Parent directory/ | - | - |
42 The answer to life the universe and everything offensive security Will Pearce Nick Landers.eng.srt | 108.7 KiB | 2019 Oct 01 03:17 |
42 The answer to life the universe and everything offensive security Will Pearce Nick Landers.mp4 | 48.7 MiB | 2021 Apr 22 13:36 |
API Keys Now WhatTaking the Pen Test Into the Amazon Cloud Jim Shaver.eng.srt | 55.6 KiB | 2019 Oct 01 03:17 |
API Keys Now WhatTaking the Pen Test Into the Amazon Cloud Jim Shaver.mp4 | 24.4 MiB | 2021 Apr 22 13:36 |
Active Directory Security Beyond the Easy Button Sean Metcalf.eng.srt | 78.4 KiB | 2019 Oct 01 03:17 |
Active Directory Security Beyond the Easy Button Sean Metcalf.mp4 | 42.1 MiB | 2021 Apr 22 13:36 |
Adventures in Azure Privilege Escalation Karl Fosaaen.eng.srt | 91.5 KiB | 2019 Oct 01 03:17 |
Adventures in Azure Privilege Escalation Karl Fosaaen.mp4 | 38.6 MiB | 2021 Apr 22 13:36 |
Adventures in systemd injection Stuart McMurray.eng.srt | 43.0 KiB | 2019 Oct 01 03:17 |
Adventures in systemd injection Stuart McMurray.mp4 | 21.6 MiB | 2021 Apr 22 13:36 |
Adversarial Emulation Bryson Bort.eng.srt | 73.0 KiB | 2019 Oct 01 03:16 |
Adversarial Emulation Bryson Bort.mp4 | 42.0 MiB | 2021 Apr 22 13:36 |
Almost All Noise 2 00 Metasploit Town Hall Finale Brent Cook Pearce Barry Jeffrey Martin Matthew Kie.mp4 | 28.9 MiB | 2021 Apr 22 13:36 |
Are you ready to leverage DevSecOps Get ready and use it for good Nicole Schwartz aka Circ.eng.srt | 43.4 KiB | 2019 Oct 01 03:17 |
Are you ready to leverage DevSecOps Get ready and use it for good Nicole Schwartz aka Circ.mp4 | 23.4 MiB | 2021 Apr 22 13:36 |
Assessing IoT Surveillance Arlo Jimi Sebree.eng.srt | 40.3 KiB | 2019 Oct 01 03:17 |
Assessing IoT Surveillance Arlo Jimi Sebree.mp4 | 18.9 MiB | 2021 Apr 22 13:36 |
Assumed Breach A Better Model for Penetration Testing Mike Saunders.eng.srt | 71.7 KiB | 2019 Oct 01 03:17 |
Assumed Breach A Better Model for Penetration Testing Mike Saunders.mp4 | 54.8 MiB | 2021 Apr 22 13:36 |
Attacking with Automation How Office 365 automation provides another new risk to the cloud Tren.eng.srt | 49.6 KiB | 2019 Oct 01 03:17 |
Attacking with Automation How Office 365 automation provides another new risk to the cloud Tren.mp4 | 27.6 MiB | 2021 Apr 22 13:36 |
Automated Dylib Hijacking Jimi Sebree.eng.srt | 33.1 KiB | 2019 Oct 01 03:17 |
Automated Dylib Hijacking Jimi Sebree.mp4 | 20.3 MiB | 2021 Apr 22 13:36 |
Automating Hashtopolis EvilMog.eng.srt | 33.1 KiB | 2019 Oct 01 03:17 |
Automating Hashtopolis EvilMog.mp4 | 19.7 MiB | 2021 Apr 22 13:36 |
Azure Sentinel A first look at Microsofts SIEM Solution Carl Hertz.eng.srt | 73.0 KiB | 2019 Oct 01 03:17 |
Azure Sentinel A first look at Microsofts SIEM Solution Carl Hertz.mp4 | 49.5 MiB | 2021 Apr 22 13:36 |
Bad Audio 2 01 I PWN thee I PWN thee not Jayson E Street.mp4 | 46.2 MiB | 2021 Apr 22 13:36 |
Behavioral Security and Offensive Psychology at Scale Samantha Davison Josh Schwartz.eng.srt | 60.9 KiB | 2019 Oct 01 03:17 |
