◂Parent directory |
A GREAT Sewing Workshop by Pierre Delcher.eng.srt▾35.2 KiB▾2 years ago | 35.2 KiB | 2024-03-10 22:07:43 +13:00 2 years ago |
A GREAT Sewing Workshop by Pierre Delcher.mp4▾27.5 MiB▾2 years ago | 27.5 MiB | 2024-03-10 22:08:29 +13:00 2 years ago |
A New Default Value of OpenSSL could Multiply a DoS Potential by Szilárd Pfeiffer.eng.srt▾30.3 KiB▾2 years ago | 30.3 KiB | 2024-03-10 22:08:29 +13:00 2 years ago |
A New Default Value of OpenSSL could Multiply a DoS Potential by Szilárd Pfeiffer.mp4▾23.2 MiB▾2 years ago | 23.2 MiB | 2024-03-10 22:09:05 +13:00 2 years ago |
Applying ATT&CK to Analyze Ransomware Campaigns by Marc Rivero López.eng.srt▾63.0 KiB▾2 years ago | 63.0 KiB | 2024-03-10 22:09:05 +13:00 2 years ago |
Applying ATT&CK to Analyze Ransomware Campaigns by Marc Rivero López.mp4▾45.9 MiB▾2 years ago | 45.9 MiB | 2024-03-10 22:41:42 +13:00 2 years ago |
Automating Binary Analysis with Ghidra's P-Code by Gergely Révay.eng.srt▾60.8 KiB▾2 years ago | 60.8 KiB | 2024-03-10 22:41:42 +13:00 2 years ago |
Automating Binary Analysis with Ghidra's P-Code by Gergely Révay.mp4▾47.3 MiB▾2 years ago | 47.3 MiB | 2024-03-10 22:42:15 +13:00 2 years ago |
Automotive Threat Intelligence by Péter Venesz & Giuseppe Serio.eng.srt▾58.0 KiB▾2 years ago | 58.0 KiB | 2024-03-10 22:40:17 +13:00 2 years ago |
Automotive Threat Intelligence by Péter Venesz & Giuseppe Serio.mp4▾43.4 MiB▾2 years ago | 43.4 MiB | 2024-03-10 22:40:35 +13:00 2 years ago |
Broad View to Automotive Security & Penn testing by András Kabai & László Tóth.eng.srt▾73.3 KiB▾2 years ago | 73.3 KiB | 2024-03-10 22:30:04 +13:00 2 years ago |
Broad View to Automotive Security & Penn testing by András Kabai & László Tóth.mp4▾86.3 MiB▾2 years ago | 86.3 MiB | 2024-03-10 22:30:29 +13:00 2 years ago |
Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal.mp4▾65.6 MiB▾2 years ago | 65.6 MiB | 2024-03-10 22:31:04 +13:00 2 years ago |
Cybersecurity Cannot Ignore Climate Change by Chloé Messdaghi.eng.srt▾52.4 KiB▾2 years ago | 52.4 KiB | 2024-03-10 22:31:04 +13:00 2 years ago |
Cybersecurity Cannot Ignore Climate Change by Chloé Messdaghi.mp4▾27.8 MiB▾2 years ago | 27.8 MiB | 2024-03-10 22:39:10 +13:00 2 years ago |
DDoS Testing Your Infrastructure, including IPv6 SYN floods by Henrik Kramselund.eng.srt▾76.7 KiB▾2 years ago | 76.7 KiB | 2024-03-10 22:39:11 +13:00 2 years ago |
DDoS Testing Your Infrastructure, including IPv6 SYN floods by Henrik Kramselund.mp4▾44.5 MiB▾2 years ago | 44.5 MiB | 2024-03-10 22:39:35 +13:00 2 years ago |
Developer in a Digital Crosshair, 2022 Edition by Mateusz Olejarka.eng.srt▾31.8 KiB▾2 years ago | 31.8 KiB | 2024-03-10 22:36:08 +13:00 2 years ago |
Developer in a Digital Crosshair, 2022 Edition by Mateusz Olejarka.mp4▾23.7 MiB▾2 years ago | 23.7 MiB | 2024-03-10 22:36:30 +13:00 2 years ago |
DiceyF Deploys the GamePlayerFramework by Kurt Baumgartner & Georgy Kucherin.eng.srt▾68.8 KiB▾2 years ago | 68.8 KiB | 2024-03-10 22:36:30 +13:00 2 years ago |
DiceyF Deploys the GamePlayerFramework by Kurt Baumgartner & Georgy Kucherin.mp4▾47.7 MiB▾2 years ago | 47.7 MiB | 2024-03-10 22:36:35 +13:00 2 years ago |
