Общая информация
Название GrrCON
Тип
Размер 12.50Гб
Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[Least] resistance is [anything but] futile Tim Maletic.mp4 46.60Мб
[Least] resistance is [anything but] futile Tim Maletic.srt 46.95Кб
#TrevorForget with Lintile.mp4 13.40Мб
2018 SIEM Trends What is my Mean Time to Value Bill Lampe.eng.srt 115.69Кб
2018 SIEM Trends What is my Mean Time to Value Bill Lampe.mp4 50.00Мб
3rd Party Data Burns Aaron Finux Finnon.mp4 40.45Мб
Abnormal Behavior Detection in Large Environments Dave Kennedy.mp4 48.85Мб
Abnormal Behavior Detection in Large Environments Dave Kennedy.srt 176.11Кб
Act Three The Evolution of Privacy Finux.mp4 39.25Мб
Act Three The Evolution of Privacy Finux.srt 104.82Кб
A Day in the Life of a Security Operations Center What do you get when you partner.eng.srt 44.20Кб
A Day in the Life of a Security Operations Center What do you get when you partner.mp4 20.50Мб
Adding 10 Security to Your Scrum Agile Environment tehEx0dus.mp4 19.48Мб
Adding 10 Security to Your Scrum Agile Environment tehEx0dus.srt 24.56Кб
Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.mp4 61.97Мб
Aditya Sood & Dr. Richard Enbody - The Realm of 3rd Generation Botnet Attacks.srt 71.50Кб
Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.eng.srt 121.60Кб
Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint Jared Phip.mp4 43.09Мб
Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.mp4 37.92Мб
Advanced Breaches of 2013 vs Behavioral Detection Charles Herring.srt 74.40Кб
A GRReat New Way of Thinking about Innovating for Cyber Defense and even Cyber Offense Ernest.mp4 64.84Мб
Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).mp4 21.53Мб
Alexander Chaveriat - Certifiable A.S.S. (Application Security Specialist).srt 38.09Кб
Alexander Chaveriat - I Think Therefore I PwN.mp4 49.02Мб
Alexander Chaveriat - I Think Therefore I PwN.srt 37.64Кб
AlgoSec.mp4 22.27Мб
AlgoSec.srt 22.67Кб
Alignment of business and IT Security Shane Harsch.mp4 28.87Мб
Alignment of business and IT Security Shane Harsch.srt 96.79Кб
Amol Sarwate - SCADA Security.mp4 54.52Мб
Amol Sarwate - SCADA Security.srt 76.43Кб
Analyzing Multi Dimensional Malware Dataset Ankur Tyagi.mp4 40.19Мб
Analyzing Pwned Passwords with Apache Spark Kelley Robinson.eng.srt 123.66Кб
Analyzing Pwned Passwords with Apache Spark Kelley Robinson.mp4 38.90Мб
An Attack Pathway Into Your Organization Reducing risk without reducing operational efficiency.mp4 54.39Мб
and bad mistakes Ive made a few Jayson Street.mp4 41.71Мб
and bad mistakes Ive made a few Jayson Street.srt 80.84Кб
and bad mistakes Ive made a few Jayson Street (only first 30 min or so).mp4 41.71Мб
and bad mistakes Ive made a few Jayson Street (only first 30 min or so).srt 80.84Кб
An Employee their Laptop and a Hacker walk into a Bar Shannon Fritz.mp4 59.56Мб
An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.eng.srt 20.19Кб
An Inconvenient Truth Evading the Ransomware Protection in Windows 10 Soya Aoy.mp4 26.35Мб
Application Pen Testing Chris Pfoutz.mp4 38.34Мб
Application Recon The Lost Art Tony Miller.mp4 33.59Мб
Application Recon The Lost Art Tony Miller.srt 62.58Кб
A Reporters Look at Open Source Intelligence Hilary Louise.mp4 48.50Мб
Are you a janitor or a cleaner John ageekspeeda Stauffacher Matthew Mattrix Hoy.mp4 35.39Мб
Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.mp4 53.82Мб
Arron F1nux Finnon - Passive IPS Reconnaissance and Enumeration.srt 67.31Кб
A Theme of Fear Hacking the Paradigm Catherine Ullman.eng.srt 87.61Кб
A Theme of Fear Hacking the Paradigm Catherine Ullman.mp4 59.60Мб
atlas of d00m - TBA.mp4 51.17Мб
atlas of d00m - TBA.srt 14.60Кб
atlas of doom- GHz or Bust.mp4 59.90Мб
atlas of doom- GHz or Bust.srt 71.59Кб
Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.mp4 52.67Мб
Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years.srt 167.76Кб
Automating Phishing Analysis Kyle Eaton.eng.srt 32.62Кб
Automating Phishing Analysis Kyle Eaton.mp4 15.54Мб
Automation and Open Source Turning the Tide on Attackers John Grigg.eng.srt 137.98Кб
Automation and Open Source Turning the Tide on Attackers John Grigg.mp4 52.83Мб
Autonomous Remote Hacking Drones Dr Phil Polstra.mp4 41.93Мб
Backdooring Git John Menerick.mp4 35.39Мб
Backdooring Git John Menerick.srt 43.08Кб
Back to the Future Understanding our future but following the past Kevin Johnson.mp4 43.88Мб
Back to the Future Understanding our future but following the past Kevin Johnson.srt 121.19Кб
Bad Guys Look Just Like You Justin Beard.mp4 19.70Мб
Bad Guys Look Just Like You Justin Beard.srt 48.39Кб
Baselining Behavior Tradecraft through Simulations Dave Kenendy.mp4 49.83Мб
Beautiful Models - J Wolfgang Goerlich.mp4 59.44Мб
