GreHack/GreHack 2015/[Grehack 2015] (Invited talk) Draw me a Local Kernel Debugger - Samuel Chevet and Clément Rouault.mp4 |
133 MB |
GreHack/GreHack 2015/[Grehack 2015] (Keynote) Failure is not an Option - Philippe Biondi.mp4 |
187.1 MB |
GreHack/GreHack 2015/[Grehack 2015] Corrupted GOOSE Detector.mp4 |
92.4 MB |
GreHack/GreHack 2015/[Grehack 2015] Hacking a Sega Whitestar Pinball Focussing on the audio board.mp4 |
117.5 MB |
GreHack/GreHack 2015/[Grehack 2015] Industrial Control Systems Dynamic Code Injection.mp4 |
128.4 MB |
GreHack/GreHack 2015/[Grehack 2015] Linnea Detecting blacklist-evading malware with SQL rules.mp4 |
93.2 MB |
GreHack/GreHack 2015/[Grehack 2015] New Results for the PTB-PTS Attack on Tunnelling Gateways.mp4 |
75.4 MB |
GreHack/GreHack 2015/[Grehack 2015] Similarities and anomalies analysis of network mapping results.mp4 |
131.7 MB |
GreHack/GreHack 2016/[GreHack 16] Scapy in 15 minutes – Guillaume Valadon.mp4 |
61 MB |
GreHack/GreHack 2016/[GreHack 2016] Arybo Make expression simplification great again – Marion Videau.mp4 |
119.2 MB |
GreHack/GreHack 2016/[GreHack 2016] BtleJuice the Bluetooth Smart Man In The Middle Framework – Damien Cauquil.mp4 |
149.9 MB |
GreHack/GreHack 2016/[GreHack 2016] Gorille Another approach to binary code analysis – Jean Yves Marion.mp4 |
160.2 MB |
GreHack/GreHack 2016/[GreHack 2016] Improving dm-crypt performance for XTS-AES mode – Levent Demir.mp4 |
64.6 MB |
GreHack/GreHack 2016/[GreHack 2016] M 'etamorphose.univ-nantes.fr – Rémi Lehn.mp4 |
136.3 MB |
GreHack/GreHack 2016/[GreHack 2016] Old Memories Requiem – Fabien Périgaud.mp4 |
46.8 MB |
GreHack/GreHack 2016/[GreHack 2016] Protecting Data on Smartphones & Tablets using Trusted Computing – Stefan Saroiu.mp4 |
256.3 MB |
GreHack/GreHack 2016/[GreHack 2016] [Rump] CNN For Everyone – Camille Mougey.mp4 |
17.9 MB |
GreHack/GreHack 2016/[GreHack 2016] [Rump] Don't always trust your debugger blindly – 0xMitsurugi.mp4 |
12.6 MB |
GreHack/GreHack 2016/[GreHack 2016] [Rump] Fuzzing – Nicolas Ruff.mp4 |
30.4 MB |
GreHack/GreHack 2016/[GreHack 2016] [Rump] R2M2 – Guillaume Valadon.mp4 |
26.9 MB |
GreHack/GreHack 2016/[GreHack 2016] [Rump] Tigress challenges – Jonathan Salwan.mp4 |
19.9 MB |
GreHack/GreHack 2016/[GreHack 2016] [Rump] White Paper - Write (super) CTF Challs – _Frky.mp4 |
18 MB |
GreHack/GreHack 2016/[GreHack 2016] [Rump] XSS without parenthesis – Yohann Gely.mp4 |
23.8 MB |
GreHack/GreHack 2017/[GreHack 2017] Attack ARM TrustZone using Rowhammer.mp4 |
35.4 MB |
GreHack/GreHack 2017/[GreHack 2017] Automation Attacks at Scale.mp4 |
67.5 MB |
GreHack/GreHack 2017/[GreHack 2017] Code Protection Promises and Limits of Symbolic Deobfuscation.mp4 |
68.7 MB |
GreHack/GreHack 2017/[GreHack 2017] Detection of cryptographic algorithms with grap.mp4 |
62.8 MB |
GreHack/GreHack 2017/[GreHack 2017] Down The Rabbit Hole How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets.mp4 |
29.8 MB |
GreHack/GreHack 2017/[GreHack 2017] Efficient Defenses against Adversarial Examples for Deep Neural Networks.mp4 |
47.3 MB |
GreHack/GreHack 2017/[GreHack 2017] Get the (Spider)monkey off your back.mp4 |
36 MB |
GreHack/GreHack 2017/[GreHack 2017] Random Memories writeup.mp4 |
44 MB |
GreHack/GreHack 2017/[GreHack 2017] Rump -- Hacking in 2017.mp4 |
9.5 MB |
GreHack/GreHack 2017/[GreHack 2017] Rump -- Overengineered making-of.mp4 |
