BT种子基本信息
- 种子哈希:2d2ca71604d663979086866e2bfb8d6037848df7
- 文档大小:13.4 GB
- 文档个数:562个文档
- 下载次数:8125次
- 下载速度:极快
- 收录时间:2021-11-04
- 最近下载:2025-01-22
- DMCA/屏蔽:DMCA/屏蔽
文档列表
- GrrCON 2013/Burning the Enterprise with BYOD - Georgia Weidman.mp4 82.3 MB
- GrrCON 2012/Mike Kemp - Everything Old is New Again.mp4 79.5 MB
- GrrCON 2012/Jared DeMott - Stop ROP and Roll.mp4 79.3 MB
- GrrCON 2012/dam Ely- Hack The Cloud.mp4 78.0 MB
- GrrCON 2013/Security Counterknowledge - Mike Kemp.mp4 76.8 MB
- GrrCON 2013/What s - Context - got to do with it - Arron Finnon.mp4 74.7 MB
- GrrCON 2017/STRATEGIES ON SECURING YOU BANKS ENTERPRISES FROM SOMEONE WHO ROBS BANKS ENTERPRISES FOR A L.mp4 71.9 MB
- GrrCON 2018/Life Death the Nematodes Long live Cyber Resilience Chad Calease.mp4 71.5 MB
- GrrCON 2018/emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.mp4 71.2 MB
- GrrCON 2019/Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.mp4 71.1 MB
- GrrCON 2017/A GRReat New Way of Thinking about Innovating for Cyber Defense and even Cyber Offense Ernest.mp4 68.0 MB
- GrrCON 2019/Ssshhhh Atlas of Doom.mp4 68.0 MB
- GrrCON 2017/Topic depends on number of federal agents in audience Atlas of Doom.mp4 67.6 MB
- GrrCON 2013/Hacking Giveaways, Contests, and Polls for Fun and Profit - Matthew Bryant.mp4 67.6 MB
- GrrCON 2018/How to rob a bank over the phone Joshua Naga Crumbaugh.mp4 66.7 MB
- GrrCON 2015/The wrong side of history everything that is old is new again Arron Finnon.mp4 65.5 MB
- GrrCON 2012/Jimmy Shah - Advances in Android Malware.mp4 65.4 MB
- GrrCON 2012/Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.mp4 65.0 MB
- GrrCON 2012/William Tarkington - Psychological Tricks of the Social Engineer.mp4 64.8 MB
- GrrCON 2012/Duncan Manuts - Certify Manuts.mp4 64.2 MB
- GrrCON 2015/Poking The Bear Mike Kemp.mp4 63.8 MB
- GrrCON 2012/Chris Roberts - By Land, By Sea, By Air.mp4 63.8 MB
- GrrCON 2012/atlas of doom- GHz or Bust.mp4 62.8 MB
- GrrCON 2019/A Theme of Fear Hacking the Paradigm Catherine Ullman.mp4 62.5 MB
- GrrCON 2017/An Employee their Laptop and a Hacker walk into a Bar Shannon Fritz.mp4 62.5 MB
- GrrCON 2019/CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.mp4 62.3 MB
- GrrCON 2013/Beautiful Models - J Wolfgang Goerlich.mp4 62.3 MB
- GrrCON 2012/David HealWHans Schwartzberg - iOS Hash Cracking.mp4 62.2 MB
- GrrCON 2017/Eye on the Prize a Proposal for Legalizing Hacking Back Adam Hogan.mp4 61.6 MB
- GrrCON 2019/QA on our industry and other things that are top of mind Chris Roberts.mp4 61.5 MB
- GrrCON 2019/Reverse Engineering Malware for N00bs GregB33fJames.mp4 61.3 MB
- GrrCON 2018/The Abyss is Waving BackThe four paths that human evolution is charging down a.mp4 61.1 MB
- GrrCON 2019/Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.mp4 60.9 MB
- GrrCON 2018/Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.mp4 60.8 MB
- GrrCON 2017/The Shuttle Columbia Disaster Lessons That Were Not Learned Joel I love it when they call me.mp4 60.8 MB
- GrrCON 2014/Bigger Boys Made Us Mike Kemp.mp4 60.6 MB
- GrrCON 2019/I PWN thee I PWN thee not Jayson Street.mp4 60.3 MB
- GrrCON 2017/Learning from InfoSec Fails - Derek Milroy.mp4 60.2 MB
- GrrCON 2012/J Wolfgang Goerlich- Punch Counter Punch with.mp4 60.0 MB
- GrrCON 2018/More Tales from the CryptAnalyst Jeff Man.mp4 60.0 MB
- GrrCON 2018/Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.mp4 60.0 MB
- GrrCON 2012/Jim Rennie - Law of Internet Scanning.mp4 59.4 MB
- GrrCON 2018/Threat Modeling How to actually do it and make it useful Derek Milroy.mp4 59.4 MB
- GrrCON 2013/The Science of Security Automation - Paul Cochran & Toni Buhrke.mp4 59.3 MB
- GrrCON 2014/Finuxs Historical Tour Of IDS Evasion Insertions and Other Odditie Arron Finux Finnon.mp4 59.3 MB
- GrrCON 2019/Understanding how public places introduce additional risks to business Len Noe.mp4 59.2 MB
- GrrCON 2019/Big Plane Little Plane How common aviation attacks affect airlines and general avia.mp4 58.7 MB
- GrrCON 2017/Skills For A Red Teamer Brent White Tim Roberts.mp4 58.3 MB
- GrrCON 2019/Malicious Cryptomining is Exploding Are you at risk John Fatten.mp4 58.0 MB
- GrrCON 2012/Raymond Lily - OSINT Footprinting.mp4 57.8 MB
- GrrCON 2013/Pwnage from the Skies - Philip Polstra.mp4 57.3 MB
- GrrCON 2012/Amol Sarwate - SCADA Security.mp4 57.2 MB
- GrrCON 2017/An Attack Pathway Into Your Organization Reducing risk without reducing operational efficiency.mp4 57.0 MB
- GrrCON 2018/Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.mp4 56.6 MB
- GrrCON 2012/Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.mp4 56.4 MB
- GrrCON 2012/Mark Ehr - Security Intellligence.mp4 55.9 MB
- GrrCON 2019/Keynote Amanda Infosystir Berlin.mp4 55.6 MB
- GrrCON 2012/Steve F. Fox - From Obstacle to Ally - Repositioning the Security Team.mp4 55.5 MB
- GrrCON 2018/Automation and Open Source Turning the Tide on Attackers John Grigg.mp4 55.4 MB
- GrrCON 2019/From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.mp4 55.4 MB
- GrrCON 2016/Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.mp4 55.2 MB
- GrrCON 2012/Philip Polstra - Battery Powered Pentesting and Forensics.mp4 55.1 MB
- GrrCON 2012/Chris Silvers - Go with the Flow - Strategies for Successful Social Engineering.mp4 55.0 MB
- GrrCON 2017/Building a Usable Mobile Data Protection Strategy David Heal Schwartzberg.mp4 54.8 MB
- GrrCON 2016/Machine Duping Pwning Deep Learning Systems Clarence Chio.mp4 54.5 MB
- GrrCON 2019/How to Make a Honeypot Stickier SSH Jose Hernandez.mp4 54.2 MB
