|
/
|
|
HEADER.md
|
0.7 KB
|
|
|
|
Insomni'hack 2008.mp4
|
7.0 MB
|
|
Insomni'hack 2009.mp4
|
2.9 MB
|
|
Insomni'hack 2010.mp4
|
2.1 MB
|
|
Insomni'hack 2011.mp4
|
5.0 MB
|
|
Insomni'hack 2012.mp4
|
4.7 MB
|
|
Insomni'hack 2013.mp4
|
5.7 MB
|
|
Insomni'hack 2014.mp4
|
3.3 MB
|
|
Insomni'hack logo 2.jpg
|
10.4 KB
|
|
Insomni'hack logo.jpg
|
31.7 KB
|
|
Insomni'hack thank you.txt
|
1.0 KB
|
|
Life is hard(ware) demo.mp4
|
1.3 MB
|
|
/Pictures/
|
|
20160317_100059.jpg
|
157.9 KB
|
|
20160317_100115.jpg
|
128.7 KB
|
|
20160317_100131.jpg
|
112.7 KB
|
|
20160317_113131.jpg
|
115.5 KB
|
|
20160317_113147.jpg
|
93.2 KB
|
|
20160317_113157.jpg
|
104.4 KB
|
|
20160317_122703.jpg
|
109.4 KB
|
|
20160317_140140.jpg
|
51.2 KB
|
|
20160318_110417.jpg
|
109.1 KB
|
|
20160318_110427.jpg
|
116.0 KB
|
|
20160318_142058.jpg
|
140.8 KB
|
|
20160318_143141.jpg
|
119.5 KB
|
|
20160318_143212.jpg
|
126.6 KB
|
|
20160318_143346.jpg
|
121.7 KB
|
|
20160318_143443.jpg
|
103.2 KB
|
|
20160318_143725.jpg
|
122.2 KB
|
|
20160318_164323.jpg
|
58.8 KB
|
|
20160318_200943.jpg
|
106.6 KB
|
|
20160318_201018.jpg
|
111.0 KB
|
|
20160318_201034.jpg
|
115.2 KB
|
|
20160318_201037.jpg
|
119.3 KB
|
|
20160318_223149.jpg
|
128.5 KB
|
|
20160318_223217.jpg
|
102.6 KB
|
|
20160318_223303.jpg
|
98.9 KB
|
|
20160318_223452.jpg
|
130.5 KB
|
|
20160318_225559.jpg
|
67.5 KB
|
|
20160318_230521.jpg
|
46.1 KB
|
|
20160318_230730.jpg
|
104.3 KB
|
|
20160318_232730.jpg
|
136.9 KB
|
|
20160318_233137.jpg
|
92.0 KB
|
|
20160319_024101.jpg
|
88.9 KB
|
|
D7k_2016-03-17_19-55-26.JPG
|
188.0 KB
|
|
D7k_2016-03-17_19-55-30.JPG
|
172.7 KB
|
|
D7k_2016-03-17_19-55-34.JPG
|
128.4 KB
|
|
D7k_2016-03-17_19-56-20.JPG
|
138.2 KB
|
|
D7k_2016-03-17_19-56-22.JPG
|
117.0 KB
|
|
D7k_2016-03-17_19-56-28.JPG
|
218.9 KB
|
|
D7k_2016-03-17_19-56-30.JPG
|
189.7 KB
|
|
D7k_2016-03-17_19-56-34.JPG
|
145.6 KB
|
|
D7k_2016-03-17_19-57-00.JPG
|
134.5 KB
|
|
D7k_2016-03-17_19-57-08.JPG
|
227.0 KB
|
|
D7k_2016-03-17_20-19-56.JPG
|
132.1 KB
|
|
D7k_2016-03-17_20-20-16.JPG
|
138.8 KB
|
|
D7k_2016-03-17_20-20-20.JPG
|
120.2 KB
|
|
D7k_2016-03-17_20-20-24.JPG
|
142.4 KB
|
|
D7k_2016-03-17_20-20-30.JPG
|
155.9 KB
|
|
D7k_2016-03-17_20-20-32.JPG
|
118.0 KB
|
|
D7k_2016-03-17_20-20-38.JPG
|
152.0 KB
|
|
D7k_2016-03-17_20-20-40.JPG
|
169.3 KB
|
|
D7k_2016-03-18_09-40-52.JPG
|
103.9 KB
|
|
D7k_2016-03-18_09-42-44.JPG
|
159.3 KB
|
|
D7k_2016-03-18_09-43-08.JPG
|
166.3 KB
|
|
D7k_2016-03-18_09-43-28.JPG
|
125.2 KB
|
|
D7k_2016-03-18_09-43-36.JPG
|
51.8 KB
|
|
D7k_2016-03-18_09-44-20.JPG
|
149.3 KB
|
|
D7k_2016-03-18_09-44-42.JPG
|
151.7 KB
|
|
D7k_2016-03-18_09-45-34.JPG
|
32.9 KB
|
|
D7k_2016-03-18_09-45-40.JPG
|
159.9 KB
|
|
D7k_2016-03-18_09-46-32.JPG
|
79.1 KB
|
|
D7k_2016-03-18_09-47-28.JPG
|
29.2 KB
|
|
D7k_2016-03-18_09-47-36.JPG
|
97.0 KB
|
|
D7k_2016-03-18_09-47-48.JPG
|
143.4 KB
|
|
D7k_2016-03-18_09-48-54.JPG
|
61.7 KB
|
|
D7k_2016-03-18_09-49-06.JPG
|
40.9 KB
|
|
D7k_2016-03-18_09-51-00.JPG
|
100.0 KB
|
|
D7k_2016-03-18_10-08-10.JPG
|
68.6 KB
|
|
D7k_2016-03-18_10-29-12.JPG
|
135.5 KB
|
|
D7k_2016-03-18_10-29-16.JPG
|
154.3 KB
|
|
D7k_2016-03-18_10-29-40.JPG
|
162.5 KB
|
|
D7k_2016-03-18_10-30-24.JPG
|
103.4 KB
|
|
D7k_2016-03-18_10-31-54.JPG
|
89.4 KB
|
|
D7k_2016-03-18_10-32-00.JPG
|
91.6 KB
|
|
D7k_2016-03-18_10-32-12.JPG
|
95.5 KB
|
|
D7k_2016-03-18_10-34-14.JPG
|
153.1 KB
|
|
D7k_2016-03-18_10-34-16.JPG
|
126.4 KB
|
|
D7k_2016-03-18_10-35-06.JPG
|
168.4 KB
|
|
D7k_2016-03-18_10-35-14.JPG
|
154.1 KB
|
|
D7k_2016-03-18_10-35-34.JPG
|
140.2 KB
|
|
D7k_2016-03-18_10-35-42.JPG
|
120.5 KB
|
|
D7k_2016-03-18_10-36-20.JPG
|
147.1 KB
|
|
D7k_2016-03-18_10-37-46.JPG
|
139.4 KB
|
|
D7k_2016-03-18_10-37-58.JPG
|
167.5 KB
|
|
D7k_2016-03-18_10-38-16.JPG
|
155.8 KB
|
|
D7k_2016-03-18_10-39-10.JPG
|
77.2 KB
|
|
D7k_2016-03-18_10-39-36.JPG
|
184.1 KB
|
|
D7k_2016-03-18_10-39-48.JPG
|
123.7 KB
|
|
D7k_2016-03-18_10-41-04.JPG
|
161.1 KB
|
|
D7k_2016-03-18_10-41-06.JPG
|
158.6 KB
|
|
D7k_2016-03-18_10-41-12.JPG
|
156.5 KB
|
|
D7k_2016-03-18_10-41-44.JPG
|
119.6 KB
|
|
D7k_2016-03-18_10-46-16.JPG
|
165.0 KB
|
|
D7k_2016-03-18_10-46-26.JPG
|
129.4 KB
|
|
D7k_2016-03-18_10-46-48.JPG
|
98.8 KB
|
|
D7k_2016-03-18_10-48-04.JPG
|
107.7 KB
|
|
D7k_2016-03-18_10-48-22.JPG
|
170.9 KB
|
|
D7k_2016-03-18_10-48-26.JPG
|
152.1 KB
|
|
D7k_2016-03-18_10-50-24.JPG
|
152.8 KB
|
|
D7k_2016-03-18_10-50-44.JPG
|
160.6 KB
|
|
D7k_2016-03-18_10-56-12.JPG
|
139.5 KB
|
|
D7k_2016-03-18_10-56-26.JPG
|
92.1 KB
|
|
D7k_2016-03-18_10-56-44.JPG
|
162.4 KB
|
|
D7k_2016-03-18_10-56-52.JPG
|
90.4 KB
|
|
D7k_2016-03-18_10-56-56.JPG
|
46.8 KB
|
|
D7k_2016-03-18_10-57-08.JPG
|
87.6 KB
|
|
D7k_2016-03-18_10-57-20.JPG
|
131.6 KB
|
|
D7k_2016-03-18_10-57-50.JPG
|
88.0 KB
|
|
D7k_2016-03-18_10-58-04.JPG
|
146.3 KB
|
|
D7k_2016-03-18_10-58-22.JPG
|
115.1 KB
|
|
D7k_2016-03-18_10-58-32.JPG
|
74.8 KB
|
|
D7k_2016-03-18_10-58-44.JPG
|
123.5 KB
|
|
D7k_2016-03-18_10-58-58.JPG
|
107.8 KB
|
|
D7k_2016-03-18_10-59-24.JPG
|
85.4 KB
|
|
D7k_2016-03-18_11-00-20.JPG
|
162.1 KB
|
|
D7k_2016-03-18_11-00-24.JPG
|
72.6 KB
|
|
D7k_2016-03-18_11-00-44.JPG
|
101.0 KB
|
|
D7k_2016-03-18_11-00-52.JPG
|
42.8 KB
|
|
D7k_2016-03-18_11-00-54.JPG
|
47.0 KB
|
|
D7k_2016-03-18_11-01-10.JPG
|
75.6 KB
|
|
D7k_2016-03-18_11-35-54.JPG
|
34.6 KB
|
|
D7k_2016-03-18_11-37-50.JPG
|
92.8 KB
|
|
D7k_2016-03-18_11-37-58.JPG
|
80.5 KB
|
|
D7k_2016-03-18_11-53-26.JPG
|
88.3 KB
|
|
D7k_2016-03-18_11-53-36.JPG
|
136.2 KB
|
|
D7k_2016-03-18_11-53-50.JPG
|
108.2 KB
|
|
D7k_2016-03-18_11-54-10.JPG
|
96.7 KB
|
|
D7k_2016-03-18_11-54-20.JPG
|
71.2 KB
|
|
D7k_2016-03-18_11-54-20_01.JPG
|
70.4 KB
|
|
D7k_2016-03-18_11-54-48.JPG
|
111.7 KB
|
|
D7k_2016-03-18_11-55-06.JPG
|
39.2 KB
|
|
D7k_2016-03-18_11-55-08.JPG
|
29.0 KB
|
|
D7k_2016-03-18_11-56-10.JPG
|
116.2 KB
|
|
D7k_2016-03-18_11-56-24.JPG
|
29.7 KB
|
|
D7k_2016-03-18_11-56-34.JPG
|
77.2 KB
|
|
D7k_2016-03-18_11-56-50.JPG
|
121.8 KB
|
|
D7k_2016-03-18_11-56-56.JPG
|
98.2 KB
|
|
D7k_2016-03-18_11-57-22.JPG
|
158.2 KB
|
|
D7k_2016-03-18_11-58-08.JPG
|
71.4 KB
|
|
D7k_2016-03-18_11-58-42.JPG
|
138.6 KB
|
|
D7k_2016-03-18_11-59-22.JPG
|
59.6 KB
|
|
D7k_2016-03-18_11-59-44.JPG
|
80.0 KB
|
|
D7k_2016-03-18_12-32-12.JPG
|
90.1 KB
|
|
D7k_2016-03-18_12-32-34.JPG
|
92.4 KB
|
|
D7k_2016-03-18_12-32-38.JPG
|
103.3 KB
|
|
D7k_2016-03-18_12-33-44.JPG
|
132.6 KB
|
|
D7k_2016-03-18_12-53-48.JPG
|
81.4 KB
|
|
D7k_2016-03-18_12-58-58.JPG
|
164.6 KB
|
|
D7k_2016-03-18_12-59-14.JPG
|
217.9 KB
|
|
D7k_2016-03-18_12-59-14_01.JPG
|
224.0 KB
|
|
D7k_2016-03-18_12-59-30.JPG
|
239.0 KB
|
|
D7k_2016-03-18_12-59-32.JPG
|
236.5 KB
|
|
D7k_2016-03-18_12-59-32_01.JPG
|
238.6 KB
|
|
D7k_2016-03-18_13-07-08.JPG
|
201.1 KB
|
|
D7k_2016-03-18_13-07-12.JPG
|
213.8 KB
|
|
D7k_2016-03-18_13-07-12_01.JPG
|
212.9 KB
|
|
