2022-10-23 | Organising a Con | 59:49 | 1 | |
|
2022-10-23 | l Design and Build a 2 MeV Cyclotron | 46:06 | 9 | |
|
2022-10-23 | wikileaks followup | 45:44 | 2 | |
|
2022-10-23 | l Opening ceremony | 11:10 | 1 | |
|
2022-10-23 | Wikileaks Panel | 1:16:54 | 0 | |
|
2022-10-23 | Panel discussion with Brein MPAA and HAR | 1:06:46 | 0 | Discussion |
|
2022-10-23 | l Policy hacking | 55:53 | 1 | |
|
2022-10-23 | Unusual lock picking | 52:37 | 3 | |
|
2022-10-23 | part2 Design and Build a 2 MeV Cyclotron | 11:47 | 1 | |
|
2022-10-23 | l The ZeuS evolution | 53:59 | 0 | |
|
2022-10-23 | Wikileaks | 51:24 | 4 | |
|
2022-10-23 | Runtime Kernel Patching on Mac OS X | 36:49 | 2 | |
|
2022-10-23 | part3 Design and Build a 2 MeV Cyclotron | 4:28 | 1 | |
|
2022-10-23 | Practical Attacks Against Authorship Attribution Techniques | 42:50 | 2 | |
|
2022-10-23 | Securing networks from an ISP perspective | 47:06 | 1 | |
|
2022-10-23 | WokTheWob FOIA for open source | 48:14 | 0 | |
|
2022-10-23 | Life or Death Cryptology | 48:19 | 1 | Vlog |
|
2022-10-23 | Programming the cloud | 36:39 | 0 | |
|
2022-10-23 | Side channel analysis on embedded systems | 55:42 | 6 | |
|
2022-10-23 | x509 is considered harmful | 59:39 | 3 | |
|
2022-10-23 | Protheses for 50 instead of 250000 | 31:33 | 3 | |
|
2022-10-23 | Lightning talks Friday | 1:58:42 | 1 | |
|
2022-10-23 | Public transport SMS ticket hacking | 50:54 | 5 | |
|
2022-10-23 | Sniffing cable modems | 59:41 | 8 | |
|
2022-10-23 | quantum cryptography an introduction | 52:13 | 5 | |
|
2022-10-23 | Statistics and the Law | 56:47 | 0 | |
|
2022-10-23 | Locally Exploiting Wireless Sensors | 43:10 | 6 | |
|
2022-10-23 | Lockpicking | 56:24 | 1 | |
|
2022-10-23 | Teh Internetz are pwned | 55:21 | 2 | |
|
2022-10-23 | Arte documentary Hackito Ergo Sum extract | 2:58 | 7 | |
|
2022-10-23 | Eric Freyssinet | 16:15 | 4 | |
|
2022-10-23 | Itzik Kotler | 53:29 | 4 | |
|
2022-10-23 | James Oakley and Sergey Bratus | 1:03:48 | 1 | |
|
2022-10-23 | Jon Larimer | 46:09 | 1 | |
|
2022-10-23 | Marc Heuse | 48:27 | 8 | |
|
2022-10-23 | Mate Soos | 46:15 | 0 | |
|
2022-10-23 | Rodrigo Rubira Branco | 45:54 | 27 | |
|
2022-10-23 | Sabastien Tricaud | 33:55 | 1 | |
|
2022-10-23 | lightning talk Python libraries mostly for telecommunication by Mitshell | 8:25 | 4 | |
|
2022-10-23 | ligntning talk Advanced methods for polymorphic shellcode detection by Romain Lesteven | 13:29 | 11 | |
|
2022-10-23 | Mechanical locks opening and forensic analysis by Alexandre TRIFFAULT | 43:43 | 6 | |
|
2022-10-23 | Mind your language by Olivier Levillain and Pierre Chifflier | 53:05 | 3 | |
|
2022-10-23 | The hidden dangers inside the platform by Mickey Shkatov and Jesse Michael | 50:24 | 27 | |
|
2022-10-23 | Android malware that wont make you fall asleep by Lukasz Siewierski | 47:29 | 6 | |
|
2022-10-23 | Applying machine learning methods network mapping by Camille Mougey and Xavier Martin | 46:27 | 5 | |
|
2022-10-23 | Complex malware forensics investigation by Paul Rascagneres and Sebastien Larinier | 54:00 | 6 | |
|
2022-10-23 | Cracking Sendmail crackaddr by Bogdan Mihaila | 47:39 | 3 | |
|
2022-10-23 | Keynote by JB of Bioelit and FX from Phenoelit | 1:09:06 | 2 | |
|
2022-10-23 | lightning talk Lockpicking my parents safe by Augustin | 2:28 | 1 | |
|
2022-10-23 | lightning talk Modern crypto and privacy by Morten Dahl | 9:32 | 4 | |
|
2022-10-22 | Brenno de Winter Keynote Thanks for all the Fish | 44:13 | 4 | |
|
2022-10-22 | Diderik van Wingerden From Cool Hach to Sustainable Company | 34:55 | 1 | |
|
2022-10-22 | Dimitri Modderman Opening HackerHotel 2015 | 11:22 | 2 | |
|
2022-10-22 | Elger Jonker Security in Webapplications | 39:23 | 4 | |
|
2022-10-22 | Hans de Goede Upstream Allwinner SOC support | 18:15 | 2 | |
|
2022-10-22 | Jeroen Domburg Cheating at Retrogaming Incomplete | 28:21 | 5 | |
|
2022-10-22 | Jos Weyers Showing Keys in Public | 47:55 | 6 | |
|
2022-10-22 | Matthias Strubel Hacker Meets Mainframe | 49:39 | 2 | |
|
