44Con/44Con 2011/Communicating with the Boss, Steve Armstrong - 44CON 2011.mp4 |
123.7 MB |
44Con/44Con 2011/Penetration Testing Considered Harmful, Haroon Meer - 44CON 2011.mp4 |
102.6 MB |
44Con/44Con 2011/Systems Applications Proxy Pwnage, Ian De Villiers - 44CON 2011.mp4 |
96.8 MB |
44Con/44Con 2011/Terrorism, Tracking, Privacy And Human Interactions. Daniel Cuthbert & Glenn Wilkinson at 4CON 2012.mp4 |
134 MB |
44Con/44Con 2011/Trusteer Rapport, Neil Kettle - 44CON 2011.mp4 |
124 MB |
44Con/44Con 2011/USB Flash Drive Forensics, Philip Polstra - 44CON 2011.mp4 |
142.9 MB |
44Con/44Con 2011/Windows Pwn 7 OEM, Alex Plaskett - 44CON 2011.mp4 |
100.9 MB |
44Con/44Con 2012/2012 In Review Tor And The Censorship Arms Race. Runa A. Sandvik at 44CON 2012.mp4 |
111.7 MB |
44Con/44Con 2012/An Idiot Abroad. Don A. Bailey at 44CON 2012.mp4 |
100.4 MB |
44Con/44Con 2012/Cryptanalysis Of The Enigma Machine. Robert Weiss & Ben Gatti at 44CON 2012.mp4 |
132 MB |
44Con/44Con 2012/Hacking And Forensics On The Go. Phil Polstra at 44CON 2012.mp4 |
93.5 MB |
44Con/44Con 2012/I m The Butcher, Would You Like Some Beef Thomas Mackenzie & Michele Orru at 44CON 2012.mp4 |
124.7 MB |
44Con/44Con 2012/Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012.mp4 |
137.3 MB |
44Con/44Con 2012/Passive IPS Reconnaissance and Enumeration - false positive (ab)use - Arron Finnon.mp4 |
70.7 MB |
44Con/44Con 2012/Securing The Internet You re Doing It Wrong (An Infosec Intervention). Jayson Street at 44CON 2012.mp4 |
99.5 MB |
44Con/44Con 2012/Software Security Austerity. Ollie Whitehouse at 44CON 2012.mp4 |
66.5 MB |
44Con/44Con 2012/Surveillance Cameras..... Michael Viscuso at 44CON 2012.mp4 |
90.5 MB |
44Con/44Con 2013/44CON 2013 - A talk about (info-sec) talks - Haroon Meer.mp4 |
62.9 MB |
44Con/44Con 2013/44CON 2013 - Even More Tamagotchis Were Harmed... - Natalie Silvanovich.mp4 |
166.4 MB |
44Con/44Con 2013/44CON 2013 - Punking Punkbuster - Isaac Dawson.mp4 |
177 MB |
44Con/44Con 2013/44CON 2013 - Security Lessons from Dictators - Jerry Gamblin.mp4 |
151.4 MB |
44Con/44Con 2013/A Captive Audience - Jaime Cochran in 44CON 2013 Conference Videos.mp4 |
72.2 MB |
44Con/44Con 2013/A Fast Hard Disk with Active Antiforensics - Travis Godspeed in 44CON 2013 Conference Videos.mp4 |
158 MB |
44Con/44Con 2013/A talk about (info-sec) talks - Haroon Meer in 44CON 2013 Conference Videos.mp4 |
71.4 MB |
44Con/44Con 2013/Best Practices and the Future of Adaptive Authentication - Robert Weiss & Ben Gatti in 44CON 2013 Conference Videos.mp4 |
94.7 MB |
44Con/44Con 2013/Breaking Bad Programs - Don A. Bailey in 44CON 2013 Conference Videos.mp4 |
202 MB |
44Con/44Con 2013/Browser bug hunting - Memoirs of a last man standing - Atte Kettunen in 44CON 2013 Conference Videos.mp4 |
93.6 MB |
