GrrCON/GrrCON 2011/GrrCON 11 - Kernel Fun - Jon Oberheide.mp4 |
127.3 MB |
GrrCON/GrrCON 2011/GrrCON 11 - Kernel Fun - Jon Oberheide.srt |
27 KB |
GrrCON/GrrCON 2011/GrrCON 11 AlgoSec.mp4 |
52.4 MB |
GrrCON/GrrCON 2011/GrrCON 11 AlgoSec.srt |
23 KB |
GrrCON/GrrCON 2011/GrrCON 11 Blinkie Lights! Network Monitoring with Arduino - Steve Ocepek.mp4 |
131.2 MB |
GrrCON/GrrCON 2011/GrrCON 11 Blinkie Lights! Network Monitoring with Arduino - Steve Ocepek.srt |
47 KB |
GrrCON/GrrCON 2011/GrrCON 11 Characteristics of a Highly-Effective Information Security Executive - Bob West.mp4 |
76.8 MB |
GrrCON/GrrCON 2011/GrrCON 11 Characteristics of a Highly-Effective Information Security Executive - Bob West.srt |
48 KB |
GrrCON/GrrCON 2011/GrrCON 11 Chris Roberts - Planes, Trains and Automobiles.mp4 |
113.4 MB |
GrrCON/GrrCON 2011/GrrCON 11 Chris Roberts - Planes, Trains and Automobiles.srt |
36 KB |
GrrCON/GrrCON 2011/GrrCON 11 Cyber Vigilantes - Rob Rachwald.mp4 |
70.5 MB |
GrrCON/GrrCON 2011/GrrCON 11 Cyber Vigilantes - Rob Rachwald.srt |
27 KB |
GrrCON/GrrCON 2011/GrrCON 11 Dear Pentesters, Get Bent - Duncan Manuts.mp4 |
79.1 MB |
GrrCON/GrrCON 2011/GrrCON 11 Dear Pentesters, Get Bent - Duncan Manuts.srt |
44 KB |
GrrCON/GrrCON 2011/GrrCON 11 Defcon CTF-Why even Losers Always Win - Jarod DeMott.mp4 |
59.8 MB |
GrrCON/GrrCON 2011/GrrCON 11 Defcon CTF-Why even Losers Always Win - Jarod DeMott.srt |
23 KB |
GrrCON/GrrCON 2011/GrrCON 11 Dispelling Cloud Security Hype - Johnathan Norman.mp4 |
61.9 MB |
GrrCON/GrrCON 2011/GrrCON 11 Dispelling Cloud Security Hype - Johnathan Norman.srt |
30 KB |
GrrCON/GrrCON 2011/GrrCON 11 Hacking Trust Steven Fox.mp4 |
48.1 MB |
GrrCON/GrrCON 2011/GrrCON 11 Hacking Trust Steven Fox.srt |
12 KB |
GrrCON/GrrCON 2011/GrrCON 11 Hook, Line and Syncer A Liar for Hire s Ultimate Tackle Box Chris Silvers & Pat McCoy.mp4 |
85.6 MB |
GrrCON/GrrCON 2011/GrrCON 11 How asteroids falling from the sky improve security - J Wolfgang Goerlich.mp4 |
92.8 MB |
GrrCON/GrrCON 2011/GrrCON 11 How asteroids falling from the sky improve security - J Wolfgang Goerlich.srt |
35 KB |
GrrCON/GrrCON 2011/GrrCON 11 Hunting Hackers Tim Crothers.mp4 |
95.7 MB |
GrrCON/GrrCON 2011/GrrCON 11 Hunting Hackers Tim Crothers.srt |
50 KB |
GrrCON/GrrCON 2011/GrrCON 11 It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.mp4 |
92.1 MB |
GrrCON/GrrCON 2011/GrrCON 11 It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.srt |
71 KB |
GrrCON/GrrCON 2011/GrrCON 11 Legal Perspectives on Data Breaches - Carol Romej.mp4 |
72.6 MB |
GrrCON/GrrCON 2011/GrrCON 11 Legal Perspectives on Data Breaches - Carol Romej.srt |
31 KB |
GrrCON/GrrCON 2011/GrrCON 11 Mike Kemp - When I grow up I want to be a cyber terrorist.mp4 |
102.4 MB |
GrrCON/GrrCON 2011/GrrCON 11 Mobile App Moolah Profit taking with Mobile Malware - Jimmy Shah.mp4 |
91.2 MB |
GrrCON/GrrCON 2011/GrrCON 11 Mobile App Moolah Profit taking with Mobile Malware - Jimmy Shah.srt |
20 KB |
GrrCON/GrrCON 2011/GrrCON 11 Panel Discussion Cloud Data Security and Privacy -- How to leverage the Cloud safely.mp4 |
84.4 MB |
GrrCON/GrrCON 2011/GrrCON 11 Panel Discussion Cloud Data Security and Privacy -- How to leverage the Cloud safely.srt |
60 KB |
GrrCON/GrrCON 2011/GrrCON 11 SmartMeters Are they a gateway drug - Robert Former.mp4 |
111.4 MB |
GrrCON/GrrCON 2011/GrrCON 11 SmartMeters Are they a gateway drug - Robert Former.srt |
60 KB |
GrrCON/GrrCON 2011/GrrCON 11 The future of Authenticity - Moxie Marlinspike.mp4 |
120.1 MB |
GrrCON/GrrCON 2011/GrrCON 11 The future of Authenticity - Moxie Marlinspike.srt |
43 KB |
GrrCON/GrrCON 2011/GrrCON 11 ZeuS -- Inside Command and Control Adam Johnson.mp4 |
124.9 MB |
GrrCON/GrrCON 2011/GrrCON 11 ZeuS -- Inside Command and Control Adam Johnson.srt |
38 KB |
GrrCON/GrrCON 2011/GrrCON 11 [Least] resistance is [anything but] futile Tim Maletic.mp4 |
104.5 MB |
GrrCON/GrrCON 2011/GrrCON 11 [Least] resistance is [anything but] futile Tim Maletic.srt |
47 KB |
GrrCON/GrrCON 2011/GrrCON 11 sploit me if u can - atlas 0f d00m.mp4 |
88.8 MB |
GrrCON/GrrCON 2011/GrrCON 11 sploit me if u can - atlas 0f d00m.srt |
35 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).mp4 |
51.2 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).srt |
38 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Alexander Chaveriat - I Think Therefore I PwN.mp4 |
151.3 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Alexander Chaveriat - I Think Therefore I PwN.srt |
38 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Amol Sarwate - SCADA Security.mp4 |
175.8 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Amol Sarwate - SCADA Security.srt |
76 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.mp4 |
157.9 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.srt |
67 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.mp4 |
45 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.srt |
30 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Chris Roberts - By Land, By Sea, By Air.mp4 |
214.4 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Chris Roberts - By Land, By Sea, By Air.srt |
81 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Chris Silvers - Go with the Flow Strategies for Successful Social Engineering.mp4 |
222.5 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Chris Silvers - Go with the Flow Strategies for Successful Social Engineering.srt |
76 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Christopher Elisan - Threat Ecosystem.mp4 |
107.8 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Christopher Elisan - Threat Ecosystem.srt |
61 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Daniel Gregory - Securing & Managing Mobile Devices in the workplace.mp4 |
62.5 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Daniel Gregory - Securing & Managing Mobile Devices in the workplace.srt |
48 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Daniel Lohrman - Why Security Professionals Fail.mp4 |
114.6 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Daniel Lohrman - Why Security Professionals Fail.srt |
73 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - David HealWHans Schwartzberg - iOS Hash Cracking.mp4 |
75.5 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - David HealWHans Schwartzberg - iOS Hash Cracking.srt |
63 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Duncan Manuts - Certify Manuts.mp4 |
90.4 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Duncan Manuts - Certify Manuts.srt |
95 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Gary McCully & David Sopata - Hacking PCI Requ.mp4 |
94.6 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Gary McCully & David Sopata - Hacking PCI Requ.srt |
67 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - J Wolfgang Goerlich- Punch Counter Punch with.mp4 |
109.9 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - J Wolfgang Goerlich- Punch Counter Punch with.srt |
57 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Jack Wink - XSS Session Fixation.mp4 |
39.1 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Jack Wink - XSS Session Fixation.srt |
25 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Jared DeMott - Stop! ROP! and Roll!.mp4 |
188.6 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Jim Rennie - Law of Internet Scanning.mp4 |
120.4 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Jim Rennie - Law of Internet Scanning.srt |
82 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Jimmy Shah - Advances in Android Malware.mp4 |