Behavioral Security and Offensive Psychology at Scale Samantha Davison Josh Schwartz.mp4 | 46.3 MiB | 2021 Apr 22 13:36 |
BloodHound From Red to Blue Mathieu Saulnier.eng.srt | 75.0 KiB | 2019 Oct 01 03:17 |
BloodHound From Red to Blue Mathieu Saulnier.mp4 | 54.8 MiB | 2021 Apr 22 13:36 |
BloodHound Head to Tail Andy Robbins Rohan Vazarkar.eng.srt | 84.5 KiB | 2019 Oct 01 03:17 |
BloodHound Head to Tail Andy Robbins Rohan Vazarkar.mp4 | 43.3 MiB | 2021 Apr 22 13:36 |
Breaking Entering via SDR or How I defeated Wiegend over UHFVHF or your apartment isnt safe Tim.eng.srt | 82.7 KiB | 2019 Oct 01 03:17 |
Breaking Entering via SDR or How I defeated Wiegend over UHFVHF or your apartment isnt safe Tim.mp4 | 47.6 MiB | 2021 Apr 22 13:36 |
Build your own multi user password manager using open source software Michael Vieau Kevin.eng.srt | 42.9 KiB | 2019 Oct 01 03:17 |
Build your own multi user password manager using open source software Michael Vieau Kevin.mp4 | 24.4 MiB | 2021 Apr 22 13:36 |
Bypassing MacOS Detections With Swift Cedric Owens.eng.srt | 48.1 KiB | 2019 Oct 01 03:17 |
Bypassing MacOS Detections With Swift Cedric Owens.mp4 | 27.1 MiB | 2021 Apr 22 13:36 |
COM Hijacking Techniques David Tulis.eng.srt | 81.0 KiB | 2019 Oct 01 03:17 |
COM Hijacking Techniques David Tulis.mp4 | 42.9 MiB | 2021 Apr 22 13:36 |
Choose Your Own TTX Redefining the Incident Response Table Top Exercise Jamison Budacki.eng.srt | 43.4 KiB | 2019 Oct 01 03:16 |
Choose Your Own TTX Redefining the Incident Response Table Top Exercise Jamison Budacki.mp4 | 23.3 MiB | 2021 Apr 22 13:36 |
Collect All the Data Protect All the Things Aaron Rosenmund.eng.srt | 92.7 KiB | 2019 Oct 01 03:17 |
Collect All the Data Protect All the Things Aaron Rosenmund.mp4 | 34.2 MiB | 2021 Apr 22 13:36 |
Confessions of an IT OT Marriage Counselor Lesley Carhart.eng.srt | 57.8 KiB | 2019 Oct 01 03:17 |
Confessions of an IT OT Marriage Counselor Lesley Carhart.mp4 | 27.4 MiB | 2021 Apr 22 13:36 |
Cyber false flags and adversarial counterintelligence oh my Jacob Williams.eng.srt | 110.5 KiB | 2019 Oct 01 03:17 |
Cyber false flags and adversarial counterintelligence oh my Jacob Williams.mp4 | 51.0 MiB | 2021 Apr 22 13:36 |
Defeating Next Gen AV and EDR Using Old And New Tricks on New Dogs Nick Lehman Graph X Steve Ei.eng.srt | 57.2 KiB | 2019 Oct 01 03:17 |
Defeating Next Gen AV and EDR Using Old And New Tricks on New Dogs Nick Lehman Graph X Steve Ei.mp4 | 41.4 MiB | 2021 Apr 22 13:36 |
DerbyCon 9 0 Metasploit Town Hall Redubbed.eng.srt | 53.7 KiB | 2019 Oct 01 03:16 |
DerbyCon 9 0 Metasploit Town Hall Redubbed.mp4 | 23.5 MiB | 2021 Apr 22 13:36 |
DerbyCon 9 Behind the scenes.eng.srt | 11.1 KiB | 2019 Oct 01 03:17 |
DerbyCon 9 Behind the scenes.mp4 | 23.7 MiB | 2021 Apr 22 13:36 |
DerbyCon 9 Closing.eng.srt | 156.6 KiB | 2019 Oct 01 03:17 |
DerbyCon 9 Closing.mp4 | 129.2 MiB | 2021 Apr 22 13:36 |
DerbyCon 9 Finish Line.pdf | 14.9 MiB | 2019 Aug 23 00:36 |
