Parent directory/ | - | - |
100 Opening Ceremony DerbyCon Team.mp4 | 28.4 MiB | 2021 Apr 21 12:52 |
101 Key Note Jeffrey Snover Lee Holmes.mp4 | 55.5 MiB | 2021 Apr 21 12:52 |
101 Key Note Jeffrey Snover Lee Holmes.srt | 77.3 KiB | 2019 Oct 01 03:11 |
102 Thinking Purple Carlos Perez.mp4 | 49.6 MiB | 2021 Apr 21 12:52 |
102 Thinking Purple Carlos Perez.srt | 71.9 KiB | 2019 Oct 01 03:11 |
103 Writing malware while the blue team is staring at you Mubix Rob Fuller.mp4 | 32.3 MiB | 2021 Apr 21 12:52 |
104 Macs Get Sick Too Tyler Halfpop Jacob Soo.mp4 | 44.6 MiB | 2021 Apr 21 12:52 |
104 Macs Get Sick Too Tyler Halfpop Jacob Soo.srt | 59.4 KiB | 2019 Oct 01 03:12 |
105 A Year in the Empire Will Schroeder Matt Nelson.mp4 | 41.4 MiB | 2021 Apr 21 12:52 |
105 A Year in the Empire Will Schroeder Matt Nelson.srt | 68.2 KiB | 2019 Oct 01 03:12 |
106 PowerShell Secrets and Tactics Ben0xA (2).mp4 | 48.2 MiB | 2021 Apr 21 12:52 |
106 PowerShell Secrets and Tactics Ben0xA (2).srt | 58.4 KiB | 2019 Oct 01 03:12 |
106 PowerShell Secrets and Tactics Ben0xA.mp4 | 51.1 MiB | 2021 Apr 21 12:52 |
106 PowerShell Secrets and Tactics Ben0xA.srt | 58.4 KiB | 2019 Oct 01 03:12 |
107 CrackMapExec Owning Active Directory by using Active Directory Marcello Salvati.mp4 | 36.7 MiB | 2021 Apr 21 12:52 |
107 CrackMapExec Owning Active Directory by using Active Directory Marcello Salvati.srt | 50.1 KiB | 2019 Oct 01 03:13 |
108 Exploiting First Hop Protocols to Own the Network Paul Coggin.mp4 | 34.0 MiB | 2021 Apr 21 12:52 |
108 Exploiting First Hop Protocols to Own the Network Paul Coggin.srt | 59.5 KiB | 2019 Oct 01 03:12 |
109 Defeating The Latest Advances in Script Obfuscation Mark Mager.mp4 | 22.7 MiB | 2021 Apr 21 12:52 |
109 Defeating The Latest Advances in Script Obfuscation Mark Mager.srt | 37.1 KiB | 2019 Oct 01 03:12 |
110 Breaking Credit Card Tokenization Without Cryptanalysis Tim MalcomVetter.mp4 | 37.7 MiB | 2021 Apr 21 12:52 |
110 Breaking Credit Card Tokenization Without Cryptanalysis Tim MalcomVetter.srt | 68.1 KiB | 2019 Oct 01 03:11 |
111 Attacking EvilCorp Anatomy of a Corporate Hack Sean Metcalf Will Schroeder (2).mp4 | 44.5 MiB | 2021 Apr 21 12:52 |
111 Attacking EvilCorp Anatomy of a Corporate Hack Sean Metcalf Will Schroeder (2).srt | 72.5 KiB | 2019 Oct 01 03:12 |
111 Attacking EvilCorp Anatomy of a Corporate Hack Sean Metcalf Will Schroeder.mp4 | 45.2 MiB | 2021 Apr 21 12:52 |
111 Attacking EvilCorp Anatomy of a Corporate Hack Sean Metcalf Will Schroeder.srt | 72.9 KiB | 2019 Oct 01 03:12 |
112 Phishing without Failure and Frustration Jay Beale.mp4 | 33.9 MiB | 2021 Apr 21 12:52 |
112 Phishing without Failure and Frustration Jay Beale.srt | 63.7 KiB | 2019 Oct 01 03:12 |
113 New Shiny in Metasploit Framework egypt.mp4 | 29.4 MiB | 2021 Apr 21 12:52 |
113 New Shiny in Metasploit Framework egypt.srt | 52.0 KiB | 2019 Oct 01 03:13 |
114 Embrace the Bogeyman Tactical Fear Mongering for Those Who Penetrate FuzzyNop.mp4 | 24.9 MiB | 2021 Apr 21 12:52 |
114 Embrace the Bogeyman Tactical Fear Mongering for Those Who Penetrate FuzzyNop.srt | 51.2 KiB | 2019 Oct 01 03:12 |
115 How to Social Engineer your way into your dream job Jason Blanchard.mp4 | 43.4 MiB | 2021 Apr 21 12:52 |
115 How to Social Engineer your way into your dream job Jason Blanchard.srt | 71.6 KiB | 2019 Oct 01 03:12 |
