FileMood

Download 44CON

44CON

Name

44CON

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

14.6 GB

Total Files

299

Hash

50AC7CCDE7FD1A7D667AC17CE1D4898FC3C61AD5

/

44CON logo.gif

5.5 KB

44CON logo.png

7.0 KB

44CON thank you.txt

0.9 KB

/44CON 2011/

Communicating with the Boss, Steve Armstrong - 44CON 2011.mp4

47.1 MB

Penetration Testing Considered Harmful, Haroon Meer - 44CON 2011.mp4

36.3 MB

Systems Applications Proxy Pwnage, Ian De Villiers - 44CON 2011.mp4

36.0 MB

Terrorism, Tracking, Privacy And Human Interactions. Daniel Cuthbert & Glenn Wilkinson at 4CON 2012.mp4

88.6 MB

Trusteer Rapport, Neil Kettle - 44CON 2011.mp4

49.5 MB

USB Flash Drive Forensics, Philip Polstra - 44CON 2011.eng.srt

83.3 KB

USB Flash Drive Forensics, Philip Polstra - 44CON 2011.mp4

56.9 MB

Windows Pwn 7 OEM, Alex Plaskett - 44CON 2011.mp4

41.2 MB

/44CON 2012/

2012 In Review Tor And The Censorship Arms Race. Runa A. Sandvik at 44CON 2012.mp4

80.8 MB

An Idiot Abroad. Don A. Bailey at 44CON 2012.mp4

89.3 MB

Cryptanalysis Of The Enigma Machine. Robert Weiss & Ben Gatti at 44CON 2012.mp4

83.6 MB

Hacking And Forensics On The Go. Phil Polstra at 44CON 2012.mp4

71.6 MB

I m The Butcher, Would You Like Some Beef Thomas Mackenzie & Michele Orru at 44CON 2012.mp4

85.4 MB

Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012.mp4

95.1 MB

Passive IPS Reconnaissance and Enumeration - false positive (ab)use - Arron Finnon.mp4

38.3 MB

Securing The Internet You re Doing It Wrong (An Infosec Intervention). Jayson Street at 44CON 2012.mp4

64.3 MB

Software Security Austerity. Ollie Whitehouse at 44CON 2012.mp4

46.6 MB

Surveillance Cameras..... Michael Viscuso at 44CON 2012.mp4

69.8 MB

/44CON 2013/

A Captive Audience - Jaime Cochran.mp4

30.6 MB

A Fast Hard Disk with Active Antiforensics - Travis Godspeed.mp4

80.2 MB

A talk about (info-sec) talks - Haroon Meer.mp4

69.8 MB

Best Practices and the Future of Adaptive Authentication - Robert Weiss & Ben Gatti.mp4

55.2 MB

Breaking Bad Programs - Don A. Bailey.mp4

57.7 MB

Browser bug hunting - Memoirs of a last man standing - Atte Kettunen.mp4

52.2 MB

dotNet Havoc - Manipulating Properties of Dormant Server Side Web Controls - Shay Chen.mp4

50.0 MB

Evading Identification and Detection by Messing with Binary Formats - Ange Albertini.mp4

23.3 MB

Even More Tamagotchis Were Harmed in the Making of this Presentation - Natalie Silvanovich.mp4

76.9 MB

Hack the Gibson - Exploiting Supercomputers - John Fitzpatrick & Luke Jennings.mp4

53.4 MB

Honey I m Home - Hacking Z-Wave Home Automation Systems - Behrang Fouladi & Sahand Ghanoun.mp4

45.7 MB

I miss LSD - Tim Brown.mp4

37.2 MB

My quest into FM-RDS, Oona Raisanen.mp4

28.0 MB

Punking Punkbuster - Isaac Dawson.mp4

81.8 MB

Reversing and Exploiting BT CPE Devices - Zachary Cutlip.mp4

33.0 MB

Security Lessons from Dictators - Jerry Gamblin.mp4

63.0 MB

Signatureless Breach Detection Under The Microscope - Olli-Pekka Niemi & Antti Levomaki.mp4

56.2 MB

Surviving the 0-day - Reducing the Window of Exposure - Andreas Lindh.mp4

20.6 MB

The Forgers Art Exploiting XML Digital Signature Implementations - James Forshaw.mp4

