BITCQ

Security BSides

Size: 164.3 GB
Magnet link

Name Size
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/Security BSides Amsterdam 2017 (closing remarks).en.transcribed.srt 5 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/Security BSides Amsterdam 2017 (closing remarks).mp4 4.9 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/Security BSides Amsterdam 2017 (opening).en.transcribed.srt 14 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/Security BSides Amsterdam 2017 (opening).mp4 9.9 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T1 - What if we really assumed breach, Kevin Jonkers (@gillroy).en.transcribed.srt 81 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T1 - What if we really assumed breach, Kevin Jonkers (@gillroy).mp4 60.3 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T10 - I Boot when U-Boot, Bernardo Maia Rodrigues (@bernardomr) & Vincent Ruijter (@_evict).en.transcribed.srt 83 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T10 - I Boot when U-Boot, Bernardo Maia Rodrigues (@bernardomr) & Vincent Ruijter (@_evict).mp4 61.4 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T11 - Automating security with PowerShell, Jaap Brasser (@Jaap_Brasser).en.transcribed.srt 58 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T11 - Automating security with PowerShell, Jaap Brasser (@Jaap_Brasser).mp4 49 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T12 - Behavioral Analysis using DNS, Network Traffic and Logs, Josh Pyorre (@joshpyorre).en.transcribed.srt 92 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T12 - Behavioral Analysis using DNS, Network Traffic and Logs, Josh Pyorre (@joshpyorre).mp4 64.3 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T2 - Requiem For An Admin, Walter Legowski (@SadProcessor).en.transcribed.srt 67 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T2 - Requiem For An Admin, Walter Legowski (@SadProcessor).mp4 59.9 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T3 - Demystifying the Ransomware and IoT Threat, Christopher Elisan (@Tophs).en.transcribed.srt 83 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T3 - Demystifying the Ransomware and IoT Threat, Christopher Elisan (@Tophs).mp4 65.2 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T4 - To click or not to click, or how to build awareness..., Jelena Milosevic (@_j3lena_).mp4 28.5 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T5 - To pin or not to pin SSL pinning for Android & iOS, Jeroen Willemsen (@commjoenie).en.transcribed.srt 68 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T5 - To pin or not to pin SSL pinning for Android & iOS, Jeroen Willemsen (@commjoenie).mp4 43.2 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T6 - V!4GR4 Cyber-Crime, Enlarged, Ben Herzberg (@KernelXSS).en.transcribed.srt 54 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T6 - V!4GR4 Cyber-Crime, Enlarged, Ben Herzberg (@KernelXSS).mp4 46.8 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T7 - I Thought I Saw a HAXOR, Thomas V. Fischer (@fvt).en.transcribed.srt 57 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T7 - I Thought I Saw a HAXOR, Thomas V. Fischer (@fvt).mp4 40.9 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T8 - Bots Combine! Behind the Modern Botnet, Andrea Scarfo (@AScarf0).en.transcribed.srt 35 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T8 - Bots Combine! Behind the Modern Botnet, Andrea Scarfo (@AScarf0).mp4 40.8 MB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T9 - The hidden horrors that 3 years of global red-teaming, Jos van der Peet (@Voske1985).en.transcribed.srt 49 KB
Security BSides/BSides Amsterdam/BSides Amsterdam 2017/T9 - The hidden horrors that 3 years of global red-teaming, Jos van der Peet (@Voske1985).mp4 34.7 MB
Security BSides/BSides Amsterdam/BSides Amsterdam Logo.jpg 53 KB
Security BSides/BSides Asheville/BSides Asheville Logo.jpg 16 KB
Security BSides/BSides Athens/BSides Athens 2016/Security BSides Athens 2016 (Video Screen Loop).mp4 1.8 MB
Security BSides/BSides Athens/BSides Athens 2016/Security BSides Athens 2016 (closing remarks).mp4 4.6 MB
Security BSides/BSides Athens/BSides Athens 2016/Security BSides Athens 2016 (welcome).mp4 7.4 MB
Security BSides/BSides Athens/BSides Athens 2016/T1 01 Welcome to Security BSides Athens 2016.en.transcribed.srt 12 KB
Security BSides/BSides Athens/BSides Athens 2016/T1 01 Welcome to Security BSides Athens 2016.mp4 29.8 MB
Security BSides/BSides Athens/BSides Athens 2016/T1 02 Keynote - The future of CyberSecurity - Colonel Myron Koutsias.mp4 34.8 MB
Security BSides/BSides Athens/BSides Athens 2016/T1 03 OWASP ASVS - Panagiotis Yialouris.en.transcribed.srt 46 KB
Security BSides/BSides Athens/BSides Athens 2016/T1 03 OWASP ASVS - Panagiotis Yialouris.mp4 141.8 MB
Security BSides/BSides Athens/BSides Athens 2016/T1 04 State of Mobile Applications Security - Vasilis Maritsas, Dimitris Bougioukas.mp4 83.5 MB
Security BSides/BSides Athens/BSides Athens 2016/T1 05 Temet Nosce - Thomas V. Fischer.en.transcribed.srt 65 KB
Security BSides/BSides Athens/BSides Athens 2016/T1 05 Temet Nosce - Thomas V. Fischer.mp4 111 MB
Security BSides/BSides Athens/BSides Athens 2016/T1 06 Perform injection attackt - Anastasios Stasinopoulos.en.transcribed.srt 30 KB
Security BSides/BSides Athens/BSides Athens 2016/T1 06 Perform injection attackt - Anastasios Stasinopoulos.mp4 70.8 MB
Security BSides/BSides Athens/BSides Athens 2016/T1 07 Fir3Ey3 Mail Scanner - Xavier Mertens.en.transcribed.srt 50 KB
Security BSides/BSides Athens/BSides Athens 2016/T1 07 Fir3Ey3 Mail Scanner - Xavier Mertens.mp4 73.4 MB
Security BSides/BSides Athens/BSides Athens 2016/T1 08 WarBerry - Yiannis Ioannides.mp4 72.9 MB
Security BSides/BSides Athens/BSides Athens 2016/T1 09 Information security upgrade - Leonidas Tertipis.mp4 91.4 MB
Security BSides/BSides Athens/BSides Athens 2016/T1 10 Security BSides Athens 2016 - Closing Remarks.en.transcribed.srt 17 KB
Security BSides/BSides Athens/BSides Athens 2016/T1 10 Security BSides Athens 2016 - Closing Remarks.mp4 52.2 MB
Security BSides/BSides Athens/BSides Athens 2016/T2 03 Automating cryptanalysis of HTTPS - Dionysis, Dimitris, Eva.en.transcribed.srt 46 KB
Security BSides/BSides Athens/BSides Athens 2016/T2 03 Automating cryptanalysis of HTTPS - Dionysis, Dimitris, Eva.mp4 83.4 MB
Security BSides/BSides Athens/BSides Athens 2016/T2 04 Evil Twin with Wifiphisher - George Chatzisofroniou.en.transcribed.srt 58 KB
Security BSides/BSides Athens/BSides Athens 2016/T2 04 Evil Twin with Wifiphisher - George Chatzisofroniou.mp4 93.4 MB
Security BSides/BSides Athens/BSides Athens 2016/T2 05 Building Malicious Hardware - Steve Lord.en.transcribed.srt 65 KB
Security BSides/BSides Athens/BSides Athens 2016/T2 05 Building Malicious Hardware - Steve Lord.mp4 127.4 MB
Security BSides/BSides Athens/BSides Athens 2016/T2 06 TOR I2P traffic - Ben Herzberg.mp4 126.8 MB
Security BSides/BSides Athens/BSides Athens 2016/T2 07 Malware Analysis Environments - Alexandros Zacharis.mp4 119.9 MB
Security BSides/BSides Athens/BSides Athens 2016/T2 08 Poodles drown no more - Martijn Grooten.en.transcribed.srt 46 KB
Security BSides/BSides Athens/BSides Athens 2016/T2 08 Poodles drown no more - Martijn Grooten.mp4 95.5 MB
Security BSides/BSides Athens/BSides Athens 2016/T2 09a Cyber-extortion against companies - Germanos Georgios, Papathanasiou Anastasios.en.transcribed.srt 34 KB
Security BSides/BSides Athens/BSides Athens 2016/T2 09a Cyber-extortion against companies - Germanos Georgios, Papathanasiou Anastasios.mp4 20.2 MB
Security BSides/BSides Athens/BSides Athens 2016/T2 09b One Fish, Two Fish, Red Phish, Blue Fish - Kaitlyn Garratley.en.transcribed.srt 49 KB
Security BSides/BSides Athens/BSides Athens 2016/T2 09b One Fish, Two Fish, Red Phish, Blue Fish - Kaitlyn Garratley.mp4 16.5 MB