116 Make STEHM Great Again David Schwartzberg and Chris Sistrunk.mp4 | 39.2 MiB | 2021 Apr 21 12:52 |
116 Make STEHM Great Again David Schwartzberg and Chris Sistrunk.srt | 59.9 KiB | 2019 Oct 01 03:12 |
117 Breaking Android Apps for Fun and Profit Bill Sempf.mp4 | 38.3 MiB | 2021 Apr 21 12:52 |
117 Breaking Android Apps for Fun and Profit Bill Sempf.srt | 61.6 KiB | 2019 Oct 01 03:12 |
118 Attacking ADFS Endpoints with PowerShell Karl Fosaaen.mp4 | 43.2 MiB | 2021 Apr 21 12:52 |
118 Attacking ADFS Endpoints with PowerShell Karl Fosaaen.srt | 66.3 KiB | 2019 Oct 01 03:12 |
119 Introducing PowerShell into your Arsenal with PSAttack Jared Haight.mp4 | 31.1 MiB | 2021 Apr 21 12:52 |
119 Introducing PowerShell into your Arsenal with PSAttack Jared Haight.srt | 49.2 KiB | 2019 Oct 01 03:12 |
120 Hardening AWS Environments and Automating Incident Response for AWS Compromises Andrew Krug Alex.mp4 | 52.4 MiB | 2021 Apr 21 12:52 |
120 Hardening AWS Environments and Automating Incident Response for AWS Compromises Andrew Krug Alex.srt | 62.4 KiB | 2019 Oct 01 03:13 |
121 Invoke Obfuscation PowerShell obFUsk8tion Techniques How To Try To DeTect Them Daniel Bohannon.mp4 | 38.2 MiB | 2021 Apr 21 12:52 |
121 Invoke Obfuscation PowerShell obFUsk8tion Techniques How To Try To DeTect Them Daniel Bohannon.srt | 76.8 KiB | 2019 Oct 01 03:12 |
122 MariaDB Lock it down like a chastity belt Ben Stillman.mp4 | 20.7 MiB | 2021 Apr 21 12:52 |
122 MariaDB Lock it down like a chastity belt Ben Stillman.srt | 37.8 KiB | 2019 Oct 01 03:12 |
200 Internet of Things Voice Control AI and Office Automation BUILDING YOUR VERY OWN JARVIS Ed Skoud.mp4 | 48.6 MiB | 2021 Apr 21 12:52 |
201 Mind Reading for Fun and Profit using DISC Christopher Hadnagy.mp4 | 42.6 MiB | 2021 Apr 21 12:52 |
202 Hunting for Exploit Kits Joe Desimone.mp4 | 27.7 MiB | 2021 Apr 21 12:52 |
202 Hunting for Exploit Kits Joe Desimone.srt | 42.0 KiB | 2019 Oct 01 03:11 |
203 Next Gen Web Pen Testing Handling modern applications in a penetration test Kevin Johnson and Ja.mp4 | 54.2 MiB | 2021 Apr 21 12:52 |
203 Next Gen Web Pen Testing Handling modern applications in a penetration test Kevin Johnson and Ja.srt | 67.4 KiB | 2019 Oct 01 03:12 |
204 Beyond The Cript Practical iOS Reverse Engineering Michael Allen.mp4 | 42.7 MiB | 2021 Apr 21 12:52 |
204 Beyond The Cript Practical iOS Reverse Engineering Michael Allen.srt | 55.0 KiB | 2019 Oct 01 03:12 |
205 Adaptation of the Security Sub Culture Rockie Brockway Adam Hogan.mp4 | 52.6 MiB | 2021 Apr 21 12:52 |
205 Adaptation of the Security Sub Culture Rockie Brockway Adam Hogan.srt | 73.2 KiB | 2019 Oct 01 03:12 |
206 Outlook and Exchange for the Bad Guys Nick Landers.mp4 | 36.4 MiB | 2021 Apr 21 12:52 |
206 Outlook and Exchange for the Bad Guys Nick Landers.srt | 73.8 KiB | 2019 Oct 01 03:13 |
207 Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement Bill V.mp4 | 43.7 MiB | 2021 Apr 21 12:52 |
207 Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement Bill V.srt | 64.0 KiB | 2019 Oct 01 03:13 |
208 Living Off the Land 2 A Minimalists Guide to Windows Defense Matt Graeber.mp4 | 45.1 MiB | 2021 Apr 21 12:52 |
208 Living Off the Land 2 A Minimalists Guide to Windows Defense Matt Graeber.srt | 55.4 KiB | 2019 Oct 01 03:12 |
