FileMood

Download CactusCon

CactusCon

Name

CactusCon

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

9.6 GB

Total Files

369

Last Seen

Hash

116CAB6488130CD9FDE47503BB49D89C9E52CE64

/

CactusCon 2023 11 logo.jpg

4.5 KB

CactusCon 2024 12 logo.jpg

30.3 KB

CactusCon 2025 13 logo.jpg

193.1 KB

CactusCon logo.png

149.7 KB

CactusCon thank you.txt

0.9 KB

HEADER.md

0.4 KB

CactusCon 2014/

1o57 keynote.mp4

27.7 MB

PresidentBeef - Making Life Easier w. Static Analysis Tools.mp4

29.1 MB

/.../CactusCon 2014 captions/

1o57 keynote.eng.json

3.1 MB

1o57 keynote.eng.lrc

72.8 KB

1o57 keynote.eng.srt

83.0 KB

1o57 keynote.eng.text

50.3 KB

1o57 keynote.eng.tsv

63.6 KB

1o57 keynote.eng.txt

73.6 KB

1o57 keynote.eng.vtt

73.7 KB

PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.json

2.5 MB

PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.lrc

62.9 KB

PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.srt

71.8 KB

PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.text

43.6 KB

PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.tsv

55.0 KB

PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.txt

63.7 KB

PresidentBeef - Making Life Easier w. Static Analysis Tools.eng.vtt

63.7 KB

CactusCon 2015/

Badge - Completed.mp4

1.3 MB

Internalized Context.mp4

33.1 MB

/.../CactusCon 2015 captions/

Badge - Completed.eng.json

0.1 KB

Badge - Completed.eng.lrc

0.0 KB

Badge - Completed.eng.srt

0.0 KB

Badge - Completed.eng.text

0.0 KB

Badge - Completed.eng.tsv

0.0 KB

Badge - Completed.eng.txt

0.0 KB

Badge - Completed.eng.vtt

0.0 KB

Internalized Context.eng.json

2.5 MB

Internalized Context.eng.lrc

58.6 KB

Internalized Context.eng.srt

66.8 KB

Internalized Context.eng.text

40.6 KB

Internalized Context.eng.tsv

51.2 KB

Internalized Context.eng.txt

59.3 KB

Internalized Context.eng.vtt

59.3 KB

CactusCon 2017/

Ring-0 Assembly.mp4

60.5 MB

/.../CactusCon 2017 captions/

Ring-0 Assembly.eng.srt

107.7 KB

CactusCon 2018/

ARMaHYDAN - Misadventures of ARM instruction encodings.mp4

75.6 MB

/.../CactusCon 2018 captions/

ARMaHYDAN - Misadventures of ARM instruction encodings.eng.srt

78.1 KB

CactusCon 2021 9/

Analyzing Suspicious Artifacts (deep dive).mp4

60.1 MB

CactusCon 9 Closing Ceremonies.mp4

91.6 MB

CactusCon 9 Opening Ceremony.mp4

71.9 MB

Can Artificial Intelligence (AI) Detect Advanced Persistent Threats.mp4

42.6 MB

Day One Wrapup.mp4

19.3 MB

Extracting a Bootloader's AES Key via a Power Analysis Side Channel Attack.mp4

42.4 MB

Hacking with Skynet How AI is Empowering Adversaries.mp4

56.0 MB

Hands-on Purple Team Workshop.mp4

65.1 MB

Introduction to Car Hacking Basics.mp4

20.4 MB

Keynote Address Eva Galperin.mp4

164.7 MB

Keynote April C. Wright.mp4

48.3 MB

Learning Offensive Security with Project V3 VulnHub - VirtualBox - Vagrant.mp4

19.6 MB

Linux IR Windows of Opportunity.mp4

26.3 MB

MQTT Tiny Protocol, Big Vulnerabilities.mp4

37.2 MB

Q&A - MQTT Tiny Protocol, Big Vulnerabilities.mp4

16.3 MB

Q&A Analyzing Suspicious Artifacts (deep dive).mp4

22.7 MB

Q&A Can Artificial Intelligence (AI) detect Advanced Persistent Threats.mp4

