/44Con 2011/
|
Communicating with the Boss, Steve Armstrong - 44CON 2011.mp4
|
129.7 MB
|
Penetration Testing Considered Harmful, Haroon Meer - 44CON 2011.mp4
|
107.6 MB
|
Systems Applications Proxy Pwnage, Ian De Villiers - 44CON 2011.mp4
|
101.5 MB
|
Terrorism, Tracking, Privacy And Human Interactions. Daniel Cuthbert & Glenn Wilkinson at 4CON 2012.mp4
|
140.6 MB
|
Trusteer Rapport, Neil Kettle - 44CON 2011.mp4
|
130.1 MB
|
USB Flash Drive Forensics, Philip Polstra - 44CON 2011.mp4
|
149.8 MB
|
Windows Pwn 7 OEM, Alex Plaskett - 44CON 2011.mp4
|
105.8 MB
|
/44Con 2012/
|
2012 In Review Tor And The Censorship Arms Race. Runa A. Sandvik at 44CON 2012.mp4
|
117.1 MB
|
An Idiot Abroad. Don A. Bailey at 44CON 2012.mp4
|
105.3 MB
|
Cryptanalysis Of The Enigma Machine. Robert Weiss & Ben Gatti at 44CON 2012.mp4
|
138.4 MB
|
Hacking And Forensics On The Go. Phil Polstra at 44CON 2012.mp4
|
98.1 MB
|
I m The Butcher, Would You Like Some Beef Thomas Mackenzie & Michele Orru at 44CON 2012.mp4
|
130.7 MB
|
Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012.mp4
|
143.9 MB
|
Passive IPS Reconnaissance and Enumeration - false positive (ab)use - Arron Finnon.mp4
|
74.1 MB
|
Securing The Internet You re Doing It Wrong (An Infosec Intervention). Jayson Street at 44CON 2012.mp4
|
104.4 MB
|
Software Security Austerity. Ollie Whitehouse at 44CON 2012.mp4
|
69.7 MB
|
Surveillance Cameras..... Michael Viscuso at 44CON 2012.mp4
|
94.9 MB
|
/44Con 2013/
|
44CON 2013 - A talk about (info-sec) talks - Haroon Meer.mp4
|
65.9 MB
|
44CON 2013 - Even More Tamagotchis Were Harmed... - Natalie Silvanovich.mp4
|
174.5 MB
|
44CON 2013 - Punking Punkbuster - Isaac Dawson.mp4
|
185.6 MB
|
44CON 2013 - Security Lessons from Dictators - Jerry Gamblin.mp4
|
158.8 MB
|
A Captive Audience - Jaime Cochran in 44CON 2013 Conference Videos.mp4
|
75.7 MB
|
A Fast Hard Disk with Active Antiforensics - Travis Godspeed in 44CON 2013 Conference Videos.mp4
|
165.7 MB
|
A talk about (info-sec) talks - Haroon Meer in 44CON 2013 Conference Videos.mp4
|
74.8 MB
|
Best Practices and the Future of Adaptive Authentication - Robert Weiss & Ben Gatti in 44CON 2013 Conference Videos.mp4
|
99.3 MB
|
Breaking Bad Programs - Don A. Bailey in 44CON 2013 Conference Videos.mp4
|
211.9 MB
|
Browser bug hunting - Memoirs of a last man standing - Atte Kettunen in 44CON 2013 Conference Videos.mp4
|
98.1 MB
|
Evading Identification and Detection by Messing with Binary Formats - Ange Albertini in 44CON 2013 Conference Videos.mp4
|
48.8 MB
|
Even More Tamagotchis Were Harmed in the Making of this Presentation - Natalie Silvanovich in 44CON 2013 Conference Videos.mp4
|
80.3 MB
|
Hack the Gibson - Exploiting Supercomputers - John Fitzpatrick & Luke Jennings in 44CON 2013 Conference Videos.mp4
|
127.0 MB
|
Honey I m Home - Hacking Z-Wave Home Automation Systems - Behrang Fouladi & Sahand Ghanoun in 44CON 2013 Conference Videos.mp4
|
92.3 MB
|
I miss LSD - Tim Brown in 44CON 2013 Conference Videos.mp4
|
110.8 MB
|
My quest into FM-RDS, Oona Raisanen in 44CON 2013 Conference Videos.mp4
|
88.0 MB
|
Punking Punkbuster - Isaac Dawson in 44CON 2013 Conference Videos.mp4
|
69.1 MB
|
