
Nightmares of a Pentester - Chris Nickerson.mp4 - 163 MB

Hacking as Practice for Transplanetary Life in the 21st Century - Richard Thieme.mp4 - 63.3 MB

Levelling Up Security @ Riot Games - Mark Hillick.mp4 - 57.3 MB

Creating REAL Threat Intelligence .. with Evernote - L. Grecs.mp4 - 45.6 MB

Shims For The Win - Willi Ballenthin & Jon Tomczak.mp4 - 44.3 MB

Keynote - Looking Forward - Finding the right balance for INFOSEC - David Kennedy.mp4 - 43.1 MB

Brain Waves Surfing - (In)Security in EEG Technologies - Alejandro Hernandez.mp4 - 39.6 MB

The .11 Veil, Camouflage & Covert Invisible WiFi, Revealed - R. Nandedkar & A. Iyer.mp4 - 37.6 MB

Advanced WiFi Attacks using Commodity Hardware - Mathy Vanhoef.mp4 - 33.7 MB

SSO It s the SAML SAML Situation - David Mortman.mp4 - 33.3 MB

Unified DNS View to Track Threats - Dhia Mahjoub & Thomas Mathew.mp4 - 31.4 MB

CVE-Search - Alexandre Dulaunoy & Pieter-Jan Moreels.mp4 - 29.8 MB

Keynote - What BASE Jumping Taught Me about Risk - Shyama Rose.mp4 - 28.8 MB

Desired state compromised - Ryan Kazanciyan & Matt Hastings.mp4 - 25.8 MB

OSXCollector Automated forensic evidence collection & analysis for OS X - Kuba Sendor.mp4 - 23.9 MB

Levelling Up Security @ Riot Games - Mark Hillick.srt - 91.1 kB

Nightmares of a Pentester - Chris Nickerson.srt - 87.3 kB

Keynote - Looking Forward - Finding the right balance for INFOSEC - David Kennedy.srt - 85.3 kB

Shims For The Win - Willi Ballenthin & Jon Tomczak.srt - 74.1 kB

Unified DNS View to Track Threats - Dhia Mahjoub & Thomas Mathew.srt - 67.4 kB

Creating REAL Threat Intelligence .. with Evernote - L. Grecs.srt - 67.1 kB

Desired state compromised - Ryan Kazanciyan & Matt Hastings.srt - 58.4 kB

SSO It s the SAML SAML Situation - David Mortman.srt - 53.6 kB

Hacking as Practice for Transplanetary Life in the 21st Century - Richard Thieme.srt - 51.3 kB

Keynote - What BASE Jumping Taught Me about Risk - Shyama Rose.srt - 46.7 kB

Brain Waves Surfing - (In)Security in EEG Technologies - Alejandro Hernandez.srt - 43.3 kB

The .11 Veil, Camouflage & Covert Invisible WiFi, Revealed - R. Nandedkar & A. Iyer.srt - 33.7 kB

OSXCollector Automated forensic evidence collection & analysis for OS X - Kuba Sendor.srt - 30.6 kB

Automated adversary emulation using Caldera - Erik Van Buggenhout.mp4 - 151 MB

Tales from professional thieves - Dan McInerney and Justin Wynn.mp4 - 137 MB

Incident response in the cloud foggy with a ray of sunshine - Jeroen Vandeleur.mp4 - 128 MB

Cloud SIEM What happened and what's next - Gunter Ollmann.mp4 - 126 MB

Why isn't infosec working Did you turn it off and back on again - Rob Fuller.mp4 - 116 MB

Internet Scale analysis of AWS Cognito Security - Andres Riancho.mp4 - 115 MB

Security transition from 4G to 5G are we secure enough - Altaf Shaik and Ravisha.mp4 - 109 MB

It takes a village. - Kimber Dowsett.mp4 - 101 MB

A hackers view to the upcoming ISO SAE 21434 - Martin Schmiedecker.mp4 - 83.2 MB

Defeating Bluetooth Low Energy 5 PRNG for fun and jamming - Damien Cauquil.mp4 - 81.2 MB

