Joris Van De Vis.mp4
|
81.2 MB
|
Exploiting new default accounts in SAP systems by Joris Van De Vis.srt
|
71.0 KB
|
Fraud detection and forensics on telco networks.mp4
|
64.7 MB
|
Hadoop safari - Hunting for vulnerabilities by Mahdi Braik and Thomas Debize.mp4
|
92.7 MB
|
House intercoms attacks - when frontdoors become backdoors by Sébastien Dudek.mp4
|
61.1 MB
|
Interesting Malware - No, Im not kidding... by Marion Marschalek.mp4
|
72.4 MB
|
Interesting Malware - No, Im not kidding... by Marion Marschalek.srt
|
95.9 KB
|
KillTheHashes 30 million Malware DNA profiling exercise by Luciano Martins.mp4
|
75.9 MB
|
KillTheHashes 30 million Malware DNA profiling exercise by Luciano Martins.srt
|
70.4 KB
|
Lightning Talk - 0Patch - Be Your Own Software Doctor by Mitja Kolsek.mp4
|
16.3 MB
|
Lightning Talk - 0Patch - Be Your Own Software Doctor by Mitja Kolsek.srt
|
19.5 KB
|
Lightning Talk - Cracking An Egg And Cooking The Chicken by Jacob Torrey.mp4
|
18.5 MB
|
Lightning Talk - Cracking An Egg And Cooking The Chicken by Jacob Torrey.srt
|
24.4 KB
|
Lightning Talk - EmailMadeIn.lu by Martin Bosslet.mp4
|
6.9 MB
|
Lightning Talk - EmailMadeIn.lu by Martin Bosslet.srt
|
10.4 KB
|
Lightning Talk - Geeks Without Bounds by Chris Kebecka.mp4
|
7.9 MB
|
Lightning Talk - Geeks Without Bounds by Chris Kebecka.srt
|
7.0 KB
|
Lightning Talk - Hardware Shredder by Stefan Chorus.mp4
|
7.2 MB
|
Lightning Talk - Illusions And Reality Of CERT Business by Sascha Rommelfangen.mp4
|
19.4 MB
|
Lightning Talk - Illusions And Reality Of CERT Business by Sascha Rommelfangen.srt
|
17.4 KB
|
Lightning Talk - iOS Forensics by Pasquale Stirparo.mp4
|
12.2 MB
|
Lightning Talk - iOS Forensics by Pasquale Stirparo.srt
|
14.3 KB
|
Lightning Talk - Lama Project by Valentin Giannini.mp4
|
8.3 MB
|
Lightning Talk - Lama Project by Valentin Giannini.srt
|
6.3 KB
|
Lightning Talk - Metabrik Meets CVE-Search by GomoR.mp4
|
17.3 MB
|
Lightning Talk - Metabrik Meets CVE-Search by GomoR.srt
|
12.9 KB
|
Lightning Talk - Sisyphe, All IP Data In One Place by GomoR.mp4
|
10.1 MB
|
Lightning Talk - Sisyphe, All IP Data In One Place by GomoR.srt
|
9.8 KB
|
Lightning Talk - Start-up Pitch - redowl.com by Peter Heim.mp4
|
18.7 MB
|
Lightning Talk - Start-up Pitch - redowl.com by Peter Heim.srt
|
21.0 KB
|
Lightning Talk - Start-up Pitch - securityscorecard.io by Chris Meidinger.mp4
|
18.9 MB
|
Lightning Talk - Start-up Pitch - securityscorecard.io by Chris Meidinger.srt
|
19.5 KB
|
Lightning Talk - When Your Firewall Turns Against You by Rene Freingruber.mp4
|
17.3 MB
|
Machine Duping - Pwning Deep Learning Systems by Clarence Chio.mp4
|
63.6 MB
|
Machine Duping - Pwning Deep Learning Systems by Clarence Chio.srt
|
81.6 KB
|
Of Mice and Keyboards - On the Security of Modern Wireless Desktop Sets.mp4
|
81.8 MB
|
Of Mice and Keyboards - On the Security of Modern Wireless Desktop Sets.srt
|
83.7 KB
|
Secrets in Soft Token - A security study of HID Global Soft Token by Mouad Abouhali.mp4
|
56.8 MB
|
Secrets in Soft Token - A security study of HID Global Soft Token by Mouad Abouhali.srt
|
66.7 KB
|
Stressed out Denial of service attacks from the providers perspective.mp4
|
53.9 MB
|
Stressed out Denial of service attacks from the providers perspective.srt
