BITCQ

GrrCON

Size: 17.8 GB
Magnet link

Name Size
GrrCON/GrrCON 2012/GrrCON 2012 - Philip Polstra - Battery Powered Pentesting and Forensics.mp4 462.8 MB
GrrCON/GrrCON 2011/GrrCON 11 - Kernel Fun - Jon Oberheide.srt 27 KB
GrrCON/GrrCON 2011/GrrCON 11 AlgoSec.mp4 52.4 MB
GrrCON/GrrCON 2011/GrrCON 11 AlgoSec.srt 23 KB
GrrCON/GrrCON 2011/GrrCON 11 Blinkie Lights! Network Monitoring with Arduino - Steve Ocepek.mp4 131.2 MB
GrrCON/GrrCON 2011/GrrCON 11 Blinkie Lights! Network Monitoring with Arduino - Steve Ocepek.srt 47 KB
GrrCON/GrrCON 2011/GrrCON 11 Characteristics of a Highly-Effective Information Security Executive - Bob West.mp4 76.8 MB
GrrCON/GrrCON 2011/GrrCON 11 Characteristics of a Highly-Effective Information Security Executive - Bob West.srt 48 KB
GrrCON/GrrCON 2011/GrrCON 11 Chris Roberts - Planes, Trains and Automobiles.mp4 113.4 MB
GrrCON/GrrCON 2011/GrrCON 11 Chris Roberts - Planes, Trains and Automobiles.srt 36 KB
GrrCON/GrrCON 2011/GrrCON 11 Cyber Vigilantes - Rob Rachwald.mp4 70.5 MB
GrrCON/GrrCON 2011/GrrCON 11 Cyber Vigilantes - Rob Rachwald.srt 27 KB
GrrCON/GrrCON 2011/GrrCON 11 Dear Pentesters, Get Bent - Duncan Manuts.mp4 79.1 MB
GrrCON/GrrCON 2011/GrrCON 11 Dear Pentesters, Get Bent - Duncan Manuts.srt 44 KB
GrrCON/GrrCON 2011/GrrCON 11 Defcon CTF-Why even Losers Always Win - Jarod DeMott.mp4 59.8 MB
GrrCON/GrrCON 2011/GrrCON 11 Defcon CTF-Why even Losers Always Win - Jarod DeMott.srt 23 KB
GrrCON/GrrCON 2011/GrrCON 11 Dispelling Cloud Security Hype - Johnathan Norman.mp4 61.9 MB
GrrCON/GrrCON 2011/GrrCON 11 Dispelling Cloud Security Hype - Johnathan Norman.srt 30 KB
GrrCON/GrrCON 2011/GrrCON 11 Hacking Trust Steven Fox.mp4 48.1 MB
GrrCON/GrrCON 2011/GrrCON 11 Hacking Trust Steven Fox.srt 12 KB
GrrCON/GrrCON 2011/GrrCON 11 Hook, Line and Syncer A Liar for Hire s Ultimate Tackle Box Chris Silvers & Pat McCoy.mp4 85.6 MB
GrrCON/GrrCON 2011/GrrCON 11 How asteroids falling from the sky improve security - J Wolfgang Goerlich.mp4 92.8 MB
GrrCON/GrrCON 2011/GrrCON 11 How asteroids falling from the sky improve security - J Wolfgang Goerlich.srt 35 KB
GrrCON/GrrCON 2011/GrrCON 11 Hunting Hackers Tim Crothers.mp4 95.7 MB
GrrCON/GrrCON 2011/GrrCON 11 Hunting Hackers Tim Crothers.srt 50 KB
GrrCON/GrrCON 2011/GrrCON 11 It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.mp4 92.1 MB
GrrCON/GrrCON 2011/GrrCON 11 It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.srt 71 KB
GrrCON/GrrCON 2011/GrrCON 11 Legal Perspectives on Data Breaches - Carol Romej.mp4 72.6 MB
GrrCON/GrrCON 2011/GrrCON 11 Legal Perspectives on Data Breaches - Carol Romej.srt 31 KB
GrrCON/GrrCON 2011/GrrCON 11 Mike Kemp - When I grow up I want to be a cyber terrorist.mp4 102.4 MB
GrrCON/GrrCON 2011/GrrCON 11 Mobile App Moolah Profit taking with Mobile Malware - Jimmy Shah.mp4 91.2 MB
GrrCON/GrrCON 2011/GrrCON 11 Mobile App Moolah Profit taking with Mobile Malware - Jimmy Shah.srt 20 KB
GrrCON/GrrCON 2011/GrrCON 11 Panel Discussion Cloud Data Security and Privacy -- How to leverage the Cloud safely.mp4 84.4 MB
GrrCON/GrrCON 2011/GrrCON 11 Panel Discussion Cloud Data Security and Privacy -- How to leverage the Cloud safely.srt 60 KB
GrrCON/GrrCON 2011/GrrCON 11 SmartMeters Are they a gateway drug - Robert Former.mp4 111.4 MB
GrrCON/GrrCON 2011/GrrCON 11 SmartMeters Are they a gateway drug - Robert Former.srt 60 KB
GrrCON/GrrCON 2011/GrrCON 11 sploit me if u can - atlas 0f d00m.mp4 88.8 MB
GrrCON/GrrCON 2011/GrrCON 11 sploit me if u can - atlas 0f d00m.srt 35 KB
GrrCON/GrrCON 2011/GrrCON 11 The future of Authenticity - Moxie Marlinspike.mp4 120.1 MB
GrrCON/GrrCON 2011/GrrCON 11 The future of Authenticity - Moxie Marlinspike.srt 43 KB
GrrCON/GrrCON 2011/GrrCON 11 ZeuS -- Inside Command and Control Adam Johnson.mp4 124.9 MB
GrrCON/GrrCON 2011/GrrCON 11 ZeuS -- Inside Command and Control Adam Johnson.srt 38 KB
GrrCON/GrrCON 2011/GrrCON 11 [Least] resistance is [anything but] futile Tim Maletic.mp4 104.5 MB
GrrCON/GrrCON 2011/GrrCON 11 [Least] resistance is [anything but] futile Tim Maletic.srt 47 KB
GrrCON/GrrCON 2012/Grrcon 2012 - Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.mp4 167.5 MB
