files/Hacktivity/Hacktivity 19 2022/

NameSizeLast modification

Parent directory

A GREAT Sewing Workshop by Pierre Delcher.eng.srt35.2 KiB2 years ago

35.2 KiB2024-03-10 22:07:43 +13:00 2 years ago

A GREAT Sewing Workshop by Pierre Delcher.mp427.5 MiB2 years ago

27.5 MiB2024-03-10 22:08:29 +13:00 2 years ago

A New Default Value of OpenSSL could Multiply a DoS Potential by Szilárd Pfeiffer.eng.srt30.3 KiB2 years ago

30.3 KiB2024-03-10 22:08:29 +13:00 2 years ago

A New Default Value of OpenSSL could Multiply a DoS Potential by Szilárd Pfeiffer.mp423.2 MiB2 years ago

23.2 MiB2024-03-10 22:09:05 +13:00 2 years ago

Applying ATT&CK to Analyze Ransomware Campaigns by Marc Rivero López.eng.srt63.0 KiB2 years ago

63.0 KiB2024-03-10 22:09:05 +13:00 2 years ago

Applying ATT&CK to Analyze Ransomware Campaigns by Marc Rivero López.mp445.9 MiB2 years ago

45.9 MiB2024-03-10 22:41:42 +13:00 2 years ago

Automating Binary Analysis with Ghidra's P-Code by Gergely Révay.eng.srt60.8 KiB2 years ago

60.8 KiB2024-03-10 22:41:42 +13:00 2 years ago

Automating Binary Analysis with Ghidra's P-Code by Gergely Révay.mp447.3 MiB2 years ago

47.3 MiB2024-03-10 22:42:15 +13:00 2 years ago

Automotive Threat Intelligence by Péter Venesz & Giuseppe Serio.eng.srt58.0 KiB2 years ago

58.0 KiB2024-03-10 22:40:17 +13:00 2 years ago

Automotive Threat Intelligence by Péter Venesz & Giuseppe Serio.mp443.4 MiB2 years ago

43.4 MiB2024-03-10 22:40:35 +13:00 2 years ago

Broad View to Automotive Security & Penn testing by András Kabai & László Tóth.eng.srt73.3 KiB2 years ago

73.3 KiB2024-03-10 22:30:04 +13:00 2 years ago

Broad View to Automotive Security & Penn testing by András Kabai & László Tóth.mp486.3 MiB2 years ago

86.3 MiB2024-03-10 22:30:29 +13:00 2 years ago

Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal.mp465.6 MiB2 years ago

65.6 MiB2024-03-10 22:31:04 +13:00 2 years ago

Cybersecurity Cannot Ignore Climate Change by Chloé Messdaghi.eng.srt52.4 KiB2 years ago

52.4 KiB2024-03-10 22:31:04 +13:00 2 years ago

Cybersecurity Cannot Ignore Climate Change by Chloé Messdaghi.mp427.8 MiB2 years ago

27.8 MiB2024-03-10 22:39:10 +13:00 2 years ago

DDoS Testing Your Infrastructure, including IPv6 SYN floods by Henrik Kramselund.eng.srt76.7 KiB2 years ago

76.7 KiB2024-03-10 22:39:11 +13:00 2 years ago

DDoS Testing Your Infrastructure, including IPv6 SYN floods by Henrik Kramselund.mp444.5 MiB2 years ago

44.5 MiB2024-03-10 22:39:35 +13:00 2 years ago

Developer in a Digital Crosshair, 2022 Edition by Mateusz Olejarka.eng.srt31.8 KiB2 years ago

31.8 KiB2024-03-10 22:36:08 +13:00 2 years ago

Developer in a Digital Crosshair, 2022 Edition by Mateusz Olejarka.mp423.7 MiB2 years ago

23.7 MiB2024-03-10 22:36:30 +13:00 2 years ago

DiceyF Deploys the GamePlayerFramework by Kurt Baumgartner & Georgy Kucherin.eng.srt68.8 KiB2 years ago

68.8 KiB2024-03-10 22:36:30 +13:00 2 years ago

DiceyF Deploys the GamePlayerFramework by Kurt Baumgartner & Georgy Kucherin.mp447.7 MiB2 years ago

47.7 MiB2024-03-10 22:36:35 +13:00 2 years ago

Everyday Numbers to Break Not So Everyday Software by Márk Módly.eng.srt24.9 KiB2 years ago

