Skip to main content

Moving Image Archive

Download or listen to free movies, films, and videos


rss RSS

6,336
RESULTS


More right-solid

Show sorted alphabetically

More right-solid

Show sorted alphabetically

More right-solid

More right-solid
A B C D E F G H I J K L M N O P Q R S T U V W remove-circle X Y Z AE SS TH
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Off-Center and Outsider
by "XTheBobX" (YouTube)
movies

eye 25

favorite 0

comment 0

Video uploaded to YouTube by user “XTheBobX” Original description: ;D
Topics: trollface, rage, comics, trolls, trolling, internets, phenomena, memes, parody, humor, dramatica
Off-Center and Outsider
by "xklamation" (YouTube)
movies

eye 32

favorite 0

comment 0

Video uploaded to YouTube by user "xklamation" (Citing Creative Commons) Original description: read the report on the cadaver dogs here» http://joana-morais.blogspot.com/2008...
Topics: maddie, madeleine, gerry, kate, mccann, guilty, police, suspects, cadaver, canine, officer, dog,...
Off-Center and Outsider
by "xxFeiLxx" (YouTube)
movies

eye 54

favorite 0

comment 0

Video uploaded to YouTube by user “xxFeiLxx” Original description: just trolling around as trollface. Enjoy xD trolololololololololololololololol
Topics: trollface, grand, theft, auto, gta, gta iv, gta 4, rage comics, trolls, trolling, games, gaming,...
Social Media Videos
by #น้ำชุบเหม้านากุ้งแห้ง... - ชิมแล - By เอโพดำ บันเทิงศิลป์|...
movies

eye 2

favorite 0

comment 0

Topics: Facebook, video
Social Media Videos
by 🟥ทนายเดชา แถลงด่วน ปมมือถือแตงโม... -...
movies

eye 2

favorite 0

comment 0

Topics: Facebook, video
Social Media Videos
by 討厭吃蔬菜的 ID 特務 Vestia Zeta Hololive... - 流星丸工作室-AhyoDoomlord| By 流星丸工作室-AhyoDoomlord
movies

eye 25

favorite 0

comment 0

討厭吃蔬菜的 ID 特務 Vestia Zeta Hololive Indonesia 3rd Gen 來源: https://www.youtube.com/watch?v=FbTMYv7B0Ag&t=0s Source: https://www.facebook.com/watch/?v=1355146021666998 Uploader: 討厭吃蔬菜的 ID 特務 Vestia Zeta Hololive... - 流星丸工作室-AhyoDoomlord| By 流星丸工作室-AhyoDoomlord
Topics: Facebook, video
Social Media Videos
by ข่าวGMM25 - ไลฟ์รีแพร์ ผิดกฎหมาย | Facebook
movies

eye 9

favorite 0

comment 0

Topics: Facebook, video
Social Media Videos
by ฝนตกน้ำท่วมรึปล่าว มาตรวจดูกันครับ… - ชัชชาติ...
movies

eye 2

favorite 0

comment 0

Topics: Facebook, video
Social Media Videos
by ฟิตจัด… เช้านี้ที่สวนลุม - ชัชชาติ สิทธิพันธุ์| By...
movies

eye 4

favorite 0

comment 0

Topics: Facebook, video
Social Media Videos
by รายการสด สวท.มหาสารคาม - รายการ...
movies

eye 2

favorite 0

comment 0

Topics: Facebook, video
Social Media Videos
by เจาะลึกทั่วไทย Inside Thailand - “ชัชชาติ” ออกตัว โต้ข้อกล่าวหา |...
movies

eye 9

favorite 0

comment 0

Topics: Facebook, video
Social Media Videos
by เที่ยงวันทันเหตุการณ์ - ถ่ายทอดสด...
movies

eye 5

favorite 0

comment 0

Topics: Facebook, video
Social Media Videos
by เรื่องเล่าเช้านี้ - ถ่ายทอดสด เรื่องเล่าเช้านี้...
movies

eye 3

favorite 0

comment 0

Topics: Facebook, video
Topics: Facebook, video
Community Video
by 'xyzzy'
movies

