|
/
|
|
CactusCon 2023 11 logo.jpg
|
4.5 KB
|
|
|
|
CactusCon 2024 12 logo.jpg
|
30.3 KB
|
|
CactusCon 2025 13 logo.jpg
|
193.1 KB
|
|
CactusCon logo.png
|
149.7 KB
|
|
CactusCon thank you.txt
|
0.9 KB
|
|
HEADER.md
|
0.4 KB
|
|
CactusCon 2014/
|
|
1o57 keynote.mp4
|
27.7 MB
|
|
PresidentBeef - Making Life Easier w. Static Analysis Tools.mp4
|
29.1 MB
|
|
/.../CactusCon 2014 captions/
|
|
1o57 keynote.eng.json
|
3.1 MB
|
|
1o57 keynote.eng.lrc
|
72.8 KB
|
|
1o57 keynote.eng.srt
|
83.0 KB
|
|
1o57 keynote.eng.text
|
50.3 KB
|
|
1o57 keynote.eng.tsv
|
63.6 KB
|
|
1o57 keynote.eng.txt
|
73.6 KB
|
|
1o57 keynote.eng.vtt
|
73.7 KB
|
|
PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.json
|
2.5 MB
|
|
PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.lrc
|
62.9 KB
|
|
PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.srt
|
71.8 KB
|
|
PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.text
|
43.6 KB
|
|
PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.tsv
|
55.0 KB
|
|
PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.txt
|
63.7 KB
|
|
PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.vtt
|
63.7 KB
|
|
CactusCon 2015/
|
|
Badge - Completed.mp4
|
1.3 MB
|
|
Internalized Context.mp4
|
33.1 MB
|
|
/.../CactusCon 2015 captions/
|
|
Badge - Completed.eng.json
|
0.1 KB
|
|
Badge - Completed.eng.lrc
|
0.0 KB
|
|
Badge - Completed.eng.srt
|
0.0 KB
|
|
Badge - Completed.eng.text
|
0.0 KB
|
|
Badge - Completed.eng.tsv
|
0.0 KB
|
|
Badge - Completed.eng.txt
|
0.0 KB
|
|
Badge - Completed.eng.vtt
|
0.0 KB
|
|
Internalized Context.eng.json
|
2.5 MB
|
|
Internalized Context.eng.lrc
|
58.6 KB
|
|
Internalized Context.eng.srt
|
66.8 KB
|
|
Internalized Context.eng.text
|
40.6 KB
|
|
Internalized Context.eng.tsv
|
51.2 KB
|
|
Internalized Context.eng.txt
|
59.3 KB
|
|
Internalized Context.eng.vtt
|
59.3 KB
|
|
CactusCon 2017/
|
|
Ring-0 Assembly.mp4
|
60.5 MB
|
|
/.../CactusCon 2017 captions/
|
|
Ring-0 Assembly.eng.srt
|
107.7 KB
|
|
CactusCon 2018/
|
|
ARMaHYDAN - Misadventures of ARM instruction encodings.mp4
|
75.6 MB
|
|
/.../CactusCon 2018 captions/
|
|
ARMaHYDAN - Misadventures of ARM instruction encodings.eng.srt
|
78.1 KB
|
|
CactusCon 2021 9/
|
|
Analyzing Suspicious Artifacts (deep dive).mp4
|
60.1 MB
|
|
CactusCon 9 Closing Ceremonies.mp4
|
91.6 MB
|
|
CactusCon 9 Opening Ceremony.mp4
|
71.9 MB
|
|
Can Artificial Intelligence (AI) Detect Advanced Persistent Threats.mp4
|
42.6 MB
|
|
Day One Wrapup.mp4
|
19.3 MB
|
|
Extracting a Bootloader's AES Key via a Power Analysis Side Channel Attack.mp4
|
42.4 MB
|
|
Hacking with Skynet How AI is Empowering Adversaries.mp4
|
56.0 MB
|
|
Hands-on Purple Team Workshop.mp4
|
65.1 MB
|
|
Introduction to Car Hacking Basics.mp4
|
20.4 MB
|
|
Keynote Address Eva Galperin.mp4
|
164.7 MB
|
|
Keynote April C. Wright.mp4
|
48.3 MB
|
|
Learning Offensive Security with Project V3 VulnHub - VirtualBox - Vagrant.mp4
|
19.6 MB
|
|
Linux IR Windows of Opportunity.mp4
|
26.3 MB
|
|
MQTT Tiny Protocol, Big Vulnerabilities.mp4
|
37.2 MB
|
|
Q&A - MQTT Tiny Protocol, Big Vulnerabilities.mp4
|
16.3 MB
|
|
Q&A Analyzing Suspicious Artifacts (deep dive).mp4
|
22.7 MB
|
|
Q&A Can Artificial Intelligence (AI) detect Advanced Persistent Threats.mp4
|
14.4 MB
|
|
Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.mp4
|
14.7 MB
|
|
Q&A Hacking with Skynet - How AI is Empowering Adversaries.mp4
|
10.5 MB
|
|
Q&A Introduction to Car Hacking Basics.mp4
|
9.0 MB
|
|
Q&A Keynote April C. Wright.mp4
|
8.2 MB
|
|
Q&A Keynote Eva Galperin.mp4
|
17.1 MB
|
|
Q&A Learning Offensive Security with Project V3 VulnHub - VirtualBox - Vagrant.mp4
|
17.7 MB
|
|
Q&A Linux IR Windows of Opportunity.mp4
|
29.4 MB
|
|
Q&A Reverse Engineering Websites.mp4
|
13.1 MB
|
|
Q&A Stealing a password through interpretive dance, and other wild video game hacks.mp4
|
18.8 MB
|
|
Q&A The Crimeware Arms Race Modern Techniques in Malware Armoring and Evasion.mp4
|
11.1 MB
|
|
Q&A The full purple juice, not the watered down stuff.mp4
|
13.2 MB
|
|
Q&A When Your Memory Forensics Tools Only Tell Half the Story.mp4
|
12.5 MB
|
|
Q&A Worst-of Cybersecurity Reporting 2021.mp4
|
33.3 MB
|
|
Reverse Engineering Websites.mp4
|
48.3 MB
|
|
Stealing a Password Through Interpretive Dance, and Other Wild Video Game Hacks.mp4
|
87.2 MB
|
|
The Crimeware Arms Race Modern Techniques in Malware Armoring & Evasion.mp4
|
47.5 MB
|
|
The Full Purple Juice, Not the Watered-Down Stuff.mp4
|
51.0 MB
|
|
When Your Memory Forensics Tools Only Tell Half the Story.mp4
|
45.5 MB
|
|
Worst of Cybersecurity Reporting 2021.mp4
|
30.7 MB
|
|
/.../CactusCon 2021 9 captions/
|
|
Analyzing Suspicious Artifacts (deep dive).eng.srt
|
62.4 KB
|
|
CactusCon 9 Closing Ceremonies.eng.srt
|
131.0 KB
|
|
CactusCon 9 Opening Ceremony.eng.srt
|
119.2 KB
|
|
Can Artificial Intelligence (AI) Detect Advanced Persistent Threats.eng.srt
|
74.6 KB
|
|
Day One Wrapup.eng.srt
|
24.5 KB
|
|
Extracting a Bootloader's AES Key via a Power Analysis Side Channel Attack.eng.srt
|
96.8 KB
|
|
Hacking with Skynet How AI is Empowering Adversaries.eng.srt
|
95.9 KB
|
|
Hands-on Purple Team Workshop.eng.srt
|
112.8 KB
|
|
Introduction to Car Hacking Basics.eng.srt
|
40.1 KB
|
|
Keynote Address Eva Galperin.eng.srt
|
81.2 KB
|
|
Keynote April C. Wright.eng.srt
|
93.4 KB
|
|
Learning Offensive Security with Project V3 VulnHub - VirtualBox - Vagrant.eng.srt
|
34.4 KB
|
|
Linux IR Windows of Opportunity.eng.srt
|
77.7 KB
|
|
MQTT Tiny Protocol, Big Vulnerabilities.eng.srt
|
81.2 KB
|
|
Q&A - MQTT Tiny Protocol, Big Vulnerabilities.eng.srt
|
27.8 KB
|
|
Q&A Analyzing Suspicious Artifacts (deep dive).eng.srt
|
28.5 KB
|
|
Q&A Can Artificial Intelligence (AI) detect Advanced Persistent Threats.eng.srt
|
15.0 KB
|
|
Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.json
|
534.6 KB
|
|
Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.lrc
|
13.1 KB
|
|
Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.srt
|
14.7 KB
|
|
Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.text
|
9.3 KB
|
|
Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.tsv
|
11.3 KB
|
|
Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.txt
|
13.2 KB
|
|
Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.vtt
|
13.2 KB
|
|
Q&A Hacking with Skynet - How AI is Empowering Adversaries.eng.srt
|
11.2 KB
|
|
Q&A Introduction to Car Hacking Basics.eng.srt
|
16.6 KB
|
|
Q&A Keynote April C. Wright.eng.srt
|
9.2 KB
|
|
Q&A Keynote Eva Galperin.eng.srt
|
21.4 KB
|
|
