DEF CON logo

Media Server

  • Home |
  • Mastodon |
  • Forums |
  • Groups |
  • FAQ |
  • RSS |
  • .onion |

/DEF CON 25/DEF CON 25 video and slides/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 25 - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.mp4128.4 MiB2020 May 27 07:23
DEF CON 25 - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.srt44.7 KiB2020 May 16 12:02
DEF CON 25 - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.txt34.7 KiB2024 Apr 29 21:51
DEF CON 25 - Andrea Matwyshyn and Panel - Panel- Meet The Feds.srt94.4 KiB2020 May 16 12:02
DEF CON 25 - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.mp4182.2 MiB2020 May 27 07:23
DEF CON 25 - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.srt57.6 KiB2020 May 16 12:02
DEF CON 25 - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.txt45.0 KiB2024 Apr 29 22:03
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation.mp4169.9 MiB2020 May 27 07:23
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation.srt37.4 KiB2020 May 16 12:02
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation.txt28.3 KiB2024 Apr 29 22:17
DEF CON 25 - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.mp4117.8 MiB2020 May 27 07:23
DEF CON 25 - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.srt29.0 KiB2020 May 16 12:02
DEF CON 25 - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.txt22.2 KiB2024 Apr 29 22:26
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals.mp4137.9 MiB2020 May 27 07:23
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals.srt37.4 KiB2020 May 16 12:03
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals.txt29.4 KiB2024 Apr 29 22:37
DEF CON 25 - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.mp464.0 MiB2020 May 27 07:23
DEF CON 25 - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.srt25.7 KiB2020 May 16 12:02
DEF CON 25 - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.txt19.3 KiB2024 Apr 29 22:44
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus.mp461.8 MiB2020 May 27 07:23
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus.srt8.4 KiB2020 May 16 12:02
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus.txt6.5 KiB2024 Apr 29 22:48
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.mp4184.9 MiB2020 May 27 07:23
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.srt52.3 KiB2020 May 16 12:02
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.txt39.1 KiB2024 Apr 29 23:01
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.mp4201.0 MiB2020 May 27 07:23
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.srt53.2 KiB2020 May 16 12:02
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.txt39.1 KiB2024 Apr 29 23:16
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set .mp4170.1 MiB2020 May 27 07:23
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set .srt62.0 KiB2020 May 16 12:02
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set .txt46.1 KiB2024 Apr 29 23:31
DEF CON 25 - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.mp4137.3 MiB2020 May 27 07:23
DEF CON 25 - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.srt46.4 KiB2020 May 16 12:02
DEF CON 25 - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.txt35.9 KiB2024 Apr 29 23:43
DEF CON 25 - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.mp4188.3 MiB2020 May 27 07:23
DEF CON 25 - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.txt42.3 KiB2024 Apr 29 23:52
DEF CON 25 - Cory Doctorow - BIGNUM steps forward, TRUMPNUM steps back how can we tell if we're winning.srt55.5 KiB2020 May 16 12:02
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit.mp4143.0 MiB2020 May 27 07:23
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit.srt34.2 KiB2020 May 16 12:02
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit.txt25.5 KiB2024 Apr 30 00:02
DEF CON 25 - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.mp4152.8 MiB2020 May 27 07:23
DEF CON 25 - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.srt59.6 KiB2020 May 16 12:02
DEF CON 25 - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.txt45.7 KiB2024 Apr 30 00:15
DEF CON 25 - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.mp4170.2 MiB2020 May 27 07:23
DEF CON 25 - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.txt47.4 KiB2024 Apr 30 00:28
DEF CON 25 - Daniel Bohannon, Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.srt61.2 KiB2020 May 16 12:02
