FileMood

Download GrrCON

GrrCON

Name

GrrCON

 DOWNLOAD Copy Link

Total Size

26.1 GB

Total Files

561

Hash

D79B10742604E10A070A927A32CDCA1743AB1100

/GrrCON 2011/

GrrCON 11 - Kernel Fun - Jon Oberheide.mp4

133.5 MB

GrrCON 11 - Kernel Fun - Jon Oberheide.srt

27.9 KB

GrrCON 11 AlgoSec.mp4

54.9 MB

GrrCON 11 AlgoSec.srt

23.2 KB

GrrCON 11 Blinkie Lights! Network Monitoring with Arduino - Steve Ocepek.mp4

137.6 MB

GrrCON 11 Blinkie Lights! Network Monitoring with Arduino - Steve Ocepek.srt

48.0 KB

GrrCON 11 Characteristics of a Highly-Effective Information Security Executive - Bob West.mp4

80.5 MB

GrrCON 11 Characteristics of a Highly-Effective Information Security Executive - Bob West.srt

48.8 KB

GrrCON 11 Chris Roberts - Planes, Trains and Automobiles.mp4

118.9 MB

GrrCON 11 Chris Roberts - Planes, Trains and Automobiles.srt

36.6 KB

GrrCON 11 Cyber Vigilantes - Rob Rachwald.mp4

74.0 MB

GrrCON 11 Cyber Vigilantes - Rob Rachwald.srt

27.3 KB

GrrCON 11 Dear Pentesters, Get Bent - Duncan Manuts.mp4

83.0 MB

GrrCON 11 Dear Pentesters, Get Bent - Duncan Manuts.srt

45.3 KB

GrrCON 11 Defcon CTF-Why even Losers Always Win - Jarod DeMott.mp4

62.8 MB

GrrCON 11 Defcon CTF-Why even Losers Always Win - Jarod DeMott.srt

23.7 KB

GrrCON 11 Dispelling Cloud Security Hype - Johnathan Norman.mp4

64.9 MB

GrrCON 11 Dispelling Cloud Security Hype - Johnathan Norman.srt

30.7 KB

GrrCON 11 Hacking Trust Steven Fox.mp4

50.4 MB

GrrCON 11 Hacking Trust Steven Fox.srt

12.1 KB

GrrCON 11 Hook, Line and Syncer A Liar for Hire s Ultimate Tackle Box Chris Silvers & Pat McCoy.mp4

89.8 MB

GrrCON 11 How asteroids falling from the sky improve security - J Wolfgang Goerlich.mp4

97.3 MB

GrrCON 11 How asteroids falling from the sky improve security - J Wolfgang Goerlich.srt

35.5 KB

GrrCON 11 Hunting Hackers Tim Crothers.mp4

100.4 MB

GrrCON 11 Hunting Hackers Tim Crothers.srt

50.8 KB

GrrCON 11 It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.mp4

96.6 MB

GrrCON 11 It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.srt

72.5 KB

GrrCON 11 Legal Perspectives on Data Breaches - Carol Romej.mp4

76.1 MB

GrrCON 11 Legal Perspectives on Data Breaches - Carol Romej.srt

32.2 KB

GrrCON 11 Mike Kemp - When I grow up I want to be a cyber terrorist.mp4

107.4 MB

GrrCON 11 Mobile App Moolah Profit taking with Mobile Malware - Jimmy Shah.mp4

95.6 MB

GrrCON 11 Mobile App Moolah Profit taking with Mobile Malware - Jimmy Shah.srt

20.9 KB

GrrCON 11 Panel Discussion Cloud Data Security and Privacy -- How to leverage the Cloud safely.mp4

88.5 MB

GrrCON 11 Panel Discussion Cloud Data Security and Privacy -- How to leverage the Cloud safely.srt

61.3 KB

GrrCON 11 SmartMeters Are they a gateway drug - Robert Former.mp4

116.8 MB

GrrCON 11 SmartMeters Are they a gateway drug - Robert Former.srt

61.5 KB

GrrCON 11 The future of Authenticity - Moxie Marlinspike.mp4

126.0 MB

GrrCON 11 The future of Authenticity - Moxie Marlinspike.srt

44.2 KB

GrrCON 11 ZeuS -- Inside Command and Control Adam Johnson.mp4

130.9 MB

GrrCON 11 ZeuS -- Inside Command and Control Adam Johnson.srt

38.5 KB

GrrCON 11 [Least] resistance is [anything but] futile Tim Maletic.mp4

109.5 MB

GrrCON 11 [Least] resistance is [anything but] futile Tim Maletic.srt

48.1 KB

GrrCON 11 sploit me if u can - atlas 0f d00m.mp4

93.2 MB

GrrCON 11 sploit me if u can - atlas 0f d00m.srt

35.5 KB

/GrrCON 2012/

GrrCON 2012 - Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).mp4

53.7 MB

GrrCON 2012 - Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).srt

39.0 KB

GrrCON 2012 - Alexander Chaveriat - I Think Therefore I PwN.mp4

158.6 MB

GrrCON 2012 - Alexander Chaveriat - I Think Therefore I PwN.srt

38.5 KB

GrrCON 2012 - Amol Sarwate - SCADA Security.mp4

184.3 MB

GrrCON 2012 - Amol Sarwate - SCADA Security.srt

78.3 KB

GrrCON 2012 - Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.mp4

165.6 MB

GrrCON 2012 - Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.srt

68.9 KB

GrrCON 2012 - Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.mp4

47.2 MB

GrrCON 2012 - Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.srt

30.9 KB

GrrCON 2012 - Chris Roberts - By Land, By Sea, By Air.mp4

224.8 MB

GrrCON 2012 - Chris Roberts - By Land, By Sea, By Air.srt

83.2 KB

GrrCON 2012 - Chris Silvers - Go with the Flow Strategies for Successful Social Engineering.mp4

233.3 MB

GrrCON 2012 - Chris Silvers - Go with the Flow Strategies for Successful Social Engineering.srt

78.1 KB

GrrCON 2012 - Christopher Elisan - Threat Ecosystem.mp4

113.0 MB

GrrCON 2012 - Christopher Elisan - Threat Ecosystem.srt

62.5 KB

GrrCON 2012 - Daniel Gregory - Securing & Managing Mobile Devices in the workplace.mp4

65.5 MB

GrrCON 2012 - Daniel Gregory - Securing & Managing Mobile Devices in the workplace.srt

