Parent directory/ | - | - |
DEF CON 25 - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.mp4 | 172.2 MiB | 2020 May 27 00:23 |
DEF CON 25 - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.mp4 | 115.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.mp4 | 125.4 MiB | 2020 May 27 00:23 |
DEF CON 25 - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.mp4 | 177.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.mp4 | 132.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.mp4 | 75.8 MiB | 2020 May 27 00:23 |
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis.mp4 | 195.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.mp4 | 179.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - trixr4skids - DOOMed Point of Sale Systems.mp4 | 137.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.mp4 | 149.5 MiB | 2020 May 27 00:23 |
DEF CON 25 - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.mp4 | 163.5 MiB | 2020 May 27 00:23 |
DEF CON 25 - Svea Owen and Andreas Dewes - Dark Data.mp4 | 165.2 MiB | 2020 May 27 00:23 |
DEF CON 25 - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.mp4 | 151.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.mp4 | 351.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - XlogicX - Assembly Language is Too High Level.mp4 | 189.8 MiB | 2020 May 27 00:23 |
DEF CON 25 - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.mp4 | 85.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25.mp4 | 64.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.mp4 | 154.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.mp4 | 476.6 MiB | 2020 May 27 00:23 |
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.mp4 | 156.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.mp4 | 118.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - Min Zheng and Xiangyu Liu - macOS-iOS Kernel Debugging and Heap Feng Shui.mp4 | 110.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.mp4 | 107.6 MiB | 2020 May 27 00:23 |
DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.mp4 | 165.3 MiB | 2020 May 27 00:23 |
DEF CON 25 - Plore - Popping a Smart Gun.mp4 | 111.6 MiB | 2020 May 27 00:23 |
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security.mp4 | 99.2 MiB | 2020 May 27 00:23 |
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard - A Year Later.mp4 | 160.5 MiB | 2020 May 27 00:23 |
DEF CON 25 - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.mp4 | 186.8 MiB | 2020 May 27 00:23 |
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It.mp4 | 58.5 MiB | 2020 May 27 00:23 |
DEF CON 25 - Philip Tully and Michael T Raggo - A Picture is Worth a Thousand Words and Literally.mp4 | 157.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4 | 158.5 MiB | 2020 May 27 00:23 |
DEF CON 25 - Snide Owen - Phone system testing and other fun tricks.mp4 | 158.2 MiB | 2020 May 27 00:23 |
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.mp4 | 126.4 MiB | 2020 May 27 00:23 |
DEF CON 25 - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.mp4 | 69.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.mp4 | 133.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.mp4 | 75.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - Omar Eissa - Attacking Autonomic Networks.mp4 | 157.4 MiB | 2020 May 27 00:23 |
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.mp4 | 81.4 MiB | 2020 May 27 00:23 |
DEF CON 25 - Patrick Wardle - Death By 1000 Installers_ on macOS and it's all broken!.mp4 | 164.6 MiB | 2020 May 27 00:23 |
DEF CON 25 - Roger Dingledine - Next-Generation Tor Onion Services.mp4 | 158.2 MiB | 2020 May 27 00:23 |
DEF CON 25 - Nick Cano - XenoScan- Scanning Memory Like a Boss.mp4 | 139.6 MiB | 2020 May 27 00:23 |
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.mp4 | 86.6 MiB | 2020 May 27 00:23 |
DEF CON 25 - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.mp4 | 161.3 MiB | 2020 May 27 00:23 |
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.mp4 | 67.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Patrick DeSantis - From Box to Backdoor.mp4 | 124.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.mp4 | 137.3 MiB | 2020 May 27 00:23 |
DEF CON 25 - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.mp4 | 75.3 MiB | 2020 May 27 00:23 |