Catching WMI lateral movement in an enterprise network - Jaco Blokker.mp4 - 78.3 MB

Weaknesses in WPA3's Dragonfly Handshake - Mathy Vanhoef.mp4 - 75.9 MB

Human side-channels and their implications for security and privacy.mp4 - 67.2 MB

Atomic Threat Coverage being Threat Centric - Daniil Yugoslavskiy and Mateusz Wy.mp4 - 39.9 MB

BruCON Opening.mp4 - 11.2 MB

BruCON Closing.mp4 - 10.6 MB

Security transition from 4G to 5G are we secure enough - Altaf Shaik and Ravisha.eng.srt - 119 kB

Tales from professional thieves - Dan McInerney and Justin Wynn.eng.srt - 118 kB

Automated adversary emulation using Caldera - Erik Van Buggenhout.eng.srt - 112 kB

Cloud SIEM What happened and what's next - Gunter Ollmann.eng.srt - 105 kB

Human side-channels and their implications for security and privacy.eng.srt - 98.5 kB

Weaknesses in WPA3's Dragonfly Handshake - Mathy Vanhoef.eng.srt - 97.1 kB

It takes a village. - Kimber Dowsett.eng.srt - 88.5 kB

Why isn't infosec working Did you turn it off and back on again - Rob Fuller.eng.srt - 74.8 kB

Internet Scale analysis of AWS Cognito Security - Andres Riancho.eng.srt - 64.8 kB

A hackers view to the upcoming ISO SAE 21434 - Martin Schmiedecker.eng.srt - 62.6 kB

Defeating Bluetooth Low Energy 5 PRNG for fun and jamming - Damien Cauquil.eng.srt - 53.3 kB

Atomic Threat Coverage being Threat Centric - Daniil Yugoslavskiy and Mateusz Wy.eng.srt - 38.9 kB

BruCON Opening.eng.srt - 6.94 kB

BruCON Closing.eng.srt - 5.37 kB

All Your Cloud Are Belong To Us - Hunting Compromise in Azure - Nate Warfield.mp4 - 139 MB

Hacking driverless vehicles - ZoZ.mp4 - 139 MB

(Re)Investigating Powershell attacks - Matt Hastings and Ryan Kazanciyan.mp4 - 132 MB

Forging Trusts for Deception in Active Directory - Nikhil Mittal.mp4 - 131 MB

Finding 0days in embedded systems with code coverage guided fuzzing.mp4 - 122 MB

$SignaturesAreDead = Long Live RESILIENT Signatures wide ascii nocase.mp4 - 121 MB

When Lemon Markets, Imposter Syndrome & Dunning-Kruger collide - Haroon Meer.mp4 - 117 MB

oT RCE, a Study With Disney - Lilith Wyatt.mp4 - 117 MB

Levelling Up Security @ Riot Games - Mark Hillick.mp4 - 108 MB

Using blue team techniques in red team ops - Mark Bergman & Marc Smeets.mp4 - 106 MB

Advanced WiFi Attacks using Commodity Hardware - Mathy Vanhoef.mp4 - 95.8 MB

Social engineering for penetration testers - Sharon Conheady.mp4 - 87.5 MB

The 99c heart surgeon dilemma - Stefan Friedli.mp4 - 80.6 MB

Shaving the beard.mp4 - 75.2 MB

Process Control through Counterfeit Comms - Jared Rittle.mp4 - 70.4 MB

BruCON Retro Opening.mp4 - 70.3 MB

Hunting Android Malware A novel runtime technique for identifying applications.mp4 - 65.8 MB

Nerdland podcast recording - Lieven Scheire.mp4 - 47.8 MB

Dissecting Of Non Malicious Artifacts One IP At A Time - Dani Goland & Ido Naor.mp4 - 33.9 MB

Disrupting the Kill Chain - Vineet Bhatia.mp4 - 16.8 MB

BruCON Opening.mp4 - 10.2 MB

All Your Cloud Are Belong To Us - Hunting Compromise in Azure - Nate Warfield.eng.srt - 205 kB