Q&A Learning Offensive Security with Project V3 VulnHub - VirtualBox - Vagrant.eng.srt
|
23.4 KB
|
|
Q&A Linux IR Windows of Opportunity.eng.srt
|
41.6 KB
|
|
Q&A Reverse Engineering Websites.eng.srt
|
18.2 KB
|
|
Q&A Stealing a password through interpretive dance, and other wild video game hacks.eng.srt
|
24.0 KB
|
|
Q&A The Crimeware Arms Race Modern Techniques in Malware Armoring and Evasion.eng.srt
|
14.7 KB
|
|
Q&A The full purple juice, not the watered down stuff.eng.srt
|
15.9 KB
|
|
Q&A When Your Memory Forensics Tools Only Tell Half the Story.eng.srt
|
15.6 KB
|
|
Q&A Worst-of Cybersecurity Reporting 2021.eng.srt
|
50.2 KB
|
|
Reverse Engineering Websites.eng.srt
|
116.5 KB
|
|
Stealing a Password Through Interpretive Dance, and Other Wild Video Game Hacks.eng.srt
|
102.7 KB
|
|
The Crimeware Arms Race Modern Techniques in Malware Armoring & Evasion.eng.srt
|
112.9 KB
|
|
The Full Purple Juice, Not the Watered-Down Stuff.eng.srt
|
100.0 KB
|
|
When Your Memory Forensics Tools Only Tell Half the Story.eng.srt
|
90.0 KB
|
|
Worst of Cybersecurity Reporting 2021.eng.srt
|
69.4 KB
|
|
CactusCon 2022 10/
|
|
Active Defense Scenarios A Quarterly Intelligence Driven Purple Team Exercise.mp4
|
42.4 MB
|
|
API's Dark Side Addressing AppSec's Biggest Challenge.mp4
|
29.2 MB
|
|
Artificial Intelligence Friend or Foe.mp4
|
80.2 MB
|
|
atomic-operator Atomic Red Team Python Execution Framework.mp4
|
80.7 MB
|
|
Building & Defending a Machine Learning Malware Classifier Taking 3rd at MLSEC 2021.mp4
|
45.5 MB
|
|
Building a more inclusive future in Cybersecurity.mp4
|
12.7 MB
|
|
Building a Ransomware Incident Response Plan.mp4
|
44.8 MB
|
|
Building the Cybersecurity Pipeline A Call to Action.mp4
|
28.7 MB
|
|
CactusCon 10 Closing Ceremonies.mp4
|
39.2 MB
|
|
CactusCon 10 Opening Ceremonies.mp4
|
18.4 MB
|
|
Chasing your Tail with a Raspberry Pi.mp4
|
29.3 MB
|
|
Container Scanning Run Fast and Stay Safe.mp4
|
34.4 MB
|
|
Dissecting the Ransomware Kill Chain Why Companies Need It.mp4
|
32.5 MB
|
|
Forensic Artifacts in Free Tiers of Azure, GCP, and AWS.mp4
|
34.4 MB
|
|
Hacking Back Scammers.mp4
|
22.0 MB
|
|
How Nefilim Dropper uses Polymorphism.mp4
|
26.7 MB
|
|
How not to suck at CFPs Real-World Feedback from the CC10 Review Board.mp4
|
28.8 MB
|
|
Human Intelligence Versus Artificial Intelligence Ransomware.mp4
|
24.1 MB
|
|
Hunting Phish Kits.mp4
|
52.2 MB
|
|
JavaScript Obfuscation - It’s All About the P-a-c-k-e-r-s.mp4
|
38.1 MB
|
|
Keynote Charles Shirer.mp4
|
26.7 MB
|
|
KEYNOTE Mari DeGrazia.mp4
|
40.8 MB
|
|
Level Up Your Vulnerability Management Program.mp4
|
46.1 MB
|
|
Live Q&A - Artificial Intelligence Friend or Foe in the Context of Cybersecurity.mp4
|
17.8 MB
|
|
Live Q&A - Building a More Inclusive Future in Cybersecurity.mp4
|
8.5 MB
|
|
Live Q&A - Hunting Phish Kits.mp4
|
5.8 MB
|
|
Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.mp4
|
846.4 KB
|
|
Live Q&A - Operationalizing Purple Team.mp4
|
3.5 MB
|
|
Live Q&A - Tag Management System the Agile Way to Add Vulerabilities.mp4
|
11.5 MB
|
|
Live Q&A - Throwing the Elephant.mp4
|
13.0 MB
|
|
Live Q&A -Threat Hunting Becoming the Predator and No Longer the Prey.mp4
|
14.3 MB
|
|
Malware of the Mind - Disinformation and Manipulation via Social Platforms.mp4