D7k_2016-03-18_13-07-30.JPG
|
163.9 KB
|
|
D7k_2016-03-18_13-07-32.JPG
|
164.0 KB
|
|
D7k_2016-03-18_13-07-34.JPG
|
153.0 KB
|
|
D7k_2016-03-18_13-07-40.JPG
|
169.8 KB
|
|
D7k_2016-03-18_13-07-42.JPG
|
160.8 KB
|
|
D7k_2016-03-18_13-07-42_01.JPG
|
138.8 KB
|
|
D7k_2016-03-18_13-07-46.JPG
|
203.4 KB
|
|
D7k_2016-03-18_14-14-52.JPG
|
108.5 KB
|
|
D7k_2016-03-18_14-15-00.JPG
|
45.8 KB
|
|
D7k_2016-03-18_14-15-02.JPG
|
38.1 KB
|
|
D7k_2016-03-18_14-15-12.JPG
|
38.3 KB
|
|
D7k_2016-03-18_14-15-20.JPG
|
165.9 KB
|
|
D7k_2016-03-18_14-15-38.JPG
|
115.5 KB
|
|
D7k_2016-03-18_14-16-46.JPG
|
128.2 KB
|
|
D7k_2016-03-18_14-16-58_01.JPG
|
71.6 KB
|
|
D7k_2016-03-18_14-17-08.JPG
|
126.3 KB
|
|
D7k_2016-03-18_14-17-14.JPG
|
37.3 KB
|
|
D7k_2016-03-18_14-17-50.JPG
|
27.2 KB
|
|
D7k_2016-03-18_14-17-56.JPG
|
121.4 KB
|
|
D7k_2016-03-18_14-18-12.JPG
|
142.0 KB
|
|
D7k_2016-03-18_15-24-46.JPG
|
117.1 KB
|
|
D7k_2016-03-18_15-24-58.JPG
|
85.7 KB
|
|
D7k_2016-03-18_15-25-08.JPG
|
31.8 KB
|
|
D7k_2016-03-18_15-25-14.JPG
|
31.0 KB
|
|
D7k_2016-03-18_15-25-24.JPG
|
33.3 KB
|
|
D7k_2016-03-18_15-26-04.JPG
|
114.0 KB
|
|
D7k_2016-03-18_15-26-22.JPG
|
93.9 KB
|
|
D7k_2016-03-18_15-27-50.JPG
|
160.8 KB
|
|
D7k_2016-03-18_15-28-04.JPG
|
92.5 KB
|
|
D7k_2016-03-18_15-28-12.JPG
|
132.3 KB
|
|
D7k_2016-03-18_15-28-22.JPG
|
34.0 KB
|
|
D7k_2016-03-18_15-28-34.JPG
|
88.1 KB
|
|
D7k_2016-03-18_16-33-50.JPG
|
88.9 KB
|
|
D7k_2016-03-18_16-33-56.JPG
|
61.9 KB
|
|
D7k_2016-03-18_17-37-34.JPG
|
130.5 KB
|
|
D7k_2016-03-18_17-37-44.JPG
|
141.5 KB
|
|
D7k_2016-03-18_17-38-02.JPG
|
158.1 KB
|
|
D7k_2016-03-18_17-39-02.JPG
|
107.8 KB
|
|
D7k_2016-03-18_17-47-08.JPG
|
172.9 KB
|
|
D7k_2016-03-18_18-30-54.JPG
|
157.4 KB
|
|
D7k_2016-03-18_18-30-58.JPG
|
153.4 KB
|
|
D7k_2016-03-18_18-31-04.JPG
|
139.1 KB
|
|
D7k_2016-03-18_18-31-08.JPG
|
159.0 KB
|
|
D7k_2016-03-18_18-31-14.JPG
|
154.9 KB
|
|
D7k_2016-03-18_18-31-16.JPG
|
164.0 KB
|
|
D7k_2016-03-18_18-31-28.JPG
|
122.5 KB
|
|
D7k_2016-03-18_18-34-30.JPG
|
82.6 KB
|
|
D7k_2016-03-18_19-17-22.JPG
|
69.3 KB
|
|
D7k_2016-03-18_19-17-34.JPG
|
148.8 KB
|
|
D7k_2016-03-18_19-18-12.JPG
|
143.0 KB
|
|
D7k_2016-03-19_04-16-28.JPG
|
100.0 KB
|
|
D7k_2016-03-19_04-28-08.JPG
|
133.0 KB
|
|
D7k_2016-03-19_04-28-32.JPG
|
135.7 KB
|
|
D7k_2016-03-19_04-28-48.JPG
|
145.3 KB
|
|
D7k_2016-03-19_04-29-28.JPG
|
137.9 KB
|
|
D7k_2016-03-19_04-29-52.JPG
|
128.0 KB
|
|
D7k_2016-03-19_04-30-02.JPG
|
133.6 KB
|
|
Insomni'hack 2017/
|
|
A new source of trouble - Amat Cama.mp4
|
16.6 MB
|
|
Automating computer security - Tyler Nighswander.mp4
|
54.4 MB
|
|
Bridging the Gap - Stefan Lüders.mp4
|
77.8 MB
|
|
DevOops Redux - Chris Gates.mp4
|
219.7 KB
|
|
Dissecting a Metamorphic File-Infecting Ransomware - Raul Alvarez.mp4
|
47.5 MB
|
|
Modern reconnaissance phase on APT - Paul Rascagnères.mp4
|
53.2 MB
|
|
RHME2 CTF challenges and solutions - Eloi Sanfèlix & Andres Moreno.mp4
|
60.5 MB
|
|
Secret-In.me - Florian Gaultier.mp4
|
36.4 MB
|
|
Welcome - Alain Mowat.mp4
|
16.9 MB
|
|
/.../Insomni'hack 2017 captions/
|
|
A new source of trouble - Amat Cama.eng.json
|
1.4 MB
|
|
A new source of trouble - Amat Cama.eng.lrc
|
33.6 KB
|
|
A new source of trouble - Amat Cama.eng.srt
|
37.3 KB
|
|
A new source of trouble - Amat Cama.eng.text
|
25.2 KB
|
|
A new source of trouble - Amat Cama.eng.tsv
|
30.0 KB
|
|
A new source of trouble - Amat Cama.eng.txt
|
33.9 KB
|
|
A new source of trouble - Amat Cama.eng.vtt
|
33.9 KB
|
|
Automating computer security - Tyler Nighswander.eng.json
|
2.6 MB
|
|
Automating computer security - Tyler Nighswander.eng.lrc
|
60.3 KB
|
|
Automating computer security - Tyler Nighswander.eng.srt
|
67.5 KB
|
|
Automating computer security - Tyler Nighswander.eng.text
|
44.5 KB
|
|
Automating computer security - Tyler Nighswander.eng.tsv
|
53.8 KB
|
|
Automating computer security - Tyler Nighswander.eng.txt
|
61.0 KB
|
|
Automating computer security - Tyler Nighswander.eng.vtt
|
61.0 KB
|
|
Bridging the Gap - Stefan Lüders.eng.json
|
3.8 MB
|
|
Bridging the Gap - Stefan Lüders.eng.lrc
|
99.6 KB
|
|
Bridging the Gap - Stefan Lüders.eng.srt
|
114.2 KB
|
|
Bridging the Gap - Stefan Lüders.eng.text
|
67.4 KB
|
|
Bridging the Gap - Stefan Lüders.eng.tsv
|
86.4 KB
|
|
Bridging the Gap - Stefan Lüders.eng.txt
|
100.9 KB
|
|
Bridging the Gap - Stefan Lüders.eng.vtt
|
100.9 KB
|
|
Dissecting a Metamorphic File-Infecting Ransomware - Raul Alvarez.eng.json
|
1.6 MB
|
|
Dissecting a Metamorphic File-Infecting Ransomware - Raul Alvarez.eng.lrc
|
38.8 KB
|
|
Dissecting a Metamorphic File-Infecting Ransomware - Raul Alvarez.eng.srt
|
43.2 KB
|
|
Dissecting a Metamorphic File-Infecting Ransomware - Raul Alvarez.eng.text
|
29.3 KB
|
|
Dissecting a Metamorphic File-Infecting Ransomware - Raul Alvarez.eng.tsv
|
34.8 KB
|
|
Dissecting a Metamorphic File-Infecting Ransomware - Raul Alvarez.eng.txt
|
39.2 KB
|
|
Dissecting a Metamorphic File-Infecting Ransomware - Raul Alvarez.eng.vtt
|
39.2 KB
|
|
Modern reconnaissance phase on APT - Paul Rascagnères.eng.json
|
1.5 MB
|
|
Modern reconnaissance phase on APT - Paul Rascagnères.eng.lrc
|
36.6 KB
|
|
Modern reconnaissance phase on APT - Paul Rascagnères.eng.srt
|
41.0 KB
|
|
Modern reconnaissance phase on APT - Paul Rascagnères.eng.text
|
27.0 KB
|
|
Modern reconnaissance phase on APT - Paul Rascagnères.eng.tsv
|
32.6 KB
|
|
Modern reconnaissance phase on APT - Paul Rascagnères.eng.txt
|
37.0 KB
|
|
Modern reconnaissance phase on APT - Paul Rascagnères.eng.vtt
|
37.0 KB
|
|
RHME2 CTF challenges and solutions - Eloi Sanfèlix & Andres Moreno.eng.json
|
2.5 MB
|
|
RHME2 CTF challenges and solutions - Eloi Sanfèlix & Andres Moreno.eng.lrc
|
62.9 KB
|
|
RHME2 CTF challenges and solutions - Eloi Sanfèlix & Andres Moreno.eng.srt
|
71.7 KB
|
|
RHME2 CTF challenges and solutions - Eloi Sanfèlix & Andres Moreno.eng.text
|
43.5 KB
|
|
RHME2 CTF challenges and solutions - Eloi Sanfèlix & Andres Moreno.eng.tsv
|
54.7 KB
|
|
RHME2 CTF challenges and solutions - Eloi Sanfèlix & Andres Moreno.eng.txt
|
63.6 KB
|
|
RHME2 CTF challenges and solutions - Eloi Sanfèlix & Andres Moreno.eng.vtt
|
63.6 KB
|
|
Secret-In.me - Florian Gaultier.eng.json
|
1.9 MB
|
|
Secret-In.me - Florian Gaultier.eng.lrc
|
49.8 KB
|
|
Secret-In.me - Florian Gaultier.eng.srt
|
58.7 KB
|
|
Secret-In.me - Florian Gaultier.eng.text
|
30.2 KB
|
|
Secret-In.me - Florian Gaultier.eng.tsv
|
41.5 KB
|
|
Secret-In.me - Florian Gaultier.eng.txt
|
50.5 KB
|
|
Secret-In.me - Florian Gaultier.eng.vtt
|
50.6 KB
|
|
Welcome - Alain Mowat.eng.json
|
668.4 KB
|
|
Welcome - Alain Mowat.eng.lrc
|
16.1 KB
|
|
Welcome - Alain Mowat.eng.srt
|
17.7 KB
|
|
Welcome - Alain Mowat.eng.text
|
12.5 KB
|
|
Welcome - Alain Mowat.eng.tsv
|
14.4 KB
|
|
Welcome - Alain Mowat.eng.txt
|
16.2 KB
|
|
Welcome - Alain Mowat.eng.vtt
|
16.3 KB
