Toorcon/ToorCamp - 2011/ToorCon 13 (2011) - Anthony J. Stieber - Crisis and Opportunity in Key Management 2001-2031.mp4 |
106.4 MB |
Toorcon/ToorCamp - 2011/ToorCon 13 (2011) - Anthony J. Stieber - How NOT to Implement Cryptography for the OWASP Top 10 (Reloaded).mp4 |
84.1 MB |
Toorcon/ToorCamp - 2012/ToorCamp 2012 Ignite 1-2.mp4 |
376.3 MB |
Toorcon/ToorCamp - 2012/ToorCamp 2012 Ignite 2-2.mp4 |
376.3 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - BUILDING AND SAILING A 12 FOOT SAILBOAT - Jeff Costlow.en.transcribed.srt |
92 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - BUILDING AND SAILING A 12 FOOT SAILBOAT - Jeff Costlow.mp4 |
93 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - DEMYSTIFYING THE STATE OF MACHINE LEARNING - Ren.en.transcribed.srt |
47 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - DEMYSTIFYING THE STATE OF MACHINE LEARNING - Ren.mp4 |
47.8 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - DIY OSC DEBUG MULTITOOL APP - Alexandre Elsayad.en.transcribed.srt |
60 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - DIY OSC DEBUG MULTITOOL APP - Alexandre Elsayad.mp4 |
74.2 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - ENTROPY - Jeff Costlow.mp4 |
57.2 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - FINDING SECRETS IN SOURCE CODE WITH TRUFFLEHOG - Dylan.en.transcribed.srt |
73 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - FINDING SECRETS IN SOURCE CODE WITH TRUFFLEHOG - Dylan.mp4 |
125.1 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - GETTING SHELLS FROM JAVASCRIPT - Dylan.en.transcribed.srt |
85 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - GETTING SHELLS FROM JAVASCRIPT - Dylan.mp4 |
125.7 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - GR-IRIDIUM UNDER THE HOOD - schneider.en.transcribed.srt |
81 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - GR-IRIDIUM UNDER THE HOOD - schneider.mp4 |
140.9 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - HARDWARE REVESE PSYCHOLOGY - Jeremy Hong.en.transcribed.srt |
42 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - HARDWARE REVESE PSYCHOLOGY - Jeremy Hong.mp4 |
122.5 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - HOW TO AVOID AN EMBARRASSING BREACH - (MATTRIX) MATT HOY.en.transcribed.srt |
69 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - HOW TO AVOID AN EMBARRASSING BREACH - (MATTRIX) MATT HOY.mp4 |
134.4 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - Keynote MAKING AND BREAKING HARDWARE - bunnie.en.transcribed.srt |
128 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - Keynote MAKING AND BREAKING HARDWARE - bunnie.mp4 |
169 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - LET THEM EAT CRÈME BRÛLÉE! - Taylor Streetman & Jacob Graves.en.transcribed.srt |
62 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - NANOFABRICATION AT HOME - Rob Flickenger.en.transcribed.srt |
89 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - NANOFABRICATION AT HOME - Rob Flickenger.mp4 |
134.4 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - OSCILLOSCOPE MUSIC - Jerobeam Fenderson.en.transcribed.srt |
22 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - OSCILLOSCOPE MUSIC - Jerobeam Fenderson.mp4 |
53.6 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - PROJECT LADON (FKA HACKERBOAT) SAIL ON - Pierce Nichols.en.transcribed.srt |
73 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - PROJECT LADON (FKA HACKERBOAT) SAIL ON - Pierce Nichols.mp4 |
91.3 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - SOCIAL ENGINEERING TECH EDUCATION - Tyler Menezes.en.transcribed.srt |
105 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - SOCIAL ENGINEERING TECH EDUCATION - Tyler Menezes.mp4 |
152.5 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - SUB TURING MACHINES THE END OF UNKNOWN UNKNOWNS - Falcon Darkstar Momot.en.transcribed.srt |
