Parent directory/ | - | - |
DEF CON 26 - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits - Audio.mp3 | 18.4 MiB | 2020 May 16 05:46 |
DEF CON 26 - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits - Audio.lrc | 52.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits - Audio.flac | 123.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear - Audio.mp3 | 7.1 MiB | 2020 May 16 05:46 |
DEF CON 26 - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear - Audio.lrc | 19.0 KiB | 2020 May 16 05:46 |
DEF CON 26 - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear - Audio.flac | 50.6 MiB | 2020 May 26 03:59 |
DEF CON 26 - yawnbox - Privacy Infrastructure Challenges and Opportunities - Audio.mp3 | 12.0 MiB | 2020 May 16 05:47 |
DEF CON 26 - yawnbox - Privacy Infrastructure Challenges and Opportunities - Audio.lrc | 32.7 KiB | 2020 May 16 05:46 |
DEF CON 26 - yawnbox - Privacy Infrastructure Challenges and Opportunities - Audio.flac | 79.2 MiB | 2020 May 26 03:59 |
DEF CON 26 - smea - Jailbreaking the 3DS through 7 years of hardening - Audio.mp3 | 18.7 MiB | 2020 May 16 05:46 |
DEF CON 26 - smea - Jailbreaking the 3DS through 7 years of hardening - Audio.lrc | 59.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - smea - Jailbreaking the 3DS through 7 years of hardening - Audio.flac | 116.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - singe - Practical and Improved Wifi MitM with Mana - Audio.mp3 | 15.8 MiB | 2020 May 16 05:46 |
DEF CON 26 - singe - Practical and Improved Wifi MitM with Mana - Audio.lrc | 44.9 KiB | 2020 May 16 05:46 |
DEF CON 26 - singe - Practical and Improved Wifi MitM with Mana - Audio.flac | 99.0 MiB | 2020 May 26 03:59 |
DEF CON 26 - sghctoma - All Your Math are Belong to Us - Audio.mp3 | 16.8 MiB | 2020 May 16 05:46 |
DEF CON 26 - sghctoma - All Your Math are Belong to Us - Audio.lrc | 28.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - sghctoma - All Your Math are Belong to Us - Audio.flac | 138.1 MiB | 2020 May 26 03:59 |
DEF CON 26 - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems - Audio.mp3 | 7.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems - Audio.lrc | 22.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems - Audio.flac | 52.2 MiB | 2020 May 26 03:59 |
DEF CON 26 - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking - Audio.mp3 | 7.5 MiB | 2020 May 16 05:46 |
DEF CON 26 - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking - Audio.lrc | 22.7 KiB | 2020 May 16 05:46 |
DEF CON 26 - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking - Audio.flac | 47.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - egypt and Vu - One-liners to Rule Them All - Audio.mp3 | 17.6 MiB | 2020 May 16 05:46 |
DEF CON 26 - egypt and Vu - One-liners to Rule Them All - Audio.lrc | 41.0 KiB | 2020 May 16 05:46 |
DEF CON 26 - egypt and Vu - One-liners to Rule Them All - Audio.flac | 111.3 MiB | 2020 May 26 03:59 |
DEF CON 26 - delta zero amd Azeem Aqil - Your Voice is My Passport - Audio.mp3 | 13.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - delta zero amd Azeem Aqil - Your Voice is My Passport - Audio.lrc | 35.7 KiB | 2020 May 16 05:46 |
DEF CON 26 - delta zero amd Azeem Aqil - Your Voice is My Passport - Audio.flac | 90.0 MiB | 2020 May 26 03:59 |
DEF CON 26 - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts - Audio.mp3 | 14.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts - Audio.lrc | 22.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts - Audio.flac | 94.6 MiB | 2020 May 26 03:59 |
DEF CON 26 - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability - Audio.mp3 | 18.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability - Audio.lrc | 37.1 KiB | 2020 May 16 05:46 |
DEF CON 26 - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability - Audio.flac | 130.8 MiB | 2020 May 26 03:59 |
DEF CON 26 - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox - Audio.mp3 | 7.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox - Audio.lrc | 16.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox - Audio.flac | 49.1 MiB | 2020 May 26 03:59 |
DEF CON 26 - Zeng and Panel - Lora Smart Water Meter Security Analysis - Audio.mp3 | 8.4 MiB | 2020 May 16 05:47 |