Security BSides/BSides Athens/BSides Athens 2017/Security BSides Athens (Logo Teaser).mp4 460 KB
Security BSides/BSides Athens/BSides Athens 2017/T1 01 Welcome, by Dr. Grigorios Fragkos (@drgfragkos).mp4 46.4 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 02 The Smile of the Child , by Dr. Stefanos Alevizos (Guest Speaker).mp4 23.6 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 03 [Keynote] The Unbearable Lightness of Failure, by Dave Lewis (@gattaca).mp4 162.5 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 04 Operation Grand Mars, defending against Carbanak, Thanassis Diogos.mp4 146.9 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 05 Security in Continuous Integration and Continuous Development, Yiannis Koukouras (@twelvesec).mp4 57.1 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 06 The Role of Professionalism & Standards in Penetration Testing, Prof. A.Blyth (@ajcblyth).mp4 184.1 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 07 Detecting and Deceiving the Unknown with Illicium, Andreas Ntakas - Emmanouil Gavriil.mp4 113.6 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 08 I Thought I Saw a - 4x0.-, Thomas V. Fischer (@fvt).mp4 145 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 09 NO DRONE ZONE, Christina Skouloudi (@miss_narbi) & Alexandros Zacharis.mp4 113.3 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 10 Car hacking - a real security threat or a media hype, Anna Stylianou.mp4 110 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 11 Unity Makes Strength, Xavier Mertens (@xme).mp4 166.8 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 12 A Shortcut to Red Teaming, Theo Papadopoulos.mp4 99.7 MB
Security BSides/BSides Athens/BSides Athens 2017/T1 13 Closing Remarks.mp4 5.7 MB
Security BSides/BSides Athens/BSides Athens 2017/T2 04 Don't Ignore GDPR, it impacts is wider than InfoSec, Thomas V. Fischer (@fvt).mp4 160.2 MB
Security BSides/BSides Athens/BSides Athens 2017/T2 05 Machine Learning and Images for Malware Detection and Classification, Konstantinos Kosmidis.mp4 71.9 MB
Security BSides/BSides Athens/BSides Athens 2017/T2 06 Intercepting sensitive data in smartphone app network connections, Eirini Anthi.mp4 90.8 MB
Security BSides/BSides Athens/BSides Athens 2017/T2 07 “The Browser Within”, Local exploitation of internal browsers in software, Alexandros Zacharis.mp4 139.8 MB
Security BSides/BSides Athens/BSides Athens 2017/T2 08 Detect the Undetectable with Sysmon and PowerShell Logs, Dimitrios Margaritis (@dmargaritis).mp4 159 MB
Security BSides/BSides Athens/BSides Athens 2017/T2 09 LightBulb Framework Shedding Light on the Dark Side of WAFs and Filters, Ioannis Stais.mp4 136.8 MB
Security BSides/BSides Athens/BSides Athens 2017/T2 10 Attacking IPv6 - MitM IPv6 patch for Bettercap, D.Grigoriou & D.Karakostas (@dimitKarakostas).mp4 116.1 MB
Security BSides/BSides Athens/BSides Athens Logo.jpg 26 KB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Buy the Dip by John Foster.en.transcribed.srt 119 KB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Buy the Dip by John Foster.mp4 80.5 MB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Hacking 802.15.4 - Thermostats, Security, and More by Ryan Speers.en.transcribed.srt 97 KB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Hacking 802.15.4 - Thermostats, Security, and More by Ryan Speers.mp4 79.8 MB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Malware Infection, Visualized. by Xavier Ashe.en.transcribed.srt 32 KB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Malware Infection, Visualized. by Xavier Ashe.mp4 21.3 MB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Online No One Knows You're Dead by Andrew Kalat.en.transcribed.srt 91 KB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Online No One Knows You're Dead by Andrew Kalat.mp4 70 MB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Operationalizing Threat Intelligence by Willard Dawson.en.transcribed.srt 129 KB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Operationalizing Threat Intelligence by Willard Dawson.mp4 109.9 MB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 The Art of Speaking With Muggles by Martin Fisher.en.transcribed.srt 49 KB
Security BSides/BSides Atlanta/BSides ATL 2015/BSidesATL 2015 The Art of Speaking With Muggles by Martin Fisher.mp4 69.7 MB
Security BSides/BSides Augusta/BSides Agusta Logo.jpg 80 KB
Security BSides/BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Brad Shoop & Chris Rimondi - Eyeing the Onion.mp4 170.8 MB
Security BSides/BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Christopher Campbell and Matthew Graeber - Living Off the Land.mp4 110.3 MB
Security BSides/BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 David Bianco - Enterprise Security Monitoring.mp4 183.6 MB
Security BSides/BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 David Coursey - Sheep and Sheepdogs Employing EMET for Application Security.mp4 125.7 MB
Security BSides/BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Doug Burks - Security Onion Peeling Back the Layers of Your Network in Minutes.mp4 208.9 MB
Security BSides/BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Martin Holste - Not BigData, AnyData.mp4 146.4 MB
Security BSides/BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Mike Jones - Unconventional Methodologies to consider in Information Security.mp4 70 MB
Security BSides/BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Paul Coggin - Digital Energy BPT (Basic Persistent Threat).mp4 78.2 MB
Security BSides/BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Richard Bejtlich Keynote.mp4 189.1 MB
Security BSides/BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Ron Martin - Human Shields for your Network.mp4 82.8 MB
Security BSides/BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Tim Tomes - Look Ma, No Exploits! - The Recon-ng Framework.mp4 100.8 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Chris Campbell - Using Microsofts Incident Response Language.mp4 148.8 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Chris Sanders - Defeating Cognitive Bias and Developing Analytic Technique.mp4 134.5 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Chris Sistrunk - ICS SCADA Defense.mp4 147.4 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Chris Truncer - Pentester++.mp4 132.1 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 David Dewey - App Wrapping What does that even mean.mp4 52.8 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Jacob Williams - Spying on your employees using memory.mp4 128.1 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Jeff Murri - Is that hardware in your toolkit, or are you just.mp4 164.7 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Mark Baggett - Crazy Sexy Hacking Outro.mp4 128.1 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Mark Baggett Welcome to BSidesAugusta.mp4 30.1 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Mike Reeves - Scaling Security Onion to the Enterprise.mp4 140.1 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Tim Crothers - Techniques for Fast Windows Investigations.mp4 116.9 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Tim Fowler - When Zombies take to the Airwaves.mp4 141.7 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Tim Tomes - The Adobe Guide to Keyless Decryption.mp4 126.5 MB
Security BSides/BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Will Schroeder - Adventures in Asymmetric Warfare.mp4 74.8 MB
Security BSides/BSides Augusta/BSides Augusta 2015/00-Welcome-Major-General-Fogarty.mp4 73.3 MB