GrrCON/GrrCON 2012/Grrcon 2012 - Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.srt 72 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).mp4 51.2 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).srt 38 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Alexander Chaveriat - I Think Therefore I PwN.mp4 151.3 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Alexander Chaveriat - I Think Therefore I PwN.srt 38 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Amol Sarwate - SCADA Security.mp4 175.8 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Amol Sarwate - SCADA Security.srt 76 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.mp4 157.9 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.srt 67 KB
GrrCON/GrrCON 2012/GrrCON 2012 - atlas of doom- GHz or Bust.mp4 116.7 MB
GrrCON/GrrCON 2012/GrrCON 2012 - atlas of doom- GHz or Bust.srt 72 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.mp4 45 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.srt 30 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Chris Roberts - By Land, By Sea, By Air.mp4 214.4 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Chris Roberts - By Land, By Sea, By Air.srt 81 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Chris Silvers - Go with the Flow Strategies for Successful Social Engineering.mp4 222.5 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Chris Silvers - Go with the Flow Strategies for Successful Social Engineering.srt 76 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Christopher Elisan - Threat Ecosystem.mp4 107.8 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Christopher Elisan - Threat Ecosystem.srt 61 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Daniel Gregory - Securing & Managing Mobile Devices in the workplace.mp4 62.5 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Daniel Gregory - Securing & Managing Mobile Devices in the workplace.srt 48 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Daniel Lohrman - Why Security Professionals Fail.mp4 114.6 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Daniel Lohrman - Why Security Professionals Fail.srt 73 KB
GrrCON/GrrCON 2012/GrrCON 2012 - David HealWHans Schwartzberg - iOS Hash Cracking.mp4 75.5 MB
GrrCON/GrrCON 2012/GrrCON 2012 - David HealWHans Schwartzberg - iOS Hash Cracking.srt 63 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Duncan Manuts - Certify Manuts.mp4 90.4 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Duncan Manuts - Certify Manuts.srt 95 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Gary McCully & David Sopata - Hacking PCI Requ.mp4 94.6 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Gary McCully & David Sopata - Hacking PCI Requ.srt 67 KB
GrrCON/GrrCON 2012/GrrCON 2012 - J Wolfgang Goerlich- Punch Counter Punch with.mp4 109.9 MB
GrrCON/GrrCON 2012/GrrCON 2012 - J Wolfgang Goerlich- Punch Counter Punch with.srt 57 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Jack Wink - XSS Session Fixation.mp4 39.1 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Jack Wink - XSS Session Fixation.srt 25 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Jared DeMott - Stop! ROP! and Roll!.mp4 188.6 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Jim Rennie - Law of Internet Scanning.mp4 120.4 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Jim Rennie - Law of Internet Scanning.srt 82 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Jimmy Shah - Advances in Android Malware.mp4 148.1 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Jimmy Shah - Advances in Android Malware.srt 83 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Jonathan Deutsch - Facebook and You.mp4 107.8 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Jonathan Deutsch - Facebook and You.srt 45 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Larry Holland & Hal Charnley - The Killer is Already in Your House.mp4 75.4 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Larry Holland & Hal Charnley - The Killer is Already in Your House.srt 34 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Louise