/GrrCON 2011/
|
AlgoSec.mp4
|
23.4 MB
|
AlgoSec.srt
|
23.2 KB
|
Blinkie Lights Network Monitoring with Arduino - Steve Ocepek.mp4
|
47.2 MB
|
Blinkie Lights Network Monitoring with Arduino - Steve Ocepek.srt
|
48.0 KB
|
Characteristics of a Highly-Effective Information Security Executive - Bob West.mp4
|
42.2 MB
|
Characteristics of a Highly-Effective Information Security Executive - Bob West.srt
|
48.8 KB
|
Chris Roberts - Planes, Trains and Automobiles.mp4
|
29.5 MB
|
Chris Roberts - Planes, Trains and Automobiles.srt
|
36.6 KB
|
Cyber Vigilantes - Rob Rachwald.mp4
|
29.6 MB
|
Cyber Vigilantes - Rob Rachwald.srt
|
27.3 KB
|
Dear Pentesters, Get Bent - Duncan Manuts.mp4
|
37.7 MB
|
Dear Pentesters, Get Bent - Duncan Manuts.srt
|
45.3 KB
|
Defcon CTF-Why even Losers Always Win - Jarod DeMott.mp4
|
27.5 MB
|
Defcon CTF-Why even Losers Always Win - Jarod DeMott.srt
|
23.7 KB
|
Dispelling Cloud Security Hype - Johnathan Norman.mp4
|
29.4 MB
|
Dispelling Cloud Security Hype - Johnathan Norman.srt
|
30.7 KB
|
Hacking Trust Steven Fox.mp4
|
26.6 MB
|
Hacking Trust Steven Fox.srt
|
12.1 KB
|
Hook, Line and Syncer - A Liar for Hire s Ultimate Tackle Box Chris Silvers & Pat McCoy.mp4
|
47.6 MB
|
How asteroids falling from the sky improve security - J Wolfgang Goerlich.mp4
|
38.2 MB
|
How asteroids falling from the sky improve security - J Wolfgang Goerlich.srt
|
35.5 KB
|
Hunting Hackers Tim Crothers.mp4
|
34.6 MB
|
Hunting Hackers Tim Crothers.srt
|
50.8 KB
|
It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.mp4
|
51.0 MB
|
It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.srt
|
72.5 KB
|
Kernel Fun - Jon Oberheide.mp4
|
44.5 MB
|
Kernel Fun - Jon Oberheide.srt
|
27.9 KB
|
Legal Perspectives on Data Breaches - Carol Romej.mp4
|
29.3 MB
|
Legal Perspectives on Data Breaches - Carol Romej.srt
|
32.2 KB
|
Mike Kemp - When I grow up I want to be a cyber terrorist.mp4
|
48.7 MB
|
Mobile App Moolah - Profit taking with Mobile Malware - Jimmy Shah.mp4
|
41.6 MB
|
Mobile App Moolah - Profit taking with Mobile Malware - Jimmy Shah.srt
|
20.9 KB
|
Panel Discussion - Cloud Data Security and Privacy - How to leverage the Cloud safely.mp4
|
46.6 MB
|
Panel Discussion - Cloud Data Security and Privacy - How to leverage the Cloud safely.srt
|
61.3 KB
|
SmartMeters - Are they a gateway drug - Robert Former.mp4
|
53.2 MB
|
SmartMeters - Are they a gateway drug - Robert Former.srt
|
61.5 KB
|
The future of Authenticity - Moxie Marlinspike.mp4
|
49.2 MB
|
The future of Authenticity - Moxie Marlinspike.srt
|
44.2 KB
|
ZeuS - Inside Command and Control Adam Johnson.mp4
|
45.6 MB
|
ZeuS - Inside Command and Control Adam Johnson.srt
|
38.5 KB
|
[Least] resistance is [anything but] futile Tim Maletic.mp4
|
48.9 MB
|
[Least] resistance is [anything but] futile Tim Maletic.srt
|
48.1 KB
|
sploit me if u can - atlas 0f d00m.mp4
|
49.0 MB
|
sploit me if u can - atlas 0f d00m.srt
|
35.5 KB
|
/GrrCON 2012/
|
Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.mp4
|
65.0 MB
|
Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.srt
|
73.2 KB
|
Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).mp4
|
22.6 MB
|
Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).srt
|
39.0 KB
|
Alexander Chaveriat - I Think Therefore I PwN.mp4
|
51.4 MB
|
Alexander Chaveriat - I Think Therefore I PwN.srt
|
38.5 KB
|
Amol Sarwate - SCADA Security.mp4
|
57.2 MB
|
Amol Sarwate - SCADA Security.srt
|
78.3 KB
|
Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.mp4
|
56.4 MB
|
Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.srt
|
68.9 KB
|
Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.mp4
|
19.1 MB
|
Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.srt
|
30.9 KB
|
Chris Roberts - By Land, By Sea, By Air.mp4
|
63.8 MB
|
Chris Roberts - By Land, By Sea, By Air.srt
|
83.2 KB
|
Chris Silvers - Go with the Flow - Strategies for Successful Social Engineering.mp4
|
55.0 MB
|
Chris Silvers - Go with the Flow - Strategies for Successful Social Engineering.srt
|
78.1 KB
|
Christopher Elisan - Threat Ecosystem.mp4
|
47.7 MB
|
Christopher Elisan - Threat Ecosystem.srt
|
62.5 KB
|
Daniel Gregory - Securing & Managing Mobile Devices in the workplace.mp4
|
30.1 MB
|
Daniel Gregory - Securing & Managing Mobile Devices in the workplace.srt
|
49.4 KB
|
Daniel Lohrman - Why Security Professionals Fail.mp4
|
53.2 MB
|
Daniel Lohrman - Why Security Professionals Fail.srt
|
75.2 KB
|
David HealWHans Schwartzberg - iOS Hash Cracking.mp4
|
62.2 MB
|
David HealWHans Schwartzberg - iOS Hash Cracking.srt
|
64.5 KB
|
Duncan Manuts - Certify Manuts.mp4
|
64.2 MB
|
Duncan Manuts - Certify Manuts.srt
|
97.4 KB
|
Gary McCully & David Sopata - Hacking PCI Requ.mp4
|
51.8 MB
|
Gary McCully & David Sopata - Hacking PCI Requ.srt
|
68.7 KB
|
J Wolfgang Goerlich- Punch Counter Punch with.mp4
|
60.0 MB
|
J Wolfgang Goerlich- Punch Counter Punch with.srt
|
58.9 KB
|
Jack Wink - XSS Session Fixation.mp4
|
17.0 MB
|
Jack Wink - XSS Session Fixation.srt
|
25.6 KB
|
Jared DeMott - Stop ROP and Roll.mp4
|
79.3 MB
|
Jim Rennie - Law of Internet Scanning.mp4
|
59.4 MB
|
Jim Rennie - Law of Internet Scanning.srt
|
84.0 KB
|
Jimmy Shah - Advances in Android Malware.mp4
|
65.4 MB
|
Jimmy Shah - Advances in Android Malware.srt
|
84.7 KB
|
Jonathan Deutsch - Facebook and You.mp4
|
37.2 MB
|
Jonathan Deutsch - Facebook and You.srt
|
45.9 KB
|
Larry Holland & Hal Charnley - The Killer is Already in Your House.mp4
|
22.4 MB
|
Larry Holland & Hal Charnley - The Killer is Already in Your House.srt
|
34.4 KB
|
Louise Popyck - Simplifying Data Center Security and Compliance.mp4
|
44.8 MB
|
Louise Popyck - Simplifying Data Center Security and Compliance.srt
|
23.8 KB
|
Mark Ehr - Security Intellligence.mp4
|
55.9 MB
|
Mark Ehr - Security Intellligence.srt
|
89.1 KB
|
Matt Johnson - Powershell - Be a Cool Blue Kid.mp4
|
47.1 MB
|
Matt Johnson - Powershell - Be a Cool Blue Kid.srt
|
50.8 KB
|
Mike Kemp - Everything Old is New Again.mp4
|
79.5 MB
|
Mike Kemp - Everything Old is New Again.srt
|
109.2 KB
|
Nick Percoco - Mobile Attacks - What will the future bring.mp4
|
52.6 MB
|
Nick Percoco - Mobile Attacks - What will the future bring.srt
|
91.6 KB
|
Philip Polstra - Battery Powered Pentesting and Forensics.mp4
|
55.1 MB
|
Philip Polstra - Battery Powered Pentesting and Forensics.srt
|
70.5 KB
|
Rafal Los- House of Cards.mp4
|
52.4 MB
|
Rafal Los- House of Cards.srt
|
77.7 KB
|
Raymond Lily - OSINT Footprinting.mp4
|
57.8 MB
|
Raymond Lily - OSINT Footprinting.srt
|
68.2 KB
|
Richard Stiennon - Cyber Defense.mp4
|
53.7 MB
|
Richard Stiennon - Cyber Defense.srt
|
80.0 KB
|
Robert Rowley - Juice Jacking.mp4
|
31.4 MB
|
Robert Rowley - Juice Jacking.srt
|
44.5 KB
|
Scott Thomas - InfoSec Flameout.mp4
|
14.9 MB
|
Scott Thomas - InfoSec Flameout.srt
|
25.4 KB
|
Steve F. Fox - From Obstacle to Ally - Repositioning the Security Team.mp4
|
55.5 MB
|
Taylor Ettema - Modern Malware.mp4
|
45.8 MB
|
Taylor Ettema - Modern Malware.srt
|
67.2 KB
|
Thomas Richards - Android in the Healthcare Workplace.mp4
|
24.2 MB
|
Thomas Richards - Android in the Healthcare Workplace.srt
|
36.7 KB
|
Tom Clare - 7 Stages of Advanced Threats.mp4
|
26.5 MB
|
Tom Clare - 7 Stages of Advanced Threats.srt
|
42.7 KB
|
William Tarkington - Psychological Tricks of the Social Engineer.mp4
|
64.8 MB
|
William Tarkington - Psychological Tricks of the Social Engineer.srt
|
79.0 KB
|
atlas of doom- GHz or Bust.mp4
|
62.8 MB
|
atlas of doom- GHz or Bust.srt
|
73.3 KB
|
dam Ely- Hack The Cloud.mp4
|
78.0 MB
|
dam Ely- Hack The Cloud.srt
|
97.6 KB
|
tlas of d00m subbing for Kevin Johnson- Tactical SecOps.mp4
|
46.9 MB
|
/GrrCON 2013/
|
Beautiful Models - J Wolfgang Goerlich.mp4
|
62.3 MB
|
Beautiful Models - J Wolfgang Goerlich.srt
|
31.4 KB
|
Burning the Enterprise with BYOD - Georgia Weidman.mp4
|
82.3 MB
|
David Schwartzberg- Zeus C&C for Tech Support.mp4
|
53.1 MB
|
David Schwartzberg- Zeus C&C for Tech Support.srt
|
9.1 KB
|
Hacker History - This Stuff Matters - Duncan Manuts.mp4
|
49.7 MB
|
Hacking Giveaways, Contests, and Polls for Fun and Profit - Matthew Bryant.mp4
|
67.6 MB
|
Hacking Giveaways, Contests, and Polls for Fun and Profit - Matthew Bryant.srt
|
43.3 KB
|
Mark Stanislav - Core Linux Security - 0-Day Isn t Everything.mp4
|
46.6 MB
|
Pwnage from the Skies - Philip Polstra.mp4
|
57.3 MB
|
Pwnage from the Skies - Philip Polstra.srt
|
31.8 KB
|
Security Counterknowledge - Mike Kemp.mp4
|
76.8 MB
|
The Science of Security Automation - Paul Cochran & Toni Buhrke.mp4
|
59.3 MB
|
The Science of Security Automation - Paul Cochran & Toni Buhrke.srt
|
35.3 KB
|
What s - Context - got to do with it - Arron Finnon.mp4
|
74.7 MB
|
What s - Context - got to do with it - Arron Finnon.srt
|
41.6 KB
|
atlas of d00m - TBA.mp4
|
53.7 MB
|
atlas of d00m - TBA.srt
|
14.9 KB
|
/GrrCON 2014/
|
Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.mp4
|
39.8 MB
|
Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.srt
|
76.2 KB
|
Application Pen Testing Chris Pfoutz.mp4
|
40.2 MB
|
Are you a janitor or a cleaner John ageekspeeda Stauffacher Matthew Mattrix Hoy.mp4
|
37.1 MB
|
Autonomous Remote Hacking Drones Dr Phil Polstra.mp4
|
44.0 MB
|
Bigger Boys Made Us Mike Kemp.mp4
|
60.6 MB
|
BioHacking Becoming the Best Me I Can Be Leonard.mp4
|
33.4 MB
|
Board Breaking Challenge.mp4
|
22.8 MB
|
Breach Stains Matt The Streaker Johnson.mp4
|
38.8 MB
|
Cyber Security Incidents Red Blue Team Unc13 Fuck3r.mp4
|
18.9 MB
|
Finuxs Historical Tour Of IDS Evasion Insertions and Other Odditie Arron Finux Finnon.mp4
|
59.3 MB
|
Full Douchesclosure Duncan Manuts.mp4
|
43.1 MB
|
GrrCon TAP.mp4
|
14.4 MB
|
Grrcon 2014 closing.mp4
|
23.5 MB
|
Hack the Hustle Career Strategies For Information Security Professionals Eve Adams.mp4
