DefCamp/DefCamp 2014/DefCamp 2014 - A look into Bullet Proof Hosting.mp4 |
232.4 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Android(in)Security.mp4 |
226.1 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Android(in)Security.srt |
58 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT).mp4 |
159.1 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT).srt |
42 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Crypto as a global business.mp4 |
205.1 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Crypto as a global business.srt |
57 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - CubeSats - How I got the chance to implement satellite (in-)security and how I fix it.mp4 |
235.1 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - CubeSats - How I got the chance to implement satellite (in-)security and how I fix it.srt |
45 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Cyber Necromancy Reverse Engineering Dead Protocols.mp4 |
220.4 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Cyber Necromancy Reverse Engineering Dead Protocols.srt |
84 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Cyber Ranges.mp4 |
283.5 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Democracy and massive-control in the post-Snowden age.mp4 |
428.6 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Finding a European way for a safer cyberworld..mp4 |
167.7 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Finding a European way for a safer cyberworld..srt |
29 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - I can track you! They can track you! Everybody can track you!.mp4 |
166.8 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - I can track you! They can track you! Everybody can track you!.srt |
36 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Managing Risk Effectively.mp4 |
83.5 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Managing Risk Effectively.srt |
29 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Memory Forensics & Security Analytics Detecting Unknown Malware.mp4 |
317.4 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Official Overview.mp4 |
16.3 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Official Trailer.mp4 |
8.7 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Owning the girl next door.mp4 |
282.5 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Penetration Testing - 7 Deadly Sins.mp4 |
188.2 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Practical Study of Security Problems on the Most Efficient Web Application Firewall.mp4 |
53.2 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Practical Study of Security Problems on the Most Efficient Web Application Firewall.srt |
14 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - PuttyRider - Pivoting from Windows to Linux in a penetration test.mp4 |
176.5 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - PuttyRider - Pivoting from Windows to Linux in a penetration test.srt |
63 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Pyrotechnic Composition Fireworks, Embedded Wireless and Insecurity-by-Design.mp4 |
285.6 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - SCADA Software or Swiss Cheese Software.mp4 |
193.9 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Securing Networks using SDN and Machine Learning.mp4 |
156.8 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Security Nightmares for Journalists, why we must all be SysAdmins..mp4 |
193.2 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Security Nightmares for Journalists, why we must all be SysAdmins..srt |
34 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Social Engineering, or hacking people.mp4 |
304.8 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - Social Engineering, or hacking people.srt |
86 KB |
DefCamp/DefCamp 2014/DefCamp 2014 - Vulnerability Assessments on SCADA Networks Outsmarting the Smart Grid..mp4 |
297.2 MB |
DefCamp/DefCamp 2014/DefCamp 2014 - What happens in Windows 8 stays in Windows 8.mp4 |
211.1 MB |
DefCamp/DefCamp 2014/TITANII FUNKY FRESH @DefCamp 2014 - Day One.mp4 |
84.4 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - (In)Security of Embedded Devices Firmware - Fast and Furious at Large Scale.mp4 |
444.7 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - A new Hope - CTF stories & IoT Hacking.mp4 |
254.5 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - A new Hope - CTF stories & IoT Hacking.srt |
32 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Abstract Apoc@lypse Technique.mp4 |
162.5 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Abstract Apoc@lypse Technique.srt |
14 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Breaking in Bad (Im the one who doesnt knock).mp4 |
520.2 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Breaking in Bad (Im the one who doesnt knock).srt |
176 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Cyber Security Operations Center.mp4 |
221.7 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Cyber Security Operations Center.srt |
48 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Weaponized Honeybot ( part I ).mp4 |
174.4 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Weaponized Honeybot ( part I ).srt |
30 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Weaponized Honeybot (part II).mp4 |
39.2 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Building a Weaponized Honeybot (part II).srt |
