Magnetic link has been copied to the cutting board

Name Security BSides

File Type video

Size 171.83GB

UpdateDate 2024-9-14

hash *****2EB817F90FA19EC91D0B823F4F6C757D05

Hot 9

Files BSides Amsterdam/BSides Amsterdam 2017/Security BSides Amsterdam 2017 (closing remarks).en.transcribed.srt | 4.77KB BSides Amsterdam/BSides Amsterdam 2017/Security BSides Amsterdam 2017 (closing remarks).mp4 | 4.93MB BSides Amsterdam/BSides Amsterdam 2017/Security BSides Amsterdam 2017 (opening).en.transcribed.srt | 14.45KB BSides Amsterdam/BSides Amsterdam 2017/Security BSides Amsterdam 2017 (opening).mp4 | 9.92MB BSides Amsterdam/BSides Amsterdam 2017/T1 - What if we really assumed breach, Kevin Jonkers (@gillroy).en.transcribed.srt | 81.47KB BSides Amsterdam/BSides Amsterdam 2017/T1 - What if we really assumed breach, Kevin Jonkers (@gillroy).mp4 | 60.25MB BSides Amsterdam/BSides Amsterdam 2017/T10 - I Boot when U-Boot, Bernardo Maia Rodrigues (@bernardomr) & Vincent Ruijter (@_evict).en.transcribed.srt | 83.08KB BSides Amsterdam/BSides Amsterdam 2017/T10 - I Boot when U-Boot, Bernardo Maia Rodrigues (@bernardomr) & Vincent Ruijter (@_evict).mp4 | 61.36MB BSides Amsterdam/BSides Amsterdam 2017/T11 - Automating security with PowerShell, Jaap Brasser (@Jaap_Brasser).en.transcribed.srt | 58.13KB BSides Amsterdam/BSides Amsterdam 2017/T11 - Automating security with PowerShell, Jaap Brasser (@Jaap_Brasser).mp4 | 49.00MB BSides Amsterdam/BSides Amsterdam 2017/T12 - Behavioral Analysis using DNS, Network Traffic and Logs, Josh Pyorre (@joshpyorre).en.transcribed.srt | 92.10KB BSides Amsterdam/BSides Amsterdam 2017/T12 - Behavioral Analysis using DNS, Network Traffic and Logs, Josh Pyorre (@joshpyorre).mp4 | 64.28MB BSides Amsterdam/BSides Amsterdam 2017/T2 - Requiem For An Admin, Walter Legowski (@SadProcessor).en.transcribed.srt | 66.93KB BSides Amsterdam/BSides Amsterdam 2017/T2 - Requiem For An Admin, Walter Legowski (@SadProcessor).mp4 | 59.90MB BSides Amsterdam/BSides Amsterdam 2017/T3 - Demystifying the Ransomware and IoT Threat, Christopher Elisan (@Tophs).en.transcribed.srt | 83.23KB BSides Amsterdam/BSides Amsterdam 2017/T3 - Demystifying the Ransomware and IoT Threat, Christopher Elisan (@Tophs).mp4 | 65.22MB BSides Amsterdam/BSides Amsterdam 2017/T4 - To click or not to click, or how to build awareness..., Jelena Milosevic (@_j3lena_).mp4 | 28.52MB BSides Amsterdam/BSides Amsterdam 2017/T5 - To pin or not to pin SSL pinning for Android & iOS, Jeroen Willemsen (@commjoenie).en.transcribed.srt | 68.01KB BSides Amsterdam/BSides Amsterdam 2017/T5 - To pin or not to pin SSL pinning for Android & iOS, Jeroen Willemsen (@commjoenie).mp4 | 43.18MB BSides Amsterdam/BSides Amsterdam 2017/T6 - V!4GR4 Cyber-Crime, Enlarged, Ben Herzberg (@KernelXSS).en.transcribed.srt | 53.64KB BSides Amsterdam/BSides Amsterdam 2017/T6 - V!4GR4 Cyber-Crime, Enlarged, Ben Herzberg (@KernelXSS).mp4 | 46.78MB BSides Amsterdam/BSides Amsterdam 2017/T7 - I Thought I Saw a HAXOR, Thomas V. Fischer (@fvt).en.transcribed.srt | 57.37KB BSides Amsterdam/BSides Amsterdam 2017/T7 - I Thought I Saw a HAXOR, Thomas V. Fischer (@fvt).mp4 | 40.87MB BSides Amsterdam/BSides Amsterdam 2017/T8 - Bots Combine! Behind the Modern Botnet, Andrea Scarfo (@AScarf0).en.transcribed.srt | 35.29KB BSides Amsterdam/BSides Amsterdam 2017/T8 - Bots Combine! Behind the Modern Botnet, Andrea Scarfo (@AScarf0).mp4 | 40.83MB BSides Amsterdam/BSides Amsterdam 2017/T9 - The hidden horrors that 3 years of global red-teaming, Jos van der Peet (@Voske1985).en.transcribed.srt | 48.89KB BSides Amsterdam/BSides Amsterdam 2017/T9 - The hidden horrors that 3 years of global red-teaming, Jos van der Peet (@Voske1985).mp4 | 34.73MB BSides Amsterdam/BSides Amsterdam Logo.jpg | 52.81KB BSides Asheville/BSides Asheville Logo.jpg | 15.68KB BSides Athens/BSides Athens 2016/Security BSides Athens 2016 (Video Screen Loop).mp4 | 1.76MB BSides Athens/BSides Athens 2016/Security BSides Athens 2016 (closing remarks).mp4 | 4.61MB BSides Athens/BSides Athens 2016/Security BSides Athens 2016 (welcome).mp4 | 7.40MB BSides Athens/BSides Athens 2016/T1 01 Welcome to Security BSides Athens 2016.en.transcribed.srt | 11.68KB BSides Athens/BSides Athens 2016/T1 01 Welcome to Security BSides Athens 2016.mp4 | 29.78MB BSides Athens/BSides Athens 2016/T1 02 Keynote - The future of CyberSecurity - Colonel Myron Koutsias.mp4 | 34.79MB BSides Athens/BSides Athens 2016/T1 03 OWASP ASVS - Panagiotis Yialouris.en.transcribed.srt | 45.54KB BSides Athens/BSides Athens 2016/T1 03 OWASP ASVS - Panagiotis Yialouris.mp4 | 141.85MB BSides Athens/BSides Athens 2016/T1 04 State of Mobile Applications Security - Vasilis Maritsas, Dimitris Bougioukas.mp4 | 83.54MB BSides Athens/BSides Athens 2016/T1 05 Temet Nosce - Thomas V. Fischer.en.transcribed.srt | 65.34KB BSides Athens/BSides Athens 2016/T1 05 Temet Nosce - Thomas V. Fischer.mp4 | 111.03MB BSides Athens/BSides Athens 2016/T1 06 Perform injection attackt - Anastasios Stasinopoulos.en.transcribed.srt | 30.00KB BSides Athens/BSides Athens 2016/T1 06 Perform injection attackt - Anastasios Stasinopoulos.mp4 | 70.84MB BSides Athens/BSides Athens 2016/T1 07 Fir3Ey3 Mail Scanner - Xavier Mertens.en.transcribed.srt | 50.36KB BSides Athens/BSides Athens 2016/T1 07 Fir3Ey3 Mail Scanner - Xavier Mertens.mp4 | 73.40MB BSides Athens/BSides Athens 2016/T1 08 WarBerry - Yiannis Ioannides.mp4 | 72.93MB BSides Athens/BSides Athens 2016/T1 09 Information security upgrade - Leonidas Tertipis.mp4 | 91.38MB BSides Athens/BSides Athens 2016/T1 10 Security BSides Athens 2016 - Closing Remarks.en.transcribed.srt | 17.42KB BSides Athens/BSides Athens 2016/T1 10 Security BSides Athens 2016 - Closing Remarks.mp4 | 52.15MB BSides Athens/BSides Athens 2016/T2 03 Automating cryptanalysis of HTTPS - Dionysis, Dimitris, Eva.en.transcribed.srt | 45.65KB BSides Athens/BSides Athens 2016/T2 03 Automating cryptanalysis of HTTPS - Dionysis, Dimitris, Eva.mp4 | 83.41MB BSides Athens/BSides Athens 2016/T2 04 Evil Twin with Wifiphisher - George Chatzisofroniou.en.transcribed.srt | 57.77KB BSides Athens/BSides Athens 2016/T2 04 Evil Twin with Wifiphisher - George Chatzisofroniou.mp4 | 93.37MB BSides Athens/BSides Athens 2016/T2 05 Building Malicious Hardware - Steve Lord.en.transcribed.srt | 65.50KB BSides Athens/BSides Athens 2016/T2 05 Building Malicious Hardware - Steve Lord.mp4 | 127.44MB BSides Athens/BSides Athens 2016/T2 06 TOR I2P traffic - Ben Herzberg.mp4 | 126.78MB BSides Athens/BSides Athens 2016/T2 07 Malware Analysis Environments - Alexandros Zacharis.mp4 | 119.90MB BSides Athens/BSides Athens 2016/T2 08 Poodles drown no more - Martijn Grooten.en.transcribed.srt | 46.41KB BSides Athens/BSides Athens 2016/T2 08 Poodles drown no more - Martijn Grooten.mp4 | 95.52MB BSides Athens/BSides Athens 2016/T2 09a Cyber-extortion against companies - Germanos Georgios, Papathanasiou Anastasios.en.transcribed.srt | 33.80KB BSides Athens/BSides Athens 2016/T2 09a Cyber-extortion against companies - Germanos Georgios, Papathanasiou Anastasios.mp4 | 20.21MB BSides Athens/BSides Athens 2016/T2 09b One Fish, Two Fish, Red Phish, Blue Fish - Kaitlyn Garratley.en.transcribed.srt | 49.23KB BSides Athens/BSides Athens 2016/T2 09b One Fish, Two Fish, Red Phish, Blue Fish - Kaitlyn Garratley.mp4 | 16.53MB BSides Athens/BSides Athens 2017/Security BSides Athens (Logo Teaser).mp4 | 460.33KB BSides Athens/BSides Athens 2017/T1 01 Welcome, by Dr. Grigorios Fragkos (@drgfragkos).mp4 | 46.40MB BSides Athens/BSides Athens 2017/T1 02 The Smile of the Child , by Dr. Stefanos Alevizos (Guest Speaker).mp4 | 23.60MB BSides Athens/BSides Athens 2017/T1 03 [Keynote] The Unbearable Lightness of Failure, by Dave Lewis (@gattaca).mp4 | 162.53MB BSides Athens/BSides Athens 2017/T1 04 Operation Grand Mars, defending against Carbanak, Thanassis Diogos.mp4 | 146.90MB BSides Athens/BSides Athens 2017/T1 05 Security in Continuous Integration and Continuous Development, Yiannis Koukouras (@twelvesec).mp4 | 57.14MB BSides Athens/BSides Athens 2017/T1 06 The Role of Professionalism & Standards in Penetration Testing, Prof. A.Blyth (@ajcblyth).mp4 | 184.09MB BSides Athens/BSides Athens 2017/T1 07 Detecting and Deceiving the Unknown with Illicium, Andreas Ntakas - Emmanouil Gavriil.mp4 | 113.58MB BSides Athens/BSides Athens 2017/T1 08 I Thought I Saw a - 4x0.-, Thomas V. Fischer (@fvt).mp4 | 144.96MB BSides Athens/BSides Athens 2017/T1 09 NO DRONE ZONE, Christina Skouloudi (@miss_narbi) & Alexandros Zacharis.mp4 | 113.27MB BSides Athens/BSides Athens 2017/T1 10 Car hacking - a real security threat or a media hype, Anna Stylianou.mp4 | 109.98MB BSides Athens/BSides Athens 2017/T1 11 Unity Makes Strength, Xavier Mertens (@xme).mp4 | 166.81MB BSides Athens/BSides Athens 2017/T1 12 A Shortcut to Red Teaming, Theo Papadopoulos.mp4 | 99.71MB BSides Athens/BSides Athens 2017/T1 13 Closing Remarks.mp4 | 5.67MB BSides Athens/BSides Athens 2017/T2 04 Don't Ignore GDPR, it impacts is wider than InfoSec, Thomas V. Fischer (@fvt).mp4 | 160.20MB BSides Athens/BSides Athens 2017/T2 05 Machine Learning and Images for Malware Detection and Classification, Konstantinos Kosmidis.mp4 | 71.90MB BSides Athens/BSides Athens 2017/T2 06 Intercepting sensitive data in smartphone app network connections, Eirini Anthi.mp4 | 90.77MB BSides Athens/BSides Athens 2017/T2 07 “The Browser Within”, Local exploitation of internal browsers in software, Alexandros Zacharis.mp4 | 139.80MB BSides Athens/BSides Athens 2017/T2 08 Detect the Undetectable with Sysmon and PowerShell Logs, Dimitrios Margaritis (@dmargaritis).mp4 | 158.96MB BSides Athens/BSides Athens 2017/T2 09 LightBulb Framework Shedding Light on the Dark Side of WAFs and Filters, Ioannis Stais.mp4 | 136.82MB BSides Athens/BSides Athens 2017/T2 10 Attacking IPv6 - MitM IPv6 patch for Bettercap, D.Grigoriou & D.Karakostas (@dimitKarakostas).mp4 | 116.09MB BSides Athens/BSides Athens Logo.jpg | 25.98KB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Buy the Dip by John Foster.en.transcribed.srt | 119.28KB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Buy the Dip by John Foster.mp4 | 80.50MB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Hacking 802.15.4 - Thermostats, Security, and More by Ryan Speers.en.transcribed.srt | 96.92KB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Hacking 802.15.4 - Thermostats, Security, and More by Ryan Speers.mp4 | 79.76MB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Malware Infection, Visualized. by Xavier Ashe.en.transcribed.srt | 32.37KB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Malware Infection, Visualized. by Xavier Ashe.mp4 | 21.33MB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Online No One Knows You're Dead by Andrew Kalat.en.transcribed.srt | 91.24KB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Online No One Knows You're Dead by Andrew Kalat.mp4 | 70.02MB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Operationalizing Threat Intelligence by Willard Dawson.en.transcribed.srt | 128.66KB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 Operationalizing Threat Intelligence by Willard Dawson.mp4 | 109.86MB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 The Art of Speaking With Muggles by Martin Fisher.en.transcribed.srt | 49.19KB BSides Atlanta/BSides ATL 2015/BSidesATL 2015 The Art of Speaking With Muggles by Martin Fisher.mp4 | 69.70MB BSides Augusta/BSides Agusta Logo.jpg | 79.53KB BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Brad Shoop & Chris Rimondi - Eyeing the Onion.mp4 | 170.83MB BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Christopher Campbell and Matthew Graeber - Living Off the Land.mp4 | 110.33MB BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 David Bianco - Enterprise Security Monitoring.mp4 | 183.56MB BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 David Coursey - Sheep and Sheepdogs Employing EMET for Application Security.mp4 | 125.69MB BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Doug Burks - Security Onion Peeling Back the Layers of Your Network in Minutes.mp4 | 208.87MB BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Martin Holste - Not BigData, AnyData.mp4 | 146.42MB BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Mike Jones - Unconventional Methodologies to consider in Information Security.mp4 | 70.00MB BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Paul Coggin - Digital Energy BPT (Basic Persistent Threat).mp4 | 78.24MB BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Richard Bejtlich Keynote.mp4 | 189.15MB BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Ron Martin - Human Shields for your Network.mp4 | 82.84MB BSides Augusta/BSides Augusta 2013/BSidesAugusta 2013 Tim Tomes - Look Ma, No Exploits! - The Recon-ng Framework.mp4 | 100.80MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Chris Campbell - Using Microsofts Incident Response Language.mp4 | 148.77MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Chris Sanders - Defeating Cognitive Bias and Developing Analytic Technique.mp4 | 134.50MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Chris Sistrunk - ICS SCADA Defense.mp4 | 147.45MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Chris Truncer - Pentester++.mp4 | 132.12MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 David Dewey - App Wrapping What does that even mean.mp4 | 52.78MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Jacob Williams - Spying on your employees using memory.mp4 | 128.11MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Jeff Murri - Is that hardware in your toolkit, or are you just.mp4 | 164.67MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Mark Baggett - Crazy Sexy Hacking Outro.mp4 | 128.09MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Mark Baggett Welcome to BSidesAugusta.mp4 | 30.07MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Mike Reeves - Scaling Security Onion to the Enterprise.mp4 | 140.12MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Tim Crothers - Techniques for Fast Windows Investigations.mp4 | 116.94MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Tim Fowler - When Zombies take to the Airwaves.mp4 | 141.71MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Tim Tomes - The Adobe Guide to Keyless Decryption.mp4 | 126.52MB BSides Augusta/BSides Augusta 2014/BSidesAugusta 2014 Will Schroeder - Adventures in Asymmetric Warfare.mp4 | 74.85MB BSides Augusta/BSides Augusta 2015/00-Welcome-Major-General-Fogarty.mp4 | 73.26MB BSides Augusta/BSides Augusta 2015/01-Keynote-Ed-Skoudis.mp4 | 66.85MB BSides Augusta/BSides Augusta 2015/BT100-Fundamental-Understanding-of-Baseline-Analysis-and-Remediation-for-Industrial-Control-Systems-Juli-Joyner-and-Jeffrey-Medsger.mp4 | 78.39MB BSides Augusta/BSides Augusta 2015/BT101-Taking-a-Distributed-Computing-Approach-to-Network-Detection-with-Bro-and-aThe-Clouda-Mike-Reeves.mp4 | 213.23MB BSides Augusta/BSides Augusta 2015/BT102-A-A-Scouts-Perspective-on-Network-Defense-Justin-Edgar.mp4 | 176.87MB BSides Augusta/BSides Augusta 2015/BT103-Doomsday-Preppers-APT-Edition-Tanner-Payne.mp4 | 32.49MB BSides Augusta/BSides Augusta 2015/BT104-Building-a-Better-Security-Analyst-Using-Cognitive-Psychology-Chris-Sanders.mp4 | 38.68MB BSides Augusta/BSides Augusta 2015/BT105-Viper-Framework-for-Malware-Analysis-Paul-Melson.mp4 | 31.80MB BSides Augusta/BSides Augusta 2015/BT106-Infiltrating-C2-Infrastructure-Tim-Crothers.mp4 | 104.34MB BSides Augusta/BSides Augusta 2015/BT107-Building-aMuscle-Memory-with-Rekall-Memory-Forensic-Framework-Alissa-Torres.mp4 | 74.12MB BSides Augusta/BSides Augusta 2015/BT108-The-Blue-Team-Starter-Kit-Timothy-De-Block.mp4 | 54.42MB BSides Augusta/BSides Augusta 2015/BT200-Go-Hack-Yourself-Jason-Frank.mp4 | 63.18MB BSides Augusta/BSides Augusta 2015/BT201-2015-Its-not-over-yet-Joel-Esler.mp4 | 107.63MB BSides Augusta/BSides Augusta 2015/BT202-How-to-Get-Into-ICS-Security-Chris-Sistrunk.mp4 | 72.11MB BSides Augusta/BSides Augusta 2015/BT203-Destruction-as-a-Service-Security-Through-Reanimation-Jon-Medina.mp4 | 59.02MB BSides Augusta/BSides Augusta 2015/BT204-The-Programmatic-Evolution-of-Technology-Defense-Roland-Cloutier.mp4 | 63.60MB BSides Augusta/BSides Augusta 2015/BT205-Lessons-Learned-from-Analyzing-Terabytes-of-Malware-Wes-Widner.mp4 | 56.29MB BSides Augusta/BSides Augusta 2015/RT100-Using-a-HackRF-One-to-Infiltrate-the-Digital-Thetford-Wall-Patrick-Perry.mp4 | 57.23MB BSides Augusta/BSides Augusta 2015/RT101-Malvertizing-Like-a-Pro-Alex-Rymdeko-Harvey.mp4 | 63.37MB BSides Augusta/BSides Augusta 2015/RT102-Weaponizing-our-youth-The-Case-for-Integrated-Cyber-Ethics-Josh-Rykowski.mp4 | 46.09MB BSides Augusta/BSides Augusta 2015/RT103-Making-Everything-Old-New-Again-Andrew-Cole-and-Rich-Moulton.mp4 | 304.75MB BSides Augusta/BSides Augusta 2015/RT104-DIY-Vulnerability-Discovery-with-DLL-Side-Loading-Jake-Williams.mp4 | 69.16MB BSides Augusta/BSides Augusta 2015/RT105-Recon-ng-and-Beyond-Tim-Tomes.mp4 | 85.26MB BSides Augusta/BSides Augusta 2015/RT106-Attacking-OWASP-Exploiting-the-Top-10-David-Coursey.mp4 | 62.42MB BSides Augusta/BSides Augusta 2016/I Got You00 Using Honeypots for Network Security Monitoring Chris Sanders.mp4 | 70.12MB BSides Augusta/BSides Augusta 2016/I Got You01 This one weird trick will secure your web server David Coursey.mp4 | 24.96MB BSides Augusta/BSides Augusta 2016/I Got You01 This one weird trick will secure your web server David Coursey.srt | 22.02KB BSides Augusta/BSides Augusta 2016/I Got You02 This is not your Mommas Threat Intelligence Rob Gresham.mp4 | 29.30MB BSides Augusta/BSides Augusta 2016/I Got You02 This is not your Mommas Threat Intelligence Rob Gresham.srt | 22.39KB BSides Augusta/BSides Augusta 2016/I Got You03 Moving Target Defense Evasive Maneuvers in Cyberspace Adam Duby.mp4 | 28.82MB BSides Augusta/BSides Augusta 2016/I Got You03 Moving Target Defense Evasive Maneuvers in Cyberspace Adam Duby.srt | 30.11KB BSides Augusta/BSides Augusta 2016/I Got You04 Beyond Math Practical Security Analytics Martin Holste.mp4 | 50.27MB BSides Augusta/BSides Augusta 2016/I Got You04 Beyond Math Practical Security Analytics Martin Holste.srt | 55.35KB BSides Augusta/BSides Augusta 2016/I Got You05 Exploit Kits and Indicators of Compromise Brad Duncan.mp4 | 64.01MB BSides Augusta/BSides Augusta 2016/I Got You05 Exploit Kits and Indicators of Compromise Brad Duncan.srt | 48.96KB BSides Augusta/BSides Augusta 2016/I Got You06 ICS SCADA Threat Hunting Robert M Lee Jon Lavender.mp4 | 66.43MB BSides Augusta/BSides Augusta 2016/I Got You06 ICS SCADA Threat Hunting Robert M Lee Jon Lavender.srt | 87.31KB BSides Augusta/BSides Augusta 2016/I Got You07 Agilely Compliant yet Insecure Tom Ruff.mp4 | 42.70MB BSides Augusta/BSides Augusta 2016/I Got You07 Agilely Compliant yet Insecure Tom Ruff.srt | 41.29KB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here00 Gamification for the Win Josh Rykowski and Scott Hamilton.mp4 | 69.79MB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here01 IDSIPS Choices Benefits Drawback and Configurations ForgottenSec.mp4 | 36.76MB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here01 IDSIPS Choices Benefits Drawback and Configurations ForgottenSec.srt | 32.31KB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here02 Micro segmentation and Security The Way Forward Jack Koons.mp4 | 43.12MB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here02 Micro segmentation and Security The Way Forward Jack Koons.srt | 29.19KB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here03 Adventures in RAT dev Hunter Hardman.mp4 | 25.67MB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here03 Adventures in RAT dev Hunter Hardman.srt | 26.17KB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here04 Linux privilege escalation for fun profit and all around mischief Jake Willi.mp4 | 70.40MB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here04 Linux privilege escalation for fun profit and all around mischief Jake Willi.srt | 59.73KB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here05 How About a Piece of Pi Experiences with Robots and Raspberry Pi Hacking Joh.mp4 | 51.22MB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here05 How About a Piece of Pi Experiences with Robots and Raspberry Pi Hacking Joh.srt | 50.42KB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here06 Flaying out the Blockchain Ledger for Fun Profit and Hip Hop Andrew Morris.mp4 | 58.64MB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here06 Flaying out the Blockchain Ledger for Fun Profit and Hip Hop Andrew Morris.srt | 72.14KB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here07 Network Situational Awareness with Flow Data Jason Smith.mp4 | 73.28MB BSides Augusta/BSides Augusta 2016/Its Too Funky In Here07 Network Situational Awareness with Flow Data Jason Smith.srt | 74.46KB BSides Augusta/BSides Augusta 2016/Keynote Rob Joyce.mp4 | 62.05MB BSides Augusta/BSides Augusta 2016/Keynote Rob Joyce.srt | 45.72KB BSides Augusta/BSides Augusta 2016/Living In America00 A worm in the Apple examining OSX malware Wes Widner.mp4 | 68.63MB BSides Augusta/BSides Augusta 2016/Living In America00 A worm in the Apple examining OSX malware Wes Widner.srt | 52.76KB BSides Augusta/BSides Augusta 2016/Living In America01 You TOO can defend against MILLIONS of cyber attacks Michael Banks.mp4 | 42.76MB BSides Augusta/BSides Augusta 2016/Living In America01 You TOO can defend against MILLIONS of cyber attacks Michael Banks.srt | 29.10KB BSides Augusta/BSides Augusta 2016/Living In America02 Finding Evil in DNS Traffic Keelyn Roberts.mp4 | 23.37MB BSides Augusta/BSides Augusta 2016/Living In America02 Finding Evil in DNS Traffic Keelyn Roberts.srt | 23.23KB BSides Augusta/BSides Augusta 2016/Living In America03 Ransomware Threats to the Healthcare Industry Tim Gurganis.mp4 | 37.61MB BSides Augusta/BSides Augusta 2016/Living In America03 Ransomware Threats to the Healthcare Industry Tim Gurganis.srt | 35.42KB BSides Augusta/BSides Augusta 2016/Living In America04 Using Ransomware Against Itself Tim Crothers and Ryan Borres.mp4 | 64.08MB BSides Augusta/BSides Augusta 2016/Living In America04 Using Ransomware Against Itself Tim Crothers and Ryan Borres.srt | 50.34KB BSides Augusta/BSides Augusta 2016/Living In America05 Hunting Defense Against The Dark Arts Jacqueline Stokes Danny Akacki and Stephen.mp4 | 71.34MB BSides Augusta/BSides Augusta 2016/Living In America05 Hunting Defense Against The Dark Arts Jacqueline Stokes Danny Akacki and Stephen.srt | 70.65KB BSides Augusta/BSides Augusta 2016/Living In America06 Automating Malware Analysis for Threat Intelligence Paul Melson.mp4 | 74.42MB BSides Augusta/BSides Augusta 2016/Living In America06 Automating Malware Analysis for Threat Intelligence Paul Melson.srt | 51.39KB BSides Augusta/BSides Augusta 2016/Living In America07 Hide and Seek with EMET Jonathan Creekmore and Michael Edie.mp4 | 85.84MB BSides Augusta/BSides Augusta 2016/Living In America07 Hide and Seek with EMET Jonathan Creekmore and Michael Edie.srt | 56.71KB BSides Augusta/BSides Augusta 2016/Super Bad00 Mobile Hacking Aaron Guzman.mp4 | 73.85MB BSides Augusta/BSides Augusta 2016/Super Bad00 Mobile Hacking Aaron Guzman.srt | 63.89KB BSides Augusta/BSides Augusta 2016/Super Bad01 Incident Response Awakens Tom Webb.mp4 | 38.38MB BSides Augusta/BSides Augusta 2016/Super Bad01 Incident Response Awakens Tom Webb.srt | 30.29KB BSides Augusta/BSides Augusta 2016/Super Bad02 Dr Pentester or How I Learned To Stop Worrying and Love the Blue Team Ryan OHoro.mp4 | 52.84MB BSides Augusta/BSides Augusta 2016/Super Bad02 Dr Pentester or How I Learned To Stop Worrying and Love the Blue Team Ryan OHoro.srt | 33.21KB BSides Augusta/BSides Augusta 2016/Super Bad03 Exploit Kits Machine Learning Patrick Perry.mp4 | 38.12MB BSides Augusta/BSides Augusta 2016/Super Bad03 Exploit Kits Machine Learning Patrick Perry.srt | 32.82KB BSides Augusta/BSides Augusta 2016/Super Bad04 Detection of malicious capabilities using YARA Brian Bell.mp4 | 29.25MB BSides Augusta/BSides Augusta 2016/Super Bad04 Detection of malicious capabilities using YARA Brian Bell.srt | 14.40KB BSides Augusta/BSides Augusta 2016/Super Bad05 Owning MS Outlook with Powershell Andrew Cole.mp4 | 63.04MB BSides Augusta/BSides Augusta 2016/Super Bad05 Owning MS Outlook with Powershell Andrew Cole.srt | 62.33KB BSides Augusta/BSides Augusta 2016/Super Bad06 RAT Reusing Adversary Tradecraft Alexander Rymdeko Harvey.mp4 | 89.16MB BSides Augusta/BSides Augusta 2016/Super Bad06 RAT Reusing Adversary Tradecraft Alexander Rymdeko Harvey.srt | 71.50KB BSides Augusta/BSides Augusta 2016/Super Bad07 Internet of Terrible Brandon McCrillis.mp4 | 74.15MB BSides Augusta/BSides Augusta 2016/Super Bad07 Internet of Terrible Brandon McCrillis.srt | 52.08KB BSides Bordeaux/BSides Bordeaux logo.jpg | 31.57KB BSides Boston/BSides Boston Logo.jpg | 26.30KB BSides Boston/Boston BSides 2013/Alissa Torres Security BSides Boston 2013 - Sick Anti-Analysis Mechanisms From The Wild.mp4 | 128.28MB BSides Boston/Boston BSides 2013/Allison Nixon Brandon Levene Security BSides Boston 2013 - The Noob Persistent Threat.mp4 | 168.40MB BSides Boston/Boston BSides 2013/Andrew Clare Security BSides Boston 2013 - The Future Of Drones and the Impact On Infosec.mp4 | 173.17MB BSides Boston/Boston BSides 2013/Ben April Security BSides Boston 2013 - NFC I Don t Think It Means What You Think It Means.mp4 | 168.16MB BSides Boston/Boston BSides 2013/CJ Heres Security BSides Boston 2013 - Google TV The Next Generation.mp4 | 175.51MB BSides Boston/Boston BSides 2013/Closing Remarks Security BSides Boston 2013 - Closing and Ending.mp4 | 29.40MB BSides Boston/Boston BSides 2013/Dan Geer Security BSides Boston 2013 - Identity As Privacy.mp4 | 267.89MB BSides Boston/Boston BSides 2013/Dan Stolts Security BSides Boston 2013 - Cloudy Weather How Secure Is The Cloud.mp4 | 150.00MB BSides Boston/Boston BSides 2013/David Bressler Security BSides Boston 2013 - Maltego In The Enterprise.mp4 | 122.09MB BSides Boston/Boston BSides 2013/David Dumas Security BSides Boston 2013 - Security 101 For New Security Professionals.mp4 | 179.58MB BSides Boston/Boston BSides 2013/Deral Heiland Security BSides Boston 2013 - Plunder, Pillage and Print.mp4 | 186.87MB BSides Boston/Boston BSides 2013/Jeff Northrop Security BSides Boston 2013 - The State Of Privacy & Proper Planning For The Future.mp4 | 168.90MB BSides Boston/Boston BSides 2013/Joseph Cohen Security BSides Boston 2013 - Bluecat Netcat For Bluetooth.mp4 | 60.83MB BSides Boston/Boston BSides 2013/Josh Corman Security BSides Boston 2013 - Good Enough Isn t Anymore The Value of Hitting Rock Bottom.mp4 | 224.24MB BSides Boston/Boston BSides 2013/Keith Gilbert Security BSides Boston 2013 - Malformity.mp4 | 137.98MB BSides Boston/Boston BSides 2013/Macy Cronkite Security BSides Boston 2013 - Splunk.mp4 | 61.07MB BSides Boston/Boston BSides 2013/Oliver Day Security BSides Boston 2013 - Securing Change Call For Volunteers.mp4 | 90.75MB BSides Boston/Boston BSides 2013/Paul Braren Security BSides Boston 2013 - Build Your Own VMWare ESXi & Microsoft Hyper V-Lab At Home.mp4 | 155.95MB BSides Boston/Boston BSides 2013/Roy Wattanasin Security BSides Boston 2013 - Opening Remarks.mp4 | 6.99MB BSides Boston/Boston BSides 2013/Schuyler Towne Security BSides Boston 2013 - Unlucky In Locks.mp4 | 161.99MB BSides Boston/Boston BSides 2013/Walt Williams Security BSides Boston 2013 - Realistic Affordable & Quantitative Risk Management.mp4 | 153.80MB BSides Boston/Boston BSides 2014/Abusing Mobile Games Ming Chow Security BSides Boston 2014.mp4 | 138.22MB BSides Boston/Boston BSides 2014/Auditing all the things for smarter detection faster incident response Mark Thomas BSides Boston 14.mp4 | 88.23MB BSides Boston/Boston BSides 2014/Doomed to repeat, InfoSec s failure to learn from the past Jack Daniel Security BSides Boston 2014.mp4 | 229.44MB BSides Boston/Boston BSides 2014/Information Security Careers & Education Panel Security BSides Boston 2014.mp4 | 221.63MB BSides Boston/Boston BSides 2014/Next Generation Red Teaming Robert Wood Security BSides Boston 2014.mp4 | 184.70MB BSides Boston/Boston BSides 2014/Offensive Mobile Forensics Joey Peloquin Security BSides Boston 2014.mp4 | 159.79MB BSides Boston/Boston BSides 2014/Pwninstaller 1.0 Will Shroeder Security BSides Boston 2014.mp4 | 90.34MB BSides Boston/Boston BSides 2014/Target, Snowden, Heartbleed ... Oh my! Keynote by Rob Cheyne Security BSides Boston 2014.mp4 | 228.26MB BSides Boston/Boston BSides 2014/The Challenge of Natural Security Systems Rockie Brockway Security BSides Boston 2014.mp4 | 156.92MB BSides Boston/Boston BSides 2014/Using Hackers Own Methods & Tools to Defeat Persistent Adversaries Michael Davis BSides Boston 2014.mp4 | 177.99MB BSides Boston/Boston BSides 2014/Why You Should Give Up Online Social Networks Jason Ding Security BSides Boston 2014.mp4 | 166.57MB BSides Boston/Boston BSides 2015/100-Is-Threat-Modeling-for-Me-Robert-Hurlbut.mp4 | 69.78MB BSides Boston/Boston BSides 2015/101-Hacker-or-criminal-Repairing-the-reputation-of-the-infosec-community-Melanie-Ensign.mp4 | 66.75MB BSides Boston/Boston BSides 2015/102-Running-Away-from-Security-Web-App-Vulnerabilities-and-OSINT-Collide-Micah-Hoffman.mp4 | 65.28MB BSides Boston/Boston BSides 2015/103-Robots-Ninjas-Pirates-and-Building-an-Effective-Vulnerability-Management-Program-Paul-Asadoorian.mp4 | 68.78MB BSides Boston/Boston BSides 2015/104-Protect-Your-nKeys-to-the-Kingdomi-Securing-Against-the-Next-Inevitable-Cyberattack-Paul-Kozlov.mp4 | 321.29MB BSides Boston/Boston BSides 2015/105-In-pursuit-of-a-better-crypto-puzzle-Samuel-Erb.mp4 | 180.16MB BSides Boston/Boston BSides 2015/200-When-penguins-attack-Linuxs-role-in-the-malware-ecosystem-Chester-Wisniewski.mp4 | 70.13MB BSides Boston/Boston BSides 2015/201-The-Benefits-in-Externalizing-DMZ-as-a-Service-in-the-Cloud-Israel-Barak.mp4 | 77.92MB BSides Boston/Boston BSides 2015/202-Common-misconfigurations-that-lead-to-a-breach-Justin-Tharpe.mp4 | 55.09MB BSides Boston/Boston BSides 2015/203-Applying-Big-Data-technology-to-security-use-case-Max-Pevzner.mp4 | 77.17MB BSides Boston/Boston BSides 2015/204-Marketing-Theyre-not-all-Schmucks-Jen-Ellis-Josh-Feinblum.mp4 | 54.26MB BSides Boston/Boston BSides 2015/205-Next-Gen-Incident-Management-Building-out-a-Modern-Incident-Management-Capability-John-McDonald.mp4 | 79.85MB BSides Boston/Boston BSides 2015/BSides-Boston-2015-Closing.mp4 | 81.74MB BSides Boston/Boston BSides 2015/K00-The-Securitized-State-Where-it-came-from-where-its-going-what-can-be-done-about-it-Molly-Sauter.mp4 | 70.72MB BSides Calgary/BSides Calgary 2017/A closer look at Docker and Garden.en.transcribed.srt | 192.72KB BSides Calgary/BSides Calgary 2017/A closer look at Docker and Garden.mp4 | 102.65MB BSides Calgary/BSides Calgary 2017/Accidental Insider, How attackers target I.T. staff, how I.T staff make it easy.en.transcribed.srt | 152.29KB BSides Calgary/BSides Calgary 2017/Accidental Insider, How attackers target I.T. staff, how I.T staff make it easy.mp4 | 89.30MB BSides Calgary/BSides Calgary 2017/Adware's new upsell Malware.en.transcribed.srt | 87.37KB BSides Calgary/BSides Calgary 2017/Adware's new upsell Malware.mp4 | 53.01MB BSides Calgary/BSides Calgary 2017/Andrew Hay KeyNote BSides 2017.en.transcribed.srt | 161.54KB BSides Calgary/BSides Calgary 2017/Andrew Hay KeyNote BSides 2017.mp4 | 112.74MB BSides Calgary/BSides Calgary 2017/Attack of the Document Clones.en.transcribed.srt | 163.04KB BSides Calgary/BSides Calgary 2017/Attack of the Document Clones.mp4 | 80.51MB BSides Calgary/BSides Calgary 2017/Bluetooth that bites, BTLE unlocking.en.transcribed.srt | 85.60KB BSides Calgary/BSides Calgary 2017/Bluetooth that bites, BTLE unlocking.mp4 | 77.13MB BSides Calgary/BSides Calgary 2017/Bypassing of Self-Encrypting Drives - Techniques for Hackers and Forensic Investigators.en.transcribed.srt | 141.69KB BSides Calgary/BSides Calgary 2017/Bypassing of Self-Encrypting Drives - Techniques for Hackers and Forensic Investigators.mp4 | 82.10MB BSides Calgary/BSides Calgary 2017/Chet Wisniewski KeyNote BSides 2017.en.transcribed.srt | 169.43KB BSides Calgary/BSides Calgary 2017/Chet Wisniewski KeyNote BSides 2017.mp4 | 108.69MB BSides Calgary/BSides Calgary 2017/Chris Thompson MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt).en.transcribed.srt | 125.41KB BSides Calgary/BSides Calgary 2017/Chris Thompson MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt).mp4 | 84.25MB BSides Calgary/BSides Calgary 2017/Creating Realistic Cyber Security Policies for Industrial Control Systems, Lee Cysouw.en.transcribed.srt | 120.19KB BSides Calgary/BSides Calgary 2017/Creating Realistic Cyber Security Policies for Industrial Control Systems, Lee Cysouw.mp4 | 78.03MB BSides Calgary/BSides Calgary 2017/Dave Kennedy Understanding Offensive and Defense - Having a purple view on INFOSEC.en.transcribed.srt | 203.45KB BSides Calgary/BSides Calgary 2017/Dave Kennedy Understanding Offensive and Defense - Having a purple view on INFOSEC.mp4 | 91.04MB BSides Calgary/BSides Calgary 2017/David Lindner Dont Touch Me That Way.mp4 | 66.06MB BSides Calgary/BSides Calgary 2017/Deviant Elevator Hacking.en.transcribed.srt | 155.07KB BSides Calgary/BSides Calgary 2017/Deviant Elevator Hacking.mp4 | 107.36MB BSides Calgary/BSides Calgary 2017/Fergus Raphael WebDev (In)Security.en.transcribed.srt | 109.29KB BSides Calgary/BSides Calgary 2017/Fergus Raphael WebDev (In)Security.mp4 | 51.48MB BSides Calgary/BSides Calgary 2017/Hacking the Internet of Dongs.en.transcribed.srt | 155.19KB BSides Calgary/BSides Calgary 2017/Hacking the Internet of Dongs.mp4 | 106.65MB BSides Calgary/BSides Calgary 2017/Hunting Methodology A key to the labyrinth of network forensics.en.transcribed.srt | 112.53KB BSides Calgary/BSides Calgary 2017/Hunting Methodology A key to the labyrinth of network forensics.mp4 | 84.48MB BSides Calgary/BSides Calgary 2017/I Have a SIEM - How Do I Make It Useful.en.transcribed.srt | 193.20KB BSides Calgary/BSides Calgary 2017/I Have a SIEM - How Do I Make It Useful.mp4 | 103.24MB BSides Calgary/BSides Calgary 2017/IT vs OT -- Who Wins Who Loses.en.transcribed.srt | 111.00KB BSides Calgary/BSides Calgary 2017/IT vs OT -- Who Wins Who Loses.mp4 | 127.97MB BSides Calgary/BSides Calgary 2017/Jack Daniel Keynote Calgary BSides 2016.en.transcribed.srt | 96.37KB BSides Calgary/BSides Calgary 2017/Jack Daniel Keynote Calgary BSides 2016.mp4 | 141.39MB BSides Calgary/BSides Calgary 2017/Malware for busy people Nick Taylor.en.transcribed.srt | 96.76KB BSides Calgary/BSides Calgary 2017/Malware for busy people Nick Taylor.mp4 | 80.54MB BSides Calgary/BSides Calgary 2017/Michael Gale Openstack Security.en.transcribed.srt | 144.04KB BSides Calgary/BSides Calgary 2017/Michael Gale Openstack Security.mp4 | 65.00MB BSides Calgary/BSides Calgary 2017/Michael Spaling Sniffing 3 million passwords.mp4 | 95.59MB BSides Calgary/BSides Calgary 2017/Milind Bhargava Lighting up the Canadian darknet financially.en.transcribed.srt | 73.53KB BSides Calgary/BSides Calgary 2017/Milind Bhargava Lighting up the Canadian darknet financially.mp4 | 50.56MB BSides Calgary/BSides Calgary 2017/OpenStack - An Introduction to Micro-Segmentation and Neutron SFC.en.transcribed.srt | 56.42KB BSides Calgary/BSides Calgary 2017/OpenStack - An Introduction to Micro-Segmentation and Neutron SFC.mp4 | 39.31MB BSides Calgary/BSides Calgary 2017/Prepping for a career in infosec.en.transcribed.srt | 140.05KB BSides Calgary/BSides Calgary 2017/Prepping for a career in infosec.mp4 | 89.54MB BSides Calgary/BSides Calgary 2017/Richard Sillito Simplified Security Devops.en.transcribed.srt | 93.44KB BSides Calgary/BSides Calgary 2017/Richard Sillito Simplified Security Devops.mp4 | 69.85MB BSides Calgary/BSides Calgary 2017/Securing Active Directory in the Enterprise.en.transcribed.srt | 175.81KB BSides Calgary/BSides Calgary 2017/Securing Active Directory in the Enterprise.mp4 | 118.69MB BSides Calgary/BSides Calgary 2017/Securing your ICS with Defense in Depth and Deep Packet Inspection.en.transcribed.srt | 101.56KB BSides Calgary/BSides Calgary 2017/Securing your ICS with Defense in Depth and Deep Packet Inspection.mp4 | 83.55MB BSides Calgary/BSides Calgary 2017/Seth Jaffe Incident Response, lessons from Nasa.en.transcribed.srt | 168.48KB BSides Calgary/BSides Calgary 2017/Seth Jaffe Incident Response, lessons from Nasa.mp4 | 120.30MB BSides Calgary/BSides Calgary 2017/SniffAir, a wireless security framework.en.transcribed.srt | 73.10KB BSides Calgary/BSides Calgary 2017/SniffAir, a wireless security framework.mp4 | 59.11MB BSides Calgary/BSides Calgary 2017/Steve Mathezer We dont need a better mouse trap.en.transcribed.srt | 140.93KB BSides Calgary/BSides Calgary 2017/Steve Mathezer We dont need a better mouse trap.mp4 | 77.14MB BSides Calgary/BSides Calgary 2017/TCP Modbus Missile Launcher.en.transcribed.srt | 7.37KB BSides Calgary/BSides Calgary 2017/TCP Modbus Missile Launcher.mp4 | 11.04MB BSides Calgary/BSides Calgary 2017/The Air Goes In and Out, the Blood Goes Round and Round. Organizing Incident Response..en.transcribed.srt | 125.12KB BSides Calgary/BSides Calgary 2017/The Air Goes In and Out, the Blood Goes Round and Round. Organizing Incident Response..mp4 | 72.45MB BSides Calgary/BSides Calgary 2017/Timmons Security in innovation.en.transcribed.srt | 136.51KB BSides Calgary/BSides Calgary 2017/Timmons Security in innovation.mp4 | 103.54MB BSides Calgary/BSides Calgary 2017/Understanding A Malware's On-Demand Polymorphic Code.en.transcribed.srt | 69.06KB BSides Calgary/BSides Calgary 2017/Understanding A Malware's On-Demand Polymorphic Code.mp4 | 58.26MB BSides Calgary/BSides Calgary 2017/Using Netflow & Open Source Tools for Network Behavioral Analysis.en.transcribed.srt | 116.30KB BSides Calgary/BSides Calgary 2017/Using Netflow & Open Source Tools for Network Behavioral Analysis.mp4 | 75.43MB BSides Calgary/BSides Calgary Logo.jpg | 34.45KB BSides Cape Town/BSidesCapeTown 2015 Automating the process of mapping and compromising networks.mp4 | 57.56MB BSides Cape Town/BSidesCapeTown 2015 Hack all the things - Exploiting and fixing IoT.mp4 | 104.64MB BSides Cape Town/BSidesCapeTown 2015 Hacker Jeopardy.mp4 | 31.45MB BSides Cape Town/BSidesCapeTown 2015 Ode to the Node.mp4 | 44.66MB BSides Cape Town/BSidesCapeTown 2015 Overview of Mobile Security.mp4 | 56.41MB BSides Cape Town/BSidesCapeTown 2015 Running a Secure Tor Hidden Service.mp4 | 108.21MB BSides Cape Town/BSidesCapeTown 2015 Sharepoint Hacking.mp4 | 41.32MB BSides Charleston South Carolina/BSidesCHS 2013/BSidesCHS 2013 - Session 01 - Passive Recon.mp4 | 82.98MB BSides Charleston South Carolina/BSidesCHS 2013/BSidesCHS 2013 - Session 02 - Java Shellcode Execution.mp4 | 128.53MB BSides Charleston South Carolina/BSidesCHS 2013/BSidesCHS 2013 - Session 03 - Waging War on an Entire City.mp4 | 1.62GB BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Allow myself to encrypt...myself! - Evan Davison.mp4 | 137.18MB BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Ballin on a Budget - Andrew Morris.mp4 | 84.71MB BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Building an Open Source Threat Intelligence Program - Edward McCabe.mp4 | 157.77MB BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Just Apply the Patch - Robert Wessen.mp4 | 72.50MB BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Keynote Speaker - Jason Street.mp4 | 450.72MB BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 Keynote Speaker - Kizz Myanthia.mp4 | 136.79MB BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 WUDS You Say SmartAssPhone - Frank Catucci.mp4 | 136.97MB BSides Charleston South Carolina/BSidesCHS 2014/BSidesCHS 2014 When a Security Architect Writes an Application - David Zendzian.mp4 | 342.50MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Building Burp Extensions - Jason Gillam.en.transcribed.srt | 79.20KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Building Burp Extensions - Jason Gillam.mp4 | 80.89MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Exploiting Mass Emergency Notification Systems - Evan Davison.en.transcribed.srt | 96.22KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Exploiting Mass Emergency Notification Systems - Evan Davison.mp4 | 83.62MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 