Media Server
Home
|
Mastodon
|
Forums
|
Groups
|
FAQ
|
RSS
|
.onion
|
/DEF CON 24/DEF CON 24 presentations/
File Name
↓
File Size
↓
Date
↓
Parent directory/
-
-
DEFCON-24-Amro-Abdelgawad-Extras/
-
2016 Aug 05 00:15
DEFCON-24-Jonathan-Brossard-Extras/
-
2016 Aug 05 00:15
DEFCON-24-Lucas-Lundgren-Extras/
-
2016 Aug 05 00:15
DEFCON-24-Mike-Rich-Extras/
-
2020 May 24 15:44
DEFCON-24-Regilero-Extras/
-
2018 Jul 31 00:47
DEFCON-24-Robert-Olson-Extras/
-
2024 Jul 26 04:09
DEFCON-24-Seymour-Tully-Extras/
-
2016 Aug 05 00:15
DEFCON-24-SixVolts-and-Haystack-Extras/
-
2020 May 24 15:44
DEF CON 24 - 3alarmlampscoot-DIY-Nukeproofing.pdf
3.5 MiB
2020 May 16 10:32
DEF CON 24 - Aaron-Luo-Drones-Hijacking-Multi-Dimensional-Attack-Vectors-And-Countermeasures-UPDATED.pdf
4.6 MiB
2020 May 16 10:32
DEF CON 24 - Adam-Donenfeld-Stumping-The-Mobile-Chipset-UPDATED.pdf
4.2 MiB
2020 May 16 10:32
DEF CON 24 - Adam-Donenfeld-Stumping-The-Mobile-Chipset-WP-UPDATED.pdf
1.1 MiB
2020 May 16 10:32
DEF CON 24 - Adam-Donenfeld-Stumping-The-Mobile-Chipset.pdf
2.7 MiB
2020 May 16 10:32
DEF CON 24 - Allan-Cecil-dwangoAC-Tasbot-The-Perfectionist-UPDATED.pdf
11.2 MiB
2020 May 16 10:32
DEF CON 24 - Allan-Cecil-dwangoAC-Tasbot-The-Perfectionist.pdf
7.1 MiB
2020 May 16 10:32
DEF CON 24 - Amro-Abdelgawad-The-Remote-Metamorphic-Engine-UPDATED.pdf
3.4 MiB
2020 May 16 10:32
DEF CON 24 - Amro-Abdelgawad-The-Remote-Metamorphic-Engine.pdf
2.4 MiB
2020 May 16 10:32
DEF CON 24 - Anch-So-you-want-to-be-a-pentester-DC101.pdf
572.9 KiB
2020 May 16 10:32
DEF CON 24 - Ang-Cui-and-Jatin-Kataria-A-Monitor-Darkly-UPDATED.pdf
136.1 MiB
2020 May 16 10:32
DEF CON 24 - Anto-Joseph-Fuzzing-Android-Devices.pdf
30.2 MiB
2020 May 16 10:32
DEF CON 24 - Arnaud-Soullie-Workshop-Pentesting-ICS-101.pdf
4.1 MiB
2020 May 16 10:32
DEF CON 24 - Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection-UPDATED.pdf
2.7 MiB
2020 May 16 10:32
DEF CON 24 - Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection-Writeup.pdf
3.1 MiB
2020 May 16 10:32
DEF CON 24 - Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection.pdf
2.4 MiB
2020 May 16 10:32
DEF CON 24 - Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime-Extras-UPDATED.txt
306 B
2020 May 16 10:32
DEF CON 24 - Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime-UPDATED.pdf
4.9 MiB
2020 May 16 10:32
DEF CON 24 - Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime.pdf
705.1 KiB
2020 May 16 10:32
DEF CON 24 - Bertin-Bervis-James-Jara-Exploiting-And-Attacking-Seismological-Networks-Remotely.pdf
5.3 MiB
2020 May 16 10:32
DEF CON 24 - Bigezy-Saci-Pinworm-MITM-for-Metadata.pdf