2 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Challenges on Reversing Layered Malware.mp4 |
397.2 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Cryptography - our weapon in the 21st century.mp4 |
329.9 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Cryptography - our weapon in the 21st century.srt |
111 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Defending the Enterprise Against Network Infrastructure Threats.mp4 |
282.4 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Defending the Enterprise Against Network Infrastructure Threats.srt |
58 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - ELK stack for Hackers.mp4 |
278 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - ELK stack for Hackers.srt |
32 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Finding media bugs in Android using file format fuzzing.mp4 |
151.9 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Finding media bugs in Android using file format fuzzing.srt |
52 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Game of Hacks Play, Hack & Track.mp4 |
284.8 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Game of Hacks Play, Hack & Track.srt |
38 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Hacking and Securing Network Monitoring Systems.mp4 |
408.1 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - How to mess with Android Intents.mp4 |
118 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - How to mess with Android Intents.srt |
13 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - IDS Evasion Techniques.mp4 |
291.8 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - IDS Evasion Techniques.srt |
70 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Integrating Mobile Devices into Your Penetration Testing Program.mp4 |
532.5 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - IoT Security.mp4 |
177 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - IoT Security.srt |
18 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - IoT Village Awards Ceremony.mp4 |
66 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - IoT Village Awards Ceremony.srt |
7 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Misleading implementations that compromise the privacy and information security.mp4 |
157.4 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Misleading implementations that compromise the privacy and information security.srt |
15 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Modern approaches to Wi-Fi attacks.mp4 |
243.5 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Modern approaches to Wi-Fi attacks.srt |
23 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Official Overview.mp4 |
34.5 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Orange about Bug Bounty & Innovation Labs 2016.mp4 |
409.9 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Orange about Bug Bounty & Innovation Labs 2016.srt |
40 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Pentesting Android Applications.mp4 |
221.7 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Toward large-scale vulnerability discovery using Machine Learning.mp4 |
169 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Uncommon methods of attack and monitoring them for detection.mp4 |
413.1 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Uncommon methods of attack and monitoring them for detection.srt |
56 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - Untrusted Mobile Applications. State of Art of Security App-Apocalypse.mp4 |
503.2 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - When Steganography Stops Being Cool.mp4 |
206.6 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - When Steganography Stops Being Cool.srt |
33 KB |
DefCamp/DefCamp 2015/DefCamp 2015 - White hat hacker bounty program to improve online environment security.mp4 |
129.1 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Why nation-state malwares target Telco Networks.mp4 |
365.9 MB |
DefCamp/DefCamp 2015/DefCamp 2015 - Why nation-state malwares target Telco Networks.srt |
45 KB |
DefCamp/DefCamp 2015/DefCamp 2015 -From Hype Hangover to Happy Hacking Shaping the World through Shaping Actions.mp4 |
454.1 MB |
DefCamp/DefCamp 2015/DefCamp 2015 -From Hype Hangover to Happy Hacking Shaping the World through Shaping Actions.srt |
68 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - BAD SOFTWARE IS EATING THE WORLD! LETS FIX IT!.mp4 |
21.8 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - BAD SOFTWARE IS EATING THE WORLD! LETS FIX IT!.srt |
59 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - BROWSER INSTRUMENTATION FOR EXPLOIT ANALYSIS.mp4 |
55.6 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - BROWSER INSTRUMENTATION FOR EXPLOIT ANALYSIS.srt |
42 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - CRAFTING THE UNAVOIDABLE.mp4 |
25.3 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - DETECTING DRIVE-BY ATTACKS BY ANALYZING MALICIOUS JAVASCRIPT IN BIG DATA ENVIRONMENTS - YouTube.mp4 |
47.5 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - DETECTING DRIVE-BY ATTACKS BY ANALYZING MALICIOUS JAVASCRIPT IN BIG DATA ENVIRONMENTS - YouTube.srt |
81 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - DO TINDER BOTS DREAM OF ELECTRIC TOYS.mp4 |
13.9 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - DO TINDER BOTS DREAM OF ELECTRIC TOYS.srt |
72 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - DVB-T HACKING.mp4 |
