Hackers 2 Hackers 收录时间:2022-01-19 17:00:50 文件大小:8GB 下载次数:1 最近下载:2022-01-19 17:00:50 磁力链接: magnet:?xt=urn:btih:87f02fa3d878a7af94adebdb5df3256cc2bd7b5f 立即下载 复制链接 文件列表 H2HC 11 2014/Balestra & Espinhara - Pentest - H2HC University.mp4 258MB Unsorted/H2HC Hangout 2 - Como Realizar Pesquisas em Seguranca da Information.mp4 164MB Unsorted/H2HC Hangout 1 - Como aprender Seguranca da Information.mp4 161MB H2HC 5 2008/ferramentas.flv 133MB H2HC 11 2014/H2CSO (Hackers to CSO) - Parte1.mp4 124MB H2HC 13 2016/Alexandre Borges - Few Tricks Used by Malware.mp4 122MB H2HC 14 2017/Shay Gueron - Keynote17.mp4 120MB H2HC 11 2014/H2HC Hangout 3 - Novidades e Underground Hacker.mp4 120MB Unsorted/H2HC Hangout 3 - Novidades H2HC 2014 e Underground Hacker.mp4 119MB H2HC 13 2016/Shay Gueron - Keynote.mp4 114MB H2HC 10 2013/Automotive Hacking - Chris Valasek e Charlie Miller.mp4 113MB H2HC 13 2016/Sandra & Jesus - Voting Among Sharks.mp4 107MB H2HC 10 2013/H2CSO 2013.mp4 107MB H2HC 14 2017/Oleksandr Bazhaniuk - Software Attacks on Differen.mp4 107MB H2HC 13 2016/Lucas Teske - Satellite Communications Reverse Engineering.mp4 106MB H2HC 15 2018/Getting Malicious in 2018 - Stone & McRoberts.mp4 104MB H2HC 15 2018/Splitter - TOR Analysis - Rener Silva.mp4 103MB H2HC 10 2013/Keynote Speaker 1 - FX.mp4 101MB H2HC 10 2013/Using Online Activity as Digital DNA - Espinhara & Albuquerque.mp4 100MB H2HC 15 2018/Public Security Tests of the Brazilian Voting System - Paulo Matias.mp4 99MB H2HC 13 2016/Anchises Moraes - Internet's Fallen Heroes.mp4 98MB H2HC 13 2016/Fernando Merces - Protecting Linux from Ring3 Rootkits.mp4 96MB H2HC 10 2013/Automated Exploitation Grand Challenge - Julien Vanegue.mp4 95MB H2HC 13 2016/Marion Marschalek - Malware Behavior Analysis.mp4 95MB H2HC 14 2017/Butterly & Schmidt - Attacking Cellular Devices -.mp4 95MB H2HC 11 2014/Ygor Parreira - H2HC University.mp4 92MB H2HC 14 2017/Marion Marschalek - 50 shades of Visual Studio - H.mp4 90MB H2HC 10 2013/Lula Project - Fernando Merces.mp4 88MB H2HC 13 2016/Maximiliano Soler - HTTP2 Journey by RFC.mp4 88MB H2HC 11 2014/Fernando Gont - IPv6.mp4 86MB H2HC 14 2017/Alex Matrosov - Betraying the BIOS Where the Guard.mp4 85MB H2HC 10 2013/The Lula Project - a malware sourcing and handling system (Fernando Merces).mp4 82MB H2HC 15 2018/Fault Injection Attacks com Enfase em Ultrassom - Julio Della Flora.mp4 81MB H2HC 15 2018/SegDSP - Lucas Teske.mp4 80MB H2HC 13 2016/Rafael Silva - Phishing.mp4 78MB H2HC 11 2014/H2CSO (Hackers to CSO) - Parte4.mp4 77MB H2HC 11 2014/Sergey Bratus - For Want of a Nail.mp4 77MB H2HC 13 2016/Butterly & Schmidt - Dumbster Driving 4G LTE BaseStations.mp4 77MB H2HC 10 2013/SCADA hacking - diversio em escala industrial (Jan Seidl).mp4 76MB H2HC 13 2016/Stefano Zanero - Risk-based design for automotive networks.mp4 75MB H2HC 10 2013/Sandboxing is the shit - Jonathan Brossard.mp4 75MB H2HC 15 2018/GCC Is The New Pincc - Marion Marschalek - H2HC2018.mp4 75MB H2HC 11 2014/Noilson Caio - 2.4GHz Jammer - H2HC University.mp4 75MB H2HC 15 2018/Cracking the Craptcha - Gustavo Scotti.mp4 74MB H2HC 15 2018/Keynote - Jayson E. Street.mp4 69MB H2HC 13 2016/Felipe Boeira - Android Resiliency Defense Strategy.mp4 69MB H2HC 10 2013/Invited Talk ( Otavio Cunha ).mp4 69MB H2HC 15 2018/Is Visualization Still Necessary - Edmond Rogers.mp4 67MB H2HC 15 2018/E-voting from Argentina to the World - Ortega & Oro.mp4 67MB H2HC 11 2014/piter punk - Multiprocessamento - SlackShow.mp4 66MB H2HC 15 2018/Internet of Sht - Maycon Vitali.mp4 66MB H2HC 11 2014/Sergey Shekyan - Headless Browser.mp4 66MB H2HC 15 2018/SWAPwn - Artem Shishkin.mp4 66MB H2HC 15 2018/Code and Command Infection flaws in Web Apps - Joao Matos.mp4 65MB H2HC 15 2018/Linux Kernel Rootkits - Matveychikov & f0rb1dd3n.mp4 65MB H2HC 11 2014/Julio Neves - Keynote - H2HC University.mp4 64MB H2HC 11 2014/Andre Detsch - Kernel - SlackShow.mp4 64MB H2HC 13 2016/Lenoir & Rigo - Lost your secure HDD PIN We can help.mp4 63MB H2HC 15 2018/Finding 0days in embedded - Anh Quynh & Lau.mp4 62MB H2HC 11 2014/Claudio Borges - OpenDJ - SlackShow.mp4 62MB H2HC 11 2014/Butterly & Schmidt - LTE.mp4 61MB H2HC 15 2018/DSL Dismantling Secret Layers - Brian Butterly.mp4 61MB H2HC 13 2016/Jacob Torrey - Towards a LangSec-Aware SDLC.mp4 60MB H2HC 11 2014/H2CSO (Hackers to CSO) - Parte3.mp4 60MB H2HC 15 2018/Attacking VMware NSX - Luft & Harrie.mp4 60MB H2HC 11 2014/Goodspeed & Bratus - Fillory of PHY.mp4 59MB H2HC 5 2008/secure_planet.mp4 58MB H2HC 11 2014/Tulio Magno - Toolchain - SlackShow.mp4 58MB H2HC 15 2018/The Path Towards Automated Heap Exploitation - Thais Hamasaki.mp4 58MB H2HC 14 2017/Sergey Shekyan - Content Security Policy.mp4 58MB H2HC 15 2018/Hacking the International RFQ Process - Dino Covotsos.mp4 57MB H2HC 11 2014/Lindolfo Rodrigues - Optimizacao - Slackware Show.mp4 56MB H2HC 11 2014/Ewerson crash - Router Backdoors - H2HC University.mp4 56MB H2HC 15 2018/Constrain't Solvers for Reverse engineering - Edgar Barbosa.mp4 56MB H2HC 10 2013/Scanning of Satellites in Low Earth Orbit - Travis Goodspeed.mp4 55MB H2HC 13 2016/Jonathan Brossard - Witchcraft Compiler Collection.mp4 52MB H2HC 15 2018/All The Tiny Features - Natalie Silvanovich.mp4 51MB H2HC 13 2016/Alex Matrosov - UEFI Firmware Rootkits - Myths & Realities.mp4 50MB H2HC 15 2018/Exploring the Safari - Jasiel Spelman.mp4 50MB H2HC 11 2014/Daniel