DefCamp/DefCamp 2014/DefCamp 2014 - A look into Bullet Proof Hosting.mp4 |
232.4 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Android(in)Security.mp4 |
226.1 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Android(in)Security.srt |
58 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT).mp4 |
159.1 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT).srt |
42 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Crypto as a global business.mp4 |
205.1 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Crypto as a global business.srt |
57 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - CubeSats - How I got the chance to implement satellite (in-)security and how I fix it.mp4 |
235.1 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - CubeSats - How I got the chance to implement satellite (in-)security and how I fix it.srt |
45 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Cyber Necromancy Reverse Engineering Dead Protocols.mp4 |
220.4 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Cyber Necromancy Reverse Engineering Dead Protocols.srt |
84 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Cyber Ranges.mp4 |
283.5 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Democracy and massive-control in the post-Snowden age.mp4 |
428.6 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Finding a European way for a safer cyberworld..mp4 |
167.7 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Finding a European way for a safer cyberworld..srt |
29 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - I can track you! They can track you! Everybody can track you!.mp4 |
166.8 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - I can track you! They can track you! Everybody can track you!.srt |
36 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Managing Risk Effectively.mp4 |
83.5 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Managing Risk Effectively.srt |
29 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Memory Forensics & Security Analytics Detecting Unknown Malware.mp4 |
317.4 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Official Overview.mp4 |
16.3 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Official Trailer.mp4 |
8.7 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Owning the girl next door.mp4 |
282.5 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Penetration Testing - 7 Deadly Sins.mp4 |
188.2 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Practical Study of Security Problems on the Most Efficient Web Application Firewall.mp4 |
53.2 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Practical Study of Security Problems on the Most Efficient Web Application Firewall.srt |
14 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - PuttyRider - Pivoting from Windows to Linux in a penetration test.mp4 |
176.5 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - PuttyRider - Pivoting from Windows to Linux in a penetration test.srt |
63 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Pyrotechnic Composition Fireworks, Embedded Wireless and Insecurity-by-Design.mp4 |
285.6 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - SCADA Software or Swiss Cheese Software.mp4 |
193.9 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Securing Networks using SDN and Machine Learning.mp4 |
156.8 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Security Nightmares for Journalists, why we must all be SysAdmins..mp4 |
193.2 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Security Nightmares for Journalists, why we must all be SysAdmins..srt |
34 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Social Engineering, or hacking people.mp4 |
304.8 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Social Engineering, or hacking people.srt |
86 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Vulnerability Assessments on SCADA Networks Outsmarting the Smart Grid..mp4 |
297.2 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - What happens in Windows 8 stays in Windows 8.mp4 |
211.1 MB |
DefCamp/DefCamp 2014/TITANII FUNKY FRESH @DefCamp 2014 - Day One.mp4 |
84.4 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - (In)Security of Embedded Devices Firmware - Fast and Furious at Large Scale.mp4 |
444.7 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - A new Hope - CTF stories & IoT Hacking.mp4 |
254.5 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - A new Hope - CTF stories & IoT Hacking.srt |
32 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Abstract Apoc@lypse Technique.mp4 |
162.5 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Abstract Apoc@lypse Technique.srt |
14 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Breaking in Bad (Im the one who doesnt knock).mp4 |
520.2 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Breaking in Bad (Im the one who doesnt knock).srt |
176 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Cyber Security Operations Center.mp4 |
221.7 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Cyber Security Operations Center.srt |
48 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Weaponized Honeybot ( part I ).mp4 |
174.4 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Weaponized Honeybot ( part I ).srt |
30 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Weaponized Honeybot (part II).mp4 |
39.2 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Weaponized Honeybot (part II).srt |
2 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Challenges on Reversing Layered Malware.mp4 |
397.2 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Cryptography - our weapon in the 21st century.mp4 |
329.9 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Cryptography - our weapon in the 21st century.srt |
111 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Defending the Enterprise Against Network Infrastructure Threats.mp4 |
282.4 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Defending the Enterprise Against Network Infrastructure Threats.srt |
