Torrent Info
Title GrrCON
Category
Size 12.50GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[Least] resistance is [anything but] futile Tim Maletic.mp4 46.60MB
[Least] resistance is [anything but] futile Tim Maletic.srt 46.95KB
#TrevorForget with Lintile.mp4 13.40MB
2018 SIEM Trends What is my Mean Time to Value Bill Lampe.eng.srt 115.69KB
2018 SIEM Trends What is my Mean Time to Value Bill Lampe.mp4 50.00MB
3rd Party Data Burns Aaron Finux Finnon.mp4 40.45MB
Abnormal Behavior Detection in Large Environments Dave Kennedy.mp4 48.85MB
Abnormal Behavior Detection in Large Environments Dave Kennedy.srt 176.11KB
Act Three The Evolution of Privacy Finux.mp4 39.25MB
Act Three The Evolution of Privacy Finux.srt 104.82KB
A Day in the Life of a Security Operations Center What do you get when you partner.eng.srt 44.20KB
A Day in the Life of a Security Operations Center What do you get when you partner.mp4 20.50MB
Adding 10 Security to Your Scrum Agile Environment tehEx0dus.mp4 19.48MB
Adding 10 Security to Your Scrum Agile Environment tehEx0dus.srt 24.56KB
Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.mp4 61.97MB
Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.srt 71.50KB
Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.eng.srt 121.60KB
Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.mp4 43.09MB
Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.mp4 37.92MB
Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.srt 74.40KB
A GRReat New Way of Thinking about Innovating for Cyber Defense and even Cyber Offense Ernest.mp4 64.84MB
Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).mp4 21.53MB
Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).srt 38.09KB
Alexander Chaveriat - I Think Therefore I PwN.mp4 49.02MB
Alexander Chaveriat - I Think Therefore I PwN.srt 37.64KB
AlgoSec.mp4 22.27MB
AlgoSec.srt 22.67KB
Alignment of business and IT Security Shane Harsch.mp4 28.87MB
Alignment of business and IT Security Shane Harsch.srt 96.79KB
Amol Sarwate - SCADA Security.mp4 54.52MB
Amol Sarwate - SCADA Security.srt 76.43KB
Analyzing Multi Dimensional Malware Dataset Ankur Tyagi.mp4 40.19MB
Analyzing Pwned Passwords with Apache Spark Kelley Robinson.eng.srt 123.66KB
Analyzing Pwned Passwords with Apache Spark Kelley Robinson.mp4 38.90MB
An Attack Pathway Into Your Organization Reducing risk without reducing operational efficiency.mp4 54.39MB
and bad mistakes Ive made a few Jayson Street.mp4 41.71MB
and bad mistakes Ive made a few Jayson Street.srt 80.84KB
and bad mistakes Ive made a few Jayson Street (only first 30 min or so).mp4 41.71MB
and bad mistakes Ive made a few Jayson Street (only first 30 min or so).srt 80.84KB
An Employee their Laptop and a Hacker walk into a Bar Shannon Fritz.mp4 59.56MB
An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.eng.srt 20.19KB
An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.mp4 26.35MB
Application Pen Testing Chris Pfoutz.mp4 38.34MB
Application Recon The Lost Art Tony Miller.mp4 33.59MB
Application Recon The Lost Art Tony Miller.srt 62.58KB
A Reporters Look at Open Source Intelligence Hilary Louise.mp4 48.50MB
Are you a janitor or a cleaner John ageekspeeda Stauffacher Matthew Mattrix Hoy.mp4 35.39MB
Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.mp4 53.82MB
Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.srt 67.31KB
A Theme of Fear Hacking the Paradigm Catherine Ullman.eng.srt 87.61KB
A Theme of Fear Hacking the Paradigm Catherine Ullman.mp4 59.60MB
atlas of d00m - TBA.mp4 51.17MB
atlas of d00m - TBA.srt 14.60KB
atlas of doom- GHz or Bust.mp4 59.90MB
atlas of doom- GHz or Bust.srt 71.59KB
Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.mp4 52.67MB
Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.srt 167.76KB
Automating Phishing Analysis Kyle Eaton.eng.srt 32.62KB
Automating Phishing Analysis Kyle Eaton.mp4 15.54MB
Automation and Open Source Turning the Tide on Attackers John Grigg.eng.srt 137.98KB
Automation and Open Source Turning the Tide on Attackers John Grigg.mp4 52.83MB
Autonomous Remote Hacking Drones Dr Phil Polstra.mp4 41.93MB
Backdooring Git John Menerick.mp4 35.39MB
Backdooring Git John Menerick.srt 43.08KB
Back to the Future Understanding our future but following the past Kevin Johnson.mp4 43.88MB
Back to the Future Understanding our future but following the past Kevin Johnson.srt 121.19KB
Bad Guys Look Just Like You Justin Beard.mp4 19.70MB
Bad Guys Look Just Like You Justin Beard.srt 48.39KB
Baselining Behavior Tradecraft through Simulations Dave Kenendy.mp4 49.83MB
Beautiful Models - J Wolfgang Goerlich.mp4 59.44MB