44Con/44Con 2013/Evading Identification and Detection by Messing with Binary Formats - Ange Albertini in 44CON 2013 Conference Videos.mp4 |
46.5 MB |
44Con/44Con 2013/Even More Tamagotchis Were Harmed in the Making of this Presentation - Natalie Silvanovich in 44CON 2013 Conference Videos.mp4 |
76.6 MB |
44Con/44Con 2013/Hack the Gibson - Exploiting Supercomputers - John Fitzpatrick & Luke Jennings in 44CON 2013 Conference Videos.mp4 |
121.1 MB |
44Con/44Con 2013/Honey I m Home - Hacking Z-Wave Home Automation Systems - Behrang Fouladi & Sahand Ghanoun in 44CON 2013 Conference Videos.mp4 |
88.1 MB |
44Con/44Con 2013/I miss LSD - Tim Brown in 44CON 2013 Conference Videos.mp4 |
105.6 MB |
44Con/44Con 2013/My quest into FM-RDS, Oona Raisanen in 44CON 2013 Conference Videos.mp4 |
83.9 MB |
44Con/44Con 2013/Punking Punkbuster - Isaac Dawson in 44CON 2013 Conference Videos.mp4 |
65.9 MB |
44Con/44Con 2013/Reversing and Exploiting BT CPE Devices - Zachary Cutlip in 44CON 2013 Conference Videos.mp4 |
57.2 MB |
44Con/44Con 2013/Security Lessons from Dictators - Jerry Gamblin in 44CON 2013 Conference Videos.mp4 |
61.5 MB |
44Con/44Con 2013/Signatureless Breach Detection Under The Microscope - Olli-Pekka Niemi & Antti Levomaki in 44CON 2013 Conference Videos.mp4 |
181.5 MB |
44Con/44Con 2013/Surviving the 0-day - Reducing the Window of Exposure - Andreas Lindh in 44CON 2013 Conference Videos.mp4 |
43.1 MB |
44Con/44Con 2013/The Forgers Art Exploiting XML Digital Signature Implementations - James Forshaw in 44CON 2013 Conference Videos.mp4 |
96.4 MB |
44Con/44Con 2013/dotNet Havoc - Manipulating Properties of Dormant Server Side Web Controls - Shay Chen in 44CON 2013 Conference Videos.mp4 |
90.5 MB |
44Con/44Con 2014/10 Simple Hardware Side Channel Attacks - Joe FitzPatrick in 44CON 2014.mp4 |
154.3 MB |
44Con/44Con 2014/44CON 2014 Conference Videos.mp4 |
25.4 MB |
44Con/44Con 2014/A Year in Recap I Am The Cavalry - Beau Woods in 44CON 2014.mp4 |
954 KB |
44Con/44Con 2014/Breaking AV Software - Joxean Koret in 44CON 2014.mp4 |
130.4 MB |
44Con/44Con 2014/Bug Bounties - Relationship Advice for the Hunters and the Hunted - Katie Moussouris in 44CON 2014.mp4 |
22.8 MB |
44Con/44Con 2014/Chopping Down Mountains - Don A. Bailey in 44CON 2014.mp4 |
130.4 MB |
44Con/44Con 2014/Darshak how to turn your phone into a low cost IMSI catcher device - Ravishankar Borgaonkar and Swapnil Udar in 44CON 2014.mp4 |
279.6 MB |
44Con/44Con 2014/Flushing Away Preconceptions of Risk - Thom Langford in 44CON 2014.mp4 |
76.8 MB |
44Con/44Con 2014/Goodbye 44CON 2014.mp4 |
279.6 MB |
44Con/44Con 2014/GreedyBTS Hacking Adventures in GSM - Hacker Fantastic in 44CON 2014.mp4 |
1.9 MB |
44Con/44Con 2014/Hot or not the hacker way - Dan Tentler in 44CON 2014.mp4 |
76.8 MB |
