BSides Amsterdam/BSides Amsterdam 2017/T12 - Behavioral Analysis using DNS, Network Traffic and Logs, Josh Pyorre (@joshpyorre).en.transcribed.srt 94.3 kB
BSides Amsterdam/BSides Amsterdam 2017/T12 - Behavioral Analysis using DNS, Network Traffic and Logs, Josh Pyorre (@joshpyorre).mp4 67.4 MB
BSides Amsterdam/BSides Amsterdam 2017/T2 - Requiem For An Admin, Walter Legowski (@SadProcessor).en.transcribed.srt 68.5 kB
BSides Amsterdam/BSides Amsterdam 2017/T2 - Requiem For An Admin, Walter Legowski (@SadProcessor).mp4 62.8 MB
BSides Amsterdam/BSides Amsterdam 2017/T3 - Demystifying the Ransomware and IoT Threat, Christopher Elisan (@Tophs).en.transcribed.srt 85.2 kB
BSides Amsterdam/BSides Amsterdam 2017/T3 - Demystifying the Ransomware and IoT Threat, Christopher Elisan (@Tophs).mp4 68.4 MB
BSides Amsterdam/BSides Amsterdam 2017/T4 - To click or not to click, or how to build awareness..., Jelena Milosevic (@_j3lena_).mp4 29.9 MB
BSides Amsterdam/BSides Amsterdam 2017/T5 - To pin or not to pin SSL pinning for Android & iOS, Jeroen Willemsen (@commjoenie).en.transcribed.srt 69.6 kB
BSides Amsterdam/BSides Amsterdam 2017/T5 - To pin or not to pin SSL pinning for Android & iOS, Jeroen Willemsen (@commjoenie).mp4 45.3 MB
BSides Amsterdam/BSides Amsterdam 2017/T7 - I Thought I Saw a HAXOR, Thomas V. Fischer (@fvt).en.transcribed.srt 58.7 kB
BSides Amsterdam/BSides Amsterdam 2017/T7 - I Thought I Saw a HAXOR, Thomas V. Fischer (@fvt).mp4 42.9 MB
BSides Amsterdam/BSides Amsterdam 2017/T8 - Bots Combine! Behind the Modern Botnet, Andrea Scarfo (@AScarf0).en.transcribed.srt 36.1 kB
BSides Amsterdam/BSides Amsterdam 2017/T8 - Bots Combine! Behind the Modern Botnet, Andrea Scarfo (@AScarf0).mp4 42.8 MB
BSides Amsterdam/BSides Amsterdam 2017/T9 - The hidden horrors that 3 years of global red-teaming, Jos van der Peet (@Voske1985).en.transcribed.srt 50.1 kB
BSides Amsterdam/BSides Amsterdam 2017/T9 - The hidden horrors that 3 years of global red-teaming, Jos van der Peet (@Voske1985).mp4 36.4 MB
BSides Calgary/BSides Calgary 2017/Chris Thompson MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt).en.transcribed.srt 128.4 kB
BSides Calgary/BSides Calgary 2017/Chris Thompson MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt).mp4 88.3 MB
BSides Calgary/BSides Calgary 2017/Creating Realistic Cyber Security Policies for Industrial Control Systems, Lee Cysouw.en.transcribed.srt 123.1 kB
BSides Calgary/BSides Calgary 2017/Creating Realistic Cyber Security Policies for Industrial Control Systems, Lee Cysouw.mp4 81.8 MB
BSides Calgary/BSides Calgary 2017/Dave Kennedy Understanding Offensive and Defense - Having a purple view on INFOSEC.en.transcribed.srt 208.3 kB
BSides Calgary/BSides Calgary 2017/Dave Kennedy Understanding Offensive and Defense - Having a purple view on INFOSEC.mp4 95.5 MB
BSides Calgary/BSides Calgary 2017/David Lindner Dont Touch Me That Way.mp4 69.3 MB
BSides Calgary/BSides Calgary 2017/Deviant Elevator Hacking.en.transcribed.srt 158.8 kB
BSides Calgary/BSides Calgary 2017/Deviant Elevator Hacking.mp4 112.6 MB
BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 WUDS You Say SmartAssPhone - Frank Catucci.mp4 143.6 MB
BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 When a Security Architect Writes an Application - David Zendzian.mp4 359.1 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Building Burp Extensions - Jason Gillam.en.transcribed.srt 81.1 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Building Burp Extensions - Jason Gillam.mp4 84.8 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Exploiting Mass Emergency Notification Systems - Evan Davison.en.transcribed.srt 98.5 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Exploiting Mass Emergency Notification Systems - Evan Davison.mp4 87.7 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 FAIL-in-Depth - Marcus J. Carey.en.transcribed.srt 88.7 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 FAIL-in-Depth - Marcus J. Carey.mp4 80.5 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Get-Help An intro to Powershell and how to use it for evil.en.transcribed.srt 113.6 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Get-Help An intro to Powershell and how to use it for evil.mp4 98.1 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Hacking Web Apps - Brent White & Tim Roberts.en.transcribed.srt 127.3 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Hacking Web Apps - Brent White & Tim Roberts.mp4 94.7 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 How to pen-test off the grid...and in the middle of the Pacific.en.transcribed.srt 62.5 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 How to pen-test off the grid...and in the middle of the Pacific.mp4 68.0 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Internet of Things Hacking - Jason Davison.en.transcribed.srt 53.8 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Internet of Things Hacking - Jason Davison.mp4 51.7 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Software Vulnerability Discovery and Exploitation During Red Team Assessments.en.transcribed.srt 95.9 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Software Vulnerability Discovery and Exploitation During Red Team Assessments.mp4 52.6 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 The State of Information Security Today - Jeff Man.en.transcribed.srt 131.5 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 The State of Information Security Today - Jeff Man.mp4 116.0 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 You spent $20k & a throw away email can have full recon on your network.en.transcribed.srt 130.7 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 You spent $20k & a throw away email can have full recon on your network.mp4 78.7 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Infosec (Cyber Security) We're Doing It Wrong - Bill Gardner.en.transcribed.srt 56.3 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Infosec (Cyber Security) We're Doing It Wrong - Bill Gardner.mp4 43.9 MB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Kevin Johnson.en.transcribed.srt 106.3 kB
BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Kevin Johnson.mp4 69.7 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Adding PowerShell to your Arsenal with PSAttack - Jared Haight.en.transcribed.srt 117.4 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Adding PowerShell to your Arsenal with PSAttack - Jared Haight.mp4 95.5 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Anonymize Me A Technician's Guide to Hiding from the Internet - Ralph Collum.en.transcribed.srt 156.0 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Anonymize Me A Technician's Guide to Hiding from the Internet - Ralph Collum.mp4 102.4 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Black Box FISMA-based SCA of Public Cloud (IaaS) Providers - Gerald Auger.en.transcribed.srt 96.3 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Black Box FISMA-based SCA of Public Cloud (IaaS) Providers - Gerald Auger.mp4 87.6 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Do We Still Need Pen Testing - Jeff Man.en.transcribed.srt 77.2 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Do We Still Need Pen Testing - Jeff Man.mp4 83.4 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hacking Young Minds How to get Students interested in Infosec - Bryan Rhodes.en.transcribed.srt 114.3 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hacking Young Minds How to get Students interested in Infosec - Bryan Rhodes.mp4 118.0 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hunting High-Value Targets in Corporate Networks - Patrick Fussell & Josh Stone.en.transcribed.srt 119.2 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hunting High-Value Targets in Corporate Networks - Patrick Fussell & Josh Stone.mp4 81.6 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Mon'Amie XXE - Leo Pate.en.transcribed.srt 81.8 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Mon'Amie XXE - Leo Pate.mp4 69.5 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 OMNOMNOM A Newbie Chick's Take on InfoSec - April M. Jones.en.transcribed.srt 40.3 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 OMNOMNOM A Newbie Chick's Take on InfoSec - April M. Jones.mp4 98.2 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Shellcoding basics - Max Harley.en.transcribed.srt 85.7 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Shellcoding basics - Max Harley.mp4 62.3 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Alma Doesn't Fall Far From the Tree - Jason Davison & King Salemo.en.transcribed.srt 127.6 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Alma Doesn't Fall Far From the Tree - Jason Davison & King Salemo.mp4 152.8 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Hacker Evolution What have we become - Jason Gillam.en.transcribed.srt 72.3 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Hacker Evolution What have we become - Jason Gillam.mp4 78.4 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Weaponize JS Making the most of XSS opportunities - Mic Whitehorn-Gillam.en.transcribed.srt 67.1 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Weaponize JS Making the most of XSS opportunities - Mic Whitehorn-Gillam.mp4 60.7 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 What I learned being an OSINT creeper - Josh Huff.en.transcribed.srt 76.1 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 What I learned being an OSINT creeper - Josh Huff.mp4 45.6 MB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Keynote - Joseph Opacki.en.transcribed.srt 115.0 kB
BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Keynote - Joseph Opacki.mp4 55.8 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSides CHS 2017 Keynote Presentation by Jack Daniel.en.transcribed.srt 95.2 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSides CHS 2017 Keynote Presentation by Jack Daniel.mp4 67.8 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Are you ready by Jason Kent.en.transcribed.srt 133.3 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Are you ready by Jason Kent.mp4 83.5 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Becoming a Cyber Warrior by Ralph Collum.en.transcribed.srt 160.3 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Becoming a Cyber Warrior by Ralph Collum.mp4 110.1 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Deny All, application white-listing on Mac and Windows by Valentine Reid.en.transcribed.srt 108.2 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Deny All, application white-listing on Mac and Windows by Valentine Reid.mp4 93.1 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Hacking the ROI How to maximize your value from a Pentest by Mike Hodges.en.transcribed.srt 78.4 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Hacking the ROI How to maximize your value from a Pentest by Mike Hodges.mp4 66.5 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Learning to Firewalk Low to no cost resources to get into infosec by Bryan Austin.en.transcribed.srt 104.9 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Learning to Firewalk Low to no cost resources to get into infosec by Bryan Austin.mp4 99.0 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Poor Usability The Mother of Invention... by Christopher Hudel.en.transcribed.srt 136.8 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Poor Usability The Mother of Invention... by Christopher Hudel.mp4 214.9 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Quick Wins To Enhance Your Active Directory Security by Eric Kuehn.en.transcribed.srt 105.6 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Quick Wins To Enhance Your Active Directory Security by Eric Kuehn.mp4 78.1 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Realtime OSINT Tracking the Escaped Georgia Fugitives by Josh Huff.en.transcribed.srt 58.5 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Realtime OSINT Tracking the Escaped Georgia Fugitives by Josh Huff.mp4 40.8 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 RevEng All the IOTs by Gerald Auger, Tyler Flaagan, & Cory Nance.en.transcribed.srt 114.5 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 RevEng All the IOTs by Gerald Auger, Tyler Flaagan, & Cory Nance.mp4 85.5 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 SOS from pirates of the high sea to those of high finance by Francois Dion.en.transcribed.srt 97.1 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 SOS from pirates of the high sea to those of high finance by Francois Dion.mp4 102.4 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 What Up Breaches by Frank Catucci - YouTube.en.transcribed.srt 115.1 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 What Up Breaches by Frank Catucci - YouTube.mp4 91.9 MB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 ‘Weaponizing Ansible by Christopher Grimm.en.transcribed.srt 148.9 kB
BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 ‘Weaponizing Ansible by Christopher Grimm.mp4 77.4 MB
BSides Charm/BSides Charm 2018/Track 1 01 To AI or Not to AI What the US Military Needs for Fighting Cyber Wars Ernest Wong.en.transcribed.srt 18.6 kB
BSides Charm/BSides Charm 2018/Track 1 01 To AI or Not to AI What the US Military Needs for Fighting Cyber Wars Ernest Wong.mp4 34.7 MB
BSides Charm/BSides Charm 2018/Track 1 02 FailTime Failing towards Success Sean Metcalf.en.transcribed.srt 136.3 kB
BSides Charm/BSides Charm 2018/Track 1 02 FailTime Failing towards Success Sean Metcalf.mp4 46.3 MB
BSides Charm/BSides Charm 2018/Track 1 03 Basic Offensive Application of MOF Files in Scripting Devon Bordonaro.en.transcribed.srt 46.9 kB
BSides Charm/BSides Charm 2018/Track 1 03 Basic Offensive Application of MOF Files in Scripting Devon Bordonaro.mp4 24.6 MB
BSides Charm/BSides Charm 2018/Track 1 04 Counting Down to Skynet Nolan Hedglin.en.transcribed.srt 74.2 kB
BSides Charm/BSides Charm 2018/Track 1 04 Counting Down to Skynet Nolan Hedglin.mp4 31.0 MB
BSides Charm/BSides Charm 2018/Track 1 05 How we reverse engineered OSXPirrit got legal threats and survived Amit Serper.en.transcribed.srt 150.5 kB
BSides Charm/BSides Charm 2018/Track 1 05 How we reverse engineered OSXPirrit got legal threats and survived Amit Serper.mp4 72.6 MB
BSides Charm/BSides Charm 2018/Track 1 06 Quantify your hunt not your parents red teaming Devon Kerr.en.transcribed.srt 179.6 kB
BSides Charm/BSides Charm 2018/Track 1 06 Quantify your hunt not your parents red teaming Devon Kerr.mp4 61.7 MB
BSides Charm/BSides Charm 2018/Track 1 07 Internet Anarchy The Global March toward Data Localization Andrea Little Limbago.en.transcribed.srt 105.0 kB
BSides Charm/BSides Charm 2018/Track 1 07 Internet Anarchy The Global March toward Data Localization Andrea Little Limbago.mp4 32.8 MB
BSides Charm/BSides Charm 2018/Track 1 08 Effective Monitoring for Operational Security Russell Mosley Ryan St Germain.en.transcribed.srt 70.7 kB
BSides Charm/BSides Charm 2018/Track 1 08 Effective Monitoring for Operational Security Russell Mosley Ryan St Germain.mp4 31.6 MB
BSides Charm/BSides Charm 2018/Track 1 10 Between a SOC and a Hard Place Shawn Thomas Andrew Marini James Callahan Dustin Shirley.en.transcribed.srt 191.4 kB
BSides Charm/BSides Charm 2018/Track 1 10 Between a SOC and a Hard Place Shawn Thomas Andrew Marini James Callahan Dustin Shirley.mp4 88.2 MB
BSides Charm/BSides Charm 2018/Track 1 11 Using Atomic Red Team to Test Endpoint Solutions Adam Mathis.en.transcribed.srt 123.7 kB
BSides Charm/BSides Charm 2018/Track 1 11 Using Atomic Red Team to Test Endpoint Solutions Adam Mathis.mp4 43.3 MB
BSides Charm/BSides Charm 2018/Track 1 12 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Myers Barrett Adams.en.transcribed.srt 37.2 kB
BSides Charm/BSides Charm 2018/Track 1 12 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Myers Barrett Adams.mp4 37.4 MB
BSides Charm/BSides Charm 2018/Track 2 00 Preparing for Incident Handling and Response within Industrial Control Networks Mark Stac.en.transcribed.srt 64.9 kB
BSides Charm/BSides Charm 2018/Track 2 00 Preparing for Incident Handling and Response within Industrial Control Networks Mark Stac.mp4 42.3 MB
BSides Charm/BSides Charm 2018/Track 2 01 Getting Saucy with APFS The State of Apples New File System Sarah Edwards.en.transcribed.srt 144.2 kB
BSides Charm/BSides Charm 2018/Track 2 01 Getting Saucy with APFS The State of Apples New File System Sarah Edwards.mp4 88.7 MB
BSides Charm/BSides Charm 2018/Track 2 02 An Open Source Malware Classifier and Dataset Phil Roth.en.transcribed.srt 98.1 kB
BSides Charm/BSides Charm 2018/Track 2 02 An Open Source Malware Classifier and Dataset Phil Roth.mp4 62.2 MB
BSides Charm/BSides Charm 2018/Track 2 03 Threat Activity Attribution Differentiating the Who from the How Joe Slowik.en.transcribed.srt 184.5 kB
BSides Charm/BSides Charm 2018/Track 2 03 Threat Activity Attribution Differentiating the Who from the How Joe Slowik.mp4 95.3 MB
BSides Charm/BSides Charm 2018/Track 2 05 Powershell Deobfuscation Putting the toothpaste back in the tube Daniel Grant.en.transcribed.srt 78.4 kB
BSides Charm/BSides Charm 2018/Track 2 05 Powershell Deobfuscation Putting the toothpaste back in the tube Daniel Grant.mp4 48.1 MB
BSides Charm/BSides Charm 2018/Track 2 06 Plight at the end of the Tunnel Anjum Ahuja.en.transcribed.srt 62.9 kB
BSides Charm/BSides Charm 2018/Track 2 06 Plight at the end of the Tunnel Anjum Ahuja.mp4 36.1 MB
BSides Charm/BSides Charm 2018/Track 2 07 Malware Analysis and Automation using Binary Ninja Erika Noerenberg.en.transcribed.srt 143.1 kB
BSides Charm/BSides Charm 2018/Track 2 07 Malware Analysis and Automation using Binary Ninja Erika Noerenberg.mp4 70.4 MB
BSides Charm/BSides Charm 2018/Track 2 08 Exercise Your SOC How to run an effective SOC response simulation Brian Andrzejewski.en.transcribed.srt 93.9 kB
BSides Charm/BSides Charm 2018/Track 2 08 Exercise Your SOC How to run an effective SOC response simulation Brian Andrzejewski.mp4 55.0 MB
BSides Charm/BSides Charm 2018/Track 2 09 Building a Predictive Pipeline to Rapidly Detect Phishing Domains Wes Connell.en.transcribed.srt 115.2 kB
BSides Charm/BSides Charm 2018/Track 2 09 Building a Predictive Pipeline to Rapidly Detect Phishing Domains Wes Connell.mp4 84.7 MB
BSides Charm/BSides Charm 2018/fixed2 Track 1 09 Rise of the Miners Josh Grunzweig.en.transcribed.srt 132.6 kB
BSides Charm/BSides Charm 2018/fixed2 Track 1 09 Rise of the Miners Josh Grunzweig.mp4 55.5 MB
BSides Chicago/BSides Chicago 2014/Aligning Threats and Allies through Stories J Wolfgang Goerlich and Steven Fox.mp4 130.9 MB
BSides Chicago/BSides Chicago 2014/Bioinformatics Erasing the line between biology and hacking Krystal Thomas White and Patrick Thomas.mp4 119.4 MB
BSides Chicago/BSides Chicago 2014/Building an AppSec Program from Scratch Chris Pfoutz.mp4 47.0 MB
BSides Chicago/BSides Chicago 2014/Bypassing EMET 41 Jared DeMott.mp4 49.5 MB
BSides Chicago/BSides Chicago 2014/Call of Community Modern Warfare Matt Johnson & Ben Ten.mp4 75.7 MB
BSides Chicago/BSides Chicago 2014/Checklist Pentesting; Not checklist hacking Trenton Ivey.mp4 197.5 MB
BSides Chicago/BSides Chicago 2014/Checklist Pentesting_ Not checklist hacking Trenton Ivey.mp4 71.2 MB
BSides Chicago/BSides Chicago 2014/Comparing Risks to Risks Why Asset Management Is Broken and How to Fix It Michael Roytman.mp4 150.8 MB
BSides Chicago/BSides Chicago 2014/Everything I Ever Needed to Know About Infosec I Learned from Hollywood Tom Ervin.mp4 56.4 MB
BSides Chicago/BSides Chicago 2014/Hacking Diversity in InfoSec Greg Thomas.mp4 90.2 MB
BSides Chicago/BSides Chicago 2014/How To Win Friends and Influence Hackers Jimmy Vo.mp4 41.4 MB
BSides Chicago/BSides Chicago 2014/InfoSec Big Joke 3rd Party Assessments moey.mp4 64.7 MB
BSides Chicago/BSides Chicago 2014/Looking for the Weird Charles Herring.mp4 77.2 MB
BSides Chicago/BSides Chicago 2014/Minecraft Security Riese Goerlich.mp4 45.0 MB
BSides Chicago/BSides Chicago 2014/Seeing Purple Hybrid Security Teams for the Enterprise Belt.mp4 45.2 MB
BSides Chicago/BSides Chicago 2014/Sit stay proxy Good beagle Why I love the beaglebone black and why you should too Colin Vallance.mp4 58.0 MB
BSides Chicago/BSides Chicago 2014/The SMB Security Gap Mike Kavka.mp4 61.9 MB
BSides Chicago/BSides Chicago 2014/The Ultimate INFOSEC Interview Why must I be surrounded by frickin idiots Dr Evil 1997 Stephen Heath.mp4 180.4 MB
BSides Chicago/BSides Chicago 2014/closing.mp4 89.8 MB
BSides Chicago/BSides Chicago 2014/intro.mp4 34.3 MB
BSides Chicago/BSides Chicago 2014/jail.mp4 715.4 kB
