Parent directory/ | - | - |
DEF CON 30 - Aaditya Purani, Max Garrett - ElectroVolt - Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron.mp4 | 69.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Aaditya Purani, Max Garrett - ElectroVolt - Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron.srt | 71.3 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Adam Zabrocki, Alex Tereshkin - Exploitation in the era of Formal Verification - A Peek at a New Frontier with AdaCore-Spark.mp4 | 74.5 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Adam Zabrocki, Alex Tereshkin - Exploitation in the era of Formal Verification - A Peek at a New Frontier with AdaCore-Spark.srt | 80.3 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Andrew Logan - Tracking Military Ghost Helicopters over Washington DC.mp4 | 34.7 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Andrew Logan - Tracking Military Ghost Helicopters over Washington DC.srt | 31.0 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Arik Atar - Top-performing account crackers business modules, architecture, and techniques.mp4 | 77.2 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Arik Atar - Top-performing account crackers business modules, architecture, and techniques.srt | 75.4 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Asaf Gilboa, Ron Ben-Yitzhak - LSASS Shtinkering - Abusing Windows Error Reporting to Dump LSASS.mp4 | 42.4 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Asaf Gilboa, Ron Ben-Yitzhak - LSASS Shtinkering - Abusing Windows Error Reporting to Dump LSASS.srt | 44.7 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Aviv Sassoon - The Journey From an Isolated Container to Cluster Admin in Service Fabric.mp4 | 57.4 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Aviv Sassoon - The Journey From an Isolated Container to Cluster Admin in Service Fabric.srt | 48.4 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Ben Barnea, Ophir Harpaz - Exploring Ancient Ruins to Find Modern Bugs - Discovering a 0-Day in an MS-RPC Service.mp4 | 66.0 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Ben Barnea, Ophir Harpaz - Exploring Ancient Ruins to Find Modern Bugs - Discovering a 0-Day in an MS-RPC Service.srt | 66.6 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Ben Gardiner - Trailer Shouting - Talking PLC4TRUCKS Remotely with an SDR.mp4 | 69.0 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Ben Gardiner - Trailer Shouting - Talking PLC4TRUCKS Remotely with an SDR.srt | 79.5 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Bill Graydon - Defeating Moving Elements in High Security Keys.mp4 | 75.7 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Bill Graydon - Defeating Moving Elements in High Security Keys.srt | 80.4 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Billy Jheng, Muhammad ALifa Ramdhan - All Roads Lead to GKEs Host - 4 Ways to Escape.mp4 | 70.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Billy Jheng, Muhammad ALifa Ramdhan - All Roads Lead to GKEs Host - 4 Ways to Escape.srt | 49.3 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Bing-John Jheng, Muhammad Ramdhan - All Roads Lead to GKEs Host - 4 Ways to Escape.mp4 | 70.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Bing-John Jheng, Muhammad Ramdhan - All Roads Lead to GKEs Host - 4 Ways to Escape.srt | 47.2 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Cesare Pizzi - Old Malware, New Tools - Ghidra and Commodore 64.mp4 | 75.6 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Cesare Pizzi - Old Malware, New Tools - Ghidra and Commodore 64.srt | 71.3 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Chris Inglis, Kim Zetter - A Policy Fireside Chat with the National Cyber Director.mp4 | 73.6 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Chris Inglis, Kim Zetter - A Policy Fireside Chat with the National Cyber Director.srt | 85.8 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Chris Rock - Killer Hertz.mp4 | 62.7 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Chris Rock - Killer Hertz.srt | 52.6 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Christopher Panayi - Pulling Passwords out of Configuration Manager - Practical Attacks against MS Endpoint Management Software.mp4 | 89.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Christopher Panayi - Pulling Passwords out of Configuration Manager.srt | 87.8 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Closing Ceremonies and Awards.mp4 | 248.2 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Closing Ceremonies and Awards.srt | 180.8 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - ColdwaterQ - Backdooring Pickles - A decade only made things worse.mp4 | 32.0 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - ColdwaterQ - Backdooring Pickles - A decade only made things worse.srt | 36.9 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Contests Closing Ceremonies and Awards.mp4 | 108.1 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Contests Closing Ceremonies and Awards.srt | 87.6 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Cory Doctorow, Christian Dameff, & Jeff Tully MD - Literal Self-Pwning - Why Patients Should Be Encouraged to Hack Med Tech.mp4 | 54.5 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Cory Doctorow, Christian Dameff, & Jeff Tully MD - Literal Self-Pwning - Why Patients Should Be Encouraged to Hack Med Tech.srt | 86.6 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Dagan Henderson, Will Kline - The Call is Coming From Inside The Cluster.mp4 | 64.2 