2023-12-20 | OWASP Juice Shop Project Björn Kimminich | 1:00:04 | 1 | |
|
2023-12-20 | Exhibitor Over a Decade of Software Security What Have We Learned Adam Brown | 53:17 | 0 | |
|
2023-12-20 | OWASP ASVS Project Josh Grossman | 54:51 | 3 | |
|
2023-12-19 | Charlie Miller Keynote Bugs ruin everything | 52:30 | 2 | |
|
2023-12-19 | Chris Romeo AppSec Awareness A Blue Print for Security Culture Change | 46:15 | 1 | |
|
2023-12-19 | Christian Schneider, Alvaro Muoz Surviving the Java serialization apocalypse | 42:06 | 3 | |
|
2023-12-19 | Christian Wressnegger Analyzing and Detecting Flash based Malware | 40:08 | 0 | |
|
2023-12-19 | Daniel Kefer, Rene Reuter Addressing Security Requirements in Development Projects | 43:27 | 1 | |
|
2023-12-19 | David Lindner, Jack Mannino don't Touch Me That Way | 45:44 | 3 | |
|
2023-12-19 | Dan Cornell The ABCs of Source Assisted Web Application Penetration Testing | 44:57 | 4 | |
|
2023-11-05 | Opening Keynote Louis Pouzin | 27:29 | 4 | |
|
2023-11-05 | Revue de sécurité du protocole ZigBee d une box TV française | 39:26 | 4 | |
|
2023-11-05 | Tails Security, Main'tainability and Usability, pick three | 35:24 | 9 | |
|
2023-11-05 | Trust No One ATMs and their dirty little secrets | 37:22 | 16 | |
|
2023-11-05 | Turning a GPS based dating application into a tracking system | 36:27 | 6 | |
|
2023-11-05 | Windows 10 Security and Privacy with Thomas AUBIN, Paul HERNAULT | 27:30 | 4 | |
|
2023-11-05 | A Dozen Years of Shellphish mp4 | 38:09 | 1 | |
|
2023-11-05 | An In Depth Dive into the Ethereum Protocol with Lefteris KARAPETSAS | 41:21 | 0 | |
|
2023-11-05 | Developing x64dbg with Duncan OGILVIE | 40:02 | 1 | |
|
2023-11-05 | House intercoms attacks, when frontdoors become backdoors | 41:39 | 3 | |
|
2023-11-05 | Improvised LockPicking tools with Till LENZE, Alexandre TRIFFAULT | 34:03 | 2 | |
|
2023-11-05 | Mass pwning with a small IoT spy bug with Damien CAUQUIL | 36:45 | 4 | |
|
2023-11-05 | Microservices hacking & security with Fabien KERBOUCI | 54:34 | 4 | |
|
2023-11-05 | Side channel Attack of a Quantum Key Distribution System, Martina Bodini | 40:55 | 3 | |
|
2023-11-05 | Smart backdooring 2 0, Paul Daher | 35:59 | 2 | |
|
2023-11-05 | USB HID l'ami de la Red Team, Jérôme Poggi | 43:50 | 1 | |
|
2023-11-05 | Virtualization InApp sous Android afin de maitriser l'exécution des applications, Julien Thomas | 43:44 | 1 | |
|
2023-11-05 | Not All Quiet on the Eastern Front, Maliciarogue | 47:07 | 0 | |
|
2023-11-05 | A story of metadata, Alexandre Pujol | 35:04 | 0 | |
|
2023-11-05 | Breaking privacy in software, Maria Christofi | 40:37 | 0 | |
|
2023-11-05 | From corrupted memory dump to rootkit detection, Stéfan Le Berre | 39:11 | 1 | |
|
2023-11-05 | Hardware Slashing, Smashing, Deconstructing and Reconstruction for root access, Deral Heiland | 44:03 | 2 | |
|