|
|
/Pictures/
|
|
D7k__2017-03-23_21-53-36.JPG
|
318.5 KB
|
|
D7k__2017-03-23_21-54-13.JPG
|
316.5 KB
|
|
D7k__2017-03-23_21-54-45.JPG
|
347.0 KB
|
|
D7k__2017-03-23_21-54-51.JPG
|
314.3 KB
|
|
D7k__2017-03-23_21-54-56.JPG
|
333.2 KB
|
|
D7k__2017-03-23_21-57-08.JPG
|
287.2 KB
|
|
D7k__2017-03-23_21-57-33.JPG
|
256.4 KB
|
|
D7k__2017-03-23_21-58-57.JPG
|
482.6 KB
|
|
D7k__2017-03-23_21-58-58.JPG
|
406.8 KB
|
|
D7k__2017-03-24_09-33-06.JPG
|
382.3 KB
|
|
D7k__2017-03-24_09-33-33.JPG
|
366.3 KB
|
|
D7k__2017-03-24_09-33-38.JPG
|
339.0 KB
|
|
D7k__2017-03-24_09-34-55.JPG
|
311.4 KB
|
|
D7k__2017-03-24_09-38-59.JPG
|
306.0 KB
|
|
D7k__2017-03-24_09-41-58.JPG
|
282.4 KB
|
|
D7k__2017-03-24_09-42-34.JPG
|
283.5 KB
|
|
D7k__2017-03-24_09-42-49.JPG
|
302.7 KB
|
|
D7k__2017-03-24_09-42-50.JPG
|
293.5 KB
|
|
D7k__2017-03-24_09-43-08.JPG
|
322.2 KB
|
|
D7k__2017-03-24_09-43-20.JPG
|
294.6 KB
|
|
D7k__2017-03-24_09-45-13.JPG
|
360.1 KB
|
|
D7k__2017-03-24_09-47-23.JPG
|
235.0 KB
|
|
D7k__2017-03-24_09-47-42.JPG
|
375.9 KB
|
|
D7k__2017-03-24_09-48-25.JPG
|
211.0 KB
|
|
D7k__2017-03-24_09-48-34.JPG
|
242.3 KB
|
|
D7k__2017-03-24_09-50-01.JPG
|
319.9 KB
|
|
D7k__2017-03-24_09-50-05.JPG
|
292.7 KB
|
|
D7k__2017-03-24_09-50-25.JPG
|
209.9 KB
|
|
D7k__2017-03-24_09-51-38.JPG
|
359.2 KB
|
|
D7k__2017-03-24_10-26-04.JPG
|
374.9 KB
|
|
D7k__2017-03-24_10-26-19.JPG
|
230.2 KB
|
|
D7k__2017-03-24_10-26-20.JPG
|
255.8 KB
|
|
D7k__2017-03-24_10-26-30.JPG
|
406.1 KB
|
|
D7k__2017-03-24_10-27-01.JPG
|
263.4 KB
|
|
D7k__2017-03-24_10-27-05.JPG
|
331.3 KB
|
|
D7k__2017-03-24_10-28-47.JPG
|
216.6 KB
|
|
D7k__2017-03-24_10-36-13.JPG
|
283.2 KB
|
|
D7k__2017-03-24_10-49-41.JPG
|
346.9 KB
|
|
D7k__2017-03-24_10-49-44.JPG
|
338.7 KB
|
|
D7k__2017-03-24_12-05-48.JPG
|
359.2 KB
|
|
D7k__2017-03-24_12-05-57.JPG
|
384.0 KB
|
|
D7k__2017-03-24_12-06-01.JPG
|
351.2 KB
|
|
D7k__2017-03-24_12-06-07.JPG
|
349.8 KB
|
|
D7k__2017-03-24_12-06-20b.JPG
|
367.1 KB
|
|
D7k__2017-03-24_12-06-26.JPG
|
391.3 KB
|
|
D7k__2017-03-24_12-06-29.JPG
|
401.4 KB
|
|
D7k__2017-03-24_12-07-16b.JPG
|
256.0 KB
|
|
D7k__2017-03-24_12-09-08.JPG
|
268.4 KB
|
|
D7k__2017-03-24_12-09-28.JPG
|
388.2 KB
|
|
D7k__2017-03-24_12-09-31.JPG
|
295.4 KB
|
|
D7k__2017-03-24_12-27-04.JPG
|
291.4 KB
|
|
D7k__2017-03-24_12-27-08.JPG
|
293.5 KB
|
|
D7k__2017-03-24_12-27-37.JPG
|
440.2 KB
|
|
D7k__2017-03-24_12-38-34.JPG
|
423.5 KB
|
|
D7k__2017-03-24_12-38-45.JPG
|
426.5 KB
|
|
D7k__2017-03-24_13-13-06.JPG
|
339.8 KB
|
|
D7k__2017-03-24_13-13-15.JPG
|
299.4 KB
|
|
D7k__2017-03-24_13-13-27.JPG
|
214.2 KB
|
|
D7k__2017-03-24_13-13-57.JPG
|
346.5 KB
|
|
D7k__2017-03-24_13-14-02.JPG
|
213.5 KB
|
|
D7k__2017-03-24_13-14-08.JPG
|
224.7 KB
|
|
D7k__2017-03-24_13-14-36.JPG
|
415.9 KB
|
|
D7k__2017-03-24_13-14-38.JPG
|
389.9 KB
|
|
D7k__2017-03-24_13-14-41.JPG
|
420.8 KB
|
|
D7k__2017-03-24_13-14-43.JPG
|
324.6 KB
|
|
D7k__2017-03-24_13-14-55.JPG
|
391.4 KB
|
|
D7k__2017-03-24_13-18-56.JPG
|
258.2 KB
|
|
D7k__2017-03-24_13-18-58.JPG
|
216.9 KB
|
|
D7k__2017-03-24_13-45-02.JPG
|
298.5 KB
|
|
D7k__2017-03-24_13-45-14.JPG
|
369.1 KB
|
|
D7k__2017-03-24_13-46-59.JPG
|
260.4 KB
|
|
D7k__2017-03-24_13-47-11.JPG
|
397.4 KB
|
|
D7k__2017-03-24_13-48-01.JPG
|
249.3 KB
|
|
D7k__2017-03-24_13-48-25.JPG
|
272.8 KB
|
|
D7k__2017-03-24_13-50-19.JPG
|
495.7 KB
|
|
D7k__2017-03-24_13-52-35.JPG
|
358.4 KB
|
|
D7k__2017-03-24_13-52-42.JPG
|
302.5 KB
|
|
D7k__2017-03-24_13-52-50.JPG
|
318.5 KB
|
|
D7k__2017-03-24_13-52-59.JPG
|
325.7 KB
|
|
D7k__2017-03-24_13-53-47.JPG
|
337.6 KB
|
|
D7k__2017-03-24_13-53-50.JPG
|
385.4 KB
|
|
D7k__2017-03-24_13-53-58.JPG
|
354.1 KB
|
|
D7k__2017-03-24_13-54-00.JPG
|
342.7 KB
|
|
D7k__2017-03-24_13-54-09.JPG
|
346.3 KB
|
|
D7k__2017-03-24_14-50-30.JPG
|
251.4 KB
|
|
D7k__2017-03-24_14-50-33.JPG
|
253.6 KB
|
|
D7k__2017-03-24_14-55-12.JPG
|
335.0 KB
|
|
D7k__2017-03-24_14-55-24.JPG
|
284.4 KB
|
|
D7k__2017-03-24_14-55-39.JPG
|
311.9 KB
|
|
D7k__2017-03-24_14-55-48.JPG
|
267.2 KB
|
|
D7k__2017-03-24_14-56-04.JPG
|
281.5 KB
|
|
D7k__2017-03-24_14-56-05.JPG
|
282.0 KB
|
|
D7k__2017-03-24_14-56-34.JPG
|
285.2 KB
|
|
D7k__2017-03-24_14-57-20.JPG
|
387.1 KB
|
|
D7k__2017-03-24_14-57-31.JPG
|
205.3 KB
|
|
D7k__2017-03-24_14-57-35.JPG
|
408.8 KB
|
|
D7k__2017-03-24_14-57-50.JPG
|
242.7 KB
|
|
D7k__2017-03-24_14-58-29.JPG
|
204.9 KB
|
|
D7k__2017-03-24_14-58-36.JPG
|
362.3 KB
|
|
D7k__2017-03-24_14-58-43.JPG
|
336.0 KB
|
|
D7k__2017-03-24_14-58-51.JPG
|
312.6 KB
|
|
D7k__2017-03-24_14-59-34.JPG
|
273.1 KB
|
|
D7k__2017-03-24_14-59-41.JPG
|
277.6 KB
|
|
D7k__2017-03-24_14-59-45.JPG
|
270.8 KB
|
|
D7k__2017-03-24_15-41-09.JPG
|
381.4 KB
|
|
D7k__2017-03-24_15-41-29a.JPG
|
346.1 KB
|
|
D7k__2017-03-24_15-41-33.JPG
|
333.9 KB
|
|
D7k__2017-03-24_15-43-29.JPG
|
365.6 KB
|
|
D7k__2017-03-24_15-43-32.JPG
|
317.5 KB
|
|
D7k__2017-03-24_15-44-07.JPG
|
270.3 KB
|
|
D7k__2017-03-24_15-46-37.JPG
|
427.8 KB
|
|
D7k__2017-03-24_15-46-40.JPG
|
353.1 KB
|
|
D7k__2017-03-24_16-36-02.JPG
|
326.6 KB
|
|
D7k__2017-03-24_16-36-10.JPG
|
309.5 KB
|
|
D7k__2017-03-24_16-36-12.JPG
|
249.6 KB
|
|
D7k__2017-03-24_16-36-18.JPG
|
339.1 KB
|
|
D7k__2017-03-24_16-36-20.JPG
|
327.8 KB
|
|
D7k__2017-03-24_16-36-28.JPG
|
345.2 KB
|
|
D7k__2017-03-24_16-38-39.JPG
|
357.1 KB
|
|
D7k__2017-03-24_16-38-43.JPG
|
243.4 KB
|
|
D7k__2017-03-24_16-38-50.JPG
|
360.0 KB
|
|
D7k__2017-03-24_16-39-28.JPG
|
361.0 KB
|
|
D7k__2017-03-24_16-39-32.JPG
|
307.1 KB
|
|
D7k__2017-03-24_16-39-33.JPG
|
324.5 KB
|
|
D7k__2017-03-24_16-39-41.JPG
|
351.4 KB
|
|
D7k__2017-03-24_17-21-49.JPG
|
337.7 KB
|
|
D7k__2017-03-24_17-21-53.JPG
|
330.5 KB
|
|
D7k__2017-03-24_17-22-01.JPG
|
387.7 KB
|
|
D7k__2017-03-24_17-23-09.JPG
|
346.5 KB
|
|
D7k__2017-03-24_17-23-14.JPG
|
317.8 KB
|
|
D7k__2017-03-24_17-23-22.JPG
|
327.7 KB
|
|
D7k__2017-03-24_17-23-24.JPG
|
233.8 KB
|
|
D7k__2017-03-24_17-23-34.JPG
|
227.3 KB
|
|
D7k__2017-03-24_17-24-48.JPG
|
350.9 KB
|
|
D7k__2017-03-24_17-24-59.JPG
|
333.1 KB
|
|
D7k__2017-03-24_17-25-03.JPG
|
319.5 KB
|
|
D7k__2017-03-24_17-25-17.JPG
|
282.4 KB
|
|
D7k__2017-03-24_18-03-56.JPG
|
307.9 KB
|
|
D7k__2017-03-24_18-13-27.JPG
|
508.1 KB
|
|
D7k__2017-03-24_18-13-30.JPG
|
463.2 KB
|
|
D7k__2017-03-24_18-15-38.JPG
|
439.7 KB
|
|
D7k__2017-03-24_18-15-44.JPG
|
394.4 KB
|
|
D7k__2017-03-24_18-23-36.JPG
|
371.0 KB
|
|
D7k__2017-03-24_18-24-18.JPG
|
407.2 KB
|
|
D7k__2017-03-24_18-24-24.JPG
|
395.5 KB
|
|
D7k__2017-03-24_18-25-07.JPG
|
390.3 KB
|
|
D7k__2017-03-24_18-25-20.JPG
|
342.2 KB
|
|
D7k__2017-03-24_18-25-27.JPG
|
352.4 KB
|
|
D7k__2017-03-24_18-25-32.JPG
|
380.2 KB
|
|
D7k__2017-03-24_18-26-24.JPG
|
365.6 KB
|
|
D7k__2017-03-24_18-26-29.JPG
|
405.4 KB
|
|
D7k__2017-03-24_18-26-41.JPG
|
448.0 KB
|
|
D7k__2017-03-24_18-26-46.JPG
|
414.0 KB
|
|
D7k__2017-03-24_18-27-24.JPG
|
409.8 KB
|
