2022-05-05 | Brutal Blogging Go for the Jugular Kate Brew DerbyCon 8 | 22:54 | 0 | Vlog |
|
2022-05-05 | Mirai Satori OMG and Owari IoT Botnets Oh My Peter Arzamendi DerbyCon 8 | 23:04 | 15 | |
|
2022-05-05 | Protect Your Payloads Modern Keying Techniques Leo Loobeek DerbyCon 8 | 40:15 | 5 | |
|
2022-05-05 | Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso DerbyCon 8 | 35:38 | 4 | |
|
2022-05-05 | How to test Network Investigative TechniquesNITs used by the FBI Dr Matthew Miller DerbyCon 8 | 43:41 | 4 | Guide |
|
2022-05-05 | Goodbye Obfuscation Hello Invisi Shell Hiding Your Powershell Script in Plain Sight Omer DerbyCon | 45:40 | 19 | |
|
2022-05-05 | Decision Analysis Applications in Threat Analysis Frameworks Emily Shawgo DerbyCon 8 | 15:00 | 3 | |
|
2022-05-05 | Metasploit Town Hall 0x4 Brent Cook Aaron Soto Adam Cammack Cody Pierce DerbyCon 8 | 40:03 | 2 | |
|
2022-05-05 | Breaking Into Your Building A Hackers Guide to Unauthorized Access Tim Roberts Brent Whit DerbyCon | 50:46 | 3 | Guide |
|
2022-05-05 | Perfect Storm Taking the Helm of Kubernetes Ian Coldwater DerbyCon 8 | 42:45 | 24 | |
|
2022-05-05 | Going on a Printer Safari Hunting Zebra Printers James Edge DerbyCon 8 | 46:57 | 3 | |
|
2022-05-05 | Patching Show me where it hurts Cheryl Biswas DerbyCon 8 | 19:54 | 0 | |
|
2022-05-05 | Blue Blood Injection Transitioning Red to Purple Lsly Ayyy DerbyCon 8 | 23:55 | 0 | |
|
2022-05-05 | Cyber Intelligence There Are No Rules and No Certainties Coleman Kane DerbyCon 8 | 1:00:24 | 2 | |
|
2022-05-05 | How to put on a Con for Fun and Non Profit Benny Karnes John Moore Rick Hayes Matt Perry DerbyCon | 47:19 | 2 | Guide |
|
2022-05-05 | MA Defense and Integration All that Glitters is not Gold Sara Leal Jason Morrow DerbyCon 8 | 28:01 | 2 | |
|
2022-05-05 | Invoke DOSfuscation Techniques FOR F IN style DO S level CMD Obfuscation Daniel Bohannon DerbyCon | 51:09 | 2 | |
|
2022-05-05 | Escoteric Hashcat Attacks Evilmog DerbyCon 8 | 18:13 | 6 | |
|
2022-05-05 | 99 Reasons Your Perimeter Is Leaking Evolution of CC John Askew DerbyCon 8 | 49:22 | 11 | |
|
2022-05-05 | Detecting WMI exploitation Michael Gough DerbyCon 8 | 50:59 | 9 | |
|
2022-05-05 | Derbycon 8 video rig use DerbyCon 8 | 3:19 | 2 | |
|
2022-05-05 | Changing Our Mindset From Technical To Psychological Defenses Andrew Kalat DerbyCon 8 | 57:53 | 0 | Vlog |
|
2022-05-05 | Winning and Quitting the Privacy Game What it REALLY takes to have True Privacy in the 21st Cen De | 42:45 | 2 | |
|
2022-05-05 | Windows Rootkit Development Python prototyping to kernel level C2 RJ McDown DerbyCon 7 | 47:05 | 56 | |
|
2022-05-04 | 508 ARRR Maties DerbyCon 6 | 23:01 | 1 | |
|
2022-05-04 | 305 Better Network Defense Through Threat Injection and Hunting Zach Grace Brian Genz DerbyCon 6 | 34:36 | 10 | |
|
2022-05-04 | 208 Living Off the Land 2 A Minimalists Guide to Windows Defense Matt Graeber DerbyCon 6 | 52:32 | 11 | Guide |
|
2022-05-04 | 315 Reverse engineering all the malwareand why you should stop Brandon Young DerbyCon 6 | 54:33 | 7 | |
|
2022-05-04 | 507 Real World Attacks VS Check box Security Brent White Tim Roberts DerbyCon 6 | 24:07 | 2 | |
|
2022-05-04 | 504 Nose Breathing 101 A Guide to Infosec Interviewing Wartortell and Aaron Bayles DerbyCon 6 | 36:47 | 0 | Guide |
|
2022-05-04 | 503 DNSSUX Why DNSSEC Makes Us Weaker Alfredo Ramirez DerbyCon 6 | 22:53 | 2 | |
|
2022-05-04 | 506 Is that a penguin in my Windows Spencer McIntyre DerbyCon 6 | 24:31 | 1 | |
|
2022-05-04 | 304 and bad mistakes Ive made a few Jayson E Street DerbyCon 6 | 51:41 | 5 | |
|
2022-05-04 | 408 The Art of War Attacking the Organization and Raising the Defense Jeremy Mio David Lauer Mike Wo | 31:10 | 4 | |
