Media Server
Home
|
Mastodon
|
Forums
|
Groups
|
FAQ
|
RSS
|
.onion
|
/DEF CON 25/DEF CON 25 video and slides/
File Name
↓
File Size
↓
Date
↓
Parent directory/
-
-
DEF CON 25 - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.mp4
128.4 MiB
2020 May 27 07:23
DEF CON 25 - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.srt
44.7 KiB
2020 May 16 12:02
DEF CON 25 - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.txt
34.7 KiB
2024 Apr 29 21:51
DEF CON 25 - Andrea Matwyshyn and Panel - Panel- Meet The Feds.srt
94.4 KiB
2020 May 16 12:02
DEF CON 25 - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.mp4
182.2 MiB
2020 May 27 07:23
DEF CON 25 - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.srt
57.6 KiB
2020 May 16 12:02
DEF CON 25 - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.txt
45.0 KiB
2024 Apr 29 22:03
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation.mp4
169.9 MiB
2020 May 27 07:23
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation.srt
37.4 KiB
2020 May 16 12:02
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation.txt
28.3 KiB
2024 Apr 29 22:17
DEF CON 25 - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.mp4
117.8 MiB
2020 May 27 07:23
DEF CON 25 - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.srt
29.0 KiB
2020 May 16 12:02
DEF CON 25 - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.txt
22.2 KiB
2024 Apr 29 22:26
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals.mp4
137.9 MiB
2020 May 27 07:23
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals.srt
37.4 KiB
2020 May 16 12:03
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals.txt
29.4 KiB
2024 Apr 29 22:37
DEF CON 25 - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.mp4
64.0 MiB
2020 May 27 07:23
DEF CON 25 - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.srt
25.7 KiB
2020 May 16 12:02
DEF CON 25 - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.txt
19.3 KiB
2024 Apr 29 22:44
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus.mp4
61.8 MiB
2020 May 27 07:23
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus.srt
8.4 KiB
2020 May 16 12:02
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus.txt
6.5 KiB
2024 Apr 29 22:48
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.mp4
184.9 MiB
2020 May 27 07:23
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.srt
52.3 KiB
2020 May 16 12:02
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.txt
39.1 KiB
2024 Apr 29 23:01
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.mp4
201.0 MiB
2020 May 27 07:23
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.srt
53.2 KiB
2020 May 16 12:02
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.txt
39.1 KiB
2024 Apr 29 23:16
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set .mp4
170.1 MiB
2020 May 27 07:23
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set .srt
62.0 KiB
2020 May 16 12:02
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set .txt
46.1 KiB
2024 Apr 29 23:31
DEF CON 25 - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.mp4
137.3 MiB
2020 May 27 07:23
DEF CON 25 - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.srt
46.4 KiB
2020 May 16 12:02
DEF CON 25 - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.txt
35.9 KiB
2024 Apr 29 23:43
DEF CON 25 - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.mp4
188.3 MiB
2020 May 27 07:23
DEF CON 25 - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.txt
42.3 KiB
2024 Apr 29 23:52
DEF CON 25 - Cory Doctorow - BIGNUM steps forward, TRUMPNUM steps back how can we tell if we're winning.srt
55.5 KiB
2020 May 16 12:02
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit.mp4
143.0 MiB
2020 May 27 07:23
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit.srt
34.2 KiB
2020 May 16 12:02
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit.txt
25.5 KiB
2024 Apr 30 00:02
