Parent directory/ | - | - |
Josh Pitts/ | - | 2020 May 21 07:14 |
Dimitry Snezhkov/ | - | 2019 Apr 13 23:58 |
DEF CON 25 - chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf | 42.6 MiB | 2020 May 16 04:59 |
DEF CON 25 - Matt-Knight-and-Marc-Newlin-Radio-Exploitation-UPDATED.pdf | 25.6 MiB | 2020 May 16 04:59 |
DEF CON 25 - Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf | 3.3 MiB | 2020 May 16 04:59 |
DEF CON 25 - Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf | 1.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf | 69.2 KiB | 2020 May 16 04:59 |
DEF CON 25 - Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts.pdf | 6.1 MiB | 2020 May 16 04:59 |
DEF CON 25 - Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf | 2.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Dimitry-Snezhkov-Abusing-Web-Hooks-UPDATED.pdf | 9.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Matt-Knight-and-Marc-Newlin-Radio-Exploitation.pdf | 25.1 MiB | 2020 May 16 04:59 |
DEF CON 25 - Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf | 1.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies-UPDATED.pdf | 9.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Dimitry-Snezhkov-Abusing-Web-Hooks.pdf | 71.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf | 3.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf | 5.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Cincvolflt-Inside-The-Meet-Desai-Attack.pdf | 1.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Cooper-Quintin-The-Pregnancy-Panopticon-WP-UPDATED.pdf | 631.3 KiB | 2020 May 16 04:59 |
DEF CON 25 - 5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects.pdf | 10.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf | 2.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - 5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects-WP.pdf | 6.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf | 10.6 MiB | 2020 May 16 04:59 |
DEF CON 25 - Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf | 250.0 KiB | 2020 May 16 04:59 |
DEF CON 25 - Matt-Wixey-See-No-Evil-Hear-No-Evil-UPDATED.pdf | 5.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally.pdf | 3.6 MiB | 2020 May 16 04:59 |
DEF CON 25 - Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf | 2.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time-UPDATED.pdf | 4.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Alvaro-Munoz-and-Oleksandr-Mirosh-JSON-Attacks-UPDATED.pdf | 18.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf | 290.1 KiB | 2020 May 16 04:59 |
DEF CON 25 - 0ctane-Untrustworthy-Hardware-UPDATED.pdf | 5.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf | 4.1 MiB | 2020 May 16 04:59 |
DEF CON 25 - Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe-UPDATED.pdf | 4.1 MiB | 2020 May 16 04:59 |
DEF CON 25 - Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf | 6.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - K2-Un-Fucking-Forensics-UPDATED.pdf | 1.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Zardus-25-Years-of-Program-Analysis-UPDATED.pdf | 3.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly-UPDATED..pdf | 15.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Christopher-Domas-Breaking-The-x86-ISA-UPDATED.pdf | 16.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Mickey-Jesse-and-Oleksander-Driving-Down-the-Rabbit-Hole-UPDATED.pdf | 12.3 MiB | 2020 May 16 04:59 |
DEF CON 25 - trixr4skids-DOOMed-Point-of-Sale-Systems-UPDATED.pdf | 21.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House.pdf | 6.3 MiB | 2020 May 16 04:59 |
DEF CON 25 - Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery-UPDATED.pdf | 2.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - William-Knowles-Persisting-With-Microsoft-Office.pdf | 2.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community-UPDATED.pdf | 26.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf | 29.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Alvaro-Munoz-JSON-attacks-WP-UPDATED.pdf | 665.0 KiB | 2020 May 16 04:59 |
DEF CON 25 - Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf | 5.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf | 4.6 MiB | 2020 May 16 04:59 |
DEF CON 25 - DEFCON-101-The-Panel-UPDATED.pdf | 6.3 MiB | 2020 May 16 04:59 |
DEF CON 25 - Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP.pdf | 124.7 KiB | 2020 May 16 04:59 |
DEF CON 25 - Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf | 616.5 KiB | 2020 May 16 04:59 |
DEF CON 25 - Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-UPDATED.pdf | 14.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Plore-Popping-a-Smart-Gun.pdf | 4.1 MiB | 2020 May 16 04:59 |