44Con/44Con 2014/I Hunt TR-069 Admins - Pwning ISPs Like a Boss, Shahar Tal in 44CON 2014.mp4 |
279.6 MB |
44Con/44Con 2014/I gave a talk about robots and hardware! - Josh Thomas in 44CON 2014.mp4 |
130.4 MB |
44Con/44Con 2014/Incident Handling with CyberCPR - Mike Antcliffe Steve Armstrong Ed Tredgett in 44CON 2014.mp4 |
76.8 MB |
44Con/44Con 2014/Lessons Learned from Black Hat s Infrastructure - The Tweets Must Flow Conan Dooley in 44CON 2014.mp4 |
130.4 MB |
44Con/44Con 2014/Manna from Heaven Improving the state of wireless rogue AP attacks Dominic White in 44CON 2014.mp4 |
279.6 MB |
44Con/44Con 2014/Meterpreter Internals - OJ Reeves in 44CON 2014.mp4 |
279.6 MB |
44Con/44Con 2014/On Her Majestys Secret Service GRX and a Spy Agency - Stephen Kho in 44CON 2014.mp4 |
171.5 MB |
44Con/44Con 2014/Pandas Bears and Goldern Hamsters Automating malware triage and recent campaign analysis - David Cannings in 44CON 2014.mp4 |
76.8 MB |
44Con/44Con 2014/Payment applications handle lots of money. No really lots of it. Alberto Revelli and Mark Swift in 44CON 2014.mp4 |
51.2 MB |
44Con/44Con 2014/Pentesting NoSQL DB s Using NoSQL Exploitation Framework - Francis Alexander in 44CON 2014.mp4 |
51.2 MB |
44Con/44Con 2014/Researching Android Device Security with the Help of a Droid Army - Joshua J. Drake in 44CON 2014.mp4 |
130.4 MB |
44Con/44Con 2014/Security Analytics Beyond Cyber - Phil Huggins in 44CON 2014.mp4 |
51.2 MB |
44Con/44Con 2014/Side Channel attacks in the cloud - Gorka Irazoqui Apecechea in 44CON 2014.mp4 |
171.5 MB |
44Con/44Con 2014/Social Engineering Your Own - Developing An Awareness Training Program That Actually Works - Valerie Thomas in 44CON 2014.mp4 |
171.5 MB |
44Con/44Con 2014/Stupid PCIe Tricks - Joe FitzPatrick in 44CON 2014.mp4 |
171.5 MB |
44Con/44Con 2014/Top 5 Media Fails - Dan Raywood in 44CON 2014.mp4 |
51.2 MB |
44Con/44Con 2014/Using Hadoop for Malware Network Forensics and Log analysis - Michael Boman in 44CON 2014.mp4 |
51.2 MB |
44Con/44Con 2014/What Did You Just Say To Me - Jerry Gamblin in 44CON 2014.mp4 |
76.8 MB |
44Con/44Con 2014/When Documents Bite - Vlad Ovtchinikov in 44CON 2014.mp4 |
171.5 MB |
44Con/44Con 2015/44CON CyberSecurity 2015 - Checksec in 44CON CS 2015.mp4 |
25.4 MB |
44Con/44Con 2015/44CON CyberSecurity 2015 - Digital Shadows in 44CON CS 2015.mp4 |
57.2 MB |
44Con/44Con 2015/44CON CyberSecurity 2015 - F-Secure in 44CON CS 2015.mp4 |
24.4 MB |
44Con/44Con 2015/44CON CyberSecurity 2015 - F-Secure party - Mikko in 44CON CS 2015.mp4 |
25.4 MB |
44Con/44Con 2015/44CON CyberSecurity 2015 - Jerry Gamblin in 44CON CS 2015.mp4 |
57.2 MB |
44Con/44Con 2015/44CON CyberSecurity 2015 - Logically Secure in 44CON CS 2015.mp4 |
57.2 MB |
44Con/44Con 2015/44CON CyberSecurity 2015 - PQChat in 44CON CS 2015.mp4 |
57.2 MB |
