TorBT - Torrents and Magnet Links Search Engine

No Hat

File Name
Size
HEADER.md
861 B
No Hat logo.png
46 kB
No Hat thank you.txt
1.2 kB
No Hat 2019/Alexandre Borges - Advanced Malware Threats.mp4
27 MB
No Hat 2019/Andrea Barisani - USB Armory Reloaded.mp4
28 MB
No Hat 2019/Carola Frediani - Devil is in the details.mp4
27 MB
No Hat 2019/Daniel Gruss - Microarchitectural Attacks.mp4
32 MB
No Hat 2019/Federico Maggi - Radio and Hardware Security Testing for Human Beings.mp4
27 MB
No Hat 2019/Marco Balduzzi - Closing.mp4
4.0 MB
No Hat 2019/Marco Balduzzi - Welcome.mp4
6.5 MB
No Hat 2019/Marco Squarcina - Hack the ___ Conquering Flags on the World's Stage.mp4
36 MB
No Hat 2019/Stefano Chiccarelli - Stories from the Underground, The Italian Way.mp4
30 MB
No Hat 2019/Stefano Zanero - Securing Cyber-Physical Systems Moving Beyond Fear.mp4
22 MB
No Hat 2019/No Hat 2019 captions/Alexandre Borges - Advanced Malware Threats.eng.srt
43 kB
No Hat 2019/No Hat 2019 captions/Andrea Barisani - USB Armory Reloaded.eng.srt
73 kB
No Hat 2019/No Hat 2019 captions/Carola Frediani - Devil is in the details.eng.srt
49 kB
No Hat 2019/No Hat 2019 captions/Daniel Gruss - Microarchitectural Attacks.eng.srt
85 kB
No Hat 2019/No Hat 2019 captions/Federico Maggi - Radio and Hardware Security Testing for Human Beings.eng.srt
72 kB
No Hat 2019/No Hat 2019 captions/Marco Balduzzi - Closing.eng.srt
7.9 kB
No Hat 2019/No Hat 2019 captions/Marco Balduzzi - Welcome.eng.srt
18 kB
No Hat 2019/No Hat 2019 captions/Marco Squarcina - Hack the ___ Conquering Flags on the World's Stage.eng.srt
68 kB
No Hat 2019/No Hat 2019 captions/Stefano Chiccarelli - Stories from the Underground, The Italian Way.eng.srt
78 kB
No Hat 2019/No Hat 2019 captions/Stefano Zanero - Securing Cyber-Physical Systems Moving Beyond Fear.eng.srt
46 kB
No Hat 2020/Alexander Ermolov & Dmitriy Frolov - Exploiting vulnerabilities in Intel ACMs.mp4
22 MB
No Hat 2020/Andrea Continella - Identifying multi-binary vulnerabilities in embedded firmware.mp4
25 MB
No Hat 2020/Avinash Sudhodanan - Cross-Origin State Inference Attacks Leaking Web Site States.mp4
26 MB
No Hat 2020/Axelle Apvrille - Medical Malware on Android.mp4
45 MB
No Hat 2020/Eran Shimony - 60 CVEs in 60 Days.mp4
20 MB
No Hat 2020/Filippo Cremonese - CRISPR - Binary Editing with High Level Languages.mp4
28 MB
No Hat 2020/Fran Ramirez & Pablo Gonzalez - Weaponizing the Scam fraud with AI and Autoencoders.mp4
21 MB
No Hat 2020/Marco Balduzzi - Closing.mp4
4.1 MB
No Hat 2020/Marco Balduzzi - Opening.mp4
10 MB
No Hat 2020/Michele Orru & Giuseppe Trotta - As it would be Sampei for you too.mp4
35 MB
No Hat 2020/Saumil Shah - Humans in Cyberspace.mp4
48 MB
No Hat 2020/No Hat 2020 captions/Alexander Ermolov & Dmitriy Frolov - Exploiting vulnerabilities in Intel ACMs.eng.srt
48 kB
No Hat 2020/No Hat 2020 captions/Andrea Continella - Identifying multi-binary vulnerabilities in embedded firmware.eng.srt
68 kB
No Hat 2020/No Hat 2020 captions/Avinash Sudhodanan - Cross-Origin State Inference Attacks Leaking Web Site States.eng.srt
86 kB
No Hat 2020/No Hat 2020 captions/Axelle Apvrille - Medical Malware on Android.eng.srt
71 kB
No Hat 2020/No Hat 2020 captions/Eran Shimony - 60 CVEs in 60 Days.eng.srt
74 kB
No Hat 2020/No Hat 2020 captions/Filippo Cremonese - CRISPR - Binary Editing with High Level Languages.eng.srt
70 kB
No Hat 2020/No Hat 2020 captions/Fran Ramirez & Pablo Gonzalez - Weaponizing the Scam fraud with AI and Autoencoders.eng.srt
37 kB
No Hat 2020/No Hat 2020 captions/Marco Balduzzi - Closing.eng.srt
12 kB
No Hat 2020/No Hat 2020 captions/Marco Balduzzi - Opening.eng.srt
30 kB