148.1 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Jimmy Shah - Advances in Android Malware.srt |
83 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Jonathan Deutsch - Facebook and You.mp4 |
107.8 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Jonathan Deutsch - Facebook and You.srt |
45 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Larry Holland & Hal Charnley - The Killer is Already in Your House.mp4 |
75.4 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Larry Holland & Hal Charnley - The Killer is Already in Your House.srt |
34 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Louise Popyck - Simplifying Data Center Security and Compliance.mp4 |
84.6 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Louise Popyck - Simplifying Data Center Security and Compliance.srt |
23 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Mark Ehr - Security Intellligence.mp4 |
122.1 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Mark Ehr - Security Intellligence.srt |
87 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Matt Johnson - Powershell Be a Cool Blue Kid.mp4 |
153.4 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Matt Johnson - Powershell Be a Cool Blue Kid.srt |
50 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Mike Kemp - Everything Old is New Again.mp4 |
152.1 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Mike Kemp - Everything Old is New Again.srt |
107 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Nick Percoco - Mobile Attacks What will the future bring.mp4 |
100.9 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Nick Percoco - Mobile Attacks What will the future bring.srt |
89 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Philip Polstra - Battery Powered Pentesting and Forensics.mp4 |
462.8 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Philip Polstra - Battery Powered Pentesting and Forensics.srt |
69 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Rafal Los- House of Cards.mp4 |
124 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Rafal Los- House of Cards.srt |
76 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Raymond Lily - OSINT Footprinting.mp4 |
174.8 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Raymond Lily - OSINT Footprinting.srt |
67 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Richard Stiennon - Cyber Defense.mp4 |
168.5 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Richard Stiennon - Cyber Defense.srt |
78 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Robert Rowley - Juice Jacking.mp4 |
108.6 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Robert Rowley - Juice Jacking.srt |
43 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Scott Thomas - InfoSec Flameout.mp4 |
27.1 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Scott Thomas - InfoSec Flameout.srt |
25 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Steve F. Fox - From Obstacle to Ally Repositioning the Security Team.mp4 |
100.1 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Taylor Ettema - Modern Malware.mp4 |
131.3 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Taylor Ettema - Modern Malware.srt |
66 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Thomas Richards - Android in the Healthcare Workplace.mp4 |
77.2 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Thomas Richards - Android in the Healthcare Workplace.srt |
36 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - Tom Clare - 7 Stages of Advanced Threats.mp4 |
51.9 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - Tom Clare - 7 Stages of Advanced Threats.srt |
42 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - William Tarkington - Psychological Tricks of the Social Engineer.mp4 |
97.2 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - William Tarkington - Psychological Tricks of the Social Engineer.srt |
77 KB |
GrrCON/GrrCON 2012/GrrCON 2012 - atlas of doom- GHz or Bust.mp4 |
116.7 MB |
GrrCON/GrrCON 2012/GrrCON 2012 - atlas of doom- GHz or Bust.srt |
72 KB |
GrrCON/GrrCON 2012/GrrCON 2012- Adam Ely- Hack The Cloud.mp4 |
181.7 MB |
GrrCON/GrrCON 2012/GrrCON 2012- Adam Ely- Hack The Cloud.srt |
95 KB |
GrrCON/GrrCON 2012/GrrCON 2012- atlas of d00m subbing for Kevin Johnson- Tactical SecOps.mp4 |
94.8 MB |
GrrCON/GrrCON 2012/Grrcon 2012 - Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.mp4 |
167.5 MB |
GrrCON/GrrCON 2012/Grrcon 2012 - Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.srt |
72 KB |
GrrCON/GrrCON 2013/GrrCON 2013 - Hacker History This Stuff Matters - Duncan Manuts.mp4 |
275.8 MB |
GrrCON/GrrCON 2013/GrrCON 2013 - Hacking Giveaways, Contests, and Polls for Fun and Profit! - Matthew Bryant.mp4 |
368.3 MB |
GrrCON/GrrCON 2013/GrrCON 2013 - Hacking Giveaways, Contests, and Polls for Fun and Profit! - Matthew Bryant.srt |
42 KB |
GrrCON/GrrCON 2013/GrrCON 2013 - Mark Stanislav - Core Linux Security 0-Day Isn t Everything.mp4 |
53.3 MB |
GrrCON/GrrCON 2013/GrrCON 2013 - Pwnage from the Skies! - Philip Polstra.mp4 |
326 MB |
GrrCON/GrrCON 2013/GrrCON 2013 - Pwnage from the Skies! - Philip Polstra.srt |
31 KB |
GrrCON/GrrCON 2013/GrrCON 2013 - Security Counterknowledge - Mike Kemp.mp4 |
351.9 MB |
GrrCON/GrrCON 2013/GrrCON 2013 - The Science of Security Automation - Paul Cochran & Toni Buhrke.mp4 |
325.9 MB |
GrrCON/GrrCON 2013/GrrCON 2013 - The Science of Security Automation - Paul Cochran & Toni Buhrke.srt |
34 KB |
GrrCON/GrrCON 2013/GrrCON 2013 - What s Context got to do with it! - Arron Finnon.mp4 |
370.3 MB |
GrrCON/GrrCON 2013/GrrCON 2013 - What s Context got to do with it! - Arron Finnon.srt |
41 KB |
GrrCON/GrrCON 2013/GrrCON 2013 - atlas of d00m - TBA.mp4 |
59.7 MB |
GrrCON/GrrCON 2013/GrrCON 2013 - atlas of d00m - TBA.srt |
15 KB |
GrrCON/GrrCON 2013/GrrCON 2013 -Burning the Enterprise with BYOD - Georgia Weidman.mp4 |
399.9 MB |
GrrCON/GrrCON 2013/GrrCON 2013- Beautiful Models - J Wolfgang Goerlich.mp4 |
344 MB |
GrrCON/GrrCON 2013/GrrCON 2013- Beautiful Models - J Wolfgang Goerlich.srt |
31 KB |
GrrCON/GrrCON 2013/GrrCON 2013- David Schwartzberg- Zeus C&C for Tech Support.mp4 |
165.5 MB |
GrrCON/GrrCON 2013/GrrCON 2013- David Schwartzberg- Zeus C&C for Tech Support.srt |
9 KB |
GrrCON/GrrCON 2014/Board Breaking Challenge.mp4 |
91.3 MB |
GrrCON/GrrCON 2014/GrrCon TAP.mp4 |
43.3 MB |
GrrCON/GrrCON 2014/Grrcon 2014 closing.mp4 |
80.5 MB |
GrrCON/GrrCON 2014/b00 Hack the Hustle Career Strategies For Information Security Professionals Eve Adams.mp4 |
115.5 MB |
GrrCON/GrrCON 2014/b01 The Challenge of Natural Security Systems Rockie Brockway.mp4 |
125.4 MB |
GrrCON/GrrCON 2014/b02 Application Pen Testing Chris Pfoutz.mp4 |
94 MB |
GrrCON/GrrCON 2014/b03 Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.mp4 |
92.5 MB |
GrrCON/GrrCON 2014/b03 Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.srt |
74 KB |
GrrCON/GrrCON 2014/b04 Security On The Cheap Joel Cardella.mp4 |
100.3 MB |
GrrCON/GrrCON 2014/b05 Home Grown Linux Phil Polstra.mp4 |
90.8 MB |
GrrCON/GrrCON 2014/b06 Cyber Security Incidents Red Blue Team Unc13 Fuck3r.mp4 |
44.6 MB |
GrrCON/GrrCON 2014/s09 How to budget IDSs Brian Arcane Heitzman.mp4 |
60.3 MB |
GrrCON/GrrCON 2014/s10 LEVIATHAN Command and Control Communications on Planet Earth Kevin Thompson.mp4 |
49.2 MB |
GrrCON/GrrCON 2014/s11 Red Teaming Back and Forth 5ever FuzzyNop.mp4 |
108.8 MB |
GrrCON/GrrCON 2014/s11 Red Teaming Back and Forth 5ever FuzzyNop.srt |
67 KB |
GrrCON/GrrCON 2014/s12 Intelligence Driven Security Shane Harsch.mp4 |