1.2 MiB
2020 May 16 10:32
DEF CON 24 - Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle-UPDATED.pdf
4.4 MiB
2020 May 16 10:32
DEF CON 24 - Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle.pdf
1.3 MiB
2020 May 16 10:32
DEF CON 24 - Brad-Woodberg-Malware-Command-And-Control-Channels-A-Journey-Into-Darkness-UPDATED.pdf
2.7 MiB
2020 May 16 10:32
DEF CON 24 - Brad-Woodberg-Malware-Command-And-Control-Channels-A-Journey-Into-Darkness.pdf
1.7 MiB
2020 May 16 10:32
DEF CON 24 - Bryant-Zadegan-Ryan-Lester-Abusing-Bleeding-Edge-Web-Standards-For-Appsec-Glory-UPDATED.pdf
24.6 MiB
2020 May 16 10:32
DEF CON 24 - Bryant-Zadegan-Ryan-Lester-Abusing-Bleeding-Edge-Web-Standards-For-Appsec-Glory.pdf
2.5 MiB
2020 May 16 10:32
DEF CON 24 - Bull-Matthews-Trumbull-VLAN-Hopping-ARP-MITM-in-Virtualized-UPDATED.pdf
2.8 MiB
2020 May 16 10:32
DEF CON 24 - Bull-Matthews-Trumbull-VLAN-Hopping-ARP-MITM-in-Virtualized-WP-UPDATED.pdf
294.2 KiB
2020 May 16 10:32
DEF CON 24 - Bursztein-Picod-Cheating-at-Poker-James-Bond-Style-UPDATED.pdf
69.0 MiB
2020 May 16 10:32
DEF CON 24 - Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs-UPDATED.pdf
2.4 MiB
2020 May 16 10:32
DEF CON 24 - Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs.pdf
1.9 MiB
2020 May 16 10:32
DEF CON 24 - Chris-Eagle-Sk3wlDbg-Emulating-with-Ida-UPDATED.pdf
156.8 KiB
2020 May 16 10:32
DEF CON 24 - Chris-Rock-How-to-overthrow-a-Government-Kuwait-Coup-WP.pdf
231.4 KiB
2020 May 16 10:32
DEF CON 24 - Chris-Rock-How-to-overthrow-a-Government.pdf
6.1 MiB
2020 May 16 10:32
DEF CON 24 - Clarence-Chio-Machine-Duping-101-UPDATED.pdf
6.5 MiB
2020 May 16 10:32
DEF CON 24 - Clarence-Chio-Machine-Duping-101.pdf
5.9 MiB
2020 May 16 10:32
DEF CON 24 - Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools-UPDATED.pdf
1.4 MiB
2020 May 16 10:32
DEF CON 24 - Demay-Auditing-6LoWPAN-Networks-using-Standard-Penetration-Testing-Tools-WP-UPDATED.pdf
666.1 KiB
2020 May 16 10:32
DEF CON 24 - Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools-WP.pdf
769.5 KiB
2020 May 16 10:32
DEF CON 24 - Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools.pdf
632.2 KiB
2020 May 16 10:32
DEF CON 24 - Demay-CANSPY-a-Platorm-For-Auditing-CAN-Devices-UPDATED.pdf
1.8 MiB
2020 May 16 10:32
DEF CON 24 - Demay-CANSPY-a-Platorm-For-Auditing-CAN-Devices-WP-UPDATED.pdf
818.6 KiB
2020 May 16 10:32
DEF CON 24 - Demay-Lebrun-Canspy-A-Platorm-For-Auditing-Can-Devices.pdf
1.5 MiB
2020 May 16 10:32
DEF CON 24 - Dr-Phil-Polstra-Mouse-Jigglers.pdf
346.9 KiB
2020 May 16 10:32
DEF CON 24 - Drake-Christey-Vulnerabilities-101-UPDATED.pdf