DEF CON 25 - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.mp4
152.8 MiB
2020 May 27 07:23
DEF CON 25 - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.srt
59.6 KiB
2020 May 16 12:02
DEF CON 25 - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.txt
45.7 KiB
2024 Apr 30 00:15
DEF CON 25 - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.mp4
170.2 MiB
2020 May 27 07:23
DEF CON 25 - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.txt
47.4 KiB
2024 Apr 30 00:28
DEF CON 25 - Daniel Bohannon, Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.srt
61.2 KiB
2020 May 16 12:02
DEF CON 25 - David Robinson - Using GPS Spoofing to control time .mp4
149.9 MiB
2020 May 27 07:23
DEF CON 25 - David Robinson - Using GPS Spoofing to control time .srt
39.0 KiB
2020 May 16 12:02
DEF CON 25 - David Robinson - Using GPS Spoofing to control time .txt
30.2 KiB
2024 Apr 30 00:42
DEF CON 25 - Dennis Maldonado - Real-time RFID Cloning in the Field.mp4
86.6 MiB
2020 May 27 07:23
DEF CON 25 - Dennis Maldonado - Real-time RFID Cloning in the Field.srt
26.6 KiB
2020 May 16 12:02
DEF CON 25 - Dennis Maldonado - Real-time RFID Cloning in the Field.txt
20.4 KiB
2024 Apr 30 00:50
DEF CON 25 - Denton Gentry - I Know What You Are by the Smell of Your Wifi.mp4
66.1 MiB
2020 May 27 07:23
DEF CON 25 - Denton Gentry - I Know What You Are by the Smell of Your Wifi.srt
22.2 KiB
2020 May 16 12:02
DEF CON 25 - Denton Gentry - I Know What You Are by the Smell of Your Wifi.txt
16.7 KiB
2024 Apr 30 00:58
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control.mp4
86.5 MiB
2020 May 27 07:23
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control.srt
23.5 KiB
2020 May 16 12:02
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control.txt
17.2 KiB
2024 Apr 30 01:03
DEF CON 25 - Dor Azouri - BITSInject.mp4
81.7 MiB
2020 May 27 07:23
DEF CON 25 - Dor Azouri - BITSInject.srt
19.5 KiB
2020 May 16 12:02
DEF CON 25 - Dor Azouri - BITSInject.txt
15.8 KiB
2024 Apr 30 01:09
DEF CON 25 - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.mp4
183.6 MiB
2020 May 27 07:23
DEF CON 25 - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.srt
48.9 KiB
2020 May 16 12:02
DEF CON 25 - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.txt
39.1 KiB
2024 Apr 30 01:25
DEF CON 25 - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.mp4
116.7 MiB
2020 May 27 07:23
DEF CON 25 - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.srt
48.4 KiB
2020 May 16 12:02
DEF CON 25 - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.txt
36.9 KiB
2024 Apr 30 01:35
DEF CON 25 - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.mp4
163.0 MiB
2020 May 27 07:23
DEF CON 25 - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.srt
58.5 KiB
2020 May 16 12:02
DEF CON 25 - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.txt
43.7 KiB
2024 Apr 30 01:45
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation.mp4
186.7 MiB
2020 May 27 07:23
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation.srt
68.6 KiB
2020 May 16 12:03
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation.txt
48.1 KiB
2024 Apr 30 01:56
DEF CON 25 - Garry Kasparov - The Brain's Last Stand.mp4
201.3 MiB
2020 May 27 07:23
DEF CON 25 - Garry Kasparov - The Brain's Last Stand.srt
55.2 KiB
2020 May 16 12:02
DEF CON 25 - Garry Kasparov - The Brain's Last Stand.txt
39.7 KiB
2024 Apr 30 02:08
DEF CON 25 - Gerald Steere - Sean Metcalf - Hacking the Cloud.mp4
155.9 MiB
2020 May 27 07:23
DEF CON 25 - Gerald Steere - Sean Metcalf - Hacking the Cloud.srt
56.3 KiB
2020 May 16 12:02
DEF CON 25 - Gerald Steere - Sean Metcalf - Hacking the Cloud.txt
44.6 KiB
2024 Apr 30 02:24
DEF CON 25 - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.srt
38.1 KiB
2020 May 16 12:02
DEF CON 25 - Gil Cohen - Call the plumber - you have a leak in your named pipe.mp4
159.7 MiB
2020 May 27 07:23
DEF CON 25 - Gil Cohen - Call the plumber - you have a leak in your named pipe.txt