|
56.7 KB
|
The Infosec Crossroads by Saumil Shah.mp4
|
74.9 MB
|
The Infosec Crossroads by Saumil Shah.srt
|
82.2 KB
|
The Legend of Windows - A Link to the Hash by m4xk and sıx.mp4
|
34.5 MB
|
The Metabrik Platform - Rapid Development of Reusable Security Tools by Patrice Auffret.mp4
|
62.0 MB
|
The Metabrik Platform - Rapid Development of Reusable Security Tools by Patrice Auffret.srt
|
62.8 KB
|
Unveiling the attack chain of Russian-speaking cybercriminals.mp4
|
71.1 MB
|
Unveiling the attack chain of Russian-speaking cybercriminals.srt
|
63.6 KB
|
When Crypto Fails by Yaniv Balmas and Ben Herzog.mp4
|
74.3 MB
|
When Crypto Fails by Yaniv Balmas and Ben Herzog.srt
|
82.0 KB
|
Where should I host my malware by Attila Marosi.mp4
|
48.1 MB
|
Where should I host my malware by Attila Marosi.srt
|
41.8 KB
|
WiFi Exploitation - How passive interception leads to active exploitation.mp4
|
120.0 MB
|
WiFi Exploitation - How passive interception leads to active exploitation.srt
|
128.9 KB
|
Windows systems & code signing protection by Paul Rascagnères.mp4
|
63.5 MB
|
/Hack.lu 2017/
|
Hack.lu logo.png
|
702.7 KB
|
logo.png
|
7.4 MB
|
logo.svg
|
359.7 KB
|
/Presentations/
|
barbie_slides.pdf
|
3.1 MB
|
crng-presentation.pdf
|
367.9 KB
|
Digital-Vengeance-updated.pdf
|
4.6 MB
|
Dr.Honeypots-Hack.lu-2017.pdf
|
4.7 MB
|
hack.lu-2017 logo.png
|
702.7 KB
|
Hacklu-BrokenTIP.pptx
|
4.2 MB
|
HackLU_2017_Malicious_use_LAPS_Clementz_Goichot.pdf
|
1.3 MB
|
Hacklu_POST_TIDS_framework.pdf
|
1.5 MB
|
randori-a-low-interaction-honeypot.pdf
|
13.8 MB
|
Sigma-20171018-Hack.lu.pdf
|
849.1 KB
|
the-untold-stories-of-hackers-in-detention.pdf
|
73.4 KB
|
/Videos/
|
A view into ALPC-RPC by Clement Rouault and Thomas Imbert.mp4
|
96.0 MB
|
API design for cryptography by Frank Denis.mp4
|
54.0 MB
|
Applying bug hunters methodologies to your organisation, lessons from the field.mp4
|
64.6 MB
|
Are your VoLTE and VoWiFi calls secure by Sreepriya Chalakkal.mp4
|
65.0 MB
|
Automation Attacks at Scale by Will Glazier and Mayank Dhiman.mp4
|
65.5 MB
|
Bug hunting using symbolic virtual machines by Anto Joseph.mp4
|
92.8 MB
|
Digital Vengeance - Exploiting Notorious C&C Toolkits by Waylon Grange.mp4
|
68.2 MB
|
Hospitals and infosec (the consequences of bad security in health care) by J. Milosevic.mp4
|
100.0 MB
|
How Ive Broken Every Threat Intel Platform Ive Ever Had (And Settled on MISP).mp4
|
77.0 MB
|
Information Flows and Leaks in Social Media by Vladimir Kropotov and Fyodor Yarochkin.mp4
|
99.6 MB
|
Infosec and failure by Ange Albertini.mp4
|
95.4 MB
|
Intel AMT - Using & Abusing the Ghost in the Machine by Parth Shukla.mp4
|
89.2 MB
|
Keynterceptor - Press any key to continue by Niels van Dijkhuizen.mp4
|
63.2 MB
|
Lets Play with WinDBG & .NET by Paul Rascagneres.mp4
|
59.7 MB
|
Lightning Talk - Fancy Remediation Tracking Tool by Daniel Nguyen.mp4
|
19.7 MB
|
Lightning Talk - Finding The Bad Guys by Eric Leblond.mp4
|
14.4 MB
|
Lightning Talk - Gigatron DIY TTL Computer by Walker Belgers.mp4
|
16.3 MB
|
Lightning Talk - Peerlyst 3 Years In by Claus Houmann.mp4
|
6.6 MB
|
Lightning Talk - RetDec - An Open-Source Machine-Code Decompiler by Peter Matula.mp4
|
9.8 MB
|
Lightning Talk - Secure Physical Data Destruction by Johan Huurman.mp4
