/
|
44CON logo.gif
|
5.5 KB
|
44CON logo.png
|
7.0 KB
|
44CON thank you.txt
|
0.9 KB
|
/44CON 2011/
|
Communicating with the Boss, Steve Armstrong - 44CON 2011.mp4
|
47.1 MB
|
Penetration Testing Considered Harmful, Haroon Meer - 44CON 2011.mp4
|
36.3 MB
|
Systems Applications Proxy Pwnage, Ian De Villiers - 44CON 2011.mp4
|
36.0 MB
|
Terrorism, Tracking, Privacy And Human Interactions. Daniel Cuthbert & Glenn Wilkinson at 4CON 2012.mp4
|
88.6 MB
|
Trusteer Rapport, Neil Kettle - 44CON 2011.mp4
|
49.5 MB
|
USB Flash Drive Forensics, Philip Polstra - 44CON 2011.eng.srt
|
83.3 KB
|
USB Flash Drive Forensics, Philip Polstra - 44CON 2011.mp4
|
56.9 MB
|
Windows Pwn 7 OEM, Alex Plaskett - 44CON 2011.mp4
|
41.2 MB
|
/44CON 2012/
|
2012 In Review Tor And The Censorship Arms Race. Runa A. Sandvik at 44CON 2012.mp4
|
80.8 MB
|
An Idiot Abroad. Don A. Bailey at 44CON 2012.mp4
|
89.3 MB
|
Cryptanalysis Of The Enigma Machine. Robert Weiss & Ben Gatti at 44CON 2012.mp4
|
83.6 MB
|
Hacking And Forensics On The Go. Phil Polstra at 44CON 2012.mp4
|
71.6 MB
|
I m The Butcher, Would You Like Some Beef Thomas Mackenzie & Michele Orru at 44CON 2012.mp4
|
85.4 MB
|
Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012.mp4
|
95.1 MB
|
Passive IPS Reconnaissance and Enumeration - false positive (ab)use - Arron Finnon.mp4
|
38.3 MB
|
Securing The Internet You re Doing It Wrong (An Infosec Intervention). Jayson Street at 44CON 2012.mp4
|
64.3 MB
|
Software Security Austerity. Ollie Whitehouse at 44CON 2012.mp4
|
46.6 MB
|
Surveillance Cameras..... Michael Viscuso at 44CON 2012.mp4
|
69.8 MB
|
/44CON 2013/
|
A Captive Audience - Jaime Cochran.mp4
|
30.6 MB
|
A Fast Hard Disk with Active Antiforensics - Travis Godspeed.mp4
|
80.2 MB
|
A talk about (info-sec) talks - Haroon Meer.mp4
|
69.8 MB
|
Best Practices and the Future of Adaptive Authentication - Robert Weiss & Ben Gatti.mp4
|
55.2 MB
|
Breaking Bad Programs - Don A. Bailey.mp4
|
57.7 MB
|
Browser bug hunting - Memoirs of a last man standing - Atte Kettunen.mp4
|
52.2 MB
|
dotNet Havoc - Manipulating Properties of Dormant Server Side Web Controls - Shay Chen.mp4
|
50.0 MB
|
Evading Identification and Detection by Messing with Binary Formats - Ange Albertini.mp4
|
23.3 MB
|
Even More Tamagotchis Were Harmed in the Making of this Presentation - Natalie Silvanovich.mp4
|
76.9 MB
|
Hack the Gibson - Exploiting Supercomputers - John Fitzpatrick & Luke Jennings.mp4
|
53.4 MB
|
Honey I m Home - Hacking Z-Wave Home Automation Systems - Behrang Fouladi & Sahand Ghanoun.mp4
|
45.7 MB
|
I miss LSD - Tim Brown.mp4
|
37.2 MB
|
My quest into FM-RDS, Oona Raisanen.mp4
|
28.0 MB
|
Punking Punkbuster - Isaac Dawson.mp4
|
81.8 MB
|
Reversing and Exploiting BT CPE Devices - Zachary Cutlip.mp4
|
33.0 MB
|
Security Lessons from Dictators - Jerry Gamblin.mp4
|
63.0 MB
|
Signatureless Breach Detection Under The Microscope - Olli-Pekka Niemi & Antti Levomaki.mp4
|
56.2 MB
|
Surviving the 0-day - Reducing the Window of Exposure - Andreas Lindh.mp4