|
D7k__2017-03-24_19-58-30.JPG
|
394.6 KB
|
|
D7k__2017-03-24_19-58-38.JPG
|
341.9 KB
|
|
D7k__2017-03-24_19-58-50.JPG
|
385.1 KB
|
|
D7k__2017-03-24_20-33-02.JPG
|
359.9 KB
|
|
D7k__2017-03-25_00-12-49.JPG
|
413.2 KB
|
|
D7k__2017-03-25_00-35-04.JPG
|
444.7 KB
|
|
D7k__2017-03-25_01-42-13.JPG
|
386.5 KB
|
|
D7k__2017-03-25_01-42-14.JPG
|
380.5 KB
|
|
D7k__2017-03-25_01-42-15.JPG
|
387.7 KB
|
|
D7k__2017-03-25_04-10-39.JPG
|
258.9 KB
|
|
D7k__2017-03-25_04-17-15.JPG
|
322.2 KB
|
|
D7k__2017-03-25_04-33-18.JPG
|
449.3 KB
|
|
D7k__2017-03-25_04-34-08.JPG
|
394.1 KB
|
|
D7k__2017-03-25_04-35-11.JPG
|
372.0 KB
|
|
D7k__2017-03-25_04-35-18.JPG
|
357.2 KB
|
|
D7k__2017-03-25_04-36-07.JPG
|
412.5 KB
|
|
D7k__2017-03-25_04-36-07twit.jpg
|
230.3 KB
|
|
D7k__2017-03-25_04-37-19.JPG
|
409.7 KB
|
|
D7k__2017-03-25_04-37-19twit.jpg
|
228.6 KB
|
|
D7k__2017-03-25_04-38-44a.JPG
|
405.0 KB
|
|
D7k__2017-03-25_04-38-44atwit.jpg
|
207.0 KB
|
|
D7k__2017-03-25_04-38-44b.JPG
|
381.2 KB
|
|
D7k__2017-03-25_04-38-46.JPG
|
390.3 KB
|
|
Insomni'hack 2018/
|
|
5G Machine Learning - Craig Gibson, Trend Micro.mp4
|
79.5 MB
|
|
A Brief History of CTF - Jordan Wiens.mp4
|
59.9 MB
|
|
A walk with Shannon - A walkthrough of a pwn2own baseband exploit - Amat Cama.mp4
|
40.5 MB
|
|
Abusing Android In-app Billing feature - Jérémy Matos.mp4
|
73.3 MB
|
|
Attacking .NET deserialization - Alvaro Muñoz.mp4
|
52.3 MB
|
|
Battle of the Smarts - Hacking Smartphones with Bluetooth Smart - Tal Melamed.mp4
|
80.7 MB
|
|
DPAPI and DPAPI-NG - Decrypting All Users’ Secrets and PFX Passwords - Paula Januszkewicz.mp4
|
80.3 MB
|
|
Email SPFoofing - modern email security features and how to break them - Roberto Clapis.mp4
|
41.7 MB
|
|
GLibC Malloc for Exploiters - Leak It, Write It, Become a Wizard - Yannay Livneh.mp4
|
79.0 MB
|
|
Hijacking the Boot Process, Ransomware Style - Raul Alvarez, Fortinet.mp4
|
68.0 MB
|
|
How to adapt the SDLC for DevSecOps - Zane Lackey.mp4
|
67.2 MB
|
|
Least privilege security architecture for virtualization and cloud - Ghaleb Zekri, VMware.mp4
|
42.9 MB
|
|
Maximize the power of hex-rays decompiler - Igor Kirillov.mp4
|
40.9 MB
|
|
Microarchitectural Attacks and the Case of Meltdown and Spectre - Daniel Gruss.mp4
|
58.1 MB
|
|
Ph0wn smart devices CTF - Behind the Scenes - Axelle Apvrille & Philippe Paget.mp4
|
61.2 MB
|
|
Quantum Cyber Blochain IoT - Jean-Philippe Aumasson.mp4
|
53.0 MB
|
|
Reducing the Cyber Exposure Gap from Cloud to Containers - Thomas Cueni, Tenable.mp4
|
55.7 MB
|
|
SAP Incident Response, real life examples on how to attack and defend - Jordan Santarsieri.mp4
|
63.2 MB
|
|
Security by Design - Reality vs Expectations - Julien Patriarca, Wallix.mp4
|
26.9 MB
|
|
Take or Buy - Michael Hausding.mp4
|
63.6 MB
|
|
Unboxing your virtualBox - Niklas Baumstark.mp4
|
52.6 MB
|
|
Unmasking stealth operations using UBA super powers - Snir Ben-Shimol, Varonis.mp4
|
76.4 MB
|
|
Using Artificial Intelligence to Predict Malicious Infrastructure Activity - Staffan Truvé.mp4
|
69.7 MB
|
|
/.../Insomni'hack 2018 captions/
|
|
5G Machine Learning - Craig Gibson, Trend Micro.eng.srt
|
154.9 KB
|
|
A Brief History of CTF - Jordan Wiens.eng.srt
|
171.2 KB
|
|
A walk with Shannon - A walkthrough of a pwn2own baseband exploit - Amat Cama.eng.srt
|
84.8 KB
|
|
Abusing Android In-app Billing feature - Jérémy Matos.eng.json
|
2.1 MB
|
|
Abusing Android In-app Billing feature - Jérémy Matos.eng.lrc
|
51.1 KB
|
|
Abusing Android In-app Billing feature - Jérémy Matos.eng.srt
|
57.1 KB
|
|
Abusing Android In-app Billing feature - Jérémy Matos.eng.text
|
37.8 KB
|
|
Abusing Android In-app Billing feature - Jérémy Matos.eng.tsv
|
45.7 KB
|
|
Abusing Android In-app Billing feature - Jérémy Matos.eng.txt
|
51.6 KB
|
|
Abusing Android In-app Billing feature - Jérémy Matos.eng.vtt
|
51.6 KB
|
|
Attacking .NET deserialization - Alvaro Muñoz.eng.srt
|
105.3 KB
|
|
Battle of the Smarts - Hacking Smartphones with Bluetooth Smart - Tal Melamed.eng.srt
|
109.7 KB
|
|
DPAPI and DPAPI-NG - Decrypting All Users’ Secrets and PFX Passwords - Paula Januszkewicz.eng.srt
|
181.4 KB
|
|
Email SPFoofing - modern email security features and how to break them - Roberto Clapis.eng.srt
|
78.1 KB
|
|
GLibC Malloc for Exploiters - Leak It, Write It, Become a Wizard - Yannay Livneh.eng.srt
|
123.0 KB
|
|
Hijacking the Boot Process, Ransomware Style - Raul Alvarez, Fortinet.eng.srt
|
112.9 KB
|
|
How to adapt the SDLC for DevSecOps - Zane Lackey.eng.srt
|
176.7 KB
|
|
Least privilege security architecture for virtualization and cloud - Ghaleb Zekri, VMware.eng.srt
|
77.4 KB
|
|
Maximize the power of hex-rays decompiler - Igor Kirillov.eng.srt
|
81.5 KB
|
|
Microarchitectural Attacks and the Case of Meltdown and Spectre - Daniel Gruss.eng.srt
|
141.9 KB
|
|
Ph0wn smart devices CTF - Behind the Scenes - Axelle Apvrille & Philippe Paget.eng.srt
|
132.8 KB
|
|
Quantum Cyber Blochain IoT - Jean-Philippe Aumasson.eng.srt
|
133.0 KB
|
|
Reducing the Cyber Exposure Gap from Cloud to Containers - Thomas Cueni, Tenable.eng.srt
|
93.8 KB
|
|
SAP Incident Response, real life examples on how to attack and defend - Jordan Santarsieri.eng.srt
|
131.6 KB
|
|
Security by Design - Reality vs Expectations - Julien Patriarca, Wallix.eng.srt
|
57.8 KB
|
|
Take or Buy - Michael Hausding.eng.srt
|
132.3 KB
|
|
Unboxing your virtualBox - Niklas Baumstark.eng.srt
|
115.5 KB
|
|
Unmasking stealth operations using UBA super powers - Snir Ben-Shimol, Varonis.eng.srt
|
135.2 KB
|
|
Using Artificial Intelligence to Predict Malicious Infrastructure Activity - Staffan Truvé.eng.srt
|
179.8 KB
|
|
Insomni'hack 2019/
|
|
Addressing privacy GDPR, Cloud, and You by Chris Esquire.mp4
|
18.7 MB
|
|
Analyzing a Portable Wireless Storage Device From 0 to RCE by Qinghao Tang & Shuo Yuan, Qihoo 360.mp4
|
33.5 MB
|
|
Attack surfaces of smart medical infrastructure by Denis Makrushin (@difezza).mp4
|
8.9 MB
|
|
Betrayed by the Android User Interface Why a Trusted UI Matters by Yanick Fratantonio (@reyammer).mp4
|
15.4 MB
|
|
Building a flexible hypervisor-level debugger by Mathieu Tarral (@mtarral).mp4
|
15.5 MB
|
|
Cryptocurrency mobile malware by Axelle Apvrille (@cryptax), Fortinet.mp4
|
17.6 MB
|
|
Dear Blue Team Forensics Advice to Supercharge your DFIR capabilities by Joe Gray (@c 3pjoe).mp4
|
48.0 MB
|
|
Digitalisation demands defensive action by Daniel Caduff, FONES.mp4
|
23.3 MB
|
|
Exploits in Wetware by Robert Sell (@robertesell).mp4
|
11.3 MB
|
|
From the cloud to the internal network - Offense vs Defense by Snir Ben-Shimol, Varonis.mp4
|
67.9 MB
|
|
Growing Hypervisor 0day with Hyperseed by Shawn Denbow (@sdenbow ), Microsoft.mp4
|
52.9 MB
|
|
How to investigate iOS devices by Paul Rascagneres (@r00tbsd), Talos.mp4
|
18.1 MB
|
|