20.6 MB |
GreHack/GreHack 2017/[GreHack 2017] TSIGKILL Bypassing dynamic DNS updates authentication through signature forgery.mp4 |
24.8 MB |
GreHack/GreHack 2017/[GreHack 2017] The Black Art of Wireless Post-Exploitation.mp4 |
62.8 MB |
GreHack/GreHack 2017/[GreHack 2017] The Making of a Secure Open Source Hardware Password Keeper.mp4 |
35.8 MB |
GreHack/GreHack 2018/GreHack 2018 Abusing Privileged File Manipulation - Clement Lavoillotte.en.transcribed.srt |
76 KB |
GreHack/GreHack 2018/GreHack 2018 Abusing Privileged File Manipulation - Clement Lavoillotte.mp4 |
37.8 MB |
GreHack/GreHack 2018/GreHack 2018 Analyzing Ultrasound-Based Physical Tracking Systems - Mathieu Cunche.en.transcribed.srt |
66 KB |
GreHack/GreHack 2018/GreHack 2018 Analyzing Ultrasound-Based Physical Tracking Systems - Mathieu Cunche.mp4 |
37.7 MB |
GreHack/GreHack 2018/GreHack 2018 Bridging The Gap Between Secure Hardware And Open Source - Charles Guillemet.en.transcribed.srt |
53 KB |
GreHack/GreHack 2018/GreHack 2018 Bridging The Gap Between Secure Hardware And Open Source - Charles Guillemet.mp4 |
43.9 MB |
GreHack/GreHack 2018/GreHack 2018 Closing Speech - Nics.en.transcribed.srt |
3 KB |
GreHack/GreHack 2018/GreHack 2018 Closing Speech - Nics.mp4 |
2.1 MB |
GreHack/GreHack 2018/GreHack 2018 Corrupted Memories Requiem - Anonymous Pwners.en.transcribed.srt |
50 KB |
GreHack/GreHack 2018/GreHack 2018 Corrupted Memories Requiem - Anonymous Pwners.mp4 |
40.3 MB |
GreHack/GreHack 2018/GreHack 2018 Detecting All Type Of Illegal Access Points On Enterprise Networks - Yunfei Yang.en.transcribed.srt |
50 KB |
GreHack/GreHack 2018/GreHack 2018 Detecting All Type Of Illegal Access Points On Enterprise Networks - Yunfei Yang.mp4 |
39.7 MB |
GreHack/GreHack 2018/GreHack 2018 Opening Speech - Jean-Guillaume Dumas.en.transcribed.srt |
4 KB |
GreHack/GreHack 2018/GreHack 2018 Opening Speech - Jean-Guillaume Dumas.mp4 |
2.8 MB |
GreHack/GreHack 2018/GreHack 2018 Pwn A SAP System... Then What - Yvan Genuer.mp4 |
60.3 MB |
GreHack/GreHack 2018/GreHack 2018 ROPGenerator Practical Automated ROP-Chain Generation - Boyan Milanov.en.transcribed.srt |
70 KB |
GreHack/GreHack 2018/GreHack 2018 ROPGenerator Practical Automated ROP-Chain Generation - Boyan Milanov.mp4 |
42 MB |
GreHack/GreHack 2018/GreHack 2018 RUMP Session - Various.en.transcribed.srt |
36 KB |
GreHack/GreHack 2018/GreHack 2018 RUMP Session - Various.mp4 |
24.8 MB |
GreHack/GreHack 2018/GreHack 2018 The Evolution Of GandCrab Ransomware - Tamas Boczan.en.transcribed.srt |
78 KB |
GreHack/GreHack 2018/GreHack 2018 The Evolution Of GandCrab Ransomware - Tamas Boczan.mp4 |
45.2 MB |
GreHack/GreHack 2018/GreHack 2018 Trap Your Keyboard 101 - Marion Lafon.mp4 |
55.5 MB |
GreHack/GreHack 2018/GreHack 2018 When Electromagnetic Side Channels Meet Radio Transceivers - Marius Muench.en.transcribed.srt |
100 KB |
GreHack/GreHack 2018/GreHack 2018 When Electromagnetic Side Channels Meet Radio Transceivers - Marius Muench.mp4 |
42.4 MB |
GreHack/GreHack 2019/GreHack 2019 Closing Speech - Xarkes.en.transcribed.srt |
2 KB |
GreHack/GreHack 2019/GreHack 2019 Closing Speech - Xarkes.mp4 |
1.9 MB |
GreHack/GreHack 2019/GreHack 2019 Delayed Memories Requiem - Anonymous Pwners.mp4 |
26.6 MB |
GreHack/GreHack 2019/GreHack 2019 Hunting For Bugs, Catching Dragons - Nicolas Joly.en.transcribed.srt |
