magnet:?xt=urn:btih:89BB061C5A72EB9BCDA191A0B27A79F803CDB1A7
Hacktivity 9 2012/Vivek Ramachandran - Cracking WPA WPA2 Personal and Enterprise for Fun and Profit.mp4 183.6 MB
Hacktivity 11 2014/Philip Young - Smashing the Mainframe for Fun and Prison Time.mp4 161.4 MB
Hacktivity 13 2016/Zoltan Balazs - The real risks of the IoT security-nightmare Hacking IP cameras through the cloud.mp4 148.7 MB
Hacktivity 9 2012/Balazs Bucsay - Paypass vulnerabilities.mp4 144.6 MB
Hacktivity 10 2013/Charlie Miller - Car Hacking.mp4 144.3 MB
Hacktivity 15 2018/Mike Ossmann - Keynote Speech at Hacktivity2018.mp4 141.7 MB
Hacktivity 9 2012/Otti Csaba - A biometria biztonsaga.mp4 141.1 MB
Hacktivity 19 2022/Fault Injection (FI) Attacks Against Embedded Systems by András Kabai.mp4 135.4 MB
Hacktivity 9 2012/Csaba Otti - The security and vulnerability of the biometry.mp4 135.0 MB
Hacktivity 15 2018/Gergely Biczok - Interdependent Privacy & the Psychology of Likes.mp4 133.8 MB
Hacktivity 12 2015/Sebastian Garcia - The Network Behavior of Targeted Attacks.mp4 132.7 MB
Hacktivity 13 2016/Dániel Komaromy - Offense wins games, Defense wins nothing.mp4 128.9 MB
Hacktivity 13 2016/Jos Weyers - Lock Impressioning.mp4 126.1 MB
Hacktivity 15 2018/Rodrigo Branco - How Offensive Security is Defining the Way We Compute - Keynote Speech.mp4 125.9 MB
Hacktivity 15 2018/Gabor Szappanos - The Nigerians are in the Spajz.mp4 123.7 MB
Hacktivity 12 2015/Jos Weyers - Post-its, post-its, post-its everywhere (and how they relate to physical keys).mp4 123.4 MB
Hacktivity 9 2012/Joe McCray - Big Bang Theory - Pentesting high security environments.mp4 117.7 MB
Hacktivity 10 2013/Csaba Krasznay - Cyber soldiers in the world - how to become a military hacker.mp4 117.1 MB
Hacktivity 9 2012/Gabor Szappanos - Journey to the bottom of a black hole.mp4 115.8 MB
Hacktivity 16 2019/Tamas Kocsis & Balint Kovacs - Fight Against Fake News Sites Using Open Source Tools (in Hungarian).mp4 115.5 MB
Hacktivity 9 2012/Shakeel Tufail - Software Threat Modeling.mp4 115.2 MB
Hacktivity 20 2023/API Security Assurance via E2E Testing.mp4 114.4 MB
Hacktivity 11 2014/Jason Chan - Building a Glass House.mp4 114.3 MB
Hacktivity 12 2015/Jochanan Sommerfeld - DDoS protection technology is far from being install & forget.mp4 113.3 MB
Hacktivity 13 2016/Zoz - Data Demolition Gone in 60 Seconds.mp4 112.7 MB
Hacktivity 15 2018/Thaís Moreira Hamasaki - The (not so profitable) Path towards Automated Heap Exploitation.mp4 112.5 MB
Hacktivity 10 2013/Muha Lajos, Dr. - Informaciobiztonsagi torveny ertelmezese.mp4 111.9 MB
Hacktivity 10 2013/Lajos Muha, Dr. - Interpretation of the Act on Information Security.mp4 111.0 MB
Hacktivity 16 2019/Dave Lewis - Sharks Petrol These Waters - Keynote Presentation.mp4 110.7 MB
Hacktivity 16 2019/Zoltan Balazs - Oldschool is Still Cool.mp4 110.5 MB
Hacktivity 13 2016/Travis Goodspeed - A Keynote in Praise of Junk Hacking.mp4 109.7 MB
Hacktivity 14 2017/Haroon Meer - keynote - Time to play - D.mp4 109.2 MB
Hacktivity 10 2013/Feher Andras, Otti Csaba - Arcfelismero rendszerek.mp4 108.7 MB
Hacktivity 10 2013/Andras Feher, Csaba Otti - Face Recognition Systems.mp4 108.6 MB
Hacktivity 9 2012/Alexander Polyakov - Top 10 most interesting SAP vulnerabilities and attacks.mp4 107.4 MB
Hacktivity 13 2016/Daniel Bohannon - Invoke-Obfuscation PowerShell obFUsk8tion.mp4 107.0 MB
Hacktivity 16 2019/Barnabas Sztan-Kovacs - Notwork Security.mp4 106.2 MB
Hacktivity 16 2019/Andrea Pierini - WHOAMI - PRIV - Show Me Your Privileges and I Will Lead You to System.mp4 105.3 MB
Hacktivity 12 2015/Fehér András, Kapitány Sándor, Martinkovics Dániel, Otti Csaba - Kézben a biztonság ().mp4 104.7 MB
Hacktivity 12 2015/Felix - FX - Lindner - keynote speaker.mp4 104.4 MB
Hacktivity 14 2017/Ben Seri & Gregory Vishnepolsky - BlueBorne Explained.mp4 104.1 MB
Hacktivity 10 2013/Domonkos Tomcsanyi - GSM - have we overslept the last wake-up call.mp4 104.0 MB
Hacktivity 20 2023/Roundtable Discussion about NIS2 Directive (in Hungarian).mp4 103.4 MB
Hacktivity 13 2016/Gerhard Klostermeier, Matthias Deeg - Of Mice and Keyboards.mp4 102.5 MB
Hacktivity 12 2015/Marina Krotofil - Rocking the pocket book - hacking chemical plant for competition and extortion.mp4 101.9 MB
Hacktivity 14 2017/Ethical hacking in Hungary - Roundtable discussion (in Hungarian).mp4 101.3 MB
Hacktivity 19 2022/Broad View to Automotive Security & Penn testing by András Kabai & László Tóth.mp4 100.1 MB
Hacktivity 12 2015/Gábor Szappanos - Comparing the incomparables.mp4 100.1 MB
Hacktivity 9 2012/Steve Mulhearn - The Rise and Fall of DDoS Attacks in 2012.mp4 99.4 MB
Hacktivity 13 2016/Csaba Fitzl, Miklos Desbordes-Korcsev - Exploit generation, JavaScript analysis automation.mp4 95.8 MB
Hacktivity 9 2012/Krisztian Schaffer - Security Code Review.mp4 95.7 MB
Hacktivity 15 2018/Zoltan Balazs - Ethereum Smart Contract Hacking Explained like I'm Five.mp4 95.6 MB
Hacktivity 9 2012/Schaffer Krisztian - Forraskod ellenorzes biztonsagi szempontok alapjan.mp4 95.6 MB
Hacktivity 12 2015/Micha Borrmann - Attacking all your IPv4 devices at home from the Internet via Dual-Stack Lite.mp4 95.5 MB
Hacktivity 12 2015/Zoltán Balázs - Sandbox detection for the masses - leak, abuse, test.mp4 94.5 MB
Hacktivity 9 2012/Domonkos Tomcsanyi - Give me a phone that can't be traced.mp4 93.9 MB
Hacktivity 14 2017/Julien Thomas - Limitations of Android permission system.mp4 93.3 MB
Hacktivity 20 2023/Pwning into Power System Center.mp4 93.0 MB
Hacktivity 12 2015/Marosi Attila - A Hacking Team rosszindulatú programjai.mp4 92.1 MB
Hacktivity 14 2017/Zoltan Balazs - How to hide your browser 0-days.mp4 91.8 MB
Hacktivity 12 2015/Jason Zhang - Make Invisible Visible - Case Studies in PDF Malware.mp4 91.6 MB
Hacktivity 9 2012/Akos Subecz - Security Problems at Hungarian everydays.mp4 91.5 MB
Hacktivity 14 2017/Anto Joseph - Bug hunting using symbolic virtual machines.mp4 91.3 MB
Hacktivity 10 2013/Charlie Miller - Mobile Threats - Hype vs. Reality (Magyar).mp4 91.1 MB
Hacktivity 12 2015/Axelle Apvrille - Fitness Tracker - Hack in Progress.mp4 90.9 MB
Hacktivity 10 2013/Benjamin Tamasi - Hacking CCTV systems.mp4 90.9 MB
Hacktivity 12 2015/Glenn Ten Cate - OWASP Security knowledge Framework - Survival is not mandatory.mp4 90.8 MB
Hacktivity 13 2016/Daniel Gruss - Microarchitectural Incontinence - You would leak too if you were so fast.mp4 89.9 MB
Hacktivity 10 2013/Bardoczi Akos, Zsakai Lilian - Adatbanyaszat a kozossegi web koraban.mp4 89.7 MB
Hacktivity 15 2018/Balazs Bucsay - XFLTReaT - Building a Tunnel.mp4 89.7 MB
Hacktivity 10 2013/Akos Bardoczi, Lilian Zsakai - Data mining in the age of social web.mp4 89.7 MB
Hacktivity 10 2013/Laszlo Toth, Ferenc Spala - What s common in Oracle and Samsung.mp4 89.6 MB
Hacktivity 9 2012/Subecz Akos - Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban.mp4 88.5 MB
Hacktivity 10 2013/Charlie Miller - Mobile Threats - Hype vs. Reality.mp4 88.4 MB
Hacktivity 16 2019/Aman Sachdev & Himanshu Sharma - Hacking Real Life Financial Applications.mp4 88.3 MB
Hacktivity 14 2017/Attila Szasz & Gergo Hosszu - Dive into Magenta - fuzzing Google's new kernel.mp4 88.3 MB
Hacktivity 14 2017/Harman Singh - Active Directory Threats & Detection.mp4 88.2 MB
Hacktivity 14 2017/Costin Raiu - keynote - APT Paleontology in the age of cyber.mp4 88.2 MB
Hacktivity 9 2012/Shay Chen - The Diviner - Digital Clairvoyance Breakthrough.mp4 88.1 MB
Hacktivity 15 2018/Kocsis Tamas & Kovacs Balint - Az Informacioszivargas Monitorozasa Open Source Eszközökkel.mp4 87.1 MB
Hacktivity 16 2019/Marcell Molnar - Hacking ATMs on a Budget.mp4 86.8 MB
Hacktivity 20 2023/Can We Break the Fault Injection Mitigation Bob.mp4 84.8 MB
Hacktivity 10 2013/Zoltan Balazs - Alice in eXploitland, attack and defense evolution.mp4 84.8 MB
Hacktivity 13 2016/Tamas Szakaly - Help, Ive got ANTs.mp4 84.7 MB
Hacktivity 15 2018/Brian Gorenc - From Bounties to Bureaucracy - Keynote Speech.mp4 84.3 MB
Hacktivity 14 2017/Zoltan Balazs - How to pwn a Windows domain.mp4 84.2 MB
Hacktivity 9 2012/Andras Veres-Szentkiralyi - USB = Universal Security Bug.mp4 84.0 MB
Hacktivity 11 2014/Micha Borrmann - CVSS is a big botch Scoring systems do not help to improve the IT security.mp4 83.8 MB
Hacktivity 20 2023/It Was Harder to Sniff Bluetooth Through My Mask During the Pandemic.mp4 83.7 MB
Hacktivity 13 2016/Vladimir Katalov - iOS Acquisition Methods Compared.mp4 83.6 MB
Hacktivity 9 2012/Adrian Furtuna - Digipass Instrumentation for Fun and Profit.mp4 82.4 MB
Hacktivity 10 2013/Gabor Pek - eNeMI - Evading the state-of-the-art hardware protection of IO virtualization.mp4 82.1 MB
Hacktivity 11 2014/Balazs Zoltan - Bypass firewalls, application white lists, secure remote desktops in 20 seconds.mp4 82.0 MB
Hacktivity 12 2015/Martin Knobloch - Secure software, start appreciating your developers.mp4 81.7 MB
Hacktivity 11 2014/Nicolas Gregoire - Hunting for Top Bounties.mp4 81.6 MB
Hacktivity 9 2012/Alexander Kornbrust - Self Defending Database.mp4 81.3 MB
Hacktivity 12 2015/Mark Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.mp4 80.7 MB
Hacktivity 9 2012/Bucsay Balazs - Paypass serulekenysegek.mp4 80.5 MB
Hacktivity 14 2017/Travis Goodspeed - Some Thoughts on Literate Disassembly and Symbol Porting.mp4 80.1 MB
Hacktivity 14 2017/Balint Varga-Perke (Buherator) - Corrupting Ancient Spirits - Penetration Testing Oracle Forms.mp4 80.0 MB
Hacktivity 16 2019/Christina Lekati - Social Engineering through Social Media.mp4 79.1 MB
Hacktivity 9 2012/Sandor Nagy - NAT Attack.mp4 79.1 MB
Hacktivity 10 2013/Tamas Jos, Attila Bogar - is BitTorrent really providing anonymity.mp4 79.0 MB
Hacktivity 12 2015/Balazs Bucsay - Chw00t - Breaking Unices - chroot solutions.mp4 78.7 MB
Hacktivity 9 2012/Szabo Aron - Chip-csirip, avagy PKI eszkozok alternativ felhasznalasai.mp4 78.5 MB
Hacktivity 16 2019/Arun Mane & Nikhil Bogam - Making Anomaly Detection System(ADS) for Vehicles - Canbus and Lin.mp4 78.2 MB
Hacktivity 9 2012/Miroslav Stampar - Spot the Web Vulnerability.mp4 78.2 MB
Hacktivity 10 2013/Axelle Apvrille - Playing Hide and Seek with Dalvik Executables.mp4 78.0 MB
Hacktivity 9 2012/Aron Szabo - Chip-tweet alternative usage of PKI devices.mp4 78.0 MB
Hacktivity 9 2012/Antonio Barresi, Peter Somogyvari - Android Security - An Introduction.mp4 77.9 MB
Hacktivity 12 2015/Pornsook Kornkitichai - Defend PowerShell Attacks When All Else Fails.mp4 77.7 MB
Hacktivity 9 2012/Tamas Szekely - Attacking The First Hop Redundancy.mp4 77.6 MB
Hacktivity 9 2012/Dr. Boldizsar Bencsath - What Makes the Analysis of Malware. Like Duqu or Flame.mp4 77.3 MB
Hacktivity 11 2014/Komaromy Daniel - Enter The Snapdragon.mp4 77.1 MB
Hacktivity 14 2017/Csaba Fitzl - How to convince a malware to avoid us.mp4 77.1 MB
Hacktivity 9 2012/Szekely Tamas - Hello HSRP, viszlat HSRP.mp4 76.9 MB
Hacktivity 10 2013/Dr. Leitold Ferenc Horvath Botond - Vedekezes kartevok C&C forgalma ellen.mp4 76.7 MB
Hacktivity 10 2013/Ferenc Leitold, Ph.D Botond Horvath - Protection against the C&C traffic of malware.mp4 76.6 MB
Hacktivity 10 2013/Gabor Szappanos - Advanced() Persistent Shellcode.mp4 76.6 MB
Hacktivity 12 2015/Tamás Szakály - Shall we play a game.mp4 76.3 MB
Hacktivity 14 2017/Omar Eissa - Network Automation is not your Safe Haven.mp4 76.1 MB
Hacktivity 12 2015/Omer Coskun - Why nation-state malwares target Telco Networks - Regin and its counterparts.mp4 75.9 MB
Hacktivity 13 2016/Stefan Marsiske - Post-quantum is the new cyber5.mp4 75.4 MB
Hacktivity 10 2013/Zane Lackey - Attack-driven defense.mp4 74.5 MB
Hacktivity 16 2019/Thomas Debize - A Decade of Infosec Tools.mp4 74.3 MB
Hacktivity 19 2022/Web3 - Scams = It's a Match by Zoltán Balázs.mp4 74.2 MB
Hacktivity 9 2012/Sir David Pepper - Cyberspace and Beyond - Evolution in Action.mp4 74.2 MB
Hacktivity 12 2015/joernchen of Phenoelit - Your Web app, those hackers & you.mp4 74.0 MB
Hacktivity 9 2012/Sir David Pepper - Kiberter es azon tul - folyamatban az evolucio.mp4 73.8 MB
Hacktivity 9 2012/Zoltan Balazs - Zombie Browsers, spiced with rootkit extensions.mp4 73.8 MB
Hacktivity 15 2018/Jack S (linkcabin) - Becoming the Quiz Master - Thanks RE.mp4 73.5 MB
Hacktivity 12 2015/Áron Szabó - Post-kvantumkriptográfia - prím kérdések = príma kérdések.mp4 73.1 MB
Hacktivity 15 2018/Joxean Koret - Pigaios - A Tool for Diffing Source Codes against Binaries.mp4 72.5 MB
Hacktivity 10 2013/Laszlo Miklos Biro - Tempest, the hidden source of data leakage.mp4 71.8 MB
Hacktivity 15 2018/Paolo Stagno - A Drone Tale - All Your Drones Belong To Us.mp4 71.7 MB
Hacktivity 10 2013/Tamas Szekely - One a Penny, Two a Penny Hot DDoS run.mp4 71.6 MB
Hacktivity 10 2013/Gergely Revay - Security implications of the Cross-Origin Resource Sharing.mp4 71.5 MB
Hacktivity 10 2013/Szekely Tamas - DDoS-t vettem a vasarban bitpenzzel.mp4 71.4 MB
Hacktivity 12 2015/Bíro László Miklós - Titkosítás és visszafejtés a fizikai réteg szintjén.mp4 71.2 MB
Hacktivity 12 2015/Boldizsár Bencsáth - BAB0 - A custom sample that bypassed cutting-edge APT attack detection tools.mp4 71.1 MB
Hacktivity 10 2013/Evgeny Neyolov - Inside the illegal traffic sales.mp4 70.7 MB
Hacktivity 12 2015/Zsombor Kovács - Semi-automated mapping of iOS binaries.mp4 70.6 MB
Hacktivity 13 2016/Gábor Pek, Tamas Koczka - SpamAndHex hacks around the world.mp4 70.0 MB
Hacktivity 9 2012/Judit Varga - Amy Farrah Fowler, or the geek girl s case with the tiara.mp4 70.0 MB
Hacktivity 12 2015/Levente Buttyán, András Szijj, Zsolt Szalay - Hacking cars in the style of Stuxnet.mp4 69.4 MB
Hacktivity 10 2013/Mihaly Zagon - The Only Thing That Is Constant Is Change.mp4 69.2 MB
Hacktivity 10 2013/Balint Varga-Perke, - Buherator - Heureka - The Suspicious Thing Is That It s Not Suspicious.mp4 69.1 MB
Hacktivity 10 2013/Varga-Perke Balint, Buherator - Heureka - Az a gyanus ami nem gyanus.mp4 69.0 MB
Hacktivity 9 2012/Zsombor Kovacs - To secure data is to prepare for jailbreak.mp4 69.0 MB
Hacktivity 9 2012/Laszlo Biro - Alternative internet.mp4 68.9 MB
Hacktivity 15 2018/Alex Plaskett & James Loureiro - The Mate Escape - Android Pwn2Owning.mp4 68.4 MB
Hacktivity 20 2023/How Attackers Find & Exploit Secrets in Source Code.mp4 68.2 MB
Hacktivity 15 2018/Stephan Gerling - Hacking Yachts Remotely via Satcom or Maritime Internet Router.mp4 67.2 MB
Hacktivity 13 2016/Rene Freingruber - Bypassing application whitelisting in critical infrastructures.mp4 67.0 MB
Hacktivity 16 2019/Inbar Raz - Under Pressure Real World Damage with TPMS Spoofing.mp4 66.7 MB
Hacktivity 13 2016/Mateusz Olejarka - Approaching the unknown Windows Phone application security assessment guide.mp4 66.7 MB
Hacktivity 10 2013/Mikko Hypponen - The Cyber Arms Race (Magyar).mp4 66.5 MB
Hacktivity 10 2013/Dr. Boldizsar Bencsath - What happened to targeted malware attacks last year.mp4 66.2 MB
Hacktivity 18 2021/DNS in Offensive Techniques.mp4 66.2 MB
Hacktivity 15 2018/Zsombor Kovacs - Cheaters for Everything from Minesweeper to Mobile Banking Applications.mp4 65.5 MB
Hacktivity 16 2019/Jennifer Janesko - Facepalm and Carry On A Tale of I's O's and T's.mp4 65.4 MB
Hacktivity 15 2018/Inbar Raz - Under the Hood - The Automotive Challenge.mp4 65.1 MB
Hacktivity 8 2011/Otti Csaba, Oszi Arnold - Ujjlenyomat azonosito rendszerek, biztonsag vagy biztonsagi res.mp4 65.0 MB
Hacktivity 15 2018/Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps.mp4 64.8 MB
Hacktivity 8 2011/Csaba Otti, Arnold Oszi - Finderprint identification systems, security or security leak.mp4 64.7 MB
Hacktivity 13 2016/Dmitry Chastuhin, Dmitry Yudin -Getting access to the SAP server via SAP Management Console.mp4 64.4 MB
Hacktivity 12 2015/Fabian Yamaguchi - Mining for Bugs with Graph Database Queries.mp4 64.2 MB
Hacktivity 14 2017/Mateusz Olejarka - REST API, pentester's perspective.mp4 64.1 MB
Hacktivity 14 2017/Kirils Solovjovs - Tools for effortless reverse engineering of MikroTik routers.mp4 64.0 MB
Hacktivity 18 2021/Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones.mp4 63.6 MB
Hacktivity 16 2019/Ignat Korchagin - Live-Patching Weak Crypto with OpenSSL Engines.mp4 63.5 MB
Hacktivity 14 2017/Ignat Korchagin - Exploiting USB IP in Linux.mp4 63.3 MB
Hacktivity 12 2015/Zoltán L. Németh - Memory corruption vulnerabilities, runtime mitigations and their bypasses.mp4 63.2 MB
Hacktivity 10 2013/Mikko Hypponen - The Cyber Arms Race.mp4 63.1 MB
Hacktivity 16 2019/David Török - A Friendly Guide on How to Avoid Getting Pwned Out of Business - a Hacker's Memento.mp4 62.2 MB
Hacktivity 10 2013/Dr. Bartok Sandor Peter - Informatikai igazsagugyi laboratoriumok szakmai szolgaltatasai.mp4 62.0 MB
Hacktivity 15 2018/Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication System.mp4 62.0 MB
Hacktivity 13 2016/George Webster, Julian Kirsch - A Study of the Rich Header and Respective Malware Triage.mp4 61.9 MB
Hacktivity 14 2017/Mehmet Ince - A heaven for Hackers - Breaking Log SIEM Products.mp4 60.9 MB
Hacktivity 16 2019/Asad Qureshi - Using Open Source Intelligence to Investigate CryptoCurrency Cybercrime.mp4 60.4 MB
Hacktivity 12 2015/Váradi Tamás- Tárcsás zárak nyitásának eszközei és módszerei.mp4 60.3 MB
Hacktivity 14 2017/Roland Kamaras - Locky - anti-analysis techniques used by the ransomware.mp4 60.3 MB
Hacktivity 13 2016/Ivan Yushkevich Wordlists from statistics to genetic.mp4 60.3 MB
Hacktivity 14 2017/Leigh-Anne Galloway - Money makes money - How to buy an ATM and what you can do with it.mp4 60.2 MB
Hacktivity 13 2016/Aleksandar Nikolic - Guided Fuzzing And Binary Blobs.mp4 59.6 MB
Hacktivity 10 2013/Tenyi Geza, Dr. - Bizalmas informaciok kezelese es adatvedelem a felhoszolgaltatasban.mp4 59.0 MB
Hacktivity 10 2013/Geza Tenyi - Management of Confidential Information and Data Protection In Cloud Computing.mp4 58.8 MB
Hacktivity 20 2023/How to Hack and Defend (Your) Open Source.mp4 57.9 MB
Hacktivity 19 2022/Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal.mp4 57.9 MB
Hacktivity 13 2016/Kelly Shortridge - The Art of Explanation Behavioral Models of InfoSec.mp4 57.5 MB
Hacktivity 8 2011/Bodor Peter - Social Engineering es pszichologia.mp4 57.4 MB
Hacktivity 9 2012/Andras Kabai - Hunting and exploiting bugs in kernel drivers.mp4 57.2 MB
Hacktivity 20 2023/Get Deception In Your Environment Now.mp4 57.1 MB
Hacktivity 8 2011/Peter Bodor - Social Engineering and psychology.mp4 57.0 MB
Hacktivity 18 2021/The History of Hacking AI Systems.mp4 57.0 MB
Hacktivity 16 2019/Frantisek Strasak & Jan Fajfer - Increasing Efficiency of Encr. Traffic Analysis of People at Risk.mp4 56.8 MB
Hacktivity 15 2018/Gabriel Cirlig & Stefan Tanase - Smart Car Forensics & Vehicle Weaponization.mp4 56.6 MB
Hacktivity 10 2013/Tamas K. Lengyel - Virtual Machine Introspection to Detect and Protect.mp4 56.6 MB
Hacktivity 20 2023/SIEM Slam Tricking Modern SIEMs with Fake Logs and Confusing Blue Teams.mp4 56.0 MB
Hacktivity 13 2016/Sergej Proskurin, Tamás K. Lengyel - Stealthy, Hypervisor-based Malware Analysis.mp4 55.8 MB
Hacktivity 8 2011/Raul Chiesa - Kiberbunozes, informacios hadviseles es kiberhaboru - mi ez az egesz.mp4 55.5 MB
Hacktivity 8 2011/Raul Chiesa - Cybercrime, Information, Warfare and Cyberwar - what s this all about.mp4 55.5 MB
Hacktivity 16 2019/Kelly Shortridge - To Err is Human - Keynote Presentation.mp4 55.1 MB
Hacktivity 10 2013/Maroy Akos, Bodoky Tamas - Anonim adatszivarogtatas a GlobaLeaks platform.mp4 54.6 MB
Hacktivity 20 2023/The New SaaS Cyber Kill Chain.mp4 54.2 MB
Hacktivity 19 2022/Hacking AppLocker Cache by Grzegorz Tworek.mp4 54.1 MB
Hacktivity 8 2011/Vivek Ramachandran - Enterprise Wi-Fo Worms, Backdoors and Botnets for Fun and Profit.mp4 54.1 MB
Hacktivity 10 2013/Akos Maroy, Tamas Bodoky - Anonim whistleblowing using the GlobaLeaks platform.mp4 54.0 MB
Hacktivity 8 2011/Felix Schuster - Design and implementation of an additional layer of encryption for Skype.mp4 53.5 MB
Hacktivity 8 2011/Vivek Ramachandran - Enterprise Wi-Fo Worms.mp4 53.3 MB
Hacktivity 13 2016/Laszlo Miklos Biro - Lets hijack an airplane.mp4 53.3 MB
Hacktivity 8 2011/Szor Peter - Kuzdelem a kartekony kodok ellen.mp4 53.2 MB
Hacktivity 19 2022/How Attackers Abused DNS in 2021 2022 by Piotr Głaska.mp4 52.9 MB
Hacktivity 8 2011/Peter Szor - Fighting Computer Malware.mp4 52.4 MB
Hacktivity 9 2012/Andras Tevesz - Neutralizing an AntiVirus program.mp4 52.2 MB
Hacktivity 8 2011/Oroszi Eszter - Social Engineering, amikor fellebben a fagyol.mp4 52.1 MB
Hacktivity 9 2012/Tevesz Andras - Antivirus program hatastalanitas.mp4 51.8 MB
Hacktivity 8 2011/Eszter Oroszi - Social Engineering, when the veil lifted.mp4 51.5 MB
Hacktivity 12 2015/Norbert Tihanyi - Modification of the prime generation method of the OpenSSL library.mp4 50.8 MB
Hacktivity 20 2023/The Power of Coercion Techniques in Windows Environments.mp4 50.5 MB
Hacktivity 18 2021/C2Centipede APT Level C2 Communications for Common Reverse HTTP Shell Tools.mp4 50.4 MB
Hacktivity 18 2021/MIPS-X The Next IoT Frontier.mp4 50.3 MB
Hacktivity 8 2011/Kovacs Gyozo - Valogatott kalandozasaim Informatikaban.mp4 50.1 MB
Hacktivity 9 2012/Tamas Varadi - Impressioning.mp4 50.0 MB
Hacktivity 13 2016/Gabor Molnar - War Stories from Google Vulnerability Reward Program.mp4 49.8 MB
Hacktivity 16 2019/Laszlo Miklos Biro - IoT Devices, Were Are You and What Do you Do.mp4 49.4 MB
Hacktivity 9 2012/Varadi Tamas - Impressziotechnika.mp4 49.4 MB
Hacktivity 10 2013/Paul M. Wright - Oracle 12c Security - Defense and Attack.mp4 49.3 MB
Hacktivity 10 2013/Vaagn Toukharian - HTTP Time Bandit.mp4 48.8 MB
Hacktivity 8 2011/Gyozo Kovacs - My Assorted Wandering in IT.mp4 48.8 MB
Hacktivity 16 2019/Itay Cohen & Ari Eitan - The Red Square - Mapping the Connections Inside Russia's APT Ecosystem.mp4 48.5 MB
Hacktivity 18 2021/How to Bypass Data Exfiltration Detection with Malicious Cryptography Techniques.mp4 48.4 MB
Hacktivity 10 2013/Yury Chemerkin - (In-) Efficiency of security features on mobile security and compliance.mp4 48.1 MB
Hacktivity 19 2022/Practical EDR Bypass Methods in 2022 by István Tóth.mp4 47.7 MB
Hacktivity 8 2011/Dr. Muszka Dniel - Kalmr korszak Szegeden.mp4 47.7 MB
Hacktivity 16 2019/Mikhail Egorov - What's Wrong with WebSocket APIs Unveiling Vulnerabilities in WebSocket APIs.mp4 47.7 MB
Hacktivity 20 2023/That’s Just a Tool - Not Good Nor Bad. That Part is Up to YOU.mp4 47.5 MB
Hacktivity 19 2022/Spin That Steering Wheel by Domokos Nagy.mp4 47.4 MB
Hacktivity 8 2011/Major Marcell, Zagon Mihaly - A legajabb webes tamadasi lehetosegek.mp4 47.3 MB
Hacktivity 8 2011/Lederer Sandor Foldes Adam Bodoky Tamas Csorgo Laszlo - Wikileaks - info-szabadsagharc vagy info-terr.mp4 47.3 MB
Hacktivity 18 2021/The Key to an - Entire Kingdom - Pandora FMS - Chained Exploit (CVE-2021-34074).mp4 47.3 MB
Hacktivity 8 2011/Dr. Peszleg Tibor - Mit tegynk, ha bekvetkezett a baj.mp4 46.9 MB
Hacktivity 10 2013/Tamas Szakaly - Stolen bytes on the video card - the GPU as an anti-rce device.mp4 46.8 MB
Hacktivity 8 2011/Sandor Lederer Adam Foldes Tamas Bodoky Laszlo Csorgo - Wikileaks - info-freedom fight or info-terror.mp4 46.8 MB
Hacktivity 8 2011/Kerenyi Kristof, Hornak Zoltan, Kispal Istvan - Crypto-chipek biztonsaga, passziv-aktiv kombinalt ta.mp4 46.7 MB
Hacktivity 10 2013/Szakaly Tamas - Lopott bajtok a videokartyan - a GPU, mint anti-rce eszkoz.mp4 46.6 MB
Hacktivity 8 2011/Vivek Ramachandran - Nagyvallalati Wi-Fi fergek es botnetek.mp4 46.6 MB
Hacktivity 8 2011/Marcell Major, Mihaly Zagon - Modern Browser Attack Vectors.mp4 46.6 MB
Hacktivity 8 2011/Gyongyosi Peter, Illes Marton Tuzfalak es tamadasok.mp4 46.6 MB
Hacktivity 20 2023/Carved in Stone Malware [ab]use of the Bitcoin Blockchain.mp4 46.4 MB
Hacktivity 8 2011/Dr. Peszleg Tibor - What to do when the problem is on board.mp4 46.3 MB
Hacktivity 17 2020/Hacking the Hacktivity 2019 badge by Valerio Di Giampetro.mp4 46.2 MB
Hacktivity 8 2011/Peter Gyongyosi, Marton Illes - Firewalls and Exploits.mp4 46.1 MB
Hacktivity 8 2011/Kristof Kerenyi, Zoltan Hornak, Istvan Kispal - Crypto-chipset Security, Passive-Active Combined Attacks.mp4 46.1 MB
Hacktivity 19 2022/Automating Binary Analysis with Ghidra's P-Code by Gergely Révay.mp4 46.0 MB
Hacktivity 8 2011/Subecz Akos, Zantho Csaba - Lockpicking - a zarnyitas muveszete.mp4 45.7 MB
Hacktivity 10 2013/Dr. Daniel Eszteri - Legal Background of Cybercrime.mp4 45.7 MB
Hacktivity 19 2022/Making Sense of Firmware Images - The Journey by Márton Illés.mp4 45.7 MB
Hacktivity 8 2011/Akos Subecz, Csaba Zantho - Lockpicking - the finest art of opening locks.mp4 45.6 MB
Hacktivity 19 2022/Sisyphus and the CVE Feed by Keziah Plattner & Kadia Mashal.mp4 45.4 MB
Hacktivity 15 2018/Robert Neumann - What's 4k in real Money.mp4 45.4 MB
Hacktivity 20 2023/Unraveling the Veins of Automotive Vulnerabilities.mp4 45.2 MB
Hacktivity 18 2021/Millions for Nothing and Clicks for Free.mp4 44.7 MB
Hacktivity 16 2019/Gabriel Cirlig - ADBHoney - Analyzing the ADB Malware Ecosystem.mp4 44.0 MB
Hacktivity 18 2021/4 Weird Google VRP Bugs in 40 Minutes.mp4 43.8 MB
Hacktivity 16 2019/Aleksandr Kolchanov - Attacks on GSM Alarms, Smart Homes, Ind. Control Sys. & Smartwatches for Kids.mp4 43.8 MB
Hacktivity 19 2022/DiceyF Deploys the GamePlayerFramework by Kurt Baumgartner & Georgy Kucherin.mp4 43.6 MB
Hacktivity 8 2011/Kabai Andras - Malware Analizis, tippek es trukkok.mp4 43.3 MB
Hacktivity 20 2023/7 Steps to Secure a SaaS Platform - the Worlds Biggest Companies Trust.mp4 43.2 MB
Hacktivity 20 2023/AI Security.mp4 43.0 MB
Hacktivity 8 2011/Andras Kabai - Malware Analysis Tips and Tricks.mp4 42.8 MB
Hacktivity 17 2020/ATTPwn Adversary Emulation. ATT&CK Automation by Pablo González & Fran Ramírez.mp4 42.7 MB
Hacktivity 15 2018/Vincent Ruijter - ~Securing~ Attacking Kubernetes.mp4 42.1 MB
Hacktivity 8 2011/Illes Zsolt - Informatikai bizonyitek, bizonyitas igazsagugyi szakertoi szemmel.mp4 41.9 MB
Hacktivity 19 2022/Pwned in Space by Paul Coggin.mp4 41.3 MB
Hacktivity 19 2022/Applying ATT&CK to Analyze Ransomware Campaigns by Marc Rivero López.mp4 41.3 MB
Hacktivity 20 2023/Clashing EV Chargers in The Pentesting Arena.mp4 41.2 MB
Hacktivity 10 2013/Robert Lipovsky - The - Facebook PokerAgent.mp4 41.0 MB
Hacktivity 10 2013/Dmitriy Chastuchin - Injecting evil code in your SAP J2EE systems.mp4 40.9 MB
Hacktivity 20 2023/Formshaker.mp4 40.8 MB
Hacktivity 8 2011/Michele Orru - Dr. Strangelove or How I learned to Stop Worrying and Love the BeEF.mp4 40.7 MB
Hacktivity 17 2020/Service Mess to Service Mesh by Rob Richardson.mp4 40.7 MB
Hacktivity 8 2011/Gara-Tarnczi Peater - Publikus exploitok testreszabasa.mp4 40.6 MB
Hacktivity 19 2022/DDoS Testing Your Infrastructure, including IPv6 SYN floods by Henrik Kramselund.mp4 40.4 MB
Hacktivity 16 2019/Kuba Gretzky - Phishing Through Modern 2FA Defences With Evilginx.mp4 40.0 MB
Hacktivity 14 2017/Adrian Vollmer - Attacking RDP with Seth.mp4 39.6 MB
Hacktivity 7 2010/Panczel Zoltan, Spala Ferenc - Buffer Overflow Workshop.mp4 39.4 MB
Hacktivity 7 2010/Zoltan Panczel, Ferenc Spala - Buffer Overflow Workshop.mp4 39.2 MB
Hacktivity 19 2022/m Hacking Power Grids to Oil Pipelines - Barak Sternberg.mp4 39.2 MB
Hacktivity 18 2021/Vulnerabilities When Securing Your Own Environment is No Longer Enough.mp4 39.1 MB
Hacktivity 19 2022/Automotive Threat Intelligence by Péter Venesz & Giuseppe Serio.mp4 39.0 MB
Hacktivity 16 2019/Csaba Fitzl - Gatekeeper - Bypass or Not Bypass.mp4 38.7 MB
Hacktivity 18 2021/Malware Hunting - Using Python as Attack Weapon.mp4 38.2 MB
Hacktivity 8 2011/Yaniv Miron - SCADA szomorusag avagy bumm-bumm SCADA.mp4 37.4 MB
Hacktivity 8 2011/Veres-Szentkiralyi Andracus - Hacking hardware for fun and profit.mp4 37.1 MB
Hacktivity 17 2020/Revisiting a Wireless Alarm System by Matthias Deeg.mp4 36.9 MB
Hacktivity 8 2011/Andras Veres-Szentkiralyi - Hacking hardware for fun and profit.mp4 36.8 MB
Hacktivity 8 2011/Yaniv Miron - SCADA Dismal or bang-bang SCADA.mp4 36.8 MB
Hacktivity 8 2011/Barta Csaba - Az NTDS.DIT forensics vizsgalata.mp4 36.5 MB
Hacktivity 18 2021/Mount(ain) of Bugs.mp4 36.2 MB
Hacktivity 8 2011/Csaba Barta - Forensic analysis of NTDS.DIT.mp4 36.1 MB
Hacktivity 19 2022/How to Kickstart a Security Program by Ottucsák József.mp4 35.8 MB
Hacktivity 17 2020/Broken IoT Supply Chain by Martin Hron.mp4 35.7 MB
Hacktivity 20 2023/SOCKS Over RDP Citrix (Pentesting Over Jump Boxes).mp4 35.4 MB
Hacktivity 17 2020/Dissectiong and Comparing Different Binaries to Malware Analysis by Filipi Pires.mp4 35.2 MB
Hacktivity 8 2011/Michele Orru - Dr. Strangelove avagy Hogyan tanultam meg nem aggodni es szeretni a BeEF-ek.mp4 34.8 MB
Hacktivity 19 2022/From Red to Black and Beyond by Albert Zsigovits & Robert Neumann.mp4 34.6 MB
Hacktivity 8 2011/Dr. Leitold Ferenc, Horvath Botond - Dobozba zart internet.mp4 34.6 MB
Hacktivity 18 2021/CSS Keylogger in 2021 - The Hubris of the Security Community.mp4 34.5 MB
Hacktivity 8 2011/Balazs Zoltan - IPv6 shipworm - My little windows domain pwnie.mp4 34.5 MB
Hacktivity 17 2020/Reversing Golang Binaries with Ghidra by Dorka Palotay and Albert Zsigovits.mp4 34.3 MB
Hacktivity 8 2011/Dr. Ferenc Leitold, Botond Horvath - Internet in the Sandbox.mp4 34.3 MB
Hacktivity 20 2023/Examining the Explanatory Factors of Malicious Hacking Behaviors.mp4 34.1 MB
Hacktivity 16 2019/TUnde Lendvai - Chinese Social Credit System - Security Issues and Social Impact.mp4 34.1 MB
Hacktivity 8 2011/Zoltan Balazs - IPv6 shipworm - My little windows domain pwnie.mp4 34.1 MB
Hacktivity 18 2021/How to Upgrade Enterprise Security Using Numeric Technique.mp4 33.6 MB
Hacktivity 18 2021/A Common Bypass Pattern to Exploit Modern Web Apps.mp4 33.5 MB
Hacktivity 8 2011/Toth Laszlo - Majdnem lathatatlan alca az Oracle adatbazisban, avagy a nem dokumentalt ismet segit min.mp4 33.4 MB
Hacktivity 13 2016/Renata Hodovan - Fuzzinator, a browser fuzzing framework.mp4 33.3 MB
Hacktivity 8 2011/Laszlo Toth - Almost invisible cloak in Oracle databases or the undocumented helps us again.mp4 33.0 MB
Hacktivity 19 2022/How an Android Application can Drain Your Wallet by Dimitrios Valsamaras.mp4 32.9 MB
Hacktivity 17 2020/State of the Art Phishing by Six.mp4 32.7 MB
Hacktivity 17 2020/Penetration testing VoIP UC nowadays by Moritz Abrell.mp4 32.4 MB
Hacktivity 18 2021/Security Awareness in Development.mp4 32.0 MB
Hacktivity 8 2011/Joe McCray - There is An App for That - Pentesting Mobile Applications.mp4 31.6 MB
Hacktivity 20 2023/Elevating OAuth2.0 for Security of Native Clients.mp4 31.1 MB
Hacktivity 20 2023/Beyond Fun and Games Understanding the Threat Landscape of Extended Reality.mp4 30.9 MB
Hacktivity 18 2021/Hackers Deserve Rights.mp4 30.5 MB
Hacktivity 20 2023/Supply Chain Attacks.mp4 30.2 MB
Hacktivity 18 2021/Penetration Testing Management Problems in Large Corporations.mp4 30.2 MB
Hacktivity 8 2011/Alexander Kornbrust - Oracle Forensics.mp4 30.1 MB
Hacktivity 8 2011/Ertunga Arsal - Rootkits and Trojans on Your SAP Landscape.mp4 30.0 MB
Hacktivity 14 2017/Csaba Fitzl - Exploit generation with WinDGB.mp4 29.8 MB
Hacktivity 8 2011/Biro Laszlo Stuxnet, tenyleg ez volt az elso.mp4 28.5 MB
Hacktivity 15 2018/Csongor Tamas - Examples of Locality Sensitive Hashing & their Usage for Malware Classification.mp4 28.3 MB
Hacktivity 8 2011/Laszlo Biro - Stuxnet, Really the first one.mp4 28.3 MB
Hacktivity 18 2021/Cloud Security Monitoring and Evasion Techniques.mp4 27.7 MB
Hacktivity 10 2013/Best of Hacktivity 2013 official.mp4 27.7 MB
Hacktivity 19 2022/A GREAT Sewing Workshop by Pierre Delcher.mp4 27.7 MB
Hacktivity 17 2020/Anatomy of Automated Account Takeovers by Tal Eliyahu & Begum Calguner.mp4 27.2 MB
Hacktivity 8 2011/Beregnyei Balazs - Szilicium layouttol a kapcsolasi rajzig.mp4 27.1 MB
Hacktivity 19 2022/Everyday Numbers to Break Not So Everyday Software by Márk Módly.mp4 27.0 MB
Hacktivity 18 2021/GALILEO In GPS We Trust.mp4 26.7 MB
Hacktivity 17 2020/XPC exploitation by Csaba Fitzl.mp4 26.7 MB
Hacktivity 8 2011/Balazs Beregnyei - From silicium layout to circuit diagram.mp4 26.6 MB
Hacktivity 7 2010/Kabai Andras - Buffer Overflow II. ASLR es DEP megkerulesi technikak.mp4 25.6 MB
Hacktivity 7 2010/Andras Kabai - Buffer Overflow step II. ASLR and DEP eveasion techniques.mp4 25.4 MB
Hacktivity 18 2021/GhostEmperor From ProxyLogon to Kernel Mode, Story of a Modern Day Rootkit.mp4 25.3 MB
Hacktivity 18 2021/How to Use Cheated Cryptography to Overload Your Server.mp4 25.3 MB
Hacktivity 19 2022/Security Assesment of Embedded Firewalls - a Case Study by Csongor Ferenczi.mp4 25.3 MB
Hacktivity 17 2020/Bring your own demise. The corporate threat of mobile endpoints by János Pallagi.mp4 25.1 MB
Hacktivity 19 2022/Cybersecurity Cannot Ignore Climate Change by Chloé Messdaghi.mp4 25.1 MB
Hacktivity 17 2020/Machine Learning Evasion Competition by Zoltán Balázs.mp4 25.1 MB
Hacktivity 8 2011/Yaniv Miron - Scada Hacking - Security Workshop.mp4 24.8 MB
Hacktivity 8 2011/Yaniv Miron - SCADA Hacking - Biztonsag Workshop.mp4 24.8 MB
Hacktivity 19 2022/The Great Hospital Hack - by Mirza Burhan Baig.mp4 24.7 MB
Hacktivity 19 2022/Metaverse (in)Security by Ali Abdollahi.mp4 24.4 MB
Hacktivity 19 2022/Developer in a Digital Crosshair, 2022 Edition by Mateusz Olejarka.mp4 23.3 MB
Hacktivity 16 2019/David Liptay & Julia Borbala Csuha - CANmap - Network Discovery on CAN.mp4 23.3 MB
Hacktivity 16 2019/Abdul Aziz Hariri - Onix Zero Day Initiative Ruined my Life.mp4 23.0 MB
Hacktivity 17 2020/My wife is watching me The spy inside all of us. by Eddy Willems.mp4 22.7 MB
Hacktivity 19 2022/How Instantly Upgrade Your Legay Code in Minutes by Tomas Votruba.mp4 21.7 MB
Hacktivity 7 2010/Illesi Zsolt - Tut a szenakazalban.mp4 21.5 MB
Hacktivity 7 2010/Felix FX Lindner - Router exploitation.mp4 21.3 MB
Hacktivity 7 2010/Felix FX Lindner - Router exploitation HUN.mp4 21.2 MB
Hacktivity 19 2022/A New Default Value of OpenSSL could Multiply a DoS Potential by Szilárd Pfeiffer.mp4 21.0 MB
Hacktivity 7 2010/Zsolt Illesi - Finding the Needle in the Haystick.mp4 20.4 MB
Hacktivity 17 2020/Speeding Up Linux Disk Encryption by Ignat Korchagin.mp4 20.4 MB
Hacktivity 17 2020/Infra security automation in CI CD impossible is nothing. 2 2 by Spyros Manglis.mp4 20.1 MB
Hacktivity 7 2010/Neumann Robert - Exepacker.mp4 20.1 MB
Hacktivity 19 2022/What are We Missing in Web Applications by Mirza Burhan Baig.mp4 20.1 MB
Hacktivity 7 2010/Robert Neumann - Exepacker.mp4 19.9 MB
Hacktivity 20 2023/Reality or Myth Unhackable Application (Using Zero Trust).mp4 19.6 MB
Hacktivity 7 2010/Buherator - Metasploit workshop.mp4 19.4 MB
Hacktivity 19 2022/Fuzzing Trusted Applications in OP-TEE via Shared Memory by Roland Nagy.mp4 19.4 MB
Hacktivity 7 2010/Bruce Schneier - keynote speech.mp4 18.2 MB
Hacktivity 17 2020/The 5G Battle by Róbert Moody and Bence Horváth.mp4 18.2 MB
Hacktivity 18 2021/Investigating the Exploitability of Trusted Execution Environments.mp4 18.0 MB
Hacktivity 7 2010/Zsombor Kovacs - Hijacking Public Hostspots.mp4 17.9 MB
Hacktivity 7 2010/Kovacs Zsombor - A visszanyalo fagyi, a sotet park es a fekete ballonkabat, avagy a publikus WiFi alulne.mp4 17.9 MB
Hacktivity 17 2020/Hacking Facial Recognition Systems by Alexander Polyakov.mp4 17.9 MB
Hacktivity 17 2020/Perception vs Reality by Piotr Pobereźny.mp4 17.8 MB
Hacktivity 7 2010/Andras Tevesz - Rootkits vs. Anti-Virus Developers.mp4 17.7 MB
Hacktivity 7 2010/Tevesz Andras - Rootkitek es AV gyartok.mp4 17.7 MB
Hacktivity 19 2022/Security in IoT - the Investigation of Bluetooth Low Energy by János Kepics.mp4 17.3 MB
Hacktivity 7 2010/Holtzl Peter - Log analizis.mp4 17.1 MB
Hacktivity 14 2017/Summary of the 14th Hacktivity - October 20-21, 2017.mp4 16.9 MB
Hacktivity 7 2010/Major Marcell - Hogyan irjunk sajat jelszotorot.mp4 16.8 MB
Hacktivity 7 2010/Peter Holtzl - Log analysis.mp4 16.8 MB
Hacktivity 19 2022/No Parking, No Problem by Ignacio Navarro.mp4 16.6 MB
Hacktivity 7 2010/Jeney Gabor - A fizetos WiFi hotspotok ingyenes hasznalatarol.mp4 16.5 MB
Hacktivity 7 2010/Krasznay Csaba - Web 2.0.mp4 16.5 MB
Hacktivity 16 2019/#Hacktivity2019 - Összefoglalo video a WeLoveDigital jovoltabol (in Hungarian).mp4 16.5 MB
Hacktivity 17 2020/How Soft Skills Get Hard Results by Scott Asai.mp4 16.4 MB
Hacktivity 7 2010/Gabor Jeney - Using Commercial WiFi Hostspots Free of Charge.mp4 16.4 MB
Hacktivity 7 2010/Gara-Tarn u00f3czi P u00e9ter - Adatment u00e9s rendhagy u00f3 m u00f3don - Hasznosak-e a hacker k u00e9pess u00e9gek egy IT Secember munk.mp4 16.3 MB
Hacktivity 7 2010/Csaba Krasznay - Web 2.0.mp4 16.3 MB
Hacktivity 7 2010/Domonkos Tomcsanyi - Hacking in Suit - Smartphone, the Swiss Army Knife of Hacker.mp4 16.2 MB
Hacktivity 7 2010/Tomcsanyi Domonkos - Oltonyos hackeles - okostelefon, mint hacker-svajcibicska.mp4 16.1 MB
Hacktivity 7 2010/Marcell Major - Writing Your Own Password Cracker Tool.mp4 16.1 MB
Hacktivity 17 2020/Working with proof key for code exch. to comm. with the cloud by Milecia McGregor.mp4 16.0 MB
Hacktivity 7 2010/Marcell Foti - There is nothing new under the sun.mp4 15.9 MB
Hacktivity 7 2010/Foti Marcell - Nincs uj a nap alatt.mp4 15.8 MB
Hacktivity 7 2010/Alexander Kornbrust - Security Comparison of the Leading Databases HUN.mp4 15.2 MB
Hacktivity 18 2021/Secure by Design Microservice Application Architecture Assessment.mp4 15.2 MB
Hacktivity 18 2021/Detection Engineering Building Custom Detection Controls for Cloud Environments.mp4 15.2 MB
Hacktivity 7 2010/Hacktivty 2010 - Alexander Kornbrust - Security Comparison of the Leading Databases.mp4 15.1 MB
Hacktivity 7 2010/Robert Lipovsky - Evolution of Rootkits.mp4 14.7 MB
Hacktivity 18 2021/Security Issues of an Apartment Intercom and Door Lock System.mp4 14.6 MB
Hacktivity 17 2020/DevSecOps in the Financial Services Industry by Stéphane Chmielewski.mp4 14.5 MB
Hacktivity 18 2021/Mobile App Security Testing is Also Essential.mp4 14.2 MB
Hacktivity 19 2022/WNEXT - Summary of the 19th Edition - 6-7 October 2022.mp4 13.8 MB
Hacktivity 7 2010/Toth Laszlo - Oracle adatbazis post exploitation technikak.mp4 13.6 MB
