2024-02-19 | Segurança em Linux Christiano Linuxman | 2:37:35 | 0 | |
|
2024-02-19 | Machine Learning Marcelo Camara | 20:35 | 0 | |
|
2024-02-19 | OSCP Um guia prático para certificação Vinicius Vieira | 2:17:44 | 1 | |
|
2024-02-19 | Blockchain e Criptmoedas I Andreza Alexandre | 23:11 | 0 | |
|
2024-02-19 | Bug Bounty Everton Michels | 26:44 | 2 | |
|
2024-02-19 | OSINT Chan Ken Chen | 10:37 | 0 | |
|
2024-02-19 | Simulação de fraude Arthur Paixão I | 19:01 | 1 | |
|
2024-02-19 | Bug Bounty Rafael Cintra | 2:46:28 | 2 | |
|
2024-02-19 | OWASP Giovana Assis | 10:40 | 1 | |
|
2024-02-19 | Pentest Web Giovana Assis | 1:10:55 | 0 | |
|
2024-02-19 | Sistema de votação eletrônico e seus ataques possíveis Inácio Gorayeb | 1:01:13 | 0 | |
|
2024-02-19 | Sistemas Operacionais Manoel Domingues Junior | 25:04 | 0 | |
|
2024-02-19 | Zanshin Tech Samurai in the digital age Claudio Canavese, Silvia Perfigli | 35:49 | 0 | |
|
2024-02-19 | An adversarial approach to improve detection capabilities Bozza, Romano | 54:10 | 0 | |
|
2024-02-19 | Apertura Evento Event Opening Cyber Saiyan | 6:35 | 0 | |
|
2024-02-19 | Cyber Saiyan Live Demo Giovanni Mellini, Davide Pala | 1:20:08 | 0 | |
|
2024-02-19 | Foto Evento Event pictures Cyber Saiyan | 12:33 | 0 | |
|
2024-02-19 | Human Users Detection stop bots with Nginx Andrea Menin | 38:28 | 0 | |
|
2024-02-19 | Live Streaming Sessione mattutina Morning Session see description | 2:34:42 | 0 | |
|
2024-02-19 | Live Streaming Sessione pomeridiana Afternoon Session see description | 2:39:17 | 1 | |
|
2024-02-19 | show me your Windows privileges and I will lead you to SYSTEM Pierini | 51:51 | 0 | |
|
2024-02-19 | Windows RID Hijacking Main'taining Access on Windows Machines Sebastián Castro | 40:43 | 0 | |
|
2024-02-19 | Valerio Di Giampietro Reverse engineering of IoT devices hack a home router ITA | 46:02 | 2 | |
|
2024-02-19 | Anwer Implementation pitfalls of OAuth 2 0 & the Auth Providers who have fell in it | 37:58 | 0 | |
|
2024-02-19 | Francesco Perna & Lorenzo Nicolodi Red teaming from badge to domain ITA | 50:50 | 0 | |
|
2024-02-19 | Le Toux How to impress your management when you are an Active Directory noob | 38:37 | 1 | Guide |
|
2024-02-19 | live streaming | 6:26:28 | 0 | |
|
2024-02-19 | Luca Massarelli SAFE Self Attentive Function Embedding for Binary Similarity | 38:19 | 0 | |
|
2024-02-19 | Orange & Chang Infiltrating Corporate Intra Like NSA Pre auth RCE on Leading SSL VPNs | 50:51 | 0 | |
|
2024-02-19 | Photos | 15:21 | 0 | |
|
2024-02-19 | Raffaele Di Taranto, Vito Lucatorto From 0 to Hero Actionable Threat Intelligence | 41:34 | 0 | |
|
2024-02-19 | Cocomazzi Win Priv Esc Still abusing local service accounts to get SYSTEM priv | 48:35 | 0 | |
|
2024-02-19 | Leo Di Donato Falco runtime security analysis through syscalls | 49:09 | 0 | |
|
2024-02-19 | Marcello Salvati BYOI Bring Your Own Interpreter payloads | 54:15 | 1 | |