DEF CON 26 - Zeng and Panel - Lora Smart Water Meter Security Analysis - Audio.lrc | 20.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Zeng and Panel - Lora Smart Water Meter Security Analysis - Audio.flac | 66.2 MiB | 2020 May 26 03:59 |
DEF CON 26 - Zach and Alex - Infecting The Embedded Supply Chain - Audio.mp3 | 8.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - Zach and Alex - Infecting The Embedded Supply Chain - Audio.lrc | 23.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - Zach and Alex - Infecting The Embedded Supply Chain - Audio.flac | 57.2 MiB | 2020 May 26 03:59 |
DEF CON 26 - Yu Wang - Attacking the macOS Kernel Graphics Driver - Audio.mp3 | 13.6 MiB | 2020 May 16 05:46 |
DEF CON 26 - Yu Wang - Attacking the macOS Kernel Graphics Driver - Audio.lrc | 24.0 KiB | 2020 May 16 05:46 |
DEF CON 26 - Yu Wang - Attacking the macOS Kernel Graphics Driver - Audio.flac | 88.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller - Audio.mp3 | 7.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller - Audio.lrc | 16.3 KiB | 2020 May 16 05:46 |
DEF CON 26 - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller - Audio.flac | 52.5 MiB | 2020 May 26 03:59 |
DEF CON 26 - William Martin - SMBetray Backdooring and breaking signatures - Audio.mp3 | 15.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - William Martin - SMBetray Backdooring and breaking signatures - Audio.lrc | 39.6 KiB | 2020 May 16 05:46 |
DEF CON 26 - William Martin - SMBetray Backdooring and breaking signatures - Audio.flac | 104.0 MiB | 2020 May 26 03:59 |
DEF CON 26 - William Martin - One-Click to OWA - Audio.mp3 | 8.0 MiB | 2020 May 16 05:46 |
DEF CON 26 - William Martin - One-Click to OWA - Audio.lrc | 22.6 KiB | 2020 May 16 05:46 |
DEF CON 26 - William Martin - One-Click to OWA - Audio.flac | 54.2 MiB | 2020 May 26 03:59 |
DEF CON 26 - West and Campbell - barcOwned Popping shells with your cereal box - Audio.mp3 | 7.8 MiB | 2020 May 16 05:46 |
DEF CON 26 - West and Campbell - barcOwned Popping shells with your cereal box - Audio.lrc | 21.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - West and Campbell - barcOwned Popping shells with your cereal box - Audio.flac | 52.8 MiB | 2020 May 26 03:59 |
DEF CON 26 - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications - Audio.mp3 | 15.9 MiB | 2020 May 16 05:46 |
DEF CON 26 - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications - Audio.lrc | 45.7 KiB | 2020 May 16 05:46 |
DEF CON 26 - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications - Audio.flac | 107.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit - Audio.mp3 | 11.7 MiB | 2020 May 16 05:46 |
DEF CON 26 - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit - Audio.lrc | 26.9 KiB | 2020 May 16 05:46 |
DEF CON 26 - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit - Audio.flac | 76.9 MiB | 2020 May 26 03:59 |
DEF CON 26 - Truman Kain - Dragnet Your Social Engineering Sidekick - Audio.mp3 | 7.4 MiB | 2020 May 16 05:46 |
DEF CON 26 - Truman Kain - Dragnet Your Social Engineering Sidekick - Audio.lrc | 20.5 KiB | 2020 May 16 05:46 |
DEF CON 26 - Truman Kain - Dragnet Your Social Engineering Sidekick - Audio.flac | 55.5 MiB | 2020 May 26 03:59 |
DEF CON 26 - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures - Audio.mp3 | 15.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures - Audio.lrc | 38.4 KiB | 2020 May 16 05:47 |
DEF CON 26 - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures - Audio.flac | 108.5 MiB | 2020 May 26 03:59 |
DEF CON 26 - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs - Audio.mp3 | 17.4 MiB | 2020 May 16 05:46 |
DEF CON 26 - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs - Audio.lrc | 52.7 KiB | 2020 May 16 05:46 |
DEF CON 26 - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs - Audio.flac | 110.9 MiB | 2020 May 26 03:59 |
DEF CON 26 - The Dark Tangent and Panel - Panel DEF CON GROUPS - Audio.mp3 | 16.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - The Dark Tangent and Panel - Panel DEF CON GROUPS - Audio.lrc | 49.5 KiB | 2020 May 16 05:46 |
DEF CON 26 - The Dark Tangent and Panel - Panel DEF CON GROUPS - Audio.flac | 126.3 MiB | 2020 May 26 03:59 |
DEF CON 26 - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk - Audio.mp3 | 16.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk - Audio.lrc | 42.3 KiB | 2020 May 16 05:46 |
