2022-05-02 | 116 Make STEHM Great Again David Schwartzberg and Chris Sistrunk DerbyCon 6 | 46:17 | 0 | |
|
2022-05-02 | 103 Writing malware while the blue team is staring at you Mubix Rob Fuller DerbyCon 6 | 37:45 | 5 | |
|
2022-05-02 | 115 How to Social Engineer your way into your dream job Jason Blanchard DerbyCon 6 | 55:37 | 15 | Guide |
|
2022-05-02 | 102 Thinking Purple Carlos Perez DerbyCon 6 | 55:19 | 1 | |
|
2022-05-02 | 114 Embrace the Bogeyman Tactical Fear Mongering for Those Who Penetrate FuzzyNop DerbyCon 6 | 40:04 | 1 | |
|
2022-05-02 | 113 New Shiny in Metasploit Framework egypt DerbyCon 6 | 47:20 | 4 | |
|
2022-05-02 | 101 Key Note Jeffrey Snover Lee Holmes DerbyCon 6 | 1:00:02 | 64 | |
|
2022-05-02 | 204 Beyond The Cript Practical iOS Reverse Engineering Michael Allen DerbyCon 6 | 49:07 | 14 | |
|
2022-05-02 | 112 Phishing without Failure and Frustration Jay Beale DerbyCon 6 | 40:30 | 2 | |
|
2022-05-02 | 203 Next Gen Web Pen Testing Handling modern applications in a penetration test Kevin Johnson and Ja | 51:47 | 4 | |
|
2022-05-02 | 111 Attacking EvilCorp Anatomy of a Corporate Hack Sean Metcalf Will Schroeder 2 DerbyCon 6 | 52:29 | 15 | |
|
2022-05-01 | 14 Attacking Packing Captain Hook Beats Down on Peter Packer Vadim Kotov Nick Cano DerbyCon 5 | 42:19 | 5 | |
|
2022-05-01 | 18 Circles Boxes Drawing SecArch into your program Christopher Robinson DerbyCon 5 | 51:17 | 1 | |
|
2022-05-01 | Keynote00 People Buy You Jordan Harbinger DerbyCon 5 | 51:12 | 0 | |
|
2022-05-01 | 30 Ansible And why it works for me Charles Yost DerbyCon 5 | 25:09 | 3 | |
|
2022-05-01 | 11 Losing Battles Winning Wars Active Defense Rebooted Rafal Los DerbyCon 5 | 45:54 | 0 | |
|
2022-05-01 | 29 Latest Tools in Automotive Hacking Craig Smith DerbyCon 5 | 20:06 | 9 | |
|
2022-05-01 | 18 Blue Team Army Its your network defend it Mick Douglas Jamie Murdock DerbyCon 5 | 44:52 | 0 | |
|
2022-05-01 | 10 CyberSecurity Alphabets Hacker Edition Reuben Paul @RAPst4r DerbyCon 5 | 41:12 | 22 | |
|
2022-05-01 | 17 Is That a Router in Your Pocket or are You Trying to P0wn Me Michael Vieau Kevin Bong DerbyCon | 51:56 | 9 | |
|
2022-05-01 | 28 Windows 10 Defense in Depth Eddie David DerbyCon 5 | 28:29 | 0 | |
|
2022-05-01 | 11 Gray Hat PowerShell Ben Ten DerbyCon 5 | 45:12 | 3 | |
|
2022-05-01 | 27 Tactical Diversion Driven Defense Greg Foss Tom Hegel DerbyCon 5 | 24:29 | 3 | |
|
2022-05-01 | 17 PHaaS Phishing as a Service Raymond Gabler DerbyCon 5 | 47:51 | 6 | |
|
2022-05-01 | 17 How I Stopped Worrying and Learned To Love InfraOps Karthik Rangarajan Daniel Tobin DerbyCon 5 | 41:37 | 1 | |
|
2022-05-01 | 10 Bugspray The 802154 Attack Surface Bryan Crypt0s Halfpap DerbyCon 5 | 43:14 | 5 | |
|
2022-05-01 | 11 Developers Care and feeding Bill Sempf DerbyCon 5 | 47:30 | 1 | |
|
2022-05-01 | 26 Tool Drop Free as in Beer Scot Berner Jason Lang DerbyCon 5 | 22:52 | 1 | |
|
2022-05-01 | 20 Surveillance using spare stuff Matt Scheurer DerbyCon 5 | 22:19 | 4 | |
|
2022-05-01 | 17 Homebrewing for Hackers Benjamin Holland Amber Aldrich DerbyCon 5 | 26:24 | 1 | |
|
2022-05-01 | 11 Detecting phishing attacks with DNS reconnaissance Mike Saunders DerbyCon 5 | 22:14 | 1 | |
|
2022-05-01 | 10 Breaking in Bad Im the one who doesnt knock Jayson E Street DerbyCon 5 | 56:52 | 5 | |
|
2022-05-01 | 13 Surviving your Startup Bruce Potter DerbyCon 5 | 17:15 | 1 | |
|
2022-05-01 | 08 Pwning People Personally Josh Schwartz DerbyCon 5 | 45:21 | 3 | |
|
2022-05-01 | 19 Disecting Wassenaar Tyler Pitchford aka Trip DerbyCon 5 | 46:08 | 0 | |