117 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - SUB TURING MACHINES THE END OF UNKNOWN UNKNOWNS - Falcon Darkstar Momot.mp4 |
169.6 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - SWARM INTELLIGENCE AND AUGMENTED REALITY - Pongolyn.en.transcribed.srt |
49 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - SWARM INTELLIGENCE AND AUGMENTED REALITY - Pongolyn.mp4 |
75 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - THREAT MODELING - Justin G.en.transcribed.srt |
71 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - THREAT MODELING - Justin G.mp4 |
83 MB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - YOU ARE ONLY HUMAN - w0z.en.transcribed.srt |
120 KB |
Toorcon/ToorCamp - 2018/ToorCamp 2018 - YOU ARE ONLY HUMAN - w0z.mp4 |
145 MB |
Toorcon/ToorCon 13 - 2011/Dan Tentler vissago Toorcon Seattle 2011.rar |
305.7 MB |
Toorcon/ToorCon 13 - 2011/ToorCon 13 (2011) - Anthony J. Stieber - How NOT to Implement Cryptography for the OWASP Top 10 (Reloaded).mp4 |
84.1 MB |
Toorcon/ToorCon 14 - 2012/Dan Tentler vissago Toorcon 2012.rar |
238.4 MB |
Toorcon/ToorCon 14 - 2012/ToorCon 14 (2012) - Tom Samstag (tecknicaltom) - HTTPS in the Real World Screw-ups, Trends, and Outliers.mp4 |
362.3 MB |
Toorcon/ToorCon 15 - 2013/Dan Tentler vissago Toorcon 2013.rar |
661.1 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - @PradoAngelo & @GluckYoel - BREACHing SSL, one byte at a time.mp4 |
172.4 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Aaron Grattafiori - The Outer Limits Hacking a Smart TV.mp4 |
251.8 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Ashaman - Applications of Artificial Intelligence in Ad-Hoc Static Code Analysis & Eric (XlogicX) Davisson - Mask Your Checksums - The Gorry Details.mp4 |
90.2 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Caezar - Keynote.mp4 |
249 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Christie Dudley (Valkyrie) - Data Leaking in Next Generation Cars.mp4 |
237 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Dmitry Nedospasov - Backside IC analysis.mp4 |
230.6 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Doug DePerry & Andrew Rahimi - Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell.mp4 |
233.9 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Grutz - Managing your pentest data with Kvasir & Anna Shubina - Active Fingerprinting of Encrypted VPNs.mp4 |
124.5 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Jimmy Shah - Mobile Malware Heuristics The path from 'eh' to 'pretty good'.mp4 |
170.9 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - John Irwin - Let the Hackers Learn.mp4 |
84 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Michael Eddington - Fuzzing the world with Peach.mp4 |
358.9 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Michael Ossmann & Kos - Multiplexed Wired Attack Surfaces.mp4 |
251.7 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Michael Ossmann - Defeating Spread Spectrum Communication with Software Defined Radio.mp4 |
316.8 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Peleus Uhley & Karthik Raman - Security Response in the Age of Mass Customized Attacks.iso.mp4 |
231.7 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Robert R - Privacy's Past, Present and Future.iso.mp4 |
239.1 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Ryan Huber - Running at 99 Surviving an Application DoS.mp4 |
172 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Toorcon 2013 Opening Remarks & Andrew Furtak, Yuriy Bulygin, Oleksandr Bazhaniuk - A Tale of One Software Bypass of Windows 8 Secure Boot.mp4 |
64.3 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Wartortell - x86 Rewriting Beating Binaries into Submission.mp4 |
249 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 (2013) - Xeno Kovah - Firmware attacks, Copernicus, and You.mp4 |
427.6 MB |