FAIL-in-Depth - Marcus J. Carey.en.transcribed.srt | 86.64KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 FAIL-in-Depth - Marcus J. Carey.mp4 | 76.78MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Get-Help An intro to Powershell and how to use it for evil.en.transcribed.srt | 110.96KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Get-Help An intro to Powershell and how to use it for evil.mp4 | 93.59MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Hacking Web Apps - Brent White & Tim Roberts.en.transcribed.srt | 124.29KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Hacking Web Apps - Brent White & Tim Roberts.mp4 | 90.36MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 How to pen-test off the grid...and in the middle of the Pacific.en.transcribed.srt | 61.03KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 How to pen-test off the grid...and in the middle of the Pacific.mp4 | 64.88MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Internet of Things Hacking - Jason Davison.en.transcribed.srt | 52.52KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Internet of Things Hacking - Jason Davison.mp4 | 49.29MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Software Vulnerability Discovery and Exploitation During Red Team Assessments.en.transcribed.srt | 93.63KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Software Vulnerability Discovery and Exploitation During Red Team Assessments.mp4 | 50.17MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 The State of Information Security Today - Jeff Man.en.transcribed.srt | 128.37KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 The State of Information Security Today - Jeff Man.mp4 | 110.61MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 You spent $20k & a throw away email can have full recon on your network.en.transcribed.srt | 127.63KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 You spent $20k & a throw away email can have full recon on your network.mp4 | 75.01MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Infosec (Cyber Security) We're Doing It Wrong - Bill Gardner.en.transcribed.srt | 54.98KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Infosec (Cyber Security) We're Doing It Wrong - Bill Gardner.mp4 | 41.83MB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Kevin Johnson.en.transcribed.srt | 103.79KB BSides Charleston South Carolina/BSidesCHS 2015/BSidesCHS 2015 Keynote Kevin Johnson.mp4 | 66.47MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Adding PowerShell to your Arsenal with PSAttack - Jared Haight.en.transcribed.srt | 114.64KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Adding PowerShell to your Arsenal with PSAttack - Jared Haight.mp4 | 91.06MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Anonymize Me A Technician's Guide to Hiding from the Internet - Ralph Collum.en.transcribed.srt | 152.39KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Anonymize Me A Technician's Guide to Hiding from the Internet - Ralph Collum.mp4 | 97.66MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Black Box FISMA-based SCA of Public Cloud (IaaS) Providers - Gerald Auger.en.transcribed.srt | 94.00KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Black Box FISMA-based SCA of Public Cloud (IaaS) Providers - Gerald Auger.mp4 | 83.58MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Do We Still Need Pen Testing - Jeff Man.en.transcribed.srt | 75.39KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Do We Still Need Pen Testing - Jeff Man.mp4 | 79.55MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hacking Young Minds How to get Students interested in Infosec - Bryan Rhodes.en.transcribed.srt | 111.58KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hacking Young Minds How to get Students interested in Infosec - Bryan Rhodes.mp4 | 112.52MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hunting High-Value Targets in Corporate Networks - Patrick Fussell & Josh Stone.en.transcribed.srt | 116.45KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Hunting High-Value Targets in Corporate Networks - Patrick Fussell & Josh Stone.mp4 | 77.83MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Mon'Amie XXE - Leo Pate.en.transcribed.srt | 79.86KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Mon'Amie XXE - Leo Pate.mp4 | 66.28MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 OMNOMNOM A Newbie Chick's Take on InfoSec - April M. Jones.en.transcribed.srt | 39.31KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 OMNOMNOM A Newbie Chick's Take on InfoSec - April M. Jones.mp4 | 93.68MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Shellcoding basics - Max Harley.en.transcribed.srt | 83.67KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Shellcoding basics - Max Harley.mp4 | 59.42MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Alma Doesn't Fall Far From the Tree - Jason Davison & King Salemo.en.transcribed.srt | 124.64KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Alma Doesn't Fall Far From the Tree - Jason Davison & King Salemo.mp4 | 145.74MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Hacker Evolution What have we become - Jason Gillam.en.transcribed.srt | 70.60KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 The Hacker Evolution What have we become - Jason Gillam.mp4 | 74.78MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Weaponize JS Making the most of XSS opportunities - Mic Whitehorn-Gillam.en.transcribed.srt | 65.54KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Weaponize JS Making the most of XSS opportunities - Mic Whitehorn-Gillam.mp4 | 57.93MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 What I learned being an OSINT creeper - Josh Huff.en.transcribed.srt | 74.35KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 What I learned being an OSINT creeper - Josh Huff.mp4 | 43.48MB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Keynote - Joseph Opacki.en.transcribed.srt | 112.35KB BSides Charleston South Carolina/BSidesCHS 2016/BSidesCHS 2016 Keynote - Joseph Opacki.mp4 | 53.22MB BSides Charleston South Carolina/BSidesCHS 2017/BSides CHS 2017 Keynote Presentation by Jack Daniel.en.transcribed.srt | 93.00KB BSides Charleston South Carolina/BSidesCHS 2017/BSides CHS 2017 Keynote Presentation by Jack Daniel.mp4 | 64.62MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Are you ready by Jason Kent.en.transcribed.srt | 130.21KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Are you ready by Jason Kent.mp4 | 79.63MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Becoming a Cyber Warrior by Ralph Collum.en.transcribed.srt | 156.56KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Becoming a Cyber Warrior by Ralph Collum.mp4 | 105.01MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Deny All, application white-listing on Mac and Windows by Valentine Reid.en.transcribed.srt | 105.64KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Deny All, application white-listing on Mac and Windows by Valentine Reid.mp4 | 88.77MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Hacking the ROI How to maximize your value from a Pentest by Mike Hodges.en.transcribed.srt | 76.57KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Hacking the ROI How to maximize your value from a Pentest by Mike Hodges.mp4 | 63.46MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Learning to Firewalk Low to no cost resources to get into infosec by Bryan Austin.en.transcribed.srt | 102.48KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Learning to Firewalk Low to no cost resources to get into infosec by Bryan Austin.mp4 | 94.44MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Poor Usability The Mother of Invention... by Christopher Hudel.en.transcribed.srt | 133.58KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Poor Usability The Mother of Invention... by Christopher Hudel.mp4 | 204.99MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Quick Wins To Enhance Your Active Directory Security by Eric Kuehn.en.transcribed.srt | 103.17KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Quick Wins To Enhance Your Active Directory Security by Eric Kuehn.mp4 | 74.46MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Realtime OSINT Tracking the Escaped Georgia Fugitives by Josh Huff.en.transcribed.srt | 57.16KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 Realtime OSINT Tracking the Escaped Georgia Fugitives by Josh Huff.mp4 | 38.91MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 RevEng All the IOTs by Gerald Auger, Tyler Flaagan, & Cory Nance.en.transcribed.srt | 111.83KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 RevEng All the IOTs by Gerald Auger, Tyler Flaagan, & Cory Nance.mp4 | 81.56MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 SOS from pirates of the high sea to those of high finance by Francois Dion.en.transcribed.srt | 94.85KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 SOS from pirates of the high sea to those of high finance by Francois Dion.mp4 | 97.69MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 What Up Breaches by Frank Catucci - YouTube.en.transcribed.srt | 112.42KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 What Up Breaches by Frank Catucci - YouTube.mp4 | 87.67MB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 ‘Weaponizing Ansible by Christopher Grimm.en.transcribed.srt | 145.38KB BSides Charleston South Carolina/BSidesCHS 2017/BSidesCHS 2017 ‘Weaponizing Ansible by Christopher Grimm.mp4 | 73.80MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 Closing.mp4 | 56.21MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T100 Keynote Rob M Lee.mp4 | 84.82MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T101 Clean up on Aisle APT Mark Parsons.mp4 | 31.67MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T102 Frony Fronius Exploring Zigbee signals from Solar City Jose Fernandez.mp4 | 31.99MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T103 The Not So Same Origin Policy David Petty.mp4 | 23.68MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T104 IoT Pressure Cooker What Could Go Wrong Ben Actis.mp4 | 28.57MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T105 I Went Phishing and Caught a Charge Maryland Law for Pentesters Joshua Rosenbl.mp4 | 74.55MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T106 Imposter Syndrome I Dont Feel Like Who You Think I Am Micah Hoffma.mp4 | 27.05MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T107 SOC Panel Keynote.mp4 | 202.82MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T108 Keynote Jim Christy.mp4 | 87.41MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T109 Red Teaming the Board Robert Wood.mp4 | 65.34MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T110 Understanding the Cybersecurity Act of 2015 Jeff Kosseff.mp4 | 60.78MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T111 Microsoft Patch Analysis for Exploitation Stephen Sims.mp4 | 90.17MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T112 Arming Small Security Programs Network Baseline Generation and Alerts with Bro.mp4 | 47.37MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T201 Weaponizing Splunk Using Blue Teams for Evil Ryan Hays.mp4 | 23.82MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T202 Current State of Virtualizing Network Monitoring Daniel Lohin Ed Sealing.mp4 | 32.00MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T203 OPSEC for the Security Practictioner Michael Clayberg.mp4 | 29.94MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T204 Automating Bulk Intelligence Collection Gita Ziabari.mp4 | 37.71MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T205 The Battle for OSINT Are you Team GUI or Team Command Line Tracy Z Maleeff Joe.mp4 | 41.32MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T206 The AVATAR Project and You da667.mp4 | 57.99MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T207 Threat Hunting Thinking About Tomorrow Tazz.mp4 | 92.23MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T208 Detecting the Elusive Active Directory Threat Hunting Sean Metcalf.mp4 | 35.37MB BSides Charm/BSides Charm 2017/BSidesCharm 2017 T209 The Cryptography of Edgar Allan Poe Robert Weiss pwcrack.mp4 | 72.99MB BSides Charm/BSides Charm 2018/Track 1 00 Keynote Jessica Payne.en.transcribed.srt | 171.75KB BSides Charm/BSides Charm 2018/Track 1 00 Keynote Jessica Payne.mp4 | 68.64MB BSides Charm/BSides Charm 2018/Track 1 01 To AI or Not to AI What the US Military Needs for Fighting Cyber Wars Ernest Wong.en.transcribed.srt | 18.14KB BSides Charm/BSides Charm 2018/Track 1 01 To AI or Not to AI What the US Military Needs for Fighting Cyber Wars Ernest Wong.mp4 | 33.07MB BSides Charm/BSides Charm 2018/Track 1 02 FailTime Failing towards Success Sean Metcalf.en.transcribed.srt | 133.12KB BSides Charm/BSides Charm 2018/Track 1 02 FailTime Failing towards Success Sean Metcalf.mp4 | 44.20MB BSides Charm/BSides Charm 2018/Track 1 03 Basic Offensive Application of MOF Files in Scripting Devon Bordonaro.en.transcribed.srt | 45.82KB BSides Charm/BSides Charm 2018/Track 1 03 Basic Offensive Application of MOF Files in Scripting Devon Bordonaro.mp4 | 23.42MB BSides Charm/BSides Charm 2018/Track 1 04 Counting Down to Skynet Nolan Hedglin.en.transcribed.srt | 72.49KB BSides Charm/BSides Charm 2018/Track 1 04 Counting Down to Skynet Nolan Hedglin.mp4 | 29.61MB BSides Charm/BSides Charm 2018/Track 1 05 How we reverse engineered OSXPirrit got legal threats and survived Amit Serper.en.transcribed.srt | 146.95KB BSides Charm/BSides Charm 2018/Track 1 05 How we reverse engineered OSXPirrit got legal threats and survived Amit Serper.mp4 | 69.28MB BSides Charm/BSides Charm 2018/Track 1 06 Quantify your hunt not your parents red teaming Devon Kerr.en.transcribed.srt | 175.34KB BSides Charm/BSides Charm 2018/Track 1 06 Quantify your hunt not your parents red teaming Devon Kerr.mp4 | 58.86MB BSides Charm/BSides Charm 2018/Track 1 07 Internet Anarchy The Global March toward Data Localization Andrea Little Limbago.en.transcribed.srt | 102.55KB BSides Charm/BSides Charm 2018/Track 1 07 Internet Anarchy The Global March toward Data Localization Andrea Little Limbago.mp4 | 31.24MB BSides Charm/BSides Charm 2018/Track 1 08 Effective Monitoring for Operational Security Russell Mosley Ryan St Germain.en.transcribed.srt | 69.05KB BSides Charm/BSides Charm 2018/Track 1 08 Effective Monitoring for Operational Security Russell Mosley Ryan St Germain.mp4 | 30.18MB BSides Charm/BSides Charm 2018/Track 1 10 Between a SOC and a Hard Place Shawn Thomas Andrew Marini James Callahan Dustin Shirley.en.transcribed.srt | 186.93KB BSides Charm/BSides Charm 2018/Track 1 10 Between a SOC and a Hard Place Shawn Thomas Andrew Marini James Callahan Dustin Shirley.mp4 | 84.13MB BSides Charm/BSides Charm 2018/Track 1 11 Using Atomic Red Team to Test Endpoint Solutions Adam Mathis.en.transcribed.srt | 120.77KB BSides Charm/BSides Charm 2018/Track 1 11 Using Atomic Red Team to Test Endpoint Solutions Adam Mathis.mp4 | 41.33MB BSides Charm/BSides Charm 2018/Track 1 12 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Myers Barrett Adams.en.transcribed.srt | 36.32KB BSides Charm/BSides Charm 2018/Track 1 12 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Myers Barrett Adams.mp4 | 35.65MB BSides Charm/BSides Charm 2018/Track 1 13 Closing Ceremonies.en.transcribed.srt | 41.81KB BSides Charm/BSides Charm 2018/Track 1 13 Closing Ceremonies.mp4 | 57.52MB BSides Charm/BSides Charm 2018/Track 2 00 Preparing for Incident Handling and Response within Industrial Control Networks Mark Stac.en.transcribed.srt | 63.37KB BSides Charm/BSides Charm 2018/Track 2 00 Preparing for Incident Handling and Response within Industrial Control Networks Mark Stac.mp4 | 40.35MB BSides Charm/BSides Charm 2018/Track 2 01 Getting Saucy with APFS The State of Apples New File System Sarah Edwards.en.transcribed.srt | 140.85KB BSides Charm/BSides Charm 2018/Track 2 01 Getting Saucy with APFS The State of Apples New File System Sarah Edwards.mp4 | 84.63MB BSides Charm/BSides Charm 2018/Track 2 02 An Open Source Malware Classifier and Dataset Phil Roth.en.transcribed.srt | 95.83KB BSides Charm/BSides Charm 2018/Track 2 02 An Open Source Malware Classifier and Dataset Phil Roth.mp4 | 59.34MB BSides Charm/BSides Charm 2018/Track 2 03 Threat Activity Attribution Differentiating the Who from the How Joe Slowik.en.transcribed.srt | 180.13KB BSides Charm/BSides Charm 2018/Track 2 03 Threat Activity Attribution Differentiating the Who from the How Joe Slowik.mp4 | 90.88MB BSides Charm/BSides Charm 2018/Track 2 05 Powershell Deobfuscation Putting the toothpaste back in the tube Daniel Grant.en.transcribed.srt | 76.58KB BSides Charm/BSides Charm 2018/Track 2 05 Powershell Deobfuscation Putting the toothpaste back in the tube Daniel Grant.mp4 | 45.88MB BSides Charm/BSides Charm 2018/Track 2 06 Plight at the end of the Tunnel Anjum Ahuja.en.transcribed.srt | 61.47KB BSides Charm/BSides Charm 2018/Track 2 06 Plight at the end of the Tunnel Anjum Ahuja.mp4 | 34.39MB BSides Charm/BSides Charm 2018/Track 2 07 Malware Analysis and Automation using Binary Ninja Erika Noerenberg.en.transcribed.srt | 139.71KB BSides Charm/BSides Charm 2018/Track 2 07 Malware Analysis and Automation using Binary Ninja Erika Noerenberg.mp4 | 67.14MB BSides Charm/BSides Charm 2018/Track 2 08 Exercise Your SOC How to run an effective SOC response simulation Brian Andrzejewski.en.transcribed.srt | 91.68KB BSides Charm/BSides Charm 2018/Track 2 08 Exercise Your SOC How to run an effective SOC response simulation Brian Andrzejewski.mp4 | 52.43MB BSides Charm/BSides Charm 2018/Track 2 09 Building a Predictive Pipeline to Rapidly Detect Phishing Domains Wes Connell.en.transcribed.srt | 112.49KB BSides Charm/BSides Charm 2018/Track 2 09 Building a Predictive Pipeline to Rapidly Detect Phishing Domains Wes Connell.mp4 | 80.79MB BSides Charm/BSides Charm 2018/fixed2 Track 1 09 Rise of the Miners Josh Grunzweig.en.transcribed.srt | 129.48KB BSides Charm/BSides Charm 2018/fixed2 Track 1 09 Rise of the Miners Josh Grunzweig.mp4 | 52.91MB BSides Chicago/BSides Chicago 2014/Aligning Threats and Allies through Stories J Wolfgang Goerlich and Steven Fox.mp4 | 124.80MB BSides Chicago/BSides Chicago 2014/Bioinformatics Erasing the line between biology and hacking Krystal Thomas White and Patrick Thomas.mp4 | 113.83MB BSides Chicago/BSides Chicago 2014/Building an AppSec Program from Scratch Chris Pfoutz.mp4 | 44.81MB BSides Chicago/BSides Chicago 2014/Bypassing EMET 41 Jared DeMott.mp4 | 47.22MB BSides Chicago/BSides Chicago 2014/Call of Community Modern Warfare Matt Johnson & Ben Ten.mp4 | 72.22MB BSides Chicago/BSides Chicago 2014/Checklist Pentesting; Not checklist hacking Trenton Ivey.mp4 | 188.35MB BSides Chicago/BSides Chicago 2014/Checklist Pentesting_ Not checklist hacking Trenton Ivey.mp4 | 67.89MB BSides Chicago/BSides Chicago 2014/Comparing Risks to Risks Why Asset Management Is Broken and How to Fix It Michael Roytman.mp4 | 143.81MB BSides Chicago/BSides Chicago 2014/Everything I Ever Needed to Know About Infosec I Learned from Hollywood Tom Ervin.mp4 | 53.83MB BSides Chicago/BSides Chicago 2014/Hacking Diversity in InfoSec Greg Thomas.mp4 | 86.01MB BSides Chicago/BSides Chicago 2014/How To Win Friends and Influence Hackers Jimmy Vo.mp4 | 39.45MB BSides Chicago/BSides Chicago 2014/InfoSec Big Joke 3rd Party Assessments moey.mp4 | 61.68MB BSides Chicago/BSides Chicago 2014/Looking for the Weird Charles Herring.mp4 | 73.58MB BSides Chicago/BSides Chicago 2014/Minecraft Security Riese Goerlich.mp4 | 42.88MB BSides Chicago/BSides Chicago 2014/Seeing Purple Hybrid Security Teams for the Enterprise Belt.mp4 | 43.15MB BSides Chicago/BSides Chicago 2014/Sit stay proxy Good beagle Why I love the beaglebone black and why you should too Colin Vallance.mp4 | 55.36MB BSides Chicago/BSides Chicago 2014/The SMB Security Gap Mike Kavka.mp4 | 59.07MB BSides Chicago/BSides Chicago 2014/The Ultimate INFOSEC Interview Why must I be surrounded by frickin idiots Dr Evil 1997 Stephen Heath.mp4 | 172.07MB BSides Chicago/BSides Chicago 2014/closing.mp4 | 85.60MB BSides Chicago/BSides Chicago 2014/intro.mp4 | 32.71MB BSides Chicago/BSides Chicago 2014/jail.mp4 | 698.64KB BSides Cincinnati/BSides Cincinnati Logo.jpg | 21.06KB BSides Cincinnati/Bsides Cincinnati 2014/BSides Cincinnati Dave Kennedy, TrustedSec - @HackingDave - Pwning Eduction and Awareness.en.transcribed.srt | 155.07KB BSides Cincinnati/Bsides Cincinnati 2014/BSides Cincinnati Dave Kennedy, TrustedSec - @HackingDave - Pwning Eduction and Awareness.mp4 | 208.02MB BSides Cincinnati/Bsides Cincinnati 2014/BSides Cincinnati Nate Hausrath, GE - @magicked - Creeping with VirusTotal.en.transcribed.srt | 129.91KB BSides Cincinnati/Bsides Cincinnati 2014/BSides Cincinnati Nate Hausrath, GE - @magicked - Creeping with VirusTotal.mp4 | 79.07MB BSides Cincinnati/Bsides Cincinnati 2015/BsidesCincy-2015-00-Welcome-and-Introduction-Josh-Ohmer-President-BSidesCincy.mp4 | 12.37MB BSides Cincinnati/Bsides Cincinnati 2015/BsidesCincy-2015-01-Lateral-Movement-Harlan-Carvey.mp4 | 343.31MB BSides Cincinnati/Bsides Cincinnati 2015/BsidesCincy-2015-02-Automated-Detection-Strategies-John-Davison.mp4 | 64.85MB BSides Cincinnati/Bsides Cincinnati 2015/BsidesCincy-2015-03-Powershell-for-Incident-Responders-Jesse-Lands.mp4 | 63.45MB BSides Cincinnati/Bsides Cincinnati 2015/BsidesCincy-2015-04-Cyber-Intelligence-Concrete-Analysis-in-a-Fluid-World-Coleman-Kane.mp4 | 77.73MB BSides Cincinnati/Bsides Cincinnati 2015/BsidesCincy-2015-05-The-Response-Ready-Infrastructure-Justin-Hall.mp4 | 69.91MB BSides Cincinnati/Bsides Cincinnati 2015/BsidesCincy-2015-06-A-Distributed-Computing-Approach-for-Network-Detection-Mike-Reeves.mp4 | 64.46MB BSides Cincinnati/Bsides Cincinnati 2015/BsidesCincy-2015-07-The-Value-of-a-Simple-DLP-Program-Chris-Tyo.mp4 | 57.65MB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 1 00 PM - Scott Roberts - Incident Response Tools You've Never Heard of.en.transcribed.srt | 88.32KB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 1 00 PM - Scott Roberts - Incident Response Tools You've Never Heard of.mp4 | 104.34MB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 10 00 AM - Liam Randall - Keynote.en.transcribed.srt | 128.36KB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 10 00 AM - Liam Randall - Keynote.mp4 | 112.57MB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 11 00 AM - Warren Kopp - Threat Modeling, What and How.en.transcribed.srt | 79.46KB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 11 00 AM - Warren Kopp - Threat Modeling, What and How.mp4 | 76.60MB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 2 00 PM - Nate Hausrath - How to Build an Intelligence Program.en.transcribed.srt | 150.37KB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 2 00 PM - Nate Hausrath - How to Build an Intelligence Program.mp4 | 161.27MB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 3 00 PM - Mark Stockman - The Burgeoning Cybersecurity Discipline.en.transcribed.srt | 83.08KB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 3 00 PM - Mark Stockman - The Burgeoning Cybersecurity Discipline.mp4 | 78.91MB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 4 00 PM - Coleman Kane - Malware Analysis on a Budget.en.transcribed.srt | 137.66KB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 4 00 PM - Coleman Kane - Malware Analysis on a Budget.mp4 | 126.75MB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 5 00 PM - Mark Jeanmougin - Your 8 Char AD Password is Strong Enough.en.transcribed.srt | 90.34KB BSides Cincinnati/Bsides Cincinnati 2016/BSides Cincinnati 2016 - 5 00 PM - Mark Jeanmougin - Your 8 Char AD Password is Strong Enough.mp4 | 107.82MB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 - 1 00 PM - Joe Gray Caroline Stephens - Data Carvey.en.transcribed.srt | 124.85KB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 - 1 00 PM - Joe Gray Caroline Stephens - Data Carvey.mp4 | 196.66MB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 - 10 00 AM - Chris Sanders - Keynote.en.transcribed.srt | 199.50KB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 - 10 00 AM - Chris Sanders - Keynote.mp4 | 211.74MB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 - 11 00 AM - Sean Whalen - Practical Defense.en.transcribed.srt | 87.64KB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 - 11 00 AM - Sean Whalen - Practical Defense.mp4 | 142.62MB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 - 2 00 PM - Andy Thompson - Defending Advanced Attacks w IAM Best Practices.en.transcribed.srt | 120.66KB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 - 2 00 PM - Andy Thompson - Defending Advanced Attacks w IAM Best Practices.mp4 | 148.87MB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 3 00 PM - Doug Burns Nik Whitis -The Case for Password Auditing in Enterprise.en.transcribed.srt | 171.81KB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 3 00 PM - Doug Burns Nik Whitis -The Case for Password Auditing in Enterprise.mp4 | 218.98MB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 4 00 PM - Michael Wolf - Mithören Device for Wireless Peripheral Testing.en.transcribed.srt | 79.17KB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 4 00 PM - Michael Wolf - Mithören Device for Wireless Peripheral Testing.mp4 | 126.74MB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 5 00 PM - Mike Schladt Chris Boettcher Andrew Plunkett - Hashbrowns & BAGELS.en.transcribed.srt | 204.11KB BSides Cincinnati/Bsides Cincinnati 2017/BSides Cincinnati 2017 5 00 PM - Mike Schladt Chris Boettcher Andrew Plunkett - Hashbrowns & BAGELS.mp4 | 251.34MB BSides Cleveland/BSides Cleveland 2014/APT2 Building a Resiliency Program to Protect Business Edward McCabe.mp4 | 86.98MB BSides Cleveland/BSides Cleveland 2014/Am I an Imposter Warren Kopp.mp4 | 63.87MB BSides Cleveland/BSides Cleveland 2014/Attacking and Defending Full Disk Encryption Tom Kopchak.mp4 | 147.98MB BSides Cleveland/BSides Cleveland 2014/Cleveland Locksport Jeff Moss Doug Hiwiller and Damon Ramsey.mp4 | 66.74MB BSides Cleveland/BSides Cleveland 2014/Dave Kennedy and Mentos.mp4 | 6.83MB BSides Cleveland/BSides Cleveland 2014/Fun with Dr Brown Spencer McIntyre.mp4 | 67.68MB BSides Cleveland/BSides Cleveland 2014/Hacking Diversity Gregorie Thomas.mp4 | 65.83MB BSides Cleveland/BSides Cleveland 2014/Keynote Dave Kennedy.mp4 | 102.46MB BSides Cleveland/BSides Cleveland 2014/Lockade Locksport Electronic Games Adrian Crenshaw.mp4 | 163.64MB BSides Cleveland/BSides Cleveland 2014/Malware Evolution Epidemiology Adam Hogan.mp4 | 120.00MB BSides Cleveland/BSides Cleveland 2014/Password Defense Controls your users wont hate Nathaniel Maier.mp4 | 67.94MB BSides Cleveland/BSides Cleveland 2014/Pentesting Layers 2 and 3 Kevin Gennuso and Eric Mikulas.mp4 | 162.10MB BSides Cleveland/BSides Cleveland 2014/Phishing Like a Monarch With King Phisher Brandon Geise and Spencer McIntyre.mp4 | 57.03MB BSides Cleveland/BSides Cleveland 2014/Plunder Pillage and Print The art of leverage multifunction printers during penetration testing Dera.mp4 | 109.76MB BSides Cleveland/BSides Cleveland 2014/PowerShell cool $h!t Zach Wojton.mp4 | 98.94MB BSides Cleveland/BSides Cleveland 2014/The importance of threat intel in your information security program Jamie Murdock.mp4 | 63.82MB BSides Cleveland/BSides Cleveland 2014/Thinking Outside the Bunker Security as a practice not a target Steven Legg.mp4 | 45.89MB BSides Cleveland/BSides Cleveland 2014/Threat Models that Exercise your SIEM and Incident Response J Wolfgang Goerlich and Nick Jacob.mp4 | 93.79MB BSides Cleveland/BSides Cleveland 2015/BL00-Why-the-foundation-of-security-is-broken-Alex-Kot.mp4 | 35.14MB BSides Cleveland/BSides Cleveland 2015/BL01-Desired-State-Configuration-DSC-Dream-Tool-or-Nightmare-for-Security-Baseline-and-Configuration-Management-Zack-Wojton-Wayne-Pruitt-zbirdflipper.mp4 | 35.84MB BSides Cleveland/BSides Cleveland 2015/BL02-Common-Sense-Security-Framework-Jerod-Brennen-slandail.mp4 | 43.99MB BSides Cleveland/BSides Cleveland 2015/BL03-Secure-Test-Driven-Development-Brakeman-Gauntlet-OWASP-and-the-Work-Still-to-Be-Done-Ricky-Rickard-rrickardjr.mp4 | 66.10MB BSides Cleveland/BSides Cleveland 2015/BL05-Building-a-Threat-Intelligence-Program-Edward-McCabe-edwardmccabe.mp4 | 368.98MB BSides Cleveland/BSides Cleveland 2015/BL06-Phishing-Witout-Ruby-Brandan-Geise-Spencer-McIntyre-coldfusion39.mp4 | 36.54MB BSides Cleveland/BSides Cleveland 2015/BL07-Security-Not-Guaranteed-Or-how-to-hold-off-the-bad-guys-for-another-day-James-Gifford-Elijah-Snow-Rackley-jrgifford.mp4 | 33.42MB BSides Cleveland/BSides Cleveland 2015/BL08-Cleveland-Locksport-Jeff-Moss-Doug-Hiwiller-Damon-Ramsey-jeffthemossman.mp4 | 41.66MB BSides Cleveland/BSides Cleveland 2015/BL09-Augmenting-Mobile-Security-and-Privacy-Controls-Brian-Krupp-briankrupp.mp4 | 127.19MB BSides Cleveland/BSides Cleveland 2015/BP00-DIY-Hacker-Training-a-Walkthrough-Warren-Kopp-warrenkopp.mp4 | 29.17MB BSides Cleveland/BSides Cleveland 2015/BP01-Quick-start-your-Burp-Suite-extensions-Jython-and-automation-Marius-Nepomuceno.mp4 | 28.63MB BSides Cleveland/BSides Cleveland 2015/BP02-Flourishing-in-a-Hostile-Work-Environment-Dennis-Goodlett.mp4 | 41.24MB BSides Cleveland/BSides Cleveland 2015/BP03-Defense-in-Depth-Your-Security-Castle-Tom-Kopchak-tomkopchak.mp4 | 63.32MB BSides Cleveland/BSides Cleveland 2015/BP04-EMET-Overview-and-Demo-Kevin-Gennuso-kevvyg.mp4 | 42.98MB BSides Cleveland/BSides Cleveland 2015/BP05-10-Reasons-Your-Security-Education-Program-Sucks-Kris-French-Jr-Turtl3Up.mp4 | 67.98MB BSides Cleveland/BSides Cleveland 2015/BP06-Call-of-Duty-Crypto-Ransomware-Brett-Hawkins-hawkbluedevil.mp4 | 70.85MB BSides Cleveland/BSides Cleveland 2015/GS00-Morning-Keynote-Jack-Daniel.mp4 | 96.71MB BSides Cleveland/BSides Cleveland 2015/GS01-Metasploit-Windows-Kernel-Exploitation-Spencer-McIntyre-zeroSteiner.mp4 | 72.87MB BSides Cleveland/BSides Cleveland 2015/GS02-PwnDrone-The-Modern-Airborne-Cyber-Threat-Devin-Gergen-DevinGergen.mp4 | 68.57MB BSides Cleveland/BSides Cleveland 2015/GS03-Afternoon-Keynote-Chris-Nickerson.mp4 | 70.50MB BSides Cleveland/BSides Cleveland 2015/GS04-Why-the-Web-is-Broken-Bill-Sempf-sempf.mp4 | 367.01MB BSides Cleveland/BSides Cleveland 2015/GS05-Outside-the-Box-David-Kennedy-Larry-Spohn-HackingDave-Spoonman1091.mp4 | 81.07MB BSides Cleveland/BSides Cleveland 2015/GS06-The-Entropy-of-Obfuscated-Code-Adam-Hogan-adamwhogan.mp4 | 51.24MB BSides Cleveland/BSides Cleveland 2015/closing.mp4 | 3.12MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 103 Delete Yourself Cognitive Bias during incidence response Dru Streicher.mp4 | 50.14MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 103 Delete Yourself Cognitive Bias during incidence response Dru Streicher.srt | 63.87KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 105 Cyber Cyber Cyber Using the killchain to accomplish something Amanda Sullivan B.mp4 | 91.29MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 105 Cyber Cyber Cyber Using the killchain to accomplish something Amanda Sullivan B.srt | 79.30KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 106 The Python in the Apple Spencer McIntyre.mp4 | 39.29MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 106 The Python in the Apple Spencer McIntyre.srt | 81.81KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 107 Eye on the Prize a Proposal for Legalizing Hacking Back Adam Hogan.mp4 | 78.19MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 107 Eye on the Prize a Proposal for Legalizing Hacking Back Adam Hogan.srt | 151.22KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 108 Bypassing Next Gen Tech David Kennedy.mp4 | 71.88MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 108 Bypassing Next Gen Tech David Kennedy.srt | 201.58KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 109 Afternoon Keynote John Strand.mp4 | 186.53MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 109 Afternoon Keynote John Strand.srt | 187.01KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 201 Diary of a Security Noob TJ Toterhi.mp4 | 85.06MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 201 Diary of a Security Noob TJ Toterhi.srt | 81.45KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 202 Enterprise Monitoring From Zero Andrew Johnson - YouTube.mp4 | 22.91MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 202 Enterprise Monitoring From Zero Andrew Johnson - YouTube.srt | 49.61KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 203 Decentralization For Security and Freedom A Discussion of Asymmetric and Decent.mp4 | 142.81MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 203 Decentralization For Security and Freedom A Discussion of Asymmetric and Decent.srt | 172.00KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 204 Building your Human Firewall Christopher Jones John Winkler.mp4 | 58.93MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 204 Building your Human Firewall Christopher Jones John Winkler.srt | 64.97KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 205 Spy vs Spy Tips from the trenches for red and blue teams Thomas McBee Jeff McCu.mp4 | 30.86MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 205 Spy vs Spy Tips from the trenches for red and blue teams Thomas McBee Jeff McCu.srt | 96.62KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 206 Choose Django for Secure Web Development Vince Salvino.mp4 | 32.96MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 206 Choose Django for Secure Web Development Vince Salvino.srt | 55.50KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 207 MacOS An easy exploit 2 ways Cody Smith.mp4 | 37.37MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 207 MacOS An easy exploit 2 ways Cody Smith.srt | 42.50KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 208 Hacking in Highschool Inspiring the next generation of security professionals M.mp4 | 36.46MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 208 Hacking in Highschool Inspiring the next generation of security professionals M.srt | 103.95KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 300 Better manual web application testing through automation Brian Mead.mp4 | 40.67MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 300 Better manual web application testing through automation Brian Mead.srt | 87.80KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 301 What Theyre Teaching Kids These Days Rob Olson Chaim Sanders.mp4 | 141.18MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 301 What Theyre Teaching Kids These Days Rob Olson Chaim Sanders.srt | 148.44KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 302 IoT Device Pentesting Erik Daguerre.mp4 | 23.43MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 302 IoT Device Pentesting Erik Daguerre.srt | 64.80KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 303 Getting back to the old school Jamie Murdock.mp4 | 50.84MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 303 Getting back to the old school Jamie Murdock.srt | 52.24KB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 304 Quantifying Securitys Value It Can Be Done Arianna Willett.mp4 | 48.66MB BSides Cleveland/BSides Cleveland 2017/BSides Cleveland 304 Quantifying Securitys Value It Can Be Done Arianna Willett.srt | 50.55KB BSides Cleveland/BSides Cleveland 2017/DIY Spy Covert Channels With Scapy And Python Jen Allen.mp4 | 32.03MB BSides Cleveland/BSides Cleveland 2018/A00 Hacking Your Happiness Chris Gates.en.transcribed.srt | 139.51KB BSides Cleveland/BSides Cleveland 2018/A00 Hacking Your Happiness Chris Gates.mp4 | 40.48MB BSides Cleveland/BSides Cleveland 2018/A01 Active Defense Helping threat actors hack themselves Matt Scheurer.en.transcribed.srt | 114.08KB BSides Cleveland/BSides Cleveland 2018/A01 Active Defense Helping threat actors hack themselves Matt Scheurer.mp4 | 57.31MB BSides Cleveland/BSides Cleveland 2018/A02 Using Technology to Defend Digital Privacy Human Rights Tom Eston.en.transcribed.srt | 163.38KB BSides Cleveland/BSides Cleveland 2018/A02 Using Technology to Defend Digital Privacy Human Rights Tom Eston.mp4 | 58.72MB BSides Cleveland/BSides Cleveland 2018/A03 Whats Changed In The New OWASP Top 10 Bill Sempf.en.transcribed.srt | 131.73KB BSides Cleveland/BSides Cleveland 2018/A03 Whats Changed In The New OWASP Top 10 Bill Sempf.mp4 | 55.55MB BSides Cleveland/BSides Cleveland 2018/A04 Hacking Identity A Pen Testers Guide to IAM Jerod Brennen.en.transcribed.srt | 176.80KB BSides Cleveland/BSides Cleveland 2018/A04 Hacking Identity A Pen Testers Guide to IAM Jerod Brennen.mp4 | 65.63MB BSides Cleveland/BSides Cleveland 2018/A05 The Marriage of Threat Intelligence and Incident Response or Threat Hunting for the Rest of Us J.en.transcribed.srt | 156.80KB BSides Cleveland/BSides Cleveland 2018/A05 The Marriage of Threat Intelligence and Incident Response or Threat Hunting for the Rest of Us J.mp4 | 73.86MB BSides Cleveland/BSides Cleveland 2018/A06 Mobile Application Privacy and Analytics Kevin Cody.en.transcribed.srt | 133.58KB BSides Cleveland/BSides Cleveland 2018/A06 Mobile Application Privacy and Analytics Kevin Cody.mp4 | 66.46MB BSides Cleveland/BSides Cleveland 2018/A07 Hackers Hugs Drugs Mental Health in Infosec Amanda Berlin.en.transcribed.srt | 148.51KB BSides Cleveland/BSides Cleveland 2018/A07 Hackers Hugs Drugs Mental Health in Infosec Amanda Berlin.mp4 | 77.30MB BSides Cleveland/BSides Cleveland 2018/B00 Reflective PE Unloading Spencer McIntyre.en.transcribed.srt | 133.12KB BSides Cleveland/BSides Cleveland 2018/B00 Reflective PE Unloading Spencer McIntyre.mp4 | 81.47MB BSides Cleveland/BSides Cleveland 2018/B01 Code Execution with JDK Scripting Tools Nashorn Javascript Engine Brett Hawkins.en.transcribed.srt | 97.86KB BSides Cleveland/BSides Cleveland 2018/B01 Code Execution with JDK Scripting Tools Nashorn Javascript Engine Brett Hawkins.mp4 | 63.13MB BSides Cleveland/BSides Cleveland 2018/B02 Raindance Raining Recon from the Microsoft Cloud Michael Stringer.en.transcribed.srt | 127.31KB BSides Cleveland/BSides Cleveland 2018/B02 Raindance Raining Recon from the Microsoft Cloud Michael Stringer.mp4 | 139.64MB BSides Cleveland/BSides Cleveland 2018/B03 Phishing Forensics Is it just suspicious or is it malicious Matt Scheurer.en.transcribed.srt | 135.11KB BSides Cleveland/BSides Cleveland 2018/B03 Phishing Forensics Is it just suspicious or is it malicious Matt Scheurer.mp4 | 94.31MB BSides Cleveland/BSides Cleveland 2018/B04 Wacky and Wild Security Getting things under CIS Controls V7 Jeremy Mio.en.transcribed.srt | 107.82KB BSides Cleveland/BSides Cleveland 2018/B04 Wacky and Wild Security Getting things under CIS Controls V7 Jeremy Mio.mp4 | 68.34MB BSides Cleveland/BSides Cleveland 2018/B05 Evolving the Teaching of Pen Testing in Higher Ed Robert Olson.en.transcribed.srt | 81.95KB BSides Cleveland/BSides Cleveland 2018/B05 Evolving the Teaching of Pen Testing in Higher Ed Robert Olson.mp4 | 44.74MB BSides Cleveland/BSides Cleveland 2018/B06 Anatomy of an Attack John Fatten.en.transcribed.srt | 36.83KB BSides Cleveland/BSides Cleveland 2018/B06 Anatomy of an Attack John Fatten.mp4 | 24.85MB BSides Cleveland/BSides Cleveland 2018/C00 One Puzzle Piece at a Time Logging Quick Wins Celeste Hall.en.transcribed.srt | 62.68KB BSides Cleveland/BSides Cleveland 2018/C00 One Puzzle Piece at a Time Logging Quick Wins Celeste Hall.mp4 | 33.28MB BSides Cleveland/BSides Cleveland 2018/C01 GO HACK YOURSELF MOVING BEYOND ASSUMPTION BASED SECURITY Christine Stevenson.en.transcribed.srt | 73.90KB BSides Cleveland/BSides Cleveland 2018/C01 GO HACK YOURSELF MOVING BEYOND ASSUMPTION BASED SECURITY Christine Stevenson.mp4 | 36.49MB BSides Cleveland/BSides Cleveland 2018/C03 Tools and Procedures for Securing Net Applications Sam Nasr.en.transcribed.srt | 115.40KB BSides Cleveland/BSides Cleveland 2018/C03 Tools and Procedures for Securing Net Applications Sam Nasr.mp4 | 78.29MB BSides Cleveland/BSides Cleveland 2018/C04 Securing Code The Basics Michael Mendez.en.transcribed.srt | 121.76KB BSides Cleveland/BSides Cleveland 2018/C04 Securing Code The Basics Michael Mendez.mp4 | 88.55MB BSides Cleveland/BSides Cleveland 2018/C05 Interdisciplinary Infosec Equifax