2023-06-01 | Overview of common Android app vulnerabilities | 54:10 | 1 | |
|
2023-06-01 | REST in Peace Abusing GraphQL to Attack Underlying Infrastructure | 1:02:41 | 1 | |
|
2023-06-01 | GSuite Security Everyone wants it but not everyone gets it | 57:30 | 0 | |
|
2023-06-01 | Code that gets you pwns 'd Louis Nyffenegger @snyff | 36:29 | 0 | |
|
2023-06-01 | Hackers Don’t Wear Black Hoodies, They Wear Capes w Chloé Messdaghi @ChloeMessdaghi | 30:33 | 1 | |
|
2023-06-01 | Hacking Your Resumé w Ricki Burke @cybersecricki | 39:53 | 0 | |
|
2023-06-01 | Recognition Primed Bug Bounty Hunting w Rhys Elsmore @rhyselsmore | 1:02:39 | 0 | |
|
2023-06-01 | Sticking With It How To Choose a Target & Stay Motivated w Katie Paxton Fear @InsiderPhD | 1:05:02 | 0 | Guide |
|
2023-06-01 | Why I ❤️ Offensive Work and Why I 💔 Offensive Work w Thomas Dullien @halvarflake | 1:00:19 | 0 | |
|
2023-06-01 | Business Tradecraft for Hackers in the Corporate Industrial Complex Josh Schwartz @fuzzynop | 56:37 | 0 | |
|
2023-06-01 | Car Hacking Explained for Bug Hunters v2 0 w Jay Turla @shipcod3 | 37:12 | 0 | |
|
2023-06-01 | Introduction to AI & Machine Learning w InsiderPhD | 49:46 | 1 | |
|
2023-06-01 | It's Not a Vulnerability, It's a Feature W Bryson and Jorge | 52:59 | 0 | |
|
2023-06-01 | Women In Security and Privacy Roundtable LevelUp0x07 and WISP | 1:02:04 | 1 | |
|
2023-06-01 | CTF Walkthrough, All Secrets Explained LevelUp0x07 | 49:29 | 0 | Walkthrough |
|
2023-06-01 | Hardware Hacking for the Masses and you v2 w BusesCanFly | 1:01:07 | 0 | |
|
2023-06-01 | How to Crush Bug Bounties in the first 12 Months | 1:35:52 | 5 | Guide |
|
2023-06-01 | How to do Chrome Extension code reviews w BreanneBoland | 17:32 | 1 | Review |
|
2023-06-01 | Insecurity Through Obscurity w Nerdwell | 52:57 | 2 | |
|
2023-06-01 | Salesforce Object Recon with B3nac | 34:25 | 0 | |
|
2023-06-01 | SPI Flash for Bug Bounty Hunters with Nerdwell | 39:59 | 1 | |
|
2023-06-01 | 8 Ways to Almost Never Get a Dupe Again with InsiderPhD Katie Paxton Fear | 56:23 | 0 | |
|
2023-06-01 | Finding and Exploiting Hidden Functionality in Windows DLLs with Nerdwell | 45:29 | 1 | |
|
2023-06-01 | Finding Sensitive Data in Android Apps with Nerdwell | 44:35 | 0 | |
|
2023-06-01 | How I hacked 55 Banks & Cryptocurrency Exchanges with Alissa Knight | 21:47 | 3 | |
|
2023-06-01 | Hunting IDOR with Z winK Part 2 | 32:47 | 2 | |
|
2023-06-01 | Recap and panel with Jeremiah Grossman, Troy Hunt, Gene Kim, Mike Arpaia | 35:13 | 0 | |
|
2023-06-01 | Scott Helme Revocation is broken, here's how we're fixing it | 43:09 | 0 | |
|
2023-06-01 | Troy Hunt I’m Pwned You’re Pwned We’re All Pwned | 44:18 | 0 | |
|
2023-06-01 | Alex Smolen Identity and Access Management Judgment Day | 32:43 | 1 | |
|
2023-06-01 | Alvaro Muñoz NET Serialization Detecting and defending vulnerable endpoints | 42:40 | 0 | |