14.4 MB

Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.mp4

14.7 MB

Q&A Hacking with Skynet - How AI is Empowering Adversaries.mp4

10.5 MB

Q&A Introduction to Car Hacking Basics.mp4

9.0 MB

Q&A Keynote April C. Wright.mp4

8.2 MB

Q&A Keynote Eva Galperin.mp4

17.1 MB

Q&A Learning Offensive Security with Project V3 VulnHub - VirtualBox - Vagrant.mp4

17.7 MB

Q&A Linux IR Windows of Opportunity.mp4

29.4 MB

Q&A Reverse Engineering Websites.mp4

13.1 MB

Q&A Stealing a password through interpretive dance, and other wild video game hacks.mp4

18.8 MB

Q&A The Crimeware Arms Race Modern Techniques in Malware Armoring and Evasion.mp4

11.1 MB

Q&A The full purple juice, not the watered down stuff.mp4

13.2 MB

Q&A When Your Memory Forensics Tools Only Tell Half the Story.mp4

12.5 MB

Q&A Worst-of Cybersecurity Reporting 2021.mp4

33.3 MB

Reverse Engineering Websites.mp4

48.3 MB

Stealing a Password Through Interpretive Dance, and Other Wild Video Game Hacks.mp4

87.2 MB

The Crimeware Arms Race Modern Techniques in Malware Armoring & Evasion.mp4

47.5 MB

The Full Purple Juice, Not the Watered-Down Stuff.mp4

51.0 MB

When Your Memory Forensics Tools Only Tell Half the Story.mp4

45.5 MB

Worst of Cybersecurity Reporting 2021.mp4

30.7 MB

/.../CactusCon 2021 9 captions/

Analyzing Suspicious Artifacts (deep dive).eng.srt

62.4 KB

CactusCon 9 Closing Ceremonies.eng.srt

131.0 KB

CactusCon 9 Opening Ceremony.eng.srt

119.2 KB

Can Artificial Intelligence (AI) Detect Advanced Persistent Threats.eng.srt

74.6 KB

Day One Wrapup.eng.srt

24.5 KB

Extracting a Bootloader's AES Key via a Power Analysis Side Channel Attack.eng.srt

96.8 KB

Hacking with Skynet How AI is Empowering Adversaries.eng.srt

95.9 KB

Hands-on Purple Team Workshop.eng.srt

112.8 KB

Introduction to Car Hacking Basics.eng.srt

40.1 KB

Keynote Address Eva Galperin.eng.srt

81.2 KB

Keynote April C. Wright.eng.srt

93.4 KB

Learning Offensive Security with Project V3 VulnHub - VirtualBox - Vagrant.eng.srt

34.4 KB

Linux IR Windows of Opportunity.eng.srt

77.7 KB

MQTT Tiny Protocol, Big Vulnerabilities.eng.srt

81.2 KB

Q&A - MQTT Tiny Protocol, Big Vulnerabilities.eng.srt

27.8 KB

Q&A Analyzing Suspicious Artifacts (deep dive).eng.srt

28.5 KB

Q&A Can Artificial Intelligence (AI) detect Advanced Persistent Threats.eng.srt

15.0 KB

Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.json

534.6 KB

Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.lrc

13.1 KB

Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.srt

14.7 KB

Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.text

9.3 KB

Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.tsv

11.3 KB

Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.txt

13.2 KB

Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.eng.vtt

13.2 KB

Q&A Hacking with Skynet - How AI is Empowering Adversaries.eng.srt

11.2 KB

Q&A Introduction to Car Hacking Basics.eng.srt

16.6 KB

Q&A Keynote April C. Wright.eng.srt

9.2 KB

Q&A Keynote Eva Galperin.eng.srt

21.4 KB

Q&A Learning Offensive Security with Project V3 VulnHub - VirtualBox - Vagrant.eng.srt