J. Berstein - Keynote.mp4 49MB H2HC 15 2018/Sonic attacks to spinning hard drives - Alfredo Ortega.mp4 46MB H2HC 11 2014/Ricardo Katz - Graylog - Slackware Show.mp4 46MB H2HC 10 2013/Keynote 2 - Charlie Miller.mp4 45MB H2HC 10 2013/Memory Anti-Anti-Forensics in a Nutshell (Rodrigues e Fuschini).mp4 42MB H2HC 11 2014/Matrosov - HexRaysCodeXplorer.mp4 37MB H2HC 5 2008/apology_0days.mp4 34MB H2HC 13 2016/Opening - Rodrigo Branco BSDaemon.mp4 33MB H2HC Revista/RevistaH2HC_9.pdf 33MB H2HC 5 2008/extreme_web.mp4 32MB H2HC 11 2014/Anton Kochkov - Firmware Reversing with Radare.mp4 31MB H2HC 5 2008/hypervisor.mp4 30MB H2HC 5 2008/playing_waf.mp4 29MB H2HC Revista/RevistaH2HC_5.pdf 28MB H2HC 11 2014/Shikhin Seti - Optional ROMs.mp4 28MB H2HC 11 2014/Paulo Brito - Shodan e Jornalismo - H2HC University.mp4 28MB H2HC 11 2014/Matias Katz - X11 Backdoor.mp4 27MB H2HC 5 2008/pci_rootkits.mp4 26MB H2HC 5 2008/hack_into_samba.mp4 26MB H2HC 5 2008/evilgrade.mp4 24MB H2HC 2 2005/video-download-capture.exe 23MB H2HC 11 2014/Breno Silva - Defeat Android Kernel Exploitation.mp4 22MB H2HC 11 2014/Rodrigo Branco - Computer Arch - H2HC University.mp4 21MB H2HC Revista/RevistaH2HC_6.pdf 19MB H2HC Revista/RevistaH2HC_13.pdf 15MB H2HC 3 2006/lockpickingshow.pdf 14MB H2HC Revista/RevistaH2HC_14.pdf 13MB H2HC Revista/RevistaH2HC_7.pdf 13MB H2HC Revista/RevistaH2HC_1.pdf 12MB H2HC Revista/RevistaH2HC_2.pdf 11MB H2HC Revista/RevistaH2HC_12.pdf 10MB H2HC 10 2013/H2HC 10 - Videoclip.mp4 10MB H2HC 5 2008/Felipe.pdf 10MB H2HC 11 2014/H2HC - Na Selva - Videoclip.mp4 9MB H2HC Revista/RevistaH2HC_3.pdf 9MB H2HC 6 2009/Gustavo.en.pdf 8MB H2HC Revista/RevistaH2HC_4.pdf 8MB H2HC 6 2009/Weber.en.pdf 8MB H2HC 11 2014/H2CSO - Videoclip.mp4 8MB H2HC Revista/RevistaH2HC_10.pdf 7MB H2HC 6 2009/Anderson.br.pptx 7MB H2HC 13 2016/Shay Gueron - Keynote PoC Working.mp4 7MB H2HC 5 2008/Nico.pdf 6MB H2HC 5 2008/Steve.pptx 6MB H2HC Revista/RevistaH2HC_11.pdf 6MB H2HC 6 2009/Paulo.br.ppt 6MB H2HC 6 2009/Andres.en.pdf 5MB H2HC 7 2010/Bruno.en.pdf 5MB H2HC 2 2005/save2pc_music2pc.exe 5MB H2HC 7 2010/Jordan.br.pdf 4MB H2HC 3 2006/luiz_eduardo_wifihostile.pdf 4MB H2HC 8 2011/Eric.en.pdf 4MB H2HC 8 2011/Matthieu.en.pdf 4MB H2HC 6 2009/Tony.br.ppt 4MB H2HC Revista/RevistaH2HC_8.pdf 4MB H2HC 2 2005/bliptv_d_setup.exe 3MB H2HC 6 2009/Nicolas.en.pdf 3MB Unsorted/H2HC Magazine 7a - Implant de Biochip - Raphael Bastos - Parte 2.mp4 3MB H2HC 6 2009/Bruno.en.pdf 2MB H2HC 3 2006/old-school-hacking.pps 2MB H2HC 6 2009/Philippe.en.pdf 2MB H2HC 6 2009/Jonathan.en.odp 2MB H2HC 8 2011/Len.en.pptx 2MB H2HC 5 2008/Guto.ppt 2MB H2HC 7 2010/Matthieu.en.pdf 2MB H2HC 7 2010/Anchises.br.pdf 2MB H2HC 7 2010/Wagner.br.pdf 2MB