Security BSides/BSides Augusta/BSides Augusta 2015/01-Keynote-Ed-Skoudis.mp4 66.9 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT100-Fundamental-Understanding-of-Baseline-Analysis-and-Remediation-for-Industrial-Control-Systems-Juli-Joyner-and-Jeffrey-Medsger.mp4 78.4 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT101-Taking-a-Distributed-Computing-Approach-to-Network-Detection-with-Bro-and-aThe-Clouda-Mike-Reeves.mp4 213.2 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT102-A-A-Scouts-Perspective-on-Network-Defense-Justin-Edgar.mp4 176.9 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT103-Doomsday-Preppers-APT-Edition-Tanner-Payne.mp4 32.5 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT104-Building-a-Better-Security-Analyst-Using-Cognitive-Psychology-Chris-Sanders.mp4 38.7 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT105-Viper-Framework-for-Malware-Analysis-Paul-Melson.mp4 31.8 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT106-Infiltrating-C2-Infrastructure-Tim-Crothers.mp4 104.3 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT107-Building-aMuscle-Memory-with-Rekall-Memory-Forensic-Framework-Alissa-Torres.mp4 74.1 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT108-The-Blue-Team-Starter-Kit-Timothy-De-Block.mp4 54.4 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT200-Go-Hack-Yourself-Jason-Frank.mp4 63.2 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT201-2015-Its-not-over-yet-Joel-Esler.mp4 107.6 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT202-How-to-Get-Into-ICS-Security-Chris-Sistrunk.mp4 72.1 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT203-Destruction-as-a-Service-Security-Through-Reanimation-Jon-Medina.mp4 59 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT204-The-Programmatic-Evolution-of-Technology-Defense-Roland-Cloutier.mp4 63.6 MB
Security BSides/BSides Augusta/BSides Augusta 2015/BT205-Lessons-Learned-from-Analyzing-Terabytes-of-Malware-Wes-Widner.mp4 56.3 MB
Security BSides/BSides Augusta/BSides Augusta 2015/RT100-Using-a-HackRF-One-to-Infiltrate-the-Digital-Thetford-Wall-Patrick-Perry.mp4 57.2 MB
Security BSides/BSides Augusta/BSides Augusta 2015/RT101-Malvertizing-Like-a-Pro-Alex-Rymdeko-Harvey.mp4 63.4 MB
Security BSides/BSides Augusta/BSides Augusta 2015/RT102-Weaponizing-our-youth-The-Case-for-Integrated-Cyber-Ethics-Josh-Rykowski.mp4 46.1 MB
Security BSides/BSides Augusta/BSides Augusta 2015/RT103-Making-Everything-Old-New-Again-Andrew-Cole-and-Rich-Moulton.mp4 304.7 MB
Security BSides/BSides Augusta/BSides Augusta 2015/RT104-DIY-Vulnerability-Discovery-with-DLL-Side-Loading-Jake-Williams.mp4 69.2 MB
Security BSides/BSides Augusta/BSides Augusta 2015/RT105-Recon-ng-and-Beyond-Tim-Tomes.mp4 85.3 MB
Security BSides/BSides Augusta/BSides Augusta 2015/RT106-Attacking-OWASP-Exploiting-the-Top-10-David-Coursey.mp4 62.4 MB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You00 Using Honeypots for Network Security Monitoring Chris Sanders.mp4 70.1 MB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You01 This one weird trick will secure your web server David Coursey.mp4 25 MB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You01 This one weird trick will secure your web server David Coursey.srt 22 KB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You02 This is not your Mommas Threat Intelligence Rob Gresham.mp4 29.3 MB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You02 This is not your Mommas Threat Intelligence Rob Gresham.srt 22 KB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You03 Moving Target Defense Evasive Maneuvers in Cyberspace Adam Duby.mp4 28.8 MB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You03 Moving Target Defense Evasive Maneuvers in Cyberspace Adam Duby.srt 30 KB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You04 Beyond Math Practical Security Analytics Martin Holste.mp4 50.3 MB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You04 Beyond Math Practical Security Analytics Martin Holste.srt 55 KB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You05 Exploit Kits and Indicators of Compromise Brad Duncan.mp4 64 MB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You05 Exploit Kits and Indicators of Compromise Brad Duncan.srt 49 KB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You06 ICS SCADA Threat Hunting Robert M Lee Jon Lavender.mp4 66.4 MB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You06 ICS SCADA Threat Hunting Robert M Lee Jon Lavender.srt 87 KB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You07 Agilely Compliant yet Insecure Tom Ruff.mp4 42.7 MB
Security BSides/BSides Augusta/BSides Augusta 2016/I Got You07 Agilely Compliant yet Insecure Tom Ruff.srt 41 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here00 Gamification for the Win Josh Rykowski and Scott Hamilton.mp4 69.8 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here01 IDSIPS Choices Benefits Drawback and Configurations ForgottenSec.mp4 36.8 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here01 IDSIPS Choices Benefits Drawback and Configurations ForgottenSec.srt 32 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here02 Micro segmentation and Security The Way Forward Jack Koons.mp4 43.1 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here02 Micro segmentation and Security The Way Forward Jack Koons.srt 29 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here03 Adventures in RAT dev Hunter Hardman.mp4 25.7 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here03 Adventures in RAT dev Hunter Hardman.srt 26 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here04 Linux privilege escalation for fun profit and all around mischief Jake Willi.mp4 70.4 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here04 Linux privilege escalation for fun profit and all around mischief Jake Willi.srt 60 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here05 How About a Piece of Pi Experiences with Robots and Raspberry Pi Hacking Joh.mp4 51.2 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here05 How About a Piece of Pi Experiences with Robots and Raspberry Pi Hacking Joh.srt 50 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here06 Flaying out the Blockchain Ledger for Fun Profit and Hip Hop Andrew Morris.mp4 58.6 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here06 Flaying out the Blockchain Ledger for Fun Profit and Hip Hop Andrew Morris.srt 72 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here07 Network Situational Awareness with Flow Data Jason Smith.mp4 73.3 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Its Too Funky In Here07 Network Situational Awareness with Flow Data Jason Smith.srt 74 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Keynote Rob Joyce.mp4 62.1 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Keynote Rob Joyce.srt 46 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America00 A worm in the Apple examining OSX malware Wes Widner.mp4 68.6 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America00 A worm in the Apple examining OSX malware Wes Widner.srt 53 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America01 You TOO can defend against MILLIONS of cyber attacks Michael Banks.mp4 42.8 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America01 You TOO can defend against MILLIONS of cyber attacks Michael Banks.srt 29 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America02 Finding Evil in DNS Traffic Keelyn Roberts.mp4 23.4 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America02 Finding Evil in DNS Traffic Keelyn Roberts.srt 23 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America03 Ransomware Threats to the Healthcare Industry Tim Gurganis.mp4 37.6 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America03 Ransomware Threats to the Healthcare Industry Tim Gurganis.srt 35 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America04 Using Ransomware Against Itself Tim