FileMood

Download CactusCon

CactusCon

Name

CactusCon

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

8.8 GB

Total Files

185

Hash

245E0BD8C31C4B9CD34D4A75C9B3EC6A40D10932

/

CactusCon 2023 logo.jpg

4.5 KB

CactusCon logo.png

149.7 KB

CactusCon thank you.txt

0.9 KB

/CactusCon 2014/

1o57 keynote.mp4

45.9 MB

PresidentBeef - Making Life Easier w. Static Analysis Tools.mp4

47.9 MB

/CactusCon 2015/

Badge - Completed.mp4

1.1 MB

Internalized Context.mp4

44.3 MB

/CactusCon 2017/

Ring-0 Assembly.en.transcribed.srt

107.7 KB

Ring-0 Assembly.mp4

125.0 MB

/CactusCon 2018/

ARMaHYDAN - Misadventures of ARM instruction encodings.eng.srt

78.1 KB

ARMaHYDAN - Misadventures of ARM instruction encodings.mp4

92.6 MB

/CactusCon 2021/

Analyzing Suspicious Artifacts (deep dive).eng.srt

62.4 KB

Analyzing Suspicious Artifacts (deep dive).mp4

90.3 MB

CactusCon 9 Closing Ceremonies.eng.srt

131.0 KB

CactusCon 9 Closing Ceremonies.mp4

124.1 MB

CactusCon 9 Opening Ceremony.eng.srt

119.2 KB

CactusCon 9 Opening Ceremony.mp4

101.9 MB

Can Artificial Intelligence (AI) Detect Advanced Persistent Threats.eng.srt

74.6 KB

Can Artificial Intelligence (AI) Detect Advanced Persistent Threats.mp4

76.2 MB

Day One Wrapup.eng.srt

24.5 KB

Day One Wrapup.mp4

26.2 MB

Extracting a Bootloader's AES Key via a Power Analysis Side Channel Attack.eng.srt