Keynote - Medieval Castles and Modern Servers by Christian Folini (@ChrFolini).mp4
|
66.0 MB
|
|
Let's hack the IoT Hub with Pwnhub dudes IoT Hub Exploitation by Jisub Kim (@JisubK), Kanghyun Choi.mp4
|
16.0 MB
|
|
NSX-T Architecture & Benefits by Erik Bussink, VMware.mp4
|
69.4 MB
|
|
On the Security of Dockless Bike Sharing Services by Antoine Neuenschwander (@ant0inet).mp4
|
13.4 MB
|
|
Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard, Riscure.mp4
|
65.6 MB
|
|
Security Analysis on the Attack Surface of Blockchain Client by Chen Nan & Kame Wang, Tencent.mp4
|
15.6 MB
|
|
Sneaking Past Device Guard by Philip Tsukerman (@philiptsukerman), Cybereason.mp4
|
26.1 MB
|
|
Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarcieri.mp4
|
19.0 MB
|
|
The Evolution of Cloud Threats by Paolo Passeri (@paulsparrows), Netskope.mp4
|
55.0 MB
|
|
These are the Droids you are looking for - security research on Android by Elena Kovakina, Google.mp4
|
15.2 MB
|
|
Threat Hunting Research Methodology A Data Driven Approach by Roberto & Jose Luis Rodriguez.mp4
|
83.0 MB
|
|
Turning your BMC into a revolving door the HPE iLO case by Alexandre Gazet, Fabien Perigaud.mp4
|
30.0 MB
|
|
Vulnerabilities of mobile OAuth 2.0 by Nikita Stupin, Mail.ru.mp4
|
39.6 MB
|
|
Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.mp4
|
17.3 MB
|
|
What every (IT Security) Professional should know about the dark web by Mischa Peters, IntSights.mp4
|
32.3 MB
|
|
/.../Insomni'hack 2019 captions/
|
|
Addressing privacy GDPR, Cloud, and You by Chris Esquire.eng.srt
|
87.5 KB
|
|
Analyzing a Portable Wireless Storage Device From 0 to RCE by Qinghao Tang & Shuo Yuan, Qihoo 360.eng.srt
|
33.0 KB
|
|
Attack surfaces of smart medical infrastructure by Denis Makrushin (@difezza).eng.srt
|
61.7 KB
|
|
Betrayed by the Android User Interface Why a Trusted UI Matters by Yanick Fratantonio (@reyammer).eng.srt
|
99.7 KB
|
|
Building a flexible hypervisor-level debugger by Mathieu Tarral (@mtarral).eng.srt
|
86.5 KB
|
|
Cryptocurrency mobile malware by Axelle Apvrille (@cryptax), Fortinet.eng.srt
|
72.9 KB
|
|
Dear Blue Team Forensics Advice to Supercharge your DFIR capabilities by Joe Gray (@c 3pjoe).eng.srt
|
86.6 KB
|
|
Digitalisation demands defensive action by Daniel Caduff, FONES.eng.srt
|
120.7 KB
|
|
Exploits in Wetware by Robert Sell (@robertesell).eng.srt
|
181.9 KB
|
|
From the cloud to the internal network - Offense vs Defense by Snir Ben-Shimol, Varonis.eng.srt
|
91.1 KB
|
|
Growing Hypervisor 0day with Hyperseed by Shawn Denbow (@sdenbow ), Microsoft.eng.srt
|
86.0 KB
|
|
How to investigate iOS devices by Paul Rascagneres (@r00tbsd), Talos.eng.srt
|
62.0 KB
|
|
Keynote - Medieval Castles and Modern Servers by Christian Folini (@ChrFolini).eng.srt
|
79.4 KB
|
|
Let's hack the IoT Hub with Pwnhub dudes IoT Hub Exploitation by Jisub Kim (@JisubK), Kanghyun Choi.eng.srt
|
52.2 KB
|
|
NSX-T Architecture & Benefits by Erik Bussink, VMware.eng.srt
|
68.6 KB
|
|
On the Security of Dockless Bike Sharing Services by Antoine Neuenschwander (@ant0inet).eng.srt
|
63.3 KB
|
|
Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard, Riscure.eng.json
|
2.4 MB
|
|
Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard, Riscure.eng.lrc
|
58.7 KB
|
|
Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard, Riscure.eng.srt
|
64.8 KB
|
|
Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard, Riscure.eng.text
|
45.2 KB
|
|
Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard, Riscure.eng.tsv
|
53.2 KB
|
|
Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard, Riscure.eng.txt
|
59.2 KB
|
|
Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard, Riscure.eng.vtt
|
59.2 KB
|
|
Security Analysis on the Attack Surface of Blockchain Client by Chen Nan & Kame Wang, Tencent.eng.srt
|
63.1 KB
|
|
Sneaking Past Device Guard by Philip Tsukerman (@philiptsukerman), Cybereason.eng.srt
|
72.4 KB
|
|
Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarcieri.eng.srt
|
96.2 KB
|
|
The Evolution of Cloud Threats by Paolo Passeri (@paulsparrows), Netskope.eng.srt
|
62.2 KB
|
|
These are the Droids you are looking for - security research on Android by Elena Kovakina, Google.eng.srt
|
65.8 KB
|
|
Threat Hunting Research Methodology A Data Driven Approach by Roberto & Jose Luis Rodriguez.eng.srt
|
122.8 KB
|
|
Turning your BMC into a revolving door the HPE iLO case by Alexandre Gazet, Fabien Perigaud.eng.srt
|
82.5 KB
|
|
Vulnerabilities of mobile OAuth 2.0 by Nikita Stupin, Mail.ru.eng.srt
|
44.7 KB
|
|
Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.eng.srt
|
61.5 KB
|
|
What every (IT Security) Professional should know about the dark web by Mischa Peters, IntSights.eng.srt
|
52.2 KB
|
|
Insomni'hack 2022/
|
|
A Blackbox Fuzzer For Bypassing Rowhammer Mitigation On DDR4 DRAM by Patrick Jattke and Stijn Gunter.mp4
|
77.5 MB
|
|
A Common Bypass Pattern To Exploit Modern Web Apps by Simon Scannell.mp4
|
46.0 MB
|
|
A Framework To Improve Collaboration Between Lawmakers And Cybersecurity Experts by Chris Esquire.mp4
|
54.5 MB
|
|
Adventurous Tales Of Online Voting In Switzerland by Christian Folini.mp4
|
78.6 MB
|
|
Attacking Bluetooth LE Design And Impl. In Mobile Wearables by Rahul Umapathi and Nitin Lakshmanan.mp4
|
47.8 MB
|
|
Automatically Extracting Static Anti-virus Signatures by Vladimir Meier.mp4
|
70.7 MB
|
|
Breaking SecureBoot With SMM by Itai Liba & Assaf Carlsbad.mp4
|
64.6 MB
|
|
Delegating Kerberos To Bypass Kerberos Delegation Limitation by Charlie Bromberg.mp4
|
68.6 MB
|
|
Elevate your security in the cloud with Telsys and AWS by C. Szajkowski and G. Schmitt.mp4
|
56.2 MB
|
|
Exploiting WebKit To Break Authentication And Authorization by Sachin Thakuri & Prakash Sharma.mp4
|
38.0 MB
|
|
Forging Golden Hammer Against Android App Protections by Georges-Bastien Michel.mp4
|
76.4 MB
|
|
Hook, Line And Sinker Pillaging API Webhooks by Abhay Bhargav.mp4
|
48.8 MB
|
|
How We've Built One Of The Most Secure Media Companies In The World by Andreas Schneider.mp4
|
86.1 MB
|
|
Hunting For Bugs In - Ethereum 2.0 - by Denis Kolegov and JP Aumasson.mp4
|
52.3 MB
|
|
Insomni-REWsploit-2022.pdf
|
127.0 KB
|
|
It’s Raining Shells - How To Find New Attack Primitives In Azure by Andy Robbins.mp4
|
73.2 MB
|
|
It's Raining Shells.pdf
|
127.3 KB
|
|
Loose Lips Might Sink Clouds by Jason Hill and Dvir Sason.mp4
|
60.4 MB
|
|
Managing Large-Scale Response by Mathias Fuchs.mp4
|
75.7 MB
|
|
Noise And Signals - Digging Through Threat- And APT-stories by Marco Preuss.mp4
|
82.1 MB
|
|
Practical Bruteforce Of Military Grade AES-1024 by Sylvain Pelissier and Boi Sletterink.mp4
|
55.3 MB
|
|
Practical Exploitation Of Zigbee Networks With RF Transceivers by Nitin Lakshmanan & Sunil Kumar.mp4
|
43.7 MB
|
|
Raising Employee Awareness Which Training Strategy To Go For by Eric Bärenzung.mp4