Crothers and Ryan Borres.mp4 64.1 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America04 Using Ransomware Against Itself Tim Crothers and Ryan Borres.srt 50 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America05 Hunting Defense Against The Dark Arts Jacqueline Stokes Danny Akacki and Stephen.mp4 71.3 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America05 Hunting Defense Against The Dark Arts Jacqueline Stokes Danny Akacki and Stephen.srt 71 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America06 Automating Malware Analysis for Threat Intelligence Paul Melson.mp4 74.4 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America06 Automating Malware Analysis for Threat Intelligence Paul Melson.srt 51 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America07 Hide and Seek with EMET Jonathan Creekmore and Michael Edie.mp4 85.8 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Living In America07 Hide and Seek with EMET Jonathan Creekmore and Michael Edie.srt 57 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad00 Mobile Hacking Aaron Guzman.mp4 73.8 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad00 Mobile Hacking Aaron Guzman.srt 64 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad01 Incident Response Awakens Tom Webb.mp4 38.4 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad01 Incident Response Awakens Tom Webb.srt 30 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad02 Dr Pentester or How I Learned To Stop Worrying and Love the Blue Team Ryan OHoro.mp4 52.8 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad02 Dr Pentester or How I Learned To Stop Worrying and Love the Blue Team Ryan OHoro.srt 33 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad03 Exploit Kits Machine Learning Patrick Perry.mp4 38.1 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad03 Exploit Kits Machine Learning Patrick Perry.srt 33 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad04 Detection of malicious capabilities using YARA Brian Bell.mp4 29.3 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad04 Detection of malicious capabilities using YARA Brian Bell.srt 14 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad05 Owning MS Outlook with Powershell Andrew Cole.mp4 63 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad05 Owning MS Outlook with Powershell Andrew Cole.srt 62 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad06 RAT Reusing Adversary Tradecraft Alexander Rymdeko Harvey.mp4 89.2 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad06 RAT Reusing Adversary Tradecraft Alexander Rymdeko Harvey.srt 72 KB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad07 Internet of Terrible Brandon McCrillis.mp4 74.1 MB
Security BSides/BSides Augusta/BSides Augusta 2016/Super Bad07 Internet of Terrible Brandon McCrillis.srt 52 KB
Security BSides/BSides Bordeaux/BSides Bordeaux logo.jpg 32 KB
Security BSides/BSides Boston/BSides Boston Logo.jpg 26 KB
Security BSides/BSides Boston/Boston BSides 2013/Alissa Torres Security BSides Boston 2013 - Sick Anti-Analysis Mechanisms From The Wild.mp4 128.3 MB
Security BSides/BSides Boston/Boston BSides 2013/Allison Nixon Brandon Levene Security BSides Boston 2013 - The Noob Persistent Threat.mp4 168.4 MB
Security BSides/BSides Boston/Boston BSides 2013/Andrew Clare Security BSides Boston 2013 - The Future Of Drones and the Impact On Infosec.mp4 173.2 MB
Security BSides/BSides Boston/Boston BSides 2013/Ben April Security BSides Boston 2013 - NFC I Don t Think It Means What You Think It Means.mp4 168.2 MB
Security BSides/BSides Boston/Boston BSides 2013/CJ Heres Security BSides Boston 2013 - Google TV The Next Generation.mp4 175.5 MB
Security BSides/BSides Boston/Boston BSides 2013/Closing Remarks Security BSides Boston 2013 - Closing and Ending.mp4 29.4 MB
Security BSides/BSides Boston/Boston BSides 2013/Dan Geer Security BSides Boston 2013 - Identity As Privacy.mp4 267.9 MB
Security BSides/BSides Boston/Boston BSides 2013/Dan Stolts Security BSides Boston 2013 - Cloudy Weather How Secure Is The Cloud.mp4 150 MB
Security BSides/BSides Boston/Boston BSides 2013/David Bressler Security BSides Boston 2013 - Maltego In The Enterprise.mp4 122.1 MB
Security BSides/BSides Boston/Boston BSides 2013/David Dumas Security BSides Boston 2013 - Security 101 For New Security Professionals.mp4 179.6 MB
Security BSides/BSides Boston/Boston BSides 2013/Deral Heiland Security BSides Boston 2013 - Plunder, Pillage and Print.mp4 186.9 MB
Security BSides/BSides Boston/Boston BSides 2013/Jeff Northrop Security BSides Boston 2013 - The State Of Privacy & Proper Planning For The Future.mp4 168.9 MB
Security BSides/BSides Boston/Boston BSides 2013/Joseph Cohen Security BSides Boston 2013 - Bluecat Netcat For Bluetooth.mp4 60.8 MB
Security BSides/BSides Boston/Boston BSides 2013/Josh Corman Security BSides Boston 2013 - Good Enough Isn t Anymore The Value of Hitting Rock Bottom.mp4 224.2 MB
Security BSides/BSides Boston/Boston BSides 2013/Keith Gilbert Security BSides Boston 2013 - Malformity.mp4 138 MB
Security BSides/BSides Boston/Boston BSides 2013/Macy Cronkite Security BSides Boston 2013 - Splunk.mp4 61.1 MB
Security BSides/BSides Boston/Boston BSides 2013/Oliver Day Security BSides Boston 2013 - Securing Change Call For Volunteers.mp4 90.7 MB
Security BSides/BSides Boston/Boston BSides 2013/Paul Braren Security BSides Boston 2013 - Build Your Own VMWare ESXi & Microsoft Hyper V-Lab At Home.mp4 155.9 MB
Security BSides/BSides Boston/Boston BSides 2013/Roy Wattanasin Security BSides Boston 2013 - Opening Remarks.mp4 7 MB
Security BSides/BSides Boston/Boston BSides 2013/Schuyler Towne Security BSides Boston 2013 - Unlucky In Locks.mp4 162 MB
Security BSides/BSides Boston/Boston BSides 2013/Walt Williams Security BSides Boston 2013 - Realistic Affordable & Quantitative Risk Management.mp4 153.8 MB
Security BSides/BSides Boston/Boston BSides 2014/Abusing Mobile Games Ming Chow Security BSides Boston 2014.mp4 138.2 MB
Security BSides/BSides Boston/Boston BSides 2014/Auditing all the things for smarter detection faster incident response Mark Thomas BSides Boston 14.mp4 88.2 MB
Security BSides/BSides Boston/Boston BSides 2014/Doomed to repeat, InfoSec s failure to learn from the past Jack Daniel Security BSides Boston 2014.mp4 229.4 MB
Security BSides/BSides Boston/Boston BSides 2014/Information Security Careers & Education Panel Security BSides Boston 2014.mp4 221.6 MB
Security BSides/BSides Boston/Boston BSides 2014/Next Generation Red Teaming Robert Wood Security BSides Boston 2014.mp4 184.7 MB
Security BSides/BSides Boston/Boston BSides 2014/Offensive Mobile Forensics Joey Peloquin Security BSides Boston 2014.mp4 159.8 MB
Security BSides/BSides Boston/Boston BSides 2014/Pwninstaller 1.0 Will Shroeder Security BSides Boston 2014.mp4 90.3 MB
Security BSides/BSides Boston/Boston BSides 2014/Target, Snowden, Heartbleed ... Oh my! Keynote by Rob Cheyne Security BSides Boston 2014.mp4 228.3 MB
Security BSides/BSides Boston/Boston BSides 2014/The Challenge of Natural Security Systems Rockie Brockway Security BSides Boston 2014.mp4 156.9 MB
Security BSides/BSides Boston/Boston BSides 2014/Using Hackers Own Methods & Tools to Defeat Persistent Adversaries Michael Davis BSides Boston 2014.mp4 178 MB
Security BSides/BSides Boston/Boston BSides 2014/Why You Should Give Up Online Social Networks Jason Ding Security BSides Boston 2014.mp4 166.6 MB
Security BSides/BSides Boston/Boston BSides 2015/100-Is-Threat-Modeling-for-Me-Robert-Hurlbut.mp4 69.8 MB
Security BSides/BSides Boston/Boston BSides 2015/101-Hacker-or-criminal-Repairing-the-reputation-of-the-infosec-community-Melanie-Ensign.mp4 66.7 MB
Security BSides/BSides Boston/Boston BSides 2015/102-Running-Away-from-Security-Web-App-Vulnerabilities-and-OSINT-Collide-Micah-Hoffman.mp4 65.3 MB