Reversing and Exploiting BT CPE Devices - Zachary Cutlip in 44CON 2013 Conference Videos.mp4
|
59.9 MB
|
Security Lessons from Dictators - Jerry Gamblin in 44CON 2013 Conference Videos.mp4
|
64.5 MB
|
Signatureless Breach Detection Under The Microscope - Olli-Pekka Niemi & Antti Levomaki in 44CON 2013 Conference Videos.mp4
|
190.3 MB
|
Surviving the 0-day - Reducing the Window of Exposure - Andreas Lindh in 44CON 2013 Conference Videos.mp4
|
45.2 MB
|
The Forgers Art Exploiting XML Digital Signature Implementations - James Forshaw in 44CON 2013 Conference Videos.mp4
|
101.1 MB
|
dotNet Havoc - Manipulating Properties of Dormant Server Side Web Controls - Shay Chen in 44CON 2013 Conference Videos.mp4
|
94.9 MB
|
/44Con 2014/
|
10 Simple Hardware Side Channel Attacks - Joe FitzPatrick in 44CON 2014.mp4
|
161.8 MB
|
44CON 2014 Conference Videos.mp4
|
26.6 MB
|
A Year in Recap I Am The Cavalry - Beau Woods in 44CON 2014.mp4
|
976.8 KB
|
Breaking AV Software - Joxean Koret in 44CON 2014.mp4
|
136.7 MB
|
Bug Bounties - Relationship Advice for the Hunters and the Hunted - Katie Moussouris in 44CON 2014.mp4
|
23.9 MB
|
Chopping Down Mountains - Don A. Bailey in 44CON 2014.mp4
|
136.7 MB
|
Darshak how to turn your phone into a low cost IMSI catcher device - Ravishankar Borgaonkar and Swapnil Udar in 44CON 2014.mp4
|
293.2 MB
|
Flushing Away Preconceptions of Risk - Thom Langford in 44CON 2014.mp4
|
80.5 MB
|
Goodbye 44CON 2014.mp4
|
293.2 MB
|
GreedyBTS Hacking Adventures in GSM - Hacker Fantastic in 44CON 2014.mp4
|
2.0 MB
|
Hot or not the hacker way - Dan Tentler in 44CON 2014.mp4
|
80.5 MB
|
I Hunt TR-069 Admins - Pwning ISPs Like a Boss, Shahar Tal in 44CON 2014.mp4
|
293.2 MB
|
I gave a talk about robots and hardware! - Josh Thomas in 44CON 2014.mp4
|
136.7 MB
|
Incident Handling with CyberCPR - Mike Antcliffe Steve Armstrong Ed Tredgett in 44CON 2014.mp4
|
80.5 MB
|
Lessons Learned from Black Hat s Infrastructure - The Tweets Must Flow Conan Dooley in 44CON 2014.mp4
|
136.7 MB
|
Manna from Heaven Improving the state of wireless rogue AP attacks Dominic White in 44CON 2014.mp4
|
293.2 MB
|
Meterpreter Internals - OJ Reeves in 44CON 2014.mp4
|
293.2 MB
|
On Her Majestys Secret Service GRX and a Spy Agency - Stephen Kho in 44CON 2014.mp4
|
179.8 MB
|
Pandas Bears and Goldern Hamsters Automating malware triage and recent campaign analysis - David Cannings in 44CON 2014.mp4
|
80.5 MB
|
Payment applications handle lots of money. No really lots of it. Alberto Revelli and Mark Swift in 44CON 2014.mp4
|
53.6 MB
|
Pentesting NoSQL DB s Using NoSQL Exploitation Framework - Francis Alexander in 44CON 2014.mp4
|
53.6 MB
|
Researching Android Device Security with the Help of a Droid Army - Joshua J. Drake in 44CON 2014.mp4
|
136.7 MB
|
Security Analytics Beyond Cyber - Phil Huggins in 44CON 2014.mp4
|
53.6 MB
|
Side Channel attacks in the cloud - Gorka Irazoqui Apecechea in 44CON 2014.mp4
|
179.8 MB
|
Social Engineering Your Own - Developing An Awareness Training Program That Actually Works - Valerie Thomas in 44CON 2014.mp4
|
179.8 MB
|
Stupid PCIe Tricks - Joe FitzPatrick in 44CON 2014.mp4
|
179.8 MB
|
Top 5 Media Fails - Dan Raywood in 44CON 2014.mp4
|
53.6 MB
|
