/
|
SAINTCON 2021 logo.jpg
|
6.9 KB
|
SAINTCON Logo.jpg
|
19.9 KB
|
SAINTCON thank you.txt
|
0.9 KB
|
SAINTCON-Logo-BW-2023.svg
|
14.7 KB
|
/SAINTCON 2015/
|
Advanced Threat Hunting.mp4
|
35.2 MB
|
Advanced Threat Hunting.srt
|
27.8 KB
|
All about the SAINTCON 2015 Badge.mp4
|
27.9 MB
|
All about the SAINTCON 2015 Badge.srt
|
21.8 KB
|
Always stay connected to IRC.mp4
|
20.3 MB
|
Always stay connected to IRC.srt
|
24.5 KB
|
Anomalies and indicators description vs. deviations vs. disrepute.mp4
|
69.6 MB
|
Anomalies and indicators description vs. deviations vs. disrepute.srt
|
32.5 KB
|
Ansible for beginners.mp4
|
88.3 MB
|
Ansible for beginners.srt
|
56.3 KB
|
Attack of the DRONES and other ID10Ts with toys.mp4
|
60.6 MB
|
Attack of the DRONES and other ID10Ts with toys.srt
|
42.4 KB
|
Basic concepts behind GPG.mp4
|
55.0 MB
|
Basic concepts behind GPG.srt
|
24.0 KB
|
Become phishers of men (and women).mp4
|
67.6 MB
|
Become phishers of men (and women).srt
|
48.5 KB
|
Beyond PCI Why (and how) you should take control of your payments security.mp4
|
56.9 MB
|
Beyond PCI Why (and how) you should take control of your payments security.srt
|
63.3 KB
|
Building a Security Strategy Perimeter to Core - Firewall is no longer enough!.mp4
|
48.6 MB
|
Building a Security Strategy Perimeter to Core - Firewall is no longer enough!.srt
|
46.4 KB
|
Cisco Threat-Centric Security.mp4
|
118.2 MB
|
Cloud Device Insecurity.mp4
|
64.0 MB
|
Cloud Device Insecurity.srt
|
50.6 KB
|
Cracking Wireless.mp4
|
68.1 MB
|
Cracking Wireless.srt
|
0.0 KB
|
Cross site scripting and cross site request forgery a dangerous combination.mp4
|
49.5 MB
|
Cyber Incident Response Management Breaking Glass.mp4
|
61.8 MB
|
Cyber Incident Response Management Breaking Glass.srt
|
58.6 KB
|
CyberPatriot Have Fun Mentoring the Next Generation Blue Team.mp4
|
58.5 MB
|
CyberPatriot Have Fun Mentoring the Next Generation Blue Team.srt
|
55.2 KB
|
Decrypting SSL Traffic.mp4
|
20.7 MB
|
Decrypting SSL Traffic.srt
|
14.0 KB
|
Dont Be Stupid With Github - SAINTCON 2015.mp4
|
35.0 MB
|
Dont Be Stupid With Github - SAINTCON 2015.srt
|
3.1 KB
|
Fishing to Phishing Adventures in chasing slimy creatures.mp4
|
70.5 MB
|
Fishing to Phishing Adventures in chasing slimy creatures.srt
|
62.3 KB
|
Fruit of the Poisonous Tree.mp4
|
57.7 MB
|
Fruit of the Poisonous Tree.srt
|
48.0 KB
|
Hardening the LAMP Stack.mp4
|
65.6 MB
|
Hardening the LAMP Stack.srt
|
44.3 KB
|
Infosec Up and Running.mp4
|
49.2 MB
|
Infosec Up and Running.srt
|
42.9 KB
|
Intro to Hacking Web Apps.mp4
|
30.0 MB
|
Intro to Hacking Web Apps.srt
|
25.2 KB
|
Intro to Windbg - how to win at minesweeper.mp4
|
146.0 MB
|
Introduction to DFIR and Malware Analysis.mp4
|
133.2 MB
|
It was the best of encryption, it was the worst of encryption - SSL in the real world.mp4
|
64.8 MB
|
It was the best of encryption, it was the worst of encryption - SSL in the real world.srt
|
54.3 KB
|
Managing Compliance in a DevOps environment.mp4
|
61.4 MB
|
Managing Compliance in a DevOps environment.srt
|
62.2 KB
|
Mobile Device Security in the Enterprise.mp4
|
67.5 MB
|
Mobile Device Security in the Enterprise.srt
|
46.1 KB
|
Network noise - scans, backscatter, and other impeding events.mp4
|
61.7 MB
|
Network noise - scans, backscatter, and other impeding events.srt
|
44.6 KB
|
NeverLAN CTF... Teaching the Younger Generation to Hack.mp4
|
50.7 MB
|
NeverLAN CTF... Teaching the Younger Generation to Hack.srt
|
35.6 KB
|
OSINT Oh the places you ll go.mp4
|
63.2 MB
|
OSINT Oh the places you ll go.srt
|
10.7 KB
|
OSX Archaeology Becoming Indiana Jones with OSXCollector and Strata.mp4
|
65.7 MB
|
OSX Archaeology Becoming Indiana Jones with OSXCollector and Strata.srt
|
6.2 KB
|
Owning Your Employees for Better Security.mp4
|
53.8 MB
|
Owning Your Employees for Better Security.srt
|
48.9 KB
|
Palo Alto Networks firewall deep dive.mp4
|
144.7 MB
|
Pseudorandom Numbers.mp4
|
52.8 MB
|
Pseudorandom Numbers.srt
|
33.1 KB
|
Rancid Pi Version control your device configurations using a raspberry pi..mp4
|
61.9 MB
|
Rancid Pi Version control your device configurations using a raspberry pi..srt
|
1.1 KB
|
Randomness Matters.mp4
|
22.5 MB
|
Randomness Matters.srt
|
3.6 KB
|
Rock Your SOCs Off Network Security Monitoring Validation.mp4
|
27.7 MB
|
Rock Your SOCs Off Network Security Monitoring Validation.srt
|
30.1 KB
|
SAINTcon 2015 The Delusion Of Internet Content Filtering.mp4
|
24.5 MB
|
SAINTcon 2015 The Delusion Of Internet Content Filtering.srt
|
4.2 KB
|
SaintCON Badge in Action.mp4
|
1.7 MB
|
SAINTCON CLOSING SESSION - Camera.mp4
|
59.2 MB
|
SAINTCON CLOSING SESSION - Camera.srt
|
23.7 KB
|
SAINTCON CLOSING SESSION.mp4
|
52.9 MB
|
SAINTCON CLOSING SESSION.srt
|
36.6 KB
|
Social Engineering Re-hash.mp4
|
34.1 MB
|
Social Engineering Re-hash.srt
|
31.3 KB
|
Software Defined Radio (SDR) Workshop.mp4
|
77.8 MB
|
Solving the Mobile Security Gap.mp4
|
32.3 MB
|
Solving the Mobile Security Gap.srt
|
33.5 KB
|
Stop bash-ing, you ve got Perl.mp4
|
120.4 MB
|
Stupid Malware Tricks The weirdest ways attackers bypass your defenses.mp4
|
64.5 MB
|
Stupid Malware Tricks The weirdest ways attackers bypass your defenses.srt
|
58.5 KB
|
Systems hardening and automation using puppet.mp4
|
40.9 MB
|
Systems hardening and automation using puppet.srt
|
0.9 KB
|
The State of HTTPS securing web traffic is not what it used to be.mp4
|
67.7 MB
|
The State of HTTPS securing web traffic is not what it used to be.srt
|
50.3 KB
|
The Unpredictability of BYOD.mp4
|
49.0 MB
|
The Unpredictability of BYOD.srt
|
45.1 KB
|
Tracking Ghosts Through the Fog.mp4
|
72.9 MB
|
Tracking Ghosts Through the Fog.srt
|
53.8 KB
|
Understanding malware evolution using Neo4j.mp4
|
41.3 MB
|
Understanding malware evolution using Neo4j.srt
|
33.5 KB
|
Virtualization Security 101 Basics of Securing a virtual infrastructure.mp4
|
61.2 MB
|
Virtualization Security 101 Basics of Securing a virtual infrastructure.srt
|
52.8 KB
|
War Walking at BlackHat and Defcon.mp4
|
69.6 MB
|
War Walking at BlackHat and Defcon.srt
|
62.2 KB
|
What do You Trust on the Internet.mp4
|
42.6 MB
|
What do You Trust on the Internet.srt
|
38.8 KB
|
What your current vulnerability management program wont tell you about your security..mp4
|
73.8 MB
|
