Parent directory/ | - | - |
A Red Team Perspective to Research - Presented by Vincent Yiu (Updated Version Available).eng.srt | 74.4 KiB | 2021 Mar 06 19:55 |
A Red Team Perspective to Research - Presented by Vincent Yiu (Updated Version Available).mp4 | 59.0 MiB | 2021 Mar 09 22:19 |
A Red Team Perspective to Research - Presented by Vincent Yiu.eng.srt | 74.3 KiB | 2021 Mar 06 19:45 |
A Red Team Perspective to Research - Presented by Vincent Yiu.mp4 | 63.3 MiB | 2021 Mar 09 22:19 |
Analyzing Kony Mobile Applications - Presented by Terry Chia.eng.srt | 60.8 KiB | 2021 Mar 06 20:04 |
Analyzing Kony Mobile Applications - Presented by Terry Chia.mp4 | 67.5 MiB | 2021 Mar 09 22:19 |
Attacking Offensively for Defense - Presented by Keith Rayle.eng.srt | 69.9 KiB | 2021 Mar 06 19:45 |
Attacking Offensively for Defense - Presented by Keith Rayle.mp4 | 86.0 MiB | 2021 Mar 09 22:19 |
Body Language Behind Social Engineering Attacks - Presented by Sarka Pekrova.eng.srt | 48.5 KiB | 2021 Mar 06 19:45 |
Body Language Behind Social Engineering Attacks - Presented by Sarka Pekrova.mp4 | 78.6 MiB | 2021 Mar 09 22:19 |
Cloudy Clusters Catastrophe - Presented by Rory McCune.eng.srt | 99.0 KiB | 2021 Mar 06 19:46 |
Cloudy Clusters Catastrophe - Presented by Rory McCune.mp4 | 68.2 MiB | 2021 Mar 09 22:19 |
Data Breaches Barbarians In the Throne Room - Presented by Dave Lewis.eng.srt | 63.8 KiB | 2021 Mar 06 19:45 |
Data Breaches Barbarians In the Throne Room - Presented by Dave Lewis.mp4 | 62.5 MiB | 2021 Mar 09 22:19 |
Designing Secure Systems Value-Driven Threat Modeling - Presented by Avi Douglen.eng.srt | 95.7 KiB | 2021 Mar 06 19:45 |
Designing Secure Systems Value-Driven Threat Modeling - Presented by Avi Douglen.mp4 | 99.9 MiB | 2021 Mar 09 22:19 |
Do You See What They See Asset Discovery In the Age of Security Automation - by Isaac Dawson.eng.srt | 58.5 KiB | 2021 Mar 06 20:07 |
Do You See What They See Asset Discovery In the Age of Security Automation - by Isaac Dawson.mp4 | 47.7 MiB | 2021 Mar 09 22:19 |
Exploiting Windows Vista Resource Virtualization - Presented by James Forshaw.mp4 | 103.8 MiB | 2021 Mar 09 22:19 |
Gargoyle Hunting In-Depth - Presented by Aliz Hammond.eng.srt | 94.1 KiB | 2021 Mar 06 20:01 |
Gargoyle Hunting In-Depth - Presented by Aliz Hammond.mp4 | 82.0 MiB | 2021 Mar 09 22:19 |
Infosec In the City. Singapore 2019 Highlights.mp4 | 5.9 MiB | 2021 Mar 09 22:19 |
Native Mobile Botnet & Anti Botnet Solutions - Presented by Ron Munitz.eng.srt | 83.3 KiB | 2021 Mar 06 20:07 |
Native Mobile Botnet & Anti Botnet Solutions - Presented by Ron Munitz.mp4 | 95.1 MiB | 2021 Mar 09 22:19 |
Office IoT The Elephant In the Room - Presented by Quentyn Taylor.eng.srt | 73.7 KiB | 2021 Mar 06 20:03 |
Office IoT The Elephant In the Room - Presented by Quentyn Taylor.mp4 | 61.0 MiB | 2021 Mar 09 22:19 |
P@ssword Making & Breaking - Presented by Will Hunt.mp4 | 94.7 MiB | 2021 Mar 09 22:19 |
Pwning AWS Cloud Services - Presented by Mohammed Aldoub.mp4 | 90.6 MiB | 2021 Mar 09 22:19 |
Real Hardware Hacking for S$30 or Less - Presented by Joe FitzPatrick.mp4 | 75.4 MiB | 2021 Mar 09 22:19 |
Reskinning the Robot Things I Would Love to Tell My Younger Self - Presented by Quentyn Taylor.mp4 | 74.7 MiB | 2021 Mar 09 22:19 |
Speed Up Recon & Pwn on Bug Bounty Build Your Own Tool - by Igor Lyrchikov & Egor Satlykov.eng.srt | 40.7 KiB | 2021 Mar 06 20:12 |
Speed Up Recon & Pwn on Bug Bounty Build Your Own Tool - by Igor Lyrchikov & Egor Satlykov.mp4 | 58.5 MiB | 2021 Mar 09 22:19 |
The Art of Persistence Lurking Behind the Browser - Presented by Samuel Pua.mp4 | 70.9 MiB | 2021 Mar 09 22:19 |
The State of AI-Assisted Fuzzing & Program Analysis - Presented by Clarence Chio.eng.srt | 87.1 KiB | 2021 Mar 06 19:45 |
The State of AI-Assisted Fuzzing & Program Analysis - Presented by Clarence Chio.mp4 | 87.9 MiB | 2021 Mar 09 22:19 |
You Are Not Hiding From Me .NET - Presented by Aden Chung.eng.srt | 52.0 KiB | 2021 Mar 06 19:53 |
You Are Not Hiding From Me .NET - Presented by Aden Chung.mp4 | 55.9 MiB | 2021 Mar 09 22:19 |