Using Hadoop for Malware Network Forensics and Log analysis - Michael Boman in 44CON 2014.mp4
|
53.6 MB
|
What Did You Just Say To Me - Jerry Gamblin in 44CON 2014.mp4
|
80.5 MB
|
When Documents Bite - Vlad Ovtchinikov in 44CON 2014.mp4
|
179.8 MB
|
/44Con 2015/
|
44CON CyberSecurity 2015 - Checksec in 44CON CS 2015.mp4
|
26.6 MB
|
44CON CyberSecurity 2015 - Digital Shadows in 44CON CS 2015.mp4
|
60.0 MB
|
44CON CyberSecurity 2015 - F-Secure in 44CON CS 2015.mp4
|
25.6 MB
|
44CON CyberSecurity 2015 - F-Secure party - Mikko in 44CON CS 2015.mp4
|
26.6 MB
|
44CON CyberSecurity 2015 - Jerry Gamblin in 44CON CS 2015.mp4
|
60.0 MB
|
44CON CyberSecurity 2015 - Logically Secure in 44CON CS 2015.mp4
|
60.0 MB
|
44CON CyberSecurity 2015 - PQChat in 44CON CS 2015.mp4
|
60.0 MB
|
44CON CyberSecurity 2015 - Quentyn Taylor in 44CON CS 2015.mp4
|
26.6 MB
|
44CON CyberSecurity 2015 - Track 1 - Jessica Barker in 44CON CS 2015.mp4
|
60.0 MB
|
44CON Cybersecurity 2015 - NCC in 44CON CS 2015.mp4
|
25.6 MB
|
44CON Cybersecurity 2015 - Track 1 - Phil Huggins in 44CON CS 2015.mp4
|
26.6 MB
|
Analyzing Malicious Office Documents - Presented By Didier Stevens (Workshop).mp4
|
241.8 MB
|
Attacking VxWorks from Stone Age to Interstellar - Presented By Yannick Formaggio.mp4
|
63.3 MB
|
Barbarians At The Gate(way) An Examination Of The Attacker Tool Box - Presented By Dave Lewis.mp4
|
188.1 MB
|
DDoS mitigation EPIC FAIL collection - Presented By Moshe Zioni.mp4
|
73.6 MB
|
Dark Fairytales from a Phisherman (Vol.II) - Presented By Michele Orru.mp4
|
108.7 MB
|
Exploiting 64-bit IE on Windows 8.1 and The Pwn2Own Case Study - Presented By Yuki Chen and Linan Hao.mp4
|
74.9 MB
|
Forging the USB armory Presented By Andrea Barisani in 44CON London 2015.mp4
|
128.9 MB
|
Get in the Ring0 &ndash_ Understanding Windows drivers - Presented By Graham Sutherland.mp4
|
108.7 MB
|
Going AUTH the Rails on a Crazy Train - Presented By Tomek Rabczak and Jeff Jarmoc.mp4
|
105.1 MB
|
Hackers in the Wire and Drones Oh My! - Presented By Philip Polstra.mp4
|
176.0 MB
|
How to drive a malware analyst crazy - Presented By Michael Boman.mp4
|
81.2 MB
|
Hunting Asynchronous Vulnerabilities - Presented By James Kettle.mp4
|
147.3 MB
|
Indicators of Compromise From malware analysis to eradication - Presented By Michael Boman (Workshop).mp4
|
128.9 MB
|
Inside Terracotta VPN - Presented By Kent Backman.mp4
|
9.1 MB
|
Introduction to Reverse Engineering C++ - Presented By Angel M. Villegas (Workshop).mp4
|
176.0 MB
|
Is there an EFI monster inside your apple - Presented By Pedro Vila.mp4
|
110.7 MB
|
Jtagsploitation 5 wires 5 ways to root - Presented By Joe FitzPatrick and Matt King.mp4
|
176.0 MB
|
MITMf Bringing Man-In-The-Middle attacks to the 21st century - Presented ByMarcello Salvati.mp4
|
147.3 MB
|
Meterpreter Understanding the New Shiny - Presented By OJ Reeves.mp4
|
193.3 MB
|
Old Dog New Tricks Forensics With PowerShell - Presented By Jared Atkinson.mp4
|
176.0 MB
|
Responsible disclosure who cares - Presented By OJ Reeves and Dan Tentler.mp4
|
45.9 MB
|
Reverse engineering and exploiting font rasterizers the OpenType saga - Presented By Mateusz Jurczyk.mp4
|
176.0 MB
|
Smart Muttering a story and toolset for smart meter platform - Presented By Ian de Villiers.mp4
|
108.7 MB
|
Software Defined Networking (SDN) Security - Presented By David Jorm.mp4
|
74.9 MB
|
Stegosploit Drive-by Browser Exploits using only Images - Presented By Saumil Shah.mp4
|
112.5 MB
|
Windows 10 2 Steps Forward 1 Step Back - Presented By James Forshaw.mp4
|
109.0 MB
|
/44Con 2016/
|
2016 The Infosec Crossroads - Presented By Saumil Shah.mp4
|
94.9 MB
|
Data protection, privacy and cloud computing navigating legal compliance - Presented By Graham McKay.mp4
|
147.4 MB
|
Effortless, Agentless Breach Detection in the Enterprise Token all the Things! - Presented By Azhar Desai &_ Nicholas Rohrbeck.mp4
|
123.8 MB
|
Frictionless Security - Presented by Jerry Gamblin (2).mp4
|
60.7 MB
|
Frictionless Security - Presented by Jerry Gamblin.mp4
|
60.7 MB
|
Jittery MacGyver Lessons Learned from Building a Bionic Hand out of a Coffee Maker - Presented By Evan Booth.mp4
|
181.8 MB
|
Light at the End of the Tunnel. (Hope for Team Defence) - Presented by Haroon Meer.mp4
|
113.2 MB
|
Managing Incidents with CyberCPR - Presented By Steve Armstrong.mp4
|
130.6 MB
|
Saving Nostalgia Modding an Old Z80 Computer - Presented By Graham Sutherland.mp4
|
117.4 MB
|
The Frugal Girl&rsquo_s Guide to Threat Intelligence - Presented By Rebekah Brown.mp4
|
162.7 MB
|
Three decades in security. What&rsquo_s changed, and what hasn&rsquo_t - Presented by Robert Schifreen.mp4
|
153.6 MB
|
Trusts you might have missed - Presented by Will Schroeder.mp4
|
155.9 MB
|
Universal Serial aBUSe Remote Physical Access Attacks - Presented By Rogan Dawes &_ Dominic White.mp4
|
80.7 MB
|
What it Means to Have the C Word in the National Security Agenda - Presented By Emil Tan.mp4
|
120.0 MB
|
/44Con 2017/
|
A Hands On Introduction To Software Defined Radio - Didier Stevens at 44CON 2017 - Workshop.en.transcribed.srt
|
156.5 KB
|
A Hands On Introduction To Software Defined Radio - Didier Stevens at 44CON 2017 - Workshop.mp4
|
392.8 MB
|
ARM Assembly and Shellcode Basics - Saumil Shah at 44CON 2017 - Workshop.en.transcribed.srt
|
239.6 KB
|
ARM Assembly and Shellcode Basics - Saumil Shah at 44CON 2017 - Workshop.mp4
|
425.8 MB
|
BaRMIe - Poking Java's Back Door - Nicky Bloor at 44CON 2017.en.transcribed.srt
|
97.0 KB
|
BaRMIe - Poking Java's Back Door - Nicky Bloor at 44CON 2017.mp4
|
147.4 MB
|
Biting the Apple that feeds you - Alex Plaskett and James Loureiro at 44CON 2017.en.transcribed.srt
|
112.5 KB
|
Biting the Apple that feeds you - Alex Plaskett and James Loureiro at 44CON 2017.mp4
|
123.2 MB
|
Breaking Historical Ciphers with Modern Algorithms - Klaus Schmeh at 44CON 2017.mp4
|
192.0 MB
|
Checking BIOS protections offline with just the firmware updates - Yuriy Bulygin at 44CON 2017.en.transcribed.srt
|
98.5 KB
|
Checking BIOS protections offline with just the firmware updates - Yuriy Bulygin at 44CON 2017.mp4
|
143.5 MB
|
Chkrootkit Eating APTs for breakfast since 1997 - Nelson Murilo at 44CON 2017.en.transcribed.srt
|
50.2 KB
|
Chkrootkit Eating APTs for breakfast since 1997 - Nelson Murilo at 44CON 2017.mp4
|
110.6 MB
|
Cisco ASA Episode 2 Striking back - Internals and Mitigations - Cedric Halbronn.en.transcribed.srt
|
127.3 KB
|
Cisco ASA Episode 2 Striking back - Internals and Mitigations - Cedric Halbronn.mp4
|
155.8 MB
|
Cracking HiTag2 Crypto - Kevin Sheldrake at 44CON 2017 - Workshop.en.transcribed.srt
|
254.0 KB
|
Cracking HiTag2 Crypto - Kevin Sheldrake at 44CON 2017 - Workshop.mp4
|
354.4 MB
|
Cracking HiTag2 Crypto - Kevin Sheldrake at 44CON 2017.en.transcribed.srt
|
131.9 KB
|
Cracking HiTag2 Crypto - Kevin Sheldrake at 44CON 2017.mp4
|
153.0 MB
|
Hide Yo Keys, Hide Yo Car - Aaron Guzman at 44CON 2017.en.transcribed.srt
|
98.1 KB
|
Hide Yo Keys, Hide Yo Car - Aaron Guzman at 44CON 2017.mp4
|
122.2 MB
|
How to Hack Radios RF Physical Layers - Matt Knight and Marc Newlin at 44CON 2017 - Workshop.en.transcribed.srt
|
282.2 KB
|
How to Hack Radios RF Physical Layers - Matt Knight and Marc Newlin at 44CON 2017 - Workshop.mp4
|
406.8 MB
|
Hypervisor-Assisted Ring0 Debugging with radare2 - Lars Haukli at 44CON 2017.en.transcribed.srt
|
84.6 KB
|
Hypervisor-Assisted Ring0 Debugging with radare2 - Lars Haukli at 44CON 2017.mp4
|
168.4 MB
|
Inside Android's SafetyNet Attestation - Colin Mulliner at 44CON 2017.en.transcribed.srt
|
166.3 KB
|
Inside Android's SafetyNet Attestation - Colin Mulliner at 44CON 2017.mp4
|
198.9 MB
|
Lessons Learned Hunting IoT Malware - Olivier Bilodeau at 44CON 2017.en.transcribed.srt
|
134.6 KB
|
Lessons Learned Hunting IoT Malware - Olivier Bilodeau at 44CON 2017.mp4
|
145.2 MB
|
Persisting with Microsoft Office Abusing Extensibility Options - William Knowles at 44CON 2017.en.transcribed.srt
|
119.0 KB
|
Persisting with Microsoft Office Abusing Extensibility Options - William Knowles at 44CON 2017.mp4
|
122.4 MB
|
Red Team Revenge Attacking Microsoft ATA - Nikhil Mittal at 44CON 2017.en.transcribed.srt
|
116.9 KB
|
Red Team Revenge Attacking Microsoft ATA - Nikhil Mittal at 44CON 2017.mp4
|
188.0 MB
|
Reverse Engineering Windows Malware 101 Workshop - Amanda Rousseau at 44CON 2017 - Workshop.en.transcribed.srt
|
185.5 KB
|
Reverse Engineering Windows Malware 101 Workshop - Amanda Rousseau at 44CON 2017 - Workshop.mp4
|
313.4 MB
|
Secrets Of The Motherboard (Shit My Chipset Says) - Graham Sutherland at 44CON 2017.en.transcribed.srt
|
111.9 KB
|
Secrets Of The Motherboard (Shit My Chipset Says) - Graham Sutherland at 44CON 2017.mp4
|
124.5 MB
|
See no evil, hear no evil - Matt Wixey at 44CON 2017.en.transcribed.srt
|
110.5 KB
|
See no evil, hear no evil - Matt Wixey at 44CON 2017.mp4
|
147.2 MB
|
So You Want to Hack Radios - Marc Newlin and Matt Knight at 44CON 2017.en.transcribed.srt
|
166.2 KB
|
So You Want to Hack Radios - Marc Newlin and Matt Knight at 44CON 2017.mp4
|
147.9 MB
|
Subgraph OS Hardening a Linux Desktop - David Mirza Ahmad at 44CON 2017.en.transcribed.srt
|
136.4 KB
|
Subgraph OS Hardening a Linux Desktop - David Mirza Ahmad at 44CON 2017.mp4
|
168.1 MB
|
The Black Art of Wireless Post-Exploitation - Gabriel Ryan at 44CON 2017.en.transcribed.srt
|
140.2 KB
|
The Black Art of Wireless Post-Exploitation - Gabriel Ryan at 44CON 2017.mp4
|
44.6 MB
|
The Internet of Us - Don A. Bailey at 44CON 2017.en.transcribed.srt
|
128.1 KB
|
The Internet of Us - Don A. Bailey at 44CON 2017.mp4
|
139.5 MB
|
/44Con 2018/
|
Automating myself out of a job - Jay Harris at 44CON 2018.en.transcribed.srt
|
84.1 KB
|
Automating myself out of a job - Jay Harris at 44CON 2018.mp4
|
130.8 MB
|
Bypassing Port-Security In 2018 Defeating MacSEC and 802.1x-2010 - Gabriel Ryan at 44CON 2018.en.transcribed.srt
|
110.9 KB
|
Bypassing Port-Security In 2018 Defeating MacSEC and 802.1x-2010 - Gabriel Ryan at 44CON 2018.mp4
|
147.0 MB
|
Catch Me If You Can - Shubham Shah & Michael Gianarakis at 44CON 2018.en.transcribed.srt
|
61.5 KB
|
Catch Me If You Can - Shubham Shah & Michael Gianarakis at 44CON 2018.mp4
|
92.6 MB
|
Code of Practice for Security in Consumer IoT Products and Services - David Rogers at 44CON 2018.en.transcribed.srt
|
75.8 KB
|
Code of Practice for Security in Consumer IoT Products and Services - David Rogers at 44CON 2018.mp4
|
128.3 MB
|
Exploits with Scratch - Kev Sheldrake at 44CON 2018.en.transcribed.srt
|
83.2 KB
|
Exploits with Scratch - Kev Sheldrake at 44CON 2018.mp4
|
183.4 MB
|
For the Love of Money - Leighanne Galloway & Tim Yunusov at 44CON 2018.mp4
|
120.9 MB
|
Ghost in the Locks - Timo Hirvonen & Tomi Tuominen at 44CON 2018.en.transcribed.srt
|
63.4 KB
|
Ghost in the Locks - Timo Hirvonen & Tomi Tuominen at 44CON 2018.mp4
|
151.6 MB
|
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus Schmeh at 44CON 2018.mp4
|
181.4 MB
|
JARVIS never saw it coming - Guy Barnhart-Magen & Ezra Caltum at 44CON 2018.en.transcribed.srt
|
101.1 KB
|
JARVIS never saw it coming - Guy Barnhart-Magen & Ezra Caltum at 44CON 2018.mp4
|
157.3 MB
|
Kill All Humans... Bugs! - Philippe Arteau at 44CON 2018.en.transcribed.srt
|
73.6 KB
|
Kill All Humans... Bugs! - Philippe Arteau at 44CON 2018.mp4
|
159.6 MB
|
Make ARM Shellcode Great Again - Saumil Shah at 44CON 2018.en.transcribed.srt
|
74.8 KB
|
Make ARM Shellcode Great Again - Saumil Shah at 44CON 2018.mp4
|
165.7 MB
|
Pwning the 44CON Nerf gun - PTP at 44CON 2018.mp4
|
89.1 MB
|
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim at 44CON 2018.en.transcribed.srt
|
57.7 KB
|
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim at 44CON 2018.mp4
|
138.5 MB
|
Security Module for PHP7 - Julien Voisin & Thibault Koechlin at 44CON 2018.en.transcribed.srt
|
58.2 KB
|
Security Module for PHP7 - Julien Voisin & Thibault Koechlin at 44CON 2018.mp4
|
138.1 MB
|
So You Want to Red Team - Lawrence Munro & Matt Lorentzen at 44CON 2018.en.transcribed.srt
|
110.8 KB
|
So You Want to Red Team - Lawrence Munro & Matt Lorentzen at 44CON 2018.mp4
|
217.7 MB
|
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzog at 44CON 2018.en.transcribed.srt
|
66.3 KB
|
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzog at 44CON 2018.mp4
|
123.7 MB
|
Using SmartNICs to Provide Better Data Center Security - Jack Matheson at 44CON 2018.en.transcribed.srt
|
125.1 KB
|
Using SmartNICs to Provide Better Data Center Security - Jack Matheson at 44CON 2018.mp4
|
236.3 MB
|
Weak Analogies make Poor Realities - Charl Van Der Walt at 44CON 2018.en.transcribed.srt
|
119.4 KB
|
Weak Analogies make Poor Realities - Charl Van Der Walt at 44CON 2018.mp4
|
171.5 MB
|
/
|
44Con logo.png
|
9.2 KB
|
44Con thank you.txt
|
0.7 KB
|
Total files 203
|