BITCQ

TROOPERS

Size: 69 GB
Magnet link

Name Size
TROOPERS/TROOPERS 2008/TROOPERS08.org_AMATO Francisco - evilgrade.mp4 2.9 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_BELENKO Andrej - password recovery.mp4 154 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_BRANCO Rodrigo - KIDS.mp4 160.4 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_BRATUS Sergey - AP fingerprinting.bak.mp4 107 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_BRATUS Sergey - Organizing and analyzing logdata with entropy.mp4 166 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_CALLAS Jon - Straight Talk abaou Crypto.mp4 165.8 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_CHIESA Raoul - SCADA and national critical infrastructures.mp4 151.7 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_DJB - Keynote.mp4 161.7 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_De Haas Job - Side channel analysis.mp4 161.8 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_HOFF Christopher - Virtualization Floor Wax & Dessert Topping.mp4 174.2 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_HOLZ Thorsten - virtual-honeypots.mp4 153.9 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_KEMP Michael - virtualise.mp4 143.7 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_KLOSE Roger - ERNW_ESX-In-Security.mp4 102.5 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_KORNBRUS Alexandert - Hardening oracle in corporate environments.mp4 141 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_Kuhn Friedwart - RMS.mp4 162.3 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_LOGLOGIC - log management.mp4 156.4 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_ROECHER Dror-John - the data went down the drain.mp4 152.2 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_SPEICHERT Horst - hackertools according to german law.mp4 162.2 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_STREHLE Rolf - self defending networks.mp4 160.3 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_THUMANN Michael - Reversing.mp4 154.7 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_THUMANN Michael - Secondlife (TM).mp4 157.9 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_Troopers IBM Appscan.mp4 154.2 MB
TROOPERS/TROOPERS 2008/TROOPERS08.org_WAISSBEIN Ariel - penetration testing learning kit.mp4 162.9 MB
TROOPERS/TROOPERS 2008/TROOPERS09_baier_access_control_service.mp4 138.2 MB
TROOPERS/TROOPERS 2008/TROOPERS09_bratus_embedded_devices.mp4 105.8 MB
TROOPERS/TROOPERS 2008/TROOPERS09_gauci_henrique_web_application_firewalls.mp4 55 MB
TROOPERS/TROOPERS 2008/TROOPERS09_rey_keynote_stop_the_madness.mp4 27.4 MB
TROOPERS/TROOPERS 2008/TROOPERS09_rey_ruediger_codenomicon_fuzzer.mp4 84.5 MB
TROOPERS/TROOPERS 2009/TROOPERS09 - .NET Access Control Service - Dominick Baier.mp4 84.9 MB
TROOPERS/TROOPERS 2009/TROOPERS09 - .NET Access Control Service - Dominick Baier.srt 49 KB
TROOPERS/TROOPERS 2009/TROOPERS09 - Stop the Madness - Keynote by Enno Rey.mp4 60.1 MB
TROOPERS/TROOPERS 2009/TROOPERS09 - Stop the Madness - Keynote by Enno Rey.srt 51 KB
TROOPERS/TROOPERS 2009/TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.mp4 133.8 MB
TROOPERS/TROOPERS 2009/TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.srt 39 KB
TROOPERS/TROOPERS 2009/TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.mp4 45.7 MB
TROOPERS/TROOPERS 2009/TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.srt 15 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.mp4 170.6 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.srt 83 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.mp4 103.4 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.srt 70 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.mp4 142 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.srt 93 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.mp4 88 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.srt 59 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.mp4 97.7 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.srt 89 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.mp4 136.6 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.srt 82 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - How to fail an audit - Martin Freiss.mp4 120.2 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - How to rate the security of closed source software - Michael Thumann.mp4 136 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - How to rate the security of closed source software - Michael Thumann.srt 72 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.mp4 158.8 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.srt 118 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - Netscreen of Death - Graeme Neilson.mp4 130 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - Netscreen of Death - Graeme Neilson.srt 82 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - Rapid Risk Assessment - Enno Rey.mp4 115.8 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - Rapid Risk Assessment - Enno Rey.srt 84 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - Return Oriented Rootkits - Ralf Hund.mp4 114.7 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - Return Oriented Rootkits - Ralf Hund.srt 83 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.mp4 107.8 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.srt 31 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.mp4 99.6 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.srt 68 KB
TROOPERS/TROOPERS 2010/TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.mp4 48.2 MB
TROOPERS/TROOPERS 2010/TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.srt 33 KB
TROOPERS/TROOPERS 2011/TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.mp4 133.7 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.srt 78 KB
TROOPERS/TROOPERS 2011/TROOPERS11 - Cache on Delivery - Marco Slaviero.mp4 112.5 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - Cache on Delivery - Marco Slaviero.srt 76 KB
TROOPERS/TROOPERS 2011/TROOPERS11 - Do you know what s happening in your $application - Felix Leder.mp4 152.6 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - Do you know what s happening in your $application - Felix Leder.srt 92 KB
TROOPERS/TROOPERS 2011/TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.mp4 88.6 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.srt 75 KB
TROOPERS/TROOPERS 2011/TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.mp4 88.1 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.srt 56 KB
