FileMood

Download GrrCON

GrrCON

Name

GrrCON

  DOWNLOAD Copy Link

Total Size

13.4 GB

Total Files

562

Last Seen

2025-02-17 02:31

Hash

2D2CA71604D663979086866E2BFB8D6037848DF7

/GrrCON 2011/

AlgoSec.mp4

23.4 MB

AlgoSec.srt

23.2 KB

Blinkie Lights Network Monitoring with Arduino - Steve Ocepek.mp4

47.2 MB

Blinkie Lights Network Monitoring with Arduino - Steve Ocepek.srt

48.0 KB

Characteristics of a Highly-Effective Information Security Executive - Bob West.mp4

42.2 MB

Characteristics of a Highly-Effective Information Security Executive - Bob West.srt

48.8 KB

Chris Roberts - Planes, Trains and Automobiles.mp4

29.5 MB

Chris Roberts - Planes, Trains and Automobiles.srt

36.6 KB

Cyber Vigilantes - Rob Rachwald.mp4

29.6 MB

Cyber Vigilantes - Rob Rachwald.srt

27.3 KB

Dear Pentesters, Get Bent - Duncan Manuts.mp4

37.7 MB

Dear Pentesters, Get Bent - Duncan Manuts.srt

45.3 KB

Defcon CTF-Why even Losers Always Win - Jarod DeMott.mp4

27.5 MB

Defcon CTF-Why even Losers Always Win - Jarod DeMott.srt

23.7 KB

Dispelling Cloud Security Hype - Johnathan Norman.mp4

29.4 MB

Dispelling Cloud Security Hype - Johnathan Norman.srt

30.7 KB

Hacking Trust Steven Fox.mp4

26.6 MB

Hacking Trust Steven Fox.srt

12.1 KB

Hook, Line and Syncer - A Liar for Hire s Ultimate Tackle Box Chris Silvers & Pat McCoy.mp4

47.6 MB

How asteroids falling from the sky improve security - J Wolfgang Goerlich.mp4

38.2 MB

How asteroids falling from the sky improve security - J Wolfgang Goerlich.srt

35.5 KB

Hunting Hackers Tim Crothers.mp4

34.6 MB

Hunting Hackers Tim Crothers.srt

50.8 KB

It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.mp4

51.0 MB

It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.srt

72.5 KB

Kernel Fun - Jon Oberheide.mp4

44.5 MB

Kernel Fun - Jon Oberheide.srt

27.9 KB

Legal Perspectives on Data Breaches - Carol Romej.mp4

29.3 MB

Legal Perspectives on Data Breaches - Carol Romej.srt

32.2 KB

Mike Kemp - When I grow up I want to be a cyber terrorist.mp4

48.7 MB

Mobile App Moolah - Profit taking with Mobile Malware - Jimmy Shah.mp4

41.6 MB

Mobile App Moolah - Profit taking with Mobile Malware - Jimmy Shah.srt

20.9 KB

Panel Discussion - Cloud Data Security and Privacy - How to leverage the Cloud safely.mp4

46.6 MB

Panel Discussion - Cloud Data Security and Privacy - How to leverage the Cloud safely.srt

61.3 KB

SmartMeters - Are they a gateway drug - Robert Former.mp4

53.2 MB

SmartMeters - Are they a gateway drug - Robert Former.srt

61.5 KB

The future of Authenticity - Moxie Marlinspike.mp4

49.2 MB

The future of Authenticity - Moxie Marlinspike.srt

44.2 KB

ZeuS - Inside Command and Control Adam Johnson.mp4

45.6 MB

ZeuS - Inside Command and Control Adam Johnson.srt

38.5 KB

[Least] resistance is [anything but] futile Tim Maletic.mp4

48.9 MB

[Least] resistance is [anything but] futile Tim Maletic.srt

48.1 KB

sploit me if u can - atlas 0f d00m.mp4

49.0 MB

sploit me if u can - atlas 0f d00m.srt

35.5 KB

/GrrCON 2012/

Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.mp4

65.0 MB

Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.srt

73.2 KB

Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).mp4

22.6 MB

Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).srt

39.0 KB

Alexander Chaveriat - I Think Therefore I PwN.mp4

51.4 MB

Alexander Chaveriat - I Think Therefore I PwN.srt

38.5 KB

Amol Sarwate - SCADA Security.mp4

57.2 MB

Amol Sarwate - SCADA Security.srt

78.3 KB

Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.mp4

56.4 MB

Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.srt

68.9 KB

Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.mp4

19.1 MB

Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.srt

30.9 KB

Chris Roberts - By Land, By Sea, By Air.mp4

63.8 MB

Chris Roberts - By Land, By Sea, By Air.srt

83.2 KB

Chris Silvers - Go with the Flow - Strategies for Successful Social Engineering.mp4

55.0 MB

Chris Silvers - Go with the Flow - Strategies for Successful Social Engineering.srt