|
2022-05-04 | 207 Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement Bill V Der | 49:27 | 0 | |
|
2022-05-04 | 505 Android Patchwork Convincing Apps to Do What You Want Them To William McLaughlin DerbyCon 6 | 24:12 | 1 | |
|
2022-05-04 | 502 Information Security Proposed Solutions Series 1 Talent Aaron Lafferty DerbyCon 6 | 24:50 | 0 | Guide |
|
2022-05-04 | 314 DNS in Enterprise IR Collection Analysis and Response Philip Martin 2 DerbyCon 6 | 46:42 | 0 | |
|
2022-05-04 | 205 Adaptation of the Security Sub Culture Rockie Brockway Adam Hogan DerbyCon 6 | 55:07 | 0 | |
|
2022-05-04 | 206 Outlook and Exchange for the Bad Guys Nick Landers DerbyCon 6 | 44:24 | 2 | |
|
2022-05-04 | 519 Open Source Intelligence What I learned by being an OSINT creeper Josh Huff DerbyCon 6 | 22:35 | 11 | |
|
2022-05-04 | 501 Abusing RTF Exploitation Evasion and Exfiltration Devon Greene DerbyCon 6 | 30:33 | 1 | |
|
2022-05-04 | 407 Tool Drop 20 Free As In Pizza Scot Berner Jason Lang DerbyCon 6 | 54:03 | 1 | |
|
2022-05-04 | 314 DNS in Enterprise IR Collection Analysis and Response Philip Martin DerbyCon 6 | 46:42 | 0 | |
|
2022-05-04 | 202 Hunting for Exploit Kits Joe Desimone DerbyCon 6 | 36:21 | 4 | |
|
2022-05-04 | 303 DevOops Redux Ken Johnson Chris Gates DerbyCon 6 | 53:11 | 1 | |
|
2022-05-04 | 201 Mind Reading for Fun and Profit using DISC Christopher Hadnagy DerbyCon 6 | 43:36 | 14 | |
|
2022-05-04 | 416 The Advanced Persistent Pentester All Your Networks Are Belong 2 Us Beau Bullock Derek Banks Jof | 38:51 | 2 | |
|
2022-05-04 | 216 Yara Rule QA Cant I Write Code to do This for Me Andrew Plunkett DerbyCon 6 | 23:01 | 1 | |
|
2022-05-04 | 402 1000000 0 Cloning a Game Using Game Hacking and Terabytes of Data Nick Cano DerbyCon 6 | 43:06 | 5 | |
|
2022-05-04 | 310 Anti Forensics AF int0x80 of Dual Core 2 DerbyCon 6 | 47:44 | 4 | |
|
2022-05-04 | 120 Hardening AWS Environments and Automating Incident Response for AWS Compromises Andrew Krug Alex | 47:02 | 4 | |
|
2022-05-04 | 415 Hack Yourself Building A Pentesting Lab David Boyd DerbyCon 6 | 43:44 | 17 | |
|
2022-05-04 | 215 Recharging Penetration Testing to Maximize Value James Jardine DerbyCon 6 | 50:47 | 1 | |
|
2022-05-04 | 401 Top 10 2015 2016 compromise patterns observed how to use non traditional Internet datasets to de | 54:23 | 1 | Guide |
|
2022-05-04 | 119 Introducing PowerShell into your Arsenal with PSAttack Jared Haight DerbyCon 6 | 42:04 | 4 | |
|
2022-05-04 | 310 Anti Forensics AF int0x80 of Dual Core DerbyCon 6 | 47:44 | 0 | |
|
2022-05-04 | 214 So Youve Inherited a Security Department Now What Amanda Berlin Lee Brotherston DerbyCon 6 | 48:43 | 0 | |
|
2022-05-04 | 414 Body Hacking 101 or a Healthy Lifestyle for Security Pros Nathan Magniez DerbyCon 6 | 1:05:22 | 0 | |
|
2022-05-04 | 518 The 1337 Gods of Geek Mythology Justin Herman Anna Jeannine Herman DerbyCon 6 | 24:26 | 1 | Vlog |
|
2022-05-04 | 400 Data Obfuscation How to hide data and payloads to make them not exist in a mathematically optima | 47:32 | 7 | Guide |
|
2022-05-04 | 213 Python 3 Its Time Charles L Yost DerbyCon 6 | 39:17 | 3 | |
|
2022-05-04 | 118 Attacking ADFS Endpoints with PowerShell Karl Fosaaen DerbyCon 6 | 50:15 | 17 | |
|
2022-05-04 | 413 Need More Sleep REST Could Help Drew Branch DerbyCon 6 | 27:33 | 0 | |
|
2022-05-04 | 308 Business Developement The best non four letter dirty word in infosec Scott Lyons and Joshua Marp | 57:20 | 0 | |
|
2022-05-04 | 517 Malicious Office Doc Analysis for EVERYONE Doug Burns DerbyCon 6 | 26:23 | 0 | |
|
2022-05-04 | 320 Static PIE How and Why Adam Cammack Brent Cook DerbyCon 6 | 41:25 | 0 | |
|
