|
/
|
|
Hacktivity logo.png
|
118.2 KB
|
|
|
|
Hacktivity thank you.txt
|
1.0 KB
|
|
Hacktivity 7 2010/
|
|
Alexander Kornbrust - Security Comparison of the Leading Databases HUN.mp4
|
27.8 MB
|
|
Andras Kabai - Buffer Overflow step II. ASLR and DEP eveasion techniques.mp4
|
43.3 MB
|
|
Andras Tevesz - Rootkits vs. Anti-Virus Developers.mp4
|
31.8 MB
|
|
Andras Veres-Szentkiralyi - We Have Linux Servers So Are We Secured.mp4
|
16.5 MB
|
|
Best of Hacktivity 2010.mp4
|
4.2 MB
|
|
BettyLove - Hacktivity Wargame.mp4
|
7.8 MB
|
|
Biro Laszlo - Digitalis amnezia.mp4
|
22.5 MB
|
|
Britney - Hacktivity Wargame.mp4
|
7.7 MB
|
|
Bruce Schneier - keynote speech.mp4
|
34.7 MB
|
|
Buherator - Metasploit workshop.mp4
|
36.2 MB
|
|
Csaba Krasznay - Web 2.0.mp4
|
27.4 MB
|
|
Domonkos Tomcsanyi - Hacking in Suit - Smartphone, the Swiss Army Knife of Hacker.mp4
|
28.9 MB
|
|
Dr. Anita - Az SE jogi kovetkezmenyei.mp4
|
21.6 MB
|
|
Dr. Anita Eros - Legal Issues with Social Engineering.mp4
|
21.0 MB
|
|
Dr. Dudas Agnes - I agree....mp4
|
12.2 MB
|
|
Dr. Istvan Szabo - The History of the Hungarian Cryptography.mp4
|
19.4 MB
|
|
Dr. Lajos Muha - Chapters from the History of IT Security.mp4
|
20.8 MB
|
|
Dr. Muha Lajos - Fejezetek az informatikai biztonsag tortenetebol.mp4
|
22.3 MB
|
|
Dr. Ormos Zoltan - Nagy port felvert nemzetkozi jogesetek az internetes biztonsag teruleten.mp4
|
20.2 MB
|
|
Dr. Szabo Istvan - A nyilvanos magyar kriptografia tortenete napjainkig (sikerek es kudarcok).mp4
|
21.0 MB
|
|
Dr. Zoltan Ormos - Most Famous Information Security-related Lawsuits from the Past.mp4
|
18.3 MB
|
|
Farmosi Istvan - Az elso virus, az elso konyv es egy elfeledett megoldas.mp4
|
22.0 MB
|
|
Felix FX Lindner - Router exploitation HUN.mp4
|
37.4 MB
|
|
Felix FX Lindner - Router exploitation.mp4
|
39.8 MB
|
|
Foti Marcell - Nincs uj a nap alatt.mp4
|
28.0 MB
|
|
Gabor Jeney - Using Commercial WiFi Hostspots Free of Charge.mp4
|
27.6 MB
|
|
Gara-Tarn u00f3czi P u00e9ter - Adatment u00e9s rendhagy u00f3 m u00f3don - Hasznosak-e a hacker k u00e9pess u00e9gek egy IT Secember munk.mp4
|
30.6 MB
|
|
Hacktivty 2010 - Alexander Kornbrust - Security Comparison of the Leading Databases.mp4
|
27.2 MB
|
|
Holtzl Peter - Log analizis.mp4
|
34.5 MB
|
|
Illesi Zsolt - Tut a szenakazalban.mp4
|
40.4 MB
|
|
Istvan Farmosi - The First Virus, the First Book and the Lost Solution.mp4
|
20.6 MB
|
|
Jeney Gabor - A fizetos WiFi hotspotok ingyenes hasznalatarol.mp4
|
28.4 MB
|
|
Kabai Andras - Buffer Overflow II. ASLR es DEP megkerulesi technikak.mp4
|
42.4 MB
|
|
Kovacs Zsombor - A visszanyalo fagyi, a sotet park es a fekete ballonkabat, avagy a publikus WiFi alulne.mp4
|
31.4 MB
|
|
Krasznay Csaba - Web 2.0.mp4
|
32.3 MB
|
|
Laszlo Biro - Digital Amnesia.mp4
|
20.5 MB
|
|
Laszlo Toth - Post Exploitation Techniques in Oracle Databases.mp4
|
26.3 MB
|
|
Major Marcell - Hogyan irjunk sajat jelszotorot.mp4
|
30.7 MB
|
|
Marcell Foti - There is nothing new under the sun.mp4
|
27.4 MB
|
|
Marcell Major - Writing Your Own Password Cracker Tool.mp4
|
26.9 MB
|
|
Neumann Robert - Exepacker.mp4
|
34.5 MB
|
|
Panczel Zoltan, Spala Ferenc - Buffer Overflow Workshop.mp4
|
68.5 MB
|
|
Peter Holtzl - Log analysis.mp4
|
29.7 MB
|
|
Robert Lipovsky - Evolution of Rootkits.mp4
|
26.8 MB
|
|
Robert Neumann - Exepacker.mp4
|
34.5 MB
|
|
Szemes Balazs - ACTA, HADOPI, Digital Economy Act - fizetni fogunk mint a katonatiszt.mp4
|
9.3 MB
|
|
Tevesz Andras - Rootkitek es AV gyartok.mp4
|
31.8 MB
|
|
Tomcsanyi Domonkos - Oltonyos hackeles - okostelefon, mint hacker-svajcibicska.mp4
|
28.5 MB
|
|
Toth Laszlo - Oracle adatbazis post exploitation technikak.mp4
|
25.3 MB
|
|
Veres-Szentkiralyi Andras - Linux szerverunk van ezert biztonsagos.mp4
|
17.8 MB
|
|
Zoltan Panczel, Ferenc Spala - Buffer Overflow Workshop.mp4
|
66.5 MB
|
|
Zsolt Illesi - Finding the Needle in the Haystick.mp4
|
36.4 MB
|
|
Zsombor Kovacs - Hijacking Public Hostspots.mp4
|
30.4 MB
|
|
Hacktivity 8 2011/
|
|
Akos Subecz, Csaba Zantho - Lockpicking - the finest art of opening locks.mp4
|
55.5 MB
|
|
Alexander Kornbrust - Oracle Forensics.mp4
|
37.5 MB
|
|
Andras Kabai - Malware Analysis Tips and Tricks.mp4
|
57.3 MB
|
|
Andras Veres-Szentkiralyi - Hacking hardware for fun and profit.mp4
|
44.5 MB
|
|
Balazs Beregnyei - From silicium layout to circuit diagram.mp4
|
33.4 MB
|
|
Balazs Zoltan - - IPv6 shipworm - My little windows domain pwnie.mp4
|
44.4 MB
|
|
Barta Csaba - Az NTDS.DIT forensics vizsgalata.mp4
|
47.1 MB
|
|
Beregnyei Balazs - Szilicium layouttol a kapcsolasi rajzig.mp4
|
37.5 MB
|
|
Best of Hacktivity 2011.mp4
|
7.1 MB
|
|
BettyLove - Hacktivity Wargame.mp4
|
8.1 MB
|
|
Biro Laszlo Stuxnet, tenyleg ez volt az elso.mp4
|
37.8 MB
|
|
Bodor Peter - Social Engineering es pszichologia.mp4
|
70.2 MB
|
|
Britney - Hacktivity Wargame.mp4
|
8.1 MB
|
|
Csaba Barta - Forensic analysis of NTDS.DIT.mp4
|
47.0 MB
|
|
Csaba Otti, Arnold Oszi - Finderprint identification systems, security or security leak.mp4
|
68.5 MB
|
|
Dr. Ferenc Leitold, Botond Horvath - Internet in the Sandbox.mp4
|
41.3 MB
|
|
Dr. Leitold Ferenc, Horvath Botond - Dobozba zart internet.mp4
|
43.2 MB
|
|
Dr. Muszka Dniel - Kalmr korszak Szegeden.mp4
|
52.1 MB
|
|
Dr. Peszleg Tibor - Mit tegynk, ha bekvetkezett a baj.mp4
|
58.1 MB
|
|
Dr. Peszleg Tibor - What to do when the problem is on board.mp4
|
56.3 MB
|
|
Ertunga Arsal - Rootkits and Trojans on Your SAP Landscape.mp4
|
40.3 MB
|
|
Eszter Oroszi - Social Engineering, when the veil lifted.mp4
|
61.0 MB
|
|
Felix Schuster - Design and implementation of an additional layer of encryption for Skype.mp4