Popyck - Simplifying Data Center Security and Compliance.mp4 84.6 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Louise Popyck - Simplifying Data Center Security and Compliance.srt 23 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Mark Ehr - Security Intellligence.mp4 122.1 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Mark Ehr - Security Intellligence.srt 87 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Matt Johnson - Powershell Be a Cool Blue Kid.mp4 153.4 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Matt Johnson - Powershell Be a Cool Blue Kid.srt 50 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Mike Kemp - Everything Old is New Again.mp4 152.1 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Mike Kemp - Everything Old is New Again.srt 107 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Nick Percoco - Mobile Attacks What will the future bring.mp4 100.9 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Nick Percoco - Mobile Attacks What will the future bring.srt 89 KB
GrrCON/GrrCON 2011/GrrCON 11 - Kernel Fun - Jon Oberheide.mp4 127.3 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Philip Polstra - Battery Powered Pentesting and Forensics.srt 69 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Rafal Los- House of Cards.mp4 124 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Rafal Los- House of Cards.srt 76 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Raymond Lily - OSINT Footprinting.mp4 174.8 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Raymond Lily - OSINT Footprinting.srt 67 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Richard Stiennon - Cyber Defense.mp4 168.5 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Richard Stiennon - Cyber Defense.srt 78 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Robert Rowley - Juice Jacking.mp4 108.6 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Robert Rowley - Juice Jacking.srt 43 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Scott Thomas - InfoSec Flameout.mp4 27.1 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Scott Thomas - InfoSec Flameout.srt 25 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Steve F. Fox - From Obstacle to Ally Repositioning the Security Team.mp4 100.1 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Taylor Ettema - Modern Malware.mp4 131.3 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Taylor Ettema - Modern Malware.srt 66 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Thomas Richards - Android in the Healthcare Workplace.mp4 77.2 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Thomas Richards - Android in the Healthcare Workplace.srt 36 KB
GrrCON/GrrCON 2012/GrrCON 2012 - Tom Clare - 7 Stages of Advanced Threats.mp4 51.9 MB
GrrCON/GrrCON 2012/GrrCON 2012 - Tom Clare - 7 Stages of Advanced Threats.srt 42 KB
GrrCON/GrrCON 2012/GrrCON 2012 - William Tarkington - Psychological Tricks of the Social Engineer.mp4 97.2 MB
GrrCON/GrrCON 2012/GrrCON 2012 - William Tarkington - Psychological Tricks of the Social Engineer.srt 77 KB
GrrCON/GrrCON 2012/GrrCON 2012- Adam Ely- Hack The Cloud.mp4 181.7 MB
GrrCON/GrrCON 2012/GrrCON 2012- Adam Ely- Hack The Cloud.srt 95 KB
GrrCON/GrrCON 2012/GrrCON 2012- atlas of d00m subbing for Kevin Johnson- Tactical SecOps.mp4 94.8 MB
GrrCON/GrrCON 2013/GrrCON 2013 - atlas of d00m - TBA.mp4 59.7 MB
GrrCON/GrrCON 2013/GrrCON 2013 - atlas of d00m - TBA.srt 15 KB
GrrCON/GrrCON 2013/GrrCON 2013 - Hacker History This Stuff Matters - Duncan Manuts.mp4 275.8 MB
GrrCON/GrrCON 2013/GrrCON 2013 - Hacking Giveaways, Contests, and Polls for Fun and Profit! - Matthew Bryant.mp4 368.3 MB
GrrCON/GrrCON 2013/GrrCON 2013 - Hacking Giveaways, Contests, and Polls for Fun and Profit! - Matthew Bryant.srt 42 KB
GrrCON/GrrCON 2013/GrrCON 2013 - Mark Stanislav - Core Linux Security 0-Day Isn t Everything.mp4 53.3 MB
GrrCON/GrrCON 2013/GrrCON 2013 - Pwnage from the Skies! - Philip Polstra.mp4 326 MB
GrrCON/GrrCON 2013/GrrCON 2013 - Pwnage from the Skies! - Philip Polstra.srt 31 KB
GrrCON/GrrCON 2013/GrrCON 2013 - Security Counterknowledge - Mike Kemp.mp4 351.9 MB
GrrCON/GrrCON 2013/GrrCON 2013 - The Science of Security Automation - Paul Cochran & Toni Buhrke.mp4 325.9 MB
GrrCON/GrrCON 2013/GrrCON 2013 - The Science of Security Automation - Paul Cochran & Toni Buhrke.srt 34 KB
GrrCON/GrrCON 2013/GrrCON 2013 - What s Context got to do with it! - Arron Finnon.mp4 370.3 MB
GrrCON/GrrCON 2013/GrrCON 2013 - What s Context got to do with it! - Arron Finnon.srt 41 KB
GrrCON/GrrCON 2013/GrrCON 2013 -Burning the Enterprise with BYOD - Georgia Weidman.mp4 399.9 MB
GrrCON/GrrCON 2013/GrrCON 2013- Beautiful Models - J Wolfgang Goerlich.mp4 344 MB
GrrCON/GrrCON 2013/GrrCON 2013- Beautiful Models - J Wolfgang Goerlich.srt 31 KB
GrrCON/GrrCON 2013/GrrCON 2013- David Schwartzberg- Zeus C&C for Tech Support.mp4 165.5 MB
GrrCON/GrrCON 2013/GrrCON 2013- David Schwartzberg- Zeus C&C for Tech Support.srt 9 KB
GrrCON/GrrCON 2014/b00 Hack the Hustle Career Strategies For Information Security Professionals Eve Adams.mp4 115.5 MB
GrrCON/GrrCON 2014/b01 The Challenge of Natural Security Systems Rockie Brockway.mp4 125.4 MB
GrrCON/GrrCON 2014/b02 Application Pen Testing Chris Pfoutz.mp4 94 MB
GrrCON/GrrCON 2014/b03 Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.mp4 92.5 MB
GrrCON/GrrCON 2014/b03 Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.srt 74 KB
GrrCON/GrrCON 2014/b04 Security On The Cheap Joel Cardella.mp4 100.3 MB
GrrCON/GrrCON 2014/b05 Home Grown Linux Phil Polstra.mp4 90.8 MB
GrrCON/GrrCON 2014/b06 Cyber Security Incidents Red Blue Team Unc13 Fuck3r.mp4 44.6 MB
GrrCON/GrrCON 2014/Board Breaking Challenge.mp4 91.3 MB
GrrCON/GrrCON 2014/Grrcon 2014 closing.mp4 80.5 MB
GrrCON/GrrCON 2014/GrrCon TAP.mp4 43.3 MB
GrrCON/GrrCON 2014/s09 How to budget IDSs Brian Arcane Heitzman.mp4 60.3 MB
GrrCON/GrrCON 2014/s10 LEVIATHAN Command and Control Communications on Planet Earth Kevin Thompson.mp4 49.2 MB
GrrCON/GrrCON 2014/s11 Red Teaming Back and Forth 5ever FuzzyNop.mp4 108.8 MB
GrrCON/GrrCON 2014/s11 Red Teaming Back and Forth 5ever FuzzyNop.srt 67 KB
GrrCON/GrrCON 2014/s12 Intelligence Driven Security Shane Harsch.mp4 80.4 MB
GrrCON/GrrCON 2014/s13 Security for the People End User Authentication Security on the Internet Mark Stanislav.mp4 76.8 MB
GrrCON/GrrCON 2014/s14 Hackers Are People Too Infosystir.mp4 62.9 MB
GrrCON/GrrCON 2014/s15 Vaccinating APKs Milan Gabor.mp4 114.3 MB
GrrCON/GrrCON 2014/s15 Vaccinating APKs Milan Gabor.srt 66 KB
GrrCON/GrrCON 2014/t09 ZitMo NoM David HealWHans Schwartzberg.mp4 105.7 MB
GrrCON/GrrCON 2014/t10 Bigger Boys Made Us Mike Kemp.mp4 144.5 MB
GrrCON/GrrCON 2014/t11 Full Douchesclosure Duncan Manuts.mp4 56.4 MB
GrrCON/GrrCON 2014/t12 Finuxs Historical Tour Of IDS Evasion Insertions and Other Odditie Arron Finux Finnon.mp4 142.8 MB
GrrCON/GrrCON 2014/v05 Autonomous Remote Hacking Drones Dr Phil Polstra.mp4 109.4 MB
GrrCON/GrrCON 2014/v06 Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.mp4 76.8 MB
GrrCON/GrrCON 2014/v06 Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.srt 52 KB
GrrCON/GrrCON 2014/v07 BioHacking Becoming the Best Me I Can Be Leonard.mp4 84.8 MB
GrrCON/GrrCON 2014/v08 Vulnerable By Design a The Backdoor That Came Through the Front Matthew mandatory Bryant.mp4 67.3 MB
GrrCON/GrrCON 2014/v09 OAuth20 a Itas the Implementation Stupid Tony Miller.mp4 110.9 MB
GrrCON/GrrCON 2014/v10 Breach Stains Matt The Streaker Johnson.mp4 87.9 MB
GrrCON/GrrCON 2014/v11 Are you a janitor or a cleaner John ageekspeeda Stauffacher Matthew Mattrix Hoy.mp4 98.5 MB
GrrCON/GrrCON 2014/v12 PCI and Crypto The Good The Bad and The Frankly Ugly Robert Formera.mp4 105.8 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger01 Subject matter to be determined by the number of federal agents present in th.mp4 79 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger01 Subject matter to be determined by the number of federal agents present in th.srt 51 KB
GrrCON/GrrCON 2015/AntiFreeze Hamburger02 Breaking in Bad Im The One Who Doesnt Knock jayson Street.mp4 78 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger02 Breaking in Bad Im The One Who Doesnt Knock jayson Street.srt 73 KB
GrrCON/GrrCON 2015/AntiFreeze Hamburger03 Process The Salvation of Incident Response Charles Herring.mp4 29.2 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger03 Process The Salvation of Incident Response Charles Herring.srt 27 KB
GrrCON/GrrCON 2015/AntiFreeze Hamburger05 But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.mp4 90.2 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger05 But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.srt 57 KB
GrrCON/GrrCON 2015/AntiFreeze Hamburger06 The wrong side of history everything that is old is new again Arron Finnon.mp4 204.2 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger07 Poking The Bear Mike Kemp.mp4 193.8 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger08 The Hitch Hikers Guide to Information Security Kellman Meghu.mp4 133.7 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger09 Backdooring Git John Menerick.mp4 63.6 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger09 Backdooring Git John Menerick.srt 43 KB
GrrCON/GrrCON 2015/AntiFreeze Hamburger10 Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.mp4 68.2 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger10 Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.srt 47 KB
GrrCON/GrrCON 2015/AntiFreeze Hamburger11 Adding 10 Security to Your Scrum Agile Environment tehEx0dus.mp4 32.3 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger11 Adding 10 Security to Your Scrum Agile Environment tehEx0dus.srt 25 KB
GrrCON/GrrCON 2015/AntiFreeze Hamburger12 How I Got Network Creds Without Even Asking A Social Engineering Case Study J.mp4 29.5 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger12 How I Got Network Creds Without Even Asking A Social Engineering Case Study J.srt 26 KB
GrrCON/GrrCON 2015/AntiFreeze Hamburger14 Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.mp4 43.5 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger14 Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.srt 32 KB
GrrCON/GrrCON 2015/AntiFreeze Hamburger16 This Is All Your Fault Duncan Manuts.mp4 59.2 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger16 This Is All Your Fault Duncan Manuts.srt 46 KB
GrrCON/GrrCON 2015/AntiFreeze Hamburger17 The Safety You Think You Have is Only a Masquerade Nathan Dragun.mp4 68.9 MB
GrrCON/GrrCON 2015/AntiFreeze Hamburger17 The Safety You Think You Have is Only a Masquerade Nathan Dragun.srt 66 KB
GrrCON/GrrCON 2015/Bumper Massage00 Security Incident Response Derek Milroy.mp4 67.9 MB
GrrCON/GrrCON 2015/Bumper Massage00 Security Incident Response Derek Milroy.srt 81 KB
GrrCON/GrrCON 2015/Bumper Massage01 Hacking the Next Generation HealWHans.mp4 54.8 MB
GrrCON/GrrCON 2015/Bumper Massage01 Hacking the Next Generation HealWHans.srt 57 KB
GrrCON/GrrCON 2015/Bumper Massage02 Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.mp4 35 MB
GrrCON/GrrCON 2015/Bumper Massage02 Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.srt 28 KB
GrrCON/GrrCON 2015/Bumper Massage04 Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.mp4 76.4 MB
GrrCON/GrrCON 2015/Bumper Massage04 Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.srt 37 KB
GrrCON/GrrCON 2015/Bumper Massage05 Application Recon The Lost Art Tony Miller.mp4 53.7 MB
GrrCON/GrrCON 2015/Bumper Massage05 Application Recon The Lost Art Tony Miller.srt 63 KB
GrrCON/GrrCON 2015/Bumper Massage06 The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.mp4 59.3 MB
GrrCON/GrrCON 2015/Bumper Massage06 The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.srt 81 KB
GrrCON/GrrCON 2015/Bumper Massage07 Software Security IWR Thomas G13 Richards.mp4 50.3 MB
GrrCON/GrrCON 2015/Bumper Massage07 Software Security IWR Thomas G13 Richards.srt 60 KB
GrrCON/GrrCON 2015/Bumper Massage08 Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.mp4 68.1 MB
GrrCON/GrrCON 2015/Bumper Massage08 Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.srt 69 KB
GrrCON/GrrCON 2015/Bumper Massage09 Understanding and Improving the Military Cyber Culture Dariusz Mikulski.mp4 29.1 MB
GrrCON/GrrCON 2015/Bumper Massage09 Understanding and Improving the Military Cyber Culture Dariusz Mikulski.srt 32 KB