2022-10-22 | Niek Blankers WTherm | 16:36 | 5 | |
|
2022-10-22 | Peter Smets The DRM of Pacman | 45:02 | 2 | |
|
2022-10-22 | Robbert Mica Outernet | 35:53 | 3 | |
|
2022-10-22 | Amal Graafstra Biohacking | 46:32 | 11 | |
|
2022-10-22 | Arjan Koopen Building Event Networks | 1:03:04 | 1 | |
|
2022-10-22 | Anus QTPass | 22:23 | 27 | |
|
2022-10-22 | Team Sanity SHA2017 | 26:30 | 0 | |
|
2022-10-22 | Bart Meijer 3D Printer Electronics | 36:25 | 3 | |
|
2022-10-22 | La chasse aux menaces est ouverte Débuter le Threat Hunting Éric Gagnon | 21:00 | 6 | |
|
2022-10-22 | Your Bank’s Digital Side Door Steven Danneman | 50:18 | 0 | |
|
2022-10-22 | Mise à jour des menaces et des risques informatique au Canada Steve Waterhouse | 49:15 | 0 | |
|
2022-10-22 | More MitM Makes Mana Mostly Mediate Mischievous Message Dominic White | 41:56 | 1 | |
|
2022-10-22 | Parlons d’enjeux nationaux sécurité informatique envers la démocratie Un état de situation panel | 20:00 | 0 | |
|
2022-10-22 | RGPD en Europe 6 mois d’expériences Damien Bancal | 23:04 | 2 | |
|
2022-10-22 | Automatisation de la réponse, introduction au standard OpenC2 David Girard | 8:35 | 1 | |
|
2022-10-22 | Blazing Secure Egress Traffic with Smokescreen Marc André Tremblay | 29:46 | 1 | |
|
2022-10-22 | RHme3 hacking through failure Colin DeWinter & Jonathan Beverley & Ben Gardiner | 41:56 | 5 | |
|
2022-10-22 | Breach Analytica Exploring the history & design of hacked data services Trevor and Pamela | 45:12 | 0 | |
|
2022-10-22 | CAN Signal Extraction from Openxc with Radare2 Ben Gardiner | 33:15 | 3 | |
|
2022-10-22 | Shut Up and Take My Money Scraping the Venmo Public Feed Johnny Xmas | 26:45 | 6 | |
|
2022-10-22 | Digital Certificate Cybercrime Exploitation and Decentralizing using Blockchain Mahsa Moosavi | 52:28 | 2 | |
|
2022-10-22 | So You Want To Be A Consultant Here’s The Fine Print… Justin Ryder | 34:57 | 6 | |
|
2022-10-22 | Discours d'ouverture du Hackfest 2018 avec l'honorable Karina Gould | 7:44 | 1 | |
|
2022-10-22 | Don’t Bring Me Down Weaponized Botnets Anyone Cheryl Biswas | 37:56 | 1 | |
|
2022-10-22 | Surviving a Cat astrophe The Art of Crisis Management as told through LOLcatz Jen Ellis | 39:38 | 0 | |
|
2022-10-22 | Exploiting Connected Medical Devices Lessons Learned & Data Earned Saurabh Harit | 37:03 | 3 | |
|
2022-10-22 | Finding Valuable Needles in Global Source Code Haystacks with Automation Jay Lagorio | 25:41 | 5 | |
|
2022-10-22 | Hacking COMBUS in a Paradox security system Kirils Solovjovs | 11:52 | 10 | |
|
2022-10-22 | Throwing it out the Windows Exfiltration d’identifiants Active Directory Léanne Dutil | 19:45 | 0 | |
|
2022-10-22 | Harakiri Manipulating binaries to optimize closed source fuzzing Sebastien Feldman | 4:59 | 1 | |
|
2022-10-22 | Utilisation de GPU pour l’inspection de trafic réseau Martin Dubois | 21:54 | 2 | |
|
2022-10-22 | How to bypass an IDS with netcat and linux Kirill Shipulin | 33:58 | 5 | Guide |
|
2022-10-21 | Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky Matt Eidelberg | 32:45 | 5 | |
|
2022-10-21 | ICS A deeper dive into defending and attacking operational technology Liam Graves | 33:42 | 4 | Vlog |
|
2022-10-21 | Who wrote this smart contract Privacy and Anonymity in Blockchain Alina Matyukhina | 40:21 | 7 | |
|
2022-10-21 | War in the fifth dimension An overview of the Weaponization of Information Alana Stazz | 57:10 | 2 | Guide |
|
2022-10-21 | Zero trust à l’ère des fuites massives d’informations Nicolas Loïc Fortin | 43:09 | 1 | Guide |
|
2022-10-21 | A comparative analysis of Open Source Web Application vulnerability scanners Rana Khalil | 32:33 | 28 | |
|
2022-10-21 | You shall not pass, even if you look like a hobbit an appeal to smarter physical sec Remy Baccino | 1:00:02 | 0 | |
|
2022-10-21 | A more secure management of front end dependencies Jérémy Matos | 40:06 | 0 | |
|
2022-10-21 | Adventures in obfuscated mobile adware Kristina Balaam | 28:10 | 4 | |
|
2022-10-21 | F2P Free to pawn Marc André Bélanger | 44:35 | 1 | |
|