H2HC 2 2005/nelson_murilo_vulnerabilidades_bluetooth.pdf 2MB H2HC 11 2014/Contagem Regressiva.mp4 2MB H2HC 6 2009/Nelson.en.pdf 2MB H2HC 8 2011/Edgar.en.pdf 2MB H2HC 7 2010/Andrew.en.pdf 2MB H2HC 6 2009/Nelson.br.pdf 2MB H2HC 1 2004/wifi-eng.zip 2MB H2HC 1 2004/wifi-pt.zip 2MB H2HC 3 2006/luiz_eduardo_voipinsecurity.pdf 2MB H2HC 8 2011/Carlos.en.pdf 2MB Unsorted/Hackers 2 CSOs - Entrevista com Galeno Gabe.mp4 2MB H2HC 4 2007/detectingbluepill.pdf 2MB H2HC 4 2007/montanaro.pdf 2MB H2HC 7 2010/Carlos.en.pdf 1MB H2HC 4 2007/strauss.pdf 1MB Unsorted/Hackers 2 CSOs - Entrevista com Eduardo Cabral.mp4 1MB H2HC 6 2009/Alex.en.ppt 1MB H2HC 5 2008/Pablo.odp 1MB H2HC 7 2010/Eric.en.pdf 1MB H2HC 3 2006/rodrigo_costa_ddk.pdf 1MB H2HC 4 2007/rodrigo_costa_ddk.pdf 1MB H2HC 1 2004/crypt2.pdf 1MB H2HC 6 2009/Edgar.en.pdf 1MB H2HC 3 2006/iii-h2hc-00b.ppt 1MB H2HC 2 2005/poli-eng.zip 1MB H2HC 2 2005/poli-pt.zip 1MB H2HC 1 2004/crypt1.pdf 1003KB H2HC 6 2009/Carlos.en.pdf 948KB H2HC 7 2010/Ranieri.br.pdf 946KB H2HC 5 2008/Edgar.pdf 911KB H2HC 8 2011/Alex.en.pdf 835KB H2HC 2 2005/bug_hunting.pdf 792KB H2HC 7 2010/Dario.br.pdf 729KB H2HC 5 2008/Joao.pdf 692KB H2HC 5 2008/Ronaldo.pdf 679KB H2HC 2 2005/tiago_assumpcao_breaking_pax_aslr.ppt 662KB H2HC 6 2009/Sebastian.en.pdf 611KB H2HC 4 2007/alexander.pdf 607KB Unsorted/H2HC Magazine 7a - Implant de Biochip - Raphael Bastos - Parte 1.mp4 605KB H2HC 2 2005/H2HCII.pdf 595KB H2HC 5 2008/Rodrigo.pdf 590KB H2HC 5 2008/Julio.pptx 566KB H2HC 2 2005/domingo_montanaro_antiforensics.pdf 525KB H2HC 4 2007/dnsamplification.pptx 482KB H2HC 4 2007/H2HCIV.pdf 402KB H2HC 3 2006/H2HCIII.pdf 371KB H2HC 4 2007/pebinary.pdf 359KB H2HC 4 2007/hackingipod.pdf 343KB H2HC 5 2008/Wagner.pptx 314KB H2HC 6 2009/Cesar.en.ppt 310KB H2HC 7 2010/Fernando.en.pdf 281KB H2HC 5 2008/Wendel.pdf 274KB H2HC 4 2007/hackapache.pdf 260KB H2HC 6 2009/Wagner.br.pdf 256KB H2HC 8 2011/Dan.en.pdf 242KB H2HC 1 2004/honey-pt.zip 241KB H2HC 8 2011/fgont-h2hc2011-ipv6-security.pdf 226KB H2HC 4 2007/wendel.pdf 220KB H2HC 2 2005/bruno_ramos_dog_crawlerxphp_guard_do_saumil_shah.ppt 212KB H2HC 7 2010/Alex.en.pdf 212KB H2HC 4 2007/restinsecurity.ppt 209KB H2HC 7 2010/Jonathan.en.pdf 207KB H2HC 4 2007/hackingbigbrother.pdf 206KB H2HC 13 2016/Marion Marschalek - Malware Behavior Analysis.eng.srt 205KB H2HC 14 2017/H2HC Founder Robot.mp4 195KB H2HC 3 2006/Polluting sys_execve()final.ppt 183KB H2HC 14 2017/Oleksandr Bazhaniuk - Software Attacks on Differen.eng.srt 180KB H2HC 1 2004/osstmm-pt.pdf 177KB H2HC 1 2004/osstmm-eng.pdf 177KB H2HC 3 2006/Kernel-Land Rootkits.pps 162KB H2HC 13 2016/Sandra & Jesus - Voting Among Sharks.eng.srt 157KB H2HC 14 2017/Marion Marschalek - 50 