DEF CON 25 - David Robinson - Using GPS Spoofing to control time .mp4149.9 MiB2020 May 27 07:23
DEF CON 25 - David Robinson - Using GPS Spoofing to control time .srt39.0 KiB2020 May 16 12:02
DEF CON 25 - David Robinson - Using GPS Spoofing to control time .txt30.2 KiB2024 Apr 30 00:42
DEF CON 25 - Dennis Maldonado - Real-time RFID Cloning in the Field.mp486.6 MiB2020 May 27 07:23
DEF CON 25 - Dennis Maldonado - Real-time RFID Cloning in the Field.srt26.6 KiB2020 May 16 12:02
DEF CON 25 - Dennis Maldonado - Real-time RFID Cloning in the Field.txt20.4 KiB2024 Apr 30 00:50
DEF CON 25 - Denton Gentry - I Know What You Are by the Smell of Your Wifi.mp466.1 MiB2020 May 27 07:23
DEF CON 25 - Denton Gentry - I Know What You Are by the Smell of Your Wifi.srt22.2 KiB2020 May 16 12:02
DEF CON 25 - Denton Gentry - I Know What You Are by the Smell of Your Wifi.txt16.7 KiB2024 Apr 30 00:58
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control.mp486.5 MiB2020 May 27 07:23
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control.srt23.5 KiB2020 May 16 12:02
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control.txt17.2 KiB2024 Apr 30 01:03
DEF CON 25 - Dor Azouri - BITSInject.mp481.7 MiB2020 May 27 07:23
DEF CON 25 - Dor Azouri - BITSInject.srt19.5 KiB2020 May 16 12:02
DEF CON 25 - Dor Azouri - BITSInject.txt15.8 KiB2024 Apr 30 01:09
DEF CON 25 - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.mp4183.6 MiB2020 May 27 07:23
DEF CON 25 - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.srt48.9 KiB2020 May 16 12:02
DEF CON 25 - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.txt39.1 KiB2024 Apr 30 01:25
DEF CON 25 - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.mp4116.7 MiB2020 May 27 07:23
DEF CON 25 - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.srt48.4 KiB2020 May 16 12:02
DEF CON 25 - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.txt36.9 KiB2024 Apr 30 01:35
DEF CON 25 - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.mp4163.0 MiB2020 May 27 07:23
DEF CON 25 - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.srt58.5 KiB2020 May 16 12:02
DEF CON 25 - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.txt43.7 KiB2024 Apr 30 01:45
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation.mp4186.7 MiB2020 May 27 07:23
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation.srt68.6 KiB2020 May 16 12:03
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation.txt48.1 KiB2024 Apr 30 01:56
DEF CON 25 - Garry Kasparov - The Brain's Last Stand.mp4201.3 MiB2020 May 27 07:23
DEF CON 25 - Garry Kasparov - The Brain's Last Stand.srt55.2 KiB2020 May 16 12:02
DEF CON 25 - Garry Kasparov - The Brain's Last Stand.txt39.7 KiB2024 Apr 30 02:08
DEF CON 25 - Gerald Steere - Sean Metcalf - Hacking the Cloud.mp4155.9 MiB2020 May 27 07:23
DEF CON 25 - Gerald Steere - Sean Metcalf - Hacking the Cloud.srt56.3 KiB2020 May 16 12:02
DEF CON 25 - Gerald Steere - Sean Metcalf - Hacking the Cloud.txt44.6 KiB2024 Apr 30 02:24
DEF CON 25 - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.srt38.1 KiB2020 May 16 12:02
DEF CON 25 - Gil Cohen - Call the plumber - you have a leak in your named pipe.mp4159.7 MiB2020 May 27 07:23
DEF CON 25 - Gil Cohen - Call the plumber - you have a leak in your named pipe.txt28.4 KiB2024 Apr 30 02:31
DEF CON 25 - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.mp4145.5 MiB2020 May 27 07:23
DEF CON 25 - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.srt46.2 KiB2020 May 16 12:03
DEF CON 25 - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.txt37.0 KiB2024 Apr 30 02:45
DEF CON 25 - Hanno Bock - Abusing Certificate Transparency Logs.mp491.0 MiB2020 May 27 07:23
DEF CON 25 - Hanno Bock - Abusing Certificate Transparency Logs.srt31.7 KiB2020 May 16 12:02
DEF CON 25 - Hanno Bock - Abusing Certificate Transparency Logs.txt24.5 KiB2024 Apr 30 02:52
DEF CON 25 - Haoqi Shan and Jian Yuan - Man in the NFC.mp4142.1 MiB2020 May 27 07:23
DEF CON 25 - Haoqi Shan and Jian Yuan - Man in the NFC.txt23.7 KiB2024 Apr 30 03:04
DEF CON 25 - Haoqi Shan, Jian Yuan - Man in the NFC.srt32.2 KiB2020 May 16 12:02
DEF CON 25 - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.mp4476.5 MiB2020 May 27 07:23
DEF CON 25 - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.srt123.8 KiB2020 May 16 12:02
DEF CON 25 - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.txt88.1 KiB2024 Apr 30 03:41