44Con/44Con 2015/44CON CyberSecurity 2015 - Quentyn Taylor in 44CON CS 2015.mp4 |
25.4 MB |
44Con/44Con 2015/44CON CyberSecurity 2015 - Track 1 - Jessica Barker in 44CON CS 2015.mp4 |
57.2 MB |
44Con/44Con 2015/44CON Cybersecurity 2015 - NCC in 44CON CS 2015.mp4 |
24.4 MB |
44Con/44Con 2015/44CON Cybersecurity 2015 - Track 1 - Phil Huggins in 44CON CS 2015.mp4 |
25.4 MB |
44Con/44Con 2015/Analyzing Malicious Office Documents - Presented By Didier Stevens (Workshop).mp4 |
230.6 MB |
44Con/44Con 2015/Attacking VxWorks from Stone Age to Interstellar - Presented By Yannick Formaggio.mp4 |
60.3 MB |
44Con/44Con 2015/Barbarians At The Gate(way) An Examination Of The Attacker Tool Box - Presented By Dave Lewis.mp4 |
179.4 MB |
44Con/44Con 2015/DDoS mitigation EPIC FAIL collection - Presented By Moshe Zioni.mp4 |
70.2 MB |
44Con/44Con 2015/Dark Fairytales from a Phisherman (Vol.II) - Presented By Michele Orru.mp4 |
103.7 MB |
44Con/44Con 2015/Exploiting 64-bit IE on Windows 8.1 and The Pwn2Own Case Study - Presented By Yuki Chen and Linan Hao.mp4 |
71.4 MB |
44Con/44Con 2015/Forging the USB armory Presented By Andrea Barisani in 44CON London 2015.mp4 |
123 MB |
44Con/44Con 2015/Get in the Ring0 &ndash_ Understanding Windows drivers - Presented By Graham Sutherland.mp4 |
103.7 MB |
44Con/44Con 2015/Going AUTH the Rails on a Crazy Train - Presented By Tomek Rabczak and Jeff Jarmoc.mp4 |
100.3 MB |
44Con/44Con 2015/Hackers in the Wire and Drones Oh My! - Presented By Philip Polstra.mp4 |
167.9 MB |
44Con/44Con 2015/How to drive a malware analyst crazy - Presented By Michael Boman.mp4 |
77.5 MB |
44Con/44Con 2015/Hunting Asynchronous Vulnerabilities - Presented By James Kettle.mp4 |
140.5 MB |
44Con/44Con 2015/Indicators of Compromise From malware analysis to eradication - Presented By Michael Boman (Workshop).mp4 |
123 MB |
44Con/44Con 2015/Inside Terracotta VPN - Presented By Kent Backman.mp4 |
8.7 MB |
44Con/44Con 2015/Introduction to Reverse Engineering C++ - Presented By Angel M. Villegas (Workshop).mp4 |
167.9 MB |
44Con/44Con 2015/Is there an EFI monster inside your apple - Presented By Pedro Vila.mp4 |
105.6 MB |
44Con/44Con 2015/Jtagsploitation 5 wires 5 ways to root - Presented By Joe FitzPatrick and Matt King.mp4 |
167.9 MB |
44Con/44Con 2015/MITMf Bringing Man-In-The-Middle attacks to the 21st century - Presented ByMarcello Salvati.mp4 |
140.5 MB |
44Con/44Con 2015/Meterpreter Understanding the New Shiny - Presented By OJ Reeves.mp4 |
184.4 MB |
44Con/44Con 2015/Old Dog New Tricks Forensics With PowerShell - Presented By Jared Atkinson.mp4 |
167.9 MB |
44Con/44Con 2015/Responsible disclosure who cares - Presented By OJ Reeves and Dan Tentler.mp4 |
43.8 MB |
44Con/44Con 2015/Reverse engineering and exploiting font rasterizers the OpenType saga - Presented By Mateusz Jurczyk.mp4 |
