2024-02-20 | Zero Trust in the era of cloud by Vandana Verma Sehgal aka InfosecVandana | 37:21 | 2 | |
|
2024-02-20 | Blockchain Based OT Monitoring Solution BBOTMS by Asif Hameed Khan Gagan Jattana | 17:26 | 0 | |
|
2024-02-20 | Red Team Village Gathering Vulnerability Intel from Darkweb by Nandakishore Harikumar | 48:10 | 0 | |
|
2024-02-20 | Car Hacking Village | 1:54:46 | 3 | |
|
2024-02-20 | Red Team Village Open source docker runtime analysis framework by Rohit Sehgal | 35:32 | 0 | |
|
2024-02-20 | Red Team Village Red Team Village Workshop No 1 | 1:49:56 | 2 | |
|
2024-02-20 | Closing Keynote by Randolph Barr | 31:59 | 0 | |
|
2024-02-20 | Discover vulnerabilities with CodeQL by Boik Su @boik su | 36:08 | 1 | |
|
2024-02-20 | From an 'IVI in a box' to a 'CAR in a box' by Ian Tabor @mintynet | 41:34 | 0 | |
|
2024-02-20 | Red Team Village The Year of the C2 by Quentin Rhoads Herrera and Charles Dardaman | 32:55 | 0 | |
|
2024-02-20 | Getting hands dirty with IOT Embedded Device Security Testing by Kaustubh Padwad | 55:31 | 0 | |
|
2024-02-20 | Hackers Don't Wear Black Hoodies, They Wear Capes by Chloé Messdaghi | 45:34 | 1 | |
|
2024-02-20 | Hacking 101 Training | 1:59:27 | 2 | |
|
2024-02-20 | I've Injected a DLL You Won't Believe What Happened Next by @CaptnBanana | 42:55 | 0 | |
|
2024-02-20 | Pursuing Evasive Custom Command & Control C3 by Mark Ian Secretario Renzon Cruz | 1:01:49 | 0 | |
|
2024-02-20 | Quark Engine An Obfuscation Neglect Android Malware Scoring System by JunWei Song KunYu Chen | 34:00 | 0 | |
|
2024-02-20 | ReconPal Leveraging NLP for Infosec by Nishant Sharma & Jeswin Mathai | 31:24 | 1 | |
|
2024-02-20 | Keeping Up With Modern Automotive Exploitation by Kamel Ghali | 46:14 | 1 | |
|
2024-02-20 | Using Wordpress comments section as a CC for fun by Juan Karlo Licudineaccidentalrebel | 38:04 | 0 | |
|
2024-02-20 | Malware Hunting Using python as attack weapon by Filipi Pires | 31:42 | 0 | |
|
2024-02-20 | OAuth Authentication Bypass by Sheikh Rizan | 34:45 | 1 | |
|
2024-02-20 | Attacking Modern Environments Series Attack Vectors on Terraform Environments Inbox by Mazin A m | 34:01 | 0 | |
|
2024-02-20 | Securing Process Control Data Transmission to the Blockchain Network | 48:52 | 0 | |
|
2024-02-20 | Automating your CAN Bus Hacking | 18:00 | 1 | |
|
2024-02-20 | Bug Bounty 101 | 1:01:16 | 0 | |
|
2024-02-20 | The Curious case of knowing the unknown by Vandana Verma Sehgal | 30:56 | 0 | |
|
2024-02-20 | The Kill Chain Future of Cyber in Defense by Harshit Agrawa | 55:41 | 0 | |
|
2024-02-20 | Burnout The Security Risk by Chloé Messdaghi | 29:40 | 1 | |
|
2024-02-20 | Buzzard Crafting your post exploitation framework against odds by Aravindha Hariharan and Subhaj | 32:50 | 0 | |
|
2024-02-20 | Career 101 0wning Your Cyber Security Career | 1:07:21 | 0 | |
|
2024-02-20 | Click Here For Free TV Chaining Bugs to Takeover Wind Vision Accounts by Leonidas Tsaousis | 19:59 | 0 | |
|
2024-02-20 | Crafting your own combat hardware | 40:12 | 1 | |