$SignaturesAreDead = Long Live RESILIENT Signatures wide ascii nocase.eng.srt - 196 kB

(Re)Investigating Powershell attacks - Matt Hastings and Ryan Kazanciyan.eng.srt - 192 kB

Hacking driverless vehicles - ZoZ.eng.srt - 187 kB

Social engineering for penetration testers - Sharon Conheady.eng.srt - 171 kB

Disrupting the Kill Chain - Vineet Bhatia.eng.srt - 171 kB

When Lemon Markets, Imposter Syndrome & Dunning-Kruger collide - Haroon Meer.eng.srt - 156 kB

Levelling Up Security @ Riot Games - Mark Hillick.eng.srt - 150 kB

Using blue team techniques in red team ops - Mark Bergman & Marc Smeets.eng.srt - 145 kB

Advanced WiFi Attacks using Commodity Hardware - Mathy Vanhoef.eng.srt - 139 kB

oT RCE, a Study With Disney - Lilith Wyatt.eng.srt - 136 kB

Forging Trusts for Deception in Active Directory - Nikhil Mittal.eng.srt - 126 kB

The 99c heart surgeon dilemma - Stefan Friedli.eng.srt - 119 kB

Hunting Android Malware A novel runtime technique for identifying applications.eng.srt - 103 kB

Process Control through Counterfeit Comms - Jared Rittle.eng.srt - 93.2 kB

BruCON Retro Opening.eng.srt - 85.1 kB

Finding 0days in embedded systems with code coverage guided fuzzing.eng.srt - 81.2 kB

Dissecting Of Non Malicious Artifacts One IP At A Time - Dani Goland & Ido Naor.eng.srt - 37.9 kB

Shaving the beard.eng.srt - 36.9 kB

BruCON Opening.eng.srt - 10.9 kB

New Adventures In Active Defense, Offensive… - John Strand.mp4 - 138 MB

Keynote - Inventing Defense - Allison Miller.mp4 - 137 MB

Keynote - The Birth Of A Discipline - Corey Schou.mp4 - 123 MB

Building A Successful Internal Adversarial Simulation Team - C. Gates & C. Nickerson.mp4 - 116 MB

Invoke obfuscation powershell obfusk8tion techniques - DanielBohannon.mp4 - 112 MB

Ant-Forensics AF - Dual Core.mp4 - 109 MB

Hello To The Dark Side - L. Grecs.mp4 - 105 MB

What Does The Perfect Door Or Padlock Look Like - Deviant Ollam.mp4 - 105 MB

Virtual Terminals, POS Security And Becoming A.. - Grigorios Fragkos.mp4 - 102 MB

Esoteric Web Application Vulnerabilities - Andres Riancho.mp4 - 93.7 MB

Smart Sheriff, Dumb Idea. - Abraham Aranguren & Fabian Fässler.mp4 - 92 MB

Security Through Design - Jelle Niemantsverdriet.mp4 - 86.6 MB

Hacking KPN Lessons From The Trenches - Jeremy Goldstein & Bouke Van Laethem.mp4 - 82.1 MB

Scraping Leaky Browsers for fun and Passwords - Stefaan Truijen - Adrian Toma.mp4 - 74.2 MB

Decepticon - R. Nandedkar-Amrita Iyer-Krishnakant Patil.mp4 - 55.2 MB

Defeating EDRs using Dynamic Invocation in C# - Jean Francois Maes.mp4 - 83.3 MB

Android malware targeting Belgian Financial apps - Jeroen Beckers.mp4 - 82 MB

How to make Belgium one of the least cyber vulnerable countries - Phédra Clouner.mp4 - 78 MB

A Critical Assessment of Supply Chain Intrusion Vectors - Joe Slowik.mp4 - 74.6 MB

Visibility beyond perimeters Detecting C2 at time of execution - Nate Warfield.mp4 - 69.7 MB