|
41.8 MB
|
|
Ransomware Encryption Internals A Behavioral Characterization by Antonio Cocomazzi.mp4
|
62.4 MB
|
|
REW-sploit Dissect Payloads With Ease by Cesare Pizzi.mp4
|
63.6 MB
|
|
Securing Critical Infrastructures With Fortinet by Dino-Boris Dougoud.mp4
|
65.5 MB
|
|
Stop This Car - GTFO by Karim Sudki.mp4
|
51.8 MB
|
|
Symbolic Execution Demystified by Jannis Kirschner.mp4
|
47.8 MB
|
|
The Nym Network Deep-dive by Simon Wicky.mp4
|
50.4 MB
|
|
Two Bugs To Rule Them All Taking Over The PHP Supply Chain by Thomas Chauchefoin.mp4
|
61.6 MB
|
|
Void Balaur A Cyber Mercenary From The Underground by Feike Hacquebord.mp4
|
49.6 MB
|
|
/.../Insomni'hack 2022 captions/
|
|
A Blackbox Fuzzer For Bypassing Rowhammer Mitigation On DDR4 DRAM by Patrick Jattke and Stijn Gunter.eng.srt
|
110.1 KB
|
|
A Common Bypass Pattern To Exploit Modern Web Apps by Simon Scannell.eng.srt
|
73.7 KB
|
|
A Framework To Improve Collaboration Between Lawmakers And Cybersecurity Experts by Chris Esquire.eng.srt
|
85.0 KB
|
|
Adventurous Tales Of Online Voting In Switzerland by Christian Folini.eng.srt
|
131.6 KB
|
|
Attacking Bluetooth LE Design And Impl. In Mobile Wearables by Rahul Umapathi and Nitin Lakshmanan.eng.srt
|
68.2 KB
|
|
Automatically Extracting Static Anti-virus Signatures by Vladimir Meier.eng.srt
|
71.8 KB
|
|
Breaking SecureBoot With SMM by Itai Liba & Assaf Carlsbad.eng.srt
|
77.0 KB
|
|
Delegating Kerberos To Bypass Kerberos Delegation Limitation by Charlie Bromberg.eng.srt
|
96.4 KB
|
|
Elevate your security in the cloud with Telsys and AWS by C. Szajkowski and G. Schmitt.eng.srt
|
81.5 KB
|
|
Exploiting WebKit To Break Authentication And Authorization by Sachin Thakuri & Prakash Sharma.eng.srt
|
57.6 KB
|
|
Forging Golden Hammer Against Android App Protections by Georges-Bastien Michel.eng.srt
|
98.8 KB
|
|
Hook, Line And Sinker Pillaging API Webhooks by Abhay Bhargav.eng.srt
|
81.4 KB
|
|
How We've Built One Of The Most Secure Media Companies In The World by Andreas Schneider.eng.srt
|
92.4 KB
|
|
Hunting For Bugs In - Ethereum 2.0 - by Denis Kolegov and JP Aumasson.eng.srt
|
81.4 KB
|
|
It’s Raining Shells - How To Find New Attack Primitives In Azure by Andy Robbins.eng.srt
|
100.6 KB
|
|
Loose Lips Might Sink Clouds by Jason Hill and Dvir Sason.eng.srt
|
92.0 KB
|
|
Managing Large-Scale Response by Mathias Fuchs.eng.srt
|
117.6 KB
|
|
Noise And Signals - Digging Through Threat- And APT-stories by Marco Preuss.eng.srt
|
88.7 KB
|
|
Practical Bruteforce Of Military Grade AES-1024 by Sylvain Pelissier and Boi Sletterink.eng.srt
|
94.5 KB
|
|
Practical Exploitation Of Zigbee Networks With RF Transceivers by Nitin Lakshmanan & Sunil Kumar.eng.srt
|
62.8 KB
|
|
Raising Employee Awareness Which Training Strategy To Go For by Eric Bärenzung.eng.srt
|
64.7 KB
|
|
Ransomware Encryption Internals A Behavioral Characterization by Antonio Cocomazzi.eng.srt
|
99.9 KB
|
|
REW-sploit Dissect Payloads With Ease by Cesare Pizzi.eng.srt
|
83.1 KB
|
|
Securing Critical Infrastructures With Fortinet by Dino-Boris Dougoud.eng.srt
|
80.3 KB
|
|
Stop This Car - GTFO by Karim Sudki.eng.srt
|
87.3 KB
|
|
Symbolic Execution Demystified by Jannis Kirschner.eng.srt
|
70.1 KB
|
|
The Nym Network Deep-dive by Simon Wicky.eng.srt
|
77.8 KB
|
|
Two Bugs To Rule Them All Taking Over The PHP Supply Chain by Thomas Chauchefoin.eng.srt
|
98.2 KB
|
|
Void Balaur A Cyber Mercenary From The Underground by Feike Hacquebord.eng.json
|
1.6 MB
|
|
Void Balaur A Cyber Mercenary From The Underground by Feike Hacquebord.eng.lrc
|
40.4 KB
|
|
Void Balaur A Cyber Mercenary From The Underground by Feike Hacquebord.eng.srt
|
45.5 KB
|
|
Void Balaur A Cyber Mercenary From The Underground by Feike Hacquebord.eng.text
|
29.0 KB
|
|
Void Balaur A Cyber Mercenary From The Underground by Feike Hacquebord.eng.tsv
|
35.7 KB
|
|
Void Balaur A Cyber Mercenary From The Underground by Feike Hacquebord.eng.txt
|
40.8 KB
|
|
Void Balaur A Cyber Mercenary From The Underground by Feike Hacquebord.eng.vtt
|
40.8 KB
|
|
Insomni'hack 2023/
|
|
(KEYNOTE) Crazy Incentives And How They Drive Security Into No Man's Land by Dr. Christian Folini.mp4
|
77.3 MB
|
|
(KEYNOTE) The Converging Threat Landscape by Patrice Perche.mp4
|
42.4 MB
|
|
A Ticket Worth Waiting 65 Years For by Charlie Bromberg.mp4
|
53.8 MB
|
|
Adversary Tracking And All The Lies We Tell Ourselves by Joe Slowik.mp4
|
47.6 MB
|
|
Attacking And Defending GraphQL The Ultimate Guide by Leo Juszkiewicz.mp4
|
68.8 MB
|
|
Breaking And Fixing Azure AD Device Identity Security by Dirk - jan Mollema.mp4
|
62.7 MB
|
|
Breaking Docker's Named Pipes SYSTEMatically by Eviatar Gerzi.mp4
|
43.8 MB
|
|
Data Science And Machine Learning In Cybersecurity Hype Or Reality by Angelo Schranko De Oliveira.mp4
|
59.4 MB
|
|
Detection Engineering In Modern Day Security Organization by Tondang Mangatas and Sylvain Lu.mp4
|
59.7 MB
|
|
Finding Malicious PyPI Packages In The Wild by Christophe Tafani - Dereeper And Vladimir De Turckheim.mp4
|
44.2 MB
|
|
Go Security Pitfalls 2 Lessons From The Battlefield At Grafana Labs by Jeremy Matos.mp4
|
51.7 MB
|
|
Hacking Harms Measuring The Impact And Harm From Cyberattacks by Emma Raffray.mp4
|
51.0 MB
|
|
Hacking Your Jump Rope Or Your Coffee Machine by Axelle Apvrille.mp4
|
55.9 MB
|
|
How To Have Visibility And Security OF CICD Ecosystem by Pramod Rana.mp4
|
41.5 MB
|
|
Inglourious Drivers The Revenge Of The Peripheral Devices by Omer Tsarfati.mp4
|
49.6 MB
|
|
Modern Adventures With Legacy Protocols by Yannay Livneh.mp4
|
59.3 MB
|
|
Optimising Business Value With Secure Access Service Edge by Neil Thacker.mp4
|
43.5 MB
|
|
Pentesting By The Numbers What Data Analysis Tells About What We Do by Charl Van Der Walt.mp4
|
60.6 MB
|
|
Permissionless Android Universal Overlays by Dimitrios Valsamaras.mp4
|
60.3 MB
|
|
Secrets, Data And Cypher - injections Neo4j Attacks & Cloud Exploits by Nitay Bachrach and Or Emanuel.mp4
|
48.3 MB
|
|
Stories Of Money Crypto, Hacks, Ransom, DeFi And Attacks by Marco Preuss.mp4
|
57.1 MB
|
|
Targeted Social Engineering Attacks Weaponizing Psychology by Christina Lekati.mp4
|
55.8 MB
|
|
The History Of Ransomware From Floppies To Droppers, And Beyond by Eliad Kimhy.mp4
|
48.9 MB
|
|
The Latest Startups In Cybersecurity & How To Become A Cyber Entrepreneur by Trust Valley Startups.mp4
|
61.1 MB
|
|
Turn And Face The Strange Ch - Ch - Changes In Ransomware Techniques by Lindsay Kaye.mp4
|
43.2 MB
|
|
Uncovering A Critical Vulnerability And Taking Over Decentralized Identity Networks by Shaked Reiner.mp4
|
48.7 MB
|
|
USBvalve Expose USB Activity On The Fly by Cesare Pizzi.mp4
|
55.7 MB
|
|
Use Case Red Teaming A Recently Breached Company by Nuri And Marat.mp4
|
72.7 MB
|
|