|
2024-02-20 | Discovering C&C in Malicious PDF with obfuscation, encoding and other techniques by Filipi | 36:20 | 4 | |
|
2024-02-20 | Fuzzing Revisiting Software Security by Nafiez | 1:17:55 | 0 | |
|
2024-02-20 | Gathering Cyber Threat Intelligence from the Cyber Criminal Underground by Eric Reyata | 48:42 | 2 | |
|
2024-02-20 | Hack the Planet Desecuritise Cyberspace Keynote by Emil Tan | 21:51 | 1 | |
|
2024-02-20 | Hacking 101 Offensive Operation by s8nph | 40:45 | 1 | |
|
2024-02-20 | Wild IoT Tales from power grids to oil pipelines by Barak Sternberg | 45:52 | 0 | |
|
2024-02-20 | A new secret stash for fileless malware by Denis Legezo | 36:39 | 0 | |
|
2024-02-20 | Alternative ways to detect mimikatz by Balazs Bucsay | 28:51 | 2 | |
|
2024-02-20 | AWSGoat A Damn Vulnerable AWS Infrastructure by Jeswin Mathai Shantanu Kale and Sanjeev Mahunta | 41:34 | 0 | |
|
2024-02-20 | Building defensive playbooks from others misfortune by Chester Wisniewski | 45:06 | 4 | |
|
2024-02-20 | How Did I Get Here I still don’t know Getting into The Lifelong Adventure of Learning Cybersecurity | 46:23 | 0 | |
|
2024-02-20 | Human Controlled Fuzzing With AFL by Maxim Grishin Igor Korkin | 13:47 | 0 | |
|
2024-02-20 | Microsoft Defender Will Be Defended MemoryRanger Prevents Blinding Windows post processed | 34:11 | 0 | |
|
2024-02-20 | Pwnppeteer Phishing Post ExploitAutomattion at Scale | 38:50 | 1 | |
|
2024-02-20 | Security Like the 80's How I stole your RF by Ayyappan Rajesh | 35:44 | 0 | |
|
2024-02-20 | Signs Signs Everywhere There are Signs of a Ransomware Intrusion by Allan Liska | 30:05 | 0 | |
|
2024-02-20 | Streamline security with shift left A cloud approach by Avinash Jain | 33:26 | 0 | |
|
2024-02-20 | The Simple Yet Lethal Anatomy of a Software Supply Chain Attack by Yehuda Galb | 27:35 | 0 | |
|
2024-02-20 | Uncovering 0days in Healthcare Management Applications by Aden Yap Chuen Zhen Sheikh Rizan and Muham | 26:04 | 0 | |
|
2024-02-20 | Understanding and Re creating Process Injection Techniques through Nimjector by Ariz Soriano | 1:03:45 | 0 | |
|
2024-02-20 | Jesús Olmos ChromeHack, a html5 chrome webhack tool | 40:43 | 0 | |
|
2024-02-20 | José Luis Verdeguer FreePBX for fun & profit | 35:47 | 2 | |
|
2024-02-20 | José M Esparza y Mikel Gastesi Sopelka VS Eurograbber really 36 million EUR | 54:30 | 0 | |
|
2024-02-20 | Vicente Díaz Fraud in Twitter and how to detect it using MLT | 36:07 | 0 | Guide |
|
2024-02-20 | Raúl Siles Wi Fi Why iOS Android and others Fail inexplicably | 1:12:42 | 0 | |
|
2024-02-20 | José Pico y David Pérez Sistema de localización geográfica de un terminal móvil | 1:04:43 | 0 | |
|
2024-02-20 | Joxean Koret Interactive Static Analysis Tools for Vulnerability Discovery | 54:25 | 0 | |
|
2024-02-20 | Roberto Baratta eFraude ganar gestionando la derrota | 36:20 | 0 | |
|
2024-02-20 | RootedPanel I Mapaches por el mundo | 1:19:22 | 0 | |
|
2024-02-20 | Organización RootedCON Keynote 2013 | 15:00 | 0 | |
|