Automating Binary Analysis with Ghidra's P-Code - Gergely Revay.mp4 - 65.7 MB

Chasing the White Whale of Malware - Kapellmann & D.Nandedkar.mp4 - 65.3 MB

PIC Your Malware - Ben Heimerdinger and Sebastian Feldmann.mp4 - 64.5 MB

The risk of CI CD pipeline poisoning via CodeBuild - Asier Rivera.mp4 - 61.6 MB

eCos Offensive Security Research Logbook - Quentin Kaiser.mp4 - 57.4 MB

Hacktivism during a global pandemic - Marc Rogers.mp4 - 56.4 MB

BruCON Closing.mp4 - 10.7 MB

BruCon Opening.mp4 - 4.15 MB

Android malware targeting Belgian Financial apps - Jeroen Beckers.eng.srt - 121 kB

Visibility beyond perimeters Detecting C2 at time of execution - Nate Warfield.eng.srt - 114 kB

A Critical Assessment of Supply Chain Intrusion Vectors - Joe Slowik.eng.srt - 110 kB

Defeating EDRs using Dynamic Invocation in C# - Jean Francois Maes.eng.srt - 110 kB

Chasing the White Whale of Malware - Kapellmann & D.Nandedkar.eng.srt - 93.1 kB

The risk of CI CD pipeline poisoning via CodeBuild - Asier Rivera.eng.srt - 88.9 kB

Automating Binary Analysis with Ghidra's P-Code - Gergely Revay.eng.srt - 80.3 kB

eCos Offensive Security Research Logbook - Quentin Kaiser.eng.srt - 77.3 kB

Hacktivism during a global pandemic - Marc Rogers.eng.srt - 60.2 kB

BruCON Closing.eng.srt - 9.91 kB

BruCon Opening.eng.srt - 3.34 kB

Adaptive Adversaries - David Kennedy.mp4 - 78.6 MB

0wn-premises Bypassing Microsoft Defender for Identity - Nikhil Mittal.mp4 - 69.2 MB

DNS as Criticial Infrastructure - do youknow where your domain is - Barry Irwin.mp4 - 67 MB

A Black-Box Security Evaluation of the SpaceX Starlink User Terminal - Lennert Wouters.mp4 - 65.2 MB

Story Continues Hacking Some More Secure Portable Storage Devices- Matthias Deeg.mp4 - 63.5 MB

INCONTROLLER New Malware Developed to Target Industrial Control Systems-Daniel Zafra.mp4 - 60.1 MB

Being a cyberdefender behind the curtains - Sabine d’Argoeuves.mp4 - 58.7 MB

Understanding the Discipline to Optimize Cyber Defense Collaboration - John Doyle.mp4 - 56.1 MB

In Curation We Trust Generating Contextual&Actionable Threat Intelligence-Coene&Nixon.mp4 - 49.7 MB

I am become loadbalancer, owner of your network - Nate Warfield.mp4 - 48.2 MB

LOLDocs Sideloading in Signed Office files - Pieter Ceelen & Dima van de Wouw.mp4 - 47 MB

BruCON 0x0E - Closing.mp4 - 8.95 MB

BruCON 0x0E - BruCON Opening.mp4 - 5.11 MB

Adaptive Adversaries - David Kennedy.eng.srt - 137 kB

A Black-Box Security Evaluation of the SpaceX Starlink User Terminal - Lennert Wouters.eng.srt - 117 kB

INCONTROLLER New Malware Developed to Target Industrial Control Systems-Daniel Zafra.eng.srt - 114 kB

DNS as Criticial Infrastructure - do youknow where your domain is - Barry Irwin.eng.srt - 109 kB

Story Continues Hacking Some More Secure Portable Storage Devices- Matthias Deeg.eng.srt - 100 kB

Understanding the Discipline to Optimize Cyber Defense Collaboration - John Doyle.eng.srt - 97.1 kB

0wn-premises Bypassing Microsoft Defender for Identity - Nikhil Mittal.eng.srt - 95.7 kB

I am become loadbalancer, owner of your network - Nate Warfield.eng.srt - 92.6 kB