45.1 MB

/44CON 2014/

10 GBP simple hardware side channel attacks - Presented By Joe FitzPatrick.eng.srt

80.9 KB

10 GBP simple hardware side channel attacks - Presented By Joe FitzPatrick.mp4

115.2 MB

44CON 2014 Conference Videos.mp4

7.3 MB

A Year in Recap I Am The Cavalry - Beau Woods.eng.srt

91.2 KB

A Year in Recap I Am The Cavalry - Beau Woods.mp4

82.0 MB

Breaking AV Software - Joxean Koret.mp4

86.6 MB

Bug Bounties - Relationship Advice for the Hunters & the Hunted - Katie Moussouris.eng.srt

91.9 KB

Bug Bounties - Relationship Advice for the Hunters & the Hunted - Katie Moussouris.mp4

166.7 MB

Chopping Down Mountains - Don A. Bailey.mp4

86.6 MB

Darshak how to turn your phone into a low cost IMSI catcher device - Ravishankar Borgaonkar and Swapnil Udar.mp4

142.7 MB

Darshak how to turn your phone into a low cost IMSI catcher device - By R Borgaonkar & S Udar.eng.srt

122.9 KB

Flushing Away Preconceptions of Risk - Thom Langford.mp4

41.4 MB

Goodbye 44CON 2014.mp4

142.7 MB

GreedyBTS Hacking Adventures in GSM - Hacker Fantastic.eng.srt

109.8 KB

GreedyBTS Hacking Adventures in GSM - Hacker Fantastic.mp4

120.4 MB

Hacking an Internet Enabled Lagomorph - Alex Chapman.eng.srt

68.8 KB

Hacking an Internet Enabled Lagomorph - Alex Chapman.mp4

60.2 MB

Hot or not the hacker way - Dan Tentler.mp4

41.4 MB

Hot or not, the hacker way - Presented By Dan Tentler.eng.srt

69.2 KB

I gave a talk about robots and hardware - Josh Thomas.mp4

86.6 MB

I Hunt TR-069 Admins - Pwning ISPs Like a Boss, Shahar Tal.mp4

142.7 MB

I Hunt TR-069 Admins Pwning ISPs Like a Boss - Presented By Shahar Tal.eng.srt

47.9 KB

Incident Handling with CyberCPR - Mike Antcliffe Steve Armstrong Ed Tredgett.mp4

41.4 MB

Lessons Learned from Black Hat s Infrastructure - The Tweets Must Flow Conan Dooley.mp4

86.6 MB

Lessons Learned from Black Hat’s Infrastructure The Tweets Must Flow - Presented By Conan Dooley.eng.srt

92.6 KB

Manna from Heaven Improving the state of wireless rogue AP attacks - Presented By Dominic White.eng.srt

80.5 KB

Manna from Heaven Improving the state of wireless rogue AP attacks Dominic White.mp4

142.7 MB

Meterpreter Internals - OJ Reeves.mp4

142.7 MB

Meterpreter Internals - Presented By OJ Reeves.eng.srt

117.2 KB

On Her Majestys Secret Service GRX and a Spy Agency - Stephen Kho.mp4

107.9 MB

On Her Majesty’s Secret Service GRX and a Spy Agency - Presented By Stephen Kho.eng.srt

73.3 KB

Pandas Bears and Goldern Hamsters Automating malware triage and recent campaign analysis - David Cannings.mp4

41.4 MB

Payment applications handle lots of money. No really lots of it. Alberto Revelli and Mark Swift.mp4

37.8 MB

Payment applications handle lots of money. No, really lots of it. - By M Swift & A Revelli.eng.srt

90.3 KB

Pentesting NoSQL DB s Using NoSQL Exploitation Framework - Francis Alexander.mp4

37.8 MB

Pentesting NoSQL DB’s Using NoSQL Exploitation Framework - Presented By Francis Alexander.eng.srt

51.6 KB

Researching Android Device Security with the Help of a Droid Army - Joshua J. Drake.mp4

86.6 MB

Security Analytics Beyond Cyber - Phil Huggins.mp4

37.8 MB

Security Analytics Beyond Cyber - Presented By Phil Huggins.eng.srt

97.8 KB

Side Channel attacks in the cloud - Gorka Irazoqui Apecechea.mp4

107.9 MB

Side Channel attacks in the cloud - Presented By Gorka Irazoqui Apecechea.eng.srt

80.4 KB

Social Engineering Your Own - Developing An Awareness Training Program That Actually Works - Valerie Thomas.mp4

