ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,077 results

Asso HZV
leHACK 2024 - REVOLUTION!!!

Welcome to leHACK - Revolution 2.0 leHACK website: https://www.lehack.org leHACK's twitter: https://twitter.com/_lehack_ ...

6:58
leHACK 2024 - REVOLUTION!!!

1,401 views

1 year ago

Asso HZV
🇬🇧 Dissecting and Comparing different Binaries to Malware Analysis   Filipi Pires

Demonstrate different kind of structures in the binaries as a PE (header and your sessions) , ELF (header and your sessions), ...

58:34
🇬🇧 Dissecting and Comparing different Binaries to Malware Analysis Filipi Pires

824 views

3 years ago

Asso HZV
Inside Black Hat: Defending One of the ‘Most Hostile Networks in the World’ - Grifter 🇬🇧

The network at Black Hat is like no other network in the world. On an average network defenders spend most of their day looking ...

47:50
Inside Black Hat: Defending One of the ‘Most Hostile Networks in the World’ - Grifter 🇬🇧

1,045 views

2 years ago

Asso HZV
Practical Threat Hunting: Straight Facts and Substantial Impacts - Grifter 🇬🇧

A lot has been said about threat hunting, by a lot of people. They'll tell you how difficult it is, what products you should use, how to ...

49:19
Practical Threat Hunting: Straight Facts and Substantial Impacts - Grifter 🇬🇧

408 views

2 years ago

Asso HZV
leHACK 2023 Keynote  -  Psychobilly & Majinboo 🇫🇷

Kernel Panic - leHACK 2023 Keynote leHACK website: https://www.lehack.org leHACK's twitter: https://twitter.com/_lehack_ ...

7:47
leHACK 2023 Keynote - Psychobilly & Majinboo 🇫🇷

1,531 views

2 years ago

Asso HZV
How EDRs work and how to bypass them - Processus 🇫🇷

I would like to speak about how Endpoint Detection and Response (EDR) softwares work and how to defeat every protection, such ...

34:19
How EDRs work and how to bypass them - Processus 🇫🇷

5,217 views

2 years ago

Asso HZV
No Metadata No Problem, Predicting photo locations from pixels using AI - Daniel Heinen 🇬🇧

Have you ever wanted to find out where a photo posted online was taken? In this talk I will demonstrate the abilities of modern ...

51:34
No Metadata No Problem, Predicting photo locations from pixels using AI - Daniel Heinen 🇬🇧

687 views

11 months ago

Mind Pump Show
Leg Press Vs Hack Squat Mass Building Benefits

In this QUAH Sal, Adam, & Justin answer the question "I know squats are best for leg development, but if you had to choose ...

7:25
Leg Press Vs Hack Squat Mass Building Benefits

96,143 views

6 years ago

Asso HZV
🇬🇧 Attack Surface Discovery with OSINT - James ATACK

Understanding an attack surface is a necessary first-step to for cyber-defenders looking to protect an organization. With this ...

1:30:53
🇬🇧 Attack Surface Discovery with OSINT - James ATACK

1,038 views

10 months ago

Asso HZV
ZFS Raiders of the Lost File - Nikolaos Tsapakis 🇬🇧

A nice summer day I decided that I did not wish to keep my old hard drive. Before throwing it into junk I started the format process.

24:36
ZFS Raiders of the Lost File - Nikolaos Tsapakis 🇬🇧

202 views

2 years ago

Asso HZV
🇫🇷 Forging golden hammer against Android software protection tools - Georges Bastien Michel

Today most of serious mobile applications relay on industrial-grade software protection tools to detect and slow down reverse ...

42:01
🇫🇷 Forging golden hammer against Android software protection tools - Georges Bastien Michel

2,189 views

3 years ago

Asso HZV
🇫🇷 Finding your place in infosec - Charlie BROMBERG - Shutdown

Ah, infosec… This field is riddled with codes, history, things to know, opportunities, and risks. This non-technical talk ...

52:07
🇫🇷 Finding your place in infosec - Charlie BROMBERG - Shutdown

4,369 views

1 year ago

Asso HZV
🇫🇷 Be better than the hacktivist: Structure a campagne of Bruteforce on OT equipment in the internet

Erwan CORDIER - biero This talk is an attempt to reconstruct the technical approach that hacktivists might take to industrial control ...

33:32
🇫🇷 Be better than the hacktivist: Structure a campagne of Bruteforce on OT equipment in the internet

827 views

1 year ago

Asso HZV
ADDS Persistance : Un conseil, brûlez tout - Charlie Bromberg / Shutdown & Volker Carstein 🇫🇷

Les services de domaine Active Directory offrent un large éventail de techniques de latéralisation et d'escalade de privilèges.

44:14
ADDS Persistance : Un conseil, brûlez tout - Charlie Bromberg / Shutdown & Volker Carstein 🇫🇷

2,264 views

2 years ago

Asso HZV
Cracking the Code: Decoding Anti Bot Systems! - Fabien Vauchelles 🇬🇧

Web scraping is gaining momentum, particularly with the advent of Large Language Models (LLMs). Access to data is being ...

53:02
Cracking the Code: Decoding Anti Bot Systems! - Fabien Vauchelles 🇬🇧

470 views

11 months ago

Seboss666
LeHack 2025 Singularity, c'était comment ? On en discute avec Djerfy :)

Cette année j'ai pu retourner à LeHACK, anciennement La nuit du Hack, conférence de sécurité informatique qui se déroulait à la ...

3:22:47
LeHack 2025 Singularity, c'était comment ? On en discute avec Djerfy :)

96 views

6 months ago

Asso HZV
Lambda Malware: the Hidden Threat in Excel Spreadsheets - Yonatan Baum & Daniel Wolfman 🇬🇧

This lecture will discuss a new technique discovered by the Mimecast Research Team. This technique can be used for embedding ...

39:02
Lambda Malware: the Hidden Threat in Excel Spreadsheets - Yonatan Baum & Daniel Wolfman 🇬🇧

928 views

2 years ago

Asso HZV
🇫🇷 Hacking Satellites: From SDR to RCE - Salim LARGO - 2ourc3

During this conference, we will explore the weaknesses of satellite systems and methods for exploiting them. We will start ...

27:48
🇫🇷 Hacking Satellites: From SDR to RCE - Salim LARGO - 2ourc3

8,415 views

1 year ago

Asso HZV
🇫🇷 The Red and the Blue: a tale of stealth and detection - Elias ISSA - shadow_gatt

With the evolution of attack surfaces, attacker skills, zero-day exploits and supply chain attacks, it is no longer possible to solely ...

49:40
🇫🇷 The Red and the Blue: a tale of stealth and detection - Elias ISSA - shadow_gatt

1,185 views

1 year ago

Asso HZV
🇫🇷 Sending network boxes to the edge of the world for fun but mostly profit - Clovis CARLIER/Joytide

Have you ever wanted a network device that's small enough to fit in your pocket but just powerful enough for your most ...

40:23
🇫🇷 Sending network boxes to the edge of the world for fun but mostly profit - Clovis CARLIER/Joytide

1,077 views

1 year ago