|
44.3 MB
|
|
Network Forensics Analysis.mp4
|
31.4 MB
|
|
Nits Among Your Bits A Dive into LockВit Ransomware Operations.mp4
|
31.2 MB
|
|
Observations from Social Engineering my way Through a Pandemic.mp4
|
16.5 MB
|
|
Offensive Debugging .NET Poops of Gold.mp4
|
53.9 MB
|
|
Operationalized Purple Teaming.mp4
|
53.0 MB
|
|
PacketSifter and Leveraging TShark for Network Traffic Analysis.mp4
|
33.6 MB
|
|
ReadySetSecure all the COVID vaccines.mp4
|
54.6 MB
|
|
Reversing DLLs.mp4
|
44.1 MB
|
|
Tag Management System the Agile Way to Add Vulnerabilities on your Website.mp4
|
18.1 MB
|
|
Threat Hunting Becoming the Predator and No Longer the Prey.mp4
|
55.7 MB
|
|
Throwing the Elephant.mp4
|
33.1 MB
|
|
What Are We Missing in Web Application.mp4
|
22.1 MB
|
|
What I Learned After my First Year as a Security Analyst.mp4
|
14.9 MB
|
|
Worst of Cybersecurity Reporting 2021.mp4
|
35.3 MB
|
|
/.../CactusCon 2022 10 captions/
|
|
Active Defense Scenarios A Quarterly Intelligence Driven Purple Team Exercise.eng.srt
|
104.9 KB
|
|
API's Dark Side Addressing AppSec's Biggest Challenge.eng.srt
|
78.1 KB
|
|
Artificial Intelligence Friend or Foe.eng.srt
|
72.8 KB
|
|
atomic-operator Atomic Red Team Python Execution Framework.eng.srt
|
105.5 KB
|
|
Building & Defending a Machine Learning Malware Classifier Taking 3rd at MLSEC 2021.eng.srt
|
111.2 KB
|
|
Building a more inclusive future in Cybersecurity.eng.srt
|
27.7 KB
|
|
Building a Ransomware Incident Response Plan.eng.srt
|
103.9 KB
|
|
Building the Cybersecurity Pipeline A Call to Action.eng.srt
|
92.4 KB
|
|
CactusCon 10 Closing Ceremonies.eng.srt
|
84.0 KB
|
|
CactusCon 10 Opening Ceremonies.eng.srt
|
37.6 KB
|
|
Chasing your Tail with a Raspberry Pi.eng.srt
|
91.5 KB
|
|
Container Scanning Run Fast and Stay Safe.eng.srt
|
97.0 KB
|
|
Dissecting the Ransomware Kill Chain Why Companies Need It.eng.srt
|
81.4 KB
|
|
Forensic Artifacts in Free Tiers of Azure, GCP, and AWS.eng.srt
|
92.5 KB
|
|
Hacking Back Scammers.eng.srt
|
60.6 KB
|
|
How Nefilim Dropper uses Polymorphism.eng.srt
|
63.7 KB
|
|
How not to suck at CFPs Real-World Feedback from the CC10 Review Board.eng.srt
|
91.1 KB
|
|
Human Intelligence Versus Artificial Intelligence Ransomware.eng.srt
|
59.3 KB
|
|
Hunting Phish Kits.eng.srt
|
92.6 KB
|
|
JavaScript Obfuscation - It’s All About the P-a-c-k-e-r-s.eng.srt
|
73.2 KB
|
|
Keynote Charles Shirer.eng.srt
|
37.5 KB
|
|
KEYNOTE Mari DeGrazia.eng.srt
|
93.0 KB
|
|
Level Up Your Vulnerability Management Program.eng.srt
|
121.2 KB
|
|
Live Q&A - Artificial Intelligence Friend or Foe in the Context of Cybersecurity.eng.srt
|
23.3 KB
|
|
Live Q&A - Building a More Inclusive Future in Cybersecurity.eng.srt
|
14.7 KB
|
|
Live Q&A - Hunting Phish Kits.eng.srt
|
6.4 KB
|
|
Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.json
|
7.0 KB
|
|
Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.lrc
|
0.2 KB
|
|
Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.srt
|
0.2 KB
|
|
Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.text
|
0.1 KB
|
|
Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.tsv
|
0.2 KB
|
|
Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.txt
|
0.2 KB
|
|
Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.vtt
|
0.2 KB
|
|