Individuation and the Modern State Thomas Pieragastini.en.transcribed.srt | 125.19KB BSides Cleveland/BSides Cleveland 2018/C05 Interdisciplinary Infosec Equifax Individuation and the Modern State Thomas Pieragastini.mp4 | 85.05MB BSides Cleveland/BSides Cleveland 2018/C06 Go back to the basics with your processes Improving operations without technology Mark Abrams.en.transcribed.srt | 171.11KB BSides Cleveland/BSides Cleveland 2018/C06 Go back to the basics with your processes Improving operations without technology Mark Abrams.mp4 | 95.98MB BSides Columbus/BSides Columbus 2015/Defense00 Got software Need a security test plan Got you covered Bill Sempf.mp4 | 94.06MB BSides Columbus/BSides Columbus 2015/Defense01 Corporate Wide SSL Interception and Inspection Frank Shaw.mp4 | 60.21MB BSides Columbus/BSides Columbus 2015/Defense02 How to Rapidly Prototype Machine Learning Solutions to Solve Security Problems Jason Montg.mp4 | 183.43MB BSides Columbus/BSides Columbus 2015/Defense03 A Basic Guide to Advanced Incident Response Scott Roberts.mp4 | 99.31MB BSides Columbus/BSides Columbus 2015/Defense04 Supply and Demand Solving the InfoSec Talent Shortage Brandon Allen.mp4 | 81.42MB BSides Columbus/BSides Columbus 2015/Jason Street Keynote.mp4 | 134.58MB BSides Columbus/BSides Columbus 2015/Keynote00 Cloud and Virtualization Theory Grauben Guevara.mp4 | 85.97MB BSides Columbus/BSides Columbus 2015/Offense00 User Behavior Analysis Matt Bianco.mp4 | 91.67MB BSides Columbus/BSides Columbus 2015/Offense01 Plunder Pillage and Print The art of leverage multifunction printers during penetration te.mp4 | 160.14MB BSides Columbus/BSides Columbus 2015/Offense02 Common Sense Security Framework Jerod Brennen.mp4 | 144.32MB BSides Columbus/BSides Columbus 2015/Offense04 OWASP Mobile Top Ten Why They Matter and What We Can Do Ricky Rickard.mp4 | 109.79MB BSides Columbus/BSides Columbus 2015/Special Teams00 Do We Still Need Pen Testing Jeff Mann.mp4 | 121.31MB BSides Columbus/BSides Columbus 2015/Special Teams01 Trolling Attackers for Fun Profit Stephen Hosom.mp4 | 48.73MB BSides Columbus/BSides Columbus 2015/Special Teams02 Inurlrobotstxt What are YOU hiding David Young.mp4 | 43.50MB BSides Columbus/BSides Columbus 2015/Special Teams03 Malware Development as the Evolution of Parasites Adam Hogan.mp4 | 74.02MB BSides Columbus/BSides Columbus 2015/Special Teams04 Snort Beyond IDS Open Source Application and File Control Adam Hogan.mp4 | 153.48MB BSides Columbus/BSides Columbus 2017/BSides Columbus 00 Learning From Pirates of the Late 1600s The first APT Adam Hogan.mp4 | 39.55MB BSides Columbus/BSides Columbus 2017/BSides Columbus 00 Learning From Pirates of the Late 1600s The first APT Adam Hogan.srt | 191.16KB BSides Columbus/BSides Columbus 2017/BSides Columbus 01 What I Learned About Cybersecurity by Training With US Navy SEALs Matthew Curtin.srt | 132.37KB BSides Columbus/BSides Columbus 2017/BSides Columbus 01 What I Learned About Cybersecurity by Training With US Navy SEALs Matthew Curtin.mp4 | 104.95MB BSides Columbus/BSides Columbus 2017/BSides Columbus 03 Cross Origin Resource Sharing Kung fu Aditya Balapure.mp4 | 35.01MB BSides Columbus/BSides Columbus 2017/BSides Columbus 03 Cross Origin Resource Sharing Kung fu Aditya Balapure.srt | 83.31KB BSides Columbus/BSides Columbus 2017/BSides Columbus 07 Automating Security in Building Software Warner Moore.mp4 | 64.66MB BSides Columbus/BSides Columbus 2017/BSides Columbus 08 Planning and Executing a Red Team Engagement Timothy Wright.mp4 | 80.83MB BSides Columbus/BSides Columbus 2017/BSides Columbus 09 DNSSec Explained Dan Benway.mp4 | 12.82MB BSides Columbus/BSides Columbus 2017/BSides Columbus 09 DNSSec Explained Dan Benway.srt | 43.28KB BSides Columbus/BSides Columbus 2017/BSides Columbus 10 Midwestern Nice Stereotype or Enterprise Threat Valerie Thomas.mp4 | 44.34MB BSides Columbus/BSides Columbus 2017/BSides Columbus 10 Midwestern Nice Stereotype or Enterprise Threat Valerie Thomas.srt | 144.69KB BSides Columbus/BSides Columbus 2017/BSides Columbus 11 Information Security Talent Trends to expect in 2017 Megan Wells AJ Candella.mp4 | 39.83MB BSides Columbus/BSides Columbus 2017/BSides Columbus Redefining Security in a Cloud Centric Future Mike Spaulding.mp4 | 52.71MB BSides Columbus/BSides Columbus 2018/A00 Keynote Dave Kennedy.en.transcribed.srt | 166.40KB BSides Columbus/BSides Columbus 2018/A00 Keynote Dave Kennedy.mp4 | 138.58MB BSides Columbus/BSides Columbus 2018/A01 Automating Security Testing with the OWTF Jerod Brennen.en.transcribed.srt | 138.27KB BSides Columbus/BSides Columbus 2018/A01 Automating Security Testing with the OWTF Jerod Brennen.mp4 | 141.95MB BSides Columbus/BSides Columbus 2018/A02 Looks Like Rain Again Secure Development in the Cloud Bill Sempf.en.transcribed.srt | 121.47KB BSides Columbus/BSides Columbus 2018/A02 Looks Like Rain Again Secure Development in the Cloud Bill Sempf.mp4 | 157.29MB BSides Columbus/BSides Columbus 2018/A04 How Stuxnet Ruined My Life For 6 Months But I Got To Fly 1st Class A Lot Chris Raiter Jeremy Smi.en.transcribed.srt | 79.39KB BSides Columbus/BSides Columbus 2018/A04 How Stuxnet Ruined My Life For 6 Months But I Got To Fly 1st Class A Lot Chris Raiter Jeremy Smi.mp4 | 85.71MB BSides Columbus/BSides Columbus 2018/A05 Emotet Banking Malware With A Bite Bradley Duncan.en.transcribed.srt | 72.39KB BSides Columbus/BSides Columbus 2018/A05 Emotet Banking Malware With A Bite Bradley Duncan.mp4 | 84.76MB BSides Columbus/BSides Columbus 2018/A06 Keynote Kevin Burkart.en.transcribed.srt | 164.75KB BSides Columbus/BSides Columbus 2018/A06 Keynote Kevin Burkart.mp4 | 160.62MB BSides Columbus/BSides Columbus 2018/BSidesNOVA.en.transcribed.srt | 142.94KB BSides Columbus/BSides Columbus 2018/BSidesNOVA.mp4 | 82.79MB BSides Columbus/BSides Columbus 2018/E00 Cryptology Its a Scalpel not a Hammer Mikhail Sudakov.en.transcribed.srt | 132.67KB BSides Columbus/BSides Columbus 2018/E00 Cryptology Its a Scalpel not a Hammer Mikhail Sudakov.mp4 | 77.18MB BSides Columbus/BSides Columbus 2018/E01 Pass the Apple Sauce Mac OS X Security Automation for Windows focused Blue Teams Brian Satira.en.transcribed.srt | 145.14KB BSides Columbus/BSides Columbus 2018/E01 Pass the Apple Sauce Mac OS X Security Automation for Windows focused Blue Teams Brian Satira.mp4 | 62.74MB BSides Columbus/BSides Columbus 2018/E02 Why People Suck at Delivery How to get your security projects off the ground and into production.en.transcribed.srt | 82.22KB BSides Columbus/BSides Columbus 2018/E02 Why People Suck at Delivery How to get your security projects off the ground and into production.mp4 | 53.08MB BSides Columbus/BSides Columbus 2018/E03 Zero to Owned in 1 Hour Securing Privilege in Cloud and DevOps Workflow Brandon Traffanstedt.en.transcribed.srt | 108.24KB BSides Columbus/BSides Columbus 2018/E03 Zero to Owned in 1 Hour Securing Privilege in Cloud and DevOps Workflow Brandon Traffanstedt.mp4 | 74.95MB BSides Columbus/BSides Columbus 2018/E04 Are you ready for my call Security researcher insights into Responsible Disclosure Jason Kent.en.transcribed.srt | 125.89KB BSides Columbus/BSides Columbus 2018/E04 Are you ready for my call Security researcher insights into Responsible Disclosure Jason Kent.mp4 | 63.19MB BSides Columbus/BSides Columbus 2018/P00 Shifting Application Security Left Craig Stuntz.en.transcribed.srt | 138.21KB BSides Columbus/BSides Columbus 2018/P00 Shifting Application Security Left Craig Stuntz.mp4 | 91.06MB BSides Columbus/BSides Columbus 2018/P01 Presenting PcketRquet An Auditory IDS Killian Ditch.en.transcribed.srt | 77.23KB BSides Columbus/BSides Columbus 2018/P01 Presenting PcketRquet An Auditory IDS Killian Ditch.mp4 | 100.33MB BSides Columbus/BSides Columbus 2018/P02 Security and Networking Dual Purpose Tools Cody Smith.en.transcribed.srt | 90.33KB BSides Columbus/BSides Columbus 2018/P02 Security and Networking Dual Purpose Tools Cody Smith.mp4 | 91.61MB BSides Columbus/BSides Columbus 2018/P04 Cybereasons Jim VanDeRyt Fileless Malware Breakout Session Jim VanDeRyt.en.transcribed.srt | 47.85KB BSides Columbus/BSides Columbus 2018/P04 Cybereasons Jim VanDeRyt Fileless Malware Breakout Session Jim VanDeRyt.mp4 | 31.44MB BSides Columbus/BSides Columbus 2018/P05 The Quieter You Become the More Youre Able to HELK Nate Guagenti Roberto Rodriquez.en.transcribed.srt | 152.00KB BSides Columbus/BSides Columbus 2018/P05 The Quieter You Become the More Youre Able to HELK Nate Guagenti Roberto Rodriquez.mp4 | 107.57MB BSides Columbus/BSides Columbus 2018/W00 Everything you always wanted to ask a hiring manager but were afraid to ask Mike Spaulding.en.transcribed.srt | 156.89KB BSides Columbus/BSides Columbus 2018/W00 Everything you always wanted to ask a hiring manager but were afraid to ask Mike Spaulding.mp4 | 100.06MB BSides Columbus/BSides Columbus 2018/W02 Deep Learning for Enterprise Solving Business Problems with AI Christian Nicholson.en.transcribed.srt | 141.81KB BSides Columbus/BSides Columbus 2018/W02 Deep Learning for Enterprise Solving Business Problems with AI Christian Nicholson.mp4 | 78.80MB BSides Columbus/BSides Columbus 2018/W03 Building Jarvis Stephen Hosom.en.transcribed.srt | 47.25KB BSides Columbus/BSides Columbus 2018/W03 Building Jarvis Stephen Hosom.mp4 | 52.28MB BSides Columbus/BSides Columbus 2018/W04 Active Defense Helping threat actors hack themselves Matt Scheurer v2.en.transcribed.srt | 104.00KB BSides Columbus/BSides Columbus 2018/W04 Active Defense Helping threat actors hack themselves Matt Scheurer v2.mp4 | 63.52MB BSides Columbus/BSides Columbus 2018/W04 Active Defense Helping threat actors hack themselves Matt Scheurer.en.transcribed.srt | 108.57KB BSides Columbus/BSides Columbus 2018/W04 Active Defense Helping threat actors hack themselves Matt Scheurer.mp4 | 52.01MB BSides DC/BSides DC 2014/BSides DC 2014 - A Better Way to Get Intelligent About Threats.mp4 | 206.88MB BSides DC/BSides DC 2014/BSides DC 2014 - Adventures in Asymmetric Warfare Fighting the AV Vendors.mp4 | 427.60MB BSides DC/BSides DC 2014/BSides DC 2014 - All About The Bass - Sing Off.mp4 | 25.16MB BSides DC/BSides DC 2014/BSides DC 2014 - Bug Bounty Hunters Lessons From Darth Vader.mp4 | 562.26MB BSides DC/BSides DC 2014/BSides DC 2014 - Building and Using A GPU Password Cracker.mp4 | 400.74MB BSides DC/BSides DC 2014/BSides DC 2014 - Closing Remarks.mp4 | 39.71MB BSides DC/BSides DC 2014/BSides DC 2014 - Cynomix Fireside Chat Demo.mp4 | 167.42MB BSides DC/BSides DC 2014/BSides DC 2014 - Diamond Model for Intrusion Analysis What You Need to Know.mp4 | 294.07MB BSides DC/BSides DC 2014/BSides DC 2014 - Diversity in IT #epicfail or #makingprogress.mp4 | 475.96MB BSides DC/BSides DC 2014/BSides DC 2014 - Doctor Docker Building Your Infrastructure s Immune System.mp4 | 156.74MB BSides DC/BSides DC 2014/BSides DC 2014 - Fighting Back Against SSL Interception (or How SSL Should Work).mp4 | 269.51MB BSides DC/BSides DC 2014/BSides DC 2014 - Hacking Rants (from an almost old guy).mp4 | 335.91MB BSides DC/BSides DC 2014/BSides DC 2014 - How Headlines Make Heads Roll The Media s Impact On Security.mp4 | 567.30MB BSides DC/BSides DC 2014/BSides DC 2014 - Keynote.mp4 | 248.81MB BSides DC/BSides DC 2014/BSides DC 2014 - MalwareViz a free Malware Visualizer.mp4 | 470.09MB BSides DC/BSides DC 2014/BSides DC 2014 - Meatspace Indicators and Incident Response.mp4 | 420.72MB BSides DC/BSides DC 2014/BSides DC 2014 - Network Attached Shell N.A.S.ty systems that store network accessible shells..mp4 | 259.37MB BSides DC/BSides DC 2014/BSides DC 2014 - Once upon a time... InfoSec History 101.mp4 | 321.58MB BSides DC/BSides DC 2014/BSides DC 2014 - Opening Acts How Attackers Get Their Big Breaks.mp4 | 407.11MB BSides DC/BSides DC 2014/BSides DC 2014 - SWF Seeking Lazy Admin for Cross-Domain Action.mp4 | 370.72MB BSides DC/BSides DC 2014/BSides DC 2014 - Training with Raspberry Pi.mp4 | 198.96MB BSides DC/BSides DC 2014/BSides DC 2014 - What Does It Actually Take to Start a Security Product Company.mp4 | 586.95MB BSides DC/BSides DC 2014/BSides DC 2014 - in ur scm, bein a ninja.mp4 | 445.33MB BSides DC/BSides DC 2016/BSides DC 2016 - Knowing the Enemy”- Creating a Cyber Threat Actor Attribution Program.en.transcribed.srt | 89.08KB BSides DC/BSides DC 2016/BSides DC 2016 - Knowing the Enemy”- Creating a Cyber Threat Actor Attribution Program.mp4 | 188.73MB BSides DC/BSides DC 2016/BSides DC 2016 - A Hacker’s Guide to Usability Testing.mp4 | 200.71MB BSides DC/BSides DC 2016/BSides DC 2016 - A Notional Framework for applying Antifragile thinking to the RMF.mp4 | 253.09MB BSides DC/BSides DC 2016/BSides DC 2016 - Abusing Windows with PowerShell and Microsoft debuggers.en.transcribed.srt | 78.45KB BSides DC/BSides DC 2016/BSides DC 2016 - Abusing Windows with PowerShell and Microsoft debuggers.mp4 | 215.40MB BSides DC/BSides DC 2016/BSides DC 2016 - Act and Think like an Epidemiologist to Combat Digital Diseases.en.transcribed.srt | 94.20KB BSides DC/BSides DC 2016/BSides DC 2016 - Act and Think like an Epidemiologist to Combat Digital Diseases.mp4 | 115.29MB BSides DC/BSides DC 2016/BSides DC 2016 - Adversarial Post-Exploitation Lessons From The Pros.en.transcribed.srt | 119.99KB BSides DC/BSides DC 2016/BSides DC 2016 - Adversarial Post-Exploitation Lessons From The Pros.mp4 | 217.31MB BSides DC/BSides DC 2016/BSides DC 2016 - Applying data science to identify malicious actors in enterprise logs.mp4 | 184.06MB BSides DC/BSides DC 2016/BSides DC 2016 - Attacking Patient Health The Anatomy of Hospital Exploitation.en.transcribed.srt | 99.68KB BSides DC/BSides DC 2016/BSides DC 2016 - Attacking Patient Health The Anatomy of Hospital Exploitation.mp4 | 193.26MB BSides DC/BSides DC 2016/BSides DC 2016 - Beyond Automated Testing.en.transcribed.srt | 126.77KB BSides DC/BSides DC 2016/BSides DC 2016 - Beyond Automated Testing.mp4 | 200.03MB BSides DC/BSides DC 2016/BSides DC 2016 - Building the BSides DC Registration System.en.transcribed.srt | 35.58KB BSides DC/BSides DC 2016/BSides DC 2016 - Building the BSides DC Registration System.mp4 | 63.94MB BSides DC/BSides DC 2016/BSides DC 2016 - Closing Ceremony & Good Bye.en.transcribed.srt | 19.57KB BSides DC/BSides DC 2016/BSides DC 2016 - Closing Ceremony & Good Bye.mp4 | 49.24MB BSides DC/BSides DC 2016/BSides DC 2016 - Crypt Kids Keynote by Liam Randall.en.transcribed.srt | 65.38KB BSides DC/BSides DC 2016/BSides DC 2016 - Crypt Kids Keynote by Liam Randall.mp4 | 123.56MB BSides DC/BSides DC 2016/BSides DC 2016 - Detecting Malicious websites using Machine Learning.en.transcribed.srt | 129.47KB BSides DC/BSides DC 2016/BSides DC 2016 - Detecting Malicious websites using Machine Learning.mp4 | 206.25MB BSides DC/BSides DC 2016/BSides DC 2016 - How to Join the Infosec Community.en.transcribed.srt | 140.29KB BSides DC/BSides DC 2016/BSides DC 2016 - How to Join the Infosec Community.mp4 | 203.19MB BSides DC/BSides DC 2016/BSides DC 2016 - Keynote by Marcia Hoffman.en.transcribed.srt | 65.11KB BSides DC/BSides DC 2016/BSides DC 2016 - Keynote by Marcia Hoffman.mp4 | 140.58MB BSides DC/BSides DC 2016/BSides DC 2016 - Opening.en.transcribed.srt | 18.90KB BSides DC/BSides DC 2016/BSides DC 2016 - Opening.mp4 | 38.47MB BSides DC/BSides DC 2016/BSides DC 2016 - PowerShell Security Defending the Enterprise from the Latest Attack Platform.en.transcribed.srt | 140.82KB BSides DC/BSides DC 2016/BSides DC 2016 - PowerShell Security Defending the Enterprise from the Latest Attack Platform.mp4 | 202.59MB BSides DC/BSides DC 2016/BSides DC 2016 - Practical Cyborgism Getting Start with Machine Learning for Incident Detection.en.transcribed.srt | 140.08KB BSides DC/BSides DC 2016/BSides DC 2016 - Practical Cyborgism Getting Start with Machine Learning for Incident Detection.mp4 | 222.68MB BSides DC/BSides DC 2016/BSides DC 2016 - Tales from the Crypt...(analyst).en.transcribed.srt | 131.04KB BSides DC/BSides DC 2016/BSides DC 2016 - Tales from the Crypt...(analyst).mp4 | 216.46MB BSides DC/BSides DC 2016/BSides DC 2016 - Tales of Fails and Tools for Message Integrity.en.transcribed.srt | 107.87KB BSides DC/BSides DC 2016/BSides DC 2016 - Tales of Fails and Tools for Message Integrity.mp4 | 147.39MB BSides DC/BSides DC 2016/BSides DC 2016 - Tipping the Scales Back In Our Favor.en.transcribed.srt | 63.58KB BSides DC/BSides DC 2016/BSides DC 2016 - Tipping the Scales Back In Our Favor.mp4 | 112.60MB BSides DC/BSides DC 2016/BSides DC 2016 - Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk.en.transcribed.srt | 89.78KB BSides DC/BSides DC 2016/BSides DC 2016 - Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk.mp4 | 188.83MB BSides DC/BSides DC 2016/BSides DC 2016 - WCTF Magic as told by a clumsy Magician.en.transcribed.srt | 56.88KB BSides DC/BSides DC 2016/BSides DC 2016 - WCTF Magic as told by a clumsy Magician.mp4 | 142.00MB BSides DC/BSides DC 2016/BSides DC 2016 - We Should Talk About This Data Security as an Issue for Communication Research.mp4 | 202.13MB BSides DC/BSides DC 2016/BSides DC 2016 - What’s the Big Deal with Assessing ICS SCADA.mp4 | 256.91MB BSides DC/BSides DC 2016/BSides DC 2016 - YAYA (Yet Another YARA Allocution) - YouTube.en.transcribed.srt | 98.02KB BSides DC/BSides DC 2016/BSides DC 2016 - YAYA (Yet Another YARA Allocution) - YouTube.mp4 | 115.31MB BSides DC/BSides DC 2017/BSides DC 2017 - Advanced soft skills Using efficacy to get sh t done.en.transcribed.srt | 116.84KB BSides DC/BSides DC 2017/BSides DC 2017 - Advanced soft skills Using efficacy to get sh t done.mp4 | 197.34MB BSides DC/BSides DC 2017/BSides DC 2017 - Adventures using trillions of records to find “bad” things.en.transcribed.srt | 152.77KB BSides DC/BSides DC 2017/BSides DC 2017 - Adventures using trillions of records to find “bad” things.mp4 | 299.60MB BSides DC/BSides DC 2017/BSides DC 2017 - Between You and Me and the Network Security Boundary.en.transcribed.srt | 106.04KB BSides DC/BSides DC 2017/BSides DC 2017 - Between You and Me and the Network Security Boundary.mp4 | 158.28MB BSides DC/BSides DC 2017/BSides DC 2017 - Beyond the Domain Exploiting Hidden Critical Assets on Red Teams.en.transcribed.srt | 99.36KB BSides DC/BSides DC 2017/BSides DC 2017 - Beyond the Domain Exploiting Hidden Critical Assets on Red Teams.mp4 | 161.38MB BSides DC/BSides DC 2017/BSides DC 2017 - Closing.en.transcribed.srt | 29.50KB BSides DC/BSides DC 2017/BSides DC 2017 - Closing.mp4 | 82.78MB BSides DC/BSides DC 2017/BSides DC 2017 - CryptKids Keynote - Ms. Batz.en.transcribed.srt | 79.54KB BSides DC/BSides DC 2017/BSides DC 2017 - CryptKids Keynote - Ms. Batz.mp4 | 153.80MB BSides DC/BSides DC 2017/BSides DC 2017 - Discover Analytic Gaps with Unfetter.en.transcribed.srt | 163.70KB BSides DC/BSides DC 2017/BSides DC 2017 - Discover Analytic Gaps with Unfetter.mp4 | 219.87MB BSides DC/BSides DC 2017/BSides DC 2017 - Exploiting Alpine Linux From vulnerability discovery to code execution.en.transcribed.srt | 100.42KB BSides DC/BSides DC 2017/BSides DC 2017 - Exploiting Alpine Linux From vulnerability discovery to code execution.mp4 | 188.95MB BSides DC/BSides DC 2017/BSides DC 2017 - Forgotten Inputs Finding Web App Flaws By Understanding The Dev's Mind.en.transcribed.srt | 111.80KB BSides DC/BSides DC 2017/BSides DC 2017 - Forgotten Inputs Finding Web App Flaws By Understanding The Dev's Mind.mp4 | 229.35MB BSides DC/BSides DC 2017/BSides DC 2017 - Hacking ASUS Routers.en.transcribed.srt | 101.27KB BSides DC/BSides DC 2017/BSides DC 2017 - Hacking ASUS Routers.mp4 | 158.27MB BSides DC/BSides DC 2017/BSides DC 2017 - How to Detect Malicious Certificates in Your Spare Time.en.transcribed.srt | 83.98KB BSides DC/BSides DC 2017/BSides DC 2017 - How to Detect Malicious Certificates in Your Spare Time.mp4 | 191.14MB BSides DC/BSides DC 2017/BSides DC 2017 - Imposter Syndrome I Don't Feel Like Who You Think I Am. (Updated video editing).en.transcribed.srt | 101.85KB BSides DC/BSides DC 2017/BSides DC 2017 - Imposter Syndrome I Don't Feel Like Who You Think I Am. (Updated video editing).mp4 | 164.61MB BSides DC/BSides DC 2017/BSides DC 2017 - Learning to Innovate “1n51d3-th3-B0x” 21st Century Cyber Defense & Deterrence.en.transcribed.srt | 165.76KB BSides DC/BSides DC 2017/BSides DC 2017 - Learning to Innovate “1n51d3-th3-B0x” 21st Century Cyber Defense & Deterrence.mp4 | 269.71MB BSides DC/BSides DC 2017/BSides DC 2017 - Open Source Approach The Next Best Thing in Cyber Incidence Management -.en.transcribed.srt | 99.33KB BSides DC/BSides DC 2017/BSides DC 2017 - Open Source Approach The Next Best Thing in Cyber Incidence Management -.mp4 | 148.19MB BSides DC/BSides DC 2017/BSides DC 2017 - PATRIOT Perceiving Advanced Threats by Rogue Internet Of Things.en.transcribed.srt | 97.27KB BSides DC/BSides DC 2017/BSides DC 2017 - PATRIOT Perceiving Advanced Threats by Rogue Internet Of Things.mp4 | 170.54MB BSides DC/BSides DC 2017/BSides DC 2017 - PCI for Pen Testers.en.transcribed.srt | 157.40KB BSides DC/BSides DC 2017/BSides DC 2017 - PCI for Pen Testers.mp4 | 259.11MB BSides DC/BSides DC 2017/BSides DC 2017 - Revoke-Obfuscation PowerShell Obfuscation Detection (And Evasion) Using Science.en.transcribed.srt | 191.00KB BSides DC/BSides DC 2017/BSides DC 2017 - Revoke-Obfuscation PowerShell Obfuscation Detection (And Evasion) Using Science.mp4 | 238.42MB BSides DC/BSides DC 2017/BSides DC 2017 - Secure Key Management in the Cloud.en.transcribed.srt | 136.77KB BSides DC/BSides DC 2017/BSides DC 2017 - Secure Key Management in the Cloud.mp4 | 213.08MB BSides DC/BSides DC 2017/BSides DC 2017 - Stealing Our Children's Youth Identifying Early Cybersecurity Talent.en.transcribed.srt | 115.90KB BSides DC/BSides DC 2017/BSides DC 2017 - Stealing Our Children's Youth Identifying Early Cybersecurity Talent.mp4 | 191.18MB BSides DC/BSides DC 2017/BSides DC 2017 - The Black Art of Wireless Post-Exploitation.en.transcribed.srt | 170.20KB BSides DC/BSides DC 2017/BSides DC 2017 - The Black Art of Wireless Post-Exploitation.mp4 | 228.97MB BSides DC/BSides DC 2017/BSides DC 2017 - The World is Y0ur$ Geolocation-based Wordlist Generation with Wordsmith.en.transcribed.srt | 127.16KB BSides DC/BSides DC 2017/BSides DC 2017 - The World is Y0ur$ Geolocation-based Wordlist Generation with Wordsmith.mp4 | 194.70MB BSides DC/BSides DC 2017/BSides DC 2017 - They Live – World Domination via Human-Mimicking Automation.en.transcribed.srt | 104.30KB BSides DC/BSides DC 2017/BSides DC 2017 - They Live – World Domination via Human-Mimicking Automation.mp4 | 151.54MB BSides DC/BSides DC 2017/BSides DC 2017 - Transfer Learning Analyst-Sourcing Behavioral Classification.en.transcribed.srt | 112.64KB BSides DC/BSides DC 2017/BSides DC 2017 - Transfer Learning Analyst-Sourcing Behavioral Classification.mp4 | 187.26MB BSides DC/BSides DC 2017/BSides DC 2017 - Welcome (Alex Norman) & Key Note (Ed Skoudis).mp4 | 301.39MB BSides DC/BSides DC 2018/BSides DC 2018 - Blue Teams next tool Social Engineering (Psychology and Sociology at Work).en.transcribed.srt | 132.81KB BSides DC/BSides DC 2018/BSides DC 2018 - Blue Teams next tool Social Engineering (Psychology and Sociology at Work).mp4 | 51.27MB BSides DC/BSides DC 2018/BSides DC 2018 - Bringing Red vs. Blue to Machine Learning.en.transcribed.srt | 135.28KB BSides DC/BSides DC 2018/BSides DC 2018 - Bringing Red vs. Blue to Machine Learning.mp4 | 107.96MB BSides DC/BSides DC 2018/BSides DC 2018 - Buy & Build Complementing Security Operations w In House Software Development.en.transcribed.srt | 74.86KB BSides DC/BSides DC 2018/BSides DC 2018 - Buy & Build Complementing Security Operations w In House Software Development.mp4 | 50.31MB BSides DC/BSides DC 2018/BSides DC 2018 - Bypassing Huawei's Fingerprint Authentication by Exploiting the TrustZone.en.transcribed.srt | 148.80KB BSides DC/BSides DC 2018/BSides DC 2018 - Bypassing Huawei's Fingerprint Authentication by Exploiting the TrustZone.mp4 | 75.06MB BSides DC/BSides DC 2018/BSides DC 2018 - Bypassing Port-Security In 2018 Defeating MacSEC and 802.1x-2010.en.transcribed.srt | 173.80KB BSides DC/BSides DC 2018/BSides DC 2018 - Bypassing Port-Security In 2018 Defeating MacSEC and 802.1x-2010.mp4 | 146.07MB BSides DC/BSides DC 2018/BSides DC 2018 - Caught my WebApp cheating on me!.en.transcribed.srt | 89.17KB BSides DC/BSides DC 2018/BSides DC 2018 - Caught my WebApp cheating on me!.mp4 | 78.61MB BSides DC/BSides DC 2018/BSides DC 2018 - Close Community Based Career Development.en.transcribed.srt | 155.13KB BSides DC/BSides DC 2018/BSides DC 2018 - Close Community Based Career Development.mp4 | 58.23MB BSides DC/BSides DC 2018/BSides DC 2018 - Close DevSecOps Awareness and Guide to Practical Implementation.en.transcribed.srt | 185.73KB BSides DC/BSides DC 2018/BSides DC 2018 - Close DevSecOps Awareness and Guide to Practical Implementation.mp4 | 55.84MB BSides DC/BSides DC 2018/BSides DC 2018 - Closing ceremonies.en.transcribed.srt | 53.74KB BSides DC/BSides DC 2018/BSides DC 2018 - Closing ceremonies.mp4 | 26.14MB BSides DC/BSides DC 2018/BSides DC 2018 - CryptKids Keynote.en.transcribed.srt | 74.71KB BSides DC/BSides DC 2018/BSides DC 2018 - CryptKids Keynote.mp4 | 85.34MB BSides DC/BSides DC 2018/BSides DC 2018 - Cryptocurrency as Asymmetric Weapon.en.transcribed.srt | 140.31KB BSides DC/BSides DC 2018/BSides DC 2018 - Cryptocurrency as Asymmetric Weapon.mp4 | 50.37MB BSides DC/BSides DC 2018/BSides DC 2018 - DevOps Application Security Teams for the Rest of Us.en.transcribed.srt | 154.04KB BSides DC/BSides DC 2018/BSides DC 2018 - DevOps Application Security Teams for the Rest of Us.mp4 | 84.09MB BSides DC/BSides DC 2018/BSides DC 2018 - Don't Bring Me Down Weaponizing Botnets.en.transcribed.srt | 101.59KB BSides DC/BSides DC 2018/BSides DC 2018 - Don't Bring Me Down Weaponizing Botnets.mp4 | 76.47MB BSides DC/BSides DC 2018/BSides DC 2018 - Dropping Cyber Norms What They are & How They Will Shape the Internet.en.transcribed.srt | 168.89KB BSides DC/BSides DC 2018/BSides DC 2018 - Dropping Cyber Norms What They are & How They Will Shape the Internet.mp4 | 105.61MB BSides DC/BSides DC 2018/BSides DC 2018 - Endpoint to Internet Security Control Validation Using Threat Behavior Emulation.en.transcribed.srt | 156.20KB BSides DC/BSides DC 2018/BSides DC 2018 - Endpoint to Internet Security Control Validation Using Threat Behavior Emulation.mp4 | 97.09MB BSides DC/BSides DC 2018/BSides DC 2018 - Finding the Right Tools and Codes for Your Career Search.mp4 | 55.64MB BSides DC/BSides DC 2018/BSides DC 2018 - Getting Started in Cybersecurity.en.transcribed.srt | 135.62KB BSides DC/BSides DC 2018/BSides DC 2018 - Getting Started in Cybersecurity.mp4 | 128.52MB BSides DC/BSides DC 2018/BSides DC 2018 - How online dating made me better at threat modeling.en.transcribed.srt | 81.54KB BSides DC/BSides DC 2018/BSides DC 2018 - How online dating made me better at threat modeling.mp4 | 54.01MB BSides DC/BSides DC 2018/BSides DC 2018 - Isolated to Constrained Language Mode - Living within the Confines.en.transcribed.srt | 156.08KB BSides DC/BSides DC 2018/BSides DC 2018 - Isolated to Constrained Language Mode - Living within the Confines.mp4 | 141.27MB BSides DC/BSides DC 2018/BSides DC 2018 - Keynote.en.transcribed.srt | 85.23KB BSides DC/BSides DC 2018/BSides DC 2018 - Keynote.mp4 | 98.75MB BSides DC/BSides DC 2018/BSides DC 2018 - Learning Lessons & Imparting Wisdom of Past NSA IAM IEM and IA-CMM Processes.en.transcribed.srt | 83.48KB BSides DC/BSides DC 2018/BSides DC 2018 - Learning Lessons & Imparting Wisdom of Past NSA IAM IEM and IA-CMM Processes.mp4 | 22.80MB BSides DC/BSides DC 2018/BSides DC 2018 - Let’s Start Over!.en.transcribed.srt | 129.30KB BSides DC/BSides DC 2018/BSides DC 2018 - Let’s Start Over!.mp4 | 82.66MB BSides DC/BSides DC 2018/BSides DC 2018 - Lightening fast CTF solving - Automatic Exploit Generation & Side Channel Analysis.en.transcribed.srt | 125.46KB BSides DC/BSides DC 2018/BSides DC 2018 - Lightening fast CTF solving - Automatic Exploit Generation & Side Channel Analysis.mp4 | 72.30MB BSides DC/BSides DC 2018/BSides DC 2018 - Network Traffic is an Open Book.en.transcribed.srt | 112.35KB BSides DC/BSides DC 2018/BSides DC 2018 - Network Traffic is an Open Book.mp4 | 26.36MB BSides DC/BSides DC 2018/BSides DC 2018 - One technique, two techniques, red technique, blue technique.en.transcribed.srt | 150.38KB BSides DC/BSides DC 2018/BSides DC 2018 - One technique, two techniques, red technique, blue technique.mp4 | 94.80MB BSides DC/BSides DC 2018/BSides DC 2018 - Reverse Engineering for Vintage Systems.en.transcribed.srt | 133.07KB BSides DC/BSides DC 2018/BSides DC 2018 - Reverse Engineering for Vintage Systems.mp4 | 37.00MB BSides DC/BSides DC 2018/BSides DC 2018 - The Exploit Factory Building a home exploit mining cluster..en.transcribed.srt | 78.19KB BSides DC/BSides DC 2018/BSides DC 2018 - The Exploit Factory Building a home exploit mining cluster..mp4 | 45.58MB BSides DC/BSides DC 2018/BSides DC 2018 - The Unforeseen Consequences of Data Breaches and Hacking.en.transcribed.srt | 100.86KB BSides DC/BSides DC 2018/BSides DC 2018 - The Unforeseen Consequences of Data Breaches and Hacking.mp4 | 63.85MB BSides DC/BSides DC 2018/BSides DC 2018 - Trust Chain How to imagine and realize multi-organization Cloud Environment.en.transcribed.srt | 148.57KB BSides DC/BSides DC 2018/BSides DC 2018 - Trust Chain How to imagine and realize multi-organization Cloud Environment.mp4 | 49.83MB BSides DC/BSides DC 2018/BSides DC 2018 - Unraveling the Threat of Chrome Based Malware.en.transcribed.srt | 147.69KB BSides DC/BSides DC 2018/BSides DC 2018 - Unraveling the Threat of Chrome Based Malware.mp4 | 87.15MB BSides DC/BSides DC 2018/BSides DC 2018 - Watch Out For That Bus! (Personal Disaster Recovery Planning).en.transcribed.srt | 182.92KB BSides DC/BSides DC 2018/BSides DC 2018 - Watch Out For That Bus! (Personal Disaster Recovery Planning).mp4 | 68.70MB BSides DC/BSides DC 2018/BSides DC 2018 - Welcome.en.transcribed.srt | 31.13KB BSides DC/BSides DC 2018/BSides DC 2018 - Welcome.mp4 | 18.32MB BSides DC/BSides DC 2018/BSides DC 2018 - What’s the Point of Compliance Making Paperwork Useful.en.transcribed.srt | 100.72KB BSides DC/BSides DC 2018/BSides DC 2018 - What’s the Point of Compliance Making Paperwork Useful.mp4 | 74.01MB BSides DC/BSides DC Logo.jpg | 20.67KB BSides Delaware/BSides Delaware 2012/Angry Cars Hacking the Car as a Platform.mp4 | 25.13MB BSides Delaware/BSides Delaware 2012/Cyber Security for the Industrial Environment An Intro to ISA IEC 62443.mp4 | 235.82MB BSides Delaware/BSides Delaware 2012/Firewalling dynamic infrastructures (the cloud) with Chef and Netfilter.mp4 | 168.53MB BSides Delaware/BSides Delaware 2012/Hacking the Male and Female OS (Men are from Windows, Women are from Linux).mp4 | 184.08MB BSides Delaware/BSides Delaware 2012/Introduction to the use after free vulnerability and why it matters.mp4 | 72.92MB BSides Delaware/BSides Delaware 2012/Social Engineering CTF Intro @SquirrelsNaBrrl.mp4 | 70.47MB BSides Delaware/BSides Delaware 2012/The Security Vulnerability Assessment Process, Best Practices & Challenges.mp4 | 88.86MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 1 1 110 years of vulnerabilities brian martin aka jericho.mp4 | 233.42MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 1 11 software security game day evan oslick eoslick.mp4 | 120.96MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 1 2 html 5 security justin klein keane @madirish2600.mp4 | 179.96MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 1 4 cloud business and academia bringing it all together cloud security alliance delaw.mp4 | 202.50MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 1 5 uncloaking ip addresses on irc derek callaway decalresponds.mp4 | 156.47MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 1 6 baking even more clam av s for fun profit nathan gibbs christ media 2nd try.mp4 | 48.41MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 1 6 baking even more clam av s for fun profit nathan gibbs christ media.mp4 | 42.37MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 1 8 introducing intelligence into your malware analysis brian baskin.mp4 | 247.99MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 1 9 another log to analyze utilizing dns to detect malware in your network nathan magn.mp4 | 250.37MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 2 1 winning isnt everything how trolling can be as much fun joey l0stkn0wledge.mp4 | 95.13MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 2 2 antipwny a windows based ids ips for metasploit rohan vazarkar david bitner.mp4 | 83.39MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 2 3 playing the forensics game forensic analysis of gaming applications for fun and pr.mp4 | 47.30MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 2 4 project phree phucking the nsa bts square r00t.mp4 | 148.03MB BSides Delaware/BSides Delaware 2013/BSidesDE 2013 2 6 hacking benjamins bob weiss pwcrack.mp4 | 372.66MB BSides Delaware/BSides Delaware 2013/Bsides 2013 how to become an unwitting accomplice in a phishing attack mark hufe hufemj.mp4 | 103.37MB BSides Delaware/BSides Delaware 2013/Bsides Delaware 2013 Wireless Penetration Testing For Realz Mellendick.mp4 | 288.80MB BSides Delaware/BSides Delaware 2013/BsidesDE 2013 LinkedAllUpIn Your Email utkonos.mp4 | 91.28MB BSides Delaware/BSides Delaware 2013/BsidesDE 2013 Pentoo Zero Chaos.mp4 | 41.00MB BSides Delaware/BSides Delaware 2013/bsidesde 2013 growing up in the information security community forgottensec.mp4 | 78.70MB BSides Delaware/BSides Delaware 2014/Cook Like a Hacker - Jim Gilsin.en.transcribed.srt | 34.35KB BSides Delaware/BSides Delaware 2014/Cook Like a Hacker - Jim Gilsin.mp4 | 59.53MB BSides Delaware/BSides Delaware 2014/Cyber Security - SWARM.mp4 | 46.50MB BSides Delaware/BSides Delaware 2014/Hacking Your way to good eats on the road.en.transcribed.srt | 73.34KB BSides Delaware/BSides Delaware 2014/Hacking Your way to good eats on the road.mp4 | 69.30MB BSides Delaware/BSides Delaware 2014/Security BSides Delaware - Afternoon - Camera 2.mp4 | 314.99MB BSides Delaware/BSides Delaware 2014/Security BSides Delaware - Afternoon.mp4 | 422.81MB BSides Delaware/BSides Delaware 2014/The Art of Sharing.en.transcribed.srt | 54.03KB BSides Delaware/BSides Delaware 2014/The Art of Sharing.mp4 | 52.30MB BSides Delaware/BSides Delaware 2014/What Dungeons and Dragons taught me about InfoSec.en.transcribed.srt | 62.56KB BSides Delaware/BSides Delaware 2014/What Dungeons and Dragons taught me about InfoSec.mp4 | 60.71MB BSides Delaware/BSides Delaware 2015/A Brief History of the Information Security Industry.en.transcribed.srt | 154.22KB BSides Delaware/BSides Delaware 2015/A Brief History of the Information Security Industry.mp4 | 102.66MB BSides Delaware/BSides Delaware 2015/A Tiny Datacenter On My Head.en.transcribed.srt | 110.04KB BSides Delaware/BSides Delaware 2015/A Tiny Datacenter On My Head.mp4 | 102.46MB BSides Delaware/BSides Delaware 2015/Bootstrapping Threat Intel Out of Thin Air.mp4 | 103.82MB BSides Delaware/BSides Delaware 2015/Building the Next Generation of InfoSec.en.transcribed.srt | 75.64KB BSides Delaware/BSides Delaware 2015/Building the Next Generation of InfoSec.mp4 | 54.68MB BSides Delaware/BSides Delaware 2015/Data You Don't Store Cannot Be Hacked!.en.transcribed.srt | 99.93KB BSides Delaware/BSides Delaware 2015/Data You Don't Store Cannot Be Hacked!.mp4 | 91.88MB BSides Delaware/BSides Delaware 2015/How Evil Kirk Uses Maltego.en.transcribed.srt | 62.95KB BSides Delaware/BSides Delaware 2015/How Evil Kirk Uses Maltego.mp4 | 61.00MB BSides Delaware/BSides Delaware 2015/IDS is dead, long live IDS.en.transcribed.srt | 138.69KB BSides Delaware/BSides Delaware 2015/IDS is dead, long live IDS.mp4 | 73.73MB BSides Delaware/BSides Delaware 2015/Inside the Outsider.en.transcribed.srt | 61.42KB BSides Delaware/BSides Delaware 2015/Inside the Outsider.mp4 | 63.01MB BSides Delaware/BSides Delaware 2015/IoT Security.en.transcribed.srt | 148.04KB BSides Delaware/BSides Delaware 2015/IoT Security.mp4 | 132.78MB BSides Delaware/BSides Delaware 2015/Mechanics of an ICS SCADA MITM.en.transcribed.srt | 83.25KB BSides Delaware/BSides Delaware 2015/Mechanics of an ICS SCADA MITM.mp4 | 67.53MB BSides Delaware/BSides Delaware 2015/OSINT for Fun & Games.en.transcribed.srt | 88.24KB BSides Delaware/BSides Delaware 2015/OSINT for Fun & Games.mp4 | 68.54MB BSides Delaware/BSides Delaware 2015/Practical IPv6 Setup and Security for your Home.en.transcribed.srt | 36.07KB BSides Delaware/BSides Delaware 2015/Practical IPv6 Setup and Security for your Home.mp4 | 50.59MB BSides Delaware/BSides Delaware 2015/Raspberry Pi, Kismet, and PCI 11.1.mp4 | 35.43MB BSides Delaware/BSides Delaware 2015/Reasonable security or are the lawyers coming.en.transcribed.srt | 110.79KB BSides Delaware/BSides Delaware 2015/Reasonable security or are the lawyers coming.mp4 | 104.50MB BSides Delhi/BSides Delhi 2017/BSides Delhi 2017 - Short Video.mp4 | 8.49MB BSides Delhi/BSides Delhi 2017/Bsides Delhi 2017 - CIS Critical Security Controls - Vikas Singh Yadav.mp4 | 127.57MB BSides Delhi/BSides Delhi 2017/Bsides Delhi 2017 - Opening Note - Sachin Bahl.mp4 | 13.84MB BSides Delhi/BSides Delhi 2017/Bsides Delhi 2017 - Web App Security Testing via AI chatBot - Abhijith BR & Thoufeeque NS.en.transcribed.srt | 29.32KB BSides Delhi/BSides Delhi 2017/Bsides Delhi 2017 - Web App Security Testing via AI chatBot - Abhijith BR & Thoufeeque NS.mp4 | 129.87MB BSides Detroit/BSides Detroit 2015/Track100-Level-One-How-To-Break-Into-The-Security-Field-Aaron-Moffett.mp4 | 34.62MB BSides Detroit/BSides Detroit 2015/Track101-Hacker-High-Why-We-Need-To-Teach-Computer-Hacking-In-Schools-Ron-Woerner.mp4 | 71.41MB BSides Detroit/BSides Detroit 2015/Track102-Getting-Started-Help-Me-Help-You-David-Trollman.mp4 | 73.98MB BSides Detroit/BSides Detroit 2015/Track103-From-Blue-To-Red-What-Matters-and-What-Really-Doesnt-Jason-Lang.mp4 | 75.07MB BSides Detroit/BSides Detroit 2015/Track104-Clear-as-FUD-How-fear-uncertainty-and-doubt-are-affecting-users-our-laws-and-technologies-Christopher-Maddalena.mp4 | 60.52MB BSides Detroit/BSides Detroit 2015/Track105-Data-Breaches-Simply-The-Cost-Of-Doing-Business-Joel-Cardella.mp4 | 61.99MB BSides Detroit/BSides Detroit 2015/Track106-Eating-the-SMB-Security-Elephant-An-ITSEC-framework-for-small-IT-shops-Austen-Bommarito.mp4 | 26.99MB BSides Detroit/BSides Detroit 2015/Track200-Enterprise-Class-Vulnerability-Management-Like-A-Boss-Rockie-Brockway.mp4 | 66.52MB BSides Detroit/BSides Detroit 2015/Track201-Funny-Money-What-Payment-Systems-Teach-us-about-Security-Drew-Sutter.mp4 | 231.05MB BSides Detroit/BSides Detroit 2015/Track202-Building-a-sturdy-foundation-a-program-based-approach-to-IT-Operations-Application-Development-and-Information-Security-in-business-Steven-Legg.mp4 | 371.27MB BSides Detroit/BSides Detroit 2015/Track203-Moving-past-Metasploit-Writing-your-first-exploit-Calvin-Hedler.mp4 | 65.44MB BSides Detroit/BSides Detroit 2015/Track205-Wielding-BurpSuite-quick-start-your-extensions-and-automation-rules-Marius-Nepomuceno.mp4 | 69.26MB BSides Detroit/BSides Detroit 2015/Track207-Browser-and-Windows-Environment-Hardening-Kurtis-Armour.mp4 | 35.22MB BSides Detroit/BSides Detroit 2015/keynote00-Information-Security-Reconciliation-The-Scene-and-The-Profession-Mark-Stanislav.mp4 | 95.53MB BSides Detroit/BSides Detroit 2016/BSides Detroit 2016 Intro.mp4 | 3.07MB BSides Detroit/BSides Detroit 2016/BSides Detroit 2016 Intro.srt | 2.26KB BSides Detroit/BSides Detroit 2016/Hacker00 Learning Security the Hard Way Going from Student to Professional Benjamin Carroll.mp4 | 38.90MB BSides Detroit/BSides Detroit 2016/Hacker00 Learning Security the Hard Way Going from Student to Professional Benjamin Carroll.srt | 46.71KB BSides Detroit/BSides Detroit 2016/Hacker01 So You Want to Be a Pentester Calvin Hedler.mp4 | 59.62MB BSides Detroit/BSides Detroit 2016/Hacker01 So You Want to Be a Pentester Calvin Hedler.srt | 69.73KB BSides Detroit/BSides Detroit 2016/Hacker02 Sheep the Shepard History and Eugenics A historical reminder on why personal privacy matter.mp4 | 84.06MB BSides Detroit/BSides Detroit 2016/Hacker02 Sheep the Shepard History and Eugenics A historical reminder on why personal privacy matter.srt | 80.96KB BSides Detroit/BSides Detroit 2016/Hacker03 