Parent directory/ | - | - |
Charles Hamilton - A Journey into Red Team.en.transcribed.srt | 169.0 KiB | 2019 Oct 01 07:25 |
Charles Hamilton - A Journey into Red Team.mp4 | 35.4 MiB | 2019 Oct 01 07:25 |
Daniel Bohannon - Invoke-DOSfuscation Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation).en.transcribed.srt | 180.7 KiB | 2019 Oct 01 07:25 |
Daniel Bohannon - Invoke-DOSfuscation Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation).mp4 | 65.0 MiB | 2019 Oct 01 07:25 |
Danny Cooper & Allan Wirth - Homeward Bound Scanning Private IP Space with DNS Rebinding.en.transcribed.srt | 102.9 KiB | 2019 Oct 01 07:25 |
Danny Cooper & Allan Wirth - Homeward Bound Scanning Private IP Space with DNS Rebinding.mp4 | 47.1 MiB | 2019 Oct 01 07:25 |
Dave gattaca Lewis - Data Breaches Barbarians in the Throne Room.en.transcribed.srt | 137.4 KiB | 2019 Oct 01 07:25 |
Dave gattaca Lewis - Data Breaches Barbarians in the Throne Room.mp4 | 53.2 MiB | 2019 Oct 01 07:25 |
Dimitry Snezhkov -- Quick Retooling with.NET Payloads.en.transcribed.srt | 132.0 KiB | 2019 Oct 01 07:25 |
Dimitry Snezhkov -- Quick Retooling with.NET Payloads.mp4 | 51.7 MiB | 2019 Oct 01 07:25 |
Eleanor Saitta - How to Think (About Complex Adversarial Systems).en.transcribed.srt | 127.1 KiB | 2019 Oct 01 07:25 |
Eleanor Saitta - How to Think (About Complex Adversarial Systems).mp4 | 79.7 MiB | 2019 Oct 01 07:25 |
Filip Kafla -- From Hacking Team to Hacked Team to….en.transcribed.srt | 36.7 KiB | 2019 Oct 01 07:25 |
Filip Kafla -- From Hacking Team to Hacked Team to….mp4 | 24.1 MiB | 2019 Oct 01 07:25 |
Karla Burnett - Ichthyology Phishing as a Science.en.transcribed.srt | 100.7 KiB | 2019 Oct 01 07:25 |
Karla Burnett - Ichthyology Phishing as a Science.mp4 | 23.7 MiB | 2019 Oct 01 07:25 |
Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development.en.transcribed.srt | 162.1 KiB | 2019 Oct 01 07:25 |
Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development.mp4 | 53.1 MiB | 2019 Oct 01 07:25 |
Laurent Desaulniers - Stupid Purple Teamer Tricks.en.transcribed.srt | 43.3 KiB | 2019 Oct 01 07:25 |
Laurent Desaulniers - Stupid Purple Teamer Tricks.mp4 | 18.0 MiB | 2019 Oct 01 07:25 |
Laurent Desaulniers - Stupid RedTeamer Tricks.en.transcribed.srt | 53.1 KiB | 2019 Oct 01 07:25 |
Laurent Desaulniers - Stupid RedTeamer Tricks.mp4 | 20.2 MiB | 2019 Oct 01 07:25 |
Marc-André Labonté - The Blackbear Project.en.transcribed.srt | 47.2 KiB | 2019 Oct 01 07:25 |
Marc-André Labonté - The Blackbear Project.mp4 | 29.1 MiB | 2019 Oct 01 07:25 |
Mark Mossberg - Binary analysis, meet the blockchain.en.transcribed.srt | 142.0 KiB | 2019 Oct 01 07:25 |
Mark Mossberg - Binary analysis, meet the blockchain.mp4 | 75.3 MiB | 2019 Oct 01 07:25 |
Martijn Grooten -- Getting ahead of the elliptic curve.en.transcribed.srt | 122.7 KiB | 2019 Oct 01 07:25 |
Martijn Grooten -- Getting ahead of the elliptic curve.mp4 | 58.4 MiB | 2019 Oct 01 07:25 |
Masha Alimardani - Tightening the Net in Iran.en.transcribed.srt | 110.3 KiB | 2019 Oct 01 07:25 |
Masha Alimardani - Tightening the Net in Iran.mp4 | 90.6 MiB | 2019 Oct 01 07:25 |
Melanie Segado -- Brain Implants & Mind Reading.en.transcribed.srt | 102.2 KiB | 2019 Oct 01 07:25 |
Melanie Segado -- Brain Implants & Mind Reading.mp4 | 31.2 MiB | 2019 Oct 01 07:25 |
Olivier Arteau -- Prototype pollution attacks in NodeJS applications.en.transcribed.srt | 64.7 KiB | 2019 Oct 01 07:25 |
Olivier Arteau -- Prototype pollution attacks in NodeJS applications.mp4 | 23.5 MiB | 2019 Oct 01 07:25 |
Paul Rascagneres & Warren Mercer - Surprise Supplies!.en.transcribed.srt | 122.1 KiB | 2019 Oct 01 07:25 |
Paul Rascagneres & Warren Mercer - Surprise Supplies!.mp4 | 49.7 MiB | 2019 Oct 01 07:25 |
Robert Sell - Exploits in Wetware.en.transcribed.srt | 139.9 KiB | 2019 Oct 01 07:25 |
Robert Sell - Exploits in Wetware.mp4 | 47.5 MiB | 2019 Oct 01 07:25 |
Ron Bowes - Video game hacks, cheats, and glitches.en.transcribed.srt | 134.1 KiB | 2019 Oct 01 07:25 |
Ron Bowes - Video game hacks, cheats, and glitches.mp4 | 54.1 MiB | 2019 Oct 01 07:25 |
Sarah Friend & Jon Maurelian - Smart contract vulnerabilities.en.transcribed.srt | 135.5 KiB | 2019 Oct 01 07:25 |
Sarah Friend & Jon Maurelian - Smart contract vulnerabilities.mp4 | 51.9 MiB | 2019 Oct 01 07:25 |
Sebastien Larinier (sebdraven) - Python and Machine Learning.mp4 | 65.8 MiB | 2019 Oct 01 07:25 |
Silvia Väli - Only an Electron away from code execution.en.transcribed.srt | 58.9 KiB | 2019 Oct 01 07:25 |
Silvia Väli - Only an Electron away from code execution.mp4 | 25.7 MiB | 2019 Oct 01 07:25 |
Stephane Graber - What are containers exactly and can they be trusted.en.transcribed.srt | 133.6 KiB | 2019 Oct 01 07:25 |
Stephane Graber - What are containers exactly and can they be trusted.mp4 | 55.3 MiB | 2019 Oct 01 07:25 |
Thaís aka barbie Moreira Hamasaki - Logic against sneak obfuscated malware.en.transcribed.srt | 47.4 KiB | 2019 Oct 01 07:25 |
Thaís aka barbie Moreira Hamasaki - Logic against sneak obfuscated malware.mp4 | 18.9 MiB | 2019 Oct 01 07:25 |
Thomas Pornin - Non-Crypto Constant-Time Coding.mp4 | 29.4 MiB | 2019 Oct 01 07:25 |
Wan Mengyuan (Nevermoe) - One Step Before Game Hackers -- Instrumenting Android Emulators.en.transcribed.srt | 54.6 KiB | 2019 Oct 01 07:25 |
Wan Mengyuan (Nevermoe) - One Step Before Game Hackers -- Instrumenting Android Emulators.mp4 | 24.6 MiB | 2019 Oct 01 07:25 |