24.9 KiB2024-03-10 22:33:29 +13:00 2 years ago

Everyday Numbers to Break Not So Everyday Software by Márk Módly.mp428.1 MiB2 years ago

28.1 MiB2024-03-10 22:34:04 +13:00 2 years ago

Fault Injection (FI) Attacks Against Embedded Systems by András Kabai.eng.srt67.7 KiB2 years ago

67.7 KiB2024-03-10 22:13:38 +13:00 2 years ago

Fault Injection (FI) Attacks Against Embedded Systems by András Kabai.mp495.6 MiB2 years ago

95.6 MiB2024-03-10 22:36:03 +13:00 2 years ago

From Red to Black and Beyond by Albert Zsigovits & Robert Neumann.eng.srt68.8 KiB2 years ago

68.8 KiB2024-03-10 22:34:53 +13:00 2 years ago

From Red to Black and Beyond by Albert Zsigovits & Robert Neumann.mp440.2 MiB2 years ago

40.2 MiB2024-03-10 22:35:18 +13:00 2 years ago

Fuzzing Trusted Applications in OP-TEE via Shared Memory by Roland Nagy.eng.srt31.9 KiB2 years ago

31.9 KiB2024-03-10 22:23:04 +13:00 2 years ago

Fuzzing Trusted Applications in OP-TEE via Shared Memory by Roland Nagy.mp422.2 MiB2 years ago

22.2 MiB2024-03-10 22:23:28 +13:00 2 years ago

Hacking AppLocker Cache by Grzegorz Tworek.eng.srt60.7 KiB2 years ago

60.7 KiB2024-03-10 22:11:12 +13:00 2 years ago

Hacking AppLocker Cache by Grzegorz Tworek.mp457.6 MiB2 years ago

57.6 MiB2024-03-10 22:16:54 +13:00 2 years ago

How an Android Application can Drain Your Wallet by Dimitrios Valsamaras.eng.srt53.2 KiB2 years ago

53.2 KiB2024-03-10 22:16:54 +13:00 2 years ago

How an Android Application can Drain Your Wallet by Dimitrios Valsamaras.mp435.8 MiB2 years ago

35.8 MiB2024-03-10 22:17:41 +13:00 2 years ago

How Attackers Abused DNS in 2021 2022 by Piotr Głaska.eng.srt64.0 KiB2 years ago

64.0 KiB2024-03-10 22:17:41 +13:00 2 years ago

How Attackers Abused DNS in 2021 2022 by Piotr Głaska.mp455.9 MiB2 years ago

55.9 MiB2024-03-10 22:37:00 +13:00 2 years ago

How Instantly Upgrade Your Legay Code in Minutes by Tomas Votruba.eng.srt26.3 KiB2 years ago

26.3 KiB2024-03-10 22:37:00 +13:00 2 years ago

How Instantly Upgrade Your Legay Code in Minutes by Tomas Votruba.mp419.9 MiB2 years ago

19.9 MiB2024-03-10 22:37:06 +13:00 2 years ago

How to Kickstart a Security Program by Ottucsák József.eng.srt66.1 KiB2 years ago

66.1 KiB2024-03-10 22:21:07 +13:00 2 years ago

How to Kickstart a Security Program by Ottucsák József.mp441.8 MiB2 years ago

41.8 MiB2024-03-10 22:22:23 +13:00 2 years ago

m Hacking Power Grids to Oil Pipelines - Barak Sternberg.eng.srt62.5 KiB2 years ago

62.5 KiB2024-03-10 22:22:23 +13:00 2 years ago

m Hacking Power Grids to Oil Pipelines - Barak Sternberg.mp445.5 MiB2 years ago

45.5 MiB2024-03-10 22:40:48 +13:00 2 years ago

Making Sense of Firmware Images - The Journey by Márton Illés.eng.srt63.2 KiB2 years ago

63.2 KiB2024-03-10 22:40:48 +13:00 2 years ago

Making Sense of Firmware Images - The Journey by Márton Illés.mp443.6 MiB2 years ago