TROOPERS/TROOPERS 2011/TROOPERS11 - I FOCA a MIL Domain - Chema Alonso.mp4 82.5 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - Keynote Day 1 - Enno Rey.mp4 77.1 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - Keynote Day 1 - Enno Rey.srt 67 KB
TROOPERS/TROOPERS 2011/TROOPERS11 - Keynote Day 2 - Richard Thieme.mp4 154.1 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - Keynote Day 2 - Richard Thieme.srt 98 KB
TROOPERS/TROOPERS 2011/TROOPERS11 - Milking a horse - Meder Kydyraliev.mp4 67.8 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - Milking a horse - Meder Kydyraliev.srt 73 KB
TROOPERS/TROOPERS 2011/TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.mp4 97.8 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.srt 51 KB
TROOPERS/TROOPERS 2011/TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.mp4 77.3 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.srt 37 KB
TROOPERS/TROOPERS 2011/TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.mp4 48.5 MB
TROOPERS/TROOPERS 2011/TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.srt 38 KB
TROOPERS/TROOPERS 2012/TROOPERS12 - Closing Remarks.mp4 19.8 MB
TROOPERS/TROOPERS 2012/TROOPERS12 - Opening Teaser.mp4 20.2 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.mp4 177.2 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.srt 14 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.mp4 184.4 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.srt 43 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.mp4 613.8 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.srt 72 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.mp4 38.5 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.srt 43 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.mp4 107.3 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.srt 49 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.mp4 350.2 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.srt 60 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Hacking and Craft - Jeff Gough.mp4 332.4 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Hacking and Craft - Jeff Gough.srt 66 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.mp4 361.3 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.srt 70 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Keynote Day 1 by Rodrigo Branco.mp4 467.6 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Keynote Day 1 by Rodrigo Branco.srt 119 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Keynote Day 2 by Chris Nickerson.mp4 270.8 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Keynote Day 2 by Chris Nickerson.srt 72 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.mp4 692.1 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.srt 83 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.mp4 395.7 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.srt 73 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.mp4 574.4 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.srt 66 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.mp4 519.8 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.srt 93 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.mp4 258.3 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.srt 68 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.mp4 254 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.srt 75 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.mp4 371 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.srt 70 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.mp4 38.9 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.srt 66 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.mp4 214 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.srt 73 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.mp4 669.6 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.srt 70 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - We Came In Peace - They Don t Hackers vs. CyberWar - fx.srt 79 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.mp4 427.3 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.srt 81 KB
TROOPERS/TROOPERS 2013/TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.mp4 372.7 MB
TROOPERS/TROOPERS 2013/TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.srt 61 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.mp4 254.1 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.srt 71 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.mp4 305.7 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.srt 55 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.mp4 130 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.srt 40 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Closing Remarks - Enno Rey.mp4 194.4 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Closing Remarks - Enno Rey.srt 26 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).mp4 311.3 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).srt 80 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Georg Bakos - Keynote.mp4 505.3 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.mp4 289.5 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.srt 86 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Granular Trust; making it work - Toby Kohlenberg.srt 91 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Granular Trust_ making it work - Toby Kohlenberg.mp4 411.6 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - How I Latch on Me and Protect My Digital Life against Passwords - Chema Alonso.mp4 238.9 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - How to Work towards Pharma Compliance for Cloud Computing - Martijn Jansen.mp4 246.3 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.mp4 384.9 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.srt 54 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.mp4 276.3 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.srt 43 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Keynote - FX.mp4 88.9 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.mp4 389.7 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.srt 42 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.mp4 339.3 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.srt 91 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.mp4 160.3 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.srt 78 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.mp4 381.6 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.srt 63 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Psychology of Security - Stefan Schumacher.mp4 237.9 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Psychology of Security - Stefan Schumacher.srt 84 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.mp4 399.3 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.srt 69 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.mp4 363.8 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.srt 71 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.mp4 340.2 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.srt 61 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.mp4 32.7 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.srt 68 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.mp4 295.3 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.srt 85 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.mp4 260.2 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.srt 63 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.mp4 39.2 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.srt 57 KB
