/
|
CactusCon 2023 logo.jpg
|
4.5 KB
|
CactusCon logo.png
|
149.7 KB
|
CactusCon thank you.txt
|
0.9 KB
|
/CactusCon 2014/
|
1o57 keynote.mp4
|
45.9 MB
|
PresidentBeef - Making Life Easier w. Static Analysis Tools.mp4
|
47.9 MB
|
/CactusCon 2015/
|
Badge - Completed.mp4
|
1.1 MB
|
Internalized Context.mp4
|
44.3 MB
|
/CactusCon 2017/
|
Ring-0 Assembly.en.transcribed.srt
|
107.7 KB
|
Ring-0 Assembly.mp4
|
125.0 MB
|
/CactusCon 2018/
|
ARMaHYDAN - Misadventures of ARM instruction encodings.eng.srt
|
78.1 KB
|
ARMaHYDAN - Misadventures of ARM instruction encodings.mp4
|
92.6 MB
|
/CactusCon 2021/
|
Analyzing Suspicious Artifacts (deep dive).eng.srt
|
62.4 KB
|
Analyzing Suspicious Artifacts (deep dive).mp4
|
90.3 MB
|
CactusCon 9 Closing Ceremonies.eng.srt
|
131.0 KB
|
CactusCon 9 Closing Ceremonies.mp4
|
124.1 MB
|
CactusCon 9 Opening Ceremony.eng.srt
|
119.2 KB
|
CactusCon 9 Opening Ceremony.mp4
|
101.9 MB
|
Can Artificial Intelligence (AI) Detect Advanced Persistent Threats.eng.srt
|
74.6 KB
|
Can Artificial Intelligence (AI) Detect Advanced Persistent Threats.mp4
|
76.2 MB
|
Day One Wrapup.eng.srt
|
24.5 KB
|
Day One Wrapup.mp4
|
26.2 MB
|
Extracting a Bootloader's AES Key via a Power Analysis Side Channel Attack.eng.srt
|
96.8 KB
|
Extracting a Bootloader's AES Key via a Power Analysis Side Channel Attack.mp4
|
85.4 MB
|
Hacking with Skynet How AI is Empowering Adversaries.eng.srt
|
95.9 KB
|
Hacking with Skynet How AI is Empowering Adversaries.mp4
|
91.6 MB
|
Hands-on Purple Team Workshop.eng.srt
|
112.8 KB
|
Hands-on Purple Team Workshop.mp4
|
117.4 MB
|
Introduction to Car Hacking Basics.eng.srt
|
40.1 KB
|
Introduction to Car Hacking Basics.mp4
|
38.4 MB
|
Keynote Address Eva Galperin.eng.srt
|
81.2 KB
|
Keynote Address Eva Galperin.mp4
|
169.1 MB
|
Keynote April C. Wright.eng.srt
|
93.4 KB
|
Keynote April C. Wright.mp4
|
76.2 MB
|
Learning Offensive Security with Project V3 VulnHub VirtualBox Vagrant.mp4
|
39.0 MB
|
Learning Offensive Security with Project V^3 VulnHub VirtualBox Vagrant.eng.srt
|
34.4 KB
|
Linux IR Windows of Opportunity.eng.srt
|
77.7 KB
|
Linux IR Windows of Opportunity.mp4
|
46.0 MB
|
MQTT Tiny Protocol, Big Vulnerabilities.eng.srt
|
81.2 KB
|
MQTT Tiny Protocol, Big Vulnerabilities.mp4
|
64.9 MB
|
Q&A MQTT Tiny Protocol, Big Vulnerabilities.eng.srt
|
27.8 KB
|
Q&A MQTT Tiny Protocol, Big Vulnerabilities.mp4
|
23.4 MB
|
Q&A Analyzing Suspicious Artifacts (deep dive).eng.srt
|
28.5 KB
|
Q&A Analyzing Suspicious Artifacts (deep dive).mp4
|
30.8 MB
|
Q&A Can Artificial Intelligence (AI) detect Advanced Persistent Threats.eng.srt
|
15.0 KB
|
Q&A Can Artificial Intelligence (AI) detect Advanced Persistent Threats.mp4
|
18.0 MB
|
Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.mp4
|
20.6 MB
|
Q&A Hacking with Skynet - How AI is Empowering Adversaries.eng.srt
|
11.2 KB
|
Q&A Hacking with Skynet - How AI is Empowering Adversaries.mp4
|
14.9 MB
|
Q&A Introduction to Car Hacking Basics.eng.srt