1.0 MiB
2020 May 16 10:32
DEF CON 24 - Drake-Christey-Vulnerabilities-101.pdf
183.7 KiB
2020 May 16 10:32
DEF CON 24 - Eagle-Sk3Wldbg-Emulating-with-Ida.pdf
370.3 KiB
2020 May 16 10:32
DEF CON 24 - Eric-Escobar-Rogue-Cell-Towers-UPDATED.pdf
2.2 MiB
2020 May 16 10:32
DEF CON 24 - Eric-Escobar-Rogue-Cell-Towers.pdf
2.3 MiB
2020 May 16 10:32
DEF CON 24 - Evan-Booth-Jjittery-Macgyver.pdf
4.4 MiB
2020 May 16 10:32
DEF CON 24 - Fasel-Jacobs-I-fight-for-the-users-UPDATED.pdf
121.9 MiB
2020 May 16 10:32
DEF CON 24 - Fasel-Jacobs-I-fight-for-the-users.pdf
2.7 MiB
2020 May 16 10:32
DEF CON 24 - Fitzpatrick-and-Grand-101-Ways-To-Brick-Your-Hardware.pdf
6.1 MiB
2020 May 16 10:32
DEF CON 24 - Forgety-Kreilein-Ng9-1-1-The-Next-Gene-Of-Emergency-Ph0Nage.pdf
3.2 MiB
2020 May 16 10:32
DEF CON 24 - Fred-Bret-Mounet-All-Your-Solar-Panels-Are-Belong-To-Me.pdf
799.2 KiB
2020 May 16 10:32
DEF CON 24 - Gorenc-Sands-Hacker-Machine-Interface-UPDATED.pdf
8.9 MiB
2020 May 16 10:32
DEF CON 24 - Gorenc-Sands-Hacker-Machine-Interface.pdf
7.0 MiB
2020 May 16 10:32
DEF CON 24 - Granolocks-Zero-Chaos-Bluehydra-Realtime-Blutetooth-Detection-UPDATED.pdf
1.7 MiB
2020 May 16 10:32
DEF CON 24 - Granolocks-Zero-Chaos-Bluehydra-Realtime-Blutetooth-Detection.pdf
101.2 KiB
2020 May 16 10:32
DEF CON 24 - Grant-Bugher-Captive-Portals-UPDATED.pdf
13.9 MiB
2020 May 16 10:32
DEF CON 24 - Grant-Bugher-Captive-Portals.pdf
12.0 MiB
2020 May 16 10:32
DEF CON 24 - Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays-WP.pdf
503.9 KiB
2020 May 16 10:32
DEF CON 24 - Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays.pdf
1.6 MiB
2020 May 16 10:32
DEF CON 24 - Hecker-Hacking-Hotel-Keys-and-PoS-Systems-UPDATED.pdf
2.2 MiB
2020 May 16 10:32
DEF CON 24 - Hecker-Hacking-Next-Gen-ATMS-UPDATED.pdf
3.3 MiB
2020 May 16 10:32
DEF CON 24 - Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations-UPDATED.pdf
1.9 MiB
2020 May 16 10:32
DEF CON 24 - Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations.pdf
1.6 MiB
2020 May 16 10:32
DEF CON 24 - Huber-Rasthofer-Smartphone-Antivirus-And-Security-Applications-Under-Fire.pdf
2.1 MiB
2020 May 16 10:32
DEF CON 24 - Hunter-Scott-Rt2Win-The-Luckiest-Guy-On-Twitter.pdf
1.2 MiB
2020 May 16 10:32
DEF CON 24 - Int0X80-Anti-Forensics-AF.pdf
413.2 KiB
2020 May 16 10:32
DEF CON 24 - Jake-Kouns-Lee-Johnstone-Cyber-who-done-it-UPDATED.pdf
49.6 MiB
2020 May 16 10:32
DEF CON 24 - Jason-Healey-Feds-and-0days-Heartbleed-to-Apple-FBI-UPDATED.pdf
1.5 MiB
2020 May 16 10:32
DEF CON 24 - Javier-Vazquez-You-CAN-haz-car-Secretz-UPDATED.pdf
3.2 MiB
2020 May 16 10:32