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Dagan Henderson, Will Kline - The Call is Coming From Inside The Cluster.srt | 70.2 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Daniel Crowley - Black-Box Assessment of Smart Cards.mp4 | 73.6 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Daniel Crowley - Black-Box Assessment of Smart Cards.srt | 70.0 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Daniel Jensen - Hunting Bugs in The Tropics.mp4 | 66.9 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Daniel Jensen - Hunting Bugs in The Tropics.srt | 67.1 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Dongsung Kim - The CSRF Resurrections - Starring the Unholy Trinity - Service Worker of PWA, SameSite of HTTP Cookie, and Fetch.mp4 | 60.1 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Dongsung Kim - The CSRF Resurrections - Starring the Unholy Trinity.srt | 52.7 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Dr James Pavur - Space Jam - Exploring Radio Frequency Attacks in Outer Space.mp4 | 54.6 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Dr James Pavur - Space Jam - Exploring Radio Frequency Attacks in Outer Space.srt | 74.5 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Emma Best, Xan North - Leak the Planet - Veritatem Cognoscere Non Pereat Mundus.mp4 | 76.2 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Emma Best, Xan North - Leak the Planet - Veritatem Cognoscere Non Pereat Mundus.srt | 66.4 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Eran Segal - The COW - Container On Windows - Who Escaped the Silo.mp4 | 57.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Eran Segal - The COW - Container On Windows - Who Escaped the Silo.srt | 49.3 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Eugene Lim - You Have 1 New Appwntment - Hacking Proprietary iCalendar Properties.mp4 | 53.0 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Eugene Lim - You Have 1 New Appwntment - Hacking Proprietary iCalendar Properties.srt | 66.2 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet.mp4 | 60.0 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet.srt | 51.7 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Hadrien Barral - Emoji Shellcoding.mp4 | 69.4 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Hadrien Barral - Emoji Shellcoding.srt | 72.8 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Harley Geiger, Leonard Bailey - Hacking Law is for Hackers.mp4 | 152.5 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Harley Geiger, Leonard Bailey - Hacking Law is for Hackers.srt | 154.1 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Ionut Cernica - Deanonymization of TOR HTTP Hidden Services.mp4 | 26.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Ionut Cernica - Deanonymization of TOR HTTP Hidden Services.srt | 25.2 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Jacob Baines - Do Not Trust the ASA, Trojans.mp4 | 58.2 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Jacob Baines - Do Not Trust the ASA, Trojans.srt | 58.1 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows.mp4 | 63.4 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows.srt | 52.2 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - James Kettle - Browser-Powered Desync Attacks - A New Frontier in HTTP Request Smuggling.mp4 | 60.3 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - James Kettle - Browser-Powered Desync Attacks - A New Frontier in HTTP Request Smuggling.srt | 69.1 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Jason Healy - A Policy Fireside Chat with Jay Healey.mp4 | 79.2 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Jason Healy - A Policy Fireside Chat with Jay Healey.srt | 80.4 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Jay Lagorio - Tear Down this Zywall - Breaking Open Zyxel Encrypted Firmware.mp4 | 41.9 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Jay Lagorio - Tear Down this Zywall - Breaking Open Zyxel Encrypted Firmware.srt | 47.8 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Jeffrey Hofmann - PreAuth RCE Chains on an MDM - KACE SMA.mp4 | 52.6 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Jeffrey Hofmann - PreAuth RCE Chains on an MDM - KACE SMA.srt | 67.3 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Jen Easterly, Dark Tangent - Walk This Way - What Run DMC and Aerosmith Can Teach Us About the Future of Cybersecurity.mp4 | 102.3 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Jen Easterly, Dark Tangent - Walk This Way - What Run DMC and Aerosmith Can Teach Us About the Future of Cybersecurity.srt | 102.4 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Jimi jimi2x Allee - Chromebook Breakout - Escaping Jail Using a Pico Ducky.mp4 | 73.