No Hat 2020/No Hat 2020 captions/Michele Orru & Giuseppe Trotta - As it would be Sampei for you too.eng.srt
50 kB
No Hat 2020/No Hat 2020 captions/Saumil Shah - Humans in Cyberspace.eng.srt
112 kB
No Hat 2021/D. D'Elia & L. Invidia - Too diluted to be seen covert distribution of a malware.mp4
20 MB
No Hat 2021/Daniel Kapellmann Zafra - Honey, they hacked the kitchen attacks on critical and.mp4
26 MB
No Hat 2021/David Calligaris - The Infinite Game of Vulnerability Research.mp4
20 MB
No Hat 2021/F. Yamaguchi & C. Ursache - Ghidra2cpg From graph queries to vulnerabilities in.mp4
29 MB
No Hat 2021/Gabi Cirlig - Alibaba and Xiaomi the downward spiral of surveillance capitalism.mp4
16 MB
No Hat 2021/LimitedResults - The Quest of the Geckos.mp4
18 MB
No Hat 2021/Marco Balduzzi - Closing.mp4
6.8 MB
No Hat 2021/Marco Balduzzi - Opening.mp4
7.2 MB
No Hat 2021/Mathias Payer - Fuzzing for profit from crashes to vulnerabilities.mp4
25 MB
No Hat 2021/Sébastien Dudek - Bug hunting in 5G-NR devices and networks.mp4
31 MB
No Hat 2021/Wrap Up.mp4
13 MB
No Hat 2021/No Hat 2021 captions/D. D'Elia & L. Invidia - Too diluted to be seen covert distribution of a malware.eng.srt
55 kB
No Hat 2021/No Hat 2021 captions/Daniel Kapellmann Zafra - Honey, they hacked the kitchen attacks on critical and.eng.srt
80 kB
No Hat 2021/No Hat 2021 captions/David Calligaris - The Infinite Game of Vulnerability Research.eng.srt
55 kB
No Hat 2021/No Hat 2021 captions/F. Yamaguchi & C. Ursache - Ghidra2cpg From graph queries to vulnerabilities in.eng.srt
80 kB
No Hat 2021/No Hat 2021 captions/Gabi Cirlig - Alibaba and Xiaomi the downward spiral of surveillance capitalism.eng.srt
41 kB
No Hat 2021/No Hat 2021 captions/LimitedResults - The Quest of the Geckos.eng.json
1.1 MB
No Hat 2021/No Hat 2021 captions/LimitedResults - The Quest of the Geckos.eng.lrc
28 kB
No Hat 2021/No Hat 2021 captions/LimitedResults - The Quest of the Geckos.eng.srt
30 kB
No Hat 2021/No Hat 2021 captions/LimitedResults - The Quest of the Geckos.eng.text
20 kB
No Hat 2021/No Hat 2021 captions/LimitedResults - The Quest of the Geckos.eng.tsv
24 kB
No Hat 2021/No Hat 2021 captions/LimitedResults - The Quest of the Geckos.eng.txt
28 kB
No Hat 2021/No Hat 2021 captions/LimitedResults - The Quest of the Geckos.eng.vtt
27 kB
No Hat 2021/No Hat 2021 captions/Marco Balduzzi - Closing.eng.srt
6.6 kB
No Hat 2021/No Hat 2021 captions/Marco Balduzzi - Opening.eng.srt
19 kB
No Hat 2021/No Hat 2021 captions/Mathias Payer - Fuzzing for profit from crashes to vulnerabilities.eng.srt
71 kB
No Hat 2021/No Hat 2021 captions/Sébastien Dudek - Bug hunting in 5G-NR devices and networks.eng.srt
88 kB
No Hat 2021/No Hat 2021 captions/Wrap Up.eng.srt
2.4 kB
No Hat 2022/Alex Matrosov - [Keynote] The Evolution of Firmware Threats Attacks below the OS.mp4
32 MB
No Hat 2022/Andrea Palanca - Mind the Gap Smashing BMCs for Fun and OT Networks.mp4
34 MB
No Hat 2022/Cristofaro Mune - Glitching Devices for Code Execution.mp4
32 MB
No Hat 2022/F. Ramirez & P. Gonzalez - The - Open Machine Learning Application Security Project.mp4
36 MB
No Hat 2022/Giovanni Vigna - [Keynote] Take the Money and Run Decentralized Finance and the.mp4
33 MB
No Hat 2022/Jonathan Leitschuh - Scaling the Security Researcher to Eliminate OSS Vuln.mp4
40 MB
No Hat 2022/Jos Wetzels - OTICEFALL - Revisiting a Decade of OT Insecure-by-Design Practices.mp4
41 MB
No Hat 2022/Luca Carettoni - Web Security in 2022 - New Techniques, New Vulnerabilities and.mp4
39 MB
No Hat 2022/Marco Balduzzi - Opening.mp4
8.9 MB
No Hat 2022/Mohamad Mokbel - Crawlector A Threat Hunting Framework.mp4
46 MB
No Hat 2022/Wrap Up - By Night.mp4
4.3 MB
