2023-05-13 | Allie Barnes Naked & Unafraid The Basics Of Securing Your Nudes | 21:27 | 8 | |
|
2023-05-13 | Allie Mellen Trust, But Verify Maintaining Democracy In Spite Of Информационные Контрмеры | 23:01 | 2 | |
|
2023-05-13 | Cassandra Brunetto Using OSINT To Catch An Online Predator | 22:09 | 5 | |
|
2023-05-13 | Cat Murdock Red Teaming Complicated Decision Making In Work & Life | 42:11 | 2 | |
|
2023-05-13 | Chris Kirsch Using OSINT For Competitive Intelligence | 24:44 | 8 | |
|
2023-05-13 | Erich Kron Lies, Deception And Manipulation Let’s Talk About Deepfakes | 49:55 | 0 | |
|
2023-05-13 | Gabriel Whalen Working With Legacy Systems In Security Humans | 23:06 | 1 | |
|
2023-05-13 | Joe Gray Social Engineering Your Metrics Using Data Science To Provide Value In Reporting | 44:27 | 0 | |
|
2023-05-12 | Andy Smith, Automate security response by creating your own Naughty Lists | 14:44 | 1 | |
|
2023-05-12 | Bjarki Ágúst Guðmundsson, Google, Eliminating XSS in Angular Applications | 16:00 | 2 | |
|
2023-05-12 | Chris Davis, Demonstrating Active Directory Penetration Testing | 18:24 | 5 | |
|
2023-05-12 | Clay Moody, Using Open Source Tools to Track Elves | 11:28 | 1 | |
|
2023-05-12 | Ed Skoudis, SANS Holiday Hack Challenge Welcome Orientation | 5:42 | 0 | |
|
2023-05-12 | Jay Beale, Kubernetes Attack Demo Hacking a Cheating Casino | 17:08 | 2 | |
|
2023-05-12 | Kevin Tyers, HIDden Duckey, Deconstructed Payload | 14:23 | 1 | |
|
2023-05-12 | Mary Ellen Kennel, How to Build a Free Malware Lab | 16:10 | 2 | Guide |
|
2023-05-12 | Nancy Gariché, Disclosing Security Vulnerabilities to OS Projects Like a Boss | 9:38 | 1 | |
|
2023-05-12 | Prof Qwerty Petabyte, FPGA Design for Embedded Systems | 12:28 | 2 | |
|
2023-05-12 | Prof Qwerty Petabyte, Log4j Vulnerability Response | 10:56 | 0 | Vlog |
|
2023-05-12 | Sean Atkinson & Chris Elgee, A CISO's Best Friend The Pentester | 11:15 | 3 | |
|
2023-05-12 | Tom Liston, RFC 3514 Compliant Pentesting Being Good While You're Being Bad | 10:42 | 2 | |
|
2023-05-12 | Xena Olsen, The Abominable Snowman's Threat Hunting Adventure | 16:20 | 2 | |
|
2023-05-12 | Blue AppSec Keynote by Tanya Janca | 55:59 | 3 | |
|
2023-05-12 | Blue Ed Tucker Joining the Dots to Cyber Security | 56:10 | 2 | |
|
2023-05-12 | Blue Harry McLaren Becoming a Defender Roles and Competencies | 39:58 | 1 | |
|
2023-05-12 | Blue James Bore Measuring Security Uncertain'ty | 42:19 | 2 | |
|
2023-05-12 | Blue Steffan Hagger The Attacker's Point of View | 42:15 | 6 | |
|
2023-05-12 | Blue su1phr Incident Preparedness On a Budget | 25:56 | 0 | |
|
2023-05-12 | Opening remarks by The Four Stus | 56:08 | 4 | |
|
2023-05-12 | Purple Chad Calease How To Pave a Path Forward for Infosec | 52:05 | 3 | Guide |
|
2023-05-12 | Purple Chrissi Robertson I'm Not a Fraud, I Promise | 24:06 | 0 | |
|