|
12.4 MB
|
Lightning Talk - Things That Go Dump In The Night by Janusz Urbanowicz.mp4
|
11.3 MB
|
Lightning Talk - Twitter Settings by Aaron K.mp4
|
5.7 MB
|
Malicious use of Microsoft Local Administrator Password Solution.mp4
|
64.6 MB
|
ManaTI - Web Assistance for the Threat Analyst, supported by Domain Similarity.mp4
|
59.6 MB
|
Myths And Realities Of Attribution Manipulation by Félix Aimé and Ronan Mouchoux.mp4
|
66.5 MB
|
On Strategy by Eleanor Saitta.mp4
|
80.9 MB
|
Queer Privacy & Building Consensual Systems by Sarah Jamie Lewis.mp4
|
103.4 MB
|
Randori, a low interaction honeypot with a vengeance by Bouke van Laethem.mp4
|
57.2 MB
|
Sigma - Generic Signatures for Log Events by Thomas Patzke.mp4
|
64.1 MB
|
SMT Solvers in the IT Security - deobfuscating binary code with logic by Thaís Hamasaki.mp4
|
51.1 MB
|
Snuffleupagus - Killing bugclasses in PHP 7, virtual-patching the rest.mp4
|
55.3 MB
|
The Bicho - An Advanced Car Backdoor Maker by Sheila Ayelen Berta and Claudio Caracciolo.mp4
|
46.7 MB
|
The Struggle - dealing with language designers & main'tainers on proper use of CSPRNGs.mp4
|
60.8 MB
|
TIDS - A Framework for Detecting Threats in Telecom Networks.mp4
|
56.9 MB
|
Vulnerability Disclosure, Governments and You by Jeroen van der Ham - YouTube.mp4
|
87.6 MB
|
What is the max Reflected Distributed Denial of Service (rDDoS) potential of IPv4.mp4
|
93.5 MB
|
WTFrance Cryptography and legislation in France by Okhin.mp4
|
59.8 MB
|
/Presentations/
|
A_Cervoise-Backdoor_Bash_on_Windows.pdf
|
0.0 KB
|
A_Cervoise-Backdoor_Bash_on_Windows.pdf.wc5854l.partial
|
2.8 MB
|
ail-training.pdf
|
0.0 KB
|
ail-training.pdf.1o3yc5h.partial
|
2.2 MB
|
dc26 - Csaba Fitzl - DSE Bypass Workshop - VM Setup.pdf
|
0.0 KB
|
dc26 - Csaba Fitzl - DSE Bypass Workshop - VM Setup.pdf.h2hugnk.partial
|
985.3 KB
|
Education___communication.pdf
|
0.0 KB
|
Education___communication.pdf.zb2s9ms.partial
|
6.7 MB
|
Hypervisor-Level Debugger Benefits & Challenges - Hack.lu 2018.pdf
|
0.0 KB
|
Hypervisor-Level Debugger Benefits & Challenges - Hack.lu 2018.pdf.dabl5qz.partial
|
669.1 KB
|
misp42splunk_app.pdf
|
0.0 KB
|
misp42splunk_app.pdf.qzoy7vw.partial
|
444.4 KB
|
mwri_hacklu_2018_samdb_z3_final.pdf
|
0.0 KB
|
mwri_hacklu_2018_samdb_z3_final.pdf.ga66nmd.partial
|
1.2 MB
|
no_profit_automated_barbie_final.pdf
|
0.0 KB
|
no_profit_automated_barbie_final.pdf.0yv7xpl.partial
|
3.7 MB
|
Sigma_Workshop-201810-Hack.lu.pdf
|
264.5 KB
|
Slides_Fuzzing_Workshop_Hack.lu_v1.0.pdf
|
0.0 KB
|
Slides_Fuzzing_Workshop_Hack.lu_v1.0.pdf.isecgfw.partial
|
4.3 MB
|
Unpacking for dummies CheatSheet.pdf
|
0.0 KB
|
Unpacking for dummies CheatSheet.pdf.rldb9k2.partial
|
131.8 KB
|
Unpacking for dummies Presentation.pdf
|
0.0 KB
|
Unpacking for dummies Presentation.pdf.y1h4nnb.partial
|
2.5 MB
|
/Videos/
|
14 Easy Lessons For Thinking About Complex Adversarial Systems - Eleanor Saitta.mp4
|
31.1 MB
|
Abusing Bash For Windows - Antoine Cervoise.eng.srt
|
45.1 KB
|
Abusing Bash For Windows - Antoine Cervoise.mp4
|
17.4 MB
|
Bettercrypto Is Not Dead - Aaron and David.eng.srt
|
10.3 KB
|
Bettercrypto Is Not Dead - Aaron and David.mp4
|
4.4 MB
|
Building With Privacy By Design - Naomi Freeman.eng.srt
|
70.3 KB
|