No Hat 2022/Wrap Up - Extended.mp4
15 MB
No Hat 2022/Wrap Up - Short.mp4
3.5 MB
No Hat 2022/No Hat 2022 captions/Alex Matrosov - [Keynote] The Evolution of Firmware Threats Attacks below the OS.eng.srt
68 kB
No Hat 2022/No Hat 2022 captions/Andrea Palanca - Mind the Gap Smashing BMCs for Fun and OT Networks.eng.srt
57 kB
No Hat 2022/No Hat 2022 captions/Cristofaro Mune - Glitching Devices for Code Execution.eng.srt
68 kB
No Hat 2022/No Hat 2022 captions/F. Ramirez & P. Gonzalez - The - Open Machine Learning Application Security Project.eng.srt
62 kB
No Hat 2022/No Hat 2022 captions/Giovanni Vigna - [Keynote] Take the Money and Run Decentralized Finance and the.eng.srt
62 kB
No Hat 2022/No Hat 2022 captions/Jonathan Leitschuh - Scaling the Security Researcher to Eliminate OSS Vuln.eng.srt
76 kB
No Hat 2022/No Hat 2022 captions/Jos Wetzels - OTICEFALL - Revisiting a Decade of OT Insecure-by-Design Practices.eng.srt
79 kB
No Hat 2022/No Hat 2022 captions/Luca Carettoni - Web Security in 2022 - New Techniques, New Vulnerabilities and.eng.srt
63 kB
No Hat 2022/No Hat 2022 captions/Marco Balduzzi - Opening.eng.srt
17 kB
No Hat 2022/No Hat 2022 captions/Mohamad Mokbel - Crawlector A Threat Hunting Framework.eng.srt
75 kB
No Hat 2022/No Hat 2022 captions/Wrap Up - By Night.eng.srt
1.9 kB
No Hat 2022/No Hat 2022 captions/Wrap Up - Extended.eng.srt
3.4 kB
No Hat 2022/No Hat 2022 captions/Wrap Up - Short.eng.json
957 B
No Hat 2022/No Hat 2022 captions/Wrap Up - Short.eng.lrc
37 B
No Hat 2022/No Hat 2022 captions/Wrap Up - Short.eng.srt
47 B
No Hat 2022/No Hat 2022 captions/Wrap Up - Short.eng.text
11 B
No Hat 2022/No Hat 2022 captions/Wrap Up - Short.eng.tsv
39 B
No Hat 2022/No Hat 2022 captions/Wrap Up - Short.eng.txt
38 B
No Hat 2022/No Hat 2022 captions/Wrap Up - Short.eng.vtt
48 B
No Hat 2023/Alessandro Magnosi - The Dark Side of the Moon Advancing System Call Obfuscation.mp4
38 MB
No Hat 2023/Andrea Continella - Toward automated analysis and patching of memory corruption.mp4
34 MB
No Hat 2023/Andrea Palanca - Codename I11USION Eleven Practical Ways to Pwn Browser Based.mp4
37 MB
No Hat 2023/Herbert Bos - [Keynote] The Truth About Threats.mp4
37 MB
No Hat 2023/Jacob Torrey - [Keynote] Talking about Pros and Cons.mp4
36 MB
No Hat 2023/M. Cheng & D. Chen - Abusing Active Directory Configuration and Implementing.mp4
56 MB
No Hat 2023/Marco Balduzzi - Opening.mp4
8.4 MB
No Hat 2023/mHACKeroni - [Keynote] mHACKeroni's Recipe for Hacking Satellites (and Winning).mp4
23 MB
No Hat 2023/Moritz Abrell - Zero-Touch-Pwn Abusing Zoom's Zero Touch Provisioning for.mp4
28 MB
No Hat 2023/Richard Johnson - Fuzzing The Age of Vulnerability Discovery.mp4
33 MB
No Hat 2023/No Hat 2023 captions/Alessandro Magnosi - The Dark Side of the Moon Advancing System Call Obfuscation.eng.srt
76 kB
No Hat 2023/No Hat 2023 captions/Andrea Continella - Toward automated analysis and patching of memory corruption.eng.srt
74 kB
No Hat 2023/No Hat 2023 captions/Andrea Palanca - Codename I11USION Eleven Practical Ways to Pwn Browser Based.eng.srt
66 kB
No Hat 2023/No Hat 2023 captions/Herbert Bos - [Keynote] The Truth About Threats.eng.srt
71 kB
No Hat 2023/No Hat 2023 captions/Jacob Torrey - [Keynote] Talking about Pros and Cons.eng.srt
71 kB
No Hat 2023/No Hat 2023 captions/M. Cheng & D. Chen - Abusing Active Directory Configuration and Implementing.eng.srt
80 kB
No Hat 2023/No Hat 2023 captions/Marco Balduzzi - Opening.eng.srt
19 kB
No Hat 2023/No Hat 2023 captions/mHACKeroni - [Keynote] mHACKeroni's Recipe for Hacking Satellites (and Winning).eng.srt
38 kB
No Hat 2023/No Hat 2023 captions/Moritz Abrell - Zero-Touch-Pwn Abusing Zoom's Zero Touch Provisioning for.eng.srt