DEF CON 25 - Hyrum Anderson - Evading next-gen AV using artificial intelligence.mp454.2 MiB2020 May 27 07:23
DEF CON 25 - Hyrum Anderson - Evading next-gen AV using artificial intelligence.srt22.4 KiB2020 May 16 12:03
DEF CON 25 - Hyrum Anderson - Evading next-gen AV using artificial intelligence.txt17.5 KiB2024 Apr 30 03:47
DEF CON 25 - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.mp4205.0 MiB2020 May 27 07:23
DEF CON 25 - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.srt61.3 KiB2020 May 16 12:03
DEF CON 25 - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.txt47.0 KiB2024 Apr 30 04:02
DEF CON 25 - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.mp4123.7 MiB2020 May 27 07:23
DEF CON 25 - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.srt54.5 KiB2020 May 16 12:02
DEF CON 25 - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.txt41.0 KiB2024 Apr 30 04:15
DEF CON 25 - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.mp4148.1 MiB2020 May 27 07:23
DEF CON 25 - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.srt40.5 KiB2020 May 16 12:02
DEF CON 25 - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.txt30.9 KiB2024 Apr 30 04:27
DEF CON 25 - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.mp4164.1 MiB2020 May 27 07:23
DEF CON 25 - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.srt52.8 KiB2020 May 16 12:02
DEF CON 25 - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.txt40.2 KiB2024 Apr 30 04:42
DEF CON 25 - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.mp4101.0 MiB2020 May 27 07:23
DEF CON 25 - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.srt37.3 KiB2020 May 16 12:02
DEF CON 25 - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.txt28.3 KiB2024 Apr 30 04:52
DEF CON 25 - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.mp4151.8 MiB2020 May 27 07:23
DEF CON 25 - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.txt39.0 KiB2024 Apr 30 05:04
DEF CON 25 - Jason Hernandez and Sam Richards, Jerod MacDonald-Evoy - Tracking Spies in the Skies.srt48.4 KiB2020 May 16 12:02
DEF CON 25 - Jason Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.mp498.5 MiB2020 May 27 07:23
DEF CON 25 - Jason Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.txt25.3 KiB2024 Apr 30 05:10
DEF CON 25 - Jeff Moss and Panel - Panel - DEF CON Groups.mp4216.8 MiB2020 May 27 07:23
DEF CON 25 - Jeff Moss and Panel - Panel - DEF CON Groups.srt66.1 KiB2020 May 16 12:02
DEF CON 25 - Jeff Moss and Panel - Panel - DEF CON Groups.txt46.5 KiB2024 Apr 30 05:24
DEF CON 25 - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.mp4167.2 MiB2020 May 27 07:23
DEF CON 25 - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.srt48.2 KiB2020 May 16 12:02
DEF CON 25 - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.txt38.7 KiB2024 Apr 30 05:38
DEF CON 25 - Joe Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.mp4174.4 MiB2020 May 27 07:23
DEF CON 25 - Joe Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.txt45.4 KiB2024 Apr 30 05:54
DEF CON 25 - Joe Rozner - Wiping out CSRF.mp4180.7 MiB2020 May 27 07:23
DEF CON 25 - Joe Rozner - Wiping out CSRF.srt52.0 KiB2020 May 16 12:03
DEF CON 25 - Joe Rozner - Wiping out CSRF.txt40.5 KiB2024 Apr 30 06:09
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.mp4174.1 MiB2020 May 27 07:23
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.srt56.0 KiB2020 May 16 12:03
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.txt41.5 KiB2024 Apr 30 06:19
DEF CON 25 - Jon Medina - Where are the SDN Security Talks-.mp4169.2 MiB2020 May 27 07:23
DEF CON 25 - Jon Medina - Where are the SDN Security Talks-.srt49.5 KiB2020 May 16 12:02
DEF CON 25 - Jon Medina - Where are the SDN Security Talks-.txt37.6 KiB2024 Apr 30 06:31
DEF CON 25 - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.mp475.3 MiB2020 May 27 07:23
DEF CON 25 - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.srt24.1 KiB2020 May 16 12:02
DEF CON 25 - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.txt18.8 KiB2024 Apr 30 06:38
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks.mp495.0 MiB2020 May 27 07:23
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks.srt33.6 KiB2020 May 16 12:02
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks.txt26.8 KiB2024 Apr 30 06:47
DEF CON 25 - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.mp4155.4 MiB2020 May 27 07:23
DEF CON 25 - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.txt35.3 KiB2024 Apr 30 06:57
DEF CON 25 - Josh Schwartz and John Cramb - MEATPISTOL, A Modular Malware Implant Framework.srt48.0 KiB2020 May 16 12:02
DEF CON 25 - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.srt33.7 KiB2020 May 16 12:02
DEF CON 25 - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.srt59.3 KiB2020 May 16 12:02
DEF CON 25 - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.mp454.6 MiB2020 May 27 07:23
DEF CON 25 - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.srt16.8 KiB2020 May 16 12:02
DEF CON 25 - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.txt13.4 KiB2024 Apr 30 07:02
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts.mp4163.5 MiB2020 May 27 07:23
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts.srt50.9 KiB2020 May 16 12:02
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts.txt38.7 KiB2024 Apr 30 07:11
DEF CON 25 - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.mp491.7 MiB2020 May 27 07:23
DEF CON 25 - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.srt26.4 KiB2020 May 16 12:02
DEF CON 25 - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.mp4174.7 MiB2020 May 27 07:23
DEF CON 25 - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.srt48.7 KiB2020 May 16 12:02
DEF CON 25 - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.txt40.4 KiB2024 Apr 30 07:26
DEF CON 25 - Macpherson and Temmingh - Uncovering useful and embarrassing info with Maltego.mp4187.4 MiB2020 May 27 07:23
DEF CON 25 - Macpherson and Temmingh - Uncovering useful and embarrassing info with Maltego.srt62.1 KiB2020 May 16 12:03
DEF CON 25 - Macpherson and Temmingh - Uncovering useful and embarrassing info with Maltego.txt47.4 KiB2024 Apr 30 07:38
DEF CON 25 - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.mp4153.0 MiB2020 May 27 07:23
DEF CON 25 - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.txt33.9 KiB2024 Apr 30 07:54
DEF CON 25 - Manfred - Twenty Years of MMORPG Hacking- Better Graphics, Same Exploits.srt44.2 KiB2020 May 16 12:02
DEF CON 25 - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.mp4173.8 MiB2020 May 27 07:23
DEF CON 25 - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.srt57.3 KiB2020 May 16 12:02
DEF CON 25 - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.txt42.5 KiB2024 Apr 30 08:04
DEF CON 25 - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.mp4165.7 MiB2020 May 27 07:23
DEF CON 25 - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.srt47.8 KiB2020 May 16 12:02
DEF CON 25 - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.txt36.0 KiB2024 Apr 30 08:16
DEF CON 25 - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.mp4119.3 MiB2020 May 27 07:23
DEF CON 25 - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.srt34.8 KiB2020 May 16 12:02
DEF CON 25 - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.txt28.0 KiB2024 Apr 30 08:27
DEF CON 25 - Matt Joyce - Amateur Digital Archeology.mp4175.0 MiB2020 May 27 07:23
DEF CON 25 - Matt Joyce - Amateur Digital Archeology.srt61.3 KiB2020 May 16 12:02
DEF CON 25 - Matt Joyce - Amateur Digital Archeology.txt47.7 KiB2024 Apr 30 08:40
DEF CON 25 - Matt Knight - Radio Exploitation 101.mp4137.8 MiB2020 May 27 07:23
DEF CON 25 - Matt Knight - Radio Exploitation 101.srt48.5 KiB2020 May 16 12:03
DEF CON 25 - Matt Knight - Radio Exploitation 101.txt37.5 KiB2024 Apr 30 08:50
DEF CON 25 - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.mp4137.3 MiB2020 May 27 07:23
DEF CON 25 - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.srt38.8 KiB2020 May 16 12:03
DEF CON 25 - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.txt31.9 KiB2024 Apr 30 09:05
DEF CON 25 - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.mp4184.3 MiB2020 May 27 07:23
DEF CON 25 - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.txt35.8 KiB2024 Apr 30 09:15
DEF CON 25 - Matt Wixey - See no evil, hear no evil - Hacking invisibly and silently with light and sound.srt49.8 KiB2020 May 16 12:03
DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch.mp4155.8 MiB2020 May 27 07:23
DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch.srt37.8 KiB2020 May 16 12:03
DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch.txt30.3 KiB2024 Apr 30 09:29
DEF CON 25 - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.mp4127.9 MiB2020 May 27 07:23