|
40.2 MB
|
Hackers Are People Too Infosystir.mp4
|
32.8 MB
|
Home Grown Linux Phil Polstra.mp4
|
30.6 MB
|
How to budget IDSs Brian Arcane Heitzman.mp4
|
21.9 MB
|
Intelligence Driven Security Shane Harsch.mp4
|
33.2 MB
|
Intelligence Driven Security Shane Harsch.srt
|
55.5 KB
|
LEVIATHAN Command and Control Communications on Planet Earth Kevin Thompson.mp4
|
22.5 MB
|
OAuth20 a Itas the Implementation Stupid Tony Miller.mp4
|
50.3 MB
|
PCI and Crypto The Good The Bad and The Frankly Ugly Robert Formera.mp4
|
30.7 MB
|
Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.mp4
|
35.3 MB
|
Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.srt
|
52.9 KB
|
Red Teaming Back and Forth 5ever FuzzyNop.mp4
|
43.2 MB
|
Red Teaming Back and Forth 5ever FuzzyNop.srt
|
68.3 KB
|
Security On The Cheap Joel Cardella.mp4
|
44.2 MB
|
Security for the People End User Authentication Security on the Internet Mark Stanislav.mp4
|
32.0 MB
|
The Challenge of Natural Security Systems Rockie Brockway.mp4
|
40.9 MB
|
Vaccinating APKs Milan Gabor.mp4
|
49.8 MB
|
Vaccinating APKs Milan Gabor.srt
|
67.1 KB
|
Vulnerable By Design a The Backdoor That Came Through the Front Matthew mandatory Bryant.mp4
|
25.4 MB
|
ZitMo NoM David HealWHans Schwartzberg.mp4
|
44.5 MB
|
/GrrCON 2015/
|
Adding 10 Security to Your Scrum Agile Environment tehEx0dus.mp4
|
20.4 MB
|
Adding 10 Security to Your Scrum Agile Environment tehEx0dus.srt
|
25.2 KB
|
Application Recon The Lost Art Tony Miller.mp4
|
35.2 MB
|
Application Recon The Lost Art Tony Miller.srt
|
64.1 KB
|
Backdooring Git John Menerick.mp4
|
37.1 MB
|
Backdooring Git John Menerick.srt
|
44.1 KB
|
Breaking in Bad Im The One Who Doesnt Knock jayson Street.mp4
|
51.6 MB
|
Breaking in Bad Im The One Who Doesnt Knock jayson Street.srt
|
74.3 KB
|
Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.mp4
|
20.3 MB
|
Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.srt
|
28.9 KB
|
But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.mp4
|
54.0 MB
|
But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.srt
|
58.3 KB
|
Can you patch a cloud Scott Thomas.srt
|
53.8 KB
|
Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.mp4
|
49.5 MB
|
Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.srt
|
70.2 KB
|
Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.mp4
|
23.5 MB
|
Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.srt
|
29.0 KB
|
Footprints of This Years Top Attack Vectors Kerstyn Clover.mp4
|
49.9 MB
|
Hacking the Next Generation HealWHans.mp4
|
31.9 MB
|
Hacking the Next Generation HealWHans.srt
|
58.0 KB
|
Harness the Force for Better Penetration Testing Patrick Fussell.mp4
|
13.8 MB
|
Harness the Force for Better Penetration Testing Patrick Fussell.srt
|
25.3 KB
|
Hello GrrCON.mp4
|
3.6 MB
|
Honeypots for Active Defense Greg Foss.mp4
|
49.2 MB
|
Honeypots for Active Defense Greg Foss.srt
|
76.4 KB
|
How I Got Network Creds Without Even Asking A Social Engineering Case Study J.mp4
|
19.9 MB
|
How I Got Network Creds Without Even Asking A Social Engineering Case Study J.srt
|
26.7 KB
|
How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.mp4
|
22.3 MB
|
How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.srt
|
32.7 KB
|
Is it EVIL Chaoticflaws.mp4
|
34.9 MB
|
Is it EVIL Chaoticflaws.srt
|
46.1 KB
|
No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.mp4
|
38.8 MB
|
No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.srt
|
62.4 KB
|
Path Well Traveled Common Mistakes with SIEM Nick Jacob.mp4
|
32.9 MB
|
Path Well Traveled Common Mistakes with SIEM Nick Jacob.srt
|
46.5 KB
|
Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.mp4
|
43.7 MB
|
Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.srt
|
53.6 KB
|
Poking The Bear Mike Kemp.mp4
|
63.8 MB
|
Process The Salvation of Incident Response Charles Herring.mp4
|
17.1 MB
|
Process The Salvation of Incident Response Charles Herring.srt
|
27.4 KB
|
Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.mp4
|
49.3 MB
|
Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.srt
|
37.8 KB
|
Securing Todays Enterprise WAN Andy Mansfield.mp4
|
28.3 MB
|
Securing Todays Enterprise WAN Andy Mansfield.srt
|
31.3 KB
|
Security Frameworks What was once old is new again Brian Wrozek.mp4
|
23.2 MB
|
Security Frameworks What was once old is new again Brian Wrozek.srt
|
38.4 KB
|
Security Incident Response Derek Milroy.mp4
|
48.6 MB
|
Security Incident Response Derek Milroy.srt
|
82.4 KB
|
Shell scripting live Linux Forensics Dr Phil Polstra.mp4
|
37.5 MB
|
Shell scripting live Linux Forensics Dr Phil Polstra.srt
|
48.9 KB
|
Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.mp4
|
30.8 MB
|
Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.srt
|
32.3 KB
|
Software Security IWR Thomas G13 Richards.mp4
|
29.4 MB
|