DEF CON 26 - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk - Audio.flac | 114.2 MiB | 2020 May 26 03:59 |
DEF CON 26 - The Dark Tangent - DEF CON 26 Closing Ceremonies - Audio.mp3 | 32.9 MiB | 2020 May 16 05:46 |
DEF CON 26 - The Dark Tangent - DEF CON 26 Closing Ceremonies - Audio.lrc | 83.1 KiB | 2020 May 16 05:46 |
DEF CON 26 - The Dark Tangent - DEF CON 26 Closing Ceremonies - Audio.flac | 252.8 MiB | 2020 May 26 03:59 |
DEF CON 26 - Steven Danneman - Your Banks Digital Side Door - Audio.mp3 | 19.8 MiB | 2020 May 16 05:46 |
DEF CON 26 - Steven Danneman - Your Banks Digital Side Door - Audio.lrc | 46.9 KiB | 2020 May 16 05:46 |
DEF CON 26 - Steven Danneman - Your Banks Digital Side Door - Audio.flac | 135.6 MiB | 2020 May 26 03:59 |
DEF CON 26 - Slava Makkaveev - Man-In-The-Disk - Audio.mp3 | 7.4 MiB | 2020 May 16 05:46 |
DEF CON 26 - Slava Makkaveev - Man-In-The-Disk - Audio.lrc | 16.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Slava Makkaveev - Man-In-The-Disk - Audio.flac | 53.0 MiB | 2020 May 26 03:59 |
DEF CON 26 - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult - Audio.mp3 | 17.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult - Audio.lrc | 46.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult - Audio.flac | 129.5 MiB | 2020 May 26 03:59 |
DEF CON 26 - Shkatov and Michael - UEFI Exploitation for the Masses - Audio.mp3 | 16.7 MiB | 2020 May 16 05:46 |
DEF CON 26 - Shkatov and Michael - UEFI Exploitation for the Masses - Audio.lrc | 42.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - Shkatov and Michael - UEFI Exploitation for the Masses - Audio.flac | 121.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts - Audio.mp3 | 7.8 MiB | 2020 May 16 05:46 |
DEF CON 26 - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts - Audio.lrc | 15.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts - Audio.flac | 49.9 MiB | 2020 May 26 03:59 |
DEF CON 26 - Sean Metcalf - Exploiting Active Directory Administrator Insecurities - Audio.mp3 | 16.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Sean Metcalf - Exploiting Active Directory Administrator Insecurities - Audio.lrc | 54.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Sean Metcalf - Exploiting Active Directory Administrator Insecurities - Audio.flac | 123.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband - Audio.mp3 | 18.4 MiB | 2020 May 16 05:46 |
DEF CON 26 - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband - Audio.lrc | 55.9 KiB | 2020 May 16 05:46 |
DEF CON 26 - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband - Audio.flac | 122.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries - Audio.mp3 | 7.9 MiB | 2020 May 16 05:46 |
DEF CON 26 - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries - Audio.lrc | 17.7 KiB | 2020 May 16 05:46 |
DEF CON 26 - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries - Audio.flac | 50.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading - Audio.mp3 | 8.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading - Audio.lrc | 13.1 KiB | 2020 May 16 05:46 |
DEF CON 26 - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading - Audio.flac | 55.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems - Audio.mp3 | 13.5 MiB | 2020 May 16 05:46 |
DEF CON 26 - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems - Audio.lrc | 39.3 KiB | 2020 May 16 05:46 |
DEF CON 26 - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems - Audio.flac | 93.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly - Audio.mp3 | 8.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly - Audio.lrc | 21.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly - Audio.flac | 52.9 MiB | 2020 May 26 03:59 |
DEF CON 26 - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data - Audio.mp3 | 7.7 MiB | 2020 May 16 05:46 |
DEF CON 26 - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data - Audio.lrc | 16.6 KiB | 2020 May 16 05:46 |
DEF CON 26 - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data - Audio.flac | 48.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - Rob Joyce - NSA Talks Cybersecurity - Audio.mp3 | 16.5 MiB | 2020 May 16 05:46 |