Toorcon/ToorCon 15 - 2013/ToorCon 15 - 2013 - Rickrolling your neighbors with Google Chromecast - 20Oct2013.mp4 |
54.8 MB |
Toorcon/ToorCon 16 - 2014/FinFisher Breakdown Toorcon 16.mp4 |
68.8 MB |
Toorcon/ToorCon 16 - 2014/FuzzyNop - Now It s Personal Red Team Anecdotes ToorCon 16.mp4 |
93.5 MB |
Toorcon/ToorCon 16 - 2014/Reverse Engineering Malware For Newbies ToorCon 16.mp4 |
166 MB |
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Aleksander Okonski - Privacy Concerns in Android Applications.mp4 |
68 MB |
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Joe Basirico - Dispel the Illusion Change the Behavior.mp4 |
87.7 MB |
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Matthew Halchyshak & Joseph Tartaro - Cyber Necromancy Reverse Engineering Dead Protocols.mp4 |
196 MB |
Toorcon/ToorCon 16 - 2014/ToorCon 16 (2014) - Zak Dehlawi - Researchers Use Google Glass in Public, And You Won't Believe How People React.mp4 |
90.4 MB |
Toorcon/ToorCon 16 - 2014/Toorcon San Diego (2014) - Cyber Necromancy Reverse Engineering Dead Protocols.mp4 |
188.8 MB |
Toorcon/ToorCon 16 - 2014/Toorcon 16 (2014) - Seminar - iOS Blackbox Pentesting Using idb.mp4 |
320 MB |
Toorcon/ToorCon 16 - 2014/Toorcon 16 (2014) - Time Trial - Racing Towards Practical Timing Attacks.mp4 |
181.9 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Jeremy Brown - A Bug Hunter's Perspective on Unix Drivers.mp4 |
179.6 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Joel St. John & Danny Iland - The Consumerization of Home Insecurity.mp4 |
126.6 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Karl Koscher - Software Defined Radios Digital Signal Processing and Digital Modulation.mp4 |
189.1 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Kevin Grigorenko - Linux Core Dumps From glibc malloc to eye catchers.mp4 |
125.2 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Marcus Hodges & Tom Samstag - Potent Pwnables Advancements in CTF.mp4 |
240.8 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Max Chauhan & Nora Sandler - Game of Pwns How we turned developers, teenagers and accountants into hackers.mp4 |
248.4 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Michael Ossmann - Rapid Radio Reversing.mp4 |
124.2 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Richo Healey & Mike Ryan - Hacking electric skateboards vehicle research for mortals.mp4 |
236 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - Samy Kamkar - Keynote.mp4 |
196 MB |
Toorcon/ToorCon 17 - 2015/ToorCon 17 (2015) - yan - New Techniques for Browser Fingerprinting.mp4 |
120.5 MB |
Toorcon/ToorCon 18 - 2016/ToorCon 18 Keynote - Jared DeMott - ANALYZING NEXTGEN SECURITY PRACTICES AND SECURITY TOOLS.en.transcribed.srt |
139 KB |
Toorcon/ToorCon 18 - 2016/ToorCon 18 Keynote - Jared DeMott - ANALYZING NEXTGEN SECURITY PRACTICES AND SECURITY TOOLS.mp4 |
136.7 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Aaron HnatIw - How To Move Mountains.en.transcribed.srt |
142 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Aaron HnatIw - How To Move Mountains.mp4 |
176.2 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Alonso & Mitnick - DirtyTooth Put Music & Lose your Contacts.en.transcribed.srt |
81 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Alonso & Mitnick - DirtyTooth Put Music & Lose your Contacts.mp4 |
141.6 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Ernest Wong - Defending Cyberspace by Thinking “1n51d3-th3-B0x”.en.transcribed.srt |
137 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Ernest Wong - Defending Cyberspace by Thinking “1n51d3-th3-B0x”.mp4 |
201.1 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Gurney Halleck - CyberWargames TableTopExercises.en.transcribed.srt |
81 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Gurney Halleck - CyberWargames TableTopExercises.mp4 |