Software Security IWR Thomas G13 Richards.srt
|
61.6 KB
|
Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.mp4
|
42.3 MB
|
Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.srt
|
48.6 KB
|
Subject matter to be determined by the number of federal agents present in th.mp4
|
46.2 MB
|
Subject matter to be determined by the number of federal agents present in th.srt
|
52.4 KB
|
The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.mp4
|
40.9 MB
|
The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.srt
|
82.7 KB
|
The Hitch Hikers Guide to Information Security Kellman Meghu.mp4
|
51.7 MB
|
The Safety You Think You Have is Only a Masquerade Nathan Dragun.mp4
|
47.2 MB
|
The Safety You Think You Have is Only a Masquerade Nathan Dragun.srt
|
67.2 KB
|
The wrong side of history everything that is old is new again Arron Finnon.mp4
|
65.5 MB
|
This Is All Your Fault Duncan Manuts.mp4
|
37.3 MB
|
This Is All Your Fault Duncan Manuts.srt
|
47.3 KB
|
Ticking me off From Threat Intel to Reversing Juan Cortes.mp4
|
23.5 MB
|
Ticking me off From Threat Intel to Reversing Juan Cortes.srt
|
24.9 KB
|
Understanding and Improving the Military Cyber Culture Dariusz Mikulski.mp4
|
17.2 MB
|
Understanding and Improving the Military Cyber Culture Dariusz Mikulski.srt
|
32.8 KB
|
Welcome to the Internet of insecure things Chandler Howell.mp4
|
18.3 MB
|
Welcome to the Internet of insecure things Chandler Howell.srt
|
26.1 KB
|
What is a cloud access broker and do I need one Tom Doane.mp4
|
18.9 MB
|
What is a cloud access broker and do I need one Tom Doane.srt
|
35.1 KB
|
Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.mp4
|
36.0 MB
|
Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.srt
|
39.9 KB
|
/GrrCON 2016/
|
Abnormal Behavior Detection in Large Environments Dave Kennedy.mp4
|
51.2 MB
|
Abnormal Behavior Detection in Large Environments Dave Kennedy.srt
|
180.3 KB
|
Act Three The Evolution of Privacy Finux.mp4
|
41.2 MB
|
Act Three The Evolution of Privacy Finux.srt
|
107.3 KB
|
Alignment of business and IT Security Shane Harsch.mp4
|
30.3 MB
|
Alignment of business and IT Security Shane Harsch.srt
|
99.1 KB
|
Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.mp4
|
55.2 MB
|
Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.srt
|
171.8 KB
|
Back to the Future Understanding our future but following the past Kevin Johnson.mp4
|
46.0 MB
|
Back to the Future Understanding our future but following the past Kevin Johnson.srt
|
124.1 KB
|
Bad Guys Look Just Like You Justin Beard.mp4
|
20.7 MB
|
Bad Guys Look Just Like You Justin Beard.srt
|
49.6 KB
|
Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.mp4
|
26.5 MB
|
Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.srt
|
67.8 KB
|
Binary Ninja Jared Demott.mp4
|
40.8 MB
|
Binary Ninja Jared Demott.srt
|
128.8 KB
|
Breaking Android Apps for Fun and Profit Bill Sempf.mp4
|
37.1 MB
|
Breaking Android Apps for Fun and Profit Bill Sempf.srt
|
130.5 KB
|
Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.mp4
|
40.7 MB
|
Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.srt
|
147.3 KB
|
Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.mp4
|
21.9 MB
|
Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.srt
|
57.4 KB
|
Encryption Mobility Cloud Oh My Bill Harmer.mp4
|
29.3 MB
|
Encryption Mobility Cloud Oh My Bill Harmer.srt
|
89.6 KB
|
Fighting the Enemy Within Matt Crowe.mp4
|
17.6 MB
|
Fighting the Enemy Within Matt Crowe.srt
|
76.2 KB
|
Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.mp4
|
10.7 MB
|
Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.srt
|
46.3 KB
|
Getting to the Root of Advanced Threats Before Impact Josh Fazio.mp4
|
15.0 MB
|
Getting to the Root of Advanced Threats Before Impact Josh Fazio.srt
|
44.1 KB
|
Guarding Lunch J Wolfgang Goerlich.mp4
|
47.8 MB
|
Guarding Lunch J Wolfgang Goerlich.srt
|
166.3 KB
|
How Do You Secure What You don't Control Dimitri Vlachos.mp4
|
19.1 MB
|
How Do You Secure What You don't Control Dimitri Vlachos.srt
|
66.3 KB
|
How to Implement Crypto Poorly Sean Cassidy.mp4
|
25.9 MB
|
How to Implement Crypto Poorly Sean Cassidy.srt
|
94.4 KB
|
Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.mp4
|
43.1 MB
|
Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.srt
|
116.8 KB
|
Machine Duping Pwning Deep Learning Systems Clarence Chio.mp4
|
54.5 MB
|
Machine Duping Pwning Deep Learning Systems Clarence Chio.srt
|
127.1 KB
|
Magnetic Stripes 101 Tyler Keeton.mp4
|
16.1 MB
|
Magnetic Stripes 101 Tyler Keeton.srt
|
37.5 KB
|
Make STEHM Great Again David HealWHans Schwartzberg.mp4
|
32.9 MB
|
Make STEHM Great Again David HealWHans Schwartzberg.srt
|
120.1 KB
|
Money Fame Power Build your success as a security professional Nathan Dragun.mp4
|
38.0 MB
|
Money Fame Power Build your success as a security professional Nathan Dragun.srt
|
152.9 KB
|