Beautiful Models - J Wolfgang Goerlich.srt 30.65KB
Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.mp4 25.30MB
Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.srt 66.23KB
Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.eng.srt 36.28KB
Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.mp4 24.39MB
Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.mp4 18.21MB
Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.srt 30.16KB
Bigger Boys Made Us Mike Kemp.mp4 57.83MB
Big Plane Little Plane How common aviation attacks affect airlines and general avia.eng.srt 70.98KB
Big Plane Little Plane How common aviation attacks affect airlines and general avia.mp4 55.94MB
Binary Ninja Jared Demott.mp4 38.95MB
Binary Ninja Jared Demott.srt 125.73KB
BioHacking Becoming the Best Me I Can Be Leonard.mp4 31.83MB
Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.eng.srt 57.87KB
Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.mp4 32.41MB
Blinkie Lights Network Monitoring with Arduino - Steve Ocepek.mp4 45.02MB
Blinkie Lights Network Monitoring with Arduino - Steve Ocepek.srt 46.91KB
Board Breaking Challenge.mp4 21.75MB
bonus talk Ryan Wisniewski.eng.srt 47.30KB
bonus talk Ryan Wisniewski.mp4 25.61MB
Bounty Hunters J Wolfgang Goerlich.eng.srt 135.36KB
Bounty Hunters J Wolfgang Goerlich.mp4 43.11MB
Breach Stains Matt The Streaker Johnson.mp4 36.97MB
Breaking Android Apps for Fun and Profit Bill Sempf.mp4 35.36MB
Breaking Android Apps for Fun and Profit Bill Sempf.srt 127.49KB
Breaking in Bad Im The One Who Doesnt Knock jayson Street.mp4 49.24MB
Breaking in Bad Im The One Who Doesnt Knock jayson Street.srt 72.56KB
Breaking NBAD & UEBA Detection by Charles Herring.eng.srt 58.21KB
Breaking NBAD & UEBA Detection by Charles Herring.mp4 29.30MB
Building a Usable Mobile Data Protection Strategy David Heal Schwartzberg.mp4 52.24MB
Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.mp4 19.33MB
Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.srt 28.19KB
Burning the Enterprise with BYOD - Georgia Weidman.mp4 78.45MB
But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.mp4 51.48MB
But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.srt 56.90KB
Can you patch a cloud Scott Thomas.srt 52.53KB
Career Risk Management 10 tips to keep you employed Chris Burrows.eng.srt 123.17KB
Career Risk Management 10 tips to keep you employed Chris Burrows.mp4 48.62MB
Change is Simply an Act of Survival Predicting the future while shackled to the past Bil Har.mp4 32.96MB
Characteristics of a Highly-Effective Information Security Executive - Bob West.mp4 40.29MB
Characteristics of a Highly-Effective Information Security Executive - Bob West.srt 47.66KB
Chris Roberts - By Land, By Sea, By Air.mp4 60.85MB
Chris Roberts - By Land, By Sea, By Air.srt 81.24KB
Chris Roberts - Planes, Trains and Automobiles.mp4 28.18MB
Chris Roberts - Planes, Trains and Automobiles.srt 35.79KB
Chris Silvers - Go with the Flow - Strategies for Successful Social Engineering.mp4 52.44MB
Chris Silvers - Go with the Flow - Strategies for Successful Social Engineering.srt 76.28KB
Christopher Elisan - Threat Ecosystem.mp4 45.51MB
Christopher Elisan - Threat Ecosystem.srt 61.07KB
Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.eng.srt 37.93KB
Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.mp4 24.59MB
Cons Careers SciaticNerd.eng.srt 93.74KB
Cons Careers SciaticNerd.mp4 47.39MB
Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.mp4 38.77MB
Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.srt 143.80KB
Critical Incident Surviving my first layoff by applying BCPDRP Principles Tom Mead.mp4 33.23MB
Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.mp4 20.84MB
Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.srt 56.10KB
Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.eng.srt 72.35KB
Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.mp4 26.49MB
Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.mp4 47.18MB
Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.srt 68.54KB
CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.eng.srt 107.09KB
CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.mp4 59.46MB
Cyber Cyber Cyber Using the killchain to accomplish something Amanda Berlin.mp4 47.41MB
Cyber Security Incidents Red Blue Team Unc13 Fuck3r.mp4 18.01MB
Cyber Vigilantes - Rob Rachwald.mp4 28.23MB
Cyber Vigilantes - Rob Rachwald.srt 26.63KB
dam Ely- Hack The Cloud.mp4 74.42MB
dam Ely- Hack The Cloud.srt 95.33KB
Dance Fancybear Dance a study in macOS Cat Self.eng.srt 86.42KB
Dance Fancybear Dance a study in macOS Cat Self.mp4 45.26MB