2023-11-05 | How to borrow a car in 60,000 millisecond, Robert Leale | 49:20 | 1 | Guide |
|
2023-11-05 | Keynote, Gaël Delalleau | 37:16 | 0 | |
|
2023-11-05 | La surprise du chef, Team HZV | 4:53 | 0 | |
|
2023-11-05 | Qu'est ce que le hacking social Gull et Viciss | 42:50 | 0 | |
|
2023-11-05 | Serrurerie forensics Techniques avancées, MrJack | 50:20 | 1 | |
|
2023-11-05 | Windows 10 pool party par Corentin BAYET | 36:34 | 0 | |
|
2023-11-05 | Assignation des permissions Android par Julien THOMAS | 43:43 | 0 | |
|
2023-11-05 | filestruisez votre cracker FPGA à bas coût par Renaud LIFCHITZ | 41:52 | 4 | |
|
2023-11-05 | How my SV Machine nailed your Malware with Nikhil KURKANI | 40:33 | 1 | |
|
2023-11-05 | Keynote par FreeMan | 16:25 | 0 | |
|
2023-11-05 | Le combat numérique au cœur des opérations par Arnaud COUSTILLIERE | 23:40 | 1 | |
|
2023-11-05 | Make hardware great again par Virtualabs | 33:05 | 1 | |
|
2023-11-05 | Mobile communication over BLE with Eliza CHELLENG & Sumanth NAROPANTH | 40:32 | 1 | |
|
2023-11-05 | NTFS, forensics, malwares and vulnerabilities with Stéfan LE BERRE HEURS | 43:28 | 1 | |
|
2023-11-05 | Where Cypherpunk Meets Organized Crime with Benjamin BROWN | 47:20 | 1 | |
|
2023-11-05 | Night Track GNU Anastasis Privacy Preserving Key Backup And Recovery by Christian Grothoff | 28:47 | 0 | |
|
2023-11-05 | Careful Who You Trust Compromising P2P Cameras At Scale by E Barzdukas and J Valletta & D Franke | 35:24 | 0 | |
|
2023-11-05 | CXO Panel Bug Bounty Great Now What | 45:24 | 4 | |
|
2023-11-05 | CXO Panel Digital Identity In The Age Of Fintech | 56:07 | 0 | |
|
2023-11-05 | CXO Panel Diversity In Bug Hunting | 33:26 | 0 | |
|
2023-11-05 | Finding And Exploiting Bugs In TLS Libraries Used By Smart UPS Devices by Yuval Sarel and Gal Levy | 51:12 | 1 | |
|
2023-11-05 | Fuzzware Automating & Scaling Fuzzing For Firmware by Tobias Scharnowski & Marius Muench | 39:09 | 0 | |
|
2023-11-05 | Keynote High assurance Code Reviews How Consulting Works When The Risks Are High by Dan Guido | 49:15 | 6 | Review |
|
2023-11-05 | Keynote Day 2 Hunting Evasive Vulnerabilities Finding Flaws That Others Miss by James Kettle | 40:27 | 2 | |
|
2023-11-05 | Making Of The Sanitizer API by Frederik Braun | 34:43 | 2 | |
|
2023-10-31 | Introduction to USRP and OpenBTS | 54:11 | 4 | |
|
2023-10-31 | Introduction au Social Engineering par HiTch | 1:18:18 | 4 | |
|
2023-10-31 | Presentation de Vodstok | 30:52 | 4 | |
|
2023-10-31 | Presentation de la RatBox | 33:50 | 9 | |
|
2023-10-31 | m101 Exploitation in a hostile world FR | 31:17 | 6 | |
|
2023-10-31 | m101 zadyree kmkz Crawling into your ISP FR | 25:59 | 1 | |
|
2023-10-31 | Mr Jack Cocolitos Crochetage de serrures haute securite a pompe FR | 38:05 | 1 | |
|
2023-10-31 | Winn SCHWARTAU The futur of Infosec EN | 1:03:33 | 2 | |
|
2023-10-31 | Alexandre DENJEAN & Philippe COURCIER | 40:03 | 3 | |
|
