54:02 On Her Majesty’s Secret Service: GRX and a Spy Agency - Presented By Stephen Kho 44CON Information Security Conference 602 views - 6 years ago
1:10:29 From Zero To Hero: Threat Modeling In 90 Minutes by Steven Wierckx 44CON Information Security Conference 8.2K views - 6 years ago
40:00 Andrew Ruddick - Exploring a New Class of Kernel Exploit Primitive 44CON Information Security Conference 256 views - 2 years ago
1:50:09 A Hands On Introduction To Software Defined Radio - Didier Stevens at 44CON 2017 - Workshop 44CON Information Security Conference 276 views - 7 years ago
1:07:05 Using SmartNICs to Provide Better Data Center Security - Jack Matheson at 44CON 2018 44CON Information Security Conference 137 views - 6 years ago
39:24 Old Dog, New Tricks Forensics With PowerShell Presented By Jared Atkinson 44CON Information Security Conference 197 views - 6 years ago
1:21:11 Old Dog, New Tricks Forensics With PowerShell Presented By Jared Atkinson Workshop 44CON Information Security Conference 937 views - 6 years ago
47:16 2016: The Infosec Crossroads - Presented By: Saumil Shah 44CON Information Security Conference 67 views - 6 years ago
45:37 Not only frogs can hop - Presented by Daniel Compton 44CON Information Security Conference 60 views - 6 years ago
52:14 Exploits with Scratch - Kev Sheldrake at 44CON 2018 44CON Information Security Conference 403 views - 6 years ago
58:15 MITMf Bringing Man In The Middle attacks to the 21st century Presented ByMarcello Salvati 44CON Information Security Conference 678 views - 6 years ago
56:56 JARVIS never saw it coming - Guy Barnhart-Magen & Ezra Caltum at 44CON 2018 44CON Information Security Conference 327 views - 6 years ago
1:24:16 Indicators of Compromise From malware analysis to eradication Presented By Michael Boman Workshop 44CON Information Security Conference 205 views - 6 years ago
56:48 Reverse engineering and exploiting font rasterizers the OpenType saga Presented By Mateusz Jurczy 44CON Information Security Conference 667 views - 6 years ago
46:40 Penetration Testing Considered Harmful, Haroon Meer - 44CON 2011 44CON Information Security Conference 6K views - 13 years ago
50:15 Get in the Ring0 – Understanding Windows drivers Presented By Graham Sutherland 44CON Information Security Conference 898 views - 6 years ago
48:15 Trusts you might have missed - Presented by Will Schroeder 44CON Information Security Conference 408 views - 6 years ago
1:29:31 Introduction To GLIBC Heap Exploitation - Max Kamper 44CON Information Security Conference 19.8K views - 6 years ago
49:46 Indicators of Compromise From malware analysis to eradication Presented By Michael Boman Worksho 44CON Information Security Conference 252 views - 6 years ago