65.9 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - DVB-T HACKING.srt |
79 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - FOLLOW THE MONEY..mp4 |
31.7 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - FOLLOW THE MONEY..srt |
60 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - FROM THREAT INTELLIGENCE TO RAPSHEETS IN JUST A FEW STEPS.mp4 |
46.5 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - FROM THREAT INTELLIGENCE TO RAPSHEETS IN JUST A FEW STEPS.srt |
93 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - FUNCTIONALITY, SECURITY, USABILITY CHOOSE ANY TWO. OR GNOME..mp4 |
97.3 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - FUNCTIONALITY, SECURITY, USABILITY CHOOSE ANY TWO. OR GNOME..srt |
124 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - HOW I HACKED MY CITY.mp4 |
27.8 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - HOW I HACKED MY CITY.srt |
75 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - INFECTING INTERNET OF THINGS.mp4 |
82.9 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - INFECTING INTERNET OF THINGS.srt |
87 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - INTERPLANETARY FILE SYSTEM (IPFS).mp4 |
173.7 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - INTERPLANETARY FILE SYSTEM (IPFS).srt |
77 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - KNOCK KNOCK.. WHOS THERE .. THE LAW! OPEN UP!.mp4 |
120.1 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - KNOCK KNOCK.. WHOS THERE .. THE LAW! OPEN UP!.srt |
94 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - MAKING HACKING AND SOCIAL ENGINEERING HARDER WITH TYPING BIOMETRICS..mp4 |
72.6 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - MAKING HACKING AND SOCIAL ENGINEERING HARDER WITH TYPING BIOMETRICS..srt |
95 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - MOVING FORWARD WITH CYBERSECURITY.mp4 |
35 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - ONLINE ALTER EGO - A SIMPLE BUTTON FOR MILITARY SECURITY.mp4 |
41.6 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - ONLINE ALTER EGO - A SIMPLE BUTTON FOR MILITARY SECURITY.srt |
139 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - Official Overview.mp4 |
162.9 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - Opening Speech Track #1 from Stefan Slavnicu, CTO Orange Romania.mp4 |
16 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - Opening Speech Track #1 from Stefan Slavnicu, CTO Orange Romania.srt |
16 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - Opening Speech Track #2 with Noam Rathaus, CTO Beyond Security.mp4 |
170.2 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - Opening Speech Track #2 with Noam Rathaus, CTO Beyond Security.srt |
66 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - REVERSING A POLYMORPHIC FILE-INFECTING RANSOMWARE.mp4 |
43 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - REVERSING A POLYMORPHIC FILE-INFECTING RANSOMWARE.srt |
79 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - RISKWARE BETRAYER. WHO IS THE BIGGEST ONE.mp4 |
18.1 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SE EXPLOIT BY IMPROVISACIÓN.mp4 |
62.5 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SECURING THE OPENNESS. THE OPERATOR CHALLENGE..mp4 |
77.3 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SECURING THE OPENNESS. THE OPERATOR CHALLENGE..srt |
74 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - SECURITY OF MOBILE CRYPTOCOIN WALLETS.mp4 |
30.4 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SECURITY OF MOBILE CRYPTOCOIN WALLETS.srt |
65 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - SECURITY THROUGH OPEN INNOVATION AND DATA SHARING.mp4 |
82.3 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SOCIAL ENGINEERING - SECURITY THROUGH EDUCATION.mp4 |
72.8 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SOCIAL ENGINEERING - SECURITY THROUGH EDUCATION.srt |
76 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - SPLIT PERSONALITIES THE PSYCHOLOGY OF SOCIAL ENGINEERING.mp4 |
57.5 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - SPLIT PERSONALITIES THE PSYCHOLOGY OF SOCIAL ENGINEERING.srt |
90 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - TESTERS VS WRITERS PENTESTS QUALITY IN ASSURANCE PROJECTS.mp4 |
89.9 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - TESTERS VS WRITERS PENTESTS QUALITY IN ASSURANCE PROJECTS.srt |
56 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - THREAT INTELLIGENCE! DIY!.mp4 |
38.7 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - THREAT INTELLIGENCE! DIY!.srt |
102 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - WEB APPLICATION FIREWALL BYPASSING.mp4 |
61.8 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - WEB APPLICATION FIREWALL BYPASSING.srt |
87 KB |
DefCamp/DefCamp 2016/DefCamp 2016 - WINDOWS SHELLCODES TO BE CONTINUED.mp4 |
42.1 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - …AND BAD MISTAKES…IVE MADE A FEW….mp4 |
64.5 MB |
DefCamp/DefCamp 2016/DefCamp 2016 - …AND BAD MISTAKES…IVE MADE A FEW….srt |
147 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - ATM every day trouble.mp4 |
79.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Active Defense Untangled.mp4 |
88.7 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Are we alone in our infrastructure.en.transcribed.srt |
35 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Are we alone in our infrastructure.mp4 |
