Parent directory/ | - | - |
DEF CON 27 - The Dark Tangent - Closing Ceremonies.mp4 | 451.2 MiB | 2020 May 25 22:59 |
DEF CON 27 - Contests and Events - Contests Awards Ceremony.mp4 | 241.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.mp4 | 227.6 MiB | 2020 May 25 22:59 |
DEF CON 27 - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.mp4 | 193.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.mp4 | 191.6 MiB | 2020 May 25 22:59 |
DEF CON 27 - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.mp4 | 188.2 MiB | 2020 May 25 22:59 |
DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.mp4 | 166.5 MiB | 2020 May 25 22:59 |
DEF CON 27 - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.mp4 | 164.0 MiB | 2020 May 25 22:59 |
DEF CON 27 - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.mp4 | 162.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.mp4 | 156.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - Bruce Schneier - Information Security in the Public Interest.mp4 | 130.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.mp4 | 129.5 MiB | 2020 May 25 22:59 |
DEF CON 27 - Bill Graydon - Duplicating Restricted Mechanical Keys.mp4 | 127.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Orange Tsai - Infiltrating Corporate Intranet Like NSA Pre-auth RCE on Leading SSL VPNs.mp4 | 125.2 MiB | 2020 May 25 22:59 |
DEF CON 27 - Jesse Michael - Get Off the Kernel if You Cant Drive.mp4 | 123.6 MiB | 2020 May 25 22:59 |
DEF CON 27 - Jmaxxz - Your Car is My Car.mp4 | 120.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction.mp4 | 120.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.mp4 | 120.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.mp4 | 119.6 MiB | 2020 May 25 22:59 |
DEF CON 27 - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware.mp4 | 115.9 MiB | 2020 May 25 22:59 |
DEF CON 27 - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.mp4 | 115.5 MiB | 2020 May 25 22:59 |
DEF CON 27 - Philippe Laulheret - Intro to Hardware Hacking.mp4 | 113.5 MiB | 2020 May 25 22:59 |
DEF CON 27 - Daniel Romero - Why You Should Fear Your mundane Office Equipment.mp4 | 112.4 MiB | 2020 May 25 22:59 |
DEF CON 27 - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.mp4 | 112.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.mp4 | 112.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - finalphoenix - Rise of the Hypebots Scripting Streetwear.mp4 | 111.6 MiB | 2020 May 25 22:59 |
DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked.mp4 | 110.9 MiB | 2020 May 25 22:59 |
DEF CON 27 - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.mp4 | 110.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.mp4 | 110.0 MiB | 2020 May 25 22:59 |
DEF CON 27 - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.mp4 | 108.2 MiB | 2020 May 25 22:59 |
DEF CON 27 - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.mp4 | 106.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Bill Swearingen - HAKC THE POLICE.mp4 | 106.2 MiB | 2020 May 25 22:59 |
DEF CON 27 - Anish Athalye - Want Strong Isolation Just Reset Your Processor.mp4 | 104.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.mp4 | 103.6 MiB | 2020 May 25 22:59 |
DEF CON 27 - Jayson Grace - MOSE Using Configuration Management for Evil.mp4 | 102.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Kyle Gwinnup - Next Generation Process Emulation with Binee.mp4 | 102.4 MiB | 2020 May 25 22:59 |
DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.mp4 | 101.7 MiB | 2020 May 25 22:59 |
DEF CON 27 - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.mp4 | 101.4 MiB | 2020 May 25 22:59 |
DEF CON 27 - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.mp4 | 101.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.mp4 | 100.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.mp4 | 100.0 MiB | 2020 May 25 22:59 |
DEF CON 27 - Omer Gull - SELECT code execution FROM USING SQLite.mp4 | 99.2 MiB | 2020 May 25 22:59 |
DEF CON 27 - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.mp4 | 98.4 MiB | 2020 May 25 22:59 |
DEF CON 27 - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.mp4 | 97.5 MiB | 2020 May 25 22:59 |
DEF CON 27 - WillC - Phreaking Elevators.mp4 | 96.6 MiB | 2020 May 25 22:59 |