28.4 KiB
2024 Apr 30 02:31
DEF CON 25 - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.mp4
145.5 MiB
2020 May 27 07:23
DEF CON 25 - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.srt
46.2 KiB
2020 May 16 12:03
DEF CON 25 - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.txt
37.0 KiB
2024 Apr 30 02:45
DEF CON 25 - Hanno Bock - Abusing Certificate Transparency Logs.mp4
91.0 MiB
2020 May 27 07:23
DEF CON 25 - Hanno Bock - Abusing Certificate Transparency Logs.srt
31.7 KiB
2020 May 16 12:02
DEF CON 25 - Hanno Bock - Abusing Certificate Transparency Logs.txt
24.5 KiB
2024 Apr 30 02:52
DEF CON 25 - Haoqi Shan and Jian Yuan - Man in the NFC.mp4
142.1 MiB
2020 May 27 07:23
DEF CON 25 - Haoqi Shan and Jian Yuan - Man in the NFC.txt
23.7 KiB
2024 Apr 30 03:04
DEF CON 25 - Haoqi Shan, Jian Yuan - Man in the NFC.srt
32.2 KiB
2020 May 16 12:02
DEF CON 25 - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.mp4
476.5 MiB
2020 May 27 07:23
DEF CON 25 - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.srt
123.8 KiB
2020 May 16 12:02
DEF CON 25 - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.txt
88.1 KiB
2024 Apr 30 03:41
DEF CON 25 - Hyrum Anderson - Evading next-gen AV using artificial intelligence.mp4
54.2 MiB
2020 May 27 07:23
DEF CON 25 - Hyrum Anderson - Evading next-gen AV using artificial intelligence.srt
22.4 KiB
2020 May 16 12:03
DEF CON 25 - Hyrum Anderson - Evading next-gen AV using artificial intelligence.txt
17.5 KiB
2024 Apr 30 03:47
DEF CON 25 - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.mp4
205.0 MiB
2020 May 27 07:23
DEF CON 25 - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.srt
61.3 KiB
2020 May 16 12:03
DEF CON 25 - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.txt
47.0 KiB
2024 Apr 30 04:02
DEF CON 25 - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.mp4
123.7 MiB
2020 May 27 07:23
DEF CON 25 - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.srt
54.5 KiB
2020 May 16 12:02
DEF CON 25 - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.txt
41.0 KiB
2024 Apr 30 04:15
DEF CON 25 - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.mp4
148.1 MiB
2020 May 27 07:23
DEF CON 25 - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.srt
40.5 KiB
2020 May 16 12:02
DEF CON 25 - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.txt
30.9 KiB
2024 Apr 30 04:27
DEF CON 25 - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.mp4
164.1 MiB
2020 May 27 07:23
DEF CON 25 - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.srt
52.8 KiB
2020 May 16 12:02
DEF CON 25 - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.txt
40.2 KiB
2024 Apr 30 04:42
DEF CON 25 - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.mp4
101.0 MiB
2020 May 27 07:23
DEF CON 25 - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.srt
37.3 KiB
2020 May 16 12:02
DEF CON 25 - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.txt
28.3 KiB
2024 Apr 30 04:52
DEF CON 25 - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.mp4
151.8 MiB
2020 May 27 07:23
DEF CON 25 - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.txt
39.0 KiB
2024 Apr 30 05:04
DEF CON 25 - Jason Hernandez and Sam Richards, Jerod MacDonald-Evoy - Tracking Spies in the Skies.srt
48.4 KiB
2020 May 16 12:02
DEF CON 25 - Jason Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.mp4
98.5 MiB
2020 May 27 07:23
DEF CON 25 - Jason Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.txt
25.3 KiB
2024 Apr 30 05:10
DEF CON 25 - Jeff Moss and Panel - Panel - DEF CON Groups.mp4
216.8 MiB
2020 May 27 07:23
DEF CON 25 - Jeff Moss and Panel - Panel - DEF CON Groups.srt
66.1 KiB
2020 May 16 12:02
DEF CON 25 - Jeff Moss and Panel - Panel - DEF CON Groups.txt
46.5 KiB
2024 Apr 30 05:24
DEF CON 25 - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.mp4
167.2 MiB
2020 May 27 07:23
DEF CON 25 - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.srt