80.4 MB |
GrrCON/GrrCON 2014/s13 Security for the People End User Authentication Security on the Internet Mark Stanislav.mp4 |
76.8 MB |
GrrCON/GrrCON 2014/s14 Hackers Are People Too Infosystir.mp4 |
62.9 MB |
GrrCON/GrrCON 2014/s15 Vaccinating APKs Milan Gabor.mp4 |
114.3 MB |
GrrCON/GrrCON 2014/s15 Vaccinating APKs Milan Gabor.srt |
66 KB |
GrrCON/GrrCON 2014/t09 ZitMo NoM David HealWHans Schwartzberg.mp4 |
105.7 MB |
GrrCON/GrrCON 2014/t10 Bigger Boys Made Us Mike Kemp.mp4 |
144.5 MB |
GrrCON/GrrCON 2014/t11 Full Douchesclosure Duncan Manuts.mp4 |
56.4 MB |
GrrCON/GrrCON 2014/t12 Finuxs Historical Tour Of IDS Evasion Insertions and Other Odditie Arron Finux Finnon.mp4 |
142.8 MB |
GrrCON/GrrCON 2014/v05 Autonomous Remote Hacking Drones Dr Phil Polstra.mp4 |
109.4 MB |
GrrCON/GrrCON 2014/v06 Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.mp4 |
76.8 MB |
GrrCON/GrrCON 2014/v06 Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.srt |
52 KB |
GrrCON/GrrCON 2014/v07 BioHacking Becoming the Best Me I Can Be Leonard.mp4 |
84.8 MB |
GrrCON/GrrCON 2014/v08 Vulnerable By Design a The Backdoor That Came Through the Front Matthew mandatory Bryant.mp4 |
67.3 MB |
GrrCON/GrrCON 2014/v09 OAuth20 a Itas the Implementation Stupid Tony Miller.mp4 |
110.9 MB |
GrrCON/GrrCON 2014/v10 Breach Stains Matt The Streaker Johnson.mp4 |
87.9 MB |
GrrCON/GrrCON 2014/v11 Are you a janitor or a cleaner John ageekspeeda Stauffacher Matthew Mattrix Hoy.mp4 |
98.5 MB |
GrrCON/GrrCON 2014/v12 PCI and Crypto The Good The Bad and The Frankly Ugly Robert Formera.mp4 |
105.8 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger01 Subject matter to be determined by the number of federal agents present in th.mp4 |
79 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger01 Subject matter to be determined by the number of federal agents present in th.srt |
51 KB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger02 Breaking in Bad Im The One Who Doesnt Knock jayson Street.mp4 |
78 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger02 Breaking in Bad Im The One Who Doesnt Knock jayson Street.srt |
73 KB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger03 Process The Salvation of Incident Response Charles Herring.mp4 |
29.2 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger03 Process The Salvation of Incident Response Charles Herring.srt |
27 KB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger05 But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.mp4 |
90.2 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger05 But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.srt |
57 KB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger06 The wrong side of history everything that is old is new again Arron Finnon.mp4 |
204.2 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger07 Poking The Bear Mike Kemp.mp4 |
193.8 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger08 The Hitch Hikers Guide to Information Security Kellman Meghu.mp4 |
133.7 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger09 Backdooring Git John Menerick.mp4 |
63.6 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger09 Backdooring Git John Menerick.srt |
43 KB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger10 Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.mp4 |
68.2 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger10 Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.srt |
47 KB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger11 Adding 10 Security to Your Scrum Agile Environment tehEx0dus.mp4 |
32.3 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger11 Adding 10 Security to Your Scrum Agile Environment tehEx0dus.srt |
25 KB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger12 How I Got Network Creds Without Even Asking A Social Engineering Case Study J.mp4 |
29.5 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger12 How I Got Network Creds Without Even Asking A Social Engineering Case Study J.srt |
26 KB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger14 Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.mp4 |
43.5 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger14 Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.srt |
32 KB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger16 This Is All Your Fault Duncan Manuts.mp4 |
59.2 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger16 This Is All Your Fault Duncan Manuts.srt |
46 KB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger17 The Safety You Think You Have is Only a Masquerade Nathan Dragun.mp4 |
68.9 MB |
GrrCON/GrrCON 2015/AntiFreeze Hamburger17 The Safety You Think You Have is Only a Masquerade Nathan Dragun.srt |
66 KB |
GrrCON/GrrCON 2015/Bumper Massage00 Security Incident Response Derek Milroy.mp4 |
67.9 MB |
GrrCON/GrrCON 2015/Bumper Massage00 Security Incident Response Derek Milroy.srt |
81 KB |
GrrCON/GrrCON 2015/Bumper Massage01 Hacking the Next Generation HealWHans.mp4 |
54.8 MB |
GrrCON/GrrCON 2015/Bumper Massage01 Hacking the Next Generation HealWHans.srt |
57 KB |
GrrCON/GrrCON 2015/Bumper Massage02 Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.mp4 |
35 MB |
GrrCON/GrrCON 2015/Bumper Massage02 Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.srt |
28 KB |
GrrCON/GrrCON 2015/Bumper Massage04 Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.mp4 |
76.4 MB |
GrrCON/GrrCON 2015/Bumper Massage04 Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.srt |
37 KB |
GrrCON/GrrCON 2015/Bumper Massage05 Application Recon The Lost Art Tony Miller.mp4 |
53.7 MB |
GrrCON/GrrCON 2015/Bumper Massage05 Application Recon The Lost Art Tony Miller.srt |
63 KB |
GrrCON/GrrCON 2015/Bumper Massage06 The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.mp4 |
59.3 MB |
GrrCON/GrrCON 2015/Bumper Massage06 The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.srt |
81 KB |
GrrCON/GrrCON 2015/Bumper Massage07 Software Security IWR Thomas G13 Richards.mp4 |
50.3 MB |
GrrCON/GrrCON 2015/Bumper Massage07 Software Security IWR Thomas G13 Richards.srt |
60 KB |
GrrCON/GrrCON 2015/Bumper Massage08 Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.mp4 |
68.1 MB |
GrrCON/GrrCON 2015/Bumper Massage08 Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.srt |
69 KB |
GrrCON/GrrCON 2015/Bumper Massage09 Understanding and Improving the Military Cyber Culture Dariusz Mikulski.mp4 |
29.1 MB |
GrrCON/GrrCON 2015/Bumper Massage09 Understanding and Improving the Military Cyber Culture Dariusz Mikulski.srt |
32 KB |
GrrCON/GrrCON 2015/Bumper Massage11 Harness the Force for Better Penetration Testing Patrick Fussell.mp4 |
21.1 MB |
GrrCON/GrrCON 2015/Bumper Massage11 Harness the Force for Better Penetration Testing Patrick Fussell.srt |
25 KB |
GrrCON/GrrCON 2015/Bumper Massage12 Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.mp4 |
33.1 MB |
GrrCON/GrrCON 2015/Bumper Massage12 Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.srt |
28 KB |
GrrCON/GrrCON 2015/Bumper Massage13 Shell scripting live Linux Forensics Dr Phil Polstra.mp4 |
49.3 MB |
GrrCON/GrrCON 2015/Bumper Massage13 Shell scripting live Linux Forensics Dr Phil Polstra.srt |
48 KB |
GrrCON/GrrCON 2015/Bumper Massage14 Can you patch a cloud Scott Thomas.srt |
53 KB |
GrrCON/GrrCON 2015/Bumper Massage16 Is it EVIL Chaoticflaws.mp4 |
56.8 MB |
GrrCON/GrrCON 2015/Bumper Massage16 Is it EVIL Chaoticflaws.srt |
45 KB |
GrrCON/GrrCON 2015/Hello GrrCON.mp4 |
13.9 MB |