107.9 MB

Social Engineering Your Own - Developing An Awareness Training Program That Actually Works.eng.srt

91.6 KB

STOP Don’t make that NOOB Incident Handling mistake - Steve Armstrong.eng.srt

96.0 KB

STOP Don’t make that NOOB Incident Handling mistake - Steve Armstrong.mp4

107.0 MB

Stupid PCIe Tricks - Joe FitzPatrick.mp4

107.9 MB

Top 5 Media Fails - Dan Raywood.mp4

37.8 MB

Using Hadoop for Malware Network Forensics and Log analysis - Michael Boman.mp4

37.8 MB

Using Hadoop for Malware, Network, Forensics and Log analysis - Presented By Michael Boman.eng.srt

30.4 KB

What Did You Just Say To Me - Jerry Gamblin.mp4

41.4 MB

When Documents Bite - Vlad Ovtchinikov.mp4

107.9 MB

/44CON 2015/

Analyzing Malicious Office Documents - Presented By Didier Stevens (Workshop).mp4

207.4 MB

Attacking VxWorks from Stone Age to Interstellar - Presented By Yannick Formaggio.mp4

29.8 MB

Barbarians At The Gate(way) An Examination Of The Attacker Tool Box - Presented By Dave Lewis.mp4

56.1 MB

Checksec.mp4

14.7 MB

Dark Fairytales from a Phisherman (Vol.II) - Presented By Michele Orru.mp4

49.6 MB

DDoS mitigation EPIC FAIL collection - Presented By Moshe Zioni.mp4

66.1 MB

Digital Shadows.mp4

39.3 MB

Exploiting 64-bit IE on Windows 8.1 and The Pwn2Own Case Study - Presented By Yuki Chen and Linan Hao.mp4

40.2 MB

F-Secure party - Mikko.mp4

14.7 MB

F-Secure.mp4

13.3 MB

Forging the USB armory Presented By Andrea Barisani in 44CON London 2015.mp4

64.0 MB

Get in the Ring0 &ndash Understanding Windows drivers - Presented By Graham Sutherland.mp4

49.6 MB

Going AUTH the Rails on a Crazy Train - Presented By Tomek Rabczak and Jeff Jarmoc.mp4

85.0 MB

Hackers in the Wire and Drones Oh My - Presented By Philip Polstra.mp4

118.0 MB

How to drive a malware analyst crazy - Presented By Michael Boman.mp4

74.5 MB

Hunting Asynchronous Vulnerabilities - Presented By James Kettle.mp4

184.5 MB

Indicators of Compromise From malware analysis to eradication - Presented By Michael Boman (Workshop).mp4

64.0 MB

Inside Terracotta VPN - Presented By Kent Backman.mp4

3.5 MB

Introduction to Reverse Engineering C - Presented By Angel M. Villegas (Workshop).mp4

118.0 MB

Is there an EFI monster inside your apple - Presented By Pedro Vila.mp4

66.3 MB

Jerry Gamblin.mp4

39.3 MB

Jessica Barker.mp4

39.3 MB

Jtagsploitation 5 wires 5 ways to root - Presented By Joe FitzPatrick and Matt King.mp4

118.0 MB

Logically Secure.mp4

39.3 MB

Meterpreter Understanding the New Shiny - Presented By OJ Reeves.mp4

88.4 MB

MITMf Bringing Man-In-The-Middle attacks to the 21st century - Presented ByMarcello Salvati.mp4

184.5 MB

NCC.mp4

13.3 MB

Old Dog New Tricks Forensics With PowerShell - Presented By Jared Atkinson.mp4

118.0 MB

Phil Huggins.mp4

14.7 MB

PQChat.mp4

39.3 MB

Quentyn Taylor.mp4

14.7 MB

Responsible disclosure who cares - Presented By OJ Reeves and Dan Tentler.mp4

41.5 MB

Reverse engineering and exploiting font rasterizers the OpenType saga - Presented By Mateusz Jurczyk.mp4

118.0 MB

Smart Muttering a story and toolset for smart meter platform - Presented By Ian de Villiers.mp4

49.6 MB

Software Defined Networking (SDN) Security - Presented By David Jorm.mp4

39.8 MB

Stegosploit Drive-by Browser Exploits using only Images - Presented By Saumil Shah.mp4