29.8 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Are you keeping up with the Commodore, ’cause the Commodore is keeping up with you!.mp4 |
154.4 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Attacking Mongoose OS on Xtensa platforms.en.transcribed.srt |
46 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Attacking Mongoose OS on Xtensa platforms.mp4 |
45.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Awards Ceremony.en.transcribed.srt |
53 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Awards Ceremony.mp4 |
149.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Back to the IoT Future Where Marty controls all your routers.en.transcribed.srt |
65 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Back to the IoT Future Where Marty controls all your routers.mp4 |
50.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - BlackBox Debugging of Embedded Systems..mp4 |
55.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Bug bounty conspiracy and 50 shades of gray hat. Who owns the vulnerability.mp4 |
77.4 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - CYBER SECURITY IN REAL BUSINESS WORLD.en.transcribed.srt |
186 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - CYBER SECURITY IN REAL BUSINESS WORLD.mp4 |
331.7 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Current challenges of cybersecurity policies and legislation.en.transcribed.srt |
201 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Current challenges of cybersecurity policies and legislation.mp4 |
373.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Drive safely on the internet lane how smart cars can leak your data - YouTube.en.transcribed.srt |
54 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Drive safely on the internet lane how smart cars can leak your data - YouTube.mp4 |
82.5 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Efficient Defenses Against Adversarial Examples for Deep Neural Networks.mp4 |
47.7 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Eternal Blues with EternalBlue.en.transcribed.srt |
50 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Eternal Blues with EternalBlue.mp4 |
21.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Evolution of threats to Electric Power Grid Operations.mp4 |
38.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Fileless malware – beyond a cursory glance.en.transcribed.srt |
24 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Fileless malware – beyond a cursory glance.mp4 |
60.3 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Fuzzing closed source applications.mp4 |
47.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - GDPR – T minus 6 months. Are you ready.en.transcribed.srt |
123 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - GDPR – T minus 6 months. Are you ready.mp4 |
75.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Hijacking the Boot Process – Ransomware Style.mp4 |
71.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - ICS Humla.mp4 |
33.5 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Incident Busters. A 2017 retrospective.mp4 |
93.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - IoT botnets How do they work.en.transcribed.srt |
50 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - IoT botnets How do they work.mp4 |
25.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Keeping customer data safe in EC2 – a deep dive.mp4 |
34.8 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Lockpicking and IT Security.en.transcribed.srt |
82 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Lockpicking and IT Security.mp4 |
89.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Making Of.mp4 |
11.3 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Minute-hacks against Robi the Robot.mp4 |
21 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Orange is the New Purple.mp4 |
61.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Pentest-Tools The first online penetration testing framework.en.transcribed.srt |
50 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Pentest-Tools The first online penetration testing framework.mp4 |
95.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Remote Attacks against IoT.mp4 |
95.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Road to ECSC 2017.mp4 |
24.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - SHA-3 vs the world.en.transcribed.srt |
81 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - SHA-3 vs the world.mp4 |
51.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Securing without Slowing.en.transcribed.srt |
161 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Securing without Slowing.mp4 |
201.6 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Sharper than a Phisher’s Hook – The Story of an Email Autopsy.mp4 |
82.5 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Smart Cities under Attack Cybercrime and Technology Response.en.transcribed.srt |
62 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Smart Cities under Attack Cybercrime and Technology Response.mp4 |
164.8 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Splunking the Clouds finding the needle in AWS & Azure..mp4 |
31.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Supporting innovation in cybersecurity through acceleration program – Orange Fab.en.transcribed.srt |
45 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Supporting innovation in cybersecurity through acceleration program – Orange Fab.mp4 |