DEF CON 24 - Jay-Beale-Larry-Pesce-Phishing-without-Frustration-UPDATED.pdf
6.3 MiB
2020 May 16 10:32
DEF CON 24 - Jay-Beale-Larry-Pesce-Phishing-without-Frustration.pdf
6.3 MiB
2020 May 16 10:32
DEF CON 24 - Jennifer-Granick-Slouching-Towards-Utopia.pdf
416.9 KiB
2020 May 16 10:32
DEF CON 24 - Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel-UPDATED.pdf
6.7 MiB
2020 May 16 10:32
DEF CON 24 - Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel-WP.pdf
1.8 MiB
2020 May 16 10:32
DEF CON 24 - Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel.pdf
1.5 MiB
2020 May 16 10:32
DEF CON 24 - Jmaxxz-Backdooring-the-Frontdoor-Bypass-Cert-Pinning.pdf
202.2 KiB
2020 May 16 10:32
DEF CON 24 - Jmaxxz-Backdooring-the-Frontdoor-Extracting-Secrets-From-Log.pdf
202.6 KiB
2020 May 16 10:32
DEF CON 24 - Jmaxxz-Backdooring-the-Frontdoor-UPDATED.pdf
1.7 MiB
2020 May 16 10:32
DEF CON 24 - Jmaxxz-Backdooring-the-Frontdoor.pdf
1.9 MiB
2020 May 16 10:32
DEF CON 24 - Joe-Grand-Zoz-BSODomizerHD-UPDATED.pdf
27.7 MiB
2020 May 16 10:32
DEF CON 24 - Joe-Grand-Zoz-BSODomizerHD.pdf
730.7 KiB
2020 May 16 10:32
DEF CON 24 - Jonathan-Brossard-Intro-to-Witchcraft-Compiler-UPDATED.pdf
4.7 MiB
2020 May 16 10:32
DEF CON 24 - Jonathan-Brossard-Intro-to-Witchcraft-Compiler.pdf
2.1 MiB
2020 May 16 10:32
DEF CON 24 - K2-Blockfighting with a Hooker-BLOCKFIGHTERII.pdf
1.2 MiB
2020 May 16 10:32
DEF CON 24 - Karyn-Benson-Examining-The-Internets-Pollution.pdf
2.3 MiB
2020 May 16 10:32
DEF CON 24 - Klijnsma-Tentler-Stargate-Pivoting-Through-VNC.pdf
30.1 MiB
2020 May 16 10:32
DEF CON 24 - Ladar-Levison-Compelled-Decryption.pdf
5.8 MiB
2020 May 16 10:32
DEF CON 24 - Liu-Yan-Xu-Can-You-Trust-Autonomous-Vehicles-WP.pdf
2.7 MiB
2020 May 16 10:32
DEF CON 24 - Liu-Yan-Xu-Can-You-Trust-Autonomous-Vehicles.pdf
2.2 MiB
2020 May 16 10:32
DEF CON 24 - Lucas-Lundgren-Light-Weight Protocol-Critical-Implications.pdf
2.5 MiB
2020 May 16 10:32
DEF CON 24 - Luke-Young-The-4TbS-Ddos-For-5-bucks.pdf
3.4 MiB
2020 May 16 10:32
DEF CON 24 - Maldonado-Mcguffin-Sticky-Keys-To-The-Kingdom.pdf
830.9 KiB
2020 May 16 10:32
DEF CON 24 - Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice-UPDATED.pd.pdf
5.1 MiB
2020 May 16 10:32
DEF CON 24 - Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice-WP-UPDATED.pdf
534.2 KiB
2020 May 16 10:32
DEF CON 24 - Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice-WP.pdf
520.0 KiB
2020 May 16 10:32
DEF CON 24 - Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice.pdf
2.0 MiB
2020 May 16 10:32
DEF CON 24 - Max-Bazaliy-A-Journey-Through-Exploit-Mitigation-Techniques-On-Ios-UPDATED.pdf