GrrCON/GrrCON 2015/Submerssion Therapy00 Ticking me off From Threat Intel to Reversing Juan Cortes.mp4 |
34.6 MB |
GrrCON/GrrCON 2015/Submerssion Therapy00 Ticking me off From Threat Intel to Reversing Juan Cortes.srt |
24 KB |
GrrCON/GrrCON 2015/Submerssion Therapy01 Securing Todays Enterprise WAN Andy Mansfield.mp4 |
37.2 MB |
GrrCON/GrrCON 2015/Submerssion Therapy01 Securing Todays Enterprise WAN Andy Mansfield.srt |
31 KB |
GrrCON/GrrCON 2015/Submerssion Therapy02 Footprints of This Years Top Attack Vectors Kerstyn Clover.mp4 |
132 MB |
GrrCON/GrrCON 2015/Submerssion Therapy03 Welcome to the Internet of insecure things Chandler Howell.mp4 |
23.5 MB |
GrrCON/GrrCON 2015/Submerssion Therapy03 Welcome to the Internet of insecure things Chandler Howell.srt |
26 KB |
GrrCON/GrrCON 2015/Submerssion Therapy05 Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.mp4 |
62.5 MB |
GrrCON/GrrCON 2015/Submerssion Therapy05 Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.srt |
52 KB |
GrrCON/GrrCON 2015/Submerssion Therapy06 Path Well Traveled Common Mistakes with SIEM Nick Jacob.mp4 |
47.5 MB |
GrrCON/GrrCON 2015/Submerssion Therapy06 Path Well Traveled Common Mistakes with SIEM Nick Jacob.srt |
45 KB |
GrrCON/GrrCON 2015/Submerssion Therapy08 How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.mp4 |
32 MB |
GrrCON/GrrCON 2015/Submerssion Therapy08 How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.srt |
32 KB |
GrrCON/GrrCON 2015/Submerssion Therapy09 What is a cloud access broker and do I need one Tom Doane.mp4 |
25.8 MB |
GrrCON/GrrCON 2015/Submerssion Therapy09 What is a cloud access broker and do I need one Tom Doane.srt |
34 KB |
GrrCON/GrrCON 2015/Submerssion Therapy10 Security Frameworks What was once old is new again Brian Wrozek.mp4 |
35 MB |
GrrCON/GrrCON 2015/Submerssion Therapy10 Security Frameworks What was once old is new again Brian Wrozek.srt |
38 KB |
GrrCON/GrrCON 2015/Submerssion Therapy11 Honeypots for Active Defense Greg Foss.mp4 |
77.1 MB |
GrrCON/GrrCON 2015/Submerssion Therapy11 Honeypots for Active Defense Greg Foss.srt |
75 KB |
GrrCON/GrrCON 2015/Submerssion Therapy14 Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.mp4 |
53.3 MB |
GrrCON/GrrCON 2015/Submerssion Therapy14 Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.srt |
39 KB |
GrrCON/GrrCON 2015/Submerssion Therapy15 No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.mp4 |
55 MB |
GrrCON/GrrCON 2015/Submerssion Therapy15 No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.srt |
61 KB |
GrrCON/GrrCON 2016/100 Act Three The Evolution of Privacy Finux.mp4 |
69.3 MB |
GrrCON/GrrCON 2016/100 Act Three The Evolution of Privacy Finux.srt |
105 KB |
GrrCON/GrrCON 2016/102 Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.mp4 |
77.7 MB |
GrrCON/GrrCON 2016/102 Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.srt |
129 KB |
GrrCON/GrrCON 2016/103 Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.mp4 |
44 MB |
GrrCON/GrrCON 2016/103 Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.srt |
66 KB |
GrrCON/GrrCON 2016/105 Abnormal Behavior Detection in Large Environments Dave Kennedy.mp4 |
91.5 MB |
GrrCON/GrrCON 2016/105 Abnormal Behavior Detection in Large Environments Dave Kennedy.srt |
176 KB |
GrrCON/GrrCON 2016/108 Secure Dicks Michael Kemp.mp4 |
75.5 MB |
GrrCON/GrrCON 2016/108 Secure Dicks Michael Kemp.srt |
103 KB |
GrrCON/GrrCON 2016/110 and bad mistakes Ive made a few Jayson Street (only first 30 min or so).mp4 |
55 MB |
GrrCON/GrrCON 2016/110 and bad mistakes Ive made a few Jayson Street (only first 30 min or so).srt |
81 KB |
GrrCON/GrrCON 2016/110 and bad mistakes Ive made a few Jayson Street.mp4 |
55 MB |
GrrCON/GrrCON 2016/110 and bad mistakes Ive made a few Jayson Street.srt |
81 KB |
GrrCON/GrrCON 2016/111 Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.mp4 |
59.9 MB |
GrrCON/GrrCON 2016/111 Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.srt |
135 KB |
GrrCON/GrrCON 2016/112 Guarding Lunch J Wolfgang Goerlich.mp4 |
69.8 MB |
GrrCON/GrrCON 2016/112 Guarding Lunch J Wolfgang Goerlich.srt |
162 KB |
GrrCON/GrrCON 2016/113 Back to the Future Understanding our future but following the past Kevin Johnson.mp4 |
64.7 MB |
GrrCON/GrrCON 2016/113 Back to the Future Understanding our future but following the past Kevin Johnson.srt |
121 KB |
GrrCON/GrrCON 2016/114 Breaking Android Apps for Fun and Profit Bill Sempf.mp4 |
59.6 MB |
GrrCON/GrrCON 2016/114 Breaking Android Apps for Fun and Profit Bill Sempf.srt |
127 KB |
GrrCON/GrrCON 2016/115 Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.mp4 |
89.4 MB |
GrrCON/GrrCON 2016/115 Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.srt |
168 KB |
GrrCON/GrrCON 2016/116 Security Guards LOL Brent White Tim Roberts.mp4 |
87.7 MB |
GrrCON/GrrCON 2016/116 Security Guards LOL Brent White Tim Roberts.srt |
156 KB |
GrrCON/GrrCON 2016/200 Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.mp4 |
78.4 MB |
GrrCON/GrrCON 2016/200 Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.srt |
114 KB |
GrrCON/GrrCON 2016/201 So You Want to Be a Pentester Absolute0x0.mp4 |
57.8 MB |
GrrCON/GrrCON 2016/201 So You Want to Be a Pentester Absolute0x0.srt |
92 KB |
GrrCON/GrrCON 2016/202 What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.mp4 |
42.1 MB |
GrrCON/GrrCON 2016/202 What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.srt |
67 KB |
GrrCON/GrrCON 2016/203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).mp4 |
78.4 MB |
GrrCON/GrrCON 2016/203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).srt |
136 KB |
GrrCON/GrrCON 2016/203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.mp4 |
78.7 MB |
GrrCON/GrrCON 2016/203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.srt |
137 KB |
GrrCON/GrrCON 2016/204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).mp4 |
75.6 MB |
GrrCON/GrrCON 2016/204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).srt |
141 KB |
GrrCON/GrrCON 2016/204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.mp4 |
78 MB |
GrrCON/GrrCON 2016/204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.srt |
142 KB |
GrrCON/GrrCON 2016/205 Threat Detection Response with Hipara J Brett Cunningham (2).mp4 |
51.9 MB |
GrrCON/GrrCON 2016/205 Threat Detection Response with Hipara J Brett Cunningham (2).srt |
60 KB |
GrrCON/GrrCON 2016/205 Threat Detection Response with Hipara J Brett Cunningham.mp4 |
49.6 MB |
GrrCON/GrrCON 2016/205 Threat Detection Response with Hipara J Brett Cunningham.srt |
60 KB |
GrrCON/GrrCON 2016/206 still broken after all these years aka utility security for smarties doug nibbelink.mp4 |
64.2 MB |
GrrCON/GrrCON 2016/206 still broken after all these years aka utility security for smarties doug nibbelink.srt |
115 KB |
GrrCON/GrrCON 2016/207 Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.mp4 |
81.4 MB |
GrrCON/GrrCON 2016/207 Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.srt |
106 KB |
GrrCON/GrrCON 2016/208 Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.mp4 |
34.3 MB |
GrrCON/GrrCON 2016/208 Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.srt |
56 KB |
GrrCON/GrrCON 2016/209 Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.mp4 |
35.4 MB |
GrrCON/GrrCON 2016/209 Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.srt |
65 KB |
GrrCON/GrrCON 2016/210 Encryption Mobility Cloud Oh My Bill Harmer.mp4 |
42 MB |
GrrCON/GrrCON 2016/210 Encryption Mobility Cloud Oh My Bill Harmer.srt |
88 KB |
GrrCON/GrrCON 2016/211 Magnetic Stripes 101 Tyler Keeton.mp4 |
24.7 MB |
