2022-05-09 | Diana Initiative 2020 Career Village Candidate Interview Prep | 15:55 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Career Village Building better job descriptions | 7:27 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Career Village Making an Offer | 6:27 | 0 | |
|
2022-05-09 | Diana Initiative 2020 Career Village TS DI HM Video Intro | 5:56 | 1 | |
|
2022-05-09 | Diana Initiative 2020 Career Village Interview Process | 11:11 | 1 | |
|
2022-05-09 | SS7 for INFOSEC Paul Coggin DerbyCon 9 | 35:49 | 5 | |
|
2022-05-09 | Social Engineering in Non Linear Warfare Bill Gardner DerbyCon 9 | 25:07 | 7 | |
|
2022-05-09 | SharPersist Windows Persistence Toolkit in C Brett Hawkins DerbyCon 9 | 23:04 | 27 | |
|
2022-05-09 | Shadow IT in the Cloud Marisa Dyer Jessica Hazelrigg DerbyCon 9 | 26:52 | 5 | |
|
2022-05-09 | Virtual Smart Cards for Lab Environments Eddie David DerbyCon 9 | 33:48 | 5 | |
|
2022-05-09 | Scientific computing for information security forging the missing link Ryan Elkins DerbyCon 9 | 40:59 | 0 | Guide |
|
2022-05-09 | Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Exploits Dr Jared De | 45:31 | 3 | |
|
2022-05-09 | SCADA What the next Stuxnet will look like and how to prevent it Joseph Bingham DerbyCon 9 | 22:10 | 10 | Guide |
|
2022-05-09 | Product Security Shouldnt be Painful Wim Remes DerbyCon 9 | 34:35 | 2 | |
|
2022-05-09 | Unix the Other White Meat Adam Compton David Boyd DerbyCon 9 | 50:29 | 0 | |
|
2022-05-09 | Prepare to Be Boarded A Tale of Kubernetes Plunder and Cryptobooty James Condon DerbyCon 9 | 24:17 | 3 | |
|
2022-05-09 | Pre Opening Keynote Ed Skoudis DerbyCon 9 | 0:40 | 1 | |
|
2022-05-09 | Practical Heuristic Exploitation Kelly Villanueva DerbyCon 9 | 50:19 | 16 | |
|
2022-05-09 | Theres No Place like DUALHomed David E Young Jr DerbyCon 9 | 25:26 | 0 | |
|
2022-05-09 | The quest for 10g IDS Harold Tabellion DerbyCon 9 | 24:46 | 0 | |
|
2022-05-09 | PowerShell Security Looking Back from the Inside Lee Holmes DerbyCon 9 | 49:40 | 8 | |
|
2022-05-09 | The Hackers Apprentice Mark Baggett DerbyCon 9 | 44:32 | 0 | |
|
2022-05-09 | The Backup Operators Guide to the Galaxy Dave Mayer DerbyCon 9 | 24:52 | 1 | Guide |
|
2022-05-09 | The 1995 anonymous cyber profile Patrick Matthews DerbyCon 9 | 24:23 | 0 | |
|
2022-05-09 | Testing Endpoint Protection How Anyone Can Bypass Next Gen AV Kevin Gennuso DerbyCon 9 | 42:08 | 8 | |
|
2022-05-09 | Well what have we here A year of cyber deception attribution and making attackers rethink their De | 49:44 | 4 | |
|
2022-05-09 | Swagger Defense Mick Douglas Pete Petersen DerbyCon 9 | 26:28 | 0 | |
|
2022-05-09 | Welcome to the Jumble Improving RDP Tooling for Malware Analysis and Pentesting milio Gonzalez Der | 45:47 | 2 | |
|
2022-05-09 | Waking up the data engineer in you Jared Atkinson DerbyCon 9 | 27:09 | 5 | |
|
2022-05-09 | StringSifter Learning to Rank Strings Output for Speedier Malware Analysis Philip Tully Matthew De | 50:19 | 3 | |
|
2022-05-09 | The Art of The BEC What Three Years of Fighting Has Taught Us Ronnie Tokazowski DerbyCon 9 | 54:04 | 6 | |
|
2022-05-09 | Phishing past Mail Protection Controls using Azure Information Protection AIP Oddvar Moe H DerbyCo | 29:32 | 6 | Guide |
|
2022-05-09 | Opening Keynote Ed Skoudis DerbyCon 9 | 47:40 | 11 | |
|
2022-05-09 | One womans journey to CISO leveraging Social Engineering Kate Mullin DerbyCon 9 | 24:04 | 1 | |
|
2022-05-09 | Rise of the Machines using machine learning with GRC Justin Leapline Rick Yocum DerbyCon 9 | 41:55 | 2 | |
|