78.1 KB

Christopher Elisan - Threat Ecosystem.mp4

47.7 MB

Christopher Elisan - Threat Ecosystem.srt

62.5 KB

Daniel Gregory - Securing & Managing Mobile Devices in the workplace.mp4

30.1 MB

Daniel Gregory - Securing & Managing Mobile Devices in the workplace.srt

49.4 KB

Daniel Lohrman - Why Security Professionals Fail.mp4

53.2 MB

Daniel Lohrman - Why Security Professionals Fail.srt

75.2 KB

David HealWHans Schwartzberg - iOS Hash Cracking.mp4

62.2 MB

David HealWHans Schwartzberg - iOS Hash Cracking.srt

64.5 KB

Duncan Manuts - Certify Manuts.mp4

64.2 MB

Duncan Manuts - Certify Manuts.srt

97.4 KB

Gary McCully & David Sopata - Hacking PCI Requ.mp4

51.8 MB

Gary McCully & David Sopata - Hacking PCI Requ.srt

68.7 KB

J Wolfgang Goerlich- Punch Counter Punch with.mp4

60.0 MB

J Wolfgang Goerlich- Punch Counter Punch with.srt

58.9 KB

Jack Wink - XSS Session Fixation.mp4

17.0 MB

Jack Wink - XSS Session Fixation.srt

25.6 KB

Jared DeMott - Stop ROP and Roll.mp4

79.3 MB

Jim Rennie - Law of Internet Scanning.mp4

59.4 MB

Jim Rennie - Law of Internet Scanning.srt

84.0 KB

Jimmy Shah - Advances in Android Malware.mp4

65.4 MB

Jimmy Shah - Advances in Android Malware.srt

84.7 KB

Jonathan Deutsch - Facebook and You.mp4

37.2 MB

Jonathan Deutsch - Facebook and You.srt

45.9 KB

Larry Holland & Hal Charnley - The Killer is Already in Your House.mp4

22.4 MB

Larry Holland & Hal Charnley - The Killer is Already in Your House.srt

34.4 KB

Louise Popyck - Simplifying Data Center Security and Compliance.mp4

44.8 MB

Louise Popyck - Simplifying Data Center Security and Compliance.srt

23.8 KB

Mark Ehr - Security Intellligence.mp4

55.9 MB

Mark Ehr - Security Intellligence.srt

89.1 KB

Matt Johnson - Powershell - Be a Cool Blue Kid.mp4

47.1 MB

Matt Johnson - Powershell - Be a Cool Blue Kid.srt

50.8 KB

Mike Kemp - Everything Old is New Again.mp4

79.5 MB

Mike Kemp - Everything Old is New Again.srt

109.2 KB

Nick Percoco - Mobile Attacks - What will the future bring.mp4

52.6 MB

Nick Percoco - Mobile Attacks - What will the future bring.srt

91.6 KB

Philip Polstra - Battery Powered Pentesting and Forensics.mp4

55.1 MB

Philip Polstra - Battery Powered Pentesting and Forensics.srt

70.5 KB

Rafal Los- House of Cards.mp4

52.4 MB

Rafal Los- House of Cards.srt

77.7 KB

Raymond Lily - OSINT Footprinting.mp4

57.8 MB

Raymond Lily - OSINT Footprinting.srt

68.2 KB

Richard Stiennon - Cyber Defense.mp4

53.7 MB

Richard Stiennon - Cyber Defense.srt

80.0 KB

Robert Rowley - Juice Jacking.mp4

31.4 MB

Robert Rowley - Juice Jacking.srt

44.5 KB

Scott Thomas - InfoSec Flameout.mp4

14.9 MB

Scott Thomas - InfoSec Flameout.srt

25.4 KB

Steve F. Fox - From Obstacle to Ally - Repositioning the Security Team.mp4

55.5 MB

Taylor Ettema - Modern Malware.mp4

45.8 MB

Taylor Ettema - Modern Malware.srt

67.2 KB

Thomas Richards - Android in the Healthcare Workplace.mp4

24.2 MB

Thomas Richards - Android in the Healthcare Workplace.srt

36.7 KB

Tom Clare - 7 Stages of Advanced Threats.mp4

26.5 MB

Tom Clare - 7 Stages of Advanced Threats.srt

42.7 KB

William Tarkington - Psychological Tricks of the Social Engineer.mp4

64.8 MB

William Tarkington - Psychological Tricks of the Social Engineer.srt

79.0 KB

atlas of doom- GHz or Bust.mp4

62.8 MB

atlas of doom- GHz or Bust.srt

73.3 KB

dam Ely- Hack The Cloud.mp4

78.0 MB

dam Ely- Hack The Cloud.srt

97.6 KB

tlas of d00m subbing for Kevin Johnson- Tactical SecOps.mp4

46.9 MB

/GrrCON 2013/

Beautiful Models - J Wolfgang Goerlich.mp4

62.3 MB

Beautiful Models - J Wolfgang Goerlich.srt

31.4 KB

Burning the Enterprise with BYOD - Georgia Weidman.mp4

82.3 MB

David Schwartzberg- Zeus C&C for Tech Support.mp4

53.1 MB

David Schwartzberg- Zeus C&C for Tech Support.srt

9.1 KB

Hacker History - This Stuff Matters - Duncan Manuts.mp4

49.7 MB

Hacking Giveaways, Contests, and Polls for Fun and Profit - Matthew Bryant.mp4

67.6 MB

Hacking Giveaways, Contests, and Polls for Fun and Profit - Matthew Bryant.srt

43.3 KB

Mark Stanislav - Core Linux Security - 0-Day Isn t Everything.mp4

46.6 MB

Pwnage from the Skies - Philip Polstra.mp4

57.3 MB

Pwnage from the Skies - Philip Polstra.srt

31.8 KB

Security Counterknowledge - Mike Kemp.mp4