|
20.6 MB
|
The Forgers Art Exploiting XML Digital Signature Implementations - James Forshaw.mp4
|
45.1 MB
|
/44CON 2014/
|
10 GBP simple hardware side channel attacks - Presented By Joe FitzPatrick.eng.srt
|
80.9 KB
|
10 GBP simple hardware side channel attacks - Presented By Joe FitzPatrick.mp4
|
115.2 MB
|
44CON 2014 Conference Videos.mp4
|
7.3 MB
|
A Year in Recap I Am The Cavalry - Beau Woods.eng.srt
|
91.2 KB
|
A Year in Recap I Am The Cavalry - Beau Woods.mp4
|
82.0 MB
|
Breaking AV Software - Joxean Koret.mp4
|
86.6 MB
|
Bug Bounties - Relationship Advice for the Hunters & the Hunted - Katie Moussouris.eng.srt
|
91.9 KB
|
Bug Bounties - Relationship Advice for the Hunters & the Hunted - Katie Moussouris.mp4
|
166.7 MB
|
Chopping Down Mountains - Don A. Bailey.mp4
|
86.6 MB
|
Darshak how to turn your phone into a low cost IMSI catcher device - Ravishankar Borgaonkar and Swapnil Udar.mp4
|
142.7 MB
|
Darshak how to turn your phone into a low cost IMSI catcher device - By R Borgaonkar & S Udar.eng.srt
|
122.9 KB
|
Flushing Away Preconceptions of Risk - Thom Langford.mp4
|
41.4 MB
|
Goodbye 44CON 2014.mp4
|
142.7 MB
|
GreedyBTS Hacking Adventures in GSM - Hacker Fantastic.eng.srt
|
109.8 KB
|
GreedyBTS Hacking Adventures in GSM - Hacker Fantastic.mp4
|
120.4 MB
|
Hacking an Internet Enabled Lagomorph - Alex Chapman.eng.srt
|
68.8 KB
|
Hacking an Internet Enabled Lagomorph - Alex Chapman.mp4
|
60.2 MB
|
Hot or not the hacker way - Dan Tentler.mp4
|
41.4 MB
|
Hot or not, the hacker way - Presented By Dan Tentler.eng.srt
|
69.2 KB
|
I gave a talk about robots and hardware - Josh Thomas.mp4
|
86.6 MB
|
I Hunt TR-069 Admins - Pwning ISPs Like a Boss, Shahar Tal.mp4
|
142.7 MB
|
I Hunt TR-069 Admins Pwning ISPs Like a Boss - Presented By Shahar Tal.eng.srt
|
47.9 KB
|
Incident Handling with CyberCPR - Mike Antcliffe Steve Armstrong Ed Tredgett.mp4
|
41.4 MB
|
Lessons Learned from Black Hat s Infrastructure - The Tweets Must Flow Conan Dooley.mp4
|
86.6 MB
|
Lessons Learned from Black Hat’s Infrastructure The Tweets Must Flow - Presented By Conan Dooley.eng.srt
|
92.6 KB
|
Manna from Heaven Improving the state of wireless rogue AP attacks - Presented By Dominic White.eng.srt
|
80.5 KB
|
Manna from Heaven Improving the state of wireless rogue AP attacks Dominic White.mp4
|
142.7 MB
|
Meterpreter Internals - OJ Reeves.mp4
|
142.7 MB
|
Meterpreter Internals - Presented By OJ Reeves.eng.srt
|
117.2 KB
|
On Her Majestys Secret Service GRX and a Spy Agency - Stephen Kho.mp4
|
107.9 MB
|
On Her Majesty’s Secret Service GRX and a Spy Agency - Presented By Stephen Kho.eng.srt
|
73.3 KB
|
Pandas Bears and Goldern Hamsters Automating malware triage and recent campaign analysis - David Cannings.mp4
|
41.4 MB
|
Payment applications handle lots of money. No really lots of it. Alberto Revelli and Mark Swift.mp4
|
37.8 MB
|
Payment applications handle lots of money. No, really lots of it. - By M Swift & A Revelli.eng.srt
|
90.3 KB
|
