Hack.lu 2018 Logo

Hack.lu 2018

0
Free
Visit Website

Come To The Dark Side! We Have Radical Insurance Groups And Ransomware - Eireann Leverett and Ankit Gangwal Hypervisor-Level Debugger: Benefits And Challenges - Mathieu Tarral Risk Assessment Optimisation With MONARC - Fabien Mathey Real World: Threat Intelligence - Elle Armageddon Let Me Yara That For You! - Dan Demeter The (Not So Profitable) Path Towards Automated Heap Exploitation - Thaís Moreira Hamasaki Neuro-Hacking: The Science Behind Social Engineering And An Effective Security Culture - Emmanuel Nicaise The Snake Keeps Reinventing Itself - Jean-Ian Boutin and Matthieu Faou What The Fax?! - Eyal Itkin and Yaniv Balmas Trojans In SS7: How They Bypass All Security Measures - Sergey Puzankov So You Think IoT DDoS Botnets Are Dangerous: Bypassing ISP And Enterprise Anti-DDoS With 90's Technology - Dennis Rand IPC - The Broken Dream Of Inherent Security - Thanh Bui and Siddharth "Sid" Rao Operating Large-Scale Honeypot Sensor Networks - Piotr Kijewski Abusing Bash For Windows - Antoine Cervoise Cl4ndestina: Privacy By Default With A Feminist Perspective From The Global South - Steffania Paola and Narrira Lemos Encrypt! Organize! Resist!: Digital Safety For Politically Vulnerable Organizations & Civil Society - Matt "Mateo" Mitchell

FEATURES

ALTERNATIVES

Scoring server for Cyber Capture the Flag events with a focus on problem modification and hint offerings.

This tutorial describes how to set up two-factor authentication for an SSH server by integrating Google Authenticator with OpenSSH.

A comprehensive collection of security assessment lists for security testers.

Comprehensive guide on best practices for PHP development.

A golang utility to spider through a website searching for additional links.

Reverts sha1 integrity back to sha512 in lock files for enhanced security.

A tool to quickly get all JavaScript sources/files

A simple snippet to increment ../ on the URL.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved