Parent directory/ | - | - |
DEF CON 25 - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.m4a | 63.9 MiB | 2020 May 26 05:41 |
DEF CON 25 - XlogicX - Assembly Language is Too High Level.m4a | 65.9 MiB | 2020 May 26 05:41 |
DEF CON 25 - trixr4skids - DOOMed Point of Sale Systems.m4a | 57.0 MiB | 2020 May 26 05:41 |
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.m4a | 50.1 MiB | 2020 May 26 05:41 |
DEF CON 25 - Vulc@n and Panel - The Last CTF Talk You'll Ever Need - AMA with 20 years of DEF CON CTF.m4a | 156.1 MiB | 2020 May 26 05:41 |
DEF CON 25 - Trey Forgety - Inside the _Meet Desai_ Attack - Defending Distributed Targets from Distributed Attacks.m4a | 56.4 MiB | 2020 May 26 05:41 |
DEF CON 25 - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.m4a | 51.0 MiB | 2020 May 26 05:41 |
DEF CON 25 - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.m4a | 23.3 MiB | 2020 May 26 05:41 |
DEF CON 25 - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.m4a | 81.5 MiB | 2020 May 26 05:41 |
DEF CON 25 - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.m4a | 46.0 MiB | 2020 May 26 05:41 |
DEF CON 25 - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.m4a | 55.4 MiB | 2020 May 26 05:41 |
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis.m4a | 64.2 MiB | 2020 May 26 05:41 |
DEF CON 25 - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.m4a | 64.2 MiB | 2020 May 26 05:41 |
DEF CON 25 - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.m4a | 25.6 MiB | 2020 May 26 05:41 |
DEF CON 25 - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.m4a | 53.0 MiB | 2020 May 26 05:41 |
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25.m4a | 21.4 MiB | 2020 May 26 05:41 |
DEF CON 25 - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.m4a | 124.5 MiB | 2020 May 26 05:41 |
DEF CON 25 - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.m4a | 46.3 MiB | 2020 May 26 05:41 |
DEF CON 25 - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.m4a | 63.2 MiB | 2020 May 26 05:41 |
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security.m4a | 28.4 MiB | 2020 May 26 05:41 |
DEF CON 25 - Svea Owen and Andreas Dewes - Dark Data.m4a | 50.5 MiB | 2020 May 26 05:41 |
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.m4a | 32.8 MiB | 2020 May 26 05:41 |
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.m4a | 21.5 MiB | 2020 May 26 05:41 |
DEF CON 25 - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.m4a | 55.8 MiB | 2020 May 26 05:41 |
DEF CON 25 - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.m4a | 65.4 MiB | 2020 May 26 05:41 |
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard - A Year Later.m4a | 54.4 MiB | 2020 May 26 05:41 |
DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.m4a | 61.8 MiB | 2020 May 26 05:41 |
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.m4a | 58.7 MiB | 2020 May 26 05:41 |
DEF CON 25 - Plore - Popping a Smart Gun.m4a | 55.4 MiB | 2020 May 26 05:41 |
DEF CON 25 - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.m4a | 56.8 MiB | 2020 May 26 05:41 |
DEF CON 25 - Roger Dingledine - Next-Generation Tor Onion Services.m4a | 62.3 MiB | 2020 May 26 05:41 |
DEF CON 25 - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.m4a | 64.8 MiB | 2020 May 26 05:41 |
DEF CON 25 - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.m4a | 46.6 MiB | 2020 May 26 05:41 |
DEF CON 25 - Snide Owen - Phone system testing and other fun tricks.m4a | 52.6 MiB | 2020 May 26 05:41 |
DEF CON 25 - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.m4a | 67.9 MiB | 2020 May 26 05:41 |
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.m4a | 44.3 MiB | 2020 May 26 05:41 |
DEF CON 25 - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.m4a | 54.5 MiB | 2020 May 26 05:41 |
DEF CON 25 - Matt Knight - Radio Exploitation 101.m4a | 44.1 MiB | 2020 May 26 05:41 |
DEF CON 25 - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.m4a | 59.0 MiB | 2020 May 26 05:41 |
DEF CON 25 - Patrick DeSantis - From Box to Backdoor.m4a | 44.2 MiB | 2020 May 26 05:41 |
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.m4a | 30.1 MiB | 2020 May 26 05:41 |
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It.m4a | 28.8 MiB | 2020 May 26 05:41 |
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.m4a | 26.7 MiB | 2020 May 26 05:41 |
DEF CON 25 - Min Zheng and Xiangyu Liu - macOS_iOS Kernel Debugging and Heap Feng Shui.m4a | 37.5 MiB | 2020 May 26 05:41 |
DEF CON 25 - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.m4a | 56.1 MiB | 2020 May 26 05:41 |
DEF CON 25 - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.m4a | 64.5 MiB | 2020 May 26 05:41 |
DEF CON 25 - Nick Cano - XenoScan- Scanning Memory Like a Boss.m4a | 56.4 MiB | 2020 May 26 05:41 |
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.m4a | 40.2 MiB | 2020 May 26 05:41 |
DEF CON 25 - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.m4a | 62.0 MiB | 2020 May 26 05:41 |
DEF CON 25 - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.m4a | 42.7 MiB | 2020 May 26 05:41 |
DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch.m4a | 51.4 MiB | 2020 May 26 05:41 |
DEF CON 25 - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.m4a | 61.9 MiB | 2020 May 26 05:41 |
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999.m4a | 28.7 MiB | 2020 May 26 05:41 |
DEF CON 25 - Omar Eissa - Attacking Autonomic Networks.m4a | 48.1 MiB | 2020 May 26 05:41 |
DEF CON 25 - Matt Joyce - Amateur Digital Archeology.m4a | 64.3 MiB | 2020 May 26 05:41 |
DEF CON 25 - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.m4a | 61.7 MiB | 2020 May 26 05:41 |
DEF CON 25 - Jon Medina - Where are the SDN Security Talks_.m4a | 54.6 MiB | 2020 May 26 05:40 |
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.m4a | 69.7 MiB | 2020 May 26 05:40 |
DEF CON 25 - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.m4a | 60.4 MiB | 2020 May 26 05:40 |
DEF CON 25 - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.m4a | 60.6 MiB | 2020 May 26 05:40 |
DEF CON 25 - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.m4a | 51.6 MiB | 2020 May 26 05:40 |
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks.m4a | 44.7 MiB | 2020 May 26 05:40 |
DEF CON 25 - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.m4a | 65.6 MiB | 2020 May 26 05:40 |
DEF CON 25 - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.m4a | 57.3 MiB | 2020 May 26 05:40 |
DEF CON 25 - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.m4a | 60.6 MiB | 2020 May 26 05:40 |
DEF CON 25 - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.m4a | 21.2 MiB | 2020 May 26 05:40 |
DEF CON 25 - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.m4a | 54.3 MiB | 2020 May 26 05:40 |
DEF CON 25 - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.m4a | 161.5 MiB | 2020 May 26 05:40 |
DEF CON 25 - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.m4a | 71.4 MiB | 2020 May 26 05:40 |
DEF CON 25 - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.m4a | 63.2 MiB | 2020 May 26 05:40 |
DEF CON 25 - Hyrum Anderson - Evading next-gen AV using artificial intelligence.m4a | 26.9 MiB | 2020 May 26 05:40 |
DEF CON 25 - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.m4a | 29.4 MiB | 2020 May 26 05:40 |
DEF CON 25 - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.m4a | 39.2 MiB | 2020 May 26 05:40 |
DEF CON 25 - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.m4a | 64.6 MiB | 2020 May 26 05:40 |
DEF CON 25 - Jeff Moss and Panel - Panel - DEF CON Groups.m4a | 76.6 MiB | 2020 May 26 05:40 |
DEF CON 25 - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.m4a | 33.0 MiB | 2020 May 26 05:40 |
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts.m4a | 69.2 MiB | 2020 May 26 05:40 |
DEF CON 25 - Joe Rozner - Wiping out CSRF.m4a | 59.9 MiB | 2020 May 26 05:40 |
DEF CON 25 - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.m4a | 32.7 MiB | 2020 May 26 05:40 |
DEF CON 25 - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.m4a | 65.7 MiB | 2020 May 26 05:40 |
DEF CON 25 - Gerald Steere - Sean Metcalf - Hacking the Cloud.m4a | 58.7 MiB | 2020 May 26 05:40 |
DEF CON 25 - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.m4a | 49.8 MiB | 2020 May 26 05:40 |
DEF CON 25 - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.m4a | 63.4 MiB | 2020 May 26 05:40 |
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.m4a | 64.4 MiB | 2020 May 26 05:40 |
DEF CON 25 - Garry Kasparov - The Brain's Last Stand.m4a | 69.2 MiB | 2020 May 26 05:40 |
DEF CON 25 - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.m4a | 58.6 MiB | 2020 May 26 05:40 |
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit.m4a | 49.3 MiB | 2020 May 26 05:40 |
DEF CON 25 - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.m4a | 60.8 MiB | 2020 May 26 05:40 |
DEF CON 25 - Hanno Bõck - Abusing Certificate Transparency Logs.m4a | 42.0 MiB | 2020 May 26 05:40 |
DEF CON 25 - Dennis Maldonado - Real-time RFID Cloning in the Field.m4a | 30.7 MiB | 2020 May 26 05:40 |
DEF CON 25 - Haoqi Shan and Jian Yuan - Man in the NFC.m4a | 48.8 MiB | 2020 May 26 05:40 |
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation.m4a | 69.5 MiB | 2020 May 26 05:40 |
DEF CON 25 - Denton Gentry - I Know What You Are by the Smell of Your Wifi.m4a | 28.2 MiB | 2020 May 26 05:40 |
DEF CON 25 - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.m4a | 59.7 MiB | 2020 May 26 05:40 |
DEF CON 25 - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.m4a | 50.7 MiB | 2020 May 26 05:40 |
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control.m4a | 30.4 MiB | 2020 May 26 05:40 |
DEF CON 25 - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.m4a | 53.9 MiB | 2020 May 26 05:40 |
DEF CON 25 - David Robinson - Using GPS Spoofing to control time.m4a | 55.1 MiB | 2020 May 26 05:40 |
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set.m4a | 53.0 MiB | 2020 May 26 05:40 |
DEF CON 25 - Dor Azouri - BITSInject.m4a | 28.2 MiB | 2020 May 26 05:40 |
DEF CON 25 - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.m4a | 45.1 MiB | 2020 May 26 05:40 |
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.m4a | 67.1 MiB | 2020 May 26 05:40 |
DEF CON 25 - Andrea Matwyshyn and Panel - Panel- Meet The Feds.m4a | 114.4 MiB | 2020 May 26 05:40 |
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals.m4a | 46.6 MiB | 2020 May 26 05:40 |
DEF CON 25 - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.m4a | 27.8 MiB | 2020 May 26 05:40 |
DEF CON 25 - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.m4a | 43.6 MiB | 2020 May 26 05:40 |
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus.m4a | 21.5 MiB | 2020 May 26 05:40 |
DEF CON 25 - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.m4a | 60.0 MiB | 2020 May 26 05:40 |
DEF CON 25 - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.m4a | 54.6 MiB | 2020 May 26 05:40 |
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation.m4a | 57.0 MiB | 2020 May 26 05:40 |
DEF CON 25 - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on z_OS.m4a | 61.3 MiB | 2020 May 26 05:40 |
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc | 25.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Matt Wixey - See no evil hear no evil - Hacking invisibly and silently with light and sound - Transcript.txt | 38.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Plore - Popping a Smart Gun.lrc | 44.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc | 50.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Philip Tully Michael T. Raggo - A Picture is Worth a Thousand Words Literally - Transcript.txt | 45.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus.lrc | 8.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc | 28.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jow Fitzpatrick Michael Leibowitz - How to roll your own counterfeit hardware security devices - Transcript.txt | 45.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts.lrc | 45.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc | 36.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc | 48.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation.lrc | 35.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals - Transcript.txt | 29.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Hanno Bõck - Abusing Certificate Transparency Logs - Transcript.txt | 24.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc | 30.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc | 24.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Patrick DeSantis - From Box to Backdoor - Transcript.txt | 28.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jeff Moss and Panel - Panel - DEF CON Groups - Transcript.txt | 51.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome - Transcript.txt | 42.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc | 44.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc | 34.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - XlogicX - Assembly Language is Too High Level - Transcript.txt | 46.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set - Transcript.txt | 47.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks - Transcript.txt | 26.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus - Transcript.txt | 6.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc | 27.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory - 128 - Transcript.txt | 34.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jon Medina - Where are the SDN Security Talks - Transcript.txt | 38.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Thomas Mathew, Dhia Mahjoub - Malicious CDNs - Transcript.txt | 42.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc | 38.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc | 40.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc | 48.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Mr. Sean Kanuck -Hacking Democracy- A Socratic Dialogue - Transcript.txt | 40.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc | 42.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Cooper Quintin, Kashmir Hill - The Internet Already Knows I'm Pregnant - Transcript.txt | 35.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour - Transcript.txt | 24.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jason Hernandez Sam Richards Jerod MacDonald-Evoy - Tracking Spies in the Skies - Transcript.txt | 37.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc | 14.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Stephan Huber Siegfried Rasthofer - Bypassing Android Password Manager Without Root - Transcript.txt | 34.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options - Transcript.txt | 18.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc | 30.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc | 53.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation - Transcript.txt | 52.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard - A Year Later - Transcript.txt | 31.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software You Cant Ever See - Transcript.txt | 20.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Snide Owen - Phone system testing and other fun tricks.lrc | 38.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Manfred - Twenty Years of MMORPG Hacking- Better Graphics Same Exploits - Transcript.txt | 33.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc | 48.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc | 23.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc | 40.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Roger Dingledine - Next Generation Tor Onion Services - Transcript.txt | 44.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Matt Suiche - Porosity - A decompiler for blockchain smart contracts bytecode - Transcript.txt | 29.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc | 54.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation - Transcript.txt | 28.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc | 43.