/
|
CHCon logo 2022.jpg
|
19.0 KB
|
CHCon logo 2023.jpg
|
67.0 KB
|
CHCon logo.jpg
|
6.4 KB
|
CHCon thank you.txt
|
0.8 KB
|
HEADER.md
|
0.4 KB
|
/CHCon 2017/
|
A Pentester's Guide to Automating Security - Benjamin Kearns.mp4
|
40.7 MB
|
Bounty hunting, how hard can it be - Jeremy Stott.mp4
|
42.5 MB
|
Eye in the Fi The commodification of privacy - Karl Barrett.mp4
|
19.9 MB
|
From Rogue One to Rebel Alliance - Peter Chestna.mp4
|
55.6 MB
|
Journey to the Top on BugCrowd The Untold Tales of Struggle and Pain - Ahmad Ashraff.mp4
|
31.7 MB
|
L2 Attacks against Virtual Devices - Kylie McDevitt.mp4
|
28.7 MB
|
Onionland Explorers - ss23.mp4
|
36.9 MB
|
Operation Luigi - I got permission to hack my friend and - Alex.mp4
|
48.1 MB
|
The Internet of Pancakes - Peter Jakowetz.mp4
|
20.9 MB
|
Using Command Line Tools To Find Linux Compromises and Rootkits - Craig Rowland.mp4
|
58.9 MB
|
Visual Hacking Seeing is Believing - Drewe Hinkley.mp4
|
59.5 MB
|
/.../CHCon 2017 captions/
|
A Pentester's Guide to Automating Security - Benjamin Kearns.eng.srt
|
55.0 KB
|
Bounty hunting, how hard can it be - Jeremy Stott.eng.srt
|
57.4 KB
|
Eye in the Fi The commodification of privacy - Karl Barrett.eng.srt
|
40.3 KB
|
From Rogue One to Rebel Alliance - Peter Chestna.eng.srt
|
82.7 KB
|
Journey to the Top on BugCrowd The Untold Tales of Struggle and Pain - Ahmad Ashraff.eng.srt
|
46.0 KB
|
L2 Attacks against Virtual Devices - Kylie McDevitt.eng.srt
|
51.3 KB
|
Onionland Explorers - ss23.eng.srt
|
48.6 KB
|
Operation Luigi - I got permission to hack my friend and - Alex.eng.srt
|
75.1 KB
|
The Internet of Pancakes - Peter Jakowetz.eng.srt
|
41.7 KB
|
Using Command Line Tools To Find Linux Compromises and Rootkits - Craig Rowland.eng.srt
|
92.8 KB
|
Visual Hacking Seeing is Believing - Drewe Hinkley.eng.srt
|
61.3 KB
|
/CHCon 2020/
|
An approach to hacking consumer electronicsBen Knight (Insomnia Security).mp4
|
19.8 MB
|
ATT&CK'ing it wrong - how to use ATT&CK effectively at an NZ scale Hamish Krebs.mp4
|
17.1 MB
|
BASE jumping is just applied risk assesment Richö Butts (#ducksec).mp4
|
25.0 MB
|
Camera obscura Tom Isaacson.mp4
|
15.5 MB
|
DXCoded - Attacking Push button Combination Locks Logan Woods (Aura Information Security).mp4
|
18.2 MB
|
Exploring New Zealand's internet IP space in styless23 and haquaman.mp4
|
20.1 MB
|
My Toyota CorollaJed Laundry @ Christchurch Hacker Conference 2020 (CHCon).mp4
|
7.0 MB
|
Network Pentesting teaching some old tricks to young dogsSam Shute (Quantum Security).mp4
|
19.1 MB
|
Never Have I EverPetra Smith (Aura Information Security).mp4
|
11.2 MB
|
Progress your Security CareerRicki Burke (CyberSec People).mp4
|
16.8 MB
|
RFID Implants For Fun (and Security) by Kay Ward.mp4
|
10.6 MB
|
/.../CHCon 2020 captions/
|
An approach to hacking consumer electronicsBen Knight (Insomnia Security).eng.srt
|
53.2 KB
|
ATT&CK'ing it wrong - how to use ATT&CK effectively at an NZ scale Hamish Krebs.eng.srt
|
61.2 KB
|
BASE jumping is just applied risk assesment Richö Butts (#ducksec).eng.srt
|
94.1 KB
|
Camera obscura Tom Isaacson.eng.json
|
955.7 KB
|
Camera obscura Tom Isaacson.eng.lrc
|
25.7 KB
|
Camera obscura Tom Isaacson.eng.srt
|
25.2 KB
|
Camera obscura Tom Isaacson.eng.text
|
17.7 KB
|
Camera obscura Tom Isaacson.eng.tsv
|
22.0 KB
|
Camera obscura Tom Isaacson.eng.txt
|
26.0 KB
|
Camera obscura Tom Isaacson.eng.vtt
|
23.1 KB
|
DXCoded - Attacking Push button Combination Locks Logan Woods (Aura Information Security).eng.srt
|
56.8 KB
|
Exploring New Zealand's internet IP space in styless23 and haquaman.eng.srt
|
62.6 KB
|
My Toyota CorollaJed Laundry @ Christchurch Hacker Conference 2020 (CHCon).eng.srt
|
17.4 KB
|
Network Pentesting teaching some old tricks to young dogsSam Shute (Quantum Security).eng.srt
|
51.4 KB
|
Never Have I EverPetra Smith (Aura Information Security).eng.srt
|
28.4 KB
|
Progress your Security CareerRicki Burke (CyberSec People).eng.srt
|
56.9 KB
|
RFID Implants For Fun (and Security) by Kay Ward.eng.srt
|
35.2 KB
|
/CHCon 2021/
|
A walk through of the Easter eggs video from April 4 2021.mp4
|
13.4 MB
|
Ankita Dhakar Cybersecurity is everyone's responsibility.mp4
|
20.3 MB
|
Announcing CHCon 2021.mp4
|
2.1 MB
|
Ben Loula - Raising the Fruit.mp4
|
19.0 MB
|
David Karit Robinson A hacker's view of DoS attacks.mp4
|
33.9 MB
|
Fiona Becoming a Jedi.mp4
|
28.9 MB
|
Francesco Badraun Continuous Assurance - Automating Cloud Configuration Security.mp4
|
22.9 MB
|
hoodiePony Surviving that cyber pauper's lyfe.mp4
|
22.7 MB
|
Hugh and Daniel - Let's Talk About Mental Health in IT.mp4
|
61.0 MB
|
Its a great day for Easter eggs.mp4
|
3.7 MB
|
Jamie McClymont - Southbridge of SPIes.mp4
|
25.3 MB
|
Jed Laundry Smartifying your dumb home.mp4
|
40.1 MB
|
Jeremy Stott SaaS - Security as a Second thought.mp4
|
34.4 MB
|
John DiLeo Baking Security In An AppSec Critical Path for Developers.mp4
|
18.0 MB
|
Kay Ward EVE Online’s Architectural History.mp4
|
9.2 MB
|
Kim Carter Dev Team Security Back to the Future.mp4
|
30.9 MB
|
Matt Cotterell Hacking OpenID Connect and OAuth 2.0.mp4
|
43.0 MB
|
Peter Jakowetz Homebrew Hacking.mp4
|
10.1 MB
|
Sam Frenchie Stewart and Abby Jaskari - Hackin your first Kubernetes cluster.mp4
|
22.2 MB
|
Sam Shute Hash Cracking in 2021 Something old and something new.mp4
|
25.0 MB
|
Tom Isaacson IANAL for IoT.mp4
|
14.5 MB
|
/.../CHCon 2021 captions/
|
A walk through of the Easter eggs video from April 4 2021.eng.srt
|
19.5 KB
|
Ankita Dhakar Cybersecurity is everyone's responsibility.eng.srt
|
39.4 KB
|
Announcing CHCon 2021.eng.srt
|
0.6 KB
|
Ben Loula - Raising the Fruit.eng.srt
|
71.2 KB
|
David Karit Robinson A hacker's view of DoS attacks.eng.srt
|
59.8 KB
|
Fiona Becoming a Jedi.eng.srt
|
56.7 KB
|
Francesco Badraun Continuous Assurance - Automating Cloud Configuration Security.eng.srt
|
83.5 KB
|
hoodiePony Surviving that cyber pauper's lyfe.eng.srt
|
32.8 KB
|
Hugh and Daniel - Let's Talk About Mental Health in IT.eng.srt
|
118.6 KB
|
Its a great day for Easter eggs.eng.srt
|
1.6 KB
|
Jamie McClymont - Southbridge of SPIes.eng.srt
|
47.9 KB
|
Jed Laundry Smartifying your dumb home.eng.srt
|
62.6 KB
|
Jeremy Stott SaaS - Security as a Second thought.eng.srt
|
72.6 KB
|
John DiLeo Baking Security In An AppSec Critical Path for Developers.eng.srt
|
60.2 KB
|
Kay Ward EVE Online’s Architectural History.eng.srt
|
27.1 KB
|
Kim Carter Dev Team Security Back to the Future.eng.srt
|
26.0 KB
|
Matt Cotterell Hacking OpenID Connect and OAuth 2.0.eng.srt
|
78.5 KB
|
Peter Jakowetz Homebrew Hacking.eng.srt
|
19.8 KB
|
Sam Frenchie Stewart and Abby Jaskari - Hackin your first Kubernetes cluster.eng.srt
|
70.7 KB
|
Sam Shute Hash Cracking in 2021 Something old and something new.eng.srt
|
72.0 KB
|
Tom Isaacson IANAL for IoT.eng.srt
|
41.1 KB
|