Live Q&A - Operationalizing Purple Team.eng.srt
|
3.6 KB
|
|
Live Q&A - Tag Management System the Agile Way to Add Vulerabilities.eng.srt
|
14.0 KB
|
|
Live Q&A - Throwing the Elephant.eng.srt
|
23.5 KB
|
|
Live Q&A -Threat Hunting Becoming the Predator and No Longer the Prey.eng.srt
|
23.5 KB
|
|
Malware of the Mind - Disinformation and Manipulation via Social Platforms.eng.srt
|
100.1 KB
|
|
Network Forensics Analysis.eng.srt
|
74.0 KB
|
|
Nits Among Your Bits A Dive into LockВit Ransomware Operations.eng.srt
|
65.0 KB
|
|
Observations from Social Engineering my way Through a Pandemic.eng.srt
|
51.8 KB
|
|
Offensive Debugging .NET Poops of Gold.eng.srt
|
104.7 KB
|
|
Operationalized Purple Teaming.eng.srt
|
86.2 KB
|
|
PacketSifter and Leveraging TShark for Network Traffic Analysis.eng.srt
|
85.3 KB
|
|
ReadySetSecure all the COVID vaccines.eng.srt
|
129.7 KB
|
|
Reversing DLLs.eng.srt
|
119.5 KB
|
|
Tag Management System the Agile Way to Add Vulnerabilities on your Website.eng.srt
|
31.7 KB
|
|
Threat Hunting Becoming the Predator and No Longer the Prey.eng.srt
|
123.6 KB
|
|
Throwing the Elephant.eng.srt
|
62.9 KB
|
|
What Are We Missing in Web Application.eng.srt
|
46.1 KB
|
|
What I Learned After my First Year as a Security Analyst.eng.srt
|
43.4 KB
|
|
Worst of Cybersecurity Reporting 2021.eng.srt
|
109.2 KB
|
|
CactusCon 2023 11/
|
|
Day 1 - Track 1.mp4
|
468.6 MB
|
|
Day 1 - Track 2.mp4
|
458.6 MB
|
|
Day 1 - Track 3.mp4
|
564.2 MB
|
|
Day 2 - Track 1.mp4
|
578.9 MB
|
|
Day 2 - Track 2.mp4
|
486.2 MB
|
|
Day 2 - Track 3.mp4
|
996.8 MB
|
|
/.../CactusCon 2023 11 captions/
|
|
Day 1 - Track 1.eng.srt
|
545.0 KB
|
|
Day 1 - Track 2.eng.srt
|
388.6 KB
|
|
Day 1 - Track 3.eng.srt
|
465.8 KB
|
|
Day 2 - Track 1.eng.srt
|
806.1 KB
|
|
Day 2 - Track 2.eng.srt
|
631.1 KB
|
|
Day 2 - Track 3.eng.srt
|
663.9 KB
|
|
CactusCon 2024 12/
|
|
60 minutes Hack this AWS account.mp4
|
16.8 MB
|
|
A cactus coup at the goldrush saloon swindling machine learning caches via wagon train.mp4
|
76.8 MB
|
|
Arizona Elections Security Prep for 2024.mp4
|
73.3 MB
|
|
Betrayed by Your Browser How Third-Party Tracking Systems Are Following You Online and What.mp4
|
14.9 MB
|
|
Breaking in to the Iron Fortress - How I hack IBM mainframes.mp4
|
19.4 MB
|
|
Building a Backyard TI Platform that Works for You.mp4
|
38.6 MB
|
|
CactusCon 12 Closing Remarks.mp4
|
68.9 MB
|
|
Catch Me If You Can Hunting Cloud Exfiltration Using Anomaly Detection.mp4
|
21.2 MB
|
|
Clearing the Fog Detection and Defense against Cloud Persistence Techniques.mp4
|
45.0 MB
|
|
Cloud security for the network security engineer, or why it’s all just so wrong these days.mp4
|
52.7 MB
|
|
Come WiFind Me WiFi and other RF Survelliance.mp4
|
41.7 MB
|
|
Command, Control, and memes Cordyceps - ant = zombie.mp4
|
19.9 MB
|
|
Cyber Espionage and the Global Power Struggle A Deep Dive.mp4
|
77.3 MB
|
|
DON’T PANIC - An IR Guide to Communicating with Execs.mp4
|
51.0 MB
|
|
Every Contact Leaves a Trace.mp4
|
45.7 MB
|
|
Exploring RMM Tools and Their Forensics.mp4
|
36.9 MB
|
|
From Cyber Lemons to Lemonade A Refreshing Take on Exposed Data.mp4
|
84.4 MB
|
|
IAES Guarding the University of Arizona's Heartbeat - The Watchful Eye on Critical.mp4
|
50.8 MB
|
|