Beautiful Models - J Wolfgang Goerlich.srt 30.65Кб
Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.mp4 25.30Мб
Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau.srt 66.23Кб
Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.eng.srt 36.28Кб
Beginners Guide to Mobile Applications Penetration Testing Whitney Phillips.mp4 24.39Мб
Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.mp4 18.21Мб
Bharat Jogi - Reversing Patches for Exploit Creation, PenTesting, or Just Fun.srt 30.16Кб
Bigger Boys Made Us Mike Kemp.mp4 57.83Мб
Big Plane Little Plane How common aviation attacks affect airlines and general avia.eng.srt 70.98Кб
Big Plane Little Plane How common aviation attacks affect airlines and general avia.mp4 55.94Мб
Binary Ninja Jared Demott.mp4 38.95Мб
Binary Ninja Jared Demott.srt 125.73Кб
BioHacking Becoming the Best Me I Can Be Leonard.mp4 31.83Мб
Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.eng.srt 57.87Кб
Black Hats White Collars Bitcoin Dark Nets and Insider Trading Ken Westin.mp4 32.41Мб
Blinkie Lights Network Monitoring with Arduino - Steve Ocepek.mp4 45.02Мб
Blinkie Lights Network Monitoring with Arduino - Steve Ocepek.srt 46.91Кб
Board Breaking Challenge.mp4 21.75Мб
bonus talk Ryan Wisniewski.eng.srt 47.30Кб
bonus talk Ryan Wisniewski.mp4 25.61Мб
Bounty Hunters J Wolfgang Goerlich.eng.srt 135.36Кб
Bounty Hunters J Wolfgang Goerlich.mp4 43.11Мб
Breach Stains Matt The Streaker Johnson.mp4 36.97Мб
Breaking Android Apps for Fun and Profit Bill Sempf.mp4 35.36Мб
Breaking Android Apps for Fun and Profit Bill Sempf.srt 127.49Кб
Breaking in Bad Im The One Who Doesnt Knock jayson Street.mp4 49.24Мб
Breaking in Bad Im The One Who Doesnt Knock jayson Street.srt 72.56Кб
Breaking NBAD & UEBA Detection by Charles Herring.eng.srt 58.21Кб
Breaking NBAD & UEBA Detection by Charles Herring.mp4 29.30Мб
Building a Usable Mobile Data Protection Strategy David Heal Schwartzberg.mp4 52.24Мб
Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.mp4 19.33Мб
Bumper Targeted Attacks and the Privileged Pivot Mark Nafe.srt 28.19Кб
Burning the Enterprise with BYOD - Georgia Weidman.mp4 78.45Мб
But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.mp4 51.48Мб
But Can They Hack ExaminingTechnological Proficiency in the US Far Right Tom.srt 56.90Кб
Can you patch a cloud Scott Thomas.srt 52.53Кб
Career Risk Management 10 tips to keep you employed Chris Burrows.eng.srt 123.17Кб
Career Risk Management 10 tips to keep you employed Chris Burrows.mp4 48.62Мб
Change is Simply an Act of Survival Predicting the future while shackled to the past Bil Har.mp4 32.96Мб
Characteristics of a Highly-Effective Information Security Executive - Bob West.mp4 40.29Мб
Characteristics of a Highly-Effective Information Security Executive - Bob West.srt 47.66Кб
Chris Roberts - By Land, By Sea, By Air.mp4 60.85Мб
Chris Roberts - By Land, By Sea, By Air.srt 81.24Кб
Chris Roberts - Planes, Trains and Automobiles.mp4 28.18Мб
Chris Roberts - Planes, Trains and Automobiles.srt 35.79Кб
Chris Silvers - Go with the Flow - Strategies for Successful Social Engineering.mp4 52.44Мб
Chris Silvers - Go with the Flow - Strategies for Successful Social Engineering.srt 76.28Кб
Christopher Elisan - Threat Ecosystem.mp4 45.51Мб
Christopher Elisan - Threat Ecosystem.srt 61.07Кб
Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.eng.srt 37.93Кб
Cloudy with a chance of SecOps Ricardo Lafosse Matthew Speakman.mp4 24.59Мб
Cons Careers SciaticNerd.eng.srt 93.74Кб
Cons Careers SciaticNerd.mp4 47.39Мб
Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.mp4 38.77Мб
Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman.srt 143.80Кб
Critical Incident Surviving my first layoff by applying BCPDRP Principles Tom Mead.mp4 33.23Мб
Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.mp4 20.84Мб
Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey.srt 56.10Кб
Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.eng.srt 72.35Кб
Crypto Gone Rogue A Tale of Ransomware Key Management and the CryptoAPI Pransh.mp4 26.49Мб
Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.mp4 47.18Мб
Cyber 101 Upstaring your career in a leading industry Johnny Deutsch.srt 68.54Кб
CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.eng.srt 107.09Кб
CyberCrime Trends of 2019 A Look Into Cybercrime Nation State and Ransomware Moneti.mp4 59.46Мб
Cyber Cyber Cyber Using the killchain to accomplish something Amanda Berlin.mp4 47.41Мб
Cyber Security Incidents Red Blue Team Unc13 Fuck3r.mp4 18.01Мб
Cyber Vigilantes - Rob Rachwald.mp4 28.23Мб
Cyber Vigilantes - Rob Rachwald.srt 26.63Кб
dam Ely- Hack The Cloud.mp4 74.42Мб
dam Ely- Hack The Cloud.srt 95.33Кб
Dance Fancybear Dance a study in macOS Cat Self.eng.srt 86.42Кб