209 I dont give one IoTA Introducing the Internet of Things Attack Methodology Larry Pesce.mp4 | 48.1 MiB | 2021 Apr 21 12:52 |
209 I dont give one IoTA Introducing the Internet of Things Attack Methodology Larry Pesce.srt | 59.1 KiB | 2019 Oct 01 03:12 |
210 What I have learned in 25years of Ham Radio Jay Radcliffe.mp4 | 36.8 MiB | 2021 Apr 21 12:52 |
210 What I have learned in 25years of Ham Radio Jay Radcliffe.srt | 55.3 KiB | 2019 Oct 01 03:12 |
211 Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs Eric Conrad.mp4 | 47.4 MiB | 2021 Apr 21 12:52 |
211 Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs Eric Conrad.srt | 70.4 KiB | 2019 Oct 01 03:12 |
212 Attackers Hunt Sysadmins Its time to fight back Lee Holmes.mp4 | 34.3 MiB | 2021 Apr 21 12:52 |
212 Attackers Hunt Sysadmins Its time to fight back Lee Holmes.srt | 51.7 KiB | 2019 Oct 01 03:11 |
213 Python 3 Its Time Charles L Yost.mp4 | 24.3 MiB | 2021 Apr 21 12:52 |
213 Python 3 Its Time Charles L Yost.srt | 49.6 KiB | 2019 Oct 01 03:12 |
214 So Youve Inherited a Security Department Now What Amanda Berlin Lee Brotherston.mp4 | 39.8 MiB | 2021 Apr 21 12:52 |
214 So Youve Inherited a Security Department Now What Amanda Berlin Lee Brotherston.srt | 55.2 KiB | 2019 Oct 01 03:12 |
215 Recharging Penetration Testing to Maximize Value James Jardine.mp4 | 39.4 MiB | 2021 Apr 21 12:52 |
215 Recharging Penetration Testing to Maximize Value James Jardine.srt | 80.3 KiB | 2019 Oct 01 03:13 |
216 Yara Rule QA Cant I Write Code to do This for Me Andrew Plunkett.mp4 | 19.8 MiB | 2021 Apr 21 12:52 |
216 Yara Rule QA Cant I Write Code to do This for Me Andrew Plunkett.srt | 36.0 KiB | 2019 Oct 01 03:12 |
300 Metasploit Townhall David Maloney James Lee Brent Cook Tod Beardsley Lance Sanchez.mp4 | 43.8 MiB | 2021 Apr 21 12:52 |
300 Metasploit Townhall David Maloney James Lee Brent Cook Tod Beardsley Lance Sanchez.srt | 54.0 KiB | 2019 Oct 01 03:12 |
301 Stagefright An Android Exploitation Case Study Jduck.mp4 | 39.8 MiB | 2021 Apr 21 12:52 |
301 Stagefright An Android Exploitation Case Study Jduck.srt | 64.9 KiB | 2019 Oct 01 03:12 |
302 Rotten Potato Privilege Escalation from Service Accounts to SYSTEM Stephen Breen Chris Mallz.mp4 | 25.7 MiB | 2021 Apr 21 12:52 |
302 Rotten Potato Privilege Escalation from Service Accounts to SYSTEM Stephen Breen Chris Mallz.srt | 48.5 KiB | 2019 Oct 01 03:12 |
303 DevOops Redux Ken Johnson Chris Gates.mp4 | 38.2 MiB | 2021 Apr 21 12:52 |
303 DevOops Redux Ken Johnson Chris Gates.srt | 73.6 KiB | 2019 Oct 01 03:12 |
304 and bad mistakes Ive made a few Jayson E Street.mp4 | 40.8 MiB | 2021 Apr 21 12:52 |
304 and bad mistakes Ive made a few Jayson E Street.srt | 69.6 KiB | 2019 Oct 01 03:11 |
305 Better Network Defense Through Threat Injection and Hunting Zach Grace Brian Genz.mp4 | 24.1 MiB | 2021 Apr 21 12:52 |
305 Better Network Defense Through Threat Injection and Hunting Zach Grace Brian Genz.srt | 46.8 KiB | 2019 Oct 01 03:12 |
306 Its Never So Bad That It Cant Get Worse Valerie Thomas and Harry Regan.mp4 | 39.2 MiB | 2021 Apr 21 12:52 |
306 Its Never So Bad That It Cant Get Worse Valerie Thomas and Harry Regan.srt | 49.8 KiB | 2019 Oct 01 03:12 |
307 From Commodity to Advanced APT malware are automated malware analysis sandboxes as useful as you.mp4 | 74.4 MiB | 2021 Apr 21 12:52 |