eye 717

favorite 0

comment 0

Speed run of SiN rejected for Speed Demos Archive due to inconsistencies between segments.
Topic: SiN
Ourmedia
by -X1- Koncept
movies

eye 116

favorite 0

comment 0

My 27 million point combo in Tony Hawk's Underground 2's Los Angeles level
Topic: thug2
Ourmedia
by -X1- Koncept
movies

eye 100

favorite 0

comment 0

My 27 million point combo in Tony Hawk's Underground 2's Los Angeles level
Topic: thug2
Community Video
by ..::XANA::.. Creations
movies

eye 1,503

favorite 0

comment 0

Community Video
by ..::XANA::.. Creations
movies

eye 282

favorite 0

comment 0

http://fnt.xanacreations.com/archive
Community Video
by ..::XANA::.. Creations
movies

eye 380

favorite 0

comment 0

http://fnt.xanacreations.com/archive/fnt-39
Topics: sean, caleb, josh
Community Video
by ..::XANA::.. Creations
movies

eye 1,513

favorite 0

comment 0

http://furcast.xanacreations.com/archive/fc-2
Topics: neko, mattox, caleb
Community Video
by ..::XANA::.. Creations
movies

eye 1,484

favorite 0

comment 0

http://furcast.xanacreations.com/archive/fc-46
Community Video
by ..::XANA::.. Creations
movies

eye 2,242

favorite 0

comment 0

http://furcast.xanacreations.com/archive/fc-1
Topics: mattox, paradox
The Lost Acidplanet
by ///X FAKTOR\\\
movies

eye 25

favorite 0

comment 0

Adam the high and mighty, nearly all-knowing, glorious roomate of mine graces us with his vast knowledge and commentary on the Acts class teacher (Rod Thompson) at CCBC. Yes, Adam, you are screwed.
Topics: acidplanet, archiveteam
Community Video
by 01x 01 El Picavion
movies

eye 24

favorite 0

comment 0

01x 01 El Picavion
Topic: 01x 01 El Picavion
Community Video
by 01x 25 En La Masa
movies

eye 12

favorite 0

comment 0

01x 25 En La Masa
Topic: 01x 25 En La Masa
The Lost Acidplanet
by 01xmario
movies

eye 16

favorite 0

comment 0

my
Topics: acidplanet, archiveteam
The Lost Acidplanet
by 01xmario
movies

eye 23

favorite 0

comment 0

lk
Topics: acidplanet, archiveteam
The Lost Acidplanet
movies

eye 24

favorite 0

comment 0

I GOT TAGED
Topics: acidplanet, archiveteam
Community Video
by 0XUZY
movies

eye 1,661

favorite 2

comment 0

PRIVATELY OWNED NOT PERMITTED FOR PUBLIC OR PERSONAL USE WITHOUT CONSENT FROM OWNER
Topic: 0XUZY
Log In Required
movies

eye 496

favorite 1

comment 0

PRIVATELY OWNED NOT PERMITTED FOR PUBLIC OR PERSONAL USE WITHOUT CONSENT FROM OWNER
Topic: 0XUZY
Community Video
by 0XUZY
movies

eye 1,723

favorite 0

comment 0

PRIVATELY OWNED NOT PERMITTED FOR PUBLIC OR PERSONAL USE WITHOUT CONSENT FROM OWNER
Topic: 0XUZY
Twitch Clips - Highlights of Game (and Creative) Streams
by 0x00c
movies

eye 9

favorite 0

comment 0

Source: https://www.twitch.tv/gronkh/clip/TiredPlumpWrenLitty-RXgrIKLVIdVhKxza Uploader: 0x00c
Topics: TwitchClips, video
Hacking and InfoSec stuff
movies

eye 91

favorite 1

comment 0

This is a complete static analysis of the Shadow Hammer Stage 1 Setup.exe. The Ghidra project is available either as a shared project in the rManganese repository on the ghidra-server.org Ghidra server (see https://www.youtube.com/watch?v=ka4vGxLmr4w on how to use this repository) or as a download from https [://] anonfile [.] com [/] 57Uan9ifne [/] ShadowHammer_2019_04_24_gar (WARNING: This is real malware!). Materials used in the video: - Scripts: https://github.com/0x6d696368/ghidra_scripts...
Topics: Youtube, video, Education, 0x6d696368, Ghidra, malware analysis, ShadowHammer, shadow hammer,...
Speed Runs
by 0xA101
movies