Security BSides/BSides Boston/Boston BSides 2015/103-Robots-Ninjas-Pirates-and-Building-an-Effective-Vulnerability-Management-Program-Paul-Asadoorian.mp4 68.8 MB
Security BSides/BSides Boston/Boston BSides 2015/104-Protect-Your-nKeys-to-the-Kingdomi-Securing-Against-the-Next-Inevitable-Cyberattack-Paul-Kozlov.mp4 321.3 MB
Security BSides/BSides Boston/Boston BSides 2015/105-In-pursuit-of-a-better-crypto-puzzle-Samuel-Erb.mp4 180.2 MB
Security BSides/BSides Boston/Boston BSides 2015/200-When-penguins-attack-Linuxs-role-in-the-malware-ecosystem-Chester-Wisniewski.mp4 70.1 MB
Security BSides/BSides Boston/Boston BSides 2015/201-The-Benefits-in-Externalizing-DMZ-as-a-Service-in-the-Cloud-Israel-Barak.mp4 77.9 MB
Security BSides/BSides Boston/Boston BSides 2015/202-Common-misconfigurations-that-lead-to-a-breach-Justin-Tharpe.mp4 55.1 MB
Security BSides/BSides Boston/Boston BSides 2015/203-Applying-Big-Data-technology-to-security-use-case-Max-Pevzner.mp4 77.2 MB
Security BSides/BSides Boston/Boston BSides 2015/204-Marketing-Theyre-not-all-Schmucks-Jen-Ellis-Josh-Feinblum.mp4 54.3 MB
Security BSides/BSides Boston/Boston BSides 2015/205-Next-Gen-Incident-Management-Building-out-a-Modern-Incident-Management-Capability-John-McDonald.mp4 79.8 MB
Security BSides/BSides Boston/Boston BSides 2015/BSides-Boston-2015-Closing.mp4 81.7 MB
Security BSides/BSides Boston/Boston BSides 2015/K00-The-Securitized-State-Where-it-came-from-where-its-going-what-can-be-done-about-it-Molly-Sauter.mp4 70.7 MB
Security BSides/BSides Calgary/BSides Calgary 2017/A closer look at Docker and Garden.en.transcribed.srt 193 KB
Security BSides/BSides Calgary/BSides Calgary 2017/A closer look at Docker and Garden.mp4 102.6 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Accidental Insider, How attackers target I.T. staff, how I.T staff make it easy.en.transcribed.srt 152 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Accidental Insider, How attackers target I.T. staff, how I.T staff make it easy.mp4 89.3 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Adware's new upsell Malware.en.transcribed.srt 87 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Adware's new upsell Malware.mp4 53 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Andrew Hay KeyNote BSides 2017.en.transcribed.srt 162 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Andrew Hay KeyNote BSides 2017.mp4 112.7 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Attack of the Document Clones.en.transcribed.srt 163 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Attack of the Document Clones.mp4 80.5 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Bluetooth that bites, BTLE unlocking.en.transcribed.srt 86 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Bluetooth that bites, BTLE unlocking.mp4 77.1 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Bypassing of Self-Encrypting Drives - Techniques for Hackers and Forensic Investigators.en.transcribed.srt 142 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Bypassing of Self-Encrypting Drives - Techniques for Hackers and Forensic Investigators.mp4 82.1 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Chet Wisniewski KeyNote BSides 2017.en.transcribed.srt 169 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Chet Wisniewski KeyNote BSides 2017.mp4 108.7 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Chris Thompson MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt).en.transcribed.srt 125 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Chris Thompson MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt).mp4 84.2 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Creating Realistic Cyber Security Policies for Industrial Control Systems, Lee Cysouw.en.transcribed.srt 120 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Creating Realistic Cyber Security Policies for Industrial Control Systems, Lee Cysouw.mp4 78 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Dave Kennedy Understanding Offensive and Defense - Having a purple view on INFOSEC.en.transcribed.srt 203 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Dave Kennedy Understanding Offensive and Defense - Having a purple view on INFOSEC.mp4 91 MB
Security BSides/BSides Calgary/BSides Calgary 2017/David Lindner Dont Touch Me That Way.mp4 66.1 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Deviant Elevator Hacking.en.transcribed.srt 155 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Deviant Elevator Hacking.mp4 107.4 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Fergus Raphael WebDev (In)Security.en.transcribed.srt 109 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Fergus Raphael WebDev (In)Security.mp4 51.5 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Hacking the Internet of Dongs.en.transcribed.srt 155 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Hacking the Internet of Dongs.mp4 106.6 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Hunting Methodology A key to the labyrinth of network forensics.en.transcribed.srt 113 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Hunting Methodology A key to the labyrinth of network forensics.mp4 84.5 MB
Security BSides/BSides Calgary/BSides Calgary 2017/I Have a SIEM - How Do I Make It Useful.en.transcribed.srt 193 KB
Security BSides/BSides Calgary/BSides Calgary 2017/I Have a SIEM - How Do I Make It Useful.mp4 103.2 MB
Security BSides/BSides Calgary/BSides Calgary 2017/IT vs OT -- Who Wins Who Loses.en.transcribed.srt 111 KB
Security BSides/BSides Calgary/BSides Calgary 2017/IT vs OT -- Who Wins Who Loses.mp4 128 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Jack Daniel Keynote Calgary BSides 2016.en.transcribed.srt 96 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Jack Daniel Keynote Calgary BSides 2016.mp4 141.4 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Malware for busy people Nick Taylor.en.transcribed.srt 97 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Malware for busy people Nick Taylor.mp4 80.5 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Michael Gale Openstack Security.en.transcribed.srt 144 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Michael Gale Openstack Security.mp4 65 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Michael Spaling Sniffing 3 million passwords.mp4 95.6 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Milind Bhargava Lighting up the Canadian darknet financially.en.transcribed.srt 74 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Milind Bhargava Lighting up the Canadian darknet financially.mp4 50.6 MB
Security BSides/BSides Calgary/BSides Calgary 2017/OpenStack - An Introduction to Micro-Segmentation and Neutron SFC.en.transcribed.srt 56 KB
Security BSides/BSides Calgary/BSides Calgary 2017/OpenStack - An Introduction to Micro-Segmentation and Neutron SFC.mp4 39.3 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Prepping for a career in infosec.en.transcribed.srt 140 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Prepping for a career in infosec.mp4 89.5 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Richard Sillito Simplified Security Devops.en.transcribed.srt 93 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Richard Sillito Simplified Security Devops.mp4 69.9 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Securing Active Directory in the Enterprise.en.transcribed.srt 176 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Securing Active Directory in the Enterprise.mp4 118.7 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Securing your ICS with Defense in Depth and Deep Packet Inspection.en.transcribed.srt 102 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Securing your ICS with Defense in Depth and Deep Packet Inspection.mp4 83.5 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Seth Jaffe Incident Response, lessons from Nasa.en.transcribed.srt 168 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Seth Jaffe Incident Response, lessons from Nasa.mp4 120.3 MB
