BITCQ

Toorcon

Size: 14.9 GB
Magnet link

Name Size
Toorcon/ToorCamp - 2011/ToorCon 13 (2011) - Anthony J. Stieber - Crisis and Opportunity in Key Management 2001-2031.mp4 106.4 MB
Toorcon/ToorCamp - 2011/ToorCon 13 (2011) - Anthony J. Stieber - How NOT to Implement Cryptography for the OWASP Top 10 (Reloaded).mp4 84.1 MB
Toorcon/ToorCamp - 2012/ToorCamp 2012 Ignite 1-2.mp4 376.3 MB
Toorcon/ToorCamp - 2012/ToorCamp 2012 Ignite 2-2.mp4 376.3 MB
Toorcon/ToorCon 13 - 2011/Dan Tentler vissago Toorcon Seattle 2011.rar 305.7 MB
Toorcon/ToorCon 13 - 2011/ToorCon 13 (2011) - Anthony J. Stieber - How NOT to Implement Cryptography for the OWASP Top 10 (Reloaded).mp4 84.1 MB
Toorcon/ToorCon 14 - 2012/Dan Tentler vissago Toorcon 2012.rar 238.4 MB
Toorcon/ToorCon 14 - 2012/ToorCon 14 (2012) - Tom Samstag (tecknicaltom) - HTTPS in the Real World Screw-ups, Trends, and Outliers.mp4 362.3 MB
Toorcon/ToorCon 15 - 2013/Dan Tentler vissago Toorcon 2013.rar 661.1 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - @PradoAngelo & @GluckYoel - BREACHing SSL, one byte at a time.mp4 172.4 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Aaron Grattafiori - The Outer Limits Hacking a Smart TV.mp4 251.8 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Ashaman - Applications of Artificial Intelligence in Ad-Hoc Static Code Analysis & Eric (XlogicX) Davisson - Mask Your Checksums - The Gorry Details.mp4 90.2 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Caezar - Keynote.mp4 249 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Christie Dudley (Valkyrie) - Data Leaking in Next Generation Cars.mp4 237 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Dmitry Nedospasov - Backside IC analysis.mp4 230.6 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Doug DePerry & Andrew Rahimi - Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell.mp4 233.9 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Grutz - Managing your pentest data with Kvasir & Anna Shubina - Active Fingerprinting of Encrypted VPNs.mp4 124.5 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Jimmy Shah - Mobile Malware Heuristics The path from 'eh' to 'pretty good'.mp4 170.9 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - John Irwin - Let the Hackers Learn.mp4 84 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Michael Eddington - Fuzzing the world with Peach.mp4 358.9 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Michael Ossmann & Kos - Multiplexed Wired Attack Surfaces.mp4 251.7 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Michael Ossmann - Defeating Spread Spectrum Communication with Software Defined Radio.mp4 316.8 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Peleus Uhley & Karthik Raman - Security Response in the Age of Mass Customized Attacks.iso.mp4 231.7 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Robert R - Privacy's Past, Present and Future.iso.mp4 239.1 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Ryan Huber - Running at 99 Surviving an Application DoS.mp4 172 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Toorcon 2013 Opening Remarks & Andrew Furtak, Yuriy Bulygin, Oleksandr Bazhaniuk - A Tale of One Software Bypass of Windows 8 Secure Boot.mp4 64.3 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Wartortell - x86 Rewriting Beating Binaries into Submission.mp4 249 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Xeno Kovah - Firmware attacks, Copernicus, and You.mp4 427.6 MB
Toorcon/ToorCon 15 - 2013/ToorCon 15 - 2013 - Rickrolling your neighbors with Google Chromecast - 20Oct2013.mp4 54.8 MB
Toorcon/ToorCon 16 - 2014/FinFisher Breakdown Toorcon 16.mp4 68.8 MB
Toorcon/ToorCon 16 - 2014/FuzzyNop - Now It s Personal Red Team Anecdotes ToorCon 16.mp4 93.5 MB
Toorcon/ToorCon 16 - 2014/Reverse Engineering Malware For Newbies ToorCon 16.mp4 166 MB