2022-05-09 | RFID sniffing under your nose and in your face Rich Rumble DerbyCon 9 | 32:37 | 16 | |
|
2022-05-09 | REST in Peace Abusing GraphQL to Attack Underlying Infrastructure Matthew Szymanski DerbyCon 9 | 50:54 | 4 | |
|
2022-05-09 | Red Team Methodology A Naked Look Jason Lang DerbyCon 9 | 47:05 | 5 | Vlog |
|
2022-05-09 | Red Team Level over 9000 Fusing the powah of NET with a scripting language of your choosing int De | 52:13 | 14 | |
|
2022-05-09 | Python Two birds with one stone Andy Cooper DerbyCon 9 | 25:08 | 2 | |
|
2022-05-07 | Assessing IoT Surveillance Arlo Jimi Sebree DerbyCon 9 | 23:51 | 7 | |
|
2022-05-07 | Five Mistakes We Wish Users Would Stop Making Lesley Carhart Chelle Clements April C Wright Ama De | 51:15 | 7 | |
|
2022-05-07 | Next gen IoT botnets leveraging cloud implementations for shells on 500k IoTs Alex Jay Balan Derby | 43:26 | 3 | |
|
2022-05-07 | Are you ready to leverage DevSecOps Get ready and use it for good Nicole Schwartz aka Circ DerbyCo | 21:48 | 0 | |
|
2022-05-07 | Enabling The Future Panel Dave Kennedy Jess Walpole Scott Angelo Kevin Baker DerbyCon 9 | 58:57 | 0 | |
|
2022-05-07 | Active Directory Security Beyond the Easy Button Sean Metcalf DerbyCon 9 | 44:45 | 35 | |
|
2022-05-07 | NET Manifesto Win Friends and Influence the Loader Casey Smith DerbyCon 9 | 24:51 | 4 | |
|
2022-05-07 | API Keys Now WhatTaking the Pen Test Into the Amazon Cloud Jim Shaver DerbyCon 9 | 38:17 | 1 | |
|
2022-05-07 | Improving CACTUSTORCH payloads Ryan Linn DerbyCon 9 | 42:53 | 8 | |
|
2022-05-07 | Empathy as a Service to Create a Culture of Security Tracy Z Maleeff DerbyCon 9 | 46:59 | 2 | |
|
2022-05-07 | Bypassing MacOS Detections With Swift Cedric Owens DerbyCon 9 | 24:39 | 7 | |
|
2022-05-07 | 42 The answer to life the universe and everything offensive security Will Pearce Nick Landers Derb | 52:30 | 3 | |
|
2022-05-07 | Almost All Noise 2 00 Metasploit Town Hall Finale Brent Cook Pearce Barry Jeffrey Martin Matthew Kie | 31:36 | 0 | |
|
2022-05-07 | The Unintended Risks of Trusting Active Directory Lee Christensen Will Schroeder Matt Nel DerbyCon | 47:43 | 30 | |
|
2022-05-07 | The MS Office Magic Show Stan Hegt Pieter Ceelen DerbyCon 8 | 43:00 | 6 | |
|
2022-05-07 | The Money Laundering Cannon Real cash Real Criminals and Real Layoffs Arian Evans DerbyCon 8 | 48:21 | 3 | |
|
2022-05-07 | The making of an iOS 11 jailbreak Kiddie to kernel hacker in 14 sleepless nights Bryce so DerbyCon | 39:39 | 3 | |
|
2022-05-07 | The Layer2 Nightmare Chris Mallz DerbyCon 8 | 17:15 | 0 | |
|
2022-05-07 | WE ARE THE ARTILLERY Using Google Fu To Take Down The Grids Chris Sistrunk Krypt3ia SynAc DerbyCon | 45:33 | 2 | |
|
2022-05-07 | The History of the Future of Cyber Education Winn Schwartau DerbyCon 8 | 49:05 | 0 | |
|
2022-05-07 | Tales From the Bug Mine Highlights from the Android VRP Brian Claire Young DerbyCon 8 | 23:01 | 0 | |
|
2022-05-07 | We are all on the spectrum What my 10 year old taught me about leading teams Carla A Raisl DerbyCo | 25:03 | 0 | |
|
2022-05-07 | Synfuzz Building a Grammar Based Re targetable Test Generation Framework Joe Rozner DerbyCon 8 | 23:26 | 0 | |
|
2022-05-07 | Victor or Victim Strategies for Avoiding an InfoSec Cold War Jason Lang Stuart McIntosh DerbyCon 8 | 47:13 | 0 | |
|
2022-05-07 | State of Win32k Security Revisiting Insecure design Vishal Chauhan DerbyCon 8 | 41:28 | 6 | |
|
2022-05-07 | Social Engineering At Work How to use positive influence to gain management buy in for an DerbyCon | 51:31 | 10 | Guide |
|
