01:01:12
Sistema de votação eletrônico e seus ataques possíveis Inácio Gorayeb
All Hacking Cons
Shared 19/02/2024
35:48
Zanshin Tech Samurai in the digital age Claudio Canavese, Silvia Perfigli
All Hacking Cons
Shared 19/02/2024
54:09
An adversarial approach to improve detection capabilities Bozza, Romano
All Hacking Cons
Shared 19/02/2024
51:50
show me your Windows privileges and I will lead you to SYSTEM Pierini
All Hacking Cons
Shared 19/02/2024
01:10:30
Praeda to PraedaSploit The embedded device data Harvesting tool for the masses Deral Heiland Perce
All Hacking Cons
Shared 01/12/2023
01:12:21
For the Love of God DEFEND YOUR MOBILE APPS Part 2 Jerod Brennen
All Hacking Cons
Shared 01/12/2023