eye 55

favorite 0

comment 0

Twitch
Topics: twitch, livestream, chrono trigger, speedrun
Speed Runs
movies

eye 97

favorite 0

comment 0

Twitch
Topics: twitch, vod, livestream, neon genesis evangelion 64, speedrun
Speed Runs
by 0xA101
movies

eye 112

favorite 1

comment 0

Twitch
Topics: twitch, speedrun, neon genesis evangelion 64
Speed Runs
by 0xA101
movies

eye 57

favorite 0

comment 0

Twitch
Topics: twitch, neon genesis evangelion 64, speedrun
Speed Runs
movies

eye 47

favorite 0

comment 0

Twitch
Topics: twitch, neon genesis evangelion 64, speedrun
Twitch
Topics: twitch, livestream, neon genesis evangelion
The essence of Pacman in 255 bytes of 6502 asm for the Acorn Electron. This is the best I can do. Pretty tough challenge. If I remove the colourful UDGs, I could probably add better ghost movement, a larger maze and sound #8bitcoders #tinyasm #acornelectron https://t.co/ubsXFAhnzk Source: https://mobile.twitter.com/0xC0DE6502/status/1414240227703545857 Uploader: 0xC0DE
Topics: Twitter, video, 8bitcoders, tinyasm, acornelectron
Community Video
movies

eye 76

favorite 0

comment 0

Link to YouTube version:  https://www.youtube.com/watch?v=_VzaXpTqtDg Videos uploaded by 0xC4KE .  Rights to the video footage belongs to The History Channel. 
Topics: Life After People, History Channel, Season 1, S01E03, The Capital Threat, YouTube
Community Video
by 0xC4KE
movies

eye 51

favorite 0

comment 0

Link to YouTube version:  https://www.youtube.com/watch?v=meqfYaLDHmY Videos uploaded by 0xC4KE .  Rights to the video footage belongs to The History Channel. 
Topics: Life After People, History Channel, Season 1, S01E10, Waters of Death, YouTube
Community Video
by 0xC4KE
movies

eye 104

favorite 0

comment 0

Link to YouTube version:  https://www.youtube.com/watch?v=xof4xT8IuSo Videos uploaded by 0xC4KE .  Rights to the video footage belongs to The History Channel. 
Topics: Life After People, History Channel, Season 1, S01E02, Outbreak, YouTube
Twitch Clips - Highlights of Game (and Creative) Streams
by 0xChris
movies

eye 7

favorite 0

comment 0

Source: https://www.twitch.tv/tanzverbot/clip/AmazonianCrispyWitchThisIsSparta Uploader: 0xChris
Topics: TwitchClips, video
Twitch Clips - Highlights of Game (and Creative) Streams
by 0xChris
movies

eye 3

favorite 0

comment 0

Source: https://www.twitch.tv/derhardi/clip/GentleWiseFinchDerp Uploader: 0xChris
Topics: TwitchClips, video
Community Video
movies

eye 6

favorite 0

comment 0

初めてAIを怖いと思った 没ネタや裏話を衝動的につぶやきたくなった時のツイ垢 @0xefuefuFFFFFF (ウリ狂特化3MOD使用) Source: https://www.nicovideo.jp/watch/sm40312193 Uploader: 0xFFFFFFFF
Topics: Niconico, video
Twitch Clips - Highlights of Game (and Creative) Streams
by 0xFelixKlauke
movies

eye 6

favorite 0

comment 0

Source: https://www.twitch.tv/julienbam/clip/ConfidentFilthyOysterShadyLulu Uploader: 0xFelixKlauke
Topics: TwitchClips, video
Hacking and InfoSec stuff
movies

eye 38

favorite 0

comment 0

Many people have a plan to make it through the robopocalypse (robot apocalypse), but in this talk we put these plans to the test. We start our discussion with a quick overview of physical and social abilities of current robots, mainly as a way to inform the people that haven’t taken the time to think what their life might be like if robots were to take over. We follow this by doing live demos of robot physical and social engineering attacks, and some of the defenses that we have employed to...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, robopocalypse, robots
Hacking and InfoSec stuff
movies

eye 43

favorite 0

comment 0

The Controller Area Network (CAN) bus has been mandated in all cars sold in the United States since 2008. But CAN is terrible in many unique and disturbing ways. CAN has served as a convenient punching bag for automotive security researches for a plethora of reasons, but all of the available analysis tools share a shortcoming. They invariably use a microcontroller with a built-in CAN peripheral that automatically takes care of the low-level (ISO layer 1 and 2) communication details, and ensures...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, CAN bus
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