Security BSides/BSides Calgary/BSides Calgary 2017/SniffAir, a wireless security framework.en.transcribed.srt 73 KB
Security BSides/BSides Calgary/BSides Calgary 2017/SniffAir, a wireless security framework.mp4 59.1 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Steve Mathezer We dont need a better mouse trap.en.transcribed.srt 141 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Steve Mathezer We dont need a better mouse trap.mp4 77.1 MB
Security BSides/BSides Calgary/BSides Calgary 2017/TCP Modbus Missile Launcher.en.transcribed.srt 7 KB
Security BSides/BSides Calgary/BSides Calgary 2017/TCP Modbus Missile Launcher.mp4 11 MB
Security BSides/BSides Calgary/BSides Calgary 2017/The Air Goes In and Out, the Blood Goes Round and Round. Organizing Incident Response..en.transcribed.srt 125 KB
Security BSides/BSides Calgary/BSides Calgary 2017/The Air Goes In and Out, the Blood Goes Round and Round. Organizing Incident Response..mp4 72.5 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Timmons Security in innovation.en.transcribed.srt 137 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Timmons Security in innovation.mp4 103.5 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Understanding A Malware's On-Demand Polymorphic Code.en.transcribed.srt 69 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Understanding A Malware's On-Demand Polymorphic Code.mp4 58.3 MB
Security BSides/BSides Calgary/BSides Calgary 2017/Using Netflow & Open Source Tools for Network Behavioral Analysis.en.transcribed.srt 116 KB
Security BSides/BSides Calgary/BSides Calgary 2017/Using Netflow & Open Source Tools for Network Behavioral Analysis.mp4 75.4 MB
Security BSides/BSides Calgary/BSides Calgary Logo.jpg 34 KB
Security BSides/BSides Cape Town/BSidesCapeTown 2015 Automating the process of mapping and compromising networks.mp4 57.6 MB
Security BSides/BSides Cape Town/BSidesCapeTown 2015 Hack all the things - Exploiting and fixing IoT.mp4 104.6 MB
Security BSides/BSides Cape Town/BSidesCapeTown 2015 Hacker Jeopardy.mp4 31.5 MB
Security BSides/BSides Cape Town/BSidesCapeTown 2015 Ode to the Node.mp4 44.7 MB
Security BSides/BSides Cape Town/BSidesCapeTown 2015 Overview of Mobile Security.mp4 56.4 MB
Security BSides/BSides Cape Town/BSidesCapeTown 2015 Running a Secure Tor Hidden Service.mp4 108.2 MB
Security BSides/BSides Cape Town/BSidesCapeTown 2015 Sharepoint Hacking.mp4 41.3 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2013/BSidesCHS 2013 - Session 01 - Passive Recon.mp4 83 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2013/BSidesCHS 2013 - Session 02 - Java Shellcode Execution.mp4 128.5 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2013/BSidesCHS 2013 - Session 03 - Waging War on an Entire City.mp4 1.6 GB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Allow myself to encrypt...myself! - Evan Davison.mp4 137.2 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Ballin on a Budget - Andrew Morris.mp4 84.7 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Building an Open Source Threat Intelligence Program - Edward McCabe.mp4 157.8 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Just Apply the Patch - Robert Wessen.mp4 72.5 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Keynote Speaker - Jason Street.mp4 450.7 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Keynote Speaker - Kizz Myanthia.mp4 136.8 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 WUDS You Say SmartAssPhone - Frank Catucci.mp4 137 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 When a Security Architect Writes an Application - David Zendzian.mp4 342.5 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Building Burp Extensions - Jason Gillam.en.transcribed.srt 79 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Building Burp Extensions - Jason Gillam.mp4 80.9 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Exploiting Mass Emergency Notification Systems - Evan Davison.en.transcribed.srt 96 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Exploiting Mass Emergency Notification Systems - Evan Davison.mp4 83.6 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 FAIL-in-Depth - Marcus J. Carey.en.transcribed.srt 87 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 FAIL-in-Depth - Marcus J. Carey.mp4 76.8 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Get-Help An intro to Powershell and how to use it for evil.en.transcribed.srt 111 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Get-Help An intro to Powershell and how to use it for evil.mp4 93.6 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Hacking Web Apps - Brent White & Tim Roberts.en.transcribed.srt 124 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Hacking Web Apps - Brent White & Tim Roberts.mp4 90.4 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 How to pen-test off the grid...and in the middle of the Pacific.en.transcribed.srt 61 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 How to pen-test off the grid...and in the middle of the Pacific.mp4 64.9 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Internet of Things Hacking - Jason Davison.en.transcribed.srt 53 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Internet of Things Hacking - Jason Davison.mp4 49.3 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Software Vulnerability Discovery and Exploitation During Red Team Assessments.en.transcribed.srt 94 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Software Vulnerability Discovery and Exploitation During Red Team Assessments.mp4 50.2 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 The State of Information Security Today - Jeff Man.en.transcribed.srt 128 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 The State of Information Security Today - Jeff Man.mp4 110.6 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 You spent $20k & a throw away email can have full recon on your network.en.transcribed.srt 128 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 You spent $20k & a throw away email can have full recon on your network.mp4 75 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Infosec (Cyber Security) We're Doing It Wrong - Bill Gardner.en.transcribed.srt 55 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Infosec (Cyber Security) We're Doing It Wrong - Bill Gardner.mp4 41.8 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Kevin Johnson.en.transcribed.srt 104 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Kevin Johnson.mp4 66.5 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Adding PowerShell to your Arsenal with PSAttack - Jared Haight.en.transcribed.srt 115 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Adding PowerShell to your Arsenal with PSAttack - Jared Haight.mp4 91.1 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Anonymize Me A Technician's Guide to Hiding from the Internet - Ralph Collum.en.transcribed.srt 152 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Anonymize Me A Technician's Guide to Hiding from the Internet - Ralph Collum.mp4 97.7 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Black Box FISMA-based SCA of Public Cloud (IaaS) Providers - Gerald Auger.en.transcribed.srt 94 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Black Box FISMA-based SCA of Public Cloud (IaaS) Providers - Gerald Auger.mp4 83.6 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Do We Still Need Pen Testing - Jeff Man.en.transcribed.srt 75 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Do We Still Need Pen Testing - Jeff Man.mp4 79.5 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hacking