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc | 23.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit - Transcript.txt | 26.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS - Transcript.txt | 47.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - David Robinson - Using GPS Spoofing to control time.lrc | 36.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc | 15.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Vasilios Mavroudis Dan Cvrcek - Trojan-tolerant Hardware Supply Chain Security in Practice - Transcript.txt | 30.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc | 21.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc | 42.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts - Transcript.txt | 39.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying - Anti-Tracking Bots Radios and Keystroke Injection - Transcript.txt | 40.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Dor Azouri - BITSInject.lrc | 17.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Andrea Matwyshyn and Panel - Panel- Meet The Feds - Transcript.txt | 71.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It - Transcript.txt | 19.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - K2 - UnFucking Forensics – Active Passive i.e. Offensive Defensive memory hacking debugging - Transcript.txt | 12.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc | 44.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Dor Azouri - BITSInject - Transcript.txt | 14.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc | 23.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc | 48.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc | 43.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology - Transcript.txt | 12.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security - Transcript.txt | 21.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Mickey Shkatov Jesse Michael Oleksandr Bazhaniuk - Driving down the rabbit hole - Transcript.txt | 29.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Svea Owen - Andreas Dewes - Dark Data - Transcript.txt | 30.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc | 35.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Gus Fritschie, Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming - Transcript.txt | 35.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Gil Cohen - Call the plumber - you have a leak in your (named) pipe - Transcript.txt | 29.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc | 37.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set.lrc | 54.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Francis Brown, David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test - Transcript.txt | 44.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Denton Gentry - I Know What You Are by the Smell of Your Wifi - Transcript.txt | 16.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Romain Coltel Yves Le Provost - WSUSpendu- How to hang WSUS clients - Transcript.txt | 12.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine - Transcript.txt | 40.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Lee Holmes - Get-pwnd- Attacking Battle-Hardened Windows Server - Transcript.txt | 20.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc | 41.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Whitney Merrill Terrell McSweeny - Tick Tick Tick.Boom Youre Dead - Tech and the FTC - Transcript.txt | 41.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc | 112.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jeff Moss and Panel - Panel - DEF CON Groups.lrc | 58.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc | 22.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc | 21.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like its 1999 - Transcript.txt | 17.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc | 33.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc | 48.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc | 47.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Matt Knight - Radio Exploitation 101 - Transcript.txt | 37.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc | 61.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc | 50.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - XlogicX - Assembly Language is Too High Level.lrc | 54.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Nick Cano - XenoScan- Scanning Memory Like a Boss - Transcription.txt | 37.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks - Transcript.txt | 25.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Dan Petro, Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway - Transcript.txt | 45.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc | 31.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc | 54.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Luke Young - There’s no place like 127.0.0.1 - Achieving reliable DNS rebinding in modern browsers - Transcript.txt | 37.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc | 43.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc | 20.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - trixr4skids - DOOMed Point of Sale Systems.lrc | 43.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc | 51.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages - Transcript.txt | 24.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc | 15.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc | 36.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Dennis Maldonado - Real-time RFID Cloning in the Field - Transcript.txt | 20.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Marina Simakov, Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms - Transcript.txt | 36.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Matt Knight - Radio Exploitation 101.lrc | 43.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Gerald Steere - Sean Metcalf - Hacking the Cloud - Transcript.txt | 86.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Hanno Bõck - Abusing Certificate Transparency Logs.lrc | 29.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc | 51.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - HighWiz Malware Unicorn Niki7a Roamer Wiseacre Shaggy - DEF CON 101 Panel - Transcript.txt | 94.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Josh Schwartz John Cramb - MEATPISTOL A Modular Malware Implant Framework - Transcript.txt | 36.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Omar Eissa - Attacking Autonomic Networks - Transcript.txt | 30.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Snide Owen - Phone system testing and other fun tricks - Transcript.txt | 33.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Josh Datko Chris Quartier - Breaking Bitcoin Hardware Wallets - Transcript.txt | 18.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - The Dark Tangent, Def Con Goons - DEF CON Closing Ceremonies.txt | 64.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Joe Rozner - Wiping out CSRF - Transcript.txt | 39.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Joe Rozner - Wiping out CSRF.lrc | 45.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc | 29.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc | 43.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc | 53.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Scott Behrens Jeremy Heffner - Starting the Avalanche- Application DoS In Microservice Architectures - Transcript.txt | 43.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks - Transcript.txt | 19.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Matt Joyce - Amateur Digital Archeology - Transcript.txt | 47.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Zenofex 0x00string CJ_000 Maximus64 - All Your Things Are Belong To Us - Transcript.txt | 52.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Plore - Popping a Smart Gun - Transcript.txt | 37.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc | 53.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Duncan Woodbury Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles - Transcript.txt | 37.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis - Transcript.txt | 40.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - David Robinson - Using GPS Spoofing to control time - Transcript.txt | 30.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C and C Toolkits - Transcript.txt | 34.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc | 51.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc | 29.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc | 25.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions - Transcript.txt | 22.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc | 83.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc | 20.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch - Transcript.txt | 28.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Omar Eissa - Attacking Autonomic Networks.lrc | 36.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc | 52.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Yuwue Zheng, Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB - Transcript.txt | 20.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Itzik Kotler Amit Klein - The Adventures of AV and the Leaky Sandbox - Transcript.txt | 30.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc | 39.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - trixr4skids - DOOMed Point of Sale Systems - Transcript.txt | 37.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Marc Newlin Logan Lamb Chris Grayson - CableTap- Wirelessly Tapping Your Home Network - Transcript.txt | 43.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Haoqi Shan and Jian Yuan - Man in the NFC.lrc | 28.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc | 30.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control - Transcript.txt | 18.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Daniel Bohannon Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science - Transcript.txt | 46.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc | 21.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc | 35.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc | 33.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc | 49.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc | 54.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It.lrc | 23.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Sean Dillon, Zach Harding - Koadic C3 - Windows COM Command & Control Framework - Transcript.txt | 37.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc | 78.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Roger Dingledine - Next-Generation Tor Onion Services.lrc | 51.