167.9 MB |
44Con/44Con 2015/Smart Muttering a story and toolset for smart meter platform - Presented By Ian de Villiers.mp4 |
103.7 MB |
44Con/44Con 2015/Software Defined Networking (SDN) Security - Presented By David Jorm.mp4 |
71.4 MB |
44Con/44Con 2015/Stegosploit Drive-by Browser Exploits using only Images - Presented By Saumil Shah.mp4 |
107.3 MB |
44Con/44Con 2015/Windows 10 2 Steps Forward 1 Step Back - Presented By James Forshaw.mp4 |
104 MB |
44Con/44Con 2016/2016 The Infosec Crossroads - Presented By Saumil Shah.mp4 |
90.5 MB |
44Con/44Con 2016/Data protection, privacy and cloud computing navigating legal compliance - Presented By Graham McKay.mp4 |
140.6 MB |
44Con/44Con 2016/Effortless, Agentless Breach Detection in the Enterprise Token all the Things! - Presented By Azhar Desai &_ Nicholas Rohrbeck.mp4 |
118.1 MB |
44Con/44Con 2016/Frictionless Security - Presented by Jerry Gamblin (2).mp4 |
57.9 MB |
44Con/44Con 2016/Frictionless Security - Presented by Jerry Gamblin.mp4 |
57.9 MB |
44Con/44Con 2016/Jittery MacGyver Lessons Learned from Building a Bionic Hand out of a Coffee Maker - Presented By Evan Booth.mp4 |
173.4 MB |
44Con/44Con 2016/Light at the End of the Tunnel. (Hope for Team Defence) - Presented by Haroon Meer.mp4 |
108 MB |
44Con/44Con 2016/Managing Incidents with CyberCPR - Presented By Steve Armstrong.mp4 |
124.5 MB |
44Con/44Con 2016/Saving Nostalgia Modding an Old Z80 Computer - Presented By Graham Sutherland.mp4 |
111.9 MB |
44Con/44Con 2016/The Frugal Girl&rsquo_s Guide to Threat Intelligence - Presented By Rebekah Brown.mp4 |
155.2 MB |
44Con/44Con 2016/Three decades in security. What&rsquo_s changed, and what hasn&rsquo_t - Presented by Robert Schifreen.mp4 |
146.5 MB |
44Con/44Con 2016/Trusts you might have missed - Presented by Will Schroeder.mp4 |
148.7 MB |
44Con/44Con 2016/Universal Serial aBUSe Remote Physical Access Attacks - Presented By Rogan Dawes &_ Dominic White.mp4 |
77 MB |
44Con/44Con 2016/What it Means to Have the C Word in the National Security Agenda - Presented By Emil Tan.mp4 |
114.5 MB |
44Con/44Con 2017/A Hands On Introduction To Software Defined Radio - Didier Stevens at 44CON 2017 - Workshop.en.transcribed.srt |
153 KB |
44Con/44Con 2017/A Hands On Introduction To Software Defined Radio - Didier Stevens at 44CON 2017 - Workshop.mp4 |
374.6 MB |
44Con/44Con 2017/ARM Assembly and Shellcode Basics - Saumil Shah at 44CON 2017 - Workshop.en.transcribed.srt |
234 KB |
44Con/44Con 2017/ARM Assembly and Shellcode Basics - Saumil Shah at 44CON 2017 - Workshop.mp4 |
406.1 MB |
44Con/44Con 2017/BaRMIe - Poking Java's Back Door - Nicky Bloor at 44CON 2017.en.transcribed.srt |
95 KB |
44Con/44Con 2017/BaRMIe - Poking Java's Back Door - Nicky Bloor at 44CON 2017.mp4 |
140.5 MB |