2022-05-04 | 212 Attackers Hunt Sysadmins Its time to fight back Lee Holmes DerbyCon 6 | 43:01 | 3 | |
|
2022-05-04 | 516 Were a Shooting Gallery Now What Joseph Tegg DerbyCon 6 | 23:52 | 2 | |
|
2022-05-04 | 110 Breaking Credit Card Tokenization Without Cryptanalysis Tim MalcomVetter DerbyCon 6 | 43:00 | 1 | |
|
2022-05-04 | 319 Hashview a new tool aimed to improve your password cracking endeavors Casey Cammilleri Hans Lakh | 36:23 | 44 | |
|
2022-05-04 | 412 Hacking for Homeschoolers STEM projects for under 20 Branden Miller DerbyCon 6 | 43:25 | 1 | |
|
2022-05-04 | 515 Advanced Persistent Thirst APT Patrick DeSantis Joe Marshall Carlos Pacho DerbyCon 6 | 19:54 | 2 | |
|
2022-05-04 | 109 Defeating The Latest Advances in Script Obfuscation Mark Mager DerbyCon 6 | 30:15 | 1 | |
|
2022-05-04 | 308 Business Developement The best non four letter dirty word in infosec Scott Lyons and Joshua Marp | 57:20 | 0 | |
|
2022-05-04 | 211 Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs Eric Conrad | 49:17 | 72 | Vlog |
|
2022-05-04 | 514 BurpSmartBuster A smart way to find hidden treasures DerbyCon 6 | 26:26 | 21 | |
|
2022-05-04 | 318 Java RATS Not even your Macs are safe Anthony Kasza DerbyCon 6 | 49:39 | 8 | |
|
2022-05-04 | 411 Fuzzing basicshow to break software grid aka Scott M DerbyCon 6 | 46:28 | 0 | Guide |
|
2022-05-04 | 108 Exploiting First Hop Protocols to Own the Network Paul Coggin DerbyCon 6 | 40:43 | 0 | |
|
2022-05-04 | 513 Confronting Obesity Infosec Michael Schearer DerbyCon 6 | 22:22 | 0 | |
|
2022-05-04 | 210 What I have learned in 25years of Ham Radio Jay Radcliffe DerbyCon 6 | 43:56 | 4 | |
|
2022-05-04 | 512 Evolving your Offices Security Culture Nancy Snoke DerbyCon 6 | 25:48 | 0 | |
|
2022-05-04 | 107 CrackMapExec Owning Active Directory by using Active Directory Marcello Salvati DerbyCon 6 | 45:17 | 15 | |
|
2022-05-04 | 317 Poetically Opaque or other John Updike Quotes hypervista DerbyCon 6 | 1:01:21 | 0 | |
|
2022-05-04 | 307 From Commodity to Advanced APT malware are automated malware analysis sandboxes as useful as you | 1:10:20 | 6 | |
|
2022-05-04 | 511 Metaprogramming in Ruby and doing it wrong Ken Toler DerbyCon 6 | 23:33 | 2 | |
|
2022-05-04 | 410 Garbage in garbage out generating useful log data in complex environments Ellen Hartstack and Ma | 50:31 | 2 | Vlog |
|
2022-05-04 | 209 I dont give one IoTA Introducing the Internet of Things Attack Methodology Larry Pesce DerbyCo | 48:16 | 2 | Vlog |
|
2022-05-04 | 510 Responder for Purple Teams Kevin Gennuso DerbyCon 6 | 21:57 | 0 | |
|
2022-05-04 | 316 The 90s called they want their technology back Stephen Hilt DerbyCon 6 | 40:07 | 3 | Vlog |
|
2022-05-04 | 306 Its Never So Bad That It Cant Get Worse Valerie Thomas and Harry Regan DerbyCon 6 | 46:12 | 1 | |
|
2022-05-04 | 509 Project MVP Hacking and Protecting SharePoint Michael Warton DerbyCon 6 | 20:48 | 1 | |
|
2022-05-04 | 409 Managed to Mangled Exploitation of Enterprise Network Management Systems Deral Heiland Matthew K | 50:14 | 0 | |
|
2022-05-04 | 311 Penetration Testing Trends John Strand DerbyCon 6 | 51:46 | 2 | |
|
2022-05-04 | 121 Invoke Obfuscation PowerShell obFUsk8tion Techniques How To Try To DeTect Them Daniel Bohannon | 48:26 | 12 | Guide |
|
2022-05-04 | 300 Metasploit Townhall David Maloney James Lee Brent Cook Tod Beardsley Lance Sanchez DerbyCon 6 | 43:49 | 2 | |
|
2022-05-04 | 529 How are tickets paid for Abe Miller DerbyCon 6 | 21:24 | 0 | |
|
2022-05-04 | 528 Making Our Profession More Professional Bill Gardner DerbyCon 6 | 26:22 | 0 | |
|
2022-05-04 | 527 Dive into DSL Digital Response Analysis with Elasticsearch Brian Marks Andrea Sancho Silgado D | 18:04 | 1 | |
|