I Have Been to The Future and I Did Not Want to Come Back Garrett McManaway.mp4 | 62.26MB BSides Detroit/BSides Detroit 2016/Hacker03 I Have Been to The Future and I Did Not Want to Come Back Garrett McManaway.srt | 55.95KB BSides Detroit/BSides Detroit 2016/Hacker04 Vulnerability Management Systems Flawed Leaving your Enterprise at High Risk Gordon MacKay.mp4 | 46.00MB BSides Detroit/BSides Detroit 2016/Hacker04 Vulnerability Management Systems Flawed Leaving your Enterprise at High Risk Gordon MacKay.srt | 52.96KB BSides Detroit/BSides Detroit 2016/Motown00 Car Hacking 0x05 Robert Leale.mp4 | 44.41MB BSides Detroit/BSides Detroit 2016/Motown00 Car Hacking 0x05 Robert Leale.srt | 58.52KB BSides Detroit/BSides Detroit 2016/Motown03 How to Build a Home Lab Chris Maddalena.mp4 | 47.75MB BSides Detroit/BSides Detroit 2016/Motown03 How to Build a Home Lab Chris Maddalena.srt | 59.00KB BSides Detroit/BSides Detroit 2016/Motown04 Bootstrapping A Security Research Project Andrew Hay.mp4 | 73.18MB BSides Detroit/BSides Detroit 2016/Motown04 Bootstrapping A Security Research Project Andrew Hay.srt | 82.42KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 100 Moving Towards Maturity 5 Issues InfoSec Must Address Jim Beechey.mp4 | 115.64MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 100 Moving Towards Maturity 5 Issues InfoSec Must Address Jim Beechey.srt | 139.83KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 101 Plotting Hackers Visualizing Attack Patterns Kent Gruber.mp4 | 73.23MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 101 Plotting Hackers Visualizing Attack Patterns Kent Gruber.srt | 187.51KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 103 Navigating Career Choices in InfoSec Fernando Montenegro.mp4 | 53.31MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 103 Navigating Career Choices in InfoSec Fernando Montenegro.srt | 73.07KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 105 Network Security What about the Data Jack Hatwick.mp4 | 57.90MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 105 Network Security What about the Data Jack Hatwick.srt | 110.34KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 106 Playing in Memory Examples of User Theivery and Hunting for Malware Kyle And.mp4 | 88.57MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 106 Playing in Memory Examples of User Theivery and Hunting for Malware Kyle And.srt | 111.17KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 107 An Employee their Laptop and a Hacker walk into a Bar Shannon Fritz.mp4 | 47.09MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 107 An Employee their Laptop and a Hacker walk into a Bar Shannon Fritz.srt | 165.82KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 200 STEHM is the new STEM David Schwartzberg.mp4 | 73.11MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 200 STEHM is the new STEM David Schwartzberg.srt | 170.13KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 201 Hacking with Ham Radios What I have learned in 25 years of being a ham Jay a.mp4 | 62.20MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 201 Hacking with Ham Radios What I have learned in 25 years of being a ham Jay a.srt | 128.73KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 202 Windows Event Logs Zero to Hero Nate Guagenti Adam Swan.mp4 | 55.46MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 202 Windows Event Logs Zero to Hero Nate Guagenti Adam Swan.srt | 118.66KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 203 ProbeSpy Tracking your past predicting your future Ian Odette.mp4 | 36.45MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 203 ProbeSpy Tracking your past predicting your future Ian Odette.srt | 85.28KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 204 The AppSec Starter Kit Timothy De Block.mp4 | 64.53MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 204 The AppSec Starter Kit Timothy De Block.srt | 137.33KB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 205 Estimating Development Security Maturity in About an Hour Matt Clapham.mp4 | 56.05MB BSides Detroit/BSides Detroit 2017/Bsides Detroit 2017 205 Estimating Development Security Maturity in About an Hour Matt Clapham.srt | 113.01KB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 100 Yes Youre an Impostor now get back to work Johnny Xmas.en.transcribed.srt | 229.36KB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 100 Yes Youre an Impostor now get back to work Johnny Xmas.mp4 | 160.43MB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 102 Protecting Phalanges from Processor Pressure Points Matthew Clapham.en.transcribed.srt | 64.39KB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 102 Protecting Phalanges from Processor Pressure Points Matthew Clapham.mp4 | 38.16MB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 103 Know the Enemy How to make threat intelligence work Nir Yosha.en.transcribed.srt | 119.01KB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 103 Know the Enemy How to make threat intelligence work Nir Yosha.mp4 | 91.71MB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 105 Practical Incident Response in Heterogenous Environment Kevin Murphy Stefano.en.transcribed.srt | 106.58KB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 105 Practical Incident Response in Heterogenous Environment Kevin Murphy Stefano.mp4 | 100.64MB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 200 GRC-What Would You Say You Do Here Brian Martinez.en.transcribed.srt | 116.69KB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 200 GRC-What Would You Say You Do Here Brian Martinez.mp4 | 88.97MB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 202 Nowhere to hide Lucas Gorczyca.en.transcribed.srt | 81.22KB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 202 Nowhere to hide Lucas Gorczyca.mp4 | 79.62MB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 203 tacopirates Art of Woo Ben Carroll.en.transcribed.srt | 93.33KB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 203 tacopirates Art of Woo Ben Carroll.mp4 | 44.06MB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 204 Saving All the Money to Buy All the Booze Learning to Hack All the Things on.en.transcribed.srt | 91.51KB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 204 Saving All the Money to Buy All the Booze Learning to Hack All the Things on.mp4 | 81.61MB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 204 Security KPIs Measuring Improvement in Your Security Program Steven Aiello.mp4 | 71.94MB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 Opening.en.transcribed.srt | 9.91KB BSides Detroit/BSides Detroit 2018/BSides Detroit 2018 Opening.mp4 | 10.72MB BSides Detroit/BSides Detroit Logo.jpg | 30.87KB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Adversarial Attacks on Autonomous Cars - The Missed Gap - Dr. Hoda Alkhzaimi.en.transcribed.srt | 53.11KB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Adversarial Attacks on Autonomous Cars - The Missed Gap - Dr. Hoda Alkhzaimi.mp4 | 47.97MB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Blockchain The New Line Of Defense - Ramy AlDamati.en.transcribed.srt | 74.35KB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Blockchain The New Line Of Defense - Ramy AlDamati.mp4 | 47.18MB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Creating Browser Extensions To Hunt For Low-Hanging Fruit - Rewanth Cool.mp4 | 36.98MB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Cyber Security Of The Future - Dr. Bushra Al Belooshi.en.transcribed.srt | 38.16KB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Cyber Security Of The Future - Dr. Bushra Al Belooshi.mp4 | 19.15MB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Growth Hacking Your Community - Dr. Marwan Al-Zarouni.en.transcribed.srt | 47.73KB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Growth Hacking Your Community - Dr. Marwan Al-Zarouni.mp4 | 40.59MB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Hunting Threats In Your Enterprise - Abdulrahman Al-Nimari.en.transcribed.srt | 65.60KB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Hunting Threats In Your Enterprise - Abdulrahman Al-Nimari.mp4 | 79.69MB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 My Experience Of Running CTF Competitions In 7 Arab Countries - Moataz Salah.en.transcribed.srt | 63.59KB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 My Experience Of Running CTF Competitions In 7 Arab Countries - Moataz Salah.mp4 | 56.08MB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Women In Cyber Security In The Middle East - Heide Young.en.transcribed.srt | 25.99KB BSides Dubai/BSide Dubai 2018/BSides Dubai 2018 Women In Cyber Security In The Middle East - Heide Young.mp4 | 23.93MB BSides Huntsville/BSides Huntsville 2016/100-Opening-Keynote-Jack-Daniel.mp4 | 58.50MB BSides Huntsville/BSides Huntsville 2016/101-Slaying-Rogue-Access-Points-with-Python-and-Cheap-Hardware-Gabriel-Ryan.mp4 | 30.21MB BSides Huntsville/BSides Huntsville 2016/102-Web-shells-as-a-covert-channel-Joe-Vest.mp4 | 68.85MB BSides Huntsville/BSides Huntsville 2016/104-At-the-mountains-of-malware-Lessons-learned-from-analyzing-terabytes-of-malware-Wes-Widner.mp4 | 19.20MB BSides Huntsville/BSides Huntsville 2016/107-BSides-Closeout-Paul-Coggin.mp4 | 10.51MB BSides Huntsville/BSides Huntsville 2016/200-Hacking-Peoples-Lives-with-Google-Sync-Shawn-Edwards-Sean-Hopkins.mp4 | 114.13MB BSides Huntsville/BSides Huntsville 2016/202-Threat-Modeling-the-Minecraft-Way-Jarred-White.mp4 | 127.71MB BSides Huntsville/BSides Huntsville 2016/204-History-of-WRT-and-Wireless-Mesh-protocols-Alex-Kot.mp4 | 36.05MB BSides Indy/BSides Indy 2016/Bsides-Indy01-Managing-Elevated-Privileges-in-the-Enterprise-Environment-Erik-Burgess.mp4 | 11.92MB BSides Indy/BSides Indy 2016/Bsides-Indy03-Where-to-start-when-your-environment-is-Fk3d-Amanda-Berlin.mp4 | 36.14MB BSides Indy/BSides Indy 2016/Bsides-Indy04-Building-an-Application-Security-Program-Mike-Spaulding.mp4 | 63.37MB BSides Indy/BSides Indy 2016/Bsides-Indy05-The-Art-of-the-Jedi-Mind-Trick-Jeff-Man.mp4 | 28.22MB BSides Indy/BSides Indy 2016/Bsides-Indy06-Securing-Docker-Instances-Chris-Huntington.mp4 | 35.38MB BSides Indy/BSides Indy 2017/BSides Indy 00 Strategies on Securing you banks enterprises From someone who robs banks enterprises f.mp4 | 68.29MB BSides Indy/BSides Indy 2017/BSides Indy 01 Crypto defenses for real world system threats Kenneth White.mp4 | 68.54MB BSides Indy/BSides Indy 2017/BSides Indy 02 Hardware Hacking Abusing the Things Price McDonald.mp4 | 38.07MB BSides Indy/BSides Indy 2017/BSides Indy 03 Kick starting an application security program Timothy De Block.mp4 | 26.19MB BSides Indy/BSides Indy 2017/BSides Indy 04 OSINT For The Win Tools Techniques to Maximize Effectiveness of Your Social Engineerin.mp4 | 44.97MB BSides Indy/BSides Indy 2017/BSides Indy 05 Physical Phishing Way Beyond USB Drops Rich Rumble.mp4 | 28.35MB BSides Indy/BSides Indy 2017/BSides Indy 06 Weaponizing Nanotechnology and hacking humans 2017 updates Chris Roberts.mp4 | 52.71MB BSides Indy/BSides Indy 2017/BSides Indy 07 Make STEHM Great Again David Schwartzberg.mp4 | 37.62MB BSides Indy/BSides Indy 2017/BSides Indy Intro Frank The Tank.mp4 | 10.66MB BSides Indy/BSides Indy 2017/BSides Indy Stream (again).mp4 | 145.31MB BSides Indy/BSides Indy 2018/BSides Indy 2018 00 Lessons Learned A 15 year Retrospective Price McDonald.en.transcribed.srt | 104.41KB BSides Indy/BSides Indy 2018/BSides Indy 2018 00 Lessons Learned A 15 year Retrospective Price McDonald.mp4 | 63.74MB BSides Indy/BSides Indy 2018/BSides Indy 2018 01 Phishing Forensics Is it just suspicious or is it malicious Matt Scheurer.en.transcribed.srt | 121.01KB BSides Indy/BSides Indy 2018/BSides Indy 2018 01 Phishing Forensics Is it just suspicious or is it malicious Matt Scheurer.mp4 | 80.78MB BSides Indy/BSides Indy 2018/BSides Indy 2018 02 Presenting PcketRquet An Auditory IDS Killian Ditch.en.transcribed.srt | 75.16KB BSides Indy/BSides Indy 2018/BSides Indy 2018 02 Presenting PcketRquet An Auditory IDS Killian Ditch.mp4 | 73.58MB BSides Indy/BSides Indy 2018/BSides Indy 2018 03 The Pillars of Continuous Incident Response Brad Garnett.en.transcribed.srt | 141.04KB BSides Indy/BSides Indy 2018/BSides Indy 2018 03 The Pillars of Continuous Incident Response Brad Garnett.mp4 | 75.48MB BSides Indy/BSides Indy 2018/BSides Indy 2018 04 Zero to Owned in 1 Hour Securing Privilege in Cloud and DevOps Workflow Brandon T.en.transcribed.srt | 99.26KB BSides Indy/BSides Indy 2018/BSides Indy 2018 04 Zero to Owned in 1 Hour Securing Privilege in Cloud and DevOps Workflow Brandon T.mp4 | 60.19MB BSides Indy/BSides Indy 2018/BSides Indy 2018 06 Social Engineering for the Blue Team Timothy De Block.en.transcribed.srt | 124.05KB BSides Indy/BSides Indy 2018/BSides Indy 2018 06 Social Engineering for the Blue Team Timothy De Block.mp4 | 77.33MB BSides Indy/BSides Indy 2018/BSides Indy 2018 07 Leveraging DevSecOps to Escape the Hamster Wheel of Never ending Security Fail Ch.en.transcribed.srt | 113.01KB BSides Indy/BSides Indy 2018/BSides Indy 2018 07 Leveraging DevSecOps to Escape the Hamster Wheel of Never ending Security Fail Ch.mp4 | 65.45MB BSides Indy/BSides Indy 2018/BSides Indy 2018 08 Creating a Cyber Volunteer Department Ray Davidson.en.transcribed.srt | 100.40KB BSides Indy/BSides Indy 2018/BSides Indy 2018 08 Creating a Cyber Volunteer Department Ray Davidson.mp4 | 74.85MB BSides Indy/BSides Indy 2018/BSides Indy 2018 Closing Frank Diaz.en.transcribed.srt | 38.52KB BSides Indy/BSides Indy 2018/BSides Indy 2018 Closing Frank Diaz.mp4 | 60.31MB BSides Indy/BSides Indy 2018/BSides Indy 2018 Intro.en.transcribed.srt | 9.60KB BSides Indy/BSides Indy 2018/BSides Indy 2018 Intro.mp4 | 6.12MB BSides Knoxville/BSides Knoxville 2015/Track-100-Keynote-Travis-Goodspeed.mp4 | 50.97MB BSides Knoxville/BSides Knoxville 2015/Track-101-How-Ive-hacked-and-un-hacked-a-logic-game-20-years-to-Lights-Out-Gyora-Benedek.mp4 | 62.11MB BSides Knoxville/BSides Knoxville 2015/Track-103-Finding-Bad-Guys-with-35-million-Flows-2-Analysts-5-Minutes-and-0-Dollars-Russell-Butturini.mp4 | 54.76MB BSides Knoxville/BSides Knoxville 2015/Track-104-Multipath-TCP-Breaking-Todays-Networks-with-Tomorrows-Protocols-Catherine-Pearce.mp4 | 302.28MB BSides Knoxville/BSides Knoxville 2015/Track-105-Phishing-Going-from-Recon-to-Credentials-Adam-Compton-Eric-Gershman.mp4 | 67.04MB BSides Knoxville/BSides Knoxville 2015/Track-106-High-Performance-Fuzzing-Richard-Johnson.mp4 | 76.11MB BSides Knoxville/BSides Knoxville 2015/Track-107-Cyber-Cyber-Cyber-Student-Security-Competitions-Eric-Gershman-Raymond-Borges.mp4 | 62.33MB BSides Knoxville/BSides Knoxville 2015/Track-200-The-Impossibility-of-Protecting-the-Enterprise-at-725-an-hour-Kevin-Thomas.mp4 | 69.65MB BSides Knoxville/BSides Knoxville 2015/Track-201-Ive-met-the-enemy-information-security-and-it-is-us-Slade-Griffin.mp4 | 72.45MB BSides Knoxville/BSides Knoxville 2015/Track-202-The-Poetry-of-Secrets-An-Introduction-to-Cryptography-Eric-Kolb.mp4 | 69.50MB BSides Knoxville/BSides Knoxville 2015/Track-203-From-X-to-Totally-Pwned-Russel-Van-Tuyl-Matt-Smith.mp4 | 73.62MB BSides Knoxville/BSides Knoxville 2015/Track-204-Introducing-User-Centered-Design-to-Augment-Human-Performance-in-Cyber-Warfare-Frank-Cohee-Joe-Davis.mp4 | 76.43MB BSides Knoxville/BSides Knoxville 2015/Track-205-Back-to-the-Future-Neil-Desai.mp4 | 77.35MB BSides Knoxville/BSides Knoxville 2015/Track-206-Virtualized-Routers-Soup-to-Nuts-Jeff-Nichols-Benjamin-Taylor-Tommy-Hardin.mp4 | 79.28MB BSides Las Vegas/BSides Las Vegas 2013/2 2 1 Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn t Suck Josh.mp4 | 172.53MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 1 The Security Industry How to Survive Becoming Management Christien Rioux.mp4 | 236.33MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 2 Discovering Dark Matter Towards better Android Malware Heuristics Jim.mp4 | 208.88MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 3 Mom! I Broke My Insulin Pump Again! Jay Rad Radcliffe.mp4 | 167.55MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 4 Dungeons & Dragons, Siege Warfare, and Fantasy Defense in Depth Evan.mp4 | 158.24MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 5 HiveMind Distributed File Storage Using JavaScript Botnets Sean Malone.mp4 | 188.23MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 6 gitDigger Creating useful wordlists from public GitHub repositories WiK and.mp4 | 96.98MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 7 Collaborative Penetration Testing With Lair Tom Steele and Dan Kottmann.mp4 | 146.78MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 8 Social Aftermath Responding to Social Pwnage Steven F Fox.mp4 | 96.42MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 1 Silence Equals Death Violet Blue.mp4 | 263.25MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 2 The Cavalry Isn t Coming Starting the Revolution to Fsck it All!.mp4 | 182.40MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 3 A Fire In The Eye Olli Pekka Niemi and Antti Levomaki.mp4 | 126.65MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 4 Defense Evasion Modeling Frank Artes.mp4 | 205.47MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 5 Malware Management Framework We detected WinNTI with it! Michael Gough.mp4 | 152.60MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 6 Crunching the Top 10,000 Websites Password Policies and Controls Steve Werb.mp4 | 201.26MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 7 Governments and UFOs A Historical Analysis of Disinformation and Deception R.mp4 | 206.01MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 8 Strange interactions in personal data Brokers and the CFAA Christine Dudley.mp4 | 95.77MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1530 Brendan OConnor HARK The Hacker Archive.mp4 | 40.71MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1550 Jack Whitsitt Critical Infrastructure Protection As Code.mp4 | 69.79MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 1 Diamonds, Fitness and Cults Manipulation for Fun and Profit Katie Rodzon.mp4 | 158.77MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 2 Vulnerability & Exploit Trends A Deep Look Inside The Data Ed Bellis, Michae.mp4 | 159.94MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 3 EC2 or Bust - How to Build Your Own Pen Testing Lab in Amazon EC2 Grecs.mp4 | 139.81MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 4 Techniques for Escaping the AppSec Labyrinth Andrew Hay.mp4 | 153.68MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 5 The Erudite Inebriate s Guide to Life, Liberty, and the Purfuit of Happinefs.mp4 | 158.56MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 6 Hack the Hustle! Career Strategies for Information Security Professionals Ev.mp4 | 180.73MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 7 Information Sharing, or I ve got 99 problems and they re probably.mp4 | 91.33MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 2 How embracing social media helped me stop the hackers, save the world and get.mp4 | 130.13MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 3 Malware Automation Christopher Elisan.mp4 | 219.20MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 4 Popping the Penguin An Introduction to the Principles of Linux Persistence M.mp4 | 138.85MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 5 Network Survival WCS James Costello.mp4 | 171.97MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 6 The Slings and Arrows of Open Source Security Tod Beardsley and Mister X.mp4 | 193.29MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 7 What if Petraeus was a hacker Email privacy for the rest of us Fak3r.mp4 | 112.76MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 1 Never Mind Your Diet, Cut the Crap From Your Vocabulary Keli Hay Brian Marti.mp4 | 174.89MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 2 The 7 habits of highly effective CISOs Franklin Tallah Wendy Nather).mp4 | 187.27MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 3 The Little Dutch Boy D0n Quix0te Bill E Ghote).mp4 | 181.23MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 5 Stop Shooting Blanks No magic bullets in your arsenal Renegade6 Nicolle Neul.mp4 | 203.45MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 6 Flameout Burnout Supernova Dan Ward Ally Miller).mp4 | 177.41MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 7 The Sensual Side of 3D Printing Kat Sweet Javvad Malik).mp4 | 125.59MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 1 Fun with WebSockets using Socket Puppet Mister Glass Weasel).mp4 | 99.54MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 2 Using Machine Learning to Support Information Security Alex Pinto Joel Wilba.mp4 | 218.30MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 3 The Truth, You Thought We Wouldn t Know Wolf Flight Terry Gold).mp4 | 189.76MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 4 Vulnerabilities in Application Whitelisting Malware Case Studies Jared Sperl.mp4 | 149.12MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 5 The Goodness is Baked In Baking Assurance into Software Ebony Davi Ottenheim.mp4 | 119.21MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 6 Matriux Leandros An Open Source Penetration Testing and Forensic Distribution.mp4 | 139.79MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 7 Sixteen Colors Archiving the Evolution of ANSI and ASCII Art Doug Moore Bren.mp4 | 209.18MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 1 1 You Are Being Watched! Bharat Jogi.mp4 | 151.84MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 1 2 Calling All Researchers A Discussion on Building a Security Research F.mp4 | 157.24MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 1 3 Evil Empire SIEM FTW EggDropX and Tha CheezMan.mp4 | 142.16MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 2 1 Attribution Shmatribution! FIX YOUR SHIT! Krypt3ia.mp4 | 148.06MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 2 2 Breach Panel Davi Ottenheimer, Raymond Umerley, Jack Daniel, Steve Werby, Da.mp4 | 200.82MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 1 Attacking and Defending Full.mp4 | 190.96MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 2 Say It to My Face Shannon Sistrunk.mp4 | 201.18MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 3 Alex Dreams of Risk How the Concept of Being a Craftsma.mp4 | 197.83MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 4 GTFO FTW Hacking Your Lifestyle for Fun and Profit Beau Woods and Taylor Ban.mp4 | 206.16MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 5 You can t make people act more securely, you can help them want to.mp4 | 178.24MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 6 Your Droid Has No Clothes Mike Murray and Allan Zhang.mp4 | 182.95MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 2 3 OMFG China! T Prophet.mp4 | 211.89MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 Cookie Reuse Sam Bowne.mp4 | 64.13MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 01 Least Authority File System @zooko.mp4 | 80.10MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 02 Hack cellular metabolism by targeting mitochondria @ambimorph).mp4 | 59.31MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 04 Cross Platform Metasploit Payloads @bperry).mp4 | 38.64MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 05 GPS Hacking @recompiler).mp4 | 50.44MB BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 07 SSD data evaporation @sambrowne).mp4 | 44.15MB BSides Las Vegas/BSides Las Vegas 2014/bg00 opening keynote beyond good and evil towards effective security adam shostack.mp4 | 112.44MB BSides Las Vegas/BSides Las Vegas 2014/bg01 usb write blocking with usbproxy dominic spill.mp4 | 82.36MB BSides Las Vegas/BSides Las Vegas 2014/bg02 allow myself to encrypt myself evan davison.mp4 | 108.71MB BSides Las Vegas/BSides Las Vegas 2014/bg03 what reaction to packet loss reveals about a vpn anna shubina sergey bratus.mp4 | 75.90MB BSides Las Vegas/BSides Las Vegas 2014/bg04 untwisting the mersenne twister how i killed the prng moloch.mp4 | 86.53MB BSides Las Vegas/BSides Las Vegas 2014/bg05 anatomy of memory scraping credit card stealing pos malware amol sarwate.mp4 | 131.87MB BSides Las Vegas/BSides Las Vegas 2014/bg06 cluck cluck on intels broken promises jacob torrey.mp4 | 90.15MB BSides Las Vegas/BSides Las Vegas 2014/bg07 a better way to get intelligent about threats adam vincent.mp4 | 136.93MB BSides Las Vegas/BSides Las Vegas 2014/bg08 bring your own risky apps michael raggo kevin watkins.mp4 | 129.41MB BSides Las Vegas/BSides Las Vegas 2014/bg09 invasive roots of anti cheat software alissa torres.mp4 | 129.59MB BSides Las Vegas/BSides Las Vegas 2014/bg10 vaccinating android milan gabor danijel grah.mp4 | 102.89MB BSides Las Vegas/BSides Las Vegas 2014/bg11 security testing for smart metering infrastructure steve vandenberg robert hawk.mp4 | 128.69MB BSides Las Vegas/BSides Las Vegas 2014/bg12 the savage curtain tony trummer tushar dalvi.mp4 | 122.32MB BSides Las Vegas/BSides Las Vegas 2014/bg13 we hacked the gibson now what philip young.mp4 | 111.86MB BSides Las Vegas/BSides Las Vegas 2014/cg00 sha 1 backdooring and exploitation jean philippe aumasson.mp4 | 60.80MB BSides Las Vegas/BSides Las Vegas 2014/cg01 evading code emulation writing ridiculously obvious malware that bypasses av kyle adams.mp4 | 163.69MB BSides Las Vegas/BSides Las Vegas 2014/cg02 security management without the suck tony turner tim krabec.mp4 | 124.79MB BSides Las Vegas/BSides Las Vegas 2014/cg04 malware analysis 101 n00b to ninja in 60 minutes grecs.mp4 | 121.41MB BSides Las Vegas/BSides Las Vegas 2014/cg05 travel hacking with the telecom informer tprophet.mp4 | 112.10MB BSides Las Vegas/BSides Las Vegas 2014/cg06 the untold story about atm malware daniel regalado.mp4 | 94.10MB BSides Las Vegas/BSides Las Vegas 2014/cg07 using superpowers for hardware reverse engineering joe grand.mp4 | 149.06MB BSides Las Vegas/BSides Las Vegas 2014/cg08 why am i surrounded by friggin idiots because you hired them stephen heath.mp4 | 144.17MB BSides Las Vegas/BSides Las Vegas 2014/cg09 demystiphying and fingerprinting the 802 15 4 zigbee phy ira ray jenkins sergey bratus.mp4 | 117.10MB BSides Las Vegas/BSides Las Vegas 2014/cg10 insider threat kill chain human indicators of compromise ken westin.mp4 | 44.89MB BSides Las Vegas/BSides Las Vegas 2014/cg11 a place to hang our hats security community and culture domenic rizzolo.mp4 | 43.43MB BSides Las Vegas/BSides Las Vegas 2014/cg12 booze devils advocate and hugs the best debates panel youll see at bsideslv 2014 david mortman.mp4 | 158.49MB BSides Las Vegas/BSides Las Vegas 2014/gt00 the power law of information michael roytman.mp4 | 153.93MB BSides Las Vegas/BSides Las Vegas 2014/gt01 measuring the iq of your threat intelligence feeds alex pinto kyle maxwell.mp4 | 188.05MB BSides Las Vegas/BSides Las Vegas 2014/gt02 strategies without frontiers meredith l patterson.mp4 | 169.13MB BSides Las Vegas/BSides Las Vegas 2014/gt03 clusterf ck actionable intelligence from machine learning mike sconzo.mp4 | 111.61MB BSides Las Vegas/BSides Las Vegas 2014/gt04 know thy operator misty blowers.mp4 | 126.78MB BSides Las Vegas/BSides Las Vegas 2014/gt05 improving security by avoiding traffic and still get what you want in data transfers art conkli.mp4 | 110.29MB BSides Las Vegas/BSides Las Vegas 2014/pg00 edsec hacking for education jessy irwin.mp4 | 60.41MB BSides Las Vegas/BSides Las Vegas 2014/pg02 securing sensitive data a strange game jeff elliot.mp4 | 42.76MB BSides Las Vegas/BSides Las Vegas 2014/pg03 brick in the wall vs hole in the wall caroline d hardin.mp4 | 57.12MB BSides Las Vegas/BSides Las Vegas 2014/pg04 cut the shit how to reign in your ids tony robinson da 667.mp4 | 57.70MB BSides Las Vegas/BSides Las Vegas 2014/pg05 geek welfare confessions of a convention swag hoarder rachel keslensky.mp4 | 90.74MB BSides Las Vegas/BSides Las Vegas 2014/pg06 no infosec staff no problem anthony czarnik.mp4 | 79.89MB BSides Las Vegas/BSides Las Vegas 2014/pg07 can i code against an api to learn a product adrienne merrick tagore.mp4 | 35.33MB BSides Las Vegas/BSides Las Vegas 2014/pg08 bridging the air gap cross domain solutions patrick orzechowski.mp4 | 92.33MB BSides Las Vegas/BSides Las Vegas 2014/pg09 back dooring the digital home david lister.mp4 | 83.81MB BSides Las Vegas/BSides Las Vegas 2014/pg11 ios url schemes omg guillaume k ross.mp4 | 61.28MB BSides Las Vegas/BSides Las Vegas 2014/pg12 oops that wasnt suppossed to happen bypassing internet explorers cross site scripting filter ca.mp4 | 67.97MB BSides Las Vegas/BSides Las Vegas 2014/pg13 what ive learned as a con man masterchen.mp4 | 63.20MB BSides Las Vegas/BSides Las Vegas 2014/pg14 training with raspberry pi nathaniel davis.mp4 | 45.85MB BSides Las Vegas/BSides Las Vegas 2014/pg15 black magic and secrets how certificates influence you robert lucero.mp4 | 64.27MB BSides Las Vegas/BSides Las Vegas 2014/pg16 attacking drupal greg foss.mp4 | 86.41MB BSides Las Vegas/BSides Las Vegas 2014/pg17 hackers vs auditors dan anderson.mp4 | 62.91MB BSides Las Vegas/BSides Las Vegas 2014/pg18 third party service provider diligence why are we doing it all wrong patrice coles.mp4 | 76.62MB BSides Las Vegas/BSides Las Vegas 2014/pg19 pwning the hapless or how to make your security program not suck casey dunham emily pience.mp4 | 52.41MB BSides Las Vegas/BSides Las Vegas 2014/pg20 teach a man to phish vinny lariza.mp4 | 60.23MB BSides Las Vegas/BSides Las Vegas 2014/pg21 the lore shows the way eric rand.mp4 | 59.07MB BSides Las Vegas/BSides Las Vegas 2015/ATGP00-Underground-Wi-Fi-Hacking-for-Web-Pentesters-Greg-Foss.mp4 | 191.79MB BSides Las Vegas/BSides Las Vegas 2015/ATGP01-radBIOS-Wireless-networking-with-audio-Richo-Healey.mp4 | 111.49MB BSides Las Vegas/BSides Las Vegas 2015/ATGP02-I-Amateur-Radio-And-So-Can-You-Kat-Sweet.mp4 | 90.31MB BSides Las Vegas/BSides Las Vegas 2015/ATGP03-Intro-for-New-WCTFers-Russell-Handorf-Rick-Farina.mp4 | 184.42MB BSides Las Vegas/BSides Las Vegas 2015/ATGP05-Better-Spectrum-Monitoring-with-Software-Defined-Radio-Michael-Ossmann.mp4 | 98.55MB BSides Las Vegas/BSides Las Vegas 2015/ATGP06-Wi-Door-BindRev-Shells-for-your-Wi-Fi-Vivek-Ramachandran.mp4 | 106.70MB BSides Las Vegas/BSides Las Vegas 2015/ATGP07-Software-Defined-Radio-Signal-Processing-with-a-5-Microcontroller-Jared-Boone.mp4 | 89.78MB BSides Las Vegas/BSides Las Vegas 2015/ATGP08-All-Your-RFz-Are-Belong-to-Me-Software-Defined-Radio-Exploits-Balint-Seeber.mp4 | 82.19MB BSides Las Vegas/BSides Las Vegas 2015/BG00-Injection-on-Steroids-Code-less-Code-Injections-and-0-Day-Techniques-Paul-Schofield-Udi-Yavo.mp4 | 77.43MB BSides Las Vegas/BSides Las Vegas 2015/BG01-Getting-the-data-out-using-social-media-Dakota-Nelson-Gabriel-Butterick-Byron-Wasti.mp4 | 30.55MB BSides Las Vegas/BSides Las Vegas 2015/BG03-NSA-Playset-Bridging-the-Airgap-without-Radios-Michael-Leibowitz.mp4 | 58.15MB BSides Las Vegas/BSides Las Vegas 2015/BG05-Your-Electronic-Device-Please-Understanding-the-Border-Search-Exception-Electronic-Devices-Whitney-Merrill.mp4 | 100.09MB BSides Las Vegas/BSides Las Vegas 2015/BG06-WhyMI-so-Sexy-WMI-Attacks-Real-Time-Defense-and-Advanced-Forensic-Analysis-William-Ballenthin-Claudiu-Teodorescu-Matthew-Graeber.mp4 | 66.35MB BSides Las Vegas/BSides Las Vegas 2015/BG07-TAPIOCA-TAPIOCA-Automated-Processing-for-IOC-Analysis-Ryan-J-Chapman-Moses-Schwartz.mp4 | 68.06MB BSides Las Vegas/BSides Las Vegas 2015/BG08-Building-an-Empire-with-PowerShell-Will-Schroeder-Justin-Warner.mp4 | 70.67MB BSides Las Vegas/BSides Las Vegas 2015/BG09-Remote-Access-the-APT-Ian-Latter.mp4 | 54.18MB BSides Las Vegas/BSides Las Vegas 2015/BG10-Crash-The-IoT-Train-Yourself-Intentionally-Vulnerable-WRT-IV-WRT-Paul-Asadoorian-Nick-Curran.mp4 | 75.33MB BSides Las Vegas/BSides Las Vegas 2015/CG00-Barely-Legal-the-Hackeras-Guide-to-Cybersecurity-Legislation-Jen-Ellis.mp4 | 100.97MB BSides Las Vegas/BSides Las Vegas 2015/CG01-Pentesting-with-Docker-Tom-Steele.mp4 | 60.58MB BSides Las Vegas/BSides Las Vegas 2015/CG02-Dont-hate-the-Disclosure-Hate-the-Vulnerability-How-the-government-is-bringing-researchers-and-vendors-together-to-talk-vulnerability-disclosure-Allan-Friedman.mp4 | 78.49MB BSides Las Vegas/BSides Las Vegas 2015/CG03-How-Portal-Can-Change-Your-Security-Forever-Katrina-Rodzon.mp4 | 72.90MB BSides Las Vegas/BSides Las Vegas 2015/CG04-Angler-Lurking-in-the-Domain-Shadows-Nick-Biasini.mp4 | 61.47MB BSides Las Vegas/BSides Las Vegas 2015/CG05-A-hackers-guide-to-using-the-YubiKey-how-to-add-inexpensive-2-factor-authentication-to-your-next-project-Russ-Gritzo.mp4 | 80.71MB BSides Las Vegas/BSides Las Vegas 2015/CG06-Haking-the-Next-Generation-David-Schwartzberg.mp4 | 73.61MB BSides Las Vegas/BSides Las Vegas 2015/CG07-Backdooring-MS-Office-documents-with-secret-master-keys-Yoshinori-Takesako-Shigeo-Mitsunari.mp4 | 43.84MB BSides Las Vegas/BSides Las Vegas 2015/CG08-Yes-you-too-can-perform-daring-acts-of-Live-Acquisition-D0n-Quix0te.mp4 | 67.29MB BSides Las Vegas/BSides Las Vegas 2015/CG10-Rethink-Repurpose-Reuse-Rain-Hell-Michael-Zupo.mp4 | 42.64MB BSides Las Vegas/BSides Las Vegas 2015/GT01-Adversary-Intelligence-from-Conflict-to-Consensus-Alex-Valdevia-Rich-Barger.mp4 | 61.64MB BSides Las Vegas/BSides Las Vegas 2015/GT03-Crema-A-LangSec-inspired-Language-Sergey-Bratus-Jacob-Torrey.mp4 | 73.05MB BSides Las Vegas/BSides Las Vegas 2015/GT04-Making-Breaking-Machine-Learning-Anomaly-Detectors-in-Real-Life-Clarence-Chio.mp4 | 320.39MB BSides Las Vegas/BSides Las Vegas 2015/GT06-Who-Watches-the-Watchers-Metrics-for-Security-Strategy-Michael-Roytman.mp4 | 77.07MB BSides Las Vegas/BSides Las Vegas 2015/GT07-Advancing-Internet-Security-Research-with-Big-Data-and-Graph-Databases-Andrew-Hess.mp4 | 18.67MB BSides Las Vegas/BSides Las Vegas 2015/GT08-Intro-to-Data-Science-for-Security-Rob-Bird-Alex-Shagla-McKotch.mp4 | 160.18MB BSides Las Vegas/BSides Las Vegas 2015/GT09-No-More-Fudge-Factors-and-Made-up-Shit-Performance-Numbers-That-Mean-Something-Russell-Thomas.mp4 | 116.23MB BSides Las Vegas/BSides Las Vegas 2015/GT09-When-steganography-stops-being-cool-David-Sancho.mp4 | 49.47MB BSides Las Vegas/BSides Las Vegas 2015/IATC00-IATC-Track-Introduction-and-Overview-Josh-Corman-joshcorman-Nicholas-J-Percoco.mp4 | 37.51MB BSides Las Vegas/BSides Las Vegas 2015/IATC00-Intro-and-Hack-the-Future-Keren-Elazari1.mp4 | 78.02MB BSides Las Vegas/BSides Las Vegas 2015/IATC01-Hack-the-Future-Keren-Elazari.mp4 | 40.71MB BSides Las Vegas/BSides Las Vegas 2015/IATC03-State-of-Medical-Device-Cyber-Safety-Beau-Woods-Scott-Erven.mp4 | 52.53MB BSides Las Vegas/BSides Las Vegas 2015/IATC04-Leading-in-a-Do-ocracy-Chris-Nickerson-Beau-Woods-Tod-Beardsley-Tim-Remes.mp4 | 159.34MB BSides Las Vegas/BSides Las Vegas 2015/IATC05-State-of-Automotive-Cyber-Safety-Josh-Corman-joshcorman-Craig-Smith.mp4 | 98.01MB BSides Las Vegas/BSides Las Vegas 2015/PG00-Speaking-Metrics-to-Executives-Michael-St-Vincent.mp4 | 35.32MB BSides Las Vegas/BSides Las Vegas 2015/PG01-Dropping-hell0days-Business-Interaction-for-Security-Professionals-Or-Anyone-Else-Elliot-Johnson.mp4 | 30.44MB BSides Las Vegas/BSides Las Vegas 2015/PG02-Practice-Safe-Cyber-The-Miseducation-of-American-Students-on-Internet-Safety-Vivienne-Pustell.mp4 | 47.76MB BSides Las Vegas/BSides Las Vegas 2015/PG03-Check-That-Certificate-Jacob-Jernigan-Andrew-Sorensen.mp4 | 39.26MB BSides Las Vegas/BSides Las Vegas 2015/PG04-The-Journey-To-ICS-Larry-Vandenaweele.mp4 | 25.08MB BSides Las Vegas/BSides Las Vegas 2015/PG05-Catching-Linux-Post-Exploitation-with-Auditd-Eric-Gershman.mp4 | 32.64MB BSides Las Vegas/BSides Las Vegas 2015/PG06-Adding-10-Security-to-Your-Scrum-Agile-Environment-Josh-Louden.mp4 | 148.05MB BSides Las Vegas/BSides Las Vegas 2015/PG07-Fight-back-raising-awareness-infosec-Petri-Koivisto.mp4 | 32.97MB BSides Las Vegas/BSides Las Vegas 2015/PG08-What-the-heck-is-this-radio-stuff-anyway-Nick-Kartsioukas.mp4 | 32.94MB BSides Las Vegas/BSides Las Vegas 2015/PG09-SIEMple-technology-Bill-Davison.mp4 | 30.66MB BSides Las Vegas/BSides Las Vegas 2015/PG10-How-I-learnt-hacking-in-highschool-Lokesh-Pidawekar.mp4 | 36.47MB BSides Las Vegas/BSides Las Vegas 2015/PG11-ZOMG-Its-OSINT-Heaven-Tazz-Tazz.mp4 | 55.86MB BSides Las Vegas/BSides Las Vegas 2015/PG12-Classic-Misdirection-Social-Engineering-to-Counter-Surveillance-Peter-Clemenko-III.mp4 | 35.02MB BSides Las Vegas/BSides Las Vegas 2015/PG13-Phishing-Going-from-Recon-to-Credentials-Adam-Compton-Eric-Gershman.mp4 | 39.33MB BSides Las Vegas/BSides Las Vegas 2015/PG14-Social-Media-in-Incident-Response-Program-JoEtta-LeSueur.mp4 | 24.49MB BSides Las Vegas/BSides Las Vegas 2015/PG15-Cats-and-Mice-Ever-evolving-attackers-and-other-game-changerse-Eric-Kmetz.mp4 | 32.82MB BSides Las Vegas/BSides Las Vegas 2015/PG16-FAA-FTC-FCC-FU-How-Three-F-ing-Agencies-are-Shaping-Info-Sec-Elizabeth-Wharton.mp4 | 44.05MB BSides Las Vegas/BSides Las Vegas 2015/PG17-10-Knowledge-Sharing-What-You-Learn-For-the-Benefit-of-the-Everyman-Ashley-Miller.mp4 | 54.51MB BSides Las Vegas/BSides Las Vegas 2015/PG18-Maximizing-Bro-Detection-John-B-Althouse.mp4 | 36.41MB BSides Las Vegas/BSides Las Vegas 2015/PG19-Embedding-Web-Apps-in-MITMProxy-Scripts-Chris-Czub.mp4 | 26.15MB BSides Las Vegas/BSides Las Vegas 2015/PG20-What-Lurks-in-the-Shadow-Cheryl-Biswas.mp4 | 28.26MB BSides Las Vegas/BSides Las Vegas 2015/PG21-Out-of-Denial-A-12-Step-Program-for-Recovering-Admins-Paul-Lee.mp4 | 22.76MB BSides Las Vegas/BSides Las Vegas 2015/PG22-Why-We-Cant-Have-Nice-Things-Original-Research-on-Conflict-Resolution-Styles-in-Information-Security-Risk-Management-Rachael-Lininger.mp4 | 36.53MB BSides Las Vegas/BSides Las Vegas 2015/PG23-Serial-Box-Primer-for-dealing-with-Serial-and-JTAG-for-basic-hardware-hacking-Matthew-Jakubowski.mp4 | 43.94MB BSides Las Vegas/BSides Las Vegas 2015/PW00-passwords-privacy-keystroke-dynamics-Per-Thorsheim.mp4 | 36.79MB BSides Las Vegas/BSides Las Vegas 2015/PW01-Unspeakable-passwords-pronounceable-or-Diceware-Jeffery-Goldberg.mp4 | 67.09MB BSides Las Vegas/BSides Las Vegas 2015/PW02-Pushing-on-String-Adventures-in-the-Dont-Care-Regions-of-Password-Strength-Cormac-Herley.mp4 | 82.56MB BSides Las Vegas/BSides Las Vegas 2015/PW03-What-would-fix-passwords-Some-weekly-password-audits-Pretty-graphs-to-prove-it-A-Haiku-Rick-Redman-Dale-Corpron.mp4 | 39.47MB BSides Las Vegas/BSides Las Vegas 2015/PW04-Breachego-Christian-Heinrich.mp4 | 40.40MB BSides Las Vegas/BSides Las Vegas 2015/PW05-Tell-Me-Who-You-Are-and-I-Will-Tell-You-Your-Lock-Pattern-Marte-LAge.mp4 | 187.68MB BSides Las Vegas/BSides Las Vegas 2015/PW06-Scrutinizing-WPA2-Password-Generating-Algorithms-in-Wireless-Routers-Eduardo-Novella.mp4 | 34.53MB BSides Las Vegas/BSides Las Vegas 2015/PW07-Poppin-Digital-Locks-Devin-Egan.mp4 | 33.41MB BSides Las Vegas/BSides Las Vegas 2015/PW08-Privileges-in-the-Real-World-Securing-Password-Management-Andrey-Dulkin.mp4 | 33.47MB BSides Las Vegas/BSides Las Vegas 2015/PW09-Security-Questions-Considered-Harmful-Jim-Fenton.mp4 | 29.86MB BSides Las Vegas/BSides Las Vegas 2015/PW10-I-Forgot-My-Password-Michal-A-paAek.mp4 | 56.71MB BSides Las Vegas/BSides Las Vegas 2015/PW11-Harvesting-Passwords-from-Source-Code-Scripts-and-Code-Repositories-Philippe-Paquet.mp4 | 46.24MB BSides Las Vegas/BSides Las Vegas 2015/PW12-Towards-Standardizing-Comparisons-of-Password-Guessability-Sean-Segreti-Blase-Ur.mp4 | 41.82MB BSides Las Vegas/BSides Las Vegas 2015/PW20-Password-Based-Encryption-Using-IO-Hardness-Greg-Zaverucha.mp4 | 31.47MB BSides Las Vegas/BSides Las Vegas 2015/PW21-Auth-for-Encrypted-Services-with-Server-Side-APT.mp4 | 44.27MB BSides Las Vegas/BSides Las Vegas 2015/PW22-Blind-Hashing.mp4 | 37.56MB BSides Las Vegas/BSides Las Vegas 2015/PW23-PBKDF2-Performance-Matters.mp4 | 29.47MB BSides Las Vegas/BSides Las Vegas 2015/PW24-Password-Alert-by-Google.mp4 | 38.28MB BSides Las Vegas/BSides Las Vegas 2015/PW25-No-More-Graphical-Passwords-Mark-Brunett.mp4 | 33.67MB BSides Las Vegas/BSides Las Vegas 2015/PW26-How-Secure-Are-Multi-Word-Random-Passphrases.mp4 | 37.41MB BSides Las Vegas/BSides Las Vegas 2015/PW27-Are-You-Sure-That-You-Still-Need-Passwords.mp4 | 