Hacktivity 7 2010/Laszlo Toth - Post Exploitation Techniques in Oracle Databases.mp4 13.6 MB
Hacktivity 17 2020/China's cheap Xiaomis are low on privacy by Cirlig Gabriel.mp4 13.5 MB
Hacktivity 15 2018/Hacktivity2018 - Summary of the 15. Jubilee Edition - 12-13 October 2018.mp4 13.1 MB
Hacktivity 16 2019/#Hacktivity2019 - Summary of the 16th Edition - 25-26 October 2019.mp4 12.9 MB
Hacktivity 7 2010/Dr. Muha Lajos - Fejezetek az informatikai biztonsag tortenetebol.mp4 12.6 MB
Hacktivity 7 2010/Dr. Lajos Muha - Chapters from the History of IT Security.mp4 12.5 MB
Hacktivity 16 2019/#Hacktivity2019 - Riport a TV2 TechGuru cimu musoraban (in Hungarian).mp4 12.4 MB
Hacktivity 7 2010/Dr. Anita - Az SE jogi kovetkezmenyei.mp4 12.1 MB
Hacktivity 7 2010/Biro Laszlo - Digitalis amnezia.mp4 12.1 MB
Hacktivity 7 2010/Dr. Anita Eros - Legal Issues with Social Engineering.mp4 12.1 MB
Hacktivity 7 2010/Dr. Szabo Istvan - A nyilvanos magyar kriptografia tortenete napjainkig (sikerek es kudarcok).mp4 12.1 MB
Hacktivity 7 2010/Laszlo Biro - Digital Amnesia.mp4 12.0 MB
Hacktivity 7 2010/Istvan Farmosi - The First Virus, the First Book and the Lost Solution.mp4 12.0 MB
Hacktivity 7 2010/Farmosi Istvan - Az elso virus, az elso konyv es egy elfeledett megoldas.mp4 12.0 MB
Hacktivity 7 2010/Dr. Istvan Szabo - The History of the Hungarian Cryptography.mp4 11.5 MB
Hacktivity 17 2020/Making developers security aware. Lessons learnt. by Mateusz Olejarka.mp4 11.0 MB
Hacktivity 20 2023/NOWNEXT - Summary of the 20th JUBILEE EDITION - 5-6 October 2023.mp4 10.8 MB
Hacktivity 7 2010/Dr. Ormos Zoltan - Nagy port felvert nemzetkozi jogesetek az internetes biztonsag teruleten.mp4 10.1 MB
Hacktivity 18 2021/#Hacktivity2021 - Summary of the 18th Edition - 8 October 2021.mp4 10.0 MB
Hacktivity 7 2010/Dr. Zoltan Ormos - Most Famous Information Security-related Lawsuits from the Past.mp4 10.0 MB
Hacktivity 17 2020/Paste Wars fighting for copypaste freedom by Ignat Korchagin.mp4 10.0 MB
Hacktivity 7 2010/Veres-Szentkiralyi Andras - Linux szerverunk van ezert biztonsagos.mp4 9.7 MB
Hacktivity 7 2010/Andras Veres-Szentkiralyi - We Have Linux Servers So Are We Secured.mp4 9.5 MB
Hacktivity 17 2020/Blue Team Over The Air by Besim Altinok.mp4 9.3 MB
Hacktivity 17 2020/The Great Hotel Hack Adventures in attacking hospitality industry. Etizaz Mohsin.mp4 9.2 MB
Hacktivity 7 2010/Britney - Hacktivity Wargame.mp4 8.9 MB
Hacktivity 8 2011/Britney - Hacktivity Wargame.mp4 8.9 MB
Hacktivity 17 2020/Stuxnet Attack by Dr. Mo Ashouri.mp4 8.8 MB
Hacktivity 17 2020/Distributed Fuzzing with k8s by Anto Joseph.mp4 8.6 MB
Hacktivity 8 2011/BettyLove - Hacktivity Wargame.mp4 6.8 MB
Hacktivity 7 2010/BettyLove - Hacktivity Wargame.mp4 6.8 MB
Hacktivity 7 2010/Dr. Dudas Agnes - I agree.mp4 6.7 MB
Hacktivity 8 2011/Best of Hacktivity 2011.mp4 6.3 MB
Hacktivity 17 2020/Infra security automation in CI CD impossible is nothing. 1 2 by Davide Cioccia.mp4 5.4 MB
Hacktivity 7 2010/Szemes Balazs - ACTA, HADOPI, Digital Economy Act - fizetni fogunk mint a katonatiszt.mp4 5.2 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Panczel Zoltan, Spala Ferenc - Buffer Overflow Workshop.eng.json 4.4 MB
Hacktivity 16 2019/#Hackitvity2019 - Interju az M1 Hiradoban (in Hungarian).mp4 4.3 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dániel Komaromy - Offense wins games, Defense wins nothing.eng.json 3.3 MB
Hacktivity 16 2019/#Hacktivity2019 - Interju a Duna TV Csaladbarat cimu musoraban (in Hungarian).mp4 3.3 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoz - Data Demolition Gone in 60 Seconds.eng.json 3.3 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shakeel Tufail - Software Threat Modeling.eng.json 3.1 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zane Lackey - Attack-driven defense.eng.json 3.1 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Vivek Ramachandran - Cracking WPA WPA2 Personal and Enterprise for Fun and Profit.eng.json 3.0 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zoltan Panczel, Ferenc Spala - Buffer Overflow Workshop.eng.json 2.9 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Harman Singh - Active Directory Threats & Detection.eng.json 2.8 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Bohannon - Invoke-Obfuscation PowerShell obFUsk8tion.eng.json 2.8 MB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Tamas Kocsis & Balint Kovacs - Fight Against Fake News Sites Using Open Source Tools (in Hungarian).eng.json 2.7 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Szor Peter - Kuzdelem a kartekony kodok ellen.eng.json 2.7 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Joe McCray - Big Bang Theory - Pentesting high security environments.eng.json 2.7 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Car Hacking.eng.json 2.7 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gerhard Klostermeier, Matthias Deeg - Of Mice and Keyboards.eng.json 2.7 MB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Philip Young - Smashing the Mainframe for Fun and Prison Time.eng.json 2.6 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kabai Andras - Buffer Overflow II. ASLR es DEP megkerulesi technikak.eng.json 2.6 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marina Krotofil - Rocking the pocket book - hacking chemical plant for competition and extortion.eng.json 2.6 MB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal.eng.json 2.5 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Stefan Marsiske - Post-quantum is the new cyber5.eng.json 2.4 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Neumann Robert - Exepacker.eng.json 2.4 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality.eng.json 2.4 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tevesz Andras - Rootkitek es AV gyartok.eng.json 2.4 MB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Roundtable Discussion about NIS2 Directive (in Hungarian).eng.json 2.4 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Dr. Boldizsar Bencsath - What Makes the Analysis of Malware. Like Duqu or Flame.eng.json 2.4 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation.eng.json 2.4 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gara-Tarnczi Peater - Publikus exploitok testreszabasa.eng.json 2.3 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race.eng.json 2.3 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Krasznay Csaba - Web 2.0.eng.json 2.3 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Csaba Krasznay - Cyber soldiers in the world - how to become a military hacker.eng.json 2.3 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Gabor Szappanos - Journey to the bottom of a black hole.eng.json 2.3 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyongyosi Peter, Illes Marton Tuzfalak es tamadasok.eng.json 2.3 MB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Komaromy Daniel - Enter The Snapdragon.eng.json 2.3 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Muha Lajos, Dr. - Informaciobiztonsagi torveny ertelmezese.eng.json 2.3 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Rene Freingruber - Bypassing application whitelisting in critical infrastructures.eng.json 2.2 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Jos Weyers - Lock Impressioning.eng.json 2.2 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation HUN.eng.json 2.2 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Cybercrime, Information, Warfare and Cyberwar - what s this all about.eng.json 2.2 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Schaffer Krisztian - Forraskod ellenorzes biztonsagi szempontok alapjan.eng.json 2.2 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Kiberbunozes, informacios hadviseles es kiberhaboru - mi ez az egesz.eng.json 2.2 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Foti Marcell - Nincs uj a nap alatt.eng.json 2.2 MB
Hacktivity 7 2010/Best of Hacktivity 2010.mp4 2.2 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Bucsay Balazs - Paypass serulekenysegek.eng.json 2.2 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ben Seri & Gregory Vishnepolsky - BlueBorne Explained.eng.json 2.1 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms.eng.json 2.1 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/George Webster, Julian Kirsch - A Study of the Rich Header and Respective Malware Triage.eng.json 2.1 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Szor - Fighting Computer Malware.eng.json 2.1 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Bartok Sandor Peter - Informatikai igazsagugyi laboratoriumok szakmai szolgaltatasai.eng.json 2.1 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Paul M. Wright - Oracle 12c Security - Defense and Attack.eng.json 2.1 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Domonkos Tomcsanyi - GSM - have we overslept the last wake-up call.eng.json 2.1 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Csaba Krasznay - Web 2.0.eng.json 2.1 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Holtzl Peter - Log analizis.eng.json 2.1 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Antonio Barresi, Peter Somogyvari - Android Security - An Introduction.eng.json 2.1 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms, Backdoors and Botnets for Fun and Profit.eng.json 2.1 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tomcsanyi Domonkos - Oltonyos hackeles - okostelefon, mint hacker-svajcibicska.eng.json 2.1 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Fehér András, Kapitány Sándor, Martinkovics Dániel, Otti Csaba - Kézben a biztonság ().eng.json 2.1 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shay Chen - The Diviner - Digital Clairvoyance Breakthrough.eng.json 2.1 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gergely Revay - Security implications of the Cross-Origin Resource Sharing.eng.json 2.1 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Beregnyei Balazs - Szilicium layouttol a kapcsolasi rajzig.eng.json 2.1 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality (Magyar).eng.json 2.1 MB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Kocsis Tamas & Kovacs Balint - Az Informacioszivargas Monitorozasa Open Source Eszközökkel.eng.json 2.1 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Haroon Meer - keynote - Time to play - D.eng.json 2.0 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Costin Raiu - keynote - APT Paleontology in the age of cyber.eng.json 2.0 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Benjamin Tamasi - Hacking CCTV systems.eng.json 2.0 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race (Magyar).eng.json 2.0 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szekely Tamas - Hello HSRP, viszlat HSRP.eng.json 2.0 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ethical hacking in Hungary - Roundtable discussion (in Hungarian).eng.json 2.0 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szabo Aron - Chip-csirip, avagy PKI eszkozok alternativ felhasznalasai.eng.json 2.0 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Domonkos Tomcsanyi - Give me a phone that can't be traced.eng.json 2.0 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Vladimir Katalov - iOS Acquisition Methods Compared.eng.json 2.0 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Travis Goodspeed - A Keynote in Praise of Junk Hacking.eng.json 2.0 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Major Marcell - Hogyan irjunk sajat jelszotorot.eng.json 2.0 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Major Marcell, Zagon Mihaly - A legajabb webes tamadasi lehetosegek.eng.json 2.0 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Illesi Zsolt - Tut a szenakazalban.eng.json 2.0 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Julien Thomas - Limitations of Android permission system.eng.json 2.0 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Toth Laszlo - Oracle adatbazis post exploitation technikak.eng.json 2.0 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Boldizsár Bencsáth - BAB0 - A custom sample that bypassed cutting-edge APT attack detection tools.eng.json 2.0 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Kabai - Buffer Overflow step II. ASLR and DEP eveasion techniques.eng.json 2.0 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Toth, Ferenc Spala - What s common in Oracle and Samsung.eng.json 1.9 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Barta Csaba - Az NTDS.DIT forensics vizsgalata.eng.json 1.9 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Gruss - Microarchitectural Incontinence - You would leak too if you were so fast.eng.json 1.9 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Bruce Schneier - keynote speech.eng.json 1.9 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Mark Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.eng.json 1.9 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szekely Tamas - DDoS-t vettem a vasarban bitpenzzel.eng.json 1.9 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gara-Tarn u00f3czi P u00e9ter - Adatment u00e9s rendhagy u00f3 m u00f3don - Hasznosak-e a hacker k u00e9pess u00e9gek egy IT Secember munk.eng.json 1.9 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Attila Szasz & Gergo Hosszu - Dive into Magenta - fuzzing Google's new kernel.eng.json 1.9 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kovacs Zsombor - A visszanyalo fagyi, a sotet park es a fekete ballonkabat, avagy a publikus WiFi alulne.eng.json 1.9 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - Mit tegynk, ha bekvetkezett a baj.eng.json 1.9 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kerenyi Kristof, Hornak Zoltan, Kispal Istvan - Crypto-chipek biztonsaga, passziv-aktiv kombinalt ta.eng.json 1.9 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Pek - eNeMI - Evading the state-of-the-art hardware protection of IO virtualization.eng.json 1.9 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Sergej Proskurin, Tamás K. Lengyel - Stealthy, Hypervisor-based Malware Analysis.eng.json 1.9 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Oroszi Eszter - Social Engineering, amikor fellebben a fagyol.eng.json 1.9 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Toth Laszlo - Majdnem lathatatlan alca az Oracle adatbazisban, avagy a nem dokumentalt ismet segit min.eng.json 1.9 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Otti Csaba - A biometria biztonsaga.eng.json 1.9 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Kelly Shortridge - The Art of Explanation Behavioral Models of InfoSec.eng.json 1.8 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Otti Csaba, Oszi Arnold - Ujjlenyomat azonosito rendszerek, biztonsag vagy biztonsagi res.eng.json 1.8 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoltan Balazs - The real risks of the IoT security-nightmare Hacking IP cameras through the cloud.eng.json 1.8 MB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aman Sachdev & Himanshu Sharma - Hacking Real Life Financial Applications.eng.json 1.8 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Veres-Szentkiralyi - USB = Universal Security Bug.eng.json 1.8 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Szappanos - Advanced() Persistent Shellcode.eng.json 1.8 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Illes Zsolt - Informatikai bizonyitek, bizonyitas igazsagugyi szakertoi szemmel.eng.json 1.8 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Veres-Szentkiralyi Andracus - Hacking hardware for fun and profit.eng.json 1.8 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kabai Andras - Malware Analizis, tippek es trukkok.eng.json 1.8 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Gábor Szappanos - Comparing the incomparables.eng.json 1.8 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Bíro László Miklós - Titkosítás és visszafejtés a fizikai réteg szintjén.eng.json 1.8 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to hide your browser 0-days.eng.json 1.8 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Balazs Bucsay - Paypass vulnerabilities.eng.json 1.7 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Csaba Otti - The security and vulnerability of the biometry.eng.json 1.7 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas K. Lengyel - Virtual Machine Introspection to Detect and Protect.eng.json 1.7 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marosi Attila - A Hacking Team rosszindulatú programjai.eng.json 1.7 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Jos, Attila Bogar - is BitTorrent really providing anonymity.eng.json 1.7 MB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Nicolas Gregoire - Hunting for Top Bounties.eng.json 1.7 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Ertunga Arsal - Rootkits and Trojans on Your SAP Landscape.eng.json 1.7 MB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Jason Chan - Building a Glass House.eng.json 1.7 MB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Stephan Gerling - Hacking Yachts Remotely via Satcom or Maritime Internet Router.eng.json 1.7 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gábor Pek, Tamas Koczka - SpamAndHex hacks around the world.eng.json 1.7 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Kirils Solovjovs - Tools for effortless reverse engineering of MikroTik routers.eng.json 1.7 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Bardoczi, Lilian Zsakai - Data mining in the age of social web.eng.json 1.7 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Polyakov - Top 10 most interesting SAP vulnerabilities and attacks.eng.json 1.7 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kovacs Gyozo - Valogatott kalandozasaim Informatikaban.eng.json 1.7 MB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication System.eng.json 1.7 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Bardoczi Akos, Zsakai Lilian - Adatbanyaszat a kozossegi web koraban.eng.json 1.7 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Feher Andras, Otti Csaba - Arcfelismero rendszerek.eng.json 1.7 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Balazs Bucsay - Chw00t - Breaking Unices - chroot solutions.eng.json 1.7 MB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Gabor Szappanos - The Nigerians are in the Spajz.eng.json 1.6 MB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Micha Borrmann - CVSS is a big botch Scoring systems do not help to improve the IT security.eng.json 1.6 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Dismal or bang-bang SCADA.eng.json 1.6 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Tevesz - Rootkits vs. Anti-Virus Developers.eng.json 1.6 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Buherator - Metasploit workshop.eng.json 1.6 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Miroslav Stampar - Spot the Web Vulnerability.eng.json 1.6 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Krisztian Schaffer - Security Code Review.eng.json 1.6 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Travis Goodspeed - Some Thoughts on Literate Disassembly and Symbol Porting.eng.json 1.6 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Varadi Tamas - Impressziotechnika.eng.json 1.6 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tevesz Andras - Antivirus program hatastalanitas.eng.json 1.6 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Steve Mulhearn - The Rise and Fall of DDoS Attacks in 2012.eng.json 1.6 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Leitold Ferenc Horvath Botond - Vedekezes kartevok C&C forgalma ellen.eng.json 1.6 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Maroy, Tamas Bodoky - Anonim whistleblowing using the GlobaLeaks platform.eng.json 1.6 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Lipovsky - Evolution of Rootkits.eng.json 1.6 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Csaba Fitzl, Miklos Desbordes-Korcsev - Exploit generation, JavaScript analysis automation.eng.json 1.6 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mihaly Zagon - The Only Thing That Is Constant Is Change.eng.json 1.5 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Boldizsar Bencsath - What happened to targeted malware attacks last year.eng.json 1.5 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Váradi Tamás- Tárcsás zárak nyitásának eszközei és módszerei.eng.json 1.5 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Leigh-Anne Galloway - Money makes money - How to buy an ATM and what you can do with it.eng.json 1.5 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Ivan Yushkevich Wordlists from statistics to genetic.eng.json 1.5 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Joe McCray - There is An App for That - Pentesting Mobile Applications.eng.json 1.5 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Kabai - Hunting and exploiting bugs in kernel drivers.eng.json 1.5 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Subecz Akos - Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban.eng.json 1.5 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Neumann - Exepacker.eng.json 1.5 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Judit Varga - Amy Farrah Fowler, or the geek girl s case with the tiara.eng.json 1.5 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to pwn a Windows domain.eng.json 1.5 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Sandor Lederer Adam Foldes Tamas Bodoky Laszlo Csorgo - Wikileaks - info-freedom fight or info-terror.eng.json 1.5 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Gyongyosi, Marton Illes - Firewalls and Exploits.eng.json 1.5 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Cyberspace and Beyond - Evolution in Action.eng.json 1.5 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Ormos Zoltan - Nagy port felvert nemzetkozi jogesetek az internetes biztonsag teruleten.eng.json 1.5 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Jeney Gabor - A fizetos WiFi hotspotok ingyenes hasznalatarol.eng.json 1.5 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zsombor Kovacs - To secure data is to prepare for jailbreak.eng.json 1.5 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Foti - There is nothing new under the sun.eng.json 1.5 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Aleksandar Nikolic - Guided Fuzzing And Binary Blobs.eng.json 1.5 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Zoltan - IPv6 shipworm - My little windows domain pwnie.eng.json 1.5 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsombor Kovacs - Hijacking Public Hostspots.eng.json 1.5 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Marcell Major, Mihaly Zagon - Modern Browser Attack Vectors.eng.json 1.5 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Varga-Perke Balint, Buherator - Heureka - Az a gyanus ami nem gyanus.eng.json 1.5 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Domonkos Tomcsanyi - Hacking in Suit - Smartphone, the Swiss Army Knife of Hacker.eng.json 1.5 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Balint Varga-Perke, - Buherator - Heureka - The Suspicious Thing Is That It s Not Suspicious.eng.json 1.5 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Szekely - Attacking The First Hop Redundancy.eng.json 1.5 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Balint Varga-Perke (Buherator) - Corrupting Ancient Spirits - Penetration Testing Oracle Forms.eng.json 1.5 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Axelle Apvrille - Playing Hide and Seek with Dalvik Executables.eng.json 1.5 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Bodor Peter - Social Engineering es pszichologia.eng.json 1.5 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Subecz Akos, Zantho Csaba - Lockpicking - a zarnyitas muveszete.eng.json 1.5 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Lederer Sandor Foldes Adam Bodoky Tamas Csorgo Laszlo - Wikileaks - info-szabadsagharc vagy info-terr.eng.json 1.5 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Hacktivty 2010 - Alexander Kornbrust - Security Comparison of the Leading Databases.eng.json 1.5 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Felix Schuster - Design and implementation of an additional layer of encryption for Skype.eng.json 1.5 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Alexander Kornbrust - Security Comparison of the Leading Databases HUN.eng.json 1.4 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Tamás Szakály - Shall we play a game.eng.json 1.4 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zoltan Balazs - Alice in eXploitland, attack and defense evolution.eng.json 1.4 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tenyi Geza, Dr. - Bizalmas informaciok kezelese es adatvedelem a felhoszolgaltatasban.eng.json 1.4 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Andras Feher, Csaba Otti - Face Recognition Systems.eng.json 1.4 MB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Balazs Zoltan - Bypass firewalls, application white lists, secure remote desktops in 20 seconds.eng.json 1.4 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove or How I learned to Stop Worrying and Love the BeEF.eng.json 1.4 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Kiberter es azon tul - folyamatban az evolucio.eng.json 1.4 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Barta - Forensic analysis of NTDS.DIT.eng.json 1.4 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Veres-Szentkiralyi - Hacking hardware for fun and profit.eng.json 1.4 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Maroy Akos, Bodoky Tamas - Anonim adatszivarogtatas a GlobaLeaks platform.eng.json 1.4 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Lajos Muha, Dr. - Interpretation of the Act on Information Security.eng.json 1.4 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Kornbrust - Self Defending Database.eng.json 1.4 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Kabai - Malware Analysis Tips and Tricks.eng.json 1.4 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szekely - One a Penny, Two a Penny Hot DDoS run.eng.json 1.4 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - How to convince a malware to avoid us.eng.json 1.4 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mateusz Olejarka - REST API, pentester's perspective.eng.json 1.4 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Toth - Post Exploitation Techniques in Oracle Databases.eng.json 1.4 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sandor Nagy - NAT Attack.eng.json 1.4 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Omar Eissa - Network Automation is not your Safe Haven.eng.json 1.4 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Muszka Dniel - Kalmr korszak Szegeden.eng.json 1.4 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Mateusz Olejarka - Approaching the unknown Windows Phone application security assessment guide.eng.json 1.4 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita - Az SE jogi kovetkezmenyei.eng.json 1.4 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Peter Holtzl - Log analysis.eng.json 1.4 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ignat Korchagin - Exploiting USB IP in Linux.eng.json 1.4 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA szomorusag avagy bumm-bumm SCADA.eng.json 1.3 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Anto Joseph - Bug hunting using symbolic virtual machines.eng.json 1.3 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsolt Illesi - Finding the Needle in the Haystick.eng.json 1.3 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - What to do when the problem is on board.eng.json 1.3 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Veres-Szentkiralyi Andras - Linux szerverunk van ezert biztonsagos.eng.json 1.3 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Alexander Kornbrust - Oracle Forensics.eng.json 1.3 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Norbert Tihanyi - Modification of the prime generation method of the OpenSSL library.eng.json 1.3 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Evgeny Neyolov - Inside the illegal traffic sales.eng.json 1.3 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Ferenc Leitold, Ph.D Botond Horvath - Protection against the C&C traffic of malware.eng.json 1.3 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Toth - Almost invisible cloak in Oracle databases or the undocumented helps us again.eng.json 1.3 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Zoltan Balazs - IPv6 shipworm - My little windows domain pwnie.eng.json 1.3 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Szabo Istvan - A nyilvanos magyar kriptografia tortenete napjainkig (sikerek es kudarcok).eng.json 1.3 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Aron Szabo - Chip-tweet alternative usage of PKI devices.eng.json 1.3 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Farmosi Istvan - Az elso virus, az elso konyv es egy elfeledett megoldas.eng.json 1.3 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Tevesz - Neutralizing an AntiVirus program.eng.json 1.3 MB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aleksandr Kolchanov - Attacks on GSM Alarms, Smart Homes, Ind. Control Sys. & Smartwatches for Kids.eng.json 1.3 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Biro Laszlo Stuxnet, tenyleg ez volt az elso.eng.json 1.3 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Akos Subecz, Csaba Zantho - Lockpicking - the finest art of opening locks.eng.json 1.2 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Roland Kamaras - Locky - anti-analysis techniques used by the ransomware.eng.json 1.2 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Major - Writing Your Own Password Cracker Tool.eng.json 1.2 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Biro Laszlo - Digitalis amnezia.eng.json 1.2 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Daniel Eszteri - Legal Background of Cybercrime.eng.json 1.2 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gabor Molnar - War Stories from Google Vulnerability Reward Program.eng.json 1.2 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - Scada Hacking - Security Workshop.eng.json 1.2 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyozo Kovacs - My Assorted Wandering in IT.eng.json 1.2 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Eszter Oroszi - Social Engineering, when the veil lifted.eng.json 1.2 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Varadi - Impressioning.eng.json 1.2 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Adrian Furtuna - Digipass Instrumentation for Fun and Profit.eng.json 1.2 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Akos Subecz - Security Problems at Hungarian everydays.eng.json 1.2 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán Balázs - Sandbox detection for the masses - leak, abuse, test.eng.json 1.2 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Leitold Ferenc, Horvath Botond - Dobozba zart internet.eng.json 1.2 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Tamas Szakaly - Help, Ive got ANTs.eng.json 1.2 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Robert Lipovsky - The - Facebook PokerAgent.eng.json 1.1 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Beregnyei - From silicium layout to circuit diagram.eng.json 1.1 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Muha Lajos - Fejezetek az informatikai biztonsag tortenetebol.eng.json 1.1 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mehmet Ince - A heaven for Hackers - Breaking Log SIEM Products.eng.json 1.1 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gabor Jeney - Using Commercial WiFi Hostspots Free of Charge.eng.json 1.1 MB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán L. Németh - Memory corruption vulnerabilities, runtime mitigations and their bypasses.eng.json 1.1 MB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zoltan Balazs - Zombie Browsers, spiced with rootkit extensions.eng.json 1.1 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Miklos Biro - Tempest, the hidden source of data leakage.eng.json 1.0 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dmitriy Chastuchin - Injecting evil code in your SAP J2EE systems.eng.json 1.0 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Geza Tenyi - Management of Confidential Information and Data Protection In Cloud Computing.eng.json 1.0 MB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Laszlo Miklos Biro - Lets hijack an airplane.eng.json 1.0 MB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Adrian Vollmer - Attacking RDP with Seth.eng.json 1.0 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Zoltan Ormos - Most Famous Information Security-related Lawsuits from the Past.eng.json 1.0 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kristof Kerenyi, Zoltan Hornak, Istvan Kispal - Crypto-chipset Security, Passive-Active Combined Attacks.eng.json 1.0 MB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Bodor - Social Engineering and psychology.eng.json 1.0 MB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Kuba Gretzky - Phishing Through Modern 2FA Defences With Evilginx.eng.json 1.0 MB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Dudas Agnes - I agree.eng.json 1.0 MB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szakaly - Stolen bytes on the video card - the GPU as an anti-rce device.eng.json 998.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Otti, Arnold Oszi - Finderprint identification systems, security or security leak.eng.json 994.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Istvan Farmosi - The First Virus, the First Book and the Lost Solution.eng.json 991.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita Eros - Legal Issues with Social Engineering.eng.json 987.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szakaly Tamas - Lopott bajtok a videokartyan - a GPU, mint anti-rce eszkoz.eng.json 986.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Renata Hodovan - Fuzzinator, a browser fuzzing framework.eng.json 982.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Hacking - Biztonsag Workshop.eng.json 964.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dmitry Chastuhin, Dmitry Yudin -Getting access to the SAP server via SAP Management Console.eng.json 955.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Laszlo Biro - Alternative internet.eng.json 936.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Yury Chemerkin - (In-) Efficiency of security features on mobile security and compliance.eng.json 917.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Ferenc Leitold, Botond Horvath - Internet in the Sandbox.eng.json 903.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Vaagn Toukharian - HTTP Time Bandit.eng.json 901.4 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/The Great Hotel Hack Adventures in attacking hospitality industry. Etizaz Mohsin.eng.json 878.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Biro - Stuxnet, Really the first one.eng.json 871.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Biro - Digital Amnesia.eng.json 854.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Lajos Muha - Chapters from the History of IT Security.eng.json 793.3 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Csaba Fitzl - Gatekeeper - Bypass or Not Bypass.eng.json 770.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Veres-Szentkiralyi - We Have Linux Servers So Are We Secured.eng.json 748.5 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/David Liptay & Julia Borbala Csuha - CANmap - Network Discovery on CAN.eng.json 707.8 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Laszlo Miklos Biro - IoT Devices, Were Are You and What Do you Do.eng.json 671.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Szemes Balazs - ACTA, HADOPI, Digital Economy Act - fizetni fogunk mint a katonatiszt.eng.json 589.6 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - Exploit generation with WinDGB.eng.json 502.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Istvan Szabo - The History of the Hungarian Cryptography.eng.json 429.6 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hackitvity2019 - Interju az M1 Hiradoban (in Hungarian).eng.json 329.3 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Interju a Duna TV Csaladbarat cimu musoraban (in Hungarian).eng.json 279.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Riport a TV2 TechGuru cimu musoraban (in Hungarian).eng.json 246.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Panczel Zoltan, Spala Ferenc - Buffer Overflow Workshop.eng.txt 131.8 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Brian Gorenc - From Bounties to Bureaucracy - Keynote Speech.eng.srt 131.5 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Rodrigo Branco - How Offensive Security is Defining the Way We Compute - Keynote Speech.eng.srt 131.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Panczel Zoltan, Spala Ferenc - Buffer Overflow Workshop.eng.lrc 129.6 kB