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Aleksander Okonski - Privacy Concerns in Android Applications.mp4 68 MB
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Joe Basirico - Dispel the Illusion Change the Behavior.mp4 87.7 MB
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Matthew Halchyshak & Joseph Tartaro - Cyber Necromancy Reverse Engineering Dead Protocols.mp4 196 MB
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Zak Dehlawi - Researchers Use Google Glass in Public, And You Won't Believe How People React.mp4 90.4 MB
Toorcon/ToorCon 16 - 2014/Toorcon San Diego (2014) - Cyber Necromancy Reverse Engineering Dead Protocols.mp4 188.8 MB
Toorcon/ToorCon 16 - 2014/Toorcon 16 (2014) - Seminar - iOS Blackbox Pentesting Using idb.mp4 320 MB
Toorcon/ToorCon 16 - 2014/Toorcon 16 (2014) - Time Trial - Racing Towards Practical Timing Attacks.mp4 181.9 MB
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Jeremy Brown - A Bug Hunter's Perspective on Unix Drivers.mp4 179.6 MB
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Joel St. John & Danny Iland - The Consumerization of Home Insecurity.mp4 126.6 MB
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Karl Koscher - Software Defined Radios Digital Signal Processing and Digital Modulation.mp4 189.1 MB
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Kevin Grigorenko - Linux Core Dumps From glibc malloc to eye catchers.mp4 125.2 MB
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Marcus Hodges & Tom Samstag - Potent Pwnables Advancements in CTF.mp4 240.8 MB
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Max Chauhan & Nora Sandler - Game of Pwns How we turned developers, teenagers and accountants into hackers.mp4 248.4 MB
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Michael Ossmann - Rapid Radio Reversing.mp4 124.2 MB
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Richo Healey & Mike Ryan - Hacking electric skateboards vehicle research for mortals.mp4 236 MB
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Samy Kamkar - Keynote.mp4 196 MB
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - yan - New Techniques for Browser Fingerprinting.mp4 120.5 MB
Toorcon/ToorCon 18 - 2016/ToorCon 18 Keynote - Jared DeMott - ANALYZING NEXTGEN SECURITY PRACTICES AND SECURITY TOOLS.en.transcribed.srt 139 KB
Toorcon/ToorCon 18 - 2016/ToorCon 18 Keynote - Jared DeMott - ANALYZING NEXTGEN SECURITY PRACTICES AND SECURITY TOOLS.mp4 136.7 MB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Aaron HnatIw - How To Move Mountains.en.transcribed.srt 142 KB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Aaron HnatIw - How To Move Mountains.mp4 176.2 MB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Alonso & Mitnick - DirtyTooth Put Music & Lose your Contacts.en.transcribed.srt 81 KB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Alonso & Mitnick - DirtyTooth Put Music & Lose your Contacts.mp4 141.6 MB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Ernest Wong - Defending Cyberspace by Thinking “1n51d3-th3-B0x”.en.transcribed.srt 137 KB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Ernest Wong - Defending Cyberspace by Thinking “1n51d3-th3-B0x”.mp4 201.1 MB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Gurney Halleck - CyberWargames TableTopExercises.en.transcribed.srt 81 KB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Gurney Halleck - CyberWargames TableTopExercises.mp4 156 MB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - James Barclay - From Zero to Zero-Trust.en.transcribed.srt 94 KB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - James Barclay - From Zero to Zero-Trust.mp4 123.2 MB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Keynote - Lance James.en.transcribed.srt 180 KB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Keynote - Lance James.mp4 213.5 MB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Mohamad