307 From Commodity to Advanced APT malware are automated malware analysis sandboxes as useful as you.srt | 110.3 KiB | 2019 Oct 01 03:13 |
308 Business Developement The best non four letter dirty word in infosec Scott Lyons and Joshua Marp (2).mp4 | 53.5 MiB | 2021 Apr 21 12:52 |
308 Business Developement The best non four letter dirty word in infosec Scott Lyons and Joshua Marp (2).srt | 80.4 KiB | 2019 Oct 01 03:12 |
308 Business Developement The best non four letter dirty word in infosec Scott Lyons and Joshua Marp.mp4 | 53.5 MiB | 2021 Apr 21 12:52 |
308 Business Developement The best non four letter dirty word in infosec Scott Lyons and Joshua Marp.srt | 80.4 KiB | 2019 Oct 01 03:12 |
310 Anti Forensics AF int0x80 of Dual Core (2).mp4 | 35.7 MiB | 2021 Apr 21 12:52 |
310 Anti Forensics AF int0x80 of Dual Core (2).srt | 46.8 KiB | 2019 Oct 01 03:12 |
310 Anti Forensics AF int0x80 of Dual Core.mp4 | 36.1 MiB | 2021 Apr 21 12:52 |
310 Anti Forensics AF int0x80 of Dual Core.srt | 47.1 KiB | 2019 Oct 01 03:12 |
311 Penetration Testing Trends John Strand (2).mp4 | 40.2 MiB | 2021 Apr 21 12:52 |
311 Penetration Testing Trends John Strand (2).srt | 75.1 KiB | 2019 Oct 01 03:13 |
311 Penetration Testing Trends John Strand.mp4 | 40.3 MiB | 2021 Apr 21 12:52 |
311 Penetration Testing Trends John Strand.srt | 74.9 KiB | 2019 Oct 01 03:12 |
312 Using Binary Ninja for Modern Malware Analysis Dr Jared DeMott Mr Josh Stroschein.mp4 | 23.9 MiB | 2021 Apr 21 12:52 |
312 Using Binary Ninja for Modern Malware Analysis Dr Jared DeMott Mr Josh Stroschein.srt | 43.0 KiB | 2019 Oct 01 03:13 |
313 Scripting Myself Out of a Job Automating the Penetration Test with APT2 Adam Compton Austin Lane (2).mp4 | 32.7 MiB | 2021 Apr 21 12:52 |
313 Scripting Myself Out of a Job Automating the Penetration Test with APT2 Adam Compton Austin Lane (2).srt | 65.8 KiB | 2019 Oct 01 03:13 |
313 Scripting Myself Out of a Job Automating the Penetration Test with APT2 Adam Compton Austin Lane.mp4 | 32.7 MiB | 2021 Apr 21 12:52 |
313 Scripting Myself Out of a Job Automating the Penetration Test with APT2 Adam Compton Austin Lane.srt | 66.0 KiB | 2019 Oct 01 03:11 |
314 DNS in Enterprise IR Collection Analysis and Response Philip Martin (2).mp4 | 30.3 MiB | 2021 Apr 21 12:52 |
314 DNS in Enterprise IR Collection Analysis and Response Philip Martin (2).srt | 62.9 KiB | 2019 Oct 01 03:12 |
314 DNS in Enterprise IR Collection Analysis and Response Philip Martin.mp4 | 30.3 MiB | 2021 Apr 21 12:52 |
314 DNS in Enterprise IR Collection Analysis and Response Philip Martin.srt | 63.2 KiB | 2019 Oct 01 03:12 |
315 Reverse engineering all the malwareand why you should stop Brandon *****.mp4 | 52.5 MiB | 2021 Apr 21 12:52 |
315 Reverse engineering all the malwareand why you should stop Brandon *****.srt | 77.4 KiB | 2019 Oct 01 03:12 |
316 The 90s called they want their technology back Stephen Hilt.mp4 | 30.5 MiB | 2021 Apr 21 12:52 |
316 The 90s called they want their technology back Stephen Hilt.srt | 43.7 KiB | 2019 Oct 01 03:12 |
317 Poetically Opaque or other John Updike Quotes hypervista.mp4 | 50.9 MiB | 2021 Apr 21 12:52 |
317 Poetically Opaque or other John Updike Quotes hypervista.srt | 63.8 KiB | 2019 Oct 01 03:12 |
318 Java RATS Not even your Macs are safe Anthony Kasza.mp4 | 40.7 MiB | 2021 Apr 21 12:52 |
318 Java RATS Not even your Macs are safe Anthony Kasza.srt | 58.1 KiB | 2019 Oct 01 03:12 |