39.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - The rise of security assistants over security audit services - YouTube.mp4 |
81.7 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Turning IDS signatures against an IDS itself a new evasion technique.en.transcribed.srt |
41 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Turning IDS signatures against an IDS itself a new evasion technique.mp4 |
30.5 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Twisting Layer 2 Protocols.62ac2b4f-55b4-40c3-b4c8-9afc4c6ee843.part |
17.7 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Twisting Layer 2 Protocols.en.transcribed.srt |
76 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Twisting Layer 2 Protocols.mp4 |
41.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Unexpected Shells with “covertutils”.957b95b2-6b27-4c85-8e97-d526295fe78a.part |
30.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Unexpected Shells with “covertutils”.en.transcribed.srt |
66 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Unexpected Shells with “covertutils”.mp4 |
78.4 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Weaponized RaspberryPi in Red Team Engagements.mp4 |
31.9 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - What the WiFiCactus!!!.en.transcribed.srt |
162 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - What the WiFiCactus!!!.mp4 |
140.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - Wisdom and Life Lessons Learned in the Business of Cyber security.en.transcribed.srt |
46 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - Wisdom and Life Lessons Learned in the Business of Cyber security.mp4 |
66.2 MB |
DefCamp/DefCamp 2017/DefCamp 2017 - You Fail in SE If You Make Those Mistakes.en.transcribed.srt |
67 KB |
DefCamp/DefCamp 2017/DefCamp 2017 - You Fail in SE If You Make Those Mistakes.mp4 |
56.1 MB |
DefCamp/DefCamp 2017/DefCamp 2017 Official Overview.mp4 |
10.2 MB |
DefCamp/DefCamp 2018/Applying Fuzzy Hashing to Phishing Page Identification at DefCamp 2018.en.transcribed.srt |
33 KB |
DefCamp/DefCamp 2018/Applying Fuzzy Hashing to Phishing Page Identification at DefCamp 2018.mp4 |
21.2 MB |
DefCamp/DefCamp 2018/Applying Honey to the Pot - The Saga of Port 5555 at DefCamp 2018.en.transcribed.srt |
29 KB |
DefCamp/DefCamp 2018/Applying Honey to the Pot - The Saga of Port 5555 at DefCamp 2018.mp4 |
25.2 MB |
DefCamp/DefCamp 2018/AutoHotKey Malware - The New AutoIT at DefCamp 2018.en.transcribed.srt |
60 KB |
DefCamp/DefCamp 2018/AutoHotKey Malware - The New AutoIT at DefCamp 2018.mp4 |
106.3 MB |
DefCamp/DefCamp 2018/Awarding Ceremony at DefCamp 2018.en.transcribed.srt |
44 KB |
DefCamp/DefCamp 2018/Awarding Ceremony at DefCamp 2018.mp4 |
63.8 MB |
DefCamp/DefCamp 2018/Back to the future how to respond to threats against ICS environments at DefCamp 2018.mp4 |
176.1 MB |
DefCamp/DefCamp 2018/Backdooring DVR NVR devices at DefCamp 2018.en.transcribed.srt |
76 KB |
DefCamp/DefCamp 2018/Backdooring DVR NVR devices at DefCamp 2018.mp4 |
146.3 MB |
DefCamp/DefCamp 2018/Bridging the gap between CyberSecurity R&D and UX at DefCamp 2018.en.transcribed.srt |
84 KB |
DefCamp/DefCamp 2018/Bridging the gap between CyberSecurity R&D and UX at DefCamp 2018.mp4 |
23.2 MB |
DefCamp/DefCamp 2018/Building application security with 0 money down at DefCamp 2018.en.transcribed.srt |
116 KB |
DefCamp/DefCamp 2018/Building application security with 0 money down at DefCamp 2018.mp4 |
138.8 MB |
DefCamp/DefCamp 2018/Burp-ing through your cryptography shield at DefCamp 2018.en.transcribed.srt |
41 KB |
DefCamp/DefCamp 2018/Burp-ing through your cryptography shield at DefCamp 2018.mp4 |
35 MB |
DefCamp/DefCamp 2018/CPU vulnerabilities - where are we now at DefCamp 2018.en.transcribed.srt |
77 KB |
DefCamp/DefCamp 2018/CPU vulnerabilities - where are we now at DefCamp 2018.mp4 |
87.3 MB |
DefCamp/DefCamp 2018/CPU vulnerabilities, resist future attacks , new tech & future trends in IT Security at DefCamp 2018.en.transcribed.srt |
189 KB |
DefCamp/DefCamp 2018/CPU vulnerabilities, resist future attacks , new tech & future trends in IT Security at DefCamp 2018.mp4 |
126.4 MB |
DefCamp/DefCamp 2018/Catch Me If You Can - Finding APTs in your network at DefCamp 2018.mp4 |
87.7 MB |
DefCamp/DefCamp 2018/Cyber Security Startups from Orange FAB at DefCamp 2018.en.transcribed.srt |
106 KB |
DefCamp/DefCamp 2018/Cyber Security Startups from Orange FAB at DefCamp 2018.mp4 |
108.9 MB |
DefCamp/DefCamp 2018/Drupalgeddon 2 - Yet Another Weapon for the Attacker at DefCamp 2018.en.transcribed.srt |
52 KB |
DefCamp/DefCamp 2018/Drupalgeddon 2 - Yet Another Weapon for the Attacker at DefCamp 2018.mp4 |
39.4 MB |
DefCamp/DefCamp 2018/Economical Denial of Sustainability in the Cloud (EDOS) at DefCamp 2018.en.transcribed.srt |
102 KB |
DefCamp/DefCamp 2018/Economical Denial of Sustainability in the Cloud (EDOS) at DefCamp 2018.mp4 |
92.7 MB |
DefCamp/DefCamp 2018/From Mirai to Monero - One Year's Worth of Honeypot Data at DefCamp 2018.en.transcribed.srt |
86 KB |
DefCamp/DefCamp 2018/From Mirai to Monero - One Year's Worth of Honeypot Data at DefCamp 2018.mp4 |
69.8 MB |
DefCamp/DefCamp 2018/Hacking at the ECSC at DefCamp 2018.en.transcribed.srt |
83 KB |
DefCamp/DefCamp 2018/Hacking at the ECSC at DefCamp 2018.mp4 |
140.1 MB |
DefCamp/DefCamp 2018/How to Fuzz like a Hacker at DefCamp 2018.en.transcribed.srt |
80 KB |
DefCamp/DefCamp 2018/How to Fuzz like a Hacker at DefCamp 2018.mp4 |