Dance Fancybear Dance a study in macOS Cat Self.mp4 45.26Мб
Daniel Gregory - Securing & Managing Mobile Devices in the workplace.mp4 28.72Мб
Daniel Gregory - Securing & Managing Mobile Devices in the workplace.srt 48.28Кб
Daniel Lohrman - Why Security Professionals Fail.mp4 50.73Мб
Daniel Lohrman - Why Security Professionals Fail.srt 73.40Кб
Data Access Rights Exploits under New Privacy Laws Amber Welch.eng.srt 50.42Кб
Data Access Rights Exploits under New Privacy Laws Amber Welch.mp4 28.12Мб
Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.eng.srt 150.41Кб
Data Data Everywhere but No One Stops to Think Scott Thomas Carl Hertz Robert.mp4 53.99Мб
Data Security How to avoid an embarrassing breach Matt mattrix Hoy.eng.srt 59.86Кб
Data Security How to avoid an embarrassing breach Matt mattrix Hoy.mp4 39.16Мб
David HealWHans Schwartzberg - iOS Hash Cracking.mp4 59.32Мб
David HealWHans Schwartzberg - iOS Hash Cracking.srt 63.04Кб
David Schwartzberg- Zeus C&C for Tech Support.mp4 50.67Мб
David Schwartzberg- Zeus C&C for Tech Support.srt 8.90Кб
Dear Pentesters, Get Bent - Duncan Manuts.mp4 35.95Мб
Dear Pentesters, Get Bent - Duncan Manuts.srt 44.21Кб
Deepfakes If anything can be real then nothing is real April C Wright.eng.srt 86.88Кб
Deepfakes If anything can be real then nothing is real April C Wright.mp4 51.11Мб
Defcon CTF-Why even Losers Always Win - Jarod DeMott.mp4 26.21Мб
Defcon CTF-Why even Losers Always Win - Jarod DeMott.srt 23.15Кб
Defending The De funded Keith Wilson.mp4 30.59Мб
Departing Employees Departing Data Todd Thorsen.eng.srt 32.09Кб
Departing Employees Departing Data Todd Thorsen.mp4 20.28Мб
Designing a Cloud Security Blueprint Sarah Elie.eng.srt 87.91Кб
Designing a Cloud Security Blueprint Sarah Elie.mp4 37.57Мб
Destroy Everything Tom Somerville.mp4 22.38Мб
Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.eng.srt 35.63Кб
Devaluing Cloud Breaches while Gaining Safe Harbor Eric Wolff.mp4 25.15Мб
Dispelling Cloud Security Hype - Johnathan Norman.mp4 28.01Мб
Dispelling Cloud Security Hype - Johnathan Norman.srt 29.97Кб
Dissecting Destructive Malware and Recovering from Catastrophe Bryan York.mp4 30.07Мб
Dragnet Your Social Engineering Sidekick Truman Kain.eng.srt 54.01Кб
Dragnet Your Social Engineering Sidekick Truman Kain.mp4 18.60Мб
Duncan Manuts - Certify Manuts.mp4 61.21Мб
Duncan Manuts - Certify Manuts.srt 95.14Кб
Embedding Security in Embedded Systems Dr Jared DeMott.mp4 50.62Мб
emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.eng.srt 103.19Кб
emulacra and emulation an intro to emulating binary code with Vivisect Atlas of D0.mp4 67.91Мб
Encryption Mobility Cloud Oh My Bill Harmer.mp4 27.98Мб
Encryption Mobility Cloud Oh My Bill Harmer.srt 87.53Кб
Eye on the Prize a Proposal for Legalizing Hacking Back Adam Hogan.mp4 58.79Мб
Fighting the Enemy Within Matt Crowe.mp4 16.82Мб
Fighting the Enemy Within Matt Crowe.srt 74.40Кб
Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.mp4 22.41Мб
Findings Needles in a Needlestack Enterprise Mass Triage Keven Murphy.srt 28.29Кб
Finuxs Historical Tour Of IDS Evasion Insertions and Other Odditie Arron Finux Finnon.mp4 56.54Мб
Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.mp4 10.21Мб
Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob.srt 45.21Кб
Footprints of This Years Top Attack Vectors Kerstyn Clover.mp4 47.57Мб
From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.eng.srt 99.89Кб
From Idea to Badge Getting Started Finished with badge making Dave Schwartzberg.mp4 52.82Мб
Full Douchesclosure Duncan Manuts.mp4 41.15Мб
Gary McCully & David Sopata - Hacking PCI Requ.mp4 49.43Мб
Gary McCully & David Sopata - Hacking PCI Requ.srt 67.11Кб
Getting to the Root of Advanced Threats Before Impact Josh Fazio.mp4 14.26Мб
Getting to the Root of Advanced Threats Before Impact Josh Fazio.srt 43.05Кб
Good Cyber Hygiene and using analytics to drive the need for it on Print David Rose.mp4 27.51Мб
Grand Rapids next to GrrCON, high water.mp4 1.02Мб
Grrcon 2014 closing.mp4 22.44Мб
GrrCON Logo.png 294.03Кб
GrrCon TAP.mp4 13.71Мб
GrrCON thank you.txt 1.55Кб
Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.eng.srt 138.54Кб
Guaranteed Failure Awareness The Greatest Cyber Insanity Joshua Naga Crumbaugh.mp4 51.68Мб
Guarding Lunch J Wolfgang Goerlich.mp4 45.55Мб
Guarding Lunch J Wolfgang Goerlich.srt 162.43Кб
Hacker History - This Stuff Matters - Duncan Manuts.mp4 47.41Мб
Hackers Are People Too Infosystir.mp4 31.27Мб
Hacker Tools Compliments of Microsoft David Fletcher Sally Vandeven.eng.srt 102.90Кб
Hacking Giveaways, Contests, and Polls for Fun and Profit - Matthew Bryant.mp4 64.47Мб
Hacking Giveaways, Contests, and Polls for Fun and Profit - Matthew Bryant.srt 42.24Кб
Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.eng.srt 47.74Кб
Hacking the Boardroom How to communicate effectively to get your budget Ryan Wisnie.mp4 31.56Мб
Hacking the Next Generation HealWHans.mp4 30.44Мб
Hacking the Next Generation HealWHans.srt 56.60Кб
Hacking Trust Steven Fox.mp4 25.40Мб
Hacking Trust Steven Fox.srt 11.78Кб
Hack the Hustle Career Strategies For Information Security Professionals Eve Adams.mp4 38.30Мб
Harness the Force for Better Penetration Testing Patrick Fussell.mp4 13.17Мб
Harness the Force for Better Penetration Testing Patrick Fussell.srt 24.67Кб
Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.eng.srt 77.61Кб
Hashes Smothered and Scattered Modern Password Cracking as a Methodology Lee Wangen.mp4 67.76Мб
Hello GrrCON.mp4 3.42Мб
Hidden Treasure Detecting Intrusions with ETW Zac Brown.mp4 48.81Мб
Hillbilly Storytime Pentest Fails Adam Compton.eng.srt 53.71Кб
Hillbilly Storytime Pentest Fails Adam Compton.mp4 36.49Мб
Home Grown Linux Phil Polstra.mp4 29.19Мб
Honeypots for Active Defense Greg Foss.mp4 46.92Мб
Honeypots for Active Defense Greg Foss.srt 74.57Кб
Hook, Line and Syncer - A Liar for Hire s Ultimate Tackle Box Chris Silvers & Pat McCoy.mp4 45.42Мб
Host Hunting on a Budget cyberGoatPsyOps.eng.srt 46.62Кб
Host Hunting on a Budget cyberGoatPsyOps.mp4 26.32Мб
How asteroids falling from the sky improve security - J Wolfgang Goerlich.mp4 36.47Мб
How asteroids falling from the sky improve security - J Wolfgang Goerlich.srt 34.63Кб
How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.mp4 21.31Мб
How compliance doesnt have to suckat least totally Robert Carson Bradley Stine.srt 31.97Кб
How do you POC Are you really testing a product Ken Donze.mp4 20.43Мб
How Do You Secure What You don't Control Dimitri Vlachos.mp4 18.19Мб
How Do You Secure What You don't Control Dimitri Vlachos.srt 64.72Кб
How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.eng.srt 48.34Кб
How Hackers Evade Your AI enabled Endpoint Detection Tools Dan Allen.mp4 30.57Мб
How I Got Network Creds Without Even Asking A Social Engineering Case Study J.mp4 19.02Мб
How I Got Network Creds Without Even Asking A Social Engineering Case Study J.srt 26.03Кб
How Nathan Crashed and Burned Nathan Dragun.eng.srt 52.85Кб
How Nathan Crashed and Burned Nathan Dragun.mp4 21.73Мб
How this 20 Year Old Changed the Security Industry James ONeill.mp4 18.38Мб
How to budget IDSs Brian Arcane Heitzman.mp4 20.88Мб
How to Conduct a Product Security Test And How it Fits Into the Larger Security St.eng.srt 119.85Кб
How to Conduct a Product Security Test And How it Fits Into the Larger Security St.mp4 33.06Мб
How to Implement Crypto Poorly Sean Cassidy.mp4 24.68Мб
How to Implement Crypto Poorly Sean Cassidy.srt 92.14Кб
How to Make a Honeypot Stickier SSH Jose Hernandez.eng.srt 92.01Кб
How to Make a Honeypot Stickier SSH Jose Hernandez.mp4 51.72Мб
How to rob a bank over the phone Joshua Naga Crumbaugh.eng.srt 119.38Кб
How to rob a bank over the phone Joshua Naga Crumbaugh.mp4 63.63Мб
Hunting Hackers Tim Crothers.mp4 32.98Мб
Hunting Hackers Tim Crothers.srt 49.61Кб
Infosec State of Affairs Too much Kim Kardashian not enough Malcolm Gladwel Jim Wojno Dan Ki.mp4 49.51Мб
Infrastructure Based Security Chris Barnes.mp4 47.58Мб
InSpec Compliance as Code Kent picat Gruber.eng.srt 117.11Кб
InSpec Compliance as Code Kent picat Gruber.mp4 37.92Мб
Intelligence Driven Security Shane Harsch.mp4 31.70Мб
Intelligence Driven Security Shane Harsch.srt 54.25Кб
Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.mp4 41.14Мб
Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong.srt 114.07Кб
I PWN thee I PWN thee not Jayson Street.eng.srt 86.94Кб
I PWN thee I PWN thee not Jayson Street.mp4 57.49Мб
Is it EVIL Chaoticflaws.mp4 33.25Мб
Is it EVIL Chaoticflaws.srt 45.03Кб
It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.mp4 48.68Мб
It s Vulnerable... Now What Three Tales of Woe and Remediation - Mark Stanislav.srt 70.82Кб
Ive got a Pocket Bone to pick with you Dr Phil Postra.mp4 44.82Мб
Jack Wink - XSS Session Fixation.mp4 16.24Мб
Jack Wink - XSS Session Fixation.srt 24.98Кб
Jared DeMott - Stop ROP and Roll.mp4 75.62Мб
Jimmy Shah - Advances in Android Malware.mp4 62.37Мб
Jimmy Shah - Advances in Android Malware.srt 82.70Кб
Jim Rennie - Law of Internet Scanning.mp4 56.67Мб
Jim Rennie - Law of Internet Scanning.srt 82.00Кб
Jonathan Deutsch - Facebook and You.mp4 35.49Мб
Jonathan Deutsch - Facebook and You.srt 44.79Кб
J Wolfgang Goerlich- Punch Counter Punch with.mp4 57.24Мб
J Wolfgang Goerlich- Punch Counter Punch with.srt 57.48Кб
Kernel Fun - Jon Oberheide.mp4 42.47Мб
Kernel Fun - Jon Oberheide.srt 27.21Кб
Keynote Amanda Infosystir Berlin.mp4 53.00Мб