43.6 MiB2024-03-10 22:41:25 +13:00 2 years ago

Metaverse (in)Security by Ali Abdollahi.eng.srt33.7 KiB2 years ago

33.7 KiB2024-03-10 22:24:52 +13:00 2 years ago

Metaverse (in)Security by Ali Abdollahi.mp426.7 MiB2 years ago

26.7 MiB2024-03-10 22:25:14 +13:00 2 years ago

No Parking, No Problem by Ignacio Navarro.eng.srt17.7 KiB2 years ago

17.7 KiB2024-03-10 22:23:43 +13:00 2 years ago

No Parking, No Problem by Ignacio Navarro.mp416.7 MiB2 years ago

16.7 MiB2024-03-10 22:24:13 +13:00 2 years ago

Practical EDR Bypass Methods in 2022 by István Tóth.eng.srt64.9 KiB2 years ago

64.9 KiB2024-03-10 22:24:13 +13:00 2 years ago

Practical EDR Bypass Methods in 2022 by István Tóth.mp455.0 MiB2 years ago

55.0 MiB2024-03-10 22:33:00 +13:00 2 years ago

Pwned in Space by Paul Coggin.eng.srt69.7 KiB2 years ago

69.7 KiB2024-03-10 22:33:00 +13:00 2 years ago

Pwned in Space by Paul Coggin.mp448.0 MiB2 years ago

48.0 MiB2024-03-10 22:33:13 +13:00 2 years ago

Security Assesment of Embedded Firewalls - a Case Study by Csongor Ferenczi.eng.srt24.1 KiB2 years ago

24.1 KiB2024-03-10 22:12:10 +13:00 2 years ago

Security Assesment of Embedded Firewalls - a Case Study by Csongor Ferenczi.mp424.2 MiB2 years ago

24.2 MiB2024-03-10 22:12:31 +13:00 2 years ago

Security in IoT - the Investigation of Bluetooth Low Energy by János Kepics.eng.srt25.4 KiB2 years ago

25.4 KiB2024-03-10 22:12:31 +13:00 2 years ago

Security in IoT - the Investigation of Bluetooth Low Energy by János Kepics.mp419.8 MiB2 years ago

19.8 MiB2024-03-10 22:28:28 +13:00 2 years ago

Sisyphus and the CVE Feed by Keziah Plattner & Kadia Mashal.eng.srt71.2 KiB2 years ago

71.2 KiB2024-03-10 22:28:28 +13:00 2 years ago

Sisyphus and the CVE Feed by Keziah Plattner & Kadia Mashal.mp446.4 MiB2 years ago

46.4 MiB2024-03-10 22:28:44 +13:00 2 years ago

Spin That Steering Wheel by Domokos Nagy.eng.srt53.3 KiB2 years ago

53.3 KiB2024-03-10 22:27:11 +13:00 2 years ago

Spin That Steering Wheel by Domokos Nagy.mp448.4 MiB2 years ago

48.4 MiB2024-03-10 22:27:12 +13:00 2 years ago

The Great Hospital Hack by Mirza Burhan Baig.eng.srt53.7 KiB2 years ago

53.7 KiB2024-03-10 22:14:27 +13:00 2 years ago

The Great Hospital Hack by Mirza Burhan Baig.mp429.5 MiB2 years ago

29.5 MiB2024-03-10 22:14:42 +13:00 2 years ago

Web3 Scams = It's a Match by Zoltán Balázs.eng.srt60.2 KiB2 years ago

60.2 KiB2024-03-10 22:09:41 +13:00 2 years ago

Web3 Scams = It's a Match by Zoltán Balázs.mp467.6 MiB2 years ago

67.6 MiB2024-03-10 22:34:43 +13:00 2 years ago

What are We Missing in Web Applications by Mirza Burhan Baig.eng.srt39.3 KiB2 years ago

39.3 KiB2024-03-10 22:05:49 +13:00 2 years ago

What are We Missing in Web Applications by Mirza Burhan Baig.mp424.0 MiB2 years ago

24.0 MiB2024-03-10 22:07:18 +13:00 2 years ago

WNEXT - Summary of the 19th Edition - 6-7 October 2022.eng.srt3.4 KiB2 years ago

3.4 KiB2024-03-10 22:07:18 +13:00 2 years ago

WNEXT - Summary of the 19th Edition - 6-7 October 2022.mp46.6 MiB2 years ago

6.6 MiB2024-03-10 22:07:28 +13:00 2 years ago

Starting upload...