156 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - James Barclay - From Zero to Zero-Trust.en.transcribed.srt |
94 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - James Barclay - From Zero to Zero-Trust.mp4 |
123.2 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Keynote - Lance James.en.transcribed.srt |
180 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Keynote - Lance James.mp4 |
213.5 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Mohamad Mokbel - ShellPcapFication (SPF) – A Sophisticated Interactive Shell Framework.en.transcribed.srt |
105 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Mohamad Mokbel - ShellPcapFication (SPF) – A Sophisticated Interactive Shell Framework.mp4 |
87.7 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Newlin, Lamb, & Greyson.mp4 |
6.3 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Robert PortvlIet - Open Up and Say 0x41414141 Attacking Medical Devices.en.transcribed.srt |
161 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Robert PortvlIet - Open Up and Say 0x41414141 Attacking Medical Devices.mp4 |
230.4 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Spill & Temkin - Facedancer 2.0 Next Generation USB Hacking.en.transcribed.srt |
166 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Spill & Temkin - Facedancer 2.0 Next Generation USB Hacking.mp4 |
209.2 MB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Tyler Cook - False Advertising.en.transcribed.srt |
108 KB |
Toorcon/ToorCon 19 - 2017/ToorCon 19 - Tyler Cook - False Advertising.mp4 |
122.4 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 1.mp4 |
16.6 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 2.mp4 |
16.7 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 3.mp4 |
14.7 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 4.mp4 |
13 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 5.mp4 |
16.5 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 6.mp4 |
16.7 MB |
Toorcon/ToorCon 8 - 2006/Hard Drive Recovery Part 7.mp4 |
6.8 MB |
Toorcon/ToorCon 8 - 2006/Sector2008 - Security Heretic - We're Doing It Wrong.mp4 |
63.3 MB |
Toorcon/ToorCon 8 - 2006/Toor2101 - Cory Doctorow - The Art Of Blogging.mp4 |
68.8 MB |
Toorcon/ToorCon 8 - 2006/Toor2102 - Simple Nomad - State Of The Enemy Of TheState.mp4 |
73.3 MB |
Toorcon/ToorCon 8 - 2006/Toor2103 - Various Presenters - Everything And Anything Lightning Presentations.mp4 |
58.5 MB |
Toorcon/ToorCon 8 - 2006/Toor2114 - Various Panelists - Old School Hacking Nostalgia Panel Discussion.mp4 |
85.8 MB |
Toorcon/ToorCon 8 - 2006/Toor2115 - Datagram - Locksmithing And Key bumping.mp4 |
78.7 MB |
Toorcon/ToorCon 8 - 2006/Toor2116 - ScottMoulton - Hacking Hard Drives For Data Recovery.mp4 |
75.6 MB |
Toorcon/ToorCon 8 - 2006/Toor2117 - Lin0xx - Advanced Windows Firewall Subversion.mp4 |
62.7 MB |
Toorcon/ToorCon 8 - 2006/Toor2119 - Spoonm - Ida Rub Reverse Engineering.mp4 |
64.4 MB |
Toorcon/ToorCon 8 - 2006/Toor2120 - Druid - VOIP Attacks.mp4 |
76.9 MB |
Toorcon/ToorCon 8 - 2006/Toor2121 - Richard Johnson - Windows Vista Exploitation Counter Measures.mp4 |
67.1 MB |
Toorcon/ToorCon 8 - 2006/Toor2122 - Steve Rambam - Privacy Is Dead - Get Over It.mp4 |
153.1 MB |
Toorcon/ToorCon 8 - 2006/Toor2123 - JaredDeMott - The Evolving Art Of Fuzzing.mp4 |
67.5 MB |
Toorcon/ToorCon 8 - 2006/Toor2124 - Vlad Tsyrklevich - Polymorphic Shellcode At A Glance.mp4 |
70.1 MB |
Toorcon/ToorCon 8 - 2006/Toor2125 - Tom St Denis - Elliptic Curve Algorithms w Bad Title.mp4 |
49.3 MB |
Toorcon/ToorCon 8 - 2006/Toor2126 - Nicholas Brulez - Breaking Pocket PC Executable Protection.mp4 |
50 MB |
Toorcon/ToorCon 8 - 2006/Toor2129 - asm - LOL Phone - Exploiting Trust In Social Phone Networks.mp4 |
65.9 MB |
Toorcon/ToorCon 8 - 2006/Toor2130 - Justin Ferguson - Bridging The Gap - Analysis Of Win32.mp4 |
44.3 MB |
Toorcon/ToorCon 8 - 2006/Toor2131 - LanceJames JoshuaBrashards - Tracksploits - Passive Tracker Hacking.mp4 |