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre - Transcript.txt | 19.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25 - Transcript.txt | 13.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Steinthor Bjarnason Jason Jones - The call is coming from inside the house - Transcript.txt | 30.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Avi Bashan Slava Makkaveev - Unboxing Android- Everything you wanted to know about Android packers - Transcript.txt | 22.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Andy Robbins Will Schroeder - Designing Active Directory DACL Backdoors - Transcript.txt | 44.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Min Zheng Xiangyu Liu - macOSiOS Kernel Debugging and Heap Feng Shui - 108 - Transcript.txt | 17.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc | 50.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc | 139.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch.lrc | 35.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy and Anonymity Without Your Consent - Transcript.txt | 37.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Ilja van Sprundel - Are all BSDs are created equally- A survey of BSD kernel vulnerabilities - Transcript.txt | 46.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Mark Williams, Rob Stanley - If You Give a Mouse a Microchip - Transcript.txt | 26.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jon Medina - Where are the SDN Security Talks.lrc | 44.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc | 47.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25.lrc | 16.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Svea Owen and Andreas Dewes - Dark Data.lrc | 35.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc | 41.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Garry Kasparov - The Brain's Last Stand.lrc | 48.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc | 46.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc | 25.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc | 48.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Cory Doctorow - BIGNUM steps forward TRUMPNUM steps back- how can we tell if were winning - Transcript.txt | 42.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Inbar Raz - Eden Schochat - From One Country - One Floppy to Startup Nation - Transcript.txt | 41.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc | 36.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc | 34.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system - Transcript.txt | 38.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc | 60.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc | 42.2 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc | 43.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Matt Joyce - Amateur Digital Archeology.lrc | 54.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly - Transcript.txt | 21.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Haoqi Shan Jian Yuan - Man in the NFC - Transcript.txt | 24.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Richard Thieme - When Privacy Goes Poof Why Its Gone and Never Coming Back - Transcript.txt | 43.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc | 24.1 KiB | 2020 May 16 05:06 |
DEF CON 25 - Alvaro Muñoz, Alexandr Mirosh - Friday the 13th- JSON attacks - Transcript.txt | 34.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc | 44.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc | 21.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Trey Forgety - Inside the “Meet Desai” Attack - Defending Distributed Targets from Distributed Attacks - Transcript.txt | 41.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Patrick Wardle - Death By 1000 Installers on macOS its all broken - Transcript.txt | 45.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc | 45.7 KiB | 2020 May 16 05:06 |
DEF CON 25 - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc | 52.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects - Transcript.txt | 38.5 KiB | 2020 May 16 05:06 |
DEF CON 25 - James Langevin Will Hurd - DC to DEF CON QA with Congressmen - Transcript.txt | 40.4 KiB | 2020 May 16 05:06 |
DEF CON 25 - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need AMA with 20 years of DEF CON CTF - Transcript.txt | 123.9 KiB | 2020 May 16 05:06 |
DEF CON 25 - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security - Transcript.txt | 37.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc | 50.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Jason Haddix - Introducing HUNT- Data Driven Web Hacking Manual Testing - Transcript.txt | 28.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Patrick DeSantis - From Box to Backdoor.lrc | 33.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes - Transcript.txt | 40.3 KiB | 2020 May 16 05:06 |
DEF CON 25 - Garry Kasparov - The Brains Last Stand - Transcript.txt | 42.0 KiB | 2020 May 16 05:06 |
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level - Transcript.txt | 27.8 KiB | 2020 May 16 05:06 |
DEF CON 25 - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc | 50.6 KiB | 2020 May 16 05:06 |
DEF CON 25 - Hyrum Anderson - Evading next-gen AV using artificial intelligence - Transcript.txt | 17.2 KiB | 2020 May 16 05:06 |