Parent directory/ | - | - |
DEF CON 23 - miaubiz - Put on your tinfo_t hat if youre my type.txt | 7.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - miaubiz - Put on your tinfo_t hat if youre my type - Slides.srt | 11.7 KiB | 2020 May 16 03:56 |
DEF CON 23 - miaubiz - Put on your tinfo_t hat if youre my type - Slides.mp4 | 14.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - atlas - Fun with Symboliks.txt | 21.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - atlas - Fun with Symboliks - Slides.srt | 32.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - atlas - Fun with Symboliks - Slides.mp4 | 38.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction.txt | 46.9 KiB | 2020 May 16 03:56 |
DEF CON 23 - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Slides.srt | 36.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Slides.mp4 | 67.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto.txt | 11.0 KiB | 2020 May 16 03:56 |
DEF CON 23 - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Slides.srt | 16.0 KiB | 2020 May 16 03:56 |
DEF CON 23 - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Slides.mp4 | 45.3 MiB | 2020 May 27 04:51 |
DEF CON 23 - Zack Fasel - Seeing through the Fog.txt | 31.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Zack Fasel - Seeing through the Fog - Slides.srt | 46.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Zack Fasel - Seeing through the Fog - Slides.mp4 | 32.3 MiB | 2020 May 27 04:51 |
DEF CON 23 - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy.txt | 29.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Slides.srt | 43.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Slides.mp4 | 32.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware.txt | 29.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Slides.srt | 45.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Slides.mp4 | 43.0 MiB | 2020 May 27 04:51 |
DEF CON 23 - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking.txt | 49.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Slides.srt | 74.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Slides.mp4 | 53.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster.txt | 29.5 KiB | 2020 May 16 03:56 |
DEF CON 23 - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Slides.srt | 44.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Slides.mp4 | 42.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Weston Hecker - Goodbye Memory Scraping Malware.txt | 30.7 KiB | 2020 May 16 03:56 |
DEF CON 23 - Weston Hecker - Goodbye Memory Scraping Malware - Slides.srt | 45.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Weston Hecker - Goodbye Memory Scraping Malware - Slides.mp4 | 34.7 MiB | 2020 May 27 04:51 |
DEF CON 23 - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures.txt | 29.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Slides.srt | 43.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Slides.mp4 | 34.0 MiB | 2020 May 27 04:51 |
DEF CON 23 - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Slides.srt | 38.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Slides.mp4 | 41.4 MiB | 2020 May 27 04:51 |
DEF CON 23 - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows.txt | 20.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Slides.srt | 29.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Slides.mp4 | 32.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams.txt | 19.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Slides.srt | 28.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Slides.mp4 | 47.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Tottenkoph and IrishMASMS - Hackers Hiring Hackers.txt | 33.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Slides.srt | 48.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Slides.mp4 | 41.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow.txt | 28.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Slides.srt | 42.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Slides.mp4 | 38.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool.txt | 39.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Slides.srt | 58.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Slides.mp4 | 51.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5.txt | 38.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Slides.srt | 56.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Slides.mp4 | 29.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - Tamas Szakaly - Shall We Play a Game.txt | 20.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Tamas Szakaly - Shall We Play a Game - Slides.srt | 29.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Tamas Szakaly - Shall We Play a Game - Slides.mp4 | 40.7 MiB | 2020 May 27 04:51 |