|
16.6 KB
|
Q&A Introduction to Car Hacking Basics.mp4
|
12.0 MB
|
Q&A Keynote April C. Wright.eng.srt
|
9.2 KB
|
Q&A Keynote April C. Wright.mp4
|
10.7 MB
|
Q&A Keynote Eva Galperin.eng.srt
|
21.4 KB
|
Q&A Keynote Eva Galperin.mp4
|
24.1 MB
|
Q&A Learning Offensive Security with Project V3 VulnHub VirtualBox Vagrant.mp4
|
24.6 MB
|
Q&A Learning Offensive Security with Project V^3 VulnHub VirtualBox Vagrant.eng.srt
|
23.4 KB
|
Q&A Linux IR Windows of Opportunity.eng.srt
|
41.6 KB
|
Q&A Linux IR Windows of Opportunity.mp4
|
41.5 MB
|
Q&A Reverse Engineering Websites.eng.srt
|
18.2 KB
|
Q&A Reverse Engineering Websites.mp4
|
15.6 MB
|
Q&A Stealing a password through interpretive dance, and other wild video game hacks.eng.srt
|
24.0 KB
|
Q&A Stealing a password through interpretive dance, and other wild video game hacks.mp4
|
24.6 MB
|
Q&A The Crimeware Arms Race Modern Techniques in Malware Armoring and Evasion.eng.srt
|
14.7 KB
|
Q&A The Crimeware Arms Race Modern Techniques in Malware Armoring and Evasion.mp4
|
16.0 MB
|
Q&A The full purple juice, not the watered down stuff.eng.srt
|
15.9 KB
|
Q&A The full purple juice, not the watered down stuff.mp4
|
18.5 MB
|
Q&A When Your Memory Forensics Tools Only Tell Half the Story.eng.srt
|
15.6 KB
|
Q&A When Your Memory Forensics Tools Only Tell Half the Story.mp4
|
17.1 MB
|
Q&A Worst-of Cybersecurity Reporting 2021.eng.srt
|
50.2 KB
|
Q&A Worst-of Cybersecurity Reporting 2021.mp4
|
46.4 MB
|
Reverse Engineering Websites.eng.srt
|
116.5 KB
|
Reverse Engineering Websites.mp4
|
85.9 MB
|
Stealing a Password Through Interpretive Dance, and Other Wild Video Game Hacks.eng.srt
|
102.7 KB
|
Stealing a Password Through Interpretive Dance, and Other Wild Video Game Hacks.mp4
|
135.2 MB
|
The Crimeware Arms Race Modern Techniques in Malware Armoring & Evasion.eng.srt
|
112.9 KB
|
The Crimeware Arms Race Modern Techniques in Malware Armoring & Evasion.mp4
|
91.1 MB
|
The Full Purple Juice, Not the Watered-Down Stuff.eng.srt
|
100.0 KB
|
The Full Purple Juice, Not the Watered-Down Stuff.mp4
|
88.5 MB
|
When Your Memory Forensics Tools Only Tell Half the Story.eng.srt
|
90.0 KB
|
When Your Memory Forensics Tools Only Tell Half the Story.mp4
|
70.9 MB
|
Worst of Cybersecurity Reporting 2021.eng.srt
|
69.4 KB
|
Worst of Cybersecurity Reporting 2021.mp4
|
53.2 MB
|
/CactusCon 2022/
|
Active Defense Scenarios A Quarterly Intelligence Driven Purple Team Exercise.eng.srt
|
104.9 KB
|
Active Defense Scenarios A Quarterly Intelligence Driven Purple Team Exercise.mp4
|
61.5 MB
|
API's Dark Side Addressing AppSec's Biggest Challenge.eng.srt
|
78.1 KB
|
API's Dark Side Addressing AppSec's Biggest Challenge.mp4
|
48.7 MB
|
Artificial Intelligence Friend or Foe.eng.srt
|
72.8 KB
|
Artificial Intelligence Friend or Foe.mp4
|
62.5 MB
|
atomic-operator Atomic Red Team Python Execution Framework.eng.srt
|
105.5 KB
|
atomic-operator Atomic Red Team Python Execution Framework.mp4