Everyday Numbers to Break Not So Everyday Software by Márk Módly.eng.srt▾24.9 KiB▾2 years ago | 24.9 KiB | 2024-03-10 22:33:29 +13:00 2 years ago |
Everyday Numbers to Break Not So Everyday Software by Márk Módly.mp4▾28.1 MiB▾2 years ago | 28.1 MiB | 2024-03-10 22:34:04 +13:00 2 years ago |
Fault Injection (FI) Attacks Against Embedded Systems by András Kabai.eng.srt▾67.7 KiB▾2 years ago | 67.7 KiB | 2024-03-10 22:13:38 +13:00 2 years ago |
Fault Injection (FI) Attacks Against Embedded Systems by András Kabai.mp4▾95.6 MiB▾2 years ago | 95.6 MiB | 2024-03-10 22:36:03 +13:00 2 years ago |
From Red to Black and Beyond by Albert Zsigovits & Robert Neumann.eng.srt▾68.8 KiB▾2 years ago | 68.8 KiB | 2024-03-10 22:34:53 +13:00 2 years ago |
From Red to Black and Beyond by Albert Zsigovits & Robert Neumann.mp4▾40.2 MiB▾2 years ago | 40.2 MiB | 2024-03-10 22:35:18 +13:00 2 years ago |
Fuzzing Trusted Applications in OP-TEE via Shared Memory by Roland Nagy.eng.srt▾31.9 KiB▾2 years ago | 31.9 KiB | 2024-03-10 22:23:04 +13:00 2 years ago |
Fuzzing Trusted Applications in OP-TEE via Shared Memory by Roland Nagy.mp4▾22.2 MiB▾2 years ago | 22.2 MiB | 2024-03-10 22:23:28 +13:00 2 years ago |
Hacking AppLocker Cache by Grzegorz Tworek.eng.srt▾60.7 KiB▾2 years ago | 60.7 KiB | 2024-03-10 22:11:12 +13:00 2 years ago |
Hacking AppLocker Cache by Grzegorz Tworek.mp4▾57.6 MiB▾2 years ago | 57.6 MiB | 2024-03-10 22:16:54 +13:00 2 years ago |
How an Android Application can Drain Your Wallet by Dimitrios Valsamaras.eng.srt▾53.2 KiB▾2 years ago | 53.2 KiB | 2024-03-10 22:16:54 +13:00 2 years ago |
How an Android Application can Drain Your Wallet by Dimitrios Valsamaras.mp4▾35.8 MiB▾2 years ago | 35.8 MiB | 2024-03-10 22:17:41 +13:00 2 years ago |
How Attackers Abused DNS in 2021 2022 by Piotr Głaska.eng.srt▾64.0 KiB▾2 years ago | 64.0 KiB | 2024-03-10 22:17:41 +13:00 2 years ago |
How Attackers Abused DNS in 2021 2022 by Piotr Głaska.mp4▾55.9 MiB▾2 years ago | 55.9 MiB | 2024-03-10 22:37:00 +13:00 2 years ago |
How Instantly Upgrade Your Legay Code in Minutes by Tomas Votruba.eng.srt▾26.3 KiB▾2 years ago | 26.3 KiB | 2024-03-10 22:37:00 +13:00 2 years ago |
How Instantly Upgrade Your Legay Code in Minutes by Tomas Votruba.mp4▾19.9 MiB▾2 years ago | 19.9 MiB | 2024-03-10 22:37:06 +13:00 2 years ago |
How to Kickstart a Security Program by Ottucsák József.eng.srt▾66.1 KiB▾2 years ago | 66.1 KiB | 2024-03-10 22:21:07 +13:00 2 years ago |
How to Kickstart a Security Program by Ottucsák József.mp4▾41.8 MiB▾2 years ago | 41.8 MiB | 2024-03-10 22:22:23 +13:00 2 years ago |
m Hacking Power Grids to Oil Pipelines - Barak Sternberg.eng.srt▾62.5 KiB▾2 years ago | 62.5 KiB | 2024-03-10 22:22:23 +13:00 2 years ago |
m Hacking Power Grids to Oil Pipelines - Barak Sternberg.mp4▾45.5 MiB▾2 years ago | 45.5 MiB | 2024-03-10 22:40:48 +13:00 2 years ago |
Making Sense of Firmware Images - The Journey by Márton Illés.eng.srt▾63.2 KiB▾2 years ago | 63.2 KiB | 2024-03-10 22:40:48 +13:00 2 years ago |
Making Sense of Firmware Images - The Journey by Márton Illés.mp4▾43.6 MiB▾2 years ago | 43.6 MiB | 2024-03-10 22:41:25 +13:00 2 years ago |