|
63.9 MB
|
|
Gara-Tarnczi Peater - Publikus exploitok testreszabasa.mp4
|
55.4 MB
|
|
Gyongyosi Peter, Illes Marton Tuzfalak es tamadasok.mp4
|
58.5 MB
|
|
Gyozo Kovacs - My Assorted Wandering in IT.mp4
|
60.4 MB
|
|
Illes Zsolt - Informatikai bizonyitek, bizonyitas igazsagugyi szakertoi szemmel.mp4
|
56.6 MB
|
|
Joe McCray - There is An App for That - Pentesting Mobile Applications.mp4
|
36.7 MB
|
|
Kabai Andras - Malware Analizis, tippek es trukkok.mp4
|
56.3 MB
|
|
Kerenyi Kristof, Hornak Zoltan, Kispal Istvan - Crypto-chipek biztonsaga, passziv-aktiv kombinalt ta.mp4
|
57.4 MB
|
|
Kovacs Gyozo - Valogatott kalandozasaim Informatikaban.mp4
|
63.2 MB
|
|
Kristof Kerenyi, Zoltan Hornak, Istvan Kispal - Crypto-chipset Security, Passive-Active Combined Attacks.mp4
|
54.7 MB
|
|
Laszlo Biro - Stuxnet, Really the first one.mp4
|
1.7 MB
|
|
Laszlo Toth - Almost invisible cloak in Oracle databases or the undocumented helps us again.mp4
|
42.7 MB
|
|
Lederer Sandor Foldes Adam Bodoky Tamas Csorgo Laszlo - Wikileaks - info-szabadsagharc vagy info-terr.mp4
|
63.8 MB
|
|
Major Marcell, Zagon Mihaly - A legajabb webes tamadasi lehetosegek.mp4
|
59.6 MB
|
|
Marcell Major, Mihaly Zagon - Modern Browser Attack Vectors.mp4
|
59.0 MB
|
|
Michele Orru - Dr. Strangelove avagy Hogyan tanultam meg nem aggodni es szeretni a BeEF-ek.mp4
|
40.9 MB
|
|
Michele Orru - Dr. Strangelove or How I learned to Stop Worrying and Love the BeEF.mp4
|
54.2 MB
|
|
Oroszi Eszter - Social Engineering, amikor fellebben a fagyol.mp4
|
62.5 MB
|
|
Otti Csaba, Oszi Arnold - Ujjlenyomat azonosito rendszerek, biztonsag vagy biztonsagi res.mp4
|
71.3 MB
|
|
Peter Bodor - Social Engineering and psychology.mp4
|
66.4 MB
|
|
Peter Gyongyosi, Marton Illes - Firewalls and Exploits.mp4
|
58.2 MB
|
|
Peter Szor - Fighting Computer Malware.mp4
|
66.8 MB
|
|
Raul Chiesa - Cybercrime, Information, Warfare and Cyberwar - what s this all about.mp4
|
69.2 MB
|
|
Raul Chiesa - Kiberbunozes, informacios hadviseles es kiberhaboru - mi ez az egesz.mp4
|
67.4 MB
|
|
Sandor Lederer Adam Foldes Tamas Bodoky Laszlo Csorgo - Wikileaks - info-freedom fight or info-terror.mp4
|
60.7 MB
|
|
Subecz Akos, Zantho Csaba - Lockpicking - a zarnyitas muveszete.mp4
|
57.6 MB
|
|
Szor Peter - Kuzdelem a kartekony kodok ellen.mp4
|
65.7 MB
|
|
Toth Laszlo - Majdnem lathatatlan alca az Oracle adatbazisban, avagy a nem dokumentalt ismet segit min.mp4
|
42.3 MB
|
|
Veres-Szentkiralyi Andracus - Hacking hardware for fun and profit.mp4
|
43.8 MB
|
|
Vivek Ramachandran - Enterprise Wi-Fo Worms, Backdoors and Botnets for Fun and Profit.mp4
|
65.5 MB
|
|
Vivek Ramachandran - Enterprise Wi-Fo Worms.mp4
|
65.2 MB
|
|
Vivek Ramachandran - Nagyvallalati Wi-Fi fergek es botnetek.mp4
|
55.1 MB
|
|
Yaniv Miron - SCADA Dismal or bang-bang SCADA.mp4
|
45.4 MB
|
|
Yaniv Miron - SCADA Hacking - Biztonsag Workshop.mp4
|
29.7 MB
|
|
Yaniv Miron - Scada Hacking - Security Workshop.mp4
|
31.0 MB
|
|
Yaniv Miron - SCADA szomorusag avagy bumm-bumm SCADA.mp4
|
43.8 MB
|
|
Zoltan Balazs - IPv6 shipworm - My little windows domain pwnie.mp4
|
45.0 MB
|
|
Hacktivity 9 2012/
|
|
Adrian Furtuna - Digipass Instrumentation for Fun and Profit.mp4
|
70.6 MB
|
|
Akos Subecz - Security Problems at Hungarian everydays.mp4
|
73.1 MB
|
|
Alexander Kornbrust - Self Defending Database.mp4
|
62.6 MB
|
|
Alexander Polyakov - Top 10 most interesting SAP vulnerabilities and attacks.mp4
|
91.7 MB
|
|
Andras Kabai - Hunting and exploiting bugs in kernel drivers.mp4
|
58.4 MB
|
|
Andras Tevesz - Neutralizing an AntiVirus program.mp4
|
44.5 MB
|
|
Andras Veres-Szentkiralyi - USB = Universal Security Bug.mp4
|
74.8 MB
|
|
Antonio Barresi, Peter Somogyvari - Android Security - An Introduction.mp4
|
73.1 MB
|
|
Aron Szabo - Chip-tweet alternative usage of PKI devices.mp4
|
68.2 MB
|
|
Balazs Bucsay - Paypass vulnerabilities.mp4
|
96.2 MB
|
|
Bucsay Balazs - Paypass serulekenysegek.mp4
|
77.3 MB
|
|
Csaba Otti - The security and vulnerability of the biometry.mp4
|
96.6 MB
|
|
Domonkos Tomcsanyi - Give me a phone that can t be traced.mp4
|
76.8 MB
|
|
Dr. Boldizsar Bencsath - What Makes the Analysis of Malware. Like Duqu or Flame.mp4
|
74.9 MB
|
|
Gabor Szappanos - Journey to the bottom of a black hole.mp4
|
104.7 MB
|
|
Joe McCray - Big Bang Theory - Pentesting high security environments.mp4
|
93.2 MB
|
|
Judit Varga - Amy Farrah Fowler, or the geek girl s case with the tiara.mp4
|
62.1 MB
|
|
Krisztian Schaffer - Security Code Review.mp4
|
75.6 MB
|
|
Laszlo Biro - Alternative internet.mp4
|
59.6 MB
|
|
Miroslav Stampar - Spot the Web Vulnerability.mp4
|
78.8 MB
|
|
Otti Csaba - A biometria biztonsaga.mp4
|
97.2 MB
|
|
Sandor Nagy - NAT Attack.mp4
|
71.0 MB
|
|
Schaffer Krisztian - Forraskod ellenorzes biztonsagi szempontok alapjan.mp4
|
75.4 MB
|
|
Shakeel Tufail - Software Threat Modeling.mp4
|
108.7 MB
|
|
Shay Chen - The Diviner - Digital Clairvoyance Breakthrough.mp4
|
67.2 MB
|
|
Sir David Pepper - Cyberspace and Beyond - Evolution in Action.mp4
|
55.6 MB
|
|
Sir David Pepper - Kiberter es azon tul - folyamatban az evolucio.mp4
|
55.1 MB
|
|
Steve Mulhearn - The Rise and Fall of DDoS Attacks in 2012.mp4
|
71.3 MB
|
|
Subecz Akos - Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban.mp4
|
72.6 MB
|
|
Szabo Aron - Chip-csirip, avagy PKI eszkozok alternativ felhasznalasai.mp4
|
68.2 MB
|
|
Szekely Tamas - Hello HSRP, viszlat HSRP.mp4
|
67.7 MB
|
|
Tamas Szekely - Attacking The First Hop Redundancy.mp4
|
68.1 MB
|
|
Tamas Varadi - Impressioning.mp4
|