On being an Eeyore in Infosec Stefan Edwards.mp4
|
33.1 MB
|
On being an Eeyore in Infosec Stefan Edwards.srt
|
142.2 KB
|
Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.mp4
|
23.8 MB
|
Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.srt
|
59.3 KB
|
Phish your employees for fun Kristoffer Marshall.mp4
|
50.3 MB
|
Phish your employees for fun Kristoffer Marshall.srt
|
112.5 KB
|
Piercing the Air Gap Network Steganography for Everyone John Ventura.mp4
|
33.3 MB
|
Piercing the Air Gap Network Steganography for Everyone John Ventura.srt
|
107.8 KB
|
Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.mp4
|
36.9 MB
|
Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.srt
|
138.6 KB
|
Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.mp4
|
53.0 MB
|
Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.srt
|
109.0 KB
|
Reality Checking Your AppSec Program Darren Meyer.mp4
|
16.6 MB
|
Reality Checking Your AppSec Program Darren Meyer.srt
|
77.4 KB
|
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).mp4
|
44.8 MB
|
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).srt
|
144.6 KB
|
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.mp4
|
44.9 MB
|
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.srt
|
145.5 KB
|
Secure Dicks Michael Kemp.mp4
|
42.4 MB
|
Secure Dicks Michael Kemp.srt
|
105.3 KB
|
Securing Trust Defending Against Next generation Attacks John Muirhead Gould.mp4
|
28.6 MB
|
Securing Trust Defending Against Next generation Attacks John Muirhead Gould.srt
|
72.6 KB
|
Security Guards LOL Brent White Tim Roberts.mp4
|
49.2 MB
|
Security Guards LOL Brent White Tim Roberts.srt
|
159.8 KB
|
So You Want to Be a Pentester Absolute0x0.mp4
|
35.1 MB
|
So You Want to Be a Pentester Absolute0x0.srt
|
94.7 KB
|
So Youve Inherited a Security Department Now What Amanda Berlin.mp4
|
36.7 MB
|
So Youve Inherited a Security Department Now What Amanda Berlin.srt
|
105.0 KB
|
Stop attacking your mothers car Charles Parker II.mp4
|
27.0 MB
|
Stop attacking your mothers car Charles Parker II.srt
|
71.7 KB
|
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).mp4
|
47.8 MB
|
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).srt
|
138.8 KB
|
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.mp4
|
47.8 MB
|
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.srt
|
140.1 KB
|
Tales from the Cryptanalyst Jeff Man.mp4
|
47.5 MB
|
Tales from the Cryptanalyst Jeff Man.srt
|
132.8 KB
|
Threat Detection Response with Hipara J Brett Cunningham (2).mp4
|
34.4 MB
|
Threat Detection Response with Hipara J Brett Cunningham (2).srt
|
61.2 KB
|
Threat Detection Response with Hipara J Brett Cunningham.mp4
|
34.3 MB
|
Threat Detection Response with Hipara J Brett Cunningham.srt
|
61.2 KB
|
Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.mp4
|
22.4 MB
|
Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.srt
|
66.3 KB
|
Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.mp4
|
50.0 MB
|
Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.srt
|
131.6 KB
|
Welcome to The World of Yesterday Tomorrow Joel Cardella.mp4
|
26.4 MB
|
Welcome to The World of Yesterday Tomorrow Joel Cardella.srt
|
154.3 KB
|
What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.mp4
|
26.4 MB
|
What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.srt
|
68.3 KB
|
Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.mp4
|
40.1 MB
|
Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.srt
|
121.1 KB
|
and bad mistakes Ive made a few Jayson Street (only first 30 min or so).mp4
|
43.7 MB
|
and bad mistakes Ive made a few Jayson Street (only first 30 min or so).srt
|
82.8 KB
|
and bad mistakes Ive made a few Jayson Street.mp4
|
43.7 MB
|
and bad mistakes Ive made a few Jayson Street.srt
|
82.8 KB
|
still broken after all these years aka utility security for smarties doug nibbelink.mp4
|
41.9 MB
|
still broken after all these years aka utility security for smarties doug nibbelink.srt
|
117.6 KB
|
/GrrCON 2017/
|
#TrevorForget with Lintile.mp4
|
14.1 MB
|
3rd Party Data Burns Aaron Finux Finnon.mp4
|
42.4 MB
|
A GRReat New Way of Thinking about Innovating for Cyber Defense and even Cyber Offense Ernest.mp4
|
68.0 MB
|
A Reporters Look at Open Source Intelligence Hilary Louise.mp4
|
50.9 MB
|
An Attack Pathway Into Your Organization Reducing risk without reducing operational efficiency.mp4
|
57.0 MB
|
An Employee their Laptop and a Hacker walk into a Bar Shannon Fritz.mp4
|
62.5 MB
|
Building a Usable Mobile Data Protection Strategy David Heal Schwartzberg.mp4
|
54.8 MB
|
Change is Simply an Act of Survival Predicting the future while shackled to the past Bil Har.mp4
|
34.6 MB
|
Critical Incident Surviving my first layoff by applying BCPDRP Principles Tom Mead.mp4
|
34.8 MB
|
Cyber Cyber Cyber Using the killchain to accomplish something Amanda Berlin.mp4
|
49.7 MB
|
Defending The De funded Keith Wilson.mp4
