Toorcon/ToorCamp - 2011/ToorCon 13 (2011) - Anthony J. Stieber - Crisis and Opportunity in Key Management 2001-2031.mp4 |
106.4 MB |
Toorcon/ToorCamp - 2011/ToorCon 13 (2011) - Anthony J. Stieber - How NOT to Implement Cryptography for the OWASP Top 10 (Reloaded).mp4 |
84.1 MB |
Toorcon/ToorCamp - 2012/ToorCamp 2012 Ignite 1-2.mp4 |
376.3 MB |
Toorcon/ToorCamp - 2012/ToorCamp 2012 Ignite 2-2.mp4 |
376.3 MB |
Toorcon/ToorCon 13 - 2011/Dan Tentler vissago Toorcon Seattle 2011.rar |
305.7 MB |
Toorcon/ToorCon 13 - 2011/ToorCon 13 (2011) - Anthony J. Stieber - How NOT to Implement Cryptography for the OWASP Top 10 (Reloaded).mp4 |
84.1 MB |
Toorcon/ToorCon 14 - 2012/Dan Tentler vissago Toorcon 2012.rar |
238.4 MB |
Toorcon/ToorCon 14 - 2012/ToorCon 14 (2012) - Tom Samstag (tecknicaltom) - HTTPS in the Real World Screw-ups, Trends, and Outliers.mp4 |
362.3 MB |
Toorcon/ToorCon 15 - 2013/Dan Tentler vissago Toorcon 2013.rar |
661.1 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - @PradoAngelo & @GluckYoel - BREACHing SSL, one byte at a time.mp4 |
172.4 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Aaron Grattafiori - The Outer Limits Hacking a Smart TV.mp4 |
251.8 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Ashaman - Applications of Artificial Intelligence in Ad-Hoc Static Code Analysis & Eric (XlogicX) Davisson - Mask Your Checksums - The Gorry Details.mp4 |
90.2 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Caezar - Keynote.mp4 |
249 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Christie Dudley (Valkyrie) - Data Leaking in Next Generation Cars.mp4 |
237 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Dmitry Nedospasov - Backside IC analysis.mp4 |
230.6 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Doug DePerry & Andrew Rahimi - Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell.mp4 |
233.9 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Grutz - Managing your pentest data with Kvasir & Anna Shubina - Active Fingerprinting of Encrypted VPNs.mp4 |
124.5 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Jimmy Shah - Mobile Malware Heuristics The path from 'eh' to 'pretty good'.mp4 |
170.9 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - John Irwin - Let the Hackers Learn.mp4 |
84 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Michael Eddington - Fuzzing the world with Peach.mp4 |
358.9 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Michael Ossmann & Kos - Multiplexed Wired Attack Surfaces.mp4 |
251.7 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Michael Ossmann - Defeating Spread Spectrum Communication with Software Defined Radio.mp4 |
316.8 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Peleus Uhley & Karthik Raman - Security Response in the Age of Mass Customized Attacks.iso.mp4 |
231.7 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Robert R - Privacy's Past, Present and Future.iso.mp4 |
239.1 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Ryan Huber - Running at 99 Surviving an Application DoS.mp4 |
172 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Toorcon 2013 Opening Remarks & Andrew Furtak, Yuriy Bulygin, Oleksandr Bazhaniuk - A Tale of One Software Bypass of Windows 8 Secure Boot.mp4 |
64.3 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Wartortell - x86 Rewriting Beating Binaries into Submission.mp4 |
249 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Xeno Kovah - Firmware attacks, Copernicus, and You.mp4 |
427.6 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 - 2013 - Rickrolling your neighbors with Google Chromecast - 20Oct2013.mp4 |
54.8 MB |
Toorcon/ToorCon 16 - 2014/FinFisher Breakdown Toorcon 16.mp4 |
68.8 MB |
Toorcon/ToorCon 16 - 2014/FuzzyNop - Now It s Personal Red Team Anecdotes ToorCon 16.mp4 |
93.5 MB |
Toorcon/ToorCon 16 - 2014/Reverse Engineering Malware For Newbies ToorCon 16.mp4 |
166 MB |
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Aleksander Okonski - Privacy Concerns in Android Applications.mp4 |