Pentesting NoSQL DB s Using NoSQL Exploitation Framework - Francis Alexander.mp4
|
37.8 MB
|
Pentesting NoSQL DB’s Using NoSQL Exploitation Framework - Presented By Francis Alexander.eng.srt
|
51.6 KB
|
Researching Android Device Security with the Help of a Droid Army - Joshua J. Drake.mp4
|
86.6 MB
|
Security Analytics Beyond Cyber - Phil Huggins.mp4
|
37.8 MB
|
Security Analytics Beyond Cyber - Presented By Phil Huggins.eng.srt
|
97.8 KB
|
Side Channel attacks in the cloud - Gorka Irazoqui Apecechea.mp4
|
107.9 MB
|
Side Channel attacks in the cloud - Presented By Gorka Irazoqui Apecechea.eng.srt
|
80.4 KB
|
Social Engineering Your Own - Developing An Awareness Training Program That Actually Works - Valerie Thomas.mp4
|
107.9 MB
|
Social Engineering Your Own - Developing An Awareness Training Program That Actually Works.eng.srt
|
91.6 KB
|
STOP Don’t make that NOOB Incident Handling mistake - Steve Armstrong.eng.srt
|
96.0 KB
|
STOP Don’t make that NOOB Incident Handling mistake - Steve Armstrong.mp4
|
107.0 MB
|
Stupid PCIe Tricks - Joe FitzPatrick.mp4
|
107.9 MB
|
Top 5 Media Fails - Dan Raywood.mp4
|
37.8 MB
|
Using Hadoop for Malware Network Forensics and Log analysis - Michael Boman.mp4
|
37.8 MB
|
Using Hadoop for Malware, Network, Forensics and Log analysis - Presented By Michael Boman.eng.srt
|
30.4 KB
|
What Did You Just Say To Me - Jerry Gamblin.mp4
|
41.4 MB
|
When Documents Bite - Vlad Ovtchinikov.mp4
|
107.9 MB
|
/44CON 2015/
|
Analyzing Malicious Office Documents - Presented By Didier Stevens (Workshop).mp4
|
207.4 MB
|
Attacking VxWorks from Stone Age to Interstellar - Presented By Yannick Formaggio.mp4
|
29.8 MB
|
Barbarians At The Gate(way) An Examination Of The Attacker Tool Box - Presented By Dave Lewis.mp4
|
56.1 MB
|
Checksec.mp4
|
14.7 MB
|
Dark Fairytales from a Phisherman (Vol.II) - Presented By Michele Orru.mp4
|
49.6 MB
|
DDoS mitigation EPIC FAIL collection - Presented By Moshe Zioni.mp4
|
66.1 MB
|
Digital Shadows.mp4
|
39.3 MB
|
Exploiting 64-bit IE on Windows 8.1 and The Pwn2Own Case Study - Presented By Yuki Chen and Linan Hao.mp4
|
40.2 MB
|
F-Secure party - Mikko.mp4
|
14.7 MB
|
F-Secure.mp4
|
13.3 MB
|
Forging the USB armory Presented By Andrea Barisani in 44CON London 2015.mp4
|
64.0 MB
|
Get in the Ring0 &ndash Understanding Windows drivers - Presented By Graham Sutherland.mp4
|
49.6 MB
|
Going AUTH the Rails on a Crazy Train - Presented By Tomek Rabczak and Jeff Jarmoc.mp4
|
85.0 MB
|
Hackers in the Wire and Drones Oh My - Presented By Philip Polstra.mp4
|
118.0 MB
|
How to drive a malware analyst crazy - Presented By Michael Boman.mp4
|
74.5 MB
|
Hunting Asynchronous Vulnerabilities - Presented By James Kettle.mp4
|
184.5 MB
|
Indicators of Compromise From malware analysis to eradication - Presented By Michael Boman (Workshop).mp4
|
64.0 MB
|
Inside Terracotta VPN - Presented By Kent Backman.mp4
|
3.5 MB
|
Introduction to Reverse Engineering C - Presented By Angel M. Villegas (Workshop).mp4
|
118.0 MB
|