Keynote Dave Kennedy.eng.srt 152.05Кб
Keynote Dave Kennedy.mp4 49.36Мб
Keynote Rachel Soul Crusher86 G.eng.srt 86.02Кб
Keynote Rachel Soul Crusher86 G.mp4 42.90Мб
Larry Holland & Hal Charnley - The Killer is Already in Your House.mp4 21.34Мб
Larry Holland & Hal Charnley - The Killer is Already in Your House.srt 33.60Кб
Learning from InfoSec Fails - Derek Milroy.mp4 57.43Мб
Legal Perspectives on Data Breaches - Carol Romej.mp4 27.91Мб
Legal Perspectives on Data Breaches - Carol Romej.srt 31.41Кб
LEVIATHAN Command and Control Communications on Planet Earth Kevin Thompson.mp4 21.43Мб
Life Death the Nematodes Long live Cyber Resilience Chad Calease.eng.srt 128.83Кб
Life Death the Nematodes Long live Cyber Resilience Chad Calease.mp4 68.23Мб
Louise Popyck - Simplifying Data Center Security and Compliance.mp4 42.69Мб
Louise Popyck - Simplifying Data Center Security and Compliance.srt 23.27Кб
Machine Duping Pwning Deep Learning Systems Clarence Chio.mp4 51.97Мб
Machine Duping Pwning Deep Learning Systems Clarence Chio.srt 124.09Кб
Magnetic Stripes 101 Tyler Keeton.mp4 15.38Мб
Magnetic Stripes 101 Tyler Keeton.srt 36.65Кб
Make STEHM Great Again David HealWHans Schwartzberg.mp4 31.40Мб
Make STEHM Great Again David HealWHans Schwartzberg.srt 117.25Кб
Malicious Cryptomining is Exploding Are you at risk John Fatten.eng.srt 63.92Кб
Malicious Cryptomining is Exploding Are you at risk John Fatten.mp4 55.31Мб
Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.eng.srt 122.53Кб
Malware Mitigation Sample Detonation Intelligence Automation Make Your Binaries Wo.mp4 36.43Мб
Mark Ehr - Security Intellligence.mp4 53.35Мб
Mark Ehr - Security Intellligence.srt 87.01Кб
Mark Stanislav - Core Linux Security - 0-Day Isn t Everything.mp4 44.42Мб
Matt Johnson - Powershell - Be a Cool Blue Kid.mp4 44.96Мб
Matt Johnson - Powershell - Be a Cool Blue Kid.srt 49.61Кб
Mike Kemp - Everything Old is New Again.mp4 75.84Мб
Mike Kemp - Everything Old is New Again.srt 106.64Кб
Mike Kemp - When I grow up I want to be a cyber terrorist.mp4 46.40Мб
Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.eng.srt 33.37Кб
Million Dollar Malware Using the Viper Framework to Investigate and Track Ryuks Suc.mp4 18.50Мб
Mobile App Moolah - Profit taking with Mobile Malware - Jimmy Shah.mp4 39.67Мб
Mobile App Moolah - Profit taking with Mobile Malware - Jimmy Shah.srt 20.45Кб
Money Fame Power Build your success as a security professional Nathan Dragun.mp4 36.27Мб
Money Fame Power Build your success as a security professional Nathan Dragun.srt 149.29Кб
More Tales from the CryptAnalyst Jeff Man.eng.srt 139.31Кб
More Tales from the CryptAnalyst Jeff Man.mp4 57.23Мб
MSSPs are greatand other lies I tell myself Scott Thomas.eng.srt 99.61Кб
MSSPs are greatand other lies I tell myself Scott Thomas.mp4 42.94Мб
My First year in Application Security Whitney Phillips.eng.srt 52.46Кб
My First year in Application Security Whitney Phillips.mp4 30.23Мб
National Guard for Cyber How about a Volunteer Cyber Department Ray Davidson.mp4 28.53Мб
Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.eng.srt 73.46Кб
Network exploitation of IoT ecosystems Fotios ithilgore Chantzis.mp4 58.11Мб
Nick Percoco - Mobile Attacks - What will the future bring.mp4 50.12Мб
Nick Percoco - Mobile Attacks - What will the future bring.srt 89.43Кб
No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.mp4 36.99Мб
No One Cares About Your Data Breach Except You And Why Should They Joel Cardel.srt 60.93Кб
OAuth20 a Itas the Implementation Stupid Tony Miller.mp4 48.00Мб
On being an Eeyore in Infosec Stefan Edwards.mp4 31.56Мб
On being an Eeyore in Infosec Stefan Edwards.srt 138.82Кб
Oops Was that your pacemaker Charles Parker II.mp4 29.58Мб
Pacu Attack and Post Exploitation in AWS Spencer Gietzen.eng.srt 56.87Кб
Pacu Attack and Post Exploitation in AWS Spencer Gietzen.mp4 21.68Мб
Panel Discussion - Cloud Data Security and Privacy - How to leverage the Cloud safely.mp4 44.39Мб
Panel Discussion - Cloud Data Security and Privacy - How to leverage the Cloud safely.srt 59.85Кб
Path Well Traveled Common Mistakes with SIEM Nick Jacob.mp4 31.40Мб
Path Well Traveled Common Mistakes with SIEM Nick Jacob.srt 45.39Кб
PCI and Crypto The Good The Bad and The Frankly Ugly Robert Formera.mp4 29.29Мб
Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.mp4 22.70Мб
Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F.srt 57.93Кб
Pen Test War Stories Why my job is so easy and how you can make it harder Aaron Herndon.mp4 44.96Мб
Philip Polstra - Battery Powered Pentesting and Forensics.mp4 52.54Мб
Philip Polstra - Battery Powered Pentesting and Forensics.srt 68.85Кб
Phish your employees for fun Kristoffer Marshall.mp4 47.99Мб