|
2022-05-01 | 22 Practical Attacks Against Multifactor Josh Stone DerbyCon 5 | 25:31 | 0 | |
|
2022-05-01 | 34 Intro to x86 Stephanie Preston DerbyCon 5 | 26:22 | 3 | |
|
2022-05-01 | 12 Social Media Risk Metrics When OMGWTFBBQ meets risk algorithms Ian Amit Alex Hutton DerbyCon 5 | 50:18 | 1 | |
|
2022-05-01 | 15 HFC Update Johnny Long Henry Wanjala DerbyCon 5 | 1:04:57 | 6 | Vlog |
|
2022-05-01 | 19 Building a Better Honeypot Network Josh Pyorre DerbyCon 5 | 24:51 | 2 | |
|
2022-05-01 | 33 Geeks Need Basements Kathleen Veach DerbyCon 5 | 21:04 | 0 | |
|
2022-05-01 | 08 Mobile Application Reverse Engineering Under the Hood Drew Branch Billy McLaughlin DerbyCon 5 | 48:05 | 2 | |
|
2022-05-01 | 21 The problems with JNI obfuscation in the Android Operating System Rick Ramgattie DerbyCon 5 | 32:52 | 1 | |
|
2022-05-01 | 12 Hacking Web Apps Brent White DerbyCon 5 | 24:33 | 2 | |
|
2022-05-01 | 08 Malfunctions Functions Automated Static Malware Analysis using Function Level Signatures Ma Der | 18:20 | 2 | |
|
2022-05-01 | PreKeynote Welcome to the Family DerbyCon 5 | 25:51 | 1 | |
|
2022-05-01 | 15 Beyond Bad IP Addresses Hashes and Domains Ed McCabe DerbyCon 5 | 52:32 | 1 | |
|
2022-05-01 | 18 The little known horrors of web application session management Matthew Sullivan DerbyCon 5 | 48:53 | 1 | |
|
2022-05-01 | 12 Fingerprinting the modern digital footprint Arian Evans DerbyCon 5 | 50:54 | 0 | |
|
2022-05-01 | 21 Gnuradio demystifying rf black magic Matthew OGorman DerbyCon 5 | 48:01 | 7 | |
|
2022-05-01 | 08 Hacking Virtual Appliances Jeremy Brown DerbyCon 5 | 50:40 | 1 | |
|
2022-05-01 | 18 Stealthy and Persistent Back Door for Z Wave Gateways Jonathan Fuller Ben Ramsey DerbyCon 5 | 21:00 | 1 | |
|
2022-05-01 | 21 Crypto 101 An Intro To Real World Crypto Adam Caudill DerbyCon 5 | 25:29 | 7 | |
|
2022-05-01 | 14 Started from the bottom now Im here How to ruin your life by getting everything you ever DerbyC | 51:54 | 1 | Guide |
|
2022-05-01 | 21 Confessions of a crypto cluster operator Dustin Heywood DerbyCon 5 | 29:16 | 3 | |
|
2022-05-01 | 12 BYPASS SURGERY ABUSING CONTENT DELIVERY NETWORKS WITH SERVER SIDE REQUEST FORGERY SSRF F DerbyC | 53:29 | 0 | |
|
2022-05-01 | Keynote01 Information Security Today and in the Future HD Moore Ed Skoudis John Strand Chris Nickers | 59:54 | 6 | Guide |
|
2022-05-01 | 18 My password cracking brings all the hashes to the yard Larry Pesce DerbyCon 5 | 52:05 | 4 | |
|
2022-05-01 | 14 How to Build Your Own Covert SIGINT Vehicle Drew Redshift Porter DerbyCon 5 | 47:10 | 27 | Guide |
|
2022-05-01 | 08 Hacking for homeschoolers Branden Miller DerbyCon 5 | 53:08 | 3 | |
|
2022-05-01 | 32 Intercepting USB Traffic for Attack and Defense Brandon Wilson DerbyCon 5 | 22:50 | 7 | |
|
2022-05-01 | 11 Unbillable Exploiting Android In App Purchases Alfredo Ramirez DerbyCon 5 | 44:08 | 3 | |
|
2022-05-01 | 31 Learning Mainframe Hacking Where the hell did all my free time go Chad Rikansrud DerbyCon 5 | 26:45 | 9 | |
|
2022-05-01 | 20 Stretching the Sandbox with Malware Feature Vectors Mike Schladt DerbyCon 5 | 41:17 | 3 | |
|
2022-05-01 | 16 InfoSec Big Picture and Some Quick Wins Schuyler Dorsey DerbyCon 5 | 39:09 | 7 | |
|
2022-05-01 | 20 Hunting Unicorns and Jerks Irrational Defensible or Necessary Steve Werby DerbyCon 5 | 55:39 | 0 | |
|
2022-05-01 | 16 HARdy HAR HAR HAR HAR File Collection and Analysis for Malware Robert Simmons DerbyCon 5 | 42:26 | 0 | |
|
2022-05-01 | 09 Stagefright Scary Code in the Heart of Android Joshua jduck Drake DerbyCon 5 | 1:13:17 | 0 | |