54 kB
No Hat 2023/No Hat 2023 captions/Richard Johnson - Fuzzing The Age of Vulnerability Discovery.eng.srt
65 kB
No Hat 2024/A. Schaal & M. Virus - Our Time in a Product Review Cabal And the malware and.mp4
47 MB
No Hat 2024/Alessandro Fausto - Not the Drones You're Looking For.mp4
34 MB
No Hat 2024/Andrea Allievi - [Keynote] Modern Mitigations in Windows OS Enhancing Security.mp4
41 MB
No Hat 2024/David El - Behind the Cheats A Tale About the Greedy Cheat Developer.mp4
35 MB
No Hat 2024/Dimitrios Valsamaras - My other ClassLoader is your ClassLoader Creating evil.mp4
34 MB
No Hat 2024/E. Agavriloae & M. Josephs - AWS CloudQuarry Searching for secrets in public AMIs.mp4
35 MB
No Hat 2024/Francesco Minetti - A Methodology for Web Cache Deception Vulnerability discovery.mp4
35 MB
No Hat 2024/Jacopo Jannone - Exploring and Exploiting an Android Smart POS Payment Terminal.mp4
41 MB
No Hat 2024/M. Salvati & D. McInerney - LLMs for Vulnerability Discovery finding 0days at.mp4
42 MB
No Hat 2024/Marco Balduzzi - Opening.mp4
11 MB
No Hat 2024/Philipp Mao - Exploiting Android's Hardened Memory Allocator.mp4
39 MB
No Hat 2024/Stiv Kupchik - Call & Register Relay attack on WinReg RPC client.mp4
33 MB
No Hat 2024/Viktor Chuchurski - A Race to the Bottom - Database Transactions Undermining Your.mp4
30 MB
No Hat 2024/Wojciech Reguła - Broken isolation - draining your credentials from popular macOS.mp4
44 MB
No Hat 2024/No Hat 2024 captions/A. Schaal & M. Virus - Our Time in a Product Review Cabal And the malware and.eng.srt
73 kB
No Hat 2024/No Hat 2024 captions/Alessandro Fausto - Not the Drones You're Looking For.eng.srt
32 kB
No Hat 2024/No Hat 2024 captions/Andrea Allievi - [Keynote] Modern Mitigations in Windows OS Enhancing Security.eng.srt
54 kB
No Hat 2024/No Hat 2024 captions/David El - Behind the Cheats A Tale About the Greedy Cheat Developer.eng.srt
58 kB
No Hat 2024/No Hat 2024 captions/Dimitrios Valsamaras - My other ClassLoader is your ClassLoader Creating evil.eng.srt
57 kB
No Hat 2024/No Hat 2024 captions/E. Agavriloae & M. Josephs - AWS CloudQuarry Searching for secrets in public AMIs.eng.srt
60 kB
No Hat 2024/No Hat 2024 captions/Francesco Minetti - A Methodology for Web Cache Deception Vulnerability discovery.eng.srt
54 kB
No Hat 2024/No Hat 2024 captions/Jacopo Jannone - Exploring and Exploiting an Android Smart POS Payment Terminal.eng.srt
78 kB
No Hat 2024/No Hat 2024 captions/M. Salvati & D. McInerney - LLMs for Vulnerability Discovery finding 0days at.eng.srt
68 kB
No Hat 2024/No Hat 2024 captions/Marco Balduzzi - Opening.eng.srt
17 kB
No Hat 2024/No Hat 2024 captions/Philipp Mao - Exploiting Android's Hardened Memory Allocator.eng.srt
73 kB
No Hat 2024/No Hat 2024 captions/Stiv Kupchik - Call & Register Relay attack on WinReg RPC client.eng.srt
61 kB
No Hat 2024/No Hat 2024 captions/Viktor Chuchurski - A Race to the Bottom - Database Transactions Undermining Your.eng.srt
75 kB
No Hat 2024/No Hat 2024 captions/Wojciech Reguła - Broken isolation - draining your credentials from popular macOS.eng.srt
71 kB
No Hat 2025/E. Pennucci, A. Repola - Go with the (net)flow a tale of fixing ML-based network.mp4
16 MB
No Hat 2025/Efstratios Chatzoglou - Unmasking Credential Leaks A Security Evaluation of.mp4
18 MB
No Hat 2025/Federico Maggi - [Keynote] Secure AI Starts with Solid Compute Foundations.mp4
27 MB
No Hat 2025/G. André, W. Bécard - NTLM reflection is dead, long live NTLM reflection Story of.mp4
22 MB
No Hat 2025/Gaetano Pellegrino - Every Domain Tells a Story Automatic Attribution from Timelines.mp4
20 MB