Building With Privacy By Design - Naomi Freeman.mp4
|
26.5 MB
|
Bypassing ISP And Enterprise Anti-DDoS With 90's Technology - Dennis Rand.eng.srt
|
51.2 KB
|
Bypassing ISP And Enterprise Anti-DDoS With 90's Technology - Dennis Rand.mp4
|
22.1 MB
|
CTF Prize Ceremony - Fluxfingers.eng.srt
|
11.2 KB
|
CTF Prize Ceremony - Fluxfingers.mp4
|
7.6 MB
|
Digital Safety For Politically Vulnerable Organizations - Matt - Mateo - Mitchell.eng.srt
|
155.4 KB
|
Digital Safety For Politically Vulnerable Organizations - Matt - Mateo - Mitchell.mp4
|
36.4 MB
|
Don't Leave Parts Unknown - A Recipe For Ethical Documentation - Noah Berman.eng.srt
|
13.4 KB
|
Don't Leave Parts Unknown - A Recipe For Ethical Documentation - Noah Berman.mp4
|
4.4 MB
|
Education And Communication - Ange Albertini.eng.srt
|
109.3 KB
|
Education And Communication - Ange Albertini.mp4
|
36.4 MB
|
Finding The Best TI Provider For A Specific Purpose - A. Hickey and D. Roecher.eng.srt
|
100.7 KB
|
Finding The Best TI Provider For A Specific Purpose - A. Hickey and D. Roecher.mp4
|
36.9 MB
|
GNUNet - You Broke The Internet Let's Make A GNU One - sva.mp4
|
5.6 MB
|
Hack.lu 2018 - 14 Easy Lessons For Thinking About Complex Adversarial Systems - Eleanor Saitta.eng.srt
|
111.0 KB
|
Hack.lu 2018 Improving Internet Security Through Cooperation - SIE Europe In 2018 - Paul Vixie.eng.srt
|
89.2 KB
|
Hack.lu 2018 Improving Internet Security Through Cooperation - SIE Europe In 2018 - Paul Vixie.mp4
|
21.9 MB
|
How To Hack A Yacht - Swimming IoT - Stephan Gerling.eng.srt
|
111.7 KB
|
How To Hack A Yacht - Swimming IoT - Stephan Gerling.mp4
|
45.1 MB
|
How We Trained The DragonW Classified APKs Via ANNs - Roman Graf and Aaron Kaplan.eng.srt
|
57.7 KB
|
How We Trained The DragonW Classified APKs Via ANNs - Roman Graf and Aaron Kaplan.mp4
|
21.0 MB
|
Hypervisor-Level Debugger - Benefits And Challenges - Mathieu Tarral.eng.srt
|
47.9 KB
|
Hypervisor-Level Debugger - Benefits And Challenges - Mathieu Tarral.mp4
|
19.5 MB
|
IPC - The Broken Dream Of Inherent Security - Thanh Bui and Siddharth - Sid - Rao.eng.srt
|
77.3 KB
|
IPC - The Broken Dream Of Inherent Security - Thanh Bui and Siddharth - Sid - Rao.mp4
|
23.6 MB
|
Junior CTF - Cryptax.eng.srt
|
9.4 KB
|
Junior CTF - Cryptax.mp4
|
4.1 MB
|
Karta - Fast Bin Diffing - Eyal.eng.srt
|
15.0 KB
|
Karta - Fast Bin Diffing - Eyal.mp4
|
6.8 MB
|
Let Me Yara That For You - Dan Demeter.eng.srt
|
73.3 KB
|
Let Me Yara That For You - Dan Demeter.mp4
|
33.4 MB
|
Make ARM Shellcode Great Again - Saumil Udayan Shah.eng.srt
|
96.7 KB
|
Make ARM Shellcode Great Again - Saumil Udayan Shah.mp4
|
35.7 MB
|
Mind The (Air)Gap - Erez Yalon and Pedro Umbelino.eng.srt
|
77.5 KB
|
Mind The (Air)Gap - Erez Yalon and Pedro Umbelino.mp4
|
32.0 MB
|
Modern Pentest Tricks For Faster, Wider, Greater Engagements - Thomas Debize.eng.srt
|
109.7 KB
|
Modern Pentest Tricks For Faster, Wider, Greater Engagements - Thomas Debize.mp4
|
34.1 MB
|
Modify RO Data - Michael Hamm.eng.srt
|
8.1 KB
|
Modify RO Data - Michael Hamm.mp4
|
5.6 MB
|
Not So Random - Guenaelle De Julis.mp4
|
13.2 MB
|
Only An Electron Away From Code Execution - Silvia Väli.eng.srt
|
76.5 KB
|
Only An Electron Away From Code Execution - Silvia Väli.mp4
|
29.8 MB
|