75.2 MB |
Toorcon/ToorCon 8 - 2006/Toor2132 - Christopher Abad - HiTech Codes And LoTech LOLs.mp4 |
75.2 MB |
Toorcon/ToorCon 8 - 2006/Toor2133 - Matt Fisher - SQL Injection - Everything About SQL Injection.mp4 |
158.3 MB |
Toorcon/ToorCon 9 - 2007/Dan Tentler vissago Toorcon 2007.rar |
379.1 MB |
Toorcon/ToorCon 9 - 2007/Videos/AdvancedHackingFlashAndHardDriveRecoveries-ScottMoulton.mp4 |
42.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/AppArmorProfileSharingPortal-CrispinCowan.mp4 |
45.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/AttackingVoIPtoGainControlOfALaptop.mp4 |
17.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/BeatingBackThePhysicalSecurityBoogeyman.mp4 |
17.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/Beetle-Keynote-WolverineYoMamaSpooksAndOsama.mp4 |
41.4 MB |
Toorcon/ToorCon 9 - 2007/Videos/BitblenderProvidingLightweightAnonymityForBittorrent-McCoyAndBauer.mp4 |
17.2 MB |
Toorcon/ToorCon 9 - 2007/Videos/BuildingHackingOpenSourceEmbeddedWirelessRouters-3of4.mp4 |
118.9 MB |
Toorcon/ToorCon 9 - 2007/Videos/Byakugan-AutomatingExploitation-NathanRittenhouse.mp4 |
17.4 MB |
Toorcon/ToorCon 9 - 2007/Videos/CDMA-UnlockingAndModification-AlexanderLash.mp4 |
26 MB |
Toorcon/ToorCon 9 - 2007/Videos/CafeLatteWithAFreeToppingOfCrackedWEP-RamachandranAndAhmad.mp4 |
20.2 MB |
Toorcon/ToorCon 9 - 2007/Videos/CharlieMiller-FuzzingWithCodeCoverage.mp4 |
43.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/ContextKeyedPayloadEncoding-Druid.mp4 |
19.4 MB |
Toorcon/ToorCon 9 - 2007/Videos/ContinuousPreventionTestingToolsforDevelopersAndProductTesters-AndreGironda.mp4 |
58.3 MB |
Toorcon/ToorCon 9 - 2007/Videos/CthuluASoftwareAnalysisFrameworkBuiltOnPhoenix-MattMiller.mp4 |
38.9 MB |
Toorcon/ToorCon 9 - 2007/Videos/DanKaminsky-BlackOps2007-DesignReviewingTheWeb.mp4 |
49.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/ExtrusionAndExploitabilityScanning.mp4 |
18.2 MB |
Toorcon/ToorCon 9 - 2007/Videos/HackerSpacesPanel-EuropeUSandTheFuture-3ricJohnsonNickFarMCFly.mp4 |
45.3 MB |
Toorcon/ToorCon 9 - 2007/Videos/HackingTheEULA-ReverseBenchmarkingWebApplications.mp4 |
21.1 MB |
Toorcon/ToorCon 9 - 2007/Videos/HackingWindowsVistaSecurity-DanGriffin.mp4 |
18.8 MB |
Toorcon/ToorCon 9 - 2007/Videos/HotspotAnalysisLookingAtHotspotsWithaMagGlass-RichardRushing.mp4 |
19.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/JAYBEALE-TheyreHackingOurClientsWhyAreWeOnlyAssessingServers.mp4 |
25.4 MB |
Toorcon/ToorCon 9 - 2007/Videos/JeromeAthias-SpeedingUpTheExploitsDevelopmentProcess.mp4 |
32.8 MB |
Toorcon/ToorCon 9 - 2007/Videos/LastStand-100percentAutomatic0DayAchievedAndExplained-JasonMedeiros.mp4 |
22.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/LinuxKernelRootkitDetectionAndAnalysisDuringIncidentResponse-GabrielLawrence.mp4 |
57.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/LiveMemoryForensicsIncidentResponseOnACompromisedSystem-Datagram.mp4 |
17.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/NewSQL-InjectionTricks-PaulBattista.mp4 |
18.3 MB |
Toorcon/ToorCon 9 - 2007/Videos/PenetrationTesting-LessonsLearnedToolsAndTechniques-OstromAndKindervag.mp4 |
20.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/PostScarcityEconomicsAndTheEconomicsOfAbundance.mp4 |
19.5 MB |
Toorcon/ToorCon 9 - 2007/Videos/PrivilegeCentricSecurityAnalysis-BrendaLarcom.mp4 |
17.1 MB |
Toorcon/ToorCon 9 - 2007/Videos/RealWorldFuzzingCollectingAndAnalyzingCode.mp4 |
69.9 MB |
Toorcon/ToorCon 9 - 2007/Videos/RodneyThayer-Crypto-Pt1of2.mp4 |
90.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/RodneyThayer-Crypto-Pt2of2.mp4 |
21.1 MB |
Toorcon/ToorCon 9 - 2007/Videos/SocialDataMiningThroughTelephonyVulnerabilities-ASM.mp4 |
20 MB |
Toorcon/ToorCon 9 - 2007/Videos/StromCarlson-TheTalkTalkHowToGiveBetterTechPresentations.mp4 |
20.4 MB |