48.2 KiB
2020 May 16 12:02
DEF CON 25 - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.txt
38.7 KiB
2024 Apr 30 05:38
DEF CON 25 - Joe Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.mp4
174.4 MiB
2020 May 27 07:23
DEF CON 25 - Joe Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.txt
45.4 KiB
2024 Apr 30 05:54
DEF CON 25 - Joe Rozner - Wiping out CSRF.mp4
180.7 MiB
2020 May 27 07:23
DEF CON 25 - Joe Rozner - Wiping out CSRF.srt
52.0 KiB
2020 May 16 12:03
DEF CON 25 - Joe Rozner - Wiping out CSRF.txt
40.5 KiB
2024 Apr 30 06:09
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.mp4
174.1 MiB
2020 May 27 07:23
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.srt
56.0 KiB
2020 May 16 12:03
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.txt
41.5 KiB
2024 Apr 30 06:19
DEF CON 25 - Jon Medina - Where are the SDN Security Talks-.mp4
169.2 MiB
2020 May 27 07:23
DEF CON 25 - Jon Medina - Where are the SDN Security Talks-.srt
49.5 KiB
2020 May 16 12:02
DEF CON 25 - Jon Medina - Where are the SDN Security Talks-.txt
37.6 KiB
2024 Apr 30 06:31
DEF CON 25 - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.mp4
75.3 MiB
2020 May 27 07:23
DEF CON 25 - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.srt
24.1 KiB
2020 May 16 12:02
DEF CON 25 - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.txt
18.8 KiB
2024 Apr 30 06:38
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks.mp4
95.0 MiB
2020 May 27 07:23
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks.srt
33.6 KiB
2020 May 16 12:02
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks.txt
26.8 KiB
2024 Apr 30 06:47
DEF CON 25 - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.mp4
155.4 MiB
2020 May 27 07:23
DEF CON 25 - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.txt
35.3 KiB
2024 Apr 30 06:57
DEF CON 25 - Josh Schwartz and John Cramb - MEATPISTOL, A Modular Malware Implant Framework.srt
48.0 KiB
2020 May 16 12:02
DEF CON 25 - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.srt
33.7 KiB
2020 May 16 12:02
DEF CON 25 - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.srt
59.3 KiB
2020 May 16 12:02
DEF CON 25 - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.mp4
54.6 MiB
2020 May 27 07:23
DEF CON 25 - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.srt
16.8 KiB
2020 May 16 12:02
DEF CON 25 - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.txt
13.4 KiB
2024 Apr 30 07:02
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts.mp4
163.5 MiB
2020 May 27 07:23
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts.srt
50.9 KiB
2020 May 16 12:02
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts.txt
38.7 KiB
2024 Apr 30 07:11
DEF CON 25 - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.mp4
91.7 MiB
2020 May 27 07:23
DEF CON 25 - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.srt
26.4 KiB
2020 May 16 12:02
DEF CON 25 - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.mp4
174.7 MiB
2020 May 27 07:23
DEF CON 25 - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.srt
48.7 KiB
2020 May 16 12:02
DEF CON 25 - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.txt
40.4 KiB
2024 Apr 30 07:26
DEF CON 25 - Macpherson and Temmingh - Uncovering useful and embarrassing info with Maltego.mp4
187.4 MiB
2020 May 27 07:23
DEF CON 25 - Macpherson and Temmingh - Uncovering useful and embarrassing info with Maltego.srt
62.1 KiB
2020 May 16 12:03
DEF CON 25 - Macpherson and Temmingh - Uncovering useful and embarrassing info with Maltego.txt
47.4 KiB
2024 Apr 30 07:38
DEF CON 25 - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.mp4
153.0 MiB
2020 May 27 07:23
DEF CON 25 - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.txt
33.9 KiB
2024 Apr 30 07:54
DEF CON 25 - Manfred - Twenty Years of MMORPG Hacking- Better Graphics, Same Exploits.srt
44.2 KiB
2020 May 16 12:02
DEF CON 25 - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.mp4