68 MB |
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Joe Basirico - Dispel the Illusion Change the Behavior.mp4 |
87.7 MB |
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Matthew Halchyshak & Joseph Tartaro - Cyber Necromancy Reverse Engineering Dead Protocols.mp4 |
196 MB |
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Zak Dehlawi - Researchers Use Google Glass in Public, And You Won't Believe How People React.mp4 |
90.4 MB |
Toorcon/ToorCon 16 - 2014/Toorcon San Diego (2014) - Cyber Necromancy Reverse Engineering Dead Protocols.mp4 |
188.8 MB |
Toorcon/ToorCon 16 - 2014/Toorcon 16 (2014) - Seminar - iOS Blackbox Pentesting Using idb.mp4 |
320 MB |
Toorcon/ToorCon 16 - 2014/Toorcon 16 (2014) - Time Trial - Racing Towards Practical Timing Attacks.mp4 |
181.9 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Jeremy Brown - A Bug Hunter's Perspective on Unix Drivers.mp4 |
179.6 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Joel St. John & Danny Iland - The Consumerization of Home Insecurity.mp4 |
126.6 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Karl Koscher - Software Defined Radios Digital Signal Processing and Digital Modulation.mp4 |
189.1 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Kevin Grigorenko - Linux Core Dumps From glibc malloc to eye catchers.mp4 |
125.2 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Marcus Hodges & Tom Samstag - Potent Pwnables Advancements in CTF.mp4 |
240.8 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Max Chauhan & Nora Sandler - Game of Pwns How we turned developers, teenagers and accountants into hackers.mp4 |
248.4 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Michael Ossmann - Rapid Radio Reversing.mp4 |
124.2 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Richo Healey & Mike Ryan - Hacking electric skateboards vehicle research for mortals.mp4 |
236 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Samy Kamkar - Keynote.mp4 |
196 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - yan - New Techniques for Browser Fingerprinting.mp4 |
120.5 MB |
Toorcon/ToorCon 18 - 2016/ToorCon 18 Keynote - Jared DeMott - ANALYZING NEXTGEN SECURITY PRACTICES AND SECURITY TOOLS.en.transcribed.srt |
139 KB |
Toorcon/ToorCon 18 - 2016/ToorCon 18 Keynote - Jared DeMott - ANALYZING NEXTGEN SECURITY PRACTICES AND SECURITY TOOLS.mp4 |
136.7 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Aaron HnatIw - How To Move Mountains.en.transcribed.srt |
142 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Aaron HnatIw - How To Move Mountains.mp4 |
176.2 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Alonso & Mitnick - DirtyTooth Put Music & Lose your Contacts.en.transcribed.srt |
81 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Alonso & Mitnick - DirtyTooth Put Music & Lose your Contacts.mp4 |
141.6 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Ernest Wong - Defending Cyberspace by Thinking “1n51d3-th3-B0x”.en.transcribed.srt |
137 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Ernest Wong - Defending Cyberspace by Thinking “1n51d3-th3-B0x”.mp4 |
201.1 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Gurney Halleck - CyberWargames TableTopExercises.en.transcribed.srt |
81 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Gurney Halleck - CyberWargames TableTopExercises.mp4 |
156 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - James Barclay - From Zero to Zero-Trust.en.transcribed.srt |
94 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - James Barclay - From Zero to Zero-Trust.mp4 |
123.2 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Keynote - Lance James.en.transcribed.srt |
180 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Keynote - Lance James.mp4 |
213.5 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Mohamad Mokbel - ShellPcapFication (SPF) – A Sophisticated Interactive Shell Framework.en.transcribed.srt |