BSides Cleveland/BSides Cleveland 2014/Keynote Dave Kennedy.mp4 107.4 MB
BSides Cleveland/BSides Cleveland 2014/Lockade Locksport Electronic Games Adrian Crenshaw.mp4 171.6 MB
BSides Cleveland/BSides Cleveland 2014/Malware Evolution Epidemiology Adam Hogan.mp4 125.8 MB
BSides Cleveland/BSides Cleveland 2014/Password Defense Controls your users wont hate Nathaniel Maier.mp4 71.2 MB
BSides Cleveland/BSides Cleveland 2014/Pentesting Layers 2 and 3 Kevin Gennuso and Eric Mikulas.mp4 170.0 MB
BSides Cleveland/BSides Cleveland 2014/Phishing Like a Monarch With King Phisher Brandon Geise and Spencer McIntyre.mp4 59.8 MB
BSides Cleveland/BSides Cleveland 2014/Plunder Pillage and Print The art of leverage multifunction printers during penetration testing Dera.mp4 115.1 MB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 201 Diary of a Security Noob TJ Toterhi.mp4 89.2 MB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 201 Diary of a Security Noob TJ Toterhi.srt 83.4 kB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 202 Enterprise Monitoring From Zero Andrew Johnson - YouTube.mp4 24.0 MB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 202 Enterprise Monitoring From Zero Andrew Johnson - YouTube.srt 50.8 kB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 203 Decentralization For Security and Freedom A Discussion of Asymmetric and Decent.mp4 149.7 MB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 203 Decentralization For Security and Freedom A Discussion of Asymmetric and Decent.srt 176.1 kB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 204 Building your Human Firewall Christopher Jones John Winkler.mp4 61.8 MB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 204 Building your Human Firewall Christopher Jones John Winkler.srt 66.5 kB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 205 Spy vs Spy Tips from the trenches for red and blue teams Thomas McBee Jeff McCu.mp4 32.4 MB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 205 Spy vs Spy Tips from the trenches for red and blue teams Thomas McBee Jeff McCu.srt 98.9 kB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 206 Choose Django for Secure Web Development Vince Salvino.mp4 34.6 MB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 206 Choose Django for Secure Web Development Vince Salvino.srt 56.8 kB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 208 Hacking in Highschool Inspiring the next generation of security professionals M.mp4 38.2 MB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 208 Hacking in Highschool Inspiring the next generation of security professionals M.srt 106.4 kB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 300 Better manual web application testing through automation Brian Mead.mp4 42.6 MB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 300 Better manual web application testing through automation Brian Mead.srt 89.9 kB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 301 What Theyre Teaching Kids These Days Rob Olson Chaim Sanders.mp4 148.0 MB
BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 301 What Theyre Teaching Kids These Days Rob Olson Chaim Sanders.srt 152.0 kB
BSides Columbus/BSides Columbus 2017/BSides Columbus 11 Information Security Talent Trends to expect in 2017 Megan Wells AJ Candella.mp4 41.8 MB
BSides Columbus/BSides Columbus 2017/BSides Columbus Redefining Security in a Cloud Centric Future Mike Spaulding.mp4 55.3 MB
BSides Columbus/BSides Columbus 2018/A00 Keynote Dave Kennedy.en.transcribed.srt 170.4 kB
BSides Columbus/BSides Columbus 2018/A00 Keynote Dave Kennedy.mp4 145.3 MB
BSides Columbus/BSides Columbus 2018/A01 Automating Security Testing with the OWTF Jerod Brennen.en.transcribed.srt 141.6 kB
BSides Columbus/BSides Columbus 2018/A01 Automating Security Testing with the OWTF Jerod Brennen.mp4 148.8 MB
BSides Columbus/BSides Columbus 2018/A02 Looks Like Rain Again Secure Development in the Cloud Bill Sempf.en.transcribed.srt 124.4 kB
BSides Columbus/BSides Columbus 2018/A02 Looks Like Rain Again Secure Development in the Cloud Bill Sempf.mp4 164.9 MB
BSides Columbus/BSides Columbus 2018/A04 How Stuxnet Ruined My Life For 6 Months But I Got To Fly 1st Class A Lot Chris Raiter Jeremy Smi.en.transcribed.srt 81.3 kB
BSides Columbus/BSides Columbus 2018/A04 How Stuxnet Ruined My Life For 6 Months But I Got To Fly 1st Class A Lot Chris Raiter Jeremy Smi.mp4 89.9 MB
BSides Columbus/BSides Columbus 2018/A05 Emotet Banking Malware With A Bite Bradley Duncan.en.transcribed.srt 74.1 kB
BSides Columbus/BSides Columbus 2018/A05 Emotet Banking Malware With A Bite Bradley Duncan.mp4 88.9 MB
BSides Columbus/BSides Columbus 2018/A06 Keynote Kevin Burkart.en.transcribed.srt 168.7 kB
BSides Columbus/BSides Columbus 2018/A06 Keynote Kevin Burkart.mp4 168.4 MB
BSides Columbus/BSides Columbus 2018/E00 Cryptology Its a Scalpel not a Hammer Mikhail Sudakov.en.transcribed.srt 135.9 kB
BSides Columbus/BSides Columbus 2018/E00 Cryptology Its a Scalpel not a Hammer Mikhail Sudakov.mp4 80.9 MB
BSides Columbus/BSides Columbus 2018/E01 Pass the Apple Sauce Mac OS X Security Automation for Windows focused Blue Teams Brian Satira.en.transcribed.srt 148.6 kB
BSides Columbus/BSides Columbus 2018/E01 Pass the Apple Sauce Mac OS X Security Automation for Windows focused Blue Teams Brian Satira.mp4 65.8 MB
BSides Columbus/BSides Columbus 2018/E02 Why People Suck at Delivery How to get your security projects off the ground and into production.en.transcribed.srt 84.2 kB
BSides Columbus/BSides Columbus 2018/E02 Why People Suck at Delivery How to get your security projects off the ground and into production.mp4 55.7 MB
BSides Columbus/BSides Columbus 2018/E03 Zero to Owned in 1 Hour Securing Privilege in Cloud and DevOps Workflow Brandon Traffanstedt.en.transcribed.srt 110.8 kB
BSides Columbus/BSides Columbus 2018/E03 Zero to Owned in 1 Hour Securing Privilege in Cloud and DevOps Workflow Brandon Traffanstedt.mp4 78.6 MB
BSides Columbus/BSides Columbus 2018/E04 Are you ready for my call Security researcher insights into Responsible Disclosure Jason Kent.en.transcribed.srt 128.9 kB
BSides Columbus/BSides Columbus 2018/E04 Are you ready for my call Security researcher insights into Responsible Disclosure Jason Kent.mp4 66.3 MB
BSides Columbus/BSides Columbus 2018/P04 Cybereasons Jim VanDeRyt Fileless Malware Breakout Session Jim VanDeRyt.en.transcribed.srt 49.0 kB
BSides Columbus/BSides Columbus 2018/P04 Cybereasons Jim VanDeRyt Fileless Malware Breakout Session Jim VanDeRyt.mp4 33.0 MB
BSides Columbus/BSides Columbus 2018/P05 The Quieter You Become the More Youre Able to HELK Nate Guagenti Roberto Rodriquez.en.transcribed.srt 155.6 kB
BSides Columbus/BSides Columbus 2018/P05 The Quieter You Become the More Youre Able to HELK Nate Guagenti Roberto Rodriquez.mp4 112.8 MB
BSides Columbus/BSides Columbus 2018/W00 Everything you always wanted to ask a hiring manager but were afraid to ask Mike Spaulding.en.transcribed.srt 160.7 kB
BSides Columbus/BSides Columbus 2018/W00 Everything you always wanted to ask a hiring manager but were afraid to ask Mike Spaulding.mp4 104.9 MB
BSides Columbus/BSides Columbus 2018/W02 Deep Learning for Enterprise Solving Business Problems with AI Christian Nicholson.en.transcribed.srt 145.2 kB
BSides Columbus/BSides Columbus 2018/W02 Deep Learning for Enterprise Solving Business Problems with AI Christian Nicholson.mp4 82.6 MB
BSides Columbus/BSides Columbus 2018/W03 Building Jarvis Stephen Hosom.en.transcribed.srt 48.4 kB
BSides Columbus/BSides Columbus 2018/W03 Building Jarvis Stephen Hosom.mp4 54.8 MB
BSides Columbus/BSides Columbus 2018/W04 Active Defense Helping threat actors hack themselves Matt Scheurer v2.en.transcribed.srt 106.5 kB
BSides Columbus/BSides Columbus 2018/W04 Active Defense Helping threat actors hack themselves Matt Scheurer v2.mp4 66.6 MB
BSides Columbus/BSides Columbus 2018/W04 Active Defense Helping threat actors hack themselves Matt Scheurer.en.transcribed.srt 111.2 kB
BSides Columbus/BSides Columbus 2018/W04 Active Defense Helping threat actors hack themselves Matt Scheurer.mp4 54.5 MB
BSides DC/BSides DC 2014/BSides DC 2014 - A Better Way to Get Intelligent About Threats.mp4 216.9 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Adventures in Asymmetric Warfare Fighting the AV Vendors.mp4 448.4 MB
BSides DC/BSides DC 2014/BSides DC 2014 - All About The Bass - Sing Off.mp4 26.4 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Bug Bounty Hunters Lessons From Darth Vader.mp4 589.6 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Building and Using A GPU Password Cracker.mp4 420.2 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Closing Remarks.mp4 41.6 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Cynomix Fireside Chat Demo.mp4 175.6 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Diamond Model for Intrusion Analysis What You Need to Know.mp4 308.4 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Diversity in IT #epicfail or #makingprogress.mp4 499.1 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Doctor Docker Building Your Infrastructure s Immune System.mp4 164.4 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Fighting Back Against SSL Interception (or How SSL Should Work).mp4 282.6 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Hacking Rants (from an almost old guy).mp4 352.2 MB
BSides DC/BSides DC 2014/BSides DC 2014 - How Headlines Make Heads Roll The Media s Impact On Security.mp4 594.9 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Keynote.mp4 260.9 MB
BSides DC/BSides DC 2014/BSides DC 2014 - MalwareViz a free Malware Visualizer.mp4 492.9 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Meatspace Indicators and Incident Response.mp4 441.2 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Network Attached Shell N.A.S.ty systems that store network accessible shells..mp4 272.0 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Once upon a time... InfoSec History 101.mp4 337.2 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Opening Acts How Attackers Get Their Big Breaks.mp4 426.9 MB
BSides DC/BSides DC 2014/BSides DC 2014 - SWF Seeking Lazy Admin for Cross-Domain Action.mp4 388.7 MB
BSides DC/BSides DC 2014/BSides DC 2014 - Training with Raspberry Pi.mp4 208.6 MB
BSides DC/BSides DC 2014/BSides DC 2014 - What Does It Actually Take to Start a Security Product Company.mp4 615.5 MB
BSides DC/BSides DC 2014/BSides DC 2014 - in ur scm, bein a ninja.mp4 467.0 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Knowing the Enemy”- Creating a Cyber Threat Actor Attribution Program.en.transcribed.srt 91.2 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Knowing the Enemy”- Creating a Cyber Threat Actor Attribution Program.mp4 197.9 MB
BSides DC/BSides DC 2016/BSides DC 2016 - A Hacker’s Guide to Usability Testing.mp4 210.5 MB
BSides DC/BSides DC 2016/BSides DC 2016 - A Notional Framework for applying Antifragile thinking to the RMF.mp4 265.4 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Abusing Windows with PowerShell and Microsoft debuggers.en.transcribed.srt 80.3 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Abusing Windows with PowerShell and Microsoft debuggers.mp4 225.9 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Act and Think like an Epidemiologist to Combat Digital Diseases.en.transcribed.srt 96.5 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Act and Think like an Epidemiologist to Combat Digital Diseases.mp4 120.9 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Adversarial Post-Exploitation Lessons From The Pros.en.transcribed.srt 122.9 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Adversarial Post-Exploitation Lessons From The Pros.mp4 227.9 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Applying data science to identify malicious actors in enterprise logs.mp4 193.0 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Attacking Patient Health The Anatomy of Hospital Exploitation.en.transcribed.srt 102.1 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Attacking Patient Health The Anatomy of Hospital Exploitation.mp4 202.6 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Beyond Automated Testing.en.transcribed.srt 129.8 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Beyond Automated Testing.mp4 209.8 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Building the BSides DC Registration System.en.transcribed.srt 36.4 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Building the BSides DC Registration System.mp4 67.0 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Closing Ceremony & Good Bye.en.transcribed.srt 20.0 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Closing Ceremony & Good Bye.mp4 51.6 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Crypt Kids Keynote by Liam Randall.en.transcribed.srt 67.0 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Crypt Kids Keynote by Liam Randall.mp4 129.6 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Detecting Malicious websites using Machine Learning.en.transcribed.srt 132.6 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Detecting Malicious websites using Machine Learning.mp4 216.3 MB
BSides DC/BSides DC 2016/BSides DC 2016 - How to Join the Infosec Community.en.transcribed.srt 143.7 kB
BSides DC/BSides DC 2016/BSides DC 2016 - How to Join the Infosec Community.mp4 213.1 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Keynote by Marcia Hoffman.en.transcribed.srt 66.7 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Keynote by Marcia Hoffman.mp4 147.4 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Opening.en.transcribed.srt 19.4 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Opening.mp4 40.3 MB
BSides DC/BSides DC 2016/BSides DC 2016 - PowerShell Security Defending the Enterprise from the Latest Attack Platform.en.transcribed.srt 144.2 kB
BSides DC/BSides DC 2016/BSides DC 2016 - PowerShell Security Defending the Enterprise from the Latest Attack Platform.mp4 212.4 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Practical Cyborgism Getting Start with Machine Learning for Incident Detection.en.transcribed.srt 143.4 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Practical Cyborgism Getting Start with Machine Learning for Incident Detection.mp4 233.5 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Tales from the Crypt...(analyst).en.transcribed.srt 134.2 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Tales from the Crypt...(analyst).mp4 227.0 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Tales of Fails and Tools for Message Integrity.en.transcribed.srt 110.5 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Tales of Fails and Tools for Message Integrity.mp4 154.6 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Tipping the Scales Back In Our Favor.en.transcribed.srt 65.1 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Tipping the Scales Back In Our Favor.mp4 118.1 MB
BSides DC/BSides DC 2016/BSides DC 2016 - Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk.en.transcribed.srt 91.9 kB
BSides DC/BSides DC 2016/BSides DC 2016 - Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk.mp4 198.0 MB
BSides DC/BSides DC 2016/BSides DC 2016 - WCTF Magic as told by a clumsy Magician.en.transcribed.srt 58.2 kB
BSides DC/BSides DC 2016/BSides DC 2016 - WCTF Magic as told by a clumsy Magician.mp4 148.9 MB
BSides DC/BSides DC 2016/BSides DC 2016 - We Should Talk About This Data Security as an Issue for Communication Research.mp4 211.9 MB
BSides DC/BSides DC 2016/BSides DC 2016 - What’s the Big Deal with Assessing ICS SCADA.mp4 269.4 MB
BSides DC/BSides DC 2016/BSides DC 2016 - YAYA (Yet Another YARA Allocution) - YouTube.en.transcribed.srt 100.4 kB
BSides DC/BSides DC 2016/BSides DC 2016 - YAYA (Yet Another YARA Allocution) - YouTube.mp4 120.9 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Advanced soft skills Using efficacy to get sh t done.en.transcribed.srt 119.6 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Advanced soft skills Using efficacy to get sh t done.mp4 206.9 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Adventures using trillions of records to find “bad” things.en.transcribed.srt 156.4 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Adventures using trillions of records to find “bad” things.mp4 314.1 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Between You and Me and the Network Security Boundary.en.transcribed.srt 108.6 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Between You and Me and the Network Security Boundary.mp4 166.0 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Beyond the Domain Exploiting Hidden Critical Assets on Red Teams.en.transcribed.srt 101.7 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Beyond the Domain Exploiting Hidden Critical Assets on Red Teams.mp4 169.2 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Closing.en.transcribed.srt 30.2 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Closing.mp4 86.8 MB
BSides DC/BSides DC 2017/BSides DC 2017 - CryptKids Keynote - Ms. Batz.en.transcribed.srt 81.4 kB
BSides DC/BSides DC 2017/BSides DC 2017 - CryptKids Keynote - Ms. Batz.mp4 161.3 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Discover Analytic Gaps with Unfetter.en.transcribed.srt 167.6 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Discover Analytic Gaps with Unfetter.mp4 230.5 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Exploiting Alpine Linux From vulnerability discovery to code execution.en.transcribed.srt 102.8 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Exploiting Alpine Linux From vulnerability discovery to code execution.mp4 198.1 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Forgotten Inputs Finding Web App Flaws By Understanding The Dev's Mind.en.transcribed.srt 114.5 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Forgotten Inputs Finding Web App Flaws By Understanding The Dev's Mind.mp4 240.5 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Hacking ASUS Routers.en.transcribed.srt 103.7 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Hacking ASUS Routers.mp4 166.0 MB
BSides DC/BSides DC 2017/BSides DC 2017 - How to Detect Malicious Certificates in Your Spare Time.en.transcribed.srt 86.0 kB
BSides DC/BSides DC 2017/BSides DC 2017 - How to Detect Malicious Certificates in Your Spare Time.mp4 200.4 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Imposter Syndrome I Don't Feel Like Who You Think I Am. (Updated video editing).en.transcribed.srt 104.3 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Imposter Syndrome I Don't Feel Like Who You Think I Am. (Updated video editing).mp4 172.6 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Learning to Innovate “1n51d3-th3-B0x” 21st Century Cyber Defense & Deterrence.en.transcribed.srt 169.7 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Learning to Innovate “1n51d3-th3-B0x” 21st Century Cyber Defense & Deterrence.mp4 282.8 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Open Source Approach The Next Best Thing in Cyber Incidence Management -.en.transcribed.srt 101.7 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Open Source Approach The Next Best Thing in Cyber Incidence Management -.mp4 155.4 MB
BSides DC/BSides DC 2017/BSides DC 2017 - PATRIOT Perceiving Advanced Threats by Rogue Internet Of Things.en.transcribed.srt 99.6 kB
BSides DC/BSides DC 2017/BSides DC 2017 - PATRIOT Perceiving Advanced Threats by Rogue Internet Of Things.mp4 178.8 MB
BSides DC/BSides DC 2017/BSides DC 2017 - PCI for Pen Testers.en.transcribed.srt 161.2 kB
BSides DC/BSides DC 2017/BSides DC 2017 - PCI for Pen Testers.mp4 271.7 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Revoke-Obfuscation PowerShell Obfuscation Detection (And Evasion) Using Science.en.transcribed.srt 195.6 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Revoke-Obfuscation PowerShell Obfuscation Detection (And Evasion) Using Science.mp4 250.0 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Secure Key Management in the Cloud.en.transcribed.srt 140.1 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Secure Key Management in the Cloud.mp4 223.4 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Stealing Our Children's Youth Identifying Early Cybersecurity Talent.en.transcribed.srt 118.7 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Stealing Our Children's Youth Identifying Early Cybersecurity Talent.mp4 200.5 MB
BSides DC/BSides DC 2017/BSides DC 2017 - The Black Art of Wireless Post-Exploitation.en.transcribed.srt 174.3 kB
BSides DC/BSides DC 2017/BSides DC 2017 - The Black Art of Wireless Post-Exploitation.mp4 240.1 MB