23.4 KB

Q&A Linux IR Windows of Opportunity.eng.srt

41.6 KB

Q&A Reverse Engineering Websites.eng.srt

18.2 KB

Q&A Stealing a password through interpretive dance, and other wild video game hacks.eng.srt

24.0 KB

Q&A The Crimeware Arms Race Modern Techniques in Malware Armoring and Evasion.eng.srt

14.7 KB

Q&A The full purple juice, not the watered down stuff.eng.srt

15.9 KB

Q&A When Your Memory Forensics Tools Only Tell Half the Story.eng.srt

15.6 KB

Q&A Worst-of Cybersecurity Reporting 2021.eng.srt

50.2 KB

Reverse Engineering Websites.eng.srt

116.5 KB

Stealing a Password Through Interpretive Dance, and Other Wild Video Game Hacks.eng.srt

102.7 KB

The Crimeware Arms Race Modern Techniques in Malware Armoring & Evasion.eng.srt

112.9 KB

The Full Purple Juice, Not the Watered-Down Stuff.eng.srt

100.0 KB

When Your Memory Forensics Tools Only Tell Half the Story.eng.srt

90.0 KB

Worst of Cybersecurity Reporting 2021.eng.srt

69.4 KB

CactusCon 2022 10/

Active Defense Scenarios A Quarterly Intelligence Driven Purple Team Exercise.mp4

42.4 MB

API's Dark Side Addressing AppSec's Biggest Challenge.mp4

29.2 MB

Artificial Intelligence Friend or Foe.mp4

80.2 MB

atomic-operator Atomic Red Team Python Execution Framework.mp4

80.7 MB

Building & Defending a Machine Learning Malware Classifier Taking 3rd at MLSEC 2021.mp4

45.5 MB

Building a more inclusive future in Cybersecurity.mp4

12.7 MB

Building a Ransomware Incident Response Plan.mp4

44.8 MB

Building the Cybersecurity Pipeline A Call to Action.mp4

28.7 MB

CactusCon 10 Closing Ceremonies.mp4

39.2 MB

CactusCon 10 Opening Ceremonies.mp4

18.4 MB

Chasing your Tail with a Raspberry Pi.mp4

29.3 MB

Container Scanning Run Fast and Stay Safe.mp4

34.4 MB

Dissecting the Ransomware Kill Chain Why Companies Need It.mp4

32.5 MB

Forensic Artifacts in Free Tiers of Azure, GCP, and AWS.mp4

34.4 MB

Hacking Back Scammers.mp4

22.0 MB

How Nefilim Dropper uses Polymorphism.mp4

26.7 MB

How not to suck at CFPs Real-World Feedback from the CC10 Review Board.mp4

28.8 MB

Human Intelligence Versus Artificial Intelligence Ransomware.mp4

24.1 MB

Hunting Phish Kits.mp4

52.2 MB

JavaScript Obfuscation - It’s All About the P-a-c-k-e-r-s.mp4

38.1 MB

Keynote Charles Shirer.mp4

26.7 MB

KEYNOTE Mari DeGrazia.mp4

40.8 MB

Level Up Your Vulnerability Management Program.mp4

46.1 MB

Live Q&A - Artificial Intelligence Friend or Foe in the Context of Cybersecurity.mp4