What your current vulnerability management program wont tell you about your security..srt
|
35.2 KB
|
/SAINTCON 2016/
|
Aaron Toponce (eightyeight) - Correctly Hashing Passwords.mp4
|
72.8 MB
|
Adam Steed (@Adaboyiam) - Patching Monthly May Be IMPOSSIBLE.mp4
|
94.3 MB
|
Andrew Brandt (Spike) - games.mp4
|
18.0 MB
|
Andrew Brandt (Spike) - Ingress Egress The emerging threats of augmented-reality gaming.mp4
|
77.2 MB
|
Andrew Brandt (Spike) - No Safety for Old Phones How Android became the new Windows XP.mp4
|
47.5 MB
|
Cam Morris (c4mm0r) - OAuth2 & Openid-Connect Good, Bad, and Ugly.mp4
|
56.3 MB
|
Chad Butler - Big Shop AppSec for Everyone Else.mp4
|
76.2 MB
|
Chris Czub - Sorting the Mess.mp4
|
19.0 MB
|
Clutch and CrYpT - Lae Rcfb Evyjw Ros Tcts Fiddxd Wqoiasfx.mp4
|
58.9 MB
|
Cory Stokes & Derek Larson - Using Security Self Assessment Survey Tools.mp4
|
64.4 MB
|
Dale Rowe (tetraide) - Surviving Under Stress - Training a Cyberdefense Team for Nationals.mp4
|
101.6 MB
|
Dmitry Dessiatnikov - How to integrate security into Agile SDLC using OWASP.mp4
|
77.2 MB
|
Erich Ficker (burnd0wn) - IoT of Doom A Survey of 3 Vulnerable Ecosystems.mp4
|
90.1 MB
|
Georgia Weidman - Nine years into mobility, has security caught up.mp4
|
72.2 MB
|
Henry Hill - You didn t wipe your drives and now this talk happened.mp4
|
57.3 MB
|
Jason Tracy (JT) - But What If I m Not a Coder.mp4
|
64.3 MB
|
Jason Wood - Red Teaming Going Beyond the Technology.mp4
|
93.0 MB
|
Jeremy Cox (supertechguy) - Getting Involved with the Lawmaking Process.mp4
|
41.4 MB
|
Jerry Smith - Privacy and Security.. Which comes first.mp4
|
47.4 MB
|
Jon Jarvis - Someone created a super-secret UtahSAINT subreddit.mp4
|
49.2 MB
|
Josh Dustin (@joshdustin) - They used my own method to own my account.mp4
|
98.1 MB
|
Josh Galvez - Hackers Challenge Shakedown.mp4
|
57.7 MB
|
Kent Schaeffer (@ne0crank) - Ghost Stories from a SysAdmin.mp4
|
34.2 MB
|
Luke Jenkins - Network Wrap-up Jonathan Karras & Klint Holmes - Badge Wrap-up.mp4
|
20.2 MB
|
Mathew Toth (Holiday) - Turning Witchcraft and Wizardry into Information Security.mp4
|
31.3 MB
|
Michael Gough - Searching Logs for Hackers. What you need to know and how to catch them.mp4
|
58.7 MB
|
Michael Spicer (d4rkm4tter) - WiFi Surveillance at DEF CON 24.mp4
|
69.9 MB
|
Nathan Cooper - Social Engineering If You Can t Beat Them, Join Them.mp4
|
38.4 MB
|
Nathan Cooper - Zero to PCI in 50 minutes.mp4
|
76.5 MB
|
Neil Wyler (Grifter) & Bart Stumper - Held for Ransom Understanding the New Face of Malware.mp4
|
101.0 MB
|
Neil Wyler (Grifter) - Left of Owned Becoming the Hunter Instead of the Hunted.mp4
|
101.1 MB
|
SaintCon 2016 AV setup.mp4
|
15.5 MB
|
Sam Mclane - Changing the Economics of Security Operations.mp4
|
38.0 MB
|
Sean Jackson (74rku5) - Oooh We ve Had An Incident How Should We Respond.mp4
|
93.5 MB
|
Steve Caimi - Effective Detection Visibility through integrated threat defense.mp4
|
36.0 MB
|
Troy Jessup (Jup1t3r) - Conference Opener.mp4
|
24.1 MB
|
Wes Furgason - Building a Successful Security Awareness Program.mp4
|
48.4 MB
|
/SAINTCON 2017/
|
#TrevorForget - The Documentary.mp4
|
35.9 MB
|
Attacking AWS Beyond Security Groups.mp4
|
46.0 MB
|
Being Penetration Tested No Pain, No Gain.mp4
|
20.7 MB
|
Bots, Bots, Everywhere a Bot!.mp4
|
86.1 MB
|
Conference Opener.mp4
|
21.6 MB
|
Creating a Campus Fabric.mp4
|
59.0 MB
|
Cuckoo not= Insanity.mp4
|
66.6 MB
|
Developing a Risk Based Security Program.mp4
|
60.4 MB
|
Digital Vengeance Exploiting Notorious C&C Toolkits.mp4
|
52.7 MB
|
DIY Web Application Threat Detection.mp4
|
53.4 MB
|
Effective Security Training for your Users.mp4
|
73.4 MB
|
False Advertising How Modern Ad platforms can be used for Targeted Exploitation.mp4
|
53.3 MB
|
Fear Security's Weakest Link.mp4
|
30.8 MB
|
Ghosts in the SIEM Poking the Bear.mp4
|
29.5 MB
|
In our world, Data is the Silver Bullet.mp4
|
25.5 MB
|
Information Security and Privacy Defending your Organization.mp4
|
66.4 MB
|
Lockpicking A few ways to pop a Lock.mp4
|
67.2 MB
|
NMap From Zero to Beginner.mp4
|
39.3 MB
|
Phishing Trends are Changing From Personal to Organizational.mp4
|
20.3 MB
|
Practical DevSecOps.mp4
|
45.8 MB
|
Ransomware Nyetya, Blood in the Water.mp4
|
33.6 MB
|
Riddle me this.mp4
|
70.1 MB
|
SAINTCON 2017 Badge Assembly Instructions.mp4
|
95.4 MB
|
Security and Compliance Auditing with Hubblestack.mp4
|
49.4 MB
|
Security Doom and Drones.mp4
|
70.2 MB
|
Shadowbrokers NSA Tools Dump.mp4
|
32.0 MB
|
Shared Library Vulnerabilities Under the Surface Threats.mp4
|
62.8 MB
|
Social Engineering Trends and Tactics.mp4
|
77.2 MB
|
Splunking Dark Tools A Pentesters Guide to Pwnage.mp4
|
56.4 MB
|
The Art of Web Defense.mp4
|
58.1 MB
|
The SAINTCON 2017 Badge.mp4
|
21.2 MB
|
The Surveillance Capitalism will continue, until Morale Improves.mp4
|
64.3 MB
|
Understanding Multi Factor Authentication.mp4
|
31.0 MB
|
Using a Security Methodology to Improve your Security.mp4
|
63.7 MB
|
Want to see the Invisible It's not as hard as it SIEMS.mp4
|
25.2 MB
|
What Non-Identifying Information.mp4
|
39.8 MB
|
WiFi Monitoring The WiFiCactus.mp4
|
86.4 MB
|
You're the NEW Security Guy (Or, I've made a terrible mistake).mp4
|
59.6 MB
|
Your Identity The Heart of Cyber Security.mp4
|
63.8 MB
|
Zero Trust, Zero Infections, and Zero Restrictions.mp4
|
40.1 MB
|
/SAINTCON 2018/
|
Aaron Bishop - Cross Site Request Forgery 101.eng.srt
|
75.8 KB
|
Aaron Bishop - Cross Site Request Forgery 101.mp4
|
28.5 MB
|
Aaron Sherman - Anatomy of a Business Email Compromise (BEC) and tools for Incident.mp4
|
59.6 MB
|
Alan Jex - Are Security Certifications Worth the Effort.eng.srt
|
61.3 KB
|
Alan Jex - Are Security Certifications Worth the Effort.mp4
|
20.9 MB
|
Andrew Brandt - Hey, You Got Your SQL In My Honeypot.eng.srt
|
155.6 KB
|
Andrew Brandt - Hey, You Got Your SQL In My Honeypot.mp4
|
59.5 MB
|
Andrew Brandt - SamSam - The (Almost) Six Million Dollar Malware.mp4
|
59.2 MB
|
April Powers - Human is the weakest link in cyber security.eng.srt
|
98.2 KB
|
April Powers - Human is the weakest link in cyber security.mp4
|
68.9 MB
|
Bill Clay III - Using metadata and telemetry to detect malware in encrypted traffic.mp4
|
25.8 MB
|
Bryce Kunz - Blue cloud of Death - Red Teaming Azure.eng.srt
|
147.4 KB
|