105 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Mohamad Mokbel - ShellPcapFication (SPF) – A Sophisticated Interactive Shell Framework.mp4 |
87.7 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Newlin, Lamb, & Greyson.mp4 |
6.3 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Robert PortvlIet - Open Up and Say 0x41414141 Attacking Medical Devices.en.transcribed.srt |
161 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Robert PortvlIet - Open Up and Say 0x41414141 Attacking Medical Devices.mp4 |
230.4 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Spill & Temkin - Facedancer 2.0 Next Generation USB Hacking.en.transcribed.srt |
166 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Spill & Temkin - Facedancer 2.0 Next Generation USB Hacking.mp4 |
209.2 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Tyler Cook - False Advertising.en.transcribed.srt |
108 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Tyler Cook - False Advertising.mp4 |
122.4 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 1.mp4 |
16.6 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 2.mp4 |
16.7 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 3.mp4 |
14.7 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 4.mp4 |
13 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 5.mp4 |
16.5 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 6.mp4 |
16.7 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 7.mp4 |
6.8 MB |
Toorcon/ToorCon 8 - 2006/Sector2008 - Security Heretic - We're Doing It Wrong.mp4 |
63.3 MB |
Toorcon/ToorCon 8 - 2006/Toor2101 - Cory Doctorow - The Art Of Blogging.mp4 |
68.8 MB |
Toorcon/ToorCon 8 - 2006/Toor2102 - Simple Nomad - State Of The Enemy Of TheState.mp4 |
73.3 MB |
Toorcon/ToorCon 8 - 2006/Toor2103 - Various Presenters - Everything And Anything Lightning Presentations.mp4 |
58.5 MB |
Toorcon/ToorCon 8 - 2006/Toor2114 - Various Panelists - Old School Hacking Nostalgia Panel Discussion.mp4 |
85.8 MB |
Toorcon/ToorCon 8 - 2006/Toor2115 - Datagram - Locksmithing And Key bumping.mp4 |
78.7 MB |
Toorcon/ToorCon 8 - 2006/Toor2116 - ScottMoulton - Hacking Hard Drives For Data Recovery.mp4 |
75.6 MB |
Toorcon/ToorCon 8 - 2006/Toor2117 - Lin0xx - Advanced Windows Firewall Subversion.mp4 |
62.7 MB |
Toorcon/ToorCon 8 - 2006/Toor2119 - Spoonm - Ida Rub Reverse Engineering.mp4 |
64.4 MB |
Toorcon/ToorCon 8 - 2006/Toor2120 - Druid - VOIP Attacks.mp4 |
76.9 MB |
Toorcon/ToorCon 8 - 2006/Toor2121 - Richard Johnson - Windows Vista Exploitation Counter Measures.mp4 |
67.1 MB |
Toorcon/ToorCon 8 - 2006/Toor2122 - Steve Rambam - Privacy Is Dead - Get Over It.mp4 |
153.1 MB |
Toorcon/ToorCon 8 - 2006/Toor2123 - JaredDeMott - The Evolving Art Of Fuzzing.mp4 |
67.5 MB |
Toorcon/ToorCon 8 - 2006/Toor2124 - Vlad Tsyrklevich - Polymorphic Shellcode At A Glance.mp4 |
70.1 MB |
Toorcon/ToorCon 8 - 2006/Toor2125 - Tom St Denis - Elliptic Curve Algorithms w Bad Title.mp4 |
49.3 MB |
Toorcon/ToorCon 8 - 2006/Toor2126 - Nicholas Brulez - Breaking Pocket PC Executable Protection.mp4 |
50 MB |
Toorcon/ToorCon 8 - 2006/Toor2129 - asm - LOL Phone - Exploiting Trust In Social Phone Networks.mp4 |
65.9 MB |
Toorcon/ToorCon 8 - 2006/Toor2130 - Justin Ferguson - Bridging The Gap - Analysis Of Win32.mp4 |
44.3 MB |
Toorcon/ToorCon 8 - 2006/Toor2131 - LanceJames JoshuaBrashards - Tracksploits - Passive Tracker Hacking.mp4 |
75.2 MB |
Toorcon/ToorCon 8 - 2006/Toor2132 - Christopher Abad - HiTech Codes And LoTech LOLs.mp4 |
75.2 MB |
Toorcon/ToorCon 8 - 2006/Toor2133 - Matt Fisher - SQL Injection - Everything About SQL Injection.mp4 |
158.3 MB |
Toorcon/ToorCon 9 - 2007/Dan Tentler vissago Toorcon 2007.rar |
379.1 MB |
Toorcon/ToorCon 9 - 2007/Videos/AdvancedHackingFlashAndHardDriveRecoveries-ScottMoulton.mp4 |
42.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/AppArmorProfileSharingPortal-CrispinCowan.mp4 |
45.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/AttackingVoIPtoGainControlOfALaptop.mp4 |