In Curation We Trust Generating Contextual&Actionable Threat Intelligence-Coene&Nixon.eng.srt - 77 kB

Being a cyberdefender behind the curtains - Sabine d’Argoeuves.eng.srt - 68.6 kB

LOLDocs Sideloading in Signed Office files - Pieter Ceelen & Dima van de Wouw.eng.srt - 66.5 kB

BruCON 0x0E - Closing.eng.srt - 7.33 kB

BruCON 0x0E - BruCON Opening.eng.srt - 6.41 kB

Red and tiger team - Chris Nickerson.mp4 - 77.1 MB

Belgian beer lovers guide to cloud computing - Craig Balding.mp4 - 67.6 MB

Attacking backbone technologies - Daniel Mende - Roger Klose.mp4 - 61.1 MB

Transition to ipv6 on the internet threats and mitigation - Eric Vyncke.mp4 - 58 MB

Building hackerspaces everywhere - Astera.mp4 - 57.6 MB

Dispelling the myths and discussing the facts global cyber warfare - Jaseon E Street.mp4 - 57.2 MB

Social engineering for penetration testers - Sharon Conheady.mp4 - 57.1 MB

Rage against the kiosk - Paul James Craig.mp4 - 51.7 MB

A new web attack vector script fragmentation - Stephan Chenette.mp4 - 51.4 MB

Botnets ransomware malware and stuff - Julia Wolf.mp4 - 43 MB

Knowing me knowing you dangers of social networks - Brian Honan.ogg.mp4 - 34.9 MB

Open source information gathering - Chris Gates.mp4 - 34.5 MB

Cyberwar Not What We Were Expecting.mp4 - 73 MB

Recent Advances in IPv6 Security.mp4 - 68.1 MB

How I met your pointer (Hijacking client software for fuzz and profit).mp4 - 50.5 MB

We have you by the gadgets.mp4 - 50.2 MB

Shotgun parsers in the cross-hairs.mp4 - 49.2 MB

Moar Anti-Forensics for the Louise.mp4 - 46.1 MB

HTML5 - A Whole New Attack Vector.mp4 - 36.6 MB

pMap, the silent killer.mp4 - 36.1 MB

Uncovering SAP vulnerabilities dissecting and breaking the Diag protocol.mp4 - 35 MB

Introducing the Smartphone Penetration Testing Framework.mp4 - 26 MB

Keynote by Katie Moussouris.mp4 - 17.5 MB

Welcome.mp4 - 3.9 MB

Cyberwar Not What We Were Expecting.srt - 66.8 kB

Shotgun parsers in the cross-hairs.srt - 63.9 kB

Moar Anti-Forensics for the Louise.srt - 63.9 kB

pMap, the silent killer.srt - 49 kB

HTML5 - A Whole New Attack Vector.srt - 47.1 kB

Uncovering SAP vulnerabilities dissecting and breaking the Diag protocol.srt - 46.6 kB

We have you by the gadgets.srt - 46.2 kB

Keynote by Katie Moussouris.srt - 21 kB

Welcome.srt - 4.69 kB

David Perez, Jose Pico - Geolocation of GSM mobile devices.mp4 - 68.6 MB

David Mortman s Keynote.mp4 - 64.5 MB

Amelia Andersdotter s keynote.mp4 - 62.9 MB

Dan Guido s Keynote.mp4 - 60.2 MB

Lightning Talks Session #1.mp4 - 59.3 MB

Erin Jacobs, Zack Fasel - Taking the BDSM out of PCI-DSS through open-source solutions.mp4 - 55.5 MB

Jake Valletta - CobraDroid.mp4 - 51.7 MB

TB. Henriques, T. Martins, J. Gouveia - Realtime analysis and visualization of ..mp4 - 47.6 MB