For many CSOCs, there was a simpler time. A time when their security event collection and monitoring problems could, in theory, be solved by buying, installing, and optimizing one product. Today, life is not so simple. The SIEM marketspace started with many startups, consolidated to a handful of leaders, and has diversified again. Acquiring and operating an analytic platform for large and mature CSOCs is a major investment of time, money and effort. The best approach to common...
Topics: Youtube, video, Science & Technology, shmoocon 2018, shmoocon, hacking, CSOC, SIEM
A former CISO, a future CISO, and a hacker walk into a bar… a profound realization over cocktails: no kid dreams of being a CISO – nor should they. So we hatched a plan – send a Terminator unit back to the 90s and eliminate the role we know today, to save all humanity. We suck at robots and hot tub time machines are creepy so we settled on a Firetalk. As global spending on infosec is projected to eclipse $1 Trillion in the next 5 years, the failure rate will be near 100%. After 20+ years...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
Hacking and InfoSec stuff
by 0xdade
movies

eye 31

favorite 0

comment 0

Subtitle: A Cipher in Arlington National Cemetery Elonka Dunin, known for her website on the World’s Most Famous Unsolved Codes, discovered a cipher on one of the tombstones in Arlington National Cemetery. Not just any tombstone, it’s that of William and Elizebeth Friedman, two giants in the fields of cryptanalysis. In fact, William Friedman created the terms of cryptanalysis, and also of “index of coincidence”. Elizebeth, who had taught William about cryptography in the first place,...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, friedman tombstone
Hacking and InfoSec stuff
movies

eye 19

favorite 0

comment 0

With GDPR coming into effect on May 25, 2018, any organization handling EU citizen’s personal data should be prepared to comply with stricter privacy regulations or be ready to pay up to four percent of their global annual revenue in fines or €20,000,000. This is a substantial penalty for non-compliant companies, and does not focus just on companies based in Europe — it’s for ALL companies globally who do business in the EU. With just months remaining, the clock is ticking on companies...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, GDPR
Hacking and InfoSec stuff
movies

eye 27

favorite 0

comment 0

For many years many of us “infosec” professionals have been working late into the midnight hours and enjoying certain libations as celebration of our wins and losses alike. In order to ensure everyone has the best possible options at their disposal, we are taking a journey together (a very, very fast one) to the north parts of the United Kingdom, and the near center of France. It’s not just Whiskey and Sparkling Wine, it’s Scotch and Bubbles (really Champagne)! Come join me on this...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
Hacking and InfoSec stuff
movies

eye 100

favorite 0

comment 0

Less than three years after the Equation Group was discovered backdooring hard drive firmware, courses on how to create such backdoored firmware are available to the public. New exploits in BIOS/UEFI that enable bypassing OS and Hypervisor protections have become commonplace. Once compromised, remediation is virtually impossible; malicious firmware is perfectly positioned to block the very updates that would remove it. Truly defending against these threats requires a different...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, securing hardware
Hacking and InfoSec stuff
movies

eye 87

favorite 0

comment 0

Four players, one moderator, two topics, and a bunch of unknowns. A few weeks ago we armed our players with two topics and asked them to research both sides. At the start of the hour they will draw a card out of a hat, letting them know which topic and which side of the argument they will be representing. Meant to be fun? Yes. But also a somewhat serious and (hopefully) educated look into some hot subjects of infosec debate. The Players: Wendy Nather, Jack Daniel, Jack Gavigan, Elizabeth...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, cryptocurrency, iot...
Hacking and InfoSec stuff
movies

