All file downloads.
Featured Downloads
- Tastic RFID - PCB Design.zip (52078 downloads )
- Tastic RFID - Parts List.txt (20763 downloads )
- Tastic RFID - Arduino Code.zip (18316 downloads )
- Securing Your Mac: A Guide to Hardening Your Browser (PDF) - 10Jun2013 (5721 downloads )
- SearchDiggity_v3.1.0.msi (281214 downloads )
- InformationWeek – Using Google to Find Vulnerabilities – 05Mar2012 (10132 downloads )
- Enterprise Security Services (1852 downloads )
- Black Hat USA 2013 - RFID Hacking - 01 Aug 2013 - Slides (12266 downloads )
All Downloads
- 2016 Kennesaw State Cyber Security Awareness Day - Exploiting Smart Devices - 06Oct2016 (2257 downloads )
- 2018 Cybersecurity Symposium – Breaking Into a Career of Breaking In - 19Oct2018 - Slides (1742 downloads )
- 2600 Magazine-The Hacker Quarterly-Summer 2013-Splunking the Google Dork PDF (4935 downloads )
- AlertsDiggity.msi (3901 downloads )
- AlertsDiggity.zip (4483 downloads )
- APT Analyst (2618 downloads )
- Assessment and Penetration Testing Brochure (2646 downloads )
- August Case Study - Built in Security (2125 downloads )
- AWS S3 Buckets Security - Avoid Common Mistakes When Deploying Cloud-based Services (2326 downloads )
- BayThreat 2011 - Pulp Google Hacking - 09Dec2011 - Slides (7118 downloads )
- BayThreat 2011 - Putting Logs on a Diet - 11Dec2011 - Slides (2921 downloads )
- BayThreat 2012 - Securing a Start Up - 07Dec2012 - Slides (3100 downloads )
- Beast Case Study (2782 downloads )
- BetterCloud Cloud IT Live - Creating a Security Blueprint - 25Oct2016 - Slides (2297 downloads )
- Bing Hacking Alerts.xml (3042 downloads )
- Bing Hacking Database (BHDB) v2.0.txt (39062 downloads )
- BingDiggity 1.0zip (2905 downloads )
- Bishop Fox Cybersecurity Style Guide (20613 downloads )
- Bishop Fox Cybersecurity Style Guide V1.1 (1320 downloads )
- Black Hat USA - CloudBots Harvesting Crypto Coins Like a Botnet Farmer - 6Aug2014 - Slides (3111 downloads )
- Black Hat USA 2005 - Catch Me If You Can - 27July2005 - Slides (7939 downloads )
- Black Hat USA 2010 – Lord of the Bing – 29July2010 - Slides (9341 downloads )
- Black Hat USA 2011 – Pulp Google Hacking – 03Aug2011 - Slides (7805 downloads )
- Black Hat USA 2013 - Lets Get Physical - 31July2013 - Slides (11312 downloads )
- Black Hat USA 2013 - RFID Hacking - 01 Aug 2013 - Slides (12266 downloads )
- Black Hat USA 2015 - Bypass Surgery - 6Aug2015 - Slides (9691 downloads )
- Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides.pdf (4095 downloads )
- Bluebox Case Study (2180 downloads )
- BSides CMH - Check Your Privilege (Escalation) - 01Mar2019 - Slides (1532 downloads )
- BSides LV - Untwisting the Mersenne Twister - 5Aug2014 - Slides (2409 downloads )
- Bsides PDX - Resistance Networks - 27Sept2013 - Slides (3480 downloads )
- BSides SF - Twist and Shout: Ferris Bueller’s Guide to Abuse Domain Permutations - 03Mar2019 - Slides (1802 downloads )
- Business Development Executive (2093 downloads )
- CactusCon 2014 - Malware and the Syrian Civil War - 4Apr2014 - Slides (3069 downloads )
- CactusCon 2014 - Malware and the Syrian Civil War - 4Apr2014 - Slides (2100 downloads )
- CactusCon 2015 - Wireless Network Risk and Controls - 13March2015 - Slides (2655 downloads )
- CactusCon 2016 - Developing and Testing an Effective Incident Response Program - 6May2016 - Slides (2749 downloads )
- CactusCon 2016 - Telling Lies & Making Friends: Penetrating People's Emotional Barriers - 6May2016 - Slides (2937 downloads )
- CactusCon 2018 - Anatomy of an AppSec Program - 29Sept2018 - Slides (2149 downloads )
- CalPoly SLO - So You Wanna Be a Hacker? - 10Nov2014 - Slides (2988 downloads )
- CCOAITS - Incident Response Preparation - 10Jul2014 - Slides (2567 downloads )
- CCOAITS - Not the Weakest Link - 10Jul2014 - Slides (2148 downloads )
- CEIC 2006 - Defeating Forensic Analysis - 04May2006 - Slides (3695 downloads )
- Change Healthcare Case Study (2284 downloads )
- CIO Magazine - How Online Criminals Make Themselves Tough to Find, Near Impossible to Nab - May 2007 (3682 downloads )
- Coinbase Case Study (2141 downloads )
- Combined Google and Bing Hack Alerts.xml (7099 downloads )
- Converge Detroit - Homebrew Censorship Detection by Analysis of BGP Data - 16July2015 - Slides (4656 downloads )
- Core Services (2303 downloads )
- Critical Infrastructure Luncheon 2016 - Laika Boss - 03Nov2016 - Slides (2040 downloads )
- CSO Magazine - The Rise of Antiforensics - June 2007 (5652 downloads )
- CVE-2017-11779 FAQS (977 downloads )
- CVE-2017-11779 FAQS (1917 downloads )
- Cybersecurity Style Guide (2877 downloads )
- Danger Drone - 3D Print Files - 15Sept2017.zip (3799 downloads )
- Danger Drone - Parts List, Prices, and Links - 03Aug2016.xlsx (2934 downloads )
- Dark Reading University - Monitoring Threats and Measuring Risk - 31Oct2014 - Slides (2911 downloads )
- Dark Reading University - Protecting Backend Systems - 28Oct2014 - Slides (2362 downloads )
- Dark Reading University - Protecting the Customer-Facing Website - 27Oct2014 - Slides (2504 downloads )
- Dark Reading Virtual Event - Preparing a Next-Generation IT Security Strategy - 15Nov2016 - Slides (2336 downloads )
- Day of Shecurity Boston 2019 - Introduction to Linux Privilege Escalation Methods - 22Feb2019 - Slides (1493 downloads )
- Day of Shecurity Boston 2019 - Network Penetration Testing Toolkit - 22Feb2019 - Slides (1558 downloads )
- DEF CON 23 (2015) - RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID - 09Aug2015 - Slides (4361 downloads )
- DEF CON 25 (2017) - DeepHack - 30Jul2017 - Slides (2759 downloads )
- DEF CON 25 (2017) - Game of Drones - Brown Latimer - 29July2017 - Slides.PDF (11240 downloads )
- DEFCON 18 – Lord of the Bing – 30July2010 - Slides (8167 downloads )
- DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides (14413 downloads )
- DEFCON 21 (2013) - RFID Hacking - 03 Aug 2013 - Slides (37763 downloads )
- Diggity Alerts FUNdle Bundle – OPML File.xml (20259 downloads )
- Dr. Katherine Albrecht Radio Show - Interview of Fran Brown about RFID Hacking - 22Aug2013 - Recording.mp3 (2193 downloads )
- Drone Magazine UK - Hacker's Delight - Danger Drone - Oct. 2016 Issue.pdf (2531 downloads )
- Empire Hacking NYC Meetup - Server-side Spreadsheet Injections in High Impact Attacks - 12June2018 - Slides (3766 downloads )
- Enterprise Security Services (1852 downloads )