|
2024-02-19 | Pawel Rzepa Serverless security attack & defense | 47:56 | 0 | |
|
2024-02-19 | Delhaye & Dola Making your own Stuxnet Exploiting New Vulns and Voodooing PLCs | 46:18 | 1 | |
|
2024-02-19 | Dirk jan Mollema Breaking Azure AD joined endpoints in zero trust environments | 44:25 | 0 | |
|
2024-02-19 | Folini Securing Access to Internet Voting with the OWASP ModSecurity Core Rule Set | 49:29 | 2 | |
|
2024-02-19 | Full Conference | 6:21:00 | 0 | |
|
2024-02-19 | Luke Hinds sigstore, software signing for the masses | 46:21 | 1 | |
|
2024-02-19 | Marco Ivaldi My last Solaris talk not your average keynote | 30:31 | 0 | |
|
2024-02-19 | Antonio Morales Fuzzing Apache HTTP Server for fun and CVEs | 42:25 | 1 | |
|
2024-02-19 | Edoardo Rosa You shall not PassRole | 40:17 | 0 | |
|
2024-02-19 | James Forshaw The Vendor Researcher Relationship Needs Improvement | 32:25 | 0 | |
|
2024-02-19 | Markus Vervier and Yasar Klawohn DES On Fire Breaking Physical Access Control | 37:18 | 0 | |
|
2024-02-19 | Nestori Syynimaa Attacking AAD abusing Synch API The story behind 40k$ bounties | 31:08 | 1 | |
|
2024-02-19 | Rohan Aggarwal Bypassing Anti Cheats & Hacking Competitive Games | 46:21 | 0 | |
|
2024-02-19 | RomHack Camp 2022 | 5:37 | 0 | |
|
2024-02-19 | Davide TheZero Security in a Immutable web3 World Breaching Smart Contracts | 39:36 | 1 | |
|
2024-02-19 | Big Data Analysis Applied to Network Security by Wilson Chua | 33:46 | 0 | |
|
2024-02-19 | Certificate Based Strong Client Authentication by Lawrence E Hughes | 45:28 | 0 | |
|
2024-02-19 | ComeLEAK from Hacking to Behind Bars by godflux & XY | 43:43 | 4 | |
|
2024-02-19 | Demistifying a Malware Attack by Christopher Elisan | 52:33 | 3 | |
|
2024-02-19 | Exploiting Home Routers by Eskie Maquilang | 32:06 | 3 | |
|
2024-02-19 | Halcyon by Sanoop Thomas | 16:34 | 0 | |
|
2024-02-19 | Ransomware Battling a Rapidly Changing and Booming Industry by Jaaziel Sam | 29:35 | 1 | |
|
2024-02-19 | Remote Code Execution via Java Native Deserialization by David Jorm | 31:11 | 0 | |
|
2024-02-19 | Reverse Engineering Swift Apps by Michael Gianarakis | 40:49 | 0 | |
|
2024-02-19 | Shifting Paradigms from Windows to Mac by Nicholas Ramos and Michelle Morales | 45:07 | 1 | |
|
2024-02-19 | Tranewreck by Jeff Kitson | 39:23 | 0 | |
|
2024-02-19 | AV is Dead Is AV Dead by Berman Enconado | 31:45 | 1 | |
|
2024-02-19 | Hugo Fernandes Make Science Sexy Again | 35:23 | 1 | |
|
2024-02-18 | Julio Della Flora Cheating like a Gentleman | 37:37 | 1 | |
|
2024-02-18 | Andreza Alexandre Aprendizado com o hack de grandes exchanges de bitcoin | 34:47 | 0 | |
|
2024-02-18 | Ronaldo Tenório Acessibilidade e inclusão O papel da tecnologia | 32:09 | 0 | Vlog |
|
2024-02-18 | çamento | 1:13 | 0 | |
|
2024-02-18 | Cintia Ramos Criando oportunidades nas dificuldades | 20:45 | 0 | |