PKI Demo With Physical Locks - Gunstick.mp4
|
7.1 MB
|
Practical And Affordable Side-Channel Attacks - Francois Durvaux.eng.srt
|
57.2 KB
|
Practical And Affordable Side-Channel Attacks - Francois Durvaux.mp4
|
22.1 MB
|
p≡p - Pretty Easy Privacy For Everyone - Sva.eng.srt
|
115.8 KB
|
p≡p - Pretty Easy Privacy For Everyone - Sva.mp4
|
38.7 MB
|
Radical Insurance Groups And Ransomware. - E. Leverett and A. Gangwal.eng.srt
|
139.7 KB
|
Radical Insurance Groups And Ransomware. - E. Leverett and A. Gangwal.mp4
|
37.6 MB
|
Real World - Threat Intelligence - Elle Armageddon.eng.srt
|
122.2 KB
|
Real World - Threat Intelligence - Elle Armageddon.mp4
|
42.6 MB
|
Risk Assessment Optimisation With MONARC - Fabien Mathey.eng.srt
|
59.5 KB
|
Risk Assessment Optimisation With MONARC - Fabien Mathey.mp4
|
26.5 MB
|
Serial-Killer - Security Analysis Of Industrial Serial Device Servers - Florian Adamsky.eng.srt
|
95.5 KB
|
Serial-Killer - Security Analysis Of Industrial Serial Device Servers - Florian Adamsky.mp4
|
32.0 MB
|
Simple Analysis Using pDNS - Irena Damsky ft. A. Dulaunoy, A. Kaplan & P. Vixie.mp4
|
53.6 MB
|
Take Your Path Normalization Off And Pop 0days Out - Orange Tsai.mp4
|
35.2 MB
|
Terms Of Service Didn't Read - Piks3l.mp4
|
5.8 MB
|
The Path Towards Automated Heap Exploitation - Thaís Moreira Hamasaki.eng.srt
|
73.0 KB
|
The Path Towards Automated Heap Exploitation - Thaís Moreira Hamasaki.mp4
|
29.0 MB
|
The Science Behind Social Engineering And An Effective Security Culture - E. Nicaise.eng.srt
|
91.8 KB
|
The Science Behind Social Engineering And An Effective Security Culture - E. Nicaise.mp4
|
42.0 MB
|
The Snake Keeps Reinventing Itself - Jean-Ian Boutin and Matthieu Faou.eng.srt
|
120.4 KB
|
The Snake Keeps Reinventing Itself - Jean-Ian Boutin and Matthieu Faou.mp4
|
45.2 MB
|
Trojans In SS7 - How They Bypass All Security Measures - Sergey Puzankov.eng.srt
|
55.0 KB
|
Trojans In SS7 - How They Bypass All Security Measures - Sergey Puzankov.mp4
|
30.2 MB
|
Unicorn Stuff From Pastes - Sami.eng.srt
|
12.8 KB
|
Unicorn Stuff From Pastes - Sami.mp4
|
6.2 MB
|
War - DNS Resolution Path - Paul Vixie.eng.srt
|
13.2 KB
|
War - DNS Resolution Path - Paul Vixie.mp4
|
5.0 MB
|
What The Fax - Eyal Itkin and Yaniv Balmas.eng.srt
|
127.9 KB
|
What The Fax - Eyal Itkin and Yaniv Balmas.mp4
|
45.2 MB
|
Worms That Turn - Nematodes And Neotodes - Matt Wixey.eng.srt
|
104.6 KB
|
Worms That Turn - Nematodes And Neotodes - Matt Wixey.mp4
|
31.2 MB
|
/Hack.lu 2023/
|
ACME Benefits Of An Internet Security Protocol In Your Network - Christophe Brocas.eng.srt
|
46.7 KB
|
ACME Benefits Of An Internet Security Protocol In Your Network - Christophe Brocas.mp4
|
48.8 MB
|
Are Leaked Credentials Dumps Used By Attackers - Xavier Mertens.eng.srt
|
7.8 KB
|
Are Leaked Credentials Dumps Used By Attackers - Xavier Mertens.mp4
|
7.3 MB
|
Avoiding The Basilisk's Fangs State-of-the-art In AI LLM Detection - Jacob Torrey.eng.srt
|
87.0 KB
|
Avoiding The Basilisk's Fangs State-of-the-art In AI LLM Detection - Jacob Torrey.mp4
|
59.6 MB
|
Belgian Cyber Reserve Forces - Christophe Vandeplas.eng.srt
|
9.8 KB
|
Belgian Cyber Reserve Forces - Christophe Vandeplas.mp4
|
7.8 MB
|
Building An Evil Phone Charging Station - Stef Van Dop and Tomás Philippart.eng.srt
