2022-07-28 | Hunting Hackers Tim Crothers | 0:00 | 4 | |
|
2022-07-28 | It s Vulnerable Now What Three Tales of Woe and Remediation Mark Stanislav | 0:00 | 1 | |
|
2022-07-27 | GRIMMCon 0x1 New Speakers Wade Wells Mapping your network to Mitre ATT&CK | 0:00 | 15 | |
|
2022-07-27 | GRIMMCon 0x1 New Speakers Johnny Ciocca Password Vaults and Dead Routers | 0:00 | 4 | |
|
2022-07-27 | GRIMMCon 0x1 New Speakers Kamel Ghali Bluetooth and why we need more people studying it | 0:00 | 3 | |
|
2022-07-27 | GRIMMCon 0x1 New Speakers Keynote Tarah Wheeler Always Fail The First Time | 0:00 | 8 | |
|
2022-07-27 | GRIMMCon 0x1 New Speakers Konstantin Klinger Passive DNS for Threat Detection & Hunting | 0:00 | 12 | |
|
2022-07-27 | GRIMMCon 0x1 New Speakers Mike Forgione Increasing efficiency of threat intelligence collection | 0:00 | 4 | |
|
2022-07-27 | GRIMMCon 0x1 New Speakers Nicole Hoffman Applying Fraud Detection Techniques to Hunt Adversaries | 0:00 | 5 | |
|
2022-07-27 | GRIMMCon 0x2 Experts Mike Gualtieri Live off the Land & Crack the NTLMSSP Protocol | 0:00 | 10 | |
|
2022-07-27 | GRIMMCon 0x2 New Speakers Richard Scott The Noobs Guide to Virtual Box | 0:00 | 1 | |
|
2022-07-27 | GRIMMCon 0x2 Experts Oshea Bownes Pushing the SOC left to achieve Nash Equilibrium | 0:00 | 0 | |
|
2022-07-27 | GRIMMCon 0x2 Experts Chloe Messdaghi The Act of Balance | 0:00 | 8 | |
|
2022-07-27 | GRIMMCon 0X2 Experts Sherrod DeGrippo Threat Actor Galaxy Brain | 0:00 | 64 | |
|
2022-07-27 | GRIMMCon 0x2 Experts Closing CISO Panel with Shawn M Bowen, Brett Conlon, Matt Conner, and Brian M | 0:00 | 7 | |
|
2022-07-27 | GRIMMCon 0x2 New Speakers Apruv Singh Gautam Threat hunting on the DarkWeb | 0:00 | 2 | |
|
2022-07-27 | GRIMMCon 0x2 Experts Dave Mayer Almost Free Adversary Emulation | 0:00 | 1 | |
|
2022-07-26 | RUMP Session Various | 0:00 | 2 | |
|
2022-07-26 | The Evolution Of GandCrab Ransomware Tamas Boczan | 0:00 | 10 | |
|
2022-07-26 | Trap Your Keyboard 101 Marion Lafon | 0:00 | 13 | |
|
2022-07-26 | When Electromagnetic Side Channels Meet Radio Transceivers Marius Muench | 0:00 | 21 | |
|
2022-07-26 | Rump Session Aperi'Solved | 0:00 | 8 | |
|
2022-07-26 | Rump Session Solving 'The Grid' In Three Different Ways | 0:00 | 0 | |
|
2022-07-26 | The Rise Of Evil HID Devices Franck Bitsch and Arthur Villeneuve | 0:00 | 12 | |
|
2022-07-26 | VBA For The Masses Jonas Zaddach | 0:00 | 11 | |
|
2022-07-26 | Wombat, One More Bleichenbacher Attack TK Olivier Levillain & Aina T Rasoamanana | 0:00 | 12 | |
|
2022-07-26 | Closing Speech Xarkes | 0:00 | 9 | |
|
2022-07-26 | Delayed Memories Requiem Anonymous Pwners | 0:00 | 2 | |
|
2022-07-26 | Hunting For Bugs, Catching Dragons Nicolas Joly | 0:00 | 4 | |
|
2022-07-26 | Implementation Pitfalls Of OAuth 2 0 Samit Anwer | 0:00 | 47 | |
|
2022-07-26 | IOT Security Hack The Damn Vulnerable IoT Device Arnaud Courty | 0:00 | 120 | |
|
2022-07-26 | Opening Speech Roland Groz | 0:00 | 19 | |
|