Devops Panel (part 2).mp4 - 47.3 MB

Robert Graham - Data-plane networking.mp4 - 45.4 MB

Vaagn Toukharian - HTTP Time Bandit.mp4 - 41.8 MB

Russ Gideon - Paint by Numbers vs. Monet.mp4 - 35.8 MB

Aloria - .NET The Framework, the Myth, the Legend.mp4 - 28.2 MB

Devops Panel.mp4 - 11.4 MB

Facebook CTF.mp4 - 5.64 MB

Amelia Andersdotter s keynote.srt - 83.3 kB

Erin Jacobs, Zack Fasel - Taking the BDSM out of PCI-DSS through open-source solutions.srt - 78.7 kB

Open Soure Security Orchestration - Gregory Pickett.mp4 - 65.6 MB

Evading Microsoft ATA for Active Directory Domination - Nikhil Mittal.mp4 - 55.4 MB

Browser Exploits Grab them by the… collar - Debasish Mandal.mp4 - 55 MB

Secure channels Building real world crypto systems - Sander Demeester.mp4 - 53.6 MB

XFLTReaT a new dimension in tunnelling - Balazs Bucsay.mp4 - 52.7 MB

How hackers changed the security industry - Chris Wysopal.mp4 - 48.6 MB

Hacking invisibly and silently with light and sound - Matt Wixey.mp4 - 47.8 MB

Weaponizing the BBC Micro Bit - Damien Cauquil.mp4 - 45.3 MB

Detecting malware even when it is encrypted - František Střasák.mp4 - 40.3 MB

From Weakest Link to Retaliation Weapon - Vlad Styran.mp4 - 39.4 MB

DYODE - Arnaud Soullié.mp4 - 38.1 MB

An overview of the CMS brute-forcing malware landscape - Anna Shirokova.mp4 - 36.6 MB

A market solution for product safety and corporate governance - Justine Bone.mp4 - 32.8 MB

Data transforming your sewage into signatures - Adam Schoeman.mp4 - 64.2 MB

The project of prototype this - Joe Grand & Zoz.mp4 - 60.2 MB

Keynote - Jennifer Minella.mp4 - 59.8 MB

Security model bedfellows - Noel Dunne & Paco Hope.mp4 - 57.3 MB

Keynote - Adam Shostack.mp4 - 55.2 MB

Cyber necromancy - resurrecting the dead - Matthew Halchyshak Joseph Tartaro.mp4 - 46.9 MB

One packer to rule them all - Arne Swinnen & Alaeddine Mesbahi.mp4 - 45.4 MB

Using superpowers for hw reverse engineering - Joe Grand.mp4 - 45.2 MB

Biting into the forbidden fruit - Krzysztof Kotowicz.mp4 - 44.2 MB

Thunderbolts and Lightning - Snare.mp4 - 43.3 MB

Investigating Powershell attacks - Matt Hastings & Ryan Kazanciyan.mp4 - 38.6 MB

Stealing a mobile using wormholes - Markus Vervier.mp4 - 33.6 MB

Hacking driverless vehicles - Zoz.mp4 - 13.7 MB

Lightning Talks - Voting Stage.mp4 - 7.43 MB

Lightning Talks - tunnelshade.mp4 - 5.55 MB

Lightning Talks - Matt Erasmus.mp4 - 4.25 MB

Lightning Talks - Gavin Millard.mp4 - 3.77 MB

Lightning Talks - Nikos Danopoulos.mp4 - 2.86 MB

Lightning Talks - 404 @JQuePublic.mp4 - 2.73 MB

Lightning Talks - Jan Kadijk.mp4 - 2.57 MB

Keynote - Adam Shostack.srt - 90.2 kB

Biting into the forbidden fruit - Krzysztof Kotowicz.srt - 83.6 kB

Thunderbolts and Lightning - Snare.srt - 65.2 kB

Stealing a mobile using wormholes - Markus Vervier.srt - 38.9 kB

Hacking driverless vehicles - Zoz.srt - 25.5 kB

Lightning Talks - tunnelshade.srt - 8.12 kB

Lightning Talks - Gavin Millard.srt - 6.6 kB

Lightning Talks - Matt Erasmus.srt - 6.55 kB

Lightning Talks - 404 @JQuePublic.srt - 5.45 kB

Lightning Talks - Jan Kadijk.srt - 5.36 kB