The Long Con
File List
- The Long Con 2019/Robert Keizer Troy Denton - Reconfigurable computing on Open-source ISAs Research and Applications.mp4 69.0 MB
- The Long Con 2019/Magno Rodrigues - Web hacking 101 burping for fun and maybe some profit.mp4 67.5 MB
- The Long Con 2019/Mike Saunders - Assumed Breach A Better Model for Penetration Testing.mp4 65.7 MB
- The Long Con 2019/Travis Friesen - Evading commercial anti-virus.mp4 60.7 MB
- The Long Con 2018/Mike Saunders - Web App 101 Getting the Lay of the Land.mp4 59.8 MB
- The Long Con 2019/Robert Wagner - Defense on a budget Free Tips & Tricks for Improving Security.mp4 54.7 MB
- The Long Con 2019/Katherine Scrupa - Rad Omens The Good and Evil Uses of WMI, CIM.mp4 49.6 MB
- The Long Con 2018/Eric Gershman - Cracked in 60 Seconds Attacking Mobile Wi-Fi Hotspots.mp4 47.2 MB
- The Long Con 2018/Muz - The Reproducible Builds Project.mp4 45.5 MB
- The Long Con 2019/Saulo Hachem - REST in peace. Exploiting GraphQL.mp4 42.7 MB
- The Long Con 2019/Matthew Southworth - Lessons in Purple Teaming with ATT&CK.mp4 36.6 MB
- The Long Con 2018/Christian Peron - Collecting and Analyzing Security Telemetry at Scale.mp4 29.1 MB
- The Long Con 2018/Matthew Southworth - Stopping Digital Skimmers.mp4 28.4 MB
- The Long Con 2018/Brandon Enright - Blockchain is Bullshit.mp4 27.5 MB
- The Long Con 2018/Rob Keizer - Abusing Video Streaming Services for Storage and Transport.mp4 26.7 MB
- The Long Con 2018/Mike Yallits - Canadian Threat Landscape Are We Really a Target.mp4 25.7 MB
- The Long Con 2019/Sarah LaCroix - Do I Need To Be Worrying About Security Updates For My Car.mp4 23.7 MB
- The Long Con 2018/Theo Baschak - BGP Hijacking Goes Mainstream.mp4 22.9 MB
- The Long Con 2018/Mike Himbeault - Amazon S3 Deep Dive for Security Practitioners.mp4 21.6 MB
- The Long Con 2018/GlitchWitch - Working with Hackers A (Brief) Look at Implementing Vulnerability Reporting Policies.mp4 20.8 MB
- The Long Con 2019/Richard Frovarp - Capturing WPA2 Enterprise credentials with a Pi.mp4 20.6 MB
- The Long Con 2018/Tim Jensen - The Easy Path.mp4 18.5 MB
- The Long Con 2018/Mark Jenkins - Re-Bootstrapping the Free World.mp4 17.8 MB
- The Long Con 2018/Travis Friesen - Beware the Maelstrom The Pitfalls of Password Rotation.mp4 15.4 MB
- The Long Con 2019/Tim Jensen - A New Age of NFS Mining.mp4 12.9 MB
- The Long Con 2018/Magno Logan - DevSecOps Integrating Security in the Development Pipeline.mp4 12.5 MB
- The Long Con 2018/Ron Bowes - Reading Binary Finding and Using an 0-day for a Pentest.mp4 12.4 MB
- The Long Con 2018/Sarah LaCroix - Technological Abuse what is it and how can we stop it.mp4 11.9 MB
- The Long Con 2019/Mike Himbeault - Taking Back the Home Reverse engineering proprietary home automation.mp4 10.5 MB
- The Long Con 2018/Sean Smith - Things the Internet Knows About You.mp4 9.3 MB
- The Long Con 2019/William Kempan - An Overview of Active Directory Active and Defence.mp4 4.9 MB
- The Long Con 2018/Mike Saunders - Web App 101 Getting the Lay of the Land.eng.srt 89.0 KB