Young Minds How to get Students interested in Infosec - Bryan Rhodes.en.transcribed.srt 112 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hacking Young Minds How to get Students interested in Infosec - Bryan Rhodes.mp4 112.5 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hunting High-Value Targets in Corporate Networks - Patrick Fussell & Josh Stone.en.transcribed.srt 116 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hunting High-Value Targets in Corporate Networks - Patrick Fussell & Josh Stone.mp4 77.8 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Mon'Amie XXE - Leo Pate.en.transcribed.srt 80 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Mon'Amie XXE - Leo Pate.mp4 66.3 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 OMNOMNOM A Newbie Chick's Take on InfoSec - April M. Jones.en.transcribed.srt 39 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 OMNOMNOM A Newbie Chick's Take on InfoSec - April M. Jones.mp4 93.7 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Shellcoding basics - Max Harley.en.transcribed.srt 84 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Shellcoding basics - Max Harley.mp4 59.4 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Alma Doesn't Fall Far From the Tree - Jason Davison & King Salemo.en.transcribed.srt 125 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Alma Doesn't Fall Far From the Tree - Jason Davison & King Salemo.mp4 145.7 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Hacker Evolution What have we become - Jason Gillam.en.transcribed.srt 71 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Hacker Evolution What have we become - Jason Gillam.mp4 74.8 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Weaponize JS Making the most of XSS opportunities - Mic Whitehorn-Gillam.en.transcribed.srt 66 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Weaponize JS Making the most of XSS opportunities - Mic Whitehorn-Gillam.mp4 57.9 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 What I learned being an OSINT creeper - Josh Huff.en.transcribed.srt 74 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 What I learned being an OSINT creeper - Josh Huff.mp4 43.5 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Keynote - Joseph Opacki.en.transcribed.srt 112 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Keynote - Joseph Opacki.mp4 53.2 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSides CHS 2017 Keynote Presentation by Jack Daniel.en.transcribed.srt 93 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSides CHS 2017 Keynote Presentation by Jack Daniel.mp4 64.6 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Are you ready by Jason Kent.en.transcribed.srt 130 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Are you ready by Jason Kent.mp4 79.6 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Becoming a Cyber Warrior by Ralph Collum.en.transcribed.srt 157 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Becoming a Cyber Warrior by Ralph Collum.mp4 105 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Deny All, application white-listing on Mac and Windows by Valentine Reid.en.transcribed.srt 106 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Deny All, application white-listing on Mac and Windows by Valentine Reid.mp4 88.8 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Hacking the ROI How to maximize your value from a Pentest by Mike Hodges.en.transcribed.srt 77 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Hacking the ROI How to maximize your value from a Pentest by Mike Hodges.mp4 63.5 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Learning to Firewalk Low to no cost resources to get into infosec by Bryan Austin.en.transcribed.srt 102 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Learning to Firewalk Low to no cost resources to get into infosec by Bryan Austin.mp4 94.4 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Poor Usability The Mother of Invention... by Christopher Hudel.en.transcribed.srt 134 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Poor Usability The Mother of Invention... by Christopher Hudel.mp4 205 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Quick Wins To Enhance Your Active Directory Security by Eric Kuehn.en.transcribed.srt 103 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Quick Wins To Enhance Your Active Directory Security by Eric Kuehn.mp4 74.5 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Realtime OSINT Tracking the Escaped Georgia Fugitives by Josh Huff.en.transcribed.srt 57 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Realtime OSINT Tracking the Escaped Georgia Fugitives by Josh Huff.mp4 38.9 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 RevEng All the IOTs by Gerald Auger, Tyler Flaagan, & Cory Nance.en.transcribed.srt 112 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 RevEng All the IOTs by Gerald Auger, Tyler Flaagan, & Cory Nance.mp4 81.6 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 SOS from pirates of the high sea to those of high finance by Francois Dion.en.transcribed.srt 95 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 SOS from pirates of the high sea to those of high finance by Francois Dion.mp4 97.7 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 What Up Breaches by Frank Catucci - YouTube.en.transcribed.srt 112 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 What Up Breaches by Frank Catucci - YouTube.mp4 87.7 MB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 ‘Weaponizing Ansible by Christopher Grimm.en.transcribed.srt 145 KB
Security BSides/BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 ‘Weaponizing Ansible by Christopher Grimm.mp4 73.8 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 Closing.mp4 56.2 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T100 Keynote Rob M Lee.mp4 84.8 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T101 Clean up on Aisle APT Mark Parsons.mp4 31.7 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T102 Frony Fronius Exploring Zigbee signals from Solar City Jose Fernandez.mp4 32 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T103 The Not So Same Origin Policy David Petty.mp4 23.7 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T104 IoT Pressure Cooker What Could Go Wrong Ben Actis.mp4 28.6 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T105 I Went Phishing and Caught a Charge Maryland Law for Pentesters Joshua Rosenbl.mp4 74.5 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T106 Imposter Syndrome I Dont Feel Like Who You Think I Am Micah Hoffma.mp4 27 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T107 SOC Panel Keynote.mp4 202.8 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T108 Keynote Jim Christy.mp4 87.4 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T109 Red Teaming the Board Robert Wood.mp4 65.3 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T110 Understanding the Cybersecurity Act of 2015 Jeff Kosseff.mp4 60.8 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T111 Microsoft Patch Analysis for Exploitation Stephen Sims.mp4 90.2 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T112 Arming Small Security Programs Network Baseline Generation and Alerts with Bro.mp4 47.4 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T201 Weaponizing Splunk Using Blue Teams for Evil Ryan Hays.mp4 23.8 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T202 Current State of Virtualizing Network Monitoring Daniel Lohin Ed Sealing.mp4 32 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T203 OPSEC for the Security Practictioner Michael Clayberg.mp4 29.9 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T204 Automating Bulk Intelligence Collection Gita Ziabari.mp4 37.7 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T205 The Battle for OSINT Are you Team GUI or Team Command Line Tracy Z Maleeff Joe.mp4 41.3 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T206 The AVATAR Project and You da667.mp4 58 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T207 Threat Hunting Thinking About Tomorrow Tazz.mp4 92.2 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T208 Detecting the Elusive Active Directory Threat Hunting Sean Metcalf.mp4 35.4 MB