/CHCon 2022/
|
A field guide for security champions. by Anna Lezhikova (DEFEND).mp4
|
16.0 MB
|
A seamless frontend-to-backend developer experience by Malcolm Crum (KTBYTE).mp4
|
20.5 MB
|
Breaking Into Infosec by Dave Reeves (Aura Information Security).mp4
|
36.1 MB
|
Glitter nail polish vs the Evil Maid - Spoiler The maid wins by hoodiePony.mp4
|
29.9 MB
|
Hardware security keys, where are they by Jeremy Stott.mp4
|
33.0 MB
|
Hear me out Documentation-powered security. by Nick Malcolm (GitLab).mp4
|
23.9 MB
|
Hiding In Plain Sight - Roll Initiative by Brandon Wyatt.mp4
|
20.5 MB
|
I see you Hacking Smart Home Cameras by Benjamin Kearns (Lateral Security).mp4
|
28.4 MB
|
IoT Traffic Classification Systems by Amith Murthy (Datacom).mp4
|
24.7 MB
|
Learning from the mistakes of others Incident Response Edition by Luke Pearson.mp4
|
29.4 MB
|
Life Beyond Spreadsheets Automated Vulnerability Management at Trade Me by Josh Brodie (Trade Me).mp4
|
42.5 MB
|
My Journey to TV Ownership by Karl Barrett (Lateral Security).mp4
|
18.3 MB
|
The Call Is Coming From Inside The House - insider attacks in the cloudby Matt Johnston (Leaven CCL).mp4
|
34.9 MB
|
The lengths you go to for a almost useless phone by Tokala.mp4
|
30.8 MB
|
The State of AppSec in NZ - 2022 by John DiLeo (OWASP New Zealand).mp4
|
30.8 MB
|
Unshredding How safe are your secret documents by Edward Robinson (Lateral Security).mp4
|
15.7 MB
|
You didn’t come this far to only come this far by Carolyn Rohm (CarolynRohm).mp4
|
20.5 MB
|
/.../CHCon 2022 captions/
|
A field guide for security champions. by Anna Lezhikova (DEFEND).eng.srt
|
26.9 KB
|
A seamless frontend-to-backend developer experience by Malcolm Crum (KTBYTE).eng.srt
|
30.4 KB
|
Breaking Into Infosec by Dave Reeves (Aura Information Security).eng.srt
|
47.4 KB
|
Glitter nail polish vs the Evil Maid - Spoiler The maid wins by hoodiePony.eng.srt
|
31.9 KB
|
Hardware security keys, where are they by Jeremy Stott.eng.srt
|
62.1 KB
|
Hear me out Documentation-powered security. by Nick Malcolm (GitLab).eng.srt
|
41.4 KB
|
Hiding In Plain Sight - Roll Initiative by Brandon Wyatt.eng.srt
|
34.3 KB
|
I see you Hacking Smart Home Cameras by Benjamin Kearns (Lateral Security).eng.srt
|
46.6 KB
|
IoT Traffic Classification Systems by Amith Murthy (Datacom).eng.srt
|
36.1 KB
|
Learning from the mistakes of others Incident Response Edition by Luke Pearson.eng.srt
|
53.6 KB
|
Life Beyond Spreadsheets Automated Vulnerability Management at Trade Me by Josh Brodie (Trade Me).eng.srt
|
54.3 KB
|
My Journey to TV Ownership by Karl Barrett (Lateral Security).eng.srt
|
39.4 KB
|
The Call Is Coming From Inside The House - insider attacks in the cloudby Matt Johnston (Leaven CCL).eng.srt
|
57.3 KB
|
The lengths you go to for a almost useless phone by Tokala.eng.srt
|
42.6 KB
|
The State of AppSec in NZ - 2022 by John DiLeo (OWASP New Zealand).eng.srt
|
45.1 KB
|
Unshredding How safe are your secret documents by Edward Robinson (Lateral Security).eng.srt
|
30.3 KB
|
You didn’t come this far to only come this far by Carolyn Rohm (CarolynRohm).eng.srt
|
22.8 KB
|
/CHCon 2023/
|
A Race to Auth - How I stumbled onto a race condition by Jack Moran.mp4
|
21.6 MB
|
Assurance is easy, I assure you by James Hitchiner.mp4
|
11.6 MB
|
Beyond The Buzz Practical Integrations of AI, Automation and Cybersecurity By Kento Stewart.mp4
|
33.6 MB
|