44Con/44Con 2017/Biting the Apple that feeds you - Alex Plaskett and James Loureiro at 44CON 2017.en.transcribed.srt |
110 KB |
44Con/44Con 2017/Biting the Apple that feeds you - Alex Plaskett and James Loureiro at 44CON 2017.mp4 |
117.5 MB |
44Con/44Con 2017/Breaking Historical Ciphers with Modern Algorithms - Klaus Schmeh at 44CON 2017.mp4 |
183.1 MB |
44Con/44Con 2017/Checking BIOS protections offline with just the firmware updates - Yuriy Bulygin at 44CON 2017.en.transcribed.srt |
96 KB |
44Con/44Con 2017/Checking BIOS protections offline with just the firmware updates - Yuriy Bulygin at 44CON 2017.mp4 |
136.8 MB |
44Con/44Con 2017/Chkrootkit Eating APTs for breakfast since 1997 - Nelson Murilo at 44CON 2017.en.transcribed.srt |
49 KB |
44Con/44Con 2017/Chkrootkit Eating APTs for breakfast since 1997 - Nelson Murilo at 44CON 2017.mp4 |
105.5 MB |
44Con/44Con 2017/Cisco ASA Episode 2 Striking back - Internals and Mitigations - Cedric Halbronn.en.transcribed.srt |
124 KB |
44Con/44Con 2017/Cisco ASA Episode 2 Striking back - Internals and Mitigations - Cedric Halbronn.mp4 |
148.6 MB |
44Con/44Con 2017/Cracking HiTag2 Crypto - Kevin Sheldrake at 44CON 2017 - Workshop.en.transcribed.srt |
248 KB |
44Con/44Con 2017/Cracking HiTag2 Crypto - Kevin Sheldrake at 44CON 2017 - Workshop.mp4 |
338 MB |
44Con/44Con 2017/Cracking HiTag2 Crypto - Kevin Sheldrake at 44CON 2017.en.transcribed.srt |
129 KB |
44Con/44Con 2017/Cracking HiTag2 Crypto - Kevin Sheldrake at 44CON 2017.mp4 |
145.9 MB |
44Con/44Con 2017/Hide Yo Keys, Hide Yo Car - Aaron Guzman at 44CON 2017.en.transcribed.srt |
96 KB |
44Con/44Con 2017/Hide Yo Keys, Hide Yo Car - Aaron Guzman at 44CON 2017.mp4 |
116.6 MB |
44Con/44Con 2017/How to Hack Radios RF Physical Layers - Matt Knight and Marc Newlin at 44CON 2017 - Workshop.en.transcribed.srt |
276 KB |
44Con/44Con 2017/How to Hack Radios RF Physical Layers - Matt Knight and Marc Newlin at 44CON 2017 - Workshop.mp4 |
388 MB |
44Con/44Con 2017/Hypervisor-Assisted Ring0 Debugging with radare2 - Lars Haukli at 44CON 2017.en.transcribed.srt |
83 KB |
44Con/44Con 2017/Hypervisor-Assisted Ring0 Debugging with radare2 - Lars Haukli at 44CON 2017.mp4 |
160.6 MB |
44Con/44Con 2017/Inside Android's SafetyNet Attestation - Colin Mulliner at 44CON 2017.en.transcribed.srt |
162 KB |
44Con/44Con 2017/Inside Android's SafetyNet Attestation - Colin Mulliner at 44CON 2017.mp4 |
189.7 MB |
44Con/44Con 2017/Lessons Learned Hunting IoT Malware - Olivier Bilodeau at 44CON 2017.en.transcribed.srt |
131 KB |
44Con/44Con 2017/Lessons Learned Hunting IoT Malware - Olivier Bilodeau at 44CON 2017.mp4 |
138.5 MB |
44Con/44Con 2017/Persisting with Microsoft Office Abusing Extensibility Options - William Knowles at 44CON 2017.en.transcribed.srt |
116 KB |
44Con/44Con 2017/Persisting with Microsoft Office Abusing Extensibility Options - William Knowles at 44CON 2017.mp4 |
116.7 MB |
44Con/44Con 2017/Red Team Revenge Attacking Microsoft ATA - Nikhil Mittal at 44CON 2017.en.transcribed.srt |
114 KB |
44Con/44Con 2017/Red Team Revenge Attacking Microsoft ATA - Nikhil Mittal at 44CON 2017.mp4 |
179.3 MB |
44Con/44Con 2017/Reverse Engineering Windows Malware 101 Workshop - Amanda Rousseau at 44CON 2017 - Workshop.en.transcribed.srt |
181 KB |
44Con/44Con 2017/Reverse Engineering Windows Malware 101 Workshop - Amanda Rousseau at 44CON 2017 - Workshop.mp4 |
298.9 MB |
44Con/44Con 2017/Secrets Of The Motherboard (Shit My Chipset Says) - Graham Sutherland at 44CON 2017.en.transcribed.srt |
109 KB |
44Con/44Con 2017/Secrets Of The Motherboard (Shit My Chipset Says) - Graham Sutherland at 44CON 2017.mp4 |
118.8 MB |
44Con/44Con 2017/See no evil, hear no evil - Matt Wixey at 44CON 2017.en.transcribed.srt |
108 KB |
44Con/44Con 2017/See no evil, hear no evil - Matt Wixey at 44CON 2017.mp4 |
140.4 MB |
44Con/44Con 2017/So You Want to Hack Radios - Marc Newlin and Matt Knight at 44CON 2017.en.transcribed.srt |
162 KB |
44Con/44Con 2017/So You Want to Hack Radios - Marc Newlin and Matt Knight at 44CON 2017.mp4 |
141 MB |
44Con/44Con 2017/Subgraph OS Hardening a Linux Desktop - David Mirza Ahmad at 44CON 2017.en.transcribed.srt |
133 KB |
44Con/44Con 2017/Subgraph OS Hardening a Linux Desktop - David Mirza Ahmad at 44CON 2017.mp4 |
160.4 MB |
44Con/44Con 2017/The Black Art of Wireless Post-Exploitation - Gabriel Ryan at 44CON 2017.en.transcribed.srt |
137 KB |
44Con/44Con 2017/The Black Art of Wireless Post-Exploitation - Gabriel Ryan at 44CON 2017.mp4 |
42.5 MB |
44Con/44Con 2017/The Internet of Us - Don A. Bailey at 44CON 2017.en.transcribed.srt |
125 KB |
44Con/44Con 2017/The Internet of Us - Don A. Bailey at 44CON 2017.mp4 |
133.1 MB |
44Con/44Con 2018/Automating myself out of a job - Jay Harris at 44CON 2018.en.transcribed.srt |
82 KB |
44Con/44Con 2018/Automating myself out of a job - Jay Harris at 44CON 2018.mp4 |
124.8 MB |
44Con/44Con 2018/Bypassing Port-Security In 2018 Defeating MacSEC and 802.1x-2010 - Gabriel Ryan at 44CON 2018.en.transcribed.srt |
108 KB |
44Con/44Con 2018/Bypassing Port-Security In 2018 Defeating MacSEC and 802.1x-2010 - Gabriel Ryan at 44CON 2018.mp4 |
140.2 MB |
44Con/44Con 2018/Catch Me If You Can - Shubham Shah & Michael Gianarakis at 44CON 2018.en.transcribed.srt |
60 KB |
44Con/44Con 2018/Catch Me If You Can - Shubham Shah & Michael Gianarakis at 44CON 2018.mp4 |
88.3 MB |
44Con/44Con 2018/Code of Practice for Security in Consumer IoT Products and Services - David Rogers at 44CON 2018.en.transcribed.srt |
74 KB |
44Con/44Con 2018/Code of Practice for Security in Consumer IoT Products and Services - David Rogers at 44CON 2018.mp4 |