59 KB |
GreHack/GreHack 2019/GreHack 2019 Hunting For Bugs, Catching Dragons - Nicolas Joly.mp4 |
38 MB |
GreHack/GreHack 2019/GreHack 2019 IOT Security Hack The Damn Vulnerable IoT Device - Arnaud Courty.en.transcribed.srt |
33 KB |
GreHack/GreHack 2019/GreHack 2019 IOT Security Hack The Damn Vulnerable IoT Device - Arnaud Courty.mp4 |
30.7 MB |
GreHack/GreHack 2019/GreHack 2019 Implementation Pitfalls Of OAuth 2.0 - Samit Anwer.en.transcribed.srt |
71 KB |
GreHack/GreHack 2019/GreHack 2019 Implementation Pitfalls Of OAuth 2.0 - Samit Anwer.mp4 |
50.1 MB |
GreHack/GreHack 2019/GreHack 2019 Opening Speech - Roland Groz.en.transcribed.srt |
8 KB |
GreHack/GreHack 2019/GreHack 2019 Opening Speech - Roland Groz.mp4 |
6.4 MB |
GreHack/GreHack 2019/GreHack 2019 Optimize Your Way To RCE Chakra - Bruno Keith.mp4 |
79.7 MB |
GreHack/GreHack 2019/GreHack 2019 Rump Session Access Granted.en.transcribed.srt |
10 KB |
GreHack/GreHack 2019/GreHack 2019 Rump Session Access Granted.mp4 |
6.5 MB |
GreHack/GreHack 2019/GreHack 2019 Rump Session Aperi'Solved.mp4 |
5.7 MB |
GreHack/GreHack 2019/GreHack 2019 Rump Session Solving 'The Grid' In Three Different Ways.en.transcribed.srt |
8 KB |
GreHack/GreHack 2019/GreHack 2019 Rump Session Solving 'The Grid' In Three Different Ways.mp4 |
6.5 MB |
GreHack/GreHack 2019/GreHack 2019 The Rise Of Evil HID Devices - Franck Bitsch and Arthur Villeneuve.en.transcribed.srt |
38 KB |
GreHack/GreHack 2019/GreHack 2019 The Rise Of Evil HID Devices - Franck Bitsch and Arthur Villeneuve.mp4 |
34.3 MB |
GreHack/GreHack 2019/GreHack 2019 VBA For The Masses - Jonas Zaddach.en.transcribed.srt |
62 KB |
GreHack/GreHack 2019/GreHack 2019 VBA For The Masses - Jonas Zaddach.mp4 |
49.6 MB |
GreHack/GreHack 2019/GreHack 2019 Wombat, One More Bleichenbacher Attack TK - Olivier Levillain & Aina T. Rasoamanana.mp4 |
39.4 MB |
GreHack/GreHack 2020/GreHack 2020 Closing Speech - Jules Maselbas.mp4 |
960 KB |
GreHack/GreHack 2020/GreHack 2020 Lunch time interludes.mp4 |
200.8 MB |
GreHack/GreHack 2020/GreHack 2020 Short break - Musics by Confipop.mp4 |
78.5 MB |
GreHack/GreHack 2020/GreHack 2020 A full chained exploit from IT network to PLC’s unconstrained code execution.mp4 |
38.9 MB |
GreHack/GreHack 2020/GreHack 2020 Anti-debugging tricks for Cortex-M chips - Nicolas Oberli.mp4 |
35.3 MB |
GreHack/GreHack 2020/GreHack 2020 Discontinued Privacy - Mathieu Cunche and Guillaume Celosia.eng.srt |
54 KB |
GreHack/GreHack 2020/GreHack 2020 Discontinued Privacy - Mathieu Cunche and Guillaume Celosia.mp4 |
34.4 MB |
GreHack/GreHack 2020/GreHack 2020 No lightsaber is needed to break the Wookey - David Berard.mp4 |
45.7 MB |
GreHack/GreHack 2020/GreHack 2020 RF Shadow games - Sebastien Dudek.eng.srt |
46 KB |
GreHack/GreHack 2020/GreHack 2020 RF Shadow games - Sebastien Dudek.mp4 |
32.3 MB |
GreHack/GreHack 2020/GreHack 2020 Reverse Engineering archeology - Shlomi Oberman, Moshe Kol and Ariel Schön.mp4 |
42.3 MB |
GreHack/GreHack 2020/GreHack 2020 Sneak into buildings with KNXnet IP - Claire Vacherot.eng.srt |
37 KB |
GreHack/GreHack 2020/GreHack 2020 Sneak into buildings with KNXnet IP - Claire Vacherot.mp4 |
22.1 MB |
GreHack/GreHack 2020/GreHack 2020 The Great Hotel Hack - Etizaz Mohsin.mp4 |
11 MB |
GreHack/GreHack Logo.png |
19 KB |
GreHack/GreHack thank you.txt |
664 B |
GreHack/greHack logo.jpg |
23 KB |