319 Hashview a new tool aimed to improve your password cracking endeavors Casey Cammilleri Hans Lakh.mp4 | 22.3 MiB | 2021 Apr 21 12:52 |
319 Hashview a new tool aimed to improve your password cracking endeavors Casey Cammilleri Hans Lakh.srt | 39.7 KiB | 2019 Oct 01 03:12 |
320 Static PIE How and Why Adam Cammack Brent Cook.mp4 | 27.5 MiB | 2021 Apr 21 12:52 |
320 Static PIE How and Why Adam Cammack Brent Cook.srt | 53.7 KiB | 2019 Oct 01 03:13 |
400 Data Obfuscation How to hide data and payloads to make them not exist in a mathematically optima.mp4 | 34.3 MiB | 2021 Apr 21 12:52 |
400 Data Obfuscation How to hide data and payloads to make them not exist in a mathematically optima.srt | 67.3 KiB | 2019 Oct 01 03:12 |
401 Top 10 2015 2016 compromise patterns observed how to use non traditional Internet datasets to de - YouTube.mp4 | 52.6 MiB | 2021 Apr 21 12:52 |
401 Top 10 2015 2016 compromise patterns observed how to use non traditional Internet datasets to de - YouTube.srt | 79.7 KiB | 2019 Oct 01 03:12 |
402 1000000 0 Cloning a Game Using Game Hacking and Terabytes of Data Nick Cano.mp4 | 36.0 MiB | 2021 Apr 21 12:52 |
402 1000000 0 Cloning a Game Using Game Hacking and Terabytes of Data Nick Cano.srt | 56.0 KiB | 2019 Oct 01 03:13 |
403 To Catch a Penetration Tester Top SIEM Use Cases Ryan Voloch and Peter Giannoutsos.mp4 | 40.5 MiB | 2021 Apr 21 12:52 |
403 To Catch a Penetration Tester Top SIEM Use Cases Ryan Voloch and Peter Giannoutsos.srt | 54.9 KiB | 2019 Oct 01 03:13 |
404 No Easy Breach Challenges and Lessons from an Epic Investigation Matthew Dunwoody Nick Carr.mp4 | 45.2 MiB | 2021 Apr 21 12:52 |
404 No Easy Breach Challenges and Lessons from an Epic Investigation Matthew Dunwoody Nick Carr.srt | 80.0 KiB | 2019 Oct 01 03:12 |
405 Hacking Lync or The Weakest Lync nyxgeek.mp4 | 21.2 MiB | 2021 Apr 21 12:52 |
405 Hacking Lync or The Weakest Lync nyxgeek.srt | 28.9 KiB | 2019 Oct 01 03:11 |
406 AWShit Pay as you go Mobile Penetration Testing Nathan Clark.mp4 | 26.1 MiB | 2021 Apr 21 12:52 |
406 AWShit Pay as you go Mobile Penetration Testing Nathan Clark.srt | 37.0 KiB | 2019 Oct 01 03:11 |
407 Tool Drop 20 Free As In Pizza Scot Berner Jason Lang.mp4 | 51.6 MiB | 2021 Apr 21 12:52 |
407 Tool Drop 20 Free As In Pizza Scot Berner Jason Lang.srt | 60.2 KiB | 2019 Oct 01 03:11 |
408 The Art of War Attacking the Organization and Raising the Defense Jeremy Mio David Lauer Mike Wo.mp4 | 28.4 MiB | 2021 Apr 21 12:52 |
408 The Art of War Attacking the Organization and Raising the Defense Jeremy Mio David Lauer Mike Wo.srt | 33.5 KiB | 2019 Oct 01 03:12 |
409 Managed to Mangled Exploitation of Enterprise Network Management Systems Deral Heiland Matthew K.mp4 | 49.7 MiB | 2021 Apr 21 12:52 |
409 Managed to Mangled Exploitation of Enterprise Network Management Systems Deral Heiland Matthew K.srt | 55.6 KiB | 2019 Oct 01 03:12 |
410 Garbage in garbage out generating useful log data in complex environments Ellen Hartstack and Ma.mp4 | 53.2 MiB | 2021 Apr 21 12:52 |
410 Garbage in garbage out generating useful log data in complex environments Ellen Hartstack and Ma.srt | 72.8 KiB | 2019 Oct 01 03:12 |
411 Fuzzing basicshow to break software grid aka Scott M.mp4 | 44.8 MiB | 2021 Apr 21 12:52 |
411 Fuzzing basicshow to break software grid aka Scott M.srt | 53.3 KiB | 2019 Oct 01 03:12 |