- GrrCON 2018/Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.mp4 54.2 MB
- GrrCON 2015/But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.mp4 54.0 MB
- GrrCON 2019/The Science of Breaking and Entering Alissa dnsprincess.mp4 53.9 MB
- GrrCON 2012/Richard Stiennon - Cyber Defense.mp4 53.7 MB
- GrrCON 2013/atlas of d00m - TBA.mp4 53.7 MB
- GrrCON 2019/Deepfakes If anything can be real then nothing is real April C Wright.mp4 53.6 MB
- GrrCON 2017/We got it wrong Wolfgang Goerlich.mp4 53.5 MB
- GrrCON 2018/The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.mp4 53.4 MB
- GrrCON 2012/Daniel Lohrman - Why Security Professionals Fail.mp4 53.2 MB
- GrrCON 2011/SmartMeters - Are they a gateway drug - Robert Former.mp4 53.2 MB
- GrrCON 2013/David Schwartzberg- Zeus C&C for Tech Support.mp4 53.1 MB
- GrrCON 2017/Embedding Security in Embedded Systems Dr Jared DeMott.mp4 53.1 MB
- GrrCON 2016/Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.mp4 53.0 MB
- GrrCON 2017/The Black Art of Wireless Post Exploitation Gabriel solstice Ryan.mp4 52.7 MB
- GrrCON 2012/Nick Percoco - Mobile Attacks - What will the future bring.mp4 52.6 MB
- GrrCON 2018/2018 SIEM Trends What is my Mean Time to Value Bill Lampe.mp4 52.4 MB
- GrrCON 2012/Rafal Los- House of Cards.mp4 52.4 MB
- GrrCON 2018/SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.mp4 52.3 MB
- GrrCON 2019/Baselining Behavior Tradecraft through Simulations Dave Kenendy.mp4 52.3 MB
- GrrCON 2017/Infosec State of Affairs Too much Kim Kardashian not enough Malcolm Gladwel Jim Wojno Dan Ki.mp4 51.9 MB
- GrrCON 2012/Gary McCully & David Sopata - Hacking PCI Requ.mp4 51.8 MB
- GrrCON 2019/Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.mp4 51.8 MB
- GrrCON 2018/Keynote Dave Kennedy.mp4 51.8 MB
- GrrCON 2015/The Hitch Hikers Guide to Information Security Kellman Meghu.mp4 51.7 MB
- GrrCON 2015/Breaking in Bad Im The One Who Doesnt Knock jayson Street.mp4 51.6 MB
- GrrCON 2012/Alexander Chaveriat - I Think Therefore I PwN.mp4 51.4 MB
- GrrCON 2016/Abnormal Behavior Detection in Large Environments Dave Kennedy.mp4 51.2 MB
- GrrCON 2017/Hidden Treasure Detecting Intrusions with ETW Zac Brown.mp4 51.2 MB
- GrrCON 2011/It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.mp4 51.0 MB
- GrrCON 2018/Career Risk Management 10 tips to keep you employed Chris Burrows.mp4 51.0 MB
- GrrCON 2017/A Reporters Look at Open Source Intelligence Hilary Louise.mp4 50.9 MB
- GrrCON 2014/OAuth20 a Itas the Implementation Stupid Tony Miller.mp4 50.3 MB
- GrrCON 2016/Phish your employees for fun Kristoffer Marshall.mp4 50.3 MB
- GrrCON 2016/Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.mp4 50.0 MB
- GrrCON 2017/Infrastructure Based Security Chris Barnes.mp4 49.9 MB
- GrrCON 2015/Footprints of This Years Top Attack Vectors Kerstyn Clover.mp4 49.9 MB
- GrrCON 2019/What Are We Doing Here Rethinking Security Jeff Man.mp4 49.8 MB
- GrrCON 2014/Vaccinating APKs Milan Gabor.mp4 49.8 MB
- GrrCON 2013/Hacker History - This Stuff Matters - Duncan Manuts.mp4 49.7 MB
- GrrCON 2017/Cyber Cyber Cyber Using the killchain to accomplish something Amanda Berlin.mp4 49.7 MB
- GrrCON 2019/Cons Careers SciaticNerd.mp4 49.7 MB
- GrrCON 2015/Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.mp4 49.5 MB
- GrrCON 2018/Youre right this talk isnt really about you Jayson E Street.mp4 49.4 MB
- GrrCON 2015/Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.mp4 49.3 MB
- GrrCON 2016/Security Guards LOL Brent White Tim Roberts.mp4 49.2 MB
- GrrCON 2015/Honeypots for Active Defense Greg Foss.mp4 49.2 MB
- GrrCON 2017/The Future of Cyber Security Anthony Sabaj.mp4 49.2 MB
- GrrCON 2011/The future of Authenticity - Moxie Marlinspike.mp4 49.2 MB
- GrrCON 2011/sploit me if u can - atlas 0f d00m.mp4 49.0 MB
- GrrCON 2011/[Least] resistance is [anything but] futile Tim Maletic.mp4 48.9 MB
- GrrCON 2011/Mike Kemp - When I grow up I want to be a cyber terrorist.mp4 48.7 MB
- GrrCON 2017/Realizing Software Security Maturity The Growing Pains Gains Mark Stanislav Kelby Ludwig.mp4 48.6 MB
- GrrCON 2015/Security Incident Response Derek Milroy.mp4 48.6 MB
- GrrCON 2018/Threat Hunting the macOS edition Megan Carney.mp4 48.4 MB
- GrrCON 2016/Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.mp4 47.8 MB
- GrrCON 2016/Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).mp4 47.8 MB
- GrrCON 2016/Guarding Lunch J Wolfgang Goerlich.mp4 47.8 MB
- GrrCON 2012/Christopher Elisan - Threat Ecosystem.mp4 47.7 MB
- GrrCON 2011/Hook, Line and Syncer - A Liar for Hire s Ultimate Tackle Box Chris Silvers & Pat McCoy.mp4 47.6 MB
- GrrCON 2016/Tales from the Cryptanalyst Jeff Man.mp4 47.5 MB
- GrrCON 2019/Dance Fancybear Dance a study in macOS Cat Self.mp4 47.5 MB
- GrrCON 2017/Population Control Through The Advances In Technology Chris Roberts part 1.mp4 47.3 MB
- GrrCON 2011/Blinkie Lights Network Monitoring with Arduino - Steve Ocepek.mp4 47.2 MB
- GrrCON 2015/The Safety You Think You Have is Only a Masquerade Nathan Dragun.mp4 47.2 MB
- GrrCON 2012/Matt Johnson - Powershell - Be a Cool Blue Kid.mp4 47.1 MB
- GrrCON 2017/Pen Test War Stories Why my job is so easy and how you can make it harder Aaron Herndon.mp4 47.1 MB
- GrrCON 2017/Ive got a Pocket Bone to pick with you Dr Phil Postra.mp4 47.0 MB
- GrrCON 2012/tlas of d00m subbing for Kevin Johnson- Tactical SecOps.mp4 46.9 MB
- GrrCON 2013/Mark Stanislav - Core Linux Security - 0-Day Isn t Everything.mp4 46.6 MB
- GrrCON 2011/Panel Discussion - Cloud Data Security and Privacy - How to leverage the Cloud safely.mp4 46.6 MB