Whatever Pown2own by Benoit Forgette & Damien Cauquil.mp4
|
54.7 MB
|
|
Which Models For Secure ICS Network Architectures To Adapt To New Usages by Alexandrine Torrents.mp4
|
54.5 MB
|
|
Why Kidz Couldn’t Care Less About Your Password Advice by Mia Landsem.mp4
|
52.5 MB
|
|
/.../Insomni'hack 2023 captions/
|
|
(KEYNOTE) Crazy Incentives And How They Drive Security Into No Man's Land by Dr. Christian Folini.eng.srt
|
106.0 KB
|
|
(KEYNOTE) The Converging Threat Landscape by Patrice Perche.eng.srt
|
66.7 KB
|
|
A Ticket Worth Waiting 65 Years For by Charlie Bromberg.eng.srt
|
89.9 KB
|
|
Adversary Tracking And All The Lies We Tell Ourselves by Joe Slowik.eng.srt
|
87.5 KB
|
|
Attacking And Defending GraphQL The Ultimate Guide by Leo Juszkiewicz.eng.srt
|
81.9 KB
|
|
Breaking And Fixing Azure AD Device Identity Security by Dirk - jan Mollema.eng.srt
|
101.0 KB
|
|
Breaking Docker's Named Pipes SYSTEMatically by Eviatar Gerzi.eng.srt
|
53.1 KB
|
|
Data Science And Machine Learning In Cybersecurity Hype Or Reality by Angelo Schranko De Oliveira.eng.srt
|
74.7 KB
|
|
Detection Engineering In Modern Day Security Organization by Tondang Mangatas and Sylvain Lu.eng.srt
|
89.8 KB
|
|
Finding Malicious PyPI Packages In The Wild by Christophe Tafani - Dereeper And Vladimir De Turckheim.eng.srt
|
72.0 KB
|
|
Go Security Pitfalls 2 Lessons From The Battlefield At Grafana Labs by Jeremy Matos.eng.srt
|
88.4 KB
|
|
Hacking Harms Measuring The Impact And Harm From Cyberattacks by Emma Raffray.eng.srt
|
80.4 KB
|
|
Hacking Your Jump Rope Or Your Coffee Machine by Axelle Apvrille.eng.srt
|
75.1 KB
|
|
How To Have Visibility And Security OF CICD Ecosystem by Pramod Rana.eng.srt
|
55.6 KB
|
|
Inglourious Drivers The Revenge Of The Peripheral Devices by Omer Tsarfati.eng.srt
|
66.4 KB
|
|
Modern Adventures With Legacy Protocols by Yannay Livneh.eng.srt
|
66.4 KB
|
|
Optimising Business Value With Secure Access Service Edge by Neil Thacker.eng.srt
|
76.8 KB
|
|
Pentesting By The Numbers What Data Analysis Tells About What We Do by Charl Van Der Walt.eng.srt
|
103.4 KB
|
|
Permissionless Android Universal Overlays by Dimitrios Valsamaras.eng.srt
|
91.5 KB
|
|
Secrets, Data And Cypher - injections Neo4j Attacks & Cloud Exploits by Nitay Bachrach and Or Emanuel.eng.srt
|
63.5 KB
|
|
Stories Of Money Crypto, Hacks, Ransom, DeFi And Attacks by Marco Preuss.eng.srt
|
77.9 KB
|
|
Targeted Social Engineering Attacks Weaponizing Psychology by Christina Lekati.eng.srt
|
79.4 KB
|
|
The History Of Ransomware From Floppies To Droppers, And Beyond by Eliad Kimhy.eng.srt
|
58.9 KB
|
|
The Latest Startups In Cybersecurity & How To Become A Cyber Entrepreneur by Trust Valley Startups.eng.srt
|
81.8 KB
|
|
Turn And Face The Strange Ch - Ch - Changes In Ransomware Techniques by Lindsay Kaye.eng.srt
|
71.2 KB
|
|
Uncovering A Critical Vulnerability And Taking Over Decentralized Identity Networks by Shaked Reiner.eng.srt
|
75.0 KB
|
|
USBvalve Expose USB Activity On The Fly by Cesare Pizzi.eng.srt
|
71.5 KB
|
|
Use Case Red Teaming A Recently Breached Company by Nuri And Marat.eng.srt
|
133.5 KB
|
|
Whatever Pown2own by Benoit Forgette & Damien Cauquil.eng.srt
|
74.1 KB
|
|
Which Models For Secure ICS Network Architectures To Adapt To New Usages by Alexandrine Torrents.eng.srt
|
79.8 KB
|
|
Why Kidz Couldn’t Care Less About Your Password Advice by Mia Landsem.eng.srt
|
80.3 KB
|
|
Insomni'hack 2024/
|
|
Abusing Misconfigured OIDC Authentication In Cloud Environments - Christophe Tafani-Dereeper.mp4
|
29.7 MB
|
|
ADDS Persistance - Burn It, Burn It All - Charlie - Shutdown - Bromberg & Volker.mp4
|
58.4 MB
|
|
An Uninvited House Guest How PROXYLIB Overstayed Its Welcome On Android Devices - Lindsay Kaye.mp4
|
43.4 MB
|
|
Beating The Sanitizer Why You Should Add MXSS To Your Toolbox - Paul Gerste & Yaniv Nizry.mp4
|
59.5 MB
|
|
Current Affairs IoT Security 101 - Iana Peix.mp4
|
35.2 MB
|
|
Diving Into JumpServer The Public Key Unlocking Your Whole Network - Oskar Zeino-Mahmalat.mp4
|
61.2 MB
|
|
Don’t Flatten Yourself Restoring Malware With Control-Flow Flattening Obfuscation - Geri Revay.mp4
|
60.5 MB
|
|
Enhancing AWS Security A Holistic Approach To Organization Management - Bogdan Nicorici.mp4
|
73.6 MB
|
|
FuzzyAI Attacking LLMs With Coverage-Guided Fuzzing - Eran Shimony & Mark Cherp.mp4
|
66.6 MB
|
|
Hijacking The Java Virtual Machine And Bypassing Runtime Application Self-Protection - Mouad Kondah.mp4
|
62.1 MB
|
|
How (Not) To Implement Secure Digital IdentityA Study Of Poland's Digital ID System - Szymon Chadam.mp4
|
83.2 MB
|
|
It’s Time For (R)evolution - Charl Van Der Walt.mp4
|
92.5 MB
|
|
Living Off The Land And Attacking Operational Technology With Surgical Precision - Ric Derbyshire.mp4
|
59.4 MB
|
|
Meet The Latest Innovations And Startups In Cybersecurity And How To Become A Cyber Entrepreneur.mp4
|
78.6 MB
|
|
MFT Malicious Fungible Tokens - Mauro Eldritch.mp4
|
47.8 MB
|
|
Microsoft 365's BEC-Detection Engineering Challenges And Opportunities - Eliraz Levi.mp4
|
27.2 MB
|
|
Operation Triangulation Attacks On IPhones iPads - Marco Preuss.mp4
|
73.5 MB
|
|
Patch Different On - OS - John McIntosh.mp4
|
66.8 MB
|
|
Secret Web Hacking Knowledge CTF Authors Hate These Simple Tricks - Philippe Dourassov.mp4
|
47.3 MB
|
|
Smart Toy Vulnerabilities Can Put Your Child At Risk Of Abuse By Strangers - Nikolay Frolov.mp4
|
36.2 MB
|
|
Standing On The Shoulders Of Giant(Dog)s A Kubernetes Attack Graph Model - Julien Terriac.mp4
|
80.8 MB
|
|
The Accessibility Abyss Navigating Android Malware Waters - Axelle Apvrille.mp4
|
62.2 MB
|
|
Threats And Mitigations Landscape In The Age Of Generative AI - Andrei Kucharavy.mp4
|
68.3 MB
|
|
Uncommon Process Injection Pattern - Yoann Dequeker.mp4
|
45.2 MB
|
|
When Malware Becomes Creative A Survey Of Android Detection Evasion Tactics - Dimitrios Valsamaras.mp4
|
55.3 MB
|
|
Why So Optimized - Ege Balci.mp4
|
57.0 MB
|
|
You Gotta Fight For Your Right To Third-Party - Mat Caplan.mp4
|
75.5 MB
|
|
Your NVMe Had Been Syz'ed - Alon Zahavi.mp4
|
32.9 MB
|
|
/.../Insomni'hack 2024 captions/
|
|
Abusing Misconfigured OIDC Authentication In Cloud Environments - Christophe Tafani-Dereeper.eng.srt
|
46.2 KB
|
|
ADDS Persistance - Burn It, Burn It All - Charlie - Shutdown - Bromberg & Volker.eng.srt
|
88.0 KB
|
|
An Uninvited House Guest How PROXYLIB Overstayed Its Welcome On Android Devices - Lindsay Kaye.eng.srt
|
81.2 KB
|
|
Beating The Sanitizer Why You Should Add MXSS To Your Toolbox - Paul Gerste & Yaniv Nizry.eng.srt
|
75.6 KB
|
|
Current Affairs IoT Security 101 - Iana Peix.eng.srt
|
64.7 KB
|
|
Diving Into JumpServer The Public Key Unlocking Your Whole Network - Oskar Zeino-Mahmalat.eng.srt
|
96.7 KB
|
|
Don’t Flatten Yourself Restoring Malware With Control-Flow Flattening Obfuscation - Geri Revay.eng.srt