Building a Security Team and then an Army by David Jennings.mp4
|
24.5 MB
|
Cyber security alchemy forging a framework by Ben Creet.mp4
|
34.2 MB
|
Everyone Under the Sun Breaking down the SolarWinds Orion Attack by Ben Cain.mp4
|
18.3 MB
|
From DevOps to DevSecOps by - Karan Sharma.mp4
|
28.0 MB
|
GGs, shake my hand Hacking game console peripherals by - Kay Ward.mp4
|
23.3 MB
|
Go by Example Creating a C2 framework (while trolling Microsoft) Jed Laundry.mp4
|
30.8 MB
|
Hackers on a plane what we can learn from the aviation industry by - Sarah Young.mp4
|
40.6 MB
|
Honey the kids tried crypto by Thomas Hobson.mp4
|
30.6 MB
|
Impossible is nothing The quest for private keys by Paul Craig.mp4
|
35.7 MB
|
Levelling Up - Adapting Security to Deliver Covid-19 National Systems by Jeremy McMullan.mp4
|
44.9 MB
|
LOLWAP Living Off the Land for Web App Pentesters by Ben Loula.mp4
|
30.7 MB
|
OMGCICD - From Intern to Production by Denis Andzakovic.mp4
|
42.1 MB
|
One Trust, Zero Trust, Red Trust, Blue Trust by Kane Narraway & Clancy Rye.mp4
|
29.2 MB
|
OneHourAppSec - Changing the world one sprint at a time by Laura Bell Main.mp4
|
27.2 MB
|
Responder Going Beyond Just Listening by - Sam Shute.mp4
|
21.4 MB
|
Securing REST API Endpoints (or, How to avoid another Optus) by James Cooper.mp4
|
40.6 MB
|
Supply chain security in the health sector SBOMs and digitally-enabled medical devices by Nick Baty.mp4
|
44.8 MB
|
Your biggest Security Risk might not be what you think it is by Glen Sparrow.mp4
|
12.4 MB
|
/.../CHCon 2023 captions/
|
A Race to Auth - How I stumbled onto a race condition by Jack Moran.eng.srt
|
29.1 KB
|
Assurance is easy, I assure you by James Hitchiner.eng.srt
|
20.7 KB
|
Beyond The Buzz Practical Integrations of AI, Automation and Cybersecurity By Kento Stewart.eng.srt
|
60.0 KB
|
Building a Security Team and then an Army by David Jennings.eng.srt
|
49.4 KB
|
Cyber security alchemy forging a framework by Ben Creet.eng.srt
|
50.5 KB
|
Everyone Under the Sun Breaking down the SolarWinds Orion Attack by Ben Cain.eng.srt
|
27.7 KB
|
From DevOps to DevSecOps by - Karan Sharma.eng.srt
|
41.5 KB
|
GGs, shake my hand Hacking game console peripherals by - Kay Ward.eng.srt
|
35.6 KB
|
Go by Example Creating a C2 framework (while trolling Microsoft) Jed Laundry.eng.srt
|
45.4 KB
|
Hackers on a plane what we can learn from the aviation industry by - Sarah Young.eng.srt
|
66.7 KB
|
Honey the kids tried crypto by Thomas Hobson.eng.srt
|
47.6 KB
|
Impossible is nothing The quest for private keys by Paul Craig.eng.srt
|
49.3 KB
|
Levelling Up - Adapting Security to Deliver Covid-19 National Systems by Jeremy McMullan.eng.srt
|
45.7 KB
|
LOLWAP Living Off the Land for Web App Pentesters by Ben Loula.eng.srt
|
53.8 KB
|
OMGCICD - From Intern to Production by Denis Andzakovic.eng.srt
|
55.2 KB
|
One Trust, Zero Trust, Red Trust, Blue Trust by Kane Narraway & Clancy Rye.eng.srt
|
52.1 KB
|
OneHourAppSec - Changing the world one sprint at a time by Laura Bell Main.eng.srt
|
46.4 KB
|
Responder Going Beyond Just Listening by - Sam Shute.eng.srt
|
36.5 KB
|
Securing REST API Endpoints (or, How to avoid another Optus) by James Cooper.eng.srt
|
63.6 KB
|
Supply chain security in the health sector SBOMs and digitally-enabled medical devices by Nick Baty.eng.srt
|
75.1 KB
|
Your biggest Security Risk might not be what you think it is by Glen Sparrow.eng.srt
|
19.1 KB
|
Total files 173
|