GrrCON/GrrCON 2016/211 Magnetic Stripes 101 Tyler Keeton.srt |
37 KB |
GrrCON/GrrCON 2016/212 Machine Duping Pwning Deep Learning Systems Clarence Chio.mp4 |
116.8 MB |
GrrCON/GrrCON 2016/212 Machine Duping Pwning Deep Learning Systems Clarence Chio.srt |
124 KB |
GrrCON/GrrCON 2016/213 Money Fame Power Build your success as a security professional Nathan Dragun.mp4 |
62.1 MB |
GrrCON/GrrCON 2016/213 Money Fame Power Build your success as a security professional Nathan Dragun.srt |
149 KB |
GrrCON/GrrCON 2016/214 Tales from the Cryptanalyst Jeff Man.mp4 |
72.2 MB |
GrrCON/GrrCON 2016/214 Tales from the Cryptanalyst Jeff Man.srt |
130 KB |
GrrCON/GrrCON 2016/215 Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.mp4 |
60 MB |
GrrCON/GrrCON 2016/215 Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.srt |
118 KB |
GrrCON/GrrCON 2016/216 Binary Ninja Jared Demott.mp4 |
65.8 MB |
GrrCON/GrrCON 2016/216 Binary Ninja Jared Demott.srt |
126 KB |
GrrCON/GrrCON 2016/217 Phish your employees for fun Kristoffer Marshall.mp4 |
84.1 MB |
GrrCON/GrrCON 2016/217 Phish your employees for fun Kristoffer Marshall.srt |
110 KB |
GrrCON/GrrCON 2016/300 Securing Trust Defending Against Next generation Attacks John Muirhead Gould.mp4 |
43.1 MB |
GrrCON/GrrCON 2016/300 Securing Trust Defending Against Next generation Attacks John Muirhead Gould.srt |
71 KB |
GrrCON/GrrCON 2016/302 Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.mp4 |
20 MB |
GrrCON/GrrCON 2016/302 Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.srt |
45 KB |
GrrCON/GrrCON 2016/303 Make STEHM Great Again David HealWHans Schwartzberg.mp4 |
55.1 MB |
GrrCON/GrrCON 2016/303 Make STEHM Great Again David HealWHans Schwartzberg.srt |
117 KB |
GrrCON/GrrCON 2016/304 Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.mp4 |
34.9 MB |
GrrCON/GrrCON 2016/304 Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.srt |
58 KB |
GrrCON/GrrCON 2016/305 How Do You Secure What You Dont Control Dimitri Vlachos.mp4 |
29.8 MB |
GrrCON/GrrCON 2016/305 How Do You Secure What You Dont Control Dimitri Vlachos.srt |
65 KB |
GrrCON/GrrCON 2016/306 Fighting the Enemy Within Matt Crowe.mp4 |
28.1 MB |
GrrCON/GrrCON 2016/306 Fighting the Enemy Within Matt Crowe.srt |
74 KB |
GrrCON/GrrCON 2016/307 Getting to the Root of Advanced Threats Before Impact Josh Fazio.mp4 |
22.1 MB |
GrrCON/GrrCON 2016/307 Getting to the Root of Advanced Threats Before Impact Josh Fazio.srt |
43 KB |
GrrCON/GrrCON 2016/308 Bad Guys Look Just Like You Justin Beard.mp4 |
28.4 MB |
GrrCON/GrrCON 2016/308 Bad Guys Look Just Like You Justin Beard.srt |
48 KB |
GrrCON/GrrCON 2016/309 Reality Checking Your AppSec Program Darren Meyer.mp4 |
32 MB |
GrrCON/GrrCON 2016/309 Reality Checking Your AppSec Program Darren Meyer.srt |
76 KB |
GrrCON/GrrCON 2016/310 How to Implement Crypto Poorly Sean Cassidy.mp4 |
40 MB |
GrrCON/GrrCON 2016/310 How to Implement Crypto Poorly Sean Cassidy.srt |
92 KB |
GrrCON/GrrCON 2016/311 Stop attacking your mothers car Charles Parker II.mp4 |
41.2 MB |
GrrCON/GrrCON 2016/311 Stop attacking your mothers car Charles Parker II.srt |
70 KB |
GrrCON/GrrCON 2016/312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.mp4 |
60.9 MB |
GrrCON/GrrCON 2016/312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.srt |
144 KB |
GrrCON/GrrCON 2016/313 Alignment of business and IT Security Shane Harsch.mp4 |
46.8 MB |
GrrCON/GrrCON 2016/313 Alignment of business and IT Security Shane Harsch.srt |
97 KB |
GrrCON/GrrCON 2016/315 So Youve Inherited a Security Department Now What Amanda Berlin.mp4 |
49.8 MB |
GrrCON/GrrCON 2016/315 So Youve Inherited a Security Department Now What Amanda Berlin.srt |
103 KB |
GrrCON/GrrCON 2016/316 Piercing the Air Gap Network Steganography for Everyone John Ventura.mp4 |
47 MB |
GrrCON/GrrCON 2016/316 Piercing the Air Gap Network Steganography for Everyone John Ventura.srt |
105 KB |
GrrCON/GrrCON 2016/317 On being an Eeyore in Infosec Stefan Edwards.mp4 |
57.1 MB |
GrrCON/GrrCON 2016/317 On being an Eeyore in Infosec Stefan Edwards.srt |
139 KB |
GrrCON/GrrCON 2016/318 Welcome to The World of Yesterday Tomorrow Joel Cardella.mp4 |
49.7 MB |
GrrCON/GrrCON 2016/318 Welcome to The World of Yesterday Tomorrow Joel Cardella.srt |
151 KB |
GrrCON/GrrCON 2017/#TrevorForget with Lintile.mp4 |
16.9 MB |
GrrCON/GrrCON 2017/Ghast01 STRATEGIES ON SECURING YOU BANKS ENTERPRISES FROM SOMEONE WHO ROBS BANKS ENTERPRISES FOR A L.mp4 |
87.8 MB |
GrrCON/GrrCON 2017/Ghast03 Population Control Through The Advances In Technology Chris Roberts part 1.mp4 |
72.9 MB |
GrrCON/GrrCON 2017/Ghast04 You Got Your SQL Attacks In My Honeypot Andrew Brandt.mp4 |
38.4 MB |
GrrCON/GrrCON 2017/Ghast06 3rd Party Data Burns Aaron Finux Finnon.mp4 |
59.9 MB |
GrrCON/GrrCON 2017/Ghast09 Oops Was that your pacemaker Charles Parker II.mp4 |
37.5 MB |
GrrCON/GrrCON 2017/Ghast12 Realizing Software Security Maturity The Growing Pains Gains Mark Stanislav Kelby Ludwig.mp4 |
69.7 MB |
GrrCON/GrrCON 2017/Ghast13 Cyber Cyber Cyber Using the killchain to accomplish something Amanda Berlin.mp4 |
65.5 MB |
GrrCON/GrrCON 2017/Ghast14 An Employee their Laptop and a Hacker walk into a Bar Shannon Fritz.mp4 |
79.9 MB |
GrrCON/GrrCON 2017/Ghast15 Eye on the Prize a Proposal for Legalizing Hacking Back Adam Hogan.mp4 |
78.8 MB |
GrrCON/GrrCON 2017/Ghast16 Ive got a Pocket Bone to pick with you Dr Phil Postra.mp4 |
49 MB |
GrrCON/GrrCON 2017/Gig00 Topic depends on number of federal agents in audience Atlas of Doom.mp4 |
98.3 MB |
GrrCON/GrrCON 2017/Gig01 Embedding Security in Embedded Systems Dr Jared DeMott.mp4 |
79.3 MB |
GrrCON/GrrCON 2017/Gig02 National Guard for Cyber How about a Volunteer Cyber Department Ray Davidson.mp4 |
40.9 MB |
GrrCON/GrrCON 2017/Gig03 Red Team Yourself Thomas Richards.mp4 |
43.7 MB |
GrrCON/GrrCON 2017/Gig04 An Attack Pathway Into Your Organization Reducing risk without reducing operational efficiency.mp4 |
73.9 MB |
GrrCON/GrrCON 2017/Gig05 Pen Test War Stories Why my job is so easy and how you can make it harder Aaron Herndon.mp4 |
57.1 MB |
GrrCON/GrrCON 2017/Gig06 Skills For A Red Teamer Brent White Tim Roberts.mp4 |
84.2 MB |
GrrCON/GrrCON 2017/Gig07 ProbeSpy Tracking your past predicting your future stumblebot.mp4 |
33.6 MB |
GrrCON/GrrCON 2017/Gig08 vAp0r and the Blooming Onion Justin Whitehead Jim Allee.mp4 |
58 MB |
GrrCON/GrrCON 2017/Gig09 A GRReat New Way of Thinking about Innovating for Cyber Defense and even Cyber Offense Ernest.mp4 |
98.4 MB |
GrrCON/GrrCON 2017/Gig10 Threat Intelligence Zero to Basics in presentation Chris J.mp4 |
57.2 MB |
GrrCON/GrrCON 2017/Gig12 Learning from InfoSec Fails - Derek Milroy.mp4 |
80.2 MB |
GrrCON/GrrCON 2017/Gig13 A Reporters Look at Open Source Intelligence Hilary Louise.mp4 |
62.6 MB |
GrrCON/GrrCON 2017/Gig14 Hidden Treasure Detecting Intrusions with ETW Zac Brown.mp4 |
63.6 MB |
GrrCON/GrrCON 2017/Gig15 The Black Art of Wireless Post Exploitation Gabriel solstice Ryan.mp4 |
75.4 MB |
GrrCON/GrrCON 2017/Grand Rapids next to GrrCON, high water.mp4 |
963 KB |
GrrCON/GrrCON 2017/Mi Go00 Change is Simply an Act of Survival Predicting the future while shackled to the past Bil Har.mp4 |
41.8 MB |
GrrCON/GrrCON 2017/Mi Go01 Dissecting Destructive Malware and Recovering from Catastrophe Bryan York.mp4 |
44.2 MB |
GrrCON/GrrCON 2017/Mi Go02 Infosec State of Affairs Too much Kim Kardashian not enough Malcolm Gladwel Jim Wojno Dan Ki.mp4 |
59.7 MB |
GrrCON/GrrCON 2017/Mi Go03 How do you POC Are you really testing a product Ken Donze.mp4 |
27.4 MB |