eye 81

favorite 0

comment 0

Note: Audio is missing until the third minute in this video. This is from the source. Sorry for the inconvenience. As desktop and server security keeps raising the baseline for successful exploitation, IOT devices are still stuck in the 1990’s, despite their ubiquity in every home network. This, coupled with the trend of “monitor your devices from anywhere!”, is creating a time-bomb situation, in which millions of households are left vulnerable, regardless of any network security posture....
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, iot rce, disney
Hacking and InfoSec stuff
by 0xdade
movies

eye 53

favorite 0

comment 0

Note: The audio cuts out at 5:42 and doesn't pick up again until 10:32. It's like this in the source material. Sorry for the inconvenience. We don’t need a Cyber Moonshot; we’ve got enough already. Computing technology is enabling multiple concurrent revolutions, in biotechnology, manufacturing, robotics, AI, and literal rocket engineering. These are our Moonshots, fueled by governments, companies, and tinkerers, powering the growth engine of the global economy and reshaping society. Our...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
Hacking and InfoSec stuff
by 0xdade
movies

eye 57

favorite 2

comment 0

Git is a widely-used Version Control System for software development projects. Because of the way Git works, “deleted” secrets don’t disappear from the filesystem. That means when a developer commits encryption keys, production passwords, or other secrets to the repository, removing them in a later commit won’t scrub them from the history. They live on in compressed plaintext on every developers’ machine, unless the history is rewritten. Grawler is a command line utility written in...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, AWS, Git hacking,...
Hacking and InfoSec stuff
movies

eye 49

favorite 0

comment 0

The information security community has long suffered from a lack of effective and affordable tools and techniques for locating radio devices. Many methods are available, but most of them require multiple radio receivers and/or physical motion of one or more antennas. Pseudo-doppler is an old technique that implements Direction Finding (DF) by rapidly switching between multiple fixed antennas connected to a single radio receiver. We have taken a modern approach to the implementation of...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, pseudo-doppler, SDR
Hacking and InfoSec stuff
by 0xdade
movies

eye 45

favorite 0

comment 0

Donna F. Dodson is the Chief Cybersecurity Advisor for the National Institute of Standards and Technology (NIST). She is also the Director of NIST’s National Cybersecurity Center of Excellence (NCCoE). Donna oversees ITL’s cyber security program to conduct research, development and outreach necessary to provide standards, guidelines, tools, metrics and practices to protect the information and communication infrastructure. In addition, Donna guides ITL programs to support both national and...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, keynote
Researching embedded devices is not always straightforward, as such devices often vastly differ from one another. Such research is difficult to repeat and results are not easily comparable because it is difficult to conceive a standard approach for analysis. This document proposes an initial research methodology for vulnerability analysis that can be applied to any embedded device. This methodology looks beyond preliminary research findings, such as open ports and running services, and takes a...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, embedded device, trommel
Hacking and InfoSec stuff
by 0xdade
movies

eye 25

favorite 0

comment 0

https://creativecommons.org/licenses/by-nc-sa/4.0/ Source: https://www.youtube.com/watch?v=Djv2R2muHCg Uploader: 0xdade
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking
Hacking and InfoSec stuff
by 0xdade
movies

eye 30

favorite 0

comment 0

For thirteen years, we’ve chosen to stand up and share all the ins and outs and inner workings of the con. Why stop now? Join us to get the break down of budget, an insight to the CFP process, a breakdown of the hours it takes to put on a con like ShmooCon, and anything thing else you might want to talk about. This is an informative, fast paced, and generally fun session as Bruce dances on stage, and Heidi tries to hide from the mic. Seriously though–if you ever wanted to know How, When, or...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, 0wnthecon
JA3 is an open source SSL/TLS client fingerprinting tool developed by John Althouse, Josh Atkins, and Jeff Atkinson. Since it’s release a few months ago in a blog post, it has gained wide adoption across the industry and we’ve seen conference talks highlighting it’s features. However, there’s been some confusion on it’s capabilities and how best to utilize it. So, then, it’s about time we do a talk on JA3 and what it can really do. In this talk we will show the benefits of SSL...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, JA3, ssl
Hacking and InfoSec stuff
by 0xdade
movies