76.8 MB

The Science of Security Automation - Paul Cochran & Toni Buhrke.mp4

59.3 MB

The Science of Security Automation - Paul Cochran & Toni Buhrke.srt

35.3 KB

What s - Context - got to do with it - Arron Finnon.mp4

74.7 MB

What s - Context - got to do with it - Arron Finnon.srt

41.6 KB

atlas of d00m - TBA.mp4

53.7 MB

atlas of d00m - TBA.srt

14.9 KB

/GrrCON 2014/

Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.mp4

39.8 MB

Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.srt

76.2 KB

Application Pen Testing Chris Pfoutz.mp4

40.2 MB

Are you a janitor or a cleaner John ageekspeeda Stauffacher Matthew Mattrix Hoy.mp4

37.1 MB

Autonomous Remote Hacking Drones Dr Phil Polstra.mp4

44.0 MB

Bigger Boys Made Us Mike Kemp.mp4

60.6 MB

BioHacking Becoming the Best Me I Can Be Leonard.mp4

33.4 MB

Board Breaking Challenge.mp4

22.8 MB

Breach Stains Matt The Streaker Johnson.mp4

38.8 MB

Cyber Security Incidents Red Blue Team Unc13 Fuck3r.mp4

18.9 MB

Finuxs Historical Tour Of IDS Evasion Insertions and Other Odditie Arron Finux Finnon.mp4

59.3 MB

Full Douchesclosure Duncan Manuts.mp4

43.1 MB

GrrCon TAP.mp4

14.4 MB

Grrcon 2014 closing.mp4

23.5 MB

Hack the Hustle Career Strategies For Information Security Professionals Eve Adams.mp4

40.2 MB

Hackers Are People Too Infosystir.mp4

32.8 MB

Home Grown Linux Phil Polstra.mp4

30.6 MB

How to budget IDSs Brian Arcane Heitzman.mp4

21.9 MB

Intelligence Driven Security Shane Harsch.mp4

33.2 MB

Intelligence Driven Security Shane Harsch.srt

55.5 KB

LEVIATHAN Command and Control Communications on Planet Earth Kevin Thompson.mp4

22.5 MB

OAuth20 a Itas the Implementation Stupid Tony Miller.mp4

50.3 MB

PCI and Crypto The Good The Bad and The Frankly Ugly Robert Formera.mp4

30.7 MB

Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.mp4

35.3 MB

Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.srt

52.9 KB

Red Teaming Back and Forth 5ever FuzzyNop.mp4

43.2 MB

Red Teaming Back and Forth 5ever FuzzyNop.srt

68.3 KB

Security On The Cheap Joel Cardella.mp4

44.2 MB

Security for the People End User Authentication Security on the Internet Mark Stanislav.mp4

32.0 MB

The Challenge of Natural Security Systems Rockie Brockway.mp4

40.9 MB

Vaccinating APKs Milan Gabor.mp4

49.8 MB

Vaccinating APKs Milan Gabor.srt

67.1 KB

Vulnerable By Design a The Backdoor That Came Through the Front Matthew mandatory Bryant.mp4

25.4 MB

ZitMo NoM David HealWHans Schwartzberg.mp4

44.5 MB

/GrrCON 2015/

Adding 10 Security to Your Scrum Agile Environment tehEx0dus.mp4

20.4 MB

Adding 10 Security to Your Scrum Agile Environment tehEx0dus.srt

25.2 KB

Application Recon The Lost Art Tony Miller.mp4

35.2 MB

Application Recon The Lost Art Tony Miller.srt

64.1 KB

Backdooring Git John Menerick.mp4

37.1 MB

Backdooring Git John Menerick.srt

44.1 KB

Breaking in Bad Im The One Who Doesnt Knock jayson Street.mp4

51.6 MB

Breaking in Bad Im The One Who Doesnt Knock jayson Street.srt

74.3 KB

Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.mp4

20.3 MB

Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.srt

28.9 KB

But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.mp4

54.0 MB

But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.srt

58.3 KB

Can you patch a cloud Scott Thomas.srt

53.8 KB

Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.mp4

49.5 MB

Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.srt

70.2 KB

Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.mp4

23.5 MB

Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.srt

29.0 KB

Footprints of This Years Top Attack Vectors Kerstyn Clover.mp4

49.9 MB

Hacking the Next Generation HealWHans.mp4

31.9 MB

Hacking the Next Generation HealWHans.srt

58.0 KB

Harness the Force for Better Penetration Testing Patrick Fussell.mp4

13.8 MB

Harness the Force for Better Penetration Testing Patrick Fussell.srt

25.3 KB

Hello GrrCON.mp4

3.6 MB

Honeypots for Active Defense Greg Foss.mp4

49.2 MB

Honeypots for Active Defense Greg Foss.srt

76.4 KB

How I Got Network Creds Without Even Asking A Social Engineering Case Study J.mp4

19.9 MB

How I Got Network Creds Without Even Asking A Social Engineering Case Study J.srt