412 Hacking for Homeschoolers STEM projects for under 20 Branden Miller.mp4 | 40.2 MiB | 2021 Apr 21 12:52 |
412 Hacking for Homeschoolers STEM projects for under 20 Branden Miller.srt | 45.0 KiB | 2019 Oct 01 03:13 |
413 Need More Sleep REST Could Help Drew Branch.mp4 | 23.1 MiB | 2021 Apr 21 12:52 |
413 Need More Sleep REST Could Help Drew Branch.srt | 24.3 KiB | 2019 Oct 01 03:13 |
414 Body Hacking 101 or a Healthy Lifestyle for Security Pros Nathan Magniez.mp4 | 52.8 MiB | 2021 Apr 21 12:52 |
414 Body Hacking 101 or a Healthy Lifestyle for Security Pros Nathan Magniez.srt | 78.4 KiB | 2019 Oct 01 03:12 |
415 Hack Yourself Building A Pentesting Lab David Boyd.mp4 | 40.1 MiB | 2021 Apr 21 12:52 |
415 Hack Yourself Building A Pentesting Lab David Boyd.srt | 51.7 KiB | 2019 Oct 01 03:13 |
416 The Advanced Persistent Pentester All Your Networks Are Belong 2 Us Beau Bullock Derek Banks Jof.mp4 | 33.4 MiB | 2021 Apr 21 12:52 |
416 The Advanced Persistent Pentester All Your Networks Are Belong 2 Us Beau Bullock Derek Banks Jof.srt | 49.3 KiB | 2019 Oct 01 03:13 |
417 Hardware Hacking the Easyware Way Brian Fehrman.mp4 | 48.4 MiB | 2021 Apr 21 12:52 |
417 Hardware Hacking the Easyware Way Brian Fehrman.srt | 54.2 KiB | 2019 Oct 01 03:12 |
418 Finding a Weak Link Attacking Windows OEM Kernel Drivers Braden Hollembaek Adam Pond.mp4 | 45.6 MiB | 2021 Apr 21 12:52 |
418 Finding a Weak Link Attacking Windows OEM Kernel Drivers Braden Hollembaek Adam Pond.srt | 62.5 KiB | 2019 Oct 01 03:13 |
500 Go with the Flow Get Started with Flow Analysis Quickly and Cheaply Jason Smith.mp4 | 28.7 MiB | 2021 Apr 21 12:52 |
500 Go with the Flow Get Started with Flow Analysis Quickly and Cheaply Jason Smith.srt | 43.2 KiB | 2019 Oct 01 03:12 |
501 Abusing RTF Exploitation Evasion and Exfiltration Devon Greene.mp4 | 28.1 MiB | 2021 Apr 21 12:52 |
501 Abusing RTF Exploitation Evasion and Exfiltration Devon Greene.srt | 37.6 KiB | 2019 Oct 01 03:13 |
502 Information Security Proposed Solutions Series 1 Talent Aaron Lafferty.mp4 | 23.1 MiB | 2021 Apr 21 12:52 |
502 Information Security Proposed Solutions Series 1 Talent Aaron Lafferty.srt | 35.4 KiB | 2019 Oct 01 03:12 |
503 DNSSUX Why DNSSEC Makes Us Weaker Alfredo Ramirez.mp4 | 13.3 MiB | 2021 Apr 21 12:52 |
503 DNSSUX Why DNSSEC Makes Us Weaker Alfredo Ramirez.srt | 29.5 KiB | 2019 Oct 01 03:11 |
504 Nose Breathing 101 A Guide to Infosec Interviewing Wartortell and Aaron Bayles.mp4 | 32.3 MiB | 2021 Apr 21 12:52 |
504 Nose Breathing 101 A Guide to Infosec Interviewing Wartortell and Aaron Bayles.srt | 56.6 KiB | 2019 Oct 01 03:13 |
505 Android Patchwork Convincing Apps to Do What You Want Them To William McLaughlin.mp4 | 20.6 MiB | 2021 Apr 21 12:52 |
505 Android Patchwork Convincing Apps to Do What You Want Them To William McLaughlin.srt | 32.1 KiB | 2019 Oct 01 03:13 |
506 Is that a penguin in my Windows Spencer McIntyre.mp4 | 19.9 MiB | 2021 Apr 21 12:52 |
506 Is that a penguin in my Windows Spencer McIntyre.srt | 39.0 KiB | 2019 Oct 01 03:12 |
507 Real World Attacks VS Check box Security Brent White Tim Roberts.mp4 | 19.0 MiB | 2021 Apr 21 12:52 |
507 Real World Attacks VS Check box Security Brent White Tim Roberts.srt | 35.6 KiB | 2019 Oct 01 03:12 |
508 ARRR Maties.mp4 | 19.8 MiB | 2021 Apr 21 12:52 |