shades of Visual Studio - H.eng.srt 147KB H2HC 13 2016/Shay Gueron - Keynote.eng.srt 145KB H2HC 6 2009/Juliano.en.pdf 138KB H2HC 2 2005/nash_leon_dum_dum_kernel_hacking.zip 132KB H2HC 13 2016/Stefano Zanero - Risk-based design for automotive networks.eng.srt 130KB H2HC 14 2017/Shay Gueron - Keynote17.eng.srt 128KB H2HC 13 2016/Butterly & Schmidt - Dumbster Driving 4G LTE BaseStations.eng.srt 125KB H2HC 13 2016/Jacob Torrey - Towards a LangSec-Aware SDLC.eng.srt 124KB H2HC 3 2006/H2HC-Process_Infection.odp 123KB H2HC 4 2007/H2HC-Process_Infection.odp 123KB H2HC 13 2016/Lenoir & Rigo - Lost your secure HDD PIN We can help.eng.srt 119KB H2HC 15 2018/GCC Is The New Pincc - Marion Marschalek - H2HC2018.eng.srt 116KB H2HC Revista/RevistaH2HC_15.pdf 114KB H2HC 4 2007/ctf.pdf 113KB H2HC 14 2017/Sergey Shekyan - Content Security Policy.eng.srt 107KB H2HC 15 2018/Hacking the International RFQ Process - Dino Covotsos.eng.srt 101KB H2HC 15 2018/Getting Malicious in 2018 - Stone & McRoberts.eng.srt 99KB H2HC 10 2013/Automated Exploitation Grand Challenge - Julien Vanegue.srt 98KB H2HC 4 2007/thebugmagazine-cfp.pdf 98KB H2HC 5 2008/thebugmagazine-cfp.pdf 98KB H2HC 14 2017/Alex Matrosov - Betraying the BIOS Where the Guard.eng.srt 90KB H2HC 10 2013/Automotive Hacking - Chris Valasek e Charlie Miller.srt 87KB H2HC 13 2016/Alex Matrosov - UEFI Firmware Rootkits - Myths & Realities.eng.srt 87KB H2HC 3 2006/itzik_kotler_shellcode_evolution.ppt 84KB H2HC 15 2018/E-voting from Argentina to the World - Ortega & Oro.eng.srt 82KB H2HC 10 2013/Keynote 2 - Charlie Miller.srt 77KB H2HC 15 2018/All The Tiny Features - Natalie Silvanovich.eng.srt 76KB H2HC 15 2018/Finding 0days in embedded - Anh Quynh & Lau.eng.srt 76KB H2HC 15 2018/Is Visualization Still Necessary - Edmond Rogers.eng.srt 74KB H2HC 15 2018/Keynote - Jayson E. Street.eng.srt 73KB H2HC 6 2009/h2hc-nicolas-waisman.html 71KB H2HC 15 2018/Exploring the Safari - Jasiel Spelman.eng.srt 71KB H2HC 2 2005/everson_tavares_fun_assembly.pdf 68KB H2HC 15 2018/SWAPwn - Artem Shishkin.eng.srt 64KB H2HC 10 2013/Keynote Speaker 1 - FX.srt 64KB H2HC 15 2018/Linux Kernel Rootkits - Matveychikov & f0rb1dd3n.eng.srt 62KB Unsorted/H2HC Magazine 7a - Biochip na catraca - Raphael Bastos.mp4 60KB H2HC 10 2013/Scanning of Satellites in Low Earth Orbit - Travis Goodspeed.srt 58KB H2HC 1 2004/honey-eng.zip 54KB H2HC 15 2018/Sonic attacks to spinning hard drives - Alfredo Ortega.eng.srt 48KB H2HC 3 2006/ticktock[1].tar.gz 31KB H2HC 13 2016/Shay Gueron - Keynote PoC Working.eng.srt 8KB Hackers 2 Hackers logo.jpg 5KB Hackers 2 Hackers thank you.txt 960B H2HC 2 2005/joachim_zutter_codb_dllmon_feedbf.zip 748B H2HC 5 2008/Francisco.pdf 748B