Bryce Kunz - Blue cloud of Death - Red Teaming Azure.mp4
|
59.1 MB
|
Chase Palmer - Objective 1 - Don't Be Low-Hanging Fruit.eng.srt
|
70.7 KB
|
Chase Palmer - Objective 1 - Don't Be Low-Hanging Fruit.mp4
|
21.7 MB
|
Chris Adamson and John Tidwell - Tactical Endpoint Monitoring 101.eng.srt
|
115.3 KB
|
Chris Adamson and John Tidwell - Tactical Endpoint Monitoring 101.mp4
|
43.1 MB
|
Chris Larsen - IPv6 - Is there an open door in your network.eng.srt
|
88.4 KB
|
Chris Larsen - IPv6 - Is there an open door in your network.mp4
|
28.6 MB
|
Chris Mather - Quantum Cryptology Armageddon.eng.srt
|
105.5 KB
|
Chris Mather - Quantum Cryptology Armageddon.mp4
|
50.6 MB
|
Chris Truncer - Introducing Effective Controls in your Environment with Windows Defe.mp4
|
64.8 MB
|
Colin Jackson - Lock Picking 101.eng.srt
|
97.0 KB
|
Colin Jackson - Lock Picking 101.mp4
|
30.6 MB
|
Colin Jackson and Nathan Smith - Dr. StrangeTalk, or How I Learned to Stop Worrying.mp4
|
37.2 MB
|
Corban Villa - Bluetooth - From basics to vulnerabilities.mp4
|
32.8 MB
|
Dan McInerney - Icebreaker.py Gaining a foothold in Active Directory in one command.eng.srt
|
84.5 KB
|
Dan McInerney - Icebreaker.py Gaining a foothold in Active Directory in one command.mp4
|
29.0 MB
|
Dana Porter - THE INDUSTRIALIZATION OF RED AND BLUE TEAMING.eng.srt
|
136.8 KB
|
Dana Porter - THE INDUSTRIALIZATION OF RED AND BLUE TEAMING.mp4
|
47.6 MB
|
Daniel Taualii - How to Solve Kryptos - Incorrectly.mp4
|
20.5 MB
|
David Cross - Alexa - take over my job a red teamer's dream in action.mp4
|
33.0 MB
|
David Owens - Inside the Defcon 26 Mad Max Valhalla Self Driving Car Challenge.eng.srt
|
64.6 KB
|
David Owens - Inside the Defcon 26 Mad Max Valhalla Self Driving Car Challenge.mp4
|
19.2 MB
|
David Thurm - Network Security 101.eng.srt
|
144.5 KB
|
David Thurm - Network Security 101.mp4
|
42.8 MB
|
Do you see what we see The latest & greatest from the Threat Intelligence Labs.mp4
|
70.8 MB
|
Erich Ficker - Intro to Pentesting - How you can get the career you want (and break 1.eng.srt
|
15.2 KB
|
Erich Ficker - Intro to Pentesting - How you can get the career you want (and break 1.mp4
|
5.2 MB
|
Erich Ficker - Intro to Pentesting - How you can get the career you want (and break 2.eng.srt
|
39.4 KB
|
Erich Ficker - Intro to Pentesting - How you can get the career you want (and break 2.mp4
|
16.7 MB
|
Erich Ficker - Intro to Pentesting - How you can get the career you want (and break 3.eng.srt
|
92.0 KB
|
Erich Ficker - Intro to Pentesting - How you can get the career you want (and break 3.mp4
|
35.1 MB
|
Forrest B and Michael M - The Theory and Practice of Building A Privacy Token.mp4
|
38.5 MB
|
James Pope - Thinking like a Hacker.eng.srt
|
176.1 KB
|
James Pope - Thinking like a Hacker.mp4
|
55.1 MB
|
James Young - CryptoMining has replaced Ransomware.mp4
|
23.3 MB
|
Jeremy Cox - Leverage the Dark Side of your Network.eng.srt
|
82.7 KB
|
Jeremy Cox - Leverage the Dark Side of your Network.mp4
|
29.2 MB
|
Jeremy Cox - Password Standards. Yes, they have changed again..mp4
|
21.1 MB
|
Jeremy Cox - Secure Network Segmentation.eng.srt
|
59.9 KB
|
Jeremy Cox - Secure Network Segmentation.mp4
|
28.6 MB
|
Jonathan Smith - Lets Play with some WiFi.eng.srt
|
75.7 KB
|
Jonathan Smith - Lets Play with some WiFi.mp4
|
24.0 MB
|
Jonathan Smith - PCI Gotchas - Deciphering PCI Nuances.eng.srt
|
86.7 KB
|
Jonathan Smith - PCI Gotchas - Deciphering PCI Nuances.mp4
|
25.6 MB
|
Josh Galvez - Beginning Hackers Challenge.eng.srt
|
45.5 KB
|
Josh Galvez - Beginning Hackers Challenge.mp4
|
18.1 MB
|
Josh Galvez - Hackers Challenge Shakedown.eng.srt
|
93.0 KB
|
Josh Galvez - Hackers Challenge Shakedown.mp4
|
53.5 MB
|
Kevin Howard - Mentoring the Next Generation.eng.srt
|
105.2 KB
|
Kevin Howard - Mentoring the Next Generation.mp4
|
37.5 MB
|
Kyle Feuz - Wireshark - A Beginners Introduction.eng.srt
|
353.3 KB
|
Kyle Feuz - Wireshark - A Beginners Introduction.mp4
|
302.2 MB
|
Lance Buttars - Introduction to Backdooring.eng.srt
|
161.3 KB
|
Lance Buttars - Introduction to Backdooring.mp4
|
111.7 MB
|
Lance Buttars - Introduction to Shellcode.mp4
|
35.3 MB
|
Mike Spicer - Year of the WiFiCactus.eng.srt
|
240.3 KB
|
Mike Spicer - Year of the WiFiCactus.mp4
|
80.1 MB
|
Mike Weaver and Michael Whiteley - The Badge Talk.eng.srt
|
83.7 KB
|
Mike Weaver and Michael Whiteley - The Badge Talk.mp4
|
47.1 MB
|
Nathan Cooper - Building A Security Program for Enterprise.mp4
|
44.2 MB
|
Paige Ishii - How Many Licks Does it take to get to the Center of Security Awareness.eng.srt
|
84.1 KB
|
Paige Ishii - How Many Licks Does it take to get to the Center of Security Awareness.mp4
|
36.8 MB
|
Paul Kraus - Security in AWS, Azure, Google, Oracle and IBM is cloudy.mp4
|
40.0 MB
|
Samuel Kimmons - Following the Bread Crumbs... How an Investigation Should Change O2.eng.srt
|
43.6 KB
|
Samuel Kimmons - Following the Bread Crumbs... How an Investigation Should Change O2.mp4
|
20.8 MB
|
Sean Jackson - The OWASP Top 10 in Review (New and Improved in 2017).mp4
|
55.9 MB
|
Sean McHenry - Privacy - Security's Bedfellow - A look at the upcoming changes to dat.mp4
|
42.2 MB
|
Seth Johnson - Amygdala Lowjacking - 7 Real Techniques to Join the Resistance.eng.srt
|
111.9 KB
|
Seth Johnson - Amygdala Lowjacking - 7 Real Techniques to Join the Resistance.mp4
|
54.8 MB
|
Shaunak Shah - Social Engineering - How to steal a laptop and have lunch while at it.mp4
|
19.8 MB
|
Spencer Heywood - A Hacker's First Look at Your Network - Port Scanning.eng.srt
|
85.3 KB
|
Spencer Heywood - A Hacker's First Look at Your Network - Port Scanning.mp4
|
24.8 MB
|
Thomas Elegante - To Be FAIR About It - Using FAIR and other risk models to prioriti.mp4
|
6.9 MB
|
Tomasz Tuzel - Who Watches the Watcher Detecting Hypervisor Introspection from Unpr.mp4
|
17.2 MB
|
Troy Jessup - Closing Session.eng.srt
|
120.8 KB
|
Troy Jessup - Closing Session.mp4
|
57.1 MB
|
Troy Jessup - Conference Opener introduction of the MC.eng.srt
|
484.7 KB
|
Troy Jessup - Conference Opener introduction of the MC.mp4
|
205.8 MB
|
Troy Jessup - Lesson Learned - Top 10 critical pentest findings.eng.srt
|
95.8 KB
|
Troy Jessup - Lesson Learned - Top 10 critical pentest findings.mp4
|
28.5 MB
|
Truman Kain - Dragnet - Your Social Engineering Sidekick.eng.srt