173.8 MiB
2020 May 27 07:23
DEF CON 25 - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.srt
57.3 KiB
2020 May 16 12:02
DEF CON 25 - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.txt
42.5 KiB
2024 Apr 30 08:04
DEF CON 25 - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.mp4
165.7 MiB
2020 May 27 07:23
DEF CON 25 - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.srt
47.8 KiB
2020 May 16 12:02
DEF CON 25 - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.txt
36.0 KiB
2024 Apr 30 08:16
DEF CON 25 - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.mp4
119.3 MiB
2020 May 27 07:23
DEF CON 25 - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.srt
34.8 KiB
2020 May 16 12:02
DEF CON 25 - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.txt
28.0 KiB
2024 Apr 30 08:27
DEF CON 25 - Matt Joyce - Amateur Digital Archeology.mp4
175.0 MiB
2020 May 27 07:23
DEF CON 25 - Matt Joyce - Amateur Digital Archeology.srt
61.3 KiB
2020 May 16 12:02
DEF CON 25 - Matt Joyce - Amateur Digital Archeology.txt
47.7 KiB
2024 Apr 30 08:40
DEF CON 25 - Matt Knight - Radio Exploitation 101.mp4
137.8 MiB
2020 May 27 07:23
DEF CON 25 - Matt Knight - Radio Exploitation 101.srt
48.5 KiB
2020 May 16 12:03
DEF CON 25 - Matt Knight - Radio Exploitation 101.txt
37.5 KiB
2024 Apr 30 08:50
DEF CON 25 - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.mp4
137.3 MiB
2020 May 27 07:23
DEF CON 25 - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.srt
38.8 KiB
2020 May 16 12:03
DEF CON 25 - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.txt
31.9 KiB
2024 Apr 30 09:05
DEF CON 25 - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.mp4
184.3 MiB
2020 May 27 07:23
DEF CON 25 - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.txt
35.8 KiB
2024 Apr 30 09:15
DEF CON 25 - Matt Wixey - See no evil, hear no evil - Hacking invisibly and silently with light and sound.srt
49.8 KiB
2020 May 16 12:03
DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch.mp4
155.8 MiB
2020 May 27 07:23
DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch.srt
37.8 KiB
2020 May 16 12:03
DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch.txt
30.3 KiB
2024 Apr 30 09:29
DEF CON 25 - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.mp4
127.9 MiB
2020 May 27 07:23
DEF CON 25 - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.srt
38.5 KiB
2020 May 16 12:02
DEF CON 25 - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.txt
30.7 KiB
2024 Apr 30 09:42
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999.mp4
82.6 MiB
2020 May 27 07:23
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999.srt
23.3 KiB
2020 May 16 12:03
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999.txt
18.3 KiB
2024 Apr 30 09:50
DEF CON 25 - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.srt
23.1 KiB
2020 May 16 12:02
DEF CON 25 - Min Zheng and Xiangyu Liu - macOS-iOS Kernel Debugging and Heap Feng Shui.mp4
110.0 MiB
2020 May 27 07:23
DEF CON 25 - Min Zheng and Xiangyu Liu - macOS-iOS Kernel Debugging and Heap Feng Shui.txt
19.0 KiB
2024 Apr 30 10:00
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.mp4
126.4 MiB
2020 May 27 07:23
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.srt
36.3 KiB
2020 May 16 12:02
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.txt
28.6 KiB
2024 Apr 30 10:06
DEF CON 25 - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.srt
53.4 KiB
2020 May 16 12:02
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.mp4
118.9 MiB
2020 May 27 07:23
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.srt
31.6 KiB
2020 May 16 12:02
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.txt
24.6 KiB
2024 Apr 30 10:16
DEF CON 25 - Nick Cano - XenoScan- Scanning Memory Like a Boss.mp4
139.6 MiB
2020 May 27 07:23
DEF CON 25 - Nick Cano - XenoScan- Scanning Memory Like a Boss.srt
48.3 KiB
2020 May 16 12:02