DEF CON 25 - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.mp4 | 91.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch.mp4 | 155.8 MiB | 2020 May 27 00:23 |
DEF CON 25 - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.mp4 | 54.6 MiB | 2020 May 27 00:23 |
DEF CON 25 - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.mp4 | 153.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - Matt Knight - Radio Exploitation 101.mp4 | 137.8 MiB | 2020 May 27 00:23 |
DEF CON 25 - Jon Medina - Where are the SDN Security Talks-.mp4 | 169.2 MiB | 2020 May 27 00:23 |
DEF CON 25 - Joe Rozner - Wiping out CSRF.mp4 | 180.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.mp4 | 119.3 MiB | 2020 May 27 00:23 |
DEF CON 25 - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.mp4 | 174.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Matt Joyce - Amateur Digital Archeology.mp4 | 175.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks.mp4 | 95.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.mp4 | 165.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.mp4 | 155.4 MiB | 2020 May 27 00:23 |
DEF CON 25 - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.mp4 | 184.3 MiB | 2020 May 27 00:23 |
DEF CON 25 - Macpherson and Temmingh - Uncovering useful and embarrassing info with Maltego.mp4 | 187.4 MiB | 2020 May 27 00:23 |
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.mp4 | 174.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts.mp4 | 163.5 MiB | 2020 May 27 00:23 |
DEF CON 25 - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.mp4 | 173.8 MiB | 2020 May 27 00:23 |
DEF CON 25 - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.mp4 | 127.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.mp4 | 167.2 MiB | 2020 May 27 00:23 |
DEF CON 25 - Joe Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.mp4 | 174.4 MiB | 2020 May 27 00:23 |
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999.mp4 | 82.6 MiB | 2020 May 27 00:23 |
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control.mp4 | 86.5 MiB | 2020 May 27 00:23 |
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation.mp4 | 186.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Hanno Bock - Abusing Certificate Transparency Logs.mp4 | 91.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.mp4 | 476.5 MiB | 2020 May 27 00:23 |
DEF CON 25 - Denton Gentry - I Know What You Are by the Smell of Your Wifi.mp4 | 66.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - Garry Kasparov - The Brain's Last Stand.mp4 | 201.3 MiB | 2020 May 27 00:23 |
DEF CON 25 - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.mp4 | 151.8 MiB | 2020 May 27 00:23 |
DEF CON 25 - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.mp4 | 145.5 MiB | 2020 May 27 00:23 |
DEF CON 25 - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.mp4 | 164.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - Haoqi Shan and Jian Yuan - Man in the NFC.mp4 | 142.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - Jason Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.mp4 | 98.5 MiB | 2020 May 27 00:23 |
DEF CON 25 - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.mp4 | 148.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - David Robinson - Using GPS Spoofing to control time .mp4 | 149.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - Gerald Steere - Sean Metcalf - Hacking the Cloud.mp4 | 155.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.mp4 | 116.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.mp4 | 183.6 MiB | 2020 May 27 00:23 |
DEF CON 25 - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.mp4 | 101.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.mp4 | 123.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Gil Cohen - Call the plumber - you have a leak in your named pipe.mp4 | 159.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Dennis Maldonado - Real-time RFID Cloning in the Field.mp4 | 86.6 MiB | 2020 May 27 00:23 |
DEF CON 25 - Jeff Moss and Panel - Panel - DEF CON Groups.mp4 | 216.8 MiB | 2020 May 27 00:23 |
DEF CON 25 - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.mp4 | 205.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - Dor Azouri - BITSInject.mp4 | 81.7 MiB | 2020 May 27 00:23 |