DEF CON 27 - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.mp4 | 96.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.mp4 | 95.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now.mp4 | 95.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.mp4 | 94.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.mp4 | 93.6 MiB | 2020 May 25 22:59 |
DEF CON 27 - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.mp4 | 93.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - Marina Simakov - Relaying Credentials Has Never Been Easier.mp4 | 93.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.mp4 | 93.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - Douglas McKee - HVACking Understand the Delta Between Security and Reality.mp4 | 92.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.mp4 | 91.5 MiB | 2020 May 25 22:59 |
DEF CON 27 - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.mp4 | 89.9 MiB | 2020 May 25 22:59 |
DEF CON 27 - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.mp4 | 89.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Alvaro Munoz - SSO Wars The Token Menace.mp4 | 88.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Leon Jacobs - Meticulously Modern Mobile Manipulations.mp4 | 88.6 MiB | 2020 May 25 22:59 |
DEF CON 27 - Hila Cohen - Malproxy Leave Your Malware at Home.mp4 | 88.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing.mp4 | 86.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.mp4 | 85.0 MiB | 2020 May 25 22:59 |
DEF CON 27 - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.mp4 | 84.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.mp4 | 83.9 MiB | 2020 May 25 22:59 |
DEF CON 27 - Hadrien Barral - The ABC of Next-Gen Shellcoding.mp4 | 81.0 MiB | 2020 May 25 22:59 |
DEF CON 27 - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.mp4 | 80.9 MiB | 2020 May 25 22:59 |
DEF CON 27 - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.mp4 | 80.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - Christopher Wade - Tag-side attacks against NFC.mp4 | 78.9 MiB | 2020 May 25 22:59 |
DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.mp4 | 77.2 MiB | 2020 May 25 22:59 |
DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.mp4 | 76.2 MiB | 2020 May 25 22:59 |
DEF CON 27 - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.mp4 | 75.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.mp4 | 74.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.mp4 | 73.4 MiB | 2020 May 25 22:59 |
DEF CON 27 - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.mp4 | 71.7 MiB | 2020 May 25 22:59 |
DEF CON 27 - Alexandre Borges - NET Malware Threats Internals And Reversing.mp4 | 69.0 MiB | 2020 May 25 22:59 |
DEF CON 27 - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined.mp4 | 67.7 MiB | 2020 May 25 22:59 |
DEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.mp4 | 65.9 MiB | 2020 May 25 22:59 |
DEF CON 27 - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.mp4 | 65.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.mp4 | 60.0 MiB | 2020 May 25 22:59 |
DEF CON 27 - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.mp4 | 57.7 MiB | 2020 May 25 22:59 |
DEF CON 27 - Jens Muller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.mp4 | 55.4 MiB | 2020 May 25 22:59 |
DEF CON 27 - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.mp4 | 54.1 MiB | 2020 May 25 22:59 |
DEF CON 27 - Nicolas Oberli - Poking the S in SD cards.mp4 | 48.9 MiB | 2020 May 25 22:59 |
DEF CON 27 - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.mp4 | 48.4 MiB | 2020 May 25 22:59 |
DEF CON 27 - Alon Weinberg - Please Inject Me a x64 Code Injection.mp4 | 45.2 MiB | 2020 May 25 22:59 |
DEF CON 27 - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.mp4 | 42.9 MiB | 2020 May 25 22:59 |
DEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.mp4 | 41.7 MiB | 2020 May 25 22:59 |
DEF CON 27 - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.mp4 | 39.8 MiB | 2020 May 25 22:59 |
DEF CON 27 - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.mp4 | 39.3 MiB | 2020 May 25 22:59 |
DEF CON 27 - Michael Stepankin - Apache Solr Injection.mp4 | 27.7 MiB | 2020 May 25 22:59 |
DEF CON 27 - The Dark Tangent - Closing Ceremonies.srt | 117.3 KiB | 2020 May 16 04:15 |