58 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - ELK stack for Hackers.mp4 |
278 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - ELK stack for Hackers.srt |
32 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Finding media bugs in Android using file format fuzzing.mp4 |
151.9 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Finding media bugs in Android using file format fuzzing.srt |
52 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Game of Hacks Play, Hack & Track.mp4 |
284.8 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Game of Hacks Play, Hack & Track.srt |
38 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Hacking and Securing Network Monitoring Systems.mp4 |
408.1 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - How to mess with Android Intents.mp4 |
118 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - How to mess with Android Intents.srt |
13 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - IDS Evasion Techniques.mp4 |
291.8 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - IDS Evasion Techniques.srt |
70 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Integrating Mobile Devices into Your Penetration Testing Program.mp4 |
532.5 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - IoT Security.mp4 |
177 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - IoT Security.srt |
18 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - IoT Village Awards Ceremony.mp4 |
66 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - IoT Village Awards Ceremony.srt |
7 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Misleading implementations that compromise the privacy and information security.mp4 |
157.4 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Misleading implementations that compromise the privacy and information security.srt |
15 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Modern approaches to Wi-Fi attacks.mp4 |
243.5 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Modern approaches to Wi-Fi attacks.srt |
23 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Official Overview.mp4 |
34.5 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Orange about Bug Bounty & Innovation Labs 2016.mp4 |
409.9 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Orange about Bug Bounty & Innovation Labs 2016.srt |
40 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Pentesting Android Applications.mp4 |
221.7 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Toward large-scale vulnerability discovery using Machine Learning.mp4 |
169 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Uncommon methods of attack and monitoring them for detection.mp4 |
413.1 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Uncommon methods of attack and monitoring them for detection.srt |
56 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Untrusted Mobile Applications. State of Art of Security App-Apocalypse.mp4 |
503.2 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - When Steganography Stops Being Cool.mp4 |
206.6 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - When Steganography Stops Being Cool.srt |
33 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - White hat hacker bounty program to improve online environment security.mp4 |
129.1 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Why nation-state malwares target Telco Networks.mp4 |
365.9 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Why nation-state malwares target Telco Networks.srt |
45 KB |
DefCamp/DefCamp 2015/DefCamp 2015 -From Hype Hangover to Happy Hacking Shaping the World through Shaping Actions.mp4 |
454.1 MB |
DefCamp/DefCamp 2015/DefCamp 2015 -From Hype Hangover to Happy Hacking Shaping the World through Shaping Actions.srt |
68 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - BAD SOFTWARE IS EATING THE WORLD! LETS FIX IT!.mp4 |
21.8 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - BAD SOFTWARE IS EATING THE WORLD! LETS FIX IT!.srt |
59 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - BROWSER INSTRUMENTATION FOR EXPLOIT ANALYSIS.mp4 |
55.6 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - BROWSER INSTRUMENTATION FOR EXPLOIT ANALYSIS.srt |
42 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - CRAFTING THE UNAVOIDABLE.mp4 |
25.3 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - DETECTING DRIVE-BY ATTACKS BY ANALYZING MALICIOUS JAVASCRIPT IN BIG DATA ENVIRONMENTS - YouTube.mp4 |
47.5 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - DETECTING DRIVE-BY ATTACKS BY ANALYZING MALICIOUS JAVASCRIPT IN BIG DATA ENVIRONMENTS - YouTube.srt |
81 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - DO TINDER BOTS DREAM OF ELECTRIC TOYS.mp4 |
13.9 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - DO TINDER BOTS DREAM OF ELECTRIC TOYS.srt |
72 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - DVB-T HACKING.mp4 |
65.9 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - DVB-T HACKING.srt |
79 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - FOLLOW THE MONEY..mp4 |
31.7 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - FOLLOW THE MONEY..srt |
60 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - FROM THREAT INTELLIGENCE TO RAPSHEETS IN JUST A FEW STEPS.mp4 |
46.5 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - FROM THREAT INTELLIGENCE TO RAPSHEETS IN JUST A FEW STEPS.srt |
93 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - FUNCTIONALITY, SECURITY, USABILITY CHOOSE ANY TWO. OR GNOME..mp4 |
97.3 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - FUNCTIONALITY, SECURITY, USABILITY CHOOSE ANY TWO. OR GNOME..srt |
124 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - HOW I HACKED MY CITY.mp4 |
27.8 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - HOW I HACKED MY CITY.srt |
75 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - INFECTING INTERNET OF THINGS.mp4 |