|
36.8 KB
|
Building An Evil Phone Charging Station - Stef Van Dop and Tomás Philippart.mp4
|
31.8 MB
|
Case Management by Cruciani.eng.srt
|
6.5 KB
|
Case Management by Cruciani.mp4
|
5.2 MB
|
Cerebrate - Learning To Run - Andras Iklody.eng.srt
|
24.6 KB
|
Cerebrate - Learning To Run - Andras Iklody.mp4
|
16.5 MB
|
Cloaking Malicious Web Content Delivery by Jeroen Pinoy.eng.srt
|
9.3 KB
|
Cloaking Malicious Web Content Delivery by Jeroen Pinoy.mp4
|
6.6 MB
|
Cobalt Striked - Vincent Hinderer.eng.srt
|
7.0 KB
|
Cobalt Striked - Vincent Hinderer.mp4
|
6.6 MB
|
Cratos Use Your Bloody Indicators - Dennis Rand.en.srt
|
38.7 KB
|
Cratos Use Your Bloody Indicators - Dennis Rand.mp4
|
37.0 MB
|
CTI Is Dead, Long Live CTI by David.eng.srt
|
47.6 KB
|
CTI Is Dead, Long Live CTI by David.mp4
|
24.6 MB
|
Defeating VPN Always-On - Maxime Clementz.eng.srt
|
43.2 KB
|
Defeating VPN Always-On - Maxime Clementz.mp4
|
30.7 MB
|
Deming - ISMS Open Source - Didier Barzin.eng.srt
|
7.9 KB
|
Deming - ISMS Open Source - Didier Barzin.mp4
|
8.0 MB
|
DER Editing, Easy-Peasy With asn1template - William Robinet.eng.srt
|
7.9 KB
|
DER Editing, Easy-Peasy With asn1template - William Robinet.mp4
|
8.2 MB
|
Detecting VPNs Proxies By Analyzing Their Attack Patterns Over Time by Emanuel Seemann.eng.srt
|
30.2 KB
|
Detecting VPNs Proxies By Analyzing Their Attack Patterns Over Time by Emanuel Seemann.mp4
|
26.9 MB
|
Do's And Don'ts In File Formats - Ange Albertini.eng.srt
|
35.5 KB
|
Do's And Don'ts In File Formats - Ange Albertini.mp4
|
31.1 MB
|
Embedded Threats A Deep Dive Into The ESIM World - Markus Vervier.eng.srt
|
46.0 KB
|
Embedded Threats A Deep Dive Into The ESIM World - Markus Vervier.mp4
|
36.7 MB
|
Ensuring IoC Quality At CERT-FR by Victor Barrault.eng.srt
|
33.3 KB
|
Ensuring IoC Quality At CERT-FR by Victor Barrault.mp4
|
25.3 MB
|
Exploring Data Collection, Analysis & Security - P. Ventuzelo & T. Laucournet.eng.srt
|
42.3 KB
|
Exploring Data Collection, Analysis & Security - P. Ventuzelo & T. Laucournet.mp4
|
32.4 MB
|
FOSStering An ISAC Enabling A Community With Open-Source Tools by JJ Josing.eng.srt
|
64.5 KB
|
FOSStering An ISAC Enabling A Community With Open-Source Tools by JJ Josing.mp4
|
42.9 MB
|
GeoOpen And MMDB-Server An Open Source Solution For IP Address Geoloc. by A. Dulaunoy.eng.srt
|
6.2 KB
|
GeoOpen And MMDB-Server An Open Source Solution For IP Address Geoloc. by A. Dulaunoy.mp4
|
4.8 MB
|
He Is Everywhere A Tale Of Lazarus And His Family - JeongGak Lyu and @lazarusholic.eng.srt
|
39.9 KB
|
He Is Everywhere A Tale Of Lazarus And His Family - JeongGak Lyu and @lazarusholic.mp4
|
26.7 MB
|
How Digital Technologies Are Redefining Warfare And Why It Matters - Mauro Vignati.eng.srt
|
38.7 KB
|
How Digital Technologies Are Redefining Warfare And Why It Matters - Mauro Vignati.mp4
|
34.3 MB
|
How We Build A Collaborative, Trustable, And Crowdsourced CTI - Matthieu Mazzolini.eng.srt
|
28.4 KB
|
How We Build A Collaborative, Trustable, And Crowdsourced CTI - Matthieu Mazzolini.mp4
|
22.8 MB
|
Identity In The Era Of Deepfakes, AI And Mass Biometrics Exposure - Vladimir Kropotov.eng.srt
|
42.7 KB
|
Identity In The Era Of Deepfakes, AI And Mass Biometrics Exposure - Vladimir Kropotov.mp4
