Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
10 major steps for Cybersecurity (English version) - Bert Heitink.en.transcribed.srt |
59.08Кб |
10 major steps for Cybersecurity (English version) - Bert Heitink.mp4 |
30.16Мб |
10 major steps for Cybersecurity (Ukrainian version) - Bert Heitink.mp4 |
15.09Мб |
A DECEPTICON and AUTOBOT walk into a bar Python for enhanced OPSEC - Joe Gray.mp4 |
58.41Мб |
Advanced reverse engineering techniques in unpacking (English version) - Ievgen Kulyk.mp4 |
12.74Мб |
Advanced reverse engineering techniques in unpacking (Ukrainian version) - Ievgen Kulyk.mp4 |
45.75Мб |
All Roads Lead to OpenVPN Pwn’ing Industrial Remote Access Clients. - Sharon Brizinov.eng.srt |
93.76Кб |
All Roads Lead to OpenVPN Pwn’ing Industrial Remote Access Clients. - Sharon Brizinov.mp4 |
34.85Мб |
Android Application Hacking with Damn Vulnerable Bank. - R. Tammana, A. Jaiswal, H. Kakade.eng.srt |
106.74Кб |
Android Application Hacking with Damn Vulnerable Bank. - R. Tammana, A. Jaiswal, H. Kakade.mp4 |
85.32Мб |
Attacks on Windows Infrastructure (Blue Team edition). - Bogdan Vennyk.eng.srt |
82.05Кб |
Attacks on Windows Infrastructure (Blue Team edition). - Bogdan Vennyk.mp4 |
62.55Мб |
Automation in modern Incident Detection & Response (IDR) process (English version) - Nazar Tymoshyk.mp4 |
53.22Мб |
Automation in modern Incident Detection & Response (IDR) process (Ukr version) - Nazar Tymoshyk.mp4 |
52.37Мб |
Bert Heitink - доповідач NoNameCon.en.transcribed.srt |
3.42Кб |
Bert Heitink - доповідач NoNameCon.mp4 |
4.67Мб |
Bug bounty hunting Workshop - Philippe Delteil.eng.srt |
323.78Кб |
Bug bounty hunting Workshop - Philippe Delteil.mp4 |
275.84Мб |
Car Hacking 101 - Andrey Voloshin, Alexander Olenyev.mp4 |
60.16Мб |
Car Hacking Yes, You can do that (English version) - Andrey Voloshin.mp4 |
45.67Мб |
Car Hacking Yes, You can do that (Ukrainian version) - Andrey Voloshin.mp4 |
44.94Мб |
Centralised Monitoring and Alerting system over AWS. - Saransh Rana.eng.srt |
76.50Кб |
Centralised Monitoring and Alerting system over AWS. - Saransh Rana.mp4 |
41.37Мб |
Cryptographic protection of ML models. - Anastasiia Voitova.eng.srt |
103.37Кб |
Cryptographic protection of ML models. - Anastasiia Voitova.mp4 |
76.02Мб |
Cyber Attacks Against Georgia (October 2019) and Georgian Internet Security - Mikheil Basilaia.eng.srt |
72.41Кб |
Cyber Attacks Against Georgia (October 2019) and Georgian Internet Security - Mikheil Basilaia.mp4 |
48.10Мб |
DFA and code control flow obfuscation a real-world example. Dima Kovalenko.eng.srt |
52.61Кб |
DFA and code control flow obfuscation a real-world example. Dima Kovalenko.mp4 |
44.60Мб |
Discovering C&C in Malicious PDF using deobfuscation, encoding, and other techniques. - Filipi Pires.eng.srt |
73.04Кб |
Discovering C&C in Malicious PDF using deobfuscation, encoding, and other techniques. - Filipi Pires.mp4 |
50.90Мб |
Dzień dobry, you’re hacked. - Andriy Varusha.eng.srt |
112.97Кб |
Dzień dobry, you’re hacked. - Andriy Varusha.mp4 |
66.27Мб |
Executable Code Protection in ARM Systems - Eugene Kulik, Pavel Kryvko.mp4 |
37.57Мб |
Getting Secure Against Challenges vs Getting Security Challenges Done - Eugene Pilyankevich.mp4 |
57.63Мб |
Hacking Robots Before Skynet - Lucas Apa UKR.mp4 |
57.11Мб |
Help, my browser is leaking Exploring XSLeaks attacks and defenses - Tom Van Goethem.mp4 |
42.74Мб |
How 2 remove a viru$ - Oksana Safronova.mp4 |
45.49Мб |
How to check if security team is ready before incident happens (English version) - Oksana Safronova.mp4 |
34.43Мб |
How to check if security team is ready before incident happens (Ukr version) - Oksana Safronova.mp4 |
33.44Мб |
Hunting for APT in network logs - Oleh Levytskyi, Bogdan Vennyk.mp4 |
185.89Мб |
Kalina, Kupina, and other flora of domestic cryptography (English version) - Ruslan Kiyanchuk.mp4 |
48.22Мб |
Kalina, Kupina, and other flora of domestic cryptography (Ukrainian version) - Ruslan Kiyanchuk.mp4 |
48.46Мб |
Knock Knock Security threats with Kubernetes (Eng version) - Igor Khoroshchenko, Stanislav Kolenkin.en.transcribed.srt |
55.06Кб |
Knock Knock Security threats with Kubernetes (Eng version) - Igor Khoroshchenko, Stanislav Kolenkin.mp4 |
16.63Мб |
Knock Knock Security threats with Kubernetes (Ukr version) - Igor Khoroshchenko, Stanislav Kolenkin.mp4 |
50.23Мб |
Let's play a game. - Oksana Safronova.eng.srt |