DEF CON 25 - Nick Cano - XenoScan- Scanning Memory Like a Boss.txt
38.4 KiB
2024 Apr 30 10:28
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It.mp4
58.5 MiB
2020 May 27 07:23
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It.srt
25.8 KiB
2020 May 16 12:02
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It.txt
19.9 KiB
2024 Apr 30 10:34
DEF CON 25 - Omar Eissa - Attacking Autonomic Networks.mp4
157.4 MiB
2020 May 27 07:23
DEF CON 25 - Omar Eissa - Attacking Autonomic Networks.srt
39.3 KiB
2020 May 16 12:02
DEF CON 25 - Omar Eissa - Attacking Autonomic Networks.txt
30.2 KiB
2024 Apr 30 10:46
DEF CON 25 - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4
158.5 MiB
2020 May 27 07:23
DEF CON 25 - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.srt
32.7 KiB
2020 May 16 12:03
DEF CON 25 - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.txt
27.0 KiB
2024 Apr 30 11:02
DEF CON 25 - Patrick DeSantis - From Box to Backdoor.mp4
124.7 MiB
2020 May 27 07:23
DEF CON 25 - Patrick DeSantis - From Box to Backdoor.srt
37.2 KiB
2020 May 16 12:02
DEF CON 25 - Patrick DeSantis - From Box to Backdoor.txt
29.2 KiB
2024 Apr 30 11:13
DEF CON 25 - Patrick Wardle - Death By 1000 Installers; on macOS, it's all broken!.srt
59.5 KiB
2020 May 16 12:03
DEF CON 25 - Patrick Wardle - Death By 1000 Installers_ on macOS and it's all broken!.mp4
164.6 MiB
2020 May 27 07:23
DEF CON 25 - Patrick Wardle - Death By 1000 Installers_ on macOS and it's all broken!.txt
47.2 KiB
2024 Apr 30 11:26
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.mp4
86.6 MiB
2020 May 27 07:23
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.srt
28.2 KiB
2020 May 16 12:02
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.txt
22.6 KiB
2024 Apr 30 11:33
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.mp4
75.9 MiB
2020 May 27 07:23
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.srt
26.1 KiB
2020 May 16 12:02
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.txt
20.4 KiB
2024 Apr 30 11:38
DEF CON 25 - Philip Tully and Michael T Raggo - A Picture is Worth a Thousand Words and Literally.mp4
157.1 MiB
2020 May 27 07:23
DEF CON 25 - Philip Tully and Michael T Raggo - A Picture is Worth a Thousand Words and Literally.txt
47.0 KiB
2024 Apr 30 11:55
DEF CON 25 - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words, Literally.srt
59.6 KiB
2020 May 16 12:02
DEF CON 25 - Plore - Popping a Smart Gun.mp4
111.6 MiB
2020 May 27 07:23
DEF CON 25 - Plore - Popping a Smart Gun.srt
49.1 KiB
2020 May 16 12:02
DEF CON 25 - Plore - Popping a Smart Gun.txt
38.3 KiB
2024 Apr 30 12:10
DEF CON 25 - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.mp4
107.6 MiB
2020 May 27 07:23
DEF CON 25 - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.srt
44.2 KiB
2020 May 16 12:02
DEF CON 25 - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.txt
35.5 KiB
2024 Apr 30 12:20
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.mp4
81.4 MiB
2020 May 27 07:23
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.srt
25.9 KiB
2020 May 16 12:02
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.txt
18.7 KiB
2024 Apr 30 12:26
DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back - 212.srt
57.0 KiB
2020 May 16 12:03
DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.mp4
165.3 MiB
2020 May 27 07:23
DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.txt
43.5 KiB
2024 Apr 30 12:39
DEF CON 25 - Roger Dingledine - Next-Generation Tor Onion Services.mp4
158.2 MiB
2020 May 27 07:23
DEF CON 25 - Roger Dingledine - Next-Generation Tor Onion Services.srt
57.9 KiB
2020 May 16 12:03
DEF CON 25 - Roger Dingledine - Next-Generation Tor Onion Services.txt
46.0 KiB
2024 Apr 30 12:52
DEF CON 25 - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.mp4
69.1 MiB
2020 May 27 07:23
DEF CON 25 - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.srt
16.6 KiB
2020 May 16 12:03