26.7 KB

How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.mp4

22.3 MB

How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.srt

32.7 KB

Is it EVIL Chaoticflaws.mp4

34.9 MB

Is it EVIL Chaoticflaws.srt

46.1 KB

No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.mp4

38.8 MB

No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.srt

62.4 KB

Path Well Traveled Common Mistakes with SIEM Nick Jacob.mp4

32.9 MB

Path Well Traveled Common Mistakes with SIEM Nick Jacob.srt

46.5 KB

Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.mp4

43.7 MB

Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.srt

53.6 KB

Poking The Bear Mike Kemp.mp4

63.8 MB

Process The Salvation of Incident Response Charles Herring.mp4

17.1 MB

Process The Salvation of Incident Response Charles Herring.srt

27.4 KB

Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.mp4

49.3 MB

Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.srt

37.8 KB

Securing Todays Enterprise WAN Andy Mansfield.mp4

28.3 MB

Securing Todays Enterprise WAN Andy Mansfield.srt

31.3 KB

Security Frameworks What was once old is new again Brian Wrozek.mp4

23.2 MB

Security Frameworks What was once old is new again Brian Wrozek.srt

38.4 KB

Security Incident Response Derek Milroy.mp4

48.6 MB

Security Incident Response Derek Milroy.srt

82.4 KB

Shell scripting live Linux Forensics Dr Phil Polstra.mp4

37.5 MB

Shell scripting live Linux Forensics Dr Phil Polstra.srt

48.9 KB

Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.mp4

30.8 MB

Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.srt

32.3 KB

Software Security IWR Thomas G13 Richards.mp4

29.4 MB

Software Security IWR Thomas G13 Richards.srt

61.6 KB

Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.mp4

42.3 MB

Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.srt

48.6 KB

Subject matter to be determined by the number of federal agents present in th.mp4

46.2 MB

Subject matter to be determined by the number of federal agents present in th.srt

52.4 KB

The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.mp4

40.9 MB

The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.srt

82.7 KB

The Hitch Hikers Guide to Information Security Kellman Meghu.mp4

51.7 MB

The Safety You Think You Have is Only a Masquerade Nathan Dragun.mp4

47.2 MB

The Safety You Think You Have is Only a Masquerade Nathan Dragun.srt

67.2 KB

The wrong side of history everything that is old is new again Arron Finnon.mp4

65.5 MB

This Is All Your Fault Duncan Manuts.mp4

37.3 MB

This Is All Your Fault Duncan Manuts.srt

47.3 KB

Ticking me off From Threat Intel to Reversing Juan Cortes.mp4

23.5 MB

Ticking me off From Threat Intel to Reversing Juan Cortes.srt

24.9 KB

Understanding and Improving the Military Cyber Culture Dariusz Mikulski.mp4

17.2 MB

Understanding and Improving the Military Cyber Culture Dariusz Mikulski.srt

32.8 KB

Welcome to the Internet of insecure things Chandler Howell.mp4

18.3 MB

Welcome to the Internet of insecure things Chandler Howell.srt

26.1 KB

What is a cloud access broker and do I need one Tom Doane.mp4

18.9 MB

What is a cloud access broker and do I need one Tom Doane.srt

35.1 KB

Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.mp4

36.0 MB

Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.srt

39.9 KB

/GrrCON 2016/

Abnormal Behavior Detection in Large Environments Dave Kennedy.mp4

51.2 MB

Abnormal Behavior Detection in Large Environments Dave Kennedy.srt

180.3 KB

Act Three The Evolution of Privacy Finux.mp4

41.2 MB

Act Three The Evolution of Privacy Finux.srt

107.3 KB

Alignment of business and IT Security Shane Harsch.mp4

30.3 MB

Alignment of business and IT Security Shane Harsch.srt

99.1 KB

Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.mp4

55.2 MB

Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.srt

171.8 KB

Back to the Future Understanding our future but following the past Kevin Johnson.mp4

46.0 MB

Back to the Future Understanding our future but following the past Kevin Johnson.srt

