/cons/CarolinaCon/CarolinaCon 10 2014/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
AV Evasion with the Veil Framework - HarmJ0y, Christopher Truncer, and Michael Wright.mp4277.6 MiB2015-Sep-17 06:49
Attacker Ghost Stories Mostly Free Defenses That Gives Attackers Nightmares - mubix.mp4210.9 MiB2015-Sep-17 06:44
Building Botnets 101 - Terrence O Connor.mp4256.2 MiB2015-Sep-17 06:53
Building Botnets 101 - Terrence O Connor.srt70.4 KiB2015-Aug-21 19:21
Bypassing EMET 4.1 - Jared DeMott.mp4119.4 MiB2015-Sep-17 06:58
Bypassing EMET 4.1 - Jared DeMott.srt86.2 KiB2015-Aug-21 19:21
Carding Markets Comparing Apples and Lemons - Tom Holt Professor Farnsworth.mp4128.5 MiB2015-Sep-17 07:02
Carding Markets Comparing Apples and Lemons - Tom Holt Professor Farnsworth.srt83.4 KiB2015-Aug-21 19:22
Demystifying The Cloud, a look at Hyperscale Computing From a Hacker Perspective - Nick Fury.mp4176.1 MiB2015-Sep-17 07:07
Exploiting the Bells and Whistles Uncovering OEM Vulnerabilities in Android - Jake Valletta.mp455.9 MiB2015-Sep-17 07:11
Exploiting the Bells and Whistles Uncovering OEM Vulnerabilities in Android - Jake Valletta.srt47.3 KiB2015-Aug-21 19:22
F ck These Guys Practical Counter-Surveillance - Lisa Lorenzin.mp4121.7 MiB2015-Sep-17 07:15
Hack Android using Normal Permissions & Broadcast Receivers - Fadi Mohsen.mp431.7 MiB2015-Sep-17 07:17
Hack Android using Normal Permissions & Broadcast Receivers - Fadi Mohsen.srt26.4 KiB2015-Aug-21 19:22
Hacking the Hackerspace - Steven Sutton and Alan Fay.mp462.5 MiB2015-Sep-17 07:20
Hacking the Hackerspace - Steven Sutton and Alan Fay.srt48.1 KiB2015-Aug-21 19:22
How To Get Money Fast Using A Pwned PBX - Patrick McNeil unregistered436.mp472.7 MiB2015-Sep-17 07:24
How To Get Money Fast Using A Pwned PBX - Patrick McNeil unregistered436.srt65.3 KiB2015-Aug-21 19:23
MichaelSmith.mp4100.3 MiB2015-Sep-17 07:28
Password Cracking for noobs All your hashes are belong to us - smrk3r.mp4152.0 MiB2015-Sep-17 07:33
Password Cracking for noobs All your hashes are belong to us - smrk3r.srt64.4 KiB2015-Aug-21 19:24
Real World Social Engineering for the Geek Introvert - Luke (MindNinja) Stephens.mp4482.5 MiB2015-Sep-17 07:41
Real World Social Engineering for the Geek Introvert - Luke (MindNinja) Stephens.srt129.9 KiB2015-Aug-21 19:24
Reverse Engineering Executables - John F. Davis (Math for 400).mp493.1 MiB2015-Sep-17 07:46
Reverse Engineering Executables - John F. Davis (Math for 400).srt75.7 KiB2015-Aug-21 19:24
Simple Network Management Pwnd - Deral Heiland (Percent_x) and Matthew Kienow.mp471.8 MiB2015-Sep-17 07:51
Simple Network Management Pwnd - Deral Heiland (Percent_x) and Matthew Kienow.srt63.0 KiB2015-Aug-21 19:25
So you want to break into Security - Surpherdave.mp482.9 MiB2015-Sep-17 07:54
So you want to break into Security - Surpherdave.srt51.6 KiB2015-Aug-21 19:25
The Insider Threat From Snowden to the Unspoken - Omar Santos.mp4188.1 MiB2015-Sep-17 07:58
The Insider Threat From Snowden to the Unspoken - Omar Santos.srt60.6 KiB2015-Aug-21 19:26