DEF CON 25 - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.txt
12.3 KiB
2024 Apr 30 12:59
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security.mp4
99.2 MiB
2020 May 27 07:23
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security.srt
27.8 KiB
2020 May 16 12:03
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security.txt
20.7 KiB
2024 Apr 30 13:04
DEF CON 25 - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.mp4
186.8 MiB
2020 May 27 07:23
DEF CON 25 - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.srt
50.6 KiB
2020 May 16 12:03
DEF CON 25 - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.txt
39.0 KiB
2024 Apr 30 13:16
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.mp4
67.7 MiB
2020 May 27 07:23
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.srt
15.7 KiB
2020 May 16 12:03
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.txt
12.8 KiB
2024 Apr 30 13:21
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard - A Year Later.mp4
160.5 MiB
2020 May 27 07:23
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard - A Year Later.srt
41.0 KiB
2020 May 16 12:03
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard - A Year Later.txt
32.5 KiB
2024 Apr 30 13:33
DEF CON 25 - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.mp4
161.3 MiB
2020 May 27 07:23
DEF CON 25 - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.srt
56.1 KiB
2020 May 16 12:02
DEF CON 25 - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.txt
43.2 KiB
2024 Apr 30 13:44
DEF CON 25 - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.mp4
133.7 MiB
2020 May 27 07:23
DEF CON 25 - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.srt
49.0 KiB
2020 May 16 12:02
DEF CON 25 - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.txt
38.0 KiB
2024 Apr 30 13:58
DEF CON 25 - Snide Owen - Phone system testing and other fun tricks.mp4
158.2 MiB
2020 May 27 07:23
DEF CON 25 - Snide Owen - Phone system testing and other fun tricks.srt
44.4 KiB
2020 May 16 12:02
DEF CON 25 - Snide Owen - Phone system testing and other fun tricks.txt
33.6 KiB
2024 Apr 30 14:06
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.mp4
149.5 MiB
2020 May 27 07:23
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.srt
50.6 KiB
2020 May 16 12:02
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.txt
39.6 KiB
2024 Apr 30 14:20
DEF CON 25 - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.mp4
125.4 MiB
2020 May 27 07:23
DEF CON 25 - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.txt
30.4 KiB
2024 Apr 30 14:27
DEF CON 25 - Steinthor Bjarnason, Jason Jones - The call is coming from inside the house.srt
39.8 KiB
2020 May 16 12:02
DEF CON 25 - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.mp4
115.0 MiB
2020 May 27 07:23
DEF CON 25 - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.srt
45.5 KiB
2020 May 16 12:02
DEF CON 25 - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.txt
36.9 KiB
2024 Apr 30 14:42
DEF CON 25 - Svea Owen and Andreas Dewes - Dark Data.mp4
165.2 MiB
2020 May 27 07:23
DEF CON 25 - Svea Owen and Andreas Dewes - Dark Data.srt
40.2 KiB
2020 May 16 12:02
DEF CON 25 - Svea Owen and Andreas Dewes - Dark Data.txt
30.4 KiB
2024 Apr 30 14:50
DEF CON 25 - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.mp4
163.5 MiB
2020 May 27 07:23
DEF CON 25 - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.srt
44.7 KiB
2020 May 16 12:02
DEF CON 25 - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.txt
34.0 KiB
2024 Apr 30 14:58
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25.mp4
64.7 MiB
2020 May 27 07:23
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25.srt
17.8 KiB
2020 May 16 12:03
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25.txt
14.3 KiB
2024 Apr 30 15:03
DEF CON 25 - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.mp4
351.1 MiB
2020 May 27 07:23
DEF CON 25 - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.srt
