light
Invidious

TROOPERS24

 Subscribe
 RSS
TROOPERS IT Security Conference | 34 videos | Updated 10 months ago
View playlist on YouTube | Switch Invidious Instance


2:43

TROOPERS24 Aftermovie

TROOPERS IT Security Conference

33:44

TROOPERS24: Keynote - A question of time

TROOPERS IT Security Conference

51:03

TROOPERS24: The Red Teamer’s Guide to Deception

TROOPERS IT Security Conference

58:07

TROOPERS24: Fuzzing at Mach Speed: Uncovering IPC Vulnerabilities on MacOS

TROOPERS IT Security Conference

51:38

TROOPERS24: How to travel the C SAFely with .json when there are no Argonauts

TROOPERS IT Security Conference

57:56

TROOPERS24: IBM i for Wintel Hackers

TROOPERS IT Security Conference

1:03:20

TROOPERS24: A Decade of Active Directory Attacks: What We've Learned & What's Next

TROOPERS IT Security Conference

45:32

TROOPERS24: Say Hello to your new cache flow!

TROOPERS IT Security Conference

53:54

TROOPERS24: ADillesHeel - Making the Impossible Possible in AD Attack Path Analysis

TROOPERS IT Security Conference

44:07

TROOPERS24: Decrypting the Directory - A Journey into a static analysis of the Active Directory NTDS

TROOPERS IT Security Conference

58:44

TROOPERS24: Open Source Vulnerability Management for Software Development and Cloud Environments

TROOPERS IT Security Conference

59:26

TROOPERS24: From ASCII to UTF-16: Leveraging Encodings to Break Software

TROOPERS IT Security Conference

51:22

TROOPERS24: WatchWitch — Hacking the Apple Watch

TROOPERS IT Security Conference

54:33

TROOPERS24: 10 Years of Windows Privilege Escalation with "Potatoes"

TROOPERS IT Security Conference

1:02:50

TROOPERS24: Forensic Security Monitoring in Automotive Cybersecurity

TROOPERS IT Security Conference

53:27

TROOPERS24: DoubleDrive - Double Agents Hide Behind The Clouds

TROOPERS IT Security Conference

54:49

TROOPERS24: Relay Your Heart Away - An OPSEC-Conscious Approach to 445 Takeover

TROOPERS IT Security Conference

1:08:53

TROOPERS24: Analyzing and Executing ADCS Attack Paths with BloodHound

TROOPERS IT Security Conference

1:04:00

TROOPERS24: So You Performed A Forest Recovery – The Sequel

TROOPERS IT Security Conference

51:15

TROOPERS24: The (almost) complete LDAP guide

TROOPERS IT Security Conference

56:56

TROOPERS24: Breaking Barriers and Boundaries

TROOPERS IT Security Conference

51:35

TROOPERS24: Hitchhiker's Guide to Automotive Container Security using eBPF

TROOPERS IT Security Conference

58:15

TROOPERS24: Considerations on AI Security

TROOPERS IT Security Conference

58:16

TROOPERS24: V2GEvil: Ghost in the wires

TROOPERS IT Security Conference

51:04

TROOPERS24: Exploiting Token-Based Authentication: Attacking and Defending Identities in the 2020s.

TROOPERS IT Security Conference

55:27

TROOPERS24: Attacking Primary Refresh Tokens using their MacOS implementation

TROOPERS IT Security Conference

1:00:55

TROOPERS24: Deep Dive into Windows Defender: Smart App Control and ETW

TROOPERS IT Security Conference

51:11

TROOPERS24: Attacking and Defending Kubernetes Cluster with KubeHound Attack Graph Model

TROOPERS IT Security Conference

49:37

TROOPERS24: So I became a node: Kubernetes bootstrap tokens and AKS

TROOPERS IT Security Conference

1:01:37

TROOPERS24: Misconfiguration Manager: Overlooked and Overprivileged

TROOPERS IT Security Conference

26:28

TROOPERS24: Insert coin: Hacking arcades for fun

TROOPERS IT Security Conference

27:02

TROOPERS24: Complexity Kills: Examining IT Security Challenges in Healthcare Facilities

TROOPERS IT Security Conference

31:46

TROOPERS24: The Registry Rundown

TROOPERS IT Security Conference

31:42

TROOPERS24: Apple CarPlay - What's Under the Hood

TROOPERS IT Security Conference

Original source code / Modified source code Documentation
Released under the AGPLv3 on GitHub. View JavaScript license information. View privacy policy.
Services Forum Donate @ Tiekoetter.com Donate @ Invidious.io Current version: 2025.05.29-35e6fe36 @ master