Hacktivity logo.png 118.2 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Mike Ossmann - Keynote Speech at Hacktivity2018.eng.srt 109.6 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Alex Plaskett & James Loureiro - The Mate Escape - Android Pwn2Owning.eng.srt 104.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Panczel Zoltan, Spala Ferenc - Buffer Overflow Workshop.eng.srt 103.9 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Zoltan Balazs - Ethereum Smart Contract Hacking Explained like I'm Five.eng.srt 103.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Panczel Zoltan, Spala Ferenc - Buffer Overflow Workshop.eng.tsv 101.7 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/The History of Hacking AI Systems.eng.srt 100.4 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones.eng.srt 99.0 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Jack S (linkcabin) - Becoming the Quiz Master - Thanks RE.eng.srt 98.2 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Gergely Biczok - Interdependent Privacy & the Psychology of Likes.eng.srt 98.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Best of Hacktivity 2010.eng.json 95.9 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Inbar Raz - Under the Hood - The Automotive Challenge.eng.srt 95.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Panczel Zoltan, Spala Ferenc - Buffer Overflow Workshop.eng.vtt 94.7 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/It Was Harder to Sniff Bluetooth Through My Mask During the Pandemic.eng.srt 93.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoz - Data Demolition Gone in 60 Seconds.eng.srt 91.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Summary of the 14th Hacktivity - October 20-21, 2017.eng.json 91.2 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Paolo Stagno - A Drone Tale - All Your Drones Belong To Us.eng.srt 91.2 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Joxean Koret - Pigaios - A Tool for Diffing Source Codes against Binaries.eng.srt 91.1 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/How Attackers Find & Exploit Secrets in Source Code.eng.srt 90.6 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/The New SaaS Cyber Kill Chain.eng.srt 90.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zane Lackey - Attack-driven defense.eng.txt 90.2 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Thaís Moreira Hamasaki - The (not so profitable) Path towards Automated Heap Exploitation.eng.srt 88.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zane Lackey - Attack-driven defense.eng.lrc 88.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dániel Komaromy - Offense wins games, Defense wins nothing.eng.txt 87.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shakeel Tufail - Software Threat Modeling.eng.srt 87.2 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Balazs Bucsay - XFLTReaT - Building a Tunnel.eng.srt 86.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dániel Komaromy - Offense wins games, Defense wins nothing.eng.lrc 86.5 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Robert Neumann - What's 4k in real Money.eng.srt 86.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoz - Data Demolition Gone in 60 Seconds.eng.txt 86.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoz - Data Demolition Gone in 60 Seconds.eng.lrc 85.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Vivek Ramachandran - Cracking WPA WPA2 Personal and Enterprise for Fun and Profit.eng.srt 84.7 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Zsombor Kovacs - Cheaters for Everything from Minesweeper to Mobile Banking Applications.eng.srt 83.5 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Anatomy of Automated Account Takeovers by Tal Eliyahu & Begum Calguner.eng.srt 83.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zoltan Panczel, Ferenc Spala - Buffer Overflow Workshop.eng.srt 82.9 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoz - Data Demolition Gone in 60 Seconds.eng.vtt 82.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kabai Andras - Buffer Overflow II. ASLR es DEP megkerulesi technikak.eng.txt 81.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Vivek Ramachandran - Cracking WPA WPA2 Personal and Enterprise for Fun and Profit.eng.txt 79.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shakeel Tufail - Software Threat Modeling.eng.vtt 79.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kabai Andras - Buffer Overflow II. ASLR es DEP megkerulesi technikak.eng.lrc 79.5 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Tamas Kocsis & Balint Kovacs - Fight Against Fake News Sites Using Open Source Tools (in Hungarian).eng.txt 78.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Joe McCray - Big Bang Theory - Pentesting high security environments.eng.txt 78.6 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/DDoS Testing Your Infrastructure, including IPv6 SYN floods by Henrik Kramselund.eng.srt 78.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Vivek Ramachandran - Cracking WPA WPA2 Personal and Enterprise for Fun and Profit.eng.lrc 78.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Szor Peter - Kuzdelem a kartekony kodok ellen.eng.txt 78.0 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Harman Singh - Active Directory Threats & Detection.eng.txt 77.8 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Tamas Kocsis & Balint Kovacs - Fight Against Fake News Sites Using Open Source Tools (in Hungarian).eng.lrc 77.6 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/AI Security.eng.srt 77.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shay Chen - The Diviner - Digital Clairvoyance Breakthrough.eng.txt 77.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Joe McCray - Big Bang Theory - Pentesting high security environments.eng.lrc 77.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Harman Singh - Active Directory Threats & Detection.eng.lrc 76.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Szor Peter - Kuzdelem a kartekony kodok ellen.eng.lrc 76.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shakeel Tufail - Software Threat Modeling.eng.txt 76.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dániel Komaromy - Offense wins games, Defense wins nothing.eng.srt 76.6 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal.eng.txt 76.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shakeel Tufail - Software Threat Modeling.eng.lrc 76.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Csaba Krasznay - Web 2.0.eng.txt 76.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Bohannon - Invoke-Obfuscation PowerShell obFUsk8tion.eng.srt 76.0 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Pwning into Power System Center.eng.srt 75.8 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps.eng.srt 75.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dániel Komaromy - Offense wins games, Defense wins nothing.eng.tsv 75.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shay Chen - The Diviner - Digital Clairvoyance Breakthrough.eng.lrc 75.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zane Lackey - Attack-driven defense.eng.srt 75.2 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Broad View to Automotive Security & Penn testing by András Kabai & László Tóth.eng.srt 75.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zoltan Panczel, Ferenc Spala - Buffer Overflow Workshop.eng.vtt 75.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zoltan Panczel, Ferenc Spala - Buffer Overflow Workshop.eng.txt 74.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Car Hacking.eng.srt 74.9 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal.eng.lrc 74.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Vivek Ramachandran - Cracking WPA WPA2 Personal and Enterprise for Fun and Profit.eng.vtt 74.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoz - Data Demolition Gone in 60 Seconds.eng.tsv 74.4 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Vincent Ruijter - ~Securing~ Attacking Kubernetes.eng.srt 74.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Csaba Krasznay - Web 2.0.eng.lrc 74.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zoltan Panczel, Ferenc Spala - Buffer Overflow Workshop.eng.lrc 74.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zane Lackey - Attack-driven defense.eng.tsv 73.9 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Philip Young - Smashing the Mainframe for Fun and Prison Time.eng.txt 73.8 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/API Security Assurance via E2E Testing.eng.srt 73.4 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Broken IoT Supply Chain by Martin Hron.eng.srt 73.0 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Sisyphus and the CVE Feed by Keziah Plattner & Kadia Mashal.eng.srt 72.9 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Philip Young - Smashing the Mainframe for Fun and Prison Time.eng.lrc 72.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Muha Lajos, Dr. - Informaciobiztonsagi torveny ertelmezese.eng.txt 72.2 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Kelly Shortridge - To Err is Human - Keynote Presentation.eng.srt 71.4 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marina Krotofil - Rocking the pocket book - hacking chemical plant for competition and extortion.eng.srt 71.4 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Pwned in Space by Paul Coggin.eng.srt 71.4 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dániel Komaromy - Offense wins games, Defense wins nothing.eng.vtt 71.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gerhard Klostermeier, Matthias Deeg - Of Mice and Keyboards.eng.srt 71.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tevesz Andras - Rootkitek es AV gyartok.eng.txt 71.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Muha Lajos, Dr. - Informaciobiztonsagi torveny ertelmezese.eng.lrc 70.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Krasznay Csaba - Web 2.0.eng.txt 70.7 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Összefoglalo video a WeLoveDigital jovoltabol (in Hungarian).eng.json 70.5 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/From Red to Black and Beyond by Albert Zsigovits & Robert Neumann.eng.srt 70.5 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/DiceyF Deploys the GamePlayerFramework by Kurt Baumgartner & Georgy Kucherin.eng.srt 70.5 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Hackers Deserve Rights.eng.srt 70.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Joe McCray - Big Bang Theory - Pentesting high security environments.eng.srt 70.2 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Roundtable Discussion about NIS2 Directive (in Hungarian).eng.txt 70.1 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Reversing Golang Binaries with Ghidra by Dorka Palotay and Albert Zsigovits.eng.srt 70.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tevesz Andras - Rootkitek es AV gyartok.eng.lrc 69.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Neumann Robert - Exepacker.eng.txt 69.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Stefan Marsiske - Post-quantum is the new cyber5.eng.srt 69.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Bohannon - Invoke-Obfuscation PowerShell obFUsk8tion.eng.vtt 69.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Krasznay Csaba - Web 2.0.eng.lrc 69.4 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Fault Injection (FI) Attacks Against Embedded Systems by András Kabai.eng.srt 69.3 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Dissectiong and Comparing Different Binaries to Malware Analysis by Filipi Pires.eng.srt 69.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shakeel Tufail - Software Threat Modeling.eng.tsv 69.2 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Philip Young - Smashing the Mainframe for Fun and Prison Time.eng.srt 69.1 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Roundtable Discussion about NIS2 Directive (in Hungarian).eng.lrc 69.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gara-Tarnczi Peater - Publikus exploitok testreszabasa.eng.txt 68.9 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Gabriel Cirlig & Stefan Tanase - Smart Car Forensics & Vehicle Weaponization.eng.srt 68.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Neumann Robert - Exepacker.eng.lrc 68.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Bohannon - Invoke-Obfuscation PowerShell obFUsk8tion.eng.txt 68.6 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Speeding Up Linux Disk Encryption by Ignat Korchagin.eng.srt 68.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Csaba Krasznay - Cyber soldiers in the world - how to become a military hacker.eng.srt 68.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zane Lackey - Attack-driven defense.eng.vtt 68.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Dr. Boldizsar Bencsath - What Makes the Analysis of Malware. Like Duqu or Flame.eng.txt 68.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Harman Singh - Active Directory Threats & Detection.eng.srt 68.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Harman Singh - Active Directory Threats & Detection.eng.tsv 68.1 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Bohannon - Invoke-Obfuscation PowerShell obFUsk8tion.eng.lrc 68.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gara-Tarnczi Peater - Publikus exploitok testreszabasa.eng.lrc 67.8 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Marcell Molnar - Hacking ATMs on a Budget.eng.srt 67.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gerhard Klostermeier, Matthias Deeg - Of Mice and Keyboards.eng.txt 67.7 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/How to Kickstart a Security Program by Ottucsák József.eng.srt 67.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Dr. Boldizsar Bencsath - What Makes the Analysis of Malware. Like Duqu or Flame.eng.lrc 67.5 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Hacking the Hacktivity 2019 badge by Valerio Di Giampetro.eng.srt 67.4 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Can We Break the Fault Injection Mitigation Bob.eng.srt 67.3 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/DNS in Offensive Techniques.eng.srt 67.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Gabor Szappanos - Journey to the bottom of a black hole.eng.txt 67.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Car Hacking.eng.txt 67.2 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/David Török - A Friendly Guide on How to Avoid Getting Pwned Out of Business - a Hacker's Memento.eng.srt 67.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gerhard Klostermeier, Matthias Deeg - Of Mice and Keyboards.eng.lrc 67.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race.eng.txt 67.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Panczel Zoltan, Spala Ferenc - Buffer Overflow Workshop.eng.text 67.0 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Service Mess to Service Mesh by Rob Richardson.eng.srt 66.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Car Hacking.eng.vtt 66.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Car Hacking.eng.lrc 66.5 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Practical EDR Bypass Methods in 2022 by István Tóth.eng.srt 66.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Vivek Ramachandran - Cracking WPA WPA2 Personal and Enterprise for Fun and Profit.eng.tsv 66.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyongyosi Peter, Illes Marton Tuzfalak es tamadasok.eng.txt 66.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Gabor Szappanos - Journey to the bottom of a black hole.eng.lrc 66.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Best of Hacktivity 2013 official.eng.json 66.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race.eng.lrc 66.1 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/How Attackers Abused DNS in 2021 2022 by Piotr Głaska.eng.srt 65.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gerhard Klostermeier, Matthias Deeg - Of Mice and Keyboards.eng.vtt 65.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Holtzl Peter - Log analizis.eng.txt 65.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyongyosi Peter, Illes Marton Tuzfalak es tamadasok.eng.lrc 65.2 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/State of the Art Phishing by Six.eng.srt 65.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Abdul Aziz Hariri - Onix Zero Day Initiative Ruined my Life.eng.srt 64.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marina Krotofil - Rocking the pocket book - hacking chemical plant for competition and extortion.eng.txt 64.8 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marina Krotofil - Rocking the pocket book - hacking chemical plant for competition and extortion.eng.vtt 64.8 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Making Sense of Firmware Images - The Journey by Márton Illés.eng.srt 64.8 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Tamas Kocsis & Balint Kovacs - Fight Against Fake News Sites Using Open Source Tools (in Hungarian).eng.tsv 64.7 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Applying ATT&CK to Analyze Ransomware Campaigns by Marc Rivero López.eng.srt 64.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Harman Singh - Active Directory Threats & Detection.eng.vtt 64.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race (Magyar).eng.txt 64.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Szor Peter - Kuzdelem a kartekony kodok ellen.eng.tsv 64.4 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Christina Lekati - Social Engineering through Social Media.eng.srt 64.3 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marina Krotofil - Rocking the pocket book - hacking chemical plant for competition and extortion.eng.lrc 64.2 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/ATTPwn Adversary Emulation. ATT&CK Automation by Pablo González & Fran Ramírez.eng.srt 64.1 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/m Hacking Power Grids to Oil Pipelines - Barak Sternberg.eng.srt 64.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Holtzl Peter - Log analizis.eng.lrc 64.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms.eng.txt 64.0 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/How to Hack and Defend (Your) Open Source.eng.srt 63.8 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/SIEM Slam Tricking Modern SIEMs with Fake Logs and Confusing Blue Teams.eng.srt 63.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zoltan Panczel, Ferenc Spala - Buffer Overflow Workshop.eng.tsv 63.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Cybercrime, Information, Warfare and Cyberwar - what s this all about.eng.srt 63.7 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Thomas Debize - A Decade of Infosec Tools.eng.srt 63.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation.eng.txt 63.6 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/The Power of Coercion Techniques in Windows Environments.eng.srt 63.4 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/A Common Bypass Pattern to Exploit Modern Web Apps.eng.srt 63.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race (Magyar).eng.lrc 63.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Jos Weyers - Lock Impressioning.eng.txt 63.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kabai Andras - Buffer Overflow II. ASLR es DEP megkerulesi technikak.eng.tsv 63.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality.eng.srt 63.1 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Get Deception In Your Environment Now.eng.srt 62.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms.eng.lrc 62.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Tamas Kocsis & Balint Kovacs - Fight Against Fake News Sites Using Open Source Tools (in Hungarian).eng.srt 62.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race.eng.srt 62.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation.eng.lrc 62.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation.eng.srt 62.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Stefan Marsiske - Post-quantum is the new cyber5.eng.vtt 62.8 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Penetration Testing Management Problems in Large Corporations.eng.srt 62.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Csaba Krasznay - Cyber soldiers in the world - how to become a military hacker.eng.txt 62.5 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/The 5G Battle by Róbert Moody and Bence Horváth.eng.srt 62.3 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Dave Lewis - Sharks Petrol These Waters - Keynote Presentation.eng.srt 62.3 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Automating Binary Analysis with Ghidra's P-Code by Gergely Révay.eng.srt 62.3 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Hacking AppLocker Cache by Grzegorz Tworek.eng.srt 62.2 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Philip Young - Smashing the Mainframe for Fun and Prison Time.eng.vtt 62.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Foti Marcell - Nincs uj a nap alatt.eng.txt 62.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ethical hacking in Hungary - Roundtable discussion (in Hungarian).eng.txt 62.1 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Jos Weyers - Lock Impressioning.eng.lrc 62.1 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Inbar Raz - Under Pressure Real World Damage with TPMS Spoofing.eng.srt 61.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Paul M. Wright - Oracle 12c Security - Defense and Attack.eng.txt 61.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Joe McCray - Big Bang Theory - Pentesting high security environments.eng.tsv 61.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Csaba Krasznay - Cyber soldiers in the world - how to become a military hacker.eng.lrc 61.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Schaffer Krisztian - Forraskod ellenorzes biztonsagi szempontok alapjan.eng.txt 61.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Bohannon - Invoke-Obfuscation PowerShell obFUsk8tion.eng.tsv 61.8 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Web3 - Scams = It's a Match by Zoltán Balázs.eng.srt 61.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Bartok Sandor Peter - Informatikai igazsagugyi laboratoriumok szakmai szolgaltatasai.eng.txt 61.6 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Philip Young - Smashing the Mainframe for Fun and Prison Time.eng.tsv 61.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Csaba Krasznay - Cyber soldiers in the world - how to become a military hacker.eng.vtt 61.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szabo Aron - Chip-csirip, avagy PKI eszkozok alternativ felhasznalasai.eng.txt 61.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality.eng.txt 61.4 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Perception vs Reality by Piotr Pobereźny.eng.srt 61.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Joe McCray - Big Bang Theory - Pentesting high security environments.eng.vtt 61.4 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal.eng.tsv 61.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Foti Marcell - Nincs uj a nap alatt.eng.lrc 61.0 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ethical hacking in Hungary - Roundtable discussion (in Hungarian).eng.lrc 61.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Paul M. Wright - Oracle 12c Security - Defense and Attack.eng.lrc 60.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Schaffer Krisztian - Forraskod ellenorzes biztonsagi szempontok alapjan.eng.lrc 60.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms, Backdoors and Botnets for Fun and Profit.eng.txt 60.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality.eng.lrc 60.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/George Webster, Julian Kirsch - A Study of the Rich Header and Respective Malware Triage.eng.txt 60.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Bartok Sandor Peter - Informatikai igazsagugyi laboratoriumok szakmai szolgaltatasai.eng.lrc 60.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gerhard Klostermeier, Matthias Deeg - Of Mice and Keyboards.eng.tsv 60.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation HUN.eng.txt 60.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szabo Aron - Chip-csirip, avagy PKI eszkozok alternativ felhasznalasai.eng.lrc 60.3 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/4 Weird Google VRP Bugs in 40 Minutes.eng.srt 60.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gergely Revay - Security implications of the Cross-Origin Resource Sharing.eng.txt 60.1 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Fehér András, Kapitány Sándor, Martinkovics Dániel, Otti Csaba - Kézben a biztonság ().eng.txt 59.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms, Backdoors and Botnets for Fun and Profit.eng.lrc 59.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/George Webster, Julian Kirsch - A Study of the Rich Header and Respective Malware Triage.eng.lrc 59.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Stefan Marsiske - Post-quantum is the new cyber5.eng.txt 59.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Szor Peter - Kuzdelem a kartekony kodok ellen.eng.srt 59.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation HUN.eng.lrc 59.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Kiberbunozes, informacios hadviseles es kiberhaboru - mi ez az egesz.eng.txt 59.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Bucsay Balazs - Paypass serulekenysegek.eng.txt 59.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shakeel Tufail - Software Threat Modeling.eng.text 59.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoz - Data Demolition Gone in 60 Seconds.eng.text 59.4 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Automotive Threat Intelligence by Péter Venesz & Giuseppe Serio.eng.srt 59.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality (Magyar).eng.txt 59.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gergely Revay - Security implications of the Cross-Origin Resource Sharing.eng.lrc 59.1 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Stefan Marsiske - Post-quantum is the new cyber5.eng.lrc 59.1 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Andrea Pierini - WHOAMI - PRIV - Show Me Your Privileges and I Will Lead You to System.eng.srt 59.0 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Fehér András, Kapitány Sándor, Martinkovics Dániel, Otti Csaba - Kézben a biztonság ().eng.lrc 58.9 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Millions for Nothing and Clicks for Free.eng.srt 58.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gara-Tarn u00f3czi P u00e9ter - Adatment u00e9s rendhagy u00f3 m u00f3don - Hasznosak-e a hacker k u00e9pess u00e9gek egy IT Secember munk.eng.txt 58.8 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/That’s Just a Tool - Not Good Nor Bad. That Part is Up to YOU.eng.srt 58.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Kiberbunozes, informacios hadviseles es kiberhaboru - mi ez az egesz.eng.lrc 58.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tomcsanyi Domonkos - Oltonyos hackeles - okostelefon, mint hacker-svajcibicska.eng.txt 58.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Toth, Ferenc Spala - What s common in Oracle and Samsung.eng.srt 58.6 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Jennifer Janesko - Facepalm and Carry On A Tale of I's O's and T's.eng.srt 58.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Bucsay Balazs - Paypass serulekenysegek.eng.lrc 58.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dániel Komaromy - Offense wins games, Defense wins nothing.eng.text 58.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Bruce Schneier - keynote speech.eng.srt 58.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Major Marcell, Zagon Mihaly - A legajabb webes tamadasi lehetosegek.eng.txt 58.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality (Magyar).eng.lrc 58.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Car Hacking.eng.tsv 58.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szekely Tamas - Hello HSRP, viszlat HSRP.eng.txt 57.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Tamas Kocsis & Balint Kovacs - Fight Against Fake News Sites Using Open Source Tools (in Hungarian).eng.vtt 57.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ben Seri & Gregory Vishnepolsky - BlueBorne Explained.eng.txt 57.8 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marina Krotofil - Rocking the pocket book - hacking chemical plant for competition and extortion.eng.tsv 57.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gara-Tarn u00f3czi P u00e9ter - Adatment u00e9s rendhagy u00f3 m u00f3don - Hasznosak-e a hacker k u00e9pess u00e9gek egy IT Secember munk.eng.lrc 57.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tomcsanyi Domonkos - Oltonyos hackeles - okostelefon, mint hacker-svajcibicska.eng.lrc 57.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Major Marcell, Zagon Mihaly - A legajabb webes tamadasi lehetosegek.eng.lrc 57.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Otti Csaba - A biometria biztonsaga.eng.txt 57.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Rene Freingruber - Bypassing application whitelisting in critical infrastructures.eng.txt 57.5 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Barnabas Sztan-Kovacs - Notwork Security.eng.srt 57.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Neumann Robert - Exepacker.eng.tsv 57.3 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ben Seri & Gregory Vishnepolsky - BlueBorne Explained.eng.lrc 57.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Illesi Zsolt - Tut a szenakazalban.eng.txt 57.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Kirils Solovjovs - Tools for effortless reverse engineering of MikroTik routers.eng.srt 57.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Rene Freingruber - Bypassing application whitelisting in critical infrastructures.eng.lrc 57.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Jos Weyers - Lock Impressioning.eng.srt 57.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality.eng.vtt 57.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szekely Tamas - Hello HSRP, viszlat HSRP.eng.lrc 56.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Dr. Boldizsar Bencsath - What Makes the Analysis of Malware. Like Duqu or Flame.eng.tsv 56.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation.eng.vtt 56.9 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/XPC exploitation by Csaba Fitzl.eng.srt 56.8 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/C2Centipede APT Level C2 Communications for Common Reverse HTTP Shell Tools.eng.srt 56.8 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Vulnerabilities When Securing Your Own Environment is No Longer Enough.eng.srt 56.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Cybercrime, Information, Warfare and Cyberwar - what s this all about.eng.vtt 56.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - Mit tegynk, ha bekvetkezett a baj.eng.txt 56.8 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Arun Mane & Nikhil Bogam - Making Anomaly Detection System(ADS) for Vehicles - Canbus and Lin.eng.srt 56.6 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Komaromy Daniel - Enter The Snapdragon.eng.srt 56.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Muha Lajos, Dr. - Informaciobiztonsagi torveny ertelmezese.eng.tsv 56.4 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Roundtable Discussion about NIS2 Directive (in Hungarian).eng.tsv 56.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Otti Csaba - A biometria biztonsaga.eng.lrc 56.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tevesz Andras - Rootkitek es AV gyartok.eng.tsv 56.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Csaba Krasznay - Web 2.0.eng.tsv 56.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race.eng.vtt 56.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tevesz Andras - Rootkitek es AV gyartok.eng.srt 56.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Illesi Zsolt - Tut a szenakazalban.eng.lrc 56.2 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Carved in Stone Malware [ab]use of the Bitcoin Blockchain.eng.srt 56.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shay Chen - The Diviner - Digital Clairvoyance Breakthrough.eng.tsv 56.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Krasznay Csaba - Web 2.0.eng.srt 56.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Benjamin Tamasi - Hacking CCTV systems.eng.srt 55.9 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Kocsis Tamas & Kovacs Balint - Az Informacioszivargas Monitorozasa Open Source Eszközökkel.eng.txt 55.9 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Rene Freingruber - Bypassing application whitelisting in critical infrastructures.eng.srt 55.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - Mit tegynk, ha bekvetkezett a baj.eng.lrc 55.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Costin Raiu - keynote - APT Paleontology in the age of cyber.eng.srt 55.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race.eng.tsv 55.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gara-Tarnczi Peater - Publikus exploitok testreszabasa.eng.tsv 55.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Neumann Robert - Exepacker.eng.srt 55.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Kiberbunozes, informacios hadviseles es kiberhaboru - mi ez az egesz.eng.srt 55.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Gabor Szappanos - Journey to the bottom of a black hole.eng.tsv 55.6 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Komaromy Daniel - Enter The Snapdragon.eng.txt 55.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Szor Peter - Kuzdelem a kartekony kodok ellen.eng.vtt 55.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Krasznay Csaba - Web 2.0.eng.tsv 55.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Gabor Szappanos - Journey to the bottom of a black hole.eng.srt 55.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Domonkos Tomcsanyi - GSM - have we overslept the last wake-up call.eng.srt 55.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Domonkos Tomcsanyi - Give me a phone that can't be traced.eng.srt 55.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Beregnyei Balazs - Szilicium layouttol a kapcsolasi rajzig.eng.txt 55.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Paul M. Wright - Oracle 12c Security - Defense and Attack.eng.srt 55.3 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Komaromy Daniel - Enter The Snapdragon.eng.lrc 55.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Illes Zsolt - Informatikai bizonyitek, bizonyitas igazsagugyi szakertoi szemmel.eng.txt 55.1 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Kocsis Tamas & Kovacs Balint - Az Informacioszivargas Monitorozasa Open Source Eszközökkel.eng.lrc 55.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ben Seri & Gregory Vishnepolsky - BlueBorne Explained.eng.srt 55.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Antonio Barresi, Peter Somogyvari - Android Security - An Introduction.eng.srt 55.0 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/The Great Hospital Hack - by Mirza Burhan Baig.eng.srt 54.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Harman Singh - Active Directory Threats & Detection.eng.text 54.9 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal.eng.srt 54.8 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Hacking Facial Recognition Systems by Alexander Polyakov.eng.srt 54.7 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Malware Hunting - Using Python as Attack Weapon.eng.srt 54.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Beregnyei Balazs - Szilicium layouttol a kapcsolasi rajzig.eng.lrc 54.7 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Roundtable Discussion about NIS2 Directive (in Hungarian).eng.srt 54.6 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Haroon Meer - keynote - Time to play - D.eng.srt 54.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation.eng.tsv 54.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Dr. Boldizsar Bencsath - What Makes the Analysis of Malware. Like Duqu or Flame.eng.srt 54.6 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Spin That Steering Wheel by Domokos Nagy.eng.srt 54.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Sebastian Garcia - The Network Behavior of Targeted Attacks.eng.srt 54.5 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/How an Android Application can Drain Your Wallet by Dimitrios Valsamaras.eng.srt 54.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Kabai - Buffer Overflow step II. ASLR and DEP eveasion techniques.eng.txt 54.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Csaba Krasznay - Cyber soldiers in the world - how to become a military hacker.eng.tsv 54.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Illes Zsolt - Informatikai bizonyitek, bizonyitas igazsagugyi szakertoi szemmel.eng.lrc 54.2 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/How Soft Skills Get Hard Results by Scott Asai.eng.srt 54.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szekely Tamas - DDoS-t vettem a vasarban bitpenzzel.eng.txt 54.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kovacs Zsombor - A visszanyalo fagyi, a sotet park es a fekete ballonkabat, avagy a publikus WiFi alulne.eng.txt 54.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Szor - Fighting Computer Malware.eng.srt 54.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kabai Andras - Buffer Overflow II. ASLR es DEP megkerulesi technikak.eng.srt 54.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Toth Laszlo - Oracle adatbazis post exploitation technikak.eng.txt 54.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Veres-Szentkiralyi Andracus - Hacking hardware for fun and profit.eng.txt 53.9 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/How to Bypass Data Exfiltration Detection with Malicious Cryptography Techniques.eng.srt 53.8 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Formshaker.eng.srt 53.7 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Attila Szasz & Gergo Hosszu - Dive into Magenta - fuzzing Google's new kernel.eng.srt 53.