83.7 KiB
2020 May 16 12:02
DEF CON 25 - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.txt
63.4 KiB
2024 Apr 30 15:33
DEF CON 25 - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.mp4
179.1 MiB
2020 May 27 07:23
DEF CON 25 - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.srt
55.8 KiB
2020 May 16 12:02
DEF CON 25 - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.txt
41.1 KiB
2024 Apr 30 15:42
DEF CON 25 - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.mp4
132.1 MiB
2020 May 27 07:23
DEF CON 25 - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.srt
29.4 KiB
2020 May 16 12:02
DEF CON 25 - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.txt
21.9 KiB
2024 Apr 30 15:50
DEF CON 25 - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.mp4
154.9 MiB
2020 May 27 07:23
DEF CON 25 - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.txt
39.8 KiB
2024 Apr 30 16:00
DEF CON 25 - Trey Forgety - Inside the “Meet Desai” Attack - Defending Distributed Targets from Distributed Attacks.srt
54.7 KiB
2020 May 16 12:02
DEF CON 25 - trixr4skids - DOOMed Point of Sale Systems.mp4
137.9 MiB
2020 May 27 07:23
DEF CON 25 - trixr4skids - DOOMed Point of Sale Systems.srt
49.8 KiB
2020 May 16 12:02
DEF CON 25 - trixr4skids - DOOMed Point of Sale Systems.txt
37.2 KiB
2024 Apr 30 16:10
DEF CON 25 - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.mp4
85.9 MiB
2020 May 27 07:23
DEF CON 25 - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.srt
40.7 KiB
2020 May 16 12:03
DEF CON 25 - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.txt
30.2 KiB
2024 Apr 30 16:19
DEF CON 25 - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.mp4
476.6 MiB
2020 May 27 07:23
DEF CON 25 - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.srt
159.5 KiB
2020 May 16 12:02
DEF CON 25 - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.txt
115.8 KiB
2024 May 01 04:38
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.mp4
156.9 MiB
2020 May 27 07:23
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.srt
53.5 KiB
2020 May 16 12:02
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.txt
39.2 KiB
2024 May 01 04:47
DEF CON 25 - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.mp4
177.1 MiB
2020 May 27 07:23
DEF CON 25 - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.txt
41.9 KiB
2024 May 01 05:03
DEF CON 25 - Whitney Merrill and Terrell McSweeny - Tick, Tick, Tick.Boom You're Dead - Tech and the FTC.srt
53.4 KiB
2020 May 16 12:02
DEF CON 25 - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.mp4
75.8 MiB
2020 May 27 07:23
DEF CON 25 - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.srt
23.9 KiB
2020 May 16 12:03
DEF CON 25 - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.txt
17.8 KiB
2024 May 01 05:07
DEF CON 25 - XlogicX - Assembly Language is Too High Level.mp4
189.8 MiB
2020 May 27 07:23
DEF CON 25 - XlogicX - Assembly Language is Too High Level.srt
60.6 KiB
2020 May 16 12:03
DEF CON 25 - XlogicX - Assembly Language is Too High Level.txt
48.2 KiB
2024 May 01 05:20
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis.mp4
195.0 MiB
2020 May 27 07:23
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis.srt
53.8 KiB
2020 May 16 12:02
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis.txt
38.1 KiB
2024 May 01 05:34
DEF CON 25 - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.mp4
151.7 MiB
2020 May 27 07:23
DEF CON 25 - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.srt
27.3 KiB
2020 May 16 12:03
DEF CON 25 - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.txt
21.9 KiB
2024 May 01 05:47
DEF CON 25 - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.mp4
172.2 MiB
2020 May 27 07:23
DEF CON 25 - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.srt
68.4 KiB
2020 May 16 12:03
DEF CON 25 - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.txt
54.0 KiB
2024 May 01 06:06