|
80.8 MB
|
Building & Defending a Machine Learning Malware Classifier Taking 3rd at MLSEC 2021.eng.srt
|
111.2 KB
|
Building & Defending a Machine Learning Malware Classifier Taking 3rd at MLSEC 2021.mp4
|
66.9 MB
|
Building a more inclusive future in Cybersecurity.eng.srt
|
27.7 KB
|
Building a more inclusive future in Cybersecurity.mp4
|
15.3 MB
|
Building a Ransomware Incident Response Plan.eng.srt
|
103.9 KB
|
Building a Ransomware Incident Response Plan.mp4
|
62.4 MB
|
Building the Cybersecurity Pipeline A Call to Action.eng.srt
|
92.4 KB
|
Building the Cybersecurity Pipeline A Call to Action.mp4
|
45.4 MB
|
CactusCon 10 Closing Ceremonies.eng.srt
|
84.0 KB
|
CactusCon 10 Closing Ceremonies.mp4
|
54.7 MB
|
CactusCon 10 Opening Ceremonies.eng.srt
|
37.6 KB
|
CactusCon 10 Opening Ceremonies.mp4
|
29.8 MB
|
Chasing your Tail with a Raspberry Pi.eng.srt
|
91.5 KB
|
Chasing your Tail with a Raspberry Pi.mp4
|
45.0 MB
|
Container Scanning Run Fast and Stay Safe.eng.srt
|
97.0 KB
|
Container Scanning Run Fast and Stay Safe.mp4
|
46.2 MB
|
Dissecting the Ransomware Kill Chain Why Companies Need It.eng.srt
|
81.4 KB
|
Dissecting the Ransomware Kill Chain Why Companies Need It.mp4
|
46.9 MB
|
Forensic Artifacts in Free Tiers of Azure, GCP, and AWS.eng.srt
|
92.5 KB
|
Forensic Artifacts in Free Tiers of Azure, GCP, and AWS.mp4
|
54.5 MB
|
Hacking Back Scammers.eng.srt
|
60.6 KB
|
Hacking Back Scammers.mp4
|
29.0 MB
|
How Nefilim Dropper uses Polymorphism.eng.srt
|
63.7 KB
|
How Nefilim Dropper uses Polymorphism.mp4
|
38.0 MB
|
How not to suck at CFPs Real-World Feedback from the CC10 Review Board.eng.srt
|
91.1 KB
|
How not to suck at CFPs Real-World Feedback from the CC10 Review Board.mp4
|
42.8 MB
|
Human Intelligence Versus Artificial Intelligence Ransomware.eng.srt
|
59.3 KB
|
Human Intelligence Versus Artificial Intelligence Ransomware.mp4
|
35.0 MB
|
Hunting Phish Kits.eng.srt
|
92.6 KB
|
Hunting Phish Kits.mp4
|
61.5 MB
|
JavaScript Obfuscation - It’s All About the P-a-c-k-e-r-s.eng.srt
|
73.2 KB
|
JavaScript Obfuscation - It’s All About the P-a-c-k-e-r-s.mp4
|
44.7 MB
|
Keynote Charles Shirer.eng.srt
|
37.5 KB
|
Keynote Charles Shirer.mp4
|
40.1 MB
|
KEYNOTE Mari DeGrazia.eng.srt
|
93.0 KB
|
KEYNOTE Mari DeGrazia.mp4
|
63.2 MB
|
Level Up Your Vulnerability Management Program.eng.srt
|
121.2 KB
|
Level Up Your Vulnerability Management Program.mp4
|
70.7 MB
|
Live Q&A - Artificial Intelligence Friend or Foe in the Context of Cybersecurity.eng.srt
|
23.3 KB
|
Live Q&A - Artificial Intelligence Friend or Foe in the Context of Cybersecurity.mp4
|
18.1 MB
|
Live Q&A - Building a More Inclusive Future in Cybersecurity.eng.srt
|
14.7 KB
|
Live Q&A - Building a More Inclusive Future in Cybersecurity.mp4
|
8.5 MB
|
Live Q&A - Hunting Phish Kits.eng.srt
|
6.4 KB
|
Live Q&A - Hunting Phish Kits.mp4
|
5.8 MB
|
Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.mp4
|
1.0 MB
|
Live Q&A - Operationalizing Purple Team.eng.srt