- ES Associate - Policy (1860 downloads )
- ES Associate - SDL (1938 downloads )
- Firecat - Source Code - firecat1.6.c (3379 downloads )
- Firecat - Tool Overview Guide.pdf (4420 downloads )
- Firecat v1.6 - Unix Binaries.zip (4711 downloads )
- Firecat v1.6 - Win Binaries.zip (10902 downloads )
- Formula Injection Cheat Sheet (2751 downloads )
- Forum - The Ethics of Cybersecurity - 26Feb2014.mp3 (2072 downloads )
- GHDB Reborn Dictionary - NEW ONLY.txt (173446 downloads )
- GHDB Reborn Dictionary.txt (118296 downloads )
- Google Hacking Alerts.xml (3557 downloads )
- Google_Hacking_History-TimelineData-07Mar2017.xlsx (3139 downloads )
- GoogleDiggity Cmdline.zip (15825 downloads )
- HackCon 2011 – Lord of the Bing – 16Feb2011 - Slides (6728 downloads )
- HackCon 2011 – SharePoint Hacking - 16Feb2011 - Slides (6405 downloads )
- Hacker Halted 2010 Singapore – Lord of the Bing – 26Oct2010 - Slides (6863 downloads )
- Hacker Halted USA 2011 – Pulp Google Hacking – 27Oct2011 - Slides (6906 downloads )
- Hacking CSEs - Creating Google Custom Search Engines.zip (19840 downloads )
- HOPE - Rickrolling your Neighbors with Google Chromecast - 18July2014 - Slides (2913 downloads )
- How ‘Small’ Security Errors Lead to a Security Breach (3285 downloads )
- InformationWeek – Using Google to Find Vulnerabilities – 05Mar2012 (10132 downloads )
- InfoSec World 2006 - K2 - Bleeding-Edge Anti-Forensics - Brown and Liu - 03April2006 - Slides (5839 downloads )
- InfoSec World 2010 – Google and Beyond – 21Apr2010 - Slides (6191 downloads )
- InfoSec World 2011 – Google Hacking – To Infinity and Beyond – 21Apr2011 - Slides (7094 downloads )
- InfoSec World 2012 – Pulp Google Hacking – 02Apr2012 – Slides (6512 downloads )
- InfoSec World 2013 – W4 – Using Google to Find Vulnerabilities in Your IT Environment – 14Apr2013 – Slides (9739 downloads )
- InfoSec World 2016 - RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID - 05Apr2016 - Slides (5282 downloads )
- Interop 2017 - Defeating Social Engineering, BECs, and Phishing - 17May2017 - Slides (2035 downloads )
- Interop 2017 - Developing and Testing an Effective Incident Response Program - 16May2017 - Slides (1840 downloads )
- Interop Las Vegas - Social Engineering: The Bad, Better, and Best Incident Response Plans - 4May2016 - Slides (2504 downloads )
- Introduction to AWS Cloud Security (2046 downloads )
- IoTium Case Study (1567 downloads )
- IoTium Case Study (2368 downloads )
- ISACA Phx - Protection of Information Assets - 27Feb2014 - Slides (2472 downloads )
- ISACA Phx - Wireless Network Risks and Controls - 22Jan2015 - Slides (2750 downloads )
- ISC(2) Phoenix - Effectively Operating a Bug Bounty Program - 13Aug2015 - Slides (3185 downloads )
- ISSA Journal - July 2007 - Penetration Testing: The White Hat Hacker (2566 downloads )
- ISSA LA – 4th Annual InfoSec Summit – Pulp Google Hacking – 15May2012 – Slides (7509 downloads )
- ISSA LA – Pulp Google Hacking – 15Feb2012 – Slides (6544 downloads )
- ISSA Phoenix Chapter – 05 Oct 2010 Presentation Slides (5648 downloads )
- ISSA Tucson - Untwisting the Mersenne Twister - Slides - 5Nov2014 (2369 downloads )