DEF CON 25 - Hyrum Anderson - Evading next-gen AV using artificial intelligence.mp4 | 54.2 MiB | 2020 May 27 00:23 |
DEF CON 25 - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.mp4 | 163.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.mp4 | 184.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.mp4 | 182.2 MiB | 2020 May 27 00:23 |
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation.mp4 | 169.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.mp4 | 188.3 MiB | 2020 May 27 00:23 |
DEF CON 25 - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.mp4 | 152.8 MiB | 2020 May 27 00:23 |
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.mp4 | 201.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.mp4 | 170.2 MiB | 2020 May 27 00:23 |
DEF CON 25 - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.mp4 | 117.8 MiB | 2020 May 27 00:23 |
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus.mp4 | 61.8 MiB | 2020 May 27 00:23 |
DEF CON 25 - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.mp4 | 64.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit.mp4 | 143.0 MiB | 2020 May 27 00:23 |
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set .mp4 | 170.1 MiB | 2020 May 27 00:23 |
DEF CON 25 - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.mp4 | 137.3 MiB | 2020 May 27 00:23 |
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals.mp4 | 137.9 MiB | 2020 May 27 00:23 |
DEF CON 25 - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.mp4 | 128.4 MiB | 2020 May 27 00:23 |
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals.srt | 37.4 KiB | 2020 May 16 05:03 |
DEF CON 25 - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.srt | 61.3 KiB | 2020 May 16 05:03 |
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation.srt | 68.6 KiB | 2020 May 16 05:03 |
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.srt | 56.0 KiB | 2020 May 16 05:03 |
DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch.srt | 37.8 KiB | 2020 May 16 05:03 |
DEF CON 25 - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.srt | 40.7 KiB | 2020 May 16 05:03 |
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25.srt | 17.8 KiB | 2020 May 16 05:03 |
DEF CON 25 - Matt Wixey - See no evil, hear no evil - Hacking invisibly and silently with light and sound.srt | 49.8 KiB | 2020 May 16 05:03 |
DEF CON 25 - Joe Rozner - Wiping out CSRF.srt | 52.0 KiB | 2020 May 16 05:03 |
DEF CON 25 - XlogicX - Assembly Language is Too High Level.srt | 60.6 KiB | 2020 May 16 05:03 |
DEF CON 25 - Hyrum Anderson - Evading next-gen AV using artificial intelligence.srt | 22.4 KiB | 2020 May 16 05:03 |
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard - A Year Later.srt | 41.0 KiB | 2020 May 16 05:03 |
DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back - 212.srt | 57.0 KiB | 2020 May 16 05:03 |
DEF CON 25 - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.srt | 68.4 KiB | 2020 May 16 05:03 |
DEF CON 25 - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.srt | 32.7 KiB | 2020 May 16 05:03 |
DEF CON 25 - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.srt | 16.6 KiB | 2020 May 16 05:03 |
DEF CON 25 - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.srt | 38.8 KiB | 2020 May 16 05:03 |
DEF CON 25 - Macpherson and Temmingh - Uncovering useful and embarrassing info with Maltego.srt | 62.1 KiB | 2020 May 16 05:03 |
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.srt | 15.7 KiB | 2020 May 16 05:03 |
DEF CON 25 - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.srt | 50.6 KiB | 2020 May 16 05:03 |
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999.srt | 23.3 KiB | 2020 May 16 05:03 |
DEF CON 25 - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.srt | 27.3 KiB | 2020 May 16 05:03 |
DEF CON 25 - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.srt | 23.9 KiB | 2020 May 16 05:03 |
DEF CON 25 - Matt Knight - Radio Exploitation 101.srt | 48.5 KiB | 2020 May 16 05:03 |
DEF CON 25 - Roger Dingledine - Next-Generation Tor Onion Services.srt | 57.9 KiB | 2020 May 16 05:03 |
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security.srt | 27.8 KiB | 2020 May 16 05:03 |