508 ARRR Maties.srt | 37.1 KiB | 2019 Oct 01 03:13 |
509 Project MVP Hacking and Protecting SharePoint Michael Warton.mp4 | 19.3 MiB | 2021 Apr 21 12:52 |
509 Project MVP Hacking and Protecting SharePoint Michael Warton.srt | 23.3 KiB | 2019 Oct 01 03:12 |
510 Responder for Purple Teams Kevin Gennuso.mp4 | 20.8 MiB | 2021 Apr 21 12:52 |
510 Responder for Purple Teams Kevin Gennuso.srt | 28.7 KiB | 2019 Oct 01 03:11 |
511 Metaprogramming in Ruby and doing it wrong Ken Toler.mp4 | 20.1 MiB | 2021 Apr 21 12:52 |
511 Metaprogramming in Ruby and doing it wrong Ken Toler.srt | 33.3 KiB | 2019 Oct 01 03:13 |
512 Evolving your Offices Security Culture Nancy Snoke.mp4 | 18.2 MiB | 2021 Apr 21 12:52 |
512 Evolving your Offices Security Culture Nancy Snoke.srt | 31.5 KiB | 2019 Oct 01 03:12 |
513 Confronting Obesity Infosec Michael Schearer.mp4 | 19.9 MiB | 2021 Apr 21 12:52 |
513 Confronting Obesity Infosec Michael Schearer.srt | 28.9 KiB | 2019 Oct 01 03:13 |
514 BurpSmartBuster A smart way to find hidden treasures.mp4 | 20.5 MiB | 2021 Apr 21 12:52 |
514 BurpSmartBuster A smart way to find hidden treasures.srt | 28.0 KiB | 2019 Oct 01 03:11 |
515 Advanced Persistent Thirst APT Patrick DeSantis Joe Marshall Carlos Pacho.mp4 | 21.2 MiB | 2021 Apr 21 12:52 |
515 Advanced Persistent Thirst APT Patrick DeSantis Joe Marshall Carlos Pacho.srt | 27.8 KiB | 2019 Oct 01 03:12 |
516 Were a Shooting Gallery Now What Joseph Tegg.mp4 | 22.1 MiB | 2021 Apr 21 12:52 |
516 Were a Shooting Gallery Now What Joseph Tegg.srt | 36.2 KiB | 2019 Oct 01 03:12 |
517 Malicious Office Doc Analysis for EVERYONE Doug Burns.mp4 | 24.2 MiB | 2021 Apr 21 12:52 |
517 Malicious Office Doc Analysis for EVERYONE Doug Burns.srt | 41.2 KiB | 2019 Oct 01 03:12 |
518 The 1337 Gods of Geek Mythology Justin Herman Anna Jeannine Herman.mp4 | 22.7 MiB | 2021 Apr 21 12:52 |
518 The 1337 Gods of Geek Mythology Justin Herman Anna Jeannine Herman.srt | 30.1 KiB | 2019 Oct 01 03:11 |
519 Open Source Intelligence What I learned by being an OSINT creeper Josh Huff.mp4 | 21.9 MiB | 2021 Apr 21 12:52 |
519 Open Source Intelligence What I learned by being an OSINT creeper Josh Huff.srt | 28.1 KiB | 2019 Oct 01 03:12 |
520 Finding Your Balance Joey Maresca.mp4 | 20.5 MiB | 2021 Apr 21 12:52 |
520 Finding Your Balance Joey Maresca.srt | 32.6 KiB | 2019 Oct 01 03:13 |
521 Hashcat State of the Union EvilMog.mp4 | 11.4 MiB | 2021 Apr 21 12:52 |
521 Hashcat State of the Union EvilMog.srt | 19.2 KiB | 2019 Oct 01 03:12 |
522 Establishing A Foothold With JavaScript Casey Smith.mp4 | 20.0 MiB | 2021 Apr 21 12:52 |
522 Establishing A Foothold With JavaScript Casey Smith.srt | 34.5 KiB | 2019 Oct 01 03:12 |
523 Overcoming Imposter Syndrome even if youre totally faking it Jesika McEvoy.mp4 | 24.7 MiB | 2021 Apr 21 12:52 |
523 Overcoming Imposter Syndrome even if youre totally faking it Jesika McEvoy.srt | 33.2 KiB | 2019 Oct 01 03:12 |
524 Security v Ops Bridging the Gap.mp4 | 23.9 MiB | 2021 Apr 21 12:52 |
524 Security v Ops Bridging the Gap.srt | 35.7 KiB | 2019 Oct 01 03:13 |
525 From Gaming to Hacking The Planet Chris Lopi.mp4 | 21.3 MiB | 2021 Apr 21 12:52 |
525 From Gaming to Hacking The Planet Chris Lopi.srt | 42.4 KiB | 2019 Oct 01 03:11 |
526 SQL Server Hacking on Scale using PowerShell Scott Sutherland.mp4 | 30.1 MiB | 2021 Apr 21 12:52 |