79.94Кб |
Let's play a game. - Oksana Safronova.mp4 |
59.91Мб |
Live-patching weak crypto with OpenSSL engines (English version) - Ignat Korchaginen.en.transcribed.srt |
42.80Кб |
Live-patching weak crypto with OpenSSL engines (English version) - Ignat Korchaginen.mp4 |
32.62Мб |
Live-patching weak crypto with OpenSSL engines (Ukrainian version) - Ignat Korchagin.mp4 |
34.46Мб |
MacOS Security threats (English version) - Vitaliy Mechytashvili.en.transcribed.srt |
36.17Кб |
MacOS Security threats (English version) - Vitaliy Mechytashvili.mp4 |
29.73Мб |
MacOS Security threats (Ukrainian version) - Vitaliy Mechytashvili.mp4 |
29.46Мб |
Mobile Anti-Virus apps exposed (English version) - Stephanie Vanroelen.en.transcribed.srt |
44.20Кб |
Mobile Anti-Virus apps exposed (English version) - Stephanie Vanroelen.mp4 |
24.96Мб |
Mobile Anti-Virus apps exposed (Ukrainian version) - Stephanie Vanroelen.mp4 |
25.81Мб |
NoNameCon logo.jpg |
25.14Кб |
NoNameCon logo 2.jpg |
4.37Кб |
NoNameCon thank you.txt |
969б |
Official Press-conference NoNameCon 2018, Kyiv.mp4 |
57.06Мб |
Passing Security By - Serhii Korolenko.mp4 |
51.81Мб |
Paste Wars fighting for copypaste freedom - Ignat Korchagin.mp4 |
57.32Мб |
PEASS - Privilege Escalation Awesome Scripts Suite - Carlos Polop.mp4 |
58.78Мб |
Post-quantum security should you care - Jean-Philippe Aumasson.mp4 |
67.45Мб |
Professional Debates - Професійні дебати.mp4 |
63.84Мб |
Remote Forensics of a Linux Server Without Physical Access - Serhii Aleynikov.mp4 |
33.83Мб |
Search over encrypted records from academic dreams to production-ready tool (Eng) - Artem Storozhuk.mp4 |
13.52Мб |
Search over encrypted records from academic dreams to production-ready tool (Ukr) - Artem Storozhuk.mp4 |
35.10Мб |
Special exclusive interview with Bruce Schneier.mp4 |
60.51Мб |
Special Interview with Daniel Miessler.eng.srt |
110.04Кб |
Special Interview with Daniel Miessler.mp4 |
59.10Мб |
Special Keynote Eva Galperin.eng.srt |
144.14Кб |
Special Keynote Eva Galperin.mp4 |
133.39Мб |
State Cybersecurity vs. Cybersecurity of the State. #FRD Lessons (Eng version) - Kostiantyn Korsun.mp4 |
51.53Мб |
State Cybersecurity vs. Cybersecurity of the State. #FRD Lessons (Ukr version) - Kostiantyn Korsun.mp4 |
52.23Мб |
Technical Insights for the SOC as Technical Centre for IT Security Defense - Bert Heitink EN.en.transcribed.srt |
145.04Кб |
Technical Insights for the SOC as Technical Centre for IT Security Defense - Bert Heitink EN.mp4 |
52.12Мб |
Technical Insights for the SOC as Technical Centre for IT Security Defense - Bert Heitink UKR.mp4 |
52.29Мб |
The country of unlearned lessons - Kostiantyn Korsun.eng.srt |
43.53Кб |
The country of unlearned lessons - Kostiantyn Korsun.mp4 |
39.94Мб |
Threat Intelligence particularities world-wide. Real life use-cases - Oleg Bondarenko.mp4 |
64.51Мб |
Tips and tricks for the efficient white-box security audit - Igor Andriushchenko EN.mp4 |
31.17Мб |
Tips and tricks for the efficient white-box security audit - Igor Andriushchenko UKR translation.mp4 |
31.62Мб |
Using cloud implementations to hack IoT - Alex Jay Balan.eng.srt |
113.21Кб |
Using cloud implementations to hack IoT - Alex Jay Balan.mp4 |
63.49Мб |
Volodymyr Lysenko, PhD - University of Arizona.mp4 |
8.05Мб |
What is autumn like in prison camps (English version) - Pavlo Zhavoronkov.mp4 |
50.80Мб |
What is autumn like in prison camps (Ukrainian version) - Pavlo Zhavoronkov.mp4 |
49.88Мб |
Why can't developers make it secure - Julia Potapenko.eng.srt |
67.23Кб |
Why can't developers make it secure - Julia Potapenko.mp4 |
42.87Мб |
Why the Options Pattern is Great for Security. - Dima Kotik.eng.srt |
76.51Кб |
Why the Options Pattern is Great for Security. - Dima Kotik.mp4 |
46.69Мб |
Ігор Мальченюк - доповідач CyberKids.mp4 |
8.82Мб |
Антон Павлушко - журналіст, InformNapalm.mp4 |
6.05Мб |
Артем Карпинський - Співзасновник NoNameCon.mp4 |
5.79Мб |
Валентин Петров - Керівник служби з питань інформаційної безпеки РНБОУ.mp4 |
5.32Мб |
Володимир Стиран - співзасновник NoNameCon.mp4 |
6.85Мб |
Де моя стратегія, чумба - Костянтин Корсун.mp4 |
96.21Мб |
Захист вiд ботiв без шкоди для бiзнесу - Igor Bondarenko.mp4 |
47.74Мб |
Костянтин Корсун - Co-founder & CEO, Berezha Security.mp4 |
24.51Мб |
Сергій Демедюк - Начальник Департаменту кіберполіції Національної поліції України.mp4 |
5.60Мб |