74.2 MB |
DefCamp/DefCamp 2018/How to [b]reach vendor's network using EV charging station at DefCamp 2018.en.transcribed.srt |
99 KB |
DefCamp/DefCamp 2018/How to [b]reach vendor's network using EV charging station at DefCamp 2018.mp4 |
90.1 MB |
DefCamp/DefCamp 2018/Implementation of INFOSEC techniques on android based Kiosk ATM remittance machines at DefCamp 2018.en.transcribed.srt |
49 KB |
DefCamp/DefCamp 2018/Implementation of INFOSEC techniques on android based Kiosk ATM remittance machines at DefCamp 2018.mp4 |
62.3 MB |
DefCamp/DefCamp 2018/In search of unique behaviour at DefCamp 2018.en.transcribed.srt |
107 KB |
DefCamp/DefCamp 2018/In search of unique behaviour at DefCamp 2018.mp4 |
129 MB |
DefCamp/DefCamp 2018/Internet Balkanization Why Are We Raising Borders Online at DefCamp 2018.en.transcribed.srt |
121 KB |
DefCamp/DefCamp 2018/Internet Balkanization Why Are We Raising Borders Online at DefCamp 2018.mp4 |
160.5 MB |
DefCamp/DefCamp 2018/Intro to Reversing Malware at DefCamp 2018.en.transcribed.srt |
99 KB |
DefCamp/DefCamp 2018/Intro to Reversing Malware at DefCamp 2018.mp4 |
52.8 MB |
DefCamp/DefCamp 2018/IoT Malware Comprehensive Survey, Analysis Framework and Case Studies at DefCamp 2018.en.transcribed.srt |
138 KB |
DefCamp/DefCamp 2018/IoT Malware Comprehensive Survey, Analysis Framework and Case Studies at DefCamp 2018.mp4 |
201.7 MB |
DefCamp/DefCamp 2018/Lattice based Merkle for post-quantum epoch at DefCamp 2018.en.transcribed.srt |
108 KB |
DefCamp/DefCamp 2018/Lattice based Merkle for post-quantum epoch at DefCamp 2018.mp4 |
71.7 MB |
DefCamp/DefCamp 2018/Mobile signaling threats and vulnerabilities - real cases and statistics at DefCamp 2018.en.transcribed.srt |
101 KB |
DefCamp/DefCamp 2018/Mobile signaling threats and vulnerabilities - real cases and statistics at DefCamp 2018.mp4 |
95.8 MB |
DefCamp/DefCamp 2018/Mobile, IoT, Clouds… It's time to hire your own risk manager! at DefCamp 2018.mp4 |
80.1 MB |
DefCamp/DefCamp 2018/Needles, Haystacks and Algorithms Using Machine Learning to detect complex threats at DefCamp 2018.en.transcribed.srt |
89 KB |
DefCamp/DefCamp 2018/Needles, Haystacks and Algorithms Using Machine Learning to detect complex threats at DefCamp 2018.mp4 |
154 MB |
DefCamp/DefCamp 2018/OSSTMM The “Measure, Don't Guess” Security Testing Methodology at DefCamp 2018.en.transcribed.srt |
112 KB |
DefCamp/DefCamp 2018/OSSTMM The “Measure, Don't Guess” Security Testing Methodology at DefCamp 2018.mp4 |
89.7 MB |
DefCamp/DefCamp 2018/One year after a major attack at DefCamp 2018.mp4 |
81.5 MB |
DefCamp/DefCamp 2018/Opening Speech at DefCamp 2018.mp4 |
80.4 MB |
DefCamp/DefCamp 2018/Privacy Between Hype and Need at DefCamp 2018.en.transcribed.srt |
113 KB |
DefCamp/DefCamp 2018/Privacy Between Hype and Need at DefCamp 2018.mp4 |
54.8 MB |
DefCamp/DefCamp 2018/Remote Yacht Hacking at DefCamp 2018.en.transcribed.srt |
115 KB |
DefCamp/DefCamp 2018/Remote Yacht Hacking at DefCamp 2018.mp4 |
110 MB |
DefCamp/DefCamp 2018/Secure&privacy-preserving data transmission & processing using homomorphic encryption - DefCamp 2018.en.transcribed.srt |
85 KB |
DefCamp/DefCamp 2018/Secure&privacy-preserving data transmission & processing using homomorphic encryption - DefCamp 2018.mp4 |
81.8 MB |
DefCamp/DefCamp 2018/Security pitfalls in script-able infrastructure pipelines at DefCamp 2018.mp4 |
23.7 MB |
DefCamp/DefCamp 2018/Stealing Traffic Analyzing a Mobile Fraud at DefCamp 2018.en.transcribed.srt |
134 KB |
DefCamp/DefCamp 2018/Stealing Traffic Analyzing a Mobile Fraud at DefCamp 2018.mp4 |
150.4 MB |
DefCamp/DefCamp 2018/Tailored, Machine Learning-driven Password Guessing Attacks and Mitigation at DefCamp 2018.en.transcribed.srt |
130 KB |
DefCamp/DefCamp 2018/Tailored, Machine Learning-driven Password Guessing Attacks and Mitigation at DefCamp 2018.mp4 |
79.2 MB |
DefCamp/DefCamp 2018/The Charter of Trust at DefCamp 2018.en.transcribed.srt |
53 KB |
DefCamp/DefCamp 2018/The Charter of Trust at DefCamp 2018.mp4 |
37.3 MB |
DefCamp/DefCamp 2018/The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags at DefCamp 2018.en.transcribed.srt |
103 KB |
DefCamp/DefCamp 2018/The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags at DefCamp 2018.mp4 |
76 MB |
DefCamp/DefCamp 2018/The challenge of building a secure and safe digital environment in healthcare at DefCamp 2018.mp4 |
144.2 MB |
DefCamp/DefCamp 2018/Threat Hunting From Platitudes to Practical Application at DefCamp 2018.en.transcribed.srt |
159 KB |
DefCamp/DefCamp 2018/Threat Hunting From Platitudes to Practical Application at DefCamp 2018.mp4 |
232.9 MB |
DefCamp/DefCamp 2018/Timing attacks against web applications Are they still practical at DefCamp 2018.en.transcribed.srt |
144 KB |
DefCamp/DefCamp 2018/Timing attacks against web applications Are they still practical at DefCamp 2018.mp4 |
64.2 MB |
DefCamp/DefCamp 2018/Tor.onions The Good, The Rotten and The Misconfigured at DefCamp 2018.mp4 |
29.1 MB |
DefCamp/DefCamp 2018/Trust, but verify - Bypassing MFA at DefCamp 2018.mp4 |
76.3 MB |
DefCamp/DefCamp 2018/Weaponizing Neural Networks. In your browser! at DefCamp 2018.en.transcribed.srt |
97 KB |
DefCamp/DefCamp 2018/Weaponizing Neural Networks. In your browser! at DefCamp 2018.mp4 |
74.1 MB |
DefCamp/DefCamp 2018/Well, that escalated quickly! A penetration tester's approach to privilege escalation - DefCamp 2018.en.transcribed.srt |
104 KB |