DEF CON 26 - Rob Joyce - NSA Talks Cybersecurity - Audio.lrc | 46.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - Rob Joyce - NSA Talks Cybersecurity - Audio.flac | 126.6 MiB | 2020 May 26 03:59 |
DEF CON 26 - Rob Joyce - Building Absurd Christmas Light Shows - Audio.mp3 | 14.8 MiB | 2020 May 16 05:46 |
DEF CON 26 - Rob Joyce - Building Absurd Christmas Light Shows - Audio.lrc | 37.5 KiB | 2020 May 16 05:46 |
DEF CON 26 - Rob Joyce - Building Absurd Christmas Light Shows - Audio.flac | 116.2 MiB | 2020 May 26 03:59 |
DEF CON 26 - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain - Audio.mp3 | 14.0 MiB | 2020 May 16 05:46 |
DEF CON 26 - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain - Audio.lrc | 46.9 KiB | 2020 May 16 05:46 |
DEF CON 26 - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain - Audio.flac | 121.1 MiB | 2020 May 26 03:59 |
DEF CON 26 - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems - Audio.mp3 | 15.0 MiB | 2020 May 16 05:46 |
DEF CON 26 - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems - Audio.lrc | 39.7 KiB | 2020 May 16 05:46 |
DEF CON 26 - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems - Audio.flac | 121.8 MiB | 2020 May 26 03:59 |
DEF CON 26 - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession - Audio.mp3 | 17.6 MiB | 2020 May 16 05:46 |
DEF CON 26 - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession - Audio.lrc | 48.0 KiB | 2020 May 16 05:46 |
DEF CON 26 - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession - Audio.flac | 137.9 MiB | 2020 May 26 03:59 |
DEF CON 26 - Patrick Wardle - The Mouse is Mightier than the Sword - Audio.mp3 | 18.4 MiB | 2020 May 16 05:46 |
DEF CON 26 - Patrick Wardle - The Mouse is Mightier than the Sword - Audio.lrc | 50.1 KiB | 2020 May 16 05:46 |
DEF CON 26 - Patrick Wardle - The Mouse is Mightier than the Sword - Audio.flac | 124.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls - Audio.mp3 | 7.8 MiB | 2020 May 16 05:46 |
DEF CON 26 - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls - Audio.lrc | 23.1 KiB | 2020 May 16 05:46 |
DEF CON 26 - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls - Audio.flac | 49.3 MiB | 2020 May 26 03:59 |
DEF CON 26 - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks - Audio.mp3 | 15.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks - Audio.lrc | 35.5 KiB | 2020 May 16 05:46 |
DEF CON 26 - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks - Audio.flac | 117.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - Panel - DC 101 PANEL - Audio.mp3 | 15.9 MiB | 2020 May 16 05:46 |
DEF CON 26 - Panel - DC 101 PANEL - Audio.lrc | 49.5 KiB | 2020 May 16 05:46 |
DEF CON 26 - Panel - DC 101 PANEL - Audio.flac | 88.1 MiB | 2020 May 26 03:59 |
DEF CON 26 - Ossmann and Spill - Revolting Radios - Audio.mp3 | 18.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - Ossmann and Spill - Revolting Radios - Audio.lrc | 49.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Ossmann and Spill - Revolting Radios - Audio.flac | 114.5 MiB | 2020 May 26 03:59 |
DEF CON 26 - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out - Audio.mp3 | 16.5 MiB | 2020 May 16 05:46 |
DEF CON 26 - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out - Audio.lrc | 34.0 KiB | 2020 May 16 05:46 |
DEF CON 26 - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out - Audio.flac | 112.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - Nirenberg and Buchwald - Reverse Engineering hacking documentary series - Audio.mp3 | 18.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Nirenberg and Buchwald - Reverse Engineering hacking documentary series - Audio.lrc | 50.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Nirenberg and Buchwald - Reverse Engineering hacking documentary series - Audio.flac | 123.6 MiB | 2020 May 26 03:59 |
DEF CON 26 - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers - Audio.mp3 | 13.1 MiB | 2020 May 16 05:46 |
DEF CON 26 - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers - Audio.lrc | 34.9 KiB | 2020 May 16 05:46 |
DEF CON 26 - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers - Audio.flac | 83.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators - Audio.mp3 | 7.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators - Audio.lrc | 14.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators - Audio.flac | 55.0 MiB | 2020 May 26 03:59 |
