1:50:09 A Hands On Introduction To Software Defined Radio - Didier Stevens at 44CON 2017 - Workshop 44CON Information Security Conference 276 views - 7 years ago
1:10:29 From Zero To Hero: Threat Modeling In 90 Minutes by Steven Wierckx 44CON Information Security Conference 8.2K views - 6 years ago
54:02 On Her Majesty’s Secret Service: GRX and a Spy Agency - Presented By Stephen Kho 44CON Information Security Conference 602 views - 6 years ago
1:07:05 Using SmartNICs to Provide Better Data Center Security - Jack Matheson at 44CON 2018 44CON Information Security Conference 137 views - 6 years ago
39:24 Old Dog, New Tricks Forensics With PowerShell Presented By Jared Atkinson 44CON Information Security Conference 197 views - 6 years ago
40:00 Andrew Ruddick - Exploring a New Class of Kernel Exploit Primitive 44CON Information Security Conference 256 views - 2 years ago
58:15 MITMf Bringing Man In The Middle attacks to the 21st century Presented ByMarcello Salvati 44CON Information Security Conference 678 views - 6 years ago
45:37 Not only frogs can hop - Presented by Daniel Compton 44CON Information Security Conference 60 views - 6 years ago
52:14 Exploits with Scratch - Kev Sheldrake at 44CON 2018 44CON Information Security Conference 403 views - 6 years ago
47:16 2016: The Infosec Crossroads - Presented By: Saumil Shah 44CON Information Security Conference 67 views - 6 years ago
1:21:11 Old Dog, New Tricks Forensics With PowerShell Presented By Jared Atkinson Workshop 44CON Information Security Conference 937 views - 6 years ago
56:56 JARVIS never saw it coming - Guy Barnhart-Magen & Ezra Caltum at 44CON 2018 44CON Information Security Conference 327 views - 6 years ago
1:24:16 Indicators of Compromise From malware analysis to eradication Presented By Michael Boman Workshop 44CON Information Security Conference 205 views - 6 years ago
48:15 Trusts you might have missed - Presented by Will Schroeder 44CON Information Security Conference 408 views - 6 years ago
40:49 Manna from Heaven; Improving the state of wireless rogue AP attacks - Presented By Dominic White 44CON Information Security Conference 79 views - 6 years ago
51:26 DDoS mitigation EPIC FAIL collection Presented By Moshe Zioni 44CON Information Security Conference 83 views - 6 years ago
49:46 Indicators of Compromise From malware analysis to eradication Presented By Michael Boman Worksho 44CON Information Security Conference 252 views - 6 years ago
27:33 Ken Munro – Aviation Security 101 44CON Information Security Conference 454 views - 4 years ago
46:40 Penetration Testing Considered Harmful, Haroon Meer - 44CON 2011 44CON Information Security Conference 6K views - 13 years ago
50:15 Get in the Ring0 – Understanding Windows drivers Presented By Graham Sutherland 44CON Information Security Conference 898 views - 6 years ago
42:15 For the Love of Money - Leighanne Galloway & Tim Yunusov at 44CON 2018 44CON Information Security Conference 257 views - 6 years ago
49:09 What the HEC? Security implications of HDMI Ethernet Channel ... - Andy Davis 44CON Information Security Conference 1.2K views - 6 years ago
39:52 Hacking an Internet Enabled Lagomorph - Presented By Alex Chapman 44CON Information Security Conference 117 views - 6 years ago
48:26 When Documents Bite - Presented By Vlad Ovtchinikov 44CON Information Security Conference 352 views - 6 years ago