Phish your employees for fun Kristoffer Marshall.srt 109.89Кб
Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.mp4 41.71Мб
Phones and Privacy for Consumers Matt Hoy mattrix and David Khudaverdyan delta.srt 52.37Кб
Physicals Badges and why it matters Alex Fernandez Gatti.eng.srt 73.75Кб
Physicals Badges and why it matters Alex Fernandez Gatti.mp4 33.16Мб
Piercing the Air Gap Network Steganography for Everyone John Ventura.mp4 31.74Мб
Piercing the Air Gap Network Steganography for Everyone John Ventura.srt 105.31Кб
Poking The Bear Mike Kemp.mp4 60.88Мб
Population Control Through The Advances In Technology Chris Roberts part 1.mp4 45.14Мб
Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.mp4 35.18Мб
Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin.srt 135.32Кб
ProbeSpy Tracking your past predicting your future stumblebot.mp4 26.40Мб
Process The Salvation of Incident Response Charles Herring.mp4 16.28Мб
Process The Salvation of Incident Response Charles Herring.srt 26.75Кб
Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.mp4 33.63Мб
Proof That Windows Computer Forensics is Sexy Kyle Chaoticflaws Andrus.srt 51.63Кб
PSD2 SCA WTF Kelley Robinson.eng.srt 49.80Кб
PSD2 SCA WTF Kelley Robinson.mp4 18.73Мб
Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.mp4 46.98Мб
Punch and Counter punch Part Deux Web Applications J Wolfgang Goerlich NerdyBeardo.srt 36.90Кб
Pwnage from the Skies - Philip Polstra.mp4 54.64Мб
Pwnage from the Skies - Philip Polstra.srt 31.05Кб
QA on our industry and other things that are top of mind Chris Roberts.eng.srt 82.06Кб
QA on our industry and other things that are top of mind Chris Roberts.mp4 58.66Мб
Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.mp4 50.54Мб
Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra.srt 106.42Кб
Rafal Los- House of Cards.mp4 49.93Мб
Rafal Los- House of Cards.srt 75.87Кб
Raymond Lily - OSINT Footprinting.mp4 55.14Мб
Raymond Lily - OSINT Footprinting.srt 66.57Кб
Reality Checking Your AppSec Program Darren Meyer.mp4 15.81Мб
Reality Checking Your AppSec Program Darren Meyer.srt 75.59Кб
Realizing Software Security Maturity The Growing Pains Gains Mark Stanislav Kelby Ludwig.mp4 46.37Мб
Real World Red Teaming spartan.mp4 40.96Мб
Red Teaming Back and Forth 5ever FuzzyNop.mp4 41.20Мб
Red Teaming Back and Forth 5ever FuzzyNop.srt 66.69Кб
Red Team Yourself Thomas Richards.mp4 32.04Мб
Reverse Engineering Malware for N00bs GregB33fJames.eng.srt 91.05Кб
Reverse Engineering Malware for N00bs GregB33fJames.mp4 58.43Мб
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.mp4 42.81Мб
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado.srt 142.12Кб
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).mp4 42.77Мб
Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado (2).srt 141.23Кб
Richard Stiennon - Cyber Defense.mp4 51.21Мб
Richard Stiennon - Cyber Defense.srt 78.17Кб
Robert Rowley - Juice Jacking.mp4 29.97Мб
Robert Rowley - Juice Jacking.srt 43.48Кб
Saving All the Money to Buy All the Booze Learning to Hack All the Things on.eng.srt 97.49Кб
Saving All the Money to Buy All the Booze Learning to Hack All the Things on.mp4 40.52Мб
Scott Thomas - InfoSec Flameout.mp4 14.20Мб
Scott Thomas - InfoSec Flameout.srt 24.83Кб
Secure Dicks Michael Kemp.mp4 40.39Мб
Secure Dicks Michael Kemp.srt 102.82Кб
Securing Todays Enterprise WAN Andy Mansfield.mp4 26.98Мб
Securing Todays Enterprise WAN Andy Mansfield.srt 30.58Кб
Securing Trust Defending Against Next generation Attacks John Muirhead Gould.mp4 27.31Мб
Securing Trust Defending Against Next generation Attacks John Muirhead Gould.srt 70.89Кб
Security Counterknowledge - Mike Kemp.mp4 73.21Мб
Security for the People End User Authentication Security on the Internet Mark Stanislav.mp4 30.47Мб
Security Frameworks What was once old is new again Brian Wrozek.mp4 22.16Мб
Security Frameworks What was once old is new again Brian Wrozek.srt 37.52Кб
Security Guards LOL Brent White Tim Roberts.mp4 46.93Мб
Security Guards LOL Brent White Tim Roberts.srt 156.06Кб
Security Incident Response Derek Milroy.mp4 46.30Мб
Security Incident Response Derek Milroy.srt 80.51Кб
Security On The Cheap Joel Cardella.mp4 42.14Мб
Shell scripting live Linux Forensics Dr Phil Polstra.mp4 35.75Мб
Shell scripting live Linux Forensics Dr Phil Polstra.srt 47.73Кб
Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.mp4 29.37Мб
Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir.srt 31.57Кб
Skills For A Red Teamer Brent White Tim Roberts.mp4 55.61Мб
SmartMeters - Are they a gateway drug - Robert Former.mp4 50.72Мб
SmartMeters - Are they a gateway drug - Robert Former.srt 60.02Кб
SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.eng.srt 152.94Кб
SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelb.mp4 49.87Мб
Software Defined Segmentation Matt Hendrickson.mp4 27.41Мб
Software Security IWR Thomas G13 Richards.mp4 28.03Мб
Software Security IWR Thomas G13 Richards.srt 60.19Кб
So Youve Inherited a Security Department Now What Amanda Berlin.mp4 35.00Мб
So Youve Inherited a Security Department Now What Amanda Berlin.srt 102.52Кб
So You Want to Be a Pentester Absolute0x0.mp4 33.45Мб
So You Want to Be a Pentester Absolute0x0.srt 92.47Кб
Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.mp4 40.35Мб
Spanking the Monkey or how pentesters can do it better Justin Whithead Cheste.srt 47.45Кб
sploit me if u can - atlas 0f d00m.mp4 46.76Мб
sploit me if u can - atlas 0f d00m.srt 34.68Кб
Ssshhhh Atlas of Doom.eng.srt 82.79Кб
Ssshhhh Atlas of Doom.mp4 64.84Мб
Steve F. Fox - From Obstacle to Ally - Repositioning the Security Team.mp4 52.89Мб
still broken after all these years aka utility security for smarties doug nibbelink.mp4 39.94Мб
still broken after all these years aka utility security for smarties doug nibbelink.srt 114.88Кб
Stop attacking your mothers car Charles Parker II.mp4 25.72Мб
Stop attacking your mothers car Charles Parker II.srt 69.99Кб
Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.eng.srt 136.34Кб
Stop Boiling The Ocean How To Succeed With Small Gains Joel Cardella.mp4 57.19Мб
STRATEGIES ON SECURING YOU BANKS ENTERPRISES FROM SOMEONE WHO ROBS BANKS ENTERPRISES FOR A L.mp4 68.58Мб
Subject matter to be determined by the number of federal agents present in th.mp4 44.07Мб
Subject matter to be determined by the number of federal agents present in th.srt 51.17Кб
Surfing and Security Ride the wave Chris Burrows.eng.srt 51.62Кб
Surfing and Security Ride the wave Chris Burrows.mp4 27.26Мб
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.mp4 45.60Мб
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0.srt 136.79Кб
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).mp4 45.60Мб
Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 (2).srt 135.54Кб
Symbolically executing a fuzzy tyrant Lojikil.eng.srt 81.32Кб
Symbolically executing a fuzzy tyrant Lojikil.mp4 43.00Мб
Tales from the Cryptanalyst Jeff Man.mp4 45.28Мб
Tales from the Cryptanalyst Jeff Man.srt 129.68Кб
Tales From The Trenches Practical Information Security Lessons Michael Belton.mp4 42.00Мб
Taylor Ettema - Modern Malware.mp4 43.71Мб
Taylor Ettema - Modern Malware.srt 65.61Кб
The Abyss is Waving BackThe four paths that human evolution is charging down a.eng.srt 135.77Кб
The Abyss is Waving BackThe four paths that human evolution is charging down a.mp4 58.26Мб
The Black Art of Wireless Post Exploitation Gabriel solstice Ryan.mp4 50.30Мб
The Challenge of Natural Security Systems Rockie Brockway.mp4 38.96Мб
The future of Authenticity - Moxie Marlinspike.mp4 46.90Мб
The future of Authenticity - Moxie Marlinspike.srt 43.13Кб
The Future of Cyber Security Anthony Sabaj.mp4 46.91Мб
The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.mp4 38.98Мб
The Hand That Rocks the Cradle Hacking Baby Monitors Mark Stanislav.srt 80.74Кб
The Hitch Hikers Guide to Information Security Kellman Meghu.mp4 49.32Мб
The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.eng.srt 151.51Кб
The Hybrid Analyst How Phishing Created A New Type of Intel Analyst Rachel Giacobo.mp4 50.91Мб
The Importance of IT Asset Visibility Brian Berk.eng.srt 34.66Кб
The Importance of IT Asset Visibility Brian Berk.mp4 21.08Мб
The Importance of Relevant Timely and Qualitative Intelligence Analysis Aamil AK.mp4 20.74Мб
The Past Present Future of Cyber Threats Chris Russell.eng.srt 44.29Кб
The Past Present Future of Cyber Threats Chris Russell.mp4 26.00Мб
The Safety You Think You Have is Only a Masquerade Nathan Dragun.mp4 44.98Мб
The Safety You Think You Have is Only a Masquerade Nathan Dragun.srt 65.63Кб
The Science of Breaking and Entering Alissa dnsprincess.eng.srt 97.42Кб
The Science of Breaking and Entering Alissa dnsprincess.mp4 51.42Мб
The Science of Security Automation - Paul Cochran & Toni Buhrke.mp4 56.55Мб
The Science of Security Automation - Paul Cochran & Toni Buhrke.srt 34.49Кб
The Shuttle Columbia Disaster Lessons That Were Not Learned Joel I love it when they call me.mp4 57.98Мб
The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.eng.srt 41.47Кб
The Spider Economy Emotet Dridex and TrickBot Oh My Adam Hogan.mp4 19.16Мб
The wrong side of history everything that is old is new again Arron Finnon.mp4 62.49Мб
This Is All Your Fault Duncan Manuts.mp4 35.54Мб
This Is All Your Fault Duncan Manuts.srt 46.20Кб
Thomas Richards - Android in the Healthcare Workplace.mp4 23.09Мб
Thomas Richards - Android in the Healthcare Workplace.srt 35.83Кб