22.88MB BSides Las Vegas/Bsides Las Vegas 2012/1 2 5 dc949 Stiltwalker Round 2.mp4 | 140.23MB BSides Las Vegas/Bsides Las Vegas 2012/1.1.0 KEYNOTE, Jack Daniel The State of Security BSides.mp4 | 91.05MB BSides Las Vegas/Bsides Las Vegas 2012/1.1.1 Matt Weeks Ambush - Catching Intruders At Any Point.mp4 | 103.86MB BSides Las Vegas/Bsides Las Vegas 2012/1.1.2 Robert Rowley Max Level Web App Security.mp4 | 83.37MB BSides Las Vegas/Bsides Las Vegas 2012/1.1.3 Davi Ottenheimer Big Data s Fourth V Or Why We ll Never Find the Loch Ness Monster.mp4 | 87.74MB BSides Las Vegas/Bsides Las Vegas 2012/1.1.4 HD Moore Empirical Exploitation.mp4 | 87.80MB BSides Las Vegas/Bsides Las Vegas 2012/1.1.5 Christopher Lytle Puzzle Competitions and You.mp4 | 75.46MB BSides Las Vegas/Bsides Las Vegas 2012/1.1.6 Parth Patel Introducing Android Security Evaluation Framework - ASEF.mp4 | 78.53MB BSides Las Vegas/Bsides Las Vegas 2012/1.1.7 Terry Gold RFID LOL.mp4 | 82.25MB BSides Las Vegas/Bsides Las Vegas 2012/1.2.0 Raphael Mudge Force Multipliers for Red Team Operations.mp4 | 92.99MB BSides Las Vegas/Bsides Las Vegas 2012/1.2.1 Andrew Hay & Matt Johansen Applications and Cloud and Hackers, Oh My!.mp4 | 97.57MB BSides Las Vegas/Bsides Las Vegas 2012/1.2.2 Brendan O Connor Reticle Dropping an Intelligent F-BOMB.mp4 | 234.71MB BSides Las Vegas/Bsides Las Vegas 2012/1.2.3 Josh Sokol Dan Cornell The Magic of Symbiotic Security Creating an Ecosystem of Security.mp4 | 76.48MB BSides Las Vegas/Bsides Las Vegas 2012/1.2.4 James Lester & Joseph Tartaro Burp Suite Informing the 99% of what the 1%ers.mp4 | 99.53MB BSides Las Vegas/Bsides Las Vegas 2012/1.2.6 Gillis Jones The Badmin project (Na-na- nanana Na-na-nanana BADMIN).mp4 | 50.98MB BSides Las Vegas/Bsides Las Vegas 2012/1.2.7 IPv6 Panel Drinking Game.mp4 | 74.71MB BSides Las Vegas/Bsides Las Vegas 2012/2.1.0 Michael Fornal How I managed to break into the InfoSec World.mp4 | 72.31MB BSides Las Vegas/Bsides Las Vegas 2012/2.1.1 David Keene Breaking Microsoft Dynamics Great Plains - an insiders guide.mp4 | 80.11MB BSides Las Vegas/Bsides Las Vegas 2012/2.1.2 William Ghote Lotus Notes Password Hash Redux.mp4 | 59.24MB BSides Las Vegas/Bsides Las Vegas 2012/2.1.3 Spencer McIntyre How I Learned To Stop Worrying and Love the Smart Meter.mp4 | 85.58MB BSides Las Vegas/Bsides Las Vegas 2012/2.1.4 Christopher Campbell Shot With Your Own Gun How Appliances are Used Against You.mp4 | 90.56MB BSides Las Vegas/Bsides Las Vegas 2012/2.1.5 Shawn Asmus, Kristov Widak Mirror Mirror -- Reflected PDF Attacks using SQL Injection.mp4 | 95.58MB BSides Las Vegas/Bsides Las Vegas 2012/2.1.6 Georgia Weidman Introducing the Smartphone Penetration Testing Framework.mp4 | 73.53MB BSides Las Vegas/Bsides Las Vegas 2012/2.2.0 Phil Young Mainframed - The Forgotten Fortress.mp4 | 92.01MB BSides Las Vegas/Bsides Las Vegas 2012/2.2.1 Walt Williams Metrics that Suck Even Less.mp4 | 107.30MB BSides Las Vegas/Bsides Las Vegas 2012/2.2.2 Conrad Constantine The Leverage of Language or How I Realized Information Theory.mp4 | 91.17MB BSides Las Vegas/Bsides Las Vegas 2012/2.2.3 Jason Ding The Blooming Social Media Economics Built on Fake Identities.mp4 | 90.08MB BSides Las Vegas/Bsides Las Vegas 2012/2.2.4 Lightning Talks.mp4 | 207.02MB BSides Leeds/BSides Leeds 2017/All You Need Is Pi by David Lodge.en.transcribed.srt | 60.68KB BSides Leeds/BSides Leeds 2017/All You Need Is Pi by David Lodge.mp4 | 33.44MB BSides Leeds/BSides Leeds 2017/Clustering Of Web Attacks A Walk Outside The Lab by Galid Yeduhai.en.transcribed.srt | 135.44KB BSides Leeds/BSides Leeds 2017/Clustering Of Web Attacks A Walk Outside The Lab by Galid Yeduhai.mp4 | 226.98MB BSides Leeds/BSides Leeds 2017/F k You, Fud by Jessica Barker and Freakyclown.en.transcribed.srt | 128.62KB BSides Leeds/BSides Leeds 2017/F k You, Fud by Jessica Barker and Freakyclown.mp4 | 59.73MB BSides Leeds/BSides Leeds 2017/Hacker Of All Trades, Master Of None by Andy Gill.en.transcribed.srt | 85.13KB BSides Leeds/BSides Leeds 2017/Hacker Of All Trades, Master Of None by Andy Gill.mp4 | 28.65MB BSides Leeds/BSides Leeds 2017/Passive-ish Recon Techniques by Tom Hudson.en.transcribed.srt | 64.49KB BSides Leeds/BSides Leeds 2017/Passive-ish Recon Techniques by Tom Hudson.mp4 | 26.03MB BSides Leeds/BSides Leeds 2017/Performing JavaScript Static Analysis by Lewis Ardern.en.transcribed.srt | 161.77KB BSides Leeds/BSides Leeds 2017/Performing JavaScript Static Analysis by Lewis Ardern.mp4 | 58.53MB BSides Leeds/BSides Leeds 2017/Prototyping And Reverse Engineering With Frida by Jay Harris.en.transcribed.srt | 106.31KB BSides Leeds/BSides Leeds 2017/Prototyping And Reverse Engineering With Frida by Jay Harris.mp4 | 50.42MB BSides Leeds/BSides Leeds 2017/Soldier To Cyber by Phill Kimpton.en.transcribed.srt | 70.16KB BSides Leeds/BSides Leeds 2017/Soldier To Cyber by Phill Kimpton.mp4 | 28.50MB BSides Leeds/BSides Leeds 2017/Working With Risk by Chris Ratcliff.en.transcribed.srt | 100.25KB BSides Leeds/BSides Leeds 2017/Working With Risk by Chris Ratcliff.mp4 | 49.17MB BSides Leeds/BSides Leeds logo.jpg | 30.31KB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - BadXNU, a rotten apple! - Pedro Vilaca.en.transcribed.srt | 124.08KB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - BadXNU, a rotten apple! - Pedro Vilaca.mp4 | 155.68MB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - CTF walkthrough - Tiago Sintra.en.transcribed.srt | 30.76KB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - CTF walkthrough - Tiago Sintra.mp4 | 57.26MB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - Diaphora a new FOSS program diffing tool - Joxean Koret.en.transcribed.srt | 75.04KB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - Diaphora a new FOSS program diffing tool - Joxean Koret.mp4 | 123.36MB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - Security Metrics Why, where and how - Tiago Henriques Tiago Martins.mp4 | 130.95MB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - Shellter - A dynamic shellcode injector - Kyriakos Economou.en.transcribed.srt | 85.50KB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - Shellter - A dynamic shellcode injector - Kyriakos Economou.mp4 | 247.45MB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - What Botnet Is This - Tiago Pereira.en.transcribed.srt | 82.20KB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - What Botnet Is This - Tiago Pereira.mp4 | 80.76MB BSides Lisbon/BSides Lisbon 2015/BSidesLisbon2015 - “Damn kids. They're all alike.” … we have a date with history - Wim Remes.mp4 | 46.22MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Brace YoSelf DDoS is Coming by Dima Bekerman.en.transcribed.srt | 72.67KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Brace YoSelf DDoS is Coming by Dima Bekerman.mp4 | 80.03MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Challenges of secure coding by Barbara Vieira.en.transcribed.srt | 50.44KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Challenges of secure coding by Barbara Vieira.mp4 | 65.15MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - From your PC to your nearest ATM a history of the sneakiest financial malware.en.transcribed.srt | 85.99KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - From your PC to your nearest ATM a history of the sneakiest financial malware.mp4 | 73.78MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - I for one welcome our new Cyber Overlords! An intro to ML in cybersecurity.en.transcribed.srt | 120.89KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - I for one welcome our new Cyber Overlords! An intro to ML in cybersecurity.mp4 | 121.65MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Introducing Man In The Contacts attack to trick encrypted messaging apps.mp4 | 88.03MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Keynote Hacking Portugal and making it a global player in Software development.en.transcribed.srt | 139.49KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Keynote Hacking Portugal and making it a global player in Software development.mp4 | 108.34MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Keynote - The Smart Fuzzer Revolution by Dan Guido.en.transcribed.srt | 106.83KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Keynote - The Smart Fuzzer Revolution by Dan Guido.mp4 | 103.24MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Lessons Learned from a Bug Bounty Operator by Jonathan Claudius.en.transcribed.srt | 117.10KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Lessons Learned from a Bug Bounty Operator by Jonathan Claudius.mp4 | 75.00MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Lightning Talk Password Profiling by Tiago Carvalho.en.transcribed.srt | 9.88KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Lightning Talk Password Profiling by Tiago Carvalho.mp4 | 11.60MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - MTLS in a Microservices World by Diogo Monica.en.transcribed.srt | 126.35KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - MTLS in a Microservices World by Diogo Monica.mp4 | 73.20MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Memory Corruption is for Wussies! by Pedro Vilaca.en.transcribed.srt | 136.97KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Memory Corruption is for Wussies! by Pedro Vilaca.mp4 | 141.99MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Semi-Offline Attack on the Android Full-Disk Encryption.en.transcribed.srt | 90.50KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - Semi-Offline Attack on the Android Full-Disk Encryption.mp4 | 78.79MB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - The way of the bounty by David Sopas.en.transcribed.srt | 81.99KB BSides Lisbon/BSides Lisbon 2016/BSides Lisbon 2016 - The way of the bounty by David Sopas.mp4 | 80.61MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Abusing Android In-app Billing feature (...) by Jérémy Matos.mp4 | 87.02MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Closing Ceremony - BSidesLisbon organizers.en.transcribed.srt | 91.44KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Closing Ceremony - BSidesLisbon organizers.mp4 | 91.34MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Controlling your neighbour's lights by André Garrido.en.transcribed.srt | 83.80KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Controlling your neighbour's lights by André Garrido.mp4 | 49.33MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Crafting the next-generation Man-in-the-Browser Trojan by P. Fortuna & P. Silva.en.transcribed.srt | 120.42KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Crafting the next-generation Man-in-the-Browser Trojan by P. Fortuna & P. Silva.mp4 | 98.14MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Fantastic signals and where to find them by Luís Grangeia and José Moreira.en.transcribed.srt | 127.45KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Fantastic signals and where to find them by Luís Grangeia and José Moreira.mp4 | 103.48MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - FileLess Malware Infections - Malware tricks for Pentesters by Ramon Pinuaga.en.transcribed.srt | 92.25KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - FileLess Malware Infections - Malware tricks for Pentesters by Ramon Pinuaga.mp4 | 74.13MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - GTFO Mr. User by David Sopas.en.transcribed.srt | 71.96KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - GTFO Mr. User by David Sopas.mp4 | 48.24MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Hardware Basics - why and how to break hardware by Kieran Roberts.en.transcribed.srt | 70.79KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Hardware Basics - why and how to break hardware by Kieran Roberts.mp4 | 31.50MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Having fun while analyzing mobile applications by alvaro Felipe Melchor.en.transcribed.srt | 57.08KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Having fun while analyzing mobile applications by alvaro Felipe Melchor.mp4 | 35.57MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - I Thought I Saw a - 4X0.- by Thomas Fischer.en.transcribed.srt | 150.64KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - I Thought I Saw a - 4X0.- by Thomas Fischer.mp4 | 112.94MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Intel AMT Using & Abusing the Ghost in the Machine by Parth Shukla.en.transcribed.srt | 135.71KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Intel AMT Using & Abusing the Ghost in the Machine by Parth Shukla.mp4 | 74.65MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Claudio André by Vítor Domingos.en.transcribed.srt | 18.17KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Claudio André by Vítor Domingos.mp4 | 25.31MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Javvad Malik by Vítor Domingos & Tiago Henriques.en.transcribed.srt | 37.83KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Javvad Malik by Vítor Domingos & Tiago Henriques.mp4 | 45.50MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Leigh Anne Galloway by Vítor Domingos & Tiago Henriques.en.transcribed.srt | 50.78KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Leigh Anne Galloway by Vítor Domingos & Tiago Henriques.mp4 | 68.35MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Oliver Kunz by Vítor Domingos & Tiago Henriques.en.transcribed.srt | 27.45KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Oliver Kunz by Vítor Domingos & Tiago Henriques.mp4 | 40.47MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Pedro Vilaca by Vítor Domingos & Tiago Henriques.en.transcribed.srt | 59.57KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Pedro Vilaca by Vítor Domingos & Tiago Henriques.mp4 | 84.15MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Thomas Fischer by Vítor Domingos & Tiago Henriques.en.transcribed.srt | 40.93KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Interview with Thomas Fischer by Vítor Domingos & Tiago Henriques.mp4 | 52.24MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Keynote How storytelling made me a better infosec professional by Javvad Malik.mp4 | 58.75MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Keynote The Post-Quantum Project Why and How by JP Aumasson.en.transcribed.srt | 110.18KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Keynote The Post-Quantum Project Why and How by JP Aumasson.mp4 | 63.23MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Practical Out-of-Band Data Exfiltration in 802.11 by João Pena Gil & Luís Gomes.en.transcribed.srt | 102.51KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Practical Out-of-Band Data Exfiltration in 802.11 by João Pena Gil & Luís Gomes.mp4 | 69.17MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - V!4GR4 BotNet Cyber-Crime, Enlarged by Ben Herzberg.en.transcribed.srt | 108.71KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Welcome to Bsides (day 1) by BSidesLisbon organizers.en.transcribed.srt | 30.03KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Welcome to Bsides (day 1) by BSidesLisbon organizers.mp4 | 41.10MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Welcome to Bsides (day 2) by BSidesLisbon organizers.en.transcribed.srt | 25.16KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Welcome to Bsides (day 2) by BSidesLisbon organizers.mp4 | 40.72MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 - Wild Wild Web App to Domain Admin A Case Study by Nacho Sorribas.mp4 | 61.29MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 Interview with Bruno Morisson by Vítor Domingos & Tiago Henriques.en.transcribed.srt | 28.46KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 Interview with Bruno Morisson by Vítor Domingos & Tiago Henriques.mp4 | 40.70MB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 Interview with Bruno Morisson by Vítor Domingos.en.transcribed.srt | 22.61KB BSides Lisbon/BSides Lisbon 2017/BSides Lisbon 2017 Interview with Bruno Morisson by Vítor Domingos.mp4 | 29.49MB BSides Lisbon/BSides Lisbon 2017/BSidesLisbon 2017 - I Boot when U-Boot by Vincent Ruijter and Bernardo Maia Rodrigues.en.transcribed.srt | 120.66KB BSides Lisbon/BSides Lisbon 2017/BSidesLisbon 2017 - I Boot when U-Boot by Vincent Ruijter and Bernardo Maia Rodrigues.mp4 | 64.07MB BSides Lisbon/BSides Lisbon Logo.jpg | 5.27KB BSides Logo.png | 3.50KB BSides London/BSides London 2011/Alec Muffett - sex, lies and instant messenger.mp4 | 46.21MB BSides London/BSides London 2011/Alec Muffett - sex, lies and instant messenger.srt | 56.01KB BSides London/BSides London 2011/Arron Finnon - DNS Tunnelling It's all in the name.mp4 | 117.00MB BSides London/BSides London 2011/Arron Finnon - DNS Tunnelling It's all in the name.srt | 57.80KB BSides London/BSides London 2011/Brian Honan - Layer 8 Security.mp4 | 170.74MB BSides London/BSides London 2011/David Rook - Jedi Mind Tricks.mp4 | 171.83MB BSides London/BSides London 2011/David Rook - Jedi Mind Tricks.srt | 79.62KB BSides London/BSides London 2011/Dr Paul Judge - Social Media & Security.mp4 | 307.81MB BSides London/BSides London 2011/Dr Paul Judge - Social Media & Security.srt | 142.97KB BSides London/BSides London 2011/Jim Shields - The Funny Thing About Information Security.mp4 | 92.23MB BSides London/BSides London 2011/Jim Shields - The Funny Thing About Information Security.srt | 94.93KB BSides London/BSides London 2011/Jimmy Blake - Cloud Computing.mp4 | 159.83MB BSides London/BSides London 2011/Jimmy Blake - Cloud Computing.srt | 67.61KB BSides London/BSides London 2011/Justin Clarke - Practical Crypto Attacks Against Web Applications.mp4 | 213.98MB BSides London/BSides London 2011/Justin Clarke - Practical Crypto Attacks Against Web Applications.srt | 90.15KB BSides London/BSides London 2011/Rory McCune - Penetration Testing Must Die.mp4 | 86.59MB BSides London/BSides London 2011/Rory McCune - Penetration Testing Must Die.srt | 61.76KB BSides London/BSides London 2011/Wicked Clown - Breaking out of Restricted RDP.mp4 | 81.53MB BSides London/BSides London 2011/Wicked Clown - Breaking out of Restricted RDP.srt | 33.41KB BSides London/BSides London 2011/Xavier Mertens - All Your Logs Are Belong To You!.mp4 | 227.64MB BSides London/BSides London 2011/Xavier Mertens - All Your Logs Are Belong To You!.srt | 91.19KB BSides London/BSides London 2012/B-sides London 2012.mp4 | 17.93MB BSides London/BSides London 2012/BSides London 2012 at the Barbican.mp4 | 10.92MB BSides London/BSides London 2012/Bsides London 2012 - Brian Honan Hacking Senior Management, Getting Your Message Across.mp4 | 110.38MB BSides London/BSides London 2012/Bsides London 2012 - Javvad Malik English, Do you speak it.mp4 | 96.24MB BSides London/BSides London 2012/Bsides London 2012 - Robert McArdle HTML5 - A Whole New Attack Vector.mp4 | 138.81MB BSides London/BSides London 2012/Bsides London 2012 - Sandro gauci Escalating privileges on common webapps.mp4 | 127.78MB BSides London/BSides London 2012/Bsides London 2012 - Thom Langford An Anatomy of a Risk Assessment.mp4 | 240.56MB BSides London/BSides London 2012/Bsides London 2012 Abraham Aranguren Introducing OWTF.mp4 | 204.08MB BSides London/BSides London 2012/Bsides London 2012 Amol Sarwate SCADA Security, why is it so hard.mp4 | 223.57MB BSides London/BSides London 2012/Bsides London 2012 David Rook Windows Phone 7 platform and application security overview.mp4 | 237.78MB BSides London/BSides London 2012/Bsides London 2012 Paco Hope - Randomness.mp4 | 148.49MB BSides London/BSides London 2012/Bsides London 2012, Dave Hartley SAP Slapping A Pen Testers Guide.mp4 | 179.82MB BSides London/BSides London 2012/Bsides London 2012, Robin Wood - Breaking into Security.mp4 | 208.84MB BSides London/BSides London 2012/Security BSides London 2012 Colin McLean - H@cking Tayles of the first degree.mp4 | 87.75MB BSides London/BSides London 2012/Security Bsides London Returns 2012.mp4 | 12.27MB BSides London/BSides London 2013/Bsides London 2013 - Abraham Aranguren Interview.mp4 | 25.50MB BSides London/BSides London 2013/Bsides London 2013 - Candid Wuest Interview.mp4 | 8.71MB BSides London/BSides London 2013/Bsides London 2013 - Chris John Riley Interview.mp4 | 10.51MB BSides London/BSides London 2013/Bsides London 2013 - David Rook Interview.mp4 | 10.72MB BSides London/BSides London 2013/Bsides London 2013 - Gavin Ewan Interview.mp4 | 10.43MB BSides London/BSides London 2013/Bsides London 2013 - Javvad Malik Interview.mp4 | 13.74MB BSides London/BSides London 2013/Bsides London 2013 - Ksenia Dmitrieva Interview.mp4 | 9.91MB BSides London/BSides London 2013/Bsides London 2013 - Rorie Hood Interview.mp4 | 15.91MB BSides London/BSides London 2013/Bsides London 2013 - Rory McCune Interview.mp4 | 9.21MB BSides London/BSides London 2013/BsidesLondon 2013 promo.mp4 | 1.74MB BSides London/BSides London 2014/Aman Hardikar - Introducing Opabinia (SSLAuditor4) (Rookie Track).mp4 | 26.26MB BSides London/BSides London 2014/Aman Hardikar - Introducing Opabinia (SSLAuditor4) (Rookie Track).srt | 18.57KB BSides London/BSides London 2014/Arron Finnon Finuxs Historical Tour of IDS Evasion, Insertions and Other Oddities.mp4 | 145.84MB BSides London/BSides London 2014/Arron Finnon Finuxs Historical Tour of IDS Evasion, Insertions and Other Oddities.srt | 112.59KB BSides London/BSides London 2014/BSidesLondon 2014 Closing Ceremony.mp4 | 287.04MB BSides London/BSides London 2014/BSidesLondon 2014 Closing Ceremony.srt | 61.73KB BSides London/BSides London 2014/Beverley A MacKenzie - Why Information Security Should Be Important To All Of Us (Rookie Track).mp4 | 19.39MB BSides London/BSides London 2014/Beverley A MacKenzie - Why Information Security Should Be Important To All Of Us (Rookie Track).srt | 25.30KB BSides London/BSides London 2014/Cam Buchanan - Probe to Pwn (Rookie Track).mp4 | 15.34MB BSides London/BSides London 2014/Cam Buchanan - Probe to Pwn (Rookie Track).srt | 32.75KB BSides London/BSides London 2014/Craig Young Easy Ways to Bypass Anti Virus Systems.mp4 | 82.55MB BSides London/BSides London 2014/Craig Young Easy Ways to Bypass Anti Virus Systems.srt | 96.52KB BSides London/BSides London 2014/Dalian Terry & Sam Sanoop - Teaching Kids Programming and Cyber Security (Rookie Track).mp4 | 18.41MB BSides London/BSides London 2014/Dalian Terry & Sam Sanoop - Teaching Kids Programming and Cyber Security (Rookie Track).srt | 35.47KB BSides London/BSides London 2014/Dr Gareth Owen TOR - Attacks and Countermeasures.mp4 | 100.79MB BSides London/BSides London 2014/Dr Gareth Owen TOR - Attacks and Countermeasures.srt | 198.10KB BSides London/BSides London 2014/Frederic Mohr - CSP Analysis - Attacking XSS Mitigation (Rookie Track).mp4 | 44.38MB BSides London/BSides London 2014/Frederic Mohr - CSP Analysis - Attacking XSS Mitigation (Rookie Track).srt | 36.18KB BSides London/BSides London 2014/Gavin Holt Honeywords - Detectable Password Theft.mp4 | 54.07MB BSides London/BSides London 2014/Gavin Holt Honeywords - Detectable Password Theft.srt | 35.39KB BSides London/BSides London 2014/Georgi Boiko - Is Privacy Still A Thing (Rookie Track).mp4 | 26.78MB BSides London/BSides London 2014/Georgi Boiko - Is Privacy Still A Thing (Rookie Track).srt | 32.14KB BSides London/BSides London 2014/Graham Sutherland Breaking Binary Protocols and Bad Crypto.mp4 | 166.30MB BSides London/BSides London 2014/Graham Sutherland Breaking Binary Protocols and Bad Crypto.srt | 97.68KB BSides London/BSides London 2014/Grant Willcox - Crawling Metadata with Recon-ng (Rookie Track).mp4 | 20.70MB BSides London/BSides London 2014/Grant Willcox - Crawling Metadata with Recon-ng (Rookie Track).srt | 23.40KB BSides London/BSides London 2014/Herbie Zimmerman - When a noob becomes aware (Rookie Track).mp4 | 24.11MB BSides London/BSides London 2014/Herbie Zimmerman - When a noob becomes aware (Rookie Track).srt | 29.99KB BSides London/BSides London 2014/Jack Daniel Impromptu Talk on B-Sides.mp4 | 277.56MB BSides London/BSides London 2014/Jack Daniel Impromptu Talk on B-Sides.srt | 47.70KB BSides London/BSides London 2014/Joseph Gwynne-Jones - The Joy of Passwords (Rookie Track).mp4 | 21.27MB BSides London/BSides London 2014/Joseph Gwynne-Jones - The Joy of Passwords (Rookie Track).srt | 22.37KB BSides London/BSides London 2014/Kaitlyn Garratley - A Look at Modern Warfare (Rookie Track).mp4 | 28.94MB BSides London/BSides London 2014/Kaitlyn Garratley - A Look at Modern Warfare (Rookie Track).srt | 26.00KB BSides London/BSides London 2014/Kevin Breen RATs and IOC's - The Easy Way.mp4 | 84.51MB BSides London/BSides London 2014/Kevin Breen RATs and IOC's - The Easy Way.srt | 63.60KB BSides London/BSides London 2014/Ollie Whitehouse Defensive Security Research is Sexy too (& Real Sign of Skill).mp4 | 142.64MB BSides London/BSides London 2014/Ollie Whitehouse Defensive Security Research is Sexy too (& Real Sign of Skill).srt | 97.74KB BSides London/BSides London 2014/Paul Amar CSRFT, A Toolkit for CSRF Vunerabilities.mp4 | 219.93MB BSides London/BSides London 2014/Paul Amar CSRFT, A Toolkit for CSRF Vunerabilities.srt | 58.86KB BSides London/BSides London 2014/Rafal Wojtczuk LoL (Layers on Layers) - Bypassing Security for Fun and Profit V2.mp4 | 111.96MB BSides London/BSides London 2014/Rafal Wojtczuk LoL (Layers on Layers) - Bypassing Security for Fun and Profit V2.srt | 82.50KB BSides London/BSides London 2014/Sasha Zivojinovic - Run-time Tools to aid Application Security Assessments (Rookie Track).mp4 | 25.66MB BSides London/BSides London 2014/Sasha Zivojinovic - Run-time Tools to aid Application Security Assessments (Rookie Track).srt | 35.06KB BSides London/BSides London 2014/Scott MacKenzie - InfoSec is a Board Responsibility (Rookie Track).mp4 | 25.24MB BSides London/BSides London 2014/Scott MacKenzie - InfoSec is a Board Responsibility (Rookie Track).srt | 26.60KB BSides London/BSides London 2014/Shaun Jones - Social Engineering Phishing Stories (Rookie Track).mp4 | 34.49MB BSides London/BSides London 2014/Shaun Jones - Social Engineering Phishing Stories (Rookie Track).srt | 30.44KB BSides London/BSides London 2014/Stephen de Vries Contininuous Security Testing in a DevOps World (Rerelease).mp4 | 366.54MB BSides London/BSides London 2014/Stephen de Vries Contininuous Security Testing in a DevOps World (Rerelease).srt | 93.39KB BSides London/BSides London 2014/Stephen de Vries Contininuous Security Testing in a DevOps World.mp4 | 60.18MB BSides London/BSides London 2014/Stephen de Vries Contininuous Security Testing in a DevOps World.srt | 93.39KB BSides London/BSides London 2014/Trey Ford - Keynote Virus! Malware! and Threats! Oh My!.mp4 | 252.33MB BSides London/BSides London 2014/Trey Ford - Keynote Virus! Malware! and Threats! Oh My!.srt | 119.57KB BSides London/BSides London 2014/d3sre - RFID Hacking - An Introduction (Rookie Track).mp4 | 19.87MB BSides London/BSides London 2014/d3sre - RFID Hacking - An Introduction (Rookie Track).srt | 31.24KB BSides London/BSides London 2015/BSides London 2015 Opening Ceremony.mp4 | 6.24MB BSides London/BSides London 2015/BSides London 2015 Opening Ceremony.srt | 9.19KB BSides London/BSides London 2015/Cam Buchanan - Intelligence led Penetration Testing.mp4 | 29.70MB BSides London/BSides London 2015/Cam Buchanan - Intelligence led Penetration Testing.srt | 68.78KB BSides London/BSides London 2015/Dr. Jessica Barker - Power to the People bringing infosec to the masses.mp4 | 29.11MB BSides London/BSides London 2015/Dr. Jessica Barker - Power to the People bringing infosec to the masses.srt | 63.63KB BSides London/BSides London 2015/George Chatzisofroniou - Introducing wifiphisher, a tool for automated WiFi phishing attacks.mp4 | 36.00MB BSides London/BSides London 2015/George Chatzisofroniou - Introducing wifiphisher, a tool for automated WiFi phishing attacks.srt | 69.54KB BSides London/BSides London 2015/Jakub Kaluzny - Proprietary network protocols - risky business on the wire..mp4 | 59.65MB BSides London/BSides London 2015/Jakub Kaluzny - Proprietary network protocols - risky business on the wire..srt | 67.21KB BSides London/BSides London 2015/James Loureiro & David Middlehurst - Why bother assessing popular software.mp4 | 54.88MB BSides London/BSides London 2015/James Loureiro & David Middlehurst - Why bother assessing popular software.srt | 76.15KB BSides London/BSides London 2015/Joe Greenwood - Crash all the Flying Things! - exploiting and defending aircraft collision avoidance.mp4 | 54.10MB BSides London/BSides London 2015/Joe Greenwood - Crash all the Flying Things! - exploiting and defending aircraft collision avoidance.srt | 108.04KB BSides London/BSides London 2015/Kevin Breen - DarkComet From Defense To Offense - Identify your Attacker.mp4 | 73.12MB BSides London/BSides London 2015/Kevin Breen - DarkComet From Defense To Offense - Identify your Attacker.srt | 92.51KB BSides London/BSides London 2015/Martijn Grooten - Elliptic Curve Cryptography for those who are afraid of maths.mp4 | 37.30MB BSides London/BSides London 2015/Martijn Grooten - Elliptic Curve Cryptography for those who are afraid of maths.srt | 70.66KB BSides London/BSides London 2015/Wendy Nather - How Google turned me into my mother the proxy paradox in security.mp4 | 78.19MB BSides London/BSides London 2015/Wendy Nather - How Google turned me into my mother the proxy paradox in security.srt | 86.43KB BSides London/BSides London 2016/Bug Hunting with Static Code Analysis - Nick Jones.mp4 | 140.21MB BSides London/BSides London 2016/Bug Hunting with Static Code Analysis - Nick Jones.srt | 90.30KB BSides London/BSides London 2016/Closing Remarks - Thomas V Fischer.mp4 | 51.72MB BSides London/BSides London 2016/Closing Remarks - Thomas V Fischer.srt | 18.02KB BSides London/BSides London 2016/Cyber by any Other Name Would Smell as Insecure The Language of Security - Jessica Barker.mp4 | 79.42MB BSides London/BSides London 2016/Cyber by any Other Name Would Smell as Insecure The Language of Security - Jessica Barker.srt | 62.83KB BSides London/BSides London 2016/Docker Security Myths, Security Legends - Rory McCune.mp4 | 84.83MB BSides London/BSides London 2016/Docker Security Myths, Security Legends - Rory McCune.srt | 103.47KB BSides London/BSides London 2016/Getting Better with Data - Steph Locke.mp4 | 44.05MB BSides London/BSides London 2016/Getting Better with Data - Steph Locke.srt | 45.52KB BSides London/BSides London 2016/LoRa the Explorer - Attacking and Defending LoRa Systems - Robert Miller.mp4 | 132.80MB BSides London/BSides London 2016/LoRa the Explorer - Attacking and Defending LoRa Systems - Robert Miller.srt | 90.11KB BSides London/BSides London 2016/Naughty Toys for Wicked Girls and Boys - Steve Lord.mp4 | 104.69MB BSides London/BSides London 2016/Naughty Toys for Wicked Girls and Boys - Steve Lord.srt | 94.10KB BSides London/BSides London 2016/OEMs Considered Harmful Hello New 0Days! - Adam Donenfeld.mp4 | 58.96MB BSides London/BSides London 2016/OEMs Considered Harmful Hello New 0Days! - Adam Donenfeld.srt | 45.77KB BSides London/BSides London 2016/OSTrICa - Open Source Threat Intelligence Collector - Roberto Sponchioni.mp4 | 133.83MB BSides London/BSides London 2016/Offensive Anti-Analysis - Holly Williams.mp4 | 98.24MB BSides London/BSides London 2016/Offensive Anti-Analysis - Holly Williams.srt | 84.38KB BSides London/BSides London 2016/Open Source Malware Lab - Robert Simmons.mp4 | 92.07MB BSides London/BSides London 2016/Open Source Malware Lab - Robert Simmons.srt | 99.81KB BSides London/BSides London 2016/iOS Malware Myth or Reality - Julien Bachmann.mp4 | 142.42MB BSides London/BSides London 2016/iOS Malware Myth or Reality - Julien Bachmann.srt | 104.41KB BSides London/BSides London 2017/A look at TR-06FAIL and other CPE Configuration Disasters - Darren Martyn.mp4 | 46.04MB BSides London/BSides London 2017/A look at TR-06FAIL and other CPE Configuration Disasters - Darren Martyn.srt | 125.41KB BSides London/BSides London 2017/Awareness about behavior online, how to build it - J3lena Milosevic.mp4 | 10.18MB BSides London/BSides London 2017/Connecting the dots! - Arron Finnon.mp4 | 42.21MB BSides London/BSides London 2017/Connecting the dots! - Arron Finnon.srt | 91.01KB BSides London/BSides London 2017/Enemies of the West - Neil Lines.mp4 | 48.31MB BSides London/BSides London 2017/Enemies of the West - Neil Lines.srt | 141.58KB BSides London/BSides London 2017/Freaky Leaks from a Chic Geek - Chris Kubecka.mp4 | 31.31MB BSides London/BSides London 2017/Freaky Leaks from a Chic Geek - Chris Kubecka.srt | 80.62KB BSides London/BSides London 2017/Holy smokes, how to vape yourself to root - Ross Bevington.mp4 | 44.51MB BSides London/BSides London 2017/Holy smokes, how to vape yourself to root - Ross Bevington.srt | 101.22KB BSides London/BSides London 2017/Hunt Or Be Hunted - Alex Davies.mp4 | 45.44MB BSides London/BSides London 2017/Hunt Or Be Hunted - Alex Davies.srt | 130.12KB BSides London/BSides London 2017/Ignorance is bliss - does privacy matter - Andi Hudson.mp4 | 17.31MB BSides London/BSides London 2017/Ignorance is bliss - does privacy matter - Andi Hudson.srt | 35.41KB BSides London/BSides London 2017/Introducing Pi-Key Hacking just like the Movies - Jon Aubrey; Trevor Shingles.srt | 102.84KB BSides London/BSides London 2017/Introducing Pi-Key Hacking just like the Movies - Jon Aubrey_ Trevor Shingles.mp4 | 37.99MB BSides London/BSides London 2017/Running Circles On Social Media - Intelligent OSINT - Jack.mp4 | 12.10MB BSides London/BSides London 2017/Security Monitoring Avoiding Oh Sh t Moments - Peter Bryan.mp4 | 18.53MB BSides London/BSides London 2017/Security Monitoring Avoiding Oh Sh t Moments - Peter Bryan.srt | 46.80KB BSides London/BSides London 2017/Sharing is not caring Proliferation of GitHub code in real attacks - Christopher Doman.mp4 | 43.64MB BSides London/BSides London 2017/Sharing is not caring Proliferation of GitHub code in real attacks - Christopher Doman.srt | 128.64KB BSides London/BSides London 2017/The state of crypto APIs - Nick Smith.mp4 | 11.12MB BSides London/BSides London 2017/The state of crypto APIs - Nick Smith.srt | 29.94KB BSides London/BSides London 2017/Think about the box - Stefan Hager.mp4 | 16.83MB BSides London/BSides London 2017/Think about the box - Stefan Hager.srt | 35.44KB BSides London/BSides London 2017/Truly Anonymous Credentials Using Modern Cryptography - Matthew Di Ferrante.mp4 | 50.55MB BSides London/BSides London 2017/Truly Anonymous Credentials Using Modern Cryptography - Matthew Di Ferrante.srt | 138.56KB BSides London/BSides London 2017/WiFi-based IMSI Catcher - Piers O'Hanlon.mp4 | 39.55MB BSides London/BSides London 2017/WiFi-based IMSI Catcher - Piers O'Hanlon.srt | 77.67KB BSides London/BSides London 2018/BotProbe - botnet traffic capture using IPFIX - Mark Graham.en.transcribed.srt | 108.62KB BSides London/BSides London 2018/BotProbe - botnet traffic capture using IPFIX - Mark Graham.mp4 | 53.84MB BSides London/BSides London 2018/Breaking the Bodyguards Tech Enabled Crime - Chrissy Marie Morgan.en.transcribed.srt | 46.88KB BSides London/BSides London 2018/Breaking the Bodyguards Tech Enabled Crime - Chrissy Marie Morgan.mp4 | 15.47MB BSides London/BSides London 2018/Circumventing egress filtering by exploiting HTTP - Lorenzo Grespan.en.transcribed.srt | 60.08KB BSides London/BSides London 2018/Circumventing egress filtering by exploiting HTTP - Lorenzo Grespan.mp4 | 34.55MB BSides London/BSides London 2018/Deep Dive on the Dark Web - John Shier.en.transcribed.srt | 111.21KB BSides London/BSides London 2018/Deep Dive on the Dark Web - John Shier.mp4 | 51.30MB BSides London/BSides London 2018/Diggin Deep into Newly Created Domains - Andrew Freebrey.en.transcribed.srt | 26.15KB BSides London/BSides London 2018/Diggin Deep into Newly Created Domains - Andrew Freebrey.mp4 | 11.46MB BSides London/BSides London 2018/From n00b to 1337 A CTF Story - Working title! - Sophia McCall.en.transcribed.srt | 24.30KB BSides London/BSides London 2018/From n00b to 1337 A CTF Story - Working title! - Sophia McCall.mp4 | 7.36MB BSides London/BSides London 2018/Hacking the Drones - Aatif Khan.en.transcribed.srt | 65.62KB BSides London/BSides London 2018/Hacking the Drones - Aatif Khan.mp4 | 27.29MB BSides London/BSides London 2018/How I break into Casinos, Airports and CNI The Basics of Social Engineering - Chris Pritchard.en.transcribed.srt | 76.40KB BSides London/BSides London 2018/How I break into Casinos, Airports and CNI The Basics of Social Engineering - Chris Pritchard.mp4 | 44.17MB BSides London/BSides London 2018/How to Actually attack computers at cafes - Felix Ryan.en.transcribed.srt | 31.62KB BSides London/BSides London 2018/How to Actually attack computers at cafes - Felix Ryan.mp4 | 11.94MB BSides London/BSides London 2018/How to get started in Cybersecurity - John Stoner.en.transcribed.srt | 57.42KB BSides London/BSides London 2018/How to get started in Cybersecurity - John Stoner.mp4 | 18.80MB BSides London/BSides London 2018/How to take over a production system in the cloud - Paul Schwarzenberger.en.transcribed.srt | 101.77KB BSides London/BSides London 2018/How to take over a production system in the cloud - Paul Schwarzenberger.mp4 | 59.47MB BSides London/BSides London 2018/One year in security - what was that thing called again - Joel Potts.en.transcribed.srt | 33.63KB BSides London/BSides London 2018/One year in security - what was that thing called again - Joel Potts.mp4 | 13.48MB BSides London/BSides London 2018/Profiling the attacker - using offender profiling in SOC environments - James Stevenson.en.transcribed.srt | 58.55KB BSides London/BSides London 2018/Profiling the attacker - using offender profiling in SOC environments - James Stevenson.mp4 | 18.54MB BSides London/BSides London 2018/Random Problems in IoT - Mark Carney.en.transcribed.srt | 139.61KB BSides London/BSides London 2018/Random Problems in IoT - Mark Carney.mp4 | 89.09MB BSides London/BSides London 2018/Solving Threat Detection - Alex Davies.en.transcribed.srt | 109.67KB BSides London/BSides London 2018/Solving Threat Detection - Alex Davies.mp4 | 38.72MB BSides London/BSides London 2018/Stop Training, Start Marketing - Jessica Payne.en.transcribed.srt | 28.58KB BSides London/BSides London 2018/Stop Training, Start Marketing - Jessica Payne.mp4 | 12.91MB BSides London/BSides London 2018/Structured analytical techniques for cyber security - Gabriel Currie.en.transcribed.srt | 34.23KB BSides London/BSides London 2018/Structured analytical techniques for cyber security - Gabriel Currie.mp4 | 10.74MB BSides London/BSides London 2018/The green padlock of doom, or why no one trusts us anymore - Meadow Ellis.mp4 | 53.15MB BSides London/BSides London 2018/Travel with Underground Services ecosystem exposed - Vladimir Kropotov.en.transcribed.srt | 65.65KB BSides London/BSides London 2018/Travel with Underground Services ecosystem exposed - Vladimir Kropotov.mp4 | 33.59MB BSides London/BSides London 2018/Understanding your business risks are key - Paul Holland.en.transcribed.srt | 32.45KB BSides London/BSides London 2018/Understanding your business risks are key - Paul Holland.mp4 | 9.34MB BSides London/BSides London 2018/Unlocking Opportunities in Cyber Security - James Hickie.en.transcribed.srt | 34.80KB BSides London/BSides London 2018/Unlocking Opportunities in Cyber Security - James Hickie.mp4 | 12.29MB BSides London/BSides London 2018/Why InfoSec needs rookies like us. - Aimee Laycock.en.transcribed.srt | 39.20KB BSides London/BSides London 2018/Why InfoSec needs rookies like us. - Aimee Laycock.mp4 | 19.97MB BSides London/BSides London 2018/[Keynote] State of The Net - Mikko Hypponen.en.transcribed.srt | 107.61KB BSides London/BSides London 2018/[Keynote] State of The Net - Mikko Hypponen.mp4 | 65.00MB BSides London/BSides London logo.jpg | 13.21KB BSides Luxembourg/BSides Luxembourg.jpg | 25.16KB BSides Munich/BSides Munich 2017/CookieMonstruo.en.transcribed.srt | 65.55KB BSides Munich/BSides Munich 2017/CookieMonstruo.mp4 | 40.24MB BSides Munich/BSides Munich 2017/Data Exfiltration.mp4 | 33.55MB BSides Munich/BSides Munich 2017/Hackers! Do We Shoot Or Do We Hug.mp4 | 72.93MB BSides Munich/BSides Munich 2017/Improve you Network Security With Opensource IDS IPS.en.transcribed.srt | 59.53KB BSides Munich/BSides Munich 2017/Improve you Network Security With Opensource IDS IPS.mp4 | 32.21MB