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Stefan Marsiske - Post-quantum is the new cyber5.eng.tsv 53.7 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Cybersecurity Cannot Ignore Climate Change by Chloé Messdaghi.eng.srt 53.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyongyosi Peter, Illes Marton Tuzfalak es tamadasok.eng.tsv 53.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Kabai - Buffer Overflow step II. ASLR and DEP eveasion techniques.eng.lrc 53.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Toth Laszlo - Majdnem lathatatlan alca az Oracle adatbazisban, avagy a nem dokumentalt ismet segit min.eng.txt 53.6 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/MIPS-X The Next IoT Frontier.eng.srt 53.6 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Detection Engineering Building Custom Detection Controls for Cloud Environments.eng.srt 53.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kerenyi Kristof, Hornak Zoltan, Kispal Istvan - Crypto-chipek biztonsaga, passziv-aktiv kombinalt ta.eng.txt 53.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szekely Tamas - DDoS-t vettem a vasarban bitpenzzel.eng.lrc 53.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Major Marcell - Hogyan irjunk sajat jelszotorot.eng.txt 53.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Barta Csaba - Az NTDS.DIT forensics vizsgalata.eng.txt 53.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Pek - eNeMI - Evading the state-of-the-art hardware protection of IO virtualization.eng.txt 53.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Toth Laszlo - Oracle adatbazis post exploitation technikak.eng.lrc 53.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kovacs Zsombor - A visszanyalo fagyi, a sotet park es a fekete ballonkabat, avagy a publikus WiFi alulne.eng.lrc 53.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Veres-Szentkiralyi Andracus - Hacking hardware for fun and profit.eng.lrc 53.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Bohannon - Invoke-Obfuscation PowerShell obFUsk8tion.eng.text 53.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Zoltan Balazs - Oldschool is Still Cool.eng.srt 53.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Best of Hacktivity 2011.eng.json 52.9 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/7 Steps to Secure a SaaS Platform - the Worlds Biggest Companies Trust.eng.srt 52.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality.eng.tsv 52.8 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Komaromy Daniel - Enter The Snapdragon.eng.vtt 52.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Toth Laszlo - Majdnem lathatatlan alca az Oracle adatbazisban, avagy a nem dokumentalt ismet segit min.eng.lrc 52.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kerenyi Kristof, Hornak Zoltan, Kispal Istvan - Crypto-chipek biztonsaga, passziv-aktiv kombinalt ta.eng.lrc 52.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Mark Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.eng.srt 52.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms.eng.srt 52.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Oroszi Eszter - Social Engineering, amikor fellebben a fagyol.eng.txt 52.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zane Lackey - Attack-driven defense.eng.text 52.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Major Marcell - Hogyan irjunk sajat jelszotorot.eng.lrc 52.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Foti Marcell - Nincs uj a nap alatt.eng.srt 52.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Barta Csaba - Az NTDS.DIT forensics vizsgalata.eng.lrc 52.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Pek - eNeMI - Evading the state-of-the-art hardware protection of IO virtualization.eng.lrc 52.4 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Travis Goodspeed - A Keynote in Praise of Junk Hacking.eng.srt 52.3 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Julien Thomas - Limitations of Android permission system.eng.srt 52.3 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marosi Attila - A Hacking Team rosszindulatú programjai.eng.txt 52.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Rene Freingruber - Bypassing application whitelisting in critical infrastructures.eng.vtt 52.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Bruce Schneier - keynote speech.eng.txt 52.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms, Backdoors and Botnets for Fun and Profit.eng.srt 52.1 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Fabian Yamaguchi - Mining for Bugs with Graph Database Queries.eng.srt 52.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Toth, Ferenc Spala - What s common in Oracle and Samsung.eng.vtt 51.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Oroszi Eszter - Social Engineering, amikor fellebben a fagyol.eng.lrc 51.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Gruss - Microarchitectural Incontinence - You would leak too if you were so fast.eng.srt 51.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Bruce Schneier - keynote speech.eng.lrc 51.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Bruce Schneier - keynote speech.eng.vtt 51.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality (Magyar).eng.srt 51.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Neumann Robert - Exepacker.eng.vtt 51.4 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Mark Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.eng.txt 51.4 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marosi Attila - A Hacking Team rosszindulatú programjai.eng.lrc 51.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Gabor Szappanos - Journey to the bottom of a black hole.eng.vtt 51.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Rene Freingruber - Bypassing application whitelisting in critical infrastructures.eng.tsv 51.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms.eng.tsv 51.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Cybercrime, Information, Warfare and Cyberwar - what s this all about.eng.txt 51.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Domonkos Tomcsanyi - GSM - have we overslept the last wake-up call.eng.vtt 51.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tomcsanyi Domonkos - Oltonyos hackeles - okostelefon, mint hacker-svajcibicska.eng.srt 51.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyongyosi Peter, Illes Marton Tuzfalak es tamadasok.eng.srt 50.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Fehér András, Kapitány Sándor, Martinkovics Dániel, Otti Csaba - Kézben a biztonság ().eng.srt 50.9 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Kelly Shortridge - The Art of Explanation Behavioral Models of InfoSec.eng.txt 50.9 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/George Webster, Julian Kirsch - A Study of the Rich Header and Respective Malware Triage.eng.srt 50.8 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Revisiting a Wireless Alarm System by Matthias Deeg.eng.srt 50.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Haroon Meer - keynote - Time to play - D.eng.txt 50.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tevesz Andras - Rootkitek es AV gyartok.eng.vtt 50.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gerhard Klostermeier, Matthias Deeg - Of Mice and Keyboards.eng.text 50.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Dr. Boldizsar Bencsath - What Makes the Analysis of Malware. Like Duqu or Flame.eng.vtt 50.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Beregnyei Balazs - Szilicium layouttol a kapcsolasi rajzig.eng.srt 50.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Mark Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.eng.lrc 50.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Cybercrime, Information, Warfare and Cyberwar - what s this all about.eng.lrc 50.7 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal.eng.vtt 50.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Szor - Fighting Computer Malware.eng.vtt 50.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Holtzl Peter - Log analizis.eng.tsv 50.6 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Costin Raiu - keynote - APT Paleontology in the age of cyber.eng.vtt 50.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gara-Tarnczi Peater - Publikus exploitok testreszabasa.eng.srt 50.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zoltan Panczel, Ferenc Spala - Buffer Overflow Workshop.eng.text 50.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ben Seri & Gregory Vishnepolsky - BlueBorne Explained.eng.vtt 50.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Csaba Otti - The security and vulnerability of the biometry.eng.srt 50.5 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Bíro László Miklós - Titkosítás és visszafejtés a fizikai réteg szintjén.eng.txt 50.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Muha Lajos, Dr. - Informaciobiztonsagi torveny ertelmezese.eng.srt 50.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation HUN.eng.srt 50.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race (Magyar).eng.tsv 50.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Schaffer Krisztian - Forraskod ellenorzes biztonsagi szempontok alapjan.eng.srt 50.4 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Kelly Shortridge - The Art of Explanation Behavioral Models of InfoSec.eng.lrc 50.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Haroon Meer - keynote - Time to play - D.eng.lrc 50.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Benjamin Tamasi - Hacking CCTV systems.eng.vtt 50.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Antonio Barresi, Peter Somogyvari - Android Security - An Introduction.eng.vtt 50.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Travis Goodspeed - A Keynote in Praise of Junk Hacking.eng.txt 50.3 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Boldizsár Bencsáth - BAB0 - A custom sample that bypassed cutting-edge APT attack detection tools.eng.txt 50.3 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Jochanan Sommerfeld - DDoS protection technology is far from being install & forget.eng.srt 50.2 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Komaromy Daniel - Enter The Snapdragon.eng.tsv 50.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Haroon Meer - keynote - Time to play - D.eng.vtt 50.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Vladimir Katalov - iOS Acquisition Methods Compared.eng.txt 50.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas K. Lengyel - Virtual Machine Introspection to Detect and Protect.eng.txt 50.2 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/The Key to an - Entire Kingdom - Pandora FMS - Chained Exploit (CVE-2021-34074).eng.srt 50.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Bardoczi, Lilian Zsakai - Data mining in the age of social web.eng.txt 50.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Domonkos Tomcsanyi - Give me a phone that can't be traced.eng.vtt 50.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation HUN.eng.tsv 50.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Otti Csaba, Oszi Arnold - Ujjlenyomat azonosito rendszerek, biztonsag vagy biztonsagi res.eng.srt 50.1 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Jos Weyers - Lock Impressioning.eng.tsv 50.1 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aman Sachdev & Himanshu Sharma - Hacking Real Life Financial Applications.eng.srt 50.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Szappanos - Advanced() Persistent Shellcode.eng.txt 50.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Krasznay Csaba - Web 2.0.eng.vtt 50.0 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Gábor Szappanos - Comparing the incomparables.eng.srt 50.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Jos Weyers - Lock Impressioning.eng.vtt 50.0 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Attila Szasz & Gergo Hosszu - Dive into Magenta - fuzzing Google's new kernel.eng.txt 50.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/George Webster, Julian Kirsch - A Study of the Rich Header and Respective Malware Triage.eng.tsv 50.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Kiberbunozes, informacios hadviseles es kiberhaboru - mi ez az egesz.eng.vtt 49.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ben Seri & Gregory Vishnepolsky - BlueBorne Explained.eng.tsv 49.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Boldizsár Bencsáth - BAB0 - A custom sample that bypassed cutting-edge APT attack detection tools.eng.lrc 49.9 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Travis Goodspeed - A Keynote in Praise of Junk Hacking.eng.lrc 49.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Bardoczi Akos, Zsakai Lilian - Adatbanyaszat a kozossegi web koraban.eng.txt 49.8 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Roundtable Discussion about NIS2 Directive (in Hungarian).eng.vtt 49.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Vladimir Katalov - iOS Acquisition Methods Compared.eng.lrc 49.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Bíro László Miklós - Titkosítás és visszafejtés a fizikai réteg szintjén.eng.lrc 49.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Kabai - Buffer Overflow step II. ASLR and DEP eveasion techniques.eng.srt 49.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Schaffer Krisztian - Forraskod ellenorzes biztonsagi szempontok alapjan.eng.tsv 49.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Domonkos Tomcsanyi - GSM - have we overslept the last wake-up call.eng.txt 49.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Antonio Barresi, Peter Somogyvari - Android Security - An Introduction.eng.txt 49.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Kiberbunozes, informacios hadviseles es kiberhaboru - mi ez az egesz.eng.tsv 49.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas K. Lengyel - Virtual Machine Introspection to Detect and Protect.eng.lrc 49.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kabai Andras - Buffer Overflow II. ASLR es DEP megkerulesi technikak.eng.vtt 49.4 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Jos Weyers - Post-its, post-its, post-its everywhere (and how they relate to physical keys).eng.srt 49.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Szappanos - Advanced() Persistent Shellcode.eng.lrc 49.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Attila Szasz & Gergo Hosszu - Dive into Magenta - fuzzing Google's new kernel.eng.lrc 49.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Paul M. Wright - Oracle 12c Security - Defense and Attack.eng.tsv 49.3 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Stephan Gerling - Hacking Yachts Remotely via Satcom or Maritime Internet Router.eng.srt 49.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Varadi Tamas - Impressziotechnika.eng.txt 49.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Bardoczi, Lilian Zsakai - Data mining in the age of social web.eng.lrc 49.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Szor - Fighting Computer Malware.eng.txt 49.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms, Backdoors and Botnets for Fun and Profit.eng.tsv 49.3 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ethical hacking in Hungary - Roundtable discussion (in Hungarian).eng.tsv 49.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Domonkos Tomcsanyi - GSM - have we overslept the last wake-up call.eng.lrc 49.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Vivek Ramachandran - Cracking WPA WPA2 Personal and Enterprise for Fun and Profit.eng.text 49.2 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Boldizsár Bencsáth - BAB0 - A custom sample that bypassed cutting-edge APT attack detection tools.eng.srt 49.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Antonio Barresi, Peter Somogyvari - Android Security - An Introduction.eng.lrc 49.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Leitold Ferenc Horvath Botond - Vedekezes kartevok C&C forgalma ellen.eng.txt 49.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Major Marcell, Zagon Mihaly - A legajabb webes tamadasi lehetosegek.eng.srt 49.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Szor - Fighting Computer Malware.eng.lrc 49.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Bardoczi Akos, Zsakai Lilian - Adatbanyaszat a kozossegi web koraban.eng.lrc 49.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Foti Marcell - Nincs uj a nap alatt.eng.tsv 49.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Paul M. Wright - Oracle 12c Security - Defense and Attack.eng.vtt 48.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gergely Revay - Security implications of the Cross-Origin Resource Sharing.eng.tsv 48.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Bartok Sandor Peter - Informatikai igazsagugyi laboratoriumok szakmai szolgaltatasai.eng.tsv 48.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Ertunga Arsal - Rootkits and Trojans on Your SAP Landscape.eng.srt 48.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kabai Andras - Malware Analizis, tippek es trukkok.eng.txt 48.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Major Marcell - Hogyan irjunk sajat jelszotorot.eng.srt 48.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Vladimir Katalov - iOS Acquisition Methods Compared.eng.srt 48.6 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Mount(ain) of Bugs.eng.srt 48.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Fehér András, Kapitány Sándor, Martinkovics Dániel, Otti Csaba - Kézben a biztonság ().eng.tsv 48.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Kelly Shortridge - The Art of Explanation Behavioral Models of InfoSec.eng.srt 48.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Sergej Proskurin, Tamás K. Lengyel - Stealthy, Hypervisor-based Malware Analysis.eng.txt 48.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Lederer Sandor Foldes Adam Bodoky Tamas Csorgo Laszlo - Wikileaks - info-szabadsagharc vagy info-terr.eng.txt 48.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Varadi Tamas - Impressziotechnika.eng.lrc 48.4 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Sergej Proskurin, Tamás K. Lengyel - Stealthy, Hypervisor-based Malware Analysis.eng.srt 48.4 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marina Krotofil - Rocking the pocket book - hacking chemical plant for competition and extortion.eng.text 48.3 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Penetration testing VoIP UC nowadays by Moritz Abrell.eng.srt 48.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Travis Goodspeed - A Keynote in Praise of Junk Hacking.eng.vtt 48.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Leitold Ferenc Horvath Botond - Vedekezes kartevok C&C forgalma ellen.eng.lrc 48.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Toth, Ferenc Spala - What s common in Oracle and Samsung.eng.txt 48.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to hide your browser 0-days.eng.txt 48.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Costin Raiu - keynote - APT Paleontology in the age of cyber.eng.txt 48.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Kirils Solovjovs - Tools for effortless reverse engineering of MikroTik routers.eng.txt 48.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Kirils Solovjovs - Tools for effortless reverse engineering of MikroTik routers.eng.vtt 48.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Bucsay Balazs - Paypass serulekenysegek.eng.tsv 48.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Julien Thomas - Limitations of Android permission system.eng.txt 48.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Attila Szasz & Gergo Hosszu - Dive into Magenta - fuzzing Google's new kernel.eng.vtt 48.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Gruss - Microarchitectural Incontinence - You would leak too if you were so fast.eng.txt 48.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kabai Andras - Malware Analizis, tippek es trukkok.eng.lrc 48.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szabo Aron - Chip-csirip, avagy PKI eszkozok alternativ felhasznalasai.eng.tsv 48.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gergely Revay - Security implications of the Cross-Origin Resource Sharing.eng.srt 48.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Sergej Proskurin, Tamás K. Lengyel - Stealthy, Hypervisor-based Malware Analysis.eng.lrc 47.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Julien Thomas - Limitations of Android permission system.eng.vtt 47.9 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Cloud Security Monitoring and Evasion Techniques.eng.srt 47.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Major Marcell, Zagon Mihaly - A legajabb webes tamadasi lehetosegek.eng.tsv 47.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Steve Mulhearn - The Rise and Fall of DDoS Attacks in 2012.eng.srt 47.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tevesz Andras - Antivirus program hatastalanitas.eng.txt 47.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Costin Raiu - keynote - APT Paleontology in the age of cyber.eng.lrc 47.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Toth, Ferenc Spala - What s common in Oracle and Samsung.eng.lrc 47.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Jeney Gabor - A fizetos WiFi hotspotok ingyenes hasznalatarol.eng.txt 47.7 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Julien Thomas - Limitations of Android permission system.eng.lrc 47.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Gruss - Microarchitectural Incontinence - You would leak too if you were so fast.eng.lrc 47.6 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to hide your browser 0-days.eng.lrc 47.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Feher Andras, Otti Csaba - Arcfelismero rendszerek.eng.txt 47.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Gruss - Microarchitectural Incontinence - You would leak too if you were so fast.eng.vtt 47.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality (Magyar).eng.tsv 47.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Lederer Sandor Foldes Adam Bodoky Tamas Csorgo Laszlo - Wikileaks - info-szabadsagharc vagy info-terr.eng.lrc 47.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Szappanos - Advanced() Persistent Shellcode.eng.srt 47.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Kirils Solovjovs - Tools for effortless reverse engineering of MikroTik routers.eng.lrc 47.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Polyakov - Top 10 most interesting SAP vulnerabilities and attacks.eng.srt 47.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Domonkos Tomcsanyi - Give me a phone that can't be traced.eng.txt 47.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoltan Balazs - The real risks of the IoT security-nightmare Hacking IP cameras through the cloud.eng.srt 47.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms.eng.vtt 47.2 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Mark Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.eng.vtt 47.2 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Márk Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.eng.srt 47.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race (Magyar).eng.srt 47.1 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Working with proof key for code exch. to comm. with the cloud by Milecia McGregor.eng.srt 47.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Otti Csaba, Oszi Arnold - Ujjlenyomat azonosito rendszerek, biztonsag vagy biztonsagi res.eng.txt 47.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Benjamin Tamasi - Hacking CCTV systems.eng.txt 47.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Dismal or bang-bang SCADA.eng.srt 47.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Beregnyei Balazs - Szilicium layouttol a kapcsolasi rajzig.eng.tsv 47.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tevesz Andras - Antivirus program hatastalanitas.eng.lrc 46.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Ignat Korchagin - Live-Patching Weak Crypto with OpenSSL Engines.eng.srt 46.9 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Kocsis Tamas & Kovacs Balint - Az Informacioszivargas Monitorozasa Open Source Eszközökkel.eng.srt 46.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Domonkos Tomcsanyi - Give me a phone that can't be traced.eng.lrc 46.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms, Backdoors and Botnets for Fun and Profit.eng.vtt 46.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Balazs Bucsay - Paypass vulnerabilities.eng.srt 46.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gara-Tarnczi Peater - Publikus exploitok testreszabasa.eng.vtt 46.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Feher Andras, Otti Csaba - Arcfelismero rendszerek.eng.lrc 46.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyongyosi Peter, Illes Marton Tuzfalak es tamadasok.eng.vtt 46.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Jeney Gabor - A fizetos WiFi hotspotok ingyenes hasznalatarol.eng.lrc 46.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szekely Tamas - Hello HSRP, viszlat HSRP.eng.srt 46.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tomcsanyi Domonkos - Oltonyos hackeles - okostelefon, mint hacker-svajcibicska.eng.tsv 46.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Tevesz - Rootkits vs. Anti-Virus Developers.eng.srt 46.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kovacs Gyozo - Valogatott kalandozasaim Informatikaban.eng.txt 46.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Ormos Zoltan - Nagy port felvert nemzetkozi jogesetek az internetes biztonsag teruleten.eng.txt 46.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Benjamin Tamasi - Hacking CCTV systems.eng.lrc 46.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gara-Tarn u00f3czi P u00e9ter - Adatment u00e9s rendhagy u00f3 m u00f3don - Hasznosak-e a hacker k u00e9pess u00e9gek egy IT Secember munk.eng.tsv 46.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szekely Tamas - Hello HSRP, viszlat HSRP.eng.tsv 46.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Beregnyei Balazs - Szilicium layouttol a kapcsolasi rajzig.eng.vtt 46.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/George Webster, Julian Kirsch - A Study of the Rich Header and Respective Malware Triage.eng.vtt 46.6 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Kocsis Tamas & Kovacs Balint - Az Informacioszivargas Monitorozasa Open Source Eszközökkel.eng.tsv 46.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Glenn Ten Cate - OWASP Security knowledge Framework - Survival is not mandatory.eng.srt 46.6 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Micha Borrmann - CVSS is a big botch Scoring systems do not help to improve the IT security.eng.srt 46.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Foti Marcell - Nincs uj a nap alatt.eng.vtt 46.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Otti Csaba, Oszi Arnold - Ujjlenyomat azonosito rendszerek, biztonsag vagy biztonsagi res.eng.lrc 46.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Illesi Zsolt - Tut a szenakazalban.eng.tsv 46.5 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Jason Chan - Building a Glass House.eng.srt 46.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Subecz Akos, Zantho Csaba - Lockpicking - a zarnyitas muveszete.eng.txt 46.3 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Boldizsár Bencsáth - BAB0 - A custom sample that bypassed cutting-edge APT attack detection tools.eng.vtt 46.3 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Nicolas Gregoire - Hunting for Top Bounties.eng.srt 46.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Ertunga Arsal - Rootkits and Trojans on Your SAP Landscape.eng.txt 46.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation HUN.eng.vtt 46.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Szor Peter - Kuzdelem a kartekony kodok ellen.eng.text 46.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Car Hacking.eng.text 46.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Cybercrime, Information, Warfare and Cyberwar - what s this all about.eng.tsv 46.1 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Gábor Szappanos - Comparing the incomparables.eng.txt 46.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Muha Lajos, Dr. - Informaciobiztonsagi torveny ertelmezese.eng.vtt 46.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Travis Goodspeed - Some Thoughts on Literate Disassembly and Symbol Porting.eng.txt 46.1 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Stefan Marsiske - Post-quantum is the new cyber5.eng.text 46.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kovacs Gyozo - Valogatott kalandozasaim Informatikaban.eng.lrc 46.0 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Gábor Szappanos - Comparing the incomparables.eng.vtt 46.0 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Fehér András, Kapitány Sándor, Martinkovics Dániel, Otti Csaba - Kézben a biztonság ().eng.vtt 45.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Szor - Fighting Computer Malware.eng.tsv 45.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality (Magyar).eng.vtt 45.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Ormos Zoltan - Nagy port felvert nemzetkozi jogesetek az internetes biztonsag teruleten.eng.lrc 45.8 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Tamas Kocsis & Balint Kovacs - Fight Against Fake News Sites Using Open Source Tools (in Hungarian).eng.text 45.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Barta Csaba - Az NTDS.DIT forensics vizsgalata.eng.srt 45.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Haroon Meer - keynote - Time to play - D.eng.tsv 45.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Vladimir Katalov - iOS Acquisition Methods Compared.eng.vtt 45.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Gábor Szappanos - Comparing the incomparables.eng.lrc 45.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Ertunga Arsal - Rootkits and Trojans on Your SAP Landscape.eng.lrc 45.7 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Micha Borrmann - CVSS is a big botch Scoring systems do not help to improve the IT security.eng.txt 45.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Schaffer Krisztian - Forraskod ellenorzes biztonsagi szempontok alapjan.eng.vtt 45.6 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aman Sachdev & Himanshu Sharma - Hacking Real Life Financial Applications.eng.vtt 45.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Felix - FX - Lindner - keynote speaker.eng.srt 45.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - Mit tegynk, ha bekvetkezett a baj.eng.tsv 45.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Kabai - Buffer Overflow step II. ASLR and DEP eveasion techniques.eng.tsv 45.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szekely Tamas - DDoS-t vettem a vasarban bitpenzzel.eng.srt 45.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Subecz Akos, Zantho Csaba - Lockpicking - a zarnyitas muveszete.eng.lrc 45.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Travis Goodspeed - Some Thoughts on Literate Disassembly and Symbol Porting.eng.lrc 45.4 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Boldizsár Bencsáth - BAB0 - A custom sample that bypassed cutting-edge APT attack detection tools.eng.tsv 45.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Domonkos Tomcsanyi - GSM - have we overslept the last wake-up call.eng.tsv 45.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tomcsanyi Domonkos - Oltonyos hackeles - okostelefon, mint hacker-svajcibicska.eng.vtt 45.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Lipovsky - Evolution of Rootkits.eng.txt 45.2 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Mikhail Egorov - What's Wrong with WebSocket APIs Unveiling Vulnerabilities in WebSocket APIs.eng.srt 45.2 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Philip Young - Smashing the Mainframe for Fun and Prison Time.eng.text 45.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Kelly Shortridge - The Art of Explanation Behavioral Models of InfoSec.eng.vtt 45.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Kabai - Buffer Overflow step II. ASLR and DEP eveasion techniques.eng.vtt 45.0 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Micha Borrmann - CVSS is a big botch Scoring systems do not help to improve the IT security.eng.lrc 45.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Bucsay Balazs - Paypass serulekenysegek.eng.srt 45.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Vladimir Katalov - iOS Acquisition Methods Compared.eng.tsv 45.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Major Marcell - Hogyan irjunk sajat jelszotorot.eng.tsv 45.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Csaba Otti - The security and vulnerability of the biometry.eng.vtt 45.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Miroslav Stampar - Spot the Web Vulnerability.eng.srt 45.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Travis Goodspeed - A Keynote in Praise of Junk Hacking.eng.tsv 45.0 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/SOCKS Over RDP Citrix (Pentesting Over Jump Boxes).eng.srt 44.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Otti Csaba, Oszi Arnold - Ujjlenyomat azonosito rendszerek, biztonsag vagy biztonsagi res.eng.vtt 44.9 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gábor Pek, Tamas Koczka - SpamAndHex hacks around the world.eng.srt 44.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Holtzl Peter - Log analizis.eng.srt 44.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szekely Tamas - DDoS-t vettem a vasarban bitpenzzel.eng.tsv 44.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Toth Laszlo - Oracle adatbazis post exploitation technikak.eng.srt 44.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Antonio Barresi, Peter Somogyvari - Android Security - An Introduction.eng.tsv 44.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Sergej Proskurin, Tamás K. Lengyel - Stealthy, Hypervisor-based Malware Analysis.eng.vtt 44.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Veres-Szentkiralyi - USB = Universal Security Bug.eng.srt 44.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Csaba Otti - The security and vulnerability of the biometry.eng.txt 44.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Major Marcell, Zagon Mihaly - A legajabb webes tamadasi lehetosegek.eng.vtt 44.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Lipovsky - Evolution of Rootkits.eng.lrc 44.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Barta Csaba - Az NTDS.DIT forensics vizsgalata.eng.tsv 44.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kerenyi Kristof, Hornak Zoltan, Kispal Istvan - Crypto-chipek biztonsaga, passziv-aktiv kombinalt ta.eng.tsv 44.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Kelly Shortridge - The Art of Explanation Behavioral Models of InfoSec.eng.tsv 44.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Major Marcell - Hogyan irjunk sajat jelszotorot.eng.vtt 44.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Otti Csaba - A biometria biztonsaga.eng.tsv 44.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Illes Zsolt - Informatikai bizonyitek, bizonyitas igazsagugyi szakertoi szemmel.eng.tsv 44.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Joe McCray - There is An App for That - Pentesting Mobile Applications.eng.txt 44.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Bruce Schneier - keynote speech.eng.tsv 44.4 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aman Sachdev & Himanshu Sharma - Hacking Real Life Financial Applications.eng.txt 44.4 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Levente Buttyán, András Szijj, Zsolt Szalay - Hacking cars in the style of Stuxnet.eng.srt 44.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoltan Balazs - The real risks of the IoT security-nightmare Hacking IP cameras through the cloud.eng.txt 44.3 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/How to Upgrade Enterprise Security Using Numeric Technique.eng.srt 44.3 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Clashing EV Chargers in The Pentesting Arena.eng.srt 44.3 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Gabor Szappanos - The Nigerians are in the Spajz.eng.srt 44.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Buherator - Metasploit workshop.eng.srt 44.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Toth Laszlo - Oracle adatbazis post exploitation technikak.eng.tsv 44.1 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Balazs Bucsay - Chw00t - Breaking Unices - chroot solutions.eng.txt 44.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Csaba Otti - The security and vulnerability of the biometry.eng.lrc 44.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ethical hacking in Hungary - Roundtable discussion (in Hungarian).eng.srt 44.1 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aman Sachdev & Himanshu Sharma - Hacking Real Life Financial Applications.eng.lrc 44.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoltan Balazs - The real risks of the IoT security-nightmare Hacking IP cameras through the cloud.eng.lrc 43.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Váradi Tamás- Tárcsás zárak nyitásának eszközei és módszerei.eng.txt 43.