GrrCON/GrrCON 2017/Mi Go04 Tales From The Trenches Practical Information Security Lessons Michael Belton.mp4 |
59.8 MB |
GrrCON/GrrCON 2017/Mi Go06 The Future of Cyber Security Anthony Sabaj.mp4 |
68.8 MB |
GrrCON/GrrCON 2017/Mi Go07 Building a Usable Mobile Data Protection Strategy David Heal Schwartzberg.mp4 |
72.5 MB |
GrrCON/GrrCON 2017/Mi Go08 Software Defined Segmentation Matt Hendrickson.mp4 |
31.3 MB |
GrrCON/GrrCON 2017/Mi Go10 The Shuttle Columbia Disaster Lessons That Were Not Learned Joel I love it when they call me.mp4 |
70 MB |
GrrCON/GrrCON 2017/Mi Go11 Infrastructure Based Security Chris Barnes.mp4 |
58.8 MB |
GrrCON/GrrCON 2017/Mi Go12 Defending The De funded Keith Wilson.mp4 |
47.3 MB |
GrrCON/GrrCON 2017/Mi Go13 Real World Red Teaming spartan.mp4 |
57.3 MB |
GrrCON/GrrCON 2017/Mi Go14 We got it wrong Wolfgang Goerlich.mp4 |
81 MB |
GrrCON/GrrCON 2017/Mi Go15 Critical Incident Surviving my first layoff by applying BCPDRP Principles Tom Mead.mp4 |
47.7 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada00 How to Conduct a Product Security Test And How it Fits Into the Larger Security St.en.transcribed.srt |
120 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada00 How to Conduct a Product Security Test And How it Fits Into the Larger Security St.mp4 |
30.6 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada02 Designing a Cloud Security Blueprint Sarah Elie.en.transcribed.srt |
88 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada02 Designing a Cloud Security Blueprint Sarah Elie.mp4 |
31.9 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada05 Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.en.transcribed.srt |
166 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada05 Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.mp4 |
51.6 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada06 Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.en.transcribed.srt |
123 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada06 Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.mp4 |
34.6 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada08 emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.en.transcribed.srt |
103 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada08 emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.mp4 |
64.8 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada10 SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.en.transcribed.srt |
153 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada10 SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.mp4 |
43.2 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada11 Threat Hunting the macOS edition Megan Carney.en.transcribed.srt |
112 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada11 Threat Hunting the macOS edition Megan Carney.mp4 |
40.8 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada12 The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.en.transcribed.srt |
152 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada12 The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.mp4 |
45.4 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada13 Dragnet Your Social Engineering Sidekick Truman Kain.en.transcribed.srt |
54 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada13 Dragnet Your Social Engineering Sidekick Truman Kain.mp4 |
15.8 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada15 Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.en.transcribed.srt |
139 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada15 Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.mp4 |
47.9 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada16 Threat Modeling How to actually do it and make it useful Derek Milroy.en.transcribed.srt |
158 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Ada16 Threat Modeling How to actually do it and make it useful Derek Milroy.mp4 |
53.5 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta00 Keynote Dave Kennedy.en.transcribed.srt |
152 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta00 Keynote Dave Kennedy.mp4 |
50.8 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta01 An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.en.transcribed.srt |
20 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta01 An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.mp4 |
24.7 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta03 The Abyss is Waving BackThe four paths that human evolution is charging down a.en.transcribed.srt |
136 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta03 The Abyss is Waving BackThe four paths that human evolution is charging down a.mp4 |
55.4 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta04 Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.en.transcribed.srt |
72 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta04 Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.mp4 |
23.1 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta06 Youre right this talk isnt really about you Jayson E Street.en.transcribed.srt |
122 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta06 Youre right this talk isnt really about you Jayson E Street.mp4 |
40.9 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta07 Analyzing Pwned Passwords with Apache Spark Kelley Robinson.en.transcribed.srt |
124 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta07 Analyzing Pwned Passwords with Apache Spark Kelley Robinson.mp4 |
35.9 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta08 How to rob a bank over the phone Joshua Naga Crumbaugh.en.transcribed.srt |
119 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta08 How to rob a bank over the phone Joshua Naga Crumbaugh.mp4 |
55.3 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta09 Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.en.transcribed.srt |
60 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta09 Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.mp4 |
23 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta13 Life Death the Nematodes Long live Cyber Resilience Chad Calease.en.transcribed.srt |
129 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta13 Life Death the Nematodes Long live Cyber Resilience Chad Calease.mp4 |
65.4 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta14 Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.en.transcribed.srt |
150 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta14 Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.mp4 |
49.4 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta15 Automation and Open Source Turning the Tide on Attackers John Grigg.en.transcribed.srt |
138 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta15 Automation and Open Source Turning the Tide on Attackers John Grigg.mp4 |
47 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta16 we we Internet Explorer Does What It Wants Aaron Heikkila.en.transcribed.srt |
54 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta16 we we Internet Explorer Does What It Wants Aaron Heikkila.mp4 |
22.4 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta17 Pacu Attack and Post Exploitation in AWS Spencer Gietzen.en.transcribed.srt |
57 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta17 Pacu Attack and Post Exploitation in AWS Spencer Gietzen.mp4 |
21.5 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Augusta19 Hacker Tools Compliments of Microsoft David Fletcher Sally Vandeven.en.transcribed.srt |