2022-05-07 | VBA Stomping Advanced Malware Techniques Carrie Roberts Kirk Sayre Harold Ogden DerbyCon 8 | 46:28 | 16 | |
|
2022-05-07 | So many pentesting tools from a 4 Arduino Kevin Bong Michael Vieau DerbyCon 8 | 25:05 | 7 | |
|
2022-05-07 | Your Training Data is Bad and You Should Feel Bad Ryan J OGrady DerbyCon 8 | 22:16 | 1 | |
|
2022-05-07 | Who Watches the Watcher Detecting Hypervisor Introspection from Unprivileged Guests Tomas DerbyCon | 47:06 | 5 | |
|
2022-05-07 | Ubiquitous Shells Jon Gorenflo DerbyCon 8 | 49:48 | 4 | |
|
2022-05-07 | When Macs Come Under ATTCK Richie Cyrus DerbyCon 8 | 46:10 | 0 | |
|
2022-05-07 | Two Factor Too Furious Evading and Protecting Evolving MFA Schemes Austin Baker Doug Bien DerbyCon | 46:34 | 2 | |
|
2022-05-07 | Web app testing classroom in a box the good the bad and the ugly Lee Neely Chelle Clement DerbyCon | 33:45 | 0 | |
|
2022-05-07 | Threat Intel On The Fly Tazz DerbyCon 8 | 24:59 | 3 | |
|
2022-05-07 | Threat Hunting with a Raspberry Pi Jamie Murdock DerbyCon 8 | 19:11 | 10 | |
|
2022-05-07 | Web App 101 Getting the lay of the land Mike Saunders DerbyCon 8 | 44:20 | 3 | |
|
2022-05-07 | Early Detection Through Deception Jason Nester DerbyCon 9 | 21:42 | 7 | |
|
2022-05-07 | Dynamic Risk Taking and Social Engineering Chris Hadnagy DerbyCon 9 | 47:55 | 18 | |
|
2022-05-07 | Designing building a stealth C2 LDAP channel Rindert Kramer DerbyCon 9 | 21:12 | 4 | |
|
2022-05-07 | DerbyCon Story Time Panel Dustin Heywood Evil Mog and others DerbyCon 9 | 51:39 | 2 | |
|
2022-05-07 | I simulate therefore i catch enhancing detection engineering with adversary simulation Mauricio De | 49:40 | 5 | |
|
2022-05-07 | Build your own multi user password manager using open source software Michael Vieau Kevin DerbyCon | 24:22 | 2 | |
|
2022-05-07 | Hunting Webshells Tracking TwoFace Josh Bryant Robert Falcone DerbyCon 9 | 45:17 | 6 | |
|
2022-05-07 | Modlishka Is a Mantis Eating 2FAs Lunch Lance Peterman DerbyCon 9 | 23:59 | 93 | |
|
2022-05-07 | Breaking Entering via SDR or How I defeated Wiegend over UHFVHF or your apartment isnt safe Tim De | 46:44 | 3 | |
|
2022-05-07 | Hunting Phish Kits Josh Rickard DerbyCon 9 | 23:36 | 1 | |
|
2022-05-07 | Lying in Wait Discovering and Exploiting Weaknesses in Automated Discovery Actions Timothy Wrig De | 42:31 | 0 | |
|
2022-05-07 | Last Minute Offensive Machine Learning James Bower DerbyCon 9 | 15:11 | 1 | |
|
2022-05-07 | How to Tell the C Level Their Baby is Ugly Heather Smith DerbyCon 9 | 36:52 | 5 | Guide |
|
2022-05-07 | BloodHound Head to Tail Andy Robbins Rohan Vazarkar DerbyCon 9 | 46:18 | 240 | |
|
2022-05-07 | How to Give the Gift That Keeps on Giving Your Knowledge Jason Blanchard DerbyCon 9 | 50:52 | 2 | Guide |
|
2022-05-07 | kubered Recipes for C2 Operations on Kubernetes Larry Suto Jeff Holden DerbyCon 9 | 47:16 | 6 | |
|
2022-05-07 | How to cook a five star meal from the convenience of your hotel room Micah K Brown DerbyCon 9 | 21:55 | 5 | Guide |
|
2022-05-07 | DerbyCon 9 0 Metasploit Town Hall Redubbed DerbyCon 9 | 29:13 | 1 | |
|
2022-05-07 | BloodHound From Red to Blue Mathieu Saulnier DerbyCon 9 | 44:20 | 1 | |
|
2022-05-07 | Kerberoasting Revisited Will Schroeder DerbyCon 9 | 21:46 | 17 | |
|
2022-05-07 | It Must Be Fancy Bear Xena Olsen DerbyCon 9 | 25:50 | 2 | |
|
2022-05-07 | Defeating Next Gen AV and EDR Using Old And New Tricks on New Dogs Nick Lehman Graph X Steve Ei De | 48:25 | 5 | |
|
2022-05-07 | How do I detect technique X in Windows Applied Methodology to Definitively Answer this Question De | 49:52 | 1 | Vlog |
|