|
32.1 MB
|
Dissecting Destructive Malware and Recovering from Catastrophe Bryan York.mp4
|
31.5 MB
|
Embedding Security in Embedded Systems Dr Jared DeMott.mp4
|
53.1 MB
|
Eye on the Prize a Proposal for Legalizing Hacking Back Adam Hogan.mp4
|
61.6 MB
|
Grand Rapids next to GrrCON, high water.mp4
|
1.1 MB
|
Hidden Treasure Detecting Intrusions with ETW Zac Brown.mp4
|
51.2 MB
|
How do you POC Are you really testing a product Ken Donze.mp4
|
21.4 MB
|
Infosec State of Affairs Too much Kim Kardashian not enough Malcolm Gladwel Jim Wojno Dan Ki.mp4
|
51.9 MB
|
Infrastructure Based Security Chris Barnes.mp4
|
49.9 MB
|
Ive got a Pocket Bone to pick with you Dr Phil Postra.mp4
|
47.0 MB
|
Learning from InfoSec Fails - Derek Milroy.mp4
|
60.2 MB
|
National Guard for Cyber How about a Volunteer Cyber Department Ray Davidson.mp4
|
29.9 MB
|
Oops Was that your pacemaker Charles Parker II.mp4
|
31.0 MB
|
Pen Test War Stories Why my job is so easy and how you can make it harder Aaron Herndon.mp4
|
47.1 MB
|
Population Control Through The Advances In Technology Chris Roberts part 1.mp4
|
47.3 MB
|
ProbeSpy Tracking your past predicting your future stumblebot.mp4
|
27.7 MB
|
Real World Red Teaming spartan.mp4
|
43.0 MB
|
Realizing Software Security Maturity The Growing Pains Gains Mark Stanislav Kelby Ludwig.mp4
|
48.6 MB
|
Red Team Yourself Thomas Richards.mp4
|
33.6 MB
|
STRATEGIES ON SECURING YOU BANKS ENTERPRISES FROM SOMEONE WHO ROBS BANKS ENTERPRISES FOR A L.mp4
|
71.9 MB
|
Skills For A Red Teamer Brent White Tim Roberts.mp4
|
58.3 MB
|
Software Defined Segmentation Matt Hendrickson.mp4
|
28.7 MB
|
Tales From The Trenches Practical Information Security Lessons Michael Belton.mp4
|
44.0 MB
|
The Black Art of Wireless Post Exploitation Gabriel solstice Ryan.mp4
|
52.7 MB
|
The Future of Cyber Security Anthony Sabaj.mp4
|
49.2 MB
|
The Shuttle Columbia Disaster Lessons That Were Not Learned Joel I love it when they call me.mp4
|
60.8 MB
|
Threat Intelligence Zero to Basics in presentation Chris J.mp4
|
40.9 MB
|
Topic depends on number of federal agents in audience Atlas of Doom.mp4
|
67.6 MB
|
We got it wrong Wolfgang Goerlich.mp4
|
53.5 MB
|
You Got Your SQL Attacks In My Honeypot Andrew Brandt.mp4
|
27.4 MB
|
vAp0r and the Blooming Onion Justin Whitehead Jim Allee.mp4
|
43.4 MB
|
/GrrCON 2018/
|
2018 SIEM Trends What is my Mean Time to Value Bill Lampe.eng.srt
|
118.5 KB
|
2018 SIEM Trends What is my Mean Time to Value Bill Lampe.mp4
|
52.4 MB
|
Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.eng.srt
|
124.5 KB
|
Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.mp4
|
45.2 MB
|
An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.eng.srt
|
20.7 KB
|
An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.mp4
|
27.6 MB
|
Analyzing Multi Dimensional Malware Dataset Ankur Tyagi.mp4
|
42.1 MB
|
Analyzing Pwned Passwords with Apache Spark Kelley Robinson.eng.srt
|
126.6 KB
|
Analyzing Pwned Passwords with Apache Spark Kelley Robinson.mp4
|
40.8 MB
|
Automation and Open Source Turning the Tide on Attackers John Grigg.eng.srt
|
141.3 KB
|
Automation and Open Source Turning the Tide on Attackers John Grigg.mp4
|
55.4 MB
|
Bounty Hunters J Wolfgang Goerlich.eng.srt
|
138.6 KB
|
Bounty Hunters J Wolfgang Goerlich.mp4
|
45.2 MB
|
Career Risk Management 10 tips to keep you employed Chris Burrows.eng.srt
|
126.1 KB
|
Career Risk Management 10 tips to keep you employed Chris Burrows.mp4
|
51.0 MB
|
Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.eng.srt
|
74.1 KB
|
Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.mp4
|
27.8 MB
|
Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.eng.srt
|
154.0 KB
|
Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.mp4
|
56.6 MB
|
Designing a Cloud Security Blueprint Sarah Elie.eng.srt
|
90.0 KB
|
Designing a Cloud Security Blueprint Sarah Elie.mp4
|
39.4 MB
|
Dragnet Your Social Engineering Sidekick Truman Kain.eng.srt
|
55.3 KB
|
Dragnet Your Social Engineering Sidekick Truman Kain.mp4
|
19.5 MB
|
Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.eng.srt
|
141.9 KB
|
Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.mp4
|
54.2 MB
|
Hacker Tools Compliments of Microsoft David Fletcher Sally Vandeven.eng.srt
|
105.4 KB
|
How this 20 Year Old Changed the Security Industry James ONeill.mp4
|
19.3 MB
|
How to Conduct a Product Security Test And How it Fits Into the Larger Security St.eng.srt
|
122.7 KB
|
How to Conduct a Product Security Test And How it Fits Into the Larger Security St.mp4
|
34.7 MB
|
How to rob a bank over the phone Joshua Naga Crumbaugh.eng.srt
|
122.2 KB
|
How to rob a bank over the phone Joshua Naga Crumbaugh.mp4
|
66.7 MB
|
InSpec Compliance as Code Kent picat Gruber.eng.srt
|
119.9 KB
|
InSpec Compliance as Code Kent picat Gruber.mp4
|
39.8 MB
|
Keynote Dave Kennedy.eng.srt
|
155.7 KB