670.8 KiB
2020 May 16 10:32
DEF CON 24 - Max-Bazaliy-A-Journey-Through-Exploit-Mitigation-Techniques-On-Ios.pdf
561.3 KiB
2020 May 16 10:32
DEF CON 24 - Mcsweeny-Cranor-Research-On-The-Machines-UPDATED.pdf
4.5 MiB
2020 May 16 10:32
DEF CON 24 - Mcsweeny-Cranor-Research-On-The-Machines.pdf
2.6 MiB
2020 May 16 10:32
DEF CON 24 - Mike-Rich-Use-Their-Machines-Against-Them-WP.pdf
1.2 MiB
2020 May 16 10:32
DEF CON 24 - Mike-Rich-Use-Their-Machines-Against-Them.pdf
1.6 MiB
2020 May 16 10:32
DEF CON 24 - Nate-Cardozo-Crypto-State-Of-The-Law-UPDATED.pdf
2.2 MiB
2020 May 16 10:32
DEF CON 24 - Nick-Rosario-Weaponize-Your-Feature-Codes.pdf
916.2 KiB
2020 May 16 10:32
DEF CON 24 - Panel-How-To-Make-A-DEFCON-Black-Badge.pdf
2.7 MiB
2020 May 16 10:32
DEF CON 24 - Patrick-Wardle-99-Problems-Little-Snitch-UPDATED.pdf
14.0 MiB
2020 May 16 10:32
DEF CON 24 - Patrick-Wardle-99-Problems-Little-Snitch.pdf
14.2 MiB
2020 May 16 10:32
DEF CON 24 - Paul-Vixie-Frontrunning-the-Frontrunners-UPDATED.pdf
9.2 MiB
2020 May 16 10:32
DEF CON 24 - Plore-Side-Channel-Attacks-On-High-Security-Electronic-Safe-Locks.pdf
16.4 MiB
2020 May 16 10:32
DEF CON 24 - Plore-Side-Channell-Attacks-High-Security-Locks-UPDATED.pdf
2.7 MiB
2020 May 16 10:32
DEF CON 24 - Przemek-Jaroszewski-How-To-Get-Good-Seats-In-The-Security-Theater-UPDATED.pdf
2.1 MiB
2020 May 16 10:32
DEF CON 24 - Przemek-Jaroszewski-How-To-Get-Good-Seats-In-The-Security-Theater.pdf
1.5 MiB
2020 May 16 10:32
DEF CON 24 - Radia-Perlman-Resilience-Despite-Malicious-Pariticpants.pdf
745.4 KiB
2020 May 16 10:32
DEF CON 24 - Regilero-Hiding-Wookiees-In-Http.pdf
410.2 KiB
2020 May 16 10:32
DEF CON 24 - Ricky-Lawshae-Lets-Get-Physical.pdf
188.4 KiB
2020 May 16 10:32
DEF CON 24 - Robbins-Vazarkar-Schroeder-Six-Degrees-of-Domain-Admin-UPDATED.pdf
2.7 MiB
2020 May 16 10:32
DEF CON 24 - Robbins-Vazarkar-Schroeder-Six-Degrees-of-Domain-Admin.pdf
855.1 KiB
2020 May 16 10:32
DEF CON 24 - Robert-Olson-Writing-Your-First-Exploit.pdf
455.4 KiB
2020 May 16 10:32
DEF CON 24 - Rogan-Dawes-Dominic-White-Universal-Serial-aBUSe-Remote-Attacks.pdf
6.2 MiB
2020 May 16 10:32
DEF CON 24 - Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks-UPDATED.pdf
3.8 MiB
2020 May 16 10:32
DEF CON 24 - Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks.pdf
7.4 MiB
2020 May 16 10:32
DEF CON 24 - Salvador-Mendoza-Samsung-Pay-Tokenized-Numbers-WP.pdf
458.9 KiB
2020 May 16 10:32
DEF CON 24 - Salvador-Mendoza-Samsung-Pay-Tokenized-Numbers.pdf
607.4 KiB
2020 May 16 10:32
DEF CON 24 - Sean-Metcalf-Beyond-The-MCSE-Red-Teaming-Active-Directory-UPDATED.pdf
5.8 MiB