124.1 KB

Bad Guys Look Just Like You Justin Beard.mp4

20.7 MB

Bad Guys Look Just Like You Justin Beard.srt

49.6 KB

Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.mp4

26.5 MB

Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.srt

67.8 KB

Binary Ninja Jared Demott.mp4

40.8 MB

Binary Ninja Jared Demott.srt

128.8 KB

Breaking Android Apps for Fun and Profit Bill Sempf.mp4

37.1 MB

Breaking Android Apps for Fun and Profit Bill Sempf.srt

130.5 KB

Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.mp4

40.7 MB

Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.srt

147.3 KB

Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.mp4

21.9 MB

Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.srt

57.4 KB

Encryption Mobility Cloud Oh My Bill Harmer.mp4

29.3 MB

Encryption Mobility Cloud Oh My Bill Harmer.srt

89.6 KB

Fighting the Enemy Within Matt Crowe.mp4

17.6 MB

Fighting the Enemy Within Matt Crowe.srt

76.2 KB

Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.mp4

10.7 MB

Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.srt

46.3 KB

Getting to the Root of Advanced Threats Before Impact Josh Fazio.mp4

15.0 MB

Getting to the Root of Advanced Threats Before Impact Josh Fazio.srt

44.1 KB

Guarding Lunch J Wolfgang Goerlich.mp4

47.8 MB

Guarding Lunch J Wolfgang Goerlich.srt

166.3 KB

How Do You Secure What You don't Control Dimitri Vlachos.mp4

19.1 MB

How Do You Secure What You don't Control Dimitri Vlachos.srt

66.3 KB

How to Implement Crypto Poorly Sean Cassidy.mp4

25.9 MB

How to Implement Crypto Poorly Sean Cassidy.srt

94.4 KB

Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.mp4

43.1 MB

Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.srt

116.8 KB

Machine Duping Pwning Deep Learning Systems Clarence Chio.mp4

54.5 MB

Machine Duping Pwning Deep Learning Systems Clarence Chio.srt

127.1 KB

Magnetic Stripes 101 Tyler Keeton.mp4

16.1 MB

Magnetic Stripes 101 Tyler Keeton.srt

37.5 KB

Make STEHM Great Again David HealWHans Schwartzberg.mp4

32.9 MB

Make STEHM Great Again David HealWHans Schwartzberg.srt

120.1 KB

Money Fame Power Build your success as a security professional Nathan Dragun.mp4

38.0 MB

Money Fame Power Build your success as a security professional Nathan Dragun.srt

152.9 KB

On being an Eeyore in Infosec Stefan Edwards.mp4

33.1 MB

On being an Eeyore in Infosec Stefan Edwards.srt

142.2 KB

Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.mp4

23.8 MB

Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.srt

59.3 KB

Phish your employees for fun Kristoffer Marshall.mp4

50.3 MB

Phish your employees for fun Kristoffer Marshall.srt

112.5 KB

Piercing the Air Gap Network Steganography for Everyone John Ventura.mp4

33.3 MB

Piercing the Air Gap Network Steganography for Everyone John Ventura.srt

107.8 KB

Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.mp4

36.9 MB

Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.srt

138.6 KB

Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.mp4

53.0 MB

Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.srt

109.0 KB

Reality Checking Your AppSec Program Darren Meyer.mp4

16.6 MB

Reality Checking Your AppSec Program Darren Meyer.srt

77.4 KB

Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).mp4

44.8 MB

Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).srt

144.6 KB

Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.mp4

44.9 MB

Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.srt

145.5 KB

Secure Dicks Michael Kemp.mp4

42.4 MB

Secure Dicks Michael Kemp.srt

105.3 KB

Securing Trust Defending Against Next generation Attacks John Muirhead Gould.mp4

28.6 MB

Securing Trust Defending Against Next generation Attacks John Muirhead Gould.srt

72.6 KB

Security Guards LOL Brent White Tim Roberts.mp4

49.2 MB

Security Guards LOL Brent White Tim Roberts.srt

159.8 KB

So You Want to Be a Pentester Absolute0x0.mp4

35.1 MB

So You Want to Be a Pentester Absolute0x0.srt

94.7 KB

So Youve Inherited a Security Department Now What Amanda Berlin.mp4

36.7 MB

So Youve Inherited a Security Department Now What Amanda Berlin.srt

105.0 KB

Stop attacking your mothers car Charles Parker II.mp4

27.0 MB

Stop attacking your mothers car Charles Parker II.srt

71.7 KB

Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).mp4

47.8 MB

Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).srt

138.8 KB

Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.mp4

47.8 MB

Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.srt

140.1 KB

Tales from the Cryptanalyst Jeff Man.mp4

47.5 MB

Tales from the Cryptanalyst Jeff Man.srt

132.8 KB

Threat Detection Response with Hipara J Brett Cunningham (2).mp4

34.4 MB

Threat Detection Response with Hipara J Brett Cunningham (2).srt

61.2 KB

Threat Detection Response with Hipara J Brett Cunningham.mp4

34.3 MB

Threat Detection Response with Hipara J Brett Cunningham.srt

61.2 KB

Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.mp4

22.4 MB

Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.srt

66.3 KB

Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.mp4

50.0 MB

Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.srt

131.6 KB

Welcome to The World of Yesterday Tomorrow Joel Cardella.mp4

26.4 MB

Welcome to The World of Yesterday Tomorrow Joel Cardella.srt

154.3 KB

What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.mp4

26.4 MB

What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.srt

68.3 KB

Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.mp4

40.1 MB

Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.srt

121.1 KB

and bad mistakes Ive made a few Jayson Street (only first 30 min or so).mp4

43.7 MB

and bad mistakes Ive made a few Jayson Street (only first 30 min or so).srt

82.8 KB

and bad mistakes Ive made a few Jayson Street.mp4

43.7 MB

and bad mistakes Ive made a few Jayson Street.srt

82.8 KB

still broken after all these years aka utility security for smarties doug nibbelink.mp4

41.9 MB

still broken after all these years aka utility security for smarties doug nibbelink.srt

117.6 KB

/GrrCON 2017/

#TrevorForget with Lintile.mp4

14.1 MB

3rd Party Data Burns Aaron Finux Finnon.mp4

42.4 MB

A GRReat New Way of Thinking about Innovating for Cyber Defense and even Cyber Offense Ernest.mp4

68.0 MB

A Reporters Look at Open Source Intelligence Hilary Louise.mp4

50.9 MB

An Attack Pathway Into Your Organization Reducing risk without reducing operational efficiency.mp4