|
Keynote Dave Kennedy.mp4
|
51.8 MB
|
Life Death the Nematodes Long live Cyber Resilience Chad Calease.eng.srt
|
131.9 KB
|
Life Death the Nematodes Long live Cyber Resilience Chad Calease.mp4
|
71.5 MB
|
Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.eng.srt
|
125.5 KB
|
Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.mp4
|
38.2 MB
|
More Tales from the CryptAnalyst Jeff Man.eng.srt
|
142.7 KB
|
More Tales from the CryptAnalyst Jeff Man.mp4
|
60.0 MB
|
My First year in Application Security Whitney Phillips.eng.srt
|
53.7 KB
|
My First year in Application Security Whitney Phillips.mp4
|
31.7 MB
|
Pacu Attack and Post Exploitation in AWS Spencer Gietzen.eng.srt
|
58.2 KB
|
Pacu Attack and Post Exploitation in AWS Spencer Gietzen.mp4
|
22.7 MB
|
Physicals Badges and why it matters Alex Fernandez Gatti.eng.srt
|
75.5 KB
|
Physicals Badges and why it matters Alex Fernandez Gatti.mp4
|
34.8 MB
|
Saving All the Money to Buy All the Booze Learning to Hack All the Things on.eng.srt
|
99.8 KB
|
Saving All the Money to Buy All the Booze Learning to Hack All the Things on.mp4
|
42.5 MB
|
SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.eng.srt
|
156.6 KB
|
SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.mp4
|
52.3 MB
|
Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.eng.srt
|
139.6 KB
|
Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.mp4
|
60.0 MB
|
The Abyss is Waving BackThe four paths that human evolution is charging down a.eng.srt
|
139.0 KB
|
The Abyss is Waving BackThe four paths that human evolution is charging down a.mp4
|
61.1 MB
|
The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.eng.srt
|
155.1 KB
|
The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.mp4
|
53.4 MB
|
Threat Hunting the macOS edition Megan Carney.eng.srt
|
114.4 KB
|
Threat Hunting the macOS edition Megan Carney.mp4
|
48.4 MB
|
Threat Modeling How to actually do it and make it useful Derek Milroy.eng.srt
|
161.8 KB
|
Threat Modeling How to actually do it and make it useful Derek Milroy.mp4
|
59.4 MB
|
Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.eng.srt
|
61.2 KB
|
Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.mp4
|
28.5 MB
|
Youre right this talk isnt really about you Jayson E Street.eng.srt
|
125.3 KB
|
Youre right this talk isnt really about you Jayson E Street.mp4
|
49.4 MB
|
Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.eng.srt
|
170.0 KB
|
Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.mp4
|
60.8 MB
|
emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.eng.srt
|
105.7 KB
|
emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.mp4
|
71.2 MB
|
we we Internet Explorer Does What It Wants Aaron Heikkila.eng.srt
|
54.9 KB
|
we we Internet Explorer Does What It Wants Aaron Heikkila.mp4
|
24.4 MB
|
/GrrCON 2019/
|
A Day in the Life of a Security Operations Center What do you get when you partner.eng.srt
|
45.3 KB
|
A Day in the Life of a Security Operations Center What do you get when you partner.mp4
|
21.5 MB
|
A Theme of Fear Hacking the Paradigm Catherine Ullman.eng.srt
|
89.7 KB
|
A Theme of Fear Hacking the Paradigm Catherine Ullman.mp4
|
62.5 MB
|
Automating Phishing Analysis Kyle Eaton.eng.srt
|
33.4 KB
|
Automating Phishing Analysis Kyle Eaton.mp4
|
16.3 MB
|
Baselining Behavior Tradecraft through Simulations Dave Kenendy.mp4
|
52.3 MB
|
Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.eng.srt
|
37.2 KB
|
Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.mp4
|
25.6 MB
|
Big Plane Little Plane How common aviation attacks affect airlines and general avia.eng.srt
|
72.7 KB
|
Big Plane Little Plane How common aviation attacks affect airlines and general avia.mp4
|
58.7 MB
|
Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.eng.srt
|
59.3 KB
|
Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.mp4
|
34.0 MB
|
Breaking NBAD & UEBA Detection by Charles Herring.eng.srt
|
59.6 KB
|
Breaking NBAD & UEBA Detection by Charles Herring.mp4
|
30.7 MB
|
Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.eng.srt
|
38.8 KB
|
Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.mp4
|
25.8 MB
|
Cons Careers SciaticNerd.eng.srt
|
96.0 KB
|
Cons Careers SciaticNerd.mp4
|
49.7 MB
|
CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.eng.srt
|
109.7 KB
|
CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.mp4
|
62.3 MB
|
Dance Fancybear Dance a study in macOS Cat Self.eng.srt
|
88.5 KB
|
Dance Fancybear Dance a study in macOS Cat Self.mp4
|
47.5 MB
|
Data Access Rights Exploits under New Privacy Laws Amber Welch.eng.srt
|
51.6 KB
|
Data Access Rights Exploits under New Privacy Laws Amber Welch.mp4
|
29.5 MB
|
Data Security How to avoid an embarrassing breach Matt mattrix Hoy.eng.srt
|
61.3 KB
|
Data Security How to avoid an embarrassing breach Matt mattrix Hoy.mp4
|
41.1 MB
|