- ITAC 2014 - Mobile Application Testing and Code Review - 30Sept2014 - Slides (2530 downloads )
- ITAC 2014 - SCADA Hacking - Clear and Present Danger - 02Oct2014 - Slides (2956 downloads )
- ITAC 2015 - CloudBots - Abusing Free Cloud Services to Build Botnets in the Cloud - 29Sept2015 - Slides (2320 downloads )
- ITAC 2015 - Internet of Things (IoT) - Hacking Smart Devices - 29Sept2015 - Slides (2483 downloads )
- ITAC 2015 - Putting Your Logs On a Diet - Network Intrusion Detection - Best Practices - 01Oct2015 - Slides (2487 downloads )
- Job Description - Editorial Intern (1623 downloads )
- Job Description - Enterprise Security Analyst (2354 downloads )
- Job Description - Enterprise Security Associate (2196 downloads )
- Job Description - Junior System Administrator (1791 downloads )
- Job Description - Penetration Tester (3092 downloads )
- Job Description - PHX Personal and Administrative Assistant (2055 downloads )
- Job Description - Project Manager (2128 downloads )
- Job Description - SFO Junior Project Manager (1919 downloads )
- Job Description - Travel Coordinator (1908 downloads )
- Journal of Digital Forensic Practice – Challenging the Presumption of Reliability – Mar2006 PDF (3007 downloads )
- Kaspersky SAS - Ghost in the Browser: Broad-Scale Espionage with Bitsquatting - 10Apr2019 - Slides (1420 downloads )
- Kiwicon 2038AD - Getting Buzzed on Buzzwords - DeMesy - 16Nov2018 - Slides (1521 downloads )
- LCD FacePlate - 3D Files - Tastic RFID Thief.zip (5738 downloads )
- Marketing Assistant (1793 downloads )
- Marketplace.org - 1-800-Hackers Why cyber crime is no longer a dark art - 02Oct2013.mp3 (4400 downloads )
- MD4 Collision Generator - md4coll.c (4540 downloads )
- MD5 Collision Generator - md5coll.c (8219 downloads )
- Microsoft BlueHat v2 - Introducing the Metasploit Anti-Forensics Project - 13Oct2005 - Slides (3953 downloads )
- Microsoft BlueHat v8 - Real World Code Review - Liu - 17Oct2008 - Slides (5015 downloads )
- MISTI - Mobile 2013 - Mobile App Testing and Code Review - 19Nov2013 - Slides (5559 downloads )
- NPR - Apple Pay Wants To Be Your Mobile Wallet - 10Sept2014.mp3 (1650 downloads )
- NPR - Apple To Fight Court Order To Break Into Shooters iPhone - 17Feb2016.mp3 (1402 downloads )
- OWASP AppSecCali 2019 - How Perceptual Analysis Helps Bug Hunters - 24012019 - Slides (1571 downloads )
- OWASP Atlanta – Attack Chaining Advanced Maneuvers – May 2012 (3086 downloads )
- OWASP LA – SharePoint Hacking – 22Feb2012 – Slides (8744 downloads )
- OWASP Phoenix - If You Like It, Then You Shouldn't Put a Ring3 On It - 9June2015 - Slides (2348 downloads )
- Password Security Guide (2019 downloads )
- PaulDotCom - Security Weekly - Epsd 211 Pt. 1 - Liu - 16Sept2010.mp3 (3827 downloads )
- Penetration Testing Resource Guide (4254 downloads )
- Phoenix Security & Audit Conference - The Active Directory Kill Chain - 10Sept2015 - Slides (3829 downloads )
- Practising Law Institute SFO - Cybersecurity: A Hacker’s Perspective - Evolving Cyber Adversary Simulation - 06Nov2018 - Slides (1408 downloads )
- Primer to Red Teaming (2586 downloads )
- Project Manager (2064 downloads )
- QCon London - Out of the Browser Into the Fire - 08Mar2017 - Slides (2152 downloads )