Mokbel - ShellPcapFication (SPF) – A Sophisticated Interactive Shell Framework.en.transcribed.srt 105 KB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Mohamad Mokbel - ShellPcapFication (SPF) – A Sophisticated Interactive Shell Framework.mp4 87.7 MB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Newlin, Lamb, & Greyson.mp4 6.3 MB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Robert PortvlIet - Open Up and Say 0x41414141 Attacking Medical Devices.en.transcribed.srt 161 KB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Robert PortvlIet - Open Up and Say 0x41414141 Attacking Medical Devices.mp4 230.4 MB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Spill & Temkin - Facedancer 2.0 Next Generation USB Hacking.en.transcribed.srt 166 KB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Spill & Temkin - Facedancer 2.0 Next Generation USB Hacking.mp4 209.2 MB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Tyler Cook - False Advertising.en.transcribed.srt 108 KB
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Tyler Cook - False Advertising.mp4 122.4 MB
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 1.mp4 16.6 MB
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 2.mp4 16.7 MB
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 3.mp4 14.7 MB
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 4.mp4 13 MB
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 5.mp4 16.5 MB
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 6.mp4 16.7 MB
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 7.mp4 6.8 MB
Toorcon/ToorCon 8 - 2006/Sector2008 - Security Heretic - We're Doing It Wrong.mp4 63.3 MB
Toorcon/ToorCon 8 - 2006/Toor2101 - Cory Doctorow - The Art Of Blogging.mp4 68.8 MB
Toorcon/ToorCon 8 - 2006/Toor2102 - Simple Nomad - State Of The Enemy Of TheState.mp4 73.3 MB
Toorcon/ToorCon 8 - 2006/Toor2103 - Various Presenters - Everything And Anything Lightning Presentations.mp4 58.5 MB
Toorcon/ToorCon 8 - 2006/Toor2114 - Various Panelists - Old School Hacking Nostalgia Panel Discussion.mp4 85.8 MB
Toorcon/ToorCon 8 - 2006/Toor2115 - Datagram - Locksmithing And Key bumping.mp4 78.7 MB
Toorcon/ToorCon 8 - 2006/Toor2116 - ScottMoulton - Hacking Hard Drives For Data Recovery.mp4 75.6 MB
Toorcon/ToorCon 8 - 2006/Toor2117 - Lin0xx - Advanced Windows Firewall Subversion.mp4 62.7 MB
Toorcon/ToorCon 8 - 2006/Toor2119 - Spoonm - Ida Rub Reverse Engineering.mp4 64.4 MB
Toorcon/ToorCon 8 - 2006/Toor2120 - Druid - VOIP Attacks.mp4 76.9 MB
Toorcon/ToorCon 8 - 2006/Toor2121 - Richard Johnson - Windows Vista Exploitation Counter Measures.mp4 67.1 MB
Toorcon/ToorCon 8 - 2006/Toor2122 - Steve Rambam - Privacy Is Dead - Get Over It.mp4 153.1 MB
Toorcon/ToorCon 8 - 2006/Toor2123 - JaredDeMott - The Evolving Art Of Fuzzing.mp4 67.5 MB
Toorcon/ToorCon 8 - 2006/Toor2124 - Vlad Tsyrklevich - Polymorphic Shellcode At A Glance.mp4 70.1 MB
Toorcon/ToorCon 8 - 2006/Toor2125 - Tom St Denis - Elliptic Curve Algorithms w Bad Title.mp4 49.3 MB
Toorcon/ToorCon 8 - 2006/Toor2126 - Nicholas Brulez - Breaking Pocket PC Executable Protection.mp4 50 MB
Toorcon/ToorCon 8 - 2006/Toor2129 - asm - LOL Phone - Exploiting Trust In Social Phone Networks.mp4 65.9 MB
Toorcon/ToorCon 8 - 2006/Toor2130 - Justin Ferguson - Bridging The Gap - Analysis Of Win32.mp4 44.3 MB
Toorcon/ToorCon 8 - 2006/Toor2131 - LanceJames JoshuaBrashards - Tracksploits - Passive Tracker Hacking.mp4 75.2 MB
Toorcon/ToorCon 8 - 2006/Toor2132 - Christopher Abad - HiTech Codes And LoTech LOLs.mp4 75.2 MB
Toorcon/ToorCon 8 - 2006/Toor2133 - Matt Fisher - SQL Injection - Everything About SQL Injection.mp4 158.3 MB
Toorcon/ToorCon 9 - 2007/Dan Tentler vissago Toorcon 2007.rar 379.1 MB
Toorcon/ToorCon 9 - 2007/Videos/AdvancedHackingFlashAndHardDriveRecoveries-ScottMoulton.mp4 42.6 MB
Toorcon/ToorCon 9 - 2007/Videos/AppArmorProfileSharingPortal-CrispinCowan.mp4 45.5 MB