2022-07-26 | Optimize Your Way To RCE Chakra Bruno Keith | 0:00 | 22 | |
|
2022-07-26 | Rump Session Access Granted | 0:00 | 4 | |
|
2022-07-26 | Discontinued Privacy Mathieu Cunche and Guillaume Celosia | 0:00 | 5 | |
|
2022-07-26 | No lightsaber is needed to break the Wookey David Berard | 0:00 | 4 | |
|
2022-07-26 | Reverse Engineering archeology Shlomi Oberman, Moshe Kol and Ariel Schön | 0:00 | 11 | |
|
2022-07-26 | RF Shadow games Sebastien Dudek | 0:00 | 27 | |
|
2022-07-26 | Short break Musics by Confipop | 0:00 | 0 | |
|
2022-07-26 | Sneak into buildings with KNXnet IP Claire Vacherot | 0:00 | 48 | |
|
2022-07-26 | The Great Hotel Hack Etizaz Mohsin | 0:00 | 18 | |
|
2022-07-26 | 8 bit edition Conference unedited full day stream tagged | 0:00 | 0 | |
|
2022-07-26 | Anti debugging tricks for Cortex M chips Nicolas Oberli | 0:00 | 16 | |
|
2022-07-26 | Closing Speech Jules Maselbas | 0:00 | 8 | |
|
2022-07-26 | Optimizing Server Side Template Injection Payloads for jinja2 Remi Gascou | 0:00 | 6 | |
|
2022-07-26 | Rooting Samsung Q60T Smart TV Jérémie Boutoille and Vincent Fargues | 0:00 | 645 | |
|
2022-07-26 | Windows kernel snapshot based fuzzing the good, the bad and the ugly Damien Aumaitre | 0:00 | 84 | |
|
2022-07-26 | WooKey Episode VII The Force Awakens Phil Teuwen | 0:00 | 1 | |
|
2022-07-26 | Closing Speech | 0:00 | 0 | |
|
2022-07-26 | DNSpooq Does DNS cache poisoning still matter Moshe Kol | 0:00 | 11 | |
|
2022-07-26 | Exploiting CSP in WebKit Prakash Sharma & Sachin Thakuri | 0:00 | 3 | |
|
2022-07-26 | GUI Mimic Vincent Raulin | 0:00 | 2 | |
|
2022-07-26 | GRIMMCon 0x1 Experts Wendy Nather What CISOs Wish They Could Say Out Loud | 0:00 | 7 | |
|
2022-07-26 | GRIMMCon 0x1 Experts Xena Olsen Adversary Detection Pipelines Finally Making Your Threat Intel U | 0:00 | 4 | |
|
2022-07-26 | GRIMMCon 0x1 New Speakers Alexandre Blanc The cyber threat landscape is after your accounts | 0:00 | 8 | |
|
2022-07-26 | GRIMMCon 0x1 New Speakers Angela Marafino Harry Potter and the Career of Secrets | 0:00 | 2 | |
|
2022-07-26 | GRIMMCon 0x1 New Speakers David Kennedy Closing Keynote Finding the Calm In the Storm | 0:00 | 3 | |
|
2022-07-26 | GRIMMCon 0x1 New Speakers Jeffball Analyzing SUID Binaries VMWare Fusion | 0:00 | 1 | |
|
2022-07-26 | GRIMMCon 0x1 New Speakers John JT Thomas Threat Modeling 101 | 0:00 | 0 | |
|
2022-07-26 | GRIMMCon 0x1 Experts Alyssa Miller Stealing Reality Exploiting the Human Element with Deep Fakes | 0:00 | 3 | |
|
2022-07-26 | GRIMMCon 0x1 Experts Casey Ellis disclose io Taking the Internets Immune System to the Next Le | 0:00 | 0 | |
|
2022-07-26 | GRIMMCon 0x1 Experts David Kennedy Closing Keynote Finding the Calm In the Storm | 0:00 | 1 | |
|
2022-07-26 | GRIMMCon 0x1 Experts Gabrielle Hempel Outbreak Virus vs Virus | 0:00 | 6 | |
|
2022-07-26 | GRIMMCon 0x1 Experts Harri Hursti Current State and Future of Elections, With or Without Corona | 0:00 | 9 | |
|