Is there an EFI monster inside your apple - Presented By Pedro Vila.mp4
|
66.3 MB
|
Jerry Gamblin.mp4
|
39.3 MB
|
Jessica Barker.mp4
|
39.3 MB
|
Jtagsploitation 5 wires 5 ways to root - Presented By Joe FitzPatrick and Matt King.mp4
|
118.0 MB
|
Logically Secure.mp4
|
39.3 MB
|
Meterpreter Understanding the New Shiny - Presented By OJ Reeves.mp4
|
88.4 MB
|
MITMf Bringing Man-In-The-Middle attacks to the 21st century - Presented ByMarcello Salvati.mp4
|
184.5 MB
|
NCC.mp4
|
13.3 MB
|
Old Dog New Tricks Forensics With PowerShell - Presented By Jared Atkinson.mp4
|
118.0 MB
|
Phil Huggins.mp4
|
14.7 MB
|
PQChat.mp4
|
39.3 MB
|
Quentyn Taylor.mp4
|
14.7 MB
|
Responsible disclosure who cares - Presented By OJ Reeves and Dan Tentler.mp4
|
41.5 MB
|
Reverse engineering and exploiting font rasterizers the OpenType saga - Presented By Mateusz Jurczyk.mp4
|
118.0 MB
|
Smart Muttering a story and toolset for smart meter platform - Presented By Ian de Villiers.mp4
|
49.6 MB
|
Software Defined Networking (SDN) Security - Presented By David Jorm.mp4
|
39.8 MB
|
Stegosploit Drive-by Browser Exploits using only Images - Presented By Saumil Shah.mp4
|
59.3 MB
|
Windows 10 2 Steps Forward 1 Step Back - Presented By James Forshaw.mp4
|
52.1 MB
|
/44CON 2016/
|
2016 The Infosec Crossroads - Presented By Saumil Shah.mp4
|
42.5 MB
|
Data protection, privacy and cloud computing navigating legal compliance - Presented By Graham McKay.mp4
|
74.5 MB
|
Effortless, Agentless Breach Detection in the Enterprise Token all the Things - Presented By Azhar Desai & Nicholas Rohrbeck.mp4
|
52.4 MB
|
Frictionless Security - Presented by Jerry Gamblin.mp4
|
23.5 MB
|
Jittery MacGyver - Lessons Learned from Building a Bionic Hand out of a Coffee Maker - Presented By Evan Booth.mp4
|
63.8 MB
|
Light at the End of the Tunnel. (Hope for Team Defence) - Presented by Haroon Meer.mp4
|
43.0 MB
|
Managing Incidents with CyberCPR - Presented By Steve Armstrong.mp4
|
70.2 MB
|
Saving Nostalgia - Modding an Old Z80 Computer - Presented By Graham Sutherland.mp4
|
45.5 MB
|
The Frugal Girl's Guide to Threat Intelligence - Presented By Rebekah Brown.mp4
|
79.3 MB
|
Three decades in security - What's changed, and what hasn't - Presented by Robert Schifreen.mp4
|
86.5 MB
|
Trusts you might have missed - Presented by Will Schroeder.mp4
|
73.6 MB
|
Universal Serial aBUSe - Remote Physical Access Attacks - Presented By Rogan Dawes & Dominic White.mp4
|
32.6 MB
|
What it Means to Have the C Word in the National Security Agenda - Presented By Emil Tan.mp4
|
52.9 MB
|
/44CON 2017/
|
A Hands On Introduction To Software Defined Radio - Didier Stevens - Workshop.eng.srt
|
156.5 KB
|
A Hands On Introduction To Software Defined Radio - Didier Stevens - Workshop.mp4
|
188.9 MB
|
ARM Assembly and Shellcode Basics - Saumil Shah - Workshop.eng.srt
|
239.6 KB
|
ARM Assembly and Shellcode Basics - Saumil Shah - Workshop.mp4
|
214.8 MB
|
BaRMIe - Poking Java's Back Door - Nicky Bloor.eng.srt
|
97.0 KB
|
BaRMIe - Poking Java's Back Door - Nicky Bloor.mp4