DEF CON 26 - Nafeez - Compression Oracle Attacks on VPN Networks - Audio.mp3 | 17.8 MiB | 2020 May 16 05:46 |
DEF CON 26 - Nafeez - Compression Oracle Attacks on VPN Networks - Audio.lrc | 40.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Nafeez - Compression Oracle Attacks on VPN Networks - Audio.flac | 110.3 MiB | 2020 May 26 03:59 |
DEF CON 26 - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit - Audio.mp3 | 13.6 MiB | 2020 May 16 05:47 |
DEF CON 26 - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit - Audio.lrc | 38.3 KiB | 2020 May 16 05:46 |
DEF CON 26 - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit - Audio.flac | 98.3 MiB | 2020 May 26 03:59 |
DEF CON 26 - Matt Wixey - Betrayed by the keyboard How what you type can give you away - Audio.mp3 | 16.0 MiB | 2020 May 16 05:46 |
DEF CON 26 - Matt Wixey - Betrayed by the keyboard How what you type can give you away - Audio.lrc | 46.1 KiB | 2020 May 16 05:46 |
DEF CON 26 - Matt Wixey - Betrayed by the keyboard How what you type can give you away - Audio.flac | 96.0 MiB | 2020 May 26 03:59 |
DEF CON 26 - Matt King - Micro-Renovator Bringing Processor Firmware up to Code - Audio.mp3 | 7.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - Matt King - Micro-Renovator Bringing Processor Firmware up to Code - Audio.lrc | 17.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - Matt King - Micro-Renovator Bringing Processor Firmware up to Code - Audio.flac | 47.0 MiB | 2020 May 26 03:59 |
DEF CON 26 - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems - Audio.mp3 | 7.9 MiB | 2020 May 16 05:46 |
DEF CON 26 - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems - Audio.lrc | 23.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems - Audio.flac | 61.5 MiB | 2020 May 26 03:59 |
DEF CON 26 - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware - Audio.mp3 | 13.7 MiB | 2020 May 16 05:46 |
DEF CON 26 - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware - Audio.lrc | 34.1 KiB | 2020 May 16 05:46 |
DEF CON 26 - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware - Audio.flac | 76.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Maggie Mayhem - Sex Work After SESTA FOSTA - Audio.mp3 | 8.5 MiB | 2020 May 16 05:46 |
DEF CON 26 - Maggie Mayhem - Sex Work After SESTA FOSTA - Audio.lrc | 22.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Maggie Mayhem - Sex Work After SESTA FOSTA - Audio.flac | 55.3 MiB | 2020 May 26 03:59 |
DEF CON 26 - Levison and hon1nbo - Booby Trapping Boxes - Audio.mp3 | 15.1 MiB | 2020 May 16 05:46 |
DEF CON 26 - Levison and hon1nbo - Booby Trapping Boxes - Audio.lrc | 43.6 KiB | 2020 May 16 05:46 |
DEF CON 26 - Levison and hon1nbo - Booby Trapping Boxes - Audio.flac | 95.3 MiB | 2020 May 26 03:59 |
DEF CON 26 - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine - Audio.mp3 | 19.5 MiB | 2020 May 16 05:46 |
DEF CON 26 - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine - Audio.lrc | 55.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine - Audio.flac | 131.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home - Audio.mp3 | 16.6 MiB | 2020 May 16 05:46 |
DEF CON 26 - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home - Audio.lrc | 49.0 KiB | 2020 May 16 05:46 |
DEF CON 26 - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home - Audio.flac | 125.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems - Audio.mp3 | 20.0 MiB | 2020 May 16 05:46 |
DEF CON 26 - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems - Audio.lrc | 61.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems - Audio.flac | 144.3 MiB | 2020 May 26 03:59 |
DEF CON 26 - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities - Audio.mp3 | 15.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities - Audio.lrc | 48.5 KiB | 2020 May 16 05:46 |
DEF CON 26 - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities - Audio.flac | 103.5 MiB | 2020 May 26 03:59 |
DEF CON 26 - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch - Audio.mp3 | 14.1 MiB | 2020 May 16 05:46 |
DEF CON 26 - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch - Audio.lrc | 28.6 KiB | 2020 May 16 05:46 |