82.9 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - INFECTING INTERNET OF THINGS.srt |
87 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - INTERPLANETARY FILE SYSTEM (IPFS).mp4 |
173.7 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - INTERPLANETARY FILE SYSTEM (IPFS).srt |
77 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - KNOCK KNOCK.. WHOS THERE .. THE LAW! OPEN UP!.mp4 |
120.1 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - KNOCK KNOCK.. WHOS THERE .. THE LAW! OPEN UP!.srt |
94 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - MAKING HACKING AND SOCIAL ENGINEERING HARDER WITH TYPING BIOMETRICS..mp4 |
72.6 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - MAKING HACKING AND SOCIAL ENGINEERING HARDER WITH TYPING BIOMETRICS..srt |
95 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - MOVING FORWARD WITH CYBERSECURITY.mp4 |
35 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - ONLINE ALTER EGO - A SIMPLE BUTTON FOR MILITARY SECURITY.mp4 |
41.6 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - ONLINE ALTER EGO - A SIMPLE BUTTON FOR MILITARY SECURITY.srt |
139 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - Official Overview.mp4 |
162.9 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - Opening Speech Track #1 from Stefan Slavnicu, CTO Orange Romania.mp4 |
16 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - Opening Speech Track #1 from Stefan Slavnicu, CTO Orange Romania.srt |
16 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - Opening Speech Track #2 with Noam Rathaus, CTO Beyond Security.mp4 |
170.2 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - Opening Speech Track #2 with Noam Rathaus, CTO Beyond Security.srt |
66 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - REVERSING A POLYMORPHIC FILE-INFECTING RANSOMWARE.mp4 |
43 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - REVERSING A POLYMORPHIC FILE-INFECTING RANSOMWARE.srt |
79 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - RISKWARE BETRAYER. WHO IS THE BIGGEST ONE.mp4 |
18.1 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SE EXPLOIT BY IMPROVISACIÓN.mp4 |
62.5 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SECURING THE OPENNESS. THE OPERATOR CHALLENGE..mp4 |
77.3 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SECURING THE OPENNESS. THE OPERATOR CHALLENGE..srt |
74 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - SECURITY OF MOBILE CRYPTOCOIN WALLETS.mp4 |
30.4 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SECURITY OF MOBILE CRYPTOCOIN WALLETS.srt |
65 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - SECURITY THROUGH OPEN INNOVATION AND DATA SHARING.mp4 |
82.3 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SOCIAL ENGINEERING - SECURITY THROUGH EDUCATION.mp4 |
72.8 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SOCIAL ENGINEERING - SECURITY THROUGH EDUCATION.srt |
76 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - SPLIT PERSONALITIES THE PSYCHOLOGY OF SOCIAL ENGINEERING.mp4 |
57.5 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SPLIT PERSONALITIES THE PSYCHOLOGY OF SOCIAL ENGINEERING.srt |
90 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - TESTERS VS WRITERS PENTESTS QUALITY IN ASSURANCE PROJECTS.mp4 |
89.9 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - TESTERS VS WRITERS PENTESTS QUALITY IN ASSURANCE PROJECTS.srt |
56 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - THREAT INTELLIGENCE! DIY!.mp4 |
38.7 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - THREAT INTELLIGENCE! DIY!.srt |
102 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - WEB APPLICATION FIREWALL BYPASSING.mp4 |
61.8 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - WEB APPLICATION FIREWALL BYPASSING.srt |
87 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - WINDOWS SHELLCODES TO BE CONTINUED.mp4 |
42.1 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - …AND BAD MISTAKES…IVE MADE A FEW….mp4 |
64.5 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - …AND BAD MISTAKES…IVE MADE A FEW….srt |
147 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - ATM every day trouble.mp4 |
79.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Active Defense Untangled.mp4 |
88.7 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Are we alone in our infrastructure.en.transcribed.srt |
35 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Are we alone in our infrastructure.mp4 |
29.8 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Are you keeping up with the Commodore, ’cause the Commodore is keeping up with you!.mp4 |
154.4 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Attacking Mongoose OS on Xtensa platforms.en.transcribed.srt |
46 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Attacking Mongoose OS on Xtensa platforms.mp4 |
45.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Awards Ceremony.en.transcribed.srt |
53 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Awards Ceremony.mp4 |
149.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Back to the IoT Future Where Marty controls all your routers.en.transcribed.srt |
65 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Back to the IoT Future Where Marty controls all your routers.mp4 |
50.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - BlackBox Debugging of Embedded Systems..mp4 |
55.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Bug bounty conspiracy and 50 shades of gray hat. Who owns the vulnerability.mp4 |
77.4 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - CYBER SECURITY IN REAL BUSINESS WORLD.en.transcribed.srt |
186 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - CYBER SECURITY IN REAL BUSINESS WORLD.mp4 |
331.7 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Current challenges of cybersecurity policies and legislation.en.transcribed.srt |
201 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Current challenges of cybersecurity policies and legislation.mp4 |