DEF CON 27 - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.srt | 81.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.srt | 68.7 KiB | 2020 May 16 04:15 |
DEF CON 27 - Philippe Laulheret - Intro to Hardware Hacking.srt | 67.4 KiB | 2020 May 16 04:15 |
DEF CON 27 - Contests and Events - Contests Awards Ceremony.srt | 67.2 KiB | 2020 May 16 04:15 |
DEF CON 27 - Anish Athalye - Want Strong Isolation Just Reset Your Processor.srt | 66.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing.srt | 65.7 KiB | 2020 May 16 04:15 |
DEF CON 27 - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.srt | 64.5 KiB | 2020 May 16 04:15 |
DEF CON 27 - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.srt | 63.6 KiB | 2020 May 16 04:15 |
DEF CON 27 - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.srt | 61.4 KiB | 2020 May 16 04:14 |
DEF CON 27 - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware .srt | 61.3 KiB | 2020 May 16 04:14 |
DEF CON 27 - Kyle Gwinnup - Next Generation Process Emulation with Binee.srt | 60.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.srt | 59.9 KiB | 2020 May 16 04:15 |
DEF CON 27 - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.srt | 59.3 KiB | 2020 May 16 04:15 |
DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction.srt | 58.7 KiB | 2020 May 16 04:15 |
DEF CON 27 - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.srt | 58.3 KiB | 2020 May 16 04:15 |
DEF CON 27 - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.srt | 57.4 KiB | 2020 May 16 04:14 |
DEF CON 27 - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.srt | 56.6 KiB | 2020 May 16 04:15 |
DEF CON 27 - Douglas McKee - HVACking Understand the Delta Between Security and Reality.srt | 56.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.srt | 55.5 KiB | 2020 May 16 04:15 |
DEF CON 27 - Bill Graydon - Duplicating Restricted Mechanical Keys.srt | 55.3 KiB | 2020 May 16 04:15 |
DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.srt | 53.5 KiB | 2020 May 16 04:15 |
DEF CON 27 - Christopher Wade - Tag-side attacks against NFC.srt | 51.7 KiB | 2020 May 16 04:15 |
DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.srt | 51.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.srt | 51.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.srt | 50.8 KiB | 2020 May 16 04:15 |
DEF CON 27 - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.srt | 50.7 KiB | 2020 May 16 04:15 |
DEF CON 27 - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.srt | 50.6 KiB | 2020 May 16 04:15 |
DEF CON 27 - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.srt | 50.5 KiB | 2020 May 16 04:15 |
DEF CON 27 - Jesse Michael - Get Off the Kernel if You Cant Drive.srt | 49.8 KiB | 2020 May 16 04:15 |
DEF CON 27 - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.srt | 49.8 KiB | 2020 May 16 04:15 |
DEF CON 27 - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.srt | 49.7 KiB | 2020 May 16 04:15 |
DEF CON 27 - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.srt | 49.5 KiB | 2020 May 16 04:15 |
DEF CON 27 - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.srt | 49.0 KiB | 2020 May 16 04:14 |
DEF CON 27 - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.srt | 48.9 KiB | 2020 May 16 04:15 |
DEF CON 27 - Leon Jacobs - Meticulously Modern Mobile Manipulations.srt | 48.1 KiB | 2020 May 16 04:15 |
DEF CON 27 - Marina Simakov - Relaying Credentials Has Never Been Easier.srt | 47.9 KiB | 2020 May 16 04:15 |
DEF CON 27 - Daniel Romero - Why You Should Fear Your mundane Office Equipment.srt | 47.8 KiB | 2020 May 16 04:15 |
DEF CON 27 - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.srt | 47.7 KiB | 2020 May 16 04:15 |
DEF CON 27 - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.srt | 47.4 KiB | 2020 May 16 04:15 |
DEF CON 27 - Bill Swearingen - HAKC THE POLICE.srt | 47.3 KiB | 2020 May 16 04:15 |
DEF CON 27 - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.srt | 46.6 KiB | 2020 May 16 04:15 |
DEF CON 27 - Jmaxxz - Your Car is My Car.srt | 46.6 KiB | 2020 May 16 04:15 |
DEF CON 27 - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.srt | 46.5 KiB | 2020 May 16 04:15 |
DEF CON 27 - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.srt | 46.5 KiB | 2020 May 16 04:15 |
DEF CON 27 - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.srt | 46.2 KiB | 2020 May 16 04:15 |
DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.srt | 45.1 KiB | 2020 May 16 04:15 |
DEF CON 27 - Jayson Grace - MOSE Using Configuration Management for Evil.srt | 44.8 KiB | 2020 May 16 04:15 |
DEF CON 27 - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.srt | 44.6 KiB | 2020 May 16 04:15 |
DEF CON 27 - Omer Gull - SELECT code execution FROM USING SQLite.srt | 44.2 KiB | 2020 May 16 04:15 |
DEF CON 27 - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.srt | 44.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.srt | 43.7 KiB | 2020 May 16 04:15 |
DEF CON 27 - Hila Cohen - Malproxy Leave Your Malware at Home.srt | 43.4 KiB | 2020 May 16 04:15 |
DEF CON 27 - finalphoenix - Rise of the Hypebots Scripting Streetwear.srt | 43.2 KiB | 2020 May 16 04:15 |
DEF CON 27 - Bruce Schneier - Information Security in the Public Interest.srt | 42.8 KiB | 2020 May 16 04:15 |
DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now.srt | 42.2 KiB | 2020 May 16 04:15 |
DEF CON 27 - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.srt | 42.1 KiB | 2020 May 16 04:15 |
DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.srt | 42.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.srt | 42.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - WillC - Phreaking Elevators.srt | 41.9 KiB | 2020 May 16 04:15 |
DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked.srt | 41.7 KiB | 2020 May 16 04:14 |
DEF CON 27 - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.srt | 41.2 KiB | 2020 May 16 04:15 |
DEF CON 27 - Alvaro Muñoz - SSO Wars The Token Menace.srt | 41.1 KiB | 2020 May 16 04:15 |
DEF CON 27 - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.srt | 38.2 KiB | 2020 May 16 04:15 |
DEF CON 27 - Hadrien Barral - The ABC of Next-Gen Shellcoding.srt | 37.9 KiB | 2020 May 16 04:15 |
DEF CON 27 - Orange Tsai - Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs.srt | 37.8 KiB | 2020 May 16 04:15 |
DEF CON 27 - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.srt | 36.5 KiB | 2020 May 16 04:15 |
DEF CON 27 - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.srt | 36.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.srt | 35.5 KiB | 2020 May 16 04:15 |
DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.srt | 35.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.srt | 34.4 KiB | 2020 May 16 04:15 |
DEF CON 27 - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.srt | 33.6 KiB | 2020 May 16 04:15 |
DEF CON 27 - Alexandre Borges - NET Malware Threats Internals And Reversing.srt | 33.3 KiB | 2020 May 16 04:15 |
DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.srt | 31.1 KiB | 2020 May 16 04:15 |
DEF CON 27 - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.srt | 28.2 KiB | 2020 May 16 04:14 |
DEF CON 27 - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.srt | 27.8 KiB | 2020 May 16 04:15 |
DEF CON 27 - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.srt | 27.7 KiB | 2020 May 16 04:14 |
DEF CON 27 - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.srt | 27.1 KiB | 2020 May 16 04:15 |
DEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.srt | 26.7 KiB | 2020 May 16 04:15 |
DEF CON 27 - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined for Others Auto Infractions.srt | 26.7 KiB | 2020 May 16 04:15 |
DEF CON 27 - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.srt | 26.2 KiB | 2020 May 16 04:15 |
DEF CON 27 - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.srt | 26.0 KiB | 2020 May 16 04:15 |
DEF CON 27 - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.srt | 25.9 KiB | 2020 May 16 04:14 |
DEF CON 27 - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.srt | 25.1 KiB | 2020 May 16 04:15 |
DEF CON 27 - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.srt | 24.5 KiB | 2020 May 16 04:15 |
DEF CON 27 - Jens Müller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.srt | 23.6 KiB | 2020 May 16 04:15 |
DEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.srt | 22.7 KiB | 2020 May 16 04:15 |
DEF CON 27 - Nicolas Oberli - Poking the S in SD cards.srt | 19.5 KiB | 2020 May 16 04:15 |
DEF CON 27 - Alon Weinberg - Please Inject Me a x64 Code Injection.srt | 18.1 KiB | 2020 May 16 04:15 |
DEF CON 27 - Michael Stepankin - Apache Solr Injection.srt | 15.9 KiB | 2020 May 16 04:15 |