17.8 MB

Live Q&A - Building a More Inclusive Future in Cybersecurity.mp4

8.5 MB

Live Q&A - Hunting Phish Kits.mp4

5.8 MB

Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.mp4

846.4 KB

Live Q&A - Operationalizing Purple Team.mp4

3.5 MB

Live Q&A - Tag Management System the Agile Way to Add Vulerabilities.mp4

11.5 MB

Live Q&A - Throwing the Elephant.mp4

13.0 MB

Live Q&A -Threat Hunting Becoming the Predator and No Longer the Prey.mp4

14.3 MB

Malware of the Mind - Disinformation and Manipulation via Social Platforms.mp4

44.3 MB

Network Forensics Analysis.mp4

31.4 MB

Nits Among Your Bits A Dive into LockВit Ransomware Operations.mp4

31.2 MB

Observations from Social Engineering my way Through a Pandemic.mp4

16.5 MB

Offensive Debugging .NET Poops of Gold.mp4

53.9 MB

Operationalized Purple Teaming.mp4

53.0 MB

PacketSifter and Leveraging TShark for Network Traffic Analysis.mp4

33.6 MB

ReadySetSecure all the COVID vaccines.mp4

54.6 MB

Reversing DLLs.mp4

44.1 MB

Tag Management System the Agile Way to Add Vulnerabilities on your Website.mp4

18.1 MB

Threat Hunting Becoming the Predator and No Longer the Prey.mp4

55.7 MB

Throwing the Elephant.mp4

33.1 MB

What Are We Missing in Web Application.mp4

22.1 MB

What I Learned After my First Year as a Security Analyst.mp4

14.9 MB

Worst of Cybersecurity Reporting 2021.mp4

35.3 MB

/.../CactusCon 2022 10 captions/

Active Defense Scenarios A Quarterly Intelligence Driven Purple Team Exercise.eng.srt

104.9 KB

API's Dark Side Addressing AppSec's Biggest Challenge.eng.srt

78.1 KB

Artificial Intelligence Friend or Foe.eng.srt

72.8 KB

atomic-operator Atomic Red Team Python Execution Framework.eng.srt

105.5 KB

Building & Defending a Machine Learning Malware Classifier Taking 3rd at MLSEC 2021.eng.srt

111.2 KB

Building a more inclusive future in Cybersecurity.eng.srt

27.7 KB

Building a Ransomware Incident Response Plan.eng.srt

103.9 KB

Building the Cybersecurity Pipeline A Call to Action.eng.srt

92.4 KB

CactusCon 10 Closing Ceremonies.eng.srt

84.0 KB

CactusCon 10 Opening Ceremonies.eng.srt

37.6 KB

Chasing your Tail with a Raspberry Pi.eng.srt

91.5 KB

Container Scanning Run Fast and Stay Safe.eng.srt

97.0 KB

Dissecting the Ransomware Kill Chain Why Companies Need It.eng.srt

81.4 KB

Forensic Artifacts in Free Tiers of Azure, GCP, and AWS.eng.srt

92.5 KB

Hacking Back Scammers.eng.srt

60.6 KB

How Nefilim Dropper uses Polymorphism.eng.srt

63.7 KB

How not to suck at CFPs Real-World Feedback from the CC10 Review Board.eng.srt

91.1 KB

Human Intelligence Versus Artificial Intelligence Ransomware.eng.srt

59.3 KB

Hunting Phish Kits.eng.srt

92.6 KB

JavaScript Obfuscation - It’s All About the P-a-c-k-e-r-s.eng.srt

73.2 KB

Keynote Charles Shirer.eng.srt

37.5 KB

KEYNOTE Mari DeGrazia.eng.srt

93.0 KB

Level Up Your Vulnerability Management Program.eng.srt

121.2 KB

Live Q&A - Artificial Intelligence Friend or Foe in the Context of Cybersecurity.eng.srt