|
37.0 MB
|
Introduction To Cyberwarfare Theory And Practice - Lukasz Olejnik.eng.srt
|
59.7 KB
|
Introduction To Cyberwarfare Theory And Practice - Lukasz Olejnik.mp4
|
50.9 MB
|
JTAN - Data Sharing Network - Paweł Pawliński and Alexandre Dulaunoy.eng.srt
|
50.4 KB
|
JTAN - Data Sharing Network - Paweł Pawliński and Alexandre Dulaunoy.mp4
|
37.5 MB
|
Kunai Your New Threat Hunting Tool For Linux by Quentin Jerome.eng.srt
|
36.5 KB
|
Kunai Your New Threat Hunting Tool For Linux by Quentin Jerome.mp4
|
38.4 MB
|
Lessons Learned From Sharing Intel About Potential Fraud - Compomise - Jeroen Pinoy.eng.srt
|
10.0 KB
|
Lessons Learned From Sharing Intel About Potential Fraud - Compomise - Jeroen Pinoy.mp4
|
5.7 MB
|
Liberate The CSAM Hashsets - Andras Iklody.eng.srt
|
10.3 KB
|
Liberate The CSAM Hashsets - Andras Iklody.mp4
|
7.9 MB
|
Malware AV Evasion Tricks Cryptography In Malware by Cocomelonc.eng.srt
|
24.8 KB
|
Malware AV Evasion Tricks Cryptography In Malware by Cocomelonc.mp4
|
29.5 MB
|
MISP Updates by Andras Iklody.eng.srt
|
42.5 KB
|
MISP Updates by Andras Iklody.mp4
|
24.4 MB
|
MISP ↔️ LLM - Automating Free Form CTI Reports - S. Mokkadem, A. Iklody and A. Kaplan.eng.srt
|
6.6 KB
|
MISP ↔️ LLM - Automating Free Form CTI Reports - S. Mokkadem, A. Iklody and A. Kaplan.mp4
|
7.3 MB
|
MISP42 Connecting CTI And SOC Teams - Remi Seguy.eng.srt
|
21.5 KB
|
MISP42 Connecting CTI And SOC Teams - Remi Seguy.mp4
|
18.6 MB
|
Modern IOCs Matching With Suricata - Eric Leblond and Peter Manev.eng.srt
|
51.3 KB
|
Modern IOCs Matching With Suricata - Eric Leblond and Peter Manev.mp4
|
42.8 MB
|
Non Vulnerable Package Dependency Resolution - Philippe Ombredanne.eng.srt
|
9.6 KB
|
Non Vulnerable Package Dependency Resolution - Philippe Ombredanne.mp4
|
11.3 MB
|
Ongoing EvilEye Campaigns Targeting CCP Adversaries - Rascagneres Paul.eng.srt
|
51.8 KB
|
Ongoing EvilEye Campaigns Targeting CCP Adversaries - Rascagneres Paul.mp4
|
40.7 MB
|
Open Wounds The Last 5 Years Have Left Bluetooth To Bleed - Xeno Kovah.eng.srt
|
70.3 KB
|
Open Wounds The Last 5 Years Have Left Bluetooth To Bleed - Xeno Kovah.mp4
|
37.2 MB
|
Operation Duck Hunt A Peak Behind The Curtain Of DuckTail - Pol Thill.eng.srt
|
24.6 KB
|
Operation Duck Hunt A Peak Behind The Curtain Of DuckTail - Pol Thill.mp4
|
18.7 MB
|
Permissionless Universal Overlays - Dimitrios Valsamaras (1).eng.srt
|
60.2 KB
|
Permissionless Universal Overlays - Dimitrios Valsamaras (1).mp4
|
40.7 MB
|
Permissionless Universal Overlays - Dimitrios Valsamaras.eng.srt
|
60.7 KB
|
Permissionless Universal Overlays - Dimitrios Valsamaras.mp4
|
40.7 MB
|
PHP Filter Chains How To Use It - Rémi Matasse (@ remsio ).eng.srt
|
47.0 KB
|
PHP Filter Chains How To Use It - Rémi Matasse (@ remsio ).mp4
|
32.1 MB
|
Pyrrha Navigate Easily Into Your System Binaries - Eloïse Brocas.eng.srt
|
38.3 KB
|
Pyrrha Navigate Easily Into Your System Binaries - Eloïse Brocas.mp4
|
25.4 MB
|
Raiders Of The Lost Arts - Stefan Hager.eng.srt
|
49.7 KB
|
Raiders Of The Lost Arts - Stefan Hager.mp4
|
42.8 MB
|
SBOMs Are They A Threat Or A Menace by Philippe Ombredanne.eng.srt
|
45.9 KB
|
SBOMs Are They A Threat Or A Menace by Philippe Ombredanne.mp4
|
39.4 MB
|
Sbud Infovis In Infosec by Ange Albertini.eng.srt
