magnet:?xt=urn:btih:E40EE8CAD419AB0ACFAAA4C5EDE2BDBED62ADF8E
Hack3rCon 5 - 2014/Bash Scripting for Pentesters by Lee Baird.mp4 202.9 MB
Hack3rCon 5 - 2014/Intro to Powershell Scripting for Security Brandon Morris.mp4 180.6 MB
Hack3rCon 3 - 2012/BashScripting101ForPenTesters-LeeBaird.mp4 105.3 MB
Hack3rCon 4 - 2013/netsniff ng jon schipp.mp4 104.2 MB
Hack3rCon 4 - 2013/red teaming your bug out bag tom moore.mp4 103.1 MB
Hack3rCon 4 - 2013/character assassination fun and games with unicode adrian crenshaw.mp4 98.1 MB
Hack3rCon 4 - 2013/another log to analyze utilizing dns to identify malware nathan magniez.mp4 96.6 MB
Hack3rCon 4 - 2013/advanced evasion techniques pwning the next generation security products david kennedy.mp4 96.0 MB
Hack3rCon 3 - 2012/IntroToLinuxExploitDevelopment-JohnDegruyter.mp4 89.0 MB
Hack3rCon 3 - 2012/FindingTheMacgyverInYou-WilliamA.Minear.mp4 78.1 MB
Hack3rCon 3 - 2012/BuildingDictionariesAndDestroyingHashesUsingAmazonEc2-SteveWerby.mp4 76.3 MB
Hack3rCon 2 - 2011/StephanLooneyUpAndRunningWithBacktrackWorkshop.mp4 74.7 MB
Hack3rCon 3 - 2012/HackingSurvival-LarryPesce.mp4 73.5 MB
Hack3rCon 3 - 2012/EmpYeahYouKnowMe-AdrianCrenshaw.mp4 73.5 MB
Hack3rCon 5 - 2014/Identify Your Web Attack Surface RAWR Tom Moore Adam Byers.mp4 73.0 MB
Hack3rCon 4 - 2013/ms08 067 under the hood john degruyter.mp4 69.1 MB
Hack3rCon 3 - 2012/FromPatchToPwnd-DeralHeiland.mp4 68.6 MB
Hack3rCon 2 - 2011/EricMilamAutomatingMitmForWinning.mp4 68.6 MB
Hack3rCon 4 - 2013/nsa wiretaps are legal and other annoying facts branden miller.mp4 68.4 MB
Hack3rCon 3 - 2012/IntroToNetworkTrafficAnalysis-Part2-JonSchipp.mp4 67.8 MB
Hack3rcon 8.5 GB