|
2024-02-18 | Julio Neves Do Inferno ao Shell em 50 minutos | 31:30 | 0 | |
|
2024-02-18 | Ciswal Santos Levando tecnologia e esperança para a África | 26:18 | 0 | Vlog |
|
2024-02-18 | Lucas Carvalho Quão privado é o Bitcoin | 19:36 | 0 | |
|
2024-02-18 | Cleber Brandão Como a tecnologia pode salvar sua vida | 22:47 | 0 | Vlog |
|
2024-02-18 | Luckas Judocka Hardware e Criptografia, o que é preciso considerar | 45:50 | 0 | |
|
2024-02-18 | Estevão Lazanha & Adriano Volpini Transformação digital e cybersecurity | 38:01 | 1 | |
|
2024-02-18 | Manoel Domingues e Zé Renato HUSKYCI | 37:06 | 0 | |
|
2024-02-18 | Everton Michels All Your Bugs Are Belong To Us | 33:54 | 0 | |
|
2024-02-18 | Marcus Vinicius Como burlar proxy e firewall através de túneis SSH e afins | 39:58 | 0 | |
|
2024-02-18 | Fábio Ramos Os riscos digitais do futuro | 34:39 | 0 | |
|
2024-02-18 | Felipe Luz As oportunidades trazidas pela onda de privacidade | 24:19 | 0 | |
|
2024-02-18 | Música e Gastronomia | 0:30 | 0 | |
|
2024-02-18 | Nana Raythz Inteligência artificial e a segurança dos teus dados | 21:07 | 0 | |
|
2024-02-18 | Fernando H Cardoso Sirius, o maior laboratório científico brasileiro | 38:58 | 0 | |
|
2024-02-18 | Gedeane Kenshima Eletrônica é coisa de criança sim | 23:42 | 0 | |
|
2024-02-18 | Julio Della Flora Ferramentas para hardware hacking | 36:15 | 1 | |
|
2024-02-18 | Yumi Ambriola Grafos e machine learning para análise de dados públicos | 23:34 | 0 | |
|
2024-02-18 | Luiz Henrique Cabuloso Principais cuidados com o aumento de golpes virtuais | 1:03:02 | 0 | |
|
2024-02-18 | Nana Raythz Uma metodologia segura para usuários de Ansible 2 | 32:32 | 1 | Vlog |
|
2024-02-18 | Ramon Souza No office, no problem Como conscientizar usuários remotamente | 27:23 | 0 | |
|
2024-02-18 | Alessandra Monteiro Privacidade e Monitoramento Uma perspectiva LGPD e GDPR | 32:17 | 0 | |
|
2024-02-18 | Respirador Hacker | 32:22 | 0 | |
|
2024-02-18 | Anchises Moraes Cyber Cultura em tempos de Coronavírus | 30:57 | 0 | |
|
2024-02-18 | Boot Santos Fraudes em apps Android | 30:53 | 0 | |
|
2024-02-18 | Camilla Martins & Rob Robert Under Attack | 41:08 | 0 | |
|
2024-02-18 | Cassius Puodzius Execuçāo concólica o reversing nāo pode parar | 1:03:41 | 1 | |
|
2024-02-18 | Deise Gonçalves Ciência dos Dados aplicada ao setor financeiro | 29:39 | 0 | |
|
2024-02-18 | Divina Vitorino Rede Segura | 41:37 | 0 | |
|
2024-02-18 | Gabriel Bergel & Rodrigo Quevedo Biohacking the Disability | 33:45 | 0 | |
|
2024-02-18 | Georgia Weidman Security in The New Reality | 42:34 | 0 | |
|
2024-02-18 | Inácio Gorayeb O que esperar da computação forense em tempos de COVID19 | 40:30 | 0 | |
|
2024-02-18 | Jayson Street Pensamentos aleatórios com Jayson durante o apocalipse | 30:16 | 0 | |
|
2024-02-18 | Joe Grand Setec Astronomy An Overview of Hardware Based Covert Channels | 36:38 | 0 | |
|