GrrCON/GrrCON 2015/Bumper Massage11 Harness the Force for Better Penetration Testing Patrick Fussell.mp4 21.1 MB
GrrCON/GrrCON 2015/Bumper Massage11 Harness the Force for Better Penetration Testing Patrick Fussell.srt 25 KB
GrrCON/GrrCON 2015/Bumper Massage12 Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.mp4 33.1 MB
GrrCON/GrrCON 2015/Bumper Massage12 Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.srt 28 KB
GrrCON/GrrCON 2015/Bumper Massage13 Shell scripting live Linux Forensics Dr Phil Polstra.mp4 49.3 MB
GrrCON/GrrCON 2015/Bumper Massage13 Shell scripting live Linux Forensics Dr Phil Polstra.srt 48 KB
GrrCON/GrrCON 2015/Bumper Massage14 Can you patch a cloud Scott Thomas.srt 53 KB
GrrCON/GrrCON 2015/Bumper Massage16 Is it EVIL Chaoticflaws.mp4 56.8 MB
GrrCON/GrrCON 2015/Bumper Massage16 Is it EVIL Chaoticflaws.srt 45 KB
GrrCON/GrrCON 2015/Hello GrrCON.mp4 13.9 MB
GrrCON/GrrCON 2015/Submerssion Therapy00 Ticking me off From Threat Intel to Reversing Juan Cortes.mp4 34.6 MB
GrrCON/GrrCON 2015/Submerssion Therapy00 Ticking me off From Threat Intel to Reversing Juan Cortes.srt 24 KB
GrrCON/GrrCON 2015/Submerssion Therapy01 Securing Todays Enterprise WAN Andy Mansfield.mp4 37.2 MB
GrrCON/GrrCON 2015/Submerssion Therapy01 Securing Todays Enterprise WAN Andy Mansfield.srt 31 KB
GrrCON/GrrCON 2015/Submerssion Therapy02 Footprints of This Years Top Attack Vectors Kerstyn Clover.mp4 132 MB
GrrCON/GrrCON 2015/Submerssion Therapy03 Welcome to the Internet of insecure things Chandler Howell.mp4 23.5 MB
GrrCON/GrrCON 2015/Submerssion Therapy03 Welcome to the Internet of insecure things Chandler Howell.srt 26 KB
GrrCON/GrrCON 2015/Submerssion Therapy05 Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.mp4 62.5 MB
GrrCON/GrrCON 2015/Submerssion Therapy05 Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.srt 52 KB
GrrCON/GrrCON 2015/Submerssion Therapy06 Path Well Traveled Common Mistakes with SIEM Nick Jacob.mp4 47.5 MB
GrrCON/GrrCON 2015/Submerssion Therapy06 Path Well Traveled Common Mistakes with SIEM Nick Jacob.srt 45 KB
GrrCON/GrrCON 2015/Submerssion Therapy08 How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.mp4 32 MB
GrrCON/GrrCON 2015/Submerssion Therapy08 How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.srt 32 KB
GrrCON/GrrCON 2015/Submerssion Therapy09 What is a cloud access broker and do I need one Tom Doane.mp4 25.8 MB
GrrCON/GrrCON 2015/Submerssion Therapy09 What is a cloud access broker and do I need one Tom Doane.srt 34 KB
GrrCON/GrrCON 2015/Submerssion Therapy10 Security Frameworks What was once old is new again Brian Wrozek.mp4 35 MB
GrrCON/GrrCON 2015/Submerssion Therapy10 Security Frameworks What was once old is new again Brian Wrozek.srt 38 KB
GrrCON/GrrCON 2015/Submerssion Therapy11 Honeypots for Active Defense Greg Foss.mp4 77.1 MB
GrrCON/GrrCON 2015/Submerssion Therapy11 Honeypots for Active Defense Greg Foss.srt 75 KB
GrrCON/GrrCON 2015/Submerssion Therapy14 Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.mp4 53.3 MB
GrrCON/GrrCON 2015/Submerssion Therapy14 Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.srt 39 KB
GrrCON/GrrCON 2015/Submerssion Therapy15 No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.mp4 55 MB
GrrCON/GrrCON 2015/Submerssion Therapy15 No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.srt 61 KB
GrrCON/GrrCON 2016/100 Act Three The Evolution of Privacy Finux.mp4 69.3 MB
GrrCON/GrrCON 2016/100 Act Three The Evolution of Privacy Finux.srt 105 KB
GrrCON/GrrCON 2016/102 Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.mp4 77.7 MB
GrrCON/GrrCON 2016/102 Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.srt 129 KB
GrrCON/GrrCON 2016/103 Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.mp4 44 MB
GrrCON/GrrCON 2016/103 Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.srt 66 KB
GrrCON/GrrCON 2016/105 Abnormal Behavior Detection in Large Environments Dave Kennedy.mp4 91.5 MB
GrrCON/GrrCON 2016/105 Abnormal Behavior Detection in Large Environments Dave Kennedy.srt 176 KB
GrrCON/GrrCON 2016/108 Secure Dicks Michael Kemp.mp4 75.5 MB
GrrCON/GrrCON 2016/108 Secure Dicks Michael Kemp.srt 103 KB