96.8 KB

Extracting a Bootloader's AES Key via a Power Analysis Side Channel Attack.mp4

85.4 MB

Hacking with Skynet How AI is Empowering Adversaries.eng.srt

95.9 KB

Hacking with Skynet How AI is Empowering Adversaries.mp4

91.6 MB

Hands-on Purple Team Workshop.eng.srt

112.8 KB

Hands-on Purple Team Workshop.mp4

117.4 MB

Introduction to Car Hacking Basics.eng.srt

40.1 KB

Introduction to Car Hacking Basics.mp4

38.4 MB

Keynote Address Eva Galperin.eng.srt

81.2 KB

Keynote Address Eva Galperin.mp4

169.1 MB

Keynote April C. Wright.eng.srt

93.4 KB

Keynote April C. Wright.mp4

76.2 MB

Learning Offensive Security with Project V3 VulnHub VirtualBox Vagrant.mp4

39.0 MB

Learning Offensive Security with Project V^3 VulnHub VirtualBox Vagrant.eng.srt

34.4 KB

Linux IR Windows of Opportunity.eng.srt

77.7 KB

Linux IR Windows of Opportunity.mp4

46.0 MB

MQTT Tiny Protocol, Big Vulnerabilities.eng.srt

81.2 KB

MQTT Tiny Protocol, Big Vulnerabilities.mp4

64.9 MB

Q&A MQTT Tiny Protocol, Big Vulnerabilities.eng.srt

27.8 KB

Q&A MQTT Tiny Protocol, Big Vulnerabilities.mp4

23.4 MB

Q&A Analyzing Suspicious Artifacts (deep dive).eng.srt

28.5 KB

Q&A Analyzing Suspicious Artifacts (deep dive).mp4

30.8 MB

Q&A Can Artificial Intelligence (AI) detect Advanced Persistent Threats.eng.srt

15.0 KB

Q&A Can Artificial Intelligence (AI) detect Advanced Persistent Threats.mp4

18.0 MB

Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack.mp4

20.6 MB

Q&A Hacking with Skynet - How AI is Empowering Adversaries.eng.srt

11.2 KB

Q&A Hacking with Skynet - How AI is Empowering Adversaries.mp4

14.9 MB

Q&A Introduction to Car Hacking Basics.eng.srt

16.6 KB

Q&A Introduction to Car Hacking Basics.mp4

12.0 MB

Q&A Keynote April C. Wright.eng.srt

9.2 KB

Q&A Keynote April C. Wright.mp4

10.7 MB

Q&A Keynote Eva Galperin.eng.srt

21.4 KB

Q&A Keynote Eva Galperin.mp4

24.1 MB

Q&A Learning Offensive Security with Project V3 VulnHub VirtualBox Vagrant.mp4

24.6 MB

Q&A Learning Offensive Security with Project V^3 VulnHub VirtualBox Vagrant.eng.srt

23.4 KB

Q&A Linux IR Windows of Opportunity.eng.srt

41.6 KB

Q&A Linux IR Windows of Opportunity.mp4

41.5 MB

Q&A Reverse Engineering Websites.eng.srt

18.2 KB

Q&A Reverse Engineering Websites.mp4

15.6 MB

Q&A Stealing a password through interpretive dance, and other wild video game hacks.eng.srt

24.0 KB

Q&A Stealing a password through interpretive dance, and other wild video game hacks.mp4

24.6 MB

Q&A The Crimeware Arms Race Modern Techniques in Malware Armoring and Evasion.eng.srt

14.7 KB

Q&A The Crimeware Arms Race Modern Techniques in Malware Armoring and Evasion.mp4

16.0 MB

Q&A The full purple juice, not the watered down stuff.eng.srt

15.9 KB

Q&A The full purple juice, not the watered down stuff.mp4

18.5 MB

Q&A When Your Memory Forensics Tools Only Tell Half the Story.eng.srt

15.6 KB

Q&A When Your Memory Forensics Tools Only Tell Half the Story.mp4

17.1 MB

Q&A Worst-of Cybersecurity Reporting 2021.eng.srt

50.2 KB

Q&A Worst-of Cybersecurity Reporting 2021.mp4

46.4 MB

Reverse Engineering Websites.eng.srt

116.5 KB

Reverse Engineering Websites.mp4

85.9 MB

Stealing a Password Through Interpretive Dance, and Other Wild Video Game Hacks.eng.srt

102.7 KB

Stealing a Password Through Interpretive Dance, and Other Wild Video Game Hacks.mp4

135.2 MB

The Crimeware Arms Race Modern Techniques in Malware Armoring & Evasion.eng.srt

112.9 KB

The Crimeware Arms Race Modern Techniques in Malware Armoring & Evasion.mp4

91.1 MB

The Full Purple Juice, Not the Watered-Down Stuff.eng.srt

100.0 KB

The Full Purple Juice, Not the Watered-Down Stuff.mp4

88.5 MB

When Your Memory Forensics Tools Only Tell Half the Story.eng.srt

90.0 KB

When Your Memory Forensics Tools Only Tell Half the Story.mp4

70.9 MB

Worst of Cybersecurity Reporting 2021.eng.srt

69.4 KB

Worst of Cybersecurity Reporting 2021.mp4

53.2 MB

/CactusCon 2022/

Active Defense Scenarios A Quarterly Intelligence Driven Purple Team Exercise.eng.srt

104.9 KB

Active Defense Scenarios A Quarterly Intelligence Driven Purple Team Exercise.mp4

61.5 MB

API's Dark Side Addressing AppSec's Biggest Challenge.eng.srt

78.1 KB

API's Dark Side Addressing AppSec's Biggest Challenge.mp4

48.7 MB

Artificial Intelligence Friend or Foe.eng.srt

72.8 KB

Artificial Intelligence Friend or Foe.mp4

62.5 MB

atomic-operator Atomic Red Team Python Execution Framework.eng.srt

105.5 KB

atomic-operator Atomic Red Team Python Execution Framework.mp4

80.8 MB

Building & Defending a Machine Learning Malware Classifier Taking 3rd at MLSEC 2021.eng.srt