|
66.6 KB
|
Truman Kain - Dragnet - Your Social Engineering Sidekick.mp4
|
17.9 MB
|
Vincent Kenney - ATM Jackpotting.mp4
|
26.8 MB
|
/SAINTCON 2019/
|
Adam Fishre - How to stop a mean two headed serpent called Hydra.eng.srt
|
92.1 KB
|
Adam Fishre - How to stop a mean two headed serpent called Hydra.mp4
|
67.2 MB
|
Andrew Brandt - RetroMal Analyzing malware on the earliest computing platforms.eng.srt
|
103.0 KB
|
Andrew Brandt - RetroMal Analyzing malware on the earliest computing platforms.mp4
|
71.9 MB
|
Andrew Brandt - The Megacortex Mysteries.mp4
|
65.7 MB
|
Bryce Kunz - May the Cloud be with You Red Teaming GCP (Google Cloud Platform).mp4
|
42.7 MB
|
Chase Palmer - How to Complete a Vendor Review The Right Way.eng.srt
|
78.9 KB
|
Chase Palmer - How to Complete a Vendor Review The Right Way.mp4
|
40.3 MB
|
Chris Larsen - Fake News, Real News, and Disinformation How it works, what to do ab.mp4
|
32.6 MB
|
Chris Mather - The Four Horsemen of Passwords.eng.srt
|
90.4 KB
|
Chris Mather - The Four Horsemen of Passwords.mp4
|
60.4 MB
|
Clint Russell - The Evolution of Video Surveillance using AI and Machine Learning t.eng.srt
|
55.3 KB
|
Clint Russell - The Evolution of Video Surveillance using AI and Machine Learning t.mp4
|
35.1 MB
|
Corey Batiuk - Roll Your Own Pentest Distro.eng.srt
|
55.8 KB
|
Corey Batiuk - Roll Your Own Pentest Distro.mp4
|
27.7 MB
|
Dallin Warne - Is Network Monitoring Dead in the Age of Encryption.eng.srt
|
75.6 KB
|
Dallin Warne - Is Network Monitoring Dead in the Age of Encryption.mp4
|
32.5 MB
|
Daniel Dayley - Building your first SIEM with the Elastic Stack.eng.srt
|
58.5 KB
|
Daniel Dayley - Building your first SIEM with the Elastic Stack.mp4
|
29.9 MB
|
Daniel Zappala - The Secure Socket API.mp4
|
35.0 MB
|
David Packham - Drone Hacking.eng.srt
|
45.8 KB
|
David Packham - Drone Hacking.mp4
|
34.2 MB
|
Erich Ficker - Chuck the lockpicks, we still gettin' in.eng.srt
|
92.0 KB
|
Erich Ficker - Chuck the lockpicks, we still gettin' in.mp4
|
57.3 MB
|
George Bekmezian - DNS and TLS Privacy and Security - Content Security Today and Tom.eng.srt
|
80.1 KB
|
George Bekmezian - DNS and TLS Privacy and Security - Content Security Today and Tom.mp4
|
45.8 MB
|
Hanna Bennett - Utah DPS SIAC Cyber Program.eng.srt
|
30.8 KB
|
Hanna Bennett - Utah DPS SIAC Cyber Program.mp4
|
19.9 MB
|
Jake Bernardes - How GDPR nearly made me miss the birth of my daughter & why I'm wor.mp4
|
49.2 MB
|
Jason Eyre - Private LTE networks - Emerging technologies that promise quality and s.mp4
|
19.8 MB
|
Jason Gale - NFC & RFID Bio-Implants For Fun and Profit.mp4
|
51.2 MB
|
Jeremy Cox - 0wn th3 c0n.mp4
|
12.6 MB
|
Jeremy Cox - Getting over impostor syndrome in INFOSEC.eng.srt
|
22.2 KB
|
Jeremy Cox - Getting over impostor syndrome in INFOSEC.mp4
|
9.6 MB
|
John Pope, James Pope - Hacking Hackers Sure you can borrow my clicker.mp4
|
65.7 MB
|
Jonathan Smith - Keys to the Kingdom.mp4
|
16.9 MB
|
Josh Galvez - Hacker's Challenge Wrap-up.mp4
|
64.9 MB
|
Karl Sickendick - Reverse Engineering and Code Emulation with Ghidra.eng.srt
|
41.8 KB
|
Karl Sickendick - Reverse Engineering and Code Emulation with Ghidra.mp4
|
25.2 MB
|
Keenan Fessler - Evolving Manipulation Cracking the Combo.eng.srt
|
111.8 KB
|
Keenan Fessler - Evolving Manipulation Cracking the Combo.mp4
|
94.7 MB
|
Kenton McDaniel - Living off the Land Come for the living off the land, stay for th.eng.srt
|
52.8 KB
|
Kenton McDaniel - Living off the Land Come for the living off the land, stay for th.mp4
|
19.2 MB
|
Kevin Crook - DevSecOps Scalable Event-Driven Security Infrastructure for Hybrid En.mp4
|
32.1 MB
|
Keynote Session - Rachel - DO NOT PUBLISH UNTIL CLEARED.mp4
|
97.0 MB
|
Keynote Session - Russ Rogers - - The Future of Hacking Big Data.mp4
|
41.6 MB
|
Keynote Session - UNEDITED.mp4
|
176.5 MB
|
Keynote Session Opening.mp4
|
21.0 MB
|
Kimber Duke - Threat Hunting like a Scientist.eng.srt
|
45.8 KB
|
Kimber Duke - Threat Hunting like a Scientist.mp4
|
24.7 MB
|
Kyle Feuz - Wireshark A Beginners Introduction.eng.srt
|
112.5 KB
|
Kyle Feuz - Wireshark A Beginners Introduction.mp4
|
139.5 MB
|
Matt Lorimer - Hands on pwning in the Sain'tCON labs.eng.srt
|
116.9 KB
|
Matt Lorimer - Hands on pwning in the Sain'tCON labs.mp4
|
111.4 MB
|
Matt Lorimer - Under the hood of Sain'tCON labs.eng.srt
|
56.6 KB
|
Matt Lorimer - Under the hood of Sain'tCON labs.mp4
|
42.5 MB
|
Matt Lorimer - What the CTF.eng.srt
|
63.4 KB
|
Matt Lorimer - What the CTF.mp4
|
62.9 MB
|
Michael Whiteley - The Badge Talk.mp4
|
35.8 MB
|
MicK Gomm - DevSecOps Expectations for next-gen AppSec.mp4
|
30.3 MB
|
Mike Spicer - Gathering All the WiFi Tales of the WiFiCactus and WiFiKraken.mp4
|
61.4 MB
|
Mike Weaver - Hacking on Sain'tCON Badges.eng.srt
|
52.3 KB
|
Mike Weaver - Hacking on Sain'tCON Badges.mp4
|
52.7 MB
|
Robert Kerby - Embracing the Dark Web - A Security Community Call to Action.eng.srt
|
90.3 KB
|
Robert Kerby - Embracing the Dark Web - A Security Community Call to Action.mp4
|
46.7 MB
|
Ryan Burnett - (Active) defense against the dark arts.eng.srt
|
80.0 KB
|
Ryan Burnett - (Active) defense against the dark arts.mp4
|
35.3 MB
|
Ryan Otteson - The Riddle of Ryuk.mp4
|
30.6 MB
|
Sean Jackson - SOC It 2 Me.eng.srt
|
66.9 KB
|
Sean Jackson - SOC It 2 Me.mp4
|
45.0 MB
|
Sean McHenry - Developing a Cyber Security Strategy, Tactics come after (1).eng.srt
|
36.6 KB
|
Sean McHenry - Developing a Cyber Security Strategy, Tactics come after (1).mp4
|
28.4 MB
|
Sean McHenry - Developing a Cyber Security Strategy, Tactics come after.eng.srt
|
37.3 KB
|
Sean McHenry - Developing a Cyber Security Strategy, Tactics come after.mp4
|
23.3 MB
|
Seth Johnson - I Got Social Engineered to Speak at Sain'tCON.eng.srt
|
69.0 KB
|
Seth Johnson - I Got Social Engineered to Speak at Sain'tCON.mp4
|
29.2 MB
|
Shaun Price - One man's trash is another man's Home Lab (2019 Edition).eng.srt
|
109.0 KB
|
Shaun Price - One man's trash is another man's Home Lab (2019 Edition).mp4
|
55.4 MB
|
Spencer Heywood - Using Docker and Your Shell for Security.eng.srt
|
50.2 KB
|
Spencer Heywood - Using Docker and Your Shell for Security.mp4
|
32.2 MB
|
Stefanie Tidwell - Serverless Security 101.mp4
|
69.9 MB
|