Toorcon/ToorCon 9 - 2007/Videos/TeachingHackingAtCollege-SamBowne.mp4 |
18.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/TechniquesForExploitingAnomalyDetectionSystems-JesseHurley.mp4 |
22.9 MB |
Toorcon/ToorCon 9 - 2007/Videos/Textella-AnAlternateApplicationOfPeerToPeer-Remorse.mp4 |
38.6 MB |
Toorcon/ToorCon 9 - 2007/Videos/TravisGoodspeed-ExploitingWirelessSensorNetworksOver802.15.4.mp4 |
39.7 MB |
Toorcon/ToorCon 9 - 2007/Videos/UsingTypeSystemsToReduceYourSecurityRisk-Zax.mp4 |
13.3 MB |
Toorcon/ToorCon 9 - 2007/Videos/vnak-VoIP-NetworkAttackKit-ZaneLackey.mp4 |
20.8 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - AN INCONVENIENT TRUTH EVADING THE RANSOMWARE PROTECTION IN WINDOWS 10 - Soya Aoyama.mp4 |
14.9 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - ANATOMY OF ICS DISRUPTIVE ATTACKS - Joe Slowik.en.transcribed.srt |
158 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - ANATOMY OF ICS DISRUPTIVE ATTACKS - Joe Slowik.mp4 |
21.9 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - AVOIDING DEFAULT PASSWORDS & SECRETS BREACHES USING OPEN SOURCE - Carpenter & Dittrich.en.transcribed.srt |
65 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - AVOIDING DEFAULT PASSWORDS & SECRETS BREACHES USING OPEN SOURCE - Carpenter & Dittrich.mp4 |
30.8 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - BUG BOUNTY HUNTING ON STEROIDS - Anshuman Bhartiya.en.transcribed.srt |
35 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - BUG BOUNTY HUNTING ON STEROIDS - Anshuman Bhartiya.mp4 |
29.9 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - DISSECTION OF WEBASSEMBLY MODULE - Patrick Ventuzelo.mp4 |
37.4 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - ELECTRON HARMONY DRAWING READABLE SCHEMATICS THE RIGHT WAY - funsized.en.transcribed.srt |
42 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - ELECTRON HARMONY DRAWING READABLE SCHEMATICS THE RIGHT WAY - funsized.mp4 |
25.9 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - FINDING SECRETS IN SOURCE CODE WITH TRUFFLEHOG - Dylan.en.transcribed.srt |
69 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - FINDING SECRETS IN SOURCE CODE WITH TRUFFLEHOG - Dylan.mp4 |
20.6 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - FOLLOWING A TRAIL OF CONFUSION - Josh Stroschein.en.transcribed.srt |
108 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - FOLLOWING A TRAIL OF CONFUSION - Josh Stroschein.mp4 |
106.3 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - FOOLING ML IMAGE CLASSIFIERS - Raghav Gurbaxani.en.transcribed.srt |
25 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - FOOLING ML IMAGE CLASSIFIERS - Raghav Gurbaxani.mp4 |
36 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - FROM CHAOS TO BLISS HOW WE SOLVED SECURITY IN JUST 20 YEARS - Steve Werby.en.transcribed.srt |
141 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - FROM CHAOS TO BLISS HOW WE SOLVED SECURITY IN JUST 20 YEARS - Steve Werby.mp4 |
76.5 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - FROM FAR AND NEAR EXPLOITING OVERFLOWS ON WINDOWS 3.X - Jacob Thompson.en.transcribed.srt |
85 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - FROM FAR AND NEAR EXPLOITING OVERFLOWS ON WINDOWS 3.X - Jacob Thompson.mp4 |
21.4 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - HIRING SECURITY - Sham.en.transcribed.srt |
43 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - HIRING SECURITY - Sham.mp4 |
37.7 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - IF YOU GIVE A CONTAINER A CAPABILITY A TALE OF CONTAINER EXPLOITATION - Kumar & Glew.en.transcribed.srt |
70 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - IF YOU GIVE A CONTAINER A CAPABILITY A TALE OF CONTAINER EXPLOITATION - Kumar & Glew.mp4 |
33.2 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - INTEGRATED SECURITY TESTING - hackimedes.mp4 |