111.2 KB

Building & Defending a Machine Learning Malware Classifier Taking 3rd at MLSEC 2021.mp4

66.9 MB

Building a more inclusive future in Cybersecurity.eng.srt

27.7 KB

Building a more inclusive future in Cybersecurity.mp4

15.3 MB

Building a Ransomware Incident Response Plan.eng.srt

103.9 KB

Building a Ransomware Incident Response Plan.mp4

62.4 MB

Building the Cybersecurity Pipeline A Call to Action.eng.srt

92.4 KB

Building the Cybersecurity Pipeline A Call to Action.mp4

45.4 MB

CactusCon 10 Closing Ceremonies.eng.srt

84.0 KB

CactusCon 10 Closing Ceremonies.mp4

54.7 MB

CactusCon 10 Opening Ceremonies.eng.srt

37.6 KB

CactusCon 10 Opening Ceremonies.mp4

29.8 MB

Chasing your Tail with a Raspberry Pi.eng.srt

91.5 KB

Chasing your Tail with a Raspberry Pi.mp4

45.0 MB

Container Scanning Run Fast and Stay Safe.eng.srt

97.0 KB

Container Scanning Run Fast and Stay Safe.mp4

46.2 MB

Dissecting the Ransomware Kill Chain Why Companies Need It.eng.srt

81.4 KB

Dissecting the Ransomware Kill Chain Why Companies Need It.mp4

46.9 MB

Forensic Artifacts in Free Tiers of Azure, GCP, and AWS.eng.srt

92.5 KB

Forensic Artifacts in Free Tiers of Azure, GCP, and AWS.mp4

54.5 MB

Hacking Back Scammers.eng.srt

60.6 KB

Hacking Back Scammers.mp4

29.0 MB

How Nefilim Dropper uses Polymorphism.eng.srt

63.7 KB

How Nefilim Dropper uses Polymorphism.mp4

38.0 MB

How not to suck at CFPs Real-World Feedback from the CC10 Review Board.eng.srt

91.1 KB

How not to suck at CFPs Real-World Feedback from the CC10 Review Board.mp4

42.8 MB

Human Intelligence Versus Artificial Intelligence Ransomware.eng.srt

59.3 KB

Human Intelligence Versus Artificial Intelligence Ransomware.mp4

35.0 MB

Hunting Phish Kits.eng.srt

92.6 KB

Hunting Phish Kits.mp4

61.5 MB

JavaScript Obfuscation - It’s All About the P-a-c-k-e-r-s.eng.srt

73.2 KB

JavaScript Obfuscation - It’s All About the P-a-c-k-e-r-s.mp4

44.7 MB

Keynote Charles Shirer.eng.srt

37.5 KB

Keynote Charles Shirer.mp4

40.1 MB

KEYNOTE Mari DeGrazia.eng.srt

93.0 KB

KEYNOTE Mari DeGrazia.mp4

63.2 MB

Level Up Your Vulnerability Management Program.eng.srt

121.2 KB

Level Up Your Vulnerability Management Program.mp4

70.7 MB

Live Q&A - Artificial Intelligence Friend or Foe in the Context of Cybersecurity.eng.srt

23.3 KB

Live Q&A - Artificial Intelligence Friend or Foe in the Context of Cybersecurity.mp4