Steve Ball - Getting started with KiCad - designing your first minibadge from art to.eng.srt
|
73.9 KB
|
Steve Ball - Getting started with KiCad - designing your first minibadge from art to.mp4
|
56.2 MB
|
Troy Jessup - CIS Critical Security Controls Framework Review.mp4
|
62.2 MB
|
Troy Jessup - Closing Session, Thanks, Awards, Etc..eng.srt
|
35.0 KB
|
Troy Jessup - Closing Session, Thanks, Awards, Etc..mp4
|
52.2 MB
|
Victor Steven Morales - Avoid putting yourself in a silver platter for hackers.eng.srt
|
36.0 KB
|
Victor Steven Morales - Avoid putting yourself in a silver platter for hackers.mp4
|
14.6 MB
|
/SAINTCON 2020/
|
0wn Th3 C0n.eng.srt
|
29.2 KB
|
0wn Th3 C0n.mp4
|
12.3 MB
|
Badge Assembly.eng.srt
|
25.8 KB
|
Badge Assembly.mp4
|
55.4 MB
|
Badge Battery Replacement.mp4
|
4.4 MB
|
Being a Mentor or a Mentee (Casual Conversation).eng.srt
|
170.5 KB
|
Being a Mentor or a Mentee (Casual Conversation).mp4
|
109.2 MB
|
Closing Ceremonies Session.eng.srt
|
37.9 KB
|
Closing Ceremonies Session.mp4
|
25.1 MB
|
CON 2020.mp4
|
4.4 MB
|
Hallway Chat with sirashrum, pope, and L34N.eng.srt
|
166.6 KB
|
Hallway Chat with sirashrum, pope, and L34N.mp4
|
86.5 MB
|
Hangout with Grifter.eng.srt
|
111.0 KB
|
Hangout with Grifter.mp4
|
46.2 MB
|
Kickoff with Jup1t3r.eng.srt
|
15.2 KB
|
Kickoff with Jup1t3r.mp4
|
17.3 MB
|
Lockpicking Hollywood.mp4
|
64.4 MB
|
Minibadge Tutorial Part 1 Installing Software.eng.srt
|
5.4 KB
|
Minibadge Tutorial Part 1 Installing Software.mp4
|
4.5 MB
|
Minibadge Tutorial Part 2 Schematic and PCB.eng.srt
|
73.3 KB
|
Minibadge Tutorial Part 2 Schematic and PCB.mp4
|
54.6 MB
|
Minibadge Tutorial Part 3 Ordering.eng.srt
|
13.2 KB
|
Minibadge Tutorial Part 3 Ordering.mp4
|
9.3 MB
|
Optimism During a Global Pandemic.mp4
|
24.1 MB
|
Serverless and Dys-FUNctional Cloud Red Teaming.eng.srt
|
167.1 KB
|
Serverless and Dys-FUNctional Cloud Red Teaming.mp4
|
72.9 MB
|
/SAINTCON 2021/
|
Andrew Hall - Building and Utilizing your Hacker Network5.eng.srt
|
8.4 KB
|
Andrew Hall - Building and Utilizing your Hacker Network5.mp4
|
6.7 MB
|
Badge Team - The Badge Talk.eng.srt
|
64.4 KB
|
Badge Team - The Badge Talk.mp4
|
54.9 MB
|
Bart Stump - - Just Scraping By - - The Privacy Implications of Mining the Internet.eng.srt
|
57.1 KB
|
Bart Stump - - Just Scraping By - - The Privacy Implications of Mining the Internet.mp4
|
41.2 MB
|
Bryce Fox - Networking 101.eng.srt
|
76.6 KB
|
Bryce Fox - Networking 101.mp4
|
50.6 MB
|
Bryce Kunz - Mining Cloud Resources for Initial Access via Serverless Services.eng.srt
|
53.6 KB
|
Bryce Kunz - Mining Cloud Resources for Initial Access via Serverless Services.mp4
|
20.9 MB
|
Christopher Hopkins - Understanding CIS Critical Controls Version 8.eng.srt
|
90.4 KB
|
Christopher Hopkins - Understanding CIS Critical Controls Version 8.mp4
|
58.1 MB
|
Colin Jackson (d1dymu5) - Lockpicking 101.eng.srt
|
47.2 KB
|
Colin Jackson (d1dymu5) - Lockpicking 101.mp4
|
26.3 MB
|
Colin Jackson d1dymu5 - Lock Bypassing 101.eng.srt
|
53.2 KB
|
Colin Jackson d1dymu5 - Lock Bypassing 101.mp4
|
35.3 MB
|
David Bowman - Is this Website Safe - 101.eng.srt
|
34.5 KB
|
David Bowman - Is this Website Safe - 101.mp4
|
16.1 MB
|
David Casteel - Securing and Monitoring Office 365 On a Budget.eng.srt
|
97.2 KB
|
David Casteel - Securing and Monitoring Office 365 On a Budget.mp4
|
43.9 MB
|
David Thurm - Zero Trust for Humans.eng.srt
|
84.6 KB
|
David Thurm - Zero Trust for Humans.mp4
|
30.2 MB
|
Eric Bennick - System Administration with a Side of Security.eng.srt
|
97.9 KB
|
Eric Bennick - System Administration with a Side of Security.mp4
|
75.8 MB
|
Erich Ficker - Hacking SDR - What is RF and why hackers should care.eng.srt
|
113.4 KB
|
Erich Ficker - Hacking SDR - What is RF and why hackers should care.mp4
|
65.4 MB
|
Jeremy Cox - Palo Kung Fu.eng.srt
|
56.4 KB
|
Jeremy Cox - Palo Kung Fu.mp4
|
27.4 MB
|
Jonathan Taylor - New security professionals -10 reasons why you fail and how to fix it.eng.srt
|
66.7 KB
|
Jonathan Taylor - New security professionals -10 reasons why you fail and how to fix it.mp4
|
37.6 MB
|
Josh Galvez - Hackers Challenge Shakedown.eng.srt
|
81.5 KB
|
Josh Galvez - Hackers Challenge Shakedown.mp4
|
75.1 MB
|
Josh Galvez - Security 101 Tools of the Trade.eng.srt
|
76.0 KB
|
Josh Galvez - Security 101 Tools of the Trade.mp4
|
46.2 MB
|
Kenton McDaniel - Hunting for Privesc in Windows Applications.eng.srt
|
49.5 KB
|
Kenton McDaniel - Hunting for Privesc in Windows Applications.mp4
|
21.8 MB
|
Keynote - LockPickingLawyer.mp4
|
45.9 MB
|
Kimber Duke - How's your SIEM [NO AUDIO].mp4
|
18.1 MB
|
Kyle Feuz - Wireshark - A Beginners Introduction.eng.srt
|
160.0 KB
|
Kyle Feuz - Wireshark - A Beginners Introduction.mp4
|
152.8 MB
|
Lynne Yocom - From Sain'tCON to Cyber State Champs.eng.srt
|
24.2 KB
|
Lynne Yocom - From Sain'tCON to Cyber State Champs.mp4
|
23.1 MB
|
Matt Lorimer and Panel - Why climb the corporate ladder when hacking the elevator is more fun.eng.srt
|
116.4 KB
|
Matt Lorimer and Panel - Why climb the corporate ladder when hacking the elevator is more fun.mp4
|
94.1 MB
|
Mike Spicer - WiFi Kraken Lite - Now With Less Calories.eng.srt
|
114.4 KB
|
Mike Spicer - WiFi Kraken Lite - Now With Less Calories.mp4
|
75.1 MB
|
Neil Grifter Wyler - Practical Threat Hunting - Straight Facts and Substantial Impacts.eng.srt
|
117.6 KB
|
Neil Grifter Wyler - Practical Threat Hunting - Straight Facts and Substantial Impacts.mp4
|
56.9 MB
|
pope - #ransowmare.eng.srt
|
118.7 KB
|
pope - #ransowmare.mp4
|
73.0 MB
|
Rafal Los - Of Sandcastles and Luck - Rethinking Vulnerability Management.eng.srt
|
103.3 KB
|
Rafal Los - Of Sandcastles and Luck - Rethinking Vulnerability Management.mp4
|
39.4 MB
|
Ryan Burnett - Phishers of men and women.eng.srt
|
94.4 KB
|
Ryan Burnett - Phishers of men and women.mp4
|
40.6 MB
|
Sain'tCON 2021 Keynote - James Pope.eng.srt
|
93.6 KB
|
Sain'tCON 2021 Keynote - James Pope.mp4
|
28.1 MB
|
Sain'tCON 2021 Opener - Troy.eng.srt
|
47.6 KB
|
Sain'tCON 2021 Opener - Troy.mp4
|
19.1 MB
|
Sean Jackson - It's Not If, But When - So What Should You Do NOW.eng.srt
|
110.2 KB
|
Sean Jackson - It's Not If, But When - So What Should You Do NOW.mp4
|
62.8 MB
|
Seth Johnson - Social Engineering Adventures.eng.srt
|
94.5 KB
|
Seth Johnson - Social Engineering Adventures.mp4