DEF CON 25 - Ilja-van-Sprundel-BSD-Kern-Vulns.pdf | 2.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - XlogicX-Assembly-Language-Is-Too-High-Level.pdf | 7.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Omar-Eissa-Attacking-Autonomic-Networks.pdf | 2.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - spaceB0x-Exploiting-Continuous-Integration.pdf | 2.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Sean-Kanuck-Hacking-Democracy-UPDATED.pdf | 174.6 KiB | 2020 May 16 04:59 |
DEF CON 25 - Closing-Slides.pdf | 8.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-UPDATED.pdf | 507.4 KiB | 2020 May 16 04:59 |
DEF CON 25 - spaceB0x-Exploiting-Continuous-Integration-UPDATED.pdf | 2.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation-UPDATED.pdf | 3.6 MiB | 2020 May 16 04:59 |
DEF CON 25 - skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf | 5.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf | 3.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf | 3.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf | 1.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf | 4.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf | 2.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf | 911.6 KiB | 2020 May 16 04:59 |
DEF CON 25 - Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf | 6.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf | 1.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-WP.pdf | 513.0 KiB | 2020 May 16 04:59 |
DEF CON 25 - Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf | 2.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-UPDATED.pdf | 6.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools-UPDATED.pdf | 12.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Redezem-PEIMA-Using-Power-Laws-to-Address-DOS-Attacks-UPDATED.pdf | 750.8 KiB | 2020 May 16 04:59 |
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf | 4.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf | 4.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Joe-Rozner-Wiping-Out-CSRF-UPDATED.pdf | 130.3 KiB | 2020 May 16 04:59 |
DEF CON 25 - Eckert-and-Dewes-Dark-Data-UPDATED.pdf | 7.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf | 2.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf | 5.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Max-Bazaliy-Jailbreaking-Apple-Watch.pdf | 1.3 MiB | 2020 May 16 04:59 |
DEF CON 25 - Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf | 4.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-WP.pdf | 164.7 KiB | 2020 May 16 04:59 |
DEF CON 25 - Damien-Cauquil-Weaponizing-the-BBC-MicroBit-UPDATED.pdf | 2.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles.pdf | 4.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-UPDATED.pdf | 2.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser in-Trending-Programming-Languages-UPDATED.pdf | 5.1 MiB | 2020 May 16 04:59 |
DEF CON 25 - Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf | 2.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf | 1.1 MiB | 2020 May 16 04:59 |
DEF CON 25 - Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud-UPDATED.pdf | 2.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi.pdf | 464.2 KiB | 2020 May 16 04:59 |
DEF CON 25 - Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf | 5.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Alvaro-Munoz-JSON-attacks.pdf | 1.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-WP.pdf | 386.4 KiB | 2020 May 16 04:59 |
DEF CON 25 - Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999-UPDATED.pdf | 4.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf | 1.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf | 5.1 MiB | 2020 May 16 04:59 |
DEF CON 25 - Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients.pdf | 2.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf | 2.3 MiB | 2020 May 16 04:59 |
DEF CON 25 - Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-WP.pdf | 586.4 KiB | 2020 May 16 04:59 |
DEF CON 25 - Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms-UPDATED.pdf | 3.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP-UPDATED.pdf | 125.0 KiB | 2020 May 16 04:59 |
DEF CON 25 - Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf | 3.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf | 20.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf | 7.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf | 57.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf | 1.6 MiB | 2020 May 16 04:59 |
DEF CON 25 - Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent-UPDATED.pdf | 2.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus-WP.pdf | 1.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf | 310.3 KiB | 2020 May 16 04:59 |