|
3.6 KB
|
Live Q&A - Operationalizing Purple Team.mp4
|
3.6 MB
|
Live Q&A - Tag Management System the Agile Way to Add Vulerabilities.eng.srt
|
14.0 KB
|
Live Q&A - Tag Management System the Agile Way to Add Vulerabilities.mp4
|
15.4 MB
|
Live Q&A - Throwing the Elephant.eng.srt
|
23.5 KB
|
Live Q&A - Throwing the Elephant.mp4
|
13.3 MB
|
Live Q&A -Threat Hunting Becoming the Predator and No Longer the Prey.eng.srt
|
23.5 KB
|
Live Q&A -Threat Hunting Becoming the Predator and No Longer the Prey.mp4
|
15.3 MB
|
Malware of the Mind - Disinformation and Manipulation via Social Platforms.eng.srt
|
100.1 KB
|
Malware of the Mind - Disinformation and Manipulation via Social Platforms.mp4
|
65.0 MB
|
Network Forensics Analysis.eng.srt
|
74.0 KB
|
Network Forensics Analysis.mp4
|
47.5 MB
|
Nits Among Your Bits A Dive into LockВit Ransomware Operations.eng.srt
|
65.0 KB
|
Nits Among Your Bits A Dive into LockВit Ransomware Operations.mp4
|
44.7 MB
|
Observations from Social Engineering my way Through a Pandemic.eng.srt
|
51.8 KB
|
Observations from Social Engineering my way Through a Pandemic.mp4
|
26.2 MB
|
Offensive Debugging .NET Poops of Gold.eng.srt
|
104.7 KB
|
Offensive Debugging .NET Poops of Gold.mp4
|
66.7 MB
|
Operationalized Purple Teaming.eng.srt
|
86.2 KB
|
Operationalized Purple Teaming.mp4
|
62.0 MB
|
PacketSifter and Leveraging TShark for Network Traffic Analysis.eng.srt
|
85.3 KB
|
PacketSifter and Leveraging TShark for Network Traffic Analysis.mp4
|
47.8 MB
|
ReadySetSecure all the COVID vaccines.eng.srt
|
129.7 KB
|
ReadySetSecure all the COVID vaccines.mp4
|
64.7 MB
|
Reversing DLLs.eng.srt
|
119.5 KB
|
Reversing DLLs.mp4
|
63.9 MB
|
Tag Management System the Agile Way to Add Vulnerabilities on your Website.eng.srt
|
31.7 KB
|
Tag Management System the Agile Way to Add Vulnerabilities on your Website.mp4
|
22.5 MB
|
Threat Hunting Becoming the Predator and No Longer the Prey.eng.srt
|
123.6 KB
|
Threat Hunting Becoming the Predator and No Longer the Prey.mp4
|
67.4 MB
|
Throwing the Elephant.eng.srt
|
62.9 KB
|
Throwing the Elephant.mp4
|
40.1 MB
|
What Are We Missing in Web Application.eng.srt
|
46.1 KB
|
What Are We Missing in Web Application.mp4
|
28.6 MB
|
What I Learned After my First Year as a Security Analyst.eng.srt
|
43.4 KB
|
What I Learned After my First Year as a Security Analyst.mp4
|
24.6 MB
|
Worst of Cybersecurity Reporting 2021.eng.srt
|
109.2 KB
|
Worst of Cybersecurity Reporting 2021.mp4
|
54.5 MB
|
/CactusCon 2023 11/
|
Day 1 - Track 1.eng.srt
|
545.0 KB
|
Day 1 - Track 1.mp4
|
651.5 MB
|
Day 1 - Track 2.eng.srt
|
388.6 KB
|
Day 1 - Track 2.mp4
|
602.5 MB
|
Day 1 - Track 3.eng.srt
|
465.8 KB
|
Day 1 - Track 3.mp4
|
648.0 MB
|
Day 2 - Track 1.eng.srt
|
806.1 KB
|
Day 2 - Track 1.mp4
|
770.4 MB
|
Day 2 - Track 2.eng.srt
|
631.1 KB
|
Day 2 - Track 2.mp4
|
659.1 MB
|
Day 2 - Track 3.eng.srt
|
663.9 KB
|
Day 2 - Track 3.mp4
|
1.1 GB
|
Total files 185
|