Channel Avatar

Hacktivity - IT Security Festival @UC71Pa-YHA32hYPKTRjZgbXw@youtube.com

32K subscribers - no pronouns :c

The IT Security Festival - Free late night party - Wargame,


37:38
#Hacktivity2022 // Sisyphus and the CVE Feed... by Keziah Plattner & Kadia Mashal
42:52
#Hacktivity2022 // Hacking AppLocker Cache by Grzegorz Tworek
21:20
#Hacktivity2022 // A GREAT Sewing Workshop by Pierre Delcher
38:35
#Hacktivity2022 // Spin That Steering Wheel by Domokos Nagy
17:23
#Hacktivity2022 // Security Assesment of Embedded Firewalls - a Case Study by Csongor Ferenczi
38:05
#Hacktivity2022 // Pwned in Space by Paul Coggin
44:02
#Hacktivity2022 // Web3 + Scams = It's a Match! by Zoltán Balázs
50:05
#Hacktivity2022 // Bug Bounty és Responsible Disclosure a Változó Kibertér Árnyékában - Kerekasztal
37:37
#Hacktivity2022 // Automating Binary Analysis with Ghidra's P-Code by Gergely Révay
21:34
#Hacktivity2022 // A New Default Value of OpenSSL could Multiply a DoS Potential by Szilárd Pfeiffer
41:43
#Hacktivity2022 // DiceyF Deploys the GamePlayerFramework by Kurt Baumgartner & Georgy Kucherin
41:16
#Hacktivity2022 // From Red to Black and Beyond... by Albert Zsigovits & Robert Neumann
20:38
#Hacktivity2022 // Developer in a Digital Crosshair, 2022 Edition by Mateusz Olejarka
46:33
#Hacktivity2022 // Practical EDR Bypass Methods in 2022 by István Tóth
41:01
#Hacktivity2022 // How to Kickstart a Security Program? by Ottucsák József
17:05
#Hacktivity2022 // How Instantly Upgrade Your Legay Code in Minutes? by Tomas Votruba
20:24
#Hacktivity2022 // What are We Missing in Web Applications? by Mirza Burhan Baig
36:53
#Hacktivity2022 // Making Sense of Firmware Images - The Journey... by Márton Illés
19:13
#Hacktivity2022 // Security in IoT – the Investigation of Bluetooth Low Energy by János Kepics
23:07
#Hacktivity2022 // Fuzzing Trusted Applications in OP-TEE via Shared Memory by Roland Nagy
30:17
#Hacktivity2022 // Cybersecurity Cannot Ignore Climate Change by Chloé Messdaghi
38:33
#Hacktivity2022 // Automotive Threat Intelligence... by Péter Venesz & Giuseppe Serio
22:19
#Hacktivity2022 // Metaverse (in)Security by Ali Abdollahi
29:37
#Hacktivity2022 // The Great Hospital Hack !! by Mirza Burhan Baig
28:49
#Hacktivity2020 // Working with proof key for code exch. to comm. with the cloud by Milecia McGregor
40:01
#Hacktivity2020 // Speeding Up Linux Disk Encryption by Ignat Korchagin
18:09
#Hacktivity2020 // Paste Wars: fighting for copypaste freedom by Ignat Korchagin
34:46
#Hacktivity2020 // The 5G Battle by Róbert Moody and Bence Horváth
20:58
#Hacktivity2020 // DevSecOps in the Financial Services Industry by Stéphane Chmielewski
36:43
#Hacktivity2020 // Hacking Facial Recognition Systems by Alexander Polyakov
46:44
#Hacktivity2020 // Anatomy of Automated Account Takeovers by Tal Eliyahu & Begum Calguner
40:53
#Hacktivity2020 // State of the Art Phishing by Six
36:07
#Hacktivity2020 // Service Mess to Service Mesh by Rob Richardson
40:03
#Hacktivity2020 // Hacking the Hacktivity 2019 badge by Valerio Di Giampetro
14:35
#Hacktivity2020 // Stuxnet Attack by Dr. Mo Ashouri
46:24
#Hacktivity2020 // ATTPwn: Adversary Emulation. ATT&CK Automation by Pablo González & Fran Ramírez
18:57
#Hacktivity2020 // Making developers security aware. Lessons learnt. by Mateusz Olejarka
39:06
#Hacktivity2020 // Penetration testing VoIP UC nowadays by Moritz Abrell
14:17
#Hacktivity2020 // Blue Team Over The Air by Besim Altinok
30:13
#Hacktivity2020 // Infra security automation in CI/CD: impossible is nothing. 2/2 by Spyros Manglis
11:06
#Hacktivity2020 // Infra security automation in CI/CD: impossible is nothing. 1/2 by Davide Cioccia
39:32
#Hacktivity2020 // XPC exploitation by Csaba Fitzl
19:56
#Hacktivity2020 // The Great Hotel Hack: Adventures in attacking hospitality industry. Etizaz Mohsin
23:40
#Hacktivity2020 // China's cheap Xiaomis are low on privacy by Cirlig Gabriel
33:59
#Hacktivity2020 // How Soft Skills Get Hard Results by Scott Asai
32:51
#Hacktivity2020 // Revisiting a Wireless Alarm System by Matthias Deeg
40:21
#Hacktivity2020 // Dissectiong and Comparing Different Binaries to Malware Analysis by Filipi Pires
45:20
#Hacktivity2020 // Broken IoT Supply Chain by Martin Hron
27:50
#Hacktivity2020 // Machine Learning Evasion Competition by Zoltán Balázs
42:31
#Hacktivity2020 // Reversing Golang Binaries with Ghidra by Dorka Palotay and Albert Zsigovits
23:47
#Hacktivity2020 // My wife is watching me: The spy inside all of us. by Eddy Willems
17:57
#Hacktivity2020 // Distributed Fuzzing with k8s by Anto Joseph
18:59
#Hacktivity2020 // Bring your own demise. The corporate threat of mobile endpoints by János Pallagi
37:17
#Hacktivity2020 // Perception vs Reality by Piotr Pobereźny
02:59
#Hacktivity2022 NOW+NEXT - Summary of the 19th Edition // 6-7 October 2022
02:16
#Hacktivity2021 - Summary of the 18th Edition // 8 October 2021
34:58
Dave Lewis - Sharks Petrol These Waters / Keynote Presentation
24:21
Dávid Török - My Adventures in Disabling Intel ME 12
37:05
Inbar Raz - Under Pressure: Real World Damage with TPMS Spoofing
40:45
Francisco Ramirez - GANs and Roses: Weaponizing the CEO Scam Fraud with AI and Autoencoders