- The Long Con 2019/Mike Saunders - Assumed Breach A Better Model for Penetration Testing.eng.srt 88.5 KB
- The Long Con 2019/Robert Wagner - Defense on a budget Free Tips & Tricks for Improving Security.eng.srt 73.6 KB
- The Long Con 2018/Brandon Enright - Blockchain is Bullshit.eng.srt 72.0 KB
- The Long Con 2019/Robert Keizer Troy Denton - Reconfigurable computing on Open-source ISAs Research and Applications.eng.srt 70.1 KB
- The Long Con 2019/Travis Friesen - Evading commercial anti-virus.eng.srt 68.7 KB
- The Long Con 2019/Mike Himbeault - Taking Back the Home Reverse engineering proprietary home automation.eng.srt 62.7 KB
- The Long Con 2019/Magno Rodrigues - Web hacking 101 burping for fun and maybe some profit.eng.srt 52.7 KB
- The Long Con 2018/Tim Jensen - The Easy Path.eng.srt 49.9 KB
- The Long Con 2018/Mike Yallits - Canadian Threat Landscape Are We Really a Target.eng.srt 48.6 KB
- The Long Con 2018/Rob Keizer - Abusing Video Streaming Services for Storage and Transport.eng.srt 47.4 KB
- The Long Con 2018/Travis Friesen - Beware the Maelstrom The Pitfalls of Password Rotation.eng.srt 47.1 KB
- The Long Con 2018/Muz - The Reproducible Builds Project.eng.srt 46.0 KB
- The Long Con 2019/Katherine Scrupa - Rad Omens The Good and Evil Uses of WMI, CIM.eng.srt 45.6 KB
- The Long Con 2018/Mike Himbeault - Amazon S3 Deep Dive for Security Practitioners.eng.srt 44.6 KB
- The Long Con 2018/Christian Peron - Collecting and Analyzing Security Telemetry at Scale.eng.srt 44.2 KB
- The Long Con 2019/Saulo Hachem - REST in peace. Exploiting GraphQL.eng.srt 44.1 KB
- The Long Con 2018/Ron Bowes - Reading Binary Finding and Using an 0-day for a Pentest.eng.srt 40.7 KB
- The Long Con 2019/Matthew Southworth - Lessons in Purple Teaming with ATT&CK.eng.srt 35.9 KB
- The Long Con 2018/Sean Smith - Things the Internet Knows About You.eng.srt 35.4 KB
- The Long Con 2018/Eric Gershman - Cracked in 60 Seconds Attacking Mobile Wi-Fi Hotspots.eng.srt 34.5 KB
- The Long Con 2018/Theo Baschak - BGP Hijacking Goes Mainstream.eng.srt 34.4 KB
- The Long Con 2018/Matthew Southworth - Stopping Digital Skimmers.eng.srt 34.0 KB
- The Long Con 2019/William Kempan - An Overview of Active Directory Active and Defence.eng.srt 31.0 KB
- The Long Con 2018/Sarah LaCroix - Technological Abuse what is it and how can we stop it.eng.srt 29.4 KB
- The Long Con 2018/Magno Logan - DevSecOps Integrating Security in the Development Pipeline.eng.srt 28.7 KB
- The Long Con 2018/Mark Jenkins - Re-Bootstrapping the Free World.eng.srt 28.2 KB
- The Long Con 2019/Richard Frovarp - Capturing WPA2 Enterprise credentials with a Pi.eng.srt 28.0 KB
- The Long Con 2019/Sarah LaCroix - Do I Need To Be Worrying About Security Updates For My Car.eng.srt 25.1 KB
- The Long Con 2018/GlitchWitch - Working with Hackers A (Brief) Look at Implementing Vulnerability Reporting Policies.eng.srt 23.5 KB
- The Long Con logo.png 9.9 KB
- The Long Con thank you.txt 1.0 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.