GrrCON/GrrCON 2016/110 and bad mistakes Ive made a few Jayson Street (only first 30 min or so).mp4 55 MB
GrrCON/GrrCON 2016/110 and bad mistakes Ive made a few Jayson Street (only first 30 min or so).srt 81 KB
GrrCON/GrrCON 2016/110 and bad mistakes Ive made a few Jayson Street.mp4 55 MB
GrrCON/GrrCON 2016/110 and bad mistakes Ive made a few Jayson Street.srt 81 KB
GrrCON/GrrCON 2016/111 Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.mp4 59.9 MB
GrrCON/GrrCON 2016/111 Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.srt 135 KB
GrrCON/GrrCON 2016/112 Guarding Lunch J Wolfgang Goerlich.mp4 69.8 MB
GrrCON/GrrCON 2016/112 Guarding Lunch J Wolfgang Goerlich.srt 162 KB
GrrCON/GrrCON 2016/113 Back to the Future Understanding our future but following the past Kevin Johnson.mp4 64.7 MB
GrrCON/GrrCON 2016/113 Back to the Future Understanding our future but following the past Kevin Johnson.srt 121 KB
GrrCON/GrrCON 2016/114 Breaking Android Apps for Fun and Profit Bill Sempf.mp4 59.6 MB
GrrCON/GrrCON 2016/114 Breaking Android Apps for Fun and Profit Bill Sempf.srt 127 KB
GrrCON/GrrCON 2016/115 Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.mp4 89.4 MB
GrrCON/GrrCON 2016/115 Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.srt 168 KB
GrrCON/GrrCON 2016/116 Security Guards LOL Brent White Tim Roberts.mp4 87.7 MB
GrrCON/GrrCON 2016/116 Security Guards LOL Brent White Tim Roberts.srt 156 KB
GrrCON/GrrCON 2016/200 Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.mp4 78.4 MB
GrrCON/GrrCON 2016/200 Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.srt 114 KB
GrrCON/GrrCON 2016/201 So You Want to Be a Pentester Absolute0x0.mp4 57.8 MB
GrrCON/GrrCON 2016/201 So You Want to Be a Pentester Absolute0x0.srt 92 KB
GrrCON/GrrCON 2016/202 What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.mp4 42.1 MB
GrrCON/GrrCON 2016/202 What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.srt 67 KB
GrrCON/GrrCON 2016/203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).mp4 78.4 MB
GrrCON/GrrCON 2016/203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).srt 136 KB
GrrCON/GrrCON 2016/203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.mp4 78.7 MB
GrrCON/GrrCON 2016/203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.srt 137 KB
GrrCON/GrrCON 2016/204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).mp4 75.6 MB
GrrCON/GrrCON 2016/204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).srt 141 KB
GrrCON/GrrCON 2016/204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.mp4 78 MB
GrrCON/GrrCON 2016/204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.srt 142 KB
GrrCON/GrrCON 2016/205 Threat Detection Response with Hipara J Brett Cunningham (2).mp4 51.9 MB
GrrCON/GrrCON 2016/205 Threat Detection Response with Hipara J Brett Cunningham (2).srt 60 KB
GrrCON/GrrCON 2016/205 Threat Detection Response with Hipara J Brett Cunningham.mp4 49.6 MB
GrrCON/GrrCON 2016/205 Threat Detection Response with Hipara J Brett Cunningham.srt 60 KB
GrrCON/GrrCON 2016/206 still broken after all these years aka utility security for smarties doug nibbelink.mp4 64.2 MB
GrrCON/GrrCON 2016/206 still broken after all these years aka utility security for smarties doug nibbelink.srt 115 KB
GrrCON/GrrCON 2016/207 Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.mp4 81.4 MB
GrrCON/GrrCON 2016/207 Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.srt 106 KB
GrrCON/GrrCON 2016/208 Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.mp4 34.3 MB
GrrCON/GrrCON 2016/208 Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.srt 56 KB
GrrCON/GrrCON 2016/209 Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.mp4 35.4 MB
GrrCON/GrrCON 2016/209 Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.srt 65 KB
GrrCON/GrrCON 2016/210 Encryption Mobility Cloud Oh My Bill Harmer.mp4 42 MB
GrrCON/GrrCON 2016/210 Encryption Mobility Cloud Oh My Bill Harmer.srt 88 KB
GrrCON/GrrCON 2016/211 Magnetic Stripes 101 Tyler Keeton.mp4 24.7 MB
GrrCON/GrrCON 2016/211 Magnetic Stripes 101 Tyler Keeton.srt 37 KB
GrrCON/GrrCON 2016/212 Machine Duping Pwning Deep Learning Systems Clarence Chio.mp4 116.8 MB