103 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace01 How this 20 Year Old Changed the Security Industry James ONeill.mp4 |
21.5 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace02 Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.en.transcribed.srt |
136 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace02 Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.mp4 |
59.3 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace04 2018 SIEM Trends What is my Mean Time to Value Bill Lampe.en.transcribed.srt |
116 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace04 2018 SIEM Trends What is my Mean Time to Value Bill Lampe.mp4 |
48.3 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace05 Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.en.transcribed.srt |
122 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace05 Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.mp4 |
39.1 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace06 More Tales from the CryptAnalyst Jeff Man.en.transcribed.srt |
139 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace06 More Tales from the CryptAnalyst Jeff Man.mp4 |
54.8 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace07 My First year in Application Security Whitney Phillips.en.transcribed.srt |
52 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace07 My First year in Application Security Whitney Phillips.mp4 |
32.9 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace09 Career Risk Management 10 tips to keep you employed Chris Burrows.en.transcribed.srt |
123 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace09 Career Risk Management 10 tips to keep you employed Chris Burrows.mp4 |
45.9 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace11 Saving All the Money to Buy All the Booze Learning to Hack All the Things on.en.transcribed.srt |
97 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace11 Saving All the Money to Buy All the Booze Learning to Hack All the Things on.mp4 |
35.4 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace12 Analyzing Multi Dimensional Malware Dataset Ankur Tyagi.mp4 |
36.8 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace13 Physicals Badges and why it matters Alex Fernandez Gatti.en.transcribed.srt |
74 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace13 Physicals Badges and why it matters Alex Fernandez Gatti.mp4 |
35.6 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace15 InSpec Compliance as Code Kent picat Gruber.en.transcribed.srt |
117 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace15 InSpec Compliance as Code Kent picat Gruber.mp4 |
49.4 MB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace16 Bounty Hunters J Wolfgang Goerlich.en.transcribed.srt |
135 KB |
GrrCON/GrrCON 2018/GrrCon 2018 Lovelace16 Bounty Hunters J Wolfgang Goerlich.mp4 |
43.7 MB |
GrrCON/GrrCON 2019/GrrCON 19 3 19 Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.en.transcribed.srt |
73 KB |
GrrCON/GrrCON 2019/GrrCON 19 3 19 Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.mp4 |
78.6 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 01 Keynote Amanda Infosystir Berlin.mp4 |
78.2 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 02 Baselining Behavior Tradecraft through Simulations Dave Kenendy.mp4 |
64.4 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 03 I PWN thee I PWN thee not Jayson Street.en.transcribed.srt |
87 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 03 I PWN thee I PWN thee not Jayson Street.mp4 |
76.2 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 04 Automating Phishing Analysis Kyle Eaton.en.transcribed.srt |
33 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 04 Automating Phishing Analysis Kyle Eaton.mp4 |
34.1 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 05 Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.en.transcribed.srt |
58 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 05 Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.mp4 |
43.3 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 06 Ssshhhh Atlas of Doom.en.transcribed.srt |
83 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 06 Ssshhhh Atlas of Doom.mp4 |
85.9 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 07 How Nathan Crashed and Burned Nathan Dragun.en.transcribed.srt |
53 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 07 How Nathan Crashed and Burned Nathan Dragun.mp4 |
55.9 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 08 Reverse Engineering Malware for N00bs GregB33fJames.en.transcribed.srt |
91 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 08 Reverse Engineering Malware for N00bs GregB33fJames.mp4 |
88.9 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 09 Host Hunting on a Budget cyberGoatPsyOps.en.transcribed.srt |
47 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 09 Host Hunting on a Budget cyberGoatPsyOps.mp4 |
45.7 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 11 Keynote Rachel Soul Crusher86 G.en.transcribed.srt |
86 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 11 Keynote Rachel Soul Crusher86 G.mp4 |
60.2 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 12 Cons Careers SciaticNerd.en.transcribed.srt |
94 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 12 Cons Careers SciaticNerd.mp4 |
62.4 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 14 Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.en.transcribed.srt |
48 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 14 Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.mp4 |
40.4 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 14 bonus talk Ryan Wisniewski.en.transcribed.srt |
47 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 14 bonus talk Ryan Wisniewski.mp4 |
32.7 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 16 The Science of Breaking and Entering Alissa dnsprincess.en.transcribed.srt |
97 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 16 The Science of Breaking and Entering Alissa dnsprincess.mp4 |
65.3 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 17 Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.en.transcribed.srt |
78 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 17 Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.mp4 |
93.1 MB |
GrrCON/GrrCON 2019/GrrCON 2019 1 19 Big Plane Little Plane How common aviation attacks affect airlines and general avia.en.transcribed.srt |
71 KB |
GrrCON/GrrCON 2019/GrrCON 2019 1 19 Big Plane Little Plane How common aviation attacks affect airlines and general avia.mp4 |
80.7 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 00 PSD2 SCA WTF Kelley Robinson.en.transcribed.srt |
50 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 00 PSD2 SCA WTF Kelley Robinson.mp4 |
37.6 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 01 Breaking NBAD & UEBA Detection” by Charles Herring.en.transcribed.srt |
58 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 01 Breaking NBAD & UEBA Detection” by Charles Herring.mp4 |
36.4 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 03 The Past Present Future of Cyber Threats Chris Russell.en.transcribed.srt |
44 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 03 The Past Present Future of Cyber Threats Chris Russell.mp4 |
29.7 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 04 Symbolically executing a fuzzy tyrant Lojikil.en.transcribed.srt |
81 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 04 Symbolically executing a fuzzy tyrant Lojikil.mp4 |