2022-07-26 | GRIMMCon 0x1 Experts Ian Tabor From an IVI in a box to a CAR in a box | 0:00 | 13 | |
|
2022-07-26 | GRIMMCon 0x1 Experts ʝօɦռռʏ Ӽʍǟֆ The Maker Response to the US COVID 19 Pandemic | 0:00 | 0 | |
|
2022-07-26 | GRIMMCon 0x1 Experts Keynote Tarah Wheeler Always Fail The First Time | 0:00 | 20 | |
|
2022-07-26 | Protecting Data on Smartphones & Tablets using Trusted Computing Stefan Saroiu | 0:00 | 8 | |
|
2022-07-26 | Rump Don't always trust your debugger blindly 0xMitsurugi | 0:00 | 0 | |
|
2022-07-26 | Rump Fuzzing Nicolas Ruff | 0:00 | 15 | |
|
2022-07-26 | Rump R2M2 Guillaume Valadon | 0:00 | 0 | |
|
2022-07-26 | Rump Tigress challenges Jonathan Salwan | 0:00 | 13 | |
|
2022-07-26 | Rump White Paper Write super CTF Challs Frky | 0:00 | 4 | |
|
2022-07-26 | Arybo Make expression simplification great again Marion Videau | 0:00 | 8 | |
|
2022-07-26 | BtleJuice the Bluetooth Smart Man In The Middle Framework Damien Cauquil | 0:00 | 238 | |
|
2022-07-26 | Gorille Another approach to binary code analysis Jean Yves Marion | 0:00 | 7 | |
|
2022-07-26 | Improving dm crypt performance for XTS AES mode Levent Demir | 0:00 | 65 | |
|
2022-07-26 | M 'etamorphose univ nantes fr Rémi Lehn | 0:00 | 51 | |
|
2022-07-26 | Old Memories Requiem Fabien Périgaud | 0:00 | 2 | |
|
2022-07-26 | Code Protection Promises and Limits of Symbolic Deobfuscation | 0:00 | 9 | |
|
2022-07-26 | TSIGKILL Bypassing dynamic DNS updates authentication through signature forgery | 0:00 | 0 | |
|
2022-07-26 | Detection of cryptographic algorithms with grap | 0:00 | 4 | |
|
2022-07-26 | Attack ARM TrustZone using Rowhammer | 0:00 | 18 | |
|
2022-07-26 | Automation Attacks at Scale | 0:00 | 2 | |
|
2022-07-26 | Down The Rabbit Hole How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets | 0:00 | 46 | | Down The Rabbit Hole
|
2022-07-26 | Efficient Defenses against Adversarial Examples for Deep Neural Networks | 0:00 | 4 | |
|
2022-07-26 | Get the Spidermonkey off your back | 0:00 | 7 | |
|
2022-07-26 | Random Memories writeup | 0:00 | 0 | |
|
2022-07-26 | Rump Hacking in 2017 | 0:00 | 8 | |
|
2022-07-26 | Rump Overengineered making of | 0:00 | 0 | |
|
2022-07-26 | The Black Art of Wireless Post Exploitation | 0:00 | 11 | |
|
2022-07-26 | The Making of a Secure Open Source Hardware Password Keeper | 0:00 | 3 | |
|
2022-07-26 | Abusing Privileged File Manipulation Clement Lavoillotte | 0:00 | 2 | |
|
2022-07-26 | Analyzing Ultrasound Based Physical Tracking Systems Mathieu Cunche | 0:00 | 4 | |
|
2022-07-26 | Bridging The Gap Between Secure Hardware And Open Source Charles Guillemet | 0:00 | 8 | |
|
2022-07-26 | Closing Speech Nics | 0:00 | 1 | |
|
2022-07-26 | Corrupted Memories Requiem Anonymous Pwners | 0:00 | 2 | |
|
2022-07-26 | Detecting All Type Of Illegal Access Points On Enterprise Networks Yunfei Yang | 0:00 | 2 | |
|
2022-07-26 | Opening Speech Jean Guillaume Dumas | 0:00 | 7 | |
|
2022-07-26 | Pwn A SAP System Then What Yvan Genuer | 0:00 | 24 | |
|