DEF CON 26 - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch - Audio.flac | 103.9 MiB | 2020 May 26 03:59 |
DEF CON 26 - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras - Audio.mp3 | 17.5 MiB | 2020 May 16 05:46 |
DEF CON 26 - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras - Audio.lrc | 42.6 KiB | 2020 May 16 05:46 |
DEF CON 26 - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras - Audio.flac | 118.6 MiB | 2020 May 26 03:59 |
DEF CON 26 - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more - Audio.mp3 | 16.8 MiB | 2020 May 16 05:46 |
DEF CON 26 - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more - Audio.lrc | 43.3 KiB | 2020 May 16 05:46 |
DEF CON 26 - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more - Audio.flac | 122.1 MiB | 2020 May 26 03:59 |
DEF CON 26 - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices - Audio.mp3 | 16.9 MiB | 2020 May 16 05:46 |
DEF CON 26 - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices - Audio.lrc | 41.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices - Audio.flac | 125.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework - Audio.mp3 | 16.4 MiB | 2020 May 16 05:46 |
DEF CON 26 - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework - Audio.lrc | 45.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework - Audio.flac | 98.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - Joe Grand - Searching for the Light Adventures with OpticSpy - Audio.mp3 | 19.4 MiB | 2020 May 16 05:46 |
DEF CON 26 - Joe Grand - Searching for the Light Adventures with OpticSpy - Audio.lrc | 60.7 KiB | 2020 May 16 05:46 |
DEF CON 26 - Joe Grand - Searching for the Light Adventures with OpticSpy - Audio.flac | 130.5 MiB | 2020 May 26 03:59 |
DEF CON 26 - Jeanette Manfra - Securing our Nations Election Infrastructure - Audio.mp3 | 7.4 MiB | 2020 May 16 05:46 |
DEF CON 26 - Jeanette Manfra - Securing our Nations Election Infrastructure - Audio.lrc | 22.7 KiB | 2020 May 16 05:46 |
DEF CON 26 - Jeanette Manfra - Securing our Nations Election Infrastructure - Audio.flac | 43.5 MiB | 2020 May 26 03:59 |
DEF CON 26 - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones - Audio.mp3 | 8.4 MiB | 2020 May 16 05:46 |
DEF CON 26 - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones - Audio.lrc | 18.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones - Audio.flac | 54.6 MiB | 2020 May 26 03:59 |
DEF CON 26 - Ian Haken - Automated Discovery of Deserialization Gadget Chains - Audio.mp3 | 17.0 MiB | 2020 May 16 05:46 |
DEF CON 26 - Ian Haken - Automated Discovery of Deserialization Gadget Chains - Audio.lrc | 52.7 KiB | 2020 May 16 05:46 |
DEF CON 26 - Ian Haken - Automated Discovery of Deserialization Gadget Chains - Audio.flac | 115.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - HuiYu and Qian - Breaking Smart Speakers We are Listening to You - Audio.mp3 | 15.5 MiB | 2020 May 16 05:46 |
DEF CON 26 - HuiYu and Qian - Breaking Smart Speakers We are Listening to You - Audio.lrc | 34.9 KiB | 2020 May 16 05:46 |
DEF CON 26 - HuiYu and Qian - Breaking Smart Speakers We are Listening to You - Audio.flac | 113.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program - Audio.mp3 | 9.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program - Audio.lrc | 16.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program - Audio.flac | 61.8 MiB | 2020 May 26 03:59 |
DEF CON 26 - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries - Audio.mp3 | 16.7 MiB | 2020 May 16 05:46 |
DEF CON 26 - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries - Audio.lrc | 46.0 KiB | 2020 May 16 05:46 |
DEF CON 26 - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries - Audio.flac | 120.9 MiB | 2020 May 26 03:59 |
DEF CON 26 - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray - Audio.mp3 | 6.6 MiB | 2020 May 16 05:46 |
DEF CON 26 - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray - Audio.lrc | 19.1 KiB | 2020 May 16 05:46 |
DEF CON 26 - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray - Audio.flac | 50.3 MiB | 2020 May 26 03:59 |
DEF CON 26 - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems - Audio.mp3 | 16.5 MiB | 2020 May 16 05:46 |