DEF CON 25 - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.srt38.5 KiB2020 May 16 12:02
DEF CON 25 - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.txt30.7 KiB2024 Apr 30 09:42
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999.mp482.6 MiB2020 May 27 07:23
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999.srt23.3 KiB2020 May 16 12:03
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999.txt18.3 KiB2024 Apr 30 09:50
DEF CON 25 - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.srt23.1 KiB2020 May 16 12:02
DEF CON 25 - Min Zheng and Xiangyu Liu - macOS-iOS Kernel Debugging and Heap Feng Shui.mp4110.0 MiB2020 May 27 07:23
DEF CON 25 - Min Zheng and Xiangyu Liu - macOS-iOS Kernel Debugging and Heap Feng Shui.txt19.0 KiB2024 Apr 30 10:00
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.mp4126.4 MiB2020 May 27 07:23
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.srt36.3 KiB2020 May 16 12:02
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.txt28.6 KiB2024 Apr 30 10:06
DEF CON 25 - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.srt53.4 KiB2020 May 16 12:02
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.mp4118.9 MiB2020 May 27 07:23
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.srt31.6 KiB2020 May 16 12:02
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.txt24.6 KiB2024 Apr 30 10:16
DEF CON 25 - Nick Cano - XenoScan- Scanning Memory Like a Boss.mp4139.6 MiB2020 May 27 07:23
DEF CON 25 - Nick Cano - XenoScan- Scanning Memory Like a Boss.srt48.3 KiB2020 May 16 12:02
DEF CON 25 - Nick Cano - XenoScan- Scanning Memory Like a Boss.txt38.4 KiB2024 Apr 30 10:28
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It.mp458.5 MiB2020 May 27 07:23
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It.srt25.8 KiB2020 May 16 12:02
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It.txt19.9 KiB2024 Apr 30 10:34
DEF CON 25 - Omar Eissa - Attacking Autonomic Networks.mp4157.4 MiB2020 May 27 07:23
DEF CON 25 - Omar Eissa - Attacking Autonomic Networks.srt39.3 KiB2020 May 16 12:02
DEF CON 25 - Omar Eissa - Attacking Autonomic Networks.txt30.2 KiB2024 Apr 30 10:46
DEF CON 25 - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4158.5 MiB2020 May 27 07:23
DEF CON 25 - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.srt32.7 KiB2020 May 16 12:03
DEF CON 25 - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.txt27.0 KiB2024 Apr 30 11:02
DEF CON 25 - Patrick DeSantis - From Box to Backdoor.mp4124.7 MiB2020 May 27 07:23
DEF CON 25 - Patrick DeSantis - From Box to Backdoor.srt37.2 KiB2020 May 16 12:02
DEF CON 25 - Patrick DeSantis - From Box to Backdoor.txt29.2 KiB2024 Apr 30 11:13
DEF CON 25 - Patrick Wardle - Death By 1000 Installers; on macOS, it's all broken!.srt59.5 KiB2020 May 16 12:03
DEF CON 25 - Patrick Wardle - Death By 1000 Installers_ on macOS and it's all broken!.mp4164.6 MiB2020 May 27 07:23
DEF CON 25 - Patrick Wardle - Death By 1000 Installers_ on macOS and it's all broken!.txt47.2 KiB2024 Apr 30 11:26
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.mp486.6 MiB2020 May 27 07:23
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.srt28.2 KiB2020 May 16 12:02
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.txt22.6 KiB2024 Apr 30 11:33
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.mp475.9 MiB2020 May 27 07:23
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.srt26.1 KiB2020 May 16 12:02
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.txt20.4 KiB2024 Apr 30 11:38
DEF CON 25 - Philip Tully and Michael T Raggo - A Picture is Worth a Thousand Words and Literally.mp4157.1 MiB2020 May 27 07:23
DEF CON 25 - Philip Tully and Michael T Raggo - A Picture is Worth a Thousand Words and Literally.txt47.0 KiB2024 Apr 30 11:55
DEF CON 25 - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words, Literally.srt59.6 KiB2020 May 16 12:02
DEF CON 25 - Plore - Popping a Smart Gun.mp4111.6 MiB2020 May 27 07:23
DEF CON 25 - Plore - Popping a Smart Gun.srt49.1 KiB2020 May 16 12:02
DEF CON 25 - Plore - Popping a Smart Gun.txt38.3 KiB2024 Apr 30 12:10
DEF CON 25 - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.mp4107.6 MiB2020 May 27 07:23
DEF CON 25 - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.srt44.2 KiB2020 May 16 12:02
DEF CON 25 - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.txt35.5 KiB2024 Apr 30 12:20
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.mp481.4 MiB2020 May 27 07:23