|
2022-05-01 | 16 DNS Miner A semi automatic Incident response and threat intelligence tool for small over wo Der | 52:33 | 0 | |
|
2022-05-01 | 20 Five Hardware Hacking Projects Under 30 Kevin Bong Michael Vieau DerbyCon 5 | 50:16 | 8 | |
|
2022-05-01 | 13 Sticky Honey Pots Paul J Vann DerbyCon 5 | 15:33 | 1 | |
|
2022-05-01 | 09 ISLET An Attempt to Improve Linux based Software Training Jon Schipp DerbyCon 5 | 37:19 | 2 | |
|
2022-05-01 | 19 Practical hardware attacks against SOHO Routers the Internet of Things Chase Schultz DerbyCon 5 | 48:04 | 6 | |
|
2022-05-01 | 16 Credential Assessment Mapping Privilege Escalation at Scale Matt Weeks 2 DerbyCon 5 | 55:58 | 0 | |
|
2022-05-01 | 13 Hackers vs Defenders Can the defender ever stop playing catch up and win Mano Paul DerbyCon 5 | 46:54 | 0 | |
|
2022-05-01 | 13 Dynamic Analysis of Flash Files Jacob Thompson DerbyCon 5 | 22:41 | 1 | |
|
2022-05-01 | 39 The Pentesters Framework PTF The easy way to roll your own distro Dave Kennedy DerbyCon 5 | 18:21 | 33 | |
|
2022-05-01 | 09 Introducing the RITA VM Hunting for bad guys on your network for free with math John Stra Derby | 56:29 | 2 | |
|
2022-05-01 | 38 Hack My Derby Nate Lager DerbyCon 5 | 29:18 | 0 | |
|
2022-05-01 | 16 Credential Assessment Mapping Privilege Escalation at Scale Matt Weeks DerbyCon 5 | 55:58 | 5 | |
|
2022-05-01 | 19 LongTail SSH Attack Analysis Eric Wedaa DerbyCon 5 | 52:58 | 1 | |
|
2022-05-01 | 13 Building a Brain for Infosec Ryan Sevey Jason Montgomery DerbyCon 5 | 45:40 | 5 | |
|
2022-05-01 | 25 A survey of Powershell enabled malware Tyler Halfpop DerbyCon 5 | 24:27 | 4 | |
|
2022-05-01 | 37 Malware is hard Lets go Shopping Richard Wartell DerbyCon 5 | 28:35 | 2 | |
|
2022-05-01 | 15 Using Windows diagnostics for system compromiseA Nicholas Berthaume aricon DerbyCon 5 | 35:18 | 3 | |
|
2022-05-01 | 24 The Human Interface Device Attack Vector Research and Development Alexander Livingston Sega Der | 28:35 | 0 | |
|
2022-05-01 | 19 Intrusion Hunting for the Masses A Practical Guide David Sharpe DerbyCon 5 | 45:46 | 2 | Guide |
|
2022-05-01 | 09 Going AUTH the Rails on a Crazy Train Tomek Rabczak Jeff Jarmoc DerbyCon 5 | 54:51 | 0 | |
|
2022-05-01 | 12 WhyMI so Sexy WMI Attacks Real Time Defense and Advanced Forensic Analysis Matt Graeber W Derby | 48:55 | 5 | |
|
2022-05-01 | 36 Voltron Defender of your inferiors Richo Healey DerbyCon 5 | 25:24 | 3 | |
|
2022-05-01 | 23 Haking the Next Generation David Schwartzberg DerbyCon 5 | 29:43 | 2 | |
|
2022-05-01 | 35 Spy Vs Spy How to Use Breakable Dependencies to Your Advantage Stacey Banks Anne Henmi DerbyCon | 20:17 | 1 | Guide |
|
2022-05-01 | 16 Stacking the Virtual Deck Attacks by Predicting RNGs Adam Schwalm DerbyCon 5 | 27:32 | 0 | |
|
2022-05-01 | 07 Moving Target Defense Learning from Hackers Sachin Shetty DerbyCon 5 | 22:21 | 2 | |
|
2022-05-01 | 03 The State of Information Security Today Jeff Man DerbyCon 5 | 52:31 | 6 | Guide |
|
2022-05-01 | 07 HackerQue Michael Smith Kyle Stone DerbyCon 5 | 1:03:41 | 1 | |
|
2022-05-01 | 03 Red vs Blue Modern Active Directory Attacks Defense Sean Metcalf DerbyCon 5 | 51:38 | 62 | |
|
2022-05-01 | 06 The Phony Pony Phreaks Blazed The Way Patrick McNeil Owen DerbyCon 5 | 50:59 | 0 | |
|
2022-05-01 | 06 Putting the Management into Vulnerability Management or YOUVE GOT BEARS Jesika McEvoy DerbyCon | 21:28 | 1 | |
|
2022-05-01 | 03 Manufactorum Terminatus The attack and defense of industrial manufacturers Noah Beddome DerbyCo | 40:22 | 3 | |
|