49.4 KB

GrrCON 2012 - Daniel Lohrman - Why Security Professionals Fail.mp4

120.2 MB

GrrCON 2012 - Daniel Lohrman - Why Security Professionals Fail.srt

75.2 KB

GrrCON 2012 - David HealWHans Schwartzberg - iOS Hash Cracking.mp4

79.2 MB

GrrCON 2012 - David HealWHans Schwartzberg - iOS Hash Cracking.srt

64.5 KB

GrrCON 2012 - Duncan Manuts - Certify Manuts.mp4

94.8 MB

GrrCON 2012 - Duncan Manuts - Certify Manuts.srt

97.4 KB

GrrCON 2012 - Gary McCully & David Sopata - Hacking PCI Requ.mp4

99.2 MB

GrrCON 2012 - Gary McCully & David Sopata - Hacking PCI Requ.srt

68.7 KB

GrrCON 2012 - J Wolfgang Goerlich- Punch Counter Punch with.mp4

115.2 MB

GrrCON 2012 - J Wolfgang Goerlich- Punch Counter Punch with.srt

58.9 KB

GrrCON 2012 - Jack Wink - XSS Session Fixation.mp4

41.0 MB

GrrCON 2012 - Jack Wink - XSS Session Fixation.srt

25.6 KB

GrrCON 2012 - Jared DeMott - Stop! ROP! and Roll!.mp4

197.7 MB

GrrCON 2012 - Jim Rennie - Law of Internet Scanning.mp4

126.2 MB

GrrCON 2012 - Jim Rennie - Law of Internet Scanning.srt

84.0 KB

GrrCON 2012 - Jimmy Shah - Advances in Android Malware.mp4

155.3 MB

GrrCON 2012 - Jimmy Shah - Advances in Android Malware.srt

84.7 KB

GrrCON 2012 - Jonathan Deutsch - Facebook and You.mp4

113.0 MB

GrrCON 2012 - Jonathan Deutsch - Facebook and You.srt

45.9 KB

GrrCON 2012 - Larry Holland & Hal Charnley - The Killer is Already in Your House.mp4

79.1 MB

GrrCON 2012 - Larry Holland & Hal Charnley - The Killer is Already in Your House.srt

34.4 KB

GrrCON 2012 - Louise Popyck - Simplifying Data Center Security and Compliance.mp4

88.7 MB

GrrCON 2012 - Louise Popyck - Simplifying Data Center Security and Compliance.srt

23.8 KB

GrrCON 2012 - Mark Ehr - Security Intellligence.mp4

128.1 MB

GrrCON 2012 - Mark Ehr - Security Intellligence.srt

89.1 KB

GrrCON 2012 - Matt Johnson - Powershell Be a Cool Blue Kid.mp4

160.8 MB

GrrCON 2012 - Matt Johnson - Powershell Be a Cool Blue Kid.srt

50.8 KB

GrrCON 2012 - Mike Kemp - Everything Old is New Again.mp4

159.5 MB

GrrCON 2012 - Mike Kemp - Everything Old is New Again.srt

109.2 KB

GrrCON 2012 - Nick Percoco - Mobile Attacks What will the future bring.mp4

105.8 MB

GrrCON 2012 - Nick Percoco - Mobile Attacks What will the future bring.srt

91.6 KB

GrrCON 2012 - Philip Polstra - Battery Powered Pentesting and Forensics.mp4

485.2 MB

GrrCON 2012 - Philip Polstra - Battery Powered Pentesting and Forensics.srt

70.5 KB

GrrCON 2012 - Rafal Los- House of Cards.mp4

130.0 MB

GrrCON 2012 - Rafal Los- House of Cards.srt

77.7 KB

GrrCON 2012 - Raymond Lily - OSINT Footprinting.mp4

183.3 MB

GrrCON 2012 - Raymond Lily - OSINT Footprinting.srt

68.2 KB

GrrCON 2012 - Richard Stiennon - Cyber Defense.mp4

176.7 MB

GrrCON 2012 - Richard Stiennon - Cyber Defense.srt

80.0 KB

GrrCON 2012 - Robert Rowley - Juice Jacking.mp4

113.9 MB

GrrCON 2012 - Robert Rowley - Juice Jacking.srt

44.5 KB

GrrCON 2012 - Scott Thomas - InfoSec Flameout.mp4

28.4 MB

GrrCON 2012 - Scott Thomas - InfoSec Flameout.srt

25.4 KB

GrrCON 2012 - Steve F. Fox - From Obstacle to Ally Repositioning the Security Team.mp4

105.0 MB

GrrCON 2012 - Taylor Ettema - Modern Malware.mp4

137.7 MB

GrrCON 2012 - Taylor Ettema - Modern Malware.srt

67.2 KB

GrrCON 2012 - Thomas Richards - Android in the Healthcare Workplace.mp4

81.0 MB

GrrCON 2012 - Thomas Richards - Android in the Healthcare Workplace.srt

36.7 KB

GrrCON 2012 - Tom Clare - 7 Stages of Advanced Threats.mp4

54.4 MB

GrrCON 2012 - Tom Clare - 7 Stages of Advanced Threats.srt

42.7 KB

GrrCON 2012 - William Tarkington - Psychological Tricks of the Social Engineer.mp4

102.0 MB

GrrCON 2012 - William Tarkington - Psychological Tricks of the Social Engineer.srt

79.0 KB

GrrCON 2012 - atlas of doom- GHz or Bust.mp4

122.3 MB

GrrCON 2012 - atlas of doom- GHz or Bust.srt

73.3 KB

GrrCON 2012- Adam Ely- Hack The Cloud.mp4

190.5 MB

GrrCON 2012- Adam Ely- Hack The Cloud.srt

97.6 KB

GrrCON 2012- atlas of d00m subbing for Kevin Johnson- Tactical SecOps.mp4

99.4 MB

Grrcon 2012 - Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.mp4

175.6 MB

Grrcon 2012 - Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.srt

73.2 KB

/GrrCON 2013/

GrrCON 2013 - Hacker History This Stuff Matters - Duncan Manuts.mp4

289.2 MB

GrrCON 2013 - Hacking Giveaways, Contests, and Polls for Fun and Profit! - Matthew Bryant.mp4

386.2 MB

GrrCON 2013 - Hacking Giveaways, Contests, and Polls for Fun and Profit! - Matthew Bryant.srt

43.3 KB

GrrCON 2013 - Mark Stanislav - Core Linux Security 0-Day Isn t Everything.mp4

55.9 MB

GrrCON 2013 - Pwnage from the Skies! - Philip Polstra.mp4

341.9 MB

GrrCON 2013 - Pwnage from the Skies! - Philip Polstra.srt

31.8 KB

GrrCON 2013 - Security Counterknowledge - Mike Kemp.mp4

369.0 MB

GrrCON 2013 - The Science of Security Automation - Paul Cochran & Toni Buhrke.mp4

341.8 MB

GrrCON 2013 - The Science of Security Automation - Paul Cochran & Toni Buhrke.srt

35.3 KB

GrrCON 2013 - What s Context got to do with it! - Arron Finnon.mp4

388.3 MB

GrrCON 2013 - What s Context got to do with it! - Arron Finnon.srt

41.6 KB

GrrCON 2013 - atlas of d00m - TBA.mp4

62.6 MB

GrrCON 2013 - atlas of d00m - TBA.srt

14.9 KB

GrrCON 2013 -Burning the Enterprise with BYOD - Georgia Weidman.mp4

419.3 MB

GrrCON 2013- Beautiful Models - J Wolfgang Goerlich.mp4

360.7 MB

GrrCON 2013- Beautiful Models - J Wolfgang Goerlich.srt

31.4 KB

GrrCON 2013- David Schwartzberg- Zeus C&C for Tech Support.mp4

173.5 MB

GrrCON 2013- David Schwartzberg- Zeus C&C for Tech Support.srt

9.1 KB

/GrrCON 2014/

Board Breaking Challenge.mp4

95.7 MB

GrrCon TAP.mp4

45.4 MB

Grrcon 2014 closing.mp4

84.4 MB

b00 Hack the Hustle Career Strategies For Information Security Professionals Eve Adams.mp4

121.1 MB

b01 The Challenge of Natural Security Systems Rockie Brockway.mp4

131.5 MB

b02 Application Pen Testing Chris Pfoutz.mp4

98.6 MB

b03 Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.mp4

97.0 MB

b03 Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.srt

76.2 KB

b04 Security On The Cheap Joel Cardella.mp4

105.2 MB

b05 Home Grown Linux Phil Polstra.mp4

95.2 MB

b06 Cyber Security Incidents Red Blue Team Unc13 Fuck3r.mp4

46.8 MB

s09 How to budget IDSs Brian Arcane Heitzman.mp4

63.2 MB

s10 LEVIATHAN Command and Control Communications on Planet Earth Kevin Thompson.mp4

51.6 MB

s11 Red Teaming Back and Forth 5ever FuzzyNop.mp4

114.0 MB

s11 Red Teaming Back and Forth 5ever FuzzyNop.srt

68.3 KB

s12 Intelligence Driven Security Shane Harsch.mp4

84.3 MB

s13 Security for the People End User Authentication Security on the Internet Mark Stanislav.mp4

80.5 MB

s14 Hackers Are People Too Infosystir.mp4

66.0 MB

s15 Vaccinating APKs Milan Gabor.mp4

119.9 MB

s15 Vaccinating APKs Milan Gabor.srt

67.1 KB

t09 ZitMo NoM David HealWHans Schwartzberg.mp4

110.9 MB

t10 Bigger Boys Made Us Mike Kemp.mp4

151.5 MB

t11 Full Douchesclosure Duncan Manuts.mp4

59.2 MB

t12 Finuxs Historical Tour Of IDS Evasion Insertions and Other Odditie Arron Finux Finnon.mp4

149.7 MB

v05 Autonomous Remote Hacking Drones Dr Phil Polstra.mp4

114.8 MB

v06 Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.mp4

80.5 MB

v06 Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.srt

52.9 KB

v07 BioHacking Becoming the Best Me I Can Be Leonard.mp4

88.9 MB

v08 Vulnerable By Design a The Backdoor That Came Through the Front Matthew mandatory Bryant.mp4

70.5 MB

v09 OAuth20 a Itas the Implementation Stupid Tony Miller.mp4

116.3 MB

v10 Breach Stains Matt The Streaker Johnson.mp4

92.1 MB

v11 Are you a janitor or a cleaner John ageekspeeda Stauffacher Matthew Mattrix Hoy.mp4

103.2 MB

v12 PCI and Crypto The Good The Bad and The Frankly Ugly Robert Formera.mp4

110.9 MB

/GrrCON 2015/

AntiFreeze Hamburger01 Subject matter to be determined by the number of federal agents present in th.mp4

82.8 MB

AntiFreeze Hamburger01 Subject matter to be determined by the number of federal agents present in th.srt

52.4 KB

AntiFreeze Hamburger02 Breaking in Bad Im The One Who Doesnt Knock jayson Street.mp4

81.8 MB

AntiFreeze Hamburger02 Breaking in Bad Im The One Who Doesnt Knock jayson Street.srt

74.3 KB

AntiFreeze Hamburger03 Process The Salvation of Incident Response Charles Herring.mp4

30.6 MB

AntiFreeze Hamburger03 Process The Salvation of Incident Response Charles Herring.srt

27.4 KB

AntiFreeze Hamburger05 But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.mp4

94.5 MB

AntiFreeze Hamburger05 But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.srt

58.3 KB

AntiFreeze Hamburger06 The wrong side of history everything that is old is new again Arron Finnon.mp4

214.1 MB

AntiFreeze Hamburger07 Poking The Bear Mike Kemp.mp4

203.3 MB

AntiFreeze Hamburger08 The Hitch Hikers Guide to Information Security Kellman Meghu.mp4

140.2 MB

AntiFreeze Hamburger09 Backdooring Git John Menerick.mp4

66.7 MB

AntiFreeze Hamburger09 Backdooring Git John Menerick.srt

44.1 KB

AntiFreeze Hamburger10 Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.mp4

71.5 MB

AntiFreeze Hamburger10 Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.srt

48.6 KB

AntiFreeze Hamburger11 Adding 10 Security to Your Scrum Agile Environment tehEx0dus.mp4

33.9 MB

AntiFreeze Hamburger11 Adding 10 Security to Your Scrum Agile Environment tehEx0dus.srt

25.2 KB

AntiFreeze Hamburger12 How I Got Network Creds Without Even Asking A Social Engineering Case Study J.mp4

31.0 MB

AntiFreeze Hamburger12 How I Got Network Creds Without Even Asking A Social Engineering Case Study J.srt

26.7 KB

AntiFreeze Hamburger14 Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.mp4

45.6 MB

AntiFreeze Hamburger14 Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.srt

32.3 KB

AntiFreeze Hamburger16 This Is All Your Fault Duncan Manuts.mp4

62.1 MB

AntiFreeze Hamburger16 This Is All Your Fault Duncan Manuts.srt

47.3 KB

AntiFreeze Hamburger17 The Safety You Think You Have is Only a Masquerade Nathan Dragun.mp4

72.2 MB

AntiFreeze Hamburger17 The Safety You Think You Have is Only a Masquerade Nathan Dragun.srt

67.2 KB

Bumper Massage00 Security Incident Response Derek Milroy.mp4

71.2 MB

Bumper Massage00 Security Incident Response Derek Milroy.srt

82.4 KB

Bumper Massage01 Hacking the Next Generation HealWHans.mp4

57.5 MB

Bumper Massage01 Hacking the Next Generation HealWHans.srt

58.0 KB

Bumper Massage02 Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.mp4

36.7 MB

Bumper Massage02 Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.srt

29.0 KB

Bumper Massage04 Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.mp4

80.1 MB

Bumper Massage04 Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.srt

37.8 KB

Bumper Massage05 Application Recon The Lost Art Tony Miller.mp4

56.3 MB

Bumper Massage05 Application Recon The Lost Art Tony Miller.srt

64.1 KB

Bumper Massage06 The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.mp4

62.2 MB

Bumper Massage06 The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.srt

82.7 KB

Bumper Massage07 Software Security IWR Thomas G13 Richards.mp4

52.8 MB

Bumper Massage07 Software Security IWR Thomas G13 Richards.srt

61.6 KB

Bumper Massage08 Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.mp4

71.4 MB

Bumper Massage08 Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.srt

70.2 KB

Bumper Massage09 Understanding and Improving the Military Cyber Culture Dariusz Mikulski.mp4

30.5 MB

Bumper Massage09 Understanding and Improving the Military Cyber Culture Dariusz Mikulski.srt

32.8 KB

Bumper Massage11 Harness the Force for Better Penetration Testing Patrick Fussell.mp4

22.1 MB

Bumper Massage11 Harness the Force for Better Penetration Testing Patrick Fussell.srt

25.3 KB

Bumper Massage12 Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.mp4

34.7 MB

Bumper Massage12 Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.srt

28.9 KB

Bumper Massage13 Shell scripting live Linux Forensics Dr Phil Polstra.mp4

51.7 MB

Bumper Massage13 Shell scripting live Linux Forensics Dr Phil Polstra.srt

48.9 KB

Bumper Massage14 Can you patch a cloud Scott Thomas.srt

53.8 KB

Bumper Massage16 Is it EVIL Chaoticflaws.mp4

59.6 MB

Bumper Massage16 Is it EVIL Chaoticflaws.srt

46.1 KB

Hello GrrCON.mp4

14.6 MB

Submerssion Therapy00 Ticking me off From Threat Intel to Reversing Juan Cortes.mp4

36.3 MB

Submerssion Therapy00 Ticking me off From Threat Intel to Reversing Juan Cortes.srt

24.9 KB

Submerssion Therapy01 Securing Todays Enterprise WAN Andy Mansfield.mp4

39.0 MB

Submerssion Therapy01 Securing Todays Enterprise WAN Andy Mansfield.srt

31.3 KB

Submerssion Therapy02 Footprints of This Years Top Attack Vectors Kerstyn Clover.mp4

138.4 MB

Submerssion Therapy03 Welcome to the Internet of insecure things Chandler Howell.mp4

24.6 MB

Submerssion Therapy03 Welcome to the Internet of insecure things Chandler Howell.srt

26.1 KB

Submerssion Therapy05 Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.mp4

65.5 MB

Submerssion Therapy05 Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.srt

53.6 KB

Submerssion Therapy06 Path Well Traveled Common Mistakes with SIEM Nick Jacob.mp4

49.8 MB

Submerssion Therapy06 Path Well Traveled Common Mistakes with SIEM Nick Jacob.srt

46.5 KB

Submerssion Therapy08 How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.mp4

33.6 MB

Submerssion Therapy08 How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.srt

32.7 KB

Submerssion Therapy09 What is a cloud access broker and do I need one Tom Doane.mp4

27.0 MB

Submerssion Therapy09 What is a cloud access broker and do I need one Tom Doane.srt

35.1 KB

Submerssion Therapy10 Security Frameworks What was once old is new again Brian Wrozek.mp4

36.7 MB

Submerssion Therapy10 Security Frameworks What was once old is new again Brian Wrozek.srt

38.4 KB

Submerssion Therapy11 Honeypots for Active Defense Greg Foss.mp4

80.9 MB

Submerssion Therapy11 Honeypots for Active Defense Greg Foss.srt

76.4 KB

Submerssion Therapy14 Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.mp4

55.9 MB

Submerssion Therapy14 Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.srt

39.9 KB

Submerssion Therapy15 No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.mp4

57.7 MB

Submerssion Therapy15 No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.srt

62.4 KB

/GrrCON 2016/

100 Act Three The Evolution of Privacy Finux.mp4

72.7 MB

100 Act Three The Evolution of Privacy Finux.srt

107.3 KB

102 Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.mp4

81.5 MB

102 Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.srt

131.6 KB

103 Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.mp4

46.2 MB

103 Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.srt

67.8 KB

105 Abnormal Behavior Detection in Large Environments Dave Kennedy.mp4

95.9 MB

105 Abnormal Behavior Detection in Large Environments Dave Kennedy.srt

180.3 KB

108 Secure Dicks Michael Kemp.mp4

79.2 MB

108 Secure Dicks Michael Kemp.srt

105.3 KB

110 and bad mistakes Ive made a few Jayson Street (only first 30 min or so).mp4

57.6 MB

110 and bad mistakes Ive made a few Jayson Street (only first 30 min or so).srt

82.8 KB

110 and bad mistakes Ive made a few Jayson Street.mp4

57.6 MB

110 and bad mistakes Ive made a few Jayson Street.srt

82.8 KB

111 Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.mp4

62.8 MB

111 Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.srt

138.6 KB

112 Guarding Lunch J Wolfgang Goerlich.mp4

73.2 MB

112 Guarding Lunch J Wolfgang Goerlich.srt

166.3 KB

113 Back to the Future Understanding our future but following the past Kevin Johnson.mp4

67.9 MB

113 Back to the Future Understanding our future but following the past Kevin Johnson.srt

124.1 KB

114 Breaking Android Apps for Fun and Profit Bill Sempf.mp4

62.5 MB

114 Breaking Android Apps for Fun and Profit Bill Sempf.srt

130.5 KB

115 Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.mp4

93.7 MB

115 Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.srt

171.8 KB

116 Security Guards LOL Brent White Tim Roberts.mp4

92.0 MB

116 Security Guards LOL Brent White Tim Roberts.srt

159.8 KB

200 Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.mp4

82.2 MB

200 Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.srt

116.8 KB

201 So You Want to Be a Pentester Absolute0x0.mp4

60.7 MB

201 So You Want to Be a Pentester Absolute0x0.srt

94.7 KB

202 What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.mp4

44.1 MB

202 What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.srt

68.3 KB

203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).mp4

82.2 MB

203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).srt

138.8 KB

203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.mp4

82.5 MB

203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.srt

140.1 KB

204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).mp4

79.3 MB

204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).srt

144.6 KB

204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.mp4

81.8 MB

204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.srt

145.5 KB

205 Threat Detection Response with Hipara J Brett Cunningham (2).mp4

54.4 MB

205 Threat Detection Response with Hipara J Brett Cunningham (2).srt

61.2 KB

205 Threat Detection Response with Hipara J Brett Cunningham.mp4

52.0 MB

205 Threat Detection Response with Hipara J Brett Cunningham.srt

61.2 KB

206 still broken after all these years aka utility security for smarties doug nibbelink.mp4

67.3 MB

206 still broken after all these years aka utility security for smarties doug nibbelink.srt

117.6 KB

207 Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.mp4

85.4 MB

207 Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.srt

109.0 KB

208 Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.mp4

36.0 MB

208 Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.srt

57.4 KB

209 Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.mp4

37.1 MB

209 Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.srt

66.3 KB

210 Encryption Mobility Cloud Oh My Bill Harmer.mp4

44.0 MB

210 Encryption Mobility Cloud Oh My Bill Harmer.srt

89.6 KB

211 Magnetic Stripes 101 Tyler Keeton.mp4

25.9 MB

211 Magnetic Stripes 101 Tyler Keeton.srt

37.5 KB

212 Machine Duping Pwning Deep Learning Systems Clarence Chio.mp4

122.5 MB

212 Machine Duping Pwning Deep Learning Systems Clarence Chio.srt

127.1 KB

213 Money Fame Power Build your success as a security professional Nathan Dragun.mp4

65.2 MB

213 Money Fame Power Build your success as a security professional Nathan Dragun.srt

152.9 KB

214 Tales from the Cryptanalyst Jeff Man.mp4

75.7 MB

214 Tales from the Cryptanalyst Jeff Man.srt

132.8 KB

215 Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.mp4

62.9 MB

215 Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.srt

121.1 KB

216 Binary Ninja Jared Demott.mp4

69.0 MB

216 Binary Ninja Jared Demott.srt

128.8 KB

217 Phish your employees for fun Kristoffer Marshall.mp4

88.1 MB

217 Phish your employees for fun Kristoffer Marshall.srt

112.5 KB

300 Securing Trust Defending Against Next generation Attacks John Muirhead Gould.mp4

45.2 MB

300 Securing Trust Defending Against Next generation Attacks John Muirhead Gould.srt

72.6 KB

302 Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.mp4

21.0 MB

302 Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.srt

46.3 KB

303 Make STEHM Great Again David HealWHans Schwartzberg.mp4

57.8 MB

303 Make STEHM Great Again David HealWHans Schwartzberg.srt

120.1 KB

304 Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.mp4

36.6 MB

304 Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.srt

59.3 KB

305 How Do You Secure What You Dont Control Dimitri Vlachos.mp4

31.2 MB

305 How Do You Secure What You Dont Control Dimitri Vlachos.srt

66.3 KB

306 Fighting the Enemy Within Matt Crowe.mp4

29.5 MB

306 Fighting the Enemy Within Matt Crowe.srt

76.2 KB

307 Getting to the Root of Advanced Threats Before Impact Josh Fazio.mp4

23.2 MB

307 Getting to the Root of Advanced Threats Before Impact Josh Fazio.srt

44.1 KB

308 Bad Guys Look Just Like You Justin Beard.mp4

29.8 MB

308 Bad Guys Look Just Like You Justin Beard.srt

49.6 KB

309 Reality Checking Your AppSec Program Darren Meyer.mp4

33.5 MB

309 Reality Checking Your AppSec Program Darren Meyer.srt

77.4 KB

310 How to Implement Crypto Poorly Sean Cassidy.mp4

41.9 MB

310 How to Implement Crypto Poorly Sean Cassidy.srt

94.4 KB

311 Stop attacking your mothers car Charles Parker II.mp4

43.2 MB

311 Stop attacking your mothers car Charles Parker II.srt

71.7 KB

312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.mp4

63.8 MB

312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.srt

147.3 KB

313 Alignment of business and IT Security Shane Harsch.mp4

49.1 MB

313 Alignment of business and IT Security Shane Harsch.srt

99.1 KB

315 So Youve Inherited a Security Department Now What Amanda Berlin.mp4

52.2 MB

315 So Youve Inherited a Security Department Now What Amanda Berlin.srt

105.0 KB

316 Piercing the Air Gap Network Steganography for Everyone John Ventura.mp4

49.3 MB

316 Piercing the Air Gap Network Steganography for Everyone John Ventura.srt

107.8 KB

317 On being an Eeyore in Infosec Stefan Edwards.mp4

59.8 MB

317 On being an Eeyore in Infosec Stefan Edwards.srt

142.2 KB

318 Welcome to The World of Yesterday Tomorrow Joel Cardella.mp4

52.1 MB

318 Welcome to The World of Yesterday Tomorrow Joel Cardella.srt

154.3 KB

/GrrCON 2017/

#TrevorForget with Lintile.mp4

17.8 MB

Ghast01 STRATEGIES ON SECURING YOU BANKS ENTERPRISES FROM SOMEONE WHO ROBS BANKS ENTERPRISES FOR A L.mp4

92.0 MB

Ghast03 Population Control Through The Advances In Technology Chris Roberts part 1.mp4

76.5 MB

Ghast04 You Got Your SQL Attacks In My Honeypot Andrew Brandt.mp4

40.3 MB

Ghast06 3rd Party Data Burns Aaron Finux Finnon.mp4

62.9 MB

Ghast09 Oops Was that your pacemaker Charles Parker II.mp4

39.3 MB

Ghast12 Realizing Software Security Maturity The Growing Pains Gains Mark Stanislav Kelby Ludwig.mp4

73.1 MB

Ghast13 Cyber Cyber Cyber Using the killchain to accomplish something Amanda Berlin.mp4

68.7 MB

Ghast14 An Employee their Laptop and a Hacker walk into a Bar Shannon Fritz.mp4

83.8 MB

Ghast15 Eye on the Prize a Proposal for Legalizing Hacking Back Adam Hogan.mp4

82.7 MB

Ghast16 Ive got a Pocket Bone to pick with you Dr Phil Postra.mp4

51.4 MB

Gig00 Topic depends on number of federal agents in audience Atlas of Doom.mp4

103.1 MB

Gig01 Embedding Security in Embedded Systems Dr Jared DeMott.mp4

83.1 MB

Gig02 National Guard for Cyber How about a Volunteer Cyber Department Ray Davidson.mp4

42.9 MB

Gig03 Red Team Yourself Thomas Richards.mp4

45.8 MB

Gig04 An Attack Pathway Into Your Organization Reducing risk without reducing operational efficiency.mp4

77.5 MB

Gig05 Pen Test War Stories Why my job is so easy and how you can make it harder Aaron Herndon.mp4

59.9 MB

Gig06 Skills For A Red Teamer Brent White Tim Roberts.mp4

88.3 MB

Gig07 ProbeSpy Tracking your past predicting your future stumblebot.mp4

35.2 MB

Gig08 vAp0r and the Blooming Onion Justin Whitehead Jim Allee.mp4

60.8 MB

Gig09 A GRReat New Way of Thinking about Innovating for Cyber Defense and even Cyber Offense Ernest.mp4

103.2 MB

Gig10 Threat Intelligence Zero to Basics in presentation Chris J.mp4

59.9 MB

Gig12 Learning from InfoSec Fails - Derek Milroy.mp4

84.1 MB

Gig13 A Reporters Look at Open Source Intelligence Hilary Louise.mp4

65.7 MB

Gig14 Hidden Treasure Detecting Intrusions with ETW Zac Brown.mp4

66.7 MB

Gig15 The Black Art of Wireless Post Exploitation Gabriel solstice Ryan.mp4

79.0 MB

Grand Rapids next to GrrCON, high water.mp4

986.2 KB

Mi Go00 Change is Simply an Act of Survival Predicting the future while shackled to the past Bil Har.mp4

43.8 MB

Mi Go01 Dissecting Destructive Malware and Recovering from Catastrophe Bryan York.mp4

46.4 MB

Mi Go02 Infosec State of Affairs Too much Kim Kardashian not enough Malcolm Gladwel Jim Wojno Dan Ki.mp4

62.6 MB

Mi Go03 How do you POC Are you really testing a product Ken Donze.mp4

28.8 MB

Mi Go04 Tales From The Trenches Practical Information Security Lessons Michael Belton.mp4

62.8 MB

Mi Go06 The Future of Cyber Security Anthony Sabaj.mp4

72.2 MB

Mi Go07 Building a Usable Mobile Data Protection Strategy David Heal Schwartzberg.mp4

76.1 MB

Mi Go08 Software Defined Segmentation Matt Hendrickson.mp4

32.8 MB

Mi Go10 The Shuttle Columbia Disaster Lessons That Were Not Learned Joel I love it when they call me.mp4

73.3 MB

Mi Go11 Infrastructure Based Security Chris Barnes.mp4

61.6 MB

Mi Go12 Defending The De funded Keith Wilson.mp4

49.6 MB

Mi Go13 Real World Red Teaming spartan.mp4

60.1 MB

Mi Go14 We got it wrong Wolfgang Goerlich.mp4

85.0 MB

Mi Go15 Critical Incident Surviving my first layoff by applying BCPDRP Principles Tom Mead.mp4

50.0 MB

/GrrCON 2018/

GrrCon 2018 Ada00 How to Conduct a Product Security Test And How it Fits Into the Larger Security St.en.transcribed.srt

122.7 KB

GrrCon 2018 Ada00 How to Conduct a Product Security Test And How it Fits Into the Larger Security St.mp4

32.1 MB

GrrCon 2018 Ada02 Designing a Cloud Security Blueprint Sarah Elie.en.transcribed.srt

90.0 KB

GrrCon 2018 Ada02 Designing a Cloud Security Blueprint Sarah Elie.mp4

33.5 MB

GrrCon 2018 Ada05 Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.en.transcribed.srt

170.0 KB

GrrCon 2018 Ada05 Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.mp4

54.1 MB

GrrCon 2018 Ada06 Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.en.transcribed.srt

125.5 KB

GrrCon 2018 Ada06 Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.mp4

36.3 MB

GrrCon 2018 Ada08 emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.en.transcribed.srt

105.7 KB

GrrCon 2018 Ada08 emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.mp4

67.9 MB

GrrCon 2018 Ada10 SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.en.transcribed.srt

156.6 KB

GrrCon 2018 Ada10 SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.mp4

45.3 MB

GrrCon 2018 Ada11 Threat Hunting the macOS edition Megan Carney.en.transcribed.srt

114.4 KB

GrrCon 2018 Ada11 Threat Hunting the macOS edition Megan Carney.mp4

42.7 MB

GrrCon 2018 Ada12 The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.en.transcribed.srt

155.1 KB

GrrCon 2018 Ada12 The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.mp4

47.6 MB

GrrCon 2018 Ada13 Dragnet Your Social Engineering Sidekick Truman Kain.en.transcribed.srt

55.3 KB

GrrCon 2018 Ada13 Dragnet Your Social Engineering Sidekick Truman Kain.mp4

16.5 MB

GrrCon 2018 Ada15 Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.en.transcribed.srt

141.9 KB

GrrCon 2018 Ada15 Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.mp4

50.2 MB

GrrCon 2018 Ada16 Threat Modeling How to actually do it and make it useful Derek Milroy.en.transcribed.srt

161.8 KB

GrrCon 2018 Ada16 Threat Modeling How to actually do it and make it useful Derek Milroy.mp4

56.1 MB

GrrCon 2018 Augusta00 Keynote Dave Kennedy.en.transcribed.srt

155.7 KB

GrrCon 2018 Augusta00 Keynote Dave Kennedy.mp4

53.3 MB

GrrCon 2018 Augusta01 An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.en.transcribed.srt

20.7 KB

GrrCon 2018 Augusta01 An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.mp4

25.9 MB

GrrCon 2018 Augusta03 The Abyss is Waving BackThe four paths that human evolution is charging down a.en.transcribed.srt

139.0 KB

GrrCon 2018 Augusta03 The Abyss is Waving BackThe four paths that human evolution is charging down a.mp4

58.1 MB

GrrCon 2018 Augusta04 Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.en.transcribed.srt

74.1 KB

GrrCon 2018 Augusta04 Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.mp4

24.2 MB

GrrCon 2018 Augusta06 Youre right this talk isnt really about you Jayson E Street.en.transcribed.srt

125.3 KB

GrrCon 2018 Augusta06 Youre right this talk isnt really about you Jayson E Street.mp4

42.9 MB

GrrCon 2018 Augusta07 Analyzing Pwned Passwords with Apache Spark Kelley Robinson.en.transcribed.srt

126.6 KB

GrrCon 2018 Augusta07 Analyzing Pwned Passwords with Apache Spark Kelley Robinson.mp4

37.7 MB

GrrCon 2018 Augusta08 How to rob a bank over the phone Joshua Naga Crumbaugh.en.transcribed.srt

122.2 KB

GrrCon 2018 Augusta08 How to rob a bank over the phone Joshua Naga Crumbaugh.mp4

58.0 MB

GrrCon 2018 Augusta09 Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.en.transcribed.srt

61.2 KB

GrrCon 2018 Augusta09 Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.mp4

24.1 MB

GrrCon 2018 Augusta13 Life Death the Nematodes Long live Cyber Resilience Chad Calease.en.transcribed.srt

131.9 KB

GrrCon 2018 Augusta13 Life Death the Nematodes Long live Cyber Resilience Chad Calease.mp4

68.6 MB

GrrCon 2018 Augusta14 Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.en.transcribed.srt

154.0 KB

GrrCon 2018 Augusta14 Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.mp4

51.8 MB

GrrCon 2018 Augusta15 Automation and Open Source Turning the Tide on Attackers John Grigg.en.transcribed.srt

141.3 KB

GrrCon 2018 Augusta15 Automation and Open Source Turning the Tide on Attackers John Grigg.mp4

49.3 MB

GrrCon 2018 Augusta16 we we Internet Explorer Does What It Wants Aaron Heikkila.en.transcribed.srt

54.9 KB

GrrCon 2018 Augusta16 we we Internet Explorer Does What It Wants Aaron Heikkila.mp4

23.5 MB

GrrCon 2018 Augusta17 Pacu Attack and Post Exploitation in AWS Spencer Gietzen.en.transcribed.srt