2023-05-12 | Jay Beale, Quick Intro Attacking a Kubernetes Cluster | 23:13 | 1 | |
|
2023-05-12 | Tim Medin, Hacking Dumberly Not Harderer | 17:40 | 2 | |
|
2023-05-12 | John Strand, Malware Zoo | 14:59 | 2 | |
|
2023-05-12 | John Strand, Evil Clouds Hacking the Cloud | 17:23 | 5 | |
|
2023-05-12 | Jon Gorenflo, Intro to Hashcat | 18:22 | 4 | |
|
2023-05-12 | Katie Knowles, Sneaking Secrets from SMB Shares | 15:29 | 1 | |
|
2023-05-12 | Beau Bullock, Everything You Wanted to Know About Password Spraying | 15:00 | 1 | |
|
2023-05-12 | Keynote Dave Kennedy, The Five Ways the Cyber Grinch Stole Christmas | 37:29 | 1 | |
|
2023-05-12 | Brian Hostetler, Buried Secrets Digging Deep Through Cloud Repositories | 8:13 | 0 | |
|
2023-05-12 | Brian Hostetler, CSV DDE Injection Pwn Web Apps Like a Ninja | 6:15 | 2 | |
|
2023-05-12 | Chris Davis & Chris Elgee, HTTP2 Because 1 is the Loneliest Number | 19:43 | 3 | |
|
2023-05-11 | Larry Pesce, Software Defined Radio The New Awesome | 19:22 | 4 | |
|
2023-05-11 | Mark Baggett, Escaping Python Shells | 18:44 | 1 | |
|
2023-05-11 | Chris Davis, Analyzing PowerShell Malware | 25:25 | 5 | |
|
2023-05-11 | Micah Hoffman, Breach Data and You | 11:10 | 0 | |
|
2023-05-11 | Mick Douglas, PowerShell for Pen Testing | 16:07 | 1 | |
|
2023-05-11 | Mike Poor, PCAP For Fun and Profit | 13:47 | 2 | |
|
2023-05-11 | Chris Davis, HTTP 2 Decryption and Analysis in Wireshark | 11:12 | 3 | |
|
2023-05-11 | Mike Saunders, Web App 101 Getting the Lay of the Land | 13:09 | 1 | |
|
2023-05-11 | Rachel Tobac, How I would Hack You Social Engineering Step by Step | 18:56 | 5 | |
|
2023-05-11 | Chris Elgee, HTTP 2 Because 1 Is the Loneliest Number | 8:15 | 0 | |
|
2023-05-11 | Derek Rook, Pivoting SSH | 17:22 | 5 | |
|
2023-05-11 | Deviant Ollam, Key Decoding | 14:56 | 1 | |
|
2023-05-11 | Ed Skoudis, KringleCon 2018 Start Here | 18:54 | 0 | |
|
2023-05-11 | Heather Mahalik, Smartphone Forensics Why Building a Toolbox Matters | 8:40 | 1 | |
|
2023-05-11 | Jack Daniel, The Secret to Building Community | 10:34 | 0 | |
|
2023-05-11 | Jason Nickola, Crash Course in Web App Pen Testing with Burp Suite | 13:31 | 1 | |
|
2023-05-11 | Dan Banker, Rudolph the Red Nosed Raptor Acquiring Triage Images via EDR | 9:07 | 0 | |
|
2023-05-11 | Dave Herrald, Adversary Emulation and Automation | 19:15 | 0 | |
|
2023-05-11 | David Tomaschik, Red Teaming Why Organizations Hack Themselves | 26:13 | 0 | |
|
2023-05-11 | Ed Skoudis, START HERE Welcome and Tips | 18:26 | 0 | |
|
2023-05-11 | HHC Closing Ceremony | 42:02 | 0 | |
|
2023-05-11 | Jack Rhysider, Give Yourself a Blog for Christmas | 15:53 | 0 | Vlog |
|
2023-05-11 | Jay Beale, Attacking and Hardening Kubernetes | 16:13 | 1 | |
|
2023-05-11 | Jorge Orchilles, Offensive Security Tools Providing Value with the C2 Matrix | 14:48 | 1 | |
|
2023-05-11 | Josh Wright, Open S3 Buckets Still a Problem In 2020 | 16:24 | 0 | |