DefCamp/DefCamp 2018/Well, that escalated quickly! A penetration tester's approach to privilege escalation - DefCamp 2018.mp4 |
105.6 MB |
DefCamp/DefCamp 2018/WiFi practical hacking “Show me the passwords!” at DefCamp 2018.mp4 |
186.2 MB |
DefCamp/DefCamp 2018/Year of the #WiFiCactus at DefCamp 2018.en.transcribed.srt |
109 KB |
DefCamp/DefCamp 2018/Year of the #WiFiCactus at DefCamp 2018.mp4 |
147.7 MB |
DefCamp/DefCamp 2018/You're right, this talk isn't really about you! at DefCamp 2018.en.transcribed.srt |
192 KB |
DefCamp/DefCamp 2018/You're right, this talk isn't really about you! at DefCamp 2018.mp4 |
69.6 MB |
DefCamp/DefCamp 2019/#Spouseware and #Stalkerware Where Do We Go from Here at DefCamp 2019.en.transcribed.srt |
69 KB |
DefCamp/DefCamp 2019/#Spouseware and #Stalkerware Where Do We Go from Here at DefCamp 2019.mp4 |
68.9 MB |
DefCamp/DefCamp 2019/5G Need of a comprehensive Cyber Security Framework at DefCamp 2019.mp4 |
42.5 MB |
DefCamp/DefCamp 2019/A Secure Distributed e-Health System for the Management of Personal Health Metrics Data- DefCamp #10.mp4 |
111.1 MB |
DefCamp/DefCamp 2019/Breaking Smart. Hacking health, wearable and smart apps to prevent leaking at DefCamp 2019.mp4 |
42.5 MB |
DefCamp/DefCamp 2019/CAN BIT- Stomping attack Prevention at DefCamp 2019.mp4 |
63.7 MB |
DefCamp/DefCamp 2019/Can Your Cloud Keep a Secret at DefCamp 2019.mp4 |
136.8 MB |
DefCamp/DefCamp 2019/Challenges in creating challenges at DefCamp 2019.mp4 |
73 MB |
DefCamp/DefCamp 2019/Connected Vehicle Security at DefCamp 2019.mp4 |
72.9 MB |
DefCamp/DefCamp 2019/Consensual Surveillance at DefCamp 2019.en.transcribed.srt |
35 KB |
DefCamp/DefCamp 2019/Consensual Surveillance at DefCamp 2019.mp4 |
69.5 MB |
DefCamp/DefCamp 2019/Cybergames with AMPIRE. NextGen Cyber Warfare and Operations Awareness&Training Polygon - DefCamp#10.en.transcribed.srt |
48 KB |
DefCamp/DefCamp 2019/Cybergames with AMPIRE. NextGen Cyber Warfare and Operations Awareness&Training Polygon - DefCamp#10.mp4 |
68.6 MB |
DefCamp/DefCamp 2019/DefCamp 2019 - Official Overview.mp4 |
6.8 MB |
DefCamp/DefCamp 2019/Emulating Packed Linux Malware Using the Unicorn Emulator Framework at DefCamp 2019.en.transcribed.srt |
53 KB |
DefCamp/DefCamp 2019/Emulating Packed Linux Malware Using the Unicorn Emulator Framework at DefCamp 2019.mp4 |
50.7 MB |
DefCamp/DefCamp 2019/Fuzzing the Stack for Fun and Profit at DefCamp 2019.en.transcribed.srt |
37 KB |
DefCamp/DefCamp 2019/Fuzzing the Stack for Fun and Profit at DefCamp 2019.mp4 |
27.6 MB |
DefCamp/DefCamp 2019/HID (Human Interface Danger) at DefCamp 2019.en.transcribed.srt |
64 KB |
DefCamp/DefCamp 2019/HID (Human Interface Danger) at DefCamp 2019.mp4 |
87 MB |
DefCamp/DefCamp 2019/Hacking ICS devices for Fun at DefCamp 2019.en.transcribed.srt |
53 KB |
DefCamp/DefCamp 2019/Hacking ICS devices for Fun at DefCamp 2019.mp4 |
71 MB |
DefCamp/DefCamp 2019/Hacking The Hacker The Story at DefCamp 2019.en.transcribed.srt |
42 KB |
DefCamp/DefCamp 2019/Hacking The Hacker The Story at DefCamp 2019.mp4 |
77.1 MB |
DefCamp/DefCamp 2019/How come we have not solved security by now at DefCamp 2019.en.transcribed.srt |
46 KB |
DefCamp/DefCamp 2019/How come we have not solved security by now at DefCamp 2019.mp4 |
40.8 MB |
DefCamp/DefCamp 2019/How to exploit Cloud adoption for making your IT more secure&convenient for end users at DefCamp #10.en.transcribed.srt |
78 KB |
DefCamp/DefCamp 2019/How to exploit Cloud adoption for making your IT more secure&convenient for end users at DefCamp #10.mp4 |
129.2 MB |
DefCamp/DefCamp 2019/How to implement a quantum key distribution protocol on IBM's quantum computer at DefCamp 2019.mp4 |
134.7 MB |
DefCamp/DefCamp 2019/I PWN thee, I PWN thee not! at DefCamp 2019.en.transcribed.srt |
99 KB |
DefCamp/DefCamp 2019/I PWN thee, I PWN thee not! at DefCamp 2019.mp4 |
90.6 MB |
DefCamp/DefCamp 2019/Implementing Continuous Offense, to Measure and Monitor Cybersecurity Defenses at DefCamp 2019.en.transcribed.srt |
54 KB |
DefCamp/DefCamp 2019/Implementing Continuous Offense, to Measure and Monitor Cybersecurity Defenses at DefCamp 2019.mp4 |
46.5 MB |
DefCamp/DefCamp 2019/In the Midst of Fire- Lessons Learned from Serious Incidents at DefCamp 2019.en.transcribed.srt |
67 KB |
DefCamp/DefCamp 2019/In the Midst of Fire- Lessons Learned from Serious Incidents at DefCamp 2019.mp4 |
53.8 MB |
DefCamp/DefCamp 2019/Intelligent Threat Intel- 'LEAD' Framework at DefCamp 2019.mp4 |
89.2 MB |
DefCamp/DefCamp 2019/Investigating Windows Graphics Vulnerabilities A Reverse Engineering & Fuzzing Story - DefCamp 2019.en.transcribed.srt |
58 KB |
DefCamp/DefCamp 2019/Investigating Windows Graphics Vulnerabilities A Reverse Engineering & Fuzzing Story - DefCamp 2019.mp4 |
58.3 MB |
DefCamp/DefCamp 2019/LIONS AT THE WATERING HOLE- ONE YEAR AFTER at DefCamp 2019.en.transcribed.srt |
62 KB |
DefCamp/DefCamp 2019/LIONS AT THE WATERING HOLE- ONE YEAR AFTER at DefCamp 2019.mp4 |
103.2 MB |
DefCamp/DefCamp 2019/Live smart, live longer. On modern intelligent cyberweapon at DefCamp 2019.mp4 |
66.7 MB |
DefCamp/DefCamp 2019/Machine Learning and Advanced Analytics in Today's Cyber Security at DefCamp 2019.en.transcribed.srt |
51 KB |
DefCamp/DefCamp 2019/Machine Learning and Advanced Analytics in Today's Cyber Security at DefCamp 2019.mp4 |
51.4 MB |
DefCamp/DefCamp 2019/Messaging Layer Security Towards a New Era of Secure Group Messaging at DefCamp 2019.en.transcribed.srt |
78 KB |