DEF CON 25 - Patrick Wardle - Death By 1000 Installers; on macOS, it's all broken!.srt | 59.5 KiB | 2020 May 16 05:03 |
DEF CON 25 - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.srt | 46.2 KiB | 2020 May 16 05:03 |
DEF CON 25 - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.srt | 83.7 KiB | 2020 May 16 05:02 |
DEF CON 25 - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.srt | 45.5 KiB | 2020 May 16 05:02 |
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.srt | 28.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.srt | 37.3 KiB | 2020 May 16 05:02 |
DEF CON 25 - Gerald Steere - Sean Metcalf - Hacking the Cloud.srt | 56.3 KiB | 2020 May 16 05:02 |
DEF CON 25 - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.srt | 29.0 KiB | 2020 May 16 05:02 |
DEF CON 25 - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.srt | 55.8 KiB | 2020 May 16 05:02 |
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control.srt | 23.5 KiB | 2020 May 16 05:02 |
DEF CON 25 - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.srt | 57.3 KiB | 2020 May 16 05:02 |
DEF CON 25 - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.srt | 48.9 KiB | 2020 May 16 05:02 |
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.srt | 53.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.srt | 29.4 KiB | 2020 May 16 05:02 |
DEF CON 25 - Daniel Bohannon, Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.srt | 61.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.srt | 53.4 KiB | 2020 May 16 05:02 |
DEF CON 25 - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words, Literally.srt | 59.6 KiB | 2020 May 16 05:02 |
DEF CON 25 - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.srt | 48.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - Omar Eissa - Attacking Autonomic Networks.srt | 39.3 KiB | 2020 May 16 05:02 |
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis.srt | 53.8 KiB | 2020 May 16 05:02 |
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus.srt | 8.4 KiB | 2020 May 16 05:02 |
DEF CON 25 - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.srt | 48.4 KiB | 2020 May 16 05:02 |
DEF CON 25 - Nick Cano - XenoScan- Scanning Memory Like a Boss.srt | 48.3 KiB | 2020 May 16 05:02 |
DEF CON 25 - Cory Doctorow - BIGNUM steps forward, TRUMPNUM steps back how can we tell if we're winning.srt | 55.5 KiB | 2020 May 16 05:02 |
DEF CON 25 - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.srt | 54.5 KiB | 2020 May 16 05:02 |
DEF CON 25 - Steinthor Bjarnason, Jason Jones - The call is coming from inside the house.srt | 39.8 KiB | 2020 May 16 05:02 |
DEF CON 25 - Snide Owen - Phone system testing and other fun tricks.srt | 44.4 KiB | 2020 May 16 05:02 |
DEF CON 25 - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.srt | 48.7 KiB | 2020 May 16 05:02 |
DEF CON 25 - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.srt | 34.8 KiB | 2020 May 16 05:02 |
DEF CON 25 - Andrea Matwyshyn and Panel - Panel- Meet The Feds.srt | 94.4 KiB | 2020 May 16 05:02 |
DEF CON 25 - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.srt | 52.8 KiB | 2020 May 16 05:02 |
DEF CON 25 - David Robinson - Using GPS Spoofing to control time .srt | 39.0 KiB | 2020 May 16 05:02 |
DEF CON 25 - Josh Schwartz and John Cramb - MEATPISTOL, A Modular Malware Implant Framework.srt | 48.0 KiB | 2020 May 16 05:02 |
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.srt | 53.5 KiB | 2020 May 16 05:02 |
DEF CON 25 - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.srt | 59.3 KiB | 2020 May 16 05:02 |
DEF CON 25 - Dor Azouri - BITSInject.srt | 19.5 KiB | 2020 May 16 05:02 |
DEF CON 25 - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.srt | 49.0 KiB | 2020 May 16 05:02 |
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.srt | 26.1 KiB | 2020 May 16 05:02 |
DEF CON 25 - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.srt | 23.1 KiB | 2020 May 16 05:02 |
DEF CON 25 - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.srt | 44.7 KiB | 2020 May 16 05:02 |
DEF CON 25 - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.srt | 159.5 KiB | 2020 May 16 05:02 |
DEF CON 25 - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.srt | 123.8 KiB | 2020 May 16 05:02 |