BSides DC/BSides DC 2017/BSides DC 2017 - The World is Y0ur$ Geolocation-based Wordlist Generation with Wordsmith.en.transcribed.srt 130.2 kB
BSides DC/BSides DC 2017/BSides DC 2017 - The World is Y0ur$ Geolocation-based Wordlist Generation with Wordsmith.mp4 204.2 MB
BSides DC/BSides DC 2017/BSides DC 2017 - They Live – World Domination via Human-Mimicking Automation.en.transcribed.srt 106.8 kB
BSides DC/BSides DC 2017/BSides DC 2017 - They Live – World Domination via Human-Mimicking Automation.mp4 158.9 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Transfer Learning Analyst-Sourcing Behavioral Classification.en.transcribed.srt 115.3 kB
BSides DC/BSides DC 2017/BSides DC 2017 - Transfer Learning Analyst-Sourcing Behavioral Classification.mp4 196.4 MB
BSides DC/BSides DC 2017/BSides DC 2017 - Welcome (Alex Norman) & Key Note (Ed Skoudis).mp4 316.0 MB
BSides DC/BSides DC Logo.jpg 21.2 kB
BSides Delaware/BSides Delaware 2012/Angry Cars Hacking the Car as a Platform.mp4 26.4 MB
BSides Delaware/BSides Delaware 2012/Cyber Security for the Industrial Environment An Intro to ISA IEC 62443.mp4 247.3 MB
BSides Delaware/BSides Delaware 2012/Firewalling dynamic infrastructures (the cloud) with Chef and Netfilter.mp4 176.7 MB
BSides Delaware/BSides Delaware 2012/Hacking the Male and Female OS (Men are from Windows, Women are from Linux).mp4 193.0 MB
BSides Delaware/BSides Delaware 2012/Introduction to the use after free vulnerability and why it matters.mp4 76.5 MB
BSides Delhi/BSides Delhi 2017/Bsides Delhi 2017 - Web App Security Testing via AI chatBot - Abhijith BR & Thoufeeque NS.en.transcribed.srt 30.0 kB
BSides Delhi/BSides Delhi 2017/Bsides Delhi 2017 - Web App Security Testing via AI chatBot - Abhijith BR & Thoufeeque NS.mp4 136.2 MB
BSides Detroit/BSides Detroit 2015/Track100-Level-One-How-To-Break-Into-The-Security-Field-Aaron-Moffett.mp4 36.3 MB
BSides Detroit/BSides Detroit 2015/Track101-Hacker-High-Why-We-Need-To-Teach-Computer-Hacking-In-Schools-Ron-Woerner.mp4 74.9 MB
BSides Detroit/BSides Detroit 2015/Track102-Getting-Started-Help-Me-Help-You-David-Trollman.mp4 77.6 MB
BSides Detroit/BSides Detroit 2015/Track103-From-Blue-To-Red-What-Matters-and-What-Really-Doesnt-Jason-Lang.mp4 78.7 MB
BSides Detroit/BSides Detroit 2015/Track104-Clear-as-FUD-How-fear-uncertainty-and-doubt-are-affecting-users-our-laws-and-technologies-Christopher-Maddalena.mp4 63.5 MB
BSides Detroit/BSides Detroit 2015/Track105-Data-Breaches-Simply-The-Cost-Of-Doing-Business-Joel-Cardella.mp4 65.0 MB
BSides Detroit/BSides Detroit 2015/Track106-Eating-the-SMB-Security-Elephant-An-ITSEC-framework-for-small-IT-shops-Austen-Bommarito.mp4 28.3 MB
BSides Detroit/BSides Detroit 2015/Track200-Enterprise-Class-Vulnerability-Management-Like-A-Boss-Rockie-Brockway.mp4 69.7 MB
BSides Detroit/BSides Detroit 2015/Track201-Funny-Money-What-Payment-Systems-Teach-us-about-Security-Drew-Sutter.mp4 242.3 MB
BSides Detroit/BSides Detroit 2015/Track202-Building-a-sturdy-foundation-a-program-based-approach-to-IT-Operations-Application-Development-and-Information-Security-in-business-Steven-Legg.mp4 389.3 MB
BSides Detroit/BSides Detroit 2015/Track203-Moving-past-Metasploit-Writing-your-first-exploit-Calvin-Hedler.mp4 68.6 MB
BSides Detroit/BSides Detroit 2015/Track205-Wielding-BurpSuite-quick-start-your-extensions-and-automation-rules-Marius-Nepomuceno.mp4 72.6 MB
BSides Detroit/BSides Detroit 2015/Track207-Browser-and-Windows-Environment-Hardening-Kurtis-Armour.mp4 36.9 MB
BSides Detroit/BSides Detroit 2015/keynote00-Information-Security-Reconciliation-The-Scene-and-The-Profession-Mark-Stanislav.mp4 100.2 MB
BSides Detroit/BSides Detroit 2016/BSides Detroit 2016 Intro.mp4 3.2 MB
BSides Detroit/BSides Detroit 2016/BSides Detroit 2016 Intro.srt 2.3 kB
BSides Detroit/BSides Detroit 2016/Hacker00 Learning Security the Hard Way Going from Student to Professional Benjamin Carroll.mp4 40.8 MB
BSides Detroit/BSides Detroit 2016/Hacker00 Learning Security the Hard Way Going from Student to Professional Benjamin Carroll.srt 47.8 kB
BSides Detroit/BSides Detroit 2016/Hacker01 So You Want to Be a Pentester Calvin Hedler.mp4 62.5 MB
BSides Detroit/BSides Detroit 2016/Hacker01 So You Want to Be a Pentester Calvin Hedler.srt 71.4 kB
BSides Detroit/BSides Detroit 2016/Hacker02 Sheep the Shepard History and Eugenics A historical reminder on why personal privacy matter.mp4 88.1 MB
BSides Detroit/BSides Detroit 2016/Hacker02 Sheep the Shepard History and Eugenics A historical reminder on why personal privacy matter.srt 82.9 kB
BSides Detroit/BSides Detroit 2016/Hacker03 I Have Been to The Future and I Did Not Want to Come Back Garrett McManaway.mp4 65.3 MB
BSides Detroit/BSides Detroit 2016/Hacker03 I Have Been to The Future and I Did Not Want to Come Back Garrett McManaway.srt 57.3 kB
BSides Detroit/BSides Detroit 2016/Hacker04 Vulnerability Management Systems Flawed Leaving your Enterprise at High Risk Gordon MacKay.mp4 48.2 MB
BSides Detroit/BSides Detroit 2016/Hacker04 Vulnerability Management Systems Flawed Leaving your Enterprise at High Risk Gordon MacKay.srt 54.2 kB
BSides Detroit/BSides Detroit 2016/Motown00 Car Hacking 0x05 Robert Leale.mp4 46.6 MB
BSides Detroit/BSides Detroit 2016/Motown00 Car Hacking 0x05 Robert Leale.srt 59.9 kB
BSides Detroit/BSides Detroit 2016/Motown03 How to Build a Home Lab Chris Maddalena.mp4 50.1 MB
BSides Detroit/BSides Detroit 2016/Motown03 How to Build a Home Lab Chris Maddalena.srt 60.4 kB
BSides Detroit/BSides Detroit 2016/Motown04 Bootstrapping A Security Research Project Andrew Hay.mp4 76.7 MB
BSides Detroit/BSides Detroit 2016/Motown04 Bootstrapping A Security Research Project Andrew Hay.srt 84.4 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 100 Moving Towards Maturity 5 Issues InfoSec Must Address Jim Beechey.mp4 121.3 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 100 Moving Towards Maturity 5 Issues InfoSec Must Address Jim Beechey.srt 143.2 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 101 Plotting Hackers Visualizing Attack Patterns Kent Gruber.mp4 76.8 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 101 Plotting Hackers Visualizing Attack Patterns Kent Gruber.srt 192.0 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 103 Navigating Career Choices in InfoSec Fernando Montenegro.mp4 55.9 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 103 Navigating Career Choices in InfoSec Fernando Montenegro.srt 74.8 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 105 Network Security What about the Data Jack Hatwick.mp4 60.7 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 105 Network Security What about the Data Jack Hatwick.srt 113.0 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 106 Playing in Memory Examples of User Theivery and Hunting for Malware Kyle And.mp4 92.9 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 106 Playing in Memory Examples of User Theivery and Hunting for Malware Kyle And.srt 113.8 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 107 An Employee their Laptop and a Hacker walk into a Bar Shannon Fritz.mp4 49.4 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 107 An Employee their Laptop and a Hacker walk into a Bar Shannon Fritz.srt 169.8 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 200 STEHM is the new STEM David Schwartzberg.mp4 76.7 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 200 STEHM is the new STEM David Schwartzberg.srt 174.2 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 201 Hacking with Ham Radios What I have learned in 25 years of being a ham Jay a.mp4 65.2 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 201 Hacking with Ham Radios What I have learned in 25 years of being a ham Jay a.srt 131.8 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 202 Windows Event Logs Zero to Hero Nate Guagenti Adam Swan.mp4 58.2 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 202 Windows Event Logs Zero to Hero Nate Guagenti Adam Swan.srt 121.5 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 203 ProbeSpy Tracking your past predicting your future Ian Odette.mp4 38.2 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 203 ProbeSpy Tracking your past predicting your future Ian Odette.srt 87.3 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 204 The AppSec Starter Kit Timothy De Block.mp4 67.7 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 204 The AppSec Starter Kit Timothy De Block.srt 140.6 kB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 205 Estimating Development Security Maturity in About an Hour Matt Clapham.mp4 58.8 MB
BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 205 Estimating Development Security Maturity in About an Hour Matt Clapham.srt 115.7 kB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 100 Yes Youre an Impostor now get back to work Johnny Xmas.en.transcribed.srt 234.9 kB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 100 Yes Youre an Impostor now get back to work Johnny Xmas.mp4 168.2 MB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 102 Protecting Phalanges from Processor Pressure Points Matthew Clapham.en.transcribed.srt 65.9 kB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 102 Protecting Phalanges from Processor Pressure Points Matthew Clapham.mp4 40.0 MB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 103 Know the Enemy How to make threat intelligence work Nir Yosha.en.transcribed.srt 121.9 kB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 103 Know the Enemy How to make threat intelligence work Nir Yosha.mp4 96.2 MB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 105 Practical Incident Response in Heterogenous Environment Kevin Murphy Stefano.en.transcribed.srt 109.1 kB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 105 Practical Incident Response in Heterogenous Environment Kevin Murphy Stefano.mp4 105.5 MB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 200 GRC-What Would You Say You Do Here Brian Martinez.en.transcribed.srt 119.5 kB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 200 GRC-What Would You Say You Do Here Brian Martinez.mp4 93.3 MB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 202 Nowhere to hide Lucas Gorczyca.en.transcribed.srt 83.2 kB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 202 Nowhere to hide Lucas Gorczyca.mp4 83.5 MB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 203 tacopirates Art of Woo Ben Carroll.en.transcribed.srt 95.6 kB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 203 tacopirates Art of Woo Ben Carroll.mp4 46.2 MB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 204 Saving All the Money to Buy All the Booze Learning to Hack All the Things on.en.transcribed.srt 93.7 kB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 204 Saving All the Money to Buy All the Booze Learning to Hack All the Things on.mp4 85.6 MB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 204 Security KPIs Measuring Improvement in Your Security Program Steven Aiello.mp4 75.4 MB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 Opening.en.transcribed.srt 10.1 kB
BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 Opening.mp4 11.2 MB
BSides Indy/BSides Indy 2018/BSides Indy 2018 03 The Pillars of Continuous Incident Response Brad Garnett.en.transcribed.srt 144.4 kB
BSides Indy/BSides Indy 2018/BSides Indy 2018 03 The Pillars of Continuous Incident Response Brad Garnett.mp4 79.1 MB
BSides Indy/BSides Indy 2018/BSides Indy 2018 04 Zero to Owned in 1 Hour Securing Privilege in Cloud and DevOps Workflow Brandon T.en.transcribed.srt 101.6 kB
BSides Indy/BSides Indy 2018/BSides Indy 2018 04 Zero to Owned in 1 Hour Securing Privilege in Cloud and DevOps Workflow Brandon T.mp4 63.1 MB
BSides Indy/BSides Indy 2018/BSides Indy 2018 06 Social Engineering for the Blue Team Timothy De Block.en.transcribed.srt 127.0 kB
BSides Indy/BSides Indy 2018/BSides Indy 2018 06 Social Engineering for the Blue Team Timothy De Block.mp4 81.1 MB
BSides Indy/BSides Indy 2018/BSides Indy 2018 07 Leveraging DevSecOps to Escape the Hamster Wheel of Never ending Security Fail Ch.en.transcribed.srt 115.7 kB
BSides Indy/BSides Indy 2018/BSides Indy 2018 07 Leveraging DevSecOps to Escape the Hamster Wheel of Never ending Security Fail Ch.mp4 68.6 MB
BSides Indy/BSides Indy 2018/BSides Indy 2018 08 Creating a Cyber Volunteer Department Ray Davidson.en.transcribed.srt 102.8 kB
BSides Indy/BSides Indy 2018/BSides Indy 2018 08 Creating a Cyber Volunteer Department Ray Davidson.mp4 78.5 MB
BSides Las Vegas/BSides Las Vegas 2013/2 2 1 Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn t Suck Josh.mp4 180.9 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 1 The Security Industry How to Survive Becoming Management Christien Rioux.mp4 247.8 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 2 Discovering Dark Matter Towards better Android Malware Heuristics Jim.mp4 219.0 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 3 Mom! I Broke My Insulin Pump Again! Jay Rad Radcliffe.mp4 175.7 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 4 Dungeons & Dragons, Siege Warfare, and Fantasy Defense in Depth Evan.mp4 165.9 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 5 HiveMind Distributed File Storage Using JavaScript Botnets Sean Malone.mp4 197.4 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 6 gitDigger Creating useful wordlists from public GitHub repositories WiK and.mp4 101.7 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 7 Collaborative Penetration Testing With Lair Tom Steele and Dan Kottmann.mp4 153.9 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 8 Social Aftermath Responding to Social Pwnage Steven F Fox.mp4 101.1 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 1 Silence Equals Death Violet Blue.mp4 276.0 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 2 The Cavalry Isn t Coming Starting the Revolution to Fsck it All!.mp4 191.3 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 3 A Fire In The Eye Olli Pekka Niemi and Antti Levomaki.mp4 132.8 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 4 Defense Evasion Modeling Frank Artes.mp4 215.4 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 5 Malware Management Framework We detected WinNTI with it! Michael Gough.mp4 160.0 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 6 Crunching the Top 10,000 Websites Password Policies and Controls Steve Werb.mp4 211.0 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 7 Governments and UFOs A Historical Analysis of Disinformation and Deception R.mp4 216.0 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 8 Strange interactions in personal data Brokers and the CFAA Christine Dudley.mp4 100.4 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1530 Brendan OConnor HARK The Hacker Archive.mp4 42.7 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1550 Jack Whitsitt Critical Infrastructure Protection As Code.mp4 73.2 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 1 Diamonds, Fitness and Cults Manipulation for Fun and Profit Katie Rodzon.mp4 166.5 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 2 Vulnerability & Exploit Trends A Deep Look Inside The Data Ed Bellis, Michae.mp4 167.7 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 3 EC2 or Bust - How to Build Your Own Pen Testing Lab in Amazon EC2 Grecs.mp4 146.6 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 4 Techniques for Escaping the AppSec Labyrinth Andrew Hay.mp4 161.1 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 5 The Erudite Inebriate s Guide to Life, Liberty, and the Purfuit of Happinefs.mp4 166.3 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 6 Hack the Hustle! Career Strategies for Information Security Professionals Ev.mp4 189.5 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 7 Information Sharing, or I ve got 99 problems and they re probably.mp4 95.8 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 2 How embracing social media helped me stop the hackers, save the world and get.mp4 136.5 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 3 Malware Automation Christopher Elisan.mp4 229.8 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 4 Popping the Penguin An Introduction to the Principles of Linux Persistence M.mp4 145.6 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 5 Network Survival WCS James Costello.mp4 180.3 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 6 The Slings and Arrows of Open Source Security Tod Beardsley and Mister X.mp4 202.7 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 7 What if Petraeus was a hacker Email privacy for the rest of us Fak3r.mp4 118.2 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 1 Never Mind Your Diet, Cut the Crap From Your Vocabulary Keli Hay Brian Marti.mp4 183.4 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 2 The 7 habits of highly effective CISOs Franklin Tallah Wendy Nather).mp4 196.4 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 3 The Little Dutch Boy D0n Quix0te Bill E Ghote).mp4 190.0 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 5 Stop Shooting Blanks No magic bullets in your arsenal Renegade6 Nicolle Neul.mp4 213.3 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 6 Flameout Burnout Supernova Dan Ward Ally Miller).mp4 186.0 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 7 The Sensual Side of 3D Printing Kat Sweet Javvad Malik).mp4 131.7 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 1 Fun with WebSockets using Socket Puppet Mister Glass Weasel).mp4 104.4 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 2 Using Machine Learning to Support Information Security Alex Pinto Joel Wilba.mp4 228.9 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 3 The Truth, You Thought We Wouldn t Know Wolf Flight Terry Gold).mp4 199.0 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 4 Vulnerabilities in Application Whitelisting Malware Case Studies Jared Sperl.mp4 156.4 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 5 The Goodness is Baked In Baking Assurance into Software Ebony Davi Ottenheim.mp4 125.0 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 6 Matriux Leandros An Open Source Penetration Testing and Forensic Distribution.mp4 146.6 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 7 Sixteen Colors Archiving the Evolution of ANSI and ASCII Art Doug Moore Bren.mp4 219.3 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 1 1 You Are Being Watched! Bharat Jogi.mp4 159.2 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 1 2 Calling All Researchers A Discussion on Building a Security Research F.mp4 164.9 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 1 3 Evil Empire SIEM FTW EggDropX and Tha CheezMan.mp4 149.1 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 2 1 Attribution Shmatribution! FIX YOUR SHIT! Krypt3ia.mp4 155.3 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 2 2 Breach Panel Davi Ottenheimer, Raymond Umerley, Jack Daniel, Steve Werby, Da.mp4 210.6 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 1 Attacking and Defending Full.mp4 200.2 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 2 Say It to My Face Shannon Sistrunk.mp4 211.0 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 3 Alex Dreams of Risk How the Concept of Being a Craftsma.mp4 207.4 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 4 GTFO FTW Hacking Your Lifestyle for Fun and Profit Beau Woods and Taylor Ban.mp4 216.2 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 5 You can t make people act more securely, you can help them want to.mp4 186.9 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 6 Your Droid Has No Clothes Mike Murray and Allan Zhang.mp4 191.8 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 2 3 OMFG China! T Prophet.mp4 222.2 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 Cookie Reuse Sam Bowne.mp4 67.2 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 01 Least Authority File System @zooko.mp4 84.0 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 02 Hack cellular metabolism by targeting mitochondria @ambimorph).mp4 62.2 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 04 Cross Platform Metasploit Payloads @bperry).mp4 40.5 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 05 GPS Hacking @recompiler).mp4 52.9 MB
BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 07 SSD data evaporation @sambrowne).mp4 46.3 MB
BSides Las Vegas/BSides Las Vegas 2014/bg00 opening keynote beyond good and evil towards effective security adam shostack.mp4 117.9 MB
BSides Las Vegas/BSides Las Vegas 2014/bg01 usb write blocking with usbproxy dominic spill.mp4 86.4 MB