57.0 MB

An Employee their Laptop and a Hacker walk into a Bar Shannon Fritz.mp4

62.5 MB

Building a Usable Mobile Data Protection Strategy David Heal Schwartzberg.mp4

54.8 MB

Change is Simply an Act of Survival Predicting the future while shackled to the past Bil Har.mp4

34.6 MB

Critical Incident Surviving my first layoff by applying BCPDRP Principles Tom Mead.mp4

34.8 MB

Cyber Cyber Cyber Using the killchain to accomplish something Amanda Berlin.mp4

49.7 MB

Defending The De funded Keith Wilson.mp4

32.1 MB

Dissecting Destructive Malware and Recovering from Catastrophe Bryan York.mp4

31.5 MB

Embedding Security in Embedded Systems Dr Jared DeMott.mp4

53.1 MB

Eye on the Prize a Proposal for Legalizing Hacking Back Adam Hogan.mp4

61.6 MB

Grand Rapids next to GrrCON, high water.mp4

1.1 MB

Hidden Treasure Detecting Intrusions with ETW Zac Brown.mp4

51.2 MB

How do you POC Are you really testing a product Ken Donze.mp4

21.4 MB

Infosec State of Affairs Too much Kim Kardashian not enough Malcolm Gladwel Jim Wojno Dan Ki.mp4

51.9 MB

Infrastructure Based Security Chris Barnes.mp4

49.9 MB

Ive got a Pocket Bone to pick with you Dr Phil Postra.mp4

47.0 MB

Learning from InfoSec Fails - Derek Milroy.mp4

60.2 MB

National Guard for Cyber How about a Volunteer Cyber Department Ray Davidson.mp4

29.9 MB

Oops Was that your pacemaker Charles Parker II.mp4

31.0 MB

Pen Test War Stories Why my job is so easy and how you can make it harder Aaron Herndon.mp4

47.1 MB

Population Control Through The Advances In Technology Chris Roberts part 1.mp4

47.3 MB

ProbeSpy Tracking your past predicting your future stumblebot.mp4

27.7 MB

Real World Red Teaming spartan.mp4

43.0 MB

Realizing Software Security Maturity The Growing Pains Gains Mark Stanislav Kelby Ludwig.mp4

48.6 MB

Red Team Yourself Thomas Richards.mp4

33.6 MB

STRATEGIES ON SECURING YOU BANKS ENTERPRISES FROM SOMEONE WHO ROBS BANKS ENTERPRISES FOR A L.mp4

71.9 MB

Skills For A Red Teamer Brent White Tim Roberts.mp4

58.3 MB

Software Defined Segmentation Matt Hendrickson.mp4

28.7 MB

Tales From The Trenches Practical Information Security Lessons Michael Belton.mp4

44.0 MB

The Black Art of Wireless Post Exploitation Gabriel solstice Ryan.mp4

52.7 MB

The Future of Cyber Security Anthony Sabaj.mp4

49.2 MB

The Shuttle Columbia Disaster Lessons That Were Not Learned Joel I love it when they call me.mp4

60.8 MB

Threat Intelligence Zero to Basics in presentation Chris J.mp4

40.9 MB

Topic depends on number of federal agents in audience Atlas of Doom.mp4

67.6 MB

We got it wrong Wolfgang Goerlich.mp4

53.5 MB

You Got Your SQL Attacks In My Honeypot Andrew Brandt.mp4

27.4 MB

vAp0r and the Blooming Onion Justin Whitehead Jim Allee.mp4

43.4 MB

/GrrCON 2018/

2018 SIEM Trends What is my Mean Time to Value Bill Lampe.eng.srt

118.5 KB

2018 SIEM Trends What is my Mean Time to Value Bill Lampe.mp4

52.4 MB

Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.eng.srt

124.5 KB

Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.mp4

45.2 MB

An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.eng.srt

20.7 KB

An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.mp4

27.6 MB

Analyzing Multi Dimensional Malware Dataset Ankur Tyagi.mp4

42.1 MB

Analyzing Pwned Passwords with Apache Spark Kelley Robinson.eng.srt

126.6 KB

Analyzing Pwned Passwords with Apache Spark Kelley Robinson.mp4

40.8 MB

Automation and Open Source Turning the Tide on Attackers John Grigg.eng.srt

141.3 KB

Automation and Open Source Turning the Tide on Attackers John Grigg.mp4

55.4 MB

Bounty Hunters J Wolfgang Goerlich.eng.srt

138.6 KB

Bounty Hunters J Wolfgang Goerlich.mp4

45.2 MB

Career Risk Management 10 tips to keep you employed Chris Burrows.eng.srt

126.1 KB

Career Risk Management 10 tips to keep you employed Chris Burrows.mp4

51.0 MB

Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.eng.srt

74.1 KB

Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.mp4

27.8 MB

Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.eng.srt

154.0 KB

Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.mp4

56.6 MB

Designing a Cloud Security Blueprint Sarah Elie.eng.srt

90.0 KB

Designing a Cloud Security Blueprint Sarah Elie.mp4

39.4 MB

Dragnet Your Social Engineering Sidekick Truman Kain.eng.srt

55.3 KB

Dragnet Your Social Engineering Sidekick Truman Kain.mp4

19.5 MB

Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.eng.srt

141.9 KB

Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.mp4

54.2 MB

Hacker Tools Compliments of Microsoft David Fletcher Sally Vandeven.eng.srt

105.4 KB

How this 20 Year Old Changed the Security Industry James ONeill.mp4

19.3 MB

How to Conduct a Product Security Test And How it Fits Into the Larger Security St.eng.srt

122.7 KB

How to Conduct a Product Security Test And How it Fits Into the Larger Security St.mp4

34.7 MB

How to rob a bank over the phone Joshua Naga Crumbaugh.eng.srt

122.2 KB

How to rob a bank over the phone Joshua Naga Crumbaugh.mp4

66.7 MB

InSpec Compliance as Code Kent picat Gruber.eng.srt

119.9 KB

InSpec Compliance as Code Kent picat Gruber.mp4

39.8 MB

Keynote Dave Kennedy.eng.srt

155.7 KB

Keynote Dave Kennedy.mp4

51.8 MB

Life Death the Nematodes Long live Cyber Resilience Chad Calease.eng.srt

131.9 KB

Life Death the Nematodes Long live Cyber Resilience Chad Calease.mp4

71.5 MB

Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.eng.srt

125.5 KB

Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.mp4

38.2 MB

More Tales from the CryptAnalyst Jeff Man.eng.srt

142.7 KB

More Tales from the CryptAnalyst Jeff Man.mp4

60.0 MB

My First year in Application Security Whitney Phillips.eng.srt

53.7 KB

My First year in Application Security Whitney Phillips.mp4

31.7 MB

Pacu Attack and Post Exploitation in AWS Spencer Gietzen.eng.srt

58.2 KB

Pacu Attack and Post Exploitation in AWS Spencer Gietzen.mp4

22.7 MB

Physicals Badges and why it matters Alex Fernandez Gatti.eng.srt

75.5 KB

Physicals Badges and why it matters Alex Fernandez Gatti.mp4

34.8 MB

Saving All the Money to Buy All the Booze Learning to Hack All the Things on.eng.srt

99.8 KB

Saving All the Money to Buy All the Booze Learning to Hack All the Things on.mp4

42.5 MB

SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.eng.srt

156.6 KB

SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.mp4

52.3 MB

Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.eng.srt

139.6 KB

Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.mp4

60.0 MB

The Abyss is Waving BackThe four paths that human evolution is charging down a.eng.srt

139.0 KB

The Abyss is Waving BackThe four paths that human evolution is charging down a.mp4

61.1 MB

The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.eng.srt

155.1 KB

The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.mp4

53.4 MB

Threat Hunting the macOS edition Megan Carney.eng.srt

114.4 KB

Threat Hunting the macOS edition Megan Carney.mp4

48.4 MB

Threat Modeling How to actually do it and make it useful Derek Milroy.eng.srt

161.8 KB

Threat Modeling How to actually do it and make it useful Derek Milroy.mp4

59.4 MB

Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.eng.srt

61.2 KB

Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.mp4

28.5 MB

Youre right this talk isnt really about you Jayson E Street.eng.srt

125.3 KB

Youre right this talk isnt really about you Jayson E Street.mp4

49.4 MB

Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.eng.srt

170.0 KB

Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.mp4

60.8 MB

emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.eng.srt

105.7 KB

emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.mp4

71.2 MB

we we Internet Explorer Does What It Wants Aaron Heikkila.eng.srt

54.9 KB

we we Internet Explorer Does What It Wants Aaron Heikkila.mp4

24.4 MB

/GrrCON 2019/

A Day in the Life of a Security Operations Center What do you get when you partner.eng.srt

45.3 KB

A Day in the Life of a Security Operations Center What do you get when you partner.mp4

21.5 MB

A Theme of Fear Hacking the Paradigm Catherine Ullman.eng.srt

89.7 KB

A Theme of Fear Hacking the Paradigm Catherine Ullman.mp4

62.5 MB

Automating Phishing Analysis Kyle Eaton.eng.srt

33.4 KB

Automating Phishing Analysis Kyle Eaton.mp4

16.3 MB

Baselining Behavior Tradecraft through Simulations Dave Kenendy.mp4

52.3 MB

Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.eng.srt

37.2 KB

Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.mp4

25.6 MB

Big Plane Little Plane How common aviation attacks affect airlines and general avia.eng.srt

72.7 KB

Big Plane Little Plane How common aviation attacks affect airlines and general avia.mp4

58.7 MB

Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.eng.srt

59.3 KB

Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.mp4

34.0 MB

Breaking NBAD & UEBA Detection by Charles Herring.eng.srt

59.6 KB

Breaking NBAD & UEBA Detection by Charles Herring.mp4

30.7 MB

Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.eng.srt

38.8 KB

Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.mp4

25.8 MB

Cons Careers SciaticNerd.eng.srt

96.0 KB

Cons Careers SciaticNerd.mp4

49.7 MB

CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.eng.srt

109.7 KB

CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.mp4

62.3 MB

Dance Fancybear Dance a study in macOS Cat Self.eng.srt

88.5 KB

Dance Fancybear Dance a study in macOS Cat Self.mp4

47.5 MB

Data Access Rights Exploits under New Privacy Laws Amber Welch.eng.srt

51.6 KB

Data Access Rights Exploits under New Privacy Laws Amber Welch.mp4

29.5 MB

Data Security How to avoid an embarrassing breach Matt mattrix Hoy.eng.srt

61.3 KB

Data Security How to avoid an embarrassing breach Matt mattrix Hoy.mp4

41.1 MB

Deepfakes If anything can be real then nothing is real April C Wright.eng.srt

89.0 KB

Deepfakes If anything can be real then nothing is real April C Wright.mp4

53.6 MB

Departing Employees Departing Data Todd Thorsen.eng.srt

32.9 KB

Departing Employees Departing Data Todd Thorsen.mp4

21.3 MB

Destroy Everything Tom Somerville.mp4

23.5 MB

Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.eng.srt

36.5 KB

Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.mp4

26.4 MB

From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.eng.srt

102.3 KB

From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.mp4

55.4 MB

Good Cyber Hygiene and using analytics to drive the need for it on Print David Rose.mp4