DerbyCon Story Time Panel Dustin Heywood Evil Mog and others.eng.srt | 87.9 KiB | 2019 Oct 01 03:17 |
DerbyCon Story Time Panel Dustin Heywood Evil Mog and others.mp4 | 62.5 MiB | 2021 Apr 22 13:36 |
Designing building a stealth C2 LDAP channel Rindert Kramer.eng.srt | 33.8 KiB | 2019 Oct 01 03:17 |
Designing building a stealth C2 LDAP channel Rindert Kramer.mp4 | 21.0 MiB | 2021 Apr 22 13:36 |
Dynamic Risk Taking and Social Engineering Chris Hadnagy.eng.srt | 96.6 KiB | 2019 Oct 01 03:17 |
Dynamic Risk Taking and Social Engineering Chris Hadnagy.mp4 | 45.5 MiB | 2021 Apr 22 13:36 |
Early Detection Through Deception Jason Nester.eng.srt | 45.6 KiB | 2019 Oct 01 03:17 |
Early Detection Through Deception Jason Nester.mp4 | 19.6 MiB | 2021 Apr 22 13:36 |
Empathy as a Service to Create a Culture of Security Tracy Z Maleeff.eng.srt | 90.9 KiB | 2019 Oct 01 03:17 |
Empathy as a Service to Create a Culture of Security Tracy Z Maleeff.mp4 | 32.3 MiB | 2021 Apr 22 13:36 |
Enabling The Future Panel Dave Kennedy Jess Walpole Scott Angelo Kevin Baker.eng.srt | 108.2 KiB | 2019 Oct 01 03:17 |
Enabling The Future Panel Dave Kennedy Jess Walpole Scott Angelo Kevin Baker.mp4 | 74.3 MiB | 2021 Apr 22 13:36 |
Endpoint Detection Super Powers on the cheap with Sysmon Olaf Hartong.eng.srt | 46.3 KiB | 2019 Oct 01 03:17 |
Endpoint Detection Super Powers on the cheap with Sysmon Olaf Hartong.mp4 | 46.9 MiB | 2021 Apr 22 13:36 |
Five Mistakes We Wish Users Would Stop Making Lesley Carhart Chelle Clements April C Wright Ama.eng.srt | 81.2 KiB | 2019 Oct 01 03:17 |
Five Mistakes We Wish Users Would Stop Making Lesley Carhart Chelle Clements April C Wright Ama.mp4 | 71.3 MiB | 2021 Apr 22 13:36 |
Frag Youre It Hacking Laser Tag Eric Escobar.eng.srt | 49.2 KiB | 2019 Oct 01 03:17 |
Frag Youre It Hacking Laser Tag Eric Escobar.mp4 | 26.7 MiB | 2021 Apr 22 13:36 |
Full Steam Ahead Serverless Hacking 101 Tal Melamed.eng.srt | 69.6 KiB | 2019 Oct 01 03:17 |
Full Steam Ahead Serverless Hacking 101 Tal Melamed.mp4 | 52.7 MiB | 2021 Apr 22 13:36 |
Getting dirty on the CANBUS Justin Herman.eng.srt | 33.5 KiB | 2019 Oct 01 03:17 |
Getting dirty on the CANBUS Justin Herman.mp4 | 17.7 MiB | 2021 Apr 22 13:36 |
Getting the most out of your covert physical security assessment A Clients Guide Brent Whi.eng.srt | 47.9 KiB | 2019 Oct 01 03:17 |
Getting the most out of your covert physical security assessment A Clients Guide Brent Whi.mp4 | 29.6 MiB | 2021 Apr 22 13:36 |
Hacking Humans Addressing Vulnerabilities in the Advancing Medical Device Landscape Gabrie.eng.srt | 40.9 KiB | 2019 Oct 01 03:17 |
Hacking Humans Addressing Vulnerabilities in the Advancing Medical Device Landscape Gabrie.mp4 | 24.8 MiB | 2021 Apr 22 13:36 |
Hacking While Blind Joe B TheBlindHacker.eng.srt | 31.7 KiB | 2019 Oct 01 03:17 |
Hacking While Blind Joe B TheBlindHacker.mp4 | 21.7 MiB | 2021 Apr 22 13:36 |
How do I detect technique X in Windows Applied Methodology to Definitively Answer this Question.eng.srt | 73.2 KiB | 2019 Oct 01 03:16 |