BSides Munich/BSides Munich 2017/Keynote Hardening The Web Platform.en.transcribed.srt | 174.18KB BSides Munich/BSides Munich 2017/Keynote Hardening The Web Platform.mp4 | 86.36MB BSides Munich/BSides Munich 2017/Long Term Study On SSL TLS Certificates.mp4 | 30.84MB BSides Munich/BSides Munich 2017/Network and Incident Response.en.transcribed.srt | 55.98KB BSides Munich/BSides Munich 2017/Network and Incident Response.mp4 | 33.01MB BSides Munich/BSides Munich 2017/NoSQL Means No Security.en.transcribed.srt | 71.95KB BSides Munich/BSides Munich 2017/NoSQL Means No Security.mp4 | 50.59MB BSides Munich/BSides Munich 2017/Welcome Address.en.transcribed.srt | 17.36KB BSides Munich/BSides Munich 2017/Welcome Address.mp4 | 29.75MB BSides Munich/BSides Munich 2017/Would You Like Some Honey With That.en.transcribed.srt | 60.59KB BSides Munich/BSides Munich 2017/Would You Like Some Honey With That.mp4 | 30.41MB BSides Munich/BSides Munich 2018/Att&ck™ the Attacker.mp4 | 127.72MB BSides Munich/BSides Munich 2018/CWS - Cryptographic Web Store.en.transcribed.srt | 98.20KB BSides Munich/BSides Munich 2018/CWS - Cryptographic Web Store.mp4 | 152.94MB BSides Munich/BSides Munich 2018/Closing.en.transcribed.srt | 5.75KB BSides Munich/BSides Munich 2018/Closing.mp4 | 2.72MB BSides Munich/BSides Munich 2018/DIY Patch Management.en.transcribed.srt | 111.82KB BSides Munich/BSides Munich 2018/DIY Patch Management.mp4 | 115.39MB BSides Munich/BSides Munich 2018/I've Had Enough! Of Security.en.transcribed.srt | 56.56KB BSides Munich/BSides Munich 2018/I've Had Enough! Of Security.mp4 | 83.50MB BSides Munich/BSides Munich 2018/Improving The Data Privacy Within IoT Networks.mp4 | 79.18MB BSides Munich/BSides Munich 2018/Opening.en.transcribed.srt | 23.51KB BSides Munich/BSides Munich 2018/Opening.mp4 | 37.26MB BSides Munich/BSides Munich 2018/ParseDroid Targeting The Android Development & Research Community.en.transcribed.srt | 24.48KB BSides Munich/BSides Munich 2018/ParseDroid Targeting The Android Development & Research Community.mp4 | 54.61MB BSides Munich/BSides Munich 2018/Social Engineering And Emerging Multimedia Technologies.en.transcribed.srt | 57.89KB BSides Munich/BSides Munich 2018/Social Engineering And Emerging Multimedia Technologies.mp4 | 104.45MB BSides Munich/BSides Munich 2018/Social Media How You Make Yourself A Target And Help Obstruct Corporate Security.en.transcribed.srt | 108.54KB BSides Munich/BSides Munich 2018/Social Media How You Make Yourself A Target And Help Obstruct Corporate Security.mp4 | 164.63MB BSides Munich/BSides Munich 2018/The First Monero Hardware Wallet.en.transcribed.srt | 121.39KB BSides Munich/BSides Munich 2018/The First Monero Hardware Wallet.mp4 | 213.51MB BSides Munich/BSides Munich 2018/The Hacker's Guide To Perception.en.transcribed.srt | 103.45KB BSides Munich/BSides Munich 2018/The Hacker's Guide To Perception.mp4 | 210.19MB BSides Munich/BSides Munich 2018/To Click Or Not To Click, Or How To Build Awareness About Behavior Online (Keynote).mp4 | 72.41MB BSides Munich/BSides Munich 2018/UPnP - Universal Pwn n Play.en.transcribed.srt | 78.68KB BSides Munich/BSides Munich 2018/UPnP - Universal Pwn n Play.mp4 | 132.81MB BSides Munich/BSides Munich 2018/Vulnswatch Managing Known Vulnerabilities In A Product.en.transcribed.srt | 36.08KB BSides Munich/BSides Munich 2018/Vulnswatch Managing Known Vulnerabilities In A Product.mp4 | 51.01MB BSides Munich/BSides Munich logo.jpg | 21.06KB BSides Nashville/BSides Nashville 2014/000 welcome to bsides nashville.mp4 | 32.28MB BSides Nashville/BSides Nashville 2014/001 bsides harmonicas and communication skills jack daniel.mp4 | 142.10MB BSides Nashville/BSides Nashville 2014/002 closing ceremonies.mp4 | 15.89MB BSides Nashville/BSides Nashville 2014/100 attack paths breaking into infosec from it or other totally different fields eve adams.mp4 | 126.59MB BSides Nashville/BSides Nashville 2014/101 learn from your mistakes adam len compton.mp4 | 96.93MB BSides Nashville/BSides Nashville 2014/102 beating the infosec learning curve without burning out scott thomas.mp4 | 79.04MB BSides Nashville/BSides Nashville 2014/103 sun tzu was a punk confucius was an infosec rockstar branden miller.mp4 | 90.34MB BSides Nashville/BSides Nashville 2014/200 making mongo cry automated nosql exploitation with nosqlmap russell butturini.mp4 | 85.96MB BSides Nashville/BSides Nashville 2014/201 the bsidesnash talk that keeps YouTube up all night (2).mp4 | 93.80MB BSides Nashville/BSides Nashville 2014/201 the bsidesnash talk that keeps YouTube up all night.mp4 | 97.46MB BSides Nashville/BSides Nashville 2014/202 how do i hack thee let me count the ways stewart fey.mp4 | 201.34MB BSides Nashville/BSides Nashville 2014/203 healthcare security which protocal adam john.mp4 | 152.31MB BSides Nashville/BSides Nashville 2014/204 why you can t prove you re pwnd but you are ben miller.mp4 | 164.62MB BSides Nashville/BSides Nashville 2014/300 bending and twisting networks paul coggin.mp4 | 189.03MB BSides Nashville/BSides Nashville 2014/301 succeeding with enterprise software security key performance indicators rafal los.mp4 | 191.59MB BSides Nashville/BSides Nashville 2014/302 scaling security in the enterprise making people a stronger link kevin riggs.mp4 | 154.31MB BSides Nashville/BSides Nashville 2014/305 seeing purple hybrid security teams for the enterprise mark kikta.mp4 | 77.94MB BSides Nashville/BSides Nashville 2014/Applying analog thinking to digial networks Winn Schwartau.mp4 | 216.15MB BSides Nashville/BSides Nashville 2014/Barry White version 100 attack paths breaking into infosec Eve Adams.mp4 | 158.17MB BSides Nashville/BSides Nashville 2015/B00 Applied Detection and Analysis Using Flow Data Jason A Smith.mp4 | 119.46MB BSides Nashville/BSides Nashville 2015/B01 Using devops monitoring tools to increase security visibility Chris Rimondi.mp4 | 57.88MB BSides Nashville/BSides Nashville 2015/B02 The Great Trojan Demo Ben Miller.mp4 | 94.98MB BSides Nashville/BSides Nashville 2015/B03 Nobody Understands Me Better Executive Metrics Michael St Vincent.mp4 | 113.45MB BSides Nashville/BSides Nashville 2015/B04 Agile and Security Oil and Water Ron Parker.mp4 | 79.73MB BSides Nashville/BSides Nashville 2015/BSides Nashville Intro and Pondering the False Economy of Secrets Trey Ford @TreyFord.mp4 | 100.68MB BSides Nashville/BSides Nashville 2015/G01 We Built This So Can You Tim Fowler.mp4 | 109.03MB BSides Nashville/BSides Nashville 2015/G02 Thats NOT my RJ45 Jack IRL Networking for Humans Johnny Xmas.mp4 | 78.00MB BSides Nashville/BSides Nashville 2015/G03 Finding Low Hanging Fruit with Kali Stephen Haywood.mp4 | 103.94MB BSides Nashville/BSides Nashville 2015/G04 What do infosec practitioners actually do Slade Griffin.mp4 | 116.89MB BSides Nashville/BSides Nashville 2015/R00 From Parking Lot to Server Room Tim Roberts and Brent White.mp4 | 164.33MB BSides Nashville/BSides Nashville 2015/R01 N4P Wireless Pentesting So easy even a caveman can do it Chris Scott.mp4 | 134.15MB BSides Nashville/BSides Nashville 2015/R02 hashcat NSAKEY.mp4 | 127.43MB BSides Nashville/BSides Nashville 2015/R04 Skiddiemonkeys Fling stuff at your Defenses and See What Sticks Russell Butturini Joshua Tower.mp4 | 90.18MB BSides Nashville/BSides Nashville 2016/B00 At the mountains of malware Wes Widner.mp4 | 125.21MB BSides Nashville/BSides Nashville 2016/B00 At the mountains of malware Wes Widner.srt | 67.18KB BSides Nashville/BSides Nashville 2016/B01 Collection and Detection with Flow Data A Follow Up Jason Smith.mp4 | 134.30MB BSides Nashville/BSides Nashville 2016/B01 Collection and Detection with Flow Data A Follow Up Jason Smith.srt | 69.00KB BSides Nashville/BSides Nashville 2016/B02 Container Chaos Docker Security Container Auditing Chris Huntington.mp4 | 52.49MB BSides Nashville/BSides Nashville 2016/B02 Container Chaos Docker Security Container Auditing Chris Huntington.srt | 75.06KB BSides Nashville/BSides Nashville 2016/B03 Its Not If But When How to Create Your Cyber Incident Response Plan Lucie Hayward Marc Brawner.mp4 | 67.69MB BSides Nashville/BSides Nashville 2016/B03 Its Not If But When How to Create Your Cyber Incident Response Plan Lucie Hayward Marc Brawner.srt | 28.53KB BSides Nashville/BSides Nashville 2016/B04 Threat Modeling the Minecraft Way Jarred White.mp4 | 101.12MB BSides Nashville/BSides Nashville 2016/B04 Threat Modeling the Minecraft Way Jarred White.srt | 84.47KB BSides Nashville/BSides Nashville 2016/G00 AppSec Enigma and Mirage When Good Ideas Can Go Awry Frank Catucci.mp4 | 52.71MB BSides Nashville/BSides Nashville 2016/G00 AppSec Enigma and Mirage When Good Ideas Can Go Awry Frank Catucci.srt | 64.65KB BSides Nashville/BSides Nashville 2016/G01 The Art of the Jedi Mind Trick Jeff Man.mp4 | 66.85MB BSides Nashville/BSides Nashville 2016/G01 The Art of the Jedi Mind Trick Jeff Man.srt | 61.23KB BSides Nashville/BSides Nashville 2016/G02 How to get into ICS security mark heard.mp4 | 54.82MB BSides Nashville/BSides Nashville 2016/G02 How to get into ICS security mark heard.srt | 84.31KB BSides Nashville/BSides Nashville 2016/G03 The Ransomware Threat Tracking the Digital Footprints Kevin Bottomley.mp4 | 35.21MB BSides Nashville/BSides Nashville 2016/G03 The Ransomware Threat Tracking the Digital Footprints Kevin Bottomley.srt | 22.36KB BSides Nashville/BSides Nashville 2016/G04 InfoSecs in the City Starting a Successful CitySec Meetup Johnny Xmas Fletcher Munson Chris Carl.mp4 | 136.14MB BSides Nashville/BSides Nashville 2016/G04 InfoSecs in the City Starting a Successful CitySec Meetup Johnny Xmas Fletcher Munson Chris Carl.srt | 73.27KB BSides Nashville/BSides Nashville 2016/K00 And bad mistakes Ive made a few Jayson Street.mp4 | 127.17MB BSides Nashville/BSides Nashville 2016/R01 Ever Present Persistence Established Footholds Seen in the Wild Evan Pena Chris Truncer.mp4 | 126.33MB BSides Nashville/BSides Nashville 2016/R02 Forging Your Identity Credibility Beyond Words Tim Roberts Brent White.mp4 | 113.94MB BSides Nashville/BSides Nashville 2016/R02 Forging Your Identity Credibility Beyond Words Tim Roberts Brent White.srt | 58.44KB BSides Nashville/BSides Nashville 2016/R03 IAM Complicated Why you need to know about Identity and Access Management Ron Parker.mp4 | 66.18MB BSides Nashville/BSides Nashville 2016/R04 Put a Socket in it Understanding and Attacking Sockets on Android Jake Valletta.mp4 | 62.15MB BSides Nashville/BSides Nashville 2016/R04 Put a Socket in it Understanding and Attacking Sockets on Android Jake Valletta.srt | 62.51KB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Blue00 Got Vendors Armin Smailhodzic and Willie Hight.mp4 | 78.68MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Blue01 Emerging Legal Trends in Cybersecurity Rodney Hampton.mp4 | 61.28MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Blue02 Trust But Verify Your SAML Service Providers Bruce Wilson.mp4 | 41.61MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Blue03 Does DoD Level Security Work in the Real World Jeff Man.mp4 | 79.99MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Blue04 Abstract Tools for Effective Threat Hunting Chris Sanders.mp4 | 68.69MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Green00 Infosec Tools of the Trade Getting Your Hands Dirty Jason Smith and Ta - YouTube.mp4 | 52.00MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Green01 How to learn reverse engineering kick ass at bug bounties and being a.mp4 | 37.58MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Green02 A Pyrate looks at 40 Adam John.mp4 | 101.42MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Green03 Springtime for code reviews Ryan Goltry.mp4 | 46.83MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Green04 Marrying Incident Response and Threat Intel Within Your Enterprise Joe.mp4 | 99.78MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Keynote Mental Health in Infosec Hackers Hugs and Drugs Amanda Berlin.mp4 | 60.18MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Red00 Security Guards LOL Brent White.mp4 | 110.36MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Red01 Windows Operating System Archaeology Casey Smithand Matt Nelson.mp4 | 49.15MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Red02 Intro to drone tech Ron Foster.mp4 | 73.26MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Red03 Weaponizing Splunk Using Blue Team Tools for Evil Ryan Hays.mp4 | 24.85MB BSides Nashville/BSides Nashville 2017/BSides Nashville 2017 Red04 Chunky Cookies Smashing Application Aware Defenses Russell Butturini.mp4 | 66.76MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 00 Deploying Microsoft Advanced Threat Analytics in the Real World Russel.en.transcribed.srt | 140.90KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 00 Deploying Microsoft Advanced Threat Analytics in the Real World Russel.mp4 | 109.53MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 01 Changing Who Writes the Queries High Leverage IR with Visual Playbooks.en.transcribed.srt | 178.45KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 01 Changing Who Writes the Queries High Leverage IR with Visual Playbooks.mp4 | 109.93MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 02 Hacking the Users Developing the Human Sensor and Firewall Erich Kron.en.transcribed.srt | 201.83KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 02 Hacking the Users Developing the Human Sensor and Firewall Erich Kron.mp4 | 108.84MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 04 Growing Up to be a Infosec Policy Driven Organization Frank Rietta.en.transcribed.srt | 60.44KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 04 Growing Up to be a Infosec Policy Driven Organization Frank Rietta.mp4 | 36.76MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 05 Evaluating Injection Attack Tools Through Quasi Natural Experimentatio.en.transcribed.srt | 160.52KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Blue 05 Evaluating Injection Attack Tools Through Quasi Natural Experimentatio.mp4 | 65.53MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 00 An Oral History of Bug Bounty Programs Dustin Childs.en.transcribed.srt | 169.50KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 00 An Oral History of Bug Bounty Programs Dustin Childs.mp4 | 83.51MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 01 Learning to Hack the IOT with the Damn Vulnerable Habit Helper IOT De.en.transcribed.srt | 153.77KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 01 Learning to Hack the IOT with the Damn Vulnerable Habit Helper IOT De.mp4 | 85.98MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 02 Community Based Career Activities or How Having Fun Can Help You with.en.transcribed.srt | 182.08KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 02 Community Based Career Activities or How Having Fun Can Help You with.mp4 | 111.95MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 03 See the ID Rules Before Us FAL IAL AAL eh Aaaagh How How How How Bruc.en.transcribed.srt | 128.74KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 03 See the ID Rules Before Us FAL IAL AAL eh Aaaagh How How How How Bruc.mp4 | 66.33MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 04 Hacking VDI 101 Patrick Coble.en.transcribed.srt | 69.71KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 04 Hacking VDI 101 Patrick Coble.mp4 | 34.17MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 05 Social Engineering for the Blue Team Timothy De Block.en.transcribed.srt | 72.97KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Green 05 Social Engineering for the Blue Team Timothy De Block.mp4 | 34.43MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Intro.en.transcribed.srt | 40.10KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Intro.mp4 | 35.50MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 00 Blue Cloud of Death Red Teaming Azure Bryce Kunz.en.transcribed.srt | 140.23KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 00 Blue Cloud of Death Red Teaming Azure Bryce Kunz.mp4 | 81.62MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 01 SECURITY INSTRUMENTATION BE THE HERO GETTING VALUE FROM SECURITY Brian.en.transcribed.srt | 195.34KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 01 SECURITY INSTRUMENTATION BE THE HERO GETTING VALUE FROM SECURITY Brian.mp4 | 58.96MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 02 Hillbilly Storytime Pentest Fails Adam Compton.en.transcribed.srt | 160.75KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 02 Hillbilly Storytime Pentest Fails Adam Compton.mp4 | 79.50MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 03 SAEDY Subversion and Espionage Directed Against You Judy Towers.en.transcribed.srt | 158.39KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 03 SAEDY Subversion and Espionage Directed Against You Judy Towers.mp4 | 127.23MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 04 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Mye.en.transcribed.srt | 88.74KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 Red 04 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Mye.mp4 | 61.50MB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 global 00 Know Your Why Oladipupo Ladi Adefala.en.transcribed.srt | 135.79KB BSides Nashville/BSides Nashville 2018/BSides Nashville 2018 global 00 Know Your Why Oladipupo Ladi Adefala.mp4 | 125.10MB BSides NoVa/BSides NoVa 2017/100 AM KEYNOTE RON GULA Ron Gula.mp4 | 26.83MB BSides NoVa/BSides NoVa 2017/100 AM KEYNOTE RON GULA Ron Gula.srt | 130.91KB BSides NoVa/BSides NoVa 2017/102 Using Software Defined Radio for IoT Analysis Samantha Palazzolo.mp4 | 25.38MB BSides NoVa/BSides NoVa 2017/102 Using Software Defined Radio for IoT Analysis Samantha Palazzolo.srt | 71.80KB BSides NoVa/BSides NoVa 2017/103 Imposter Syndrome I Dont Feel Like Who You Think I Am Micah Hoffman.mp4 | 19.93MB BSides NoVa/BSides NoVa 2017/103 Imposter Syndrome I Dont Feel Like Who You Think I Am Micah Hoffman.srt | 73.49KB BSides NoVa/BSides NoVa 2017/105 How the Smart City becomes stupid Denis Makrushin.mp4 | 107.73MB BSides NoVa/BSides NoVa 2017/105 How the Smart City becomes stupid Denis Makrushin.srt | 74.63KB BSides NoVa/BSides NoVa 2017/106 Wont Get Fooled Again The expected future of IoT malware and what to do about it Blaine Mulugeta.mp4 | 33.83MB BSides NoVa/BSides NoVa 2017/107 Software Supply Chains and the Illusion of Control Derek Weeks.mp4 | 49.62MB BSides NoVa/BSides NoVa 2017/200 Humans right Soft Skills in Security Ariel Robinson.mp4 | 70.94MB BSides NoVa/BSides NoVa 2017/200 Humans right Soft Skills in Security Ariel Robinson.srt | 39.58KB BSides NoVa/BSides NoVa 2017/201 Panel Local Community Cyber Groups in NoVA Jeremy Duncan.mp4 | 444.33MB BSides NoVa/BSides NoVa 2017/202 Networking with Humans to Create a Culture of Security Tracy Maleeff.mp4 | 201.16MB BSides NoVa/BSides NoVa 2017/202 Networking with Humans to Create a Culture of Security Tracy Maleeff.srt | 118.69KB BSides NoVa/BSides NoVa 2017/203 Why the NTP Security Problem Is Worse than You Think Allan Liska.mp4 | 20.88MB BSides NoVa/BSides NoVa 2017/204 Bro I Can See You Moving Laterally Richie Cyrus.mp4 | 23.63MB BSides NoVa/BSides NoVa 2017/204 Bro I Can See You Moving Laterally Richie Cyrus.srt | 46.71KB BSides NoVa/BSides NoVa 2017/205 Panel Parlaying Education and Experience into an Infosec Career Forgotten Sec.mp4 | 472.69MB BSides NoVa/BSides NoVa 2017/300 So you want to be a Cyber Threat Analyst eh Anthony Melfi.mp4 | 68.54MB BSides NoVa/BSides NoVa 2017/300 So you want to be a Cyber Threat Analyst eh Anthony Melfi.srt | 146.53KB BSides NoVa/BSides NoVa 2017/301 0 to 31337 Real Quick Lessons Learned by Reversing the Flare On Challenge Blaine Stancill.mp4 | 52.76MB BSides NoVa/BSides NoVa 2017/302 Finding a Companies BreakPoint Zachary Meyers.mp4 | 33.24MB BSides NoVa/BSides NoVa 2017/302 Finding a Companies BreakPoint Zachary Meyers.srt | 119.06KB BSides NoVa/BSides NoVa 2017/303 Challenges and Opportunities Application Containers and Microservices Andrew Wild.mp4 | 17.19MB BSides NoVa/BSides NoVa 2017/303 Challenges and Opportunities Application Containers and Microservices Andrew Wild.srt | 67.48KB BSides NoVa/BSides NoVa 2017/304 Cyber Hunt Challenge Develop and Test your Threat Hunting skills with Darryl Taylor from LogicHu.mp4 | 26.72MB BSides NoVa/BSides NoVa 2017/304 Cyber Hunt Challenge Develop and Test your Threat Hunting skills with Darryl Taylor from LogicHu.srt | 66.55KB BSides NoVa/BSides NoVa 2017/305 Anti Virus Firewall Bypass Techniques BY Candan B LKBAS Candan Bolukbas.mp4 | 23.82MB BSides NoVa/BSides NoVa 2017/306 Im Cuckoo for Malware Cuckoo Sandbox and Dynamic Malware Analysis Lane Huff.mp4 | 25.32MB BSides NoVa/BSides NoVa 2017/306 Im Cuckoo for Malware Cuckoo Sandbox and Dynamic Malware Analysis Lane Huff.srt | 102.51KB BSides NoVa/BSides NoVa 2017/PM KEYNOTE Tarah Wheeler.mp4 | 72.04MB BSides NoVa/BSides NoVa 2017/PM KEYNOTE Tarah Wheeler.srt | 91.26KB BSides NoVa/BSides NoVa 2017/Request-Fuck You, Pay Me.srt | 23.36KB BSides NoVa/BSides NoVa 2018/100 AM Keynote Matt Devost.en.transcribed.srt | 151.54KB BSides NoVa/BSides NoVa 2018/100 AM Keynote Matt Devost.mp4 | 107.15MB BSides NoVa/BSides NoVa 2018/102 Deep Dive in the Dark Web OSINT Style Kirby Plessas.en.transcribed.srt | 131.20KB BSides NoVa/BSides NoVa 2018/102 Deep Dive in the Dark Web OSINT Style Kirby Plessas.mp4 | 86.87MB BSides NoVa/BSides NoVa 2018/103 PM Keynote Jack Daniel.en.transcribed.srt | 76.96KB BSides NoVa/BSides NoVa 2018/103 PM Keynote Jack Daniel.mp4 | 65.08MB BSides NoVa/BSides NoVa 2018/104 Adding Pentest Sauce to your Vulnerability Management Recipe Luke Hudson Andrew McNicol.mp4 | 72.05MB BSides NoVa/BSides NoVa 2018/105 The Value of Design in Cyber Threat Intelligence Devon Rollins.en.transcribed.srt | 110.78KB BSides NoVa/BSides NoVa 2018/105 The Value of Design in Cyber Threat Intelligence Devon Rollins.mp4 | 72.90MB BSides NoVa/BSides NoVa 2018/106 DNC Hacked Data in the Hands of a Trained Intelligence Professional Wally Prather Dave Marcus.en.transcribed.srt | 103.49KB BSides NoVa/BSides NoVa 2018/106 DNC Hacked Data in the Hands of a Trained Intelligence Professional Wally Prather Dave Marcus.mp4 | 96.95MB BSides NoVa/BSides NoVa 2018/200 Your Facts Are Not Safe With Us Russian Information Operations as Social Engineering Meagan Keim.en.transcribed.srt | 75.13KB BSides NoVa/BSides NoVa 2018/200 Your Facts Are Not Safe With Us Russian Information Operations as Social Engineering Meagan Keim.mp4 | 64.39MB BSides NoVa/BSides NoVa 2018/201 DECEPTICON Deceptive Techniques to Derail OSINT attempts Joe Gray.en.transcribed.srt | 130.85KB BSides NoVa/BSides NoVa 2018/201 DECEPTICON Deceptive Techniques to Derail OSINT attempts Joe Gray.mp4 | 75.79MB BSides NoVa/BSides NoVa 2018/202 I Thought Renewing the Domain Name Was Your Job Allan Liska.en.transcribed.srt | 53.10KB BSides NoVa/BSides NoVa 2018/202 I Thought Renewing the Domain Name Was Your Job Allan Liska.mp4 | 45.63MB BSides NoVa/BSides NoVa 2018/203 Automating Unstructured Data Classification Malek Ben Salem.en.transcribed.srt | 39.06KB BSides NoVa/BSides NoVa 2018/203 Automating Unstructured Data Classification Malek Ben Salem.mp4 | 50.42MB BSides NoVa/BSides NoVa 2018/204 Vulnerability Patched in Democratic Donor Database Josh Lospinoso.en.transcribed.srt | 57.28KB BSides NoVa/BSides NoVa 2018/204 Vulnerability Patched in Democratic Donor Database Josh Lospinoso.mp4 | 51.56MB BSides NoVa/BSides NoVa 2018/205 Living in a world with insecure Internet of Things IoT Marc Schneider.en.transcribed.srt | 55.88KB BSides NoVa/BSides NoVa 2018/205 Living in a world with insecure Internet of Things IoT Marc Schneider.mp4 | 35.07MB BSides NoVa/BSides NoVa 2018/206 Vulnerability Accountability Levers and How You Can Use Them Amelie Koran.en.transcribed.srt | 66.88KB BSides NoVa/BSides NoVa 2018/206 Vulnerability Accountability Levers and How You Can Use Them Amelie Koran.mp4 | 55.95MB BSides NoVa/BSides NoVa 2018/207 Cyber Mutual Assistance A New Model for Preparing and Responding to Cyber Attack David Batz.en.transcribed.srt | 48.56KB BSides NoVa/BSides NoVa 2018/207 Cyber Mutual Assistance A New Model for Preparing and Responding to Cyber Attack David Batz.mp4 | 44.79MB BSides NoVa/BSides NoVa 2018/300 What Color Is Your Cyber Parachute Cliff Neve Candace King Kazi Islam Trey Maxam Amlie Koran.en.transcribed.srt | 149.49KB BSides NoVa/BSides NoVa 2018/300 What Color Is Your Cyber Parachute Cliff Neve Candace King Kazi Islam Trey Maxam Amlie Koran.mp4 | 107.97MB BSides NoVa/BSides NoVa 2018/302 Recruiting in Cyber Dan Waddel Kathleen Smith Suzie Grieco Sabrina Iacarus Kirsten Renner Karen.en.transcribed.srt | 169.52KB BSides NoVa/BSides NoVa 2018/302 Recruiting in Cyber Dan Waddel Kathleen Smith Suzie Grieco Sabrina Iacarus Kirsten Renner Karen.mp4 | 161.57MB BSides NoVa/BSides NoVa 2018/303 How to get started in Cybersecurity John Stoner.en.transcribed.srt | 67.99KB BSides NoVa/BSides NoVa 2018/303 How to get started in Cybersecurity John Stoner.mp4 | 42.73MB BSides NoVa/BSides NoVa 2018/304 Improving Technical Interviewing Forgotten Sec.en.transcribed.srt | 71.89KB BSides NoVa/BSides NoVa 2018/304 Improving Technical Interviewing Forgotten Sec.mp4 | 40.93MB BSides NoVa/BSides NoVa 2018/Rethinking Threat Intelligence Tim Gallo.en.transcribed.srt | 51.38KB BSides NoVa/BSides NoVa 2018/Rethinking Threat Intelligence Tim Gallo.mp4 | 53.31MB BSides Orlando/B-Sides Orlando 2013/Bsides Orlando - Joey Belans - Hacking Like It s 1999.mp4 | 63.41MB BSides Orlando/B-Sides Orlando 2013/Bsides Orlando - Jordan Wiens - Capture The Flag Introduction.mp4 | 108.29MB BSides Orlando/B-Sides Orlando 2013/Bsides Orlando - Luis Santana - Hacking Non-Traditional Systems.mp4 | 201.63MB BSides Orlando/B-Sides Orlando 2013/Bsides Orlando - Owen Redwood - Lessons From Training Ninjas.mp4 | 74.72MB BSides Orlando/B-Sides Orlando 2013/Bsides Orlando - Tim Armstrong - Android Malware Grows Up.mp4 | 63.89MB BSides Orlando/B-Sides Orlando 2014/Alex Hutton - Alex Dreams of Risk.mp4 | 155.28MB BSides Orlando/B-Sides Orlando 2014/Jack Daniel - Survival Skills for Infosec Pros.mp4 | 85.14MB BSides Orlando/B-Sides Orlando 2014/Jeff Toth - Tacticool Mindset.mp4 | 46.07MB BSides Orlando/B-Sides Orlando 2014/Jess Hires - Physical Security From Locks to Dox.mp4 | 67.55MB BSides Orlando/B-Sides Orlando 2014/Jorge Orchilles -- Windows Phone 8 Security and Testing WP8 Apps.mp4 | 130.00MB BSides Orlando/B-Sides Orlando 2014/Keith Perry - Roll Your Own Internet of Things Search Engine.mp4 | 102.45MB BSides Orlando/B-Sides Orlando 2014/Lee V Mangold - Decoding the Air An introduction to low cost SDR decoding.mp4 | 130.16MB BSides Orlando/B-Sides Orlando 2014/Luis Connection Santana (hacktalk) - Phishing Like The Pros.mp4 | 62.02MB BSides Orlando/B-Sides Orlando 2014/Rod Soto - Civilianization of War Paramilitarization of Cyberspace.mp4 | 122.86MB BSides Orlando/B-Sides Orlando 2014/Vikram Dhillon - Wrecking the ultimate defense Human Body.mp4 | 126.20MB BSides Orlando/B-Sides Orlando 2014/voodooKobra - When Frameworks... Don t.mp4 | 26.27MB BSides Philly/BSides Philly 2016/CJ00 Attackers Perspective A Technical Demonstration of an Email Phishing Attack Zac Davis.mp4 | 70.72MB BSides Philly/BSides Philly 2016/CJ01 How to Find a Companys BreakPoint Andrew McNicol.mp4 | 79.83MB BSides Philly/BSides Philly 2016/CJ02 What the deuce Strategies for splitting your alerts John T Myers.mp4 | 93.32MB BSides Philly/BSides Philly 2016/CJ03 Solar Flare Pulling apart SolarWinds ORION Rob Fuller.mp4 | 32.30MB BSides Philly/BSides Philly 2016/CJ04 Every day is a Zero Day Building an in house Secure SDLC program Tony Reinert.mp4 | 43.43MB BSides Philly/BSides Philly 2016/CJ05 Owning MS Outlook with Powershell Andrew Cole.mp4 | 62.52MB BSides Philly/BSides Philly 2016/CJ06 Remote attacks against IoT Alex Balan.mp4 | 54.56MB BSides Philly/BSides Philly 2016/CJ08 So you want to beat the Red Team Cameron Moore.mp4 | 137.00MB BSides Philly/BSides Philly 2016/CJ09 Cryptography Pitfalls John Downey.mp4 | 57.40MB BSides Philly/BSides Philly 2016/CJ10 Getting Permission to Break Things William Bailey.mp4 | 128.32MB BSides Philly/BSides Philly 2016/CJ11 Red Teaming your Risk Management Framework Keith Pachulski.mp4 | 75.05MB BSides Philly/BSides Philly 2016/CJ12 Web Application Exploit 101 Breaking Access Control and Business Logic Tomohisa Ishikawa.mp4 | 52.07MB BSides Philly/BSides Philly 2016/Cryptography and Failure Matt Blaze.mp4 | 63.55MB BSides Philly/BSides Philly 2016/IH00 Crashing Android phones via hostile networks Yakov Shafranovich.mp4 | 54.95MB BSides Philly/BSides Philly 2016/IH01 Im Cuckoo for Malware Cuckoo Sandbox and Dynamic Malware Analysis Lane Huff.mp4 | 54.94MB BSides Philly/BSides Philly 2016/IH02 Red Team Yourself Thomas Richards.mp4 | 61.52MB BSides Philly/BSides Philly 2016/IH04 Staying Afloat in a Tsunami of Security Information Tracy Z Maleeff.mp4 | 174.29MB BSides Philly/BSides Philly 2016/IH05 Hunting Defense Against The Dark Arts Danny Akacki.mp4 | 181.39MB BSides Philly/BSides Philly 2016/IH06 A tour through the magical wonderful world of crypto land Ben Agre.mp4 | 171.02MB BSides Philly/BSides Philly 2016/IH07 Hacking the Human Social Engineering Basics Dave Comstock sten0.mp4 | 91.21MB BSides Philly/BSides Philly 2016/IH09 Hacking Your Way into the APRS Network on the Cheap Extended Edition Mark Lenigan.mp4 | 54.11MB BSides Philly/BSides Philly 2016/IH10 Threat Intel Analysis of Ukrainians Power Grid Hack Nir Yosha.mp4 | 65.19MB BSides Philly/BSides Philly 2016/IH11 Information security and the law Alex Muentz.mp4 | 70.03MB BSides Philly/BSides Philly 2016/IH12 Knowing the Enemy Creating a Cyber Threat Actor Attribution Program Jack Johnson.mp4 | 37.43MB BSides Philly/BSides Philly 2016/IH13 Size Doesnt Matter Metrics and Other Four Letter Security Words Jim Menkevich.mp4 | 50.86MB BSides Philly/BSides Philly 2016/Most Sound Missing IH08 Top 10 Mistakes Made In Active Directory That Can Lead To Being Compromised.mp4 | 91.69MB BSides Philly/BSides Philly 2016/No Sound CJ07 Where do I start Charles Sgrillo II.mp4 | 30.45MB BSides Philly/BSides Philly 2017/BSidesPhilly cg01 Innovating for 21st Century Warfare Ernest Cozy Panda Wong.mp4 | 42.24MB BSides Philly/BSides Philly 2017/BSidesPhilly cg02 MFA Its 2017 and Youre Still Doing Wrong Presented by Dan Astor and Chris Salerno.mp4 | 36.36MB BSides Philly/BSides Philly 2017/BSidesPhilly cg03 Out With the Old In With the GNU Lsly.mp4 | 22.79MB BSides Philly/BSides Philly 2017/BSidesPhilly cg04 IoT devices are one of the biggest challenges Charles libertyunix Sgrillo.mp4 | 25.42MB BSides Philly/BSides Philly 2017/BSidesPhilly cg05 Evading C2 Detection with Asymmetry By Brandon Arvanaghi and Andrew Johnston.mp4 | 23.03MB BSides Philly/BSides Philly 2017/BSidesPhilly cg06 Abusing Normality Data Exfiltration in Plain Site Aelon Porat.mp4 | 16.31MB BSides Philly/BSides Philly 2017/BSidesPhilly cg07 Smarter ways to gain skills or as the DoD puts it Dr P Shane Gallagher Institute f.mp4 | 24.72MB BSides Philly/BSides Philly 2017/BSidesPhilly cg08 Game of the SE Improv comedy as a tool in Social Engineering Danny Akacki Security.mp4 | 36.76MB BSides Philly/BSides Philly 2017/BSidesPhilly cg09 File Polyglottery or This Proof of Concept is Also a Picture of Cats Evan Sultanik.mp4 | 31.03MB BSides Philly/BSides Philly 2017/BSidesPhilly cs01 Your Facts Are Not Safe With Us Russian Information Operations As Social Engineeri.mp4 | 34.56MB BSides Philly/BSides Philly 2017/BSidesPhilly cs02 Supercharge Your SOC with Sysmon Chris Lee Matthew Giannetto.mp4 | 32.65MB BSides Philly/BSides Philly 2017/BSidesPhilly cs04 Threat Hunting Defining the Process While Circumventing Corporate Obstacles Kevin.mp4 | 38.65MB BSides Philly/BSides Philly 2017/BSidesPhilly cs05 Put up a CryptoWall and Locky the Key Stopping the Explosion of Ransomware Erich K.mp4 | 29.99MB BSides Philly/BSides Philly 2017/BSidesPhilly cs06 Web Hacking 101 Hands on with Burp Suite David Rhoades of MavenSecuritycom.mp4 | 35.44MB BSides Philly/BSides Philly 2017/BSidesPhilly cs08 Hacker Mindset David Brown CISSP CISM IAM.mp4 | 30.50MB BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Connecting IT Security s community through B-Sides.mp4 | 3.83MB BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Covert Calling - Secrets of Social Engineering Revealed.mp4 | 5.40MB BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Driving Secure Development Using a Threat Model.mp4 | 4.00MB BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Highlights about BSidesPDX from Organizers.mp4 | 18.58MB BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Preview of SCADA Security - Why is it So Hard.mp4 | 8.79MB BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Preview to Level Up - How Security is not like a Video Game.mp4 | 7.49MB BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Preview to Using a Blender Game for Security Visualization.mp4 | 6.98MB BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Recap on OS Security for Specific Purpose Devices.mp4 | 8.39MB BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Recap on The Need for Hackers, Hackerspaces and Hacktivism.mp4 | 10.92MB BSides Portland/BSides Portland 2011/B-Sides Portland 2011 When IT Fails by Tripwire s Founder, Gene Kim.mp4 | 8.02MB BSides Portland/BSides Portland 2011/Security B-Sides co-founder speaks about the evolution of B-Sides.mp4 | 8.62MB BSides Raleigh/BSides Raleigh 2014/Dan Kaminsky - BSides Raleigh.mp4 | 370.17MB BSides Raleigh/BSides Raleigh 2014/Security on the Blockchain Past Present & The Future - Shannon Code.mp4 | 157.80MB BSides Raleigh/BSides Raleigh 2014/Slaying the Hydra Evolution and Mitigation of Denial-of-Service Attacks - BSides Raleigh.mp4 | 161.90MB BSides Raleigh/BSides Raleigh 2014/grep visualization var logs unused - Dr Carrie Gates - BSides Raleigh.mp4 | 232.42MB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 00 Welcome Opening Remarks BsidesRDU Staff.en.transcribed.srt | 26.95KB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 00 Welcome Opening Remarks BsidesRDU Staff.mp4 | 10.46MB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 01 Keynote from Shahid Buttar EFF Director Of Grassroots Advocacy Shahid Buttar.en.transcribed.srt | 179.54KB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 01 Keynote from Shahid Buttar EFF Director Of Grassroots Advocacy Shahid Buttar.mp4 | 61.94MB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 02 Approaching Parity Considerations for adapting enterprise monitoring Matt.en.transcribed.srt | 66.10KB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 02 Approaching Parity Considerations for adapting enterprise monitoring Matt.mp4 | 36.64MB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 03 Movement After Initial Compromise SleepZ3R0 and HA12TL3Y.en.transcribed.srt | 150.86KB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 03 Movement After Initial Compromise SleepZ3R0 and HA12TL3Y.mp4 | 73.66MB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 04 Our Docker app got hacked Now what Joel Lathrop.en.transcribed.srt | 160.46KB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 04 Our Docker app got hacked Now what Joel Lathrop.mp4 | 65.03MB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 06 Sky high IR IR at Cloud Scale aarondlancaster.en.transcribed.srt | 93.21KB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 06 Sky high IR IR at Cloud Scale aarondlancaster.mp4 | 41.28MB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 07 When it rains it pours Sam Granger.en.transcribed.srt | 79.20KB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 07 When it rains it pours Sam Granger.mp4 | 29.78MB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 08 Rise of the Advisor Neal Humphrey.en.transcribed.srt | 136.50KB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 08 Rise of the Advisor Neal Humphrey.mp4 | 62.32MB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 10 No Network Needed Ron Burkett.en.transcribed.srt | 98.86KB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 10 No Network Needed Ron Burkett.mp4 | 32.50MB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 11 WarGames Justin Hoeckle.en.transcribed.srt | 105.34KB BSides Raleigh/BSides Raleigh 2018/BsidesRDU 2018 11 WarGames Justin Hoeckle.mp4 | 32.46MB BSides Raleigh/BSides Raleigh Logo.jpg | 23.29KB BSides Rhode Island/BsidesRI 2013 0 Large scale application security Charlie Eriksen.mp4 | 148.06MB BSides Rhode Island/BsidesRI 2013 1 0 Hacking Your Neighbors for Fun! Josh Wright.mp4 | 156.35MB BSides Rhode Island/BsidesRI 2013 1 1 Public cloud PCI compliance or a sharp stick in the eye, which to choose Chris.mp4 | 203.69MB BSides Rhode Island/BsidesRI 2013 1 2 Bite the Wax Tadpole The importance of culture in user security Kati Rodzon.mp4 | 209.37MB BSides Rhode Island/BsidesRI 2013 1 3 Exploiting the Top Ten Database Vulnerabilities and Misconfigurations Josh Sha.mp4 | 175.68MB BSides Rhode Island/BsidesRI 2013 1 4 Exploit Development for Mere Mortals Joe McCray.mp4 | 187.93MB BSides Rhode Island/BsidesRI 2013 1 5 Future Trends in IT security Ron Gula.mp4 | 171.20MB BSides Rhode Island/BsidesRI 2013 1 6 The Freaky Economics Of Cybersecurity Robert David Graham.mp4 | 162.75MB BSides Rhode Island/BsidesRI 2013 1 SMB SRMF for identifying top 10 risks Jim Peeler.mp4 | 196.25MB BSides Rhode Island/BsidesRI 2013 2 0 Booting the Booters, Stressing the Stressors Allison Nixon and Brandon Levene.mp4 | 166.81MB BSides Rhode Island/BsidesRI 2013 2 1 Talk More Better Jack Daniel.mp4 | 186.89MB BSides Rhode Island/BsidesRI 2013 2 3 So, you want to compute post apocalypse Larry Pesce & Darren Wigley.mp4 | 189.05MB BSides Rhode Island/BsidesRI 2013 2 4 Feeling Sick Healthcare Information Security Roy Wattanasin.mp4 | 148.54MB BSides Rhode Island/BsidesRI 2013 2 5 Blitzing with Your Defense Ben Jackson.mp4 | 175.76MB BSides Rhode Island/BsidesRI 2013 2 6 Lessons Learned Why I became a PaulDotCom Intern and why you should become an In.mp4 | 86.55MB BSides Rhode Island/BsidesRI 2013 2 7 Learning Security on the Cheap Patrick Laverty.mp4 | 61.28MB BSides Rhode Island/BsidesRI 2013 2 How I Do a Weekly Podcast or Three) Paul Asadoorian.mp4 | 207.72MB BSides Rhode Island/BsidesRI 2013 3 Show and Tell Super Minipwner James Edge.mp4 | 163.88MB BSides Rhode Island/BsidesRI 2013 4 Opening the Treasure Chest Attacking Network Attached Storage on a Pen Test Russ.mp4 | 165.22MB BSides Rhode Island/BsidesRI 2013 Closing Paul Asadoorian, Patrick Laverty & Mike Perez.mp4 | 40.38MB BSides Rhode Island/BsidesRI 2013 Intro with Paul Asadoorian, Patrick Laverty & Mike Perez.mp4 | 27.98MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Artsiom Holub Deconstructing The Cyber Kill Chain of Angler Exploit Kit.en.transcribed.srt | 82.99KB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Artsiom Holub Deconstructing The Cyber Kill Chain of Angler Exploit Kit.mp4 | 197.11MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 David Schuetz A not so quick Primer on iOS Encryption.en.transcribed.srt | 132.62KB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 David Schuetz A not so quick Primer on iOS Encryption.mp4 | 160.47MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Devon Kerr Passive detection doesn't work lessons from a hunter of elusive.mp4 | 232.47MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Fernando Montenegro Economics of Information Security.en.transcribed.srt | 110.53KB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Fernando Montenegro Economics of Information Security.mp4 | 191.67MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Jamie Geiger Android Application Function Hooking with Xposed.en.transcribed.srt | 123.18KB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Jamie Geiger Android Application Function Hooking with Xposed.mp4 | 200.21MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Jared Stroud & Bryan Harmat RedOps Scaling & Automating Your Pwnage.en.transcribed.srt | 95.53KB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Jared Stroud & Bryan Harmat RedOps Scaling & Automating Your Pwnage.mp4 | 69.15MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Joe Testa Bitclamp A Permanent and