122.4 MB |
44Con/44Con 2018/Exploits with Scratch - Kev Sheldrake at 44CON 2018.en.transcribed.srt |
81 KB |
44Con/44Con 2018/Exploits with Scratch - Kev Sheldrake at 44CON 2018.mp4 |
174.9 MB |
44Con/44Con 2018/For the Love of Money - Leighanne Galloway & Tim Yunusov at 44CON 2018.mp4 |
115.3 MB |
44Con/44Con 2018/Ghost in the Locks - Timo Hirvonen & Tomi Tuominen at 44CON 2018.en.transcribed.srt |
62 KB |
44Con/44Con 2018/Ghost in the Locks - Timo Hirvonen & Tomi Tuominen at 44CON 2018.mp4 |
144.5 MB |
44Con/44Con 2018/How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus Schmeh at 44CON 2018.mp4 |
173 MB |
44Con/44Con 2018/JARVIS never saw it coming - Guy Barnhart-Magen & Ezra Caltum at 44CON 2018.en.transcribed.srt |
99 KB |
44Con/44Con 2018/JARVIS never saw it coming - Guy Barnhart-Magen & Ezra Caltum at 44CON 2018.mp4 |
150 MB |
44Con/44Con 2018/Kill All Humans... Bugs! - Philippe Arteau at 44CON 2018.en.transcribed.srt |
72 KB |
44Con/44Con 2018/Kill All Humans... Bugs! - Philippe Arteau at 44CON 2018.mp4 |
152.2 MB |
44Con/44Con 2018/Make ARM Shellcode Great Again - Saumil Shah at 44CON 2018.en.transcribed.srt |
73 KB |
44Con/44Con 2018/Make ARM Shellcode Great Again - Saumil Shah at 44CON 2018.mp4 |
158.1 MB |
44Con/44Con 2018/Pwning the 44CON Nerf gun - PTP at 44CON 2018.mp4 |
84.9 MB |
44Con/44Con 2018/Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim at 44CON 2018.en.transcribed.srt |
56 KB |
44Con/44Con 2018/Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim at 44CON 2018.mp4 |
132.1 MB |
44Con/44Con 2018/Security Module for PHP7 - Julien Voisin & Thibault Koechlin at 44CON 2018.en.transcribed.srt |
57 KB |
44Con/44Con 2018/Security Module for PHP7 - Julien Voisin & Thibault Koechlin at 44CON 2018.mp4 |
131.7 MB |
44Con/44Con 2018/So You Want to Red Team - Lawrence Munro & Matt Lorentzen at 44CON 2018.en.transcribed.srt |
108 KB |
44Con/44Con 2018/So You Want to Red Team - Lawrence Munro & Matt Lorentzen at 44CON 2018.mp4 |
207.6 MB |
44Con/44Con 2018/They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzog at 44CON 2018.en.transcribed.srt |
65 KB |
44Con/44Con 2018/They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzog at 44CON 2018.mp4 |
117.9 MB |
44Con/44Con 2018/Using SmartNICs to Provide Better Data Center Security - Jack Matheson at 44CON 2018.en.transcribed.srt |
122 KB |
44Con/44Con 2018/Using SmartNICs to Provide Better Data Center Security - Jack Matheson at 44CON 2018.mp4 |
225.3 MB |
44Con/44Con 2018/Weak Analogies make Poor Realities - Charl Van Der Walt at 44CON 2018.en.transcribed.srt |
117 KB |
44Con/44Con 2018/Weak Analogies make Poor Realities - Charl Van Der Walt at 44CON 2018.mp4 |
163.5 MB |
44Con/44Con logo.png |
9 KB |
44Con/44Con thank you.txt |
705 B |