23.3 KB

Live Q&A - Building a More Inclusive Future in Cybersecurity.eng.srt

14.7 KB

Live Q&A - Hunting Phish Kits.eng.srt

6.4 KB

Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.json

7.0 KB

Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.lrc

0.2 KB

Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.srt

0.2 KB

Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.text

0.1 KB

Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.tsv

0.2 KB

Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.txt

0.2 KB

Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.eng.vtt

0.2 KB

Live Q&A - Operationalizing Purple Team.eng.srt

3.6 KB

Live Q&A - Tag Management System the Agile Way to Add Vulerabilities.eng.srt

14.0 KB

Live Q&A - Throwing the Elephant.eng.srt

23.5 KB

Live Q&A -Threat Hunting Becoming the Predator and No Longer the Prey.eng.srt

23.5 KB

Malware of the Mind - Disinformation and Manipulation via Social Platforms.eng.srt

100.1 KB

Network Forensics Analysis.eng.srt

74.0 KB

Nits Among Your Bits A Dive into LockВit Ransomware Operations.eng.srt

65.0 KB

Observations from Social Engineering my way Through a Pandemic.eng.srt

51.8 KB

Offensive Debugging .NET Poops of Gold.eng.srt

104.7 KB

Operationalized Purple Teaming.eng.srt

86.2 KB

PacketSifter and Leveraging TShark for Network Traffic Analysis.eng.srt

85.3 KB

ReadySetSecure all the COVID vaccines.eng.srt

129.7 KB

Reversing DLLs.eng.srt

119.5 KB

Tag Management System the Agile Way to Add Vulnerabilities on your Website.eng.srt

31.7 KB

Threat Hunting Becoming the Predator and No Longer the Prey.eng.srt

123.6 KB

Throwing the Elephant.eng.srt

62.9 KB

What Are We Missing in Web Application.eng.srt

46.1 KB

What I Learned After my First Year as a Security Analyst.eng.srt

43.4 KB

Worst of Cybersecurity Reporting 2021.eng.srt

109.2 KB

CactusCon 2023 11/

Day 1 - Track 1.mp4

468.6 MB

Day 1 - Track 2.mp4

458.6 MB

Day 1 - Track 3.mp4

564.2 MB

Day 2 - Track 1.mp4

578.9 MB

Day 2 - Track 2.mp4

486.2 MB

Day 2 - Track 3.mp4

996.8 MB

/.../CactusCon 2023 11 captions/

Day 1 - Track 1.eng.srt

545.0 KB

Day 1 - Track 2.eng.srt

388.6 KB

Day 1 - Track 3.eng.srt

465.8 KB

Day 2 - Track 1.eng.srt

806.1 KB

Day 2 - Track 2.eng.srt

631.1 KB

Day 2 - Track 3.eng.srt

663.9 KB

CactusCon 2024 12/

60 minutes Hack this AWS account.mp4

16.8 MB

A cactus coup at the goldrush saloon swindling machine learning caches via wagon train.mp4

76.8 MB

Arizona Elections Security Prep for 2024.mp4

73.3 MB

Betrayed by Your Browser How Third-Party Tracking Systems Are Following You Online and What.mp4

14.9 MB

Breaking in to the Iron Fortress - How I hack IBM mainframes.mp4

19.4 MB

Building a Backyard TI Platform that Works for You.mp4

38.6 MB

CactusCon 12 Closing Remarks.mp4

68.9 MB

Catch Me If You Can Hunting Cloud Exfiltration Using Anomaly Detection.mp4

21.2 MB

Clearing the Fog Detection and Defense against Cloud Persistence Techniques.mp4

45.0 MB

Cloud security for the network security engineer, or why it’s all just so wrong these days.mp4

52.7 MB

Come WiFind Me WiFi and other RF Survelliance.mp4

41.7 MB

Command, Control, and memes Cordyceps - ant = zombie.mp4

19.9 MB

Cyber Espionage and the Global Power Struggle A Deep Dive.mp4

77.3 MB

DON’T PANIC - An IR Guide to Communicating with Execs.mp4

51.0 MB

Every Contact Leaves a Trace.mp4

45.7 MB

Exploring RMM Tools and Their Forensics.mp4

36.9 MB

From Cyber Lemons to Lemonade A Refreshing Take on Exposed Data.mp4

84.4 MB

IAES Guarding the University of Arizona's Heartbeat - The Watchful Eye on Critical.mp4

