Parent directory/ | - | - |
What you reap, is what you sow by Chris Sidragon1 Roberts.mp4 | 54.7 MiB | 2021 Oct 28 00:20 |
What's in my hacking tool box by Richard Rushing.mp4 | 46.8 MiB | 2021 Oct 28 00:20 |
Serverless Top 10 Vulnerabilities by Tal Melamed.mp4 | 35.7 MiB | 2021 Oct 28 00:20 |
iPhone Baseband Research - Reversing by Sem Voigtländer.mp4 | 31.3 MiB | 2021 Oct 28 00:20 |
From CTF to CVE by Joe Gray.mp4 | 31.0 MiB | 2021 Oct 28 00:20 |
AEM hacker - approaching Adobe Experience Manager webapps by Mikhail Egorov.mp4 | 28.5 MiB | 2021 Oct 28 00:20 |
Finding Bugs with Binary Ninja by Jordan Wiens.mp4 | 20.0 MiB | 2021 Oct 28 00:20 |
The Law and You Reducing the Cost of Free Speech by Nate Cardozo from EFF.mp4 | 19.9 MiB | 2021 Oct 28 00:20 |
Turbo Intruder Abusing HTTP Misfeatures to Accelerate Attacks by James Kettle.mp4 | 18.4 MiB | 2021 Oct 28 00:20 |
Social Engineering 101 by Matteo Cagnazzo.mp4 | 18.0 MiB | 2021 Oct 28 00:20 |
Why humans suck at calculating risk and how it affects security - Masha Sedova.mp4 | 16.9 MiB | 2021 Oct 28 00:20 |
IoT - Attacker Point of View by Arnaud COURTY.mp4 | 15.1 MiB | 2021 Oct 28 00:20 |
API Security 101 by Sadako.mp4 | 15.1 MiB | 2021 Oct 28 00:20 |
Mach0 and the App Store by Murtaza Munaim.mp4 | 15.0 MiB | 2021 Oct 28 00:20 |
Bad API, hAPI Hackers by jr0ch17.mp4 | 12.9 MiB | 2021 Oct 28 00:20 |
From an IVI in a box to a CAR in a box by Ian Tabor 'mintynet'.mp4 | 11.5 MiB | 2021 Oct 28 00:20 |
Profiling the Attacker - Using Offender Profiling In SOC Environments by James Stevenson.mp4 | 10.3 MiB | 2021 Oct 28 00:20 |
Behind the Curtain Safe Harbor and Department of Defense.mp4 | 6.4 MiB | 2021 Oct 28 00:20 |
What you reap, is what you sow by Chris Sidragon1 Roberts.eng.srt | 186.5 KiB | 2019 Sep 30 23:07 |
What's in my hacking tool box by Richard Rushing.eng.srt | 107.2 KiB | 2019 Sep 30 23:07 |
Behind the Curtain Safe Harbor and Department of Defense.eng.srt | 97.1 KiB | 2019 Sep 30 23:07 |
From CTF to CVE by Joe Gray.eng.srt | 95.2 KiB | 2019 Sep 30 23:07 |
Serverless Top 10 Vulnerabilities by Tal Melamed.eng.srt | 75.0 KiB | 2019 Sep 30 23:07 |
iPhone Baseband Research - Reversing by Sem Voigtländer.eng.srt | 66.1 KiB | 2019 Sep 30 23:07 |
The Law and You Reducing the Cost of Free Speech by Nate Cardozo from EFF.eng.srt | 60.6 KiB | 2019 Sep 30 23:07 |
AEM hacker - approaching Adobe Experience Manager webapps by Mikhail Egorov.eng.srt | 55.0 KiB | 2019 Sep 30 23:07 |
Finding Bugs with Binary Ninja by Jordan Wiens.eng.srt | 50.0 KiB | 2019 Sep 30 23:07 |
Turbo Intruder Abusing HTTP Misfeatures to Accelerate Attacks by James Kettle.eng.srt | 47.0 KiB | 2019 Sep 30 23:07 |
Why humans suck at calculating risk and how it affects security - Masha Sedova.eng.srt | 39.9 KiB | 2019 Sep 30 23:07 |
Social Engineering 101 by Matteo Cagnazzo.eng.srt | 37.4 KiB | 2019 Sep 30 23:07 |
Bad API, hAPI Hackers by jr0ch17.eng.srt | 37.0 KiB | 2019 Sep 30 23:07 |
Mach0 and the App Store by Murtaza Munaim.eng.srt | 36.2 KiB | 2019 Sep 30 23:07 |
Profiling the Attacker - Using Offender Profiling In SOC Environments by James Stevenson.eng.srt | 36.1 KiB | 2019 Sep 30 23:07 |
From an IVI in a box to a CAR in a box by Ian Tabor 'mintynet'.eng.srt | 35.5 KiB | 2019 Sep 30 23:07 |
API Security 101 by Sadako.eng.srt | 35.3 KiB | 2019 Sep 30 23:07 |