DEF CON 23 - Spot the FED.txt | 6.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Spot the FED.srt | 9.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis.txt | 23.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Slides.srt | 34.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Slides.mp4 | 44.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Sean Pierce - Abusing native Shims for Post Exploitation.txt | 30.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Sean Pierce - Abusing native Shims for Post Exploitation - Slides.srt | 44.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Sean Pierce - Abusing native Shims for Post Exploitation - Slides.mp4 | 47.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense.txt | 40.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Slides.srt | 60.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Slides.mp4 | 49.7 MiB | 2020 May 27 04:51 |
DEF CON 23 - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots.txt | 23.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Slides.srt | 35.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Slides.mp4 | 31.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Sarah Edwards - Ubiquity Forensics - Your iCloud and You.txt | 30.9 KiB | 2020 May 16 03:56 |
DEF CON 23 - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Slides.srt | 45.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Slides.mp4 | 41.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars.txt | 36.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Slides.srt | 54.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Slides.mp4 | 47.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - Ryan Oneill - Advances in Linux Process Forensics Using ECFS.txt | 37.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Slides.srt | 56.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Slides.mp4 | 42.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Ryan Mitchell - Separating Bots from the Humans.txt | 11.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ryan Mitchell - Separating Bots from the Humans - Slides.srt | 17.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ryan Mitchell - Separating Bots from the Humans - Slides.mp4 | 32.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Ryan Castellucci - Cracking Cryptocurrency Brainwallets.txt | 29.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.srt | 44.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.mp4 | 39.0 MiB | 2020 May 27 04:51 |
DEF CON 23 - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle.txt | 36.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle - Slides.srt | 53.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments.txt | 41.4 KiB | 2020 May 16 03:56 |
DEF CON 23 - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Slides.srt | 62.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Slides.mp4 | 44.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline.txt | 40.1 KiB | 2020 May 16 03:56 |
DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Slides.srt | 59.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Slides.mp4 | 37.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer.txt | 36.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Slides.srt | 53.6 KiB | 2020 May 16 03:56 |
DEF CON 23 - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Slides.mp4 | 38.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP.txt | 26.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Slides.srt | 39.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Slides.mp4 | 51.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Richard Thieme - Hacking the Human Body and Brain.txt | 30.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Richard Thieme - Hacking the Human Body and Brain - Slides.srt | 45.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Richard Thieme - Hacking the Human Body and Brain - Slides.mp4 | 36.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Rich Kelley - Harness - Powershell Weaponization Made Easy.txt | 10.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Rich Kelley - Harness - Powershell Weaponization Made Easy - Slides.srt | 16.0 KiB | 2020 May 16 03:56 |
DEF CON 23 - Rich Kelley - Harness - Powershell Weaponization Made Easy - Slides.mp4 | 20.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Qing YANG - Im A Newbie Yet I Can Hack ZigBee.txt | 11.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Slides.srt | 16.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Slides.mp4 | 16.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery.txt | 42.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Slides.srt | 62.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Slides.mp4 | 38.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - Peter Shipley - Insteon - False Security and Deceptive Documentation.txt | 16.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Peter Shipley - Insteon - False Security and Deceptive Documentation - Slides.srt | 24.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Peter Shipley - Insteon - False Security and Deceptive Documentation - Slides.mp4 | 44.7 MiB | 2020 May 27 04:51 |
DEF CON 23 - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain.txt | 15.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Slides.srt | 22.7 KiB | 2020 May 16 03:56 |