TROOPERS/TROOPERS 2014/TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.mp4 5.9 MB
TROOPERS/TROOPERS 2014/TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.srt 29 KB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.mp4 1.7 GB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.srt 96 KB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).mp4 1.8 GB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).srt 113 KB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Basic Attacks and Defences (2 2).mp4 715.7 MB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.mp4 1.5 GB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.srt 104 KB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.mp4 952.1 MB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.srt 65 KB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Enno Rey - 48 Considered Harmful.mp4 1.1 GB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Enno Rey - 48 Considered Harmful.srt 65 KB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Enno Rey - Reliable & Secure DHCPv6.mp4 716.8 MB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Eric Vyncke - Routing Header Is Back... Should We Panic.mp4 342.6 MB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.mp4 1.8 GB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.srt 123 KB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.mp4 1.7 GB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.srt 139 KB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Gabriel Muller - .1.3.6.1.2.1.4.31.1.1 - Hello, anybody there.mp4 574.4 MB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Ivan Pepelnjak - IPv6 Microsegmentation Done Right.mp4 329.2 MB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Jayzon Salazar, Enno Rey, Antonios Atlasis - MLD Considered Harmful.mp4 715.4 MB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Julian Bangert - Tales of 6006 Protocols.mp4 264.6 MB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.mp4 1.9 GB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.srt 124 KB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.mp4 496.9 MB
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.srt 83 KB
TROOPERS/TROOPERS 2015/TROOPERS15 - Welcome Trailer.mp4 9.1 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Andreas Lindh - Defender Economics.mp4 139.8 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Andreas Lindh - Defender Economics.srt 61 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Ange Albertini, Kurt Pfeifle - Advanced PDF Tricks.mp4 701 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.mp4 277.7 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.srt 50 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.mp4 312.3 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.srt 54 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.mp4 215.7 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.srt 95 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.mp4 335.8 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.srt 75 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.mp4 227.5 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.srt 69 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.mp4 220.3 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.srt 48 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Enno Rey - Opening Remarks.mp4 66.7 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Enno Rey - Opening Remarks.srt 9 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Ertunga Arsal - SAP, Credit Cards and the Bird that Talks Too Much.mp4 280.5 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.mp4 263.4 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.srt 66 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.mp4 268.8 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.srt 82 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.mp4 236.9 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.srt 65 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.mp4 173.5 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.srt 38 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Haroon Meer - Keynote.mp4 163.5 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Haroon Meer - Keynote.srt 94 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Ivan Pepelnjak - Automating Network Security.mp4 112.9 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Ivan Pepelnjak - Automating Network Security.srt 71 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.mp4 220.2 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.srt 84 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.mp4 314.4 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.srt 66 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.mp4 472.2 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.srt 87 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Martijn Grooten - The State of Email in 2015.mp4 87.1 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Martijn Grooten - The State of Email in 2015.srt 65 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.mp4 217.2 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.srt 78 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.mp4 281.8 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.srt 86 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.mp4 440.5 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.srt 86 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.mp4 152.4 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.srt 95 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.mp4 235.8 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.srt 72 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergej Bratus - Keynote.mp4 304 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergej Bratus - Keynote.srt 84 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.mp4 135.3 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.srt 46 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.mp4 232 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.srt 71 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.mp4 152.4 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.srt 67 KB