Daniel Gregory - Securing & Managing Mobile Devices in the workplace.mp4 28.72MB
Daniel Gregory - Securing & Managing Mobile Devices in the workplace.srt 48.28KB
Daniel Lohrman - Why Security Professionals Fail.mp4 50.73MB
Daniel Lohrman - Why Security Professionals Fail.srt 73.40KB
Data Access Rights Exploits under New Privacy Laws Amber Welch.eng.srt 50.42KB
Data Access Rights Exploits under New Privacy Laws Amber Welch.mp4 28.12MB
Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.eng.srt 150.41KB
Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.mp4 53.99MB
Data Security How to avoid an embarrassing breach Matt mattrix Hoy.eng.srt 59.86KB
Data Security How to avoid an embarrassing breach Matt mattrix Hoy.mp4 39.16MB
David HealWHans Schwartzberg - iOS Hash Cracking.mp4 59.32MB
David HealWHans Schwartzberg - iOS Hash Cracking.srt 63.04KB
David Schwartzberg- Zeus C&C for Tech Support.mp4 50.67MB
David Schwartzberg- Zeus C&C for Tech Support.srt 8.90KB
Dear Pentesters, Get Bent - Duncan Manuts.mp4 35.95MB
Dear Pentesters, Get Bent - Duncan Manuts.srt 44.21KB
Deepfakes If anything can be real then nothing is real April C Wright.eng.srt 86.88KB
Deepfakes If anything can be real then nothing is real April C Wright.mp4 51.11MB
Defcon CTF-Why even Losers Always Win - Jarod DeMott.mp4 26.21MB
Defcon CTF-Why even Losers Always Win - Jarod DeMott.srt 23.15KB
Defending The De funded Keith Wilson.mp4 30.59MB
Departing Employees Departing Data Todd Thorsen.eng.srt 32.09KB
Departing Employees Departing Data Todd Thorsen.mp4 20.28MB
Designing a Cloud Security Blueprint Sarah Elie.eng.srt 87.91KB
Designing a Cloud Security Blueprint Sarah Elie.mp4 37.57MB
Destroy Everything Tom Somerville.mp4 22.38MB
Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.eng.srt 35.63KB
Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.mp4 25.15MB
Dispelling Cloud Security Hype - Johnathan Norman.mp4 28.01MB
Dispelling Cloud Security Hype - Johnathan Norman.srt 29.97KB
Dissecting Destructive Malware and Recovering from Catastrophe Bryan York.mp4 30.07MB
Dragnet Your Social Engineering Sidekick Truman Kain.eng.srt 54.01KB
Dragnet Your Social Engineering Sidekick Truman Kain.mp4 18.60MB
Duncan Manuts - Certify Manuts.mp4 61.21MB
Duncan Manuts - Certify Manuts.srt 95.14KB
Embedding Security in Embedded Systems Dr Jared DeMott.mp4 50.62MB
emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.eng.srt 103.19KB
emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.mp4 67.91MB
Encryption Mobility Cloud Oh My Bill Harmer.mp4 27.98MB
Encryption Mobility Cloud Oh My Bill Harmer.srt 87.53KB
Eye on the Prize a Proposal for Legalizing Hacking Back Adam Hogan.mp4 58.79MB
Fighting the Enemy Within Matt Crowe.mp4 16.82MB
Fighting the Enemy Within Matt Crowe.srt 74.40KB
Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.mp4 22.41MB
Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.srt 28.29KB
Finuxs Historical Tour Of IDS Evasion Insertions and Other Odditie Arron Finux Finnon.mp4 56.54MB
Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.mp4 10.21MB
Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.srt 45.21KB
Footprints of This Years Top Attack Vectors Kerstyn Clover.mp4 47.57MB
From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.eng.srt 99.89KB
From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.mp4 52.82MB
Full Douchesclosure Duncan Manuts.mp4 41.15MB
Gary McCully & David Sopata - Hacking PCI Requ.mp4 49.43MB
Gary McCully & David Sopata - Hacking PCI Requ.srt 67.11KB
Getting to the Root of Advanced Threats Before Impact Josh Fazio.mp4 14.26MB
Getting to the Root of Advanced Threats Before Impact Josh Fazio.srt 43.05KB
Good Cyber Hygiene and using analytics to drive the need for it on Print David Rose.mp4 27.51MB
Grand Rapids next to GrrCON, high water.mp4 1.02MB
Grrcon 2014 closing.mp4 22.44MB
GrrCON Logo.png 294.03KB
GrrCon TAP.mp4 13.71MB
GrrCON thank you.txt 1.55KB
Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.eng.srt 138.54KB
Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.mp4 51.68MB
Guarding Lunch J Wolfgang Goerlich.mp4 45.55MB
Guarding Lunch J Wolfgang Goerlich.srt 162.43KB
Hacker History - This Stuff Matters - Duncan Manuts.mp4 47.41MB
Hackers Are People Too Infosystir.mp4 31.27MB
Hacker Tools Compliments of Microsoft David Fletcher Sally Vandeven.eng.srt 102.90KB
Hacking Giveaways, Contests, and Polls for Fun and Profit - Matthew Bryant.mp4 64.47MB
Hacking Giveaways, Contests, and Polls for Fun and Profit - Matthew Bryant.srt 42.24KB
Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.eng.srt 47.74KB
Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.mp4 31.56MB
Hacking the Next Generation HealWHans.mp4 30.44MB
Hacking the Next Generation HealWHans.srt 56.60KB
Hacking Trust Steven Fox.mp4 25.40MB
Hacking Trust Steven Fox.srt 11.78KB
Hack the Hustle Career Strategies For Information Security Professionals Eve Adams.mp4 38.30MB
Harness the Force for Better Penetration Testing Patrick Fussell.mp4 13.17MB
Harness the Force for Better Penetration Testing Patrick Fussell.srt 24.67KB
Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.eng.srt 77.61KB
Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.mp4 67.76MB
Hello GrrCON.mp4 3.42MB
Hidden Treasure Detecting Intrusions with ETW Zac Brown.mp4 48.81MB
Hillbilly Storytime Pentest Fails Adam Compton.eng.srt 53.71KB
Hillbilly Storytime Pentest Fails Adam Compton.mp4 36.49MB
Home Grown Linux Phil Polstra.mp4 29.19MB
Honeypots for Active Defense Greg Foss.mp4 46.92MB
Honeypots for Active Defense Greg Foss.srt 74.57KB
Hook, Line and Syncer - A Liar for Hire s Ultimate Tackle Box Chris Silvers & Pat McCoy.mp4 45.42MB
Host Hunting on a Budget cyberGoatPsyOps.eng.srt 46.62KB
Host Hunting on a Budget cyberGoatPsyOps.mp4 26.32MB
How asteroids falling from the sky improve security - J Wolfgang Goerlich.mp4 36.47MB
How asteroids falling from the sky improve security - J Wolfgang Goerlich.srt 34.63KB
How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.mp4 21.31MB
How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.srt 31.97KB
How do you POC Are you really testing a product Ken Donze.mp4 20.43MB
How Do You Secure What You don't Control Dimitri Vlachos.mp4 18.19MB
How Do You Secure What You don't Control Dimitri Vlachos.srt 64.72KB
How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.eng.srt 48.34KB
How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.mp4 30.57MB
How I Got Network Creds Without Even Asking A Social Engineering Case Study J.mp4 19.02MB
How I Got Network Creds Without Even Asking A Social Engineering Case Study J.srt 26.03KB
How Nathan Crashed and Burned Nathan Dragun.eng.srt 52.85KB
How Nathan Crashed and Burned Nathan Dragun.mp4 21.73MB
How this 20 Year Old Changed the Security Industry James ONeill.mp4 18.38MB
How to budget IDSs Brian Arcane Heitzman.mp4 20.88MB
How to Conduct a Product Security Test And How it Fits Into the Larger Security St.eng.srt 119.85KB
How to Conduct a Product Security Test And How it Fits Into the Larger Security St.mp4 33.06MB
How to Implement Crypto Poorly Sean Cassidy.mp4 24.68MB
How to Implement Crypto Poorly Sean Cassidy.srt 92.14KB
How to Make a Honeypot Stickier SSH Jose Hernandez.eng.srt 92.01KB
How to Make a Honeypot Stickier SSH Jose Hernandez.mp4 51.72MB
How to rob a bank over the phone Joshua Naga Crumbaugh.eng.srt 119.38KB
How to rob a bank over the phone Joshua Naga Crumbaugh.mp4 63.63MB
Hunting Hackers Tim Crothers.mp4 32.98MB
Hunting Hackers Tim Crothers.srt 49.61KB
Infosec State of Affairs Too much Kim Kardashian not enough Malcolm Gladwel Jim Wojno Dan Ki.mp4 49.51MB
Infrastructure Based Security Chris Barnes.mp4 47.58MB
InSpec Compliance as Code Kent picat Gruber.eng.srt 117.11KB
InSpec Compliance as Code Kent picat Gruber.mp4 37.92MB
Intelligence Driven Security Shane Harsch.mp4 31.70MB
Intelligence Driven Security Shane Harsch.srt 54.25KB
Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.mp4 41.14MB
Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.srt 114.07KB
I PWN thee I PWN thee not Jayson Street.eng.srt 86.94KB
I PWN thee I PWN thee not Jayson Street.mp4 57.49MB
Is it EVIL Chaoticflaws.mp4 33.25MB
Is it EVIL Chaoticflaws.srt 45.03KB
It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.mp4 48.68MB
It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.srt 70.82KB
Ive got a Pocket Bone to pick with you Dr Phil Postra.mp4 44.82MB
Jack Wink - XSS Session Fixation.mp4 16.24MB
Jack Wink - XSS Session Fixation.srt 24.98KB
Jared DeMott - Stop ROP and Roll.mp4 75.62MB
Jimmy Shah - Advances in Android Malware.mp4 62.37MB
Jimmy Shah - Advances in Android Malware.srt 82.70KB
Jim Rennie - Law of Internet Scanning.mp4 56.67MB
Jim Rennie - Law of Internet Scanning.srt 82.00KB
Jonathan Deutsch - Facebook and You.mp4 35.49MB
Jonathan Deutsch - Facebook and You.srt 44.79KB
J Wolfgang Goerlich- Punch Counter Punch with.mp4 57.24MB
J Wolfgang Goerlich- Punch Counter Punch with.srt 57.48KB
Kernel Fun - Jon Oberheide.mp4 42.47MB
Kernel Fun - Jon Oberheide.srt 27.21KB
Keynote Amanda Infosystir Berlin.mp4 53.00MB
Keynote Dave Kennedy.eng.srt 152.05KB
Keynote Dave Kennedy.mp4 49.36MB
Keynote Rachel Soul Crusher86 G.eng.srt 86.02KB