DEF CON 23 - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Slides.mp4 | 19.7 MiB | 2020 May 27 04:51 |
DEF CON 23 - Patrick Wardle - Stick That In Your root Pipe and Smoke It.txt | 33.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Slides.srt | 50.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Slides.mp4 | 43.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Patrick Wardle - DLL Hijacking on OS X.txt | 31.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Patrick Wardle - DLL Hijacking on OS X - Slides.srt | 47.0 KiB | 2020 May 16 03:56 |
DEF CON 23 - Patrick Wardle - DLL Hijacking on OS X - Slides.mp4 | 48.3 MiB | 2020 May 27 04:51 |
DEF CON 23 - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis.txt | 70.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Slides.srt | 103.5 KiB | 2020 May 16 03:56 |
DEF CON 23 - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Slides.mp4 | 81.3 MiB | 2020 May 27 04:51 |
DEF CON 23 - Panel - ThunderStrike 2- Sith Strike.txt | 25.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - ThunderStrike 2- Sith Strike - Slides.srt | 38.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - ThunderStrike 2- Sith Strike - Slides.mp4 | 40.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Panel - Switches Get Stitches.txt | 20.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Switches Get Stitches - Slides.srt | 30.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Switches Get Stitches - Slides.mp4 | 42.7 MiB | 2020 May 27 04:51 |
DEF CON 23 - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research.txt | 74.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Slides.srt | 111.4 KiB | 2020 May 16 03:56 |
DEF CON 23 - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Slides.mp4 | 83.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web.txt | 28.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Slides.srt | 43.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Slides.mp4 | 41.4 MiB | 2020 May 27 04:51 |
DEF CON 23 - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques.txt | 17.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Slides.srt | 26.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Slides.mp4 | 30.4 MiB | 2020 May 27 04:51 |
DEF CON 23 - Panel - DEF CON Comedy Inception.txt | 60.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - DEF CON Comedy Inception - Slides.srt | 86.2 KiB | 2020 May 16 03:56 |
DEF CON 23 - Panel - DEF CON Comedy Inception - Slides.mp4 | 104.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Panel - DEF CON 101 The Panel.txt | 58.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - DEF CON 101 The Panel - Slides.srt | 86.5 KiB | 2020 May 16 03:56 |
DEF CON 23 - Panel - DEF CON 101 The Panel - Slides.mp4 | 55.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Panel - Contests Closing Ceremonies.txt | 20.1 KiB | 2020 May 16 03:56 |
DEF CON 23 - Panel - Contests Closing Ceremonies - Slides.srt | 29.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Contests Closing Ceremonies - Slides.mp4 | 22.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Panel - Closing Ceremonies.txt | 52.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Closing Ceremonies - Slides.srt | 77.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Closing Ceremonies - Slides.mp4 | 178.3 MiB | 2020 May 27 04:51 |
DEF CON 23 - Panel - Ask the EFF - The Year in Digital Civil Liberties.txt | 48.5 KiB | 2020 May 16 03:56 |
DEF CON 23 - Panel - Ask the EFF - The Year in Digital Civil Liberties - Slides.srt | 72.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs.txt | 29.2 KiB | 2020 May 16 03:56 |
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs - Slides.srt | 43.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs - Slides.mp4 | 31.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Omer Coskun - Why nation-state malwares target Telco Networks.txt | 20.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Omer Coskun - Why nation-state malwares target Telco Networks - Slides.srt | 31.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Omer Coskun - Why nation-state malwares target Telco Networks - Slides.mp4 | 49.7 MiB | 2020 May 27 04:51 |
DEF CON 23 - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS.txt | 35.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Slides.srt | 52.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Slides.mp4 | 39.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack.txt | 25.9 KiB | 2020 May 16 03:56 |
DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Slides.srt | 39.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Slides.mp4 | 42.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Slides.srt | 25.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Slides.mp4 | 29.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Mike Sconzo - I Am Packer And So Can You.txt | 31.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Mike Sconzo - I Am Packer And So Can You - Slides.srt | 46.3 KiB | 2020 May 16 03:56 |