59.3 MB

Windows 10 2 Steps Forward 1 Step Back - Presented By James Forshaw.mp4

52.1 MB

/44CON 2016/

2016 The Infosec Crossroads - Presented By Saumil Shah.mp4

42.5 MB

Data protection, privacy and cloud computing navigating legal compliance - Presented By Graham McKay.mp4

74.5 MB

Effortless, Agentless Breach Detection in the Enterprise Token all the Things - Presented By Azhar Desai & Nicholas Rohrbeck.mp4

52.4 MB

Frictionless Security - Presented by Jerry Gamblin.mp4

23.5 MB

Jittery MacGyver - Lessons Learned from Building a Bionic Hand out of a Coffee Maker - Presented By Evan Booth.mp4

63.8 MB

Light at the End of the Tunnel. (Hope for Team Defence) - Presented by Haroon Meer.mp4

43.0 MB

Managing Incidents with CyberCPR - Presented By Steve Armstrong.mp4

70.2 MB

Saving Nostalgia - Modding an Old Z80 Computer - Presented By Graham Sutherland.mp4

45.5 MB

The Frugal Girl's Guide to Threat Intelligence - Presented By Rebekah Brown.mp4

79.3 MB

Three decades in security - What's changed, and what hasn't - Presented by Robert Schifreen.mp4

86.5 MB

Trusts you might have missed - Presented by Will Schroeder.mp4

73.6 MB

Universal Serial aBUSe - Remote Physical Access Attacks - Presented By Rogan Dawes &amp Dominic White.mp4

32.6 MB

What it Means to Have the C Word in the National Security Agenda - Presented By Emil Tan.mp4

52.9 MB

/44CON 2017/

A Hands On Introduction To Software Defined Radio - Didier Stevens - Workshop.eng.srt

156.5 KB

A Hands On Introduction To Software Defined Radio - Didier Stevens - Workshop.mp4

188.9 MB

ARM Assembly and Shellcode Basics - Saumil Shah - Workshop.eng.srt

239.6 KB

ARM Assembly and Shellcode Basics - Saumil Shah - Workshop.mp4

214.8 MB

BaRMIe - Poking Java's Back Door - Nicky Bloor.eng.srt

97.0 KB

BaRMIe - Poking Java's Back Door - Nicky Bloor.mp4

67.6 MB

Biting the Apple that feeds you - Alex Plaskett and James Loureiro.eng.srt

112.5 KB

Biting the Apple that feeds you - Alex Plaskett and James Loureiro.mp4

58.1 MB

Breaking Historical Ciphers with Modern Algorithms - Klaus Schmeh.mp4

94.2 MB

Checking BIOS protections offline with just the firmware updates - Yuriy Bulygin.eng.srt

98.5 KB

Checking BIOS protections offline with just the firmware updates - Yuriy Bulygin.mp4

70.7 MB

Chkrootkit Eating APTs for breakfast since 1997 - Nelson Murilo.eng.srt

50.2 KB

Chkrootkit Eating APTs for breakfast since 1997 - Nelson Murilo.mp4

59.0 MB

Cisco ASA Episode 2 Striking back - Internals and Mitigations - Cedric Halbronn.eng.srt

127.3 KB

Cisco ASA Episode 2 Striking back - Internals and Mitigations - Cedric Halbronn.mp4

76.3 MB

Cracking HiTag2 Crypto - Kevin Sheldrake - Workshop.eng.srt

254.0 KB

Cracking HiTag2 Crypto - Kevin Sheldrake - Workshop.mp4

181.7 MB

Cracking HiTag2 Crypto - Kevin Sheldrake.eng.srt

131.9 KB

Cracking HiTag2 Crypto - Kevin Sheldrake.mp4

73.3 MB

Hide Yo Keys, Hide Yo Car - Aaron Guzman.eng.srt

98.1 KB

Hide Yo Keys, Hide Yo Car - Aaron Guzman.mp4

57.2 MB

How to Hack Radios RF Physical Layers - Matt Knight and Marc Newlin - Workshop.eng.srt

282.2 KB

How to Hack Radios RF Physical Layers - Matt Knight and Marc Newlin - Workshop.mp4

206.3 MB

Hypervisor-Assisted Ring0 Debugging with radare2 - Lars Haukli.eng.srt

84.6 KB

Hypervisor-Assisted Ring0 Debugging with radare2 - Lars Haukli.mp4

82.1 MB

Inside Android's SafetyNet Attestation - Colin Mulliner.eng.srt

166.3 KB

Inside Android's SafetyNet Attestation - Colin Mulliner.mp4

97.4 MB

Lessons Learned Hunting IoT Malware - Olivier Bilodeau.eng.srt

134.6 KB

Lessons Learned Hunting IoT Malware - Olivier Bilodeau.mp4

69.9 MB

Persisting with Microsoft Office Abusing Extensibility Options - William Knowles.eng.srt