No Hat 2025/Ignacio Navarro- Oops, I Hacked It Again Tales and disclosures.mp4
16 MB
No Hat 2025/Jr-Wei Huang - PS C Live Off the .NET Gadgets Defeating Super Hat’s VM Caching.mp4
27 MB
No Hat 2025/Katie Moussouris - [Keynote] No pAIn, No gAIn How AI Will Hurt Bug Bounty Hunters.mp4
20 MB
No Hat 2025/Ken Munro - All at sea. Thought your OT - IT infrastructure was complex Try doing.mp4
23 MB
No Hat 2025/Marco Balduzzi - Opening.mp4
6.3 MB
No Hat 2025/Maria Khodak - Be Not Afraid AppSec Solutions for ML Vulnerabilities.mp4
17 MB
No Hat 2025/Maria Khodak - Poison in the Wires Interactive Network Visualization of Data.mp4
17 MB
No Hat 2025/Matthias Deeg - Your Security Update is Not Secure Enough Hacking Portable.mp4
23 MB
No Hat 2025/Paul Zenker - Antedating Bananas Don't Matter State of GenAI Security Solutions.mp4
17 MB
No Hat 2025/Y. Jia, X. Lei - DarkKiller A QEMU KVM Black Box Escape via Virtio Devices.mp4
23 MB
No Hat 2025/No Hat 2025 captions/E. Pennucci, A. Repola - Go with the (net)flow a tale of fixing ML-based network.eng.json
1.3 MB
No Hat 2025/No Hat 2025 captions/E. Pennucci, A. Repola - Go with the (net)flow a tale of fixing ML-based network.eng.lrc
31 kB
No Hat 2025/No Hat 2025 captions/E. Pennucci, A. Repola - Go with the (net)flow a tale of fixing ML-based network.eng.srt
34 kB
No Hat 2025/No Hat 2025 captions/E. Pennucci, A. Repola - Go with the (net)flow a tale of fixing ML-based network.eng.text
25 kB
No Hat 2025/No Hat 2025 captions/E. Pennucci, A. Repola - Go with the (net)flow a tale of fixing ML-based network.eng.tsv
28 kB
No Hat 2025/No Hat 2025 captions/E. Pennucci, A. Repola - Go with the (net)flow a tale of fixing ML-based network.eng.txt
32 kB
No Hat 2025/No Hat 2025 captions/E. Pennucci, A. Repola - Go with the (net)flow a tale of fixing ML-based network.eng.vtt
32 kB
No Hat 2025/No Hat 2025 captions/Efstratios Chatzoglou - Unmasking Credential Leaks A Security Evaluation of.eng.json
1.0 MB
No Hat 2025/No Hat 2025 captions/Efstratios Chatzoglou - Unmasking Credential Leaks A Security Evaluation of.eng.lrc
26 kB
No Hat 2025/No Hat 2025 captions/Efstratios Chatzoglou - Unmasking Credential Leaks A Security Evaluation of.eng.srt
28 kB
No Hat 2025/No Hat 2025 captions/Efstratios Chatzoglou - Unmasking Credential Leaks A Security Evaluation of.eng.text
20 kB
No Hat 2025/No Hat 2025 captions/Efstratios Chatzoglou - Unmasking Credential Leaks A Security Evaluation of.eng.tsv
24 kB
No Hat 2025/No Hat 2025 captions/Efstratios Chatzoglou - Unmasking Credential Leaks A Security Evaluation of.eng.txt
26 kB
No Hat 2025/No Hat 2025 captions/Efstratios Chatzoglou - Unmasking Credential Leaks A Security Evaluation of.eng.vtt
26 kB
No Hat 2025/No Hat 2025 captions/Federico Maggi - [Keynote] Secure AI Starts with Solid Compute Foundations.eng.json
1.5 MB
No Hat 2025/No Hat 2025 captions/Federico Maggi - [Keynote] Secure AI Starts with Solid Compute Foundations.eng.lrc
40 kB
No Hat 2025/No Hat 2025 captions/Federico Maggi - [Keynote] Secure AI Starts with Solid Compute Foundations.eng.srt
45 kB
No Hat 2025/No Hat 2025 captions/Federico Maggi - [Keynote] Secure AI Starts with Solid Compute Foundations.eng.text
31 kB
No Hat 2025/No Hat 2025 captions/Federico Maggi - [Keynote] Secure AI Starts with Solid Compute Foundations.eng.tsv
36 kB
No Hat 2025/No Hat 2025 captions/Federico Maggi - [Keynote] Secure AI Starts with Solid Compute Foundations.eng.txt
41 kB
No Hat 2025/No Hat 2025 captions/Federico Maggi - [Keynote] Secure AI Starts with Solid Compute Foundations.eng.vtt
41 kB
No Hat 2025/No Hat 2025 captions/G. André, W. Bécard - NTLM reflection is dead, long live NTLM reflection Story of.eng.json
1.5 MB