eye 47

favorite 0

comment 0

A (slightly irreverent) look at the most important laws, cases, regulations, and legally relevant (or, in some cases, irrelevant) cybersecurity issues during the most recent year–and maybe a little farther back if the item is particularly outrageous. Just the basic topic and fundamental principles are highlighted–most original legal texts are so complex–who would read them all the way through? Prior to moving to Texas, Professor Steve Black (@legalh4ck3r) taught at BYU, UNH, LSU, Syracuse...
Topics: Youtube, video, Science & Technology, hacking, shmoocon, shmoocon 2018, cyberlaw
Hacking and InfoSec stuff
movies

eye 27

favorite 0

comment 0

Revisiting past CVEs can be a useful tool for finding patterns, to increase our critical thinking, gain knowledge in techniques that have been previously used, and to increase our skills to eventually be able to contribute to the wider security community. In addition, when a known exploit currently exists for a CVE, and our experiments yield different results from the known exploit, we must practice our critical thinking skills to determine the discrepancies, and to determine if any unstated...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, CVEs
Hacking and InfoSec stuff
movies

eye 27

favorite 0

comment 0

Complete Title: Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs The ability to detect automated behavior within cyber relevant log data is a useful tool for the network defender, as malicious activity executed by scripts or bots is likely to leave behind identifiable traces in logs. This paper presents a methodology for detecting certain types of automated activity within logs based on matching observed temporal patterns. This methodology is...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, data fusion,...
Hacking and InfoSec stuff
movies

eye 36

favorite 0

comment 0

Complete title: Everything You Wanted to Know About Creating an Insider Threat Program (But Were Afraid To Ask) Oh no! You just got tasked with creating THE Insider Threat Program for your organization! Where do you start? How do you start? This is the quickie speed brief I gave an old mentor at Starbucks recently. Tess Schrodinger (@TessSchrodinger) is a jack of all trades and a master of some. She has spoken at a variety of security conferences on such topics as counter-intelligence, insider...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
Hacking and InfoSec stuff
movies

eye 21

favorite 1

comment 0

https://creativecommons.org/licenses/by-nc-sa/4.0/ Source: https://www.youtube.com/watch?v=VOUqD8H2ZSs Uploader: 0xdade
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking
You’re arrested and your phone is held up to your face to be unlocked by the arresting officer, then sent to a forensics lab. Dystopian future or one where FaceID collides with weak self-incrimination protections for biometrics? This talk will explain how your 4th and 5th Amendment rights interact with advances in biometric technology. Along the way it will offer design suggestions for creators of mobile devices and tips to end users. Wendy Knox Everette (@wendyck) is a hacker lawyer who...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, civil rights
Hacking and InfoSec stuff
movies

eye 41

favorite 0

comment 0

This talk is an encapsulation of implemented solutions for achieving common requirements when constructing software designed to perform long term covert intelligence gathering. It is a “grab bag” of “tips and tricks” developed and or abstracted from previous works by the presenter in a variety of intelligence gathering operations, none of which will be specifically disclosed. Full source code (almost all of it written in Golang) will be provided for tactic snippets, as well as several...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, vyrus, malware
Hacking and InfoSec stuff
movies

eye 69

favorite 0

comment 0

With the demise of dtrace on macOS, and Apple’s push to rid the kernel of 3rd-party kexts, another option is needed to perform effective auditing on macOS. Lucky for us, OpenBSM fits the bill. Though quite powerful, this auditing mechanism is rather poorly documented and suffered from a variety of kernel vulnerabilities. In this talk, we’ll begin with an introductory overview of OpenBSM’s goals, capabilities, and components before going ‘behind-the-scenes’ to take a closer look at...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, openbsm, macos
Hacking and InfoSec stuff
movies

eye 40

favorite 0

comment 0

Higher education institutions have started heavily investing in cybersecurity education programs for STEM (Science, Technology, Engineering, and Mathematics) disciplines. These programs offer standard courses, such as network security, forensics, penetration testing, intrusion detection and recovery. To offer a holistic experience, these programs also include courses on business systems lifecycle, data analytics, auditing, investigation, and cyberlaw. Little, however, is being done to...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, cybersecurity education