DEF CON 23 - Mike Sconzo - I Am Packer And So Can You - Slides.mp4 | 40.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Mike Ryan and Richo Healey - Hacking Electric Skateboards.txt | 21.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Slides.srt | 32.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Slides.mp4 | 45.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop.txt | 18.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Slides.srt | 27.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Slides.mp4 | 49.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF.txt | 25.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Slides.srt | 38.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Slides.mp4 | 51.4 MiB | 2020 May 27 04:51 |
DEF CON 23 - Michael Schrenk - Applied Intelligence - Using Information Thats Not There.txt | 31.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Slides.srt | 47.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Slides.mp4 | 35.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers.txt | 38.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Slides.srt | 58.1 KiB | 2020 May 16 03:56 |
DEF CON 23 - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Slides.mp4 | 45.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System.txt | 39.1 KiB | 2020 May 16 03:56 |
DEF CON 23 - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Slides.srt | 57.9 KiB | 2020 May 16 03:56 |
DEF CON 23 - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Slides.mp4 | 46.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars.txt | 40.1 KiB | 2020 May 16 03:56 |
DEF CON 23 - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Slides.srt | 60.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Slides.mp4 | 49.0 MiB | 2020 May 27 04:51 |
DEF CON 23 - Marte L0ge - Tell me who you are and I will tell you your lock pattern.txt | 8.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Slides.srt | 12.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Slides.mp4 | 13.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb.txt | 25.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Slides.srt | 38.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Slides.mp4 | 61.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic.txt | 29.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Slides.srt | 44.1 KiB | 2020 May 16 03:56 |
DEF CON 23 - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Slides.mp4 | 35.3 MiB | 2020 May 27 04:51 |
DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S.txt | 27.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Slides.srt | 41.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Slides.mp4 | 49.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings.txt | 12.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings - Slides.srt | 18.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings - Slides.mp4 | 16.7 MiB | 2020 May 27 04:51 |
DEF CON 23 - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR.txt | 13.8 KiB | 2020 May 16 03:56 |
DEF CON 23 - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Slides.srt | 20.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Slides.mp4 | 45.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion.txt | 33.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Slides.srt | 50.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Slides.mp4 | 45.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Ken Westin - Confessions of a Professional Cyber Stalker.txt | 37.3 KiB | 2020 May 16 03:56 |
DEF CON 23 - Ken Westin - Confessions of a Professional Cyber Stalker - Slides.srt | 55.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ken Westin - Confessions of a Professional Cyber Stalker - Slides.mp4 | 38.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Justin Engler - Secure Messaging for Normal People.txt | 43.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Justin Engler - Secure Messaging for Normal People - Slides.srt | 64.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Justin Engler - Secure Messaging for Normal People - Slides.mp4 | 44.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC.txt | 36.8 KiB | 2020 May 16 03:56 |
DEF CON 23 - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Slides.srt | 54.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Slides.mp4 | 39.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Joshua J Drake - Stagefright - Scary Code in the Heart of Android.txt | 30.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Slides.srt | 44.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Slides.mp4 | 51.0 MiB | 2020 May 27 04:51 |
DEF CON 23 - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.txt | 22.9 KiB | 2020 May 16 03:56 |
DEF CON 23 - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.srt | 34.8 KiB | 2020 May 16 03:56 |
DEF CON 23 - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.mp4 | 61.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - John Seymour - Quantum Classification of Malware.txt | 25.3 KiB | 2020 May 16 03:56 |
DEF CON 23 - John Seymour - Quantum Classification of Malware - Slides.srt | 38.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - John Seymour - Quantum Classification of Malware - Slides.mp4 | 22.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - John Menerick - Backdooring Git.txt | 26.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - John Menerick - Backdooring Git - Slides.srt | 40.1 KiB | 2020 May 16 03:56 |
DEF CON 23 - John Menerick - Backdooring Git - Slides.mp4 | 45.4 MiB | 2020 May 27 04:51 |
DEF CON 23 - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants.txt | 27.5 KiB | 2020 May 16 03:56 |
DEF CON 23 - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Slides.srt | 41.3 KiB | 2020 May 16 03:56 |
DEF CON 23 - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Slides.mp4 | 40.4 MiB | 2020 May 27 04:51 |
DEF CON 23 - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications.txt | 31.0 KiB | 2020 May 16 03:56 |
DEF CON 23 - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Slides.srt | 46.2 KiB | 2020 May 16 03:56 |
DEF CON 23 - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Slides.mp4 | 36.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Jean-Philippe Aumasson - Quantum Computers vs Computers Security.txt | 14.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Slides.srt | 21.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Slides.mp4 | 27.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015.txt | 34.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Slides.srt | 52.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Slides.mp4 | 43.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers.txt | 19.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Slides.srt | 29.1 KiB | 2020 May 16 03:56 |
DEF CON 23 - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Slides.mp4 | 47.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Ian Latter - Remote Access - the APT.txt | 32.0 KiB | 2020 May 16 03:56 |
DEF CON 23 - Ian Latter - Remote Access - the APT - Slides.srt | 47.6 KiB | 2020 May 16 03:56 |
DEF CON 23 - Ian Latter - Remote Access - the APT - Slides.mp4 | 50.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Ian Kline - LTE Recon and Tracking with RTLSDR.txt | 9.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Ian Kline - LTE Recon and Tracking with RTLSDR - Slides.srt | 13.5 KiB | 2020 May 16 03:56 |
DEF CON 23 - Ian Kline - LTE Recon and Tracking with RTLSDR - Slides.mp4 | 10.0 MiB | 2020 May 27 04:51 |
DEF CON 23 - Gregory Picket - Staying Persistent in Software Defined Networks.txt | 32.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Gregory Picket - Staying Persistent in Software Defined Networks - Slides.srt | 49.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Gregory Picket - Staying Persistent in Software Defined Networks - Slides.mp4 | 41.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence.txt | 41.3 KiB | 2020 May 16 03:56 |
DEF CON 23 - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Slides.srt | 61.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Slides.mp4 | 47.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Graham and Maynor - HamSammich - long distance proxying over radio.txt | 21.0 KiB | 2020 May 16 03:56 |
DEF CON 23 - Graham and Maynor - HamSammich - long distance proxying over radio - Slides.srt | 30.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Graham and Maynor - HamSammich - long distance proxying over radio - Slides.mp4 | 26.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack.txt | 33.4 KiB | 2020 May 16 03:56 |
DEF CON 23 - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Slides.srt | 49.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Slides.mp4 | 33.3 MiB | 2020 May 27 04:51 |
DEF CON 23 - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter.txt | 38.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Slides.srt | 57.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Slides.mp4 | 48.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID.txt | 33.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Slides.srt | 49.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Slides.mp4 | 52.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Fernando Arnabold - Abusing XSLT for Practical Attacks.txt | 27.1 KiB | 2020 May 16 03:56 |
DEF CON 23 - Fernando Arnabold - Abusing XSLT for Practical Attacks - Slides.srt | 40.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Fernando Arnabold - Abusing XSLT for Practical Attacks - Slides.mp4 | 28.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Etienne Martineau - The art of cache timing covert channel on x86 multi-core.txt | 28.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Slides.srt | 43.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Slides.mp4 | 38.7 MiB | 2020 May 27 04:51 |