2023-10-31 | Bruno KANT Libertie d expression, censure et Internet FR | 32:25 | 0 | |
|
2023-10-31 | Bruno KEROUANTON Reinventing old school vulnerability FR | 28:27 | 1 | |
|
2023-10-31 | Damien CAUQUIL Hacking Android for fun and profits FR | 30:03 | 3 | |
|
2023-10-31 | David DUMAS Hacking girls FR | 43:01 | 3 | |
|
2023-10-31 | Jayson E STREET Steal everything, kill everyone, cause total financial ruin EN | 34:03 | 2 | |
|
2023-10-31 | Damien CAUQUIL Securite des tickets de metro FR | 29:37 | 1 | |
|
2023-10-31 | Franklin RACCAH How did I secured SKYNET FR | 33:55 | 1 | |
|
2023-10-31 | FreeMan Opening Keynote 2012 FR | 24:20 | 0 | |
|
2023-10-31 | Laurence FORAUD HADOPI, LOPPSI, ACTA & Co FR | 50:50 | 0 | |
|
2023-10-31 | Martin KABERG Tor box EN | 28:29 | 2 | |
|
2023-10-31 | Matthieu BOUTHORS Cloud computing FR | 44:01 | 1 | |
|
2023-10-31 | Paul RASCAGNERES & Hugo CARON Analyse et poneage d un botnet FR | 29:51 | 3 | |
|
2023-10-31 | Robert ERRA Cryptographie quantique et post quantique FR | 38:09 | 0 | |
|
2023-10-31 | Tris ACATRINEI Hacking mobile FR | 34:00 | 2 | |
|
2023-10-31 | Winn SCHWARTAU Solving the cyber security hiring crisis EN | 27:27 | 0 | |
|
2023-10-31 | Chris HADNAGY Nonverbal human hacking EN | 47:46 | 3 | |
|
2023-10-31 | Cocolitos & Mrjack Comment obtenir le passe general d un organigramme FR | 17:32 | 0 | |
|
2023-10-31 | Davide CANALI Behind the scenes of web attacks EN | 50:07 | 1 | |
|
2023-10-31 | Eric FILIOL Thibaut SCHERRER Peut on scuriser les villes avec des camras de surveillance FR | 27:32 | 0 | |
|
2023-10-31 | Florent BATARD Nicolas OBERLI Modern Frameworks, Modern vulnerabilities FR | 30:09 | 0 | |
|
2023-10-31 | Hicham TOLIMAT Julie GOMMES Social Engineering et journalisme FR | 34:36 | 2 | |
|
2023-10-31 | Jayson E STREET Love letters to Franck ABAGNALE EN | 46:49 | 0 | |
|
2023-10-31 | Keynote Libert ou contrle EN | 17:34 | 2 | |
|
2023-10-31 | Rosario VALOTTA Abusing browser user interfaces for fun & profit EN | 33:50 | 0 | |
|
2023-10-31 | Sebastien ANDRIVET Attaque de l e voting Un cas concret FR | 43:45 | 0 | |
|
2023-10-31 | Vladimir KATALOV Cracking and analyzing iCloud protocols EN | 43:57 | 1 | |
|
2023-10-31 | Adrian FURTUNA Practical Exploitation of rounding vulnerabilities in banking applications EN | 42:00 | 0 | |
|
2023-10-31 | Cocolitos Mr Jack Physical security flaws applied to industrial spying FR | 39:20 | 0 | |
|
2023-10-31 | Dave KENNEDY Thinking outside of the box EN | 23:45 | 6 | |
|
2023-10-31 | Vorex & Virtualabs Coucou, tu veux voir ma domotique | 32:36 | 0 | |
|
2023-10-31 | Benjamin Bayart Keynote | 9:45 | 11 | |
|
2023-10-31 | Borja Berastegui & Zakaria Rachid Take care of your input | 46:53 | 2 | |
|
2023-10-31 | Crash Test Retro arcade protections and hacking | 39:42 | 0 | |
|
2023-10-31 | Electrolab Using a bathroom scale to follow a beehive production | 40:19 | 0 | |
|