61.6 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - INTRODUCING INFOCONDB.ORG IMDB FOR HACKER CONS - Tom Samstag (tecknicaltom).en.transcribed.srt |
43 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - INTRODUCING INFOCONDB.ORG IMDB FOR HACKER CONS - Tom Samstag (tecknicaltom).mp4 |
34.5 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - IOT BOTNETS THE CRUX OF INTERNET OF THINGS CHAOS! - Aditya K Sood.en.transcribed.srt |
101 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - IOT BOTNETS THE CRUX OF INTERNET OF THINGS CHAOS! - Aditya K Sood.mp4 |
24.3 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - IT WILL KILL OR HARM YOU AND IT'S IN YOU OR YOUR HOME - Ryan Satterfield.en.transcribed.srt |
33 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - IT WILL KILL OR HARM YOU AND IT'S IN YOU OR YOUR HOME - Ryan Satterfield.mp4 |
52 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - KEYNOTE The Enemy Within - SIMPLE NOMAD.en.transcribed.srt |
135 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - KEYNOTE The Enemy Within - SIMPLE NOMAD.mp4 |
15.6 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - LOST & FOUND CERTIFICATES RESIDUAL CERTIFICATES FOR PRE-OWNED DOMAINS - Foster & Dylan.en.transcribed.srt |
56 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - LOST & FOUND CERTIFICATES RESIDUAL CERTIFICATES FOR PRE-OWNED DOMAINS - Foster & Dylan.mp4 |
46.9 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - MY LITTLE AWS IR SANDBOX - Michael Wylie.en.transcribed.srt |
48 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - MY LITTLE AWS IR SANDBOX - Michael Wylie.mp4 |
38.2 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - RANSOMWARE VERSUS CRYPTOJACKING LATEST TRENDS IN MODERN MALWARE - Pranshu Bajpai.en.transcribed.srt |
106 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - RANSOMWARE VERSUS CRYPTOJACKING LATEST TRENDS IN MODERN MALWARE - Pranshu Bajpai.mp4 |
83.8 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - RIDICULOUS ROUTER Using OpenWRT to do all the enterprise stuff 2 - Gene Erik.en.transcribed.srt |
32 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - RIDICULOUS ROUTER Using OpenWRT to do all the enterprise stuff 2 - Gene Erik.mp4 |
27.7 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - SHINING A LIGHT ON A BLACK BOX REVERSE ENGINEERING PROTOCOLS - Rick Ramgattie.mp4 |
31.7 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - SMART CONTRACT HONEYPOTS FOR PROFIT (AND PROBABLY FUN) - Ben Schmidt.en.transcribed.srt |
37 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - SMART CONTRACT HONEYPOTS FOR PROFIT (AND PROBABLY FUN) - Ben Schmidt.mp4 |
44.9 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - SYMBOLIC COMPUTING, MOVING ON UP. - zv.en.transcribed.srt |
47 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - SYMBOLIC COMPUTING, MOVING ON UP. - zv.mp4 |
35.7 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - UEFI IS SCARY - Gene Erik.en.transcribed.srt |
33 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - UEFI IS SCARY - Gene Erik.mp4 |
41.8 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - UNIKERNEL APOCALYPSE BIG TROUBLE IN RING 0 - Spencer Michaels & Jeff Dileo.en.transcribed.srt |
94 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - UNIKERNEL APOCALYPSE BIG TROUBLE IN RING 0 - Spencer Michaels & Jeff Dileo.mp4 |
78.2 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - YET ANOTHER IOT HACK - Joshua Meyer.en.transcribed.srt |
38 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - YET ANOTHER IOT HACK - Joshua Meyer.mp4 |
29.2 MB |
Toorcon/ToorCon XX - 2018/ToorCon XX - YOU’RE NOT ALONE IN YOUR HOTEL ROOM - Michael Wylie.en.transcribed.srt |
57 KB |
Toorcon/ToorCon XX - 2018/ToorCon XX - YOU’RE NOT ALONE IN YOUR HOTEL ROOM - Michael Wylie.mp4 |
42.4 MB |
Toorcon/Toorcon logo.png |
97 KB |
Toorcon/Toorcon thank you.txt |
680 B |