Hack.lu 2018 Logo

Hack.lu 2018

0
Free
Visit Website

Come To The Dark Side! We Have Radical Insurance Groups And Ransomware - Eireann Leverett and Ankit Gangwal Hypervisor-Level Debugger: Benefits And Challenges - Mathieu Tarral Risk Assessment Optimisation With MONARC - Fabien Mathey Real World: Threat Intelligence - Elle Armageddon Let Me Yara That For You! - Dan Demeter The (Not So Profitable) Path Towards Automated Heap Exploitation - Thaís Moreira Hamasaki Neuro-Hacking: The Science Behind Social Engineering And An Effective Security Culture - Emmanuel Nicaise The Snake Keeps Reinventing Itself - Jean-Ian Boutin and Matthieu Faou What The Fax?! - Eyal Itkin and Yaniv Balmas Trojans In SS7: How They Bypass All Security Measures - Sergey Puzankov So You Think IoT DDoS Botnets Are Dangerous: Bypassing ISP And Enterprise Anti-DDoS With 90's Technology - Dennis Rand IPC - The Broken Dream Of Inherent Security - Thanh Bui and Siddharth "Sid" Rao Operating Large-Scale Honeypot Sensor Networks - Piotr Kijewski Abusing Bash For Windows - Antoine Cervoise Cl4ndestina: Privacy By Default With A Feminist Perspective From The Global South - Steffania Paola and Narrira Lemos Encrypt! Organize! Resist!: Digital Safety For Politically Vulnerable Organizations & Civil Society - Matt "Mateo" Mitchell

FEATURES

ALTERNATIVES

Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.

Unofficial Python API for searching, browsing, and downloading Android apps from Google Play.

Detailed explanations of steps taken to solve challenges in Capture The Flag competitions.

A simple snippet to increment ../ on the URL.

Framework for creating jeopardy CTF challenges with configurable structure and efficient integration.

A command-line tool for parsing, creating, and manipulating JWT tokens

Real-time capture the flag (CTF) scoring engine for computer wargames with a fun game-like environment for learning cybersecurity skills.

Domain availability checker with privacy settings