DEF CON 23 - Eric-XlogicX-Davisson - REvisiting RE DoS.txt | 35.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Eric-XlogicX-Davisson - REvisiting RE DoS - Slides.srt | 52.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Eric-XlogicX-Davisson - REvisiting RE DoS - Slides.mp4 | 55.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers.txt | 11.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Slides.srt | 17.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Slides.mp4 | 17.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - Eijah - Crypto for Hackers.txt | 39.9 KiB | 2020 May 16 03:56 |
DEF CON 23 - Eijah - Crypto for Hackers - Slides.srt | 59.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Eijah - Crypto for Hackers - Slides.mp4 | 42.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Dr Phil Polstra - One Device to Pwn Them All.txt | 23.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Dr Phil Polstra - One Device to Pwn Them All - Slides.srt | 34.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Dr Phil Polstra - One Device to Pwn Them All - Slides.mp4 | 36.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Dr Phil Polstra - Hacker in the Wires.txt | 25.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Dr Phil Polstra - Hacker in the Wires - Slides.srt | 37.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Dr Phil Polstra - Hacker in the Wires - Slides.mp4 | 43.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs.txt | 24.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - Slides.srt | 36.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - Slides.mp4 | 38.1 MiB | 2020 May 27 04:51 |
DEF CON 23 - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems.txt | 25.6 KiB | 2020 May 16 03:56 |
DEF CON 23 - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Slides.srt | 38.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Slides.mp4 | 45.3 MiB | 2020 May 27 04:51 |
DEF CON 23 - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You.txt | 32.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Slides.srt | 49.1 KiB | 2020 May 16 03:56 |
DEF CON 23 - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Slides.mp4 | 27.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - David Huerta - Alice and Bob are Really Confused.txt | 33.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - David Huerta - Alice and Bob are Really Confused - Slides.mp4 | 45.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - David An - When the Secretary of State says Please Stop Hacking Us.txt | 18.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - David An - When the Secretary of State says Please Stop Hacking Us - Slides.srt | 27.2 KiB | 2020 May 16 03:56 |
DEF CON 23 - David An - When the Secretary of State says Please Stop Hacking Us - Slides.mp4 | 18.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns.txt | 25.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Slides.srt | 37.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Slides.mp4 | 38.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You.txt | 35.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Slides.srt | 52.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Slides.mp4 | 57.0 MiB | 2020 May 27 04:51 |
DEF CON 23 - Dan Kaminsky - I want these bugs off my Internet.txt | 27.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Dan Kaminsky - I want these bugs off my Internet - Slides.srt | 40.3 KiB | 2020 May 16 03:56 |
DEF CON 23 - Dan Kaminsky - I want these bugs off my Internet - Slides.mp4 | 46.4 MiB | 2020 May 27 04:51 |
DEF CON 23 - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment.txt | 22.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Slides.srt | 33.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Slides.mp4 | 41.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village.txt | 19.9 KiB | 2020 May 16 03:56 |
DEF CON 23 - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Slides.srt | 32.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Slides.mp4 | 35.0 MiB | 2020 May 27 04:51 |
DEF CON 23 - DT and 1057 - Welcome to DEF CON.txt | 24.3 KiB | 2020 May 16 03:55 |
DEF CON 23 - DT and 1057 - Welcome to DEF CON - Slides.srt | 60.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - DT and 1057 - Welcome to DEF CON - Slides.mp4 | 32.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research.txt | 32.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Slides.srt | 48.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Slides.mp4 | 46.0 MiB | 2020 May 27 04:51 |
DEF CON 23 - Craig Young - How to Train Your RFID Hacking Tools.txt | 26.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Craig Young - How to Train Your RFID Hacking Tools - Slides.srt | 39.3 KiB | 2020 May 16 03:56 |
DEF CON 23 - Craig Young - How to Train Your RFID Hacking Tools - Slides.mp4 | 30.3 MiB | 2020 May 27 04:51 |
DEF CON 23 - Cory Doctorow - Fighting Back in the War on General Purpose Computers.txt | 46.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Cory Doctorow - Fighting Back in the War on General Purpose Computers - Slides.srt | 70.0 KiB | 2020 May 16 03:56 |
DEF CON 23 - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit.txt | 35.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Slides.srt | 53.2 KiB | 2020 May 16 03:56 |
