Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Watch our Toorcon 15 2013 rickrolling your neighbors with google chromecast 2 video
Video

ToorCon 15 (2013) - Rickrolling your neighbors with Google Chromecast

This presentation will demonstrate how to hijack a Google Chromecast on any network to play videos of your choosing. Let no TV be safe.
Watch our Rfid hacking over the head move stealing badges w tastic rfid thief video
Video

RFID Hacking: Over-the-head Move - Stealing Badges w Tastic RFID Thief

The Tastic RFID Thief can be concealed in a briefcase or messenger bag, and used to silently steal the proximity badge information from an unsuspecting employee as they physically walk near the concealed device. Learn how to get full coverage of all pockets as you walk by your target.
Watch our Microsoft bluehat v8 real world code review video
Video

Microsoft BlueHat v8 - Real World Code Review

This presentation provides a thorough and objective review of the benefits, shortcomings, and trade-offs of static code analysis tools, black box application scanners, and expert analysis.
Watch our Mozilla security blog threat modeling using trike video
Video

Mozilla Security Blog - Threat Modeling Using Trike

Threat modeling is heavily used by the Mozilla Security team in order to analyze potential threats and weaknesses in Firefox and also our other systems, such as addons.mozilla.org, browserID, etc. This video highlights the Trike methodology for threat modeling.
Watch our Uat what palpatine can teach about pentesters video
Video

UAT - What Palpatine Can Teach About Pentesters

Learn about the differences in skill sets and qualities that make a good pen tester.
Watch our Baythreat where to start when securing a startup video
Video

BayThreat - Where To Start When Securing A Startup?

This presentation will give you actionable tips on where to start when securing a startup, and how to bridge the gap between your small company and a Fortune 1000 company you want to secure as a client.
Watch our Black hat usa 2005 catch me if you can video
Video

Black Hat USA 2005 - Catch Me If You Can

Prepare to watch trusted forensics tools crumble. James C. Foster and Vincent T. Liu share over eighteen months of continued private forensic research, including ground-breaking vulnerabilities and key weaknesses in some of the most popular tools used by forensic examiners.
Watch our Hp webinar harness the power of agile video
Video

HP Webinar-Harness the Power of Agile

Watch this webinar and learn how organizations have harnessed the power of Agile.

Watch our Black hat usa 2011 pulp google hacking video
Video

Black Hat USA 2011 - Pulp Google Hacking

We once again tear down the basic assumptions about what Google/Bing Hacking is and the extent to which it can be exploited to target organizations and even governments.
Watch our Def con 20 2012 tenacious diggity video
Video

DEF CON 20 (2012) - Tenacious Diggity

Check out all brand new tool additions to the Google Hacking Diggity Project - The Next Generation Search Engine Hacking Arsenal. We explore these tools and more in this DEMO rich presentation.
Watch our Rfid hacking distance limitation proxmark3 video
Video

RFID Hacking: Distance Limitation - Proxmark3

Distance limitation of traditional RFID hacking tools. Stealing card info with the Proxmark3.
Watch our Rfid hacking intro to tastic rfid thief video
Video

RFID Hacking: Intro to Tastic RFID Thief

Introducing the TasticRFID Thief - a long range RFID hacking tool.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.