373.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Drive safely on the internet lane how smart cars can leak your data - YouTube.en.transcribed.srt |
54 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Drive safely on the internet lane how smart cars can leak your data - YouTube.mp4 |
82.5 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Efficient Defenses Against Adversarial Examples for Deep Neural Networks.mp4 |
47.7 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Eternal Blues with EternalBlue.en.transcribed.srt |
50 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Eternal Blues with EternalBlue.mp4 |
21.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Evolution of threats to Electric Power Grid Operations.mp4 |
38.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Fileless malware – beyond a cursory glance.en.transcribed.srt |
24 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Fileless malware – beyond a cursory glance.mp4 |
60.3 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Fuzzing closed source applications.mp4 |
47.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - GDPR – T minus 6 months. Are you ready.en.transcribed.srt |
123 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - GDPR – T minus 6 months. Are you ready.mp4 |
75.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Hijacking the Boot Process – Ransomware Style.mp4 |
71.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - ICS Humla.mp4 |
33.5 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Incident Busters. A 2017 retrospective.mp4 |
93.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - IoT botnets How do they work.en.transcribed.srt |
50 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - IoT botnets How do they work.mp4 |
25.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Keeping customer data safe in EC2 – a deep dive.mp4 |
34.8 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Lockpicking and IT Security.en.transcribed.srt |
82 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Lockpicking and IT Security.mp4 |
89.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Making Of.mp4 |
11.3 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Minute-hacks against Robi the Robot.mp4 |
21 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Orange is the New Purple.mp4 |
61.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Pentest-Tools The first online penetration testing framework.en.transcribed.srt |
50 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Pentest-Tools The first online penetration testing framework.mp4 |
95.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Remote Attacks against IoT.mp4 |
95.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Road to ECSC 2017.mp4 |
24.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - SHA-3 vs the world.en.transcribed.srt |
81 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - SHA-3 vs the world.mp4 |
51.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Securing without Slowing.en.transcribed.srt |
161 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Securing without Slowing.mp4 |
201.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Sharper than a Phisher’s Hook – The Story of an Email Autopsy.mp4 |
82.5 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Smart Cities under Attack Cybercrime and Technology Response.en.transcribed.srt |
62 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Smart Cities under Attack Cybercrime and Technology Response.mp4 |
164.8 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Splunking the Clouds finding the needle in AWS & Azure..mp4 |
31.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Supporting innovation in cybersecurity through acceleration program – Orange Fab.en.transcribed.srt |
45 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Supporting innovation in cybersecurity through acceleration program – Orange Fab.mp4 |
39.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - The rise of security assistants over security audit services - YouTube.mp4 |
81.7 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Turning IDS signatures against an IDS itself a new evasion technique.en.transcribed.srt |
41 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Turning IDS signatures against an IDS itself a new evasion technique.mp4 |
30.5 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Twisting Layer 2 Protocols.62ac2b4f-55b4-40c3-b4c8-9afc4c6ee843.part |
17.7 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Twisting Layer 2 Protocols.en.transcribed.srt |
76 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Twisting Layer 2 Protocols.mp4 |
41.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Unexpected Shells with “covertutils”.957b95b2-6b27-4c85-8e97-d526295fe78a.part |
30.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Unexpected Shells with “covertutils”.en.transcribed.srt |
66 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Unexpected Shells with “covertutils”.mp4 |
78.4 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Weaponized RaspberryPi in Red Team Engagements.mp4 |
31.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - What the WiFiCactus!!!.en.transcribed.srt |
162 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - What the WiFiCactus!!!.mp4 |
140.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Wisdom and Life Lessons Learned in the Business of Cyber security.en.transcribed.srt |
46 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Wisdom and Life Lessons Learned in the Business of Cyber security.mp4 |
66.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - You Fail in SE If You Make Those Mistakes.en.transcribed.srt |
67 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - You Fail in SE If You Make Those Mistakes.mp4 |
56.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 Official Overview.mp4 |
10.2 MB |
DefCamp/DefCamp logo.jpg |
23 KB |
DefCamp/DefCamp thank you.txt |
954 B |