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Neumann - Exepacker.eng.srt 43.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Pek - eNeMI - Evading the state-of-the-art hardware protection of IO virtualization.eng.srt 43.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Kabai - Hunting and exploiting bugs in kernel drivers.eng.txt 43.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gergely Revay - Security implications of the Cross-Origin Resource Sharing.eng.vtt 43.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Polyakov - Top 10 most interesting SAP vulnerabilities and attacks.eng.txt 43.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kovacs Zsombor - A visszanyalo fagyi, a sotet park es a fekete ballonkabat, avagy a publikus WiFi alulne.eng.tsv 43.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Pek - eNeMI - Evading the state-of-the-art hardware protection of IO virtualization.eng.tsv 43.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoltan Balazs - The real risks of the IoT security-nightmare Hacking IP cameras through the cloud.eng.vtt 43.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Csaba Krasznay - Cyber soldiers in the world - how to become a military hacker.eng.text 43.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Jos, Attila Bogar - is BitTorrent really providing anonymity.eng.txt 43.8 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Stephan Gerling - Hacking Yachts Remotely via Satcom or Maritime Internet Router.eng.vtt 43.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Joe McCray - There is An App for That - Pentesting Mobile Applications.eng.lrc 43.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kabai Andras - Malware Analizis, tippek es trukkok.eng.srt 43.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kovacs Zsombor - A visszanyalo fagyi, a sotet park es a fekete ballonkabat, avagy a publikus WiFi alulne.eng.srt 43.6 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Stephan Gerling - Hacking Yachts Remotely via Satcom or Maritime Internet Router.eng.txt 43.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Balazs Bucsay - Paypass vulnerabilities.eng.txt 43.5 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Balazs Bucsay - Chw00t - Breaking Unices - chroot solutions.eng.lrc 43.5 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Mark Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.eng.tsv 43.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Ertunga Arsal - Rootkits and Trojans on Your SAP Landscape.eng.vtt 43.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Costin Raiu - keynote - APT Paleontology in the age of cyber.eng.tsv 43.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zsombor Kovacs - To secure data is to prepare for jailbreak.eng.srt 43.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Jos, Attila Bogar - is BitTorrent really providing anonymity.eng.lrc 43.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Polyakov - Top 10 most interesting SAP vulnerabilities and attacks.eng.lrc 43.3 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Kocsis Tamas & Kovacs Balint - Az Informacioszivargas Monitorozasa Open Source Eszközökkel.eng.vtt 43.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Rene Freingruber - Bypassing application whitelisting in critical infrastructures.eng.text 43.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Szappanos - Advanced() Persistent Shellcode.eng.vtt 43.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Gruss - Microarchitectural Incontinence - You would leak too if you were so fast.eng.tsv 43.2 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Váradi Tamás- Tárcsás zárak nyitásának eszközei és módszerei.eng.lrc 43.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Kabai - Hunting and exploiting bugs in kernel drivers.eng.lrc 43.2 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Balazs Bucsay - Chw00t - Breaking Unices - chroot solutions.eng.srt 43.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Julien Thomas - Limitations of Android permission system.eng.tsv 43.1 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Komaromy Daniel - Enter The Snapdragon.eng.text 43.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Steve Mulhearn - The Rise and Fall of DDoS Attacks in 2012.eng.vtt 43.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Foti - There is nothing new under the sun.eng.srt 43.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Krisztian Schaffer - Security Code Review.eng.srt 43.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Balazs Bucsay - Paypass vulnerabilities.eng.lrc 43.1 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Stephan Gerling - Hacking Yachts Remotely via Satcom or Maritime Internet Router.eng.lrc 43.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Jos, Attila Bogar - is BitTorrent really providing anonymity.eng.srt 43.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Veres-Szentkiralyi Andracus - Hacking hardware for fun and profit.eng.tsv 43.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Subecz Akos - Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban.eng.txt 42.9 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication System.eng.txt 42.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Attila Szasz & Gergo Hosszu - Dive into Magenta - fuzzing Google's new kernel.eng.tsv 42.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Toth Laszlo - Majdnem lathatatlan alca az Oracle adatbazisban, avagy a nem dokumentalt ismet segit min.eng.tsv 42.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Frantisek Strasak & Jan Fajfer - Increasing Efficiency of Encr. Traffic Analysis of People at Risk.eng.srt 42.8 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Gabor Szappanos - The Nigerians are in the Spajz.eng.txt 42.8 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Machine Learning Evasion Competition by Zoltán Balázs.eng.srt 42.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Sergej Proskurin, Tamás K. Lengyel - Stealthy, Hypervisor-based Malware Analysis.eng.tsv 42.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Maroy, Tamas Bodoky - Anonim whistleblowing using the GlobaLeaks platform.eng.txt 42.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Szappanos - Advanced() Persistent Shellcode.eng.tsv 42.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Polyakov - Top 10 most interesting SAP vulnerabilities and attacks.eng.vtt 42.6 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Jason Chan - Building a Glass House.eng.vtt 42.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Domonkos Tomcsanyi - Give me a phone that can't be traced.eng.tsv 42.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szekely Tamas - Hello HSRP, viszlat HSRP.eng.vtt 42.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Oroszi Eszter - Social Engineering, amikor fellebben a fagyol.eng.tsv 42.6 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication System.eng.lrc 42.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Feher Andras, Otti Csaba - Arcfelismero rendszerek.eng.srt 42.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race (Magyar).eng.vtt 42.5 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Jason Chan - Building a Glass House.eng.txt 42.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Veres-Szentkiralyi Andras - Linux szerverunk van ezert biztonsagos.eng.txt 42.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Veres-Szentkiralyi - USB = Universal Security Bug.eng.txt 42.4 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Gabor Szappanos - The Nigerians are in the Spajz.eng.lrc 42.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - Mit tegynk, ha bekvetkezett a baj.eng.srt 42.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Balazs Bucsay - Paypass vulnerabilities.eng.vtt 42.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Bartok Sandor Peter - Informatikai igazsagugyi laboratoriumok szakmai szolgaltatasai.eng.srt 42.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Sandor Lederer Adam Foldes Tamas Bodoky Laszlo Csorgo - Wikileaks - info-freedom fight or info-terror.eng.srt 42.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Benjamin Tamasi - Hacking CCTV systems.eng.tsv 42.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Otti Csaba - A biometria biztonsaga.eng.srt 42.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Cyberspace and Beyond - Evolution in Action.eng.srt 42.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation.eng.text 42.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Tevesz - Rootkits vs. Anti-Virus Developers.eng.vtt 42.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Toth, Ferenc Spala - What s common in Oracle and Samsung.eng.tsv 42.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Subecz Akos - Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban.eng.lrc 42.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Maroy, Tamas Bodoky - Anonim whistleblowing using the GlobaLeaks platform.eng.lrc 42.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Gyongyosi, Marton Illes - Firewalls and Exploits.eng.srt 42.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Barta Csaba - Az NTDS.DIT forensics vizsgalata.eng.vtt 42.2 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Jason Chan - Building a Glass House.eng.lrc 42.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Illesi Zsolt - Tut a szenakazalban.eng.srt 42.1 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gábor Pek, Tamas Koczka - SpamAndHex hacks around the world.eng.txt 42.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Veres-Szentkiralyi - USB = Universal Security Bug.eng.lrc 42.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Bodor Peter - Social Engineering es pszichologia.eng.txt 42.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Dismal or bang-bang SCADA.eng.vtt 41.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Csaba Krasznay - Web 2.0.eng.srt 41.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Bíro László Miklós - Titkosítás és visszafejtés a fizikai réteg szintjén.eng.tsv 41.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Illes Zsolt - Informatikai bizonyitek, bizonyitas igazsagugyi szakertoi szemmel.eng.srt 41.8 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Nicolas Gregoire - Hunting for Top Bounties.eng.vtt 41.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality.eng.text 41.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szekely Tamas - DDoS-t vettem a vasarban bitpenzzel.eng.vtt 41.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Hacktivty 2010 - Alexander Kornbrust - Security Comparison of the Leading Databases.eng.srt 41.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gábor Pek, Tamas Koczka - SpamAndHex hacks around the world.eng.lrc 41.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Szor - Fighting Computer Malware.eng.text 41.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Kiberter es azon tul - folyamatban az evolucio.eng.txt 41.7 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication System.eng.srt 41.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Veres-Szentkiralyi Andras - Linux szerverunk van ezert biztonsagos.eng.lrc 41.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Oroszi Eszter - Social Engineering, amikor fellebben a fagyol.eng.srt 41.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Dr. Boldizsar Bencsath - What Makes the Analysis of Malware. Like Duqu or Flame.eng.text 41.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Domonkos Tomcsanyi - Hacking in Suit - Smartphone, the Swiss Army Knife of Hacker.eng.srt 41.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Gábor Szappanos - Comparing the incomparables.eng.tsv 41.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Bucsay Balazs - Paypass serulekenysegek.eng.vtt 41.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas K. Lengyel - Virtual Machine Introspection to Detect and Protect.eng.tsv 41.5 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Micha Borrmann - CVSS is a big botch Scoring systems do not help to improve the IT security.eng.vtt 41.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Bodor Peter - Social Engineering es pszichologia.eng.lrc 41.4 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Nicolas Gregoire - Hunting for Top Bounties.eng.txt 41.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas K. Lengyel - Virtual Machine Introspection to Detect and Protect.eng.srt 41.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szabo Aron - Chip-csirip, avagy PKI eszkozok alternativ felhasznalasai.eng.srt 41.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tenyi Geza, Dr. - Bizalmas informaciok kezelese es adatvedelem a felhoszolgaltatasban.eng.txt 41.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Toth Laszlo - Majdnem lathatatlan alca az Oracle adatbazisban, avagy a nem dokumentalt ismet segit min.eng.srt 41.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Miroslav Stampar - Spot the Web Vulnerability.eng.txt 41.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Veres-Szentkiralyi - USB = Universal Security Bug.eng.vtt 41.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Judit Varga - Amy Farrah Fowler, or the geek girl s case with the tiara.eng.txt 41.3 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to hide your browser 0-days.eng.srt 41.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Neumann Robert - Exepacker.eng.text 41.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Dismal or bang-bang SCADA.eng.txt 41.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kabai Andras - Malware Analizis, tippek es trukkok.eng.tsv 41.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Kiberter es azon tul - folyamatban az evolucio.eng.lrc 41.1 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marosi Attila - A Hacking Team rosszindulatú programjai.eng.tsv 41.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Joe McCray - There is An App for That - Pentesting Mobile Applications.eng.srt 41.0 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Nicolas Gregoire - Hunting for Top Bounties.eng.lrc 41.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gábor Pek, Tamas Koczka - SpamAndHex hacks around the world.eng.vtt 41.0 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal.eng.text 40.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Miroslav Stampar - Spot the Web Vulnerability.eng.vtt 40.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Miroslav Stampar - Spot the Web Vulnerability.eng.lrc 40.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Toth Laszlo - Oracle adatbazis post exploitation technikak.eng.vtt 40.9 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Gabor Szappanos - The Nigerians are in the Spajz.eng.vtt 40.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Boldizsar Bencsath - What happened to targeted malware attacks last year.eng.srt 40.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gara-Tarn u00f3czi P u00e9ter - Adatment u00e9s rendhagy u00f3 m u00f3don - Hasznosak-e a hacker k u00e9pess u00e9gek egy IT Secember munk.eng.srt 40.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tenyi Geza, Dr. - Bizalmas informaciok kezelese es adatvedelem a felhoszolgaltatasban.eng.lrc 40.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Holtzl Peter - Log analizis.eng.vtt 40.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Judit Varga - Amy Farrah Fowler, or the geek girl s case with the tiara.eng.lrc 40.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Dismal or bang-bang SCADA.eng.lrc 40.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kerenyi Kristof, Hornak Zoltan, Kispal Istvan - Crypto-chipek biztonsaga, passziv-aktiv kombinalt ta.eng.srt 40.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Steve Mulhearn - The Rise and Fall of DDoS Attacks in 2012.eng.txt 40.7 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Infra security automation in CI CD impossible is nothing. 2 2 by Spyros Manglis.eng.srt 40.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Gabor Szappanos - Journey to the bottom of a black hole.eng.text 40.6 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to hide your browser 0-days.eng.tsv 40.6 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - How to convince a malware to avoid us.eng.srt 40.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race.eng.text 40.6 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ethical hacking in Hungary - Roundtable discussion (in Hungarian).eng.vtt 40.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita - Az SE jogi kovetkezmenyei.eng.txt 40.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Bardoczi, Lilian Zsakai - Data mining in the age of social web.eng.tsv 40.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Leigh-Anne Galloway - Money makes money - How to buy an ATM and what you can do with it.eng.srt 40.4 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Csaba Fitzl, Miklos Desbordes-Korcsev - Exploit generation, JavaScript analysis automation.eng.txt 40.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Pek - eNeMI - Evading the state-of-the-art hardware protection of IO virtualization.eng.vtt 40.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Veres-Szentkiralyi Andracus - Hacking hardware for fun and profit.eng.srt 40.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Otti Csaba, Oszi Arnold - Ujjlenyomat azonosito rendszerek, biztonsag vagy biztonsagi res.eng.tsv 40.4 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Aleksandar Nikolic - Guided Fuzzing And Binary Blobs.eng.srt 40.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Buherator - Metasploit workshop.eng.vtt 40.3 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zsombor Kovács - Semi-automated mapping of iOS binaries.eng.srt 40.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Steve Mulhearn - The Rise and Fall of DDoS Attacks in 2012.eng.lrc 40.3 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Balazs Zoltan - Bypass firewalls, application white lists, secure remote desktops in 20 seconds.eng.txt 40.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Zoltan - IPv6 shipworm - My little windows domain pwnie.eng.txt 40.3 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/What are We Missing in Web Applications by Mirza Burhan Baig.eng.srt 40.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoltan Balazs - The real risks of the IoT security-nightmare Hacking IP cameras through the cloud.eng.tsv 40.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Bardoczi Akos, Zsakai Lilian - Adatbanyaszat a kozossegi web koraban.eng.tsv 40.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Jos, Attila Bogar - is BitTorrent really providing anonymity.eng.vtt 40.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kabai Andras - Malware Analizis, tippek es trukkok.eng.vtt 40.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Varga-Perke Balint, Buherator - Heureka - Az a gyanus ami nem gyanus.eng.txt 40.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Cyberspace and Beyond - Evolution in Action.eng.txt 40.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Joe McCray - Big Bang Theory - Pentesting high security environments.eng.text 40.0 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Balint Varga-Perke (Buherator) - Corrupting Ancient Spirits - Penetration Testing Oracle Forms.eng.srt 40.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Neumann - Exepacker.eng.vtt 40.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mihaly Zagon - The Only Thing That Is Constant Is Change.eng.srt 40.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Szekely - Attacking The First Hop Redundancy.eng.srt 40.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Csaba Fitzl, Miklos Desbordes-Korcsev - Exploit generation, JavaScript analysis automation.eng.lrc 40.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Domonkos Tomcsanyi - Hacking in Suit - Smartphone, the Swiss Army Knife of Hacker.eng.txt 40.0 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Anto Joseph - Bug hunting using symbolic virtual machines.eng.srt 40.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Buherator - Metasploit workshop.eng.txt 40.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Muszka Dniel - Kalmr korszak Szegeden.eng.txt 40.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aman Sachdev & Himanshu Sharma - Hacking Real Life Financial Applications.eng.tsv 39.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita - Az SE jogi kovetkezmenyei.eng.lrc 39.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Maroy Akos, Bodoky Tamas - Anonim adatszivarogtatas a GlobaLeaks platform.eng.txt 39.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mateusz Olejarka - REST API, pentester's perspective.eng.srt 39.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Lajos Muha, Dr. - Interpretation of the Act on Information Security.eng.srt 39.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Zoltan - IPv6 shipworm - My little windows domain pwnie.eng.lrc 39.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kovacs Zsombor - A visszanyalo fagyi, a sotet park es a fekete ballonkabat, avagy a publikus WiFi alulne.eng.vtt 39.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsombor Kovacs - Hijacking Public Hostspots.eng.srt 39.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Felix Schuster - Design and implementation of an additional layer of encryption for Skype.eng.srt 39.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Bíro László Miklós - Titkosítás és visszafejtés a fizikai réteg szintjén.eng.srt 39.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Cyberspace and Beyond - Evolution in Action.eng.lrc 39.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Barta - Forensic analysis of NTDS.DIT.eng.srt 39.7 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Balazs Zoltan - Bypass firewalls, application white lists, secure remote desktops in 20 seconds.eng.lrc 39.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Veres-Szentkiralyi - Hacking hardware for fun and profit.eng.srt 39.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Tevesz - Rootkits vs. Anti-Virus Developers.eng.txt 39.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Domonkos Tomcsanyi - GSM - have we overslept the last wake-up call.eng.text 39.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Buherator - Metasploit workshop.eng.lrc 39.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Varga-Perke Balint, Buherator - Heureka - Az a gyanus ami nem gyanus.eng.lrc 39.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Balint Varga-Perke, - Buherator - Heureka - The Suspicious Thing Is That It s Not Suspicious.eng.srt 39.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Cybercrime, Information, Warfare and Cyberwar - what s this all about.eng.text 39.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Krisztian Schaffer - Security Code Review.eng.txt 39.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Domonkos Tomcsanyi - Hacking in Suit - Smartphone, the Swiss Army Knife of Hacker.eng.lrc 39.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Omar Eissa - Network Automation is not your Safe Haven.eng.srt 39.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Maroy, Tamas Bodoky - Anonim whistleblowing using the GlobaLeaks platform.eng.srt 39.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Tevesz - Rootkits vs. Anti-Virus Developers.eng.lrc 39.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Bartok Sandor Peter - Informatikai igazsagugyi laboratoriumok szakmai szolgaltatasai.eng.vtt 39.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Neumann - Exepacker.eng.txt 39.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Krisztian Schaffer - Security Code Review.eng.vtt 39.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szekely - One a Penny, Two a Penny Hot DDoS run.eng.srt 39.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Illesi Zsolt - Tut a szenakazalban.eng.vtt 39.3 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ben Seri & Gregory Vishnepolsky - BlueBorne Explained.eng.text 39.3 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/GhostEmperor From ProxyLogon to Kernel Mode, Story of a Modern Day Rootkit.eng.srt 39.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Muszka Dniel - Kalmr korszak Szegeden.eng.lrc 39.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Ertunga Arsal - Rootkits and Trojans on Your SAP Landscape.eng.tsv 39.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Maroy Akos, Bodoky Tamas - Anonim adatszivarogtatas a GlobaLeaks platform.eng.lrc 39.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Kornbrust - Self Defending Database.eng.srt 39.2 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication System.eng.vtt 39.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Cyberspace and Beyond - Evolution in Action.eng.vtt 39.2 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Tamás Szakály - Shall we play a game.eng.txt 39.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Haroon Meer - keynote - Time to play - D.eng.text 39.1 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/My wife is watching me The spy inside all of us. by Eddy Willems.eng.srt 39.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Boldizsar Bencsath - What happened to targeted malware attacks last year.eng.txt 39.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mihaly Zagon - The Only Thing That Is Constant Is Change.eng.txt 39.1 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Boldizsár Bencsáth - BAB0 - A custom sample that bypassed cutting-edge APT attack detection tools.eng.text 39.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Krisztian Schaffer - Security Code Review.eng.lrc 39.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - Mit tegynk, ha bekvetkezett a baj.eng.vtt 39.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Neumann - Exepacker.eng.lrc 39.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Sandor Lederer Adam Foldes Tamas Bodoky Laszlo Csorgo - Wikileaks - info-freedom fight or info-terror.eng.vtt 39.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kabai Andras - Buffer Overflow II. ASLR es DEP megkerulesi technikak.eng.text 39.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Jos, Attila Bogar - is BitTorrent really providing anonymity.eng.tsv 39.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Balint Varga-Perke, - Buherator - Heureka - The Suspicious Thing Is That It s Not Suspicious.eng.txt 39.0 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Balazs Bucsay - Chw00t - Breaking Unices - chroot solutions.eng.vtt 38.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Andras Feher, Csaba Otti - Face Recognition Systems.eng.srt 38.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Leitold Ferenc Horvath Botond - Vedekezes kartevok C&C forgalma ellen.eng.tsv 38.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zsombor Kovacs - To secure data is to prepare for jailbreak.eng.vtt 38.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Travis Goodspeed - Some Thoughts on Literate Disassembly and Symbol Porting.eng.srt 38.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Csaba Otti - The security and vulnerability of the biometry.eng.tsv 38.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Marcell Major, Mihaly Zagon - Modern Browser Attack Vectors.eng.txt 38.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Boldizsar Bencsath - What happened to targeted malware attacks last year.eng.lrc 38.8 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Making developers security aware. Lessons learnt. by Mateusz Olejarka.eng.srt 38.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mihaly Zagon - The Only Thing That Is Constant Is Change.eng.lrc 38.7 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Kirils Solovjovs - Tools for effortless reverse engineering of MikroTik routers.eng.tsv 38.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Csaba Fitzl, Miklos Desbordes-Korcsev - Exploit generation, JavaScript analysis automation.eng.srt 38.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Tamás Szakály - Shall we play a game.eng.lrc 38.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Antonio Barresi, Peter Somogyvari - Android Security - An Introduction.eng.text 38.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/joernchen of Phenoelit - Your Web app, those hackers & you.eng.srt 38.6 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Csongor Tamas - Examples of Locality Sensitive Hashing & their Usage for Malware Classification.eng.srt 38.6 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication System.eng.tsv 38.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Illes Zsolt - Informatikai bizonyitek, bizonyitas igazsagugyi szakertoi szemmel.eng.vtt 38.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Balint Varga-Perke, - Buherator - Heureka - The Suspicious Thing Is That It s Not Suspicious.eng.lrc 38.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kovacs Gyozo - Valogatott kalandozasaim Informatikaban.eng.tsv 38.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Marcell Major, Mihaly Zagon - Modern Browser Attack Vectors.eng.srt 38.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Travis Goodspeed - Some Thoughts on Literate Disassembly and Symbol Porting.eng.tsv 38.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Marcell Major, Mihaly Zagon - Modern Browser Attack Vectors.eng.lrc 38.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Varadi Tamas - Impressziotechnika.eng.tsv 38.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Toth - Post Exploitation Techniques in Oracle Databases.eng.srt 38.4 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Roundtable Discussion about NIS2 Directive (in Hungarian).eng.text 38.4 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Vladimir Katalov - iOS Acquisition Methods Compared.eng.text 38.3 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Micha Borrmann - CVSS is a big botch Scoring systems do not help to improve the IT security.eng.tsv 38.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Ivan Yushkevich Wordlists from statistics to genetic.eng.srt 38.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Gyongyosi, Marton Illes - Firewalls and Exploits.eng.txt 38.3 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Jason Chan - Building a Glass House.eng.tsv 38.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Feher Andras, Otti Csaba - Arcfelismero rendszerek.eng.tsv 38.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas K. Lengyel - Virtual Machine Introspection to Detect and Protect.eng.vtt 38.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Varga-Perke Balint, Buherator - Heureka - Az a gyanus ami nem gyanus.eng.srt 38.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kerenyi Kristof, Hornak Zoltan, Kispal Istvan - Crypto-chipek biztonsaga, passziv-aktiv kombinalt ta.eng.vtt 38.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Polyakov - Top 10 most interesting SAP vulnerabilities and attacks.eng.tsv 38.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Travis Goodspeed - A Keynote in Praise of Junk Hacking.eng.text 38.2 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Gabor Szappanos - The Nigerians are in the Spajz.eng.tsv 38.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Alexander Kornbrust - Security Comparison of the Leading Databases HUN.eng.txt 38.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Veres-Szentkiralyi - USB = Universal Security Bug.eng.tsv 38.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to hide your browser 0-days.eng.vtt 38.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szabo Aron - Chip-csirip, avagy PKI eszkozok alternativ felhasznalasai.eng.vtt 38.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Aleksandar Nikolic - Guided Fuzzing And Binary Blobs.eng.txt 38.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Balazs Bucsay - Paypass vulnerabilities.eng.tsv 38.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Oroszi Eszter - Social Engineering, amikor fellebben a fagyol.eng.vtt 38.1 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Mateusz Olejarka - Approaching the unknown Windows Phone application security assessment guide.eng.srt 38.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Boldizsar Bencsath - What happened to targeted malware attacks last year.eng.vtt 38.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Lipovsky - Evolution of Rootkits.eng.srt 38.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Gyongyosi, Marton Illes - Firewalls and Exploits.eng.vtt 38.1 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Elevating OAuth2.0 for Security of Native Clients.eng.srt 38.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Bardoczi, Lilian Zsakai - Data mining in the age of social web.eng.srt 38.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Kabai - Hunting and exploiting bugs in kernel drivers.eng.srt 38.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shay Chen - The Diviner - Digital Clairvoyance Breakthrough.eng.srt 38.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Zoltan - IPv6 shipworm - My little windows domain pwnie.eng.srt 38.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zsombor Kovacs - To secure data is to prepare for jailbreak.eng.txt 38.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gara-Tarnczi Peater - Publikus exploitok testreszabasa.eng.text 38.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Foti - There is nothing new under the sun.eng.txt 38.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Lipovsky - Evolution of Rootkits.eng.tsv 38.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Szabo Istvan - A nyilvanos magyar kriptografia tortenete napjainkig (sikerek es kudarcok).eng.txt 37.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Gyongyosi, Marton Illes - Firewalls and Exploits.eng.lrc 37.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Hacktivty 2010 - Alexander Kornbrust - Security Comparison of the Leading Databases.eng.txt 37.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Otti Csaba - A biometria biztonsaga.eng.vtt 37.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Feher Andras, Otti Csaba - Arcfelismero rendszerek.eng.vtt 37.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Csaba Krasznay - Web 2.0.eng.vtt 37.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA szomorusag avagy bumm-bumm SCADA.eng.txt 37.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Bardoczi Akos, Zsakai Lilian - Adatbanyaszat a kozossegi web koraban.eng.srt 37.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Aleksandar Nikolic - Guided Fuzzing And Binary Blobs.eng.lrc 37.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to pwn a Windows domain.eng.srt 37.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Foti - There is nothing new under the sun.eng.vtt 37.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gara-Tarn u00f3czi P u00e9ter - Adatment u00e9s rendhagy u00f3 m u00f3don - Hasznosak-e a hacker k u00e9pess u00e9gek egy IT Secember munk.eng.vtt 37.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Alexander Kornbrust - Security Comparison of the Leading Databases HUN.eng.lrc 37.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Toth Laszlo - Majdnem lathatatlan alca az Oracle adatbazisban, avagy a nem dokumentalt ismet segit min.eng.vtt 37.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Hacktivty 2010 - Alexander Kornbrust - Security Comparison of the Leading Databases.eng.vtt 37.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zoltan Balazs - Alice in eXploitland, attack and defense evolution.eng.txt 37.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zsombor Kovacs - To secure data is to prepare for jailbreak.eng.lrc 37.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tevesz Andras - Antivirus program hatastalanitas.eng.tsv 37.6 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Stephan Gerling - Hacking Yachts Remotely via Satcom or Maritime Internet Router.eng.tsv 37.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tevesz Andras - Rootkitek es AV gyartok.eng.text 37.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Hacktivty 2010 - Alexander Kornbrust - Security Comparison of the Leading Databases.eng.lrc 37.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Foti - There is nothing new under the sun.eng.lrc 37.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to pwn a Windows domain.eng.txt 37.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Judit Varga - Amy Farrah Fowler, or the geek girl s case with the tiara.eng.srt 37.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gábor Pek, Tamas Koczka - SpamAndHex hacks around the world.eng.tsv 37.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Costin Raiu - keynote - APT Paleontology in the age of cyber.eng.text 37.4 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Axelle Apvrille - Fitness Tracker - Hack in Progress.eng.srt 37.3 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Balazs Bucsay - Chw00t - Breaking Unices - chroot solutions.eng.tsv 37.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Szabo Istvan - A nyilvanos magyar kriptografia tortenete napjainkig (sikerek es kudarcok).eng.lrc 37.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA szomorusag avagy bumm-bumm SCADA.eng.lrc 37.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Aleksandar Nikolic - Guided Fuzzing And Binary Blobs.eng.vtt 37.