73 тысяч подписчиков
7 тысяч видео
29C3: SCADA Strangelove (EN)
DEFCON 14: Exploit Writing Using Injectable Virtual Machines
OWASP AppSec EU 2013: From the Trenches: Real-World Agile SDLC
OWASP: A deliberately vulnerable set of php scripts that implement the OWASP top 10 7/8
CIC News 12-01-2014: Cyber Security Perspectives 2013 report | Dropbox hit by DDoS hoax
NOTACON 9: Code That Sounds Good: Music Theory and Algorithmic Composition (EN)
CERIAS Security: Secure Network Coding for Wireless Mesh Networks 3/4
DEFCON 15: Securing Linux Applications With AppArmor
OpenSecurityTraining: Introduction To Software Exploits (day 1, part 2)
Brucon 2010: Memoirs of a Data Security Street Fighter 1/5
DEFCON 14: A Hacker's Guide to RFID Spoofing and Jamming
DEFCON 18: This Needs to be Fixed and Other Jokes in Commit Statements 1/3
NOTACON 7: What's a Linux?: Creating & teaching college courses at 24.
DEFCON 18: Mastering the Nmap Scripting Engine 1/3
Putty SSH Connection Tutorial Complete (credits mrbrunohacked)
DEFCON 20: Improving Accuracy and Efficiency in Post Exploitation Metasploit Framework
25c3: The Ultimate Commodore 64 Talk
Man In The Middle (MITM) Attack (ettercap, metasploit, sbd) (made by g0tmi1k)
DEFCON 19: Don't Drop the SOAP: Real World Web Service Testing for Web Hackers (w speaker)
DEFCON 18: pyREtic: In memory Reverse Engineering for Obfuscated Python Bytecode 1/3
SQL injection challenge How to
CERIAS Security: Static source code analysis 3/6
DEFCON 15: The Commercial Malware Industry
CERIAS Security: Database Assurance: Anomaly Detection for Relational Databases 5/5
CERIAS Security: Responding to Anomalous Database Requests 1/4
DEFCON 14: Bridging the Gap Between Static and Dynamic Reversing
CERIAS Security: CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations 4/4
DEFCON 14: 802.1x Networking
DeepSec 2013: Finux's Historical Tour Of IDS Evasion, Insertions, and Other Oddities
DEFCON 14: Hacking Malware: Offense Is the New Defense
DEFCON 16: Living in the RIA World
30C3: The Gospel of IRMA (EN)
DEFCON 20: Rapid Blind SQL Injection Exploitation with BBQSQL
Defcon14 V36 Geers and Eisen IPv6 World Update
OWASP AppSecUSA 2011: Next Generation Web Attacks -- HTML 5, DOM(L3) and XHR(L2)
DEFCON 17: RAID Recovery: Recover your PORN by Sight and Sound
CERIAS Security: Administrative Scope and Role-Based Administration 6/6
30C3: The Year in Crypto (EN)
ShmooCon 2013: Hacking As An Act Of War
Metasploit Class Videos: 2 Metasploit Scanning and Pivoting 1/6
Black Hat USA 2010: Harder Better Faster Stronger: Semi-Auto Vulnerability Research 2/4
24C3: Latest trends in Oracle Security
DEFCON 15: Re-Animating Drives & Advanced Data Recovery
ShmooCon 2013: Hide And Seek, Post-Exploitation Style
30C3: Hardware Attacks, Advanced ARM Exploitation, and Android Hacking (EN)
30C3: Even More Tamagotchis Were Harmed in the Making of this Presentation (EN)
ShmooCon 2014: Vehicle Forensics - The Data Beyond the Dashboard
VEDA DAY 2: Explanation of the CIC News Engine
How do you make your coffee?
ShmooCon 2014: You Don't Have the Evidence
CIC News 11-01-2014: Target Data Breach Affected 70M | Fake AV served to Dailymotion visitors