58.2 KB

GrrCon 2018 Augusta17 Pacu Attack and Post Exploitation in AWS Spencer Gietzen.mp4

22.6 MB

GrrCon 2018 Augusta19 Hacker Tools Compliments of Microsoft David Fletcher Sally Vandeven.en.transcribed.srt

105.4 KB

GrrCon 2018 Lovelace01 How this 20 Year Old Changed the Security Industry James ONeill.mp4

22.5 MB

GrrCon 2018 Lovelace02 Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.en.transcribed.srt

139.6 KB

GrrCon 2018 Lovelace02 Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.mp4

62.2 MB

GrrCon 2018 Lovelace04 2018 SIEM Trends What is my Mean Time to Value Bill Lampe.en.transcribed.srt

118.5 KB

GrrCon 2018 Lovelace04 2018 SIEM Trends What is my Mean Time to Value Bill Lampe.mp4

50.7 MB

GrrCon 2018 Lovelace05 Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.en.transcribed.srt

124.5 KB

GrrCon 2018 Lovelace05 Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.mp4

41.0 MB

GrrCon 2018 Lovelace06 More Tales from the CryptAnalyst Jeff Man.en.transcribed.srt

142.7 KB

GrrCon 2018 Lovelace06 More Tales from the CryptAnalyst Jeff Man.mp4

57.4 MB

GrrCon 2018 Lovelace07 My First year in Application Security Whitney Phillips.en.transcribed.srt

53.7 KB

GrrCon 2018 Lovelace07 My First year in Application Security Whitney Phillips.mp4

34.5 MB

GrrCon 2018 Lovelace09 Career Risk Management 10 tips to keep you employed Chris Burrows.en.transcribed.srt

126.1 KB

GrrCon 2018 Lovelace09 Career Risk Management 10 tips to keep you employed Chris Burrows.mp4

48.1 MB

GrrCon 2018 Lovelace11 Saving All the Money to Buy All the Booze Learning to Hack All the Things on.en.transcribed.srt

99.8 KB

GrrCon 2018 Lovelace11 Saving All the Money to Buy All the Booze Learning to Hack All the Things on.mp4

37.1 MB

GrrCon 2018 Lovelace12 Analyzing Multi Dimensional Malware Dataset Ankur Tyagi.mp4

38.6 MB

GrrCon 2018 Lovelace13 Physicals Badges and why it matters Alex Fernandez Gatti.en.transcribed.srt

75.5 KB

GrrCon 2018 Lovelace13 Physicals Badges and why it matters Alex Fernandez Gatti.mp4

37.3 MB

GrrCon 2018 Lovelace15 InSpec Compliance as Code Kent picat Gruber.en.transcribed.srt

119.9 KB

GrrCon 2018 Lovelace15 InSpec Compliance as Code Kent picat Gruber.mp4

51.8 MB

GrrCon 2018 Lovelace16 Bounty Hunters J Wolfgang Goerlich.en.transcribed.srt

138.6 KB

GrrCon 2018 Lovelace16 Bounty Hunters J Wolfgang Goerlich.mp4

45.8 MB

/GrrCON 2019/

GrrCON 19 3 19 Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.en.transcribed.srt

75.2 KB

GrrCON 19 3 19 Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.mp4

82.4 MB

GrrCON 2019 1 01 Keynote Amanda Infosystir Berlin.mp4

82.0 MB

GrrCON 2019 1 02 Baselining Behavior Tradecraft through Simulations Dave Kenendy.mp4

67.5 MB

GrrCON 2019 1 03 I PWN thee I PWN thee not Jayson Street.en.transcribed.srt

89.0 KB

GrrCON 2019 1 03 I PWN thee I PWN thee not Jayson Street.mp4

79.9 MB

GrrCON 2019 1 04 Automating Phishing Analysis Kyle Eaton.en.transcribed.srt

33.4 KB

GrrCON 2019 1 04 Automating Phishing Analysis Kyle Eaton.mp4

35.8 MB

GrrCON 2019 1 05 Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.en.transcribed.srt

59.3 KB

GrrCON 2019 1 05 Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.mp4

45.4 MB

GrrCON 2019 1 06 Ssshhhh Atlas of Doom.en.transcribed.srt

84.8 KB

GrrCON 2019 1 06 Ssshhhh Atlas of Doom.mp4

90.0 MB

GrrCON 2019 1 07 How Nathan Crashed and Burned Nathan Dragun.en.transcribed.srt

54.1 KB

GrrCON 2019 1 07 How Nathan Crashed and Burned Nathan Dragun.mp4

58.6 MB

GrrCON 2019 1 08 Reverse Engineering Malware for N00bs GregB33fJames.en.transcribed.srt

93.2 KB

GrrCON 2019 1 08 Reverse Engineering Malware for N00bs GregB33fJames.mp4

93.2 MB

GrrCON 2019 1 09 Host Hunting on a Budget cyberGoatPsyOps.en.transcribed.srt

47.7 KB

GrrCON 2019 1 09 Host Hunting on a Budget cyberGoatPsyOps.mp4

47.9 MB

GrrCON 2019 1 11 Keynote Rachel Soul Crusher86 G.en.transcribed.srt

88.1 KB

GrrCON 2019 1 11 Keynote Rachel Soul Crusher86 G.mp4

63.1 MB

GrrCON 2019 1 12 Cons Careers SciaticNerd.en.transcribed.srt

96.0 KB

GrrCON 2019 1 12 Cons Careers SciaticNerd.mp4

65.4 MB

GrrCON 2019 1 14 Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.en.transcribed.srt

48.9 KB

GrrCON 2019 1 14 Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.mp4

42.3 MB

GrrCON 2019 1 14 bonus talk Ryan Wisniewski.en.transcribed.srt

48.4 KB

GrrCON 2019 1 14 bonus talk Ryan Wisniewski.mp4

34.2 MB

GrrCON 2019 1 16 The Science of Breaking and Entering Alissa dnsprincess.en.transcribed.srt

99.8 KB

GrrCON 2019 1 16 The Science of Breaking and Entering Alissa dnsprincess.mp4

68.4 MB

GrrCON 2019 1 17 Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.en.transcribed.srt

79.5 KB

GrrCON 2019 1 17 Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.mp4

97.6 MB

GrrCON 2019 1 19 Big Plane Little Plane How common aviation attacks affect airlines and general avia.en.transcribed.srt

72.7 KB

GrrCON 2019 1 19 Big Plane Little Plane How common aviation attacks affect airlines and general avia.mp4

84.6 MB

GrrCON 2019 2 00 PSD2 SCA WTF Kelley Robinson.en.transcribed.srt

51.0 KB

GrrCON 2019 2 00 PSD2 SCA WTF Kelley Robinson.mp4

39.4 MB

GrrCON 2019 2 01 Breaking NBAD & UEBA Detection” by Charles Herring.en.transcribed.srt