119.0 KB

Persisting with Microsoft Office Abusing Extensibility Options - William Knowles.mp4

56.6 MB

Red Team Revenge Attacking Microsoft ATA - Nikhil Mittal.eng.srt

116.9 KB

Red Team Revenge Attacking Microsoft ATA - Nikhil Mittal.mp4

92.8 MB

Reverse Engineering Windows Malware 101 Workshop - Amanda Rousseau - Workshop.eng.srt

185.5 KB

Reverse Engineering Windows Malware 101 Workshop - Amanda Rousseau - Workshop.mp4

164.0 MB

Secrets Of The Motherboard (Shit My Chipset Says) - Graham Sutherland.eng.srt

111.9 KB

Secrets Of The Motherboard (Shit My Chipset Says) - Graham Sutherland.mp4

57.3 MB

See no evil, hear no evil - Matt Wixey.eng.srt

110.5 KB

See no evil, hear no evil - Matt Wixey.mp4

74.7 MB

So You Want to Hack Radios - Marc Newlin and Matt Knight.eng.srt

166.2 KB

So You Want to Hack Radios - Marc Newlin and Matt Knight.mp4

68.6 MB

Subgraph OS Hardening a Linux Desktop - David Mirza Ahmad.eng.srt

136.4 KB

Subgraph OS Hardening a Linux Desktop - David Mirza Ahmad.mp4

79.8 MB

The Black Art of Wireless Post-Exploitation - Gabriel Ryan.eng.srt

140.2 KB

The Black Art of Wireless Post-Exploitation - Gabriel Ryan.mp4

80.2 MB

The Internet of Us - Don A. Bailey.eng.srt

128.1 KB

The Internet of Us - Don A. Bailey.mp4

69.0 MB

/44CON 2018/

Automating myself out of a job - Jay Harris.eng.srt

84.1 KB

Automating myself out of a job - Jay Harris.mp4

44.0 MB

Bypassing Port-Security In 2018 Defeating MacSEC and 802.1x-2010 - Gabriel Ryan.eng.srt

110.9 KB

Bypassing Port-Security In 2018 Defeating MacSEC and 802.1x-2010 - Gabriel Ryan.mp4

51.8 MB

Catch Me If You Can - Shubham Shah & Michael Gianarakis.eng.srt

61.5 KB

Catch Me If You Can - Shubham Shah & Michael Gianarakis.mp4

34.5 MB

Code of Practice for Security in Consumer IoT Products and Services - David Rogers.eng.srt

75.8 KB

Code of Practice for Security in Consumer IoT Products and Services - David Rogers.mp4

