Skip to content

Latest commit

 

History

History
72 lines (68 loc) · 4.45 KB

index.md

File metadata and controls

72 lines (68 loc) · 4.45 KB
layout
layouts/post.njk

Events

{% event "2024-01-11" "Wprowadzenie do testowania aplikacji mobilnych" %} {% event "2023-12-14" "Krótka historia o pewnym CTFie" %} {% event "2023-11-30" "Wstęp do exploitacji binarnej part 1" %} {% event "2023-11-16" "Przejmujemy system monitoringu" %} {% event "2023-11-02" "Czy komputery kwantowe zniszczą prywatność?" %} {% event "2023-10-19" "Asembler dla początkujących" %} {% event "2023-05-25" "WhySoJava 0x2 - Serializacja i deserializacja w Java" %} {% event "2023-05-18" "WhySoJava 0x1 - Serializacja i deserializacja w Java" %} {% event "2023-05-11" "Potężny shell czyli Windows Powershell w akcji" %} {% event "2023-04-27" "Reverse Engineering C++ binaries" %} {% event "2023-04-20" "Gynvael Coldwind - AI buzz a Cybersecurity" %} {% event "2023-04-13" "Wykrywanie fałszywych opinii na google maps" %} {% event "2023-04-06" "Praktyczne ataki na warstwy sieciowe?" %} {% event "2023-03-30" "Jak dostać roota na Philips Hue i co można z tym zrobić?" %} {% event "2023-03-23" "Jak nauczyliśmy się hakować karty miejskie?" %} {% event "2023-03-16" "Prawie udane laby" %} {% event "2023-03-09" "Jak działa internet?" %} {% event "2023-01-05" "Intro to Docker" %} {% event "2022-12-08" "Intro to Vim" %} {% event "2022-11-17" "Practical web hacking with burp and nmap" %} {% event "2022-10-10" "Intro to Linux" "(terminal)" %} {% event "2022-10-03" "Intro to Linux" "(ssh)" %} {% event "2022-06-07" "Cloud Security Academy: Reference Security Architecture in Google Cloud" "(ISSA Polska feat. KNCyber)" %} {% event "2022-05-26" "Warsztat: Bezpieczne hostowanie aplikacji na dockerze" %} {% event "2022-05-12" "IRL hacking with hardware 2" %} {% event "2022-04-28" "IRL hacking with hardware" %} {% event "2022-01-13" "Automating clusters of servers with ansible" %} {% event "2021-12-21" "Christmas hacking CTF + presentation form" "billtech" %} {% event "2021-12-16" "Having fun with Log4J - how to hack the internet" %} {% event "2021-11-18" "AW CTF writeups" %} {% event "2021-11-04" "Introduction to Science Club" %} {% event "2021-05-18" "How (not) to organize a CTF?" %} {% event "2021-05-17" "Web Exploitation (SSRF) - workshop 4" %} {% event "2021-05-11" "Surprise encryption - story of a certain attack" %} {% event "2021-04-26" "Web Exploitation (SQL injections) - workshop 3" %} {% event "2021-04-20" "Docker - introduction to containerization" %} {% event "2021-04-12" "Basic use of Python for request automation" %} {% event "2021-04-06" "A few things about dynamic binary instrumentation" "by Redford" %} {% event "2021-04-05" "Web Exploitation (SQL injections) - workshop 2" %} {% event "2021-03-30" "How to decrypt ransomware, or die trying" "by msm" %} {% event "2021-03-29" "Web Exploitation (SQL injections) - workshop 1" %} {% event "2021-03-23" "Introduction to Web Exploitation" %} {% event "2021-03-09" "Introduction to Science Club" %} {% event "2020-12-17" "Jak mogłem sterować polskim przemysłem?" "by dudekmar" %} {% event "2020-12-14" "Web Exploitation - workshop 1" %} {% event "2020-11-30" "Binary Exploitation - workshop 3" %} {% event "2020-11-26" "Summary of project ideas" %} {% event "2020-11-23" "Binary Exploitation - workshop 2" %} {% event "2020-11-19" "A few stories about virtual machine introspection and malware monitoring" %} {% event "2020-11-16" "Binary Exploitation - workshop 1" %} {% event "2020-11-12" "Open Arena (member presentations)" %} {% event "2020-11-09" "Reverse Engineering - workshop 2" %} {% event "2020-11-05" "Wide view on Cybersecurity landscape - challenges and solutions" %} {% event "2020-11-02" "Introduction to x86 assembly" %} {% event "2020-10-29" "What do we know for sure?" %} {% event "2020-10-22" "Introduction to Python" %} {% event "2020-10-15" "Reverse Engineering - workshop 1" %} {% event "2020-10-08" "Introduction to Science Club" %}

Useful links