50.8 MB

It's Phishing Season An Overview of Phishing Kits.mp4

2.8 MB

Keynote - Naomi Brockwell Building a More Private Future.mp4

81.4 MB

Keynote - Riana Pfefferkorn Who's Afraid of Responsible Vulnerability Disclosure.mp4

3.7 MB

Leaving Doors Unlocked With Cognito.mp4

20.0 MB

Never Break the Chain Attack Chaining for 0-Days.mp4

20.1 MB

Novel Detection Technique of Process Injection using Network Anomalies.mp4

15.2 MB

Opening the DarkGate Exploring the Destructive Potential of AutoIT and Possible Mitigations.mp4

42.1 MB

Reverse Engineering Go Malware A BianLian Story.mp4

16.1 MB

SBOMs for Evil Turning Un-Remediated Software Supply Chain Documentation into an Attack Path.mp4

87.2 MB

Simple Ways to Make Webhook Security Better.mp4

50.8 MB

Subdomain Takeover.mp4

19.7 MB

The Best Free Resources to Get Started in Incident Response.mp4

74.1 MB

The Registry Hives you may be MSIX-ing.mp4

49.7 MB

The Story of a Never Ending Scam When Natalie Hamilton Reemerged with Vengeance and a Power.mp4

17.4 MB

Unlocking RFID Security A Deep Dive into Flipper Zero and the Vulnerabilities of Multiclass.mp4

36.4 MB

Validating Identity in a World of Deepfakes.mp4

44.3 MB

Veilid, the future of privacy- aka- how to destroy capitalism with the Cult of the Dead Cow.mp4

63.9 MB

Worst of Cybersecurity Reporting 2023.mp4

39.7 MB

/.../CactusCon 2024 12 captions/

60 minutes Hack this AWS account.eng.srt

96.9 KB

A cactus coup at the goldrush saloon swindling machine learning caches via wagon train.eng.srt

104.0 KB

Arizona Elections Security Prep for 2024.eng.srt

110.0 KB

Betrayed by Your Browser How Third-Party Tracking Systems Are Following You Online and What.eng.srt

65.1 KB

Breaking in to the Iron Fortress - How I hack IBM mainframes.eng.srt

104.8 KB

Building a Backyard TI Platform that Works for You.eng.srt

66.5 KB

CactusCon 12 Closing Remarks.eng.srt

55.9 KB

Catch Me If You Can Hunting Cloud Exfiltration Using Anomaly Detection.eng.srt

114.1 KB

Clearing the Fog Detection and Defense against Cloud Persistence Techniques.eng.srt

75.4 KB

Cloud security for the network security engineer, or why it’s all just so wrong these days..eng.srt

32.5 KB

Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.json

874.4 KB

Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.lrc

24.2 KB

Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.srt

27.9 KB

Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.text

15.9 KB

Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.tsv

20.7 KB

Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.txt

24.5 KB

Cloud security for the network security engineer, or why it’s all just so wrong these days.eng.vtt

24.5 KB

Come WiFind Me WiFi and other RF Survelliance.eng.srt

76.9 KB

Command, Control, and memes Cordyceps - ant = zombie.eng.srt

108.4 KB

Cyber Espionage and the Global Power Struggle A Deep Dive.eng.srt

97.9 KB

DON’T PANIC - An IR Guide to Communicating with Execs.eng.srt

46.5 KB

Every Contact Leaves a Trace.eng.srt

115.2 KB

Exploring RMM Tools and Their Forensics.eng.srt

52.6 KB

From Cyber Lemons to Lemonade A Refreshing Take on Exposed Data.eng.srt

116.0 KB

IAES Guarding the University of Arizona's Heartbeat - The Watchful Eye on Critical.eng.srt