It's Phishing Season An Overview of Phishing Kits.mp4
|
2.8 MB
|
|
Keynote - Naomi Brockwell Building a More Private Future.mp4
|
81.4 MB
|
|
Keynote - Riana Pfefferkorn Who's Afraid of Responsible Vulnerability Disclosure.mp4
|
3.7 MB
|
|
Leaving Doors Unlocked With Cognito.mp4
|
20.0 MB
|
|
Never Break the Chain Attack Chaining for 0-Days.mp4
|
20.1 MB
|
|
Novel Detection Technique of Process Injection using Network Anomalies.mp4
|
15.2 MB
|
|
Opening the DarkGate Exploring the Destructive Potential of AutoIT and Possible Mitigations.mp4
|
42.1 MB
|
|
Reverse Engineering Go Malware A BianLian Story.mp4
|
16.1 MB
|
|
SBOMs for Evil Turning Un-Remediated Software Supply Chain Documentation into an Attack Path.mp4
|
87.2 MB
|
|
Simple Ways to Make Webhook Security Better.mp4
|
50.8 MB
|
|
Subdomain Takeover.mp4
|
19.7 MB
|
|
The Best Free Resources to Get Started in Incident Response.mp4
|
74.1 MB
|
|
The Registry Hives you may be MSIX-ing.mp4
|
49.7 MB
|
|
The Story of a Never Ending Scam When Natalie Hamilton Reemerged with Vengeance and a Power.mp4
|
17.4 MB
|
|
Unlocking RFID Security A Deep Dive into Flipper Zero and the Vulnerabilities of Multiclass.mp4
|
36.4 MB
|
|
Validating Identity in a World of Deepfakes.mp4
|
44.3 MB
|
|
Veilid, the future of privacy- aka- how to destroy capitalism with the Cult of the Dead Cow.mp4
|
63.9 MB
|
|
Worst of Cybersecurity Reporting 2023.mp4
|
39.7 MB
|
|
/.../CactusCon 2024 12 captions/
|
|
60 minutes Hack this AWS account.eng.srt
|
96.9 KB
|
|
A cactus coup at the goldrush saloon swindling machine learning caches via wagon train.eng.srt
|
104.0 KB
|
|
Arizona Elections Security Prep for 2024.eng.srt
|
110.0 KB
|
|
Betrayed by Your Browser How Third-Party Tracking Systems Are Following You Online and What.eng.srt
|
65.1 KB
|
|
Breaking in to the Iron Fortress - How I hack IBM mainframes.eng.srt
|
104.8 KB
|
|
Building a Backyard TI Platform that Works for You.eng.srt
|
66.5 KB
|
|
CactusCon 12 Closing Remarks.eng.srt
|
55.9 KB
|
|
Catch Me If You Can Hunting Cloud Exfiltration Using Anomaly Detection.eng.srt
|
114.1 KB
|
|
Clearing the Fog Detection and Defense against Cloud Persistence Techniques.eng.srt
|
75.4 KB
|
|
Cloud security for the network security engineer, or why it’s all just so wrong these days..eng.srt
|
32.5 KB
|
|
Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.json
|
874.4 KB
|
|
Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.lrc
|
24.2 KB
|
|
Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.srt
|
27.9 KB
|
|
Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.text
|
15.9 KB
|
|
Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.tsv
|
20.7 KB
|
|
Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.txt
|
24.5 KB
|
|
Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.vtt
|
24.5 KB
|
|
Come WiFind Me WiFi and other RF Survelliance.eng.srt
|
76.9 KB
|
|
Command, Control, and memes Cordyceps - ant = zombie.eng.srt
|
108.4 KB
|
|
Cyber Espionage and the Global Power Struggle A Deep Dive.eng.srt
|
97.9 KB
|
|
DON’T PANIC - An IR Guide to Communicating with Execs.eng.srt
|
46.5 KB
|
|
Every Contact Leaves a Trace.eng.srt
|
115.2 KB
|
|
Exploring RMM Tools and Their Forensics.eng.srt
|
52.6 KB
|
|
From Cyber Lemons to Lemonade A Refreshing Take on Exposed Data.eng.srt