50.0 MB
|
|
Tevesz Andras - Antivirus program hatastalanitas.mp4
|
44.2 MB
|
|
Varadi Tamas - Impressziotechnika.mp4
|
48.9 MB
|
|
Vivek Ramachandran - Cracking WPA WPA2 Personal and Enterprise for Fun and Profit.mp4
|
127.1 MB
|
|
Zoltan Balazs - Zombie Browsers, spiced with rootkit extensions.mp4
|
64.5 MB
|
|
Zsombor Kovacs - To secure data is to prepare for jailbreak.mp4
|
61.9 MB
|
|
Hacktivity 10 2013/
|
|
Akos Bardoczi, Lilian Zsakai - Data mining in the age of social web.mp4
|
73.3 MB
|
|
Akos Maroy, Tamas Bodoky - Anonim whistleblowing using the GlobaLeaks platform.mp4
|
54.7 MB
|
|
Andras Feher, Csaba Otti - Face Recognition Systems.mp4
|
78.4 MB
|
|
Axelle Apvrille - Playing Hide and Seek with Dalvik Executables.mp4
|
65.5 MB
|
|
Balint Varga-Perke, - Buherator - - Heureka - The Suspicious Thing Is That It s Not Suspicious.mp4
|
55.1 MB
|
|
Bardoczi Akos, Zsakai Lilian - Adatbanyaszat a kozossegi web koraban.mp4
|
73.4 MB
|
|
Benjamin Tamasi - Hacking CCTV systems.mp4
|
75.7 MB
|
|
Best of Hacktivity 2013 official.mp4
|
11.0 MB
|
|
Charlie Miller - Car Hacking.mp4
|
94.7 MB
|
|
Charlie Miller - Mobile Threats - Hype vs. Reality (Magyar).mp4
|
72.2 MB
|
|
Charlie Miller - Mobile Threats - Hype vs. Reality.mp4
|
71.8 MB
|
|
Csaba Krasznay - Cyber soldiers in the world - how to become a military hacker.mp4
|
92.2 MB
|
|
Dmitriy Chastuchin - Injecting evil code in your SAP J2EE systems.mp4
|
38.7 MB
|
|
Domonkos Tomcsanyi - GSM - have we overslept the last wake-up call.mp4
|
83.2 MB
|
|
Dr. Bartok Sandor Peter - Informatikai igazsagugyi laboratoriumok szakmai szolgaltatasai.mp4
|
57.7 MB
|
|
Dr. Boldizsar Bencsath - What happened to targeted malware attacks last year.mp4
|
61.4 MB
|
|
Dr. Daniel Eszteri - Legal Background of Cybercrime.mp4
|
45.4 MB
|
|
Dr. Leitold Ferenc Horvath Botond - Vedekezes kartevok C&C forgalma ellen.mp4
|
57.7 MB
|
|
Evgeny Neyolov - Inside the illegal traffic sales.mp4
|
63.4 MB
|
|
Feher Andras, Otti Csaba - Arcfelismero rendszerek.mp4
|
78.3 MB
|
|
Ferenc Leitold, Ph.D Botond Horvath - Protection against the C&C traffic of malware.mp4
|
57.8 MB
|
|
Gabor Pek - eNeMI - Evading the state-of-the-art hardware protection of IO virtualization.mp4
|
66.8 MB
|
|
Gabor Szappanos - Advanced() Persistent Shellcode.mp4
|
68.8 MB
|
|
Gergely Revay - Security implications of the Cross-Origin Resource Sharing.mp4
|
66.2 MB
|
|
Geza Tenyi - Management of Confidential Information and Data Protection In Cloud Computing.mp4
|
58.1 MB
|
|
Lajos Muha, Dr. - Interpretation of the Act on Information Security.mp4
|
82.8 MB
|
|
Laszlo Miklos Biro - Tempest, the hidden source of data leakage.mp4
|
60.4 MB
|
|
Laszlo Toth, Ferenc Spala - What s common in Oracle and Samsung.mp4
|
64.6 MB
|
|
Maroy Akos, Bodoky Tamas - Anonim adatszivarogtatas a GlobaLeaks platform.mp4
|
55.9 MB
|
|
Mihaly Zagon - - The Only Thing That Is Constant Is Change.mp4
|
60.5 MB
|
|
Mikko Hypponen - The Cyber Arms Race (Magyar).mp4
|
60.3 MB
|
|
Mikko Hypponen - The Cyber Arms Race.mp4
|
59.0 MB
|
|
Muha Lajos, Dr. - Informaciobiztonsagi torveny ertelmezese.mp4
|
82.8 MB
|
|
Paul M. Wright - Oracle 12c Security - Defense and Attack.mp4
|
46.1 MB
|
|
Robert Lipovsky - The - Facebook PokerAgent.mp4
|
37.9 MB
|
|
Szakaly Tamas - Lopott bajtok a videokartyan - a GPU, mint anti-rce eszkoz.mp4
|
45.0 MB
|
|
Szekely Tamas - DDoS-t vettem a vasarban bitpenzzel.mp4
|
61.5 MB
|
|
Tamas Jos, Attila Bogar - is BitTorrent really providing anonymity.mp4
|
75.9 MB
|
|
Tamas K. Lengyel - Virtual Machine Introspection to Detect and Protect.mp4
|
51.0 MB
|
|
Tamas Szakaly - Stolen bytes on the video card - the GPU as an anti-rce device.mp4
|
45.1 MB
|
|
Tamas Szekely - One a Penny, Two a Penny Hot DDoS run.mp4
|
61.8 MB
|
|
Tenyi Geza, Dr. - Bizalmas informaciok kezelese es adatvedelem a felhoszolgaltatasban.mp4
|
58.0 MB
|
|
Vaagn Toukharian - HTTP Time Bandit.mp4
|
44.9 MB
|
|
Varga-Perke Balint, Buherator - Heureka - Az a gyanus ami nem gyanus.mp4
|
55.2 MB
|
|
Yury Chemerkin - (In-) Efficiency of security features on mobile security and compliance.mp4
|
48.7 MB
|
|
Zane Lackey - Attack-driven defense.mp4
|
62.5 MB
|
|
Zoltan Balazs - Alice in eXploitland, attack and defense evolution.mp4
|
73.2 MB
|
|
Hacktivity 11 2014/
|
|
Balazs Zoltan - Bypass firewalls, application white lists, secure remote desktops in 20 seconds.mp4
|
71.5 MB
|
|
Jason Chan - Building a Glass House.mp4
|
67.4 MB
|
|
Komaromy Daniel - Enter The Snapdragon.mp4
|
73.3 MB
|
|
Micha Borrmann - CVSS is a big botch Scoring systems do not help to improve the IT security.mp4
|
71.0 MB
|
|
Nicolas Gregoire - Hunting for Top Bounties.mp4
|
68.7 MB
|
|
Philip Young - Smashing the Mainframe for Fun and Prison Time.mp4
|
87.4 MB
|
|
Hacktivity 12 2015/
|
|
Axelle Apvrille - Fitness Tracker - Hack in Progress.mp4
|
74.4 MB
|
|
Axelle Apvrille - Fitness Tracker - Hack in Progress.srt
|
37.3 KB
|
|
Balazs Bucsay - Chw00t - Breaking Unices - chroot solutions.mp4
|
67.1 MB
|
|
Boldizsár Bencsáth - BAB0 - A custom sample that bypassed cutting-edge APT attack detection tools.mp4
|
70.2 MB
|
|
Bíro László Miklós - Titkosítás és visszafejtés a fizikai réteg szintjén.mp4
|
69.6 MB
|
|
Fabian Yamaguchi - Mining for Bugs with Graph Database Queries.mp4
|
64.7 MB
|
|
Fabian Yamaguchi - Mining for Bugs with Graph Database Queries.srt
|
52.1 KB
|
|
Fehér András, Kapitány Sándor, Martinkovics Dániel, Otti Csaba - Kézben a biztonság ().mp4
|
85.7 MB
|
|
Felix - FX - Lindner - keynote speaker.mp4
|
94.6 MB
|
|
Felix - FX - Lindner - keynote speaker.srt
|
45.6 KB
|
|
Glenn Ten Cate - OWASP Security knowledge Framework - Survival is not mandatory.mp4
|
69.3 MB
|
|
Glenn Ten Cate - OWASP Security knowledge Framework - Survival is not mandatory.srt
|
46.6 KB
|
|
Gábor Szappanos - Comparing the incomparables.mp4
|
88.0 MB
|
|
Jason Zhang - Make Invisible Visible - Case Studies in PDF Malware.mp4
|
74.8 MB
|
|
Jason Zhang - Make Invisible Visible - Case Studies in PDF Malware.srt
|
18.9 KB
|
|
Jochanan Sommerfeld - DDoS protection technology is far from being install & forget.mp4
|
84.5 MB
|
|
Jochanan Sommerfeld - DDoS protection technology is far from being install & forget.srt
|
50.2 KB
|
|
joernchen of Phenoelit - Your Web app, those hackers & you.mp4
|
61.4 MB
|
|
joernchen of Phenoelit - Your Web app, those hackers & you.srt
|
38.6 KB
|
|
Jos Weyers - Post-its, post-its, post-its everywhere (and how they relate to physical keys).mp4
|
91.6 MB
|
|
Jos Weyers - Post-its, post-its, post-its everywhere (and how they relate to physical keys).srt
|
49.4 KB
|
|
Levente Buttyán, András Szijj, Zsolt Szalay - Hacking cars in the style of Stuxnet.mp4
|
63.6 MB
|
|
Levente Buttyán, András Szijj, Zsolt Szalay - Hacking cars in the style of Stuxnet.srt
|
44.3 KB
|
|
Marina Krotofil - Rocking the pocket book - hacking chemical plant for competition and extortion.mp4
|
89.8 MB
|
|
Mark Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.mp4
|
66.4 MB
|
|
Marosi Attila - A Hacking Team rosszindulatú programjai.mp4
|
68.5 MB
|
|
Martin Knobloch - Secure software, start appreciating your developers.mp4
|
61.7 MB
|
|
Martin Knobloch - Secure software, start appreciating your developers.srt
|
36.9 KB
|
|
Micha Borrmann - Attacking all your IPv4 devices at home from the Internet via Dual-Stack Lite.mp4
|
74.1 MB
|
|
Micha Borrmann - Attacking all your IPv4 devices at home from the Internet via Dual-Stack Lite.srt
|
34.7 KB
|
|
Márk Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.srt
|
47.1 KB
|
|
Norbert Tihanyi - Modification of the prime generation method of the OpenSSL library.mp4
|
45.0 MB
|
|
Omer Coskun - Why nation-state malwares target Telco Networks - Regin and its counterparts.mp4
|
68.3 MB
|
|
Omer Coskun - Why nation-state malwares target Telco Networks - Regin and its counterparts.srt
|
35.7 KB
|
|
Pornsook Kornkitichai - Defend PowerShell Attacks When All Else Fails.mp4
|
69.1 MB
|
|
Pornsook Kornkitichai - Defend PowerShell Attacks When All Else Fails.srt
|
25.6 KB
|
|
Sebastian Garcia - The Network Behavior of Targeted Attacks.mp4
|
89.0 MB
|
|
Sebastian Garcia - The Network Behavior of Targeted Attacks.srt
|
54.5 KB
|
|
Tamás Szakály - Shall we play a game.mp4
|
64.9 MB
|
|
Váradi Tamás- Tárcsás zárak nyitásának eszközei és módszerei.mp4
|
53.3 MB
|
|
Zoltán Balázs - Sandbox detection for the masses - leak, abuse, test.mp4
|
72.4 MB
|
|
Zoltán L. Németh - Memory corruption vulnerabilities, runtime mitigations and their bypasses.mp4
|
57.7 MB
|
|
Zsombor Kovács - Semi-automated mapping of iOS binaries.mp4
|
63.5 MB
|
|
Zsombor Kovács - Semi-automated mapping of iOS binaries.srt
|
40.3 KB
|
|
Áron Szabó - Post-kvantumkriptográfia - prím kérdések = príma kérdések.mp4
|
65.4 MB
|
|
Áron Szabó - Post-kvantumkriptográfia - prím kérdések = príma kérdések.srt
|
11.8 KB
|
|
/Presentations/
|
|
Aleksandar_Nikolic.pdf
|
4.2 MB
|
|
Daniel_Bohannon.pdf
|
2.8 MB
|
|
Daniel_Gruss.pdf
|
3.4 MB
|
|
Dmitry_Chastuhin_Dmitry_Yudin.pdf
|
12.5 MB
|
|
Fitzl_Csaba_Exploit-generation-and-JavaScript-analysis-automation-with-WinDBG_hacktivity.pdf
|
59.6 MB
|
|
Gabor_Molnar.pdf
|
2.7 MB
|
|
Gabor_Pek_Tamas_Koczka.pdf
|
7.1 MB
|
|
George_Webster-and-Julian-Kirsch.pdf
|
14.3 MB
|
|
Ivan_Yuksevich_Hacktivity2016.pdf
|
1.6 MB
|
|
Jos-Weyers.pdf
|
130.7 MB
|
|
Kelly_Shortridge.pdf
|
871.9 KB
|
|
Laszlo_M_Biro.pdf
|
2.5 MB
|
|
Mateusz_Olejarka.pdf
|
1.8 MB
|
|
Matthias_Deeg_Of_Mice_and_Keyboards-Hacktivity_2016_Matthias_Deeg.pdf
|
8.1 MB
|
|
Renata_Hodovan.pdf
|
4.4 MB
|
|
Rene_Freingruber.pdf
|
2.5 MB
|
|
Stefan_Marsiske.pdf
|
4.3 MB
|
|
Tamas_K_Lengyel.pdf
|
1.8 MB
|
|
Tamas_Szakaly_Help_I_ve_got_ANTS.pdf
|
6.8 MB
|
|
Vladimir_Katalov_Hacktivity_2016_iOS_Forensics_ElcomSoft.pdf
|
1.4 MB
|
|
Zoltan_Balazs_All-IoT-security-is-terrible_Hacktivity.pdf
|
2.9 MB
|
|
/Videos/
|
|
Aleksandar Nikolic - Guided Fuzzing And Binary Blobs.mp4
|
58.7 MB
|
|
Csaba Fitzl, Miklos Desbordes-Korcsev - Exploit generation, JavaScript analysis automation.mp4
|
74.1 MB
|
|
Csaba Fitzl, Miklós Desbordes-Korcsev - Exploit generation, JavaScript analysis automation.eng.srt
|
58.6 KB
|
|
Daniel Bohannon - Invoke-Obfuscation PowerShell obFUsk8tion.mp4
|
82.9 MB
|
|
Daniel Gruss - Microarchitectural Incontinence - You would leak too if you were so fast.mp4
|
78.6 MB
|
|
Dmitry Chastuhin, Dmitry Yudin -Getting access to the SAP server via SAP Management Console.mp4
|
54.2 MB
|
|
Dániel Komaromy - Offense wins games, Defense wins nothing.mp4
|
104.0 MB
|
|
Gabor Molnar - War Stories from Google Vulnerability Reward Program.mp4
|
47.6 MB
|
|
George Webster, Julian Kirsch - A Study of the Rich Header and Respective Malware Triage.eng.srt
|
71.5 KB
|
|
George Webster, Julian Kirsch - A Study of the Rich Header and Respective Malware Triage.mp4
|
56.6 MB
|
|
Gerhard Klostermeier, Matthias Deeg - Of Mice and Keyboards.eng.srt
|
102.4 KB
|
|
Gerhard Klostermeier, Matthias Deeg - Of Mice and Keyboards.mp4
|
92.8 MB
|
|
Gábor Pek, Tamas Koczka - SpamAndHex hacks around the world.mp4
|
67.6 MB
|
|
Ivan Yushkevich Wordlists from statistics to genetic.eng.srt
|
47.9 KB
|
|
Ivan Yushkevich Wordlists from statistics to genetic.mp4
|
59.2 MB
|
|
Jos Weyers - Lock Impressioning.mp4
|
89.0 MB
|
|
Kelly Shortridge - The Art of Explanation Behavioral Models of InfoSec.mp4
|
57.5 MB
|
|
Laszlo Miklos Biro - Lets hijack an airplane.mp4
|
53.2 MB
|
|
Mateusz Olejarka - Approaching the unknown Windows Phone application security assessment guide.mp4
|
58.4 MB
|
|
Renata Hodovan - Fuzzinator, a browser fuzzing framework.mp4
|
34.7 MB
|
|
Rene Freingruber - Bypassing application whitelisting in critical infrastructures.mp4
|
66.2 MB
|
|
Sergej Proskurin, Tamás K. Lengyel - Stealthy, Hypervisor-based Malware Analysis.mp4
|
54.6 MB
|
|
Stefan Marsiske - Post-quantum is the new cyber5.mp4
|
68.5 MB
|
|
Tamas Szakaly - Help, Ive got ANTs.mp4
|
69.3 MB
|
|
Travis Goodspeed - A Keynote in Praise of Junk Hacking.mp4
|
86.6 MB
|
|
Vladimir Katalov - iOS Acquisition Methods Compared.mp4
|
81.7 MB
|
|
Zoltan Balazs - The real risks of the IoT security-nightmare Hacking IP cameras through the cloud.mp4
|
101.2 MB
|
|
Zoz - Data Demolition Gone in 60 Seconds.mp4
|
94.0 MB
|
|
Hacktivity 14 2017/
|
|
Adrian Vollmer - Attacking RDP with Seth.eng.srt
|
22.6 KB
|
|
Adrian Vollmer - Attacking RDP with Seth.mp4
|
33.0 MB
|
|
Anto Joseph - Bug hunting using symbolic virtual machines.mp4
|
68.6 MB
|
|
Attila Szasz & Gergo Hosszu - Dive into Magenta - fuzzing Google's new kernel.mp4
|
71.1 MB
|
|
Balint Varga-Perke (Buherator) - Corrupting Ancient Spirits - Penetration Testing Oracle Forms.mp4
|
66.3 MB
|
|
Ben Seri & Gregory Vishnepolsky - BlueBorne Explained.eng.srt
|
79.4 KB
|
|
Ben Seri & Gregory Vishnepolsky - BlueBorne Explained.mp4
|
80.6 MB
|
|
Costin Raiu - keynote - APT Paleontology in the age of cyber.mp4
|
73.0 MB
|
|
Csaba Fitzl - Exploit generation with WinDGB.mp4
|
23.4 MB
|
|
Csaba Fitzl - How to convince a malware to avoid us.mp4
|
61.5 MB
|
|
Ethical hacking in Hungary - Roundtable discussion (in Hungarian).mp4
|
78.5 MB
|
|
Harman Singh - Active Directory Threats & Detection.eng.srt
|
110.2 KB
|
|
Harman Singh - Active Directory Threats & Detection.mp4
|
86.4 MB
|
|
Haroon Meer - keynote - Time to play - D.mp4
|
86.6 MB
|
|
Ignat Korchagin - Exploiting USB IP in Linux.eng.srt
|
51.5 KB
|
|
Ignat Korchagin - Exploiting USB IP in Linux.mp4
|
52.7 MB
|
|
Julien Thomas - Limitations of Android permission system.eng.srt
|
72.3 KB
|
|
Julien Thomas - Limitations of Android permission system.mp4
|
70.5 MB
|
|
Kirils Solovjovs - Tools for effortless reverse engineering of MikroTik routers.eng.srt
|
51.1 KB
|
|
Kirils Solovjovs - Tools for effortless reverse engineering of MikroTik routers.mp4
|
56.6 MB
|
|
Leigh-Anne Galloway - Money makes money - How to buy an ATM and what you can do with it.mp4
|
52.8 MB
|
|
Leigh-Anne Galloway - Money makes money How to buy an ATM and what you can do with it.eng.srt
|
57.1 KB
|
|
Mateusz Olejarka - REST API, pentester's perspective.eng.srt
|
52.0 KB
|
|
Mateusz Olejarka - REST API, pentester's perspective.mp4
|
53.6 MB
|
|
Mehmet Ince - A heaven for Hackers - Breaking Log SIEM Products.mp4
|
46.1 MB
|
|
Omar Eissa - Network Automation is not your Safe Haven.eng.srt
|
51.1 KB
|
|
Omar Eissa - Network Automation is not your Safe Haven.mp4
|
57.4 MB
|
|
Roland Kamaras - Locky - anti-analysis techniques used by the ransomware.mp4
|
53.5 MB
|
|
Roland Kamarás - Locky anti-analysis techniques used by the ransomware.eng.srt
|
45.6 KB
|
|
Summary of the 14th Hacktivity - October 20-21, 2017.eng.srt
|
4.1 KB
|
|
Summary of the 14th Hacktivity - October 20-21, 2017.mp4
|
8.0 MB
|
|
Travis Goodspeed - Some Thoughts on Literate Disassembly and Symbol Porting.eng.srt
|
58.0 KB
|
|
Travis Goodspeed - Some Thoughts on Literate Disassembly and Symbol Porting.mp4
|
57.7 MB
|
|
Zoltan Balazs - How to hide your browser 0-days.mp4
|
77.1 MB
|
|
Zoltan Balazs - How to pwn a Windows domain.mp4
|
65.0 MB
|
|
Hacktivity 15 2018/
|
|
Alex Plaskett & James Loureiro - The Mate Escape - Android Pwn2Owning.eng.srt
|
104.9 KB
|
|
Alex Plaskett & James Loureiro - The Mate Escape - Android Pwn2Owning.mp4
|
62.7 MB
|
|
Balazs Bucsay - XFLTReaT - Building a Tunnel.eng.srt
|
86.8 KB
|
|
Balazs Bucsay - XFLTReaT - Building a Tunnel.mp4
|
58.1 MB
|
|
Brian Gorenc - From Bounties to Bureaucracy - - Keynote Speech.eng.srt
|
131.5 KB
|
|
Brian Gorenc - From Bounties to Bureaucracy - - Keynote Speech.mp4
|
70.1 MB
|
|
Csongor Tamas - Examples of Locality Sensitive Hashing & their Usage for Malware Classification.eng.srt
|
38.6 KB
|
|
Csongor Tamas - Examples of Locality Sensitive Hashing & their Usage for Malware Classification.mp4
|
28.8 MB
|
|
Gabor Szappanos - The Nigerians are in the Spajz.mp4
|
74.3 MB
|
|
Gabriel Cirlig & Stefan Tanase - Smart Car Forensics & Vehicle Weaponization.eng.srt
|
68.8 KB
|
|
Gabriel Cirlig & Stefan Tanase - Smart Car Forensics & Vehicle Weaponization.mp4
|
43.7 MB
|
|
Gergely Biczok - Interdependent Privacy & the Psychology of Likes.eng.srt
|
98.1 KB
|
|
Gergely Biczok - Interdependent Privacy & the Psychology of Likes.mp4
|
86.3 MB
|
|
Hacktivity2018 - Summary of the 15. Jubilee Edition - - 12-13 October 2018.eng.srt
|
6.3 KB
|
|
Hacktivity2018 - Summary of the 15. Jubilee Edition - - 12-13 October 2018.mp4
|
6.5 MB
|
|
Inbar Raz - Under the Hood - The Automotive Challenge.eng.srt
|
95.7 KB
|
|
Inbar Raz - Under the Hood - The Automotive Challenge.mp4
|
54.7 MB
|
|
Jack S (linkcabin) - Becoming the Quiz Master - Thanks RE.eng.srt
|
98.2 KB
|
|
Jack S (linkcabin) - Becoming the Quiz Master - Thanks RE.mp4
|
51.9 MB
|
|
Joxean Koret - Pigaios - A Tool for Diffing Source Codes against Binaries.eng.srt
|
91.1 KB
|
|
Joxean Koret - Pigaios - A Tool for Diffing Source Codes against Binaries.mp4
|
57.4 MB
|
|
Kocsis Tamas & Kovacs Balint - Az Informacioszivargas Monitorozasa Open Source Eszközökkel.mp4
|
68.1 MB
|
|
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication System.mp4
|
62.9 MB
|
|
Mike Ossmann - Keynote Speech at Hacktivity2018.eng.srt
|
109.6 KB
|
|
Mike Ossmann - Keynote Speech at Hacktivity2018.mp4
|
87.7 MB
|
|
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps.eng.srt
|
75.8 KB
|
|
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps.mp4
|
56.7 MB
|
|
Paolo Stagno - A Drone Tale - All Your Drones Belong To Us.eng.srt
|
91.2 KB
|
|
Paolo Stagno - A Drone Tale - All Your Drones Belong To Us.mp4
|
67.3 MB
|
|
Robert Neumann - What's 4k in real Money.eng.srt
|
86.5 KB
|
|
Robert Neumann - What's 4k in real Money.mp4
|
42.7 MB
|
|
Rodrigo Branco - How Offensive Security is Defining the Way We Compute - - Keynote Speech.eng.srt
|
131.4 KB
|
|
Rodrigo Branco - How Offensive Security is Defining the Way We Compute - - Keynote Speech.mp4
|
79.6 MB
|
|
Stephan Gerling - Hacking Yachts Remotely via Satcom or Maritime Internet Router.mp4
|
57.5 MB
|
|
Thaís Moreira Hamasaki - The (not so profitable) Path towards Automated Heap Exploitation.eng.srt
|
88.9 KB
|
|
Thaís Moreira Hamasaki - The (not so profitable) Path towards Automated Heap Exploitation.mp4
|
73.8 MB
|
|
Vincent Ruijter - ~Securing~ Attacking Kubernetes.eng.srt
|
74.3 KB
|
|
Vincent Ruijter - ~Securing~ Attacking Kubernetes.mp4
|
36.6 MB
|
|
Zoltan Balazs - Ethereum Smart Contract Hacking Explained like I'm Five.eng.srt
|
103.8 KB
|
|
Zoltan Balazs - Ethereum Smart Contract Hacking Explained like I'm Five.mp4
|
80.5 MB
|
|
Zsombor Kovacs - Cheaters for Everything from Minesweeper to Mobile Banking Applications.eng.srt
|
83.5 KB
|
|
Zsombor Kovacs - Cheaters for Everything from Minesweeper to Mobile Banking Applications.mp4
|
53.4 MB
|
|
Hacktivity 16 2019/
|
|
Abdul Aziz Hariri - Onix Zero Day Initiative Ruined my Life.en.srt
|
64.9 KB
|
|
Abdul Aziz Hariri - Onix Zero Day Initiative Ruined my Life.mp4
|
21.5 MB
|
|
Aleksandr Kolchanov - Attacks on GSM Alarms, Smart Homes, Ind. Control Sys. & Smartwatches for Kids.mp4
|
41.1 MB
|
|
Aman Sachdev & Himanshu Sharma - Hacking Real Life Financial Applications.mp4
|
66.3 MB
|
|
Andrea Pierini - WHOAMI - PRIV - Show Me Your Privileges and I Will Lead You to System.en.srt
|
59.0 KB
|
|
Andrea Pierini - WHOAMI - PRIV - Show Me Your Privileges and I Will Lead You to System.mp4
|
76.0 MB
|
|
Arun Mane & Nikhil Bogam - Making Anomaly Detection System(ADS) for Vehicles - Canbus and Lin.en.srt
|
56.6 KB
|
|
Arun Mane & Nikhil Bogam - Making Anomaly Detection System(ADS) for Vehicles - Canbus and Lin.mp4
|
62.3 MB
|
|
Asad Qureshi - Using Open Source Intelligence to Investigate CryptoCurrency Cybercrime.en.srt
|
33.0 KB
|
|
Asad Qureshi - Using Open Source Intelligence to Investigate CryptoCurrency Cybercrime.mp4
|
49.7 MB
|
|
Barnabas Sztan-Kovacs - Notwork Security.en.srt
|
57.4 KB
|
|
Barnabas Sztan-Kovacs - Notwork Security.mp4
|
68.5 MB
|
|
Christina Lekati - Social Engineering through Social Media.en.srt
|
64.3 KB
|
|
Christina Lekati - Social Engineering through Social Media.mp4
|
64.6 MB
|
|
Csaba Fitzl - Gatekeeper - Bypass or Not Bypass.mp4
|
35.0 MB
|
|
Dave Lewis - Sharks Petrol These Waters - Keynote Presentation.en.srt
|
62.3 KB
|
|
Dave Lewis - Sharks Petrol These Waters - Keynote Presentation.mp4
|
66.4 MB
|
|
David Liptay & Julia Borbala Csuha - CANmap - Network Discovery on CAN.mp4
|
22.8 MB
|
|
David Török - A Friendly Guide on How to Avoid Getting Pwned Out of Business - a Hacker's Memento.en.srt
|
67.2 KB
|
|
David Török - A Friendly Guide on How to Avoid Getting Pwned Out of Business - a Hacker's Memento.mp4
|
60.1 MB
|
|
Frantisek Strasak & Jan Fajfer - Increasing Efficiency of Encr. Traffic Analysis of People at Risk.en.srt
|
42.8 KB
|
|
Frantisek Strasak & Jan Fajfer - Increasing Efficiency of Encr. Traffic Analysis of People at Risk.mp4
|
50.6 MB
|
|
Gabriel Cirlig - ADBHoney - Analyzing the ADB Malware Ecosystem.en.srt
|
34.6 KB
|
|
Gabriel Cirlig - ADBHoney - Analyzing the ADB Malware Ecosystem.mp4
|
39.1 MB
|
|
Ignat Korchagin - Live-Patching Weak Crypto with OpenSSL Engines.en.srt
|
46.9 KB
|
|
Ignat Korchagin - Live-Patching Weak Crypto with OpenSSL Engines.mp4
|
49.3 MB
|
|
Inbar Raz - Under Pressure Real World Damage with TPMS Spoofing.en.srt
|
61.9 KB
|
|
Inbar Raz - Under Pressure Real World Damage with TPMS Spoofing.mp4
|
57.5 MB
|
|
Interju a Duna TV Csaladbarat cimu musoraban (in Hungarian).mp4
|
5.3 MB
|
|
Interju az M1 Hiradoban (in Hungarian).mp4
|
6.7 MB
|
|
Itay Cohen & Ari Eitan - The Red Square - Mapping the Connections Inside Russia's APT Ecosystem.en.srt
|
30.9 KB
|
|
Itay Cohen & Ari Eitan - The Red Square - Mapping the Connections Inside Russia's APT Ecosystem.mp4
|
33.6 MB
|
|
Jennifer Janesko - Facepalm and Carry On A Tale of I's O's and T's.en.srt
|
58.6 KB
|
|
Jennifer Janesko - Facepalm and Carry On A Tale of I's O's and T's.mp4
|
57.3 MB
|
|
Kelly Shortridge - To Err is Human - Keynote Presentation.en.srt
|
71.4 KB
|
|
Kelly Shortridge - To Err is Human - Keynote Presentation.mp4
|
46.1 MB
|
|
Kuba Gretzky - Phishing Through Modern 2FA Defences With Evilginx.mp4
|
36.7 MB
|
|
Laszlo Miklos Biro - IoT Devices, Were Are You and What Do you Do.mp4
|
40.8 MB
|
|
Marcell Molnar - Hacking ATMs on a Budget.en.srt
|
67.8 KB
|
|
Marcell Molnar - Hacking ATMs on a Budget.mp4
|
68.3 MB
|
|
Mikhail Egorov - What's Wrong with WebSocket APIs Unveiling Vulnerabilities in WebSocket APIs..en.srt
|
45.2 KB
|
|
Mikhail Egorov - What's Wrong with WebSocket APIs Unveiling Vulnerabilities in WebSocket APIs..mp4
|
43.9 MB
|
|
Riport a TV2 TechGuru cimu musoraban (in Hungarian).mp4
|
12.5 MB
|
|
Summary of the 16th Edition - 25-26 October 2019.en.srt
|
3.7 KB
|
|
Summary of the 16th Edition - 25-26 October 2019.mp4
|
6.3 MB
|
|
Tamas Kocsis & Balint Kovacs - Fight Against Fake News Sites Using Open Source Tools (in Hungarian).mp4
|
102.5 MB
|
|
Thomas Debize - A Decade of Infosec Tools.en.srt
|
63.6 KB
|
|
Thomas Debize - A Decade of Infosec Tools.mp4
|
61.6 MB
|
|
TUnde Lendvai - Chinese Social Credit System - Security Issues and Social Impact.en.srt
|
31.5 KB
|
|
TUnde Lendvai - Chinese Social Credit System - Security Issues and Social Impact.mp4
|
31.2 MB
|
|
Zoltan Balazs - Oldschool is Still Cool.en.srt
|
53.0 KB
|
|
Zoltan Balazs - Oldschool is Still Cool.mp4
|
75.9 MB
|
|
Összefoglalo video a WeLoveDigital jovoltabol (in Hungarian).mp4
|
8.0 MB
|
|
Hacktivity 17 2020/
|
|
Anatomy of Automated Account Takeovers by Tal Eliyahu & Begum Calguner.eng.srt
|
83.5 KB
|
|
Anatomy of Automated Account Takeovers by Tal Eliyahu & Begum Calguner.mp4
|
31.6 MB
|
|
ATTPwn Adversary Emulation. ATT&CK Automation by Pablo González & Fran Ramírez.eng.srt
|
64.1 KB
|
|
ATTPwn Adversary Emulation. ATT&CK Automation by Pablo González & Fran Ramírez.mp4
|
42.9 MB
|
|
Blue Team Over The Air by Besim Altinok.eng.srt
|
20.7 KB
|
|
Blue Team Over The Air by Besim Altinok.mp4
|
11.1 MB
|
|
Bring your own demise. The corporate threat of mobile endpoints by János Pallagi.eng.srt
|
25.1 KB
|
|
Bring your own demise. The corporate threat of mobile endpoints by János Pallagi.mp4
|
23.0 MB
|
|
Broken IoT Supply Chain by Martin Hron.eng.srt
|
73.0 KB
|
|
Broken IoT Supply Chain by Martin Hron.mp4
|
41.6 MB
|
|
China's cheap Xiaomis are low on privacy by Cirlig Gabriel.eng.srt
|
35.1 KB
|
|
China's cheap Xiaomis are low on privacy by Cirlig Gabriel.mp4
|
17.3 MB
|
|
DevSecOps in the Financial Services Industry by Stéphane Chmielewski.eng.srt
|
29.4 KB
|
|
DevSecOps in the Financial Services Industry by Stéphane Chmielewski.mp4
|
17.4 MB
|
|
Dissectiong and Comparing Different Binaries to Malware Analysis by Filipi Pires.eng.srt
|
69.2 KB
|
|
Dissectiong and Comparing Different Binaries to Malware Analysis by Filipi Pires.mp4
|
43.6 MB
|
|
Distributed Fuzzing with k8s by Anto Joseph.eng.srt
|
26.5 KB
|
|
Distributed Fuzzing with k8s by Anto Joseph.mp4
|
14.4 MB
|
|
Hacking Facial Recognition Systems by Alexander Polyakov.eng.srt
|
54.7 KB
|
|
Hacking Facial Recognition Systems by Alexander Polyakov.mp4
|
21.3 MB
|
|
Hacking the Hacktivity 2019 badge by Valerio Di Giampetro.eng.srt
|
67.4 KB
|
|
Hacking the Hacktivity 2019 badge by Valerio Di Giampetro.mp4
|
47.3 MB
|
|
How Soft Skills Get Hard Results by Scott Asai.eng.srt
|
54.1 KB
|
|
How Soft Skills Get Hard Results by Scott Asai.mp4
|
17.0 MB
|
|
Infra security automation in CI CD impossible is nothing. 1 2 by Davide Cioccia.eng.srt
|
20.4 KB
|
|
Infra security automation in CI CD impossible is nothing. 1 2 by Davide Cioccia.mp4
|
6.2 MB
|
|
Infra security automation in CI CD impossible is nothing. 2 2 by Spyros Manglis.eng.srt
|
40.6 KB
|
|
Infra security automation in CI CD impossible is nothing. 2 2 by Spyros Manglis.mp4
|
20.8 MB
|
|
Machine Learning Evasion Competition by Zoltán Balázs.eng.srt
|
42.8 KB
|
|
Machine Learning Evasion Competition by Zoltán Balázs.mp4
|
23.7 MB
|
|
Making developers security aware. Lessons learnt. by Mateusz Olejarka.eng.srt
|
38.8 KB
|
|
Making developers security aware. Lessons learnt. by Mateusz Olejarka.mp4
|
13.0 MB
|
|
My wife is watching me The spy inside all of us. by Eddy Willems.eng.srt
|
39.1 KB
|
|
My wife is watching me The spy inside all of us. by Eddy Willems.mp4
|
21.0 MB
|
|
Paste Wars fighting for copypaste freedom by Ignat Korchagin.eng.srt
|
33.3 KB
|
|
Paste Wars fighting for copypaste freedom by Ignat Korchagin.mp4
|
11.4 MB
|
|
Penetration testing VoIP UC nowadays by Moritz Abrell.eng.srt
|
48.3 KB
|
|
Penetration testing VoIP UC nowadays by Moritz Abrell.mp4
|
30.0 MB
|
|
Perception vs Reality by Piotr Pobereźny.eng.srt
|
61.4 KB
|
|
Perception vs Reality by Piotr Pobereźny.mp4
|
27.0 MB
|
|
Reversing Golang Binaries with Ghidra by Dorka Palotay and Albert Zsigovits.eng.srt
|
70.0 KB
|
|
Reversing Golang Binaries with Ghidra by Dorka Palotay and Albert Zsigovits.mp4
|
42.1 MB
|
|
Revisiting a Wireless Alarm System by Matthias Deeg.eng.srt
|
50.8 KB
|
|
Revisiting a Wireless Alarm System by Matthias Deeg.mp4
|
34.0 MB
|
|
Service Mess to Service Mesh by Rob Richardson.eng.srt
|
66.7 KB
|
|
Service Mess to Service Mesh by Rob Richardson.mp4
|
36.4 MB
|
|
Speeding Up Linux Disk Encryption by Ignat Korchagin.eng.srt
|
68.5 KB
|
|
Speeding Up Linux Disk Encryption by Ignat Korchagin.mp4
|
23.3 MB
|
|
State of the Art Phishing by Six.eng.srt
|
65.0 KB
|
|
State of the Art Phishing by Six.mp4
|
36.9 MB
|
|
Stuxnet Attack by Dr. Mo Ashouri.eng.srt
|
22.0 KB
|
|
Stuxnet Attack by Dr. Mo Ashouri.mp4
|
12.9 MB
|
|
The 5G Battle by Róbert Moody and Bence Horváth.eng.srt
|
62.3 KB
|
|
The 5G Battle by Róbert Moody and Bence Horváth.mp4
|
23.4 MB
|
|
The Great Hotel Hack Adventures in attacking hospitality industry. Etizaz Mohsin.mp4
|
15.4 MB
|
|
Working with proof key for code exch. to comm. with the cloud by Milecia McGregor.eng.srt
|
47.1 KB
|
|
Working with proof key for code exch. to comm. with the cloud by Milecia McGregor.mp4
|
18.6 MB
|
|
XPC exploitation by Csaba Fitzl.eng.srt
|
56.8 KB
|
|
XPC exploitation by Csaba Fitzl.mp4
|
29.2 MB
|
|
Hacktivity 19 2022/
|
|
A GREAT Sewing Workshop by Pierre Delcher.eng.srt
|
36.0 KB
|
|
A GREAT Sewing Workshop by Pierre Delcher.mp4
|
28.8 MB
|
|
A New Default Value of OpenSSL could Multiply a DoS Potential by Szilárd Pfeiffer.eng.srt
|
31.0 KB
|
|
A New Default Value of OpenSSL could Multiply a DoS Potential by Szilárd Pfeiffer.mp4
|
24.4 MB
|
|
Applying ATT&CK to Analyze Ransomware Campaigns by Marc Rivero López.eng.srt
|
64.5 KB
|
|
Applying ATT&CK to Analyze Ransomware Campaigns by Marc Rivero López.mp4
|
48.1 MB
|
|
Automating Binary Analysis with Ghidra's P-Code by Gergely Révay.eng.srt
|
62.3 KB
|
|
Automating Binary Analysis with Ghidra's P-Code by Gergely Révay.mp4
|
49.6 MB
|
|
Automotive Threat Intelligence by Péter Venesz & Giuseppe Serio.eng.srt
|
59.3 KB
|
|
Automotive Threat Intelligence by Péter Venesz & Giuseppe Serio.mp4
|
45.5 MB
|
|
Broad View to Automotive Security & Penn testing by András Kabai & László Tóth.eng.srt
|
75.1 KB
|
|
Broad View to Automotive Security & Penn testing by András Kabai & László Tóth.mp4
|
90.5 MB
|
|
Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal.mp4
|
68.8 MB
|
|
Cybersecurity Cannot Ignore Climate Change by Chloé Messdaghi.eng.srt
|
53.7 KB
|
|
Cybersecurity Cannot Ignore Climate Change by Chloé Messdaghi.mp4
|
29.2 MB
|
|
DDoS Testing Your Infrastructure, including IPv6 SYN floods by Henrik Kramselund.eng.srt
|
78.5 KB
|
|
DDoS Testing Your Infrastructure, including IPv6 SYN floods by Henrik Kramselund.mp4
|
46.7 MB
|
|
Developer in a Digital Crosshair, 2022 Edition by Mateusz Olejarka.eng.srt
|
32.6 KB
|
|
Developer in a Digital Crosshair, 2022 Edition by Mateusz Olejarka.mp4
|
24.9 MB
|
|
DiceyF Deploys the GamePlayerFramework by Kurt Baumgartner & Georgy Kucherin.eng.srt
|
70.5 KB
|
|
DiceyF Deploys the GamePlayerFramework by Kurt Baumgartner & Georgy Kucherin.mp4
|
50.0 MB
|
|
Everyday Numbers to Break Not So Everyday Software by Márk Módly.eng.srt
|
25.5 KB
|
|
Everyday Numbers to Break Not So Everyday Software by Márk Módly.mp4
|
29.5 MB
|
|
Fault Injection (FI) Attacks Against Embedded Systems by András Kabai.eng.srt
|
69.3 KB
|
|
Fault Injection (FI) Attacks Against Embedded Systems by András Kabai.mp4
|
100.2 MB
|
|
From Red to Black and Beyond by Albert Zsigovits & Robert Neumann.eng.srt
|
70.5 KB
|
|
From Red to Black and Beyond by Albert Zsigovits & Robert Neumann.mp4
|
42.2 MB
|
|
Fuzzing Trusted Applications in OP-TEE via Shared Memory by Roland Nagy.eng.srt
|
32.7 KB
|
|
Fuzzing Trusted Applications in OP-TEE via Shared Memory by Roland Nagy.mp4
|
23.3 MB
|
|
Hacking AppLocker Cache by Grzegorz Tworek.eng.srt
|
62.2 KB
|
|
Hacking AppLocker Cache by Grzegorz Tworek.mp4
|
60.4 MB
|
|
How an Android Application can Drain Your Wallet by Dimitrios Valsamaras.eng.srt
|
54.4 KB
|
|
How an Android Application can Drain Your Wallet by Dimitrios Valsamaras.mp4
|
37.5 MB
|
|
How Attackers Abused DNS in 2021 2022 by Piotr Głaska.eng.srt
|
65.5 KB
|
|
How Attackers Abused DNS in 2021 2022 by Piotr Głaska.mp4
|
58.6 MB
|
|
How Instantly Upgrade Your Legay Code in Minutes by Tomas Votruba.eng.srt
|
27.0 KB
|
|
How Instantly Upgrade Your Legay Code in Minutes by Tomas Votruba.mp4
|
20.9 MB
|
|
How to Kickstart a Security Program by Ottucsák József.eng.srt
|
67.7 KB
|
|
How to Kickstart a Security Program by Ottucsák József.mp4
|
43.9 MB
|
|
m Hacking Power Grids to Oil Pipelines - Barak Sternberg.eng.srt
|
64.0 KB
|
|
m Hacking Power Grids to Oil Pipelines - Barak Sternberg.mp4
|
47.7 MB
|
|
Making Sense of Firmware Images - The Journey by Márton Illés.eng.srt
|
64.8 KB
|
|
Making Sense of Firmware Images - The Journey by Márton Illés.mp4
|
45.7 MB
|
|
Metaverse (in)Security by Ali Abdollahi.eng.srt
|
34.5 KB
|
|
Metaverse (in)Security by Ali Abdollahi.mp4
|
28.0 MB
|
|
No Parking, No Problem by Ignacio Navarro.eng.srt
|
18.2 KB
|
|
No Parking, No Problem by Ignacio Navarro.mp4
|
17.5 MB
|
|
Practical EDR Bypass Methods in 2022 by István Tóth.eng.srt
|
66.4 KB
|
|
Practical EDR Bypass Methods in 2022 by István Tóth.mp4
|
57.7 MB
|
|
Pwned in Space by Paul Coggin.eng.srt
|
71.4 KB
|
|
Pwned in Space by Paul Coggin.mp4
|
50.3 MB
|
|
Security Assesment of Embedded Firewalls - a Case Study by Csongor Ferenczi.eng.srt
|
24.6 KB
|
|
Security Assesment of Embedded Firewalls - a Case Study by Csongor Ferenczi.mp4
|
25.4 MB
|
|
Security in IoT - the Investigation of Bluetooth Low Energy by János Kepics.eng.srt
|
26.0 KB
|
|
Security in IoT - the Investigation of Bluetooth Low Energy by János Kepics.mp4
|
20.8 MB
|
|
Sisyphus and the CVE Feed by Keziah Plattner & Kadia Mashal.eng.srt
|
72.9 KB
|
|
Sisyphus and the CVE Feed by Keziah Plattner & Kadia Mashal.mp4
|
48.7 MB
|
|
Spin That Steering Wheel by Domokos Nagy.eng.srt
|
54.6 KB
|
|
Spin That Steering Wheel by Domokos Nagy.mp4
|
50.7 MB
|
|
The Great Hospital Hack by Mirza Burhan Baig.eng.srt
|
54.9 KB
|
|
The Great Hospital Hack by Mirza Burhan Baig.mp4
|
30.9 MB
|
|
Web3 Scams = It's a Match by Zoltán Balázs.eng.srt
|
61.7 KB
|
|
Web3 Scams = It's a Match by Zoltán Balázs.mp4
|
70.9 MB
|
|
What are We Missing in Web Applications by Mirza Burhan Baig.eng.srt
|
40.3 KB
|
|
What are We Missing in Web Applications by Mirza Burhan Baig.mp4
|
25.2 MB
|
|
WNEXT - Summary of the 19th Edition - 6-7 October 2022.eng.srt
|
3.5 KB
|
|
WNEXT - Summary of the 19th Edition - 6-7 October 2022.mp4
|
6.9 MB
|
|
Total files 556
|