2020 May 16 10:32
DEF CON 24 - Sean-Metcalf-Beyond-The-MCSE-Red-Teaming-Active-Directory.pdf
4.8 MiB
2020 May 16 10:32
DEF CON 24 - Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-WP.pdf
469.4 KiB
2020 May 16 10:32
DEF CON 24 - Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering.pdf
3.7 MiB
2020 May 16 10:32
DEF CON 24 - Shane-Steiger-Maelstrom-Are-You-Playing-With-A-Full-Deck-UPDATED.pdf
8.3 MiB
2020 May 16 10:32
DEF CON 24 - Shane-Steiger-Maelstrom-Are-You-Playing-With-A-Full-Deck-V14-Back.pdf
2.3 MiB
2020 May 16 10:32
DEF CON 24 - Shane-Steiger-Maelstrom-Rules-V10.pdf
928.8 KiB
2020 May 16 10:32
DEF CON 24 - Shellphish-Cyber Grand Shellphish-Tool-Links.txt
118 B
2020 May 16 10:32
DEF CON 24 - Shellphish-Cyber Grand Shellphish-UPDATED.pdf
8.5 MiB
2020 May 16 10:32
DEF CON 24 - SixVolts-and-Haystack-Cheap-Tools-For-Hacking-Heavy-Trucks.pdf
24.2 MiB
2020 May 16 10:32
DEF CON 24 - Tamas-Szakaly-Help-I-got-ANTS.pdf
5.7 MiB
2020 May 16 10:32
DEF CON 24 - the-bob-ross-fan-club-Propaganda-and-you.pdf
2.9 MiB
2020 May 16 10:32
DEF CON 24 - Thomas-Wilhelm-Hacking-Network-Protocols-Using-Kali.pdf
585.1 KiB
2020 May 16 10:32
DEF CON 24 - Thomas-Wilhelm-Intrusion-Prevention-System-Evasion-Techniques.pdf
794.6 KiB
2020 May 16 10:32
DEF CON 24 - Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines-Literature-Survey.pdf
351.7 KiB
2020 May 16 10:32
DEF CON 24 - Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines.pdf
1.2 MiB
2020 May 16 10:32
DEF CON 24 - Tom-Kopchak-Sentient-Storage.pdf
1.5 MiB
2020 May 16 10:32
DEF CON 24 - Tom-Kopchak-SSD-Forensics-Research-WP.pdf
1.4 MiB
2020 May 16 10:32
DEF CON 24 - Ulf-Frisk-Direct-Memory-Attack-the-Kernel.pdf
1.1 MiB
2020 May 16 10:32
DEF CON 24 - Wesley-McGrew-Secure-Penetration-Testing-Operations-snagterpreter.py
2.2 KiB
2020 May 16 10:32
DEF CON 24 - Wesley-McGrew-Secure-Penetration-Testing-Operations-WP.pdf
125.6 KiB
2020 May 16 10:32
DEF CON 24 - Wesley-McGrew-Secure-Penetration-Testing-Operations.pdf
295.5 KiB
2020 May 16 10:32
DEF CON 24 - Willa-Riggins-Esoteric-Exfiltration-UPDATED.pdf
796.6 KiB
2020 May 16 10:32
DEF CON 24 - Willa-Riggins-Esoteric-Exfiltration.pdf
305.3 KiB
2020 May 16 10:32
DEF CON 24 - Workshop-Simon-Roses-Use-MS-Free-Sec-Tools-as-a-Ninja-UPDATED.pdf
3.9 MiB
2020 May 16 10:32
DEF CON 24 - Zhang-Shan-Forcing-Targeted-Lte-Cellphone-Into-Unsafe-Network.pdf
4.2 MiB
2020 May 16 10:32
DEF CON 24 - Zhong-Lee-411-A-Framework-For-Managing-Security-Alerts-UPDATED.pdf
8.2 MiB
2020 May 16 10:32
DEF CON 24 - Zhong-Lee-411-A-Framework-For-Managing-Security-Alerts.pdf
48.8 KiB
2020 May 16 10:32