|
116.0 KB
|
|
IAES Guarding the University of Arizona's Heartbeat - The Watchful Eye on Critical.eng.srt
|
96.6 KB
|
|
It's Phishing Season An Overview of Phishing Kits.eng.srt
|
9.8 KB
|
|
Keynote - Naomi Brockwell Building a More Private Future.eng.srt
|
110.8 KB
|
|
Keynote - Riana Pfefferkorn Who's Afraid of Responsible Vulnerability Disclosure.eng.srt
|
8.4 KB
|
|
Leaving Doors Unlocked With Cognito.eng.srt
|
38.0 KB
|
|
Never Break the Chain Attack Chaining for 0-Days.eng.srt
|
105.1 KB
|
|
Novel Detection Technique of Process Injection using Network Anomalies.eng.srt
|
72.8 KB
|
|
Opening the DarkGate Exploring the Destructive Potential of AutoIT and Possible Mitigations.eng.srt
|
87.1 KB
|
|
Reverse Engineering Go Malware A BianLian Story.eng.srt
|
94.0 KB
|
|
SBOMs for Evil Turning Un-Remediated Software Supply Chain Documentation into an Attack Path.eng.srt
|
104.0 KB
|
|
Simple Ways to Make Webhook Security Better.eng.srt
|
74.1 KB
|
|
Subdomain Takeover.eng.srt
|
42.5 KB
|
|
The Best Free Resources to Get Started in Incident Response.eng.srt
|
109.4 KB
|
|
The Registry Hives you may be MSIX-ing.eng.srt
|
83.6 KB
|
|
The Story of a Never Ending Scam When Natalie Hamilton Reemerged with Vengeance and a Power.eng.srt
|
90.6 KB
|
|
Unlocking RFID Security A Deep Dive into Flipper Zero and the Vulnerabilities of Multiclass.eng.srt
|
45.9 KB
|
|
Validating Identity in a World of Deepfakes.eng.srt
|
82.3 KB
|
|
Veilid, the future of privacy- aka- how to destroy capitalism with the Cult of the Dead Cow.eng.srt
|
86.2 KB
|
|
Worst of Cybersecurity Reporting 2023.eng.srt
|
53.7 KB
|
|
CactusCon 2025 13/
|
|
Alice & Bob Lose Their Life Savings.mp4
|
22.2 MB
|
|
Becoming a Red Team Operator.mp4
|
43.9 MB
|
|
Beyond the Horizon Innovative Approaches to Space Cyberattack Scenarios.mp4
|
68.6 MB
|
|
Building Trust in AI On Safe and Responsible Use of LLMs.mp4
|
46.5 MB
|
|
Deep dive into JWT Algorithm Confusion.mp4
|
45.5 MB
|
|
Digital damage control misinformation, disinformation & negative effects during a crisis.mp4
|
56.8 MB
|
|
Digital Doppelgängers The Dual Faces of Deepfake Technology.mp4
|
61.2 MB
|
|
DIY AI Build Your Own Digital InfoSec Team with BYOLLM.mp4
|
75.8 MB
|
|
Dr. CVE Love, or how I learned to stop worrying and love vuln management.mp4
|
24.6 MB
|
|
EKUwu - Not Just another AD CS ESC.mp4
|
46.5 MB
|
|
Evasion, Persistence, and Blinding EDR - Oh My.mp4
|
74.4 MB
|
|
Exploiting AI & Machine Learning Systems Adversarial Attacks against Deep Learning Algorithms.mp4
|
54.5 MB
|
|
HIDe-&-SEEK Who Owns Your Keyboard.mp4
|
61.6 MB
|
|
Intelligent Response Merging Threat Intel, MDR, and Incident Response for Maximum Impact.mp4
|
60.2 MB
|
|
It is 2025 Is Microsoft Active Directory Still Risky to Your Enterprise.mp4
|
69.2 MB
|
|
JS-Tap Mark II Attacking Web Apps With Even More Red Team Shenanigans.mp4
|
70.1 MB
|
|
Keynote Down the Rabbit Hole Red Team Deep Fakes and the Evolution of Social Engineering.mp4
|
63.1 MB
|
|
Keynote How Generative AI is Shaping Online Threats.mp4
|
35.3 MB
|
|
LLMs Your Wireless Hacking Friend.mp4
|
15.3 MB
|
|
Machine Learning Models Gone Rogue - How to Reel Them Back In.mp4
|
21.4 MB
|
|
Navigating Blind SSRF Attacking and Defending Critical Systems.mp4