Keynote Rachel Soul Crusher86 G.mp4 42.90MB
Larry Holland & Hal Charnley - The Killer is Already in Your House.mp4 21.34MB
Larry Holland & Hal Charnley - The Killer is Already in Your House.srt 33.60KB
Learning from InfoSec Fails - Derek Milroy.mp4 57.43MB
Legal Perspectives on Data Breaches - Carol Romej.mp4 27.91MB
Legal Perspectives on Data Breaches - Carol Romej.srt 31.41KB
LEVIATHAN Command and Control Communications on Planet Earth Kevin Thompson.mp4 21.43MB
Life Death the Nematodes Long live Cyber Resilience Chad Calease.eng.srt 128.83KB
Life Death the Nematodes Long live Cyber Resilience Chad Calease.mp4 68.23MB
Louise Popyck - Simplifying Data Center Security and Compliance.mp4 42.69MB
Louise Popyck - Simplifying Data Center Security and Compliance.srt 23.27KB
Machine Duping Pwning Deep Learning Systems Clarence Chio.mp4 51.97MB
Machine Duping Pwning Deep Learning Systems Clarence Chio.srt 124.09KB
Magnetic Stripes 101 Tyler Keeton.mp4 15.38MB
Magnetic Stripes 101 Tyler Keeton.srt 36.65KB
Make STEHM Great Again David HealWHans Schwartzberg.mp4 31.40MB
Make STEHM Great Again David HealWHans Schwartzberg.srt 117.25KB
Malicious Cryptomining is Exploding Are you at risk John Fatten.eng.srt 63.92KB
Malicious Cryptomining is Exploding Are you at risk John Fatten.mp4 55.31MB
Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.eng.srt 122.53KB
Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.mp4 36.43MB
Mark Ehr - Security Intellligence.mp4 53.35MB
Mark Ehr - Security Intellligence.srt 87.01KB
Mark Stanislav - Core Linux Security - 0-Day Isn t Everything.mp4 44.42MB
Matt Johnson - Powershell - Be a Cool Blue Kid.mp4 44.96MB
Matt Johnson - Powershell - Be a Cool Blue Kid.srt 49.61KB
Mike Kemp - Everything Old is New Again.mp4 75.84MB
Mike Kemp - Everything Old is New Again.srt 106.64KB
Mike Kemp - When I grow up I want to be a cyber terrorist.mp4 46.40MB
Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.eng.srt 33.37KB
Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.mp4 18.50MB
Mobile App Moolah - Profit taking with Mobile Malware - Jimmy Shah.mp4 39.67MB
Mobile App Moolah - Profit taking with Mobile Malware - Jimmy Shah.srt 20.45KB
Money Fame Power Build your success as a security professional Nathan Dragun.mp4 36.27MB
Money Fame Power Build your success as a security professional Nathan Dragun.srt 149.29KB
More Tales from the CryptAnalyst Jeff Man.eng.srt 139.31KB
More Tales from the CryptAnalyst Jeff Man.mp4 57.23MB
MSSPs are greatand other lies I tell myself Scott Thomas.eng.srt 99.61KB
MSSPs are greatand other lies I tell myself Scott Thomas.mp4 42.94MB
My First year in Application Security Whitney Phillips.eng.srt 52.46KB
My First year in Application Security Whitney Phillips.mp4 30.23MB
National Guard for Cyber How about a Volunteer Cyber Department Ray Davidson.mp4 28.53MB
Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.eng.srt 73.46KB
Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.mp4 58.11MB
Nick Percoco - Mobile Attacks - What will the future bring.mp4 50.12MB
Nick Percoco - Mobile Attacks - What will the future bring.srt 89.43KB
No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.mp4 36.99MB
No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.srt 60.93KB
OAuth20 a Itas the Implementation Stupid Tony Miller.mp4 48.00MB
On being an Eeyore in Infosec Stefan Edwards.mp4 31.56MB
On being an Eeyore in Infosec Stefan Edwards.srt 138.82KB
Oops Was that your pacemaker Charles Parker II.mp4 29.58MB
Pacu Attack and Post Exploitation in AWS Spencer Gietzen.eng.srt 56.87KB
Pacu Attack and Post Exploitation in AWS Spencer Gietzen.mp4 21.68MB
Panel Discussion - Cloud Data Security and Privacy - How to leverage the Cloud safely.mp4 44.39MB
Panel Discussion - Cloud Data Security and Privacy - How to leverage the Cloud safely.srt 59.85KB
Path Well Traveled Common Mistakes with SIEM Nick Jacob.mp4 31.40MB
Path Well Traveled Common Mistakes with SIEM Nick Jacob.srt 45.39KB
PCI and Crypto The Good The Bad and The Frankly Ugly Robert Formera.mp4 29.29MB
Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.mp4 22.70MB
Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.srt 57.93KB
Pen Test War Stories Why my job is so easy and how you can make it harder Aaron Herndon.mp4 44.96MB
Philip Polstra - Battery Powered Pentesting and Forensics.mp4 52.54MB
Philip Polstra - Battery Powered Pentesting and Forensics.srt 68.85KB
Phish your employees for fun Kristoffer Marshall.mp4 47.99MB
Phish your employees for fun Kristoffer Marshall.srt 109.89KB
Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.mp4 41.71MB
Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.srt 52.37KB
Physicals Badges and why it matters Alex Fernandez Gatti.eng.srt 73.75KB
Physicals Badges and why it matters Alex Fernandez Gatti.mp4 33.16MB
Piercing the Air Gap Network Steganography for Everyone John Ventura.mp4 31.74MB
Piercing the Air Gap Network Steganography for Everyone John Ventura.srt 105.31KB
Poking The Bear Mike Kemp.mp4 60.88MB
Population Control Through The Advances In Technology Chris Roberts part 1.mp4 45.14MB
Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.mp4 35.18MB
Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.srt 135.32KB
ProbeSpy Tracking your past predicting your future stumblebot.mp4 26.40MB
Process The Salvation of Incident Response Charles Herring.mp4 16.28MB
Process The Salvation of Incident Response Charles Herring.srt 26.75KB
Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.mp4 33.63MB
Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.srt 51.63KB
PSD2 SCA WTF Kelley Robinson.eng.srt 49.80KB
PSD2 SCA WTF Kelley Robinson.mp4 18.73MB
Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.mp4 46.98MB
Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.srt 36.90KB
Pwnage from the Skies - Philip Polstra.mp4 54.64MB
Pwnage from the Skies - Philip Polstra.srt 31.05KB
QA on our industry and other things that are top of mind Chris Roberts.eng.srt 82.06KB
QA on our industry and other things that are top of mind Chris Roberts.mp4 58.66MB
Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.mp4 50.54MB
Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.srt 106.42KB
Rafal Los- House of Cards.mp4 49.93MB
Rafal Los- House of Cards.srt 75.87KB
Raymond Lily - OSINT Footprinting.mp4 55.14MB
Raymond Lily - OSINT Footprinting.srt 66.57KB
Reality Checking Your AppSec Program Darren Meyer.mp4 15.81MB
Reality Checking Your AppSec Program Darren Meyer.srt 75.59KB
Realizing Software Security Maturity The Growing Pains Gains Mark Stanislav Kelby Ludwig.mp4 46.37MB
Real World Red Teaming spartan.mp4 40.96MB
Red Teaming Back and Forth 5ever FuzzyNop.mp4 41.20MB
Red Teaming Back and Forth 5ever FuzzyNop.srt 66.69KB
Red Team Yourself Thomas Richards.mp4 32.04MB
Reverse Engineering Malware for N00bs GregB33fJames.eng.srt 91.05KB
Reverse Engineering Malware for N00bs GregB33fJames.mp4 58.43MB
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.mp4 42.81MB
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.srt 142.12KB
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).mp4 42.77MB
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).srt 141.23KB
Richard Stiennon - Cyber Defense.mp4 51.21MB
Richard Stiennon - Cyber Defense.srt 78.17KB
Robert Rowley - Juice Jacking.mp4 29.97MB
Robert Rowley - Juice Jacking.srt 43.48KB
Saving All the Money to Buy All the Booze Learning to Hack All the Things on.eng.srt 97.49KB
Saving All the Money to Buy All the Booze Learning to Hack All the Things on.mp4 40.52MB
Scott Thomas - InfoSec Flameout.mp4 14.20MB
Scott Thomas - InfoSec Flameout.srt 24.83KB
Secure Dicks Michael Kemp.mp4 40.39MB
Secure Dicks Michael Kemp.srt 102.82KB
Securing Todays Enterprise WAN Andy Mansfield.mp4 26.98MB
Securing Todays Enterprise WAN Andy Mansfield.srt 30.58KB
Securing Trust Defending Against Next generation Attacks John Muirhead Gould.mp4 27.31MB
Securing Trust Defending Against Next generation Attacks John Muirhead Gould.srt 70.89KB
Security Counterknowledge - Mike Kemp.mp4 73.21MB
Security for the People End User Authentication Security on the Internet Mark Stanislav.mp4 30.47MB
Security Frameworks What was once old is new again Brian Wrozek.mp4 22.16MB
Security Frameworks What was once old is new again Brian Wrozek.srt 37.52KB
Security Guards LOL Brent White Tim Roberts.mp4 46.93MB
Security Guards LOL Brent White Tim Roberts.srt 156.06KB
Security Incident Response Derek Milroy.mp4 46.30MB
Security Incident Response Derek Milroy.srt 80.51KB
Security On The Cheap Joel Cardella.mp4 42.14MB
Shell scripting live Linux Forensics Dr Phil Polstra.mp4 35.75MB
Shell scripting live Linux Forensics Dr Phil Polstra.srt 47.73KB
Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.mp4 29.37MB
Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.srt 31.57KB
Skills For A Red Teamer Brent White Tim Roberts.mp4 55.61MB
SmartMeters - Are they a gateway drug - Robert Former.mp4 50.72MB
SmartMeters - Are they a gateway drug - Robert Former.srt 60.02KB
SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.eng.srt 152.94KB
SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.mp4 49.87MB
Software Defined Segmentation Matt Hendrickson.mp4 27.41MB