How do I detect technique X in Windows Applied Methodology to Definitively Answer this Question.mp4 | 46.4 MiB | 2021 Apr 22 13:36 |
How to Give the Gift That Keeps on Giving Your Knowledge Jason Blanchard.eng.srt | 96.3 KiB | 2019 Oct 01 03:16 |
How to Give the Gift That Keeps on Giving Your Knowledge Jason Blanchard.mp4 | 33.9 MiB | 2021 Apr 22 13:36 |
How to Tell the C Level Their Baby is Ugly Heather Smith.eng.srt | 58.6 KiB | 2019 Oct 01 03:17 |
How to Tell the C Level Their Baby is Ugly Heather Smith.mp4 | 30.6 MiB | 2021 Apr 22 13:36 |
How to cook a five star meal from the convenience of your hotel room Micah K Brown.eng.srt | 39.2 KiB | 2019 Oct 01 03:17 |
How to cook a five star meal from the convenience of your hotel room Micah K Brown.mp4 | 26.2 MiB | 2021 Apr 22 13:36 |
Hunting Phish Kits Josh Rickard.eng.srt | 40.4 KiB | 2019 Oct 01 03:17 |
Hunting Phish Kits Josh Rickard.mp4 | 25.4 MiB | 2021 Apr 22 13:36 |
Hunting Webshells Tracking TwoFace Josh Bryant Robert Falcone.eng.srt | 82.2 KiB | 2019 Oct 01 03:17 |
Hunting Webshells Tracking TwoFace Josh Bryant Robert Falcone.mp4 | 53.9 MiB | 2021 Apr 22 13:36 |
I simulate therefore i catch enhancing detection engineering with adversary simulation Mauricio.eng.srt | 96.3 KiB | 2019 Oct 01 03:16 |
I simulate therefore i catch enhancing detection engineering with adversary simulation Mauricio.mp4 | 46.1 MiB | 2021 Apr 22 13:36 |
IPv6 Security Considerations For When Just Turn It Off Isnt Good Enough Jason Lewis.eng.srt | 47.5 KiB | 2019 Oct 01 03:17 |
IPv6 Security Considerations For When Just Turn It Off Isnt Good Enough Jason Lewis.mp4 | 21.2 MiB | 2021 Apr 22 13:36 |
Improving CACTUSTORCH payloads Ryan Linn.eng.srt | 74.6 KiB | 2019 Oct 01 03:16 |
Improving CACTUSTORCH payloads Ryan Linn.mp4 | 43.6 MiB | 2021 Apr 22 13:36 |
Incident response on macOS Thomas Reed.eng.srt | 74.9 KiB | 2019 Oct 01 03:16 |
Incident response on macOS Thomas Reed.mp4 | 40.0 MiB | 2021 Apr 22 13:36 |
Inter chip communication Testing end to end security on IoT Deral Heiland.eng.srt | 91.9 KiB | 2019 Oct 01 03:16 |
Inter chip communication Testing end to end security on IoT Deral Heiland.mp4 | 41.8 MiB | 2021 Apr 22 13:36 |
Invoke GreatBirdOfCommonKnowledge Gathering what is scattered with ATTCK an Atomic Bird an.eng.srt | 45.3 KiB | 2019 Oct 01 03:17 |
Invoke GreatBirdOfCommonKnowledge Gathering what is scattered with ATTCK an Atomic Bird an.mp4 | 28.7 MiB | 2021 Apr 22 13:36 |
It Must Be Fancy Bear Xena Olsen.eng.srt | 38.8 KiB | 2019 Oct 01 03:17 |
It Must Be Fancy Bear Xena Olsen.mp4 | 25.4 MiB | 2021 Apr 22 13:36 |
Kerberoasting Revisited Will Schroeder.mp4 | 31.1 MiB | 2021 Apr 22 13:36 |
Last Minute Offensive Machine Learning James Bower.eng.srt | 30.3 KiB | 2019 Oct 01 03:17 |
Last Minute Offensive Machine Learning James Bower.mp4 | 9.9 MiB | 2021 Apr 22 13:36 |
Lying in Wait Discovering and Exploiting Weaknesses in Automated Discovery Actions Timothy Wrig.mp4 | 36.9 MiB | 2021 Apr 22 13:36 |