No Hat 2025/No Hat 2025 captions/G. André, W. Bécard - NTLM reflection is dead, long live NTLM reflection Story of.eng.lrc
36 kB
No Hat 2025/No Hat 2025 captions/G. André, W. Bécard - NTLM reflection is dead, long live NTLM reflection Story of.eng.srt
40 kB
No Hat 2025/No Hat 2025 captions/G. André, W. Bécard - NTLM reflection is dead, long live NTLM reflection Story of.eng.text
28 kB
No Hat 2025/No Hat 2025 captions/G. André, W. Bécard - NTLM reflection is dead, long live NTLM reflection Story of.eng.tsv
33 kB
No Hat 2025/No Hat 2025 captions/G. André, W. Bécard - NTLM reflection is dead, long live NTLM reflection Story of.eng.txt
37 kB
No Hat 2025/No Hat 2025 captions/G. André, W. Bécard - NTLM reflection is dead, long live NTLM reflection Story of.eng.vtt
37 kB
No Hat 2025/No Hat 2025 captions/Gaetano Pellegrino - Every Domain Tells a Story Automatic Attribution from Timelines.eng.json
1.3 MB
No Hat 2025/No Hat 2025 captions/Gaetano Pellegrino - Every Domain Tells a Story Automatic Attribution from Timelines.eng.lrc
35 kB
No Hat 2025/No Hat 2025 captions/Gaetano Pellegrino - Every Domain Tells a Story Automatic Attribution from Timelines.eng.srt
39 kB
No Hat 2025/No Hat 2025 captions/Gaetano Pellegrino - Every Domain Tells a Story Automatic Attribution from Timelines.eng.text
27 kB
No Hat 2025/No Hat 2025 captions/Gaetano Pellegrino - Every Domain Tells a Story Automatic Attribution from Timelines.eng.tsv
32 kB
No Hat 2025/No Hat 2025 captions/Gaetano Pellegrino - Every Domain Tells a Story Automatic Attribution from Timelines.eng.txt
36 kB
No Hat 2025/No Hat 2025 captions/Gaetano Pellegrino - Every Domain Tells a Story Automatic Attribution from Timelines.eng.vtt
36 kB
No Hat 2025/No Hat 2025 captions/Ignacio Navarro- Oops, I Hacked It Again Tales and disclosures.eng.json
1.6 MB
No Hat 2025/No Hat 2025 captions/Ignacio Navarro- Oops, I Hacked It Again Tales and disclosures.eng.lrc
39 kB
No Hat 2025/No Hat 2025 captions/Ignacio Navarro- Oops, I Hacked It Again Tales and disclosures.eng.srt
44 kB
No Hat 2025/No Hat 2025 captions/Ignacio Navarro- Oops, I Hacked It Again Tales and disclosures.eng.text
27 kB
No Hat 2025/No Hat 2025 captions/Ignacio Navarro- Oops, I Hacked It Again Tales and disclosures.eng.tsv
34 kB
No Hat 2025/No Hat 2025 captions/Ignacio Navarro- Oops, I Hacked It Again Tales and disclosures.eng.txt
40 kB
No Hat 2025/No Hat 2025 captions/Ignacio Navarro- Oops, I Hacked It Again Tales and disclosures.eng.vtt
40 kB
No Hat 2025/No Hat 2025 captions/Jr-Wei Huang - PS C Live Off the .NET Gadgets Defeating Super Hat’s VM Caching.eng.json
1.3 MB
No Hat 2025/No Hat 2025 captions/Jr-Wei Huang - PS C Live Off the .NET Gadgets Defeating Super Hat’s VM Caching.eng.lrc
33 kB
No Hat 2025/No Hat 2025 captions/Jr-Wei Huang - PS C Live Off the .NET Gadgets Defeating Super Hat’s VM Caching.eng.srt
37 kB
No Hat 2025/No Hat 2025 captions/Jr-Wei Huang - PS C Live Off the .NET Gadgets Defeating Super Hat’s VM Caching.eng.text
25 kB
No Hat 2025/No Hat 2025 captions/Jr-Wei Huang - PS C Live Off the .NET Gadgets Defeating Super Hat’s VM Caching.eng.tsv
30 kB
No Hat 2025/No Hat 2025 captions/Jr-Wei Huang - PS C Live Off the .NET Gadgets Defeating Super Hat’s VM Caching.eng.txt
34 kB
No Hat 2025/No Hat 2025 captions/Jr-Wei Huang - PS C Live Off the .NET Gadgets Defeating Super Hat’s VM Caching.eng.vtt
34 kB
No Hat 2025/No Hat 2025 captions/Katie Moussouris - [Keynote] No pAIn, No gAIn How AI Will Hurt Bug Bounty Hunters.eng.json
1.4 MB
No Hat 2025/No Hat 2025 captions/Katie Moussouris - [Keynote] No pAIn, No gAIn How AI Will Hurt Bug Bounty Hunters.eng.lrc
35 kB