BSides Las Vegas/BSides Las Vegas 2014/bg02 allow myself to encrypt myself evan davison.mp4 114.0 MB
BSides Las Vegas/BSides Las Vegas 2014/bg03 what reaction to packet loss reveals about a vpn anna shubina sergey bratus.mp4 79.6 MB
BSides Las Vegas/BSides Las Vegas 2014/bg04 untwisting the mersenne twister how i killed the prng moloch.mp4 90.7 MB
BSides Las Vegas/BSides Las Vegas 2014/bg05 anatomy of memory scraping credit card stealing pos malware amol sarwate.mp4 138.3 MB
BSides Las Vegas/BSides Las Vegas 2014/bg06 cluck cluck on intels broken promises jacob torrey.mp4 94.5 MB
BSides Las Vegas/BSides Las Vegas 2014/bg07 a better way to get intelligent about threats adam vincent.mp4 143.6 MB
BSides Las Vegas/BSides Las Vegas 2014/bg08 bring your own risky apps michael raggo kevin watkins.mp4 135.7 MB
BSides Las Vegas/BSides Las Vegas 2014/bg09 invasive roots of anti cheat software alissa torres.mp4 135.9 MB
BSides Las Vegas/BSides Las Vegas 2014/bg10 vaccinating android milan gabor danijel grah.mp4 107.9 MB
BSides Las Vegas/BSides Las Vegas 2014/bg11 security testing for smart metering infrastructure steve vandenberg robert hawk.mp4 134.9 MB
BSides Las Vegas/BSides Las Vegas 2014/bg12 the savage curtain tony trummer tushar dalvi.mp4 128.3 MB
BSides Las Vegas/BSides Las Vegas 2014/bg13 we hacked the gibson now what philip young.mp4 117.3 MB
BSides Las Vegas/BSides Las Vegas 2014/cg00 sha 1 backdooring and exploitation jean philippe aumasson.mp4 63.8 MB
BSides Las Vegas/BSides Las Vegas 2014/cg01 evading code emulation writing ridiculously obvious malware that bypasses av kyle adams.mp4 171.6 MB
BSides Las Vegas/BSides Las Vegas 2014/cg02 security management without the suck tony turner tim krabec.mp4 130.8 MB
BSides Las Vegas/BSides Las Vegas 2014/cg04 malware analysis 101 n00b to ninja in 60 minutes grecs.mp4 127.3 MB
BSides Las Vegas/BSides Las Vegas 2014/cg05 travel hacking with the telecom informer tprophet.mp4 117.5 MB
BSides Las Vegas/BSides Las Vegas 2014/cg06 the untold story about atm malware daniel regalado.mp4 98.7 MB
BSides Las Vegas/BSides Las Vegas 2014/cg07 using superpowers for hardware reverse engineering joe grand.mp4 156.3 MB
BSides Las Vegas/BSides Las Vegas 2014/cg08 why am i surrounded by friggin idiots because you hired them stephen heath.mp4 151.2 MB
BSides Las Vegas/BSides Las Vegas 2014/cg09 demystiphying and fingerprinting the 802 15 4 zigbee phy ira ray jenkins sergey bratus.mp4 122.8 MB
BSides Las Vegas/BSides Las Vegas 2014/cg10 insider threat kill chain human indicators of compromise ken westin.mp4 47.1 MB
BSides Las Vegas/BSides Las Vegas 2014/cg11 a place to hang our hats security community and culture domenic rizzolo.mp4 45.5 MB
BSides Las Vegas/BSides Las Vegas 2014/cg12 booze devils advocate and hugs the best debates panel youll see at bsideslv 2014 david mortman.mp4 166.2 MB
BSides Las Vegas/BSides Las Vegas 2014/gt00 the power law of information michael roytman.mp4 161.4 MB
BSides Las Vegas/BSides Las Vegas 2014/gt01 measuring the iq of your threat intelligence feeds alex pinto kyle maxwell.mp4 197.2 MB
BSides Las Vegas/BSides Las Vegas 2014/gt02 strategies without frontiers meredith l patterson.mp4 177.4 MB
BSides Las Vegas/BSides Las Vegas 2014/gt03 clusterf ck actionable intelligence from machine learning mike sconzo.mp4 117.0 MB
BSides Las Vegas/BSides Las Vegas 2014/gt04 know thy operator misty blowers.mp4 132.9 MB
BSides Las Vegas/BSides Las Vegas 2014/gt05 improving security by avoiding traffic and still get what you want in data transfers art conkli.mp4 115.6 MB
BSides Las Vegas/BSides Las Vegas 2014/pg00 edsec hacking for education jessy irwin.mp4 63.3 MB
BSides Las Vegas/BSides Las Vegas 2014/pg02 securing sensitive data a strange game jeff elliot.mp4 44.8 MB
BSides Las Vegas/BSides Las Vegas 2014/pg03 brick in the wall vs hole in the wall caroline d hardin.mp4 59.9 MB
BSides Las Vegas/BSides Las Vegas 2014/pg04 cut the shit how to reign in your ids tony robinson da 667.mp4 60.5 MB
BSides Las Vegas/BSides Las Vegas 2014/pg05 geek welfare confessions of a convention swag hoarder rachel keslensky.mp4 95.1 MB
BSides Las Vegas/BSides Las Vegas 2014/pg06 no infosec staff no problem anthony czarnik.mp4 83.8 MB
BSides Las Vegas/BSides Las Vegas 2014/pg07 can i code against an api to learn a product adrienne merrick tagore.mp4 37.0 MB
BSides Las Vegas/BSides Las Vegas 2014/pg08 bridging the air gap cross domain solutions patrick orzechowski.mp4 96.8 MB
BSides Las Vegas/BSides Las Vegas 2014/pg09 back dooring the digital home david lister.mp4 87.9 MB
BSides Las Vegas/BSides Las Vegas 2014/pg11 ios url schemes omg guillaume k ross.mp4 64.3 MB
BSides Las Vegas/BSides Las Vegas 2014/pg12 oops that wasnt suppossed to happen bypassing internet explorers cross site scripting filter ca.mp4 71.3 MB
BSides Las Vegas/BSides Las Vegas 2014/pg13 what ive learned as a con man masterchen.mp4 66.3 MB
BSides Las Vegas/BSides Las Vegas 2014/pg14 training with raspberry pi nathaniel davis.mp4 48.1 MB
BSides Las Vegas/BSides Las Vegas 2014/pg15 black magic and secrets how certificates influence you robert lucero.mp4 67.4 MB
BSides Las Vegas/BSides Las Vegas 2014/pg16 attacking drupal greg foss.mp4 90.6 MB
BSides Las Vegas/BSides Las Vegas 2014/pg17 hackers vs auditors dan anderson.mp4 66.0 MB
BSides Las Vegas/BSides Las Vegas 2014/pg18 third party service provider diligence why are we doing it all wrong patrice coles.mp4 80.3 MB
BSides Las Vegas/BSides Las Vegas 2014/pg19 pwning the hapless or how to make your security program not suck casey dunham emily pience.mp4 55.0 MB
BSides Las Vegas/BSides Las Vegas 2014/pg20 teach a man to phish vinny lariza.mp4 63.2 MB
BSides Las Vegas/BSides Las Vegas 2014/pg21 the lore shows the way eric rand.mp4 61.9 MB
BSides Las Vegas/BSides Las Vegas 2015/ATGP00-Underground-Wi-Fi-Hacking-for-Web-Pentesters-Greg-Foss.mp4 201.1 MB
BSides Las Vegas/BSides Las Vegas 2015/ATGP01-radBIOS-Wireless-networking-with-audio-Richo-Healey.mp4 116.9 MB
BSides Las Vegas/BSides Las Vegas 2015/ATGP02-I-Amateur-Radio-And-So-Can-You-Kat-Sweet.mp4 94.7 MB
BSides Las Vegas/BSides Las Vegas 2015/ATGP03-Intro-for-New-WCTFers-Russell-Handorf-Rick-Farina.mp4 193.4 MB
BSides Las Vegas/BSides Las Vegas 2015/ATGP05-Better-Spectrum-Monitoring-with-Software-Defined-Radio-Michael-Ossmann.mp4 103.3 MB
BSides Las Vegas/BSides Las Vegas 2015/ATGP06-Wi-Door-BindRev-Shells-for-your-Wi-Fi-Vivek-Ramachandran.mp4 111.9 MB
BSides Las Vegas/BSides Las Vegas 2015/ATGP07-Software-Defined-Radio-Signal-Processing-with-a-5-Microcontroller-Jared-Boone.mp4 94.1 MB
BSides Las Vegas/BSides Las Vegas 2015/ATGP08-All-Your-RFz-Are-Belong-to-Me-Software-Defined-Radio-Exploits-Balint-Seeber.mp4 86.2 MB
BSides Las Vegas/BSides Las Vegas 2015/BG00-Injection-on-Steroids-Code-less-Code-Injections-and-0-Day-Techniques-Paul-Schofield-Udi-Yavo.mp4 81.2 MB
BSides Las Vegas/BSides Las Vegas 2015/BG01-Getting-the-data-out-using-social-media-Dakota-Nelson-Gabriel-Butterick-Byron-Wasti.mp4 32.0 MB
BSides Las Vegas/BSides Las Vegas 2015/BG03-NSA-Playset-Bridging-the-Airgap-without-Radios-Michael-Leibowitz.mp4 61.0 MB
BSides Las Vegas/BSides Las Vegas 2015/BG05-Your-Electronic-Device-Please-Understanding-the-Border-Search-Exception-Electronic-Devices-Whitney-Merrill.mp4 105.0 MB
BSides Las Vegas/BSides Las Vegas 2015/BG06-WhyMI-so-Sexy-WMI-Attacks-Real-Time-Defense-and-Advanced-Forensic-Analysis-William-Ballenthin-Claudiu-Teodorescu-Matthew-Graeber.mp4 69.6 MB
BSides Las Vegas/BSides Las Vegas 2015/BG07-TAPIOCA-TAPIOCA-Automated-Processing-for-IOC-Analysis-Ryan-J-Chapman-Moses-Schwartz.mp4 71.4 MB
BSides Las Vegas/BSides Las Vegas 2015/BG08-Building-an-Empire-with-PowerShell-Will-Schroeder-Justin-Warner.mp4 74.1 MB
BSides Las Vegas/BSides Las Vegas 2015/BG09-Remote-Access-the-APT-Ian-Latter.mp4 56.8 MB
BSides Las Vegas/BSides Las Vegas 2015/BG10-Crash-The-IoT-Train-Yourself-Intentionally-Vulnerable-WRT-IV-WRT-Paul-Asadoorian-Nick-Curran.mp4 79.0 MB
BSides Las Vegas/BSides Las Vegas 2015/CG00-Barely-Legal-the-Hackeras-Guide-to-Cybersecurity-Legislation-Jen-Ellis.mp4 105.9 MB
BSides Las Vegas/BSides Las Vegas 2015/CG01-Pentesting-with-Docker-Tom-Steele.mp4 63.5 MB
BSides Las Vegas/BSides Las Vegas 2015/CG02-Dont-hate-the-Disclosure-Hate-the-Vulnerability-How-the-government-is-bringing-researchers-and-vendors-together-to-talk-vulnerability-disclosure-Allan-Friedman.mp4 82.3 MB
BSides Las Vegas/BSides Las Vegas 2015/CG03-How-Portal-Can-Change-Your-Security-Forever-Katrina-Rodzon.mp4 76.4 MB
BSides Las Vegas/BSides Las Vegas 2015/CG04-Angler-Lurking-in-the-Domain-Shadows-Nick-Biasini.mp4 64.5 MB
BSides Las Vegas/BSides Las Vegas 2015/CG05-A-hackers-guide-to-using-the-YubiKey-how-to-add-inexpensive-2-factor-authentication-to-your-next-project-Russ-Gritzo.mp4 84.6 MB
BSides Las Vegas/BSides Las Vegas 2015/CG06-Haking-the-Next-Generation-David-Schwartzberg.mp4 77.2 MB
BSides Las Vegas/BSides Las Vegas 2015/CG07-Backdooring-MS-Office-documents-with-secret-master-keys-Yoshinori-Takesako-Shigeo-Mitsunari.mp4 46.0 MB
BSides Las Vegas/BSides Las Vegas 2015/CG08-Yes-you-too-can-perform-daring-acts-of-Live-Acquisition-D0n-Quix0te.mp4 70.6 MB
BSides Las Vegas/BSides Las Vegas 2015/CG10-Rethink-Repurpose-Reuse-Rain-Hell-Michael-Zupo.mp4 44.7 MB
BSides Las Vegas/BSides Las Vegas 2015/GT01-Adversary-Intelligence-from-Conflict-to-Consensus-Alex-Valdevia-Rich-Barger.mp4 64.6 MB
BSides Las Vegas/BSides Las Vegas 2015/GT03-Crema-A-LangSec-inspired-Language-Sergey-Bratus-Jacob-Torrey.mp4 76.6 MB
BSides Las Vegas/BSides Las Vegas 2015/GT04-Making-Breaking-Machine-Learning-Anomaly-Detectors-in-Real-Life-Clarence-Chio.mp4 336.0 MB
BSides Las Vegas/BSides Las Vegas 2015/GT06-Who-Watches-the-Watchers-Metrics-for-Security-Strategy-Michael-Roytman.mp4 80.8 MB
BSides Las Vegas/BSides Las Vegas 2015/GT07-Advancing-Internet-Security-Research-with-Big-Data-and-Graph-Databases-Andrew-Hess.mp4 19.6 MB
BSides Las Vegas/BSides Las Vegas 2015/GT08-Intro-to-Data-Science-for-Security-Rob-Bird-Alex-Shagla-McKotch.mp4 168.0 MB
BSides Las Vegas/BSides Las Vegas 2015/GT09-No-More-Fudge-Factors-and-Made-up-Shit-Performance-Numbers-That-Mean-Something-Russell-Thomas.mp4 121.9 MB
BSides Las Vegas/BSides Las Vegas 2015/GT09-When-steganography-stops-being-cool-David-Sancho.mp4 51.9 MB
BSides Las Vegas/BSides Las Vegas 2015/IATC00-IATC-Track-Introduction-and-Overview-Josh-Corman-joshcorman-Nicholas-J-Percoco.mp4 39.3 MB
BSides Las Vegas/BSides Las Vegas 2015/IATC00-Intro-and-Hack-the-Future-Keren-Elazari1.mp4 81.8 MB
BSides Las Vegas/BSides Las Vegas 2015/IATC01-Hack-the-Future-Keren-Elazari.mp4 42.7 MB
BSides Las Vegas/BSides Las Vegas 2015/IATC03-State-of-Medical-Device-Cyber-Safety-Beau-Woods-Scott-Erven.mp4 55.1 MB
BSides Las Vegas/BSides Las Vegas 2015/IATC04-Leading-in-a-Do-ocracy-Chris-Nickerson-Beau-Woods-Tod-Beardsley-Tim-Remes.mp4 167.1 MB
BSides Las Vegas/BSides Las Vegas 2015/IATC05-State-of-Automotive-Cyber-Safety-Josh-Corman-joshcorman-Craig-Smith.mp4 102.8 MB
BSides Las Vegas/BSides Las Vegas 2015/PG00-Speaking-Metrics-to-Executives-Michael-St-Vincent.mp4 37.0 MB
BSides Las Vegas/BSides Las Vegas 2015/PG01-Dropping-hell0days-Business-Interaction-for-Security-Professionals-Or-Anyone-Else-Elliot-Johnson.mp4 31.9 MB
BSides Las Vegas/BSides Las Vegas 2015/PG02-Practice-Safe-Cyber-The-Miseducation-of-American-Students-on-Internet-Safety-Vivienne-Pustell.mp4 50.1 MB
BSides Las Vegas/BSides Las Vegas 2015/PG03-Check-That-Certificate-Jacob-Jernigan-Andrew-Sorensen.mp4 41.2 MB
BSides Las Vegas/BSides Las Vegas 2015/PG04-The-Journey-To-ICS-Larry-Vandenaweele.mp4 26.3 MB
BSides Las Vegas/BSides Las Vegas 2015/PG05-Catching-Linux-Post-Exploitation-with-Auditd-Eric-Gershman.mp4 34.2 MB
BSides Las Vegas/BSides Las Vegas 2015/PG06-Adding-10-Security-to-Your-Scrum-Agile-Environment-Josh-Louden.mp4 155.2 MB
BSides Las Vegas/BSides Las Vegas 2015/PG07-Fight-back-raising-awareness-infosec-Petri-Koivisto.mp4 34.6 MB
BSides Las Vegas/BSides Las Vegas 2015/PG08-What-the-heck-is-this-radio-stuff-anyway-Nick-Kartsioukas.mp4 34.5 MB
BSides Las Vegas/BSides Las Vegas 2015/PG09-SIEMple-technology-Bill-Davison.mp4 32.1 MB
BSides Las Vegas/BSides Las Vegas 2015/PG10-How-I-learnt-hacking-in-highschool-Lokesh-Pidawekar.mp4 38.2 MB
BSides Las Vegas/BSides Las Vegas 2015/PG11-ZOMG-Its-OSINT-Heaven-Tazz-Tazz.mp4 58.6 MB
BSides Las Vegas/BSides Las Vegas 2015/PG12-Classic-Misdirection-Social-Engineering-to-Counter-Surveillance-Peter-Clemenko-III.mp4 36.7 MB
BSides Las Vegas/BSides Las Vegas 2015/PG13-Phishing-Going-from-Recon-to-Credentials-Adam-Compton-Eric-Gershman.mp4 41.2 MB
BSides Las Vegas/BSides Las Vegas 2015/PG14-Social-Media-in-Incident-Response-Program-JoEtta-LeSueur.mp4 25.7 MB
BSides Las Vegas/BSides Las Vegas 2015/PG15-Cats-and-Mice-Ever-evolving-attackers-and-other-game-changerse-Eric-Kmetz.mp4 34.4 MB
BSides Las Vegas/BSides Las Vegas 2015/PG16-FAA-FTC-FCC-FU-How-Three-F-ing-Agencies-are-Shaping-Info-Sec-Elizabeth-Wharton.mp4 46.2 MB
BSides Las Vegas/BSides Las Vegas 2015/PG17-10-Knowledge-Sharing-What-You-Learn-For-the-Benefit-of-the-Everyman-Ashley-Miller.mp4 57.2 MB
BSides Las Vegas/BSides Las Vegas 2015/PG18-Maximizing-Bro-Detection-John-B-Althouse.mp4 38.2 MB
BSides Las Vegas/BSides Las Vegas 2015/PG19-Embedding-Web-Apps-in-MITMProxy-Scripts-Chris-Czub.mp4 27.4 MB
BSides Las Vegas/BSides Las Vegas 2015/PG20-What-Lurks-in-the-Shadow-Cheryl-Biswas.mp4 29.6 MB
BSides Las Vegas/BSides Las Vegas 2015/PG21-Out-of-Denial-A-12-Step-Program-for-Recovering-Admins-Paul-Lee.mp4 23.9 MB
BSides Las Vegas/BSides Las Vegas 2015/PG22-Why-We-Cant-Have-Nice-Things-Original-Research-on-Conflict-Resolution-Styles-in-Information-Security-Risk-Management-Rachael-Lininger.mp4 38.3 MB
BSides Las Vegas/BSides Las Vegas 2015/PG23-Serial-Box-Primer-for-dealing-with-Serial-and-JTAG-for-basic-hardware-hacking-Matthew-Jakubowski.mp4 46.1 MB
BSides Las Vegas/BSides Las Vegas 2015/PW00-passwords-privacy-keystroke-dynamics-Per-Thorsheim.mp4 38.6 MB
BSides Las Vegas/BSides Las Vegas 2015/PW01-Unspeakable-passwords-pronounceable-or-Diceware-Jeffery-Goldberg.mp4 70.3 MB
BSides Las Vegas/BSides Las Vegas 2015/PW02-Pushing-on-String-Adventures-in-the-Dont-Care-Regions-of-Password-Strength-Cormac-Herley.mp4 86.6 MB
BSides Las Vegas/BSides Las Vegas 2015/PW03-What-would-fix-passwords-Some-weekly-password-audits-Pretty-graphs-to-prove-it-A-Haiku-Rick-Redman-Dale-Corpron.mp4 41.4 MB
BSides Las Vegas/BSides Las Vegas 2015/PW04-Breachego-Christian-Heinrich.mp4 42.4 MB
BSides Las Vegas/BSides Las Vegas 2015/PW05-Tell-Me-Who-You-Are-and-I-Will-Tell-You-Your-Lock-Pattern-Marte-LAge.mp4 196.8 MB
BSides Las Vegas/BSides Las Vegas 2015/PW06-Scrutinizing-WPA2-Password-Generating-Algorithms-in-Wireless-Routers-Eduardo-Novella.mp4 36.2 MB
BSides Las Vegas/BSides Las Vegas 2015/PW07-Poppin-Digital-Locks-Devin-Egan.mp4 35.0 MB
BSides Las Vegas/BSides Las Vegas 2015/PW08-Privileges-in-the-Real-World-Securing-Password-Management-Andrey-Dulkin.mp4 35.1 MB
BSides Las Vegas/BSides Las Vegas 2015/PW09-Security-Questions-Considered-Harmful-Jim-Fenton.mp4 31.3 MB
BSides Las Vegas/BSides Las Vegas 2015/PW10-I-Forgot-My-Password-Michal-A-paAek.mp4 59.5 MB
BSides Las Vegas/BSides Las Vegas 2015/PW11-Harvesting-Passwords-from-Source-Code-Scripts-and-Code-Repositories-Philippe-Paquet.mp4 48.5 MB
BSides Las Vegas/BSides Las Vegas 2015/PW12-Towards-Standardizing-Comparisons-of-Password-Guessability-Sean-Segreti-Blase-Ur.mp4 43.9 MB
BSides Las Vegas/BSides Las Vegas 2015/PW20-Password-Based-Encryption-Using-IO-Hardness-Greg-Zaverucha.mp4 33.0 MB
BSides Las Vegas/BSides Las Vegas 2015/PW21-Auth-for-Encrypted-Services-with-Server-Side-APT.mp4 46.4 MB
BSides Las Vegas/BSides Las Vegas 2015/PW22-Blind-Hashing.mp4 39.4 MB
BSides Las Vegas/BSides Las Vegas 2015/PW23-PBKDF2-Performance-Matters.mp4 30.9 MB
BSides Las Vegas/BSides Las Vegas 2015/PW24-Password-Alert-by-Google.mp4 40.1 MB
BSides Las Vegas/BSides Las Vegas 2015/PW25-No-More-Graphical-Passwords-Mark-Brunett.mp4 35.3 MB
BSides Las Vegas/BSides Las Vegas 2015/PW26-How-Secure-Are-Multi-Word-Random-Passphrases.mp4 39.2 MB
BSides Las Vegas/BSides Las Vegas 2015/PW27-Are-You-Sure-That-You-Still-Need-Passwords.mp4 24.0 MB
BSides Las Vegas/Bsides Las Vegas 2012/1 2 5 dc949 Stiltwalker Round 2.mp4 147.0 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.1.0 KEYNOTE, Jack Daniel The State of Security BSides.mp4 95.5 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.1.1 Matt Weeks Ambush - Catching Intruders At Any Point.mp4 108.9 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.1.2 Robert Rowley Max Level Web App Security.mp4 87.4 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.1.3 Davi Ottenheimer Big Data s Fourth V Or Why We ll Never Find the Loch Ness Monster.mp4 92.0 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.1.4 HD Moore Empirical Exploitation.mp4 92.1 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.1.5 Christopher Lytle Puzzle Competitions and You.mp4 79.1 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.1.6 Parth Patel Introducing Android Security Evaluation Framework - ASEF.mp4 82.3 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.1.7 Terry Gold RFID LOL.mp4 86.2 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.2.0 Raphael Mudge Force Multipliers for Red Team Operations.mp4 97.5 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.2.1 Andrew Hay & Matt Johansen Applications and Cloud and Hackers, Oh My!.mp4 102.3 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.2.2 Brendan O Connor Reticle Dropping an Intelligent F-BOMB.mp4 246.1 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.2.3 Josh Sokol Dan Cornell The Magic of Symbiotic Security Creating an Ecosystem of Security.mp4 80.2 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.2.4 James Lester & Joseph Tartaro Burp Suite Informing the 99% of what the 1%ers.mp4 104.4 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.2.6 Gillis Jones The Badmin project (Na-na- nanana Na-na-nanana BADMIN).mp4 53.5 MB
BSides Las Vegas/Bsides Las Vegas 2012/1.2.7 IPv6 Panel Drinking Game.mp4 78.3 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.1.0 Michael Fornal How I managed to break into the InfoSec World.mp4 75.8 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.1.1 David Keene Breaking Microsoft Dynamics Great Plains - an insiders guide.mp4 84.0 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.1.2 William Ghote Lotus Notes Password Hash Redux.mp4 62.1 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.1.3 Spencer McIntyre How I Learned To Stop Worrying and Love the Smart Meter.mp4 89.7 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.1.4 Christopher Campbell Shot With Your Own Gun How Appliances are Used Against You.mp4 95.0 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.1.5 Shawn Asmus, Kristov Widak Mirror Mirror -- Reflected PDF Attacks using SQL Injection.mp4 100.2 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.1.6 Georgia Weidman Introducing the Smartphone Penetration Testing Framework.mp4 77.1 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.2.0 Phil Young Mainframed - The Forgotten Fortress.mp4 96.5 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.2.1 Walt Williams Metrics that Suck Even Less.mp4 112.5 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.2.2 Conrad Constantine The Leverage of Language or How I Realized Information Theory.mp4 95.6 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.2.3 Jason Ding The Blooming Social Media Economics Built on Fake Identities.mp4 94.5 MB
BSides Las Vegas/Bsides Las Vegas 2012/2.2.4 Lightning Talks.mp4 217.1 MB
BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - BadXNU, a rotten apple! - Pedro Vilaca.en.transcribed.srt 127.1 kB
BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - BadXNU, a rotten apple! - Pedro Vilaca.mp4 163.2 MB
BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - What Botnet Is This - Tiago Pereira.en.transcribed.srt 84.2 kB
BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - What Botnet Is This - Tiago Pereira.mp4 84.7 MB
BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - “Damn kids. They're all alike.” … we have a date with history - Wim Remes.mp4 48.5 MB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Brace YoSelf DDoS is Coming by Dima Bekerman.en.transcribed.srt 74.4 kB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Brace YoSelf DDoS is Coming by Dima Bekerman.mp4 83.9 MB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Challenges of secure coding by Barbara Vieira.en.transcribed.srt 51.7 kB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Challenges of secure coding by Barbara Vieira.mp4 68.3 MB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - From your PC to your nearest ATM a history of the sneakiest financial malware.en.transcribed.srt 88.1 kB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - From your PC to your nearest ATM a history of the sneakiest financial malware.mp4 77.4 MB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - I for one welcome our new Cyber Overlords! An intro to ML in cybersecurity.en.transcribed.srt 123.8 kB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - I for one welcome our new Cyber Overlords! An intro to ML in cybersecurity.mp4 127.6 MB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Introducing Man In The Contacts attack to trick encrypted messaging apps.mp4 92.3 MB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Keynote Hacking Portugal and making it a global player in Software development.en.transcribed.srt 142.8 kB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Keynote Hacking Portugal and making it a global player in Software development.mp4 113.6 MB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Keynote - The Smart Fuzzer Revolution by Dan Guido.en.transcribed.srt 109.4 kB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Keynote - The Smart Fuzzer Revolution by Dan Guido.mp4 108.3 MB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Lessons Learned from a Bug Bounty Operator by Jonathan Claudius.en.transcribed.srt 119.9 kB
BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Lessons Learned from a Bug Bounty Operator by Jonathan Claudius.mp4 78.6 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Controlling your neighbour's lights by André Garrido.en.transcribed.srt 85.8 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Controlling your neighbour's lights by André Garrido.mp4 51.7 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Crafting the next-generation Man-in-the-Browser Trojan by P. Fortuna & P. Silva.en.transcribed.srt 123.3 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Crafting the next-generation Man-in-the-Browser Trojan by P. Fortuna & P. Silva.mp4 102.9 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Fantastic signals and where to find them by Luís Grangeia and José Moreira.en.transcribed.srt 130.5 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Fantastic signals and where to find them by Luís Grangeia and José Moreira.mp4 108.5 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - FileLess Malware Infections - Malware tricks for Pentesters by Ramon Pinuaga.en.transcribed.srt 94.5 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - FileLess Malware Infections - Malware tricks for Pentesters by Ramon Pinuaga.mp4 77.7 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - GTFO Mr. User by David Sopas.en.transcribed.srt 73.7 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - GTFO Mr. User by David Sopas.mp4 50.6 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Hardware Basics - why and how to break hardware by Kieran Roberts.en.transcribed.srt 72.5 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Hardware Basics - why and how to break hardware by Kieran Roberts.mp4 33.0 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Having fun while analyzing mobile applications by alvaro Felipe Melchor.en.transcribed.srt 58.4 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Having fun while analyzing mobile applications by alvaro Felipe Melchor.mp4 37.3 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - I Thought I Saw a - 4X0.- by Thomas Fischer.en.transcribed.srt 154.3 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - I Thought I Saw a - 4X0.- by Thomas Fischer.mp4 118.4 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Intel AMT Using & Abusing the Ghost in the Machine by Parth Shukla.en.transcribed.srt 139.0 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Intel AMT Using & Abusing the Ghost in the Machine by Parth Shukla.mp4 78.3 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Claudio André by Vítor Domingos.en.transcribed.srt 18.6 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Claudio André by Vítor Domingos.mp4 26.5 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Javvad Malik by Vítor Domingos & Tiago Henriques.en.transcribed.srt 38.7 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Javvad Malik by Vítor Domingos & Tiago Henriques.mp4 47.7 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Leigh Anne Galloway by Vítor Domingos & Tiago Henriques.en.transcribed.srt 52.0 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Leigh Anne Galloway by Vítor Domingos & Tiago Henriques.mp4 71.7 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Oliver Kunz by Vítor Domingos & Tiago Henriques.en.transcribed.srt 28.1 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Oliver Kunz by Vítor Domingos & Tiago Henriques.mp4 42.4 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Pedro Vilaca by Vítor Domingos & Tiago Henriques.en.transcribed.srt 61.0 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Pedro Vilaca by Vítor Domingos & Tiago Henriques.mp4 88.2 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Thomas Fischer by Vítor Domingos & Tiago Henriques.en.transcribed.srt 41.9 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Thomas Fischer by Vítor Domingos & Tiago Henriques.mp4 54.8 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Keynote How storytelling made me a better infosec professional by Javvad Malik.mp4 61.6 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Keynote The Post-Quantum Project Why and How by JP Aumasson.en.transcribed.srt 112.8 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Keynote The Post-Quantum Project Why and How by JP Aumasson.mp4 66.3 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Practical Out-of-Band Data Exfiltration in 802.11 by João Pena Gil & Luís Gomes.en.transcribed.srt 105.0 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Practical Out-of-Band Data Exfiltration in 802.11 by João Pena Gil & Luís Gomes.mp4 72.5 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - V!4GR4 BotNet Cyber-Crime, Enlarged by Ben Herzberg.en.transcribed.srt 111.3 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Welcome to Bsides (day 1) by BSidesLisbon organizers.en.transcribed.srt 30.7 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Welcome to Bsides (day 1) by BSidesLisbon organizers.mp4 43.1 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Welcome to Bsides (day 2) by BSidesLisbon organizers.en.transcribed.srt 25.8 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Welcome to Bsides (day 2) by BSidesLisbon organizers.mp4 42.7 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Wild Wild Web App to Domain Admin A Case Study by Nacho Sorribas.mp4 64.3 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 Interview with Bruno Morisson by Vítor Domingos & Tiago Henriques.en.transcribed.srt 29.1 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 Interview with Bruno Morisson by Vítor Domingos & Tiago Henriques.mp4 42.7 MB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 Interview with Bruno Morisson by Vítor Domingos.en.transcribed.srt 23.2 kB
BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 Interview with Bruno Morisson by Vítor Domingos.mp4 30.9 MB
BSides Lisbon/BSides Lisbon 2017/BSidesLisbon 2017 - I Boot when U-Boot by Vincent Ruijter and Bernardo Maia Rodrigues.en.transcribed.srt 123.6 kB
BSides Lisbon/BSides Lisbon 2017/BSidesLisbon 2017 - I Boot when U-Boot by Vincent Ruijter and Bernardo Maia Rodrigues.mp4 67.2 MB
BSides Lisbon/BSides Lisbon Logo.jpg 5.4 kB
BSides Logo.png 3.6 kB
BSides London/BSides London 2011/Alec Muffett - sex, lies and instant messenger.mp4 48.5 MB
BSides London/BSides London 2011/Alec Muffett - sex, lies and instant messenger.srt 57.4 kB
BSides London/BSides London 2011/Arron Finnon - DNS Tunnelling It's all in the name.mp4 122.7 MB
BSides London/BSides London 2011/Arron Finnon - DNS Tunnelling It's all in the name.srt 59.2 kB
BSides Nashville/BSides Nashville 2016/B03 Its Not If But When How to Create Your Cyber Incident Response Plan Lucie Hayward Marc Brawner.mp4 71.0 MB
BSides Nashville/BSides Nashville 2016/B03 Its Not If But When How to Create Your Cyber Incident Response Plan Lucie Hayward Marc Brawner.srt 29.2 kB
BSides Nashville/BSides Nashville 2016/B04 Threat Modeling the Minecraft Way Jarred White.mp4 106.0 MB
BSides Nashville/BSides Nashville 2016/B04 Threat Modeling the Minecraft Way Jarred White.srt 86.5 kB
BSides Nashville/BSides Nashville 2016/G00 AppSec Enigma and Mirage When Good Ideas Can Go Awry Frank Catucci.mp4 55.3 MB
BSides Nashville/BSides Nashville 2016/G00 AppSec Enigma and Mirage When Good Ideas Can Go Awry Frank Catucci.srt 66.2 kB
BSides Nashville/BSides Nashville 2016/G01 The Art of the Jedi Mind Trick Jeff Man.mp4 70.1 MB
BSides Nashville/BSides Nashville 2016/G01 The Art of the Jedi Mind Trick Jeff Man.srt 62.7 kB
BSides Nashville/BSides Nashville 2016/G02 How to get into ICS security mark heard.mp4 57.5 MB
BSides Nashville/BSides Nashville 2016/G02 How to get into ICS security mark heard.srt 86.3 kB
BSides Nashville/BSides Nashville 2016/G03 The Ransomware Threat Tracking the Digital Footprints Kevin Bottomley.mp4 36.9 MB
BSides Nashville/BSides Nashville 2016/G03 The Ransomware Threat Tracking the Digital Footprints Kevin Bottomley.srt 22.9 kB
BSides Nashville/BSides Nashville 2016/G04 InfoSecs in the City Starting a Successful CitySec Meetup Johnny Xmas Fletcher Munson Chris Carl.mp4 142.7 MB
BSides Nashville/BSides Nashville 2016/G04 InfoSecs in the City Starting a Successful CitySec Meetup Johnny Xmas Fletcher Munson Chris Carl.srt 75.0 kB
BSides Nashville/BSides Nashville 2016/K00 And bad mistakes Ive made a few Jayson Street.mp4 133.3 MB
BSides Nashville/BSides Nashville 2016/R01 Ever Present Persistence Established Footholds Seen in the Wild Evan Pena Chris Truncer.mp4 132.5 MB
BSides Nashville/BSides Nashville 2016/R02 Forging Your Identity Credibility Beyond Words Tim Roberts Brent White.mp4 119.5 MB
BSides Nashville/BSides Nashville 2016/R02 Forging Your Identity Credibility Beyond Words Tim Roberts Brent White.srt 59.8 kB
BSides Nashville/BSides Nashville 2016/R03 IAM Complicated Why you need to know about Identity and Access Management Ron Parker.mp4 69.4 MB
BSides Nashville/BSides Nashville 2016/R04 Put a Socket in it Understanding and Attacking Sockets on Android Jake Valletta.mp4 65.2 MB
BSides Nashville/BSides Nashville 2016/R04 Put a Socket in it Understanding and Attacking Sockets on Android Jake Valletta.srt 64.0 kB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Blue02 Trust But Verify Your SAML Service Providers Bruce Wilson.mp4 43.6 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Blue03 Does DoD Level Security Work in the Real World Jeff Man.mp4 83.9 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Blue04 Abstract Tools for Effective Threat Hunting Chris Sanders.mp4 72.0 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Green00 Infosec Tools of the Trade Getting Your Hands Dirty Jason Smith and Ta - YouTube.mp4 54.5 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Green01 How to learn reverse engineering kick ass at bug bounties and being a.mp4 39.4 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Green02 A Pyrate looks at 40 Adam John.mp4 106.3 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Green03 Springtime for code reviews Ryan Goltry.mp4 49.1 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Green04 Marrying Incident Response and Threat Intel Within Your Enterprise Joe.mp4 104.6 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Keynote Mental Health in Infosec Hackers Hugs and Drugs Amanda Berlin.mp4 63.1 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Red01 Windows Operating System Archaeology Casey Smithand Matt Nelson.mp4 51.5 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Red02 Intro to drone tech Ron Foster.mp4 76.8 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Red03 Weaponizing Splunk Using Blue Team Tools for Evil Ryan Hays.mp4 26.1 MB
BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Red04 Chunky Cookies Smashing Application Aware Defenses Russell Butturini.mp4 70.0 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 00 Deploying Microsoft Advanced Threat Analytics in the Real World Russel.en.transcribed.srt 144.3 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 00 Deploying Microsoft Advanced Threat Analytics in the Real World Russel.mp4 114.9 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 01 Changing Who Writes the Queries High Leverage IR with Visual Playbooks.en.transcribed.srt 182.7 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 01 Changing Who Writes the Queries High Leverage IR with Visual Playbooks.mp4 115.3 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 02 Hacking the Users Developing the Human Sensor and Firewall Erich Kron.en.transcribed.srt 206.7 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 02 Hacking the Users Developing the Human Sensor and Firewall Erich Kron.mp4 114.1 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 04 Growing Up to be a Infosec Policy Driven Organization Frank Rietta.en.transcribed.srt 61.9 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 04 Growing Up to be a Infosec Policy Driven Organization Frank Rietta.mp4 38.5 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 05 Evaluating Injection Attack Tools Through Quasi Natural Experimentatio.en.transcribed.srt 164.4 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 05 Evaluating Injection Attack Tools Through Quasi Natural Experimentatio.mp4 68.7 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 00 An Oral History of Bug Bounty Programs Dustin Childs.en.transcribed.srt 173.6 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 00 An Oral History of Bug Bounty Programs Dustin Childs.mp4 87.6 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 01 Learning to Hack the IOT with the Damn Vulnerable Habit Helper IOT De.en.transcribed.srt 157.5 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 01 Learning to Hack the IOT with the Damn Vulnerable Habit Helper IOT De.mp4 90.2 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 02 Community Based Career Activities or How Having Fun Can Help You with.en.transcribed.srt 186.4 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 02 Community Based Career Activities or How Having Fun Can Help You with.mp4 117.4 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 03 See the ID Rules Before Us FAL IAL AAL eh Aaaagh How How How How Bruc.en.transcribed.srt 131.8 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 03 See the ID Rules Before Us FAL IAL AAL eh Aaaagh How How How How Bruc.mp4 69.6 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 04 Hacking VDI 101 Patrick Coble.en.transcribed.srt 71.4 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 04 Hacking VDI 101 Patrick Coble.mp4 35.8 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 05 Social Engineering for the Blue Team Timothy De Block.en.transcribed.srt 74.7 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 05 Social Engineering for the Blue Team Timothy De Block.mp4 36.1 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 00 Blue Cloud of Death Red Teaming Azure Bryce Kunz.en.transcribed.srt 143.6 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 00 Blue Cloud of Death Red Teaming Azure Bryce Kunz.mp4 85.6 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 01 SECURITY INSTRUMENTATION BE THE HERO GETTING VALUE FROM SECURITY Brian.en.transcribed.srt 200.0 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 01 SECURITY INSTRUMENTATION BE THE HERO GETTING VALUE FROM SECURITY Brian.mp4 61.8 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 02 Hillbilly Storytime Pentest Fails Adam Compton.en.transcribed.srt 164.6 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 02 Hillbilly Storytime Pentest Fails Adam Compton.mp4 83.4 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 03 SAEDY Subversion and Espionage Directed Against You Judy Towers.en.transcribed.srt 162.2 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 03 SAEDY Subversion and Espionage Directed Against You Judy Towers.mp4 133.4 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 04 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Mye.en.transcribed.srt 90.9 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 04 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Mye.mp4 64.5 MB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 global 00 Know Your Why Oladipupo Ladi Adefala.en.transcribed.srt 139.0 kB
BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 global 00 Know Your Why Oladipupo Ladi Adefala.mp4 131.2 MB
BSides NoVa/BSides NoVa 2017/100 AM KEYNOTE RON GULA Ron Gula.mp4 28.1 MB
BSides NoVa/BSides NoVa 2017/100 AM KEYNOTE RON GULA Ron Gula.srt 134.1 kB
BSides NoVa/BSides NoVa 2017/102 Using Software Defined Radio for IoT Analysis Samantha Palazzolo.mp4 26.6 MB
BSides NoVa/BSides NoVa 2017/102 Using Software Defined Radio for IoT Analysis Samantha Palazzolo.srt 73.5 kB
BSides NoVa/BSides NoVa 2017/103 Imposter Syndrome I Dont Feel Like Who You Think I Am Micah Hoffman.mp4 20.9 MB
BSides NoVa/BSides NoVa 2017/103 Imposter Syndrome I Dont Feel Like Who You Think I Am Micah Hoffman.srt 75.2 kB
BSides NoVa/BSides NoVa 2017/105 How the Smart City becomes stupid Denis Makrushin.mp4 113.0 MB
BSides NoVa/BSides NoVa 2017/105 How the Smart City becomes stupid Denis Makrushin.srt 76.4 kB
BSides NoVa/BSides NoVa 2017/106 Wont Get Fooled Again The expected future of IoT malware and what to do about it Blaine Mulugeta.mp4 35.5 MB
BSides NoVa/BSides NoVa 2017/107 Software Supply Chains and the Illusion of Control Derek Weeks.mp4 52.0 MB
BSides NoVa/BSides NoVa 2017/200 Humans right Soft Skills in Security Ariel Robinson.mp4 74.4 MB
BSides NoVa/BSides NoVa 2017/200 Humans right Soft Skills in Security Ariel Robinson.srt 40.5 kB
BSides NoVa/BSides NoVa 2017/201 Panel Local Community Cyber Groups in NoVA Jeremy Duncan.mp4 465.9 MB
BSides NoVa/BSides NoVa 2017/202 Networking with Humans to Create a Culture of Security Tracy Maleeff.mp4 210.9 MB
BSides NoVa/BSides NoVa 2017/202 Networking with Humans to Create a Culture of Security Tracy Maleeff.srt 121.5 kB
BSides NoVa/BSides NoVa 2017/203 Why the NTP Security Problem Is Worse than You Think Allan Liska.mp4 21.9 MB
BSides NoVa/BSides NoVa 2017/204 Bro I Can See You Moving Laterally Richie Cyrus.mp4 24.8 MB
BSides NoVa/BSides NoVa 2017/204 Bro I Can See You Moving Laterally Richie Cyrus.srt 47.8 kB
BSides NoVa/BSides NoVa 2017/205 Panel Parlaying Education and Experience into an Infosec Career Forgotten Sec.mp4 495.7 MB
BSides NoVa/BSides NoVa 2017/300 So you want to be a Cyber Threat Analyst eh Anthony Melfi.mp4 71.9 MB
BSides NoVa/BSides NoVa 2017/300 So you want to be a Cyber Threat Analyst eh Anthony Melfi.srt 150.0 kB
BSides NoVa/BSides NoVa 2017/301 0 to 31337 Real Quick Lessons Learned by Reversing the Flare On Challenge Blaine Stancill.mp4 55.3 MB
BSides NoVa/BSides NoVa 2017/302 Finding a Companies BreakPoint Zachary Meyers.mp4 34.9 MB
BSides NoVa/BSides NoVa 2017/302 Finding a Companies BreakPoint Zachary Meyers.srt 121.9 kB
BSides NoVa/BSides NoVa 2017/303 Challenges and Opportunities Application Containers and Microservices Andrew Wild.mp4 18.0 MB
BSides NoVa/BSides NoVa 2017/303 Challenges and Opportunities Application Containers and Microservices Andrew Wild.srt 69.1 kB
BSides NoVa/BSides NoVa 2017/304 Cyber Hunt Challenge Develop and Test your Threat Hunting skills with Darryl Taylor from LogicHu.mp4 28.0 MB
BSides NoVa/BSides NoVa 2017/304 Cyber Hunt Challenge Develop and Test your Threat Hunting skills with Darryl Taylor from LogicHu.srt 68.1 kB
BSides NoVa/BSides NoVa 2017/305 Anti Virus Firewall Bypass Techniques BY Candan B LKBAS Candan Bolukbas.mp4 25.0 MB
BSides NoVa/BSides NoVa 2017/306 Im Cuckoo for Malware Cuckoo Sandbox and Dynamic Malware Analysis Lane Huff.mp4 26.6 MB
BSides NoVa/BSides NoVa 2017/306 Im Cuckoo for Malware Cuckoo Sandbox and Dynamic Malware Analysis Lane Huff.srt 105.0 kB
BSides NoVa/BSides NoVa 2017/PM KEYNOTE Tarah Wheeler.mp4 75.5 MB
BSides NoVa/BSides NoVa 2017/PM KEYNOTE Tarah Wheeler.srt 93.5 kB
BSides NoVa/BSides NoVa 2017/Request-Fuck You, Pay Me.srt 23.9 kB
BSides NoVa/BSides NoVa 2018/100 AM Keynote Matt Devost.en.transcribed.srt 155.2 kB
BSides NoVa/BSides NoVa 2018/100 AM Keynote Matt Devost.mp4 112.4 MB
BSides NoVa/BSides NoVa 2018/102 Deep Dive in the Dark Web OSINT Style Kirby Plessas.en.transcribed.srt 134.3 kB