Anonymous Publishing Platform Over Bitco.en.transcribed.srt | 71.25KB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Joe Testa Bitclamp A Permanent and Anonymous Publishing Platform Over Bitco.mp4 | 62.54MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Matt Arnold How Secure is your Linux Distro.en.transcribed.srt | 67.62KB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Matt Arnold How Secure is your Linux Distro.mp4 | 196.43MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nate Cardozo The State of the Law 2016.en.transcribed.srt | 72.71KB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nate Cardozo The State of the Law 2016.mp4 | 158.07MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nick Piazza Fault Tolerant Command and Control Networks.en.transcribed.srt | 93.03KB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nick Piazza Fault Tolerant Command and Control Networks.mp4 | 161.41MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nitin Jami Exploring SecAccessControl Obj in iOS 9 Keychain - YouTube.en.transcribed.srt | 87.49KB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Nitin Jami Exploring SecAccessControl Obj in iOS 9 Keychain - YouTube.mp4 | 152.87MB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Rockie Brockway Enterprise Class Threat Management Like a Boss.en.transcribed.srt | 100.50KB BSides Rochester/BSides Rochester 2016/BSides Rochester 2016 Rockie Brockway Enterprise Class Threat Management Like a Boss.mp4 | 218.96MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Adam Dean Real Security Incidents, Unusual Situations.en.transcribed.srt | 49.42KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Adam Dean Real Security Incidents, Unusual Situations.mp4 | 25.17MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 David Kukfa The Hardest CTF I've Ever Done My Experiences Reverse Engineeri.en.transcribed.srt | 181.25KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 David Kukfa The Hardest CTF I've Ever Done My Experiences Reverse Engineeri.mp4 | 160.39MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Joe Testa Problems With Elliptic Curve Cryptography in TLS and SSH.en.transcribed.srt | 90.13KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Joe Testa Problems With Elliptic Curve Cryptography in TLS and SSH.mp4 | 97.40MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Jon Szymaniak Get Low To All STC STC STC STC.en.transcribed.srt | 137.45KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Jon Szymaniak Get Low To All STC STC STC STC.mp4 | 94.51MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Justin Moore Decoder Improved An Improved Burp Suite Decoder.en.transcribed.srt | 66.92KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Justin Moore Decoder Improved An Improved Burp Suite Decoder.mp4 | 27.65MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Kevin Wall Common Developer Crypto Mistakes With Illustrations in Java.en.transcribed.srt | 125.74KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Kevin Wall Common Developer Crypto Mistakes With Illustrations in Java.mp4 | 103.62MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Mo Morsi & Mark Scrano The Guild The Rise and Fall of Syracuse's Hackerspac.en.transcribed.srt | 78.50KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Mo Morsi & Mark Scrano The Guild The Rise and Fall of Syracuse's Hackerspac.mp4 | 47.61MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Nick Collisson Reverse Engineering Techniques for Game Hacking.en.transcribed.srt | 143.74KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Nick Collisson Reverse Engineering Techniques for Game Hacking.mp4 | 134.23MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Price McDonald & Justin Berry Insecure Obsolete and Trivial The Real IOT.en.transcribed.srt | 121.24KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Price McDonald & Justin Berry Insecure Obsolete and Trivial The Real IOT.mp4 | 82.64MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Reg Harnish Breaking is Bad Why Everyone at This Conference Will be Unemplo.en.transcribed.srt | 83.50KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Reg Harnish Breaking is Bad Why Everyone at This Conference Will be Unemplo.mp4 | 33.75MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Rob Olson & Chaim Sanders Whose Idea Was That Comparing Security Curriculum.en.transcribed.srt | 132.30KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Rob Olson & Chaim Sanders Whose Idea Was That Comparing Security Curriculum.mp4 | 94.71MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Sean Cassidy Attacking Modern SaaS Companies.en.transcribed.srt | 128.24KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Sean Cassidy Attacking Modern SaaS Companies.mp4 | 84.37MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Tyler Wrightson Here We Go Again A Pentesters Year In Review.en.transcribed.srt | 149.86KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Tyler Wrightson Here We Go Again A Pentesters Year In Review.mp4 | 134.43MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Valerie Thomas How I Broke Into Your Data Center.en.transcribed.srt | 165.00KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 Valerie Thomas How I Broke Into Your Data Center.mp4 | 59.13MB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 int0x80 Anti Forensics AF.en.transcribed.srt | 88.35KB BSides Rochester/BSides Rochester 2017/BSides Rochester 2017 int0x80 Anti Forensics AF.mp4 | 110.82MB BSides Rochester/BSides Rochester Logo.jpg | 59.67KB BSides SATX/BSides SATX logo.jpg | 14.90KB BSides SATX/Bsides SATX 2018/Abhishek Tripathi - Tactics, Techniques and Procedures-Building and Running a Blue Team from Scratch.mp4 | 63.92MB BSides SATX/Bsides SATX 2018/Achieving Advanced Security Use Cases by Integrating Key Security Solutions with a VMS.en.transcribed.srt | 55.78KB BSides SATX/Bsides SATX 2018/Achieving Advanced Security Use Cases by Integrating Key Security Solutions with a VMS.mp4 | 79.24MB BSides SATX/Bsides SATX 2018/Adventures in Open Source Security Software - Jordan Wright.en.transcribed.srt | 112.53KB BSides SATX/Bsides SATX 2018/Adventures in Open Source Security Software - Jordan Wright.mp4 | 80.06MB BSides SATX/Bsides SATX 2018/Are You Pwning Or Being Pwned - Irma Symonds, KJ Howell & Bill Branstetter.en.transcribed.srt | 141.00KB BSides SATX/Bsides SATX 2018/Are You Pwning Or Being Pwned - Irma Symonds, KJ Howell & Bill Branstetter.mp4 | 194.78MB BSides SATX/Bsides SATX 2018/Attacking Authentication in Web Applications - Jake Miller.en.transcribed.srt | 127.68KB BSides SATX/Bsides SATX 2018/Attacking Authentication in Web Applications - Jake Miller.mp4 | 45.42MB BSides SATX/Bsides SATX 2018/BSidesSATX Sponsors SlideDeck.mp4 | 1.60MB BSides SATX/Bsides SATX 2018/Community Based Career Development - Kathleen Smith & Cindy Jones.en.transcribed.srt | 153.03KB BSides SATX/Bsides SATX 2018/Community Based Career Development - Kathleen Smith & Cindy Jones.mp4 | 158.40MB BSides SATX/Bsides SATX 2018/Containers No, Not Your Mama's Tupperware - Ell Marquez.en.transcribed.srt | 139.22KB BSides SATX/Bsides SATX 2018/Containers No, Not Your Mama's Tupperware - Ell Marquez.mp4 | 91.15MB BSides SATX/Bsides SATX 2018/Cryptojacking Servers The Intersection of poor patch management and ICO's - Chuck McAuley.en.transcribed.srt | 107.14KB BSides SATX/Bsides SATX 2018/Cryptojacking Servers The Intersection of poor patch management and ICO's - Chuck McAuley.mp4 | 150.96MB BSides SATX/Bsides SATX 2018/Dan Browder - Exposed- Getting Control of Your Vendors Before They Expose You.en.transcribed.srt | 130.80KB BSides SATX/Bsides SATX 2018/Dan Browder - Exposed- Getting Control of Your Vendors Before They Expose You.mp4 | 111.47MB BSides SATX/Bsides SATX 2018/Duncan McAlynn - Does Patch Tuesday Really Matter Anymore AKA Screw Patch Tuesday!.en.transcribed.srt | 104.72KB BSides SATX/Bsides SATX 2018/Duncan McAlynn - Does Patch Tuesday Really Matter Anymore AKA Screw Patch Tuesday!.mp4 | 159.73MB BSides SATX/Bsides SATX 2018/Everything Old is New Again - Cindy Jones.en.transcribed.srt | 129.67KB BSides SATX/Bsides SATX 2018/Everything Old is New Again - Cindy Jones.mp4 | 91.85MB BSides SATX/Bsides SATX 2018/Fiddling with Flash Drive Forensics - Alexander Klepal.en.transcribed.srt | 53.96KB BSides SATX/Bsides SATX 2018/Fiddling with Flash Drive Forensics - Alexander Klepal.mp4 | 86.31MB BSides SATX/Bsides SATX 2018/GSuite Digital Forensics and Incident Response - Megan Roddie.en.transcribed.srt | 72.58KB BSides SATX/Bsides SATX 2018/GSuite Digital Forensics and Incident Response - Megan Roddie.mp4 | 97.30MB BSides SATX/Bsides SATX 2018/Get an Internship - Panel.en.transcribed.srt | 191.37KB BSides SATX/Bsides SATX 2018/Get an Internship - Panel.mp4 | 195.89MB BSides SATX/Bsides SATX 2018/IDS Configuration for Beginners - Nick leghorn.en.transcribed.srt | 132.39KB BSides SATX/Bsides SATX 2018/IDS Configuration for Beginners - Nick leghorn.mp4 | 89.60MB BSides SATX/Bsides SATX 2018/PowerShell post-exploitation, the Empire has fallen - Michael Gough.en.transcribed.srt | 181.71KB BSides SATX/Bsides SATX 2018/PowerShell post-exploitation, the Empire has fallen - Michael Gough.mp4 | 216.58MB BSides SATX/Bsides SATX 2018/Securing The Future of TLS 1.3 - Carl Mehner.mp4 | 129.72MB BSides SATX/Bsides SATX 2018/Strengthen Your SecOps Team by Leveraging Neurodiversity - Megan Roddie.en.transcribed.srt | 84.50KB BSides SATX/Bsides SATX 2018/Strengthen Your SecOps Team by Leveraging Neurodiversity - Megan Roddie.mp4 | 108.76MB BSides Salt Lake City/BSides SLC 2015/BSdiesSLC 2015 -- What To Do When Something Bad Has Happened -- Jason Wood.en.transcribed.srt | 58.11KB BSides Salt Lake City/BSides SLC 2015/BSdiesSLC 2015 -- What To Do When Something Bad Has Happened -- Jason Wood.mp4 | 97.08MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC -- Fundamentals That Time Forgot -- Jup1t3r.mp4 | 159.68MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Asymmetric Warfare and Corollaries in Network Defense - Jason Tracy.en.transcribed.srt | 57.03KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Asymmetric Warfare and Corollaries in Network Defense - Jason Tracy.mp4 | 83.01MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Building AppSec In - Seth Law.en.transcribed.srt | 93.12KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Building AppSec In - Seth Law.mp4 | 107.87MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Cloud Security - Scott Arveseth.en.transcribed.srt | 115.66KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Cloud Security - Scott Arveseth.mp4 | 250.66MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Fighting Hardware Attacks with Software - Doktor Unicorn.en.transcribed.srt | 101.49KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Fighting Hardware Attacks with Software - Doktor Unicorn.mp4 | 140.93MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - From Vim Muggle to Wizard in 10 Easy Steps - Erik Falor.en.transcribed.srt | 132.48KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - From Vim Muggle to Wizard in 10 Easy Steps - Erik Falor.mp4 | 249.87MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Hey Guys, I m a Pentester! - Metacortex.mp4 | 48.38MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Hey Guys, I'm a Pentester! - Metacortex.en.transcribed.srt | 33.35KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Malware Fun - Kenny Long.en.transcribed.srt | 72.04KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - Malware Fun - Kenny Long.mp4 | 82.95MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - PlagueScanner An Open Source Multiple AV Scanner Framework - Robert Simmons.en.transcribed.srt | 105.62KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - PlagueScanner An Open Source Multiple AV Scanner Framework - Robert Simmons.mp4 | 144.68MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - RBAC is Dead. So now what - Adam Fisher.en.transcribed.srt | 97.97KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 - RBAC is Dead. So now what - Adam Fisher.mp4 | 129.21MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Authenticode in-depth -- Scott Piper.en.transcribed.srt | 90.00KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Authenticode in-depth -- Scott Piper.mp4 | 146.18MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- BREAKING in BAD (I m the one who doesn t knock) -- Jayson E. Street.mp4 | 322.07MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- BREAKING in BAD (I'm the one who doesn't knock) -- Jayson E. Street.en.transcribed.srt | 137.25KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Bad USB Weaponized -- Dan Anderson and Steve Fink.en.transcribed.srt | 48.55KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Bad USB Weaponized -- Dan Anderson and Steve Fink.mp4 | 66.94MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Feeding the Shark -- Jeremy Pierson.en.transcribed.srt | 103.06KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Feeding the Shark -- Jeremy Pierson.mp4 | 165.08MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- How to prevent eavesdropping on office VoIP calls -- Dmitry Dessiatnikov.en.transcribed.srt | 91.16KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- How to prevent eavesdropping on office VoIP calls -- Dmitry Dessiatnikov.mp4 | 169.93MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- InfoSec, Just Doing It -- Rob Jorgensen - YouTube.en.transcribed.srt | 82.19KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- InfoSec, Just Doing It -- Rob Jorgensen.mp4 | 175.99MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Leading Change -- John Overbaugh.en.transcribed.srt | 95.37KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Leading Change -- John Overbaugh.mp4 | 165.39MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Pragmatic Cloud Security -- Joshua Danielson.en.transcribed.srt | 91.75KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Pragmatic Cloud Security -- Joshua Danielson.mp4 | 124.17MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Psst, Come Check Out My Lair!! #notacreeper -- Justin Larson.en.transcribed.srt | 40.33KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Psst, Come Check Out My Lair!! #notacreeper -- Justin Larson.mp4 | 113.07MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Security Onions and Honey Potz -- Ethan Dodge.en.transcribed.srt | 102.80KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Security Onions and Honey Potz -- Ethan Dodge.mp4 | 194.66MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Security Researcher, Security Besmircher -- Kevin Johnson.en.transcribed.srt | 107.48KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Security Researcher, Security Besmircher -- Kevin Johnson.mp4 | 96.72MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Social Engineering The Good, the Bad, and the Ugly -- Stephanie Carruthers.en.transcribed.srt | 70.25KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Social Engineering The Good, the Bad, and the Ugly -- Stephanie Carruthers.mp4 | 73.06MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Take Charge of Your Infosec Career! -- Glen Roberts.en.transcribed.srt | 56.40KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Take Charge of Your Infosec Career! -- Glen Roberts.mp4 | 108.88MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- The Inception Framework Cloud Based Attack -- Waylon Grange.en.transcribed.srt | 94.64KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- The Inception Framework Cloud Based Attack -- Waylon Grange.mp4 | 106.21MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- The Secret Lives of Debuggers -- Lance Buttars.en.transcribed.srt | 84.02KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- The Secret Lives of Debuggers -- Lance Buttars.mp4 | 159.92MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Trends In Exploit Kits -- Jeffrey Doty.en.transcribed.srt | 115.40KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Trends In Exploit Kits -- Jeffrey Doty.mp4 | 214.30MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Why You Need To Be Red Team ed -- Nate McConnell.mp4 | 94.36MB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- Why You Need To Be Red Team'ed -- Nate McConnell.en.transcribed.srt | 81.27KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- You Must Search Before You Destroy -- Adam Steed.en.transcribed.srt | 47.06KB BSides Salt Lake City/BSides SLC 2015/BSidesSLC 2015 -- You Must Search Before You Destroy -- Adam Steed.mp4 | 143.27MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- App Scanner Galore - How do I choose one -- Teja Myneedu and Yashvier Kosaraju.en.transcribed.srt | 57.53KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- App Scanner Galore - How do I choose one -- Teja Myneedu and Yashvier Kosaraju.mp4 | 41.08MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Bought Some Lockpicks, Now What -- Colin Jackson.en.transcribed.srt | 106.49KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Bought Some Lockpicks, Now What -- Colin Jackson.mp4 | 84.32MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Building A Secure Development Lifecycle On A Shoestring Budget -- John Overbaugh.en.transcribed.srt | 125.49KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Building A Secure Development Lifecycle On A Shoestring Budget -- John Overbaugh.mp4 | 48.96MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Don't be stupid with Github - Even more Github fun -- Metacortex.en.transcribed.srt | 46.59KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Don't be stupid with Github - Even more Github fun -- Metacortex.mp4 | 78.60MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Evolution -- Neil Wyler.en.transcribed.srt | 152.84KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Evolution -- Neil Wyler.mp4 | 79.48MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Googling Like A Boss Expanding the Powers of OSINT -- Ethan Dodge.en.transcribed.srt | 100.10KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Googling Like A Boss Expanding the Powers of OSINT -- Ethan Dodge.mp4 | 55.35MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Hackinabox Self contained Pen Testing lab -- Marv White.en.transcribed.srt | 82.52KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Hackinabox Self contained Pen Testing lab -- Marv White.mp4 | 50.68MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- How HIPAA Compliance helps and hinders true patient data security -- Dan Anderson.en.transcribed.srt | 80.27KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- How HIPAA Compliance helps and hinders true patient data security -- Dan Anderson.mp4 | 44.81MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- How to Build an Effective InfoSec Risk Management Program -- Kiston Finney.en.transcribed.srt | 158.03KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- How to Build an Effective InfoSec Risk Management Program -- Kiston Finney.mp4 | 89.75MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Insert Title Here -- Jack Daniel.en.transcribed.srt | 110.99KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Insert Title Here -- Jack Daniel.mp4 | 71.03MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Patchng Mnthly IMPOSSIBLE, Maintaining Compliance Is Possible -- Adam Steed.en.transcribed.srt | 59.16KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Patchng Mnthly IMPOSSIBLE, Maintaining Compliance Is Possible -- Adam Steed.mp4 | 62.97MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Preparing 4 PowerShellmageddon -- Chad Tilbury.en.transcribed.srt | 104.76KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Preparing 4 PowerShellmageddon -- Chad Tilbury.mp4 | 76.84MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Slaying Rogue Access Points with Python and Cheap Hardware -- Gabriel Ryan.en.transcribed.srt | 70.35KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Slaying Rogue Access Points with Python and Cheap Hardware -- Gabriel Ryan.mp4 | 37.82MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Tabletop Cryptography -- Jason Reverri.en.transcribed.srt | 76.98KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Tabletop Cryptography -- Jason Reverri.mp4 | 71.66MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Art of the Jedi Mind Trick -- Jeff Man.en.transcribed.srt | 54.15KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Art of the Jedi Mind Trick -- Jeff Man.mp4 | 44.74MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Hacker will see you now -- Jay Radcliffe.en.transcribed.srt | 62.79KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Hacker will see you now -- Jay Radcliffe.mp4 | 35.83MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Node.js Highway Attacks Are At Full Throttle -- Igor Matlin.en.transcribed.srt | 34.40KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- The Node.js Highway Attacks Are At Full Throttle -- Igor Matlin.mp4 | 47.69MB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Writing Custom Splunk Applications -- Cody Hatch.en.transcribed.srt | 62.74KB BSides Salt Lake City/BSides SLC 2016/BSidesSLC 2016 -- Writing Custom Splunk Applications -- Cody Hatch.mp4 | 33.11MB BSides Salt Lake City/BSides SLC 2017/BSIdesSLC 2017 -- Adam Englander -- Biometrics The New Pandora's Box.en.transcribed.srt | 56.52KB BSides Salt Lake City/BSides SLC 2017/BSIdesSLC 2017 -- Adam Englander -- Biometrics The New Pandora's Box.mp4 | 34.87MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC -- Fundamentals That Time Forgot -- Jup1t3r.en.transcribed.srt | 95.07KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC -- Fundamentals That Time Forgot -- Jup1t3r.mp4 | 60.88MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC -- JC -- Facing the Kobayashi Maru Incident Response Tabletop Exercises.en.transcribed.srt | 144.79KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC -- Jerry Smith -- Getting Privacy Into The Conversation.en.transcribed.srt | 40.82KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC -- Jerry Smith -- Getting Privacy Into The Conversation.mp4 | 61.36MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Adam Fisher -- Man In The Cloud Attack.en.transcribed.srt | 113.56KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Adam Fisher -- Man In The Cloud Attack.mp4 | 89.98MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Andrew Hall -- NIST Risk Management Framework and why it should be utilized.en.transcribed.srt | 50.56KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Andrew Hall -- NIST Risk Management Framework and why it should be utilized.mp4 | 42.06MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Brandon Gillespie -- Container Secrets Done Right.en.transcribed.srt | 137.69KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Brandon Gillespie -- Container Secrets Done Right.mp4 | 32.12MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Bri Rolston -- If System = ICS, Then Pwn4g3 is Greater Than Root.en.transcribed.srt | 164.75KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Bri Rolston -- If System = ICS, Then Pwn4g3 is Greater Than Root.mp4 | 60.47MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Bryce Kunz -- Pwned Cloud Society.en.transcribed.srt | 74.96KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Bryce Kunz -- Pwned Cloud Society.mp4 | 51.43MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Chad Tilbury -- Windows Credential Attacks and Mitigations.en.transcribed.srt | 172.36KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Chad Tilbury -- Windows Credential Attacks and Mitigations.mp4 | 105.51MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Chris Hopkins -- NMAP 101.en.transcribed.srt | 66.40KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Chris Hopkins -- NMAP 101.mp4 | 47.08MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Daniel Jeffrey -- Security and Ops in Startups.en.transcribed.srt | 141.76KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Daniel Jeffrey -- Security and Ops in Startups.mp4 | 95.58MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Dave Kennedy -- A Continually Changing Industry INFOSEC.en.transcribed.srt | 150.18KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Dave Kennedy -- A Continually Changing Industry INFOSEC.mp4 | 117.87MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- David Moore -- The Aftermath of a Fuzz Run What to do about those crashes.en.transcribed.srt | 140.46KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- David Moore -- The Aftermath of a Fuzz Run What to do about those crashes.mp4 | 99.54MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Gabriel Ryan -- Beyond Wardriving Tracking Human Beings with RF Technology.en.transcribed.srt | 145.35KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Gabriel Ryan -- Beyond Wardriving Tracking Human Beings with RF Technology.mp4 | 74.60MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Haydn Johnson -- Planning a Purple Team Exercise; The What, Why, and How.en.transcribed.srt | 134.88KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Haydn Johnson -- Planning a Purple Team Exercise_ The What, Why, and How.mp4 | 104.15MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- J0N J4RV1S -- The Surveillance Capitalism Will Continue Until Moral Improves.en.transcribed.srt | 164.87KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- J0N J4RV1S -- The Surveillance Capitalism Will Continue Until Moral Improves.mp4 | 88.22MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- James Dickenson & Chris Tilley -- Network Security Monitoring Product Evaluation.en.transcribed.srt | 121.65KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- James Dickenson & Chris Tilley -- Network Security Monitoring Product Evaluation.mp4 | 63.18MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- James Habben -- USB Device Analysis.en.transcribed.srt | 151.53KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- James Habben -- USB Device Analysis.mp4 | 117.18MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Jason Reverri -- Green Eggs and Hacks.en.transcribed.srt | 69.27KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Jason Reverri -- Green Eggs and Hacks.mp4 | 52.99MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Jason Wood -- Get Started Writing Nmap Scripts.en.transcribed.srt | 125.33KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Jason Wood -- Get Started Writing Nmap Scripts.mp4 | 92.21MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- John Overbaugh -- Influcencing the SLC...When I'm Not A Developer.en.transcribed.srt | 146.98KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- John Overbaugh -- Influcencing the SLC...When I'm Not A Developer.mp4 | 110.52MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Lesley Carhart -- Together, We Could Land a Plane Our Community as our Strength.en.transcribed.srt | 131.60KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Lesley Carhart -- Together, We Could Land a Plane Our Community as our Strength.mp4 | 88.91MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Matt Krieger & Kasim Esmail -- How We Got Here Integrating DiD Into DevOps.en.transcribed.srt | 165.25KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Matt Krieger & Kasim Esmail -- How We Got Here Integrating DiD Into DevOps.mp4 | 116.55MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Nathan Smith & Brian Hadfield -- I've Upped My Attitude, So Up Yours!.en.transcribed.srt | 58.28KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Nathan Smith & Brian Hadfield -- I've Upped My Attitude, So Up Yours!.mp4 | 34.60MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Parasaran Raman -- On-Demand Outlier Detection [OD^2] to Optimize Threat Analytics.en.transcribed.srt | 64.65KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Parasaran Raman -- On-Demand Outlier Detection [OD^2] to Optimize Threat Analytics.mp4 | 47.59MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Robert Wood -- Red Teaming The Board.en.transcribed.srt | 127.41KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Robert Wood -- Red Teaming The Board.mp4 | 64.85MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Sam McLane -- How to Build A SOC for Small to Mid-Size Companies.en.transcribed.srt | 68.03KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Sam McLane -- How to Build A SOC for Small to Mid-Size Companies.mp4 | 31.84MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Shane Lawrence -- Federal Bug Bounty Programs.en.transcribed.srt | 66.14KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Shane Lawrence -- Federal Bug Bounty Programs.mp4 | 50.26MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Thomas Elegante -- InfoSec Parenting.en.transcribed.srt | 64.93KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Thomas Elegante -- InfoSec Parenting.mp4 | 42.97MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Tiberius Hefflin -- De Falsis Deis Social Contracts.en.transcribed.srt | 40.48KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Tiberius Hefflin -- De Falsis Deis Social Contracts.mp4 | 33.03MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Tiberius Hefflin -- Tales From the Crypt--ology.en.transcribed.srt | 53.27KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Tiberius Hefflin -- Tales From the Crypt--ology.mp4 | 32.44MB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Waylon Grange -- Hadouken! Exploiting Street Fighter V to gain ring0.en.transcribed.srt | 87.37KB BSides Salt Lake City/BSides SLC 2017/BSidesSLC 2017 -- Waylon Grange -- Hadouken! Exploiting Street Fighter V to gain ring0.mp4 | 66.43MB BSides San Francisco/BSides San Francisco 2012/Security s Best Asset are Argumentative Geeks.mp4 | 21.75MB BSides San Francisco/BSides San Francisco 2015/00 BSidesSF 2015 Intro.mp4 | 13.56MB BSides San Francisco/BSides San Francisco 2015/100 Stick a Pin in Certificate Pinning How to Inspect Mobile Traffic and Stop Data Exfiltration Gopa.mp4 | 116.79MB BSides San Francisco/BSides San Francisco 2015/101 OSXCollector Forensic Collection and Automated Analysis for OS X Ivan Leichtling.mp4 | 88.70MB BSides San Francisco/BSides San Francisco 2015/102 DNS Spikes Strikes and The Like thomas mathew.mp4 | 47.48MB BSides San Francisco/BSides San Francisco 2015/103 Ask the EFF Kurt Opsahl.mp4 | 171.50MB BSides San Francisco/BSides San Francisco 2015/104 Your Users Passwords Are Already Stolen Lucas Zaichkowsky.mp4 | 46.38MB BSides San Francisco/BSides San Francisco 2015/106 Medical Device Security From Detection To Compromise Scott Erven.mp4 | 132.58MB BSides San Francisco/BSides San Francisco 2015/107 How SecOps Can Convince DevOps To Believe In The Bogeyman Leif Dreizler.mp4 | 98.73MB BSides San Francisco/BSides San Francisco 2015/108 Human Hunting Sean Gillespie.mp4 | 132.87MB BSides San Francisco/BSides San Francisco 2015/109 Phighting Phishers Phake Phronts Kevin Bottomley.mp4 | 81.42MB BSides San Francisco/BSides San Francisco 2015/110 Corporate Governance For Fun and NonProfit Christie Dudley.mp4 | 98.74MB BSides San Francisco/BSides San Francisco 2015/111 HIPAA 2015 Wrath of the Audits W Hudson Harris.mp4 | 131.04MB BSides San Francisco/BSides San Francisco 2015/112 Lessons Learned from Building and Running MHN the Worlds Largest Crowdsourced Honeynet Jason Tro.mp4 | 73.33MB BSides San Francisco/BSides San Francisco 2015/113 Getting started Let me help you David Trollman.mp4 | 123.95MB BSides San Francisco/BSides San Francisco 2015/200 Critical Infrastructure The Cloud loves me The Cloud loves me not Bryan Owen.mp4 | 124.30MB BSides San Francisco/BSides San Francisco 2015/201 Fck These Guys Practical Countersurveillance Lisa Lorenzin.mp4 | 122.15MB BSides San Francisco/BSides San Francisco 2015/202 Collective Action Problems in Cybersecurity Allan Friedman.mp4 | 82.13MB BSides San Francisco/BSides San Francisco 2015/203 Intrusion Detection in the clouds Josh Pyorre.mp4 | 49.80MB BSides San Francisco/BSides San Francisco 2015/204 Hacker or criminal Repairing the reputation of the infosec community Melanie Ensign.mp4 | 137.81MB BSides San Francisco/BSides San Francisco 2015/205 Student Surveillance How Hackers Can Help Protect Student Privacy Jessy Irwin.mp4 | 137.93MB BSides San Francisco/BSides San Francisco 2015/206 When Doing the Right Thing Goes Wrong Impact of Certificates on Service Based Infrastructure Rob.mp4 | 84.14MB BSides San Francisco/BSides San Francisco 2015/207 How to Lie with Statistics Information Security Edition Tony Martin Vegue.mp4 | 112.01MB BSides San Francisco/BSides San Francisco 2015/208 Ground Zero Financial Services The Latest Targeted Attacks from the Darknet Brian Contos.mp4 | 76.72MB BSides San Francisco/BSides San Francisco 2015/209 Securing the Hastily Formed Network Infosec for Disaster Relief and Emergency Response Rakesh Bh.mp4 | 157.17MB BSides San Francisco/BSides San Francisco 2015/210 GitReview Reflective Control In Action Jon Debonis.mp4 | 54.47MB BSides San Francisco/BSides San Francisco 2015/212 Blink The Network Perimeter is Gone Rick Farina ZeroChaos.mp4 | 136.34MB BSides San Francisco/BSides San Francisco 2015/213 Federating AWS CLI Paul Moreno.mp4 | 63.94MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 104 A year in the wild fighting malware at the corporate level Kuba Sendor.mp4 | 83.08MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 104 A year in the wild fighting malware at the corporate level Kuba Sendor.srt | 33.60KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 105 Breaking Honeypots for Fun and Profit Gadi Evron Dean Sysman Itamar Sher.mp4 | 112.55MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 105 Breaking Honeypots for Fun and Profit Gadi Evron Dean Sysman Itamar Sher.srt | 35.01KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 107 Why its all snake oil and that may be ok Pablo Breuer.mp4 | 36.93MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 107 Why its all snake oil and that may be ok Pablo Breuer.srt | 12.71KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 111 Planning Effective Red Team Exercises Sean T Malone.mp4 | 181.16MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 111 Planning Effective Red Team Exercises Sean T Malone.srt | 59.95KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 112 Fraud Detection Real time Trust Decisions James Addison.mp4 | 121.45MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 112 Fraud Detection Real time Trust Decisions James Addison.srt | 48.75KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 114 Elliptic Curve Cryptography for those who are afraid of mathematics Martijn Grooten.mp4 | 38.16MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 114 Elliptic Curve Cryptography for those who are afraid of mathematics Martijn Grooten.srt | 23.62KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 115 APT Reports and OPSEC Evolution or These are not the APT reports you are looking for Ga.mp4 | 57.96MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 115 APT Reports and OPSEC Evolution or These are not the APT reports you are looking for Ga.srt | 27.18KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 117 Employee Hijacking Building a hacktober awareness program Ryan Barrett Ninad Bhamburdek.mp4 | 69.05MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 117 Employee Hijacking Building a hacktober awareness program Ryan Barrett Ninad Bhamburdek.srt | 25.03KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 203 Scan Pwn Next exploiting service accounts in Windows networks Andrey Dulkin Matan Hart.mp4 | 108.07MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 203 Scan Pwn Next exploiting service accounts in Windows networks Andrey Dulkin Matan Hart.srt | 24.84KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 204 Guest to root How to Hack Your Own Career Path and Stand Out Javvad Malik.mp4 | 66.89MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 204 Guest to root How to Hack Your Own Career Path and Stand Out Javvad Malik.srt | 24.99KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 206 In the crosshairs the trend towards targeted attacks Lance Cottrell.mp4 | 54.99MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 206 In the crosshairs the trend towards targeted attacks Lance Cottrell.srt | 30.65KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 207 Developing a Rugged DevOps Approach to Cloud Security Tim Prendergast.mp4 | 44.40MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 207 Developing a Rugged DevOps Approach to Cloud Security Tim Prendergast.srt | 42.58KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 208 Digital Intelligence Gathering Using the Powers of OSINT for Both Blue and Red Teams Et.srt | 42.02KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 209 Sharing is Caring Understanding and measuring Threat Intelligence Sharing Effectiveness.mp4 | 142.08MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 209 Sharing is Caring Understanding and measuring Threat Intelligence Sharing Effectiveness.srt | 74.72KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 210 The Ransomware Threat Tracking the Digital Footprints Kevin Bottomley.mp4 | 43.33MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 210 The Ransomware Threat Tracking the Digital Footprints Kevin Bottomley.srt | 27.79KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 211 Access Control in 2016 deep dive Dr Ulrich Lang.mp4 | 121.34MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 212 Using Behavior to Protect Cloud Servers Anirban Banerjee.mp4 | 65.35MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 212 Using Behavior to Protect Cloud Servers Anirban Banerjee.srt | 53.30KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 213 The Art of the Jedi Mind Trick Jeff Man.mp4 | 57.54MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 213 The Art of the Jedi Mind Trick Jeff Man.srt | 30.90KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 214 Mobile App Corporate Espionage Michael Raggo.mp4 | 39.75MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 214 Mobile App Corporate Espionage Michael Raggo.srt | 32.24KB BSides San Francisco/BSides San Francisco 2016/BSidesSF 216 Advanced techniques for real time detection of polymorphic malware Ajit Thyagarajan.mp4 | 76.67MB BSides San Francisco/BSides San Francisco 2016/BSidesSF 216 Advanced techniques for real time detection of polymorphic malware Ajit Thyagarajan.srt | 23.86KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - #securityselfie (size up your appsec program with new metrics) (Jim O'Leary).mp4 | 78.92MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - #securityselfie (size up your appsec program with new metrics) (Jim O'Leary).srt | 99.23KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - 5 Keys to Building an App Sec Program in the Age of DevOps (Tim Jarrett).mp4 | 139.31MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - 5 Keys to Building an App Sec Program in the Age of DevOps (Tim Jarrett).srt | 87.71KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Access Control with Concierge One Tool to Rule Them All (Karthik Rangarajan).mp4 | 104.33MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Access Control with Concierge One Tool to Rule Them All (Karthik Rangarajan).srt | 73.58KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Ask the EFF (Kurt Opsahl, Erica Portnoy, Gennie Gebhart, Jamie Lee Williams, ..).mp4 | 111.66MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Ask the EFF (Kurt Opsahl, Erica Portnoy, Gennie Gebhart, Jamie Lee Williams, ..).srt | 97.04KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Assessing the Embedded Devices On Your Network (David Tomaschik).mp4 | 91.05MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Assessing the Embedded Devices On Your Network (David Tomaschik).srt | 103.23KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - AtomBombing Injecting Code Using Windows’ Atoms (Tal Liberman).mp4 | 42.52MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - AtomBombing Injecting Code Using Windows’ Atoms (Tal Liberman).srt | 66.09KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Better SSH management with ephemeral