46.0 MB

Exploits with Scratch - Kev Sheldrake.eng.srt

83.2 KB

Exploits with Scratch - Kev Sheldrake.mp4

70.5 MB

For the Love of Money - Leighanne Galloway & Tim Yunusov.mp4

41.2 MB

Ghost in the Locks - Timo Hirvonen & Tomi Tuominen.eng.srt

63.4 KB

Ghost in the Locks - Timo Hirvonen & Tomi Tuominen.mp4

54.4 MB

How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus Schmeh.mp4

62.4 MB

JARVIS never saw it coming - Guy Barnhart-Magen & Ezra Caltum.eng.srt

101.1 KB

JARVIS never saw it coming - Guy Barnhart-Magen & Ezra Caltum.mp4

58.4 MB

Kill All Humans... Bugs - Philippe Arteau.eng.srt

73.6 KB

Kill All Humans... Bugs - Philippe Arteau.mp4

57.9 MB

Make ARM Shellcode Great Again - Saumil Shah.eng.srt

74.8 KB

Make ARM Shellcode Great Again - Saumil Shah.mp4

65.0 MB

Pwning the 44CON Nerf gun - PTP.mp4

29.3 MB

Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim.eng.srt

57.7 KB

Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim.mp4

51.9 MB

Security Module for PHP7 - Julien Voisin & Thibault Koechlin.eng.srt

58.2 KB

Security Module for PHP7 - Julien Voisin & Thibault Koechlin.mp4

50.3 MB

So You Want to Red Team - Lawrence Munro & Matt Lorentzen.eng.srt

110.8 KB

So You Want to Red Team - Lawrence Munro & Matt Lorentzen.mp4

82.2 MB

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzog.eng.srt

66.3 KB

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzog.mp4

40.0 MB

Using SmartNICs to Provide Better Data Center Security - Jack Matheson.eng.srt

125.1 KB

Using SmartNICs to Provide Better Data Center Security - Jack Matheson.mp4

85.7 MB

Weak Analogies make Poor Realities - Charl Van Der Walt.eng.srt

119.4 KB

Weak Analogies make Poor Realities - Charl Van Der Walt.mp4

61.0 MB

/44CON 2019/

Attacking Development Pipelines For Actual Profit - Alex Chapman.eng.srt

48.3 KB

Attacking Development Pipelines For Actual Profit - Alex Chapman.mp4

40.3 MB

Automating User Interaction With Sheepl Soup To Nuts - Matt Lorentzen.eng.srt

205.7 KB

Automating User Interaction With Sheepl Soup To Nuts - Matt Lorentzen.mp4

190.4 MB

Breaking Badge - Tim Wilkes and Phyushin.eng.srt

43.2 KB

Breaking Badge - Tim Wilkes and Phyushin.mp4

42.8 MB

BYOI PayloadsFusing The Powah Of.NET With A Scripting Language Of Your Choosing - Marcello Salvati.eng.srt

104.9 KB

BYOI PayloadsFusing The Powah Of.NET With A Scripting Language Of Your Choosing - Marcello Salvati.mp4

111.3 MB

Closing Ceremony - Adrian and Steve.eng.srt

32.4 KB

Closing Ceremony - Adrian and Steve.mp4

39.9 MB

Cold War Cryptography - Klaus Schmeh.mp4

96.4 MB

Community Evening Opening - Adrian and Steve.eng.srt

26.2 KB

Community Evening Opening - Adrian and Steve.mp4

18.5 MB

Day 2 Opening - Sam.eng.srt

2.3 KB

Day 2 Opening - Sam.mp4

1.9 MB

Dial V For Vulnerable Attacking VoIP Phones - Phillip Roskosch and Stephan Huber.mp4

49.2 MB

Here Be Dragons… The AWS S3 Logging Minefields - Kieren Nicholas Lovell.eng.srt

45.8 KB

Here Be Dragons… The AWS S3 Logging Minefields - Kieren Nicholas Lovell.mp4

49.1 MB

Human Side-Channels And Their Implications For Security And Privacy - Matt Wixey.eng.srt

90.9 KB

Human Side-Channels And Their Implications For Security And Privacy - Matt Wixey.mp4

78.0 MB

Hunting For Bugs, Catching Dragons - Nicolas Joly.eng.srt

76.5 KB

Hunting For Bugs, Catching Dragons - Nicolas Joly.mp4

99.5 MB

IBM Trusteer Rapport Does IBM (I)ntentionally (B)ackdoor (M)achines - Neil Kettle.eng.srt

57.2 KB

IBM Trusteer Rapport Does IBM (I)ntentionally (B)ackdoor (M)achines - Neil Kettle.mp4

65.6 MB

Introduction To GLIBC Heap Exploitation - Max Kamper.eng.srt

149.8 KB

Introduction To GLIBC Heap Exploitation - Max Kamper.mp4

127.8 MB

Logging Made Easy Workshop - NCSC Representatives and Duncan Atkin.eng.srt

31.8 KB

Logging Made Easy Workshop - NCSC Representatives and Duncan Atkin.mp4

17.5 MB

Making Something Out Of Something - Chris Wade.eng.srt

54.5 KB

Making Something Out Of Something - Chris Wade.mp4

39.2 MB

Office Equipment The Front Door To Persistence On Enterprise Networks - D. Romero and M. Rivas.eng.srt

78.9 KB

Office Equipment The Front Door To Persistence On Enterprise Networks - D. Romero and M. Rivas.mp4

77.3 MB

Opening - Adrian and Steve.eng.srt

17.1 KB

Opening - Adrian and Steve.mp4

14.9 MB

Outsourcing Global Cyber Norms - Katharina Sommer.eng.srt

65.8 KB

Outsourcing Global Cyber Norms - Katharina Sommer.mp4

55.6 MB

Owning The Cloud Through SSRF - Cody Brocious.eng.srt

54.2 KB

Owning The Cloud Through SSRF - Cody Brocious.mp4

48.4 MB

Playbook On How To Be The First Security Engineer At A Company - Kashish Mittal.eng.srt