No Hat 2025/No Hat 2025 captions/Katie Moussouris - [Keynote] No pAIn, No gAIn How AI Will Hurt Bug Bounty Hunters.eng.srt
39 kB
No Hat 2025/No Hat 2025 captions/Katie Moussouris - [Keynote] No pAIn, No gAIn How AI Will Hurt Bug Bounty Hunters.eng.text
27 kB
No Hat 2025/No Hat 2025 captions/Katie Moussouris - [Keynote] No pAIn, No gAIn How AI Will Hurt Bug Bounty Hunters.eng.tsv
32 kB
No Hat 2025/No Hat 2025 captions/Katie Moussouris - [Keynote] No pAIn, No gAIn How AI Will Hurt Bug Bounty Hunters.eng.txt
36 kB
No Hat 2025/No Hat 2025 captions/Katie Moussouris - [Keynote] No pAIn, No gAIn How AI Will Hurt Bug Bounty Hunters.eng.vtt
36 kB
No Hat 2025/No Hat 2025 captions/Ken Munro - All at sea. Thought your OT - IT infrastructure was complex Try doing.eng.json
1.7 MB
No Hat 2025/No Hat 2025 captions/Ken Munro - All at sea. Thought your OT - IT infrastructure was complex Try doing.eng.lrc
49 kB
No Hat 2025/No Hat 2025 captions/Ken Munro - All at sea. Thought your OT - IT infrastructure was complex Try doing.eng.srt
57 kB
No Hat 2025/No Hat 2025 captions/Ken Munro - All at sea. Thought your OT - IT infrastructure was complex Try doing.eng.text
34 kB
No Hat 2025/No Hat 2025 captions/Ken Munro - All at sea. Thought your OT - IT infrastructure was complex Try doing.eng.tsv
43 kB
No Hat 2025/No Hat 2025 captions/Ken Munro - All at sea. Thought your OT - IT infrastructure was complex Try doing.eng.txt
50 kB
No Hat 2025/No Hat 2025 captions/Ken Munro - All at sea. Thought your OT - IT infrastructure was complex Try doing.eng.vtt
50 kB
No Hat 2025/No Hat 2025 captions/Marco Balduzzi - Opening.eng.json
478 kB
No Hat 2025/No Hat 2025 captions/Marco Balduzzi - Opening.eng.lrc
12 kB
No Hat 2025/No Hat 2025 captions/Marco Balduzzi - Opening.eng.srt
13 kB
No Hat 2025/No Hat 2025 captions/Marco Balduzzi - Opening.eng.text
8.3 kB
No Hat 2025/No Hat 2025 captions/Marco Balduzzi - Opening.eng.tsv
10 kB
No Hat 2025/No Hat 2025 captions/Marco Balduzzi - Opening.eng.txt
12 kB
No Hat 2025/No Hat 2025 captions/Marco Balduzzi - Opening.eng.vtt
12 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Be Not Afraid AppSec Solutions for ML Vulnerabilities.eng.json
987 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Be Not Afraid AppSec Solutions for ML Vulnerabilities.eng.lrc
27 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Be Not Afraid AppSec Solutions for ML Vulnerabilities.eng.srt
29 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Be Not Afraid AppSec Solutions for ML Vulnerabilities.eng.text
22 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Be Not Afraid AppSec Solutions for ML Vulnerabilities.eng.tsv
24 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Be Not Afraid AppSec Solutions for ML Vulnerabilities.eng.txt
27 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Be Not Afraid AppSec Solutions for ML Vulnerabilities.eng.vtt
27 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Poison in the Wires Interactive Network Visualization of Data.eng.json
1.1 MB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Poison in the Wires Interactive Network Visualization of Data.eng.lrc
29 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Poison in the Wires Interactive Network Visualization of Data.eng.srt
31 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Poison in the Wires Interactive Network Visualization of Data.eng.text
23 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Poison in the Wires Interactive Network Visualization of Data.eng.tsv
26 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Poison in the Wires Interactive Network Visualization of Data.eng.txt
29 kB