|
2023-06-01 | Brian Campbell Beyond Bearer Token Binding as the Foundation for a More Secure Web | 57:14 | 0 | |
|
2023-06-01 | Devdatta Akhawe How I learnt to play in the CSP Sandbox | 37:46 | 1 | |
|
2023-06-01 | Emily Schechter The Trouble with URLs, and how Humans Don't Understand Site Identity | 28:17 | 0 | |
|
2023-06-01 | Gene Kim Top Infosec Lessons Learned Researching And Co Authoring The DevOps Handbook | 44:31 | 2 | |
|
2023-06-01 | Jeremy Long The Application Patching Manifesto | 41:18 | 0 | |
|
2023-06-01 | John Melton Starting an AppSec Program An Honest Retrospective | 49:38 | 0 | |
|
2023-06-01 | Kevin Gosschalk How bots decide what you can buy and how much you'll pay | 33:57 | 0 | |
|
2023-06-01 | Ksenia Peguero How to REACT to JavaScript Security Issues | 1:01:18 | 1 | Guide |
|
2023-06-01 | Mario Heiderich XSS is dead We just don't get it | 43:29 | 1 | |
|
2023-06-01 | Mike Arpaia Starting, growing, and scaling your host intrusion detection efforts | 43:45 | 2 | |
|
2023-05-24 | Won't Somebody Please Think of the Routers Sander Smith | 52:23 | 17 | |
|
2023-05-24 | 3d Photogrammetry Machinist No sound | 54:32 | 6 | |
|
2023-05-24 | Attacking Mac OSX Dan Tentler | 31:52 | 9 | |
|
2023-05-24 | Enforcing Web security and privacy with zero knowledge protocols Ignat Korchagin | 32:50 | 4 | |
|
2023-05-24 | Hackers Hiring Hackers Irish | 55:44 | 6 | |
|
2023-05-24 | Hacking Commercial ATMs and Safes XCC & Alex | 34:35 | 0 | |
|
2023-05-24 | Intrusion Hunting for the Masses David Sharpe | 49:48 | 1 | |
|
2023-05-24 | Investigating HIPAA Breaches and Identifying Vulnerabilities Herbert Icasiano | 45:35 | 2 | |
|
2023-05-24 | Kerberos Party Tricks Geoffrey Janjua No sound | 37:24 | 5 | |
|
2023-05-24 | OEMs Considered Harmful Zero days with zero efforts Adam Donenfeld | 26:21 | 0 | |
|
2023-05-24 | OSX Pirrit The blue balls of OS X adware Amit Serper | 54:24 | 1 | |
|
2023-05-24 | Planning Effective Red Team Exercises Sean T Malone | 1:00:17 | 2 | |
|
2023-05-24 | Web Application Hacking Workshop Sam Bowne | 1:14:08 | 6 | |
|
2023-05-24 | Turning Joy into Sadness Common Cryptography Anti Patterns Becker Polverini | 47:37 | 2 | |
|
2023-05-24 | Automating Javascript Deobfuscation iximeow | 39:20 | 2 | |
|
2023-05-24 | Doorking Around Brett Chance | 34:26 | 1 | |
|
2023-05-24 | Exploiting USB IP in Linux Ignat Korchagin | 45:09 | 0 | |
|
2023-05-24 | From Zero to Bender in 12 Months Zapp & Hyr0n | 50:31 | 1 | |
|
2023-05-24 | Getting off The Grid and onto Hyperboria William Turner | 37:48 | 0 | |
|
2023-05-24 | How Containers Contain z0rro | 29:08 | 3 | |
|
2023-05-24 | IAM Unhinged Jason Ritzke | 41:58 | 0 | |
|
2023-05-24 | Post Mortem Forensics Telling the Story of a Breach Jase Kasperowicz | 53:09 | 1 | |
|