DEF CON 23 - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Slides.mp4 | 49.4 MiB | 2020 May 27 04:51 |
DEF CON 23 - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service.txt | 36.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Slides.srt | 54.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Slides.mp4 | 35.4 MiB | 2020 May 27 04:51 |
DEF CON 23 - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF.txt | 21.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Slides.srt | 32.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Slides.mp4 | 51.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Chris Sistrunk - NSM 101 for ICS.txt | 24.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Chris Sistrunk - NSM 101 for ICS - Slides.srt | 36.7 KiB | 2020 May 16 03:56 |
DEF CON 23 - Chris Sistrunk - NSM 101 for ICS - Slides.mp4 | 35.2 MiB | 2020 May 27 04:51 |
DEF CON 23 - Chris Rock - I Will Kill You.txt | 13.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Chris Rock - I Will Kill You - Slides.srt | 20.0 KiB | 2020 May 16 03:56 |
DEF CON 23 - Chris Rock - I Will Kill You - Slides.mp4 | 39.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Chris Domas - Repsych - Psychological Warfare in Reverse Engineering.txt | 19.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Slides.srt | 29.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Slides.mp4 | 48.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Charlie Miller - Remote exploitation of an unaltered passenger vehicle.txt | 23.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Slides.srt | 34.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Slides.mp4 | 53.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Bruce Schneier - Questions and Answers.txt | 32.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - Bruce Schneier - Questions and Answers - Slides.srt | 48.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Bruce Potter - A Hackers Guide to Risk.txt | 56.0 KiB | 2020 May 16 03:56 |
DEF CON 23 - Bruce Potter - A Hackers Guide to Risk - Slides.srt | 43.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Bruce Potter - A Hackers Guide to Risk - Slides.mp4 | 47.9 MiB | 2020 May 27 04:51 |
DEF CON 23 - Brent White - Hacking Web Apps.txt | 27.3 KiB | 2020 May 16 03:56 |
DEF CON 23 - Brent White - Hacking Web Apps - Slides.srt | 40.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Brent White - Hacking Web Apps - Slides.mp4 | 31.4 MiB | 2020 May 27 04:51 |
DEF CON 23 - Beccaro and Collura - Extracting the Painful blue-tooth.txt | 20.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Beccaro and Collura - Extracting the Painful blue-tooth - Slides.srt | 29.9 KiB | 2020 May 16 03:56 |
DEF CON 23 - Beccaro and Collura - Extracting the Painful blue-tooth - Slides.mp4 | 38.5 MiB | 2020 May 27 04:51 |
DEF CON 23 - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed.txt | 15.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Slides.srt | 22.8 KiB | 2020 May 16 03:55 |
DEF CON 23 - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Slides.mp4 | 45.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring.txt | 22.6 KiB | 2020 May 16 03:55 |
DEF CON 23 - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Slides.srt | 33.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Slides.mp4 | 31.0 MiB | 2020 May 27 04:51 |
DEF CON 23 - AmmonRa - How to hack your way out of home detention.txt | 20.9 KiB | 2020 May 16 03:55 |
DEF CON 23 - AmmonRa - How to hack your way out of home detention - Slides.srt | 30.4 KiB | 2020 May 16 03:55 |
DEF CON 23 - AmmonRa - How to hack your way out of home detention - Slides.mp4 | 29.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track.txt | 15.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Slides.srt | 23.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Slides.mp4 | 32.6 MiB | 2020 May 27 04:51 |
DEF CON 23 - Alejandro Mayorkas - Working together to keep the Internet safe and secure.txt | 24.7 KiB | 2020 May 16 03:55 |
DEF CON 23 - Alejandro Mayorkas - Working together to keep the Internet safe and secure - Slides.srt | 37.0 KiB | 2020 May 16 03:55 |
DEF CON 23 - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns.txt | 29.4 KiB | 2020 May 16 03:56 |
DEF CON 23 - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Slides.srt | 44.2 KiB | 2020 May 16 03:55 |
DEF CON 23 - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Slides.mp4 | 29.8 MiB | 2020 May 27 04:51 |
DEF CON 23 - Aaron Grattafiori - Linux Containers - Future or Fantasy.txt | 33.1 KiB | 2020 May 16 03:55 |
DEF CON 23 - Aaron Grattafiori - Linux Containers - Future or Fantasy - Slides.srt | 49.6 KiB | 2020 May 16 03:56 |
DEF CON 23 - Aaron Grattafiori - Linux Containers - Future or Fantasy - Slides.mp4 | 33.0 MiB | 2020 May 27 04:51 |
DEF CON 23 - 1057 - RICKASTLEY.txt | 21.9 KiB | 2020 May 16 03:56 |
DEF CON 23 - 1057 - RICKASTLEY - Slides.srt | 32.5 KiB | 2020 May 16 03:55 |
DEF CON 23 - 1057 - RICKASTLEY - Slides.mp4 | 32.4 MiB | 2020 May 27 04:51 |