|
50.8 MB
|
|
NTLMv1 reversion to NTLM with hashcat and the NTLMv1-multi tool.mp4
|
24.8 MB
|
|
Presenting Like a Boss Virtual & Physical Presenting Tips & Tricks.mp4
|
60.4 MB
|
|
Staunching Wounds and Staying Sane A Survival Guide for Incident Responders.mp4
|
51.4 MB
|
|
That Shouldn't Have Worked - Payload Development 101.mp4
|
65.7 MB
|
|
The Pin Puller's Guide A Hands-On Guide to Reverse Engineering iOS Applications.mp4
|
62.2 MB
|
|
Top 10 Unexpected AI Systems Hacks that we did not see coming.mp4
|
57.4 MB
|
|
When AI Meets Cybersecurity Challenges and Strategies for Professionals.mp4
|
33.6 MB
|
|
Whoops I Accidentally Hacked ASU.mp4
|
27.1 MB
|
|
Worst of Cybersecurity Reporting 2024.mp4
|
33.7 MB
|
|
/.../CactusCon 2025 13 captions/
|
|
Alice & Bob Lose Their Life Savings.eng.srt
|
41.9 KB
|
|
Becoming a Red Team Operator.eng.srt
|
89.1 KB
|
|
Beyond the Horizon Innovative Approaches to Space Cyberattack Scenarios.eng.srt
|
88.9 KB
|
|
Building Trust in AI On Safe and Responsible Use of LLMs.eng.srt
|
78.4 KB
|
|
Deep dive into JWT Algorithm Confusion.eng.srt
|
75.9 KB
|
|
Digital damage control misinformation, disinformation & negative effects during a crisis.eng.srt
|
108.9 KB
|
|
Digital Doppelgängers The Dual Faces of Deepfake Technology.eng.srt
|
99.4 KB
|
|
DIY AI Build Your Own Digital InfoSec Team with BYOLLM.eng.srt
|
133.1 KB
|
|
Dr. CVE Love, or how I learned to stop worrying and love vuln management.eng.srt
|
47.9 KB
|
|
EKUwu - Not Just another AD CS ESC.eng.srt
|
69.5 KB
|
|
Evasion, Persistence, and Blinding EDR - Oh My.eng.srt
|
89.8 KB
|
|
Exploiting AI & Machine Learning Systems Adversarial Attacks against Deep Learning Algorithms.eng.srt
|
82.7 KB
|
|
HIDe-&-SEEK Who Owns Your Keyboard.eng.srt
|
82.1 KB
|
|
Intelligent Response Merging Threat Intel, MDR, and Incident Response for Maximum Impact.eng.srt
|
96.7 KB
|
|
It is 2025 Is Microsoft Active Directory Still Risky to Your Enterprise.eng.srt
|
77.5 KB
|
|
JS-Tap Mark II Attacking Web Apps With Even More Red Team Shenanigans.eng.srt
|
90.7 KB
|
|
Keynote Down the Rabbit Hole Red Team Deep Fakes and the Evolution of Social Engineering.eng.srt
|
90.7 KB
|
|
Keynote How Generative AI is Shaping Online Threats.eng.srt
|
70.8 KB
|
|
LLMs Your Wireless Hacking Friend.eng.srt
|
24.4 KB
|
|
Machine Learning Models Gone Rogue - How to Reel Them Back In.eng.srt
|
32.9 KB
|
|
Navigating Blind SSRF Attacking and Defending Critical Systems.eng.srt
|
87.7 KB
|
|
NTLMv1 reversion to NTLM with hashcat and the NTLMv1-multi tool.eng.srt
|
33.1 KB
|
|
Presenting Like a Boss Virtual & Physical Presenting Tips & Tricks.eng.srt
|
114.3 KB
|
|
Staunching Wounds and Staying Sane A Survival Guide for Incident Responders.eng.srt
|
107.3 KB
|
|
That Shouldn't Have Worked - Payload Development 101.eng.srt
|
99.3 KB
|
|
The Pin Puller's Guide A Hands-On Guide to Reverse Engineering iOS Applications.eng.srt
|
75.6 KB
|
|
Top 10 Unexpected AI Systems Hacks that we did not see coming.eng.srt
|
75.6 KB
|
|
When AI Meets Cybersecurity Challenges and Strategies for Professionals.eng.srt
|
44.2 KB
|
|
Whoops I Accidentally Hacked ASU.eng.srt
|
36.8 KB
|
|
Worst of Cybersecurity Reporting 2024.eng.srt
|
62.1 KB
|
|
Total files 369
|