- GrrCON 2015/Subject matter to be determined by the number of federal agents present in th.mp4 46.2 MB
- GrrCON 2016/Back to the Future Understanding our future but following the past Kevin Johnson.mp4 46.0 MB
- GrrCON 2012/Taylor Ettema - Modern Malware.mp4 45.8 MB
- GrrCON 2011/ZeuS - Inside Command and Control Adam Johnson.mp4 45.6 MB
- GrrCON 2018/Bounty Hunters J Wolfgang Goerlich.mp4 45.2 MB
- GrrCON 2018/Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.mp4 45.2 MB
- GrrCON 2019/Symbolically executing a fuzzy tyrant Lojikil.mp4 45.1 MB
- GrrCON 2019/MSSPs are greatand other lies I tell myself Scott Thomas.mp4 45.0 MB
- GrrCON 2019/Keynote Rachel Soul Crusher86 G.mp4 45.0 MB
- GrrCON 2016/Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.mp4 44.9 MB
- GrrCON 2016/Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).mp4 44.8 MB
- GrrCON 2012/Louise Popyck - Simplifying Data Center Security and Compliance.mp4 44.8 MB
- GrrCON 2014/ZitMo NoM David HealWHans Schwartzberg.mp4 44.5 MB
- GrrCON 2011/Kernel Fun - Jon Oberheide.mp4 44.5 MB
- GrrCON 2014/Security On The Cheap Joel Cardella.mp4 44.2 MB
- GrrCON 2017/Tales From The Trenches Practical Information Security Lessons Michael Belton.mp4 44.0 MB
- GrrCON 2014/Autonomous Remote Hacking Drones Dr Phil Polstra.mp4 44.0 MB
- GrrCON 2015/Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.mp4 43.7 MB
- GrrCON 2016/and bad mistakes Ive made a few Jayson Street (only first 30 min or so).mp4 43.7 MB
- GrrCON 2016/and bad mistakes Ive made a few Jayson Street.mp4 43.7 MB
- GrrCON 2017/vAp0r and the Blooming Onion Justin Whitehead Jim Allee.mp4 43.4 MB
- GrrCON 2014/Red Teaming Back and Forth 5ever FuzzyNop.mp4 43.2 MB
- GrrCON 2014/Full Douchesclosure Duncan Manuts.mp4 43.1 MB
- GrrCON 2016/Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.mp4 43.1 MB
- GrrCON 2017/Real World Red Teaming spartan.mp4 43.0 MB
- GrrCON 2018/Saving All the Money to Buy All the Booze Learning to Hack All the Things on.mp4 42.5 MB
- GrrCON 2017/3rd Party Data Burns Aaron Finux Finnon.mp4 42.4 MB
- GrrCON 2016/Secure Dicks Michael Kemp.mp4 42.4 MB
- GrrCON 2015/Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.mp4 42.3 MB
- GrrCON 2011/Characteristics of a Highly-Effective Information Security Executive - Bob West.mp4 42.2 MB
- GrrCON 2018/Analyzing Multi Dimensional Malware Dataset Ankur Tyagi.mp4 42.1 MB
- GrrCON 2016/still broken after all these years aka utility security for smarties doug nibbelink.mp4 41.9 MB
- GrrCON 2011/Mobile App Moolah - Profit taking with Mobile Malware - Jimmy Shah.mp4 41.6 MB
- GrrCON 2016/Act Three The Evolution of Privacy Finux.mp4 41.2 MB
- GrrCON 2019/Data Security How to avoid an embarrassing breach Matt mattrix Hoy.mp4 41.1 MB
- GrrCON 2015/The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.mp4 40.9 MB
- GrrCON 2017/Threat Intelligence Zero to Basics in presentation Chris J.mp4 40.9 MB
- GrrCON 2014/The Challenge of Natural Security Systems Rockie Brockway.mp4 40.9 MB
- GrrCON 2016/Binary Ninja Jared Demott.mp4 40.8 MB
- GrrCON 2018/Analyzing Pwned Passwords with Apache Spark Kelley Robinson.mp4 40.8 MB
- GrrCON 2016/Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.mp4 40.7 MB
- GrrCON 2014/Application Pen Testing Chris Pfoutz.mp4 40.2 MB
- GrrCON 2014/Hack the Hustle Career Strategies For Information Security Professionals Eve Adams.mp4 40.2 MB
- GrrCON 2016/Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.mp4 40.1 MB
- GrrCON 2018/InSpec Compliance as Code Kent picat Gruber.mp4 39.8 MB
- GrrCON 2014/Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.mp4 39.8 MB
- GrrCON 2018/Designing a Cloud Security Blueprint Sarah Elie.mp4 39.4 MB
- GrrCON 2015/No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.mp4 38.8 MB
- GrrCON 2014/Breach Stains Matt The Streaker Johnson.mp4 38.8 MB
- GrrCON 2019/Hillbilly Storytime Pentest Fails Adam Compton.mp4 38.3 MB
- GrrCON 2011/How asteroids falling from the sky improve security - J Wolfgang Goerlich.mp4 38.2 MB
- GrrCON 2018/Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.mp4 38.2 MB
- GrrCON 2016/Money Fame Power Build your success as a security professional Nathan Dragun.mp4 38.0 MB
- GrrCON 2011/Dear Pentesters, Get Bent - Duncan Manuts.mp4 37.7 MB
- GrrCON 2015/Shell scripting live Linux Forensics Dr Phil Polstra.mp4 37.5 MB
- GrrCON 2015/This Is All Your Fault Duncan Manuts.mp4 37.3 MB
- GrrCON 2012/Jonathan Deutsch - Facebook and You.mp4 37.2 MB
- GrrCON 2015/Backdooring Git John Menerick.mp4 37.1 MB
- GrrCON 2014/Are you a janitor or a cleaner John ageekspeeda Stauffacher Matthew Mattrix Hoy.mp4 37.1 MB
- GrrCON 2016/Breaking Android Apps for Fun and Profit Bill Sempf.mp4 37.1 MB
- GrrCON 2016/Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.mp4 36.9 MB
- GrrCON 2016/So Youve Inherited a Security Department Now What Amanda Berlin.mp4 36.7 MB
- GrrCON 2015/Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.mp4 36.0 MB
- GrrCON 2014/Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.mp4 35.3 MB
- GrrCON 2015/Application Recon The Lost Art Tony Miller.mp4 35.2 MB
- GrrCON 2016/So You Want to Be a Pentester Absolute0x0.mp4 35.1 MB
- GrrCON 2015/Is it EVIL Chaoticflaws.mp4 34.9 MB
- GrrCON 2017/Critical Incident Surviving my first layoff by applying BCPDRP Principles Tom Mead.mp4 34.8 MB
- GrrCON 2018/Physicals Badges and why it matters Alex Fernandez Gatti.mp4 34.8 MB
- GrrCON 2018/How to Conduct a Product Security Test And How it Fits Into the Larger Security St.mp4 34.7 MB
- GrrCON 2011/Hunting Hackers Tim Crothers.mp4 34.6 MB
- GrrCON 2017/Change is Simply an Act of Survival Predicting the future while shackled to the past Bil Har.mp4 34.6 MB
- GrrCON 2016/Threat Detection Response with Hipara J Brett Cunningham (2).mp4 34.4 MB
- GrrCON 2016/Threat Detection Response with Hipara J Brett Cunningham.mp4 34.3 MB
- GrrCON 2019/Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.mp4 34.0 MB
- GrrCON 2017/Red Team Yourself Thomas Richards.mp4 33.6 MB
- GrrCON 2014/BioHacking Becoming the Best Me I Can Be Leonard.mp4 33.4 MB
- GrrCON 2016/Piercing the Air Gap Network Steganography for Everyone John Ventura.mp4 33.3 MB
- GrrCON 2014/Intelligence Driven Security Shane Harsch.mp4 33.2 MB
- GrrCON 2019/Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.mp4 33.1 MB
- GrrCON 2016/On being an Eeyore in Infosec Stefan Edwards.mp4 33.1 MB
- GrrCON 2015/Path Well Traveled Common Mistakes with SIEM Nick Jacob.mp4 32.9 MB
- GrrCON 2016/Make STEHM Great Again David HealWHans Schwartzberg.mp4 32.9 MB
- GrrCON 2014/Hackers Are People Too Infosystir.mp4 32.8 MB
- GrrCON 2017/Defending The De funded Keith Wilson.mp4 32.1 MB
- GrrCON 2019/How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.mp4 32.0 MB
- GrrCON 2014/Security for the People End User Authentication Security on the Internet Mark Stanislav.mp4 32.0 MB
- GrrCON 2015/Hacking the Next Generation HealWHans.mp4 31.9 MB
- GrrCON 2018/My First year in Application Security Whitney Phillips.mp4 31.7 MB
- GrrCON 2017/Dissecting Destructive Malware and Recovering from Catastrophe Bryan York.mp4 31.5 MB
- GrrCON 2012/Robert Rowley - Juice Jacking.mp4 31.4 MB
- GrrCON 2017/Oops Was that your pacemaker Charles Parker II.mp4 31.0 MB
- GrrCON 2015/Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.mp4 30.8 MB
- GrrCON 2019/Breaking NBAD & UEBA Detection by Charles Herring.mp4 30.7 MB
- GrrCON 2014/PCI and Crypto The Good The Bad and The Frankly Ugly Robert Formera.mp4 30.7 MB
- GrrCON 2014/Home Grown Linux Phil Polstra.mp4 30.6 MB
- GrrCON 2016/Alignment of business and IT Security Shane Harsch.mp4 30.3 MB
- GrrCON 2012/Daniel Gregory - Securing & Managing Mobile Devices in the workplace.mp4 30.1 MB
- GrrCON 2017/National Guard for Cyber How about a Volunteer Cyber Department Ray Davidson.mp4 29.9 MB
- GrrCON 2011/Cyber Vigilantes - Rob Rachwald.mp4 29.6 MB
- GrrCON 2011/Chris Roberts - Planes, Trains and Automobiles.mp4 29.5 MB
- GrrCON 2019/Data Access Rights Exploits under New Privacy Laws Amber Welch.mp4 29.5 MB
- GrrCON 2015/Software Security IWR Thomas G13 Richards.mp4 29.4 MB
- GrrCON 2011/Dispelling Cloud Security Hype - Johnathan Norman.mp4 29.4 MB
- GrrCON 2016/Encryption Mobility Cloud Oh My Bill Harmer.mp4 29.3 MB
- GrrCON 2011/Legal Perspectives on Data Breaches - Carol Romej.mp4 29.3 MB
- GrrCON 2019/Good Cyber Hygiene and using analytics to drive the need for it on Print David Rose.mp4 28.8 MB
- GrrCON 2017/Software Defined Segmentation Matt Hendrickson.mp4 28.7 MB
- GrrCON 2016/Securing Trust Defending Against Next generation Attacks John Muirhead Gould.mp4 28.6 MB
- GrrCON 2019/Surfing and Security Ride the wave Chris Burrows.mp4 28.6 MB
- GrrCON 2018/Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.mp4 28.5 MB
- GrrCON 2015/Securing Todays Enterprise WAN Andy Mansfield.mp4 28.3 MB
- GrrCON 2018/Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.mp4 27.8 MB
- GrrCON 2017/ProbeSpy Tracking your past predicting your future stumblebot.mp4 27.7 MB
- GrrCON 2018/An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.mp4 27.6 MB
- GrrCON 2019/Host Hunting on a Budget cyberGoatPsyOps.mp4 27.6 MB
- GrrCON 2011/Defcon CTF-Why even Losers Always Win - Jarod DeMott.mp4 27.5 MB
- GrrCON 2017/You Got Your SQL Attacks In My Honeypot Andrew Brandt.mp4 27.4 MB
- GrrCON 2019/The Past Present Future of Cyber Threats Chris Russell.mp4 27.3 MB
- GrrCON 2016/Stop attacking your mothers car Charles Parker II.mp4 27.0 MB
- GrrCON 2019/bonus talk Ryan Wisniewski.mp4 26.9 MB
- GrrCON 2011/Hacking Trust Steven Fox.mp4 26.6 MB
- GrrCON 2016/Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.mp4 26.5 MB
- GrrCON 2012/Tom Clare - 7 Stages of Advanced Threats.mp4 26.5 MB
- GrrCON 2016/What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.mp4 26.4 MB
- GrrCON 2019/Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.mp4 26.4 MB
- GrrCON 2016/Welcome to The World of Yesterday Tomorrow Joel Cardella.mp4 26.4 MB
- GrrCON 2016/How to Implement Crypto Poorly Sean Cassidy.mp4 25.9 MB
- GrrCON 2019/Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.mp4 25.8 MB
- GrrCON 2019/Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.mp4 25.6 MB
- GrrCON 2014/Vulnerable By Design a The Backdoor That Came Through the Front Matthew mandatory Bryant.mp4 25.4 MB
- GrrCON 2018/we we Internet Explorer Does What It Wants Aaron Heikkila.mp4 24.4 MB
- GrrCON 2012/Thomas Richards - Android in the Healthcare Workplace.mp4 24.2 MB
- GrrCON 2016/Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.mp4 23.8 MB
- GrrCON 2014/Grrcon 2014 closing.mp4 23.5 MB
- GrrCON 2015/Ticking me off From Threat Intel to Reversing Juan Cortes.mp4 23.5 MB
- GrrCON 2015/Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.mp4 23.5 MB
- GrrCON 2019/Destroy Everything Tom Somerville.mp4 23.5 MB
- GrrCON 2011/AlgoSec.mp4 23.4 MB
- GrrCON 2015/Security Frameworks What was once old is new again Brian Wrozek.mp4 23.2 MB
- GrrCON 2014/Board Breaking Challenge.mp4 22.8 MB
- GrrCON 2019/How Nathan Crashed and Burned Nathan Dragun.mp4 22.8 MB
- GrrCON 2018/Pacu Attack and Post Exploitation in AWS Spencer Gietzen.mp4 22.7 MB
- GrrCON 2012/Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).mp4 22.6 MB
- GrrCON 2014/LEVIATHAN Command and Control Communications on Planet Earth Kevin Thompson.mp4 22.5 MB
- GrrCON 2016/Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.mp4 22.4 MB
- GrrCON 2012/Larry Holland & Hal Charnley - The Killer is Already in Your House.mp4 22.4 MB
- GrrCON 2015/How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.mp4 22.3 MB
- GrrCON 2019/The Importance of IT Asset Visibility Brian Berk.mp4 22.1 MB
- GrrCON 2014/How to budget IDSs Brian Arcane Heitzman.mp4 21.9 MB
- GrrCON 2016/Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.mp4 21.9 MB
- GrrCON 2019/The Importance of Relevant Timely and Qualitative Intelligence Analysis Aamil AK.mp4 21.7 MB
- GrrCON 2019/Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.mp4 21.7 MB
- GrrCON 2019/A Day in the Life of a Security Operations Center What do you get when you partner.mp4 21.5 MB
- GrrCON 2017/How do you POC Are you really testing a product Ken Donze.mp4 21.4 MB
- GrrCON 2019/Departing Employees Departing Data Todd Thorsen.mp4 21.3 MB
- GrrCON 2016/Bad Guys Look Just Like You Justin Beard.mp4 20.7 MB
- GrrCON 2015/Adding 10 Security to Your Scrum Agile Environment tehEx0dus.mp4 20.4 MB
- GrrCON 2015/Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.mp4 20.3 MB
- GrrCON 2019/The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.mp4 20.1 MB
- GrrCON 2015/How I Got Network Creds Without Even Asking A Social Engineering Case Study J.mp4 19.9 MB
- GrrCON 2019/PSD2 SCA WTF Kelley Robinson.mp4 19.6 MB
- GrrCON 2018/Dragnet Your Social Engineering Sidekick Truman Kain.mp4 19.5 MB
- GrrCON 2019/Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.mp4 19.4 MB
- GrrCON 2018/How this 20 Year Old Changed the Security Industry James ONeill.mp4 19.3 MB
- GrrCON 2019/Want to Play a Game John DeRyke.mp4 19.2 MB
- GrrCON 2012/Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.mp4 19.1 MB
- GrrCON 2016/How Do You Secure What You don't Control Dimitri Vlachos.mp4 19.1 MB
- GrrCON 2015/What is a cloud access broker and do I need one Tom Doane.mp4 18.9 MB
- GrrCON 2014/Cyber Security Incidents Red Blue Team Unc13 Fuck3r.mp4 18.9 MB
- GrrCON 2015/Welcome to the Internet of insecure things Chandler Howell.mp4 18.3 MB
- GrrCON 2016/Fighting the Enemy Within Matt Crowe.mp4 17.6 MB
- GrrCON 2015/Understanding and Improving the Military Cyber Culture Dariusz Mikulski.mp4 17.2 MB
- GrrCON 2015/Process The Salvation of Incident Response Charles Herring.mp4 17.1 MB
- GrrCON 2012/Jack Wink - XSS Session Fixation.mp4 17.0 MB
- GrrCON 2016/Reality Checking Your AppSec Program Darren Meyer.mp4 16.6 MB
- GrrCON 2019/Automating Phishing Analysis Kyle Eaton.mp4 16.3 MB
- GrrCON 2016/Magnetic Stripes 101 Tyler Keeton.mp4 16.1 MB
- GrrCON 2016/Getting to the Root of Advanced Threats Before Impact Josh Fazio.mp4 15.0 MB
- GrrCON 2012/Scott Thomas - InfoSec Flameout.mp4 14.9 MB
- GrrCON 2014/GrrCon TAP.mp4 14.4 MB
- GrrCON 2017/#TrevorForget with Lintile.mp4 14.1 MB
- GrrCON 2015/Harness the Force for Better Penetration Testing Patrick Fussell.mp4 13.8 MB
- GrrCON 2016/Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.mp4 10.7 MB
- GrrCON 2015/Hello GrrCON.mp4 3.6 MB
- GrrCON 2017/Grand Rapids next to GrrCON, high water.mp4 1.1 MB
- GrrCON Logo.png 301.1 kB
- GrrCON 2016/Abnormal Behavior Detection in Large Environments Dave Kennedy.srt 180.3 kB
- GrrCON 2016/Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.srt 171.8 kB
- GrrCON 2018/Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.eng.srt 170.0 kB
- GrrCON 2016/Guarding Lunch J Wolfgang Goerlich.srt 166.3 kB
- GrrCON 2018/Threat Modeling How to actually do it and make it useful Derek Milroy.eng.srt 161.8 kB
- GrrCON 2016/Security Guards LOL Brent White Tim Roberts.srt 159.8 kB
- GrrCON 2018/SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.eng.srt 156.6 kB
- GrrCON 2018/Keynote Dave Kennedy.eng.srt 155.7 kB
- GrrCON 2018/The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.eng.srt 155.1 kB
- GrrCON 2016/Welcome to The World of Yesterday Tomorrow Joel Cardella.srt 154.3 kB
- GrrCON 2018/Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.eng.srt 154.0 kB
- GrrCON 2016/Money Fame Power Build your success as a security professional Nathan Dragun.srt 152.9 kB
- GrrCON 2016/Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.srt 147.3 kB
- GrrCON 2016/Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.srt 145.5 kB
- GrrCON 2016/Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).srt 144.6 kB
- GrrCON 2018/More Tales from the CryptAnalyst Jeff Man.eng.srt 142.7 kB
- GrrCON 2016/On being an Eeyore in Infosec Stefan Edwards.srt 142.2 kB
- GrrCON 2018/Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.eng.srt 141.9 kB
- GrrCON 2018/Automation and Open Source Turning the Tide on Attackers John Grigg.eng.srt 141.3 kB
- GrrCON 2016/Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.srt 140.1 kB
- GrrCON 2018/Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.eng.srt 139.6 kB
- GrrCON 2018/The Abyss is Waving BackThe four paths that human evolution is charging down a.eng.srt 139.0 kB
- GrrCON 2016/Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).srt 138.8 kB
- GrrCON 2018/Bounty Hunters J Wolfgang Goerlich.eng.srt 138.6 kB
- GrrCON 2016/Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.srt 138.6 kB
- GrrCON 2016/Tales from the Cryptanalyst Jeff Man.srt 132.8 kB