59.6 KB

GrrCON 2019 2 01 Breaking NBAD & UEBA Detection” by Charles Herring.mp4

38.2 MB

GrrCON 2019 2 03 The Past Present Future of Cyber Threats Chris Russell.en.transcribed.srt

45.4 KB

GrrCON 2019 2 03 The Past Present Future of Cyber Threats Chris Russell.mp4

31.1 MB

GrrCON 2019 2 04 Symbolically executing a fuzzy tyrant Lojikil.en.transcribed.srt

83.3 KB

GrrCON 2019 2 04 Symbolically executing a fuzzy tyrant Lojikil.mp4

52.4 MB

GrrCON 2019 2 05 A Theme of Fear Hacking the Paradigm Catherine Ullman.en.transcribed.srt

89.7 KB

GrrCON 2019 2 05 A Theme of Fear Hacking the Paradigm Catherine Ullman.mp4

88.2 MB

GrrCON 2019 2 06 QA on our industry and other things that are top of mind Chris Roberts.en.transcribed.srt

84.0 KB

GrrCON 2019 2 06 QA on our industry and other things that are top of mind Chris Roberts.mp4

79.9 MB

GrrCON 2019 2 07 How to Make a Honeypot Stickier SSH Jose Hernandez.en.transcribed.srt

94.2 KB

GrrCON 2019 2 07 How to Make a Honeypot Stickier SSH Jose Hernandez.mp4

111.8 MB

GrrCON 2019 2 08 Data Access Rights Exploits under New Privacy Laws Amber Welch.en.transcribed.srt

51.6 KB

GrrCON 2019 2 08 Data Access Rights Exploits under New Privacy Laws Amber Welch.mp4

44.5 MB

GrrCON 2019 2 09 Data Security How to avoid an embarrassing breach Matt mattrix Hoy.en.transcribed.srt

61.3 KB

GrrCON 2019 2 09 Data Security How to avoid an embarrassing breach Matt mattrix Hoy.mp4

92.7 MB

GrrCON 2019 2 10 MSSPs are greatand other lies I tell myself Scott Thomas.en.transcribed.srt

102.0 KB

GrrCON 2019 2 10 MSSPs are greatand other lies I tell myself Scott Thomas.mp4

70.1 MB

GrrCON 2019 2 11 Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.en.transcribed.srt

36.5 KB

GrrCON 2019 2 11 Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.mp4

35.8 MB

GrrCON 2019 2 12 Good Cyber Hygiene and using analytics to drive the need for it on Print David Rose.mp4

34.9 MB

GrrCON 2019 2 13 Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.en.transcribed.srt

52.8 KB

GrrCON 2019 2 13 Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.mp4

28.6 MB

GrrCON 2019 2 14 A Day in the Life of a Security Operations Center What do you get when you partner.en.transcribed.srt

45.3 KB

GrrCON 2019 2 14 A Day in the Life of a Security Operations Center What do you get when you partner.mp4

23.6 MB

GrrCON 2019 2 15 Malicious Cryptomining is Exploding Are you at risk John Fatten.en.transcribed.srt

65.5 KB

GrrCON 2019 2 15 Malicious Cryptomining is Exploding Are you at risk John Fatten.mp4

57.6 MB

GrrCON 2019 2 18 Dance Fancybear Dance a study in macOS Cat Self.en.transcribed.srt

88.5 KB

GrrCON 2019 2 18 Dance Fancybear Dance a study in macOS Cat Self.mp4

58.5 MB

GrrCON 2019 3 00 The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.en.transcribed.srt

42.5 KB

GrrCON 2019 3 00 The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.mp4

36.2 MB

GrrCON 2019 3 01 Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.en.transcribed.srt

38.8 KB

GrrCON 2019 3 01 Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.mp4

31.6 MB

GrrCON 2019 3 02 Destroy Everything Tom Somerville.mp4

34.3 MB

GrrCON 2019 3 03 Surfing and Security Ride the wave Chris Burrows.en.transcribed.srt

52.9 KB

GrrCON 2019 3 03 Surfing and Security Ride the wave Chris Burrows.mp4

35.3 MB

GrrCON 2019 3 04 The Importance of IT Asset Visibility Brian Berk.en.transcribed.srt

35.5 KB

GrrCON 2019 3 04 The Importance of IT Asset Visibility Brian Berk.mp4

38.9 MB

GrrCON 2019 3 05 From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.en.transcribed.srt

102.3 KB

GrrCON 2019 3 05 From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.mp4

64.8 MB

GrrCON 2019 3 06 CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.en.transcribed.srt

109.7 KB

GrrCON 2019 3 06 CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.mp4

72.8 MB

GrrCON 2019 3 07 Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.en.transcribed.srt

101.8 KB

GrrCON 2019 3 07 Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.mp4

80.4 MB

GrrCON 2019 3 08 What Are We Doing Here Rethinking Security Jeff Man.en.transcribed.srt

90.4 KB

GrrCON 2019 3 08 What Are We Doing Here Rethinking Security Jeff Man.mp4

68.9 MB

GrrCON 2019 3 09 How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.en.transcribed.srt

49.5 KB

GrrCON 2019 3 09 How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.mp4

38.4 MB

GrrCON 2019 3 10 Hillbilly Storytime Pentest Fails Adam Compton.en.transcribed.srt

55.0 KB

GrrCON 2019 3 10 Hillbilly Storytime Pentest Fails Adam Compton.mp4

48.9 MB

GrrCON 2019 3 11 Want to Play a Game John DeRyke.en.transcribed.srt

42.7 KB

GrrCON 2019 3 11 Want to Play a Game John DeRyke.mp4

36.9 MB

GrrCON 2019 3 13 Departing Employees Departing Data Todd Thorsen.en.transcribed.srt

32.9 KB

GrrCON 2019 3 13 Departing Employees Departing Data Todd Thorsen.mp4

32.0 MB

GrrCON 2019 3 14 Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.en.transcribed.srt

37.2 KB

GrrCON 2019 3 14 Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.mp4

46.4 MB

GrrCON 2019 3 15 Understanding how public places introduce additional risks to business Len Noe.en.transcribed.srt

85.1 KB

GrrCON 2019 3 15 Understanding how public places introduce additional risks to business Len Noe.mp4

64.9 MB

GrrCON 2019 3 16 Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.en.transcribed.srt

34.2 KB

GrrCON 2019 3 16 Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.mp4

27.5 MB

GrrCON 2019 3 17 The Importance of Relevant Timely and Qualitative Intelligence Analysis Aamil AK.mp4

29.0 MB

GrrCON 2019 3 18 Deepfakes If anything can be real then nothing is real April C Wright.en.transcribed.srt

89.0 KB

GrrCON 2019 3 18 Deepfakes If anything can be real then nothing is real April C Wright.mp4

68.6 MB

/

GrrCON Logo.png

301.1 KB

GrrCON thank you.txt

1.4 KB

 

Total files 561


Copyright © 2024 FileMood.com