|
63.4 MB
|
Shaun Price - IoT safety in a world where everything - needs the internet.eng.srt
|
95.5 KB
|
Shaun Price - IoT safety in a world where everything - needs the internet.mp4
|
39.9 MB
|
Shaun Price - One man's trash is another man's Homelab 2021 Edition.eng.srt
|
111.9 KB
|
Shaun Price - One man's trash is another man's Homelab 2021 Edition.mp4
|
49.6 MB
|
Tristan Rhodes - How to build a conference network 2021.eng.srt
|
70.9 KB
|
Tristan Rhodes - How to build a conference network 2021.mp4
|
38.2 MB
|
Troy Jessup - Closing Ceremonies.eng.srt
|
81.6 KB
|
Troy Jessup - Closing Ceremonies.mp4
|
68.6 MB
|
Troy Jessup - Jupit3r's Randomness.eng.srt
|
108.0 KB
|
Troy Jessup - Jupit3r's Randomness.mp4
|
49.0 MB
|
Vincent Kenney - The Evolution of Cryptocurrencies in Cyber Crime.eng.srt
|
38.4 KB
|
Vincent Kenney - The Evolution of Cryptocurrencies in Cyber Crime.mp4
|
20.6 MB
|
Waylon Grange - 1 21 GigaWatts - Vulnerabilities in Solar Panel Controllers.eng.srt
|
82.5 KB
|
Waylon Grange - 1 21 GigaWatts - Vulnerabilities in Solar Panel Controllers.mp4
|
55.1 MB
|
/SAINTCON 2022/
|
Aaamir Lakhani - Dr. Chaos presents Top hacker tools, techniques & DeepWeb exploits.eng.srt
|
73.3 KB
|
Aaamir Lakhani - Dr. Chaos presents Top hacker tools, techniques & DeepWeb exploits.mp4
|
35.6 MB
|
Aaron Haymore - Red Team Tooling with Nim-Lang.eng.srt
|
18.6 KB
|
Aaron Haymore - Red Team Tooling with Nim-Lang.mp4
|
7.6 MB
|
Alexander Rubin, Martin Rakhmanov - Pen-testing opensource databases (MySQL and PostgreSQL).eng.srt
|
60.1 KB
|
Alexander Rubin, Martin Rakhmanov - Pen-testing opensource databases (MySQL and PostgreSQL).mp4
|
35.4 MB
|
Alton Crossley - Code Secure Without Becoming a Hacker.eng.srt
|
48.6 KB
|
Alton Crossley - Code Secure Without Becoming a Hacker.mp4
|
26.4 MB
|
Andrew Hall - Putting the Sec back into DevSecOps.eng.srt
|
83.4 KB
|
Andrew Hall - Putting the Sec back into DevSecOps.mp4
|
46.5 MB
|
Andrew Riesel - Lock Picking with Drew.eng.srt
|
40.2 KB
|
Andrew Riesel - Lock Picking with Drew.mp4
|
26.9 MB
|
Bart Stump - How the most hostile network in the world taught me the foundations of security.eng.srt
|
68.6 KB
|
Bart Stump - How the most hostile network in the world taught me the foundations of security.mp4
|
20.0 MB
|
Ben Coon - Emerging Trends in SMS Phishing.eng.srt
|
115.3 KB
|
Ben Coon - Emerging Trends in SMS Phishing.mp4
|
65.1 MB
|
Bill Swearingen - ~~~= {HACKING ANONYMOUSLY} =~~~.eng.srt
|
64.6 KB
|
Bill Swearingen - ~~~= {HACKING ANONYMOUSLY} =~~~.mp4
|
40.6 MB
|
Brian Hoopes - From Developer to CISO lessons I learned along the way.eng.srt
|
50.9 KB
|
Brian Hoopes - From Developer to CISO lessons I learned along the way.mp4
|
27.2 MB
|
Bryce Kunz - Cloud Focused Continuous Red Teaming Avoiding the Fall of Icarus.eng.srt
|
102.7 KB
|
Bryce Kunz - Cloud Focused Continuous Red Teaming Avoiding the Fall of Icarus.mp4
|
47.5 MB
|
Caleb Menendez - Networking outside of the switch rooms.eng.srt
|
40.1 KB
|
Caleb Menendez - Networking outside of the switch rooms.mp4
|
23.5 MB
|
Chase Palmer - 10 Communication Tips for New Security Managers.eng.srt
|
90.4 KB
|
Chase Palmer - 10 Communication Tips for New Security Managers.mp4
|
48.3 MB
|
Chris Honda - Vendor Risk Management 101.eng.srt
|
62.5 KB
|
Chris Honda - Vendor Risk Management 101.mp4
|
23.9 MB
|
Chris Larsen - A Pandemic of Covid-themed Domains.eng.srt
|
45.1 KB
|
Chris Larsen - A Pandemic of Covid-themed Domains.mp4
|
20.5 MB
|
Colin Jackson - Adventures in OSINT.eng.srt
|
123.6 KB
|
Colin Jackson - Adventures in OSINT.mp4
|
53.6 MB
|
David Bowman - Actually Remediating Devices.eng.srt
|
86.6 KB
|
David Bowman - Actually Remediating Devices.mp4
|
32.7 MB
|
David Casteel - How to secure your network, and not have everyone hate you.eng.srt
|
100.6 KB
|
David Casteel - How to secure your network, and not have everyone hate you.mp4
|
37.0 MB
|
Doug Hubbard - Why Data Breaches Aren’t Like Plane Crashes, but Should Be.eng.srt
|
58.5 KB
|
Doug Hubbard - Why Data Breaches Aren’t Like Plane Crashes, but Should Be.mp4
|
26.9 MB
|
G J - Free yourself from traditional cybersecurity learning.eng.srt
|
31.3 KB
|
G J - Free yourself from traditional cybersecurity learning.mp4
|
24.5 MB
|
Gabe Mouritsen - Building your XDR 'Stack'.eng.srt
|
48.0 KB
|
Gabe Mouritsen - Building your XDR 'Stack'.mp4
|
20.2 MB
|
Gabrielle Hempel - Let's Get Cloud Threat Hunting in Cloud-Based Environments.eng.srt
|
39.3 KB
|
Gabrielle Hempel - Let's Get Cloud Threat Hunting in Cloud-Based Environments.mp4
|
19.1 MB
|
Garrett Hamilton, Colt Blackmore - Best Practices Are the Worst.eng.srt
|
79.4 KB
|
Garrett Hamilton, Colt Blackmore - Best Practices Are the Worst.mp4
|
39.9 MB
|
Gary Glover - PCIDSS 4.0.eng.srt
|
101.7 KB
|
Gary Glover - PCIDSS 4.0.mp4
|
69.2 MB
|
Jake Bernardes - Will the USA ever truly care about privacy & its citizens' data.eng.srt
|
103.7 KB
|
Jake Bernardes - Will the USA ever truly care about privacy & its citizens' data.mp4
|
54.2 MB
|
Jason Prost - Overcoming Challenges of a Fragmented Cybersecurity Architecture.eng.srt
|
52.6 KB
|
Jason Prost - Overcoming Challenges of a Fragmented Cybersecurity Architecture.mp4
|
26.7 MB
|
Jesse Harris - Securing a Remote Workforce.eng.srt
|
112.8 KB
|
Jesse Harris - Securing a Remote Workforce.mp4
|
45.4 MB
|
Joe Sarkisian - Whatever Happened Last Time, It Wasn’t A Penetration Test.eng.srt
|
92.1 KB
|
Joe Sarkisian - Whatever Happened Last Time, It Wasn’t A Penetration Test.mp4
|
69.6 MB
|
John Whiteman - Let's Do a Crypto Review.eng.srt
|
57.8 KB
|
John Whiteman - Let's Do a Crypto Review.mp4
|
23.1 MB
|
Jonathan Dutson - An Inside Look Into Microsoft's Cloud Bug Bounty Programs.eng.srt
|
41.7 KB
|
Jonathan Dutson - An Inside Look Into Microsoft's Cloud Bug Bounty Programs.mp4
|
17.7 MB
|
Josh Brodbent - Identity Driven Zero Trust.eng.srt
|
36.8 KB
|
Josh Brodbent - Identity Driven Zero Trust.mp4
|
17.1 MB
|
Josh Galvez - Hackers Challenge Shakedown.eng.srt
|
68.0 KB
|
Josh Galvez - Hackers Challenge Shakedown.mp4
|
40.9 MB
|
Josh Linton - Executive Cybersecurity Strategies What you must know.eng.srt
|
74.1 KB
|
Josh Linton - Executive Cybersecurity Strategies What you must know.mp4
|
31.2 MB
|
Justin Giboney - Lessons learned from a socially-engineerable chatbot.eng.srt