Threat Detection Response with Hipara J Brett Cunningham.mp4 32.67Мб
Threat Detection Response with Hipara J Brett Cunningham.srt 59.80Кб
Threat Detection Response with Hipara J Brett Cunningham (2).mp4 32.77Мб
Threat Detection Response with Hipara J Brett Cunningham (2).srt 59.75Кб
Threat Hunting the macOS edition Megan Carney.eng.srt 111.70Кб
Threat Hunting the macOS edition Megan Carney.mp4 46.20Мб
Threat Intelligence Zero to Basics in presentation Chris J.mp4 38.96Мб
Threat Modeling How to actually do it and make it useful Derek Milroy.eng.srt 157.97Кб
Threat Modeling How to actually do it and make it useful Derek Milroy.mp4 56.62Мб
Ticking me off From Threat Intel to Reversing Juan Cortes.mp4 22.43Мб
Ticking me off From Threat Intel to Reversing Juan Cortes.srt 24.28Кб
tlas of d00m subbing for Kevin Johnson- Tactical SecOps.mp4 44.76Мб
Tom Clare - 7 Stages of Advanced Threats.mp4 25.30Мб
Tom Clare - 7 Stages of Advanced Threats.srt 41.67Кб
Topic depends on number of federal agents in audience Atlas of Doom.mp4 64.51Мб
Understanding and Improving the Military Cyber Culture Dariusz Mikulski.mp4 16.40Мб
Understanding and Improving the Military Cyber Culture Dariusz Mikulski.srt 32.05Кб
Understanding how public places introduce additional risks to business Len Noe.eng.srt 83.07Кб
Understanding how public places introduce additional risks to business Len Noe.mp4 56.49Мб
Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.eng.srt 99.42Кб
Using Next Generation Fuzzing Tools Fixing Bugs and Writing Memory Corruption Explo.mp4 49.40Мб
Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.mp4 21.40Мб
Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma.srt 64.73Кб
Vaccinating APKs Milan Gabor.mp4 47.47Мб
Vaccinating APKs Milan Gabor.srt 65.50Кб
vAp0r and the Blooming Onion Justin Whitehead Jim Allee.mp4 41.41Мб
Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.eng.srt 51.53Кб
Varna Custom robust AWS monitoring for cents a day using EQL Adam Ringwood.mp4 20.66Мб
Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.eng.srt 59.74Кб
Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky M.mp4 27.18Мб
Vulnerable By Design a The Backdoor That Came Through the Front Matthew mandatory Bryant.mp4 24.21Мб
Want to Play a Game John DeRyke.eng.srt 41.70Кб
Want to Play a Game John DeRyke.mp4 18.32Мб
Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.mp4 47.65Мб
Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts.srt 128.54Кб
We got it wrong Wolfgang Goerlich.mp4 51.03Мб
Welcome to the Internet of insecure things Chandler Howell.mp4 17.42Мб
Welcome to the Internet of insecure things Chandler Howell.srt 25.51Кб
Welcome to The World of Yesterday Tomorrow Joel Cardella.mp4 25.14Мб
Welcome to The World of Yesterday Tomorrow Joel Cardella.srt 150.70Кб
we we Internet Explorer Does What It Wants Aaron Heikkila.eng.srt 53.63Кб
we we Internet Explorer Does What It Wants Aaron Heikkila.mp4 23.27Мб
What Are We Doing Here Rethinking Security Jeff Man.eng.srt 88.26Кб
What Are We Doing Here Rethinking Security Jeff Man.mp4 47.53Мб
What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.mp4 25.16Мб
What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth.srt 66.71Кб
What is a cloud access broker and do I need one Tom Doane.mp4 18.04Мб
What is a cloud access broker and do I need one Tom Doane.srt 34.24Кб
What s - Context - got to do with it - Arron Finnon.mp4 71.21Мб
What s - Context - got to do with it - Arron Finnon.srt 40.63Кб
Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.mp4 38.21Мб
Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller.srt 118.22Кб
William Tarkington - Psychological Tricks of the Social Engineer.mp4 61.78Мб
William Tarkington - Psychological Tricks of the Social Engineer.srt 77.18Кб
Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.mp4 34.35Мб
Wireless Intrusion Detection Systems with the Raspberry Pi Chris J.srt 38.97Кб
You Got Your SQL Attacks In My Honeypot Andrew Brandt.mp4 26.18Мб
Youre right this talk isnt really about you Jayson E Street.eng.srt 122.32Кб
Youre right this talk isnt really about you Jayson E Street.mp4 47.15Мб
Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.eng.srt 166.04Кб
Zero to Owned in 1 Hour Securing Privilege in Cloud DevOps On Prem Workflows Brand.mp4 58.01Мб
ZeuS - Inside Command and Control Adam Johnson.mp4 43.52Мб
ZeuS - Inside Command and Control Adam Johnson.srt 37.59Кб
ZitMo NoM David HealWHans Schwartzberg.mp4 42.49Мб
Похожие торрент-файлы
3.56Гб
40.83Гб
1.64Гб
1.40Гб
5.39Гб
3.89Гб
9.37Гб
15.01Гб
1.04Гб
23.87Гб
Статистика распространения по странам
США (US) 4
Китай (CN) 1
Россия (RU) 1
Сингапур (SG) 1
Всего 7
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент