2022-05-11 | TRAPE Rastreando al delincuente | 22:52 | 1 | |
|
2022-05-11 | Common Sense Security Framework One Framework to rule them all | 1:04:29 | 5 | |
|
2022-05-11 | Ciberataque de DDoS Ataque y defensa ¿Estás protegido | 28:48 | 0 | |
|
2022-05-11 | Biohacking, ¿qué es, ¿de que me estás hablando | 35:41 | 3 | |
|
2022-05-11 | A no endulzarse con las honeypots | 43:53 | 1 | |
|
2022-05-11 | Old fox, new tricks Malicious OSX MacOS macros are back | 37:51 | 3 | |
|
2022-05-11 | Números de terror, atacando equipos de anestesia en quirófanos | 33:01 | 0 | |
|
2022-05-11 | Manual del Paranoico | 1:11:07 | 0 | Tutorial |
|
2022-05-11 | Malware, atacando ATMs Cajeros Automáticos | 1:07:15 | 4 | |
|
2022-05-11 | Innovación, magia y pensamiento hacker | 24:37 | 0 | |
|
2022-05-11 | Infidelidad Tecnológica, creando hackers espontáneos | 15:37 | 0 | |
|
2022-05-11 | Hookeando funciones en aplicaciones móviles | 42:40 | 0 | |
|
2022-05-11 | Hacking Hackers con Honeypots y Hip Hop | 59:49 | 1 | |
|
2022-05-11 | FreeBSD Insecure by default | 1:03:10 | 91 | |
|
2022-05-11 | Ejecución Dinámica Simbólica un nuevo paradigma para el análisis de binarios | 51:13 | 0 | |
|
2022-05-11 | Victoria Pérez | 0:23 | 2 | |
|
2022-05-11 | Tu seguridad da igual según Freud, Ingeniería Social Aplicada | 1:25:52 | 4 | |
|
2022-05-11 | Sack Framework Footprinting track sessions | 39:36 | 2 | |
|
2022-05-11 | Mobile App Pentesting en Primera Persona | 1:15:22 | 16 | |
|
2022-05-11 | Juan Pablo Quiñe nos deja un saludo antes del DragonJARCON | 0:22 | 7 | |
|
2022-05-11 | Jose Pino @jofpin | 0:41 | 3 | |
|
2022-05-11 | Ingeniería Social | 1:17 | 0 | |
|
2022-05-11 | Hacking is Coming Congreso de Hackers en Bogotá | 0:15 | 1 | |
|
2022-05-11 | Hackeando puntos de venta PoS y canales financieros | 1:14:35 | 3 | |
|
2022-05-11 | Ganador del 2do Puesto en el CTF realizado por EHCGroup para el DragonJARCON 2016 | 0:34 | 1 | |
|
2022-05-11 | Fuck the all things | 33:53 | 0 | |
|
2022-05-11 | Explotando y atacando redes sismológicas remotamente | 40:16 | 0 | |
|
2022-05-11 | Comentarios Sobre el DragonJAR 2016 Fernando | 0:17 | 0 | |
|
2022-05-11 | Comentarios Sobre el DragonJAR 2016 Carlos | 0:22 | 0 | |
|
2022-05-11 | Bertín Bervis Bonilla HD | 0:33 | 20 | |
|
2022-05-11 | Atacando Ondas Neuronales | 1:14:19 | 1 | |
|
2022-05-11 | Alejandro Hernandez @nitr0usmx te invita al DragonJAR CON 2016 | 0:34 | 0 | |
|
2022-05-11 | Agradecimientos del DragonJAR 2016 | 1:10 | 0 | |
|
2022-05-11 | ¿NoSQL NoSecurity, seguridad en bases de datos no relacionales | 52:03 | 10 | |
|
2022-05-11 | Desarrollo Profesional en Seguridad ¿Que es lo que sigue | 1:14:48 | 0 | |
|
2022-05-11 | Darwin Algarín | 0:19 | 1 | |
|
2022-05-11 | Creando un proyecto de seguridad informática en el país del sagrado corazón | 20:30 | 0 | |
|
2022-05-11 | Crackeando Aplicación con Javaagents | 41:44 | 0 | |
|
2022-05-11 | Comentarios Sobre el DragonJAR 2016 Popayán | 0:47 | 0 | |
|
2022-05-11 | Comentarios Sobre el DragonJAR 2016 Luis Fernando | 0:16 | 0 | |
|
2022-05-11 | Banca Movil un Análisis de Seguridad Nelson Boris Murillo | 1:00:32 | 2 | |
|
2022-05-11 | Ya están aquí , fisical hacking Victoria Perez | 36:17 | 0 | |
|
2022-05-11 | Pentest Técnicas alternativas para un cliente experimentado Nelson Boris Murillo | 40:39 | 0 | |
|
2022-05-11 | Leonardo Huertas | 2:23 | 2 | |
|
2022-05-11 | Un interruptor de seguridad para tu vida digital Leonardo Huertas | 50:49 | 1 | |
|
2022-05-11 | IPv6 ¿Ventaja o Amenaza Jhon Cesar Arango | 32:32 | 6 | |
|
2022-05-11 | Invitacion Oficial al DragonJAR 2014 | 6:31 | 0 | |
|
2022-05-11 | Tomando el Control de Android Cristian Amicelli | 58:01 | 0 | |
|
2022-05-11 | Huellas en la memoria para Análisis de malware Mateo Martinez | 1:03:15 | 2 | |
|
2022-05-11 | FBTokens, cuando tu información queda expuesta Gustavo Nicolas Ogawa | 36:43 | 1 | |
|
2022-05-11 | Survillance States, Colombian Chapter Andrés Gómez | 58:42 | 0 | |
|
2022-05-11 | Exploiting Browser's DOM Camilo Galdos | 1:08:43 | 6 | |
|
2022-05-11 | Ecrime Team, What, Why, and How Marc Rivero | 53:13 | 0 | |
|
2022-05-11 | Sostenibilidad de la Seguridad en el Espacio Freddy Grey | 1:08:31 | 0 | |
|
2022-05-11 | CSRF El Nuevo Target Juan David Castro | 53:02 | 0 | |
|
2022-05-11 | Seguridad en SAP no es Solo SOD Efrén A Sanchez | 50:56 | 0 | |
|
2022-05-11 | Seguridad en Grid Computing, el caso del CERN Andrés Gómez | 25:55 | 1 | |
|
2022-05-11 | Clientes Bancarios al Descubierto y a la mano Freddy Grey | 52:30 | 0 | |
|
2022-05-11 | Camilo Galdos | 0:32 | 39 | |
|
2022-05-11 | Reporting Vulnerabilities A personal experience Marc Rivero | 41:40 | 3 | |
|
2022-05-11 | Behind the Bitcoin Carlos Mesa | 1:00:03 | 1 | |
|
2022-05-11 | DojoCon 2010 15 | 46:48 | 0 | |
|
2022-05-11 | DojoCon 2010 14 | 54:41 | 0 | |
|
2022-05-11 | DojoCon 2010 13 | 26:00 | 0 | |
|
2022-05-11 | DojoCon 2010 12 | 46:17 | 0 | |
|
2022-05-11 | DojoCon 2010 11 | 43:11 | 0 | |
|
2022-05-11 | DojoCon 2010 10 | 50:55 | 0 | |
|
2022-05-11 | DojoCon 2010 9 | 59:25 | 0 | |
|
2022-05-11 | DojoCon 2010 8 | 1:05:32 | 0 | |
|
2022-05-11 | DojoCon 2010 7 | 50:39 | 0 | |
|
2022-05-11 | DojoCon 2010 6 | 39:54 | 0 | |
|
2022-05-11 | DojoCon 2010 5 | 36:47 | 0 | |
|
2022-05-11 | DojoCon 2010 4 | 30:38 | 0 | |
|
2022-05-11 | DojoCon 2010 2 | 57:37 | 0 | |
|
2022-05-11 | DojoCon 2010 1 | 1:03:58 | 0 | |
|
2022-05-11 | DojoCon 2010 16 | 27:09 | 0 | |
|
2022-05-11 | Securing automation and solving the Secret Zero problem DevSecCon Singapore 2018 | 34:41 | 13 | |
|
2022-05-11 | Pushing left like a boss DevSecCon Singapore 2018 | 42:59 | 0 | |
|
2022-05-11 | Maginot Line 6 Common AppSec Anti Patterns Preventing your Success DevSecCon Singapore 2018 | 45:00 | 2 | |
|
2022-05-11 | In graph we trust Microservices, GraphQL and security challenges DevSecCon Singapore 2018 | 40:48 | 8 | |
|
2022-05-11 | From zero to DevSecOps in 60 minutes DevSecCon Singapore 2018 | 46:46 | 3 | |
|
2022-05-11 | DevOps An opportunity for better Security DevSecCon Singapore 2018 | 29:03 | 1 | |
|
2022-05-11 | Closing Keynote Measuring and maximizing vuln discovery efforts DevSecCon Singapore 2018 | 55:09 | 1 | |
|
2022-05-11 | AST In CI CD how to make it WORK DevSecCon Singapore 2018 | 46:17 | 3 | Guide |
|
2022-05-11 | All in one security with open source tools DevSecCon Singapore 2018 | 47:33 | 1 | |
|
2022-05-11 | Securing your DevOps pipeline DevSecCon Singapore 2018 | 45:22 | 1 | |
|
2022-05-11 | Get rid of these TLS certificates DevSecCon London 2018 | 46:10 | 3 | |
|
2022-05-11 | Enabling shift left for 12k banking developers from scratch DevSecCon London 2018 | 43:09 | 0 | |
|
2022-05-11 | Building effective DevSecOps teams through role playing games DevSecCon London 2018 | 41:52 | 1 | |
|
2022-05-11 | A Journey to Continuous Cloud Compliance DevSecCon London 2018 | 39:44 | 0 | |
|
2022-05-11 | Whatever happened to attack aware applications | 40:52 | 0 | |
|
2022-05-11 | Using Instrumentation to integrate automatic security testing in your SDLC DevSecCon London 2018 | 37:47 | 0 | |
|
2022-05-11 | Security in the serverless world DevSecCon London 2018 | 37:23 | 0 | |
|
2022-05-11 | Securing a web app business security VS the OWASP top 10 DevSecCon London 2018 | 37:13 | 0 | |
|
2022-05-11 | Practical steps for securing your container deployment | 39:38 | 0 | |
|
2022-05-11 | Patterns and techniques for securing Microservices | 32:10 | 3 | |
|
2022-05-11 | Open DevSecOps DevSecCon London | 29:35 | 0 | |
|
2022-05-11 | Lessons from the legion the DevSecCon London Remix | 44:24 | 0 | |
|
2022-05-11 | Is your supply chain your achille’s heel | 35:48 | 0 | |
|
2022-05-11 | Introducing Salus How Coinbase scales security automation | 31:17 | 1 | |
|