- GrrCON 2018/Life Death the Nematodes Long live Cyber Resilience Chad Calease.eng.srt 131.9 kB
- GrrCON 2016/Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.srt 131.6 kB
- GrrCON 2016/Breaking Android Apps for Fun and Profit Bill Sempf.srt 130.5 kB
- GrrCON 2016/Binary Ninja Jared Demott.srt 128.8 kB
- GrrCON 2016/Machine Duping Pwning Deep Learning Systems Clarence Chio.srt 127.1 kB
- GrrCON 2018/Analyzing Pwned Passwords with Apache Spark Kelley Robinson.eng.srt 126.6 kB
- GrrCON 2018/Career Risk Management 10 tips to keep you employed Chris Burrows.eng.srt 126.1 kB
- GrrCON 2018/Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.eng.srt 125.5 kB
- GrrCON 2018/Youre right this talk isnt really about you Jayson E Street.eng.srt 125.3 kB
- GrrCON 2018/Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.eng.srt 124.5 kB
- GrrCON 2016/Back to the Future Understanding our future but following the past Kevin Johnson.srt 124.1 kB
- GrrCON 2018/How to Conduct a Product Security Test And How it Fits Into the Larger Security St.eng.srt 122.7 kB
- GrrCON 2018/How to rob a bank over the phone Joshua Naga Crumbaugh.eng.srt 122.2 kB
- GrrCON 2016/Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.srt 121.1 kB
- GrrCON 2016/Make STEHM Great Again David HealWHans Schwartzberg.srt 120.1 kB
- GrrCON 2018/InSpec Compliance as Code Kent picat Gruber.eng.srt 119.9 kB
- GrrCON 2018/2018 SIEM Trends What is my Mean Time to Value Bill Lampe.eng.srt 118.5 kB
- GrrCON 2016/still broken after all these years aka utility security for smarties doug nibbelink.srt 117.6 kB
- GrrCON 2016/Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.srt 116.8 kB
- GrrCON 2018/Threat Hunting the macOS edition Megan Carney.eng.srt 114.4 kB
- GrrCON 2016/Phish your employees for fun Kristoffer Marshall.srt 112.5 kB
- GrrCON 2019/CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.eng.srt 109.7 kB
- GrrCON 2012/Mike Kemp - Everything Old is New Again.srt 109.2 kB
- GrrCON 2016/Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.srt 109.0 kB
- GrrCON 2016/Piercing the Air Gap Network Steganography for Everyone John Ventura.srt 107.8 kB
- GrrCON 2016/Act Three The Evolution of Privacy Finux.srt 107.3 kB
- GrrCON 2018/emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.eng.srt 105.7 kB
- GrrCON 2018/Hacker Tools Compliments of Microsoft David Fletcher Sally Vandeven.eng.srt 105.4 kB
- GrrCON 2016/Secure Dicks Michael Kemp.srt 105.3 kB
- GrrCON 2016/So Youve Inherited a Security Department Now What Amanda Berlin.srt 105.0 kB
- GrrCON 2019/From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.eng.srt 102.3 kB
- GrrCON 2019/MSSPs are greatand other lies I tell myself Scott Thomas.eng.srt 102.0 kB
- GrrCON 2019/Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.eng.srt 101.8 kB
- GrrCON 2018/Saving All the Money to Buy All the Booze Learning to Hack All the Things on.eng.srt 99.8 kB
- GrrCON 2019/The Science of Breaking and Entering Alissa dnsprincess.eng.srt 99.8 kB
- GrrCON 2016/Alignment of business and IT Security Shane Harsch.srt 99.1 kB
- GrrCON 2012/dam Ely- Hack The Cloud.srt 97.6 kB
- GrrCON 2012/Duncan Manuts - Certify Manuts.srt 97.4 kB
- GrrCON 2019/Cons Careers SciaticNerd.eng.srt 96.0 kB
- GrrCON 2016/So You Want to Be a Pentester Absolute0x0.srt 94.7 kB
- GrrCON 2016/How to Implement Crypto Poorly Sean Cassidy.srt 94.4 kB
- GrrCON 2019/How to Make a Honeypot Stickier SSH Jose Hernandez.eng.srt 94.2 kB
- GrrCON 2019/Reverse Engineering Malware for N00bs GregB33fJames.eng.srt 93.2 kB
- GrrCON 2012/Nick Percoco - Mobile Attacks - What will the future bring.srt 91.6 kB
- GrrCON 2019/What Are We Doing Here Rethinking Security Jeff Man.eng.srt 90.4 kB
- GrrCON 2018/Designing a Cloud Security Blueprint Sarah Elie.eng.srt 90.0 kB
- GrrCON 2019/A Theme of Fear Hacking the Paradigm Catherine Ullman.eng.srt 89.7 kB
- GrrCON 2016/Encryption Mobility Cloud Oh My Bill Harmer.srt 89.6 kB
- GrrCON 2012/Mark Ehr - Security Intellligence.srt 89.1 kB
- GrrCON 2019/I PWN thee I PWN thee not Jayson Street.eng.srt 89.0 kB
- GrrCON 2019/Deepfakes If anything can be real then nothing is real April C Wright.eng.srt 89.0 kB
- GrrCON 2019/Dance Fancybear Dance a study in macOS Cat Self.eng.srt 88.5 kB
- GrrCON 2019/Keynote Rachel Soul Crusher86 G.eng.srt 88.1 kB
- GrrCON 2019/Understanding how public places introduce additional risks to business Len Noe.eng.srt 85.1 kB
- GrrCON 2019/Ssshhhh Atlas of Doom.eng.srt 84.8 kB
- GrrCON 2012/Jimmy Shah - Advances in Android Malware.srt 84.7 kB
- GrrCON 2019/QA on our industry and other things that are top of mind Chris Roberts.eng.srt 84.0 kB
- GrrCON 2012/Jim Rennie - Law of Internet Scanning.srt 84.0 kB
- GrrCON 2019/Symbolically executing a fuzzy tyrant Lojikil.eng.srt 83.3 kB
- GrrCON 2012/Chris Roberts - By Land, By Sea, By Air.srt 83.2 kB
- GrrCON 2016/and bad mistakes Ive made a few Jayson Street (only first 30 min or so).srt 82.8 kB
- GrrCON 2016/and bad mistakes Ive made a few Jayson Street.srt 82.8 kB
- GrrCON 2015/The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.srt 82.7 kB
- GrrCON 2015/Security Incident Response Derek Milroy.srt 82.4 kB
- GrrCON 2012/Richard Stiennon - Cyber Defense.srt 80.0 kB
- GrrCON 2019/Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.eng.srt 79.5 kB
- GrrCON 2012/William Tarkington - Psychological Tricks of the Social Engineer.srt 79.0 kB
- GrrCON 2012/Amol Sarwate - SCADA Security.srt 78.3 kB
- GrrCON 2012/Chris Silvers - Go with the Flow - Strategies for Successful Social Engineering.srt 78.1 kB
- GrrCON 2012/Rafal Los- House of Cards.srt 77.7 kB