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zoltan Balazs - Alice in eXploitland, attack and defense evolution.eng.lrc 37.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Lederer Sandor Foldes Adam Bodoky Tamas Csorgo Laszlo - Wikileaks - info-szabadsagharc vagy info-terr.eng.tsv 37.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to pwn a Windows domain.eng.lrc 37.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Leigh-Anne Galloway - Money makes money - How to buy an ATM and what you can do with it.eng.vtt 37.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Leigh-Anne Galloway - Money makes money - How to buy an ATM and what you can do with it.eng.txt 37.1 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Daniel Gruss - Microarchitectural Incontinence - You would leak too if you were so fast.eng.text 37.1 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Bíro László Miklós - Titkosítás és visszafejtés a fizikai réteg szintjén.eng.vtt 37.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Veres-Szentkiralyi Andracus - Hacking hardware for fun and profit.eng.vtt 37.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Evgeny Neyolov - Inside the illegal traffic sales.eng.srt 37.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Alexander Kornbrust - Security Comparison of the Leading Databases HUN.eng.srt 37.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove or How I learned to Stop Worrying and Love the BeEF.eng.srt 36.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Balint Varga-Perke (Buherator) - Corrupting Ancient Spirits - Penetration Testing Oracle Forms.eng.txt 36.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyongyosi Peter, Illes Marton Tuzfalak es tamadasok.eng.text 36.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Jeney Gabor - A fizetos WiFi hotspotok ingyenes hasznalatarol.eng.tsv 36.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Julien Thomas - Limitations of Android permission system.eng.text 36.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Martin Knobloch - Secure software, start appreciating your developers.eng.srt 36.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Alexander Kornbrust - Oracle Forensics.eng.srt 36.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Leigh-Anne Galloway - Money makes money - How to buy an ATM and what you can do with it.eng.lrc 36.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Lajos Muha, Dr. - Interpretation of the Act on Information Security.eng.vtt 36.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mihaly Zagon - The Only Thing That Is Constant Is Change.eng.vtt 36.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - What to do when the problem is on board.eng.srt 36.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Roland Kamaras - Locky - anti-analysis techniques used by the ransomware.eng.txt 36.7 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Security Awareness in Development.eng.srt 36.7 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Nicolas Gregoire - Hunting for Top Bounties.eng.tsv 36.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Domonkos Tomcsanyi - Hacking in Suit - Smartphone, the Swiss Army Knife of Hacker.eng.vtt 36.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Zoltan Balazs - IPv6 shipworm - My little windows domain pwnie.eng.srt 36.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Szekely - Attacking The First Hop Redundancy.eng.vtt 36.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Miroslav Stampar - Spot the Web Vulnerability.eng.tsv 36.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Kelly Shortridge - The Art of Explanation Behavioral Models of InfoSec.eng.text 36.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Peter Holtzl - Log analysis.eng.srt 36.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Maroy, Tamas Bodoky - Anonim whistleblowing using the GlobaLeaks platform.eng.tsv 36.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Beregnyei Balazs - Szilicium layouttol a kapcsolasi rajzig.eng.text 36.6 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Balint Varga-Perke (Buherator) - Corrupting Ancient Spirits - Penetration Testing Oracle Forms.eng.lrc 36.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Domonkos Tomcsanyi - Give me a phone that can't be traced.eng.text 36.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Toth - Almost invisible cloak in Oracle databases or the undocumented helps us again.eng.srt 36.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Felix Schuster - Design and implementation of an additional layer of encryption for Skype.eng.txt 36.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/George Webster, Julian Kirsch - A Study of the Rich Header and Respective Malware Triage.eng.text 36.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsolt Illesi - Finding the Needle in the Haystick.eng.srt 36.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Balint Varga-Perke (Buherator) - Corrupting Ancient Spirits - Penetration Testing Oracle Forms.eng.vtt 36.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsombor Kovacs - Hijacking Public Hostspots.eng.vtt 36.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Steve Mulhearn - The Rise and Fall of DDoS Attacks in 2012.eng.tsv 36.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Maroy, Tamas Bodoky - Anonim whistleblowing using the GlobaLeaks platform.eng.vtt 36.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Ormos Zoltan - Nagy port felvert nemzetkozi jogesetek az internetes biztonsag teruleten.eng.tsv 36.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kovacs Gyozo - Valogatott kalandozasaim Informatikaban.eng.srt 36.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Kabai - Hunting and exploiting bugs in kernel drivers.eng.tsv 36.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Axelle Apvrille - Playing Hide and Seek with Dalvik Executables.eng.srt 36.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ignat Korchagin - Exploiting USB IP in Linux.eng.srt 36.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Benjamin Tamasi - Hacking CCTV systems.eng.text 36.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Roland Kamaras - Locky - anti-analysis techniques used by the ransomware.eng.lrc 36.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Sandor Lederer Adam Foldes Tamas Bodoky Laszlo Csorgo - Wikileaks - info-freedom fight or info-terror.eng.txt 36.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Felix Schuster - Design and implementation of an additional layer of encryption for Skype.eng.lrc 36.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Felix FX Lindner - Router exploitation HUN.eng.text 36.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Travis Goodspeed - Some Thoughts on Literate Disassembly and Symbol Porting.eng.vtt 36.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Cyberspace and Beyond - Evolution in Action.eng.tsv 36.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - How to convince a malware to avoid us.eng.vtt 36.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szekely - One a Penny, Two a Penny Hot DDoS run.eng.vtt 36.0 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Investigating the Exploitability of Trusted Execution Environments.eng.srt 36.0 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/A GREAT Sewing Workshop by Pierre Delcher.eng.srt 36.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Barta - Forensic analysis of NTDS.DIT.eng.vtt 36.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Joe McCray - There is An App for That - Pentesting Mobile Applications.eng.vtt 36.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Felix Schuster - Design and implementation of an additional layer of encryption for Skype.eng.vtt 36.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Sandor Lederer Adam Foldes Tamas Bodoky Laszlo Csorgo - Wikileaks - info-freedom fight or info-terror.eng.lrc 35.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Muha Lajos, Dr. - Informaciobiztonsagi torveny ertelmezese.eng.text 35.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Raul Chiesa - Kiberbunozes, informacios hadviseles es kiberhaboru - mi ez az egesz.eng.text 35.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Balint Varga-Perke, - Buherator - Heureka - The Suspicious Thing Is That It s Not Suspicious.eng.vtt 35.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Tevesz - Rootkits vs. Anti-Virus Developers.eng.tsv 35.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Subecz Akos, Zantho Csaba - Lockpicking - a zarnyitas muveszete.eng.tsv 35.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mateusz Olejarka - REST API, pentester's perspective.eng.vtt 35.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - How to convince a malware to avoid us.eng.txt 35.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Dismal or bang-bang SCADA.eng.tsv 35.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Buherator - Metasploit workshop.eng.tsv 35.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Kabai - Malware Analysis Tips and Tricks.eng.srt 35.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Krasznay Csaba - Web 2.0.eng.text 35.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Csaba Fitzl, Miklos Desbordes-Korcsev - Exploit generation, JavaScript analysis automation.eng.vtt 35.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Bodor Peter - Social Engineering es pszichologia.eng.srt 35.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Omer Coskun - Why nation-state malwares target Telco Networks - Regin and its counterparts.eng.srt 35.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Veres-Szentkiralyi - Hacking hardware for fun and profit.eng.txt 35.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Bodor Peter - Social Engineering es pszichologia.eng.tsv 35.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Axelle Apvrille - Playing Hide and Seek with Dalvik Executables.eng.txt 35.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Gábor Szappanos - Comparing the incomparables.eng.text 35.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Veres-Szentkiralyi - Hacking hardware for fun and profit.eng.vtt 35.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Norbert Tihanyi - Modification of the prime generation method of the OpenSSL library.eng.txt 35.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Kornbrust - Self Defending Database.eng.vtt 35.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Boldizsar Bencsath - What happened to targeted malware attacks last year.eng.tsv 35.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove or How I learned to Stop Worrying and Love the BeEF.eng.txt 35.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sandor Nagy - NAT Attack.eng.srt 35.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Váradi Tamás- Tárcsás zárak nyitásának eszközei és módszerei.eng.tsv 35.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Omar Eissa - Network Automation is not your Safe Haven.eng.vtt 35.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Andras Feher, Csaba Otti - Face Recognition Systems.eng.vtt 35.5 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marosi Attila - A Hacking Team rosszindulatú programjai.eng.srt 35.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Marcell Major, Mihaly Zagon - Modern Browser Attack Vectors.eng.vtt 35.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Anto Joseph - Bug hunting using symbolic virtual machines.eng.vtt 35.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - How to convince a malware to avoid us.eng.lrc 35.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Kornbrust - Self Defending Database.eng.txt 35.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zoltan Balazs - Alice in eXploitland, attack and defense evolution.eng.srt 35.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tevesz Andras - Antivirus program hatastalanitas.eng.srt 35.4 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Sergej Proskurin, Tamás K. Lengyel - Stealthy, Hypervisor-based Malware Analysis.eng.text 35.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Veres-Szentkiralyi - Hacking hardware for fun and profit.eng.lrc 35.3 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to pwn a Windows domain.eng.vtt 35.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Neumann - Exepacker.eng.tsv 35.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Axelle Apvrille - Playing Hide and Seek with Dalvik Executables.eng.lrc 35.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Lipovsky - Evolution of Rootkits.eng.vtt 35.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove or How I learned to Stop Worrying and Love the BeEF.eng.lrc 35.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Csaba Fitzl, Miklos Desbordes-Korcsev - Exploit generation, JavaScript analysis automation.eng.tsv 35.2 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Beyond Fun and Games Understanding the Threat Landscape of Extended Reality.eng.srt 35.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Mateusz Olejarka - Approaching the unknown Windows Phone application security assessment guide.eng.txt 35.2 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Norbert Tihanyi - Modification of the prime generation method of the OpenSSL library.eng.lrc 35.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Alexander Kornbrust - Oracle Forensics.eng.txt 35.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Major - Writing Your Own Password Cracker Tool.eng.srt 35.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Subecz Akos - Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban.eng.tsv 35.1 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/China's cheap Xiaomis are low on privacy by Cirlig Gabriel.eng.srt 35.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Kornbrust - Self Defending Database.eng.lrc 35.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Krisztian Schaffer - Security Code Review.eng.tsv 35.1 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/How to Use Cheated Cryptography to Overload Your Server.eng.srt 35.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Bardoczi, Lilian Zsakai - Data mining in the age of social web.eng.vtt 35.0 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Tamás Szakály - Shall we play a game.eng.srt 35.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Ivan Yushkevich Wordlists from statistics to genetic.eng.vtt 35.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Joe McCray - There is An App for That - Pentesting Mobile Applications.eng.tsv 35.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Biro Laszlo Stuxnet, tenyleg ez volt az elso.eng.txt 34.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Zoltan - IPv6 shipworm - My little windows domain pwnie.eng.vtt 34.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Judit Varga - Amy Farrah Fowler, or the geek girl s case with the tiara.eng.tsv 34.9 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Zoltan Balazs - The real risks of the IoT security-nightmare Hacking IP cameras through the cloud.eng.text 34.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shay Chen - The Diviner - Digital Clairvoyance Breakthrough.eng.vtt 34.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sandor Nagy - NAT Attack.eng.txt 34.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Mateusz Olejarka - Approaching the unknown Windows Phone application security assessment guide.eng.lrc 34.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Alexander Kornbrust - Oracle Forensics.eng.lrc 34.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Bardoczi Akos, Zsakai Lilian - Adatbanyaszat a kozossegi web koraban.eng.vtt 34.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Micha Borrmann - Attacking all your IPv4 devices at home from the Internet via Dual-Stack Lite.eng.srt 34.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Toth - Post Exploitation Techniques in Oracle Databases.eng.vtt 34.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Kabai - Hunting and exploiting bugs in kernel drivers.eng.vtt 34.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Varga-Perke Balint, Buherator - Heureka - Az a gyanus ami nem gyanus.eng.vtt 34.6 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Gabriel Cirlig - ADBHoney - Analyzing the ADB Malware Ecosystem.eng.srt 34.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tenyi Geza, Dr. - Bizalmas informaciok kezelese es adatvedelem a felhoszolgaltatasban.eng.tsv 34.6 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Kocsis Tamas & Kovacs Balint - Az Informacioszivargas Monitorozasa Open Source Eszközökkel.eng.text 34.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sandor Nagy - NAT Attack.eng.lrc 34.5 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Metaverse (in)Security by Ali Abdollahi.eng.srt 34.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Major Marcell - Hogyan irjunk sajat jelszotorot.eng.text 34.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Biro Laszlo Stuxnet, tenyleg ez volt az elso.eng.lrc 34.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Zoltan - IPv6 shipworm - My little windows domain pwnie.eng.tsv 34.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Toth, Ferenc Spala - What s common in Oracle and Samsung.eng.text 34.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Judit Varga - Amy Farrah Fowler, or the geek girl s case with the tiara.eng.vtt 34.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mihaly Zagon - The Only Thing That Is Constant Is Change.eng.tsv 34.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Barta - Forensic analysis of NTDS.DIT.eng.txt 34.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms.eng.text 34.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Toth - Post Exploitation Techniques in Oracle Databases.eng.txt 34.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Andras Feher, Csaba Otti - Face Recognition Systems.eng.txt 34.3 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Supply Chain Attacks.eng.srt 34.3 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aman Sachdev & Himanshu Sharma - Hacking Real Life Financial Applications.eng.text 34.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Schaffer Krisztian - Forraskod ellenorzes biztonsagi szempontok alapjan.eng.text 34.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - What to do when the problem is on board.eng.vtt 34.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Aleksandar Nikolic - Guided Fuzzing And Binary Blobs.eng.tsv 34.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Mateusz Olejarka - Approaching the unknown Windows Phone application security assessment guide.eng.vtt 34.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Jeney Gabor - A fizetos WiFi hotspotok ingyenes hasznalatarol.eng.srt 34.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Bruce Schneier - keynote speech.eng.text 34.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Enterprise Wi-Fo Worms, Backdoors and Botnets for Fun and Profit.eng.text 34.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsombor Kovacs - Hijacking Public Hostspots.eng.txt 34.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Evgeny Neyolov - Inside the illegal traffic sales.eng.txt 34.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Lajos Muha, Dr. - Interpretation of the Act on Information Security.eng.txt 34.1 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Ivan Yushkevich Wordlists from statistics to genetic.eng.txt 34.1 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/GALILEO In GPS We Trust.eng.srt 34.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Barta - Forensic analysis of NTDS.DIT.eng.lrc 34.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Tevesz - Neutralizing an AntiVirus program.eng.srt 34.1 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/CSS Keylogger in 2021 - The Hubris of the Security Community.eng.srt 34.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Kabai - Malware Analysis Tips and Tricks.eng.txt 34.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Kiberter es azon tul - folyamatban az evolucio.eng.tsv 34.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Toth - Post Exploitation Techniques in Oracle Databases.eng.lrc 34.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Andras Feher, Csaba Otti - Face Recognition Systems.eng.lrc 34.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Marcell Major, Mihaly Zagon - Modern Browser Attack Vectors.eng.tsv 34.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gergely Revay - Security implications of the Cross-Origin Resource Sharing.eng.text 34.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsombor Kovacs - Hijacking Public Hostspots.eng.lrc 34.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Lajos Muha, Dr. - Interpretation of the Act on Information Security.eng.lrc 33.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Evgeny Neyolov - Inside the illegal traffic sales.eng.vtt 33.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Fehér András, Kapitány Sándor, Martinkovics Dániel, Otti Csaba - Kézben a biztonság ().eng.text 33.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Mark Vinkovits - I play Jack of Information Disclosure - How to do threat modeling via playing cards.eng.text 33.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Attila Szasz & Gergo Hosszu - Dive into Magenta - fuzzing Google's new kernel.eng.text 33.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Leitold Ferenc Horvath Botond - Vedekezes kartevok C&C forgalma ellen.eng.srt 33.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aleksandr Kolchanov - Attacks on GSM Alarms, Smart Homes, Ind. Control Sys. & Smartwatches for Kids.eng.srt 33.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Ivan Yushkevich Wordlists from statistics to genetic.eng.lrc 33.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Evgeny Neyolov - Inside the illegal traffic sales.eng.lrc 33.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Adrian Furtuna - Digipass Instrumentation for Fun and Profit.eng.srt 33.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to pwn a Windows domain.eng.tsv 33.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kovacs Gyozo - Valogatott kalandozasaim Informatikaban.eng.vtt 33.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove or How I learned to Stop Worrying and Love the BeEF.eng.vtt 33.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Kabai - Malware Analysis Tips and Tricks.eng.lrc 33.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Major Marcell, Zagon Mihaly - A legajabb webes tamadasi lehetosegek.eng.text 33.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Kiberter es azon tul - folyamatban az evolucio.eng.srt 33.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Peter Holtzl - Log analysis.eng.vtt 33.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Balint Varga-Perke, - Buherator - Heureka - The Suspicious Thing Is That It s Not Suspicious.eng.tsv 33.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Farmosi Istvan - Az elso virus, az elso konyv es egy elfeledett megoldas.eng.txt 33.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Alexander Kornbrust - Security Comparison of the Leading Databases HUN.eng.vtt 33.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Varga-Perke Balint, Buherator - Heureka - Az a gyanus ami nem gyanus.eng.tsv 33.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Szekely - Attacking The First Hop Redundancy.eng.txt 33.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Varadi Tamas - Impressziotechnika.eng.srt 33.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsolt Illesi - Finding the Needle in the Haystick.eng.vtt 33.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Gyongyosi, Marton Illes - Firewalls and Exploits.eng.tsv 33.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szekely - One a Penny, Two a Penny Hot DDoS run.eng.txt 33.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Sandor Lederer Adam Foldes Tamas Bodoky Laszlo Csorgo - Wikileaks - info-freedom fight or info-terror.eng.tsv 33.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Biro Laszlo - Digitalis amnezia.eng.txt 33.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Kabai - Buffer Overflow step II. ASLR and DEP eveasion techniques.eng.text 33.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Barta Csaba - Az NTDS.DIT forensics vizsgalata.eng.text 33.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zsombor Kovacs - To secure data is to prepare for jailbreak.eng.tsv 33.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Szekely - Attacking The First Hop Redundancy.eng.lrc 33.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Ferenc Leitold, Ph.D Botond Horvath - Protection against the C&C traffic of malware.eng.txt 33.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Leigh-Anne Galloway - Money makes money - How to buy an ATM and what you can do with it.eng.tsv 33.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Bucsay Balazs - Paypass serulekenysegek.eng.text 33.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Robert Lipovsky - The - Facebook PokerAgent.eng.txt 33.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Zoltan Balazs - IPv6 shipworm - My little windows domain pwnie.eng.txt 33.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szekely - One a Penny, Two a Penny Hot DDoS run.eng.lrc 33.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Omar Eissa - Network Automation is not your Safe Haven.eng.txt 33.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Paul M. Wright - Oracle 12c Security - Defense and Attack.eng.text 33.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Bodor Peter - Social Engineering es pszichologia.eng.vtt 33.3 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mateusz Olejarka - REST API, pentester's perspective.eng.txt 33.3 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ignat Korchagin - Exploiting USB IP in Linux.eng.vtt 33.3 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Paste Wars fighting for copypaste freedom by Ignat Korchagin.eng.srt 33.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Subecz Akos - Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban.eng.srt 33.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Farmosi Istvan - Az elso virus, az elso konyv es egy elfeledett megoldas.eng.lrc 33.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Hacktivty 2010 - Alexander Kornbrust - Security Comparison of the Leading Databases.eng.tsv 33.2 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Balazs Zoltan - Bypass firewalls, application white lists, secure remote desktops in 20 seconds.eng.tsv 33.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Maroy Akos, Bodoky Tamas - Anonim adatszivarogtatas a GlobaLeaks platform.eng.srt 33.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ignat Korchagin - Exploiting USB IP in Linux.eng.txt 33.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Alexander Kornbrust - Oracle Forensics.eng.vtt 33.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Domonkos Tomcsanyi - Hacking in Suit - Smartphone, the Swiss Army Knife of Hacker.eng.tsv 33.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Daniel Eszteri - Legal Background of Cybercrime.eng.srt 33.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Omar Eissa - Network Automation is not your Safe Haven.eng.lrc 33.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Ferenc Leitold, Ph.D Botond Horvath - Protection against the C&C traffic of malware.eng.lrc 33.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mateusz Olejarka - REST API, pentester's perspective.eng.lrc 33.0 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Jason Chan - Building a Glass House.eng.text 33.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Zoltan Balazs - IPv6 shipworm - My little windows domain pwnie.eng.lrc 33.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Asad Qureshi - Using Open Source Intelligence to Investigate CryptoCurrency Cybercrime.eng.srt 33.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Biro Laszlo - Digitalis amnezia.eng.lrc 33.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Jos Weyers - Lock Impressioning.eng.text 33.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Axelle Apvrille - Playing Hide and Seek with Dalvik Executables.eng.vtt 33.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Szappanos - Advanced() Persistent Shellcode.eng.text 33.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Zoltan Balazs - IPv6 shipworm - My little windows domain pwnie.eng.vtt 33.0 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication System.eng.text 33.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Aron Szabo - Chip-tweet alternative usage of PKI devices.eng.srt 33.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sandor Nagy - NAT Attack.eng.vtt 32.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyozo Kovacs - My Assorted Wandering in IT.eng.srt 32.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - Scada Hacking - Security Workshop.eng.srt 32.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Robert Lipovsky - The - Facebook PokerAgent.eng.lrc 32.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zoltan Balazs - Alice in eXploitland, attack and defense evolution.eng.vtt 32.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ignat Korchagin - Exploiting USB IP in Linux.eng.lrc 32.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zoltan Balazs - Alice in eXploitland, attack and defense evolution.eng.tsv 32.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Kabai - Malware Analysis Tips and Tricks.eng.vtt 32.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Veres-Szentkiralyi - USB = Universal Security Bug.eng.text 32.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szekely Tamas - DDoS-t vettem a vasarban bitpenzzel.eng.text 32.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Balint Varga-Perke (Buherator) - Corrupting Ancient Spirits - Penetration Testing Oracle Forms.eng.tsv 32.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Toth - Almost invisible cloak in Oracle databases or the undocumented helps us again.eng.txt 32.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marosi Attila - A Hacking Team rosszindulatú programjai.eng.vtt 32.7 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Fuzzing Trusted Applications in OP-TEE via Shared Memory by Roland Nagy.eng.srt 32.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Maroy Akos, Bodoky Tamas - Anonim adatszivarogtatas a GlobaLeaks platform.eng.tsv 32.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Akos Subecz, Csaba Zantho - Lockpicking - the finest art of opening locks.eng.srt 32.7 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Balazs Zoltan - Bypass firewalls, application white lists, secure remote desktops in 20 seconds.eng.srt 32.7 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aleksandr Kolchanov - Attacks on GSM Alarms, Smart Homes, Ind. Control Sys. & Smartwatches for Kids.eng.txt 32.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Illesi Zsolt - Tut a szenakazalban.eng.text 32.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Jos, Attila Bogar - is BitTorrent really providing anonymity.eng.text 32.6 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Developer in a Digital Crosshair, 2022 Edition by Mateusz Olejarka.eng.srt 32.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szekely Tamas - Hello HSRP, viszlat HSRP.eng.text 32.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kerenyi Kristof, Hornak Zoltan, Kispal Istvan - Crypto-chipek biztonsaga, passziv-aktiv kombinalt ta.eng.text 32.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita - Az SE jogi kovetkezmenyei.eng.tsv 32.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Alexander Kornbrust - Security Comparison of the Leading Databases HUN.eng.tsv 32.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tenyi Geza, Dr. - Bizalmas informaciok kezelese es adatvedelem a felhoszolgaltatasban.eng.srt 32.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Toth - Almost invisible cloak in Oracle databases or the undocumented helps us again.eng.vtt 32.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Muha Lajos - Fejezetek az informatikai biztonsag tortenetebol.eng.txt 32.5 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Gabor Szappanos - The Nigerians are in the Spajz.eng.text 32.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Bartok Sandor Peter - Informatikai igazsagugyi laboratoriumok szakmai szolgaltatasai.eng.text 32.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Veres-Szentkiralyi Andras - Linux szerverunk van ezert biztonsagos.eng.tsv 32.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ethical hacking in Hungary - Roundtable discussion (in Hungarian).eng.text 32.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Toth - Almost invisible cloak in Oracle databases or the undocumented helps us again.eng.lrc 32.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsolt Illesi - Finding the Needle in the Haystick.eng.txt 32.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Charlie Miller - Mobile Threats - Hype vs. Reality (Magyar).eng.text 32.3 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aleksandr Kolchanov - Attacks on GSM Alarms, Smart Homes, Ind. Control Sys. & Smartwatches for Kids.eng.lrc 32.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA szomorusag avagy bumm-bumm SCADA.eng.srt 32.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tevesz Andras - Antivirus program hatastalanitas.eng.vtt 32.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Tamas Szakaly - Help, Ive got ANTs.eng.srt 32.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Foti - There is nothing new under the sun.eng.tsv 32.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Foti Marcell - Nincs uj a nap alatt.eng.text 32.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Major - Writing Your Own Password Cracker Tool.eng.vtt 32.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Eszter Oroszi - Social Engineering, when the veil lifted.eng.txt 32.1 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Tamás Szakály - Shall we play a game.eng.tsv 32.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Felix Schuster - Design and implementation of an additional layer of encryption for Skype.eng.tsv 32.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Lederer Sandor Foldes Adam Bodoky Tamas Csorgo Laszlo - Wikileaks - info-szabadsagharc vagy info-terr.eng.srt 32.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsolt Illesi - Finding the Needle in the Haystick.eng.lrc 32.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Gabor Pek - eNeMI - Evading the state-of-the-art hardware protection of IO virtualization.eng.text 32.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Muha Lajos - Fejezetek az informatikai biztonsag tortenetebol.eng.lrc 32.0 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Váradi Tamás- Tárcsás zárak nyitásának eszközei és módszerei.eng.srt 32.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Muszka Dniel - Kalmr korszak Szegeden.eng.tsv 31.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Lajos Muha, Dr. - Interpretation of the Act on Information Security.eng.tsv 31.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Tomcsanyi Domonkos - Oltonyos hackeles - okostelefon, mint hacker-svajcibicska.eng.text 31.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mikko Hypponen - The Cyber Arms Race (Magyar).eng.text 31.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - What to do when the problem is on board.eng.txt 31.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Daniel Eszteri - Legal Background of Cybercrime.eng.txt 31.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Otti Csaba, Oszi Arnold - Ujjlenyomat azonosito rendszerek, biztonsag vagy biztonsagi res.eng.text 31.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Eszter Oroszi - Social Engineering, when the veil lifted.eng.lrc 31.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Eszter Oroszi - Social Engineering, when the veil lifted.eng.srt 31.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Ferenc Leitold, Ph.D Botond Horvath - Protection against the C&C traffic of malware.eng.srt 31.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Peter Holtzl - Log analysis.eng.txt 31.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Subecz Akos, Zantho Csaba - Lockpicking - a zarnyitas muveszete.eng.srt 31.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Tamás Szakály - Shall we play a game.eng.vtt 31.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Toth Laszlo - Oracle adatbazis post exploitation technikak.eng.text 31.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dmitriy Chastuchin - Injecting evil code in your SAP J2EE systems.eng.srt 31.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - What to do when the problem is on board.eng.lrc 31.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gabor Molnar - War Stories from Google Vulnerability Reward Program.eng.txt 31.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Kornbrust - Self Defending Database.eng.tsv 31.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mehmet Ince - A heaven for Hackers - Breaking Log SIEM Products.eng.srt 31.5 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/TUnde Lendvai - Chinese Social Credit System - Security Issues and Social Impact.eng.srt 31.5 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Secure by Design Microservice Application Architecture Assessment.eng.srt 31.