Security BSides/BSides Charm/BSides Charm 2017/BSidesCharm 2017 T209 The Cryptography of Edgar Allan Poe Robert Weiss pwcrack.mp4 73 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 00 Keynote Jessica Payne.en.transcribed.srt 172 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 00 Keynote Jessica Payne.mp4 68.6 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 01 To AI or Not to AI What the US Military Needs for Fighting Cyber Wars Ernest Wong.en.transcribed.srt 18 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 01 To AI or Not to AI What the US Military Needs for Fighting Cyber Wars Ernest Wong.mp4 33.1 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 02 FailTime Failing towards Success Sean Metcalf.en.transcribed.srt 133 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 02 FailTime Failing towards Success Sean Metcalf.mp4 44.2 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 03 Basic Offensive Application of MOF Files in Scripting Devon Bordonaro.en.transcribed.srt 46 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 03 Basic Offensive Application of MOF Files in Scripting Devon Bordonaro.mp4 23.4 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 04 Counting Down to Skynet Nolan Hedglin.en.transcribed.srt 72 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 04 Counting Down to Skynet Nolan Hedglin.mp4 29.6 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 05 How we reverse engineered OSXPirrit got legal threats and survived Amit Serper.en.transcribed.srt 147 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 05 How we reverse engineered OSXPirrit got legal threats and survived Amit Serper.mp4 69.3 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 06 Quantify your hunt not your parents red teaming Devon Kerr.en.transcribed.srt 175 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 06 Quantify your hunt not your parents red teaming Devon Kerr.mp4 58.9 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 07 Internet Anarchy The Global March toward Data Localization Andrea Little Limbago.en.transcribed.srt 103 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 07 Internet Anarchy The Global March toward Data Localization Andrea Little Limbago.mp4 31.2 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 08 Effective Monitoring for Operational Security Russell Mosley Ryan St Germain.en.transcribed.srt 69 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 08 Effective Monitoring for Operational Security Russell Mosley Ryan St Germain.mp4 30.2 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 10 Between a SOC and a Hard Place Shawn Thomas Andrew Marini James Callahan Dustin Shirley.en.transcribed.srt 187 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 10 Between a SOC and a Hard Place Shawn Thomas Andrew Marini James Callahan Dustin Shirley.mp4 84.1 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 11 Using Atomic Red Team to Test Endpoint Solutions Adam Mathis.en.transcribed.srt 121 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 11 Using Atomic Red Team to Test Endpoint Solutions Adam Mathis.mp4 41.3 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 12 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Myers Barrett Adams.en.transcribed.srt 36 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 12 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Myers Barrett Adams.mp4 35.7 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 13 Closing Ceremonies.en.transcribed.srt 42 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 1 13 Closing Ceremonies.mp4 57.5 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 00 Preparing for Incident Handling and Response within Industrial Control Networks Mark Stac.en.transcribed.srt 63 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 00 Preparing for Incident Handling and Response within Industrial Control Networks Mark Stac.mp4 40.3 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 01 Getting Saucy with APFS The State of Apples New File System Sarah Edwards.en.transcribed.srt 141 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 01 Getting Saucy with APFS The State of Apples New File System Sarah Edwards.mp4 84.6 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 02 An Open Source Malware Classifier and Dataset Phil Roth.en.transcribed.srt 96 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 02 An Open Source Malware Classifier and Dataset Phil Roth.mp4 59.3 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 03 Threat Activity Attribution Differentiating the Who from the How Joe Slowik.en.transcribed.srt 180 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 03 Threat Activity Attribution Differentiating the Who from the How Joe Slowik.mp4 90.9 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 05 Powershell Deobfuscation Putting the toothpaste back in the tube Daniel Grant.en.transcribed.srt 77 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 05 Powershell Deobfuscation Putting the toothpaste back in the tube Daniel Grant.mp4 45.9 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 06 Plight at the end of the Tunnel Anjum Ahuja.en.transcribed.srt 61 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 06 Plight at the end of the Tunnel Anjum Ahuja.mp4 34.4 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 07 Malware Analysis and Automation using Binary Ninja Erika Noerenberg.en.transcribed.srt 140 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 07 Malware Analysis and Automation using Binary Ninja Erika Noerenberg.mp4 67.1 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 08 Exercise Your SOC How to run an effective SOC response simulation Brian Andrzejewski.en.transcribed.srt 92 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 08 Exercise Your SOC How to run an effective SOC response simulation Brian Andrzejewski.mp4 52.4 MB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 09 Building a Predictive Pipeline to Rapidly Detect Phishing Domains Wes Connell.en.transcribed.srt 112 KB
Security BSides/BSides Charm/BSides Charm 2018/Track 2 09 Building a Predictive Pipeline to Rapidly Detect Phishing Domains Wes Connell.mp4 80.8 MB
Security BSides/BSides Charm/BSides Charm 2018/fixed2 Track 1 09 Rise of the Miners Josh Grunzweig.en.transcribed.srt 129 KB
Security BSides/BSides Charm/BSides Charm 2018/fixed2 Track 1 09 Rise of the Miners Josh Grunzweig.mp4 52.9 MB
Security BSides/BSides Chicago/BSides Chicago 2014/Aligning Threats and Allies through Stories J Wolfgang Goerlich and Steven Fox.mp4 124.8 MB
Security BSides/BSides Chicago/BSides Chicago 2014/Bioinformatics Erasing the line between biology and hacking Krystal Thomas White and Patrick Thomas.mp4 113.8 MB
Security BSides/BSides Chicago/BSides Chicago 2014/Building an AppSec Program from Scratch Chris Pfoutz.mp4 44.8 MB
Security BSides/BSides Chicago/BSides Chicago 2014/Bypassing EMET 41 Jared DeMott.mp4 47.2 MB
Security BSides/BSides Chicago/BSides Chicago 2014/Call of Community Modern Warfare Matt Johnson & Ben Ten.mp4 0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
Name
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Security BSides Video 164.3 GB 0
Security BSides Video 305.5 GB 0
Security BSides Video 87.9 GB 15
Security BSides Video 148.5 GB 2
Security BSides Video 272 GB 0

Loading...