28.8 MB

Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.eng.srt

48.9 KB

Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.mp4

33.1 MB

Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.eng.srt

79.5 KB

Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.mp4

71.1 MB

Hillbilly Storytime Pentest Fails Adam Compton.eng.srt

55.0 KB

Hillbilly Storytime Pentest Fails Adam Compton.mp4

38.3 MB

Host Hunting on a Budget cyberGoatPsyOps.eng.srt

47.7 KB

Host Hunting on a Budget cyberGoatPsyOps.mp4

27.6 MB

How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.eng.srt

49.5 KB

How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.mp4

32.0 MB

How Nathan Crashed and Burned Nathan Dragun.eng.srt

54.1 KB

How Nathan Crashed and Burned Nathan Dragun.mp4

22.8 MB

How to Make a Honeypot Stickier SSH Jose Hernandez.eng.srt

94.2 KB

How to Make a Honeypot Stickier SSH Jose Hernandez.mp4

54.2 MB

I PWN thee I PWN thee not Jayson Street.eng.srt

89.0 KB

I PWN thee I PWN thee not Jayson Street.mp4

60.3 MB

Keynote Amanda Infosystir Berlin.mp4

55.6 MB

Keynote Rachel Soul Crusher86 G.eng.srt

88.1 KB

Keynote Rachel Soul Crusher86 G.mp4

45.0 MB

MSSPs are greatand other lies I tell myself Scott Thomas.eng.srt

102.0 KB

MSSPs are greatand other lies I tell myself Scott Thomas.mp4

45.0 MB

Malicious Cryptomining is Exploding Are you at risk John Fatten.eng.srt

65.5 KB

Malicious Cryptomining is Exploding Are you at risk John Fatten.mp4

58.0 MB

Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.eng.srt

34.2 KB

Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.mp4

19.4 MB

Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.eng.srt

75.2 KB

Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.mp4

60.9 MB

PSD2 SCA WTF Kelley Robinson.eng.srt

51.0 KB

PSD2 SCA WTF Kelley Robinson.mp4

19.6 MB

QA on our industry and other things that are top of mind Chris Roberts.eng.srt

84.0 KB

QA on our industry and other things that are top of mind Chris Roberts.mp4

61.5 MB

Reverse Engineering Malware for N00bs GregB33fJames.eng.srt

93.2 KB

Reverse Engineering Malware for N00bs GregB33fJames.mp4

61.3 MB

Ssshhhh Atlas of Doom.eng.srt

84.8 KB

Ssshhhh Atlas of Doom.mp4

68.0 MB

Surfing and Security Ride the wave Chris Burrows.eng.srt

52.9 KB

Surfing and Security Ride the wave Chris Burrows.mp4

28.6 MB

Symbolically executing a fuzzy tyrant Lojikil.eng.srt

83.3 KB

Symbolically executing a fuzzy tyrant Lojikil.mp4

45.1 MB

The Importance of IT Asset Visibility Brian Berk.eng.srt

35.5 KB

The Importance of IT Asset Visibility Brian Berk.mp4

22.1 MB

The Importance of Relevant Timely and Qualitative Intelligence Analysis Aamil AK.mp4

21.7 MB

The Past Present Future of Cyber Threats Chris Russell.eng.srt

45.4 KB

The Past Present Future of Cyber Threats Chris Russell.mp4

27.3 MB

The Science of Breaking and Entering Alissa dnsprincess.eng.srt

99.8 KB

The Science of Breaking and Entering Alissa dnsprincess.mp4

53.9 MB

The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.eng.srt

42.5 KB

The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.mp4

20.1 MB

Understanding how public places introduce additional risks to business Len Noe.eng.srt

85.1 KB

Understanding how public places introduce additional risks to business Len Noe.mp4

59.2 MB

Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.eng.srt

101.8 KB

Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.mp4

51.8 MB

Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.eng.srt

52.8 KB

Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.mp4

21.7 MB

Want to Play a Game John DeRyke.eng.srt

42.7 KB

Want to Play a Game John DeRyke.mp4

19.2 MB

What Are We Doing Here Rethinking Security Jeff Man.eng.srt

90.4 KB

What Are We Doing Here Rethinking Security Jeff Man.mp4

49.8 MB

bonus talk Ryan Wisniewski.eng.srt

48.4 KB

bonus talk Ryan Wisniewski.mp4

26.9 MB

/

GrrCON Logo.png

301.1 KB

GrrCON thank you.txt

1.6 KB

 

Total files 562


Copyright © 2025 FileMood.com