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Daniel Eszteri - Legal Background of Cybercrime.eng.lrc 31.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dmitry Chastuhin, Dmitry Yudin -Getting access to the SAP server via SAP Management Console.eng.srt 31.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Peter Holtzl - Log analysis.eng.lrc 31.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Holtzl Peter - Log analizis.eng.text 31.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsombor Kovacs - Hijacking Public Hostspots.eng.tsv 31.4 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gábor Pek, Tamas Koczka - SpamAndHex hacks around the world.eng.text 31.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Farmosi Istvan - Az elso virus, az elso konyv es egy elfeledett megoldas.eng.srt 31.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Leitold Ferenc Horvath Botond - Vedekezes kartevok C&C forgalma ellen.eng.vtt 31.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Csaba Otti - The security and vulnerability of the biometry.eng.text 31.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Szekely - Attacking The First Hop Redundancy.eng.tsv 31.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kabai Andras - Malware Analizis, tippek es trukkok.eng.text 31.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gabor Molnar - War Stories from Google Vulnerability Reward Program.eng.lrc 31.3 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Anto Joseph - Bug hunting using symbolic virtual machines.eng.txt 31.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Boldizsar Bencsath - What happened to targeted malware attacks last year.eng.text 31.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove or How I learned to Stop Worrying and Love the BeEF.eng.tsv 31.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Veres-Szentkiralyi - Hacking hardware for fun and profit.eng.tsv 31.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Balazs Bucsay - Paypass vulnerabilities.eng.text 31.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Steve Mulhearn - The Rise and Fall of DDoS Attacks in 2012.eng.text 31.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Beregnyei - From silicium layout to circuit diagram.eng.srt 31.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Cyberspace and Beyond - Evolution in Action.eng.text 31.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Kiberter es azon tul - folyamatban az evolucio.eng.vtt 31.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Tevesz - Rootkits vs. Anti-Virus Developers.eng.text 31.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - Mit tegynk, ha bekvetkezett a baj.eng.text 31.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sandor Nagy - NAT Attack.eng.tsv 31.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Tevesz - Neutralizing an AntiVirus program.eng.vtt 31.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Varadi Tamas - Impressziotechnika.eng.vtt 31.0 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/A New Default Value of OpenSSL could Multiply a DoS Potential by Szilárd Pfeiffer.eng.srt 31.0 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Anto Joseph - Bug hunting using symbolic virtual machines.eng.lrc 31.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Axelle Apvrille - Playing Hide and Seek with Dalvik Executables.eng.tsv 30.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to hide your browser 0-days.eng.text 30.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Subecz Akos - Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban.eng.vtt 30.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szekely - One a Penny, Two a Penny Hot DDoS run.eng.tsv 30.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Andras Feher, Csaba Otti - Face Recognition Systems.eng.tsv 30.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Barta - Forensic analysis of NTDS.DIT.eng.tsv 30.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gara-Tarn u00f3czi P u00e9ter - Adatment u00e9s rendhagy u00f3 m u00f3don - Hasznosak-e a hacker k u00e9pess u00e9gek egy IT Secember munk.eng.text 30.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Norbert Tihanyi - Modification of the prime generation method of the OpenSSL library.eng.srt 30.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Itay Cohen & Ari Eitan - The Red Square - Mapping the Connections Inside Russia's APT Ecosystem.eng.srt 30.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA szomorusag avagy bumm-bumm SCADA.eng.tsv 30.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Polyakov - Top 10 most interesting SAP vulnerabilities and attacks.eng.text 30.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Szabo Aron - Chip-csirip, avagy PKI eszkozok alternativ felhasznalasai.eng.text 30.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas K. Lengyel - Virtual Machine Introspection to Detect and Protect.eng.text 30.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - How to convince a malware to avoid us.eng.tsv 30.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Ivan Yushkevich Wordlists from statistics to genetic.eng.tsv 30.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Jeney Gabor - A fizetos WiFi hotspotok ingyenes hasznalatarol.eng.vtt 30.7 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aleksandr Kolchanov - Attacks on GSM Alarms, Smart Homes, Ind. Control Sys. & Smartwatches for Kids.eng.vtt 30.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Leitold Ferenc, Horvath Botond - Dobozba zart internet.eng.txt 30.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Daniel Eszteri - Legal Background of Cybercrime.eng.vtt 30.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Illes Zsolt - Informatikai bizonyitek, bizonyitas igazsagugyi szakertoi szemmel.eng.text 30.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Miroslav Stampar - Spot the Web Vulnerability.eng.text 30.6 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Nicolas Gregoire - Hunting for Top Bounties.eng.text 30.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Aron Szabo - Chip-tweet alternative usage of PKI devices.eng.vtt 30.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Bíro László Miklós - Titkosítás és visszafejtés a fizikai réteg szintjén.eng.text 30.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Tevesz - Neutralizing an AntiVirus program.eng.txt 30.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Buherator - Metasploit workshop.eng.text 30.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Evgeny Neyolov - Inside the illegal traffic sales.eng.tsv 30.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tenyi Geza, Dr. - Bizalmas informaciok kezelese es adatvedelem a felhoszolgaltatasban.eng.vtt 30.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Ertunga Arsal - Rootkits and Trojans on Your SAP Landscape.eng.text 30.5 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán Balázs - Sandbox detection for the masses - leak, abuse, test.eng.srt 30.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Toth - Post Exploitation Techniques in Oracle Databases.eng.tsv 30.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Maroy Akos, Bodoky Tamas - Anonim adatszivarogtatas a GlobaLeaks platform.eng.vtt 30.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Kovacs Zsombor - A visszanyalo fagyi, a sotet park es a fekete ballonkabat, avagy a publikus WiFi alulne.eng.text 30.4 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Norbert Tihanyi - Modification of the prime generation method of the OpenSSL library.eng.tsv 30.4 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Mateusz Olejarka - Approaching the unknown Windows Phone application security assessment guide.eng.tsv 30.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Leitold Ferenc, Horvath Botond - Dobozba zart internet.eng.lrc 30.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Szabo Istvan - A nyilvanos magyar kriptografia tortenete napjainkig (sikerek es kudarcok).eng.tsv 30.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Adrian Furtuna - Digipass Instrumentation for Fun and Profit.eng.vtt 30.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Sandor Lederer Adam Foldes Tamas Bodoky Laszlo Csorgo - Wikileaks - info-freedom fight or info-terror.eng.text 30.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Tevesz - Neutralizing an AntiVirus program.eng.lrc 30.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Kabai - Malware Analysis Tips and Tricks.eng.tsv 30.3 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Roland Kamaras - Locky - anti-analysis techniques used by the ransomware.eng.tsv 30.2 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Balazs Zoltan - Bypass firewalls, application white lists, secure remote desktops in 20 seconds.eng.vtt 30.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Neumann - Exepacker.eng.text 30.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gabor Jeney - Using Commercial WiFi Hostspots Free of Charge.eng.srt 30.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyozo Kovacs - My Assorted Wandering in IT.eng.vtt 30.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Alexander Kornbrust - Oracle Forensics.eng.tsv 30.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Otti, Arnold Oszi - Finderprint identification systems, security or security leak.eng.srt 30.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - Scada Hacking - Security Workshop.eng.txt 30.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Ormos Zoltan - Nagy port felvert nemzetkozi jogesetek az internetes biztonsag teruleten.eng.srt 30.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Akos Subecz, Csaba Zantho - Lockpicking - the finest art of opening locks.eng.vtt 30.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - What to do when the problem is on board.eng.tsv 30.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - Scada Hacking - Security Workshop.eng.vtt 29.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Váradi Tamás- Tárcsás zárak nyitásának eszközei és módszerei.eng.vtt 29.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Adrian Furtuna - Digipass Instrumentation for Fun and Profit.eng.txt 29.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mateusz Olejarka - REST API, pentester's perspective.eng.tsv 29.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ignat Korchagin - Exploiting USB IP in Linux.eng.tsv 29.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Omar Eissa - Network Automation is not your Safe Haven.eng.tsv 29.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Akos Subecz - Security Problems at Hungarian everydays.eng.srt 29.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Bodor - Social Engineering and psychology.eng.srt 29.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - Scada Hacking - Security Workshop.eng.lrc 29.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Aron Szabo - Chip-tweet alternative usage of PKI devices.eng.txt 29.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Krisztian Schaffer - Security Code Review.eng.text 29.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Oroszi Eszter - Social Engineering, amikor fellebben a fagyol.eng.text 29.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Biro Laszlo Stuxnet, tenyleg ez volt az elso.eng.tsv 29.7 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Stephan Gerling - Hacking Yachts Remotely via Satcom or Maritime Internet Router.eng.text 29.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gabor Molnar - War Stories from Google Vulnerability Reward Program.eng.srt 29.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsolt Illesi - Finding the Needle in the Haystick.eng.tsv 29.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Ferenc Leitold, Ph.D Botond Horvath - Protection against the C&C traffic of malware.eng.vtt 29.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Adrian Furtuna - Digipass Instrumentation for Fun and Profit.eng.lrc 29.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Aron Szabo - Chip-tweet alternative usage of PKI devices.eng.lrc 29.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Miklos Biro - Tempest, the hidden source of data leakage.eng.srt 29.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Ferenc Leitold, Ph.D Botond Horvath - Protection against the C&C traffic of malware.eng.tsv 29.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Dudas Agnes - I agree.eng.txt 29.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita - Az SE jogi kovetkezmenyei.eng.srt 29.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Tamas Szakaly - Help, Ive got ANTs.eng.vtt 29.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zoltan Balazs - Zombie Browsers, spiced with rootkit extensions.eng.srt 29.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Major - Writing Your Own Password Cracker Tool.eng.txt 29.4 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/DevSecOps in the Financial Services Industry by Stéphane Chmielewski.eng.srt 29.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Adrian Vollmer - Attacking RDP with Seth.eng.txt 29.3 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Travis Goodspeed - Some Thoughts on Literate Disassembly and Symbol Porting.eng.text 29.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Aleksandar Nikolic - Guided Fuzzing And Binary Blobs.eng.text 29.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Biro Laszlo Stuxnet, tenyleg ez volt az elso.eng.srt 29.3 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Examining the Explanatory Factors of Malicious Hacking Behaviors.eng.srt 29.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Major - Writing Your Own Password Cracker Tool.eng.lrc 29.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Szabo Istvan - A nyilvanos magyar kriptografia tortenete napjainkig (sikerek es kudarcok).eng.srt 29.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Lederer Sandor Foldes Adam Bodoky Tamas Csorgo Laszlo - Wikileaks - info-szabadsagharc vagy info-terr.eng.vtt 29.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Peter Holtzl - Log analysis.eng.tsv 29.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA szomorusag avagy bumm-bumm SCADA.eng.vtt 29.2 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán L. Németh - Memory corruption vulnerabilities, runtime mitigations and their bypasses.eng.srt 29.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Lajos Muha, Dr. - Interpretation of the Act on Information Security.eng.text 29.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Zoltan Balazs - IPv6 shipworm - My little windows domain pwnie.eng.tsv 29.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Dismal or bang-bang SCADA.eng.text 29.0 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Zoltan Balazs - How to pwn a Windows domain.eng.text 29.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Dudas Agnes - I agree.eng.lrc 29.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Veres-Szentkiralyi Andracus - Hacking hardware for fun and profit.eng.text 29.0 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán Balázs - Sandbox detection for the masses - leak, abuse, test.eng.txt 29.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Toth Laszlo - Majdnem lathatatlan alca az Oracle adatbazisban, avagy a nem dokumentalt ismet segit min.eng.text 28.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Csaba Krasznay - Web 2.0.eng.text 28.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Adrian Vollmer - Attacking RDP with Seth.eng.lrc 28.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Roland Kamaras - Locky - anti-analysis techniques used by the ransomware.eng.srt 28.9 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Micha Borrmann - CVSS is a big botch Scoring systems do not help to improve the IT security.eng.text 28.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán L. Németh - Memory corruption vulnerabilities, runtime mitigations and their bypasses.eng.txt 28.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Varadi - Impressioning.eng.srt 28.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Leitold Ferenc, Horvath Botond - Dobozba zart internet.eng.srt 28.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Hacking - Biztonsag Workshop.eng.txt 28.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Geza Tenyi - Management of Confidential Information and Data Protection In Cloud Computing.eng.srt 28.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Maroy, Tamas Bodoky - Anonim whistleblowing using the GlobaLeaks platform.eng.text 28.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Tamas Szakaly - Help, Ive got ANTs.eng.txt 28.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Leigh-Anne Galloway - Money makes money - How to buy an ATM and what you can do with it.eng.text 28.8 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Norbert Tihanyi - Modification of the prime generation method of the OpenSSL library.eng.vtt 28.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Subecz Akos, Zantho Csaba - Lockpicking - a zarnyitas muveszete.eng.vtt 28.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Mihaly Zagon - The Only Thing That Is Constant Is Change.eng.text 28.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán Balázs - Sandbox detection for the masses - leak, abuse, test.eng.lrc 28.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Farmosi Istvan - Az elso virus, az elso konyv es egy elfeledett megoldas.eng.vtt 28.7 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Kuba Gretzky - Phishing Through Modern 2FA Defences With Evilginx.eng.srt 28.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Akos Subecz, Csaba Zantho - Lockpicking - the finest art of opening locks.eng.txt 28.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán L. Németh - Memory corruption vulnerabilities, runtime mitigations and their bypasses.eng.lrc 28.7 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mehmet Ince - A heaven for Hackers - Breaking Log SIEM Products.eng.vtt 28.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Csaba Fitzl, Miklos Desbordes-Korcsev - Exploit generation, JavaScript analysis automation.eng.text 28.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Eszter Oroszi - Social Engineering, when the veil lifted.eng.vtt 28.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Tamas Szakaly - Help, Ive got ANTs.eng.lrc 28.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Daniel Eszteri - Legal Background of Cybercrime.eng.tsv 28.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Farmosi Istvan - Az elso virus, az elso konyv es egy elfeledett megoldas.eng.tsv 28.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dmitriy Chastuchin - Injecting evil code in your SAP J2EE systems.eng.txt 28.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Akos Subecz, Csaba Zantho - Lockpicking - the finest art of opening locks.eng.lrc 28.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Beregnyei - From silicium layout to circuit diagram.eng.vtt 28.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Robert Lipovsky - Evolution of Rootkits.eng.text 28.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Hacking - Biztonsag Workshop.eng.lrc 28.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dmitriy Chastuchin - Injecting evil code in your SAP J2EE systems.eng.vtt 28.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyozo Kovacs - My Assorted Wandering in IT.eng.txt 28.4 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán Balázs - Sandbox detection for the masses - leak, abuse, test.eng.vtt 28.3 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Balazs Bucsay - Chw00t - Breaking Unices - chroot solutions.eng.text 28.3 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aleksandr Kolchanov - Attacks on GSM Alarms, Smart Homes, Ind. Control Sys. & Smartwatches for Kids.eng.tsv 28.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Shay Chen - The Diviner - Digital Clairvoyance Breakthrough.eng.text 28.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Miklos Biro - Tempest, the hidden source of data leakage.eng.txt 28.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Zoltan Ormos - Most Famous Information Security-related Lawsuits from the Past.eng.srt 28.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dmitriy Chastuchin - Injecting evil code in your SAP J2EE systems.eng.lrc 28.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyozo Kovacs - My Assorted Wandering in IT.eng.lrc 28.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Toth - Almost invisible cloak in Oracle databases or the undocumented helps us again.eng.tsv 28.1 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Laszlo Miklos Biro - Lets hijack an airplane.eng.txt 28.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Szekely - Attacking The First Hop Redundancy.eng.text 28.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kristof Kerenyi, Zoltan Hornak, Istvan Kispal - Crypto-chipset Security, Passive-Active Combined Attacks.eng.srt 28.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Ormos Zoltan - Nagy port felvert nemzetkozi jogesetek az internetes biztonsag teruleten.eng.vtt 28.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsombor Kovacs - Hijacking Public Hostspots.eng.text 28.0 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Anto Joseph - Bug hunting using symbolic virtual machines.eng.tsv 28.0 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mehmet Ince - A heaven for Hackers - Breaking Log SIEM Products.eng.txt 28.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Miklos Biro - Tempest, the hidden source of data leakage.eng.lrc 27.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Marcell Major, Mihaly Zagon - Modern Browser Attack Vectors.eng.text 27.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szakaly - Stolen bytes on the video card - the GPU as an anti-rce device.eng.txt 27.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Akos Bardoczi, Lilian Zsakai - Data mining in the age of social web.eng.text 27.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kovacs Gyozo - Valogatott kalandozasaim Informatikaban.eng.text 27.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gabor Molnar - War Stories from Google Vulnerability Reward Program.eng.vtt 27.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gabor Molnar - War Stories from Google Vulnerability Reward Program.eng.tsv 27.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Akos Subecz - Security Problems at Hungarian everydays.eng.vtt 27.8 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Laszlo Miklos Biro - Lets hijack an airplane.eng.lrc 27.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Gyongyosi, Marton Illes - Firewalls and Exploits.eng.text 27.7 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mehmet Ince - A heaven for Hackers - Breaking Log SIEM Products.eng.lrc 27.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Biro Laszlo - Digitalis amnezia.eng.srt 27.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Peszleg Tibor - What to do when the problem is on board.eng.text 27.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Muszka Dniel - Kalmr korszak Szegeden.eng.srt 27.7 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dmitry Chastuhin, Dmitry Yudin -Getting access to the SAP server via SAP Management Console.eng.vtt 27.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gabor Jeney - Using Commercial WiFi Hostspots Free of Charge.eng.vtt 27.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szekely - One a Penny, Two a Penny Hot DDoS run.eng.text 27.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Biro Laszlo - Digitalis amnezia.eng.tsv 27.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zsombor Kovacs - To secure data is to prepare for jailbreak.eng.text 27.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Istvan Farmosi - The First Virus, the First Book and the Lost Solution.eng.srt 27.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szakaly - Stolen bytes on the video card - the GPU as an anti-rce device.eng.lrc 27.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Aron Szabo - Chip-tweet alternative usage of PKI devices.eng.tsv 27.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita - Az SE jogi kovetkezmenyei.eng.vtt 27.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Balint Varga-Perke (Buherator) - Corrupting Ancient Spirits - Penetration Testing Oracle Forms.eng.text 27.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Biro Laszlo Stuxnet, tenyleg ez volt az elso.eng.vtt 27.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Bodor - Social Engineering and psychology.eng.vtt 27.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Bodor Peter - Social Engineering es pszichologia.eng.text 27.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Hacktivty 2010 - Alexander Kornbrust - Security Comparison of the Leading Databases.eng.text 27.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Varadi - Impressioning.eng.txt 27.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Robert Lipovsky - The - Facebook PokerAgent.eng.tsv 27.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Bardoczi Akos, Zsakai Lilian - Adatbanyaszat a kozossegi web koraban.eng.text 27.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Otti Csaba - A biometria biztonsaga.eng.text 27.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Varadi - Impressioning.eng.lrc 27.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Tevesz - Neutralizing an AntiVirus program.eng.tsv 27.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Bodor - Social Engineering and psychology.eng.txt 27.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Zoltan - IPv6 shipworm - My little windows domain pwnie.eng.text 27.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Beregnyei - From silicium layout to circuit diagram.eng.txt 27.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Laszlo Miklos Biro - Lets hijack an airplane.eng.srt 27.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Yury Chemerkin - (In-) Efficiency of security features on mobile security and compliance.eng.srt 27.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Major - Writing Your Own Password Cracker Tool.eng.tsv 27.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Eszter Oroszi - Social Engineering, when the veil lifted.eng.tsv 27.1 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán L. Németh - Memory corruption vulnerabilities, runtime mitigations and their bypasses.eng.vtt 27.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Roland Kamaras - Locky - anti-analysis techniques used by the ransomware.eng.vtt 27.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Varadi - Impressioning.eng.vtt 27.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zoltan Balazs - Zombie Browsers, spiced with rootkit extensions.eng.txt 27.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Judit Varga - Amy Farrah Fowler, or the geek girl s case with the tiara.eng.text 27.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Bodor - Social Engineering and psychology.eng.lrc 27.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Beregnyei - From silicium layout to circuit diagram.eng.lrc 27.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Geza Tenyi - Management of Confidential Information and Data Protection In Cloud Computing.eng.vtt 27.0 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/How Instantly Upgrade Your Legay Code in Minutes by Tomas Votruba.eng.srt 27.0 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Security Issues of an Apartment Intercom and Door Lock System.eng.srt 26.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Akos Subecz - Security Problems at Hungarian everydays.eng.txt 26.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zoltan Balazs - Zombie Browsers, spiced with rootkit extensions.eng.vtt 26.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Veres-Szentkiralyi Andras - Linux szerverunk van ezert biztonsagos.eng.srt 26.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Balint Varga-Perke, - Buherator - Heureka - The Suspicious Thing Is That It s Not Suspicious.eng.text 26.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Muha Lajos - Fejezetek az informatikai biztonsag tortenetebol.eng.tsv 26.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Szabo Istvan - A nyilvanos magyar kriptografia tortenete napjainkig (sikerek es kudarcok).eng.vtt 26.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Akos Subecz - Security Problems at Hungarian everydays.eng.lrc 26.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zoltan Balazs - Zombie Browsers, spiced with rootkit extensions.eng.lrc 26.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Otti, Arnold Oszi - Finderprint identification systems, security or security leak.eng.vtt 26.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Leitold Ferenc, Horvath Botond - Dobozba zart internet.eng.vtt 26.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Miklos Biro - Tempest, the hidden source of data leakage.eng.vtt 26.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Andras Feher, Csaba Otti - Face Recognition Systems.eng.text 26.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szakaly Tamas - Lopott bajtok a videokartyan - a GPU, mint anti-rce eszkoz.eng.txt 26.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Kabai - Hunting and exploiting bugs in kernel drivers.eng.text 26.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Zoltan Balazs - Alice in eXploitland, attack and defense evolution.eng.text 26.6 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Alexander Kornbrust - Self Defending Database.eng.text 26.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - Scada Hacking - Security Workshop.eng.tsv 26.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Barta - Forensic analysis of NTDS.DIT.eng.text 26.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Ivan Yushkevich Wordlists from statistics to genetic.eng.text 26.5 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Distributed Fuzzing with k8s by Anto Joseph.eng.srt 26.5 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Marosi Attila - A Hacking Team rosszindulatú programjai.eng.text 26.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Geza Tenyi - Management of Confidential Information and Data Protection In Cloud Computing.eng.txt 26.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Istvan Farmosi - The First Virus, the First Book and the Lost Solution.eng.txt 26.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gabor Jeney - Using Commercial WiFi Hostspots Free of Charge.eng.txt 26.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Felix Schuster - Design and implementation of an additional layer of encryption for Skype.eng.text 26.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Feher Andras, Otti Csaba - Arcfelismero rendszerek.eng.text 26.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Leitold Ferenc, Horvath Botond - Dobozba zart internet.eng.tsv 26.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szakaly Tamas - Lopott bajtok a videokartyan - a GPU, mint anti-rce eszkoz.eng.lrc 26.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Geza Tenyi - Management of Confidential Information and Data Protection In Cloud Computing.eng.lrc 26.3 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán Balázs - Sandbox detection for the masses - leak, abuse, test.eng.tsv 26.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Muha Lajos - Fejezetek az informatikai biztonsag tortenetebol.eng.srt 26.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gabor Jeney - Using Commercial WiFi Hostspots Free of Charge.eng.lrc 26.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Akos Subecz, Csaba Zantho - Lockpicking - the finest art of opening locks.eng.tsv 26.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Adrian Furtuna - Digipass Instrumentation for Fun and Profit.eng.tsv 26.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Zsolt Illesi - Finding the Needle in the Haystick.eng.text 26.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Istvan Farmosi - The First Virus, the First Book and the Lost Solution.eng.lrc 26.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Vaagn Toukharian - HTTP Time Bandit.eng.txt 26.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Peter Holtzl - Log analysis.eng.text 26.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sandor Nagy - NAT Attack.eng.text 26.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Robert Lipovsky - The - Facebook PokerAgent.eng.srt 26.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita Eros - Legal Issues with Social Engineering.eng.srt 26.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyozo Kovacs - My Assorted Wandering in IT.eng.tsv 26.1 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Kirils Solovjovs - Tools for effortless reverse engineering of MikroTik routers.eng.text 26.0 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Unraveling the Veins of Automotive Vulnerabilities.eng.srt 26.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Kuba Gretzky - Phishing Through Modern 2FA Defences With Evilginx.eng.vtt 26.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Evgeny Neyolov - Inside the illegal traffic sales.eng.text 26.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Tamas Szakaly - Help, Ive got ANTs.eng.tsv 26.0 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Security in IoT - the Investigation of Bluetooth Low Energy by János Kepics.eng.srt 26.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kristof Kerenyi, Zoltan Hornak, Istvan Kispal - Crypto-chipset Security, Passive-Active Combined Attacks.eng.vtt 25.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Ignat Korchagin - Exploiting USB IP in Linux.eng.text 25.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Muszka Dniel - Kalmr korszak Szegeden.eng.vtt 25.8 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán L. Németh - Memory corruption vulnerabilities, runtime mitigations and their bypasses.eng.tsv 25.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Vaagn Toukharian - HTTP Time Bandit.eng.lrc 25.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Laszlo Biro - Alternative internet.eng.srt 25.8 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/Mobile App Security Testing is Also Essential.eng.srt 25.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Zoltan Ormos - Most Famous Information Security-related Lawsuits from the Past.eng.vtt 25.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szakaly - Stolen bytes on the video card - the GPU as an anti-rce device.eng.srt 25.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove or How I learned to Stop Worrying and Love the BeEF.eng.text 25.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tenyi Geza, Dr. - Bizalmas informaciok kezelese es adatvedelem a felhoszolgaltatasban.eng.text 25.7 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mateusz Olejarka - REST API, pentester's perspective.eng.text 25.7 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Omar Eissa - Network Automation is not your Safe Haven.eng.text 25.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Otti, Arnold Oszi - Finderprint identification systems, security or security leak.eng.txt 25.7 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Pornsook Kornkitichai - Defend PowerShell Attacks When All Else Fails.eng.srt 25.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Varga-Perke Balint, Buherator - Heureka - Az a gyanus ami nem gyanus.eng.text 25.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Yury Chemerkin - (In-) Efficiency of security features on mobile security and compliance.eng.txt 25.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Veres-Szentkiralyi - Hacking hardware for fun and profit.eng.text 25.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Toth - Post Exploitation Techniques in Oracle Databases.eng.text 25.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Biro Laszlo - Digitalis amnezia.eng.vtt 25.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Leitold Ferenc Horvath Botond - Vedekezes kartevok C&C forgalma ellen.eng.text 25.5 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Everyday Numbers to Break Not So Everyday Software by Márk Módly.eng.srt 25.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Zoltan Ormos - Most Famous Information Security-related Lawsuits from the Past.eng.txt 25.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Andras Kabai - Malware Analysis Tips and Tricks.eng.text 25.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Otti, Arnold Oszi - Finderprint identification systems, security or security leak.eng.lrc 25.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kristof Kerenyi, Zoltan Hornak, Istvan Kispal - Crypto-chipset Security, Passive-Active Combined Attacks.eng.txt 25.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Alexander Kornbrust - Security Comparison of the Leading Databases HUN.eng.text 25.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Subecz Akos - Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban.eng.text 25.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Yury Chemerkin - (In-) Efficiency of security features on mobile security and compliance.eng.lrc 25.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Zoltan Ormos - Most Famous Information Security-related Lawsuits from the Past.eng.lrc 25.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Renata Hodovan - Fuzzinator, a browser fuzzing framework.eng.txt 25.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kristof Kerenyi, Zoltan Hornak, Istvan Kispal - Crypto-chipset Security, Passive-Active Combined Attacks.eng.lrc 25.1 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Bring your own demise. The corporate threat of mobile endpoints by János Pallagi.eng.srt 25.1 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Váradi Tamás- Tárcsás zárak nyitásának eszközei és módszerei.eng.text 25.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita Eros - Legal Issues with Social Engineering.eng.txt 25.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Renata Hodovan - Fuzzinator, a browser fuzzing framework.eng.lrc 25.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Istvan Farmosi - The First Virus, the First Book and the Lost Solution.eng.vtt 24.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mehmet Ince - A heaven for Hackers - Breaking Log SIEM Products.eng.tsv 24.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Akos Subecz - Security Problems at Hungarian everydays.eng.tsv 24.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Veres-Szentkiralyi Andras - Linux szerverunk van ezert biztonsagos.eng.vtt 24.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Varadi Tamas - Impressziotechnika.eng.text 24.9 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Laszlo Miklos Biro - Lets hijack an airplane.eng.vtt 24.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Axelle Apvrille - Playing Hide and Seek with Dalvik Executables.eng.text 24.9 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Renata Hodovan - Fuzzinator, a browser fuzzing framework.eng.srt 24.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tevesz Andras - Antivirus program hatastalanitas.eng.text 24.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Adrian Vollmer - Attacking RDP with Seth.eng.srt 24.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Varadi - Impressioning.eng.tsv 24.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita Eros - Legal Issues with Social Engineering.eng.lrc 24.8 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Sir David Pepper - Kiberter es azon tul - folyamatban az evolucio.eng.text 24.8 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dmitriy Chastuchin - Injecting evil code in your SAP J2EE systems.eng.tsv 24.8 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/The Great Hotel Hack Adventures in attacking hospitality industry. Etizaz Mohsin.eng.srt 24.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Beregnyei - From silicium layout to circuit diagram.eng.tsv 24.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Yury Chemerkin - (In-) Efficiency of security features on mobile security and compliance.eng.vtt 24.7 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/Security Assesment of Embedded Firewalls - a Case Study by Csongor Ferenczi.eng.srt 24.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Ferenc Leitold, Botond Horvath - Internet in the Sandbox.eng.srt 24.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Bodor - Social Engineering and psychology.eng.tsv 24.6 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dr. Daniel Eszteri - Legal Background of Cybercrime.eng.text 24.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Foti - There is nothing new under the sun.eng.text 24.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Domonkos Tomcsanyi - Hacking in Suit - Smartphone, the Swiss Army Knife of Hacker.eng.text 24.5 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Kuba Gretzky - Phishing Through Modern 2FA Defences With Evilginx.eng.txt 24.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - How to convince a malware to avoid us.eng.text 24.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Geza Tenyi - Management of Confidential Information and Data Protection In Cloud Computing.eng.tsv 24.4 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Aron Szabo - Chip-tweet alternative usage of PKI devices.eng.text 24.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Robert Lipovsky - The - Facebook PokerAgent.eng.vtt 24.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Adrian Vollmer - Attacking RDP with Seth.eng.tsv 24.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Ferenc Leitold, Ph.D Botond Horvath - Protection against the C&C traffic of malware.eng.text 24.4 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Mateusz Olejarka - Approaching the unknown Windows Phone application security assessment guide.eng.text 24.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Marcell Major - Writing Your Own Password Cracker Tool.eng.text 24.4 kB