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.srt25.9 KiB2020 May 16 12:02
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.txt18.7 KiB2024 Apr 30 12:26
DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back - 212.srt57.0 KiB2020 May 16 12:03
DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.mp4165.3 MiB2020 May 27 07:23
DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.txt43.5 KiB2024 Apr 30 12:39
DEF CON 25 - Roger Dingledine - Next-Generation Tor Onion Services.mp4158.2 MiB2020 May 27 07:23
DEF CON 25 - Roger Dingledine - Next-Generation Tor Onion Services.srt57.9 KiB2020 May 16 12:03
DEF CON 25 - Roger Dingledine - Next-Generation Tor Onion Services.txt46.0 KiB2024 Apr 30 12:52
DEF CON 25 - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.mp469.1 MiB2020 May 27 07:23
DEF CON 25 - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.srt16.6 KiB2020 May 16 12:03
DEF CON 25 - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.txt12.3 KiB2024 Apr 30 12:59
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security.mp499.2 MiB2020 May 27 07:23
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security.srt27.8 KiB2020 May 16 12:03
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security.txt20.7 KiB2024 Apr 30 13:04
DEF CON 25 - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.mp4186.8 MiB2020 May 27 07:23
DEF CON 25 - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.srt50.6 KiB2020 May 16 12:03
DEF CON 25 - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.txt39.0 KiB2024 Apr 30 13:16
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.mp467.7 MiB2020 May 27 07:23
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.srt15.7 KiB2020 May 16 12:03
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.txt12.8 KiB2024 Apr 30 13:21
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard - A Year Later.mp4160.5 MiB2020 May 27 07:23
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard - A Year Later.srt41.0 KiB2020 May 16 12:03
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard - A Year Later.txt32.5 KiB2024 Apr 30 13:33
DEF CON 25 - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.mp4161.3 MiB2020 May 27 07:23
DEF CON 25 - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.srt56.1 KiB2020 May 16 12:02
DEF CON 25 - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.txt43.2 KiB2024 Apr 30 13:44
DEF CON 25 - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.mp4133.7 MiB2020 May 27 07:23
DEF CON 25 - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.srt49.0 KiB2020 May 16 12:02
DEF CON 25 - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.txt38.0 KiB2024 Apr 30 13:58
DEF CON 25 - Snide Owen - Phone system testing and other fun tricks.mp4158.2 MiB2020 May 27 07:23
DEF CON 25 - Snide Owen - Phone system testing and other fun tricks.srt44.4 KiB2020 May 16 12:02
DEF CON 25 - Snide Owen - Phone system testing and other fun tricks.txt33.6 KiB2024 Apr 30 14:06
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.mp4149.5 MiB2020 May 27 07:23
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.srt50.6 KiB2020 May 16 12:02
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.txt39.6 KiB2024 Apr 30 14:20
DEF CON 25 - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.mp4125.4 MiB2020 May 27 07:23
DEF CON 25 - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.txt30.4 KiB2024 Apr 30 14:27
DEF CON 25 - Steinthor Bjarnason, Jason Jones - The call is coming from inside the house.srt39.8 KiB2020 May 16 12:02
DEF CON 25 - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.mp4115.0 MiB2020 May 27 07:23
DEF CON 25 - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.srt45.5 KiB2020 May 16 12:02
DEF CON 25 - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.txt36.9 KiB2024 Apr 30 14:42
DEF CON 25 - Svea Owen and Andreas Dewes - Dark Data.mp4165.2 MiB2020 May 27 07:23
DEF CON 25 - Svea Owen and Andreas Dewes - Dark Data.srt40.2 KiB2020 May 16 12:02
DEF CON 25 - Svea Owen and Andreas Dewes - Dark Data.txt30.4 KiB2024 Apr 30 14:50
DEF CON 25 - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.mp4163.5 MiB2020 May 27 07:23
DEF CON 25 - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.srt44.7 KiB2020 May 16 12:02
DEF CON 25 - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.txt34.0 KiB2024 Apr 30 14:58