|
67.6 MB
|
Biting the Apple that feeds you - Alex Plaskett and James Loureiro.eng.srt
|
112.5 KB
|
Biting the Apple that feeds you - Alex Plaskett and James Loureiro.mp4
|
58.1 MB
|
Breaking Historical Ciphers with Modern Algorithms - Klaus Schmeh.mp4
|
94.2 MB
|
Checking BIOS protections offline with just the firmware updates - Yuriy Bulygin.eng.srt
|
98.5 KB
|
Checking BIOS protections offline with just the firmware updates - Yuriy Bulygin.mp4
|
70.7 MB
|
Chkrootkit Eating APTs for breakfast since 1997 - Nelson Murilo.eng.srt
|
50.2 KB
|
Chkrootkit Eating APTs for breakfast since 1997 - Nelson Murilo.mp4
|
59.0 MB
|
Cisco ASA Episode 2 Striking back - Internals and Mitigations - Cedric Halbronn.eng.srt
|
127.3 KB
|
Cisco ASA Episode 2 Striking back - Internals and Mitigations - Cedric Halbronn.mp4
|
76.3 MB
|
Cracking HiTag2 Crypto - Kevin Sheldrake - Workshop.eng.srt
|
254.0 KB
|
Cracking HiTag2 Crypto - Kevin Sheldrake - Workshop.mp4
|
181.7 MB
|
Cracking HiTag2 Crypto - Kevin Sheldrake.eng.srt
|
131.9 KB
|
Cracking HiTag2 Crypto - Kevin Sheldrake.mp4
|
73.3 MB
|
Hide Yo Keys, Hide Yo Car - Aaron Guzman.eng.srt
|
98.1 KB
|
Hide Yo Keys, Hide Yo Car - Aaron Guzman.mp4
|
57.2 MB
|
How to Hack Radios RF Physical Layers - Matt Knight and Marc Newlin - Workshop.eng.srt
|
282.2 KB
|
How to Hack Radios RF Physical Layers - Matt Knight and Marc Newlin - Workshop.mp4
|
206.3 MB
|
Hypervisor-Assisted Ring0 Debugging with radare2 - Lars Haukli.eng.srt
|
84.6 KB
|
Hypervisor-Assisted Ring0 Debugging with radare2 - Lars Haukli.mp4
|
82.1 MB
|
Inside Android's SafetyNet Attestation - Colin Mulliner.eng.srt
|
166.3 KB
|
Inside Android's SafetyNet Attestation - Colin Mulliner.mp4
|
97.4 MB
|
Lessons Learned Hunting IoT Malware - Olivier Bilodeau.eng.srt
|
134.6 KB
|
Lessons Learned Hunting IoT Malware - Olivier Bilodeau.mp4
|
69.9 MB
|
Persisting with Microsoft Office Abusing Extensibility Options - William Knowles.eng.srt
|
119.0 KB
|
Persisting with Microsoft Office Abusing Extensibility Options - William Knowles.mp4
|
56.6 MB
|
Red Team Revenge Attacking Microsoft ATA - Nikhil Mittal.eng.srt
|
116.9 KB
|
Red Team Revenge Attacking Microsoft ATA - Nikhil Mittal.mp4
|
92.8 MB
|
Reverse Engineering Windows Malware 101 Workshop - Amanda Rousseau - Workshop.eng.srt
|
185.5 KB
|
Reverse Engineering Windows Malware 101 Workshop - Amanda Rousseau - Workshop.mp4
|
164.0 MB
|
Secrets Of The Motherboard (Shit My Chipset Says) - Graham Sutherland.eng.srt
|
111.9 KB
|
Secrets Of The Motherboard (Shit My Chipset Says) - Graham Sutherland.mp4
|
57.3 MB
|
See no evil, hear no evil - Matt Wixey.eng.srt
|
110.5 KB
|
See no evil, hear no evil - Matt Wixey.mp4
|
74.7 MB
|
So You Want to Hack Radios - Marc Newlin and Matt Knight.eng.srt
|
166.2 KB
|
So You Want to Hack Radios - Marc Newlin and Matt Knight.mp4
|
68.6 MB
|
Subgraph OS Hardening a Linux Desktop - David Mirza Ahmad.eng.srt
|
136.4 KB
|
Subgraph OS Hardening a Linux Desktop - David Mirza Ahmad.mp4
|
79.8 MB
|