BSides NoVa/BSides NoVa 2018/102 Deep Dive in the Dark Web OSINT Style Kirby Plessas.mp4 91.1 MB
BSides NoVa/BSides NoVa 2018/103 PM Keynote Jack Daniel.en.transcribed.srt 78.8 kB
BSides NoVa/BSides NoVa 2018/103 PM Keynote Jack Daniel.mp4 68.2 MB
BSides NoVa/BSides NoVa 2018/104 Adding Pentest Sauce to your Vulnerability Management Recipe Luke Hudson Andrew McNicol.mp4 75.6 MB
BSides NoVa/BSides NoVa 2018/105 The Value of Design in Cyber Threat Intelligence Devon Rollins.en.transcribed.srt 113.4 kB
BSides NoVa/BSides NoVa 2018/105 The Value of Design in Cyber Threat Intelligence Devon Rollins.mp4 76.4 MB
BSides NoVa/BSides NoVa 2018/106 DNC Hacked Data in the Hands of a Trained Intelligence Professional Wally Prather Dave Marcus.en.transcribed.srt 106.0 kB
BSides NoVa/BSides NoVa 2018/106 DNC Hacked Data in the Hands of a Trained Intelligence Professional Wally Prather Dave Marcus.mp4 101.7 MB
BSides NoVa/BSides NoVa 2018/200 Your Facts Are Not Safe With Us Russian Information Operations as Social Engineering Meagan Keim.en.transcribed.srt 76.9 kB
BSides NoVa/BSides NoVa 2018/200 Your Facts Are Not Safe With Us Russian Information Operations as Social Engineering Meagan Keim.mp4 67.5 MB
BSides NoVa/BSides NoVa 2018/201 DECEPTICON Deceptive Techniques to Derail OSINT attempts Joe Gray.en.transcribed.srt 134.0 kB
BSides NoVa/BSides NoVa 2018/201 DECEPTICON Deceptive Techniques to Derail OSINT attempts Joe Gray.mp4 79.5 MB
BSides NoVa/BSides NoVa 2018/202 I Thought Renewing the Domain Name Was Your Job Allan Liska.en.transcribed.srt 54.4 kB
BSides NoVa/BSides NoVa 2018/202 I Thought Renewing the Domain Name Was Your Job Allan Liska.mp4 47.9 MB
BSides NoVa/BSides NoVa 2018/203 Automating Unstructured Data Classification Malek Ben Salem.en.transcribed.srt 40.0 kB
BSides NoVa/BSides NoVa 2018/203 Automating Unstructured Data Classification Malek Ben Salem.mp4 52.9 MB
BSides NoVa/BSides NoVa 2018/204 Vulnerability Patched in Democratic Donor Database Josh Lospinoso.en.transcribed.srt 58.7 kB
BSides NoVa/BSides NoVa 2018/204 Vulnerability Patched in Democratic Donor Database Josh Lospinoso.mp4 54.1 MB
BSides NoVa/BSides NoVa 2018/205 Living in a world with insecure Internet of Things IoT Marc Schneider.en.transcribed.srt 57.2 kB
BSides NoVa/BSides NoVa 2018/205 Living in a world with insecure Internet of Things IoT Marc Schneider.mp4 36.8 MB
BSides NoVa/BSides NoVa 2018/206 Vulnerability Accountability Levers and How You Can Use Them Amelie Koran.en.transcribed.srt 68.5 kB
BSides NoVa/BSides NoVa 2018/206 Vulnerability Accountability Levers and How You Can Use Them Amelie Koran.mp4 58.7 MB
BSides NoVa/BSides NoVa 2018/207 Cyber Mutual Assistance A New Model for Preparing and Responding to Cyber Attack David Batz.en.transcribed.srt 49.7 kB
BSides NoVa/BSides NoVa 2018/207 Cyber Mutual Assistance A New Model for Preparing and Responding to Cyber Attack David Batz.mp4 47.0 MB
BSides NoVa/BSides NoVa 2018/300 What Color Is Your Cyber Parachute Cliff Neve Candace King Kazi Islam Trey Maxam Amlie Koran.en.transcribed.srt 153.1 kB
BSides NoVa/BSides NoVa 2018/300 What Color Is Your Cyber Parachute Cliff Neve Candace King Kazi Islam Trey Maxam Amlie Koran.mp4 113.2 MB
BSides NoVa/BSides NoVa 2018/302 Recruiting in Cyber Dan Waddel Kathleen Smith Suzie Grieco Sabrina Iacarus Kirsten Renner Karen.en.transcribed.srt 173.6 kB
BSides NoVa/BSides NoVa 2018/302 Recruiting in Cyber Dan Waddel Kathleen Smith Suzie Grieco Sabrina Iacarus Kirsten Renner Karen.mp4 169.4 MB
BSides NoVa/BSides NoVa 2018/303 How to get started in Cybersecurity John Stoner.en.transcribed.srt 69.6 kB
BSides NoVa/BSides NoVa 2018/303 How to get started in Cybersecurity John Stoner.mp4 44.8 MB
BSides Raleigh/BSides Raleigh 2014/Security on the Blockchain Past Present & The Future - Shannon Code.mp4 165.5 MB
BSides Raleigh/BSides Raleigh 2014/Slaying the Hydra Evolution and Mitigation of Denial-of-Service Attacks - BSides Raleigh.mp4 169.8 MB
BSides Raleigh/BSides Raleigh 2014/grep visualization var logs unused - Dr Carrie Gates - BSides Raleigh.mp4 243.7 MB
BSides Raleigh/BSides Raleigh Logo.jpg 23.8 kB
BSides Rhode Island/BsidesRI 2013 0 Large scale application security Charlie Eriksen.mp4 155.3 MB
BSides Rhode Island/BsidesRI 2013 1 0 Hacking Your Neighbors for Fun! Josh Wright.mp4 163.9 MB
BSides Rhode Island/BsidesRI 2013 1 1 Public cloud PCI compliance or a sharp stick in the eye, which to choose Chris.mp4 213.6 MB
BSides Rhode Island/BsidesRI 2013 1 2 Bite the Wax Tadpole The importance of culture in user security Kati Rodzon.mp4 219.5 MB
BSides Rhode Island/BsidesRI 2013 1 3 Exploiting the Top Ten Database Vulnerabilities and Misconfigurations Josh Sha.mp4 184.2 MB
BSides Rhode Island/BsidesRI 2013 1 4 Exploit Development for Mere Mortals Joe McCray.mp4 197.1 MB
BSides Rhode Island/BsidesRI 2013 1 5 Future Trends in IT security Ron Gula.mp4 179.5 MB
BSides Rhode Island/BsidesRI 2013 1 6 The Freaky Economics Of Cybersecurity Robert David Graham.mp4 170.7 MB
BSides Rhode Island/BsidesRI 2013 1 SMB SRMF for identifying top 10 risks Jim Peeler.mp4 205.8 MB
BSides Rhode Island/BsidesRI 2013 2 0 Booting the Booters, Stressing the Stressors Allison Nixon and Brandon Levene.mp4 174.9 MB
BSides Rhode Island/BsidesRI 2013 2 1 Talk More Better Jack Daniel.mp4 196.0 MB
BSides Rhode Island/BsidesRI 2013 2 3 So, you want to compute post apocalypse Larry Pesce & Darren Wigley.mp4 198.2 MB
BSides Rhode Island/BsidesRI 2013 2 4 Feeling Sick Healthcare Information Security Roy Wattanasin.mp4 155.8 MB
BSides Rhode Island/BsidesRI 2013 2 5 Blitzing with Your Defense Ben Jackson.mp4 184.3 MB
BSides Rhode Island/BsidesRI 2013 2 6 Lessons Learned Why I became a PaulDotCom Intern and why you should become an In.mp4 90.8 MB
BSides Rhode Island/BsidesRI 2013 2 7 Learning Security on the Cheap Patrick Laverty.mp4 64.3 MB
BSides Rhode Island/BsidesRI 2013 2 How I Do a Weekly Podcast or Three) Paul Asadoorian.mp4 217.8 MB
BSides Rhode Island/BsidesRI 2013 3 Show and Tell Super Minipwner James Edge.mp4 171.8 MB
BSides Rhode Island/BsidesRI 2013 4 Opening the Treasure Chest Attacking Network Attached Storage on a Pen Test Russ.mp4 173.2 MB
BSides Rhode Island/BsidesRI 2013 Closing Paul Asadoorian, Patrick Laverty & Mike Perez.mp4 42.3 MB
BSides Rhode Island/BsidesRI 2013 Intro with Paul Asadoorian, Patrick Laverty & Mike Perez.mp4 29.3 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Artsiom Holub Deconstructing The Cyber Kill Chain of Angler Exploit Kit.en.transcribed.srt 85.0 kB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Artsiom Holub Deconstructing The Cyber Kill Chain of Angler Exploit Kit.mp4 206.7 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 David Schuetz A not so quick Primer on iOS Encryption.en.transcribed.srt 135.8 kB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 David Schuetz A not so quick Primer on iOS Encryption.mp4 168.3 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Devon Kerr Passive detection doesn't work lessons from a hunter of elusive.mp4 243.8 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Fernando Montenegro Economics of Information Security.en.transcribed.srt 113.2 kB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Fernando Montenegro Economics of Information Security.mp4 201.0 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Jamie Geiger Android Application Function Hooking with Xposed.en.transcribed.srt 126.1 kB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Jamie Geiger Android Application Function Hooking with Xposed.mp4 209.9 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Jared Stroud & Bryan Harmat RedOps Scaling & Automating Your Pwnage.en.transcribed.srt 97.8 kB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Jared Stroud & Bryan Harmat RedOps Scaling & Automating Your Pwnage.mp4 72.5 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Joe Testa Bitclamp A Permanent and Anonymous Publishing Platform Over Bitco.en.transcribed.srt 73.0 kB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Joe Testa Bitclamp A Permanent and Anonymous Publishing Platform Over Bitco.mp4 65.6 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Matt Arnold How Secure is your Linux Distro.en.transcribed.srt 69.2 kB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Matt Arnold How Secure is your Linux Distro.mp4 206.0 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nate Cardozo The State of the Law 2016.en.transcribed.srt 74.5 kB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nate Cardozo The State of the Law 2016.mp4 165.7 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nick Piazza Fault Tolerant Command and Control Networks.en.transcribed.srt 95.3 kB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nick Piazza Fault Tolerant Command and Control Networks.mp4 169.3 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nitin Jami Exploring SecAccessControl Obj in iOS 9 Keychain - YouTube.en.transcribed.srt 89.6 kB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nitin Jami Exploring SecAccessControl Obj in iOS 9 Keychain - YouTube.mp4 160.3 MB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Rockie Brockway Enterprise Class Threat Management Like a Boss.en.transcribed.srt 102.9 kB
BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Rockie Brockway Enterprise Class Threat Management Like a Boss.mp4 229.6 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Adam Dean Real Security Incidents, Unusual Situations.en.transcribed.srt 50.6 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Adam Dean Real Security Incidents, Unusual Situations.mp4 26.4 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 David Kukfa The Hardest CTF I've Ever Done My Experiences Reverse Engineeri.en.transcribed.srt 185.6 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 David Kukfa The Hardest CTF I've Ever Done My Experiences Reverse Engineeri.mp4 168.2 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Joe Testa Problems With Elliptic Curve Cryptography in TLS and SSH.en.transcribed.srt 92.3 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Joe Testa Problems With Elliptic Curve Cryptography in TLS and SSH.mp4 102.1 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Jon Szymaniak Get Low To All STC STC STC STC.en.transcribed.srt 140.8 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Jon Szymaniak Get Low To All STC STC STC STC.mp4 99.1 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Justin Moore Decoder Improved An Improved Burp Suite Decoder.en.transcribed.srt 68.5 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Justin Moore Decoder Improved An Improved Burp Suite Decoder.mp4 29.0 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Kevin Wall Common Developer Crypto Mistakes With Illustrations in Java.en.transcribed.srt 128.8 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Kevin Wall Common Developer Crypto Mistakes With Illustrations in Java.mp4 108.7 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Mo Morsi & Mark Scrano The Guild The Rise and Fall of Syracuse's Hackerspac.en.transcribed.srt 80.4 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Mo Morsi & Mark Scrano The Guild The Rise and Fall of Syracuse's Hackerspac.mp4 49.9 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Nick Collisson Reverse Engineering Techniques for Game Hacking.en.transcribed.srt 147.2 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Nick Collisson Reverse Engineering Techniques for Game Hacking.mp4 140.7 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Price McDonald & Justin Berry Insecure Obsolete and Trivial The Real IOT.en.transcribed.srt 124.1 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Price McDonald & Justin Berry Insecure Obsolete and Trivial The Real IOT.mp4 86.7 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Reg Harnish Breaking is Bad Why Everyone at This Conference Will be Unemplo.en.transcribed.srt 85.5 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Reg Harnish Breaking is Bad Why Everyone at This Conference Will be Unemplo.mp4 35.4 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Rob Olson & Chaim Sanders Whose Idea Was That Comparing Security Curriculum.en.transcribed.srt 135.5 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Rob Olson & Chaim Sanders Whose Idea Was That Comparing Security Curriculum.mp4 99.3 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Sean Cassidy Attacking Modern SaaS Companies.en.transcribed.srt 131.3 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Sean Cassidy Attacking Modern SaaS Companies.mp4 88.5 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Tyler Wrightson Here We Go Again A Pentesters Year In Review.en.transcribed.srt 153.5 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Tyler Wrightson Here We Go Again A Pentesters Year In Review.mp4 141.0 MB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Valerie Thomas How I Broke Into Your Data Center.en.transcribed.srt 169.0 kB
BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Valerie Thomas How I Broke Into Your Data Center.mp4 62.0 MB
BSides Salt Lake City/BSides SLC 2015/BSdiesSLC 2015 -- What To Do When Something Bad Has Happened -- Jason Wood.en.transcribed.srt 59.5 kB
BSides Salt Lake City/BSides SLC 2015/BSdiesSLC 2015 -- What To Do When Something Bad Has Happened -- Jason Wood.mp4 101.8 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC -- Fundamentals That Time Forgot -- Jup1t3r.mp4 167.4 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Asymmetric Warfare and Corollaries in Network Defense - Jason Tracy.en.transcribed.srt 58.4 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Asymmetric Warfare and Corollaries in Network Defense - Jason Tracy.mp4 87.0 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Building AppSec In - Seth Law.en.transcribed.srt 95.4 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Building AppSec In - Seth Law.mp4 113.1 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Cloud Security - Scott Arveseth.en.transcribed.srt 118.4 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Cloud Security - Scott Arveseth.mp4 262.8 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Fighting Hardware Attacks with Software - Doktor Unicorn.en.transcribed.srt 103.9 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Fighting Hardware Attacks with Software - Doktor Unicorn.mp4 147.8 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - From Vim Muggle to Wizard in 10 Easy Steps - Erik Falor.en.transcribed.srt 135.7 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - From Vim Muggle to Wizard in 10 Easy Steps - Erik Falor.mp4 262.0 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Hey Guys, I m a Pentester! - Metacortex.mp4 50.7 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Hey Guys, I'm a Pentester! - Metacortex.en.transcribed.srt 34.1 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Malware Fun - Kenny Long.en.transcribed.srt 73.8 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Malware Fun - Kenny Long.mp4 87.0 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - PlagueScanner An Open Source Multiple AV Scanner Framework - Robert Simmons.en.transcribed.srt 108.2 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - PlagueScanner An Open Source Multiple AV Scanner Framework - Robert Simmons.mp4 151.7 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - RBAC is Dead. So now what - Adam Fisher.en.transcribed.srt 100.3 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - RBAC is Dead. So now what - Adam Fisher.mp4 135.5 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Authenticode in-depth -- Scott Piper.en.transcribed.srt 92.2 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Authenticode in-depth -- Scott Piper.mp4 153.3 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- BREAKING in BAD (I m the one who doesn t knock) -- Jayson E. Street.mp4 337.7 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- BREAKING in BAD (I'm the one who doesn't knock) -- Jayson E. Street.en.transcribed.srt 140.5 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Bad USB Weaponized -- Dan Anderson and Steve Fink.en.transcribed.srt 49.7 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Bad USB Weaponized -- Dan Anderson and Steve Fink.mp4 70.2 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Feeding the Shark -- Jeremy Pierson.en.transcribed.srt 105.5 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Feeding the Shark -- Jeremy Pierson.mp4 173.1 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- How to prevent eavesdropping on office VoIP calls -- Dmitry Dessiatnikov.en.transcribed.srt 93.3 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- How to prevent eavesdropping on office VoIP calls -- Dmitry Dessiatnikov.mp4 178.2 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- InfoSec, Just Doing It -- Rob Jorgensen - YouTube.en.transcribed.srt 84.2 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- InfoSec, Just Doing It -- Rob Jorgensen.mp4 184.5 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Leading Change -- John Overbaugh.en.transcribed.srt 97.7 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Leading Change -- John Overbaugh.mp4 173.4 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Pragmatic Cloud Security -- Joshua Danielson.en.transcribed.srt 94.0 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Pragmatic Cloud Security -- Joshua Danielson.mp4 130.2 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Psst, Come Check Out My Lair!! #notacreeper -- Justin Larson.en.transcribed.srt 41.3 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Psst, Come Check Out My Lair!! #notacreeper -- Justin Larson.mp4 118.6 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Security Onions and Honey Potz -- Ethan Dodge.en.transcribed.srt 105.3 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Security Onions and Honey Potz -- Ethan Dodge.mp4 204.1 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Security Researcher, Security Besmircher -- Kevin Johnson.en.transcribed.srt 110.1 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Security Researcher, Security Besmircher -- Kevin Johnson.mp4 101.4 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Social Engineering The Good, the Bad, and the Ugly -- Stephanie Carruthers.en.transcribed.srt 71.9 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Social Engineering The Good, the Bad, and the Ugly -- Stephanie Carruthers.mp4 76.6 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Take Charge of Your Infosec Career! -- Glen Roberts.en.transcribed.srt 57.8 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Take Charge of Your Infosec Career! -- Glen Roberts.mp4 114.2 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- The Inception Framework Cloud Based Attack -- Waylon Grange.en.transcribed.srt 96.9 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- The Inception Framework Cloud Based Attack -- Waylon Grange.mp4 111.4 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- The Secret Lives of Debuggers -- Lance Buttars.en.transcribed.srt 86.0 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- The Secret Lives of Debuggers -- Lance Buttars.mp4 167.7 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Trends In Exploit Kits -- Jeffrey Doty.en.transcribed.srt 118.2 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Trends In Exploit Kits -- Jeffrey Doty.mp4 224.7 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Why You Need To Be Red Team ed -- Nate McConnell.mp4 98.9 MB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Why You Need To Be Red Team'ed -- Nate McConnell.en.transcribed.srt 83.2 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- You Must Search Before You Destroy -- Adam Steed.en.transcribed.srt 48.2 kB
BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- You Must Search Before You Destroy -- Adam Steed.mp4 150.2 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- App Scanner Galore - How do I choose one -- Teja Myneedu and Yashvier Kosaraju.en.transcribed.srt 58.9 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- App Scanner Galore - How do I choose one -- Teja Myneedu and Yashvier Kosaraju.mp4 43.1 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Bought Some Lockpicks, Now What -- Colin Jackson.en.transcribed.srt 109.0 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Bought Some Lockpicks, Now What -- Colin Jackson.mp4 88.4 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Building A Secure Development Lifecycle On A Shoestring Budget -- John Overbaugh.en.transcribed.srt 128.5 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Building A Secure Development Lifecycle On A Shoestring Budget -- John Overbaugh.mp4 51.3 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Don't be stupid with Github - Even more Github fun -- Metacortex.en.transcribed.srt 47.7 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Don't be stupid with Github - Even more Github fun -- Metacortex.mp4 82.4 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Evolution -- Neil Wyler.en.transcribed.srt 156.5 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Evolution -- Neil Wyler.mp4 83.3 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Googling Like A Boss Expanding the Powers of OSINT -- Ethan Dodge.en.transcribed.srt 102.5 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Googling Like A Boss Expanding the Powers of OSINT -- Ethan Dodge.mp4 58.0 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Hackinabox Self contained Pen Testing lab -- Marv White.en.transcribed.srt 84.5 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Hackinabox Self contained Pen Testing lab -- Marv White.mp4 53.1 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- How HIPAA Compliance helps and hinders true patient data security -- Dan Anderson.en.transcribed.srt 82.2 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- How HIPAA Compliance helps and hinders true patient data security -- Dan Anderson.mp4 47.0 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- How to Build an Effective InfoSec Risk Management Program -- Kiston Finney.en.transcribed.srt 161.8 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- How to Build an Effective InfoSec Risk Management Program -- Kiston Finney.mp4 94.1 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Insert Title Here -- Jack Daniel.en.transcribed.srt 113.7 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Insert Title Here -- Jack Daniel.mp4 74.5 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Patchng Mnthly IMPOSSIBLE, Maintaining Compliance Is Possible -- Adam Steed.en.transcribed.srt 60.6 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Patchng Mnthly IMPOSSIBLE, Maintaining Compliance Is Possible -- Adam Steed.mp4 66.0 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Preparing 4 PowerShellmageddon -- Chad Tilbury.en.transcribed.srt 107.3 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Preparing 4 PowerShellmageddon -- Chad Tilbury.mp4 80.6 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Slaying Rogue Access Points with Python and Cheap Hardware -- Gabriel Ryan.en.transcribed.srt 72.0 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Slaying Rogue Access Points with Python and Cheap Hardware -- Gabriel Ryan.mp4 39.7 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Tabletop Cryptography -- Jason Reverri.en.transcribed.srt 78.8 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Tabletop Cryptography -- Jason Reverri.mp4 75.1 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Art of the Jedi Mind Trick -- Jeff Man.en.transcribed.srt 55.5 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Art of the Jedi Mind Trick -- Jeff Man.mp4 46.9 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Hacker will see you now -- Jay Radcliffe.en.transcribed.srt 64.3 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Hacker will see you now -- Jay Radcliffe.mp4 37.6 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Node.js Highway Attacks Are At Full Throttle -- Igor Matlin.en.transcribed.srt 35.2 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Node.js Highway Attacks Are At Full Throttle -- Igor Matlin.mp4 50.0 MB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Writing Custom Splunk Applications -- Cody Hatch.en.transcribed.srt 64.2 kB
BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Writing Custom Splunk Applications -- Cody Hatch.mp4 34.7 MB
BSides Salt Lake City/BSides SLC 2017/BSIdesSLC 2017 -- Adam Englander -- Biometrics The New Pandora's Box.en.transcribed.srt 57.9 kB
BSides Salt Lake City/BSides SLC 2017/BSIdesSLC 2017 -- Adam Englander -- Biometrics The New Pandora's Box.mp4 36.6 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC -- Fundamentals That Time Forgot -- Jup1t3r.en.transcribed.srt 97.4 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC -- Fundamentals That Time Forgot -- Jup1t3r.mp4 63.8 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC -- JC -- Facing the Kobayashi Maru Incident Response Tabletop Exercises.en.transcribed.srt 148.3 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC -- Jerry Smith -- Getting Privacy Into The Conversation.en.transcribed.srt 41.8 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC -- Jerry Smith -- Getting Privacy Into The Conversation.mp4 64.3 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Adam Fisher -- Man In The Cloud Attack.en.transcribed.srt 116.3 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Adam Fisher -- Man In The Cloud Attack.mp4 94.3 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Andrew Hall -- NIST Risk Management Framework and why it should be utilized.en.transcribed.srt 51.8 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Andrew Hall -- NIST Risk Management Framework and why it should be utilized.mp4 44.1 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Brandon Gillespie -- Container Secrets Done Right.en.transcribed.srt 141.0 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Brandon Gillespie -- Container Secrets Done Right.mp4 33.7 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Bri Rolston -- If System = ICS, Then Pwn4g3 is Greater Than Root.en.transcribed.srt 168.7 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Bri Rolston -- If System = ICS, Then Pwn4g3 is Greater Than Root.mp4 63.4 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Bryce Kunz -- Pwned Cloud Society.en.transcribed.srt 76.8 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Bryce Kunz -- Pwned Cloud Society.mp4 53.9 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Chad Tilbury -- Windows Credential Attacks and Mitigations.en.transcribed.srt 176.5 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Chad Tilbury -- Windows Credential Attacks and Mitigations.mp4 110.6 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Chris Hopkins -- NMAP 101.en.transcribed.srt 68.0 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Chris Hopkins -- NMAP 101.mp4 49.4 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Daniel Jeffrey -- Security and Ops in Startups.en.transcribed.srt 145.2 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Daniel Jeffrey -- Security and Ops in Startups.mp4 100.2 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Dave Kennedy -- A Continually Changing Industry INFOSEC.en.transcribed.srt 153.8 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Dave Kennedy -- A Continually Changing Industry INFOSEC.mp4 123.6 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- David Moore -- The Aftermath of a Fuzz Run What to do about those crashes.en.transcribed.srt 143.8 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- David Moore -- The Aftermath of a Fuzz Run What to do about those crashes.mp4 104.4 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Gabriel Ryan -- Beyond Wardriving Tracking Human Beings with RF Technology.en.transcribed.srt 148.8 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Gabriel Ryan -- Beyond Wardriving Tracking Human Beings with RF Technology.mp4 78.2 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Haydn Johnson -- Planning a Purple Team Exercise; The What, Why, and How.en.transcribed.srt 138.1 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Haydn Johnson -- Planning a Purple Team Exercise_ The What, Why, and How.mp4 109.2 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- J0N J4RV1S -- The Surveillance Capitalism Will Continue Until Moral Improves.en.transcribed.srt 168.8 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- J0N J4RV1S -- The Surveillance Capitalism Will Continue Until Moral Improves.mp4 92.5 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- James Dickenson & Chris Tilley -- Network Security Monitoring Product Evaluation.en.transcribed.srt 124.6 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- James Dickenson & Chris Tilley -- Network Security Monitoring Product Evaluation.mp4 66.2 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- James Habben -- USB Device Analysis.en.transcribed.srt 155.2 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- James Habben -- USB Device Analysis.mp4 122.9 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Jason Reverri -- Green Eggs and Hacks.en.transcribed.srt 70.9 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Jason Reverri -- Green Eggs and Hacks.mp4 55.6 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Jason Wood -- Get Started Writing Nmap Scripts.en.transcribed.srt 128.3 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Jason Wood -- Get Started Writing Nmap Scripts.mp4 96.7 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- John Overbaugh -- Influcencing the SLC...When I'm Not A Developer.en.transcribed.srt 150.5 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- John Overbaugh -- Influcencing the SLC...When I'm Not A Developer.mp4 115.9 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Lesley Carhart -- Together, We Could Land a Plane Our Community as our Strength.en.transcribed.srt 134.8 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Lesley Carhart -- Together, We Could Land a Plane Our Community as our Strength.mp4 93.2 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Matt Krieger & Kasim Esmail -- How We Got Here Integrating DiD Into DevOps.en.transcribed.srt 169.2 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Matt Krieger & Kasim Esmail -- How We Got Here Integrating DiD Into DevOps.mp4 122.2 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Nathan Smith & Brian Hadfield -- I've Upped My Attitude, So Up Yours!.en.transcribed.srt 59.7 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Nathan Smith & Brian Hadfield -- I've Upped My Attitude, So Up Yours!.mp4 36.3 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Parasaran Raman -- On-Demand Outlier Detection [OD^2] to Optimize Threat Analytics.en.transcribed.srt 66.2 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Parasaran Raman -- On-Demand Outlier Detection [OD^2] to Optimize Threat Analytics.mp4 49.9 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Robert Wood -- Red Teaming The Board.en.transcribed.srt 130.5 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Robert Wood -- Red Teaming The Board.mp4 68.0 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Sam McLane -- How to Build A SOC for Small to Mid-Size Companies.en.transcribed.srt 69.7 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Sam McLane -- How to Build A SOC for Small to Mid-Size Companies.mp4 33.4 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Shane Lawrence -- Federal Bug Bounty Programs.en.transcribed.srt 67.7 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Shane Lawrence -- Federal Bug Bounty Programs.mp4 52.7 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Thomas Elegante -- InfoSec Parenting.en.transcribed.srt 66.5 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Thomas Elegante -- InfoSec Parenting.mp4 45.1 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Tiberius Hefflin -- De Falsis Deis Social Contracts.en.transcribed.srt 41.5 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Tiberius Hefflin -- De Falsis Deis Social Contracts.mp4 34.6 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Tiberius Hefflin -- Tales From the Crypt--ology.en.transcribed.srt 54.5 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Tiberius Hefflin -- Tales From the Crypt--ology.mp4 34.0 MB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Waylon Grange -- Hadouken! Exploiting Street Fighter V to gain ring0.en.transcribed.srt 89.5 kB
BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Waylon Grange -- Hadouken! Exploiting Street Fighter V to gain ring0.mp4 69.7 MB
BSides San Francisco/BSides San Francisco 2012/Security s Best Asset are Argumentative Geeks.mp4 22.8 MB
BSides San Francisco/BSides San Francisco 2015/00 BSidesSF 2015 Intro.mp4 14.2 MB
BSides San Francisco/BSides San Francisco 2015/100 Stick a Pin in Certificate Pinning How to Inspect Mobile Traffic and Stop Data Exfiltration Gopa.mp4 122.5 MB
BSides San Francisco/BSides San Francisco 2015/101 OSXCollector Forensic Collection and Automated Analysis for OS X Ivan Leichtling.mp4 93.0 MB
BSides San Francisco/BSides San Francisco 2015/102 DNS Spikes Strikes and The Like thomas mathew.mp4 49.8 MB
BSides San Francisco/BSides San Francisco 2015/103 Ask the EFF Kurt Opsahl.mp4 179.8 MB
BSides San Francisco/BSides San Francisco 2015/104 Your Users Passwords Are Already Stolen Lucas Zaichkowsky.mp4 48.6 MB
BSides San Francisco/BSides San Francisco 2015/106 Medical Device Security From Detection To Compromise Scott Erven.mp4 139.0 MB
BSides San Francisco/BSides San Francisco 2015/107 How SecOps Can Convince DevOps To Believe In The Bogeyman Leif Dreizler.mp4 103.5 MB
BSides San Francisco/BSides San Francisco 2015/108 Human Hunting Sean Gillespie.mp4 139.3 MB
BSides San Francisco/BSides San Francisco 2015/109 Phighting Phishers Phake Phronts Kevin Bottomley.mp4 85.4 MB
BSides San Francisco/BSides San Francisco 2015/110 Corporate Governance For Fun and NonProfit Christie Dudley.mp4 103.5 MB
BSides San Francisco/BSides San Francisco 2015/111 HIPAA 2015 Wrath of the Audits W Hudson Harris.mp4 137.4 MB
BSides San Francisco/BSides San Francisco 2015/112 Lessons Learned from Building and Running MHN the Worlds Largest Crowdsourced Honeynet Jason Tro.mp4 76.9 MB
BSides San Francisco/BSides San Francisco 2015/113 Getting started Let me help you David Trollman.mp4 130.0 MB
BSides San Francisco/BSides San Francisco 2015/200 Critical Infrastructure The Cloud loves me The Cloud loves me not Bryan Owen.mp4 130.3 MB
BSides San Francisco/BSides San Francisco 2015/201 Fck These Guys Practical Countersurveillance Lisa Lorenzin.mp4 128.1 MB
BSides San Francisco/BSides San Francisco 2015/202 Collective Action Problems in Cybersecurity Allan Friedman.mp4 86.1 MB
BSides San Francisco/BSides San Francisco 2015/203 Intrusion Detection in the clouds Josh Pyorre.mp4 52.2 MB
BSides San Francisco/BSides San Francisco 2015/204 Hacker or criminal Repairing the reputation of the infosec community Melanie Ensign.mp4 144.5 MB
BSides San Francisco/BSides San Francisco 2015/205 Student Surveillance How Hackers Can Help Protect Student Privacy Jessy Irwin.mp4 144.6 MB
BSides San Francisco/BSides San Francisco 2015/206 When Doing the Right Thing Goes Wrong Impact of Certificates on Service Based Infrastructure Rob.mp4 88.2 MB
BSides San Francisco/BSides San Francisco 2015/207 How to Lie with Statistics Information Security Edition Tony Martin Vegue.mp4 117.5 MB
BSides San Francisco/BSides San Francisco 2015/208 Ground Zero Financial Services The Latest Targeted Attacks from the Darknet Brian Contos.mp4 80.4 MB
BSides San Francisco/BSides San Francisco 2015/209 Securing the Hastily Formed Network Infosec for Disaster Relief and Emergency Response Rakesh Bh.mp4 164.8 MB
BSides San Francisco/BSides San Francisco 2015/210 GitReview Reflective Control In Action Jon Debonis.mp4 57.1 MB
BSides San Francisco/BSides San Francisco 2015/212 Blink The Network Perimeter is Gone Rick Farina ZeroChaos.mp4 143.0 MB
BSides San Francisco/BSides San Francisco 2015/213 Federating AWS CLI Paul Moreno.mp4 67.0 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 104 A year in the wild fighting malware at the corporate level Kuba Sendor.mp4 87.1 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 104 A year in the wild fighting malware at the corporate level Kuba Sendor.srt 34.4 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 105 Breaking Honeypots for Fun and Profit Gadi Evron Dean Sysman Itamar Sher.mp4 118.0 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 105 Breaking Honeypots for Fun and Profit Gadi Evron Dean Sysman Itamar Sher.srt 35.9 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 107 Why its all snake oil and that may be ok Pablo Breuer.mp4 38.7 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 107 Why its all snake oil and that may be ok Pablo Breuer.srt 13.0 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 111 Planning Effective Red Team Exercises Sean T Malone.mp4 190.0 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 111 Planning Effective Red Team Exercises Sean T Malone.srt 61.4 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 112 Fraud Detection Real time Trust Decisions James Addison.mp4 127.3 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 112 Fraud Detection Real time Trust Decisions James Addison.srt 49.9 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 114 Elliptic Curve Cryptography for those who are afraid of mathematics Martijn Grooten.mp4 40.0 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 114 Elliptic Curve Cryptography for those who are afraid of mathematics Martijn Grooten.srt 24.2 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 115 APT Reports and OPSEC Evolution or These are not the APT reports you are looking for Ga.mp4 60.8 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 115 APT Reports and OPSEC Evolution or These are not the APT reports you are looking for Ga.srt 27.8 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 117 Employee Hijacking Building a hacktober awareness program Ryan Barrett Ninad Bhamburdek.mp4 72.4 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 117 Employee Hijacking Building a hacktober awareness program Ryan Barrett Ninad Bhamburdek.srt 25.6 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 203 Scan Pwn Next exploiting service accounts in Windows networks Andrey Dulkin Matan Hart.mp4 113.3 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 203 Scan Pwn Next exploiting service accounts in Windows networks Andrey Dulkin Matan Hart.srt 25.4 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 204 Guest to root How to Hack Your Own Career Path and Stand Out Javvad Malik.mp4 70.1 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 204 Guest to root How to Hack Your Own Career Path and Stand Out Javvad Malik.srt 25.6 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 206 In the crosshairs the trend towards targeted attacks Lance Cottrell.mp4 57.7 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 206 In the crosshairs the trend towards targeted attacks Lance Cottrell.srt 31.4 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 207 Developing a Rugged DevOps Approach to Cloud Security Tim Prendergast.mp4 46.6 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 207 Developing a Rugged DevOps Approach to Cloud Security Tim Prendergast.srt 43.6 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 208 Digital Intelligence Gathering Using the Powers of OSINT for Both Blue and Red Teams Et.srt 43.0 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 209 Sharing is Caring Understanding and measuring Threat Intelligence Sharing Effectiveness.mp4 149.0 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 209 Sharing is Caring Understanding and measuring Threat Intelligence Sharing Effectiveness.srt 76.5 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 210 The Ransomware Threat Tracking the Digital Footprints Kevin Bottomley.mp4 45.4 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 210 The Ransomware Threat Tracking the Digital Footprints Kevin Bottomley.srt 28.5 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 211 Access Control in 2016 deep dive Dr Ulrich Lang.mp4 127.2 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 212 Using Behavior to Protect Cloud Servers Anirban Banerjee.mp4 68.5 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 212 Using Behavior to Protect Cloud Servers Anirban Banerjee.srt 54.6 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 213 The Art of the Jedi Mind Trick Jeff Man.mp4 60.3 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 213 The Art of the Jedi Mind Trick Jeff Man.srt 31.6 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 214 Mobile App Corporate Espionage Michael Raggo.mp4 41.7 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 214 Mobile App Corporate Espionage Michael Raggo.srt 33.0 kB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 216 Advanced techniques for real time detection of polymorphic malware Ajit Thyagarajan.mp4 80.4 MB