No Hat 2025/No Hat 2025 captions/Maria Khodak - Poison in the Wires Interactive Network Visualization of Data.eng.vtt
29 kB
No Hat 2025/No Hat 2025 captions/Matthias Deeg - Your Security Update is Not Secure Enough Hacking Portable.eng.json
1.4 MB
No Hat 2025/No Hat 2025 captions/Matthias Deeg - Your Security Update is Not Secure Enough Hacking Portable.eng.lrc
34 kB
No Hat 2025/No Hat 2025 captions/Matthias Deeg - Your Security Update is Not Secure Enough Hacking Portable.eng.srt
37 kB
No Hat 2025/No Hat 2025 captions/Matthias Deeg - Your Security Update is Not Secure Enough Hacking Portable.eng.text
27 kB
No Hat 2025/No Hat 2025 captions/Matthias Deeg - Your Security Update is Not Secure Enough Hacking Portable.eng.tsv
31 kB
No Hat 2025/No Hat 2025 captions/Matthias Deeg - Your Security Update is Not Secure Enough Hacking Portable.eng.txt
34 kB
No Hat 2025/No Hat 2025 captions/Matthias Deeg - Your Security Update is Not Secure Enough Hacking Portable.eng.vtt
34 kB
No Hat 2025/No Hat 2025 captions/Paul Zenker - Antedating Bananas Don't Matter State of GenAI Security Solutions.eng.json
1.3 MB
No Hat 2025/No Hat 2025 captions/Paul Zenker - Antedating Bananas Don't Matter State of GenAI Security Solutions.eng.lrc
30 kB
No Hat 2025/No Hat 2025 captions/Paul Zenker - Antedating Bananas Don't Matter State of GenAI Security Solutions.eng.srt
32 kB
No Hat 2025/No Hat 2025 captions/Paul Zenker - Antedating Bananas Don't Matter State of GenAI Security Solutions.eng.text
25 kB
No Hat 2025/No Hat 2025 captions/Paul Zenker - Antedating Bananas Don't Matter State of GenAI Security Solutions.eng.tsv
28 kB
No Hat 2025/No Hat 2025 captions/Paul Zenker - Antedating Bananas Don't Matter State of GenAI Security Solutions.eng.txt
30 kB
No Hat 2025/No Hat 2025 captions/Paul Zenker - Antedating Bananas Don't Matter State of GenAI Security Solutions.eng.vtt
30 kB
No Hat 2025/No Hat 2025 captions/Y. Jia, X. Lei - DarkKiller A QEMU KVM Black Box Escape via Virtio Devices.eng.json
1005 kB
No Hat 2025/No Hat 2025 captions/Y. Jia, X. Lei - DarkKiller A QEMU KVM Black Box Escape via Virtio Devices.eng.lrc
26 kB
No Hat 2025/No Hat 2025 captions/Y. Jia, X. Lei - DarkKiller A QEMU KVM Black Box Escape via Virtio Devices.eng.srt
29 kB
No Hat 2025/No Hat 2025 captions/Y. Jia, X. Lei - DarkKiller A QEMU KVM Black Box Escape via Virtio Devices.eng.text
21 kB
No Hat 2025/No Hat 2025 captions/Y. Jia, X. Lei - DarkKiller A QEMU KVM Black Box Escape via Virtio Devices.eng.tsv
24 kB
No Hat 2025/No Hat 2025 captions/Y. Jia, X. Lei - DarkKiller A QEMU KVM Black Box Escape via Virtio Devices.eng.txt
27 kB
No Hat 2025/No Hat 2025 captions/Y. Jia, X. Lei - DarkKiller A QEMU KVM Black Box Escape via Virtio Devices.eng.vtt
27 kB
Road To No Hat 2022/Bergamo - Alessandro Bertoldi - Tsurikichi Sanpei (il patito del phishing).mp4
30 MB
Road To No Hat 2022/Bergamo - Giovanni Rocca - Challenges and complexities of weaponizing.mp4
25 MB
Road To No Hat 2022/Torino - Mario Del Gaudio - Obfuscation and other software White Boxes.mp4
29 MB
Road To No Hat 2022/Torino - Mattia Coffetti - L’OSINT applicato all’ analisi delle infrastrutture.mp4
38 MB
Road To No Hat 2022/Road To No Hat 2022 captions/Bergamo - Alessandro Bertoldi - Tsurikichi Sanpei (il patito del phishing).eng.srt
57 kB
Road To No Hat 2022/Road To No Hat 2022 captions/Bergamo - Giovanni Rocca - Challenges and complexities of weaponizing.eng.srt
36 kB
Road To No Hat 2022/Road To No Hat 2022 captions/Torino - Mario Del Gaudio - Obfuscation and other software White Boxes.eng.srt
37 kB
Road To No Hat 2022/Road To No Hat 2022 captions/Torino - Mattia Coffetti - L’OSINT applicato all’ analisi delle infrastrutture.eng.srt
60 kB