|
2023-05-11 | Larry Pesce, HID Card Hacking | 23:56 | 1 | |
|
2023-05-11 | Prof Qwerty Petabyte, Working with the Official Naughty Nice Blockchain | 10:03 | 0 | |
|
2023-05-11 | Spencer Gietzen, IOMs vs IOAs in AWS | 10:26 | 3 | |
|
2023-05-11 | Tom Liston, Random Facts About Mersenne Twisters | 17:57 | 2 | |
|
2023-05-11 | Chris Elgee, CAN Bus Can Can | 9:07 | 5 | |
|
2023-05-11 | Verification State space Reduction through Restricted Parsing Environments | 33:50 | 1 | |
|
2023-05-11 | A fuzzing and protocol analysis case study of DNP3 | 20:55 | 3 | |
|
2023-05-11 | Error Correcting Codes as Source for Decoding Ambiguity | 15:45 | 3 | |
|
2023-05-11 | Grammatical Inference and Language Frameworks for LANGSEC | 22:25 | 1 | |
|
2023-05-11 | Heap Models for Exploit Systems | 48:27 | 0 | |
|
2023-05-11 | Keynote Dan Geer, Dark Matter Driven By Data | 1:21:50 | 0 | |
|
2023-05-11 | Nom, a Byte oriented, Streaming, Zero copy Parser Combinators Library in Rust | 20:02 | 2 | |
|
2023-05-11 | On the Generality and Convenience of Etypes | 24:10 | 0 | |
|
2023-05-11 | Opening Remarks of the 2015 LangSec Workshop | 5:20 | 0 | |
|
2023-05-11 | Protocol State Machines and Session Languages | 35:40 | 0 | |
|
2023-05-11 | The Correctness Security Gap in Compiler Optimization YouTube | 25:18 | 0 | |
|
2023-05-11 | The State of Hammer | 9:19 | 0 | |
|
2023-05-11 | Towards more Security in Data Exchange | 15:53 | 0 | |
|
2023-05-11 | Unambiguous Encapsulation | 36:24 | 0 | |
|
2023-05-11 | The State of Hammer Ready for ICS | 19:54 | 1 | |
|
2023-05-11 | A Posteriori Taint tracking for Demonstrating Non interference in Expressive Low level Languages | 16:01 | 0 | |
|
2023-05-11 | An Incremental Learner for Language Based Anomaly Detection in XML | 18:02 | 1 | |
|
2023-05-11 | Caradoc a Pragmatic Approach to PDF Parsing and Validation | 26:01 | 1 | |
|
2023-05-11 | Complex Paths and Derelict Sentinels software engineering underpinnings of NTP vulnerabilities | 23:36 | 0 | |
|
2023-05-11 | Grammatical Inference and Machine Learning Approaches to Post Hoc LangSec | 14:46 | 1 | |
|
2023-05-11 | In Search Of Shotgun Parsers In Android Applications | 17:48 | 0 | |
|
2023-05-11 | Mitigating LangSec Problems With Capabilities | 24:07 | 0 | |
|
2023-05-11 | Panel Toward a LangSec Software Development Lifecycle | 43:24 | 0 | |
|
2023-05-11 | Research Report Analysis of Software for Restricted Computational Environment Applicability | 15:02 | 0 | |
|
2023-05-11 | Safety to the Weak Security Through Feebleness An Unorthodox Manifesto | 23:13 | 0 | |
|
2023-05-11 | Some musings on the deduplication weird machine | 15:31 | 0 | |
|
2023-05-11 | 2016 The Year of LangSec Bugs | 43:44 | 0 | |
|
2023-05-11 | Building Hardened Internet of Things Clients with Language theoretic Security | 19:31 | 0 | |
|