|
50.5 KB
|
Sbud Infovis In Infosec by Ange Albertini.mp4
|
41.1 MB
|
Sigma Project News - Thomas Patzke.eng.srt
|
7.9 KB
|
Sigma Project News - Thomas Patzke.mp4
|
6.8 MB
|
SLP DoS Amplification Someone Is Having Fun - Pedro Umbelino.eng.srt
|
9.1 KB
|
SLP DoS Amplification Someone Is Having Fun - Pedro Umbelino.mp4
|
8.2 MB
|
Supply Chain Resilience Challenges & Solutions - Saâd Kadhi.eng.srt
|
12.9 KB
|
Supply Chain Resilience Challenges & Solutions - Saâd Kadhi.mp4
|
8.7 MB
|
Suricata Language Server - Eric Leblond.eng.srt
|
4.7 KB
|
Suricata Language Server - Eric Leblond.mp4
|
5.7 MB
|
The Composition Analysis Of Binary Java, ELF, Go, And JavaScript Apps by P. Ombredanne.eng.srt
|
8.4 KB
|
The Composition Analysis Of Binary Java, ELF, Go, And JavaScript Apps by P. Ombredanne.mp4
|
7.8 MB
|
The Renaissance Of Cyber Physical Offensive Capabilities - Daniel Kapellmann Zafra.eng.srt
|
64.5 KB
|
The Renaissance Of Cyber Physical Offensive Capabilities - Daniel Kapellmann Zafra.mp4
|
48.3 MB
|
The Rise Of Malicious MSIX File - Rintaro Koike and Shogo Hayashi.eng.srt
|
34.2 KB
|
The Rise Of Malicious MSIX File - Rintaro Koike and Shogo Hayashi.mp4
|
32.0 MB
|
TIDeMEC - A Detection Engineering Platform Homegrown At The EC - Amine Besson.eng.srt
|
8.7 KB
|
TIDeMEC - A Detection Engineering Platform Homegrown At The EC - Amine Besson.mp4
|
7.5 MB
|
Token Smart Contract Analyzer - Thierry Grandjean.eng.srt
|
6.7 KB
|
Token Smart Contract Analyzer - Thierry Grandjean.mp4
|
6.2 MB
|
Token Smart Contract Analyzer by Thierry Grandjean.eng.srt
|
7.9 KB
|
Token Smart Contract Analyzer by Thierry Grandjean.mp4
|
8.4 MB
|
Turbocharging IOC Validation Become A More Efficient CTI Analyst - Arwa Alomari.eng.srt
|
33.2 KB
|
Turbocharging IOC Validation Become A More Efficient CTI Analyst - Arwa Alomari.mp4
|
33.9 MB
|
Unraveling The Cyber Battle Between Ukraine And Russia- Ondrej Nekovar and Jan Pohl.eng.srt
|
41.2 KB
|
Unraveling The Cyber Battle Between Ukraine And Russia- Ondrej Nekovar and Jan Pohl.mp4
|
43.3 MB
|
Using Apple Sysdiagnose For Mobile Forensics & Integrity Checks - D Durvaux & A Kaplan.eng.srt
|
48.9 KB
|
Using Apple Sysdiagnose For Mobile Forensics & Integrity Checks - D Durvaux & A Kaplan.mp4
|
38.6 MB
|
Using Bayesian Inference To Detect Cyber Attacks - Emanuel Seemann.eng.srt
|
35.4 KB
|
Using Bayesian Inference To Detect Cyber Attacks - Emanuel Seemann.mp4
|
31.3 MB
|
Velocity Raptor Accelerating Velociraptor Hunting With Tenzir - Matthias Vallentin.eng.srt
|
5.9 KB
|
Velocity Raptor Accelerating Velociraptor Hunting With Tenzir - Matthias Vallentin.mp4
|
5.8 MB
|
Why Does The CTI Industry Struggle With Communicating Uncertainties by Ondra Rojcik.eng.srt
|
35.9 KB
|
Why Does The CTI Industry Struggle With Communicating Uncertainties by Ondra Rojcik.mp4
|
27.9 MB
|
Wintermute An LLM Pen-Testing Buddy - Aaron Kaplan.eng.srt
|
6.6 KB
|
Wintermute An LLM Pen-Testing Buddy - Aaron Kaplan.mp4
|
5.6 MB
|
Yeti Old Dog, New Tricks - Sébastien Larinier and Thomas Chopitea.eng.srt
|
48.1 KB
|
Yeti Old Dog, New Tricks - Sébastien Larinier and Thomas Chopitea.mp4
|
25.1 MB
|
You Can Learn Anything - Cookie.eng.srt
|
6.4 KB
|
You Can Learn Anything - Cookie.mp4
|
3.8 MB
|
Total files 659
|