The Black Art of Wireless Post-Exploitation - Gabriel Ryan.eng.srt
|
140.2 KB
|
The Black Art of Wireless Post-Exploitation - Gabriel Ryan.mp4
|
80.2 MB
|
The Internet of Us - Don A. Bailey.eng.srt
|
128.1 KB
|
The Internet of Us - Don A. Bailey.mp4
|
69.0 MB
|
/44CON 2018/
|
Automating myself out of a job - Jay Harris.eng.srt
|
84.1 KB
|
Automating myself out of a job - Jay Harris.mp4
|
44.0 MB
|
Bypassing Port-Security In 2018 Defeating MacSEC and 802.1x-2010 - Gabriel Ryan.eng.srt
|
110.9 KB
|
Bypassing Port-Security In 2018 Defeating MacSEC and 802.1x-2010 - Gabriel Ryan.mp4
|
51.8 MB
|
Catch Me If You Can - Shubham Shah & Michael Gianarakis.eng.srt
|
61.5 KB
|
Catch Me If You Can - Shubham Shah & Michael Gianarakis.mp4
|
34.5 MB
|
Code of Practice for Security in Consumer IoT Products and Services - David Rogers.eng.srt
|
75.8 KB
|
Code of Practice for Security in Consumer IoT Products and Services - David Rogers.mp4
|
46.0 MB
|
Exploits with Scratch - Kev Sheldrake.eng.srt
|
83.2 KB
|
Exploits with Scratch - Kev Sheldrake.mp4
|
70.5 MB
|
For the Love of Money - Leighanne Galloway & Tim Yunusov.mp4
|
41.2 MB
|
Ghost in the Locks - Timo Hirvonen & Tomi Tuominen.eng.srt
|
63.4 KB
|
Ghost in the Locks - Timo Hirvonen & Tomi Tuominen.mp4
|
54.4 MB
|
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus Schmeh.mp4
|
62.4 MB
|
JARVIS never saw it coming - Guy Barnhart-Magen & Ezra Caltum.eng.srt
|
101.1 KB
|
JARVIS never saw it coming - Guy Barnhart-Magen & Ezra Caltum.mp4
|
58.4 MB
|
Kill All Humans... Bugs - Philippe Arteau.eng.srt
|
73.6 KB
|
Kill All Humans... Bugs - Philippe Arteau.mp4
|
57.9 MB
|
Make ARM Shellcode Great Again - Saumil Shah.eng.srt
|
74.8 KB
|
Make ARM Shellcode Great Again - Saumil Shah.mp4
|
65.0 MB
|
Pwning the 44CON Nerf gun - PTP.mp4
|
29.3 MB
|
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim.eng.srt
|
57.7 KB
|
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim.mp4
|
51.9 MB
|
Security Module for PHP7 - Julien Voisin & Thibault Koechlin.eng.srt
|
58.2 KB
|
Security Module for PHP7 - Julien Voisin & Thibault Koechlin.mp4
|
50.3 MB
|
So You Want to Red Team - Lawrence Munro & Matt Lorentzen.eng.srt
|
110.8 KB
|
So You Want to Red Team - Lawrence Munro & Matt Lorentzen.mp4
|
82.2 MB
|
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzog.eng.srt
|
66.3 KB
|
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzog.mp4
|
40.0 MB
|
Using SmartNICs to Provide Better Data Center Security - Jack Matheson.eng.srt
|
125.1 KB
|
Using SmartNICs to Provide Better Data Center Security - Jack Matheson.mp4
|
85.7 MB
|
Weak Analogies make Poor Realities - Charl Van Der Walt.eng.srt
|
119.4 KB
|
Weak Analogies make Poor Realities - Charl Van Der Walt.mp4
|
61.0 MB
|
/44CON 2019/
|
Attacking Development Pipelines For Actual Profit - Alex Chapman.eng.srt
|
48.3 KB
|
Attacking Development Pipelines For Actual Profit - Alex Chapman.mp4
|
40.3 MB
|
Automating User Interaction With Sheepl Soup To Nuts - Matt Lorentzen.eng.srt
|
205.7 KB