17.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/BeatingBackThePhysicalSecurityBoogeyman.mp4 |
17.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/Beetle-Keynote-WolverineYoMamaSpooksAndOsama.mp4 |
41.4 MB |
Toorcon/ToorCon 9 - 2007/Videos/BitblenderProvidingLightweightAnonymityForBittorrent-McCoyAndBauer.mp4 |
17.2 MB |
Toorcon/ToorCon 9 - 2007/Videos/BuildingHackingOpenSourceEmbeddedWirelessRouters-3of4.mp4 |
118.9 MB |
Toorcon/ToorCon 9 - 2007/Videos/Byakugan-AutomatingExploitation-NathanRittenhouse.mp4 |
17.4 MB |
Toorcon/ToorCon 9 - 2007/Videos/CDMA-UnlockingAndModification-AlexanderLash.mp4 |
26 MB |
Toorcon/ToorCon 9 - 2007/Videos/CafeLatteWithAFreeToppingOfCrackedWEP-RamachandranAndAhmad.mp4 |
20.2 MB |
Toorcon/ToorCon 9 - 2007/Videos/CharlieMiller-FuzzingWithCodeCoverage.mp4 |
43.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/ContextKeyedPayloadEncoding-Druid.mp4 |
19.4 MB |
Toorcon/ToorCon 9 - 2007/Videos/ContinuousPreventionTestingToolsforDevelopersAndProductTesters-AndreGironda.mp4 |
58.3 MB |
Toorcon/ToorCon 9 - 2007/Videos/CthuluASoftwareAnalysisFrameworkBuiltOnPhoenix-MattMiller.mp4 |
38.9 MB |
Toorcon/ToorCon 9 - 2007/Videos/DanKaminsky-BlackOps2007-DesignReviewingTheWeb.mp4 |
49.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/ExtrusionAndExploitabilityScanning.mp4 |
18.2 MB |
Toorcon/ToorCon 9 - 2007/Videos/HackerSpacesPanel-EuropeUSandTheFuture-3ricJohnsonNickFarMCFly.mp4 |
45.3 MB |
Toorcon/ToorCon 9 - 2007/Videos/HackingTheEULA-ReverseBenchmarkingWebApplications.mp4 |
21.1 MB |
Toorcon/ToorCon 9 - 2007/Videos/HackingWindowsVistaSecurity-DanGriffin.mp4 |
18.8 MB |
Toorcon/ToorCon 9 - 2007/Videos/HotspotAnalysisLookingAtHotspotsWithaMagGlass-RichardRushing.mp4 |
19.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/JAYBEALE-TheyreHackingOurClientsWhyAreWeOnlyAssessingServers.mp4 |
25.4 MB |
Toorcon/ToorCon 9 - 2007/Videos/JeromeAthias-SpeedingUpTheExploitsDevelopmentProcess.mp4 |
32.8 MB |
Toorcon/ToorCon 9 - 2007/Videos/LastStand-100percentAutomatic0DayAchievedAndExplained-JasonMedeiros.mp4 |
22.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/LinuxKernelRootkitDetectionAndAnalysisDuringIncidentResponse-GabrielLawrence.mp4 |
57.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/LiveMemoryForensicsIncidentResponseOnACompromisedSystem-Datagram.mp4 |
17.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/NewSQL-InjectionTricks-PaulBattista.mp4 |
18.3 MB |
Toorcon/ToorCon 9 - 2007/Videos/PenetrationTesting-LessonsLearnedToolsAndTechniques-OstromAndKindervag.mp4 |
20.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/PostScarcityEconomicsAndTheEconomicsOfAbundance.mp4 |
19.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/PrivilegeCentricSecurityAnalysis-BrendaLarcom.mp4 |
17.1 MB |
Toorcon/ToorCon 9 - 2007/Videos/RealWorldFuzzingCollectingAndAnalyzingCode.mp4 |
69.9 MB |
Toorcon/ToorCon 9 - 2007/Videos/RodneyThayer-Crypto-Pt1of2.mp4 |
90.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/RodneyThayer-Crypto-Pt2of2.mp4 |
21.1 MB |
Toorcon/ToorCon 9 - 2007/Videos/SocialDataMiningThroughTelephonyVulnerabilities-ASM.mp4 |
20 MB |
Toorcon/ToorCon 9 - 2007/Videos/StromCarlson-TheTalkTalkHowToGiveBetterTechPresentations.mp4 |
20.4 MB |
Toorcon/ToorCon 9 - 2007/Videos/TeachingHackingAtCollege-SamBowne.mp4 |
18.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/TechniquesForExploitingAnomalyDetectionSystems-JesseHurley.mp4 |
22.9 MB |
Toorcon/ToorCon 9 - 2007/Videos/Textella-AnAlternateApplicationOfPeerToPeer-Remorse.mp4 |
38.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/TravisGoodspeed-ExploitingWirelessSensorNetworksOver802.15.4.mp4 |
39.7 MB |
Toorcon/ToorCon 9 - 2007/Videos/UsingTypeSystemsToReduceYourSecurityRisk-Zax.mp4 |
13.3 MB |
Toorcon/ToorCon 9 - 2007/Videos/vnak-VoIP-NetworkAttackKit-ZaneLackey.mp4 |
20.8 MB |
Toorcon/Toorcon logo.png |
97 KB |
Toorcon/Toorcon thank you.txt |
617 B |