18.1 MB

Live Q&A - Building a More Inclusive Future in Cybersecurity.eng.srt

14.7 KB

Live Q&A - Building a More Inclusive Future in Cybersecurity.mp4

8.5 MB

Live Q&A - Hunting Phish Kits.eng.srt

6.4 KB

Live Q&A - Hunting Phish Kits.mp4

5.8 MB

Live Q&A - Javascript Obfuscation - It's All About the P-A-C-K-E-R-S.mp4

1.0 MB

Live Q&A - Operationalizing Purple Team.eng.srt

3.6 KB

Live Q&A - Operationalizing Purple Team.mp4

3.6 MB

Live Q&A - Tag Management System the Agile Way to Add Vulerabilities.eng.srt

14.0 KB

Live Q&A - Tag Management System the Agile Way to Add Vulerabilities.mp4

15.4 MB

Live Q&A - Throwing the Elephant.eng.srt

23.5 KB

Live Q&A - Throwing the Elephant.mp4

13.3 MB

Live Q&A -Threat Hunting Becoming the Predator and No Longer the Prey.eng.srt

23.5 KB

Live Q&A -Threat Hunting Becoming the Predator and No Longer the Prey.mp4

15.3 MB

Malware of the Mind - Disinformation and Manipulation via Social Platforms.eng.srt

100.1 KB

Malware of the Mind - Disinformation and Manipulation via Social Platforms.mp4

65.0 MB

Network Forensics Analysis.eng.srt

74.0 KB

Network Forensics Analysis.mp4

47.5 MB

Nits Among Your Bits A Dive into LockВit Ransomware Operations.eng.srt

65.0 KB

Nits Among Your Bits A Dive into LockВit Ransomware Operations.mp4

44.7 MB

Observations from Social Engineering my way Through a Pandemic.eng.srt

51.8 KB

Observations from Social Engineering my way Through a Pandemic.mp4

26.2 MB

Offensive Debugging .NET Poops of Gold.eng.srt

104.7 KB

Offensive Debugging .NET Poops of Gold.mp4

66.7 MB

Operationalized Purple Teaming.eng.srt

86.2 KB

Operationalized Purple Teaming.mp4

62.0 MB

PacketSifter and Leveraging TShark for Network Traffic Analysis.eng.srt

85.3 KB

PacketSifter and Leveraging TShark for Network Traffic Analysis.mp4

47.8 MB

ReadySetSecure all the COVID vaccines.eng.srt

129.7 KB

ReadySetSecure all the COVID vaccines.mp4

64.7 MB

Reversing DLLs.eng.srt

119.5 KB

Reversing DLLs.mp4

63.9 MB

Tag Management System the Agile Way to Add Vulnerabilities on your Website.eng.srt

31.7 KB

Tag Management System the Agile Way to Add Vulnerabilities on your Website.mp4

22.5 MB

Threat Hunting Becoming the Predator and No Longer the Prey.eng.srt

123.6 KB

Threat Hunting Becoming the Predator and No Longer the Prey.mp4

67.4 MB

Throwing the Elephant.eng.srt

62.9 KB

Throwing the Elephant.mp4

40.1 MB

What Are We Missing in Web Application.eng.srt

46.1 KB

What Are We Missing in Web Application.mp4

28.6 MB

What I Learned After my First Year as a Security Analyst.eng.srt

43.4 KB

What I Learned After my First Year as a Security Analyst.mp4

24.6 MB

Worst of Cybersecurity Reporting 2021.eng.srt

109.2 KB

Worst of Cybersecurity Reporting 2021.mp4

54.5 MB

/CactusCon 2023 11/

Day 1 - Track 1.eng.srt

545.0 KB

Day 1 - Track 1.mp4

651.5 MB

Day 1 - Track 2.eng.srt

388.6 KB

Day 1 - Track 2.mp4

602.5 MB

Day 1 - Track 3.eng.srt

465.8 KB

Day 1 - Track 3.mp4

648.0 MB

Day 2 - Track 1.eng.srt

806.1 KB

Day 2 - Track 1.mp4

770.4 MB

Day 2 - Track 2.eng.srt

631.1 KB

Day 2 - Track 2.mp4

659.1 MB

Day 2 - Track 3.eng.srt

663.9 KB

Day 2 - Track 3.mp4

1.1 GB

 

Total files 185


Copyright © 2025 FileMood.com