- RSA 2014 - Cloud Ninja - 27Feb2014 - Slides (5314 downloads )
- SANS - AppSec Summit 2007 - Implementation Lessons Learned - 15Aug2007 - Slides (2423 downloads )
- SANS - Pentest and AppSec Summit 2009 - Realworld Code Review - 02Jun2009 - Slides (2802 downloads )
- SANS - Pentest Security Summit 2008 - Success Stories and Lessons Learned - 02Jun2008 - Slides (3363 downloads )
- SearchDiggity_v3.1.0.msi (281214 downloads )
- SearchSecurity - Securing SharePoint: SharePoint security best practices (3875 downloads )
- Securing Your Mac: A Guide to Hardening Your Browser (PDF) - 10Jun2013 (5721 downloads )
- Security Associate (1926 downloads )
- Security B-Sides Atlanta 2010 – Lord of the Bing – 08Oct2010 - Slides (7250 downloads )
- SharePoint - URL Extensions - 18MAR2012 PDF (5564 downloads )
- SharePoint Bing Hack RSS Alerts - OPML.xml (3450 downloads )
- SharePoint BingDiggity Dictionary.txt (7853 downloads )
- SharePoint Google Hack RSS Alerts - OPML.xml (3376 downloads )
- SharePoint GoogleDiggity Dictionary.txt (10213 downloads )
- SharePointURLBrute v1.1.zip (42347 downloads )
- SHODAN Hack RSS Alerts - OPML.xml (3846 downloads )
- SHODAN Hacking Database (SHDB).txt (11906 downloads )
- SPI Dynamics Expert Articles Series - Effective Controls for Attaining Continuous Application Security Throughout the Web Application Development Life Cycle - Sept2007 (2429 downloads )
- SPI Dynamics Expert Articles Series - Implementing Effective Vulnerability Remediation Strategies Within the Web Application Development Lifecycle - Aug2007 (2342 downloads )
- SPI Dynamics Expert Articles Series - Web Application Vulnerability Assessment Essentials: Your First Step to a Highly Secure Web Site - Aug2007 (2374 downloads )
- SPICON 2007 - Lessons Learned – Implementing an Application Security Program - 17Oct2007 - Slides (2487 downloads )
- Sysadmin (2012 downloads )
- TakeDownCon 2011 – Lord of the Bing – 18May2011 - Slides (7711 downloads )
- TakeDownCon 2012 – Pulp Google Hacking – 08May2012 - Slides (7965 downloads )
- Tastic RFID - Arduino Code.zip (18316 downloads )
- Tastic RFID - Parts List.txt (20763 downloads )
- Tastic RFID - PCB Design.zip (52078 downloads )
- The Business Journal of Phoenix - Even without big budget, employee theft can be stopped - Nov 2006 (2014 downloads )
- The Challenges of Automated Application Assessments in a Web 2.0 World - 12Dec2009 (2755 downloads )
- The Gold Standard in Security Consulting - About Bishop Fox eBook (3475 downloads )
- The Good, the Bad, and the Ridiculous - SANS Penetration Testing Summit 2010 (2585 downloads )
- The ISSA Journal – SearchDiggity- Dig Before They Do – 04Sept2012 (8354 downloads )
- Threat Modeling Brochure (2408 downloads )
- ToorCon 12 – Lord of the Bing – 24Oct2010 - Slides (3512 downloads )
- ToorCon 2014 - If You Like It Then You Shouldn't Put a Ring3 On It - 25Oct2014 - Slides (2663 downloads )
- Toorcon 7 - Introducing the Metasploit Anti-Forensics Project - 16Sept2005 - Slides (9874 downloads )
- UAT TechTrek - Lessons on Security Consulting - 6Nov2014 - Slides (2804 downloads )
- VPN Comparison Guide - Chart (1371 downloads )
- Zephyr Health Case Study (2114 downloads )