- GrrCON 2016/Reality Checking Your AppSec Program Darren Meyer.srt 77.4 kB
- GrrCON 2015/Honeypots for Active Defense Greg Foss.srt 76.4 kB
- GrrCON 2014/Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.srt 76.2 kB
- GrrCON 2016/Fighting the Enemy Within Matt Crowe.srt 76.2 kB
- GrrCON 2018/Physicals Badges and why it matters Alex Fernandez Gatti.eng.srt 75.5 kB
- GrrCON 2019/Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.eng.srt 75.2 kB
- GrrCON 2012/Daniel Lohrman - Why Security Professionals Fail.srt 75.2 kB
- GrrCON 2015/Breaking in Bad Im The One Who Doesnt Knock jayson Street.srt 74.3 kB
- GrrCON 2018/Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.eng.srt 74.1 kB
- GrrCON 2012/atlas of doom- GHz or Bust.srt 73.3 kB
- GrrCON 2012/Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.srt 73.2 kB
- GrrCON 2019/Big Plane Little Plane How common aviation attacks affect airlines and general avia.eng.srt 72.7 kB
- GrrCON 2016/Securing Trust Defending Against Next generation Attacks John Muirhead Gould.srt 72.6 kB
- GrrCON 2011/It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.srt 72.5 kB
- GrrCON 2016/Stop attacking your mothers car Charles Parker II.srt 71.7 kB
- GrrCON 2012/Philip Polstra - Battery Powered Pentesting and Forensics.srt 70.5 kB
- GrrCON 2015/Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.srt 70.2 kB
- GrrCON 2012/Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.srt 68.9 kB
- GrrCON 2012/Gary McCully & David Sopata - Hacking PCI Requ.srt 68.7 kB
- GrrCON 2016/What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.srt 68.3 kB
- GrrCON 2014/Red Teaming Back and Forth 5ever FuzzyNop.srt 68.3 kB
- GrrCON 2012/Raymond Lily - OSINT Footprinting.srt 68.2 kB
- GrrCON 2016/Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.srt 67.8 kB
- GrrCON 2015/The Safety You Think You Have is Only a Masquerade Nathan Dragun.srt 67.2 kB
- GrrCON 2012/Taylor Ettema - Modern Malware.srt 67.2 kB
- GrrCON 2014/Vaccinating APKs Milan Gabor.srt 67.1 kB
- GrrCON 2016/Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.srt 66.3 kB
- GrrCON 2016/How Do You Secure What You don't Control Dimitri Vlachos.srt 66.3 kB
- GrrCON 2019/Malicious Cryptomining is Exploding Are you at risk John Fatten.eng.srt 65.5 kB
- GrrCON 2012/David HealWHans Schwartzberg - iOS Hash Cracking.srt 64.5 kB
- GrrCON 2015/Application Recon The Lost Art Tony Miller.srt 64.1 kB
- GrrCON 2012/Christopher Elisan - Threat Ecosystem.srt 62.5 kB
- GrrCON 2015/No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.srt 62.4 kB
- GrrCON 2015/Software Security IWR Thomas G13 Richards.srt 61.6 kB
- GrrCON 2011/SmartMeters - Are they a gateway drug - Robert Former.srt 61.5 kB
- GrrCON 2019/Data Security How to avoid an embarrassing breach Matt mattrix Hoy.eng.srt 61.3 kB
- GrrCON 2011/Panel Discussion - Cloud Data Security and Privacy - How to leverage the Cloud safely.srt 61.3 kB
- GrrCON 2016/Threat Detection Response with Hipara J Brett Cunningham.srt 61.2 kB
- GrrCON 2016/Threat Detection Response with Hipara J Brett Cunningham (2).srt 61.2 kB
- GrrCON 2018/Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.eng.srt 61.2 kB
- GrrCON 2019/Breaking NBAD & UEBA Detection by Charles Herring.eng.srt 59.6 kB
- GrrCON 2016/Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.srt 59.3 kB
- GrrCON 2019/Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.eng.srt 59.3 kB
- GrrCON 2012/J Wolfgang Goerlich- Punch Counter Punch with.srt 58.9 kB
- GrrCON 2015/But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.srt 58.3 kB
- GrrCON 2018/Pacu Attack and Post Exploitation in AWS Spencer Gietzen.eng.srt 58.2 kB
- GrrCON 2015/Hacking the Next Generation HealWHans.srt 58.0 kB
- GrrCON 2016/Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.srt 57.4 kB
- GrrCON 2014/Intelligence Driven Security Shane Harsch.srt 55.5 kB
- GrrCON 2018/Dragnet Your Social Engineering Sidekick Truman Kain.eng.srt 55.3 kB
- GrrCON 2019/Hillbilly Storytime Pentest Fails Adam Compton.eng.srt 55.0 kB
- GrrCON 2018/we we Internet Explorer Does What It Wants Aaron Heikkila.eng.srt 54.9 kB
- GrrCON 2019/How Nathan Crashed and Burned Nathan Dragun.eng.srt 54.1 kB
- GrrCON 2015/Can you patch a cloud Scott Thomas.srt 53.8 kB
- GrrCON 2018/My First year in Application Security Whitney Phillips.eng.srt 53.7 kB
- GrrCON 2015/Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.srt 53.6 kB
- GrrCON 2014/Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.srt 52.9 kB
- GrrCON 2019/Surfing and Security Ride the wave Chris Burrows.eng.srt 52.9 kB
- GrrCON 2019/Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.eng.srt 52.8 kB
- GrrCON 2015/Subject matter to be determined by the number of federal agents present in th.srt 52.4 kB
- GrrCON 2019/Data Access Rights Exploits under New Privacy Laws Amber Welch.eng.srt 51.6 kB
- GrrCON 2019/PSD2 SCA WTF Kelley Robinson.eng.srt 51.0 kB
- GrrCON 2012/Matt Johnson - Powershell - Be a Cool Blue Kid.srt 50.8 kB
- GrrCON 2011/Hunting Hackers Tim Crothers.srt 50.8 kB
- GrrCON 2016/Bad Guys Look Just Like You Justin Beard.srt 49.5 kB
- GrrCON 2019/How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.eng.srt 49.5 kB
- GrrCON 2012/Daniel Gregory - Securing & Managing Mobile Devices in the workplace.srt 49.4 kB
- GrrCON 2019/Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.eng.srt 48.9 kB
- GrrCON 2015/Shell scripting live Linux Forensics Dr Phil Polstra.srt 48.9 kB
- GrrCON 2011/Characteristics of a Highly-Effective Information Security Executive - Bob West.srt 48.8 kB