Software Security IWR Thomas G13 Richards.mp4 28.03MB
Software Security IWR Thomas G13 Richards.srt 60.19KB
So Youve Inherited a Security Department Now What Amanda Berlin.mp4 35.00MB
So Youve Inherited a Security Department Now What Amanda Berlin.srt 102.52KB
So You Want to Be a Pentester Absolute0x0.mp4 33.45MB
So You Want to Be a Pentester Absolute0x0.srt 92.47KB
Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.mp4 40.35MB
Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.srt 47.45KB
sploit me if u can - atlas 0f d00m.mp4 46.76MB
sploit me if u can - atlas 0f d00m.srt 34.68KB
Ssshhhh Atlas of Doom.eng.srt 82.79KB
Ssshhhh Atlas of Doom.mp4 64.84MB
Steve F. Fox - From Obstacle to Ally - Repositioning the Security Team.mp4 52.89MB
still broken after all these years aka utility security for smarties doug nibbelink.mp4 39.94MB
still broken after all these years aka utility security for smarties doug nibbelink.srt 114.88KB
Stop attacking your mothers car Charles Parker II.mp4 25.72MB
Stop attacking your mothers car Charles Parker II.srt 69.99KB
Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.eng.srt 136.34KB
Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.mp4 57.19MB
STRATEGIES ON SECURING YOU BANKS ENTERPRISES FROM SOMEONE WHO ROBS BANKS ENTERPRISES FOR A L.mp4 68.58MB
Subject matter to be determined by the number of federal agents present in th.mp4 44.07MB
Subject matter to be determined by the number of federal agents present in th.srt 51.17KB
Surfing and Security Ride the wave Chris Burrows.eng.srt 51.62KB
Surfing and Security Ride the wave Chris Burrows.mp4 27.26MB
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.mp4 45.60MB
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.srt 136.79KB
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).mp4 45.60MB
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).srt 135.54KB
Symbolically executing a fuzzy tyrant Lojikil.eng.srt 81.32KB
Symbolically executing a fuzzy tyrant Lojikil.mp4 43.00MB
Tales from the Cryptanalyst Jeff Man.mp4 45.28MB
Tales from the Cryptanalyst Jeff Man.srt 129.68KB
Tales From The Trenches Practical Information Security Lessons Michael Belton.mp4 42.00MB
Taylor Ettema - Modern Malware.mp4 43.71MB
Taylor Ettema - Modern Malware.srt 65.61KB
The Abyss is Waving BackThe four paths that human evolution is charging down a.eng.srt 135.77KB
The Abyss is Waving BackThe four paths that human evolution is charging down a.mp4 58.26MB
The Black Art of Wireless Post Exploitation Gabriel solstice Ryan.mp4 50.30MB
The Challenge of Natural Security Systems Rockie Brockway.mp4 38.96MB
The future of Authenticity - Moxie Marlinspike.mp4 46.90MB
The future of Authenticity - Moxie Marlinspike.srt 43.13KB
The Future of Cyber Security Anthony Sabaj.mp4 46.91MB
The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.mp4 38.98MB
The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.srt 80.74KB
The Hitch Hikers Guide to Information Security Kellman Meghu.mp4 49.32MB
The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.eng.srt 151.51KB
The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.mp4 50.91MB
The Importance of IT Asset Visibility Brian Berk.eng.srt 34.66KB
The Importance of IT Asset Visibility Brian Berk.mp4 21.08MB
The Importance of Relevant Timely and Qualitative Intelligence Analysis Aamil AK.mp4 20.74MB
The Past Present Future of Cyber Threats Chris Russell.eng.srt 44.29KB
The Past Present Future of Cyber Threats Chris Russell.mp4 26.00MB
The Safety You Think You Have is Only a Masquerade Nathan Dragun.mp4 44.98MB
The Safety You Think You Have is Only a Masquerade Nathan Dragun.srt 65.63KB
The Science of Breaking and Entering Alissa dnsprincess.eng.srt 97.42KB
The Science of Breaking and Entering Alissa dnsprincess.mp4 51.42MB
The Science of Security Automation - Paul Cochran & Toni Buhrke.mp4 56.55MB
The Science of Security Automation - Paul Cochran & Toni Buhrke.srt 34.49KB
The Shuttle Columbia Disaster Lessons That Were Not Learned Joel I love it when they call me.mp4 57.98MB
The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.eng.srt 41.47KB
The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.mp4 19.16MB
The wrong side of history everything that is old is new again Arron Finnon.mp4 62.49MB
This Is All Your Fault Duncan Manuts.mp4 35.54MB
This Is All Your Fault Duncan Manuts.srt 46.20KB
Thomas Richards - Android in the Healthcare Workplace.mp4 23.09MB
Thomas Richards - Android in the Healthcare Workplace.srt 35.83KB
Threat Detection Response with Hipara J Brett Cunningham.mp4 32.67MB