keys (Vivian Ho & Chris Steipp).mp4 | 64.92MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Better SSH management with ephemeral keys (Vivian Ho & Chris Steipp).srt | 78.71KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - BeyondCorp Beyond “fortress” security (Neal Mueller & Jeff Peck).mp4 | 84.52MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - BeyondCorp Beyond “fortress” security (Neal Mueller & Jeff Peck).srt | 80.11KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Building an Effective Intrusion Detection Program DNA Lounge (Jason Craig).mp4 | 83.85MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Building an Effective Intrusion Detection Program DNA Lounge (Jason Craig).srt | 98.95KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Bypassing malware analysis sandboxes is easy, ... (Michael Gough).mp4 | 79.60MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Bypassing malware analysis sandboxes is easy, ... (Michael Gough).srt | 110.36KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - DNS attacks, past, present, and future (Nick Mckenna).mp4 | 33.18MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - DNS attacks, past, present, and future (Nick Mckenna).srt | 41.21KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Does DoD Level Security Work in the Real World (Jeff Man).mp4 | 120.25MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Does DoD Level Security Work in the Real World (Jeff Man).srt | 79.58KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Dormant DOMination (xntrik).mp4 | 131.45MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Dormant DOMination (xntrik).srt | 85.55KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Fighting Email Phishing with a Custom Cloud IDS (Dan Borges).mp4 | 42.32MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Fighting Email Phishing with a Custom Cloud IDS (Dan Borges).srt | 47.52KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Hijacking .NET to Defend PowerShell (Amanda Rousseau).mp4 | 81.23MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Hijacking .NET to Defend PowerShell (Amanda Rousseau).srt | 83.43KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - How Secure are your Docker Images (Manideep Konakandla).mp4 | 142.49MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - How Secure are your Docker Images (Manideep Konakandla).srt | 95.47KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - How to Build a Security Team and Program (Coleen Coolidge).mp4 | 131.73MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - How to Build a Security Team and Program (Coleen Coolidge).srt | 70.43KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Illusion vs Reality (Jason Truppi).mp4 | 158.00MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Internet dataset combinations for #ThreatHunting .. (Arian Evans & Steve Ginty).mp4 | 66.36MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Internet dataset combinations for #ThreatHunting .. (Arian Evans & Steve Ginty).srt | 87.91KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Linux Monitoring at Scale with eBPF (Brendan Gregg & Alex Maestretti).mp4 | 64.43MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Linux Monitoring at Scale with eBPF (Brendan Gregg & Alex Maestretti).srt | 85.79KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Live Dissection Anatomy of a Browser Based Botnet (Ilya Nesterov).mp4 | 13.09MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Live Dissection Anatomy of a Browser Based Botnet (Ilya Nesterov).srt | 8.64KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Look Ma, No Hands! - Decentralizing security for scale (Chris Dorros).mp4 | 55.20MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Look Ma, No Hands! - Decentralizing security for scale (Chris Dorros).srt | 59.28KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Make Alerts Great Again (Daniel Popescu).mp4 | 50.92MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Make Alerts Great Again (Daniel Popescu).srt | 72.74KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Monday, OPENING REMARKS (Reed Loden).mp4 | 10.91MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Monday, OPENING REMARKS (Reed Loden).srt | 11.41KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Opinionless Enforcement of Opinions on Operational Secrets (Jonathan Freedman).mp4 | 63.28MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Opinionless Enforcement of Opinions on Operational Secrets (Jonathan Freedman).srt | 92.97KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Securing Kubernetes (Jesse Endahl).mp4 | 82.46MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Securing Kubernetes (Jesse Endahl).srt | 84.78KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Security through Visibility Organizational Communication Strategies (Katie Ledoux).mp4 | 57.89MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Security through Visibility Organizational Communication Strategies (Katie Ledoux).srt | 61.00KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Should I Pay or Should I Go Game Theory and Ransomware (Tony Martin Vegue).mp4 | 155.41MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Swimming Upstream Regulation vs Security (Robert Wood).mp4 | 108.09MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Swimming Upstream Regulation vs Security (Robert Wood).srt | 112.72KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - The Cyber Insurance Emperor Has No Clothes (Russell C Thomas).mp4 | 109.21MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - The Cyber Insurance Emperor Has No Clothes (Russell C Thomas).srt | 63.37KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - The Underground Economy of Apple ID (Claud Xiao).mp4 | 44.15MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - The Underground Economy of Apple ID (Claud Xiao).srt | 77.73KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Tired of Playing Exploit Kit Whack-A-Mole Let's automate (Anjum Ahuja).mp4 | 36.56MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Tired of Playing Exploit Kit Whack-A-Mole Let's automate (Anjum Ahuja).srt | 52.79KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Weathering the Storm The Art of Crisis Communications (Jen Ellis & Josh Feinblum).mp4 | 142.97MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Weathering the Storm The Art of Crisis Communications (Jen Ellis & Josh Feinblum).srt | 79.17KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - When Bandit(s) Strike - Defend your Python Code (Travis McPeak).mp4 | 100.11MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - When Bandit(s) Strike - Defend your Python Code (Travis McPeak).srt | 66.98KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Witchcraft Compiler Collection Towards programs self awareness (endrazine).mp4 | 49.45MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - Witchcraft Compiler Collection Towards programs self awareness (endrazine).srt | 52.09KB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - “Mixtape to Master Key” Scenarios .... (Aren Sandersen).mp4 | 30.98MB BSides San Francisco/BSides San Francisco 2017/BSidesSF 2017 - “Mixtape to Master Key” Scenarios .... (Aren Sandersen).srt | 53.25KB BSides San Francisco/Dan Tentler vissago_bsidessf--rsa-2011_72157625973468589.zip | 315.25MB BSides Sao Paulo/Bsides 2013 - Escalonador seguro para sistemas embarcados (Rodrigo Maximiano).mp4 | 176.39MB BSides Sao Paulo/Bsides 2013 - Mobile Maware (Fernando Cardoso).mp4 | 146.53MB BSides Sao Paulo/Bsides 2013 - Mobile or not mobile bank for financial transactions (Thiago Bordini).mp4 | 133.09MB BSides Sao Paulo/Bsides 2013 - Seguranca Acessivel (Fabiola e Fernando).mp4 | 177.52MB BSides Sao Paulo/Bsides 2013 - The Bozo Security goes to (Rodrigo(Sp0oKeR) Montoro).mp4 | 164.65MB BSides Sao Paulo/Bsides 2013 - Utilizando um smartphone como pivo para um ataque interno (Rener Alberto).mp4 | 218.76MB BSides Scotland/BSides Edinburgh 2017/10 things my escape from Alcatraz taught me about cyber security by Stephen Bonner.mp4 | 83.69MB BSides Scotland/BSides Edinburgh 2017/A Look At TR-06FAIL And Other CPE Configuration Disasters by Darren Martyn.en.transcribed.srt | 97.49KB BSides Scotland/BSides Edinburgh 2017/A Look At TR-06FAIL And Other CPE Configuration Disasters by Darren Martyn.mp4 | 44.09MB BSides Scotland/BSides Edinburgh 2017/Adding More Realism To Learning Security Testing By Using SWAG And Swing by Colin McLean.en.transcribed.srt | 78.48KB BSides Scotland/BSides Edinburgh 2017/Adding More Realism To Learning Security Testing By Using SWAG And Swing by Colin McLean.mp4 | 46.85MB BSides Scotland/BSides Edinburgh 2017/B-Sides Edinburgh 2017 wrap up and thanks.en.transcribed.srt | 8.88KB BSides Scotland/BSides Edinburgh 2017/B-Sides Edinburgh 2017 wrap up and thanks.mp4 | 5.18MB BSides Scotland/BSides Edinburgh 2017/BearSSL SSL For All Things by Thomas Pornin.mp4 | 54.92MB BSides Scotland/BSides Edinburgh 2017/Fighting User Apathy And Indifference by Christopher Carlis.en.transcribed.srt | 68.89KB BSides Scotland/BSides Edinburgh 2017/Fighting User Apathy And Indifference by Christopher Carlis.mp4 | 46.68MB BSides Scotland/BSides Edinburgh 2017/One Step, Two Step by Henri Watson.en.transcribed.srt | 77.68KB BSides Scotland/BSides Edinburgh 2017/One Step, Two Step by Henri Watson.mp4 | 43.67MB BSides Scotland/BSides Edinburgh 2017/Privacy Policies The Realm Of The Legible Word Salad by Chris Boyd.en.transcribed.srt | 90.11KB BSides Scotland/BSides Edinburgh 2017/Privacy Policies The Realm Of The Legible Word Salad by Chris Boyd.mp4 | 34.23MB BSides Scotland/BSides Edinburgh 2017/The Future Of Professional Certification And The Future Of Bug Bounty by Ian Glover.en.transcribed.srt | 182.04KB BSides Scotland/BSides Edinburgh 2017/The Future Of Professional Certification And The Future Of Bug Bounty by Ian Glover.mp4 | 57.89MB BSides Scotland/BSides Edinburgh 2017/The Hunt For The Red DA by Neil Lines.en.transcribed.srt | 121.05KB BSides Scotland/BSides Edinburgh 2017/The Hunt For The Red DA by Neil Lines.mp4 | 50.82MB BSides Scotland/BSides Edinburgh 2017/Twice The Pride, Double The Fall Why 2FA Isn't The Cure We Thought It Was by Boglarka Ronto.mp4 | 56.42MB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Andy Gill and Brian Higgins - The Internet of Death.en.transcribed.srt | 95.18KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Andy Gill and Brian Higgins - The Internet of Death.mp4 | 33.68MB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Dan Raywood - If the kids are united will they ever work in cyber.en.transcribed.srt | 114.40KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Dan Raywood - If the kids are united will they ever work in cyber.mp4 | 41.54MB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Ken Munro & Andrew Tierney - Code readout Protection Bypass... For Dildos.en.transcribed.srt | 152.67KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Ken Munro & Andrew Tierney - Code readout Protection Bypass... For Dildos.mp4 | 217.52MB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Liz Bell - Robot codebreakers and hunting Nazis machine learning and InfoSec.en.transcribed.srt | 80.83KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Liz Bell - Robot codebreakers and hunting Nazis machine learning and InfoSec.mp4 | 38.40MB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Neil Lines - The Insider.en.transcribed.srt | 86.61KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Neil Lines - The Insider.mp4 | 31.75MB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Nigel Pentland - Cracking Mainframe Passwords.en.transcribed.srt | 112.10KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Nigel Pentland - Cracking Mainframe Passwords.mp4 | 152.10MB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Opening Keynote - Everything you know is wrong.en.transcribed.srt | 168.44KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Paul Johnston - Replicator Helping Developers to Replicate Pen Test Findings.en.transcribed.srt | 106.98KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Paul Johnston - Replicator Helping Developers to Replicate Pen Test Findings.mp4 | 59.41MB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Paul Ritchie - Hacking with Git.en.transcribed.srt | 111.33KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Paul Ritchie - Hacking with Git.mp4 | 39.72MB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Phill Kimpton - Soldier to Cyber.en.transcribed.srt | 78.40KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Phill Kimpton - Soldier to Cyber.mp4 | 26.11MB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Thomas Fischer - I wrote my own ransomware; Did not see 1 iota of bitcoin.en.transcribed.srt | 139.62KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 - Thomas Fischer - I wrote my own ransomware_ Did not see 1 iota of bitcoin.mp4 | 64.64MB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 Keynote - Dr Jessica Barker - The importance of being ernest and optimistic.en.transcribed.srt | 112.47KB BSides Scotland/BSides Glasgow 2018/BSides Glasgow 2018 Keynote - Dr Jessica Barker - The importance of being ernest and optimistic.mp4 | 43.34MB BSides Scotland/BSides Scotland logo.jpg | 15.82KB BSides Springfield/BSides Springfield 2017/Aaron Blythe at BSides Springfield - Introduction to Shodan - Infosec DarkWeb Deep Web - 7 22 2017.en.transcribed.srt | 75.79KB BSides Springfield/BSides Springfield 2017/Aaron Blythe at BSides Springfield - Introduction to Shodan - Infosec DarkWeb Deep Web - 7 22 2017.mp4 | 141.42MB BSides Springfield/BSides Springfield 2017/Anthony Maughan - Using Ravello to Create a Security Lab in the Cloud - from BSides Springfield 2017.en.transcribed.srt | 49.90KB BSides Springfield/BSides Springfield 2017/Anthony Maughan - Using Ravello to Create a Security Lab in the Cloud - from BSides Springfield 2017.mp4 | 89.97MB BSides Springfield/BSides Springfield 2017/Ben Miller - BSides Springfield - Hacking up the Chain Stories & Tips for communication to bosses...en.transcribed.srt | 91.28KB BSides Springfield/BSides Springfield 2017/Ben Miller - BSides Springfield - Hacking up the Chain Stories & Tips for communication to bosses...mp4 | 127.81MB BSides Springfield/BSides Springfield 2017/Cody J. Winkler at BSides Springfield - Malware Then, Now and How - 7 22 2017.en.transcribed.srt | 71.99KB BSides Springfield/BSides Springfield 2017/Cody J. Winkler at BSides Springfield - Malware Then, Now and How - 7 22 2017.mp4 | 118.44MB BSides Springfield/BSides Springfield 2017/Jason Holcomb - ATT&CK Yourself Using Discrete Adversary TTPs... - BSides Springfield 2017.en.transcribed.srt | 83.16KB BSides Springfield/BSides Springfield 2017/Jason Holcomb - ATT&CK Yourself Using Discrete Adversary TTPs... - BSides Springfield 2017.mp4 | 96.77MB BSides Springfield/BSides Springfield 2017/Jason Reaves at BSides Springfield - Malware C2 over x509 Certificate Exchange - 7 22 2017.en.transcribed.srt | 37.39KB BSides Springfield/BSides Springfield 2017/Jason Reaves at BSides Springfield - Malware C2 over x509 Certificate Exchange - 7 22 2017.mp4 | 53.07MB BSides Springfield/BSides Springfield 2017/Learning How to Innovate '1n51d3-th3-b0x' - Leadership, Innovation, Cyber Defense - Ernest Wong.en.transcribed.srt | 140.42KB BSides Springfield/BSides Springfield 2017/Learning How to Innovate '1n51d3-th3-b0x' - Leadership, Innovation, Cyber Defense - Ernest Wong.mp4 | 179.89MB BSides Springfield/BSides Springfield 2017/Mike Motta at BSides Springfield - Securing your company's assets with packets - 7 22 2017.en.transcribed.srt | 120.75KB BSides Springfield/BSides Springfield 2017/Mike Motta at BSides Springfield - Securing your company's assets with packets - 7 22 2017.mp4 | 201.00MB BSides Springfield/BSides Springfield 2017/Weston George - Don't be a Hammer. Learning more tools with VMs and Vulnhub - live at BSides Spfd.en.transcribed.srt | 34.70KB BSides Springfield/BSides Springfield 2017/Weston George - Don't be a Hammer. Learning more tools with VMs and Vulnhub - live at BSides Spfd.mp4 | 40.71MB BSides St. Johns/B-Sides St. John s 2013 - Session 01 - Travis Barlow.mp4 | 113.73MB BSides St. Johns/B-Sides St. John s 2013 - Session 02 - Mark Nunnikhoven.mp4 | 173.79MB BSides St. Johns/B-Sides St. John s 2013 - Session 03 - Chris Vernon.mp4 | 79.88MB BSides St. Johns/B-Sides St. John s 2013 - Session 04 - Peter Rawsthorne.mp4 | 49.68MB BSides St. Johns/B-Sides St. John s 2013 - Session 05 - Zack Mullaly.mp4 | 43.43MB BSides St. Johns/B-Sides St. John s 2013 - Session 06 - Charles Robertson.mp4 | 199.97MB BSides St. Johns/B-Sides St. John s 2013 - Session 07 - Darryl MacLeod.mp4 | 60.43MB BSides St. Johns/B-Sides St. John s 2013 - Session 08 - Joe Dawson.mp4 | 105.13MB BSides St. Johns/B-Sides St. John s 2013 - Session 09 - Garry Coldwells.mp4 | 93.11MB BSides Tampa/BSides Tampa 2015/100 Bug Bounties and Security Research Kevin Johnson.mp4 | 95.14MB BSides Tampa/BSides Tampa 2015/101 Securing The Cloud Alan Zukowski.mp4 | 126.11MB BSides Tampa/BSides Tampa 2015/102 Hacking Chris Berberich.mp4 | 103.64MB BSides Tampa/BSides Tampa 2015/103 Vendor Induced Security Issues Dave Chronister.mp4 | 109.25MB BSides Tampa/BSides Tampa 2015/104 Pentest Apocalypse Beau Bullock.mp4 | 91.11MB BSides Tampa/BSides Tampa 2015/105 Kippo and Bits and Bits Chris Teodorski.mp4 | 92.60MB BSides Tampa/BSides Tampa 2015/106 The Art of Post infection Response Mitigation Caleb Crable.mp4 | 105.40MB BSides Tampa/BSides Tampa 2015/107 The Need for Pro active Defense and Threat Hunting Within Organizations Andrew Case.mp4 | 141.82MB BSides Tampa/BSides Tampa 2015/200 Finding Common Ground Within the Industry and Beyond David Shearer.mp4 | 88.12MB BSides Tampa/BSides Tampa 2015/201 Ways to Identify Malware on a System Ryan Irving.mp4 | 129.73MB BSides Tampa/BSides Tampa 2015/202 Android Malware and Analysis Shane Hartman.mp4 | 129.02MB BSides Tampa/BSides Tampa 2015/203 Teaching Kids and Even Some Adults Security Through Gaming Le Grecs.mp4 | 110.90MB BSides Tampa/BSides Tampa 2015/204 Evaluating Commercial Cyber Threat Intelligence John Berger.mp4 | 117.99MB BSides Tampa/BSides Tampa 2015/300 Cyber Geography and the Manifest Destiny of the 21st Century Joe Blankenship.mp4 | 64.22MB BSides Tampa/BSides Tampa 2015/301 Mitigating Brand Damage From A Cyber Attack Guy Hagen.mp4 | 109.29MB BSides Tampa/BSides Tampa 2015/302 What is a security analyst and what job role will they perform James Risler.mp4 | 106.47MB BSides Tampa/BSides Tampa 2015/303 Live Forensic Acquisition Techniques Joe Partlow.mp4 | 108.83MB BSides Tampa/BSides Tampa 2015/304 Cyber Security Awareness for Healthcare Professionals Marco Polizzi.mp4 | 137.77MB BSides Tampa/BSides Tampa 2017/002 Managing Your MSSP Mark Myers and Damien Adams.mp4 | 30.87MB BSides Tampa/BSides Tampa 2017/003 ArchStrike Linux Chad Seaman.mp4 | 35.31MB BSides Tampa/BSides Tampa 2017/004 Hacking The Sabbath Jonathan Singer.mp4 | 29.34MB BSides Tampa/BSides Tampa 2017/005 What Ive Lea3rned Writing CTF Challenges Vito Genoese.mp4 | 28.53MB BSides Tampa/BSides Tampa 2017/100 Private matters Cameron Boozarjomehri.mp4 | 33.59MB BSides Tampa/BSides Tampa 2017/101 Pow Pow Pow Powershell Octavio Paguaga.mp4 | 31.37MB BSides Tampa/BSides Tampa 2017/102 Advanced Targeted Attack Andy Thompson.mp4 | 19.63MB BSides Tampa/BSides Tampa 2017/103 Phishing Pholks Phor Phun and Prophit Erich Kron.mp4 | 56.09MB BSides Tampa/BSides Tampa 2017/104 Alert All the Things Network BaselinesAlerts with Bro Scripts Matthew Domko.mp4 | 43.80MB BSides Tampa/BSides Tampa 2017/105 Intro to Fuzzing for Fun and Profit Brian Beaudry.mp4 | 80.65MB BSides Tampa/BSides Tampa 2017/200 Build Your Own Physical Pentesting Go Bag Beau Bullock Derek Banks.mp4 | 36.04MB BSides Tampa/BSides Tampa 2017/201 NFC Your Smartphones Best Friend or Worst Nightmare Shane Hartman.mp4 | 27.83MB BSides Tampa/BSides Tampa 2017/202 e Extortion Trends and Defense Erik Iker.mp4 | 54.94MB BSides Tampa/BSides Tampa 2017/203 HIPAA for Infosec Professionals Michael Brown.mp4 | 34.79MB BSides Tampa/BSides Tampa 2017/204 Deconstructing 100 JavaScript based Ransomware Jeremy Rasmussen Paolo Soto.mp4 | 27.21MB BSides Tampa/BSides Tampa 2017/300 Redefining Security in a Cloud Centric Future Mike Spaulding Mitch Spaulding.mp4 | 65.28MB BSides Tampa/BSides Tampa 2017/301 Securing The Electrical Grid From Modern Threats Christopher Williams.mp4 | 46.32MB BSides Tampa/BSides Tampa 2017/302 Securing Agile Development Alan Zukowski.mp4 | 55.12MB BSides Tampa/BSides Tampa 2017/305 Mozillas Tips on Strong HTTPS Julien Vehent.mp4 | 40.19MB BSides Tampa/BSides Tampa 2017/401 Build the capability to Detect Triage And Respond Scott Sattler.mp4 | 44.00MB BSides Tampa/BSides Tampa 2017/402 What the Hell is ICS Security Brandon Workentin.mp4 | 41.59MB BSides Tampa/BSides Tampa 2017/403 Protecting Third Party Risk From Plundering Stacey Banks.mp4 | 19.32MB BSides Tampa/BSides Tampa 2017/405 Protecting Visual Assets Digital Image Counter Surveillance Strategies Nikita Mazurov Kenneth Br.mp4 | 44.91MB BSides Tampa/BSides Tampa 2017/406 Chaining the Future.mp4 | 169.86MB BSides Tampa/BSides Tampa 2017/BSides Tampa Birdy.mp4 | 7.45MB BSides Tampa/BSides Tampa 2018/Courtroom00 Cyber Assurance Testing for Success Col John Burger.en.transcribed.srt | 123.47KB BSides Tampa/BSides Tampa 2018/Courtroom00 Cyber Assurance Testing for Success Col John Burger.mp4 | 166.92MB BSides Tampa/BSides Tampa 2018/Courtroom01 You Can Runbut you cant hide Bruce Anderson.en.transcribed.srt | 109.57KB BSides Tampa/BSides Tampa 2018/Courtroom01 You Can Runbut you cant hide Bruce Anderson.mp4 | 89.03MB BSides Tampa/BSides Tampa 2018/Courtroom02 Red Team Apocalypse Beau Bullock and Derek Banks.en.transcribed.srt | 123.96KB BSides Tampa/BSides Tampa 2018/Courtroom02 Red Team Apocalypse Beau Bullock and Derek Banks.mp4 | 88.90MB BSides Tampa/BSides Tampa 2018/Courtroom03 Advanced Persistent Security Ira Winkler.mp4 | 84.89MB BSides Tampa/BSides Tampa 2018/Courtroom04 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Myers and Barrett Ad.en.transcribed.srt | 60.96KB BSides Tampa/BSides Tampa 2018/Courtroom04 Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Myers and Barrett Ad.mp4 | 63.41MB BSides Tampa/BSides Tampa 2018/Courtroom05 The Shoulders of InfoSec Jack Daniels.en.transcribed.srt | 100.20KB BSides Tampa/BSides Tampa 2018/Courtroom05 The Shoulders of InfoSec Jack Daniels.mp4 | 75.32MB BSides Tampa/BSides Tampa 2018/Courtroom06 Blockchain The New Digital Swiss Army Knife G Mark Hardy.en.transcribed.srt | 141.83KB BSides Tampa/BSides Tampa 2018/Courtroom06 Blockchain The New Digital Swiss Army Knife G Mark Hardy.mp4 | 83.24MB BSides Tampa/BSides Tampa 2018/Courtroom07 Modern Day Vandals and Thieves Wireless Edition David Switzer and Jonathan Echavarria.en.transcribed.srt | 90.10KB BSides Tampa/BSides Tampa 2018/Courtroom07 Modern Day Vandals and Thieves Wireless Edition David Switzer and Jonathan Echavarria.mp4 | 67.26MB BSides Tampa/BSides Tampa 2018/Courtroom08 Fraud Should you worry Greg Hanis.en.transcribed.srt | 55.06KB BSides Tampa/BSides Tampa 2018/Courtroom08 Fraud Should you worry Greg Hanis.mp4 | 119.52MB BSides Tampa/BSides Tampa 2018/Derrick's Thank Yous.en.transcribed.srt | 806B BSides Tampa/BSides Tampa 2018/Derrick's Thank Yous.mp4 | 7.21MB BSides Tampa/BSides Tampa 2018/Track 200 A Security Look at Voice Based Assistants David Vargas.en.transcribed.srt | 136.63KB BSides Tampa/BSides Tampa 2018/Track 200 A Security Look at Voice Based Assistants David Vargas.mp4 | 96.32MB BSides Tampa/BSides Tampa 2018/Track 201 Hackers Interrupted Alex Holden.en.transcribed.srt | 101.43KB BSides Tampa/BSides Tampa 2018/Track 201 Hackers Interrupted Alex Holden.mp4 | 64.83MB BSides Tampa/BSides Tampa 2018/Track 202 Insane in the Mainframe Taking Control of Azure Security Jeremy Rassmusen.en.transcribed.srt | 139.96KB BSides Tampa/BSides Tampa 2018/Track 202 Insane in the Mainframe Taking Control of Azure Security Jeremy Rassmusen.mp4 | 92.48MB BSides Tampa/BSides Tampa 2018/Track 203 MiFare lady Teaching an old RFID new tricks Daniel Reilly.en.transcribed.srt | 126.30KB BSides Tampa/BSides Tampa 2018/Track 203 MiFare lady Teaching an old RFID new tricks Daniel Reilly.mp4 | 75.97MB BSides Tampa/BSides Tampa 2018/Track 206 Blue Teams tool dump Stop using them term NeXt Gen this isnt XXCall of DutyXX Alex Kot.en.transcribed.srt | 158.66KB BSides Tampa/BSides Tampa 2018/Track 206 Blue Teams tool dump Stop using them term NeXt Gen this isnt XXCall of DutyXX Alex Kot.mp4 | 70.56MB BSides Tampa/BSides Tampa 2018/Track 300 Exploiting Zillow Zestimate for Reckless Profit Robert RJ Burney.en.transcribed.srt | 96.63KB BSides Tampa/BSides Tampa 2018/Track 300 Exploiting Zillow Zestimate for Reckless Profit Robert RJ Burney.mp4 | 56.31MB BSides Tampa/BSides Tampa 2018/Track 301 Self Healing Cyber Weapons Logan Hicks.en.transcribed.srt | 160.90KB BSides Tampa/BSides Tampa 2018/Track 301 Self Healing Cyber Weapons Logan Hicks.mp4 | 114.01MB BSides Tampa/BSides Tampa 2018/Track 302 Ransomware A Declining Force in Todays Threat Landscape Brad Duncan.en.transcribed.srt | 107.39KB BSides Tampa/BSides Tampa 2018/Track 302 Ransomware A Declining Force in Todays Threat Landscape Brad Duncan.mp4 | 78.06MB BSides Tampa/BSides Tampa 2018/Track 303 Modern web application security Julien Vehent.en.transcribed.srt | 133.08KB BSides Tampa/BSides Tampa 2018/Track 303 Modern web application security Julien Vehent.mp4 | 84.19MB BSides Tampa/BSides Tampa 2018/Track 304 Advanced Social Engineering and OSINT for Penetration Testing Joe Gray.en.transcribed.srt | 150.88KB BSides Tampa/BSides Tampa 2018/Track 304 Advanced Social Engineering and OSINT for Penetration Testing Joe Gray.mp4 | 86.08MB BSides Tampa/BSides Tampa 2018/Track 306 Exothermic Data Destruction Defeating Drive Recovery Forensics Nikita Mazurov and Kenneth.en.transcribed.srt | 88.31KB BSides Tampa/BSides Tampa 2018/Track 306 Exothermic Data Destruction Defeating Drive Recovery Forensics Nikita Mazurov and Kenneth.mp4 | 78.83MB BSides Tampa/BSides Tampa 2019/B 00 Doesnt It make You WannaCry Mitigating Ransom.en.transcribed.srt | 109.80KB BSides Tampa/BSides Tampa 2019/B 00 Doesnt It make You WannaCry Mitigating Ransom.mp4 | 110.12MB BSides Tampa/BSides Tampa 2019/B 01 RegEx for Incident Response Daniel Nutting.en.transcribed.srt | 72.43KB BSides Tampa/BSides Tampa 2019/B 01 RegEx for Incident Response Daniel Nutting.mp4 | 30.70MB BSides Tampa/BSides Tampa 2019/B 02 Intermediate Physical Security Justin Wynn.en.transcribed.srt | 157.90KB BSides Tampa/BSides Tampa 2019/B 02 Intermediate Physical Security Justin Wynn.mp4 | 54.71MB BSides Tampa/BSides Tampa 2019/B 03 Security Analytics in the Cloud Marc Baker.en.transcribed.srt | 128.78KB BSides Tampa/BSides Tampa 2019/B 03 Security Analytics in the Cloud Marc Baker.mp4 | 44.44MB BSides Tampa/BSides Tampa 2019/D 00 Securing Shadow IT Gene Cronk.en.transcribed.srt | 47.38KB BSides Tampa/BSides Tampa 2019/D 00 Securing Shadow IT Gene Cronk.mp4 | 38.22MB BSides Tampa/BSides Tampa 2019/D 01 Day When Quantum Computers Breaks Crypto Roge.mp4 | 38.19MB BSides Tampa/BSides Tampa 2019/D 02 An Inside Look At Stopping Unauthorized Selle.en.transcribed.srt | 120.35KB BSides Tampa/BSides Tampa 2019/D 02 An Inside Look At Stopping Unauthorized Selle.mp4 | 41.11MB BSides Tampa/BSides Tampa 2019/D 03 The Sound of Evil Wes Widner.en.transcribed.srt | 116.33KB BSides Tampa/BSides Tampa 2019/D 03 The Sound of Evil Wes Widner.mp4 | 78.97MB BSides Tampa/BSides Tampa 2019/D 04 Serverless Security Top 10 Tal Melamed.mp4 | 71.31MB BSides Tampa/BSides Tampa 2019/D 05 Hacking IoT devices by chaining application s.en.transcribed.srt | 79.55KB BSides Tampa/BSides Tampa 2019/D 05 Hacking IoT devices by chaining application s.mp4 | 36.51MB BSides Tampa/BSides Tampa 2019/D 06 Becoming a Human nMAP Cultivating a Renaissan.mp4 | 31.43MB BSides Tampa/BSides Tampa 2019/DE 00 How to use 400M endpoints to build strong AI.en.transcribed.srt | 125.22KB BSides Tampa/BSides Tampa 2019/DE 00 How to use 400M endpoints to build strong AI.mp4 | 50.85MB BSides Tampa/BSides Tampa 2019/E 00 2020 Enterprise Security Monitoring Seeing cl.en.transcribed.srt | 97.54KB BSides Tampa/BSides Tampa 2019/E 00 2020 Enterprise Security Monitoring Seeing cl.mp4 | 38.69MB BSides Tampa/BSides Tampa 2019/E 01 Beyond Lockpicking Brian Etchieson.mp4 | 60.90MB BSides Tampa/BSides Tampa 2019/E 02 Social Forensication A Multidisciplinary Appr.en.transcribed.srt | 120.75KB BSides Tampa/BSides Tampa 2019/E 02 Social Forensication A Multidisciplinary Appr.mp4 | 49.69MB BSides Tampa/BSides Tampa 2019/E 03 Phishing U2F Protected Accounts Nikita Mazuro.mp4 | 29.20MB BSides Tampa/BSides Tampa 2019/E 04 Election Hacking Getting Ready for the Russia.en.transcribed.srt | 105.42KB BSides Tampa/BSides Tampa 2019/E 04 Election Hacking Getting Ready for the Russia.mp4 | 55.08MB BSides Tampa/BSides Tampa 2019/E 05 Logging Pitfalls and How to Abuse Them Kevin.en.transcribed.srt | 125.56KB BSides Tampa/BSides Tampa 2019/E 05 Logging Pitfalls and How to Abuse Them Kevin.mp4 | 85.87MB BSides Tampa/BSides Tampa 2019/E 06 Travelocalypse Its dangerous business hacker.en.transcribed.srt | 144.08KB BSides Tampa/BSides Tampa 2019/E 06 Travelocalypse Its dangerous business hacker.mp4 | 47.11MB BSides Tampa/BSides Tampa 2019/Opening.en.transcribed.srt | 28.08KB BSides Tampa/BSides Tampa 2019/Opening.mp4 | 14.06MB BSides Tampa/BSides Tampa 2019/vCISO Is That the Right Answer Mike Brooks.mp4 | 52.67MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - A Practical Approach to Hacking an Enterprise with YASUO - Saurabh & Stephen.mp4 | 53.61MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Batch Firmware Analysis - Jeremy Richards.mp4 | 46.40MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Blackhat Python - Dan Frisch.mp4 | 108.04MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Communities @ Risk - Katie Kleemola.mp4 | 32.82MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Corporations in the middle - Lee Brotherson.mp4 | 56.74MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Cryptocurrencies and Security - Michael Perklin.mp4 | 50.78MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - ELK Not P.O.S. - Jason Kendall.mp4 | 40.53MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Honeydocs and Offensive Countermeasures - Roy Firestein.mp4 | 54.76MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Hopping on the CAN Bus - Eric Evenchick.mp4 | 61.15MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Logs and Tactical Defence - Allan Stojanovic.mp4 | 35.46MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Pwning all the Internet of things for fun and profit - Ben Hughes.mp4 | 33.32MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Recog Open Source Asset and Service Identification - Greg Wiseman.mp4 | 45.41MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Security and Behavioural Economics - Augusto Barros.mp4 | 79.59MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Shut the Front Door - Mark Bassegio.mp4 | 101.05MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - The Hitchhiker s Guide to Information Security - Kellman Meghu.mp4 | 112.97MB BSides Toronto/BSidesTO 2014/BSidesTO 2014 - Voltron - Richo Healey.mp4 | 108.38MB BSides Vancouver/BSides Vancouver 2015 - Alex Loffler - Advanced Security Analytics.mp4 | 229.28MB BSides Vancouver/BSides Vancouver 2015 - Andree Toonk - BGP Hijack - Who s Stealing Your Prefixes.mp4 | 131.63MB BSides Vancouver/BSides Vancouver 2015 - Bob Fruth - Threat Modeling in the Age of Connectivity to Everything.mp4 | 71.07MB BSides Vancouver/BSides Vancouver 2015 - Irfahn Khimji & Ken Westin - I am The Insider Threat.mp4 | 185.09MB BSides Vancouver/BSides Vancouver 2015 - Keynote Mark Weinstein - Reality Check Does Privacy Truly Matter Today.mp4 | 144.39MB BSides Vancouver/BSides Vancouver 2015 - Keynote Steven Rambam - You ve Lost Privacy, Now They re Taking Anonymity.mp4 | 298.05MB BSides Vancouver/BSides Vancouver 2015 - Robert Wood - Threat Modeling in the Gaming Industry.mp4 | 361.41MB BSides Vancouver/BSides Vancouver 2015 - VEC Panel - Entrepreneurial lessons learned and best practices.mp4 | 168.43MB BSides Vancouver/BSides Vancouver 2015 - Wesley Wineberg - Analyzing the EMU-2 Zigbee Home Energy Monitor.mp4 | 369.99MB BSides Warsaw/BSides Warsaw 2014/Jakub Unknow Mrugalski - This is (s)hell!.mp4 | 177.03MB BSides Warsaw/BSides Warsaw 2014/Maciej mak Kotowicz vel matematyk - Wakacyjne rachunki.mp4 | 128.49MB BSides Warsaw/BSides Warsaw 2014/Mariusz oshogbo vx Zaborski - Budowanie appliance sieciowego w oparciu o otwarte oprogramowanie.mp4 | 115.18MB BSides Warsaw/BSides Warsaw 2014/matt3.mp4 | 84.52MB BSides Warsaw/BSides Warsaw 2016/'Wielki Bracie' - czemu masz takie wielkie oczy.mp4 | 106.65MB BSides Warsaw/BSides Warsaw 2016/Analiza sledcza kryptowalut - co i w jaki sposob mozna odnalezc w blockchainie.mp4 | 62.54MB BSides Warsaw/BSides Warsaw 2016/Bezpieczne urzadzenie mobilne - czy to mozliwe.mp4 | 57.16MB BSides Warsaw/BSides Warsaw 2016/Bugs, tools, pitfalls, methodology - this is how we do it.mp4 | 111.76MB BSides Warsaw/BSides Warsaw 2016/Cyfrowa twierdza - poradnik rebelianta.mp4 | 91.12MB BSides Warsaw/BSides Warsaw 2016/DevOps SysOps Security.mp4 | 89.03MB BSides Warsaw/BSides Warsaw 2016/ELFie brudne sztuczki.mp4 | 51.85MB BSides Warsaw/BSides Warsaw 2016/GMD - Getting More Done.mp4 | 117.83MB BSides Warsaw/BSides Warsaw 2016/How to fuzz.mp4 | 81.75MB BSides Warsaw/BSides Warsaw 2016/Jak i dlaczego przygotowac firme do wprowadzenia narzedzia SIEM - realne problemy i wyzwania.mp4 | 48.34MB BSides Warsaw/BSides Warsaw 2016/Jak rozwijac Threat Intelligence w Twojej organizacji.mp4 | 102.42MB BSides Warsaw/BSides Warsaw 2016/Jak zdobyc flage.mp4 | 97.80MB BSides Warsaw/BSides Warsaw 2016/Make DragonflyBSD great again.mp4 | 105.87MB BSides Warsaw/BSides Warsaw 2016/Nowe zasady ochrony danych osobowych - co zmieni ogolne rozporzadzenie o ochronie danych.mp4 | 68.13MB BSides Warsaw/BSides Warsaw 2016/Oszukac system (pol zartem, pol serio).mp4 | 62.49MB BSides Warsaw/BSides Warsaw 2016/Podstawy cyberbezpieczenstwa.mp4 | 70.67MB BSides Warsaw/BSides Warsaw 2016/Stories from the SOC - vol. 2016.en.transcribed.srt | 80.82KB BSides Warsaw/BSides Warsaw 2016/Stories from the SOC - vol. 2016.mp4 | 119.82MB BSides Warsaw/BSides Warsaw 2016/Synteza dzwieku i produkcja muzyki z wykorzystaniem otwartego oprogramowania.mp4 | 137.08MB BSides Warsaw/BSides Warsaw 2016/Szybki rzut okiem na bezpieczenstwo bankowosci.mp4 | 115.58MB BSides Warsaw/BSides Warsaw 2016/TLS 1.3 Co nowego.mp4 | 68.69MB BSides Warsaw/BSides Warsaw Logo.jpg | 12.36KB BSides Wellington/BSides Wellington Logo.jpg | 18.74KB BSides Winnipeg/BSides Winnipeg 2013/Adrien de Beaupre - Making Pen-Testing Analysis Sexy.mp4 | 163.14MB BSides Winnipeg/BSides Winnipeg 2013/Brandon Enright - Detecting Malicious Activity and Malware on a Large Network.mp4 | 171.27MB BSides Winnipeg/BSides Winnipeg 2013/Closing Ceremonies BSides Winnipeg 2013.mp4 | 58.81MB BSides Winnipeg/BSides Winnipeg 2013/Ian Trump - Cyber Threat Intelligence Is it Real or is it Hokum.mp4 | 223.24MB BSides Winnipeg/BSides Winnipeg 2013/Jared Bater & Chris Kluka - Canadian Cyber Defence Challenge Building a War Zone.mp4 | 169.09MB BSides Winnipeg/BSides Winnipeg 2013/Josh More - Security Metaphors Discussing problems with others while avoiding arguments.mp4 | 177.92MB BSides Winnipeg/BSides Winnipeg 2013/Kyle Geske - Internet Bots for Fun & No Profit.mp4 | 101.92MB BSides Winnipeg/BSides Winnipeg 2013/Leslie Bester - VoIP and VoIP Related Fraud.mp4 | 110.55MB BSides Winnipeg/BSides Winnipeg 2013/Mark Jenkins - Auditable Offline Bitcoin Wallet Implementation.mp4 | 129.18MB BSides Winnipeg/BSides Winnipeg 2013/Michael Legary - NFC & RFID Harvesting for REDACTED.mp4 | 197.10MB BSides Winnipeg/BSides Winnipeg 2013/Michael Zapp - SSD Security Risks.mp4 | 225.88MB BSides Winnipeg/BSides Winnipeg 2013/Richard Rodd & Chris Otto - USB A Look Inside.mp4 | 132.69MB BSides Winnipeg/BSides Winnipeg 2013/Sergii Polishcuk - ARP attack on IXP infrastructure.mp4 | 79.03MB BSides Winnipeg/BSides Winnipeg 2013/Theo Baschak - InfoSec from an ISP Perspective.mp4 | 115.22MB BSides Winnipeg/BSides Winnipeg 2013/Yvan Boily - Security in the open.mp4 | 198.54MB BSides Winnipeg/BSides Winnipeg 2015/BGP, some Python, and a DB - BSides Winnipeg 2015.mp4 | 24.08MB BSides Winnipeg/BSides Winnipeg 2015/Basics of Radio Waves and SDR - BSides Winnipeg 2015.mp4 | 52.41MB BSides Winnipeg/BSides Winnipeg 2015/Detecting and Preventing Phishing Attacks with DNS Reconnaissance - BSides Winnipeg 2015.mp4 | 91.47MB BSides Winnipeg/BSides Winnipeg 2015/Feasibility Study Authenticated PC Firmware on the Cheap - BSides Winnipeg 2015.mp4 | 15.70MB BSides Winnipeg/BSides Winnipeg 2015/Fun With WOW64 Abusing Long Mode Transitions in Exploit Payloads - BSides Winnipeg 2015.mp4 | 29.84MB BSides Winnipeg/BSides Winnipeg 2015/Hardware Hacking 101 Erasing ThinkPad Supervisor Passwords - BSides Winnipeg 2015.mp4 | 17.88MB BSides Winnipeg/BSides Winnipeg 2015/In-Home Robots Giving Intruders a Helping Hand - BSides Winnipeg 2015.mp4 | 67.10MB BSides Winnipeg/BSides Winnipeg 2015/Interactions Between Deep Freeze and Active Directory - BSides Winnipeg 2015.mp4 | 38.03MB BSides Winnipeg/BSides Winnipeg 2015/Let Go of the Tools - BSides Winnipeg 2015.mp4 | 20.03MB BSides Winnipeg/BSides Winnipeg 2015/Meaningful Measurement Feeding the Cyber FUD Monster - BSides Winnipeg 2015.mp4 | 31.27MB BSides Winnipeg/BSides Winnipeg 2015/Modern TLS in the Enterprise - BSides Winnipeg 2015.mp4 | 27.95MB BSides Winnipeg/BSides Winnipeg 2015/Network Configuration Management - BSides Winnipeg 2015.mp4 | 43.52MB BSides Winnipeg/BSides Winnipeg 2015/Privacy in Data Management - BSides Winnipeg 2015.mp4 | 21.87MB BSides Winnipeg/BSides Winnipeg 2015/Rust Bad for your Car, Good for your Code Base - BSides Winnipeg 2015.mp4 | 62.79MB BSides Winnipeg/BSides Winnipeg 2015/TSA Luggage Locks Details, Flaws & Making the Best of a Bad Lock - BSides Winnipeg 2015.mp4 | 41.72MB BSides Winnipeg/BSides Winnipeg 2015/Telephony Denial of Service Attacks and Spam - BSides Winnipeg 2015.mp4 | 50.15MB BSides Winnipeg/BSides Winnipeg 2015/The Challenges of System Network Segmentation in an Enterprise - BSides Winnipeg 2015.mp4 | 26.97MB BSides Winnipeg/BSides Winnipeg 2015/Y U No Bild Bridge Higher - BSides Winnipeg 2015.mp4 | 17.00MB BSides Winnipeg/BSides Winnipeg 2017/An IT Risk Assessment of the Titanic.mp4 | 66.46MB BSides Winnipeg/BSides Winnipeg 2017/Avoiding Kyphosis Security Posture in the Cloud.mp4 | 132.11MB BSides Winnipeg/BSides Winnipeg 2017/Do As I Say, Not As I Do Why Our Security Advice Sucks.mp4 | 40.51MB BSides Winnipeg/BSides Winnipeg 2017/For The Win Finding WAF Evasions and Verifying Fixes with FTW.mp4 | 83.27MB BSides Winnipeg/BSides Winnipeg 2017/Hopping Fences - Practical WAF Bypasses.mp4 | 71.69MB BSides Winnipeg/BSides Winnipeg 2017/I Want my EIP.mp4 | 139.98MB BSides Winnipeg/BSides Winnipeg 2017/Info Sec for Cheapskates.mp4 | 91.05MB BSides Winnipeg/BSides Winnipeg 2017/Machine Learning and the Cyberz Separating Fact from Marketing Fiction.mp4 | 186.78MB BSides Winnipeg/BSides Winnipeg 2017/Managing Large Assessments.mp4 | 41.06MB BSides Winnipeg/BSides Winnipeg 2017/More Secure Bootstrap Problems and Solutions.mp4 | 43.79MB BSides Winnipeg/BSides Winnipeg 2017/Operating your own BGP Autonomous System on the Internet.mp4 | 67.26MB BSides Winnipeg/BSides Winnipeg 2017/Privilege Escalation Living a New Life Without getsystem.mp4 | 78.58MB BSides Winnipeg/BSides Winnipeg 2017/Reverse DNS the World - What do you learn The how and what.mp4 | 46.68MB BSides Winnipeg/BSides Winnipeg 2017/Scraping Retailers or How I Learnt to Stop Worrying and Love the Web.mp4 | 50.43MB BSides Winnipeg/BSides Winnipeg 2017/The Ins and Outs of NTLM Relaying (and why you should give a damn!).mp4 | 155.74MB BSides Winnipeg/BSides Winnipeg 2017/Winnipeg-Wide Amateur radio IP Network VA4WAN.mp4 | 111.65MB BSides Winnipeg/BSides Winnipeg 2017/Zero Day Phishing Emails.mp4 | 65.75MB Security BSides thank you.txt | 6.46KB

Recommend

Magnetic link has been copied to the cutting board