2024-02-20 | Albert López Linux Heap Exploiting Revisited | 46:01 | 0 | |
|
2024-02-20 | Alejandro Ramos Te pique lo que te pique, analiza un SQLite | 24:53 | 0 | |
|
2024-02-20 | RootedPanel II Futuro Profesional, estudios y carrera en TI Seguridad | 2:06:39 | 0 | |
|
2024-02-20 | Andrés y Miguel Tarasco OWISAM Open WIreless Security Assessment Methodology | 1:06:36 | 0 | Vlog |
|
2024-02-20 | Antonio Ramos ¿Y si la seguridad afectara al valor contable de la empresa | 33:11 | 0 | |
|
2024-02-20 | David Barroso Un gentil viaje al interior de las extorsiones mediante DDoS | 46:19 | 0 | |
|
2024-02-20 | Sebastián Guerrero Ke ase Android | 53:10 | 1 | |
|
2024-02-20 | David Fuertes Señales Débiles ¿Nos protegemos sabiendo que nos van a atacar | 58:21 | 0 | |
|
2024-02-20 | David Meléndez Cano Trash Robotic Router Platform TRRP | 38:52 | 0 | |
|
2024-02-19 | Pós Exploração com Metasploit Vinicius Alves ROADSEC@ROÇA | 2:41:25 | 2 | |
|
2024-02-19 | Wifi Deauther Davi Mikael Penegui | 2:13:56 | 5 | |
|
2024-02-19 | Criptografia I Jheyne Ortiz | 15:44 | 1 | |
|
2024-02-19 | Data Science I Daniele Guimarães | 18:27 | 0 | |
|
2024-02-19 | Programação em Clojure Talita Rodrigues | 1:14:01 | 3 | |
|
2024-02-19 | Defesa Cibernética Gabriella Salles | 2:30:00 | 0 | |
|
2024-02-19 | Privacidade e Monitoramento Cybelle Oliveira | 21:40 | 0 | |
|
2024-02-19 | Falhas e Correções O que um Ethical Hacker faz I Laios Barbosa | 18:28 | 2 | |
|
2024-02-19 | Python no ensino de programação Fernando Masanori | 29:26 | 1 | |
|
2024-02-19 | Hábitos inseguros devido a má utilização do Shell Júlio Neves | 2:26:17 | 2 | |
|
2024-02-19 | Python para Pentest Michelle Mesquita | 16:39 | 0 | |
|
2024-02-19 | Roadsec com Metaforando Lançamento do Roadsec 2022 | 4:01:57 | 0 | |
|
2024-02-19 | DevSec I Vanessa Quadros | 27:44 | 0 | |
|
2024-02-19 | Engenharia Reversa Igor Franca | 27:26 | 0 | |
|
2024-02-19 | Como construir um profissional de SI Fabio Noth | 2:04:34 | 0 | |
|
2024-02-19 | Entendendo HTTP Parameter Pollution Andres Alonso | 1:28:34 | 0 | |
|
2024-02-19 | Hackerismo e Autodidatismo o desafio dos professores da nova sociedade Karina Menezes | 22:02 | 0 | |
|
2024-02-19 | Incidentes Nelson Murilo | 20:51 | 2 | |
|
2024-02-19 | Infraestrutura e redes I George Silva | 24:18 | 0 | |
|
2024-02-19 | Inteligência Artificial Alessandro De Oliveira Faria | 2:14:09 | 0 | |
|
2024-02-19 | Entrevista Gabriel Pato | 30:57 | 0 | |
|
2024-02-19 | Análise de Malware Binário Igor Franca | 1:34:20 | 1 | |
|
2024-02-19 | Robótica Daniel Basconcello | 31:18 | 0 | |
|
2024-02-19 | Análise de malware I Filipi Pires | 21:45 | 1 | |
|
2024-02-19 | Kubernetes I Magno Logan | 18:20 | 0 | Vlog |
|
2024-02-19 | Analise Forense Hackeando o hacker Marcos Monteiro | 17:30 | 0 | |
|
2024-02-19 | Linguagem de Baixo Nível Assembly Felipe Juca Sanches | 1:15:18 | 0 | |
|
2024-02-19 | Script em Python Michelle Mesquita | 1:05:27 | 0 | |
|
2024-02-19 | Anti OPSEC Ataques de contra inteligência em redes anônimas Victor de Queiroz | 2:39:14 | 0 | |
|