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25.mp464.7 MiB2020 May 27 07:23
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25.srt17.8 KiB2020 May 16 12:03
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25.txt14.3 KiB2024 Apr 30 15:03
DEF CON 25 - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.mp4351.1 MiB2020 May 27 07:23
DEF CON 25 - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.srt83.7 KiB2020 May 16 12:02
DEF CON 25 - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.txt63.4 KiB2024 Apr 30 15:33
DEF CON 25 - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.mp4179.1 MiB2020 May 27 07:23
DEF CON 25 - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.srt55.8 KiB2020 May 16 12:02
DEF CON 25 - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.txt41.1 KiB2024 Apr 30 15:42
DEF CON 25 - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.mp4132.1 MiB2020 May 27 07:23
DEF CON 25 - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.srt29.4 KiB2020 May 16 12:02
DEF CON 25 - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.txt21.9 KiB2024 Apr 30 15:50
DEF CON 25 - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.mp4154.9 MiB2020 May 27 07:23
DEF CON 25 - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.txt39.8 KiB2024 Apr 30 16:00
DEF CON 25 - Trey Forgety - Inside the “Meet Desai” Attack - Defending Distributed Targets from Distributed Attacks.srt54.7 KiB2020 May 16 12:02
DEF CON 25 - trixr4skids - DOOMed Point of Sale Systems.mp4137.9 MiB2020 May 27 07:23
DEF CON 25 - trixr4skids - DOOMed Point of Sale Systems.srt49.8 KiB2020 May 16 12:02
DEF CON 25 - trixr4skids - DOOMed Point of Sale Systems.txt37.2 KiB2024 Apr 30 16:10
DEF CON 25 - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.mp485.9 MiB2020 May 27 07:23
DEF CON 25 - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.srt40.7 KiB2020 May 16 12:03
DEF CON 25 - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.txt30.2 KiB2024 Apr 30 16:19
DEF CON 25 - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.mp4476.6 MiB2020 May 27 07:23
DEF CON 25 - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.srt159.5 KiB2020 May 16 12:02
DEF CON 25 - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.txt115.8 KiB2024 May 01 04:38
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.mp4156.9 MiB2020 May 27 07:23
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.srt53.5 KiB2020 May 16 12:02
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.txt39.2 KiB2024 May 01 04:47
DEF CON 25 - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.mp4177.1 MiB2020 May 27 07:23
DEF CON 25 - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.txt41.9 KiB2024 May 01 05:03
DEF CON 25 - Whitney Merrill and Terrell McSweeny - Tick, Tick, Tick.Boom You're Dead - Tech and the FTC.srt53.4 KiB2020 May 16 12:02
DEF CON 25 - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.mp475.8 MiB2020 May 27 07:23
DEF CON 25 - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.srt23.9 KiB2020 May 16 12:03
DEF CON 25 - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.txt17.8 KiB2024 May 01 05:07
DEF CON 25 - XlogicX - Assembly Language is Too High Level.mp4189.8 MiB2020 May 27 07:23
DEF CON 25 - XlogicX - Assembly Language is Too High Level.srt60.6 KiB2020 May 16 12:03
DEF CON 25 - XlogicX - Assembly Language is Too High Level.txt48.2 KiB2024 May 01 05:20
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis.mp4195.0 MiB2020 May 27 07:23
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis.srt53.8 KiB2020 May 16 12:02
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis.txt38.1 KiB2024 May 01 05:34
DEF CON 25 - Yuwue Zheng and Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB.mp4151.7 MiB2020 May 27 07:23
DEF CON 25 - Yuwue Zheng and Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB.srt27.3 KiB2020 May 16 12:03
DEF CON 25 - Yuwue Zheng and Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB.txt21.9 KiB2024 May 01 05:47
DEF CON 25 - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.mp4172.2 MiB2020 May 27 07:23
DEF CON 25 - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.srt68.4 KiB2020 May 16 12:03
DEF CON 25 - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.txt54.0 KiB2024 May 01 06:06
  • © 1992-2024 DEF CON Communications, Inc.
  • Home |
  •  Mastodon |
  • Forums |
  • Discord |
  • Reddit |
  • X |
  • Facebook |
  • FAQ |
  • RSS |
  • .onion