Hacktivity 11 2014/Hacktivity 11 2014 captions/Balazs Zoltan - Bypass firewalls, application white lists, secure remote desktops in 20 seconds.eng.text 24.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Muha Lajos - Fejezetek az informatikai biztonsag tortenetebol.eng.vtt 24.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szakaly Tamas - Lopott bajtok a videokartyan - a GPU, mint anti-rce eszkoz.eng.srt 24.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita Eros - Legal Issues with Social Engineering.eng.vtt 24.3 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Kuba Gretzky - Phishing Through Modern 2FA Defences With Evilginx.eng.lrc 24.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Miklos Biro - Tempest, the hidden source of data leakage.eng.tsv 24.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Biro - Stuxnet, Really the first one.eng.srt 24.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gabor Jeney - Using Commercial WiFi Hostspots Free of Charge.eng.tsv 24.1 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Laszlo Miklos Biro - Lets hijack an airplane.eng.tsv 24.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zoltan Balazs - Zombie Browsers, spiced with rootkit extensions.eng.tsv 23.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Alexander Kornbrust - Oracle Forensics.eng.text 23.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Biro - Digital Amnesia.eng.srt 23.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Anto Joseph - Bug hunting using symbolic virtual machines.eng.text 23.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Ormos Zoltan - Nagy port felvert nemzetkozi jogesetek az internetes biztonsag teruleten.eng.text 23.7 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Laszlo Biro - Alternative internet.eng.vtt 23.7 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Maroy Akos, Bodoky Tamas - Anonim adatszivarogtatas a GlobaLeaks platform.eng.text 23.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Zoltan Balazs - IPv6 shipworm - My little windows domain pwnie.eng.text 23.6 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dmitry Chastuhin, Dmitry Yudin -Getting access to the SAP server via SAP Management Console.eng.txt 23.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Joe McCray - There is An App for That - Pentesting Mobile Applications.eng.text 23.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Norbert Tihanyi - Modification of the prime generation method of the OpenSSL library.eng.text 23.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szakaly - Stolen bytes on the video card - the GPU as an anti-rce device.eng.vtt 23.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Hacking - Biztonsag Workshop.eng.srt 23.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dmitry Chastuhin, Dmitry Yudin -Getting access to the SAP server via SAP Management Console.eng.lrc 23.4 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Tamás Szakály - Shall we play a game.eng.text 23.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szakaly - Stolen bytes on the video card - the GPU as an anti-rce device.eng.tsv 23.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Renata Hodovan - Fuzzinator, a browser fuzzing framework.eng.vtt 23.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Dudas Agnes - I agree.eng.tsv 23.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Andras Tevesz - Neutralizing an AntiVirus program.eng.text 23.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Gabor Molnar - War Stories from Google Vulnerability Reward Program.eng.text 23.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Ferenc Leitold, Botond Horvath - Internet in the Sandbox.eng.txt 23.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Adrian Vollmer - Attacking RDP with Seth.eng.vtt 23.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Gyozo Kovacs - My Assorted Wandering in IT.eng.text 23.1 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Laszlo Biro - Alternative internet.eng.txt 23.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Akos Subecz, Csaba Zantho - Lockpicking - the finest art of opening locks.eng.text 23.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kristof Kerenyi, Zoltan Hornak, Istvan Kispal - Crypto-chipset Security, Passive-Active Combined Attacks.eng.tsv 22.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Ferenc Leitold, Botond Horvath - Internet in the Sandbox.eng.lrc 22.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Istvan Farmosi - The First Virus, the First Book and the Lost Solution.eng.tsv 22.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Hacking - Biztonsag Workshop.eng.tsv 22.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Laszlo Biro - Alternative internet.eng.lrc 22.8 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/The Great Hotel Hack Adventures in attacking hospitality industry. Etizaz Mohsin.eng.txt 22.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Biro Laszlo Stuxnet, tenyleg ez volt az elso.eng.text 22.8 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Aleksandr Kolchanov - Attacks on GSM Alarms, Smart Homes, Ind. Control Sys. & Smartwatches for Kids.eng.text 22.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Biro - Stuxnet, Really the first one.eng.txt 22.8 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán Balázs - Sandbox detection for the masses - leak, abuse, test.eng.text 22.8 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/The Great Hotel Hack Adventures in attacking hospitality industry. Etizaz Mohsin.eng.vtt 22.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Zoltan Ormos - Most Famous Information Security-related Lawsuits from the Past.eng.tsv 22.7 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/The Great Hotel Hack Adventures in attacking hospitality industry. Etizaz Mohsin.eng.lrc 22.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Biro - Stuxnet, Really the first one.eng.lrc 22.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Ferenc Leitold, Botond Horvath - Internet in the Sandbox.eng.vtt 22.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita Eros - Legal Issues with Social Engineering.eng.tsv 22.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Jeney Gabor - A fizetos WiFi hotspotok ingyenes hasznalatarol.eng.text 22.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita - Az SE jogi kovetkezmenyei.eng.text 22.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szakaly Tamas - Lopott bajtok a videokartyan - a GPU, mint anti-rce eszkoz.eng.tsv 22.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Akos Subecz - Security Problems at Hungarian everydays.eng.text 22.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Renata Hodovan - Fuzzinator, a browser fuzzing framework.eng.tsv 22.5 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Tamas Szakaly - Help, Ive got ANTs.eng.text 22.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szakaly Tamas - Lopott bajtok a videokartyan - a GPU, mint anti-rce eszkoz.eng.vtt 22.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Roland Kamaras - Locky - anti-analysis techniques used by the ransomware.eng.text 22.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Otti, Arnold Oszi - Finderprint identification systems, security or security leak.eng.tsv 22.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - Scada Hacking - Security Workshop.eng.text 22.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Yury Chemerkin - (In-) Efficiency of security features on mobile security and compliance.eng.tsv 22.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Lederer Sandor Foldes Adam Bodoky Tamas Csorgo Laszlo - Wikileaks - info-szabadsagharc vagy info-terr.eng.text 22.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Toth - Almost invisible cloak in Oracle databases or the undocumented helps us again.eng.text 22.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Biro - Stuxnet, Really the first one.eng.vtt 22.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Farmosi Istvan - Az elso virus, az elso konyv es egy elfeledett megoldas.eng.text 22.1 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Vaagn Toukharian - HTTP Time Bandit.eng.srt 22.1 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Stuxnet Attack by Dr. Mo Ashouri.eng.srt 22.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Lajos Muha - Chapters from the History of IT Security.eng.srt 22.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Geza Tenyi - Management of Confidential Information and Data Protection In Cloud Computing.eng.text 22.0 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Tamas Varadi - Impressioning.eng.text 22.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Subecz Akos, Zantho Csaba - Lockpicking - a zarnyitas muveszete.eng.text 22.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Kuba Gretzky - Phishing Through Modern 2FA Defences With Evilginx.eng.tsv 22.0 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Zoltán L. Németh - Memory corruption vulnerabilities, runtime mitigations and their bypasses.eng.text 21.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Biro - Digital Amnesia.eng.vtt 21.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Dudas Agnes - I agree.eng.srt 21.8 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Balazs Beregnyei - From silicium layout to circuit diagram.eng.text 21.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Szemes Balazs - ACTA, HADOPI, Digital Economy Act - fizetni fogunk mint a katonatiszt.eng.txt 21.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA szomorusag avagy bumm-bumm SCADA.eng.text 21.5 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Adrian Furtuna - Digipass Instrumentation for Fun and Profit.eng.text 21.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Vaagn Toukharian - HTTP Time Bandit.eng.tsv 21.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Muszka Dniel - Kalmr korszak Szegeden.eng.text 21.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Mehmet Ince - A heaven for Hackers - Breaking Log SIEM Products.eng.text 21.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Peter Bodor - Social Engineering and psychology.eng.text 21.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Hacking - Biztonsag Workshop.eng.vtt 21.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Leitold Ferenc, Horvath Botond - Dobozba zart internet.eng.text 21.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Szemes Balazs - ACTA, HADOPI, Digital Economy Act - fizetni fogunk mint a katonatiszt.eng.lrc 21.0 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dmitry Chastuhin, Dmitry Yudin -Getting access to the SAP server via SAP Management Console.eng.tsv 21.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Gabor Jeney - Using Commercial WiFi Hostspots Free of Charge.eng.text 21.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Szabo Istvan - A nyilvanos magyar kriptografia tortenete napjainkig (sikerek es kudarcok).eng.text 20.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Eszter Oroszi - Social Engineering, when the veil lifted.eng.text 20.9 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Laszlo Biro - Alternative internet.eng.tsv 20.9 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Blue Team Over The Air by Besim Altinok.eng.srt 20.7 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Ferenc Leitold, Botond Horvath - Internet in the Sandbox.eng.tsv 20.5 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Csaba Fitzl - Gatekeeper - Bypass or Not Bypass.eng.srt 20.5 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/Infra security automation in CI CD impossible is nothing. 1 2 by Davide Cioccia.eng.srt 20.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Lajos Muha - Chapters from the History of IT Security.eng.vtt 20.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Biro - Digital Amnesia.eng.txt 20.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Veres-Szentkiralyi Andras - Linux szerverunk van ezert biztonsagos.eng.text 20.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Vaagn Toukharian - HTTP Time Bandit.eng.vtt 20.3 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/The Great Hotel Hack Adventures in attacking hospitality industry. Etizaz Mohsin.eng.tsv 20.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Biro - Stuxnet, Really the first one.eng.tsv 20.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Robert Lipovsky - The - Facebook PokerAgent.eng.text 20.2 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Zoltan Balazs - Zombie Browsers, spiced with rootkit extensions.eng.text 20.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Biro - Digital Amnesia.eng.lrc 20.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Dudas Agnes - I agree.eng.vtt 20.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Veres-Szentkiralyi - We Have Linux Servers So Are We Secured.eng.srt 20.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Dmitriy Chastuchin - Injecting evil code in your SAP J2EE systems.eng.text 20.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Biro Laszlo - Digitalis amnezia.eng.text 20.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Kristof Kerenyi, Zoltan Hornak, Istvan Kispal - Crypto-chipset Security, Passive-Active Combined Attacks.eng.text 19.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Lajos Muha - Chapters from the History of IT Security.eng.txt 19.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Lajos Muha - Chapters from the History of IT Security.eng.lrc 19.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Anita Eros - Legal Issues with Social Engineering.eng.text 19.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Muha Lajos - Fejezetek az informatikai biztonsag tortenetebol.eng.text 19.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Zoltan Ormos - Most Famous Information Security-related Lawsuits from the Past.eng.text 19.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Laszlo Miklos Biro - Tempest, the hidden source of data leakage.eng.text 19.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Veres-Szentkiralyi - We Have Linux Servers So Are We Secured.eng.txt 19.4 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/David Liptay & Julia Borbala Csuha - CANmap - Network Discovery on CAN.eng.srt 19.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Veres-Szentkiralyi - We Have Linux Servers So Are We Secured.eng.lrc 19.3 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Renata Hodovan - Fuzzinator, a browser fuzzing framework.eng.text 19.2 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Laszlo Miklos Biro - Lets hijack an airplane.eng.text 19.1 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/Reality or Myth Unhackable Application (Using Zero Trust).eng.srt 19.1 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Kuba Gretzky - Phishing Through Modern 2FA Defences With Evilginx.eng.text 19.0 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Adrian Vollmer - Attacking RDP with Seth.eng.text 18.9 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Jason Zhang - Make Invisible Visible - Case Studies in PDF Malware.eng.srt 18.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Csaba Fitzl - Gatekeeper - Bypass or Not Bypass.eng.vtt 18.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Veres-Szentkiralyi - We Have Linux Servers So Are We Secured.eng.vtt 18.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Biro - Digital Amnesia.eng.tsv 18.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Istvan Farmosi - The First Virus, the First Book and the Lost Solution.eng.text 18.3 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Yury Chemerkin - (In-) Efficiency of security features on mobile security and compliance.eng.text 18.3 kB
Hacktivity 9 2012/Hacktivity 9 2012 captions/Laszlo Biro - Alternative internet.eng.text 18.3 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Csaba Fitzl - Gatekeeper - Bypass or Not Bypass.eng.txt 18.2 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/No Parking, No Problem by Ignacio Navarro.eng.srt 18.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Lajos Muha - Chapters from the History of IT Security.eng.tsv 18.1 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Csaba Fitzl - Gatekeeper - Bypass or Not Bypass.eng.lrc 18.1 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Csaba Otti, Arnold Oszi - Finderprint identification systems, security or security leak.eng.text 18.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Tamas Szakaly - Stolen bytes on the video card - the GPU as an anti-rce device.eng.text 17.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/David Liptay & Julia Borbala Csuha - CANmap - Network Discovery on CAN.eng.txt 17.9 kB
Hacktivity 13 2016/Hacktivity 13 2016 captions/Dmitry Chastuhin, Dmitry Yudin -Getting access to the SAP server via SAP Management Console.eng.text 17.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/David Liptay & Julia Borbala Csuha - CANmap - Network Discovery on CAN.eng.vtt 17.8 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/David Liptay & Julia Borbala Csuha - CANmap - Network Discovery on CAN.eng.lrc 17.8 kB
Hacktivity 17 2020/Hacktivity 17 2020 captions/The Great Hotel Hack Adventures in attacking hospitality industry. Etizaz Mohsin.eng.text 17.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Szakaly Tamas - Lopott bajtok a videokartyan - a GPU, mint anti-rce eszkoz.eng.text 17.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Dr. Ferenc Leitold, Botond Horvath - Internet in the Sandbox.eng.text 17.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Veres-Szentkiralyi - We Have Linux Servers So Are We Secured.eng.tsv 17.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Laszlo Biro - Stuxnet, Really the first one.eng.text 17.1 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Laszlo Miklos Biro - IoT Devices, Were Are You and What Do you Do.eng.srt 17.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Laszlo Miklos Biro - IoT Devices, Were Are You and What Do you Do.eng.txt 17.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Laszlo Miklos Biro - IoT Devices, Were Are You and What Do you Do.eng.lrc 16.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Dudas Agnes - I agree.eng.text 16.4 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Csaba Fitzl - Gatekeeper - Bypass or Not Bypass.eng.tsv 16.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Laszlo Biro - Digital Amnesia.eng.text 16.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Lajos Muha - Chapters from the History of IT Security.eng.text 16.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/David Liptay & Julia Borbala Csuha - CANmap - Network Discovery on CAN.eng.tsv 15.9 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Vaagn Toukharian - HTTP Time Bandit.eng.text 15.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Laszlo Miklos Biro - IoT Devices, Were Are You and What Do you Do.eng.vtt 15.9 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Yaniv Miron - SCADA Hacking - Biztonsag Workshop.eng.text 15.5 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Laszlo Miklos Biro - IoT Devices, Were Are You and What Do you Do.eng.tsv 15.1 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Szemes Balazs - ACTA, HADOPI, Digital Economy Act - fizetni fogunk mint a katonatiszt.eng.tsv 15.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Andras Veres-Szentkiralyi - We Have Linux Servers So Are We Secured.eng.text 14.7 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - Exploit generation with WinDGB.eng.srt 14.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Csaba Fitzl - Gatekeeper - Bypass or Not Bypass.eng.text 14.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/David Liptay & Julia Borbala Csuha - CANmap - Network Discovery on CAN.eng.text 13.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Istvan Szabo - The History of the Hungarian Cryptography.eng.srt 13.0 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - Exploit generation with WinDGB.eng.txt 12.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/Laszlo Miklos Biro - IoT Devices, Were Are You and What Do you Do.eng.text 12.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - Exploit generation with WinDGB.eng.lrc 12.8 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - Exploit generation with WinDGB.eng.vtt 12.6 kB
Hacktivity 12 2015/Hacktivity 12 2015 captions/Áron Szabó - Post-kvantumkriptográfia - prím kérdések = príma kérdések.eng.srt 11.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Istvan Szabo - The History of the Hungarian Cryptography.eng.vtt 11.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Istvan Szabo - The History of the Hungarian Cryptography.eng.txt 11.6 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Istvan Szabo - The History of the Hungarian Cryptography.eng.lrc 11.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - Exploit generation with WinDGB.eng.tsv 10.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Szemes Balazs - ACTA, HADOPI, Digital Economy Act - fizetni fogunk mint a katonatiszt.eng.srt 10.8 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Istvan Szabo - The History of the Hungarian Cryptography.eng.tsv 10.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Szemes Balazs - ACTA, HADOPI, Digital Economy Act - fizetni fogunk mint a katonatiszt.eng.vtt 9.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Csaba Fitzl - Exploit generation with WinDGB.eng.text 8.8 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hackitvity2019 - Interju az M1 Hiradoban (in Hungarian).eng.txt 8.7 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hackitvity2019 - Interju az M1 Hiradoban (in Hungarian).eng.lrc 8.7 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Dr. Istvan Szabo - The History of the Hungarian Cryptography.eng.text 8.4 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hackitvity2019 - Interju az M1 Hiradoban (in Hungarian).eng.srt 8.2 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Szemes Balazs - ACTA, HADOPI, Digital Economy Act - fizetni fogunk mint a katonatiszt.eng.text 8.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hackitvity2019 - Interju az M1 Hiradoban (in Hungarian).eng.vtt 7.7 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hackitvity2019 - Interju az M1 Hiradoban (in Hungarian).eng.tsv 7.5 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Interju a Duna TV Csaladbarat cimu musoraban (in Hungarian).eng.txt 7.2 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Interju a Duna TV Csaladbarat cimu musoraban (in Hungarian).eng.lrc 7.1 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Riport a TV2 TechGuru cimu musoraban (in Hungarian).eng.txt 6.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Riport a TV2 TechGuru cimu musoraban (in Hungarian).eng.lrc 6.8 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Interju a Duna TV Csaladbarat cimu musoraban (in Hungarian).eng.srt 6.4 kB
Hacktivity 15 2018/Hacktivity 15 2018 captions/Hacktivity2018 - Summary of the 15. Jubilee Edition - 12-13 October 2018.eng.srt 6.3 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hackitvity2019 - Interju az M1 Hiradoban (in Hungarian).eng.text 6.2 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Interju a Duna TV Csaladbarat cimu musoraban (in Hungarian).eng.tsv 6.1 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Interju a Duna TV Csaladbarat cimu musoraban (in Hungarian).eng.vtt 6.0 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Riport a TV2 TechGuru cimu musoraban (in Hungarian).eng.tsv 5.7 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Riport a TV2 TechGuru cimu musoraban (in Hungarian).eng.srt 5.5 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Riport a TV2 TechGuru cimu musoraban (in Hungarian).eng.vtt 5.2 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Interju a Duna TV Csaladbarat cimu musoraban (in Hungarian).eng.text 5.1 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Riport a TV2 TechGuru cimu musoraban (in Hungarian).eng.text 4.5 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Summary of the 16th Edition - 25-26 October 2019.eng.srt 3.7 kB
Hacktivity 19 2022/Hacktivity 19 2022 captions/WNEXT - Summary of the 19th Edition - 6-7 October 2022.eng.srt 3.5 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Best of Hacktivity 2010.eng.txt 3.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Best of Hacktivity 2010.eng.lrc 2.9 kB
Hacktivity 18 2021/Hacktivity 18 2021 captions/#Hacktivity2021 - Summary of the 18th Edition - 8 October 2021.eng.srt 2.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Summary of the 14th Hacktivity - October 20-21, 2017.eng.srt 2.7 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Summary of the 14th Hacktivity - October 20-21, 2017.eng.vtt 2.5 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Summary of the 14th Hacktivity - October 20-21, 2017.eng.txt 2.4 kB
Hacktivity 20 2023/Hacktivity 20 2023 captions/NOWNEXT - Summary of the 20th JUBILEE EDITION - 5-6 October 2023.eng.srt 2.4 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Summary of the 14th Hacktivity - October 20-21, 2017.eng.lrc 2.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Best of Hacktivity 2013 official.eng.srt 2.3 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Best of Hacktivity 2010.eng.tsv 2.2 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Summary of the 14th Hacktivity - October 20-21, 2017.eng.tsv 2.1 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Összefoglalo video a WeLoveDigital jovoltabol (in Hungarian).eng.srt 2.0 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Best of Hacktivity 2013 official.eng.vtt 2.0 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Best of Hacktivity 2010.eng.srt 1.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Összefoglalo video a WeLoveDigital jovoltabol (in Hungarian).eng.txt 1.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Összefoglalo video a WeLoveDigital jovoltabol (in Hungarian).eng.vtt 1.9 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Összefoglalo video a WeLoveDigital jovoltabol (in Hungarian).eng.lrc 1.9 kB
Hacktivity 14 2017/Hacktivity 14 2017 captions/Summary of the 14th Hacktivity - October 20-21, 2017.eng.text 1.9 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Best of Hacktivity 2010.eng.vtt 1.8 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Összefoglalo video a WeLoveDigital jovoltabol (in Hungarian).eng.tsv 1.6 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Best of Hacktivity 2011.eng.txt 1.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Best of Hacktivity 2013 official.eng.txt 1.5 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Best of Hacktivity 2011.eng.lrc 1.5 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Best of Hacktivity 2013 official.eng.lrc 1.4 kB
Hacktivity 7 2010/Hacktivity 7 2010 captions/Best of Hacktivity 2010.eng.text 1.4 kB
Hacktivity 16 2019/Hacktivity 16 2019 captions/#Hacktivity2019 - Összefoglalo video a WeLoveDigital jovoltabol (in Hungarian).eng.text 1.4 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Best of Hacktivity 2011.eng.srt 1.4 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Best of Hacktivity 2013 official.eng.tsv 1.3 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Best of Hacktivity 2011.eng.vtt 1.2 kB
Hacktivity 10 2013/Hacktivity 10 2013 captions/Best of Hacktivity 2013 official.eng.text 1.2 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Best of Hacktivity 2011.eng.tsv 1.1 kB
Hacktivity thank you.txt 1.0 kB
Hacktivity 8 2011/Hacktivity 8 2011 captions/Best of Hacktivity 2011.eng.text 781 Bytes
HEADER.md 372 Bytes
Hacktivity 7 2010/Hacktivity 7 2010 captions/BettyLove - Hacktivity Wargame.eng.json 41 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/BettyLove - Hacktivity Wargame.eng.json 41 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove avagy Hogyan tanultam meg nem aggodni es szeretni a BeEF-ek.eng.json 41 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Nagyvallalati Wi-Fi fergek es botnetek.eng.json 41 Bytes
Hacktivity 7 2010/Hacktivity 7 2010 captions/BettyLove - Hacktivity Wargame.eng.tsv 16 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/BettyLove - Hacktivity Wargame.eng.tsv 16 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove avagy Hogyan tanultam meg nem aggodni es szeretni a BeEF-ek.eng.tsv 16 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Nagyvallalati Wi-Fi fergek es botnetek.eng.tsv 16 Bytes
Hacktivity 7 2010/Hacktivity 7 2010 captions/BettyLove - Hacktivity Wargame.eng.vtt 10 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/BettyLove - Hacktivity Wargame.eng.vtt 10 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove avagy Hogyan tanultam meg nem aggodni es szeretni a BeEF-ek.eng.vtt 10 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Nagyvallalati Wi-Fi fergek es botnetek.eng.vtt 10 Bytes
Hacktivity 7 2010/Hacktivity 7 2010 captions/BettyLove - Hacktivity Wargame.eng.lrc 0 Bytes
Hacktivity 7 2010/Hacktivity 7 2010 captions/BettyLove - Hacktivity Wargame.eng.srt 0 Bytes
Hacktivity 7 2010/Hacktivity 7 2010 captions/BettyLove - Hacktivity Wargame.eng.text 0 Bytes
Hacktivity 7 2010/Hacktivity 7 2010 captions/BettyLove - Hacktivity Wargame.eng.txt 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/BettyLove - Hacktivity Wargame.eng.lrc 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/BettyLove - Hacktivity Wargame.eng.srt 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/BettyLove - Hacktivity Wargame.eng.text 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/BettyLove - Hacktivity Wargame.eng.txt 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove avagy Hogyan tanultam meg nem aggodni es szeretni a BeEF-ek.eng.lrc 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove avagy Hogyan tanultam meg nem aggodni es szeretni a BeEF-ek.eng.srt 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove avagy Hogyan tanultam meg nem aggodni es szeretni a BeEF-ek.eng.text 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Michele Orru - Dr. Strangelove avagy Hogyan tanultam meg nem aggodni es szeretni a BeEF-ek.eng.txt 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Nagyvallalati Wi-Fi fergek es botnetek.eng.lrc 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Nagyvallalati Wi-Fi fergek es botnetek.eng.srt 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Nagyvallalati Wi-Fi fergek es botnetek.eng.text 0 Bytes
Hacktivity 8 2011/Hacktivity 8 2011 captions/Vivek Ramachandran - Nagyvallalati Wi-Fi fergek es botnetek.eng.txt 0 Bytes
Hacktivity 49.4 GB
Hacktivity 59.8 GB
Hacktivity 61.4 GB
Hacktivity 63.7 GB
Leverage.Redemption.S01E05.The.Paranormal.Hacktivity.Job.... 217.0 MB
Hacktivity 18.8 GB
Hacktivity 22.1 GB
Hacktivity 21.0 GB
Andor [HDTV 720p][Cap.205] 8145次下载
Cap
HDTV
720p
Маня и Груня.2024.WEB-DL 720p.Files-x 5109次下载
2024
WEB
DL
Havoc.2025.1080p.NF.WEB-DL.DDP5.1.Atmos.H.264-EniaHD.mkv 5077次下载
WEB
DL
DDP5
The.Super.Cube.S01E09.1080p.iQ.WEB-DL.AAC2.0.H.264-VARYG.mkv 5040次下载
WEB
DL
Cube
Star.Wars.Andor.S02E05.I.Have.Friends.Everywhere.1080p.DS... 4944次下载
WEB
DL
Star
新桥恋人.电影港 地址发布页 www.dygang.me 收藏不迷路 4365次下载
me
www
发布页
Night at the Museum Battle of the Smithsonian 2009 2160p... 4161次下载
KiNGDOM
WEB
DL
www.UIndex.org - ... 4126次下载
www
MeGusta
HEVC
Palma.2.2024.WEB-DL.1080p.ExKinoRay.mkv 4000次下载
WEB
DL
2.2024
Guns N' Roses - Greatest Hits Live Broadcast Collection... 3915次下载
Live
Remastered
Hits
Andor [HDTV 720p][Cap.205] 8145次下载
Cap
HDTV
720p
(同人CG集) [白色絵の具 (無味ムスミ)] 友達の母が巨乳で金髪の淫乱美女でした.zip 6346次下载
zip
巨乳
CG
You.S05E02.720p.HEVC.x265-MeGusta[EZTVx.to].mkv 6221次下载
S05E02
HEVC
720p
up-mod-minecraft-play-with-friends-v1-21-80-28-... 6023次下载
982108028
mod
play
the.last.of.us.s02e02.1080p.web.h264-successful... 5335次下载
web
last
h264
异世降临.6v电影 地址发布页 www.6v123.net 收藏不迷路 5220次下载
www
发布页
6v123
Opasnaya.blizost.S01.2025.WEB-DL.1080p 5127次下载
WEB
DL
S01
Маня и Груня.2024.WEB-DL 720p.Files-x 5109次下载
2024
WEB
DL
Andor.S02E02.Sagrona.Teema.1080p.HEVC.x265-MeGu... 5100次下载
HEVC
Andor
mkv
Havoc.2025.1080p.NF.WEB-DL.DDP5.1.Atmos.H.264-E... 5077次下载
WEB
DL
DDP5
Shoot.Paragon.1970.DVDRip.XviD-AFO [NO-RAR] -...
Shoot
www
AFO
DASS-041-U
DASS
041
www.UIndex.org - Andy Richter Controls...
www
Episode
S01E04
[AniDub]_Sora_Kara_Furu_Ichioku_no_Hoshi_[Oriko_Qbiq]
Furu
no
Oriko
[BEST-TORRENTS.COM]...
Cheese
DL
2160p
【成人抖音-黑料-换妻-直播-手机搜7t7a.cc】麻豆传媒映画・爆操黑丝车模小姐姐・超级圆润...
麻豆
小姐姐
车模
Por siempre [HDTV 720p][Cap.106]
siempre
720p
Cap
Workaholics.S04E01.Season.4.Episode.1.WEBRip.72...
Workaholics
Episode
HoC
MobLand.S01E01.1080P.ENG.ITA.H264-TheBlackKing.mkv
ENG
H264
ITA
43606101 - Public Dick Flash Compilation..mp4
Dick
..
Compilation
吃瓜!去欧美留学的林淑瑶 ️被欧美大鸡巴驯化3P大战被洋吊深喉狂艹!
欧美
3P
被洋
Hellraiser III Hell On Earth 1992 1080p BluRay...
5.1
1992
AAC
Ghosts S04E21 Kyle 1080p PMTP WEB-DL DDP5 1 H...
WEB
DL
STC
[Gecko] Araiguma Calcal-dan - S01E07...
WEB
DL
AAC
salamander-2-salamander-deluxe-pack-play-statio...
salamander
play
full
Catalina Cruz live cam show pack
Catalina
show
live
SDMU-534
534
SDMU
dccdom.com@MIDV111C
com
MIDV111C
dccdom