|
27.6 KB
|
Justin Giboney - Lessons learned from a socially-engineerable chatbot.mp4
|
21.6 MB
|
Kenton McDaniel - Application Security Maturity Model for Software Companies.eng.srt
|
50.1 KB
|
Kenton McDaniel - Application Security Maturity Model for Software Companies.mp4
|
34.6 MB
|
Kenton McDaniel - Incident Response Tools and Tactics for absolute beginners.eng.srt
|
60.0 KB
|
Kenton McDaniel - Incident Response Tools and Tactics for absolute beginners.mp4
|
24.3 MB
|
Keynote - Deviant Ollam - Lawyer. Passport. Locksmith. Gun.eng.srt
|
189.2 KB
|
Keynote - Deviant Ollam - Lawyer. Passport. Locksmith. Gun.mp4
|
78.8 MB
|
Keynote - Jayson E. Street - Hacker Striptease.eng.srt
|
121.1 KB
|
Keynote - Jayson E. Street - Hacker Striptease.mp4
|
116.1 MB
|
Keynote - Stephanie - Snow - Carruthers.eng.srt
|
68.1 KB
|
Keynote - Stephanie - Snow - Carruthers.mp4
|
52.7 MB
|
Loren Russon, Steve Allison - Journey to Zero Trust.eng.srt
|
66.6 KB
|
Loren Russon, Steve Allison - Journey to Zero Trust.mp4
|
32.0 MB
|
Matt Lorimer - Send n00bs.eng.srt
|
54.1 KB
|
Matt Lorimer - Send n00bs.mp4
|
44.3 MB
|
Matthew Toussain - Vulnerabilities are a Sirius Problem.eng.srt
|
102.8 KB
|
Matthew Toussain - Vulnerabilities are a Sirius Problem.mp4
|
51.2 MB
|
Michael Fischer - You have an AppSec Program, right.eng.srt
|
104.5 KB
|
Michael Fischer - You have an AppSec Program, right.mp4
|
60.5 MB
|
Michael Whiteley - The Badge Talk.eng.srt
|
44.9 KB
|
Michael Whiteley - The Badge Talk.mp4
|
44.5 MB
|
Mike Spicer - Hack Your Way to OffSec Tools, Tricks and Stories from The Red Side.eng.srt
|
120.1 KB
|
Mike Spicer - Hack Your Way to OffSec Tools, Tricks and Stories from The Red Side.mp4
|
75.5 MB
|
Noah Simon - Shrink the Attack Surface.eng.srt
|
45.9 KB
|
Noah Simon - Shrink the Attack Surface.mp4
|
19.6 MB
|
OWN THE CON 2022.eng.srt
|
38.0 KB
|
OWN THE CON 2022.mp4
|
80.3 MB
|
Pete Kruckenberg - What Security Geeks should know (and could exploit) about software development.eng.srt
|
73.0 KB
|
Pete Kruckenberg - What Security Geeks should know (and could exploit) about software development.mp4
|
59.1 MB
|
Rick Gardner - CISA Cybersecurity Resources.eng.srt
|
55.1 KB
|
Rick Gardner - CISA Cybersecurity Resources.mp4
|
37.3 MB
|
Russell Mosley - Why are all the CISOs leaving.eng.srt
|
52.6 KB
|
Russell Mosley - Why are all the CISOs leaving.mp4
|
25.0 MB
|
SAINTCON 2022 - Conference Closing.eng.srt
|
74.4 KB
|
SAINTCON 2022 - Conference Closing.mp4
|
61.0 MB
|
SAINTCON 2022 - Conference Opening.eng.srt
|
33.9 KB
|
SAINTCON 2022 - Conference Opening.mp4
|
25.3 MB
|
SAINTCON 2022 - Tamper Evident - Fabric Event Wristband.mp4
|
2.5 MB
|
SAINTCON Kids Night ChromeBook Hacking Tutorial.eng.srt
|
29.9 KB
|
SAINTCON Kids Night ChromeBook Hacking Tutorial.mp4
|
36.9 MB
|
SAINTCON People MiniBadge Assembly.eng.srt
|
20.1 KB
|
SAINTCON People MiniBadge Assembly.mp4
|
24.6 MB
|
Sean Jackson - What If I Told You There Were 10 Things You Didn't Know Right Now.eng.srt
|
52.0 KB
|
Sean Jackson - What If I Told You There Were 10 Things You Didn't Know Right Now.mp4
|
22.5 MB
|
Sean Jackson - Who's the Imposter.eng.srt
|
47.8 KB
|
Sean Jackson - Who's the Imposter.mp4
|
48.0 MB
|
Sean McHenry - Dungeons & Dragons & Cybersecurity.eng.srt
|
71.4 KB
|
Sean McHenry - Dungeons & Dragons & Cybersecurity.mp4
|
42.0 MB
|
Shawn Graff - CISA and the Cyber and Infrastructure Security Landscape.eng.srt
|
55.3 KB
|
Shawn Graff - CISA and the Cyber and Infrastructure Security Landscape.mp4
|
43.8 MB
|
Shawn Wallis - Exposing Your SaaS (Secondary title It's my data and I'll leak it if I want to).eng.srt
|
33.3 KB
|
Shawn Wallis - Exposing Your SaaS (Secondary title It's my data and I'll leak it if I want to).mp4
|
15.6 MB
|
Shawn Wallis - Threat Modeling in a Crypto-Haunted World.eng.srt
|
57.7 KB
|
Shawn Wallis - Threat Modeling in a Crypto-Haunted World.mp4
|
31.0 MB
|
Sherrie Cowley - Lead Like There is No Limit.eng.srt
|
111.4 KB
|
Sherrie Cowley - Lead Like There is No Limit.mp4
|
61.9 MB
|
Sohini Mukherjee - Securing Kubernetes Deployment @Scale.eng.srt
|
42.9 KB
|
Sohini Mukherjee - Securing Kubernetes Deployment @Scale.mp4
|
22.3 MB
|
Stephanie L - True Life I Got Into Security.eng.srt
|
75.4 KB
|
Stephanie L - True Life I Got Into Security.mp4
|
38.9 MB
|
Troy Jessup - Building a Risk Acceptance Process.eng.srt
|
96.1 KB
|
Troy Jessup - Building a Risk Acceptance Process.mp4
|
48.7 MB
|
Troy Jessup - Hacking Apple AirTags.eng.srt
|
96.5 KB
|
Troy Jessup - Hacking Apple AirTags.mp4
|
58.7 MB
|
Troy Jessup - The Future of UtahSAINT and SAINTCON.eng.srt
|
108.4 KB
|
Troy Jessup - The Future of UtahSAINT and SAINTCON.mp4
|
56.2 MB
|
Tyler Strickland - Improving Security Through Compassion.eng.srt
|
81.0 KB
|
Tyler Strickland - Improving Security Through Compassion.mp4
|
47.1 MB
|
Vader Minibadge Assembly Instructions.eng.srt
|
28.6 KB
|
Vader Minibadge Assembly Instructions.mp4
|
38.0 MB
|
Waylon Grange - H is for Hacking.eng.srt
|
37.8 KB
|
Waylon Grange - H is for Hacking.mp4
|
24.5 MB
|
Yoda MiniBadge Assembly Instructions.eng.srt
|
28.0 KB
|
Yoda MiniBadge Assembly Instructions.mp4
|
31.5 MB
|
/SAINTCON 2023/
|
0WN TH3 C0N 2023.en.srt
|
13.2 KB
|
0WN TH3 C0N 2023.mp4
|
24.5 MB
|
Alexander Rubin - Confused Deputy Problem.eng.srt
|
47.8 KB
|
Alexander Rubin - Confused Deputy Problem.mp4
|
28.9 MB
|
Andrew Brandt (spike)- You're No George Clooney.eng.srt
|
83.0 KB
|
Andrew Brandt (spike)- You're No George Clooney.mp4
|
61.0 MB
|
Andréanne Bergeron - Characterizing Remote Desktop Attackers.eng.srt
|
73.6 KB
|
Andréanne Bergeron - Characterizing Remote Desktop Attackers.mp4
|
38.0 MB
|
Ben Coon & Jake Sloane - Unmasking SMS Phishing.eng.srt
|
97.0 KB
|
Ben Coon & Jake Sloane - Unmasking SMS Phishing.mp4
|
51.1 MB
|
Bryce Kunz - Cloud Red Teaming.eng.srt
|
82.6 KB
|
Bryce Kunz - Cloud Red Teaming.mp4
|
37.8 MB
|
Camille Singleton - Cloudy With a Chance of Attack.eng.srt
|
49.1 KB
|
Camille Singleton - Cloudy With a Chance of Attack.mp4
|
20.3 MB
|
Chad Walker - Securing Big Stupid Machines.eng.srt
|
52.1 KB
|
Chad Walker - Securing Big Stupid Machines.mp4
|
27.1 MB
|
Chandler McClellan - Unleashing Pandora's Code.eng.srt
|
57.4 KB
|
Chandler McClellan - Unleashing Pandora's Code.mp4
|
27.6 MB
|