DEF CON 25 - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.srt | 47.8 KiB | 2020 May 16 05:02 |
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.srt | 31.6 KiB | 2020 May 16 05:02 |
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It.srt | 25.8 KiB | 2020 May 16 05:02 |
DEF CON 25 - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.srt | 58.5 KiB | 2020 May 16 05:02 |
DEF CON 25 - Manfred - Twenty Years of MMORPG Hacking- Better Graphics, Same Exploits.srt | 44.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.srt | 38.5 KiB | 2020 May 16 05:02 |
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set .srt | 62.0 KiB | 2020 May 16 05:02 |
DEF CON 25 - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.srt | 38.1 KiB | 2020 May 16 05:02 |
DEF CON 25 - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.srt | 33.7 KiB | 2020 May 16 05:02 |
DEF CON 25 - Dennis Maldonado - Real-time RFID Cloning in the Field.srt | 26.6 KiB | 2020 May 16 05:02 |
DEF CON 25 - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.srt | 24.1 KiB | 2020 May 16 05:02 |
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts.srt | 50.9 KiB | 2020 May 16 05:02 |
DEF CON 25 - Denton Gentry - I Know What You Are by the Smell of Your Wifi.srt | 22.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - Jeff Moss and Panel - Panel - DEF CON Groups.srt | 66.1 KiB | 2020 May 16 05:02 |
DEF CON 25 - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.srt | 44.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.srt | 56.1 KiB | 2020 May 16 05:02 |
DEF CON 25 - Hanno Bock - Abusing Certificate Transparency Logs.srt | 31.7 KiB | 2020 May 16 05:02 |
DEF CON 25 - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.srt | 44.7 KiB | 2020 May 16 05:02 |
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.srt | 52.3 KiB | 2020 May 16 05:02 |
DEF CON 25 - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.srt | 40.5 KiB | 2020 May 16 05:02 |
DEF CON 25 - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.srt | 16.8 KiB | 2020 May 16 05:02 |
DEF CON 25 - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.srt | 46.4 KiB | 2020 May 16 05:02 |
DEF CON 25 - Svea Owen and Andreas Dewes - Dark Data.srt | 40.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - Garry Kasparov - The Brain's Last Stand.srt | 55.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.srt | 57.6 KiB | 2020 May 16 05:02 |
DEF CON 25 - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.srt | 25.7 KiB | 2020 May 16 05:02 |
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks.srt | 33.6 KiB | 2020 May 16 05:02 |
DEF CON 25 - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.srt | 26.4 KiB | 2020 May 16 05:02 |
DEF CON 25 - Jason Hernandez and Sam Richards, Jerod MacDonald-Evoy - Tracking Spies in the Skies.srt | 48.4 KiB | 2020 May 16 05:02 |
DEF CON 25 - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.srt | 59.6 KiB | 2020 May 16 05:02 |
DEF CON 25 - Matt Joyce - Amateur Digital Archeology.srt | 61.3 KiB | 2020 May 16 05:02 |
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.srt | 36.3 KiB | 2020 May 16 05:02 |
DEF CON 25 - trixr4skids - DOOMed Point of Sale Systems.srt | 49.8 KiB | 2020 May 16 05:02 |
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit.srt | 34.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.srt | 50.6 KiB | 2020 May 16 05:02 |
DEF CON 25 - Jon Medina - Where are the SDN Security Talks-.srt | 49.5 KiB | 2020 May 16 05:02 |
DEF CON 25 - Trey Forgety - Inside the “Meet Desai” Attack - Defending Distributed Targets from Distributed Attacks.srt | 54.7 KiB | 2020 May 16 05:02 |
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation.srt | 37.4 KiB | 2020 May 16 05:02 |
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.srt | 25.9 KiB | 2020 May 16 05:02 |
DEF CON 25 - Plore - Popping a Smart Gun.srt | 49.1 KiB | 2020 May 16 05:02 |
DEF CON 25 - Patrick DeSantis - From Box to Backdoor.srt | 37.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - Haoqi Shan, Jian Yuan - Man in the NFC.srt | 32.2 KiB | 2020 May 16 05:02 |
DEF CON 25 - Whitney Merrill and Terrell McSweeny - Tick, Tick, Tick.Boom You're Dead - Tech and the FTC.srt | 53.4 KiB | 2020 May 16 05:02 |