Modlishka Is a Mantis Eating 2FAs Lunch Lance Peterman.eng.srt | 43.5 KiB | 2019 Oct 01 03:17 |
Modlishka Is a Mantis Eating 2FAs Lunch Lance Peterman.mp4 | 24.8 MiB | 2021 Apr 22 13:36 |
NET Manifesto Win Friends and Influence the Loader Casey Smith.eng.srt | 46.1 KiB | 2019 Oct 01 03:17 |
NET Manifesto Win Friends and Influence the Loader Casey Smith.mp4 | 27.3 MiB | 2021 Apr 22 13:36 |
Next gen IoT botnets leveraging cloud implementations for shells on 500k IoTs Alex Jay Balan.eng.srt | 61.8 KiB | 2019 Oct 01 03:17 |
Next gen IoT botnets leveraging cloud implementations for shells on 500k IoTs Alex Jay Balan.mp4 | 37.4 MiB | 2021 Apr 22 13:36 |
No class Low Tech High damage Tom Ruff.eng.srt | 32.0 KiB | 2019 Oct 01 03:17 |
No class Low Tech High damage Tom Ruff.mp4 | 24.1 MiB | 2021 Apr 22 13:36 |
Not A Security Boundary Breaking Forest Trusts Will Schroeder Lee Christensen.eng.srt | 73.2 KiB | 2019 Oct 01 03:17 |
Not A Security Boundary Breaking Forest Trusts Will Schroeder Lee Christensen.mp4 | 41.2 MiB | 2021 Apr 22 13:36 |
Old Tools New Tricks Hacking WebSockets Michael Fowl Nick Defoe.eng.srt | 32.1 KiB | 2019 Oct 01 03:16 |
Old Tools New Tricks Hacking WebSockets Michael Fowl Nick Defoe.mp4 | 21.7 MiB | 2021 Apr 22 13:36 |
One womans journey to CISO leveraging Social Engineering Kate Mullin.eng.srt | 36.9 KiB | 2019 Oct 01 03:17 |
One womans journey to CISO leveraging Social Engineering Kate Mullin.mp4 | 35.8 MiB | 2021 Apr 22 13:36 |
Opening Ceremony Derbycon Crew.eng.srt | 38.7 KiB | 2019 Oct 01 03:17 |
Opening Ceremony Derbycon Crew.mp4 | 24.7 MiB | 2021 Apr 22 13:36 |
Opening Keynote Ed Skoudis.eng.srt | 90.6 KiB | 2019 Oct 01 03:16 |
Opening Keynote Ed Skoudis.mp4 | 65.6 MiB | 2021 Apr 22 13:36 |
Phishing past Mail Protection Controls using Azure Information Protection AIP Oddvar Moe H.eng.srt | 45.1 KiB | 2019 Oct 01 03:17 |
Phishing past Mail Protection Controls using Azure Information Protection AIP Oddvar Moe H.mp4 | 61.4 MiB | 2021 Apr 22 13:36 |
PowerShell Security Looking Back from the Inside Lee Holmes.eng.srt | 77.1 KiB | 2019 Oct 01 03:17 |
PowerShell Security Looking Back from the Inside Lee Holmes.mp4 | 59.1 MiB | 2021 Apr 22 13:36 |
Practical Heuristic Exploitation Kelly Villanueva.eng.srt | 92.1 KiB | 2019 Oct 01 03:17 |
Practical Heuristic Exploitation Kelly Villanueva.mp4 | 49.6 MiB | 2021 Apr 22 13:36 |
Pre Opening Keynote Ed Skoudis.eng.srt | 754 B | 2019 Oct 01 03:17 |
Pre Opening Keynote Ed Skoudis.mp4 | 723.0 KiB | 2021 Apr 22 13:36 |
Prepare to Be Boarded A Tale of Kubernetes Plunder and Cryptobooty James Condon.eng.srt | 42.0 KiB | 2019 Oct 01 03:17 |
Prepare to Be Boarded A Tale of Kubernetes Plunder and Cryptobooty James Condon.mp4 | 25.9 MiB | 2021 Apr 22 13:36 |
Product Security Shouldnt be Painful Wim Remes.eng.srt | 50.9 KiB | 2019 Oct 01 03:17 |
Product Security Shouldnt be Painful Wim Remes.mp4 | 32.1 MiB | 2021 Apr 22 13:36 |
Python Two birds with one stone Andy Cooper.eng.srt | 45.6 KiB | 2019 Oct 01 03:17 |
Python Two birds with one stone Andy Cooper.mp4 | 28.2 MiB | 2021 Apr 22 13:36 |
REST in Peace Abusing GraphQL to Attack Underlying Infrastructure Matthew Szymanski.eng.srt | 78.7 KiB | 2019 Oct 01 03:17 |
REST in Peace Abusing GraphQL to Attack Underlying Infrastructure Matthew Szymanski.mp4 | 43.7 MiB | 2021 Apr 22 13:36 |
RFID sniffing under your nose and in your face Rich Rumble.eng.srt | 53.7 KiB | 2019 Oct 01 03:17 |
RFID sniffing under your nose and in your face Rich Rumble.mp4 | 30.6 MiB | 2021 Apr 22 13:36 |
Red Team Level over 9000 Fusing the powah of NET with a scripting language of your choosing int.eng.srt | 97.3 KiB | 2019 Oct 01 03:17 |
Red Team Level over 9000 Fusing the powah of NET with a scripting language of your choosing int.mp4 | 57.1 MiB | 2021 Apr 22 13:36 |
Red Team Methodology A Naked Look Jason Lang.eng.srt | 102.4 KiB | 2019 Oct 01 03:17 |
Red Team Methodology A Naked Look Jason Lang.mp4 | 33.2 MiB | 2021 Apr 22 13:36 |
Rise of the Machines using machine learning with GRC Justin Leapline Rick Yocum.eng.srt | 54.1 KiB | 2019 Oct 01 03:16 |
Rise of the Machines using machine learning with GRC Justin Leapline Rick Yocum.mp4 | 35.5 MiB | 2021 Apr 22 13:36 |
SCADA What the next Stuxnet will look like and how to prevent it Joseph Bingham.eng.srt | 38.5 KiB | 2019 Oct 01 03:17 |
SCADA What the next Stuxnet will look like and how to prevent it Joseph Bingham.mp4 | 25.0 MiB | 2021 Apr 22 13:36 |
SS7 for INFOSEC Paul Coggin.eng.srt | 58.3 KiB | 2019 Oct 01 03:16 |
SS7 for INFOSEC Paul Coggin.mp4 | 29.2 MiB | 2021 Apr 22 13:36 |
Scientific computing for information security forging the missing link Ryan Elkins.eng.srt | 87.3 KiB | 2019 Oct 01 03:17 |
Scientific computing for information security forging the missing link Ryan Elkins.mp4 | 38.4 MiB | 2021 Apr 22 13:36 |
Shadow IT in the Cloud Marisa Dyer Jessica Hazelrigg.eng.srt | 42.3 KiB | 2019 Oct 01 03:17 |
Shadow IT in the Cloud Marisa Dyer Jessica Hazelrigg.mp4 | 24.4 MiB | 2021 Apr 22 13:36 |
SharPersist Windows Persistence Toolkit in C Brett Hawkins.eng.srt | 43.9 KiB | 2019 Oct 01 03:17 |
SharPersist Windows Persistence Toolkit in C Brett Hawkins.mp4 | 24.9 MiB | 2021 Apr 22 13:36 |
Social Engineering in Non Linear Warfare Bill Gardner.eng.srt | 33.4 KiB | 2019 Oct 01 03:17 |
Social Engineering in Non Linear Warfare Bill Gardner.mp4 | 26.0 MiB | 2021 Apr 22 13:36 |
StringSifter Learning to Rank Strings Output for Speedier Malware Analysis Philip Tully Matthew.eng.srt | 88.9 KiB | 2019 Oct 01 03:17 |
StringSifter Learning to Rank Strings Output for Speedier Malware Analysis Philip Tully Matthew.mp4 | 50.8 MiB | 2021 Apr 22 13:36 |
Swagger Defense Mick Douglas Pete Petersen.eng.srt | 43.0 KiB | 2019 Oct 01 03:17 |
Swagger Defense Mick Douglas Pete Petersen.mp4 | 28.9 MiB | 2021 Apr 22 13:36 |
Testing Endpoint Protection How Anyone Can Bypass Next Gen AV Kevin Gennuso.eng.srt | 65.2 KiB | 2019 Oct 01 03:17 |