DefCamp/DefCamp 2019/Messaging Layer Security Towards a New Era of Secure Group Messaging at DefCamp 2019.mp4 |
76.7 MB |
DefCamp/DefCamp 2019/More Tales from the Crypt...Analyst at DefCamp 2019.en.transcribed.srt |
119 KB |
DefCamp/DefCamp 2019/More Tales from the Crypt...Analyst at DefCamp 2019.mp4 |
131.8 MB |
DefCamp/DefCamp 2019/Next-Gen IoT Botnets #3- Moar ownage at DefCamp 2019.en.transcribed.srt |
58 KB |
DefCamp/DefCamp 2019/Next-Gen IoT Botnets #3- Moar ownage at DefCamp 2019.mp4 |
55.7 MB |
DefCamp/DefCamp 2019/Opening speech with EMMANUEL CHAUTARD at DefCamp 2019.mp4 |
33.2 MB |
DefCamp/DefCamp 2019/Penetration Testing of Vehicle Components(ECU and FMS) at DefCamp 2019.en.transcribed.srt |
49 KB |
DefCamp/DefCamp 2019/Penetration Testing of Vehicle Components(ECU and FMS) at DefCamp 2019.mp4 |
75.4 MB |
DefCamp/DefCamp 2019/Pentesting on Steroids- How to perform faster and better pentest engagements at DefCamp 2019.en.transcribed.srt |
39 KB |
DefCamp/DefCamp 2019/Pentesting on Steroids- How to perform faster and better pentest engagements at DefCamp 2019.mp4 |
54.3 MB |
DefCamp/DefCamp 2019/Post quantum digital signature with OQRNG (optical quantum random number generator) at DefCamp 2019.en.transcribed.srt |
53 KB |
DefCamp/DefCamp 2019/Post quantum digital signature with OQRNG (optical quantum random number generator) at DefCamp 2019.mp4 |
104.9 MB |
DefCamp/DefCamp 2019/Privacy in the healthcare The good, the bad and the ugly at DefCamp 2019.mp4 |
53.6 MB |
DefCamp/DefCamp 2019/Project SCOUT. Deep Learning for malicious code detection at DefCamp 2019.en.transcribed.srt |
60 KB |
DefCamp/DefCamp 2019/Project SCOUT. Deep Learning for malicious code detection at DefCamp 2019.mp4 |
65 MB |
DefCamp/DefCamp 2019/Raise Ya False Flags A history about pirates and APTs at DefCamp 2019.en.transcribed.srt |
76 KB |
DefCamp/DefCamp 2019/Raise Ya False Flags A history about pirates and APTs at DefCamp 2019.mp4 |
105.7 MB |
DefCamp/DefCamp 2019/Red Team Engagements and The Forgotten Risk of Mobile Devices at DefCamp 2019.en.transcribed.srt |
95 KB |
DefCamp/DefCamp 2019/Red Team Engagements and The Forgotten Risk of Mobile Devices at DefCamp 2019.mp4 |
93 MB |
DefCamp/DefCamp 2019/Rotten to the core Android worms in the wild at DefCamp 2019.en.transcribed.srt |
44 KB |
DefCamp/DefCamp 2019/Rotten to the core Android worms in the wild at DefCamp 2019.mp4 |
54.9 MB |
DefCamp/DefCamp 2019/Secure them all-From Silicon to the Cloud at DefCamp 2019.en.transcribed.srt |
79 KB |
DefCamp/DefCamp 2019/Secure them all-From Silicon to the Cloud at DefCamp 2019.mp4 |
120.4 MB |
DefCamp/DefCamp 2019/Securing DevOps Common misconceptions at DefCamp 2019.en.transcribed.srt |
81 KB |
DefCamp/DefCamp 2019/Securing DevOps Common misconceptions at DefCamp 2019.mp4 |
98.5 MB |
DefCamp/DefCamp 2019/Security meets the world of gaming at DefCamp 2019.en.transcribed.srt |
54 KB |
DefCamp/DefCamp 2019/Security meets the world of gaming at DefCamp 2019.mp4 |
64.4 MB |
DefCamp/DefCamp 2019/Security& Compliance in the Cloud at DefCamp 2019.en.transcribed.srt |
92 KB |
DefCamp/DefCamp 2019/Security& Compliance in the Cloud at DefCamp 2019.mp4 |
143.5 MB |
DefCamp/DefCamp 2019/Simjacker- billion dollar mobile security vs. one tiny piece of plastic at DefCamp 2019.en.transcribed.srt |
40 KB |
DefCamp/DefCamp 2019/Simjacker- billion dollar mobile security vs. one tiny piece of plastic at DefCamp 2019.mp4 |
51.5 MB |
DefCamp/DefCamp 2019/Story of the new Android banking Trojan-Cerberus at DefCamp 2019.en.transcribed.srt |
39 KB |
DefCamp/DefCamp 2019/Story of the new Android banking Trojan-Cerberus at DefCamp 2019.mp4 |
56.3 MB |
DefCamp/DefCamp 2019/The Advanced Threats Evolution Researchers Arm Race at DefCamp 2019.en.transcribed.srt |
78 KB |
DefCamp/DefCamp 2019/The Advanced Threats Evolution Researchers Arm Race at DefCamp 2019.mp4 |
110.8 MB |
DefCamp/DefCamp 2019/The Decalogue(ish) of Contractual Security Sins at DefCamp 2019.en.transcribed.srt |
74 KB |
DefCamp/DefCamp 2019/The Decalogue(ish) of Contractual Security Sins at DefCamp 2019.mp4 |
103.1 MB |
DefCamp/DefCamp 2019/The Road to Hell is Paved with Bad Passwords at DefCamp 2019.en.transcribed.srt |
65 KB |
DefCamp/DefCamp 2019/The Road to Hell is Paved with Bad Passwords at DefCamp 2019.mp4 |
34.7 MB |
DefCamp/DefCamp 2019/The U.S. Election System, Can we fix it YES WE CAN! at DefCamp 2019.en.transcribed.srt |
47 KB |
DefCamp/DefCamp 2019/The U.S. Election System, Can we fix it YES WE CAN! at DefCamp 2019.mp4 |
48.1 MB |
DefCamp/DefCamp 2019/Threat Intelligence- Common Mistakes & Stories Form The Field at DefCamp 2019.en.transcribed.srt |
72 KB |
DefCamp/DefCamp 2019/Threat Intelligence- Common Mistakes & Stories Form The Field at DefCamp 2019.mp4 |
84.8 MB |
DefCamp/DefCamp 2019/Under Pressure Real world damage with TPMS spoofing at DefCamp 2019.en.transcribed.srt |
80 KB |
DefCamp/DefCamp 2019/Under Pressure Real world damage with TPMS spoofing at DefCamp 2019.mp4 |
101.6 MB |
DefCamp/DefCamp 2019/Why usual pentests suck at DefCamp 2019.en.transcribed.srt |
26 KB |
DefCamp/DefCamp 2019/Why usual pentests suck at DefCamp 2019.mp4 |
30.8 MB |
DefCamp/DefCamp 2019/Windows Based Exploit Chains and Their Detection Mechanism at DefCamp 2019.en.transcribed.srt |
32 KB |
DefCamp/DefCamp 2019/Windows Based Exploit Chains and Their Detection Mechanism at DefCamp 2019.mp4 |
36.9 MB |
DefCamp/DefCamp logo.jpg |
23 KB |
DefCamp/DefCamp thank you.txt |
955 B |