50 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 05 A Theme of Fear Hacking the Paradigm Catherine Ullman.en.transcribed.srt |
88 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 05 A Theme of Fear Hacking the Paradigm Catherine Ullman.mp4 |
84.1 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 06 QA on our industry and other things that are top of mind Chris Roberts.en.transcribed.srt |
82 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 06 QA on our industry and other things that are top of mind Chris Roberts.mp4 |
76.2 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 07 How to Make a Honeypot Stickier SSH Jose Hernandez.en.transcribed.srt |
92 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 07 How to Make a Honeypot Stickier SSH Jose Hernandez.mp4 |
106.6 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 08 Data Access Rights Exploits under New Privacy Laws Amber Welch.en.transcribed.srt |
50 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 08 Data Access Rights Exploits under New Privacy Laws Amber Welch.mp4 |
42.4 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 09 Data Security How to avoid an embarrassing breach Matt mattrix Hoy.en.transcribed.srt |
60 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 09 Data Security How to avoid an embarrassing breach Matt mattrix Hoy.mp4 |
88.4 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 10 MSSPs are greatand other lies I tell myself Scott Thomas.en.transcribed.srt |
100 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 10 MSSPs are greatand other lies I tell myself Scott Thomas.mp4 |
66.8 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 11 Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.en.transcribed.srt |
36 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 11 Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.mp4 |
34.1 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 12 Good Cyber Hygiene and using analytics to drive the need for it on Print David Rose.mp4 |
33.3 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 13 Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.en.transcribed.srt |
52 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 13 Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.mp4 |
27.3 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 14 A Day in the Life of a Security Operations Center What do you get when you partner.en.transcribed.srt |
44 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 14 A Day in the Life of a Security Operations Center What do you get when you partner.mp4 |
22.6 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 15 Malicious Cryptomining is Exploding Are you at risk John Fatten.en.transcribed.srt |
64 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 15 Malicious Cryptomining is Exploding Are you at risk John Fatten.mp4 |
54.9 MB |
GrrCON/GrrCON 2019/GrrCON 2019 2 18 Dance Fancybear Dance a study in macOS Cat Self.en.transcribed.srt |
86 KB |
GrrCON/GrrCON 2019/GrrCON 2019 2 18 Dance Fancybear Dance a study in macOS Cat Self.mp4 |
55.8 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 00 The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.en.transcribed.srt |
41 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 00 The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.mp4 |
34.5 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 01 Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.en.transcribed.srt |
38 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 01 Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.mp4 |
30.1 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 02 Destroy Everything Tom Somerville.mp4 |
32.7 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 03 Surfing and Security Ride the wave Chris Burrows.en.transcribed.srt |
52 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 03 Surfing and Security Ride the wave Chris Burrows.mp4 |
33.7 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 04 The Importance of IT Asset Visibility Brian Berk.en.transcribed.srt |
35 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 04 The Importance of IT Asset Visibility Brian Berk.mp4 |
37.1 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 05 From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.en.transcribed.srt |
100 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 05 From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.mp4 |
61.8 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 06 CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.en.transcribed.srt |
107 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 06 CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.mp4 |
69.4 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 07 Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.en.transcribed.srt |
99 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 07 Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.mp4 |
76.7 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 08 What Are We Doing Here Rethinking Security Jeff Man.en.transcribed.srt |
88 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 08 What Are We Doing Here Rethinking Security Jeff Man.mp4 |
65.8 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 09 How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.en.transcribed.srt |
48 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 09 How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.mp4 |
36.6 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 10 Hillbilly Storytime Pentest Fails Adam Compton.en.transcribed.srt |
54 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 10 Hillbilly Storytime Pentest Fails Adam Compton.mp4 |
46.6 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 11 Want to Play a Game John DeRyke.en.transcribed.srt |
42 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 11 Want to Play a Game John DeRyke.mp4 |
35.2 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 13 Departing Employees Departing Data Todd Thorsen.en.transcribed.srt |
32 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 13 Departing Employees Departing Data Todd Thorsen.mp4 |
30.6 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 14 Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.en.transcribed.srt |
36 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 14 Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.mp4 |
44.3 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 15 Understanding how public places introduce additional risks to business Len Noe.en.transcribed.srt |
83 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 15 Understanding how public places introduce additional risks to business Len Noe.mp4 |
61.9 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 16 Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.en.transcribed.srt |
33 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 16 Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.mp4 |
26.2 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 17 The Importance of Relevant Timely and Qualitative Intelligence Analysis Aamil AK.mp4 |
27.6 MB |
GrrCON/GrrCON 2019/GrrCON 2019 3 18 Deepfakes If anything can be real then nothing is real April C Wright.en.transcribed.srt |
87 KB |
GrrCON/GrrCON 2019/GrrCON 2019 3 18 Deepfakes If anything can be real then nothing is real April C Wright.mp4 |
65.4 MB |
GrrCON/GrrCON Logo.png |
294 KB |
GrrCON/GrrCON thank you.txt |
1 KB |