90.4 KB

Playbook On How To Be The First Security Engineer At A Company - Kashish Mittal.mp4

77.8 MB

Rebalance Every 10,000 Kilometers - J. Wolfgang Goerlich.eng.srt

115.9 KB

Rebalance Every 10,000 Kilometers - J. Wolfgang Goerlich.mp4

119.4 MB

Scout Suite - A Multi-Cloud Security Auditing Tool - Xavier Garceau-Aranda.eng.srt

80.2 KB

Scout Suite - A Multi-Cloud Security Auditing Tool - Xavier Garceau-Aranda.mp4

69.2 MB

Security Research Teams - How To Manage, Grow And Retain Them - Guy Barnhart-Magen.eng.srt

114.5 KB

Security Research Teams - How To Manage, Grow And Retain Them - Guy Barnhart-Magen.mp4

124.6 MB

Spyware, Ransomware And Worms. How To Prevent The Next SAP Tragedy - Jordan Santarsieri.eng.srt

91.7 KB

Spyware, Ransomware And Worms. How To Prevent The Next SAP Tragedy - Jordan Santarsieri.mp4

97.9 MB

The Billion Dollar IoT Attack No One Knows About - Tony Gee and Vangelis Stykas.eng.srt

90.0 KB

The Billion Dollar IoT Attack No One Knows About - Tony Gee and Vangelis Stykas.mp4

123.7 MB

The CISO's Dilemma - Saumil Shah.eng.srt

64.4 KB

The CISO's Dilemma - Saumil Shah.mp4

69.7 MB

The Frugal Girl's Guide to Threat Intelligence - Presented By Rebekah Brown.eng.srt

112.1 KB

The Frugal Girl's Guide to Threat Intelligence - Presented By Rebekah Brown.mp4

47.9 MB

Throw Open The Gates Trading Control For Visibility - Kyle Tobener and Alessandro Lapucci.eng.srt

81.3 KB

Throw Open The Gates Trading Control For Visibility - Kyle Tobener and Alessandro Lapucci.mp4

71.9 MB

/44CON 2022/

Andrew Ruddick - Exploring a New Class of Kernel Exploit Primitive.mp4

40.6 MB

cybergibbons - I’m the Captain Now.mp4

86.6 MB

cybergibbons - I’m the Captain Now.srt

129.9 KB

Erlend Andreas Gjære - The Need For a Human Touch In Cyber Security.mp4

51.6 MB

Erlend Andreas Gjære - The Need For a Human Touch In Cyber Security.srt

69.1 KB

Guy Barnhart-Magen - The Log4J Rollercoaster - from an incident response perspective.mp4

45.3 MB

Guy Barnhart-Magen - The Log4J Rollercoaster - from an incident response perspective.srt

97.7 KB

Jake Roberts - The Tale Of Phineas Fisher.mp4

36.8 MB

Jake Roberts - The Tale Of Phineas Fisher.srt

70.7 KB

James Forshaw - Tooling up for Kerberos.mp4

54.4 MB

James Forshaw - Tooling up for Kerberos.srt

86.1 KB

Kev Sheldrake - What is eBPF and why should you care.mp4

45.5 MB

Kev Sheldrake - What is eBPF and why should you care.srt

88.7 KB

Klaus Schmeh - Ciphers and Crime.mp4

70.9 MB

Klaus Schmeh - Ciphers and Crime.srt

79.6 KB

Melissa Goldsmith - Threat Hunting From Bodging to Efficiency in 7 Steps.mp4

43.9 MB

Melissa Goldsmith - Threat Hunting From Bodging to Efficiency in 7 Steps.srt

103.3 KB

P Allwright - Lord of War-Investigating the theft of a gambling platform and outsmarting the thieves.mp4

77.1 MB

P Allwright - Lord of War-Investigating the theft of a gambling platform and outsmarting the thieves.srt

103.1 KB

Pavel Tsakalidis - Codecepticon - Building an obfuscator to bypass Modern EDR and AV.mp4

37.7 MB

Pavel Tsakalidis - Codecepticon - Building an obfuscator to bypass Modern EDR and AV.srt

80.4 KB

YTCracker at 44CON 2022.mp4

650.3 MB

 

Total files 299


Copyright © 2025 FileMood.com