|
81.7 KB
|
|
Enhancing AWS Security A Holistic Approach To Organization Management - Bogdan Nicorici.eng.srt
|
92.2 KB
|
|
FuzzyAI Attacking LLMs With Coverage-Guided Fuzzing - Eran Shimony & Mark Cherp.eng.srt
|
89.2 KB
|
|
Hijacking The Java Virtual Machine And Bypassing Runtime Application Self-Protection - Mouad Kondah.eng.srt
|
82.1 KB
|
|
How (Not) To Implement Secure Digital IdentityA Study Of Poland's Digital ID System - Szymon Chadam.eng.srt
|
94.7 KB
|
|
It’s Time For (R)evolution - Charl Van Der Walt.eng.srt
|
125.5 KB
|
|
Living Off The Land And Attacking Operational Technology With Surgical Precision - Ric Derbyshire.eng.srt
|
83.0 KB
|
|
Meet The Latest Innovations And Startups In Cybersecurity And How To Become A Cyber Entrepreneur.eng.srt
|
87.3 KB
|
|
MFT Malicious Fungible Tokens - Mauro Eldritch.eng.srt
|
57.1 KB
|
|
Microsoft 365's BEC-Detection Engineering Challenges And Opportunities - Eliraz Levi.eng.srt
|
28.7 KB
|
|
Operation Triangulation Attacks On IPhones iPads - Marco Preuss.eng.srt
|
66.5 KB
|
|
Patch Different On - OS - John McIntosh.eng.srt
|
109.2 KB
|
|
Secret Web Hacking Knowledge CTF Authors Hate These Simple Tricks - Philippe Dourassov.eng.srt
|
70.1 KB
|
|
Smart Toy Vulnerabilities Can Put Your Child At Risk Of Abuse By Strangers - Nikolay Frolov.eng.srt
|
35.6 KB
|
|
Standing On The Shoulders Of Giant(Dog)s A Kubernetes Attack Graph Model - Julien Terriac.eng.srt
|
85.8 KB
|
|
The Accessibility Abyss Navigating Android Malware Waters - Axelle Apvrille.eng.srt
|
79.2 KB
|
|
Threats And Mitigations Landscape In The Age Of Generative AI - Andrei Kucharavy.eng.srt
|
100.7 KB
|
|
Uncommon Process Injection Pattern - Yoann Dequeker.eng.srt
|
65.8 KB
|
|
When Malware Becomes Creative A Survey Of Android Detection Evasion Tactics - Dimitrios Valsamaras.eng.srt
|
67.3 KB
|
|
Why So Optimized - Ege Balci.eng.srt
|
70.4 KB
|
|
You Gotta Fight For Your Right To Third-Party - Mat Caplan.eng.srt
|
69.5 KB
|
|
Your NVMe Had Been Syz'ed - Alon Zahavi.eng.srt
|
41.6 KB
|
|
Insomni'hack 2025/
|
|
20 Years Of Cybersecurity Automation Has AI Restored Balance To The Force - Raphaël Marichez.mp4
|
66.1 MB
|
|
A Slice Of - Modern Program Analysis - Kyle Martin.mp4
|
61.1 MB
|
|
Advanced Android Archaeology Baffled By Bloated Complexity - Mathias Payer.mp4
|
76.1 MB
|
|
Beyond LSASS Cutting-Edge Techniques For Undetectable Threat Emulation - Priyank Nigam.mp4
|
56.4 MB
|
|
Beyond The Surface Exploring Attacker Persistence Strategies In Kubernetes - Rory McCune.mp4
|
50.4 MB
|
|
Cache Me If You Can Smuggling Payloads Via Browser Caching Systems - Aurélien Chalot.mp4
|
67.9 MB
|
|
Cyber Innovation - Laurent Balmelli & Hugo Flayac & Aziz Belkhiria & Olivier Crochat & Lennig Pedron.mp4
|
86.5 MB
|
|
Demystifying Automated City Shuttles Blessing Or Cybersecurity Nightmare - Anastasija Collen.mp4
|
57.0 MB
|
|
Go Parser Footguns - Vasco Franco.mp4
|
49.1 MB
|
|
Good Models Gone Bad Visualizing Data Poisoning - Maria Khodak.mp4
|
41.0 MB
|
|
Hacking Into Fedora And OpenSUSE - Thomas Chauchefoin & Maxime Rinaudo.mp4
|
58.9 MB
|
|
Improving Your Hunting And Detection In Entra ID And O365 - John Stoner.mp4
|
67.4 MB
|
|
Introduction - Raphaël Conz.mp4
|
24.1 MB
|
|
Malware Analysis With R2AI - Axelle Apvrille.mp4
|
62.1 MB
|
|
Next-Gen Hiring Meets AI, Cybersecurity, And Inclusion - Panel Discussion.mp4
|
57.2 MB
|
|
Pioneering Zero Days At Pwn2Own Automotive 2024 - Alex Plaskett & McCaulay Hudson.mp4
|
69.0 MB
|
|
Stop Making Nonsense Cutting Through Compliance Complexity - Mat Caplan.mp4
|
87.4 MB
|
|
The AI Paradox Safety Vs Performance - Rachid Guerraoui.mp4
|
50.4 MB
|
|
The Rise Of AI-Driven Malware Threats, Myths, And Defenses - Candid Wuest.mp4
|
69.7 MB
|
|
The Spy Who Flashed Me Exploring And Defeating Physical Access Control Systems - Michael Rodger.mp4
|
58.8 MB
|
|
What If I Told You That Security Is Here To Help - Sebastian Avarvarei.mp4
|
65.7 MB
|
|
Your Identity Is Mine Techniques And Insights From OS Identity Providers Research - Maor Abutbul.mp4
|
47.6 MB
|
|
/.../Insomni'hack 2025 captions/
|
|
20 Years Of Cybersecurity Automation Has AI Restored Balance To The Force - Raphaël Marichez.eng.srt
|
78.3 KB
|
|
A Slice Of - Modern Program Analysis - Kyle Martin.eng.srt
|
85.1 KB
|
|
Advanced Android Archaeology Baffled By Bloated Complexity - Mathias Payer.eng.srt
|
99.9 KB
|
|
Beyond LSASS Cutting-Edge Techniques For Undetectable Threat Emulation - Priyank Nigam.eng.srt
|
81.4 KB
|
|
Beyond The Surface Exploring Attacker Persistence Strategies In Kubernetes - Rory McCune.eng.srt
|
91.6 KB
|
|
Cache Me If You Can Smuggling Payloads Via Browser Caching Systems - Aurélien Chalot.eng.srt
|
85.5 KB
|
|
Cyber Innovation - Laurent Balmelli & Hugo Flayac & Aziz Belkhiria & Olivier Crochat & Lennig Pedron.eng.srt
|
108.9 KB
|
|
Demystifying Automated City Shuttles Blessing Or Cybersecurity Nightmare - Anastasija Collen.eng.srt
|
82.1 KB
|
|
Go Parser Footguns - Vasco Franco.eng.srt
|
70.3 KB
|
|
Good Models Gone Bad Visualizing Data Poisoning - Maria Khodak.eng.srt
|
59.8 KB
|
|
Hacking Into Fedora And OpenSUSE - Thomas Chauchefoin & Maxime Rinaudo.eng.srt
|
82.0 KB
|
|
Improving Your Hunting And Detection In Entra ID And O365 - John Stoner.eng.srt
|
116.7 KB
|
|
Introduction - Raphaël Conz.eng.srt
|
21.7 KB
|
|
Malware Analysis With R2AI - Axelle Apvrille.eng.srt
|
73.7 KB
|
|
Next-Gen Hiring Meets AI, Cybersecurity, And Inclusion - Panel Discussion.eng.srt
|
88.6 KB
|
|
Pioneering Zero Days At Pwn2Own Automotive 2024 - Alex Plaskett & McCaulay Hudson.eng.srt
|
94.7 KB
|
|
Stop Making Nonsense Cutting Through Compliance Complexity - Mat Caplan.eng.json
|
1.8 MB
|
|
Stop Making Nonsense Cutting Through Compliance Complexity - Mat Caplan.eng.lrc
|
45.9 KB
|
|
Stop Making Nonsense Cutting Through Compliance Complexity - Mat Caplan.eng.srt
|
50.6 KB
|
|
Stop Making Nonsense Cutting Through Compliance Complexity - Mat Caplan.eng.text
|
35.5 KB
|
|
Stop Making Nonsense Cutting Through Compliance Complexity - Mat Caplan.eng.tsv
|
41.6 KB
|
|
Stop Making Nonsense Cutting Through Compliance Complexity - Mat Caplan.eng.txt
|
46.3 KB
|
|
Stop Making Nonsense Cutting Through Compliance Complexity - Mat Caplan.eng.vtt
|
46.3 KB
|
|
The AI Paradox Safety Vs Performance - Rachid Guerraoui.eng.srt
|
77.1 KB
|
|
The Rise Of AI-Driven Malware Threats, Myths, And Defenses - Candid Wuest.eng.srt
|
100.8 KB
|
|
The Spy Who Flashed Me Exploring And Defeating Physical Access Control Systems - Michael Rodger.eng.srt
|
95.3 KB
|
|
What If I Told You That Security Is Here To Help - Sebastian Avarvarei.eng.srt
|
89.1 KB
|
|
Your Identity Is Mine Techniques And Insights From OS Identity Providers Research - Maor Abutbul.eng.srt
|
42.9 KB
|
|
Total files 811
|