DEF CON 26 - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems - Audio.lrc | 45.0 KiB | 2020 May 16 05:46 |
DEF CON 26 - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems - Audio.flac | 108.1 MiB | 2020 May 26 03:59 |
DEF CON 26 - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010 - Audio.mp3 | 17.6 MiB | 2020 May 16 05:46 |
DEF CON 26 - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010 - Audio.lrc | 56.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010 - Audio.flac | 128.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries - Audio.mp3 | 18.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries - Audio.lrc | 46.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries - Audio.flac | 122.3 MiB | 2020 May 26 03:59 |
DEF CON 26 - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains - Audio.mp3 | 8.7 MiB | 2020 May 16 05:46 |
DEF CON 26 - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains - Audio.lrc | 27.1 KiB | 2020 May 16 05:46 |
DEF CON 26 - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains - Audio.flac | 56.1 MiB | 2020 May 26 03:59 |
DEF CON 26 - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You - Audio.mp3 | 8.4 MiB | 2020 May 16 05:46 |
DEF CON 26 - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You - Audio.lrc | 18.9 KiB | 2020 May 16 05:46 |
DEF CON 26 - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You - Audio.flac | 57.5 MiB | 2020 May 26 03:59 |
DEF CON 26 - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask - Audio.mp3 | 25.1 MiB | 2020 May 16 05:46 |
DEF CON 26 - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask - Audio.lrc | 82.6 KiB | 2020 May 16 05:46 |
DEF CON 26 - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask - Audio.flac | 171.0 MiB | 2020 May 26 03:59 |
DEF CON 26 - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System - Audio.mp3 | 19.5 MiB | 2020 May 16 05:46 |
DEF CON 26 - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System - Audio.lrc | 49.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System - Audio.flac | 116.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps - Audio.mp3 | 16.8 MiB | 2020 May 16 05:46 |
DEF CON 26 - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps - Audio.lrc | 42.9 KiB | 2020 May 16 05:46 |
DEF CON 26 - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps - Audio.flac | 115.9 MiB | 2020 May 26 03:59 |
DEF CON 26 - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill - Audio.mp3 | 16.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill - Audio.lrc | 39.1 KiB | 2020 May 16 05:46 |
DEF CON 26 - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill - Audio.flac | 114.6 MiB | 2020 May 26 03:59 |
DEF CON 26 - Dr Cindy Poppins AKA Svea Eckert and Panel - Inside the Fake Science Factory - Audio.mp3 | 43.8 MiB | 2020 May 16 05:46 |
DEF CON 26 - Dr Cindy Poppins AKA Svea Eckert and Panel - Inside the Fake Science Factory - Audio.lrc | 79.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - Dr Cindy Poppins AKA Svea Eckert and Panel - Inside the Fake Science Factory - Audio.flac | 316.9 MiB | 2020 May 26 03:59 |
DEF CON 26 - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals - Audio.mp3 | 18.5 MiB | 2020 May 16 05:46 |
DEF CON 26 - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals - Audio.lrc | 58.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals - Audio.flac | 137.1 MiB | 2020 May 26 03:59 |
DEF CON 26 - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices - Audio.mp3 | 17.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices - Audio.lrc | 50.0 KiB | 2020 May 16 05:46 |
DEF CON 26 - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices - Audio.flac | 117.3 MiB | 2020 May 26 03:59 |
DEF CON 26 - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones - Audio.mp3 | 13.6 MiB | 2020 May 16 05:46 |
DEF CON 26 - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones - Audio.lrc | 22.9 KiB | 2020 May 16 05:46 |
DEF CON 26 - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones - Audio.flac | 90.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills - Audio.mp3 | 20.0 MiB | 2020 May 16 05:46 |
DEF CON 26 - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills - Audio.lrc | 56.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills - Audio.flac | 118.6 MiB | 2020 May 26 03:59 |