Deepfakes If anything can be real then nothing is real April C Wright.eng.srt
|
89.0 KB
|
Deepfakes If anything can be real then nothing is real April C Wright.mp4
|
53.6 MB
|
Departing Employees Departing Data Todd Thorsen.eng.srt
|
32.9 KB
|
Departing Employees Departing Data Todd Thorsen.mp4
|
21.3 MB
|
Destroy Everything Tom Somerville.mp4
|
23.5 MB
|
Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.eng.srt
|
36.5 KB
|
Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.mp4
|
26.4 MB
|
From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.eng.srt
|
102.3 KB
|
From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.mp4
|
55.4 MB
|
Good Cyber Hygiene and using analytics to drive the need for it on Print David Rose.mp4
|
28.8 MB
|
Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.eng.srt
|
48.9 KB
|
Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.mp4
|
33.1 MB
|
Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.eng.srt
|
79.5 KB
|
Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.mp4
|
71.1 MB
|
Hillbilly Storytime Pentest Fails Adam Compton.eng.srt
|
55.0 KB
|
Hillbilly Storytime Pentest Fails Adam Compton.mp4
|
38.3 MB
|
Host Hunting on a Budget cyberGoatPsyOps.eng.srt
|
47.7 KB
|
Host Hunting on a Budget cyberGoatPsyOps.mp4
|
27.6 MB
|
How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.eng.srt
|
49.5 KB
|
How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.mp4
|
32.0 MB
|
How Nathan Crashed and Burned Nathan Dragun.eng.srt
|
54.1 KB
|
How Nathan Crashed and Burned Nathan Dragun.mp4
|
22.8 MB
|
How to Make a Honeypot Stickier SSH Jose Hernandez.eng.srt
|
94.2 KB
|
How to Make a Honeypot Stickier SSH Jose Hernandez.mp4
|
54.2 MB
|
I PWN thee I PWN thee not Jayson Street.eng.srt
|
89.0 KB
|
I PWN thee I PWN thee not Jayson Street.mp4
|
60.3 MB
|
Keynote Amanda Infosystir Berlin.mp4
|
55.6 MB
|
Keynote Rachel Soul Crusher86 G.eng.srt
|
88.1 KB
|
Keynote Rachel Soul Crusher86 G.mp4
|
45.0 MB
|
MSSPs are greatand other lies I tell myself Scott Thomas.eng.srt
|
102.0 KB
|
MSSPs are greatand other lies I tell myself Scott Thomas.mp4
|
45.0 MB
|
Malicious Cryptomining is Exploding Are you at risk John Fatten.eng.srt
|
65.5 KB
|
Malicious Cryptomining is Exploding Are you at risk John Fatten.mp4
|
58.0 MB
|
Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.eng.srt
|
34.2 KB
|
Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.mp4
|
19.4 MB
|
Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.eng.srt
|
75.2 KB
|
Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.mp4
|
60.9 MB
|
PSD2 SCA WTF Kelley Robinson.eng.srt
|
51.0 KB
|
PSD2 SCA WTF Kelley Robinson.mp4
|
19.6 MB
|
QA on our industry and other things that are top of mind Chris Roberts.eng.srt
|
84.0 KB
|
QA on our industry and other things that are top of mind Chris Roberts.mp4
|
61.5 MB
|
Reverse Engineering Malware for N00bs GregB33fJames.eng.srt
|
93.2 KB
|
Reverse Engineering Malware for N00bs GregB33fJames.mp4
|
61.3 MB
|
Ssshhhh Atlas of Doom.eng.srt
|
84.8 KB
|
Ssshhhh Atlas of Doom.mp4
|
68.0 MB
|
Surfing and Security Ride the wave Chris Burrows.eng.srt
|
52.9 KB
|
Surfing and Security Ride the wave Chris Burrows.mp4
|
28.6 MB
|
Symbolically executing a fuzzy tyrant Lojikil.eng.srt
|
83.3 KB
|
Symbolically executing a fuzzy tyrant Lojikil.mp4
|
45.1 MB
|
The Importance of IT Asset Visibility Brian Berk.eng.srt
|
35.5 KB
|
The Importance of IT Asset Visibility Brian Berk.mp4
|
22.1 MB
|
The Importance of Relevant Timely and Qualitative Intelligence Analysis Aamil AK.mp4
|
21.7 MB
|
The Past Present Future of Cyber Threats Chris Russell.eng.srt
|
45.4 KB
|
The Past Present Future of Cyber Threats Chris Russell.mp4
|
27.3 MB
|
The Science of Breaking and Entering Alissa dnsprincess.eng.srt
|
99.8 KB
|
The Science of Breaking and Entering Alissa dnsprincess.mp4
|
53.9 MB
|
The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.eng.srt
|
42.5 KB
|
The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.mp4
|
20.1 MB
|
Understanding how public places introduce additional risks to business Len Noe.eng.srt
|
85.1 KB
|
Understanding how public places introduce additional risks to business Len Noe.mp4
|
59.2 MB
|
Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.eng.srt
|
101.8 KB
|
Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.mp4
|
51.8 MB
|
Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.eng.srt
|
52.8 KB
|
Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.mp4
|
21.7 MB
|
Want to Play a Game John DeRyke.eng.srt
|
42.7 KB
|
Want to Play a Game John DeRyke.mp4
|
19.2 MB
|
What Are We Doing Here Rethinking Security Jeff Man.eng.srt
|
90.4 KB
|
What Are We Doing Here Rethinking Security Jeff Man.mp4
|
49.8 MB
|
bonus talk Ryan Wisniewski.eng.srt
|
48.4 KB
|
bonus talk Ryan Wisniewski.mp4
|
26.9 MB
|
/
|
GrrCON Logo.png
|
301.1 KB
|
GrrCON thank you.txt
|
1.6 KB
|
Total files 562
|