magnet:?xt=urn:btih:8B0E8205D0AA90F151E2EE4993E0640BB410CB21
m0leCon 2019/Matteo Ranalli - Data Breach real world adversary tactics and techniques.mp4 51.4 MB
m0leCon 2020/Colin O'Flynn - Electromagnetic Fault Injection on Practical Devices.mp4 45.5 MB
m0leCon 2019/Paolo Stagno - SCADA, A PLC's Story.mp4 44.0 MB
m0leCon 2019/Danilo Massa - Cyber range Hacking Virtual Warfare.mp4 42.0 MB
m0leCon 2020/Pietro Oliva - From Hardware to Zero Day.mp4 39.1 MB
m0leCon 2020/Fabio Traversa - Memcomputing and Empirical Results Using Self-Organizing Logic.mp4 38.8 MB
m0leCon 2020/Andrea Menin - Fantastic Bypass and Where to Find Them.mp4 37.1 MB
m0leCon 2019/Guglielmo Morgari - Quantum computers and cryptography.mp4 35.6 MB
m0leCon 2019/Mariano Graziano - Binary Analysis Notes.mp4 33.0 MB
m0leCon 2020/Giovanni Rocca - Using Cracking Techniques to Protect the Android Userspace.mp4 31.7 MB
m0leCon 2019/Lorenzo Veronese - Firewalls are a mess Compiling and decompiling network policies.mp4 23.2 MB
m0leCon 2020/Allie Mellen - Mobile Security in a Remote World.mp4 21.3 MB
m0leCon 2019/Luca Pezzolla - Up near the clouds all the servers (can) go down.mp4 14.2 MB
m0leCon 2020/Colin O'Flynn - Electromagnetic Fault Injection on Practical Devices.eng.srt 91.8 kB
m0leCon 2020/Fabio Traversa - Memcomputing and Empirical Results Using Self-Organizing Logic.eng.srt 80.0 kB
m0leCon 2019/Paolo Stagno - SCADA, A PLC's Story.eng.srt 70.7 kB
m0leCon 2019/Matteo Ranalli - Data Breach real world adversary tactics and techniques.eng.srt 69.4 kB
m0leCon 2020/Pietro Oliva - From Hardware to Zero Day.eng.srt 68.0 kB
m0leCon 2019/Mariano Graziano - Binary Analysis Notes.eng.srt 67.6 kB
m0leCon 2019/Danilo Massa - Cyber range Hacking Virtual Warfare.eng.srt 66.8 kB