GrrCON/GrrCON 2016/212 Machine Duping Pwning Deep Learning Systems Clarence Chio.srt 124 KB
GrrCON/GrrCON 2016/213 Money Fame Power Build your success as a security professional Nathan Dragun.mp4 62.1 MB
GrrCON/GrrCON 2016/213 Money Fame Power Build your success as a security professional Nathan Dragun.srt 149 KB
GrrCON/GrrCON 2016/214 Tales from the Cryptanalyst Jeff Man.mp4 72.2 MB
GrrCON/GrrCON 2016/214 Tales from the Cryptanalyst Jeff Man.srt 130 KB
GrrCON/GrrCON 2016/215 Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.mp4 60 MB
GrrCON/GrrCON 2016/215 Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.srt 118 KB
GrrCON/GrrCON 2016/216 Binary Ninja Jared Demott.mp4 65.8 MB
GrrCON/GrrCON 2016/216 Binary Ninja Jared Demott.srt 126 KB
GrrCON/GrrCON 2016/217 Phish your employees for fun Kristoffer Marshall.mp4 84.1 MB
GrrCON/GrrCON 2016/217 Phish your employees for fun Kristoffer Marshall.srt 110 KB
GrrCON/GrrCON 2016/300 Securing Trust Defending Against Next generation Attacks John Muirhead Gould.mp4 43.1 MB
GrrCON/GrrCON 2016/300 Securing Trust Defending Against Next generation Attacks John Muirhead Gould.srt 71 KB
GrrCON/GrrCON 2016/302 Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.mp4 20 MB
GrrCON/GrrCON 2016/302 Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.srt 45 KB
GrrCON/GrrCON 2016/303 Make STEHM Great Again David HealWHans Schwartzberg.mp4 55.1 MB
GrrCON/GrrCON 2016/303 Make STEHM Great Again David HealWHans Schwartzberg.srt 117 KB
GrrCON/GrrCON 2016/304 Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.mp4 34.9 MB
GrrCON/GrrCON 2016/304 Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.srt 58 KB
GrrCON/GrrCON 2016/305 How Do You Secure What You Dont Control Dimitri Vlachos.mp4 29.8 MB
GrrCON/GrrCON 2016/305 How Do You Secure What You Dont Control Dimitri Vlachos.srt 65 KB
GrrCON/GrrCON 2016/306 Fighting the Enemy Within Matt Crowe.mp4 28.1 MB
GrrCON/GrrCON 2016/306 Fighting the Enemy Within Matt Crowe.srt 74 KB
GrrCON/GrrCON 2016/307 Getting to the Root of Advanced Threats Before Impact Josh Fazio.mp4 22.1 MB
GrrCON/GrrCON 2016/307 Getting to the Root of Advanced Threats Before Impact Josh Fazio.srt 43 KB
GrrCON/GrrCON 2016/308 Bad Guys Look Just Like You Justin Beard.mp4 28.4 MB
GrrCON/GrrCON 2016/308 Bad Guys Look Just Like You Justin Beard.srt 48 KB
GrrCON/GrrCON 2016/309 Reality Checking Your AppSec Program Darren Meyer.mp4 32 MB
GrrCON/GrrCON 2016/309 Reality Checking Your AppSec Program Darren Meyer.srt 76 KB
GrrCON/GrrCON 2016/310 How to Implement Crypto Poorly Sean Cassidy.mp4 40 MB
GrrCON/GrrCON 2016/310 How to Implement Crypto Poorly Sean Cassidy.srt 92 KB
GrrCON/GrrCON 2016/311 Stop attacking your mothers car Charles Parker II.mp4 41.2 MB
GrrCON/GrrCON 2016/311 Stop attacking your mothers car Charles Parker II.srt 70 KB
GrrCON/GrrCON 2016/312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.mp4 60.9 MB
GrrCON/GrrCON 2016/312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.srt 144 KB
GrrCON/GrrCON 2016/313 Alignment of business and IT Security Shane Harsch.mp4 46.8 MB
GrrCON/GrrCON 2016/313 Alignment of business and IT Security Shane Harsch.srt 97 KB
GrrCON/GrrCON 2016/315 So Youve Inherited a Security Department Now What Amanda Berlin.mp4 49.8 MB
GrrCON/GrrCON 2016/315 So Youve Inherited a Security Department Now What Amanda Berlin.srt 103 KB
GrrCON/GrrCON 2016/316 Piercing the Air Gap Network Steganography for Everyone John Ventura.mp4 47 MB
GrrCON/GrrCON 2016/316 Piercing the Air Gap Network Steganography for Everyone John Ventura.srt 105 KB
GrrCON/GrrCON 2016/317 On being an Eeyore in Infosec Stefan Edwards.mp4 57.1 MB
GrrCON/GrrCON 2016/317 On being an Eeyore in Infosec Stefan Edwards.srt 139 KB
GrrCON/GrrCON 2016/318 Welcome to The World of Yesterday Tomorrow Joel Cardella.mp4 49.7 MB
GrrCON/GrrCON 2016/318 Welcome to The World of Yesterday Tomorrow Joel Cardella.srt 151 KB
GrrCON/GrrCON Logo.png 294 KB
GrrCON/GrrCON thank you.txt 1 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
GrrCON Video 24.3 GB 4
GrrCON Video 17.8 GB 3
GrrCON Video 21.6 GB 1

Loading...