Metaverse (in)Security by Ali Abdollahi.eng.srt▾33.7 KiB▾2 years ago | 33.7 KiB | 2024-03-10 22:24:52 +13:00 2 years ago |
Metaverse (in)Security by Ali Abdollahi.mp4▾26.7 MiB▾2 years ago | 26.7 MiB | 2024-03-10 22:25:14 +13:00 2 years ago |
No Parking, No Problem by Ignacio Navarro.eng.srt▾17.7 KiB▾2 years ago | 17.7 KiB | 2024-03-10 22:23:43 +13:00 2 years ago |
No Parking, No Problem by Ignacio Navarro.mp4▾16.7 MiB▾2 years ago | 16.7 MiB | 2024-03-10 22:24:13 +13:00 2 years ago |
Practical EDR Bypass Methods in 2022 by István Tóth.eng.srt▾64.9 KiB▾2 years ago | 64.9 KiB | 2024-03-10 22:24:13 +13:00 2 years ago |
Practical EDR Bypass Methods in 2022 by István Tóth.mp4▾55.0 MiB▾2 years ago | 55.0 MiB | 2024-03-10 22:33:00 +13:00 2 years ago |
Pwned in Space by Paul Coggin.eng.srt▾69.7 KiB▾2 years ago | 69.7 KiB | 2024-03-10 22:33:00 +13:00 2 years ago |
Pwned in Space by Paul Coggin.mp4▾48.0 MiB▾2 years ago | 48.0 MiB | 2024-03-10 22:33:13 +13:00 2 years ago |
Security Assesment of Embedded Firewalls - a Case Study by Csongor Ferenczi.eng.srt▾24.1 KiB▾2 years ago | 24.1 KiB | 2024-03-10 22:12:10 +13:00 2 years ago |
Security Assesment of Embedded Firewalls - a Case Study by Csongor Ferenczi.mp4▾24.2 MiB▾2 years ago | 24.2 MiB | 2024-03-10 22:12:31 +13:00 2 years ago |
Security in IoT - the Investigation of Bluetooth Low Energy by János Kepics.eng.srt▾25.4 KiB▾2 years ago | 25.4 KiB | 2024-03-10 22:12:31 +13:00 2 years ago |
Security in IoT - the Investigation of Bluetooth Low Energy by János Kepics.mp4▾19.8 MiB▾2 years ago | 19.8 MiB | 2024-03-10 22:28:28 +13:00 2 years ago |
Sisyphus and the CVE Feed by Keziah Plattner & Kadia Mashal.eng.srt▾71.2 KiB▾2 years ago | 71.2 KiB | 2024-03-10 22:28:28 +13:00 2 years ago |
Sisyphus and the CVE Feed by Keziah Plattner & Kadia Mashal.mp4▾46.4 MiB▾2 years ago | 46.4 MiB | 2024-03-10 22:28:44 +13:00 2 years ago |
Spin That Steering Wheel by Domokos Nagy.eng.srt▾53.3 KiB▾2 years ago | 53.3 KiB | 2024-03-10 22:27:11 +13:00 2 years ago |
Spin That Steering Wheel by Domokos Nagy.mp4▾48.4 MiB▾2 years ago | 48.4 MiB | 2024-03-10 22:27:12 +13:00 2 years ago |
The Great Hospital Hack by Mirza Burhan Baig.eng.srt▾53.7 KiB▾2 years ago | 53.7 KiB | 2024-03-10 22:14:27 +13:00 2 years ago |
The Great Hospital Hack by Mirza Burhan Baig.mp4▾29.5 MiB▾2 years ago | 29.5 MiB | 2024-03-10 22:14:42 +13:00 2 years ago |
Web3 Scams = It's a Match by Zoltán Balázs.eng.srt▾60.2 KiB▾2 years ago | 60.2 KiB | 2024-03-10 22:09:41 +13:00 2 years ago |
Web3 Scams = It's a Match by Zoltán Balázs.mp4▾67.6 MiB▾2 years ago | 67.6 MiB | 2024-03-10 22:34:43 +13:00 2 years ago |
What are We Missing in Web Applications by Mirza Burhan Baig.eng.srt▾39.3 KiB▾2 years ago | 39.3 KiB | 2024-03-10 22:05:49 +13:00 2 years ago |
What are We Missing in Web Applications by Mirza Burhan Baig.mp4▾24.0 MiB▾2 years ago | 24.0 MiB | 2024-03-10 22:07:18 +13:00 2 years ago |
WNEXT - Summary of the 19th Edition - 6-7 October 2022.eng.srt▾3.4 KiB▾2 years ago | 3.4 KiB | 2024-03-10 22:07:18 +13:00 2 years ago |
WNEXT - Summary of the 19th Edition - 6-7 October 2022.mp4▾6.6 MiB▾2 years ago | 6.6 MiB | 2024-03-10 22:07:28 +13:00 2 years ago |