Chris Honda - Making Security Happen Without Being A Jerk.eng.srt
|
58.6 KB
|
Chris Honda - Making Security Happen Without Being A Jerk.mp4
|
36.9 MB
|
Christopher Forte - Full Stack for - Hackers.eng.srt
|
117.0 KB
|
Christopher Forte - Full Stack for - Hackers.mp4
|
42.5 MB
|
Closing Ceremonies.eng.srt
|
93.0 KB
|
Closing Ceremonies.mp4
|
66.2 MB
|
Corey Ball - Start Hacking APIs.eng.srt
|
44.5 KB
|
Corey Ball - Start Hacking APIs.mp4
|
26.2 MB
|
Derek Espiritu - Breaking Into Cyber Security.eng.srt
|
38.7 KB
|
Derek Espiritu - Breaking Into Cyber Security.mp4
|
19.0 MB
|
Doug Hubbard - The Mighty Few Excelling in Small Security Teams.eng.srt
|
43.6 KB
|
Doug Hubbard - The Mighty Few Excelling in Small Security Teams.mp4
|
18.3 MB
|
Dustin Lee - A Beginner's Guide to Zeek.eng.srt
|
49.1 KB
|
Dustin Lee - A Beginner's Guide to Zeek.mp4
|
25.3 MB
|
El Kentaro - The Makings of a Hacker.eng.srt
|
77.6 KB
|
El Kentaro - The Makings of a Hacker.mp4
|
65.0 MB
|
Francisco Parra - Threat Informed Defense.eng.srt
|
43.1 KB
|
Francisco Parra - Threat Informed Defense.mp4
|
19.8 MB
|
Ian Briley - Getting the Most Out of Your Web Application Pentest.eng.srt
|
50.8 KB
|
Ian Briley - Getting the Most Out of Your Web Application Pentest.mp4
|
26.0 MB
|
Iceman - RFID Hacking.eng.srt
|
104.1 KB
|
Iceman - RFID Hacking.mp4
|
73.3 MB
|
Ivan Koshkin - The Lifecycle of Detection Engineering.eng.srt
|
56.6 KB
|
Ivan Koshkin - The Lifecycle of Detection Engineering.mp4
|
19.8 MB
|
Jacob Oakley - In Space, No One Can Hear You Ping.eng.srt
|
82.8 KB
|
Jacob Oakley - In Space, No One Can Hear You Ping.mp4
|
43.3 MB
|
James Cabe - Building an Isolated Recovery Environment.eng.srt
|
95.4 KB
|
James Cabe - Building an Isolated Recovery Environment.mp4
|
34.0 MB
|
James Reynolds - Understanding AI.eng.srt
|
109.0 KB
|
James Reynolds - Understanding AI.mp4
|
48.9 MB
|
Jason Downey - Six Things No One F@#$% Told Me About Pentesting.eng.srt
|
109.0 KB
|
Jason Downey - Six Things No One F@#$% Told Me About Pentesting.mp4
|
45.0 MB
|
Jeff Doty - File Upload Attacks Methodology.eng.srt
|
80.6 KB
|
Jeff Doty - File Upload Attacks Methodology.mp4
|
31.1 MB
|
Jess Chang - Scaling Your Security Culture.eng.srt
|
47.3 KB
|
Jess Chang - Scaling Your Security Culture.mp4
|
14.6 MB
|
Jesse Harris - DNS as a Security Tool.eng.srt
|
42.3 KB
|
Jesse Harris - DNS as a Security Tool.mp4
|
12.5 MB
|
Joe Grand - Keynote.eng.srt
|
101.6 KB
|
Joe Grand - Keynote.mp4
|
83.6 MB
|
Jonathan Dutson - Build Your Own AI Assistant.eng.srt
|
51.4 KB
|
Jonathan Dutson - Build Your Own AI Assistant.mp4
|
24.3 MB
|
Josh Galvez (zevlag) - Hackers Challenge.eng.srt
|
71.6 KB
|
Josh Galvez (zevlag) - Hackers Challenge.mp4
|
64.6 MB
|
Kenton McDaniel - Quantifying Cyber Risk in Real Dollars.eng.srt
|
51.2 KB
|
Kenton McDaniel - Quantifying Cyber Risk in Real Dollars.mp4
|
22.9 MB
|
Kyle Feuz - Wireshark 101.eng.srt
|
83.5 KB
|
Kyle Feuz - Wireshark 101.mp4
|
51.8 MB
|
Lee Christensen, Will Schroeder, and Maxwell Harley - Fighting Data With Data.eng.srt
|
103.7 KB
|
Lee Christensen, Will Schroeder, and Maxwell Harley - Fighting Data With Data.mp4
|
46.4 MB
|
Mark Walker - 7 Lessons Learned.eng.srt
|
55.0 KB
|
Mark Walker - 7 Lessons Learned.mp4
|
27.8 MB
|
Matt Durrin - The Need For Speed.eng.srt
|
103.4 KB
|
Matt Durrin - The Need For Speed.mp4
|
30.4 MB
|
Matt Lorimer (zodiak) - TTX (Probably) Not as Boring as They Sound.eng.srt
|
96.4 KB
|
Matt Lorimer (zodiak) - TTX (Probably) Not as Boring as They Sound.mp4
|
56.0 MB
|
Michael Fischer - You are the reason your AppSec Program is failing.eng.srt
|
45.4 KB
|
Michael Fischer - You are the reason your AppSec Program is failing.mp4
|
24.8 MB
|
Michael Whiteley - The Badge Talk.eng.srt
|
67.2 KB
|
Michael Whiteley - The Badge Talk.mp4
|
60.5 MB
|
Micheal Cottingham - Exploiting Chef.eng.srt
|
72.5 KB
|
Micheal Cottingham - Exploiting Chef.mp4
|
26.1 MB
|
Mike Spicer (d4rkm4tter) - PCAPinator.eng.srt
|
39.8 KB
|
Mike Spicer (d4rkm4tter) - PCAPinator.mp4
|
27.2 MB
|
Mike Venturelli - The (NTLM)Relay Race Against Threat Actors.eng.srt
|
57.4 KB
|
Mike Venturelli - The (NTLM)Relay Race Against Threat Actors.mp4
|
36.3 MB
|
Morgan Thomas - Becoming A Space Pirate.eng.srt
|
39.8 KB
|
Morgan Thomas - Becoming A Space Pirate.mp4
|
23.3 MB
|
Nicole Beckwith - Keynote.eng.srt
|
81.3 KB
|
Nicole Beckwith - Keynote.mp4
|
49.9 MB
|
Philip Kemp & Scott Henderson - Beyond the Annual Penetration Test.eng.srt
|
38.3 KB
|
Philip Kemp & Scott Henderson - Beyond the Annual Penetration Test.mp4
|
33.9 MB
|
Raili Taylor - Banish the Haunting Specter of Black Box Models.eng.srt
|
87.4 KB
|
Raili Taylor - Banish the Haunting Specter of Black Box Models.mp4
|
31.7 MB
|
Roberto Mello - Alice, this is Bob.eng.srt
|
101.0 KB
|
Roberto Mello - Alice, this is Bob.mp4
|
41.4 MB
|
Sam Moses - Easy Wins to Make My Job Harder.eng.srt
|
77.3 KB
|
Sam Moses - Easy Wins to Make My Job Harder.mp4
|
30.7 MB
|
Sean McHenry - Engineering Your Employees Before They Are Socially Engineered.eng.srt
|
77.3 KB
|
Sean McHenry - Engineering Your Employees Before They Are Socially Engineered.mp4
|
48.6 MB
|
Shaun Price (klippy) - Shuhari.eng.srt
|
87.6 KB
|
Shaun Price (klippy) - Shuhari.mp4
|
22.3 MB
|
Sherri Davidoff & Matt Durrin - Ransomware New Trends & Prevention Strategies.eng.srt
|
130.2 KB
|
Sherri Davidoff & Matt Durrin - Ransomware New Trends & Prevention Strategies.mp4
|
57.5 MB
|
Sherri Davidoff - Zero-Day and Mass Supply Chain Attacks.eng.srt
|
105.0 KB
|
Sherri Davidoff - Zero-Day and Mass Supply Chain Attacks.mp4
|
38.9 MB
|
Trevor O'Donnal - Red vs Blue The Eternal Arms Race.eng.srt
|
101.6 KB
|
Trevor O'Donnal - Red vs Blue The Eternal Arms Race.mp4
|
39.4 MB
|
Troy Jessup - Flipper Zero.eng.srt
|
75.5 KB
|
Troy Jessup - Flipper Zero.mp4
|
49.7 MB
|
Tuesday Introduction.eng.srt
|
41.5 KB
|
Tuesday Introduction.mp4
|
37.6 MB
|
Vince Kenney - Cybercrime Incorporated.eng.srt
|
49.1 KB
|
Vince Kenney - Cybercrime Incorporated.mp4
|
24.9 MB
|
Wally Prather - Turning Data into Intelligence with Russian Data Dumps.eng.srt
|
102.5 KB
|
Wally Prather - Turning Data into Intelligence with Russian Data Dumps.mp4
|
52.7 MB
|
Wednesday Introduction.eng.srt
|
5.5 KB
|
Wednesday Introduction.mp4
|
6.0 MB
|
Total files 727
|