|
Automating User Interaction With Sheepl Soup To Nuts - Matt Lorentzen.mp4
|
190.4 MB
|
Breaking Badge - Tim Wilkes and Phyushin.eng.srt
|
43.2 KB
|
Breaking Badge - Tim Wilkes and Phyushin.mp4
|
42.8 MB
|
BYOI PayloadsFusing The Powah Of.NET With A Scripting Language Of Your Choosing - Marcello Salvati.eng.srt
|
104.9 KB
|
BYOI PayloadsFusing The Powah Of.NET With A Scripting Language Of Your Choosing - Marcello Salvati.mp4
|
111.3 MB
|
Closing Ceremony - Adrian and Steve.eng.srt
|
32.4 KB
|
Closing Ceremony - Adrian and Steve.mp4
|
39.9 MB
|
Cold War Cryptography - Klaus Schmeh.mp4
|
96.4 MB
|
Community Evening Opening - Adrian and Steve.eng.srt
|
26.2 KB
|
Community Evening Opening - Adrian and Steve.mp4
|
18.5 MB
|
Day 2 Opening - Sam.eng.srt
|
2.3 KB
|
Day 2 Opening - Sam.mp4
|
1.9 MB
|
Dial V For Vulnerable Attacking VoIP Phones - Phillip Roskosch and Stephan Huber.mp4
|
49.2 MB
|
Here Be Dragons… The AWS S3 Logging Minefields - Kieren Nicholas Lovell.eng.srt
|
45.8 KB
|
Here Be Dragons… The AWS S3 Logging Minefields - Kieren Nicholas Lovell.mp4
|
49.1 MB
|
Human Side-Channels And Their Implications For Security And Privacy - Matt Wixey.eng.srt
|
90.9 KB
|
Human Side-Channels And Their Implications For Security And Privacy - Matt Wixey.mp4
|
78.0 MB
|
Hunting For Bugs, Catching Dragons - Nicolas Joly.eng.srt
|
76.5 KB
|
Hunting For Bugs, Catching Dragons - Nicolas Joly.mp4
|
99.5 MB
|
IBM Trusteer Rapport Does IBM (I)ntentionally (B)ackdoor (M)achines - Neil Kettle.eng.srt
|
57.2 KB
|
IBM Trusteer Rapport Does IBM (I)ntentionally (B)ackdoor (M)achines - Neil Kettle.mp4
|
65.6 MB
|
Introduction To GLIBC Heap Exploitation - Max Kamper.eng.srt
|
149.8 KB
|
Introduction To GLIBC Heap Exploitation - Max Kamper.mp4
|
127.8 MB
|
Logging Made Easy Workshop - NCSC Representatives and Duncan Atkin.eng.srt
|
31.8 KB
|
Logging Made Easy Workshop - NCSC Representatives and Duncan Atkin.mp4
|
17.5 MB
|
Making Something Out Of Something - Chris Wade.eng.srt
|
54.5 KB
|
Making Something Out Of Something - Chris Wade.mp4
|
39.2 MB
|
Office Equipment The Front Door To Persistence On Enterprise Networks - D. Romero and M. Rivas.eng.srt
|
78.9 KB
|
Office Equipment The Front Door To Persistence On Enterprise Networks - D. Romero and M. Rivas.mp4
|
77.3 MB
|
Opening - Adrian and Steve.eng.srt
|
17.1 KB
|
Opening - Adrian and Steve.mp4
|
14.9 MB
|
Outsourcing Global Cyber Norms - Katharina Sommer.eng.srt
|
65.8 KB
|
Outsourcing Global Cyber Norms - Katharina Sommer.mp4
|
55.6 MB
|
Owning The Cloud Through SSRF - Cody Brocious.eng.srt
|
54.2 KB
|
Owning The Cloud Through SSRF - Cody Brocious.mp4
|
48.4 MB
|
Playbook On How To Be The First Security Engineer At A Company - Kashish Mittal.eng.srt
|
90.4 KB
|
Playbook On How To Be The First Security Engineer At A Company - Kashish Mittal.mp4
|
77.8 MB
|
Rebalance Every 10,000 Kilometers - J. Wolfgang Goerlich.eng.srt
|
115.9 KB
|
Rebalance Every 10,000 Kilometers - J. Wolfgang Goerlich.mp4
|
119.4 MB
|