DEF CON 25 - Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf | 2.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf | 2.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-UPDATED.pdf | 6.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-UPDATED.pdf | 1.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - FuzzyNop-and-Ceyx-MEATPISTOL-A-Modular-Malware-Implant-Framework-UPDATED.pdf | 4.6 MiB | 2020 May 16 04:59 |
DEF CON 25 - Caleb-Madrigal-IOT-Hacking-With-SDR.pdf | 4.3 MiB | 2020 May 16 04:59 |
DEF CON 25 - Panel-Corman-and-Congressmen-DC-to-DEFCON-UPDATED.pdf | 6.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Tess-Schrodinger-Total-Recall.pdf | 5.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus.pdf | 1.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf | 6.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf | 4.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf | 6.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf | 8.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf | 4.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Konstantinos-Karagiannis-Hacking-Smart-Contracts-UPDATED.pdf | 1.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-UPDATED.pdf | 10.1 MiB | 2020 May 16 04:59 |
DEF CON 25 - 0ctane-Untrustworthy-Hardware.pdf | 2.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox.pdf | 7.1 MiB | 2020 May 16 04:59 |
DEF CON 25 - Dor-Azouri-BITSInject.pdf | 827.9 KiB | 2020 May 16 04:59 |
DEF CON 25 - Roger-Dingledine-Next-Generation-Tor-Onion-Services-UPDATED.pdf | 2.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf | 4.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI-UPDATED.pdf | 4.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf | 5.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf | 6.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - zerosum0x0-alephnaught-Koadic-C3.pdf | 1.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf | 3.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox-WP.pdf | 1.3 MiB | 2020 May 16 04:59 |
DEF CON 25 - Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf | 799.3 KiB | 2020 May 16 04:59 |
DEF CON 25 - Ilja-van-Sprundel-BSD-Kern-Vulns-UPDATED.pdf | 2.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf | 6.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Joe-Rozner-Wiping-Out-CSRF.pdf | 131.4 KiB | 2020 May 16 04:59 |
DEF CON 25 - Josh-Pitts-Teaching-Old-Shellcode-New-Tricks.pdf | 5.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf | 2.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks-UPDATED.pdf | 3.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf | 2.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Max-Bazaliy-Jailbreaking-Apple-Watch-UPDATED.pdf | 4.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf | 6.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Nathan-Seidle-Open-Source-Safe-Cracking-Robots-UPDATED.pdf | 6.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Christopher-Domas-Breaking-The-x86-ISA.pdf | 5.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Omar-Eissa-Attacking-Autonomic-Networks-UPDATED.pdf | 2.6 MiB | 2020 May 16 04:59 |
DEF CON 25 - Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android-UPDATED.pdf | 899.7 KiB | 2020 May 16 04:59 |
DEF CON 25 - skud-and-Sky-If-You-Give-A-Mouse-A-Microchip-UPDATED.pdf | 5.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Hanno-Boeck-Abusing-Certificate-Transparency-Logs-UPDATED.pdf | 851.2 KiB | 2020 May 16 04:59 |
DEF CON 25 - Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf | 6.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf | 2.4 MiB | 2020 May 16 04:59 |
DEF CON 25 - Jon-Medina-Where-are-all-the-SDN-Talks-UPDATED.pdf | 4.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Plore-Popping-a-Smart-Gun-UPDATED.pdf | 4.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients-WP.pdf | 1.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf | 5.3 MiB | 2020 May 16 04:59 |
DEF CON 25 - Svea-Eckert-Andreas-Dewes-Dark-Data.pdf | 6.2 MiB | 2020 May 16 04:59 |
DEF CON 25 - Dor-Azouri-BITSInject-WP.pdf | 1.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf | 2.7 MiB | 2020 May 16 04:59 |
DEF CON 25 - Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf | 6.8 MiB | 2020 May 16 04:59 |
DEF CON 25 - Cooper-Quintin-and-Kashmir-Hill-The-Internet-Already-Knows-Im-Pregnant-UPDATED.pdf | 3.9 MiB | 2020 May 16 04:59 |
DEF CON 25 - Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf | 6.0 MiB | 2020 May 16 04:59 |
DEF CON 25 - Josh-Pitts-Teaching-Old-Shellcode-New-Tricks-UPDATED.pdf | 3.5 MiB | 2020 May 16 04:59 |
DEF CON 25 - Cory-Doctorow-Steps-Forward-Steps-Back-How-Can-We-Tell-If-We-Are-Winning-UPDATED.pdf | 9.6 MiB | 2020 May 16 04:59 |
DEF CON 25 - Patrick-Wardle-Death-by-1000-Installers-on-MacOS-UPDATED.pdf | 29.3 MiB | 2020 May 16 04:59 |
DEF CON 25 - Macpherson-and-Temmingh-Finding-Useful-info-with-Maltego-UPDATED.pdf | 38.9 MiB | 2020 May 16 04:59 |