DEF CON 26 - Daniel Crowley and Panel - Outsmarting the Smart City - Audio.mp3 | 13.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Daniel Crowley and Panel - Outsmarting the Smart City - Audio.lrc | 33.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Daniel Crowley and Panel - Outsmarting the Smart City - Audio.flac | 102.2 MiB | 2020 May 26 03:59 |
DEF CON 26 - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts - Audio.mp3 | 16.9 MiB | 2020 May 16 05:46 |
DEF CON 26 - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts - Audio.lrc | 35.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts - Audio.flac | 115.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - Christopher Domas - The ring 0 facade awakening the processors inner demons - Audio.mp3 | 9.4 MiB | 2020 May 16 05:47 |
DEF CON 26 - Christopher Domas - The ring 0 facade awakening the processors inner demons - Audio.lrc | 27.1 KiB | 2020 May 16 05:46 |
DEF CON 26 - Christopher Domas - The ring 0 facade awakening the processors inner demons - Audio.flac | 64.4 MiB | 2020 May 26 03:59 |
DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs - Audio.mp3 | 18.6 MiB | 2020 May 16 05:46 |
DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs - Audio.lrc | 58.6 KiB | 2020 May 16 05:47 |
DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs - Audio.flac | 137.2 MiB | 2020 May 26 03:59 |
DEF CON 26 - Champion and Law - Building the Hacker Tracker - Audio.mp3 | 10.0 MiB | 2020 May 16 05:46 |
DEF CON 26 - Champion and Law - Building the Hacker Tracker - Audio.lrc | 31.0 KiB | 2020 May 16 05:46 |
DEF CON 26 - Champion and Law - Building the Hacker Tracker - Audio.flac | 74.6 MiB | 2020 May 26 03:59 |
DEF CON 26 - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication - Audio.mp3 | 12.1 MiB | 2020 May 16 05:46 |
DEF CON 26 - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication - Audio.lrc | 35.7 KiB | 2020 May 16 05:46 |
DEF CON 26 - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication - Audio.flac | 96.8 MiB | 2020 May 26 03:59 |
DEF CON 26 - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug - Audio.mp3 | 13.6 MiB | 2020 May 16 05:46 |
DEF CON 26 - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug - Audio.lrc | 27.8 KiB | 2020 May 16 05:46 |
DEF CON 26 - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug - Audio.flac | 98.2 MiB | 2020 May 26 03:59 |
DEF CON 26 - Balmas and Itkin - What the Fax - Audio.mp3 | 17.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Balmas and Itkin - What the Fax - Audio.lrc | 45.6 KiB | 2020 May 16 05:46 |
DEF CON 26 - Balmas and Itkin - What the Fax - Audio.flac | 122.1 MiB | 2020 May 26 03:59 |
DEF CON 26 - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers - Audio.mp3 | 9.7 MiB | 2020 May 16 05:46 |
DEF CON 26 - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers - Audio.lrc | 20.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers - Audio.flac | 62.0 MiB | 2020 May 26 03:59 |
DEF CON 26 - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era - Audio.mp3 | 7.2 MiB | 2020 May 16 05:46 |
DEF CON 26 - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era - Audio.lrc | 18.9 KiB | 2020 May 16 05:46 |
DEF CON 26 - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era - Audio.flac | 48.8 MiB | 2020 May 26 03:59 |
DEF CON 26 - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story - Audio.lrc | 29.4 KiB | 2020 May 16 05:46 |
DEF CON 26 - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator - Audio.mp3 | 19.3 MiB | 2020 May 16 05:46 |
DEF CON 26 - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator - Audio.lrc | 60.6 KiB | 2020 May 16 05:46 |
DEF CON 26 - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator - Audio.flac | 124.0 MiB | 2020 May 26 03:59 |
DEF CON 26 - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses - Audio.mp3 | 11.6 MiB | 2020 May 16 05:46 |
DEF CON 26 - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses - Audio.lrc | 20.2 KiB | 2020 May 16 05:46 |
DEF CON 26 - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses - Audio.flac | 76.7 MiB | 2020 May 26 03:59 |
DEF CON 26 - 0x200b - Detecting Blue Team Research Through Targeted Ads - Audio.lrc | 25.0 KiB | 2020 May 16 05:46 |