2023-05-24 | SMTP Security in a Changing World Katie Knowles | 51:24 | 1 | |
|
2023-05-24 | The Hotel Room Gourmet Deviant Ollam & Pinup | 1:24:11 | 3 | |
|
2023-05-24 | Threat Modeling 101 Viss | 47:46 | 1 | |
|
2023-05-24 | Signal Safari Investigating RF Con | 42:35 | 0 | |
|
2023-05-24 | Adware is Just Malware Amit Serpe | 53:29 | 3 | |
|
2023-05-24 | Can You Hear Me Now Wireless Com f | 36:41 | 0 | |
|
2023-05-24 | Data Security How to Avoid an Emba | 42:31 | 0 | Guide |
|
2023-05-24 | From Security to Risk Matthew Sti | 32:14 | 0 | |
|
2023-05-24 | Git for Hackers RtzqO | 44:42 | 1 | |
|
2023-05-24 | Go Hack Yourself Michael Sanders | 45:13 | 0 | |
|
2023-05-24 | Hacking and Securing Payment Techn | 48:51 | 1 | |
|
2023-05-24 | How to Security Research Without G | 45:09 | 0 | Guide |
|
2023-05-24 | HTTP2 and You Security Panda | 35:18 | 0 | |
|
2023-05-24 | InfoSec Career Panel | 1:03:13 | 1 | |
|
2023-05-24 | Leeky Onions Zorro | 49:24 | 0 | |
|
2023-05-24 | Privacy Mark Liphardt | 1:01:36 | 1 | |
|
2023-05-24 | Raise Me Resume Workshop | 1:04:59 | 0 | |
|
2023-05-24 | Tales of the Lockpick Village Marcus Richerson | 42:50 | 1 | |
|
2023-05-24 | The SEArt of War The CHIMAERA Threat Model Christina Lekat & Tigran Terpandjan | 51:45 | 3 | |
|
2023-05-24 | Tracking and Blocking Malware Distribution With Automation Chris Schafer | 47:32 | 1 | |
|
2023-05-24 | Building and Automating InfoSec Competitions spiceywasabi & bluescreenofwin | 47:50 | 0 | |
|
2023-05-24 | Chip Decapping and Why You Should Care Funsized | 52:26 | 0 | |
|
2023-05-24 | Data Access Rights Exploits Under New Privacy Laws Amber Welch | 38:42 | 1 | |
|
2023-05-24 | Digital Forensics is Not Just for Incident Response Anymore IrishMASMS | 44:42 | 1 | |
|
2023-05-24 | Hashes to Ashes The Life & Times of Clandestine Infrastructure Jason Kichen | 39:06 | 0 | |
|
2023-05-24 | How to Fix the Diversity Gap in CyberSecurity Chloe Messdaghi | 25:48 | 13 | Guide |
|
2023-05-24 | Let's Talk about WAF Bypass Baby Brett securitypanda Gravois | 16:56 | 0 | Discussion |
|
2023-05-24 | Network Exploitation of IOT Ecosystems Fotios Fotis Chantzis | 54:32 | 2 | |
|
2023-05-24 | Swords to Plowshares Repurposing the Ghost Gunner Machinist | 48:58 | 1 | |
|
2023-05-24 | Welcome Alain Mowat | 13:10 | 0 | |
|
2023-05-24 | A new source of trouble Amat Cama | 36:54 | 1 | |
|
2023-05-24 | Automating computer security Tyler Nighswander | 47:37 | 0 | |
|
2023-05-24 | Bridging the Gap Stefan Lüders | 1:02:48 | 1 | |
|
2023-05-24 | DevOops Redux Chris Gates | 0:31 | 0 | |
|
2023-05-24 | Dissecting a Metamorphic File Infecting Ransomware Raul Alvarez | 41:47 | 0 | |
|
2023-05-24 | Modern reconnaissance phase on APT Paul Rascagnères | 38:55 | 1 | |
|
2023-05-24 | RHME2 CTF challenges and solutions Eloi Sanfèlix & Andres Moreno | 49:46 | 0 | |
|