Scout Suite - A Multi-Cloud Security Auditing Tool - Xavier Garceau-Aranda.eng.srt
|
80.2 KB
|
Scout Suite - A Multi-Cloud Security Auditing Tool - Xavier Garceau-Aranda.mp4
|
69.2 MB
|
Security Research Teams - How To Manage, Grow And Retain Them - Guy Barnhart-Magen.eng.srt
|
114.5 KB
|
Security Research Teams - How To Manage, Grow And Retain Them - Guy Barnhart-Magen.mp4
|
124.6 MB
|
Spyware, Ransomware And Worms. How To Prevent The Next SAP Tragedy - Jordan Santarsieri.eng.srt
|
91.7 KB
|
Spyware, Ransomware And Worms. How To Prevent The Next SAP Tragedy - Jordan Santarsieri.mp4
|
97.9 MB
|
The Billion Dollar IoT Attack No One Knows About - Tony Gee and Vangelis Stykas.eng.srt
|
90.0 KB
|
The Billion Dollar IoT Attack No One Knows About - Tony Gee and Vangelis Stykas.mp4
|
123.7 MB
|
The CISO's Dilemma - Saumil Shah.eng.srt
|
64.4 KB
|
The CISO's Dilemma - Saumil Shah.mp4
|
69.7 MB
|
The Frugal Girl's Guide to Threat Intelligence - Presented By Rebekah Brown.eng.srt
|
112.1 KB
|
The Frugal Girl's Guide to Threat Intelligence - Presented By Rebekah Brown.mp4
|
47.9 MB
|
Throw Open The Gates Trading Control For Visibility - Kyle Tobener and Alessandro Lapucci.eng.srt
|
81.3 KB
|
Throw Open The Gates Trading Control For Visibility - Kyle Tobener and Alessandro Lapucci.mp4
|
71.9 MB
|
/44CON 2022/
|
Andrew Ruddick - Exploring a New Class of Kernel Exploit Primitive.mp4
|
40.6 MB
|
cybergibbons - I’m the Captain Now.mp4
|
86.6 MB
|
cybergibbons - I’m the Captain Now.srt
|
129.9 KB
|
Erlend Andreas Gjære - The Need For a Human Touch In Cyber Security.mp4
|
51.6 MB
|
Erlend Andreas Gjære - The Need For a Human Touch In Cyber Security.srt
|
69.1 KB
|
Guy Barnhart-Magen - The Log4J Rollercoaster - from an incident response perspective.mp4
|
45.3 MB
|
Guy Barnhart-Magen - The Log4J Rollercoaster - from an incident response perspective.srt
|
97.7 KB
|
Jake Roberts - The Tale Of Phineas Fisher.mp4
|
36.8 MB
|
Jake Roberts - The Tale Of Phineas Fisher.srt
|
70.7 KB
|
James Forshaw - Tooling up for Kerberos.mp4
|
54.4 MB
|
James Forshaw - Tooling up for Kerberos.srt
|
86.1 KB
|
Kev Sheldrake - What is eBPF and why should you care.mp4
|
45.5 MB
|
Kev Sheldrake - What is eBPF and why should you care.srt
|
88.7 KB
|
Klaus Schmeh - Ciphers and Crime.mp4
|
70.9 MB
|
Klaus Schmeh - Ciphers and Crime.srt
|
79.6 KB
|
Melissa Goldsmith - Threat Hunting From Bodging to Efficiency in 7 Steps.mp4
|
43.9 MB
|
Melissa Goldsmith - Threat Hunting From Bodging to Efficiency in 7 Steps.srt
|
103.3 KB
|
P Allwright - Lord of War-Investigating the theft of a gambling platform and outsmarting the thieves.mp4
|
77.1 MB
|
P Allwright - Lord of War-Investigating the theft of a gambling platform and outsmarting the thieves.srt
|
103.1 KB
|
Pavel Tsakalidis - Codecepticon - Building an obfuscator to bypass Modern EDR and AV.mp4
|
37.7 MB
|
Pavel Tsakalidis - Codecepticon - Building an obfuscator to bypass Modern EDR and AV.srt
|
80.4 KB
|
YTCracker at 44CON 2022.mp4
|
650.3 MB
|
Total files 299
|