Testing Endpoint Protection How Anyone Can Bypass Next Gen AV Kevin Gennuso.mp4 | 33.9 MiB | 2021 Apr 22 13:36 |
The 1995 anonymous cyber profile Patrick Matthews.eng.srt | 41.9 KiB | 2019 Oct 01 03:17 |
The 1995 anonymous cyber profile Patrick Matthews.mp4 | 26.0 MiB | 2021 Apr 22 13:36 |
The Art of The BEC What Three Years of Fighting Has Taught Us Ronnie Tokazowski.eng.srt | 111.2 KiB | 2019 Oct 01 03:17 |
The Art of The BEC What Three Years of Fighting Has Taught Us Ronnie Tokazowski.mp4 | 51.8 MiB | 2021 Apr 22 13:36 |
The Backup Operators Guide to the Galaxy Dave Mayer.eng.srt | 32.4 KiB | 2019 Oct 01 03:17 |
The Backup Operators Guide to the Galaxy Dave Mayer.mp4 | 24.7 MiB | 2021 Apr 22 13:36 |
The Hackers Apprentice Mark Baggett.eng.srt | 75.6 KiB | 2019 Oct 01 03:17 |
The Hackers Apprentice Mark Baggett.mp4 | 32.8 MiB | 2021 Apr 22 13:36 |
The quest for 10g IDS Harold Tabellion.eng.srt | 37.0 KiB | 2019 Oct 01 03:17 |
The quest for 10g IDS Harold Tabellion.mp4 | 26.6 MiB | 2021 Apr 22 13:36 |
Theres No Place like DUALHomed David E ***** Jr.eng.srt | 38.3 KiB | 2019 Oct 01 03:17 |
Theres No Place like DUALHomed David E ***** Jr.mp4 | 25.4 MiB | 2021 Apr 22 13:36 |
To CORS The cause of and solution to your SPA problems Tim lanmaster53 Tomes Kevin Cody.eng.srt | 91.4 KiB | 2019 Oct 01 03:17 |
To CORS The cause of and solution to your SPA problems Tim lanmaster53 Tomes Kevin Cody.mp4 | 45.5 MiB | 2021 Apr 22 13:36 |
Unix the Other White Meat Adam Compton David Boyd.eng.srt | 93.5 KiB | 2019 Oct 01 03:17 |
Unix the Other White Meat Adam Compton David Boyd.mp4 | 46.5 MiB | 2021 Apr 22 13:36 |
Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Exploits Dr Jared.eng.srt | 101.9 KiB | 2019 Oct 01 03:17 |
Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Exploits Dr Jared.mp4 | 48.3 MiB | 2021 Apr 22 13:36 |
Virtual Smart Cards for Lab Environments Eddie David.eng.srt | 46.0 KiB | 2019 Oct 01 03:17 |
Virtual Smart Cards for Lab Environments Eddie David.mp4 | 38.0 MiB | 2021 Apr 22 13:36 |
Waking up the data engineer in you Jared Atkinson.eng.srt | 55.9 KiB | 2019 Oct 01 03:17 |
Waking up the data engineer in you Jared Atkinson.mp4 | 31.4 MiB | 2021 Apr 22 13:36 |
Welcome to the Jumble Improving RDP Tooling for Malware Analysis and Pentesting milio Gonzalez.eng.srt | 67.3 KiB | 2019 Oct 01 03:16 |
Welcome to the Jumble Improving RDP Tooling for Malware Analysis and Pentesting milio Gonzalez.mp4 | 37.8 MiB | 2021 Apr 22 13:36 |
Well what have we here A year of cyber deception attribution and making attackers rethink their.eng.srt | 94.5 KiB | 2019 Oct 01 03:17 |
Well what have we here A year of cyber deception attribution and making attackers rethink their.mp4 | 56.2 MiB | 2021 Apr 22 13:36 |
kubered Recipes for C2 Operations on Kubernetes Larry Suto Jeff Holden.eng.srt | 66.1 KiB | 2019 Oct 01 03:17 |
kubered Recipes for C2 Operations on Kubernetes Larry Suto Jeff Holden.mp4 | 46.7 MiB | 2021 Apr 22 13:36 |