Threat Detection Response with Hipara J Brett Cunningham.srt 59.80KB
Threat Detection Response with Hipara J Brett Cunningham (2).mp4 32.77MB
Threat Detection Response with Hipara J Brett Cunningham (2).srt 59.75KB
Threat Hunting the macOS edition Megan Carney.eng.srt 111.70KB
Threat Hunting the macOS edition Megan Carney.mp4 46.20MB
Threat Intelligence Zero to Basics in presentation Chris J.mp4 38.96MB
Threat Modeling How to actually do it and make it useful Derek Milroy.eng.srt 157.97KB
Threat Modeling How to actually do it and make it useful Derek Milroy.mp4 56.62MB
Ticking me off From Threat Intel to Reversing Juan Cortes.mp4 22.43MB
Ticking me off From Threat Intel to Reversing Juan Cortes.srt 24.28KB
tlas of d00m subbing for Kevin Johnson- Tactical SecOps.mp4 44.76MB
Tom Clare - 7 Stages of Advanced Threats.mp4 25.30MB
Tom Clare - 7 Stages of Advanced Threats.srt 41.67KB
Topic depends on number of federal agents in audience Atlas of Doom.mp4 64.51MB
Understanding and Improving the Military Cyber Culture Dariusz Mikulski.mp4 16.40MB
Understanding and Improving the Military Cyber Culture Dariusz Mikulski.srt 32.05KB
Understanding how public places introduce additional risks to business Len Noe.eng.srt 83.07KB
Understanding how public places introduce additional risks to business Len Noe.mp4 56.49MB
Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.eng.srt 99.42KB
Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.mp4 49.40MB
Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.mp4 21.40MB
Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.srt 64.73KB
Vaccinating APKs Milan Gabor.mp4 47.47MB
Vaccinating APKs Milan Gabor.srt 65.50KB
vAp0r and the Blooming Onion Justin Whitehead Jim Allee.mp4 41.41MB
Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.eng.srt 51.53KB
Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.mp4 20.66MB
Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.eng.srt 59.74KB
Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.mp4 27.18MB
Vulnerable By Design a The Backdoor That Came Through the Front Matthew mandatory Bryant.mp4 24.21MB
Want to Play a Game John DeRyke.eng.srt 41.70KB
Want to Play a Game John DeRyke.mp4 18.32MB
Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.mp4 47.65MB
Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.srt 128.54KB
We got it wrong Wolfgang Goerlich.mp4 51.03MB
Welcome to the Internet of insecure things Chandler Howell.mp4 17.42MB
Welcome to the Internet of insecure things Chandler Howell.srt 25.51KB
Welcome to The World of Yesterday Tomorrow Joel Cardella.mp4 25.14MB
Welcome to The World of Yesterday Tomorrow Joel Cardella.srt 150.70KB
we we Internet Explorer Does What It Wants Aaron Heikkila.eng.srt 53.63KB
we we Internet Explorer Does What It Wants Aaron Heikkila.mp4 23.27MB
What Are We Doing Here Rethinking Security Jeff Man.eng.srt 88.26KB
What Are We Doing Here Rethinking Security Jeff Man.mp4 47.53MB
What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.mp4 25.16MB
What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.srt 66.71KB
What is a cloud access broker and do I need one Tom Doane.mp4 18.04MB
What is a cloud access broker and do I need one Tom Doane.srt 34.24KB
What s - Context - got to do with it - Arron Finnon.mp4 71.21MB
What s - Context - got to do with it - Arron Finnon.srt 40.63KB
Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.mp4 38.21MB
Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.srt 118.22KB
William Tarkington - Psychological Tricks of the Social Engineer.mp4 61.78MB
William Tarkington - Psychological Tricks of the Social Engineer.srt 77.18KB
Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.mp4 34.35MB
Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.srt 38.97KB
You Got Your SQL Attacks In My Honeypot Andrew Brandt.mp4 26.18MB
Youre right this talk isnt really about you Jayson E Street.eng.srt 122.32KB
Youre right this talk isnt really about you Jayson E Street.mp4 47.15MB
Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.eng.srt 166.04KB
Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.mp4 58.01MB
ZeuS - Inside Command and Control Adam Johnson.mp4 43.52MB
ZeuS - Inside Command and Control Adam Johnson.srt 37.59KB
ZitMo NoM David HealWHans Schwartzberg.mp4 42.49MB
Similar Torrents
NoNameCon 3.56GB
Bosnian Bill - Lockpicking 40.83GB
OzSecCon 1.64GB
Security Onion 1.40GB
ROOTCON 5.39GB
SyScan 3.89GB
BalCCon 9.37GB
GLOBSEC 15.01GB
BloomCON 1.04GB
Rooted (Rooted CON) 23.87GB
Distribution statistics by country
United States (US) 5
Total 5
IP List List of IP addresses which were distributed this torrent