TROOPERS/TROOPERS 2015/[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.mp4 204.3 MB
TROOPERS/TROOPERS 2015/[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.srt 77 KB
TROOPERS/TROOPERS 2016 IPv6 Summit/Advanced IPv6 Attacks Using Chiron Training.mp4 705.8 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/Advanced IPv6 Network Reconnaisance.mp4 484.8 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/Anonymization IPv6 in PCAPs - Challenges and Wins.mp4 183.3 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/Automating IPv6 Deployments.mp4 127.4 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/Basic Attacks and Mitigation Strategies.mp4 437.4 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/Building a Reliable and Secure IPv6 WiFi Network.mp4 218.8 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/Developing an Enterprise IPv6 Security Strategy.mp4 211.2 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/IPv6 First Hop Security Features on HP Devices.mp4 128.4 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/IPv6 Security Fundamentals.mp4 364.3 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/NATTED - A Field Report.mp4 208.5 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/Recent IPv6 Standardization Efforts.mp4 400.6 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/Remote Access and Business Partner Connections.mp4 265.2 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/Security Aspects of IPv6 Multi-Interface and Source Destination Routing.mp4 107.9 MB
TROOPERS/TROOPERS 2016 IPv6 Summit/Security Assessment of Microsoft DirectAccess.mp4 199.6 MB
TROOPERS/TROOPERS 2016/An unknown SAP default Account.mp4 189.6 MB
TROOPERS/TROOPERS 2016/Attacking Nextgen Firewalls.mp4 254.3 MB
TROOPERS/TROOPERS 2016/Attacking and Protecting Big Data Environments.mp4 154.4 MB
TROOPERS/TROOPERS 2016/Better Crypto.mp4 80 MB
TROOPERS/TROOPERS 2016/Broadcasting your Attack.mp4 203.5 MB
TROOPERS/TROOPERS 2016/Caring for File Formats.mp4 91.5 MB
TROOPERS/TROOPERS 2016/Closing Remarks.mp4 310 MB
TROOPERS/TROOPERS 2016/Crypto Code.mp4 100.4 MB
TROOPERS/TROOPERS 2016/Deep dive into SAP archive file formats.mp4 241.9 MB
TROOPERS/TROOPERS 2016/Exploiting the Unexploitable.mp4 187.6 MB
TROOPERS/TROOPERS 2016/Freifunk.mp4 65.9 MB
TROOPERS/TROOPERS 2016/Hiding your White Box Designs is Not Enough.mp4 256.2 MB
TROOPERS/TROOPERS 2016/Hollywood Hacking Facts and Fiction.mp4 150.4 MB
TROOPERS/TROOPERS 2016/How to Implement an SDL in a Large Company.mp4 89.2 MB
TROOPERS/TROOPERS 2016/Imma Chargin Mah Lazer.mp4 240.9 MB
TROOPERS/TROOPERS 2016/Keynote - A Praise for Hackers.mp4 300.1 MB
TROOPERS/TROOPERS 2016/Keynote - Ethics in Networked Systems Research.mp4 184.6 MB
TROOPERS/TROOPERS 2016/Lets Play Hide and Seek in the Cloud.mp4 23.1 MB
TROOPERS/TROOPERS 2016/Medical Device Security Hack or Hype.mp4 246.4 MB
TROOPERS/TROOPERS 2016/Mind The Gap.mp4 110.2 MB
TROOPERS/TROOPERS 2016/Offensive Active Directory with Powershell.mp4 114.1 MB
TROOPERS/TROOPERS 2016/One Tool To Rule Them All.mp4 24.7 MB
TROOPERS/TROOPERS 2016/Passive Intelligence Gathering Analytics.mp4 175.2 MB
TROOPERS/TROOPERS 2016/Patch me if you can.mp4 252.6 MB
TROOPERS/TROOPERS 2016/Preventing vulns in HANA based deployments.mp4 214 MB
TROOPERS/TROOPERS 2016/Protecting Hosts in IPv6 Networks.mp4 242.1 MB
TROOPERS/TROOPERS 2016/Rapid Radio Reversing.mp4 117.5 MB
TROOPERS/TROOPERS 2016/Real Life Software Defined Security.mp4 94.8 MB
TROOPERS/TROOPERS 2016/Reverse engineering a Digital Two way Radio.mp4 95.2 MB
TROOPERS/TROOPERS 2016/Security Evaluation of Dual-Stack Systems.mp4 202.3 MB
TROOPERS/TROOPERS 2016/TR16 - Day 1 Visuals.mp4 89.1 MB
TROOPERS/TROOPERS 2016/TROOPERS Conference 360 Teaser - must watch in YouTube app.mp4 12.4 MB
TROOPERS/TROOPERS 2016/The Chimaera Processor.mp4 41.9 MB
TROOPERS/TROOPERS 2016/The Internet of Deadly Things.mp4 30.4 MB
TROOPERS/TROOPERS 2016/The Joy of Sandbox Mitigations.mp4 98.3 MB
TROOPERS/TROOPERS 2016/The Kings in your Castle.mp4 113.6 MB
TROOPERS/TROOPERS 2016/The Road to secure Smart Cars.mp4 190.1 MB
TROOPERS/TROOPERS 2016/Towards a LangSec Aware SDLC.mp4 91.4 MB
TROOPERS/TROOPERS 2016/Unpatchable.mp4 204.4 MB
TROOPERS/TROOPERS 2016/Witness the Russian attack Live demos of their steps tools techniques.mp4 77.4 MB
TROOPERS/TROOPERS 2016/unrubby.mp4 108.7 MB
TROOPERS/TROOPERS 2017/TR17 - IoT to Gateway - Gabriel Mueller.mp4 130.3 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Authenticate Like A Boss Pete Herzog.mp4 69.5 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Dissecting Modern 3G 4G Cellular Modems Harald Welte.mp4 93.8 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Hacks and Case Studies Cellular Communications Brian Butterly.mp4 127 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Looking through the web of pages to the Internet of Things Gabriel Weaver.mp4 106.3 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Metasploit Hardware Bridge Hacking Craig Smith.mp4 103.3 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Pufs ’n stuff Getting the most of the digital world through physical identities An.mp4 81.1 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Robo Ethnography Just what can Robots do Brittany Postnikoff.mp4 100.8 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 So You Want To Hack Radios Matt Knight, Marc Newlin.mp4 64.4 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 What happened to your home IoT Hacking and Forensic with 0 Days Soohyun Jin, Moonbe.mp4 98.6 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK2 Crashing Cisco's Autonomic Network Omar Eissa.mp4 71.8 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK2 IPv6 Configuration Approaches for Servers Enno Rey.mp4 196.4 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK2 RIPE Atlas Measuring The Internet Alvaro Vives.mp4 125 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK3 BLE Authentication Design Challenges On Smartphone Controlled IoT Devices Analyzing.mp4 104.2 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK4 An Introduction to Automotive ECU Research Dieter Spaar.mp4 139.8 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK4 Hacking TP Link Devices Fernando Gont.mp4 147.6 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK4 Hidden in plain sight_ How possibly could a decades old standard be broken Paul Mel.mp4 77.3 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK4 Rusting up your GREATFET Richo Healey, Dominic Spill.mp4 164.8 MB
TROOPERS/TROOPERS 2017/TR17 NGI TRACK4 The Hardware Striptease Club Letting The Smart Home Strip Down To Its Innards Stefan.mp4 825.1 MB
TROOPERS/TROOPERS 2017/TR17 NGI Track2 An attack in depth analysis of multicast DNS and DNS service recovery Antonios Atlas.mp4 137 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 2nd Day Keynote Mara Tam.mp4 141 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 A sense of self for bootloaders no more magical writes Rebecca ”bx” Shapiro.mp4 56.6 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 Blinded Random Block Corruptions Rodrigo Branco.mp4 90.8 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 Closing Procedure.mp4 96.5 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 Demystifying COM James Foreshaw.mp4 116.6 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 Exploring North Korea's Surveillance Technology Florian Grunow Niklaus Schiess.mp4 110.3 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 Exploring The Infrared World,Part 2 Mike Ossmann, Dominic Spill.mp4 138.4 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 Graph me, I'm famous! Automated static malware analysis and indicator extraction for bi.mp4 128 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 Hardware Root of Mistrust Joseph FitzPatrick Michael Leibowitz.mp4 106.6 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 How we hacked Distributed CMSs Francis Alexander, Bharadwaj Machiraju.mp4 116.4 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 Intel ME The Way of the Static Analysis Dmitry Sklyarov.mp4 106.2 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 Opening Keynote Enno Rey.mp4 101 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 Software Attacks on Hypervisor Emulation of Hardware Oleksandr Bazhaniuk.mp4 88.5 MB
TROOPERS/TROOPERS 2017/TR17 TRACK1 Unsafe JAX RS Breaking REST API Mikhail Egorov.mp4 51.6 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Active Directory Security Best Practices - Friedwart Kuhn, Heinrich Wiederkehr.mp4 1.3 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Architecting a Modern Defense using Device Guard Matt Graeber, Casey Smith.mp4 153.4 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew (2).mp4 112.9 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew.mp4 112.9 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Data Demolition Gone In 60 Seconds Zoz Brooks.mp4 127.3 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Hunting Them All Veronica Valeros.mp4 122 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Ruler Pivoting Through Exchange Etienne Stalmans.mp4 129.3 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Samsung Pay Tokenized Numbers, Flaws and Issues Salvador Mendoza.mp4 73.1 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Securing Network Automation Ivan Pepelnjak.mp4 146.1 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Surprise Bitches! The Grugq.mp4 406.1 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Volatile Memory Behavioral Game Theory in Defensive Security Kelly Shortridge.mp4 82.9 MB
TROOPERS/TROOPERS 2017/TR17 TRACK2 Vox Ex Machina Graeme Neilson - YouTube.mp4 100.2 MB
TROOPERS/TROOPERS 2017/TR17 TRACK3 Habibi Works An Update On TROOPERS Charity Florian Horsch.mp4 46.1 MB
TROOPERS/TROOPERS 2017/TR17 TRACK3 Holy crap I need to pentest SAP from Citrix Joffrey Czarny.mp4 90.5 MB
TROOPERS/TROOPERS 2017/TR17 TRACK3 Intercepting SAP SNC protected traffic Martin Gallo.mp4 40.5 MB
TROOPERS/TROOPERS 2017/TR17 TRACK3 Lightning Talks Peter Hessler, Edmond Rogers, Sreepriya Chalakkal.mp4 16.5 MB
TROOPERS/TROOPERS 2017/TR17 TRACK3 PHP Internals Exploit Dev Edition Emmanuel Law.mp4 58.1 MB
TROOPERS/TROOPERS 2017/TR17 TRACK3 Protecting SAP HANA from vulnerabilities and exploits Pablo Artuso, Nahuel Sanchez.mp4 80.9 MB
TROOPERS/TROOPERS 2017/TR17 TRACK3 Reverse Engineering ABAP Bytecode for Malware Analysis Hans Christian Esperer, Frederik.mp4 83.2 MB
TROOPERS/TROOPERS 2017/TR17 TRACK3 SAP strikes back Your SAP server now counter attacks Vahagn Vardanyan, Dmitry Yudin.mp4 100.4 MB
TROOPERS/TROOPERS 2017/TR17 TRACK3 The Metabrik Platform Rapid Development of Reusable Security Tools Patrice Auffret.mp4 75.8 MB
TROOPERS/TROOPERS 2017/TR17 TRACK3 You've got mail Owning your business with one email Joris van de Vis.mp4 66 MB
TROOPERS/TROOPERS 2018/TR18 A Stepping Stone To Car Hacking.en.transcribed.srt 102 KB
TROOPERS/TROOPERS 2018/TR18 A Stepping Stone To Car Hacking.mp4 55.9 MB
TROOPERS/TROOPERS 2018/TR18 Active Directory Security The Journey.en.transcribed.srt 163 KB
TROOPERS/TROOPERS 2018/TR18 Active Directory Security The Journey.mp4 114 MB
TROOPERS/TROOPERS 2018/TR18 Ads networks are following you, follow them back.en.transcribed.srt 118 KB
TROOPERS/TROOPERS 2018/TR18 All Your Cloud Are Belong To Us.en.transcribed.srt 183 KB
TROOPERS/TROOPERS 2018/TR18 All Your Cloud Are Belong To Us.mp4 152.6 MB
TROOPERS/TROOPERS 2018/TR18 An ACE Up The Sleeve Designing Security Descriptor Based Backdoors.en.transcribed.srt 155 KB
TROOPERS/TROOPERS 2018/TR18 An ACE Up The Sleeve Designing Security Descriptor Based Backdoors.mp4 110.9 MB
TROOPERS/TROOPERS 2018/TR18 Attack and defend Microsoft Enhanced Security Administrative Environment.en.transcribed.srt 136 KB
TROOPERS/TROOPERS 2018/TR18 Attack and defend Microsoft Enhanced Security Administrative Environment.mp4 99.3 MB
TROOPERS/TROOPERS 2018/TR18 Blue Team Sprint.en.transcribed.srt 159 KB
TROOPERS/TROOPERS 2018/TR18 Blue Team Sprint.mp4 128.8 MB
TROOPERS/TROOPERS 2018/TR18 Closing Remarks.en.transcribed.srt 39 KB
TROOPERS/TROOPERS 2018/TR18 Closing Remarks.mp4 42.2 MB
TROOPERS/TROOPERS 2018/TR18 From Zero to Secure Continuous Delivery in 60 Minutes.en.transcribed.srt 169 KB
TROOPERS/TROOPERS 2018/TR18 From Zero to Secure Continuous Delivery in 60 Minutes.mp4 186.6 MB
TROOPERS/TROOPERS 2018/TR18 Hacking and Securing SAP Hana Applications.en.transcribed.srt 84 KB
TROOPERS/TROOPERS 2018/TR18 Hacking and Securing SAP Hana Applications.mp4 75.6 MB
TROOPERS/TROOPERS 2018/TR18 Hunting Android Malware.en.transcribed.srt 122 KB
TROOPERS/TROOPERS 2018/TR18 Hunting Android Malware.mp4 49.6 MB
TROOPERS/TROOPERS 2018/TR18 Hunting crypto secrets in SAP systems.en.transcribed.srt 139 KB
TROOPERS/TROOPERS 2018/TR18 Hunting crypto secrets in SAP systems.mp4 102.2 MB
TROOPERS/TROOPERS 2018/TR18 I forgot Your password.en.transcribed.srt 103 KB
TROOPERS/TROOPERS 2018/TR18 I forgot Your password.mp4 99.4 MB
TROOPERS/TROOPERS 2018/TR18 Introducing a Comprehensive Active Directory Security Metric.en.transcribed.srt 111 KB
TROOPERS/TROOPERS 2018/TR18 Introducing a Comprehensive Active Directory Security Metric.mp4 108.3 MB
TROOPERS/TROOPERS 2018/TR18 Mind the Gap, Bro.en.transcribed.srt 167 KB
TROOPERS/TROOPERS 2018/TR18 Mind the Gap, Bro.mp4 103.6 MB
TROOPERS/TROOPERS 2018/TR18 Mobile App Security Fails and How To Survive Them.en.transcribed.srt 129 KB
TROOPERS/TROOPERS 2018/TR18 Mobile App Security Fails and How To Survive Them.mp4 123.4 MB
TROOPERS/TROOPERS 2018/TR18 NFC Payments.en.transcribed.srt 72 KB
TROOPERS/TROOPERS 2018/TR18 NFC Payments.mp4 43.2 MB
TROOPERS/TROOPERS 2018/TR18 No royal road advanced analysis for 'advanced' threats.en.transcribed.srt 140 KB
TROOPERS/TROOPERS 2018/TR18 No royal road advanced analysis for 'advanced' threats.mp4 129.1 MB
TROOPERS/TROOPERS 2018/TR18 Real-Life Network and Security Automation.en.transcribed.srt 108 KB
TROOPERS/TROOPERS 2018/TR18 Real-Life Network and Security Automation.mp4 126.7 MB
TROOPERS/TROOPERS 2018/TR18 Reverse Engineering Black Box Systems with GreatFET.en.transcribed.srt 157 KB
TROOPERS/TROOPERS 2018/TR18 Reverse Engineering Black Box Systems with GreatFET.mp4 89.7 MB
TROOPERS/TROOPERS 2018/TR18 Robots Panel.en.transcribed.srt 206 KB
TROOPERS/TROOPERS 2018/TR18 Robots Panel.mp4 98.8 MB
TROOPERS/TROOPERS 2018/TR18 SAP BUGS The Phantom Security.en.transcribed.srt 42 KB
TROOPERS/TROOPERS 2018/TR18 SAP BUGS The Phantom Security.mp4 47.9 MB
TROOPERS/TROOPERS 2018/TR18 SAP IGS The 'vulnerable' forgotten component.en.transcribed.srt 85 KB
TROOPERS/TROOPERS 2018/TR18 SAP IGS The 'vulnerable' forgotten component.mp4 73.9 MB
TROOPERS/TROOPERS 2018/TR18 SAP Security patches_ The importance, difficulties and solutions!.mp4 51.1 MB
TROOPERS/TROOPERS 2018/TR18 Security Appliances Internals.en.transcribed.srt 126 KB
TROOPERS/TROOPERS 2018/TR18 Security Appliances Internals.mp4 118.8 MB
TROOPERS/TROOPERS 2018/TR18 Subverting Trust in Windows.en.transcribed.srt 127 KB
TROOPERS/TROOPERS 2018/TR18 Subverting Trust in Windows.mp4 114.7 MB
TROOPERS/TROOPERS 2018/TR18 The Language of Security.en.transcribed.srt 160 KB
TROOPERS/TROOPERS 2018/TR18 The Language of Security.mp4 136.1 MB
TROOPERS/TROOPERS 2018/TR18 The Wolf In SGX Clothing.en.transcribed.srt 163 KB
TROOPERS/TROOPERS 2018/TR18 The Wolf In SGX Clothing.mp4 71.7 MB
TROOPERS/TROOPERS 2018/TR18 Unifying RF Fuzzing Techniques under a Common API.en.transcribed.srt 144 KB
TROOPERS/TROOPERS 2018/TR18 Unifying RF Fuzzing Techniques under a Common API.mp4 68 MB
TROOPERS/TROOPERS 2018/TR18 When Virtual Hell Freezes Over.en.transcribed.srt 85 KB
TROOPERS/TROOPERS 2018/TR18 When Virtual Hell Freezes Over.mp4 45.7 MB
TROOPERS/TROOPERS 2018/TR18 Keynote Mike Ossmann (Inkl. Opening Remarks).en.transcribed.srt 147 KB
TROOPERS/TROOPERS 2018/TR18 Keynote Mike Ossmann (Inkl. Opening Remarks).mp4 162.7 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Advances in IPv6 Network Reconnaissance.en.transcribed.srt 55 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 Advances in IPv6 Network Reconnaissance.mp4 31.5 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Are you sure - you are alone Pwning IoT-CCTV devices!.en.transcribed.srt 40 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 Are you sure - you are alone Pwning IoT-CCTV devices!.mp4 41.3 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 BREAKING THE LAWS OF ROBOTICS ATTACKING INDUSTRIAL ROBOTS.mp4 82.9 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Dynamic IPv6 Prefix Problems and VPNs.en.transcribed.srt 105 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 Dynamic IPv6 Prefix Problems and VPNs.mp4 63.2 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Frustrating Emulation with Delay Slots in MIPS and MIPS16.en.transcribed.srt 73 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 Frustrating Emulation with Delay Slots in MIPS and MIPS16.mp4 59.9 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Hacking Robots Before Skynet.mp4 96.8 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 IPv6 Address Management - The First Five Years.en.transcribed.srt 124 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 IPv6 Address Management - The First Five Years.mp4 92.5 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 IPv6 in the Cloud - Back to Square One.en.transcribed.srt 108 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 IPv6 in the Cloud - Back to Square One.mp4 95.1 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 IoT processor and binary breakdown.en.transcribed.srt 145 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 IoT processor and binary breakdown.mp4 82 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Knockin' on IPv6's doors.en.transcribed.srt 167 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 Knockin' on IPv6's doors.mp4 104.8 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 NGI18 Keynote by Graeme Neilson.en.transcribed.srt 100 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 NGI18 Keynote by Graeme Neilson.mp4 64.8 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Practical Magic Behavior-based Safety Design for IoT.en.transcribed.srt 128 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 Practical Magic Behavior-based Safety Design for IoT.mp4 71.3 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Securing your in-ear fitness coach Challenges in hardening next generation wearables.en.transcribed.srt 141 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 Securing your in-ear fitness coach Challenges in hardening next generation wearables.mp4 84.5 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.en.transcribed.srt 143 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.mp4 101.3 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Subs, Ships, & Satellites The Internet of Invisible Things.en.transcribed.srt 181 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 Subs, Ships, & Satellites The Internet of Invisible Things.mp4 110.6 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Swimming IoT or how to hack a Yacht.mp4 88.3 MB
TROOPERS/TROOPERS 2018/TR18 NGI18 Things Attack Peek into a 18 months IoT honeypot.en.transcribed.srt 109 KB
TROOPERS/TROOPERS 2018/TR18 NGI18 Things Attack Peek into a 18 months IoT honeypot.mp4 68.1 MB
TROOPERS/TROOPERS 2018/The Hackers' Sanctuary City.mp4 12.1 MB
TROOPERS/TROOPERS 2019/TR19 A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.en.transcribed.srt 187 KB
TROOPERS/TROOPERS 2019/TR19 A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.mp4 59.7 MB
TROOPERS/TROOPERS 2019/TR19 A PKI distributed is a PKI solved.en.transcribed.srt 51 KB
TROOPERS/TROOPERS 2019/TR19 A PKI distributed is a PKI solved.mp4 25.3 MB
TROOPERS/TROOPERS 2019/TR19 Abusing privileged file operations on Windows.en.transcribed.srt 44 KB
TROOPERS/TROOPERS 2019/TR19 Abusing privileged file operations on Windows.mp4 33.3 MB
TROOPERS/TROOPERS 2019/TR19 Active Directory and Azure - Core Security Principles.en.transcribed.srt 137 KB
TROOPERS/TROOPERS 2019/TR19 Active Directory and Azure - Core Security Principles.mp4 94.2 MB
TROOPERS/TROOPERS 2019/TR19 Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.en.transcribed.srt 79 KB
TROOPERS/TROOPERS 2019/TR19 Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.mp4 35.7 MB
TROOPERS/TROOPERS 2019/TR19 Automotive Penetration Testing with Scapy.mp4 79.1 MB
TROOPERS/TROOPERS 2019/TR19 BIZEC Discussion Panel Past, Present and Future of SAP Security.en.transcribed.srt 123 KB
TROOPERS/TROOPERS 2019/TR19 BIZEC Discussion Panel Past, Present and Future of SAP Security.mp4 43.9 MB
TROOPERS/TROOPERS 2019/TR19 Beyond Windows Forensics with Built-in Microsoft Tooling.en.transcribed.srt 130 KB
TROOPERS/TROOPERS 2019/TR19 Beyond Windows Forensics with Built-in Microsoft Tooling.mp4 65.2 MB
TROOPERS/TROOPERS 2019/TR19 BloodHound and the Adversary Resilience Methodology.en.transcribed.srt 139 KB
TROOPERS/TROOPERS 2019/TR19 BloodHound and the Adversary Resilience Methodology.mp4 73.4 MB
TROOPERS/TROOPERS 2019/TR19 Bluetooth, does it spark joy.en.transcribed.srt 125 KB
TROOPERS/TROOPERS 2019/TR19 Bluetooth, does it spark joy.mp4 66.6 MB
TROOPERS/TROOPERS 2019/TR19 Car Manufacturer meets Security Community.en.transcribed.srt 147 KB
TROOPERS/TROOPERS 2019/TR19 Car Manufacturer meets Security Community.mp4 62.5 MB
TROOPERS/TROOPERS 2019/TR19 Closing Remarks.en.transcribed.srt 38 KB
TROOPERS/TROOPERS 2019/TR19 Closing Remarks.mp4 47.8 MB
TROOPERS/TROOPERS 2019/TR19 CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics....en.transcribed.srt 133 KB
TROOPERS/TROOPERS 2019/TR19 CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics....mp4 65.2 MB
TROOPERS/TROOPERS 2019/TR19 Dark Clouds ahead Attacking a Cloud Foundry Implementation.en.transcribed.srt 117 KB
TROOPERS/TROOPERS 2019/TR19 Dark Clouds ahead Attacking a Cloud Foundry Implementation.mp4 61.5 MB
TROOPERS/TROOPERS 2019/TR19 Digital Forensics and Incident Response in G Suite.en.transcribed.srt 82 KB
TROOPERS/TROOPERS 2019/TR19 Digital Forensics and Incident Response in G Suite.mp4 38 MB
TROOPERS/TROOPERS 2019/TR19 Distributed Security Alerting.en.transcribed.srt 137 KB
TROOPERS/TROOPERS 2019/TR19 Distributed Security Alerting.mp4 56.1 MB
TROOPERS/TROOPERS 2019/TR19 Ethics in Attacker Research.en.transcribed.srt 19 KB
TROOPERS/TROOPERS 2019/TR19 Ethics in Attacker Research.mp4 12.1 MB
TROOPERS/TROOPERS 2019/TR19 Evolution of kernel fuzzers in NetBSD.mp4 37.4 MB
TROOPERS/TROOPERS 2019/TR19 Fetch exploit - Attacks against source code downloaders.en.transcribed.srt 101 KB
TROOPERS/TROOPERS 2019/TR19 Fetch exploit - Attacks against source code downloaders.mp4 79.7 MB
TROOPERS/TROOPERS 2019/TR19 Finding the best threat intelligence provider.en.transcribed.srt 127 KB
TROOPERS/TROOPERS 2019/TR19 Finding the best threat intelligence provider.mp4 47 MB
TROOPERS/TROOPERS 2019/TR19 From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.en.transcribed.srt 196 KB
TROOPERS/TROOPERS 2019/TR19 From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.mp4 91.5 MB
TROOPERS/TROOPERS 2019/TR19 Fun and Pitfalls in a World of VDSL.en.transcribed.srt 132 KB
TROOPERS/TROOPERS 2019/TR19 Fun and Pitfalls in a World of VDSL.mp4 53.3 MB
TROOPERS/TROOPERS 2019/TR19 Fun with LDAP and Kerberos Attacking AD from non-Windows machines.en.transcribed.srt 179 KB
TROOPERS/TROOPERS 2019/TR19 Fun with LDAP and Kerberos Attacking AD from non-Windows machines.mp4 71.9 MB
TROOPERS/TROOPERS 2019/TR19 HackDMI.en.transcribed.srt 66 KB
TROOPERS/TROOPERS 2019/TR19 HackDMI.mp4 36.8 MB
TROOPERS/TROOPERS 2019/TR19 Hardware Side Channel attacks on the cheapest.en.transcribed.srt 129 KB
TROOPERS/TROOPERS 2019/TR19 Hardware Side Channel attacks on the cheapest.mp4 60.7 MB
TROOPERS/TROOPERS 2019/TR19 Hitting the Gym The Anatomy of a Killer Workout.mp4 50.9 MB
TROOPERS/TROOPERS 2019/TR19 How we made the badge BEFORE you showed up!.en.transcribed.srt 50 KB
TROOPERS/TROOPERS 2019/TR19 How we made the badge BEFORE you showed up!.mp4 29.9 MB
TROOPERS/TROOPERS 2019/TR19 I am AD FS and so can you Attacking Active Directory Federated Services.en.transcribed.srt 142 KB
TROOPERS/TROOPERS 2019/TR19 I am AD FS and so can you Attacking Active Directory Federated Services.mp4 54.7 MB
TROOPERS/TROOPERS 2019/TR19 I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.en.transcribed.srt 117 KB
TROOPERS/TROOPERS 2019/TR19 I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.mp4 68.1 MB
TROOPERS/TROOPERS 2019/TR19 IPv666 – Address of the Beast.en.transcribed.srt 145 KB
TROOPERS/TROOPERS 2019/TR19 IPv666 – Address of the Beast.mp4 52 MB
TROOPERS/TROOPERS 2019/TR19 Introducing Faction A modern, powerful, multiplayer C2 framework.en.transcribed.srt 158 KB
TROOPERS/TROOPERS 2019/TR19 Introducing Faction A modern, powerful, multiplayer C2 framework.mp4 109.9 MB
TROOPERS/TROOPERS 2019/TR19 Introduction to Practical Ethics for Security Practitioners.en.transcribed.srt 141 KB
TROOPERS/TROOPERS 2019/TR19 Introduction to Practical Ethics for Security Practitioners.mp4 64.1 MB
TROOPERS/TROOPERS 2019/TR19 IoT backdoors in cars.mp4 60.6 MB
TROOPERS/TROOPERS 2019/TR19 Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.en.transcribed.srt 156 KB
TROOPERS/TROOPERS 2019/TR19 Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.mp4 72.4 MB
TROOPERS/TROOPERS 2019/TR19 Keynote - Inside the Machine.en.transcribed.srt 190 KB
TROOPERS/TROOPERS 2019/TR19 Keynote - Inside the Machine.mp4 78.9 MB
TROOPERS/TROOPERS 2019/TR19 MS Office file format sorcery.en.transcribed.srt 121 KB
TROOPERS/TROOPERS 2019/TR19 MS Office file format sorcery.mp4 86.5 MB
TROOPERS/TROOPERS 2019/TR19 Medical Device Security - Please (don't) be patient!.en.transcribed.srt 105 KB
TROOPERS/TROOPERS 2019/TR19 Medical Device Security - Please (don't) be patient!.mp4 39.1 MB
TROOPERS/TROOPERS 2019/TR19 Microsoft IT (secure) journey to IPv6-only.en.transcribed.srt 174 KB
TROOPERS/TROOPERS 2019/TR19 Microsoft IT (secure) journey to IPv6-only.mp4 57.5 MB
TROOPERS/TROOPERS 2019/TR19 Modmob tools Home made tools to test mobile devices and monitor networks.en.transcribed.srt 137 KB
TROOPERS/TROOPERS 2019/TR19 Modmob tools Home made tools to test mobile devices and monitor networks.mp4 66.8 MB
TROOPERS/TROOPERS 2019/TR19 NAT64 Day 2019 @ AWK.en.transcribed.srt 99 KB
TROOPERS/TROOPERS 2019/TR19 NAT64 Day 2019 @ AWK.mp4 55.1 MB
TROOPERS/TROOPERS 2019/TR19 NGI - Keynote.en.transcribed.srt 176 KB
TROOPERS/TROOPERS 2019/TR19 NGI - Keynote.mp4 92.9 MB
TROOPERS/TROOPERS 2019/TR19 NGI - Opening Remarks.en.transcribed.srt 8 KB
TROOPERS/TROOPERS 2019/TR19 NGI - Opening Remarks.mp4 3.1 MB
TROOPERS/TROOPERS 2019/TR19 No more dumb hex!.en.transcribed.srt 122 KB
TROOPERS/TROOPERS 2019/TR19 No more dumb hex!.mp4 52.4 MB
TROOPERS/TROOPERS 2019/TR19 Not A Security Boundary Breaking Forest Trusts.en.transcribed.srt 123 KB
TROOPERS/TROOPERS 2019/TR19 Not A Security Boundary Breaking Forest Trusts.mp4 50.5 MB
TROOPERS/TROOPERS 2019/TR19 Old New Things An examination of the Philips TriMedia architecture.en.transcribed.srt 68 KB
TROOPERS/TROOPERS 2019/TR19 Old New Things An examination of the Philips TriMedia architecture.mp4 43.6 MB
TROOPERS/TROOPERS 2019/TR19 Opening remarks.en.transcribed.srt 34 KB
TROOPERS/TROOPERS 2019/TR19 Opening remarks.mp4 26.6 MB
TROOPERS/TROOPERS 2019/TR19 Practical attack simulations in Critical National Infrastructure (CNI).en.transcribed.srt 62 KB
TROOPERS/TROOPERS 2019/TR19 Practical attack simulations in Critical National Infrastructure (CNI).mp4 20.4 MB
TROOPERS/TROOPERS 2019/TR19 SI6 IPv6 Toolkit v3.0.en.transcribed.srt 101 KB
TROOPERS/TROOPERS 2019/TR19 SI6 IPv6 Toolkit v3.0.mp4 59.9 MB
TROOPERS/TROOPERS 2019/TR19 SIM Simulator.en.transcribed.srt 47 KB
TROOPERS/TROOPERS 2019/TR19 SIM Simulator.mp4 22.5 MB
TROOPERS/TROOPERS 2019/TR19 Sneaking Past Device Guard.en.transcribed.srt 110 KB
TROOPERS/TROOPERS 2019/TR19 Sneaking Past Device Guard.mp4 71.3 MB
TROOPERS/TROOPERS 2019/TR19 The Anatomy of Windows Telemetry.en.transcribed.srt 128 KB
TROOPERS/TROOPERS 2019/TR19 The Anatomy of Windows Telemetry.mp4 58.7 MB
TROOPERS/TROOPERS 2019/TR19 The evolution of IoT botnets, including Torii and a smart-home hack..en.transcribed.srt 83 KB
TROOPERS/TROOPERS 2019/TR19 The evolution of IoT botnets, including Torii and a smart-home hack..mp4 43.5 MB
TROOPERS/TROOPERS 2019/TR19 Threat Modelling and Beyond for Cisco ACI.en.transcribed.srt 91 KB
TROOPERS/TROOPERS 2019/TR19 Threat Modelling and Beyond for Cisco ACI.mp4 36 MB
TROOPERS/TROOPERS 2019/TR19 VXLAN Security or Injection, and protection.mp4 49 MB
TROOPERS/TROOPERS 2019/TR19 Vehicle alarms' insecurity and something else.en.transcribed.srt 77 KB
TROOPERS/TROOPERS 2019/TR19 Vehicle alarms' insecurity and something else.mp4 59.6 MB
TROOPERS/TROOPERS 2019/TR19 Watchgate - How stupid smartwatches threaten the security and safety of our children.en.transcribed.srt 95 KB
TROOPERS/TROOPERS 2019/TR19 Watchgate - How stupid smartwatches threaten the security and safety of our children.mp4 61.4 MB
TROOPERS/TROOPERS 2019/TR19 We are Listening – Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP..en.transcribed.srt 125 KB
TROOPERS/TROOPERS 2019/TR19 We are Listening – Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP..mp4 45.8 MB
TROOPERS/TROOPERS 2019/TR19 What are the IPv6 news from the IETF.en.transcribed.srt 217 KB
TROOPERS/TROOPERS 2019/TR19 What are the IPv6 news from the IETF.mp4 108.1 MB
TROOPERS/TROOPERS 2019/TR19 Wild West of Conference Apps Security.en.transcribed.srt 84 KB
TROOPERS/TROOPERS 2019/TR19 Wild West of Conference Apps Security.mp4 31.3 MB
TROOPERS/TROOPERS 2019/TR19 You (dis)liked mimikatz Wait for kekeo.en.transcribed.srt 146 KB
TROOPERS/TROOPERS 2019/TR19 You (dis)liked mimikatz Wait for kekeo.mp4 77.9 MB
TROOPERS/TROOPERS 2019/TR19 You try to detect mimikatz.en.transcribed.srt 66 KB
TROOPERS/TROOPERS 2019/TR19 You try to detect mimikatz.mp4 49.9 MB
TROOPERS/TROOPERS 2019/TR19 macOS - Gaining root with harmless AppStore apps.en.transcribed.srt 101 KB
TROOPERS/TROOPERS 2019/TR19 macOS - Gaining root with harmless AppStore apps.mp4 106.6 MB
TROOPERS/TROOPERS 2019/TROOPERS19 - Day #2 - A Morning Address.en.transcribed.srt 1 KB
TROOPERS/TROOPERS 2019/TROOPERS19 - Day #2 - A Morning Address.mp4 6.5 MB
TROOPERS/TROOPERS logo.gif 38 KB
TROOPERS/TROOPERS logo.png 289 KB
TROOPERS/TROOPERS thank you.txt 612 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Starship.Troopers.1997.2160p.DV.HDR10+Ai-Enhanced.HEVC.TrueHD.7.1.Atmos.MULTI-RIFE.4.18v2-60fps-DirtyHippie Video 42.5 GB 331
www.1TamilMV.wf - Starship Troopers Traitor of Mars (2017) BluRay - 1080p - x264 - Org Auds - [Tamil + Eng] - AAC - 1.4GB - ESub.mkv Video 1.5 GB 126
www.1TamilMV.wf - Starship Troopers Traitor of Mars (2017) BluRay - 720p - x264 - Org Auds - [Tamil + Eng] - AAC - 750MB - ESub.mkv Video 766.9 MB 119
www.1TamilBlasters.foo - Starship Troopers Traitor of Mars (2017)[1080p BDRip - [Tamil + Hindi + Eng] - AAC].mkv Video 1.5 GB 25
Starship Troopers 2 Hero Of The Federation (2004) [720p] [BluRay] [YTS.MX] Video 841.7 MB 18
RIfftrax - Starship Troopers (1997) 2160p HDR -Mesc Video 4.2 GB 18
Starship Troopers (1997) 25th Anniversary 2160p HDR 5.1 - 2.0 x265 10bit Phun Psyz.mkv Video 4 GB 13
The Hu - The Trooper (2024) FLAC (24bit-96kHz) Audio 624.3 MB 13
1959 - Starship Troopers (Unabridged) (Read by R.C. Bray) 452 MB 12
Żołnierze kosmosu Zdrada na Marsie - Starship.Troopers.Traitor.of.Mars.2017.MULTi.2160p.UHD.BluRay.REMUX.DV.HDR.HEVC.TrueHD.7.1-MR ~ Lektor i Napisy PL.mkv Video 42.2 GB 12
[sci-fi] Rebel's Strike, Space Troopers (03) by Jamie McFarlane EPUB Ebook 822 KB 11
Starship.Troopers.1997.1080p.BluRay.10Bit.HEVC.EAC3.5.1-jmux.mkv Video 8.7 GB 10
Starship Troopers - Terran Command [FitGirl Repack] Application 5.1 GB 10
Rick Partlow - Drop Trooper 09 - Kill Box 419.6 MB 8
Super Troopers (2001) MULTI 1080p BluRay AV1 Opus [AV1D] Video 1.7 GB 8
Starship Troopers 2 - Eroi della Federazione (2004) 1080p H264 ITA AC3 5.1 ENG AAC 5.1 SUB ENG - ToR.mkv Video 2.2 GB 7
www.1TamilMV.wf - Starship Troopers Traitor of Mars (2017) BR-Rip - x264 - Org Auds - Tamil Dubbed - AAC - 350MB - ESub.mkv Video 353.1 MB 7
Starship Troopers (1997) [2160p] [4K] [BluRay] [5.1] [YTS.MX] Video 5.9 GB 6
Armored Trooper VOTOMS Shining Heresy Video 4.1 GB 6
Starship Troopers- Continuum v14124+1.0.14124 -VRP 4.4 GB 6

Loading...