Toorcon/ToorCon 9 - 2007/Videos/AttackingVoIPtoGainControlOfALaptop.mp4 17.5 MB
Toorcon/ToorCon 9 - 2007/Videos/BeatingBackThePhysicalSecurityBoogeyman.mp4 17.5 MB
Toorcon/ToorCon 9 - 2007/Videos/Beetle-Keynote-WolverineYoMamaSpooksAndOsama.mp4 41.4 MB
Toorcon/ToorCon 9 - 2007/Videos/BitblenderProvidingLightweightAnonymityForBittorrent-McCoyAndBauer.mp4 17.2 MB
Toorcon/ToorCon 9 - 2007/Videos/BuildingHackingOpenSourceEmbeddedWirelessRouters-3of4.mp4 118.9 MB
Toorcon/ToorCon 9 - 2007/Videos/Byakugan-AutomatingExploitation-NathanRittenhouse.mp4 17.4 MB
Toorcon/ToorCon 9 - 2007/Videos/CDMA-UnlockingAndModification-AlexanderLash.mp4 26 MB
Toorcon/ToorCon 9 - 2007/Videos/CafeLatteWithAFreeToppingOfCrackedWEP-RamachandranAndAhmad.mp4 20.2 MB
Toorcon/ToorCon 9 - 2007/Videos/CharlieMiller-FuzzingWithCodeCoverage.mp4 43.5 MB
Toorcon/ToorCon 9 - 2007/Videos/ContextKeyedPayloadEncoding-Druid.mp4 19.4 MB
Toorcon/ToorCon 9 - 2007/Videos/ContinuousPreventionTestingToolsforDevelopersAndProductTesters-AndreGironda.mp4 58.3 MB
Toorcon/ToorCon 9 - 2007/Videos/CthuluASoftwareAnalysisFrameworkBuiltOnPhoenix-MattMiller.mp4 38.9 MB
Toorcon/ToorCon 9 - 2007/Videos/DanKaminsky-BlackOps2007-DesignReviewingTheWeb.mp4 49.6 MB
Toorcon/ToorCon 9 - 2007/Videos/ExtrusionAndExploitabilityScanning.mp4 18.2 MB
Toorcon/ToorCon 9 - 2007/Videos/HackerSpacesPanel-EuropeUSandTheFuture-3ricJohnsonNickFarMCFly.mp4 45.3 MB
Toorcon/ToorCon 9 - 2007/Videos/HackingTheEULA-ReverseBenchmarkingWebApplications.mp4 21.1 MB
Toorcon/ToorCon 9 - 2007/Videos/HackingWindowsVistaSecurity-DanGriffin.mp4 18.8 MB
Toorcon/ToorCon 9 - 2007/Videos/HotspotAnalysisLookingAtHotspotsWithaMagGlass-RichardRushing.mp4 19.5 MB
Toorcon/ToorCon 9 - 2007/Videos/JAYBEALE-TheyreHackingOurClientsWhyAreWeOnlyAssessingServers.mp4 25.4 MB
Toorcon/ToorCon 9 - 2007/Videos/JeromeAthias-SpeedingUpTheExploitsDevelopmentProcess.mp4 32.8 MB
Toorcon/ToorCon 9 - 2007/Videos/LastStand-100percentAutomatic0DayAchievedAndExplained-JasonMedeiros.mp4 22.6 MB
Toorcon/ToorCon 9 - 2007/Videos/LinuxKernelRootkitDetectionAndAnalysisDuringIncidentResponse-GabrielLawrence.mp4 57.6 MB
Toorcon/ToorCon 9 - 2007/Videos/LiveMemoryForensicsIncidentResponseOnACompromisedSystem-Datagram.mp4 17.5 MB
Toorcon/ToorCon 9 - 2007/Videos/NewSQL-InjectionTricks-PaulBattista.mp4 18.3 MB
Toorcon/ToorCon 9 - 2007/Videos/PenetrationTesting-LessonsLearnedToolsAndTechniques-OstromAndKindervag.mp4 20.6 MB
Toorcon/ToorCon 9 - 2007/Videos/PostScarcityEconomicsAndTheEconomicsOfAbundance.mp4 19.5 MB
Toorcon/ToorCon 9 - 2007/Videos/PrivilegeCentricSecurityAnalysis-BrendaLarcom.mp4 17.1 MB
Toorcon/ToorCon 9 - 2007/Videos/RealWorldFuzzingCollectingAndAnalyzingCode.mp4 69.9 MB
Toorcon/ToorCon 9 - 2007/Videos/RodneyThayer-Crypto-Pt1of2.mp4 90.6 MB
Toorcon/ToorCon 9 - 2007/Videos/RodneyThayer-Crypto-Pt2of2.mp4 21.1 MB
Toorcon/ToorCon 9 - 2007/Videos/SocialDataMiningThroughTelephonyVulnerabilities-ASM.mp4 20 MB
Toorcon/ToorCon 9 - 2007/Videos/StromCarlson-TheTalkTalkHowToGiveBetterTechPresentations.mp4 20.4 MB
Toorcon/ToorCon 9 - 2007/Videos/TeachingHackingAtCollege-SamBowne.mp4 18.6 MB
Toorcon/ToorCon 9 - 2007/Videos/TechniquesForExploitingAnomalyDetectionSystems-JesseHurley.mp4 22.9 MB
Toorcon/ToorCon 9 - 2007/Videos/Textella-AnAlternateApplicationOfPeerToPeer-Remorse.mp4 38.6 MB
Toorcon/ToorCon 9 - 2007/Videos/TravisGoodspeed-ExploitingWirelessSensorNetworksOver802.15.4.mp4 39.7 MB
Toorcon/ToorCon 9 - 2007/Videos/UsingTypeSystemsToReduceYourSecurityRisk-Zax.mp4 13.3 MB
Toorcon/ToorCon 9 - 2007/Videos/vnak-VoIP-NetworkAttackKit-ZaneLackey.mp4 20.8 MB
Toorcon/Toorcon logo.png 97 KB
Toorcon/Toorcon thank you.txt 617 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Toorcon Video 18.5 GB 10
toorcon-2013-ossmann-spread-spectrum Video 644.1 MB 4
Toorcon Video 14.9 GB 1
toorcon-2013-ossmann-spread-spectrum Video 644.1 MB 3
Toorcon Video 18 GB 1

Loading...