96.6 KB

It's Phishing Season An Overview of Phishing Kits.eng.srt

9.8 KB

Keynote - Naomi Brockwell Building a More Private Future.eng.srt

110.8 KB

Keynote - Riana Pfefferkorn Who's Afraid of Responsible Vulnerability Disclosure.eng.srt

8.4 KB

Leaving Doors Unlocked With Cognito.eng.srt

38.0 KB

Never Break the Chain Attack Chaining for 0-Days.eng.srt

105.1 KB

Novel Detection Technique of Process Injection using Network Anomalies.eng.srt

72.8 KB

Opening the DarkGate Exploring the Destructive Potential of AutoIT and Possible Mitigations.eng.srt

87.1 KB

Reverse Engineering Go Malware A BianLian Story.eng.srt

94.0 KB

SBOMs for Evil Turning Un-Remediated Software Supply Chain Documentation into an Attack Path.eng.srt

104.0 KB

Simple Ways to Make Webhook Security Better.eng.srt

74.1 KB

Subdomain Takeover.eng.srt

42.5 KB

The Best Free Resources to Get Started in Incident Response.eng.srt

109.4 KB

The Registry Hives you may be MSIX-ing.eng.srt

83.6 KB

The Story of a Never Ending Scam When Natalie Hamilton Reemerged with Vengeance and a Power.eng.srt

90.6 KB

Unlocking RFID Security A Deep Dive into Flipper Zero and the Vulnerabilities of Multiclass.eng.srt

45.9 KB

Validating Identity in a World of Deepfakes.eng.srt

82.3 KB

Veilid, the future of privacy- aka- how to destroy capitalism with the Cult of the Dead Cow.eng.srt

86.2 KB

Worst of Cybersecurity Reporting 2023.eng.srt

53.7 KB

CactusCon 2025 13/

Alice & Bob Lose Their Life Savings.mp4

22.2 MB

Becoming a Red Team Operator.mp4

43.9 MB

Beyond the Horizon Innovative Approaches to Space Cyberattack Scenarios.mp4

68.6 MB

Building Trust in AI On Safe and Responsible Use of LLMs.mp4

46.5 MB

Deep dive into JWT Algorithm Confusion.mp4

45.5 MB

Digital damage control misinformation, disinformation & negative effects during a crisis.mp4

56.8 MB

Digital Doppelgängers The Dual Faces of Deepfake Technology.mp4

61.2 MB

DIY AI Build Your Own Digital InfoSec Team with BYOLLM.mp4

75.8 MB

Dr. CVE Love, or how I learned to stop worrying and love vuln management.mp4

24.6 MB

EKUwu - Not Just another AD CS ESC.mp4

46.5 MB

Evasion, Persistence, and Blinding EDR - Oh My.mp4

74.4 MB

Exploiting AI & Machine Learning Systems Adversarial Attacks against Deep Learning Algorithms.mp4

54.5 MB

HIDe-&-SEEK Who Owns Your Keyboard.mp4

61.6 MB

Intelligent Response Merging Threat Intel, MDR, and Incident Response for Maximum Impact.mp4

60.2 MB

It is 2025 Is Microsoft Active Directory Still Risky to Your Enterprise.mp4

69.2 MB

JS-Tap Mark II Attacking Web Apps With Even More Red Team Shenanigans.mp4

70.1 MB

Keynote Down the Rabbit Hole Red Team Deep Fakes and the Evolution of Social Engineering.mp4

63.1 MB

Keynote How Generative AI is Shaping Online Threats.mp4

35.3 MB

LLMs Your Wireless Hacking Friend.mp4

15.3 MB

Machine Learning Models Gone Rogue - How to Reel Them Back In.mp4

21.4 MB

Navigating Blind SSRF Attacking and Defending Critical Systems.mp4

50.8 MB

NTLMv1 reversion to NTLM with hashcat and the NTLMv1-multi tool.mp4

24.8 MB

Presenting Like a Boss Virtual & Physical Presenting Tips & Tricks.mp4

60.4 MB

Staunching Wounds and Staying Sane A Survival Guide for Incident Responders.mp4

51.4 MB

That Shouldn't Have Worked - Payload Development 101.mp4

65.7 MB

The Pin Puller's Guide A Hands-On Guide to Reverse Engineering iOS Applications.mp4