BSides San Francisco/BSides San Francisco 2016/BSidesSF 216 Advanced techniques for real time detection of polymorphic malware Ajit Thyagarajan.srt 24.4 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - #securityselfie (size up your appsec program with new metrics) (Jim O'Leary).mp4 82.8 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - #securityselfie (size up your appsec program with new metrics) (Jim O'Leary).srt 101.6 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - 5 Keys to Building an App Sec Program in the Age of DevOps (Tim Jarrett).mp4 146.1 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - 5 Keys to Building an App Sec Program in the Age of DevOps (Tim Jarrett).srt 89.8 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Access Control with Concierge One Tool to Rule Them All (Karthik Rangarajan).mp4 109.4 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Access Control with Concierge One Tool to Rule Them All (Karthik Rangarajan).srt 75.3 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Ask the EFF (Kurt Opsahl, Erica Portnoy, Gennie Gebhart, Jamie Lee Williams, ..).mp4 117.1 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Ask the EFF (Kurt Opsahl, Erica Portnoy, Gennie Gebhart, Jamie Lee Williams, ..).srt 99.4 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Assessing the Embedded Devices On Your Network (David Tomaschik).mp4 95.5 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Assessing the Embedded Devices On Your Network (David Tomaschik).srt 105.7 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - AtomBombing Injecting Code Using Windows’ Atoms (Tal Liberman).mp4 44.6 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - AtomBombing Injecting Code Using Windows’ Atoms (Tal Liberman).srt 67.7 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Better SSH management with ephemeral keys (Vivian Ho & Chris Steipp).mp4 68.1 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Better SSH management with ephemeral keys (Vivian Ho & Chris Steipp).srt 80.6 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - BeyondCorp Beyond “fortress” security (Neal Mueller & Jeff Peck).mp4 88.6 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - BeyondCorp Beyond “fortress” security (Neal Mueller & Jeff Peck).srt 82.0 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Building an Effective Intrusion Detection Program DNA Lounge (Jason Craig).mp4 87.9 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Building an Effective Intrusion Detection Program DNA Lounge (Jason Craig).srt 101.3 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Bypassing malware analysis sandboxes is easy, ... (Michael Gough).mp4 83.5 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Bypassing malware analysis sandboxes is easy, ... (Michael Gough).srt 113.0 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - DNS attacks, past, present, and future (Nick Mckenna).mp4 34.8 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - DNS attacks, past, present, and future (Nick Mckenna).srt 42.2 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Does DoD Level Security Work in the Real World (Jeff Man).mp4 126.1 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Does DoD Level Security Work in the Real World (Jeff Man).srt 81.5 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Dormant DOMination (xntrik).mp4 137.8 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Dormant DOMination (xntrik).srt 87.6 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Fighting Email Phishing with a Custom Cloud IDS (Dan Borges).mp4 44.4 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Fighting Email Phishing with a Custom Cloud IDS (Dan Borges).srt 48.7 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Hijacking .NET to Defend PowerShell (Amanda Rousseau).mp4 85.2 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Hijacking .NET to Defend PowerShell (Amanda Rousseau).srt 85.4 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - How Secure are your Docker Images (Manideep Konakandla).mp4 149.4 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - How Secure are your Docker Images (Manideep Konakandla).srt 97.8 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - How to Build a Security Team and Program (Coleen Coolidge).mp4 138.1 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - How to Build a Security Team and Program (Coleen Coolidge).srt 72.1 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Illusion vs Reality (Jason Truppi).mp4 165.7 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Internet dataset combinations for #ThreatHunting .. (Arian Evans & Steve Ginty).mp4 69.6 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Internet dataset combinations for #ThreatHunting .. (Arian Evans & Steve Ginty).srt 90.0 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Linux Monitoring at Scale with eBPF (Brendan Gregg & Alex Maestretti).mp4 67.6 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Linux Monitoring at Scale with eBPF (Brendan Gregg & Alex Maestretti).srt 87.8 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Live Dissection Anatomy of a Browser Based Botnet (Ilya Nesterov).mp4 13.7 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Live Dissection Anatomy of a Browser Based Botnet (Ilya Nesterov).srt 8.8 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Look Ma, No Hands! - Decentralizing security for scale (Chris Dorros).mp4 57.9 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Look Ma, No Hands! - Decentralizing security for scale (Chris Dorros).srt 60.7 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Make Alerts Great Again (Daniel Popescu).mp4 53.4 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Make Alerts Great Again (Daniel Popescu).srt 74.5 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Monday, OPENING REMARKS (Reed Loden).mp4 11.4 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Monday, OPENING REMARKS (Reed Loden).srt 11.7 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Opinionless Enforcement of Opinions on Operational Secrets (Jonathan Freedman).mp4 66.4 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Opinionless Enforcement of Opinions on Operational Secrets (Jonathan Freedman).srt 95.2 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Securing Kubernetes (Jesse Endahl).mp4 86.5 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Securing Kubernetes (Jesse Endahl).srt 86.8 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Security through Visibility Organizational Communication Strategies (Katie Ledoux).mp4 60.7 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Security through Visibility Organizational Communication Strategies (Katie Ledoux).srt 62.5 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Should I Pay or Should I Go Game Theory and Ransomware (Tony Martin Vegue).mp4 163.0 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Swimming Upstream Regulation vs Security (Robert Wood).mp4 113.3 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Swimming Upstream Regulation vs Security (Robert Wood).srt 115.4 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - The Cyber Insurance Emperor Has No Clothes (Russell C Thomas).mp4 114.5 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - The Cyber Insurance Emperor Has No Clothes (Russell C Thomas).srt 64.9 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - The Underground Economy of Apple ID (Claud Xiao).mp4 46.3 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - The Underground Economy of Apple ID (Claud Xiao).srt 79.6 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Tired of Playing Exploit Kit Whack-A-Mole Let's automate (Anjum Ahuja).mp4 38.3 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Tired of Playing Exploit Kit Whack-A-Mole Let's automate (Anjum Ahuja).srt 54.1 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Weathering the Storm The Art of Crisis Communications (Jen Ellis & Josh Feinblum).mp4 149.9 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Weathering the Storm The Art of Crisis Communications (Jen Ellis & Josh Feinblum).srt 81.1 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - When Bandit(s) Strike - Defend your Python Code (Travis McPeak).mp4 105.0 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - When Bandit(s) Strike - Defend your Python Code (Travis McPeak).srt 68.6 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Witchcraft Compiler Collection Towards programs self awareness (endrazine).mp4 51.9 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Witchcraft Compiler Collection Towards programs self awareness (endrazine).srt 53.3 kB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - “Mixtape to Master Key” Scenarios .... (Aren Sandersen).mp4 32.5 MB
BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - “Mixtape to Master Key” Scenarios .... (Aren Sandersen).srt 54.5 kB
BSides San Francisco/Dan Tentler vissago_bsidessf--rsa-2011_72157625973468589.zip 330.6 MB
BSides Sao Paulo/Bsides 2013 - The Bozo Security goes to (Rodrigo(Sp0oKeR) Montoro).mp4 172.6 MB
BSides Sao Paulo/Bsides 2013 - Utilizando um smartphone como pivo para um ataque interno (Rener Alberto).mp4 229.4 MB
BSides Springfield/BSides Springfield 2017/Aaron Blythe at BSides Springfield - Introduction to Shodan - Infosec DarkWeb Deep Web - 7 22 2017.en.transcribed.srt 77.6 kB
BSides Springfield/BSides Springfield 2017/Aaron Blythe at BSides Springfield - Introduction to Shodan - Infosec DarkWeb Deep Web - 7 22 2017.mp4 148.3 MB
BSides Springfield/BSides Springfield 2017/Anthony Maughan - Using Ravello to Create a Security Lab in the Cloud - from BSides Springfield 2017.en.transcribed.srt 51.1 kB
BSides Springfield/BSides Springfield 2017/Anthony Maughan - Using Ravello to Create a Security Lab in the Cloud - from BSides Springfield 2017.mp4 94.3 MB
BSides Springfield/BSides Springfield 2017/Ben Miller - BSides Springfield - Hacking up the Chain Stories & Tips for communication to bosses...en.transcribed.srt 93.5 kB
BSides Springfield/BSides Springfield 2017/Ben Miller - BSides Springfield - Hacking up the Chain Stories & Tips for communication to bosses...mp4 134.0 MB
BSides Springfield/BSides Springfield 2017/Cody J. Winkler at BSides Springfield - Malware Then, Now and How - 7 22 2017.en.transcribed.srt 73.7 kB
BSides Springfield/BSides Springfield 2017/Cody J. Winkler at BSides Springfield - Malware Then, Now and How - 7 22 2017.mp4 124.2 MB
BSides Springfield/BSides Springfield 2017/Jason Holcomb - ATT&CK Yourself Using Discrete Adversary TTPs... - BSides Springfield 2017.en.transcribed.srt 85.2 kB
BSides Springfield/BSides Springfield 2017/Jason Holcomb - ATT&CK Yourself Using Discrete Adversary TTPs... - BSides Springfield 2017.mp4 101.5 MB
BSides Springfield/BSides Springfield 2017/Jason Reaves at BSides Springfield - Malware C2 over x509 Certificate Exchange - 7 22 2017.en.transcribed.srt 38.3 kB
BSides Springfield/BSides Springfield 2017/Jason Reaves at BSides Springfield - Malware C2 over x509 Certificate Exchange - 7 22 2017.mp4 55.6 MB
BSides Springfield/BSides Springfield 2017/Learning How to Innovate '1n51d3-th3-b0x' - Leadership, Innovation, Cyber Defense - Ernest Wong.en.transcribed.srt 143.8 kB
BSides Springfield/BSides Springfield 2017/Learning How to Innovate '1n51d3-th3-b0x' - Leadership, Innovation, Cyber Defense - Ernest Wong.mp4 188.6 MB
BSides Springfield/BSides Springfield 2017/Mike Motta at BSides Springfield - Securing your company's assets with packets - 7 22 2017.en.transcribed.srt 123.6 kB
BSides Springfield/BSides Springfield 2017/Mike Motta at BSides Springfield - Securing your company's assets with packets - 7 22 2017.mp4 210.8 MB
BSides Springfield/BSides Springfield 2017/Weston George - Don't be a Hammer. Learning more tools with VMs and Vulnhub - live at BSides Spfd.en.transcribed.srt 35.5 kB
BSides Springfield/BSides Springfield 2017/Weston George - Don't be a Hammer. Learning more tools with VMs and Vulnhub - live at BSides Spfd.mp4 42.7 MB
BSides St. Johns/B-Sides St. John s 2013 - Session 01 - Travis Barlow.mp4 119.3 MB
BSides St. Johns/B-Sides St. John s 2013 - Session 02 - Mark Nunnikhoven.mp4 182.2 MB
BSides St. Johns/B-Sides St. John s 2013 - Session 03 - Chris Vernon.mp4 83.8 MB
BSides St. Johns/B-Sides St. John s 2013 - Session 04 - Peter Rawsthorne.mp4 52.1 MB
BSides St. Johns/B-Sides St. John s 2013 - Session 05 - Zack Mullaly.mp4 45.5 MB
BSides St. Johns/B-Sides St. John s 2013 - Session 06 - Charles Robertson.mp4 209.7 MB
BSides St. Johns/B-Sides St. John s 2013 - Session 07 - Darryl MacLeod.mp4 63.4 MB
BSides St. Johns/B-Sides St. John s 2013 - Session 08 - Joe Dawson.mp4 110.2 MB
BSides St. Johns/B-Sides St. John s 2013 - Session 09 - Garry Coldwells.mp4 97.6 MB
BSides Tampa/BSides Tampa 2015/100 Bug Bounties and Security Research Kevin Johnson.mp4 99.8 MB
BSides Tampa/BSides Tampa 2015/101 Securing The Cloud Alan Zukowski.mp4 132.2 MB
BSides Tampa/BSides Tampa 2015/102 Hacking Chris Berberich.mp4 108.7 MB
BSides Tampa/BSides Tampa 2015/103 Vendor Induced Security Issues Dave Chronister.mp4 114.6 MB
BSides Tampa/BSides Tampa 2015/104 Pentest Apocalypse Beau Bullock.mp4 95.5 MB
BSides Tampa/BSides Tampa 2015/105 Kippo and Bits and Bits Chris Teodorski.mp4 97.1 MB
BSides Tampa/BSides Tampa 2015/106 The Art of Post infection Response Mitigation Caleb Crable.mp4 110.5 MB
BSides Tampa/BSides Tampa 2015/107 The Need for Pro active Defense and Threat Hunting Within Organizations Andrew Case.mp4 148.7 MB
BSides Tampa/BSides Tampa 2015/200 Finding Common Ground Within the Industry and Beyond David Shearer.mp4 92.4 MB
BSides Tampa/BSides Tampa 2015/201 Ways to Identify Malware on a System Ryan Irving.mp4 136.0 MB
BSides Tampa/BSides Tampa 2015/202 Android Malware and Analysis Shane Hartman.mp4 135.3 MB
BSides Tampa/BSides Tampa 2015/203 Teaching Kids and Even Some Adults Security Through Gaming Le Grecs.mp4 116.3 MB
BSides Tampa/BSides Tampa 2015/204 Evaluating Commercial Cyber Threat Intelligence John Berger.mp4 123.7 MB
BSides Tampa/BSides Tampa 2015/300 Cyber Geography and the Manifest Destiny of the 21st Century Joe Blankenship.mp4 67.3 MB
BSides Tampa/BSides Tampa 2015/301 Mitigating Brand Damage From A Cyber Attack Guy Hagen.mp4 114.6 MB
BSides Tampa/BSides Tampa 2015/302 What is a security analyst and what job role will they perform James Risler.mp4 111.6 MB
BSides Tampa/BSides Tampa 2015/303 Live Forensic Acquisition Techniques Joe Partlow.mp4 114.1 MB
BSides Tampa/BSides Tampa 2015/304 Cyber Security Awareness for Healthcare Professionals Marco Polizzi.mp4 144.5 MB
BSides Tampa/BSides Tampa 2017/002 Managing Your MSSP Mark Myers and Damien Adams.mp4 32.4 MB
BSides Tampa/BSides Tampa 2017/003 ArchStrike Linux Chad Seaman.mp4 37.0 MB
BSides Tampa/BSides Tampa 2017/004 Hacking The Sabbath Jonathan Singer.mp4 30.8 MB
BSides Tampa/BSides Tampa 2017/005 What Ive Lea3rned Writing CTF Challenges Vito Genoese.mp4 29.9 MB
BSides Tampa/BSides Tampa 2017/100 Private matters Cameron Boozarjomehri.mp4 35.2 MB
BSides Tampa/BSides Tampa 2017/102 Advanced Targeted Attack Andy Thompson.mp4 20.6 MB
BSides Tampa/BSides Tampa 2017/103 Phishing Pholks Phor Phun and Prophit Erich Kron.mp4 58.8 MB
BSides Tampa/BSides Tampa 2017/104 Alert All the Things Network BaselinesAlerts with Bro Scripts Matthew Domko.mp4 45.9 MB
BSides Tampa/BSides Tampa 2017/105 Intro to Fuzzing for Fun and Profit Brian Beaudry.mp4 84.6 MB
BSides Tampa/BSides Tampa 2017/200 Build Your Own Physical Pentesting Go Bag Beau Bullock Derek Banks.mp4 37.8 MB
BSides Tampa/BSides Tampa 2017/201 NFC Your Smartphones Best Friend or Worst Nightmare Shane Hartman.mp4 29.2 MB
BSides Tampa/BSides Tampa 2017/202 e Extortion Trends and Defense Erik Iker.mp4 57.6 MB
BSides Tampa/BSides Tampa 2017/203 HIPAA for Infosec Professionals Michael Brown.mp4 36.5 MB
BSides Tampa/BSides Tampa 2017/204 Deconstructing 100 JavaScript based Ransomware Jeremy Rasmussen Paolo Soto.mp4 28.5 MB
BSides Tampa/BSides Tampa 2017/300 Redefining Security in a Cloud Centric Future Mike Spaulding Mitch Spaulding.mp4 68.5 MB
BSides Tampa/BSides Tampa 2017/301 Securing The Electrical Grid From Modern Threats Christopher Williams.mp4 48.6 MB
BSides Tampa/BSides Tampa 2017/302 Securing Agile Development Alan Zukowski.mp4 57.8 MB
BSides Tampa/BSides Tampa 2017/305 Mozillas Tips on Strong HTTPS Julien Vehent.mp4 42.1 MB
BSides Tampa/BSides Tampa 2017/401 Build the capability to Detect Triage And Respond Scott Sattler.mp4 46.1 MB
BSides Tampa/BSides Tampa 2017/402 What the Hell is ICS Security Brandon Workentin.mp4 43.6 MB
BSides Tampa/BSides Tampa 2017/403 Protecting Third Party Risk From Plundering Stacey Banks.mp4 20.3 MB
BSides Tampa/BSides Tampa 2017/405 Protecting Visual Assets Digital Image Counter Surveillance Strategies Nikita Mazurov Kenneth Br.mp4 47.1 MB
BSides Tampa/BSides Tampa 2017/406 Chaining the Future.mp4 178.1 MB
BSides Tampa/BSides Tampa 2017/BSides Tampa Birdy.mp4 7.8 MB
BSides Tampa/BSides Tampa 2018/Courtroom00 Cyber Assurance Testing for Success Col John Burger.en.transcribed.srt 126.4 kB
BSides Tampa/BSides Tampa 2018/Courtroom00 Cyber Assurance Testing for Success Col John Burger.mp4 175.0 MB
BSides Tampa/BSides Tampa 2018/Courtroom01 You Can Runbut you cant hide Bruce Anderson.en.transcribed.srt 112.2 kB
BSides Tampa/BSides Tampa 2018/Courtroom01 You Can Runbut you cant hide Bruce Anderson.mp4 93.4 MB
BSides Tampa/BSides Tampa 2018/Courtroom02 Red Team Apocalypse Beau Bullock and Derek Banks.en.transcribed.srt 126.9 kB
BSides Tampa/BSides Tampa 2018/Courtroom02 Red Team Apocalypse Beau Bullock and Derek Banks.mp4 93.2 MB
BSides Tampa/BSides Tampa 2018/Courtroom03 Advanced Persistent Security Ira Winkler.mp4 89.0 MB
BSides Tampa/BSides Tampa 2018/Courtroom04 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Myers and Barrett Ad.en.transcribed.srt 62.4 kB
BSides Tampa/BSides Tampa 2018/Courtroom04 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Myers and Barrett Ad.mp4 66.5 MB
BSides Tampa/BSides Tampa 2018/Courtroom05 The Shoulders of InfoSec Jack Daniels.en.transcribed.srt 102.6 kB
BSides Tampa/BSides Tampa 2018/Courtroom05 The Shoulders of InfoSec Jack Daniels.mp4 79.0 MB
BSides Tampa/BSides Tampa 2018/Courtroom06 Blockchain The New Digital Swiss Army Knife G Mark Hardy.en.transcribed.srt 145.2 kB
BSides Tampa/BSides Tampa 2018/Courtroom06 Blockchain The New Digital Swiss Army Knife G Mark Hardy.mp4 87.3 MB
BSides Tampa/BSides Tampa 2018/Courtroom07 Modern Day Vandals and Thieves Wireless Edition David Switzer and Jonathan Echavarria.en.transcribed.srt 92.3 kB
BSides Tampa/BSides Tampa 2018/Courtroom07 Modern Day Vandals and Thieves Wireless Edition David Switzer and Jonathan Echavarria.mp4 70.5 MB
BSides Tampa/BSides Tampa 2018/Courtroom08 Fraud Should you worry Greg Hanis.en.transcribed.srt 56.4 kB
BSides Tampa/BSides Tampa 2018/Courtroom08 Fraud Should you worry Greg Hanis.mp4 125.3 MB
BSides Tampa/BSides Tampa 2018/Derrick's Thank Yous.en.transcribed.srt 806 Bytes
BSides Tampa/BSides Tampa 2018/Derrick's Thank Yous.mp4 7.6 MB
BSides Tampa/BSides Tampa 2018/Track 200 A Security Look at Voice Based Assistants David Vargas.en.transcribed.srt 139.9 kB
BSides Tampa/BSides Tampa 2018/Track 200 A Security Look at Voice Based Assistants David Vargas.mp4 101.0 MB
BSides Tampa/BSides Tampa 2018/Track 201 Hackers Interrupted Alex Holden.en.transcribed.srt 103.9 kB
BSides Tampa/BSides Tampa 2018/Track 201 Hackers Interrupted Alex Holden.mp4 68.0 MB
BSides Tampa/BSides Tampa 2018/Track 202 Insane in the Mainframe Taking Control of Azure Security Jeremy Rassmusen.en.transcribed.srt 143.3 kB
BSides Tampa/BSides Tampa 2018/Track 202 Insane in the Mainframe Taking Control of Azure Security Jeremy Rassmusen.mp4 97.0 MB
BSides Tampa/BSides Tampa 2018/Track 203 MiFare lady Teaching an old RFID new tricks Daniel Reilly.en.transcribed.srt 129.3 kB
BSides Tampa/BSides Tampa 2018/Track 203 MiFare lady Teaching an old RFID new tricks Daniel Reilly.mp4 79.7 MB
BSides Tampa/BSides Tampa 2018/Track 206 Blue Teams tool dump Stop using them term NeXt Gen this isnt XXCall of DutyXX Alex Kot.en.transcribed.srt 162.5 kB
BSides Tampa/BSides Tampa 2018/Track 206 Blue Teams tool dump Stop using them term NeXt Gen this isnt XXCall of DutyXX Alex Kot.mp4 74.0 MB
BSides Tampa/BSides Tampa 2018/Track 300 Exploiting Zillow Zestimate for Reckless Profit Robert RJ Burney.en.transcribed.srt 99.0 kB
BSides Tampa/BSides Tampa 2018/Track 300 Exploiting Zillow Zestimate for Reckless Profit Robert RJ Burney.mp4 59.1 MB