- GrrCON 2015/Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.srt 48.6 kB
- GrrCON 2019/bonus talk Ryan Wisniewski.eng.srt 48.4 kB
- GrrCON 2011/[Least] resistance is [anything but] futile Tim Maletic.srt 48.1 kB
- GrrCON 2011/Blinkie Lights Network Monitoring with Arduino - Steve Ocepek.srt 48.0 kB
- GrrCON 2019/Host Hunting on a Budget cyberGoatPsyOps.eng.srt 47.7 kB
- GrrCON 2015/This Is All Your Fault Duncan Manuts.srt 47.3 kB
- GrrCON 2015/Path Well Traveled Common Mistakes with SIEM Nick Jacob.srt 46.5 kB
- GrrCON 2016/Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.srt 46.3 kB
- GrrCON 2015/Is it EVIL Chaoticflaws.srt 46.1 kB
- GrrCON 2012/Jonathan Deutsch - Facebook and You.srt 45.9 kB
- GrrCON 2019/The Past Present Future of Cyber Threats Chris Russell.eng.srt 45.4 kB
- GrrCON 2011/Dear Pentesters, Get Bent - Duncan Manuts.srt 45.3 kB
- GrrCON 2019/A Day in the Life of a Security Operations Center What do you get when you partner.eng.srt 45.3 kB
- GrrCON 2012/Robert Rowley - Juice Jacking.srt 44.5 kB
- GrrCON 2011/The future of Authenticity - Moxie Marlinspike.srt 44.2 kB
- GrrCON 2015/Backdooring Git John Menerick.srt 44.1 kB
- GrrCON 2016/Getting to the Root of Advanced Threats Before Impact Josh Fazio.srt 44.1 kB
- GrrCON 2013/Hacking Giveaways, Contests, and Polls for Fun and Profit - Matthew Bryant.srt 43.3 kB
- GrrCON 2019/Want to Play a Game John DeRyke.eng.srt 42.7 kB
- GrrCON 2012/Tom Clare - 7 Stages of Advanced Threats.srt 42.7 kB
- GrrCON 2019/The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.eng.srt 42.5 kB
- GrrCON 2013/What s - Context - got to do with it - Arron Finnon.srt 41.6 kB
- GrrCON 2015/Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.srt 39.9 kB
- GrrCON 2012/Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).srt 39.0 kB
- GrrCON 2019/Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.eng.srt 38.8 kB
- GrrCON 2012/Alexander Chaveriat - I Think Therefore I PwN.srt 38.5 kB
- GrrCON 2011/ZeuS - Inside Command and Control Adam Johnson.srt 38.5 kB
- GrrCON 2015/Security Frameworks What was once old is new again Brian Wrozek.srt 38.4 kB
- GrrCON 2015/Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.srt 37.8 kB
- GrrCON 2016/Magnetic Stripes 101 Tyler Keeton.srt 37.5 kB
- GrrCON 2019/Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.eng.srt 37.2 kB
- GrrCON 2012/Thomas Richards - Android in the Healthcare Workplace.srt 36.7 kB
- GrrCON 2011/Chris Roberts - Planes, Trains and Automobiles.srt 36.6 kB
- GrrCON 2019/Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.eng.srt 36.5 kB
- GrrCON 2011/sploit me if u can - atlas 0f d00m.srt 35.5 kB
- GrrCON 2019/The Importance of IT Asset Visibility Brian Berk.eng.srt 35.5 kB
- GrrCON 2011/How asteroids falling from the sky improve security - J Wolfgang Goerlich.srt 35.5 kB
- GrrCON 2013/The Science of Security Automation - Paul Cochran & Toni Buhrke.srt 35.3 kB
- GrrCON 2015/What is a cloud access broker and do I need one Tom Doane.srt 35.1 kB
- GrrCON 2012/Larry Holland & Hal Charnley - The Killer is Already in Your House.srt 34.4 kB
- GrrCON 2019/Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.eng.srt 34.2 kB
- GrrCON 2019/Automating Phishing Analysis Kyle Eaton.eng.srt 33.4 kB
- GrrCON 2019/Departing Employees Departing Data Todd Thorsen.eng.srt 32.9 kB
- GrrCON 2015/Understanding and Improving the Military Cyber Culture Dariusz Mikulski.srt 32.8 kB
- GrrCON 2015/How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.srt 32.7 kB
- GrrCON 2015/Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.srt 32.3 kB
- GrrCON 2011/Legal Perspectives on Data Breaches - Carol Romej.srt 32.2 kB
- GrrCON 2013/Pwnage from the Skies - Philip Polstra.srt 31.8 kB
- GrrCON 2013/Beautiful Models - J Wolfgang Goerlich.srt 31.4 kB
- GrrCON 2015/Securing Todays Enterprise WAN Andy Mansfield.srt 31.3 kB
- GrrCON 2012/Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.srt 30.9 kB
- GrrCON 2011/Dispelling Cloud Security Hype - Johnathan Norman.srt 30.7 kB
- GrrCON 2015/Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.srt 29.0 kB
- GrrCON 2015/Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.srt 28.9 kB
- GrrCON 2011/Kernel Fun - Jon Oberheide.srt 27.9 kB
- GrrCON 2015/Process The Salvation of Incident Response Charles Herring.srt 27.4 kB
- GrrCON 2011/Cyber Vigilantes - Rob Rachwald.srt 27.3 kB
- GrrCON 2015/How I Got Network Creds Without Even Asking A Social Engineering Case Study J.srt 26.7 kB
- GrrCON 2015/Welcome to the Internet of insecure things Chandler Howell.srt 26.1 kB
- GrrCON 2012/Jack Wink - XSS Session Fixation.srt 25.6 kB
- GrrCON 2012/Scott Thomas - InfoSec Flameout.srt 25.4 kB
- GrrCON 2015/Harness the Force for Better Penetration Testing Patrick Fussell.srt 25.3 kB
- GrrCON 2015/Adding 10 Security to Your Scrum Agile Environment tehEx0dus.srt 25.2 kB
- GrrCON 2015/Ticking me off From Threat Intel to Reversing Juan Cortes.srt 24.9 kB
- GrrCON 2012/Louise Popyck - Simplifying Data Center Security and Compliance.srt 23.8 kB
- GrrCON 2011/Defcon CTF-Why even Losers Always Win - Jarod DeMott.srt 23.7 kB
- GrrCON 2011/AlgoSec.srt 23.2 kB
- GrrCON 2011/Mobile App Moolah - Profit taking with Mobile Malware - Jimmy Shah.srt 20.9 kB
- GrrCON 2018/An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.eng.srt 20.7 kB
- GrrCON 2013/atlas of d00m - TBA.srt 14.9 kB
- GrrCON 2011/Hacking Trust Steven Fox.srt 12.1 kB
- GrrCON 2013/David Schwartzberg- Zeus C&C for Tech Support.srt 9.1 kB
- GrrCON thank you.txt 1.6 kB
==查看完整文档列表==