526 SQL Server Hacking on Scale using PowerShell Scott Sutherland.srt | 44.0 KiB | 2019 Oct 01 03:12 |
527 Dive into DSL Digital Response Analysis with Elasticsearch Brian Marks Andrea Sancho Silgado.mp4 | 16.3 MiB | 2021 Apr 21 12:52 |
527 Dive into DSL Digital Response Analysis with Elasticsearch Brian Marks Andrea Sancho Silgado.srt | 23.8 KiB | 2019 Oct 01 03:12 |
528 Making Our Profession More Professional Bill Gardner.mp4 | 26.8 MiB | 2021 Apr 21 12:52 |
528 Making Our Profession More Professional Bill Gardner.srt | 28.5 KiB | 2019 Oct 01 03:12 |
529 How are tickets paid for Abe Miller.mp4 | 16.1 MiB | 2021 Apr 21 12:52 |
529 How are tickets paid for Abe Miller.srt | 28.2 KiB | 2019 Oct 01 03:12 |
530 Security Automation in your Continuous Integration Pipeline Jimmy Byrd.mp4 | 18.8 MiB | 2021 Apr 21 12:52 |
530 Security Automation in your Continuous Integration Pipeline Jimmy Byrd.srt | 27.4 KiB | 2019 Oct 01 03:12 |
531 Cruise Ship Security OR Hacking the High Seas Chad M Dewey.mp4 | 20.6 MiB | 2021 Apr 21 12:52 |
531 Cruise Ship Security OR Hacking the High Seas Chad M Dewey.srt | 29.3 KiB | 2019 Oct 01 03:12 |
532 Web Security for Dummies Lee Neely.mp4 | 19.7 MiB | 2021 Apr 21 12:52 |
532 Web Security for Dummies Lee Neely.srt | 29.7 KiB | 2019 Oct 01 03:12 |
533 I Love myBFF Brute Force Framework Kirk Hayes.mp4 | 15.0 MiB | 2021 Apr 21 12:52 |
533 I Love myBFF Brute Force Framework Kirk Hayes.srt | 21.1 KiB | 2019 Oct 01 03:12 |
534 Nobody gets fired by choosing IBM but maybe they should Cameron Craig Keith Conway.mp4 | 23.1 MiB | 2021 Apr 21 12:52 |
534 Nobody gets fired by choosing IBM but maybe they should Cameron Craig Keith Conway.srt | 39.0 KiB | 2019 Oct 01 03:12 |
535 Shackles Shims and Shivs Understanding Bypass Techniques Mirovengi.mp4 | 23.2 MiB | 2021 Apr 21 12:52 |
535 Shackles Shims and Shivs Understanding Bypass Techniques Mirovengi.srt | 31.0 KiB | 2019 Oct 01 03:12 |
536 Abusing Linux Trust Relationships Authentication Back Alleys and Forgotten Features Ronnie Flath.mp4 | 21.9 MiB | 2021 Apr 21 12:52 |
536 Abusing Linux Trust Relationships Authentication Back Alleys and Forgotten Features Ronnie Flath.srt | 37.7 KiB | 2019 Oct 01 03:13 |
537 Samsung Pay Tokenized Numbers Flaws and Issues Salvador Mendoza.mp4 | 24.7 MiB | 2021 Apr 21 12:52 |
537 Samsung Pay Tokenized Numbers Flaws and Issues Salvador Mendoza.srt | 24.3 KiB | 2019 Oct 01 03:12 |
538 Fire Away Sinking the Next Gen Firewall Russell Butturini.mp4 | 26.4 MiB | 2021 Apr 21 12:52 |
538 Fire Away Sinking the Next Gen Firewall Russell Butturini.srt | 40.8 KiB | 2019 Oct 01 03:12 |
539 PacketKO Data Exfiltration Via Port Knocking Matthew Lichtenberger.mp4 | 13.1 MiB | 2021 Apr 21 12:52 |
539 PacketKO Data Exfiltration Via Port Knocking Matthew Lichtenberger.srt | 17.9 KiB | 2019 Oct 01 03:12 |
540 Ransomware An overview Jamie Murdock.mp4 | 25.2 MiB | 2021 Apr 21 12:52 |
540 Ransomware An overview Jamie Murdock.srt | 32.3 KiB | 2019 Oct 01 03:11 |
541 The Beginners Guide to ICS How to Never Sleep Soundly Again Dan Bougere.mp4 | 29.5 MiB | 2021 Apr 21 12:52 |
541 The Beginners Guide to ICS How to Never Sleep Soundly Again Dan Bougere.srt | 39.4 KiB | 2019 Oct 01 03:12 |
DerbyCon 6 Recharge.pdf | 4.2 MiB | 2016 Sep 12 19:14 |
Derbycon 6 Closing Ceremonies.mp4 | 93.9 MiB | 2021 Apr 21 12:52 |