62.2 MB

Top 10 Unexpected AI Systems Hacks that we did not see coming.mp4

57.4 MB

When AI Meets Cybersecurity Challenges and Strategies for Professionals.mp4

33.6 MB

Whoops I Accidentally Hacked ASU.mp4

27.1 MB

Worst of Cybersecurity Reporting 2024.mp4

33.7 MB

/.../CactusCon 2025 13 captions/

Alice & Bob Lose Their Life Savings.eng.srt

41.9 KB

Becoming a Red Team Operator.eng.srt

89.1 KB

Beyond the Horizon Innovative Approaches to Space Cyberattack Scenarios.eng.srt

88.9 KB

Building Trust in AI On Safe and Responsible Use of LLMs.eng.srt

78.4 KB

Deep dive into JWT Algorithm Confusion.eng.srt

75.9 KB

Digital damage control misinformation, disinformation & negative effects during a crisis.eng.srt

108.9 KB

Digital Doppelgängers The Dual Faces of Deepfake Technology.eng.srt

99.4 KB

DIY AI Build Your Own Digital InfoSec Team with BYOLLM.eng.srt

133.1 KB

Dr. CVE Love, or how I learned to stop worrying and love vuln management.eng.srt

47.9 KB

EKUwu - Not Just another AD CS ESC.eng.srt

69.5 KB

Evasion, Persistence, and Blinding EDR - Oh My.eng.srt

89.8 KB

Exploiting AI & Machine Learning Systems Adversarial Attacks against Deep Learning Algorithms.eng.srt

82.7 KB

HIDe-&-SEEK Who Owns Your Keyboard.eng.srt

82.1 KB

Intelligent Response Merging Threat Intel, MDR, and Incident Response for Maximum Impact.eng.srt

96.7 KB

It is 2025 Is Microsoft Active Directory Still Risky to Your Enterprise.eng.srt

77.5 KB

JS-Tap Mark II Attacking Web Apps With Even More Red Team Shenanigans.eng.srt

90.7 KB

Keynote Down the Rabbit Hole Red Team Deep Fakes and the Evolution of Social Engineering.eng.srt

90.7 KB

Keynote How Generative AI is Shaping Online Threats.eng.srt

70.8 KB

LLMs Your Wireless Hacking Friend.eng.srt

24.4 KB

Machine Learning Models Gone Rogue - How to Reel Them Back In.eng.srt

32.9 KB

Navigating Blind SSRF Attacking and Defending Critical Systems.eng.srt

87.7 KB

NTLMv1 reversion to NTLM with hashcat and the NTLMv1-multi tool.eng.srt

33.1 KB

Presenting Like a Boss Virtual & Physical Presenting Tips & Tricks.eng.srt

114.3 KB

Staunching Wounds and Staying Sane A Survival Guide for Incident Responders.eng.srt

107.3 KB

That Shouldn't Have Worked - Payload Development 101.eng.srt

99.3 KB

The Pin Puller's Guide A Hands-On Guide to Reverse Engineering iOS Applications.eng.srt

75.6 KB

Top 10 Unexpected AI Systems Hacks that we did not see coming.eng.srt

75.6 KB

When AI Meets Cybersecurity Challenges and Strategies for Professionals.eng.srt

44.2 KB

Whoops I Accidentally Hacked ASU.eng.srt

36.8 KB

Worst of Cybersecurity Reporting 2024.eng.srt

62.1 KB

 

Total files 369


Copyright © 2026 FileMood.com