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Jimi jimi2x Allee - Chromebook Breakout - Escaping Jail Using a Pico Ducky.srt | 74.1 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Jimmy Wylie - Analyzing PIPEDREAM - Challenges in Testing an ICS Attack Toolkit.mp4 | 73.0 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Jimmy Wylie - Analyzing PIPEDREAM - Challenges in Testing an ICS Attack Toolkit.srt | 83.9 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - John Midgely - OpenCola The AntiSocial Network.mp4 | 60.3 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - John Midgely - OpenCola The AntiSocial Network.srt | 77.1 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Jonathan Leitschuh - Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.mp4 | 69.4 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Jonathan Leitschuh - Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.srt | 82.3 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Jonghyuk Song, Soohwan Oh, Woongjo Choi - Automotive Ethernet Fuzzing.mp4 | 28.3 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Jonghyuk Song, Soohwan Oh, Woongjo Choi - Automotive Ethernet Fuzzing.srt | 28.8 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Jose Pico, Fernando Perera - Wireless Keystroke Injection via Bluetooth Low Energy.mp4 | 59.5 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Jose Pico, Fernando Perera - Wireless Keystroke Injection via Bluetooth Low Energy.srt | 55.6 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Joseph Ravichandran - The PACMAN Attack - Breaking PAC on the Apple M1 with Hardware Attacks.mp4 | 58.7 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Joseph Ravichandran - The PACMAN Attack - Breaking PAC on the Apple M1 with Hardware Attacks.srt | 87.3 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Karl Koscher, Andrew Green - Hack the Hemisphere.mp4 | 83.9 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Karl Koscher, Andrew Green - Hack the Hemisphere.srt | 61.7 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Kenneth Geers - Computer Hacks in the Russia-Ukraine War.mp4 | 34.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Kenneth Geers - Computer Hacks in the Russia-Ukraine War.srt | 31.7 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve, and More.mp4 | 76.1 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve, and More.srt | 87.9 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Lennert Wouters - Black Box Security Evaluation of SpaceX Starlink.mp4 | 54.0 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Lennert Wouters - Black Box Security Evaluation of SpaceX Starlink.srt | 64.7 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Martin Doyhenard - Internet Server Error - Exploiting Inter-process Communication with New Desynch Primitives.mp4 | 73.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Martin Doyhenard - Internet Server Error - Exploiting Inter-process Communication with New Desynch Primitives.srt | 78.4 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Melvin Langvik - Taking a Dump In The Cloud.mp4 | 72.1 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Melvin Langvik - Taking a Dump In The Cloud.srt | 73.2 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Miana E Windall, Micsen - Digital Skeleton Keys.mp4 | 33.5 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Miana E Windall, Micsen - Digital Skeleton Keys.srt | 28.1 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Michael Bargury - Low Code High Risk - Enterprise Donation via Low Code Abuse.mp4 | 62.6 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Michael Bargury - Low Code High Risk - Enterprise Donation via Low Code Abuse.srt | 67.1 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Michael Bargury - No-Code Malware - Windows 11 At Your Service.mp4 | 47.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Michael Bargury - No-Code Malware - Windows 11 At Your Service.srt | 52.2 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Mickey Shkatov, Jesse Michael - One Bootloader to Load Them All.mp4 | 89.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Mickey Shkatov, Jesse Michael - One Bootloader to Load Them All.srt | 82.2 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Minh Duong - The Big Rick - How I Rickrolled My High School District and Got Away With It.mp4 | 34.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Minh Duong - The Big Rick - How I Rickrolled My High School District and Got Away With It.srt | 35.9 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Moritz Abrell - Phreaking 2.0 - Abusing Microsoft Teams Direct Routing.mp4 | 30.4 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Moritz Abrell - Phreaking 2.0 - Abusing Microsoft Teams Direct Routing.srt | 31.7 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Nick Powers, Steven Flores - Less SmartScreen More Caffeine - ClickOnce AbUse for Trusted Code Execution.mp4 | 71.9 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Nick Powers, Steven Flores - Less SmartScreen More Caffeine - ClickOnce AbUse for Trusted Code Execution.srt | 80.2 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Nikita Kurtin - Defaults - The Faults - Bypassing Android Permissions From All Protection Levels.mp4 | 51.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Nikita Kurtin - Defaults - The Faults - Bypassing Android Permissions From All Protection Levels.srt | 50.7 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Octavio Gianatiempo, Octavio Galland - Exploring the Hidden Attack Surfaces of OEM IoT Devices.mp4 | 59.9 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Octavio Gianatiempo, Octavio Galland - Exploring the Hidden Attack Surfaces of OEM IoT Devices.srt | 65.5 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Omri Misgav - Running Rootkits Like A Nation-State Hacker.mp4 | 39.4 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Omri Misgav - Running Rootkits Like A Nation-State Hacker.srt | 30.8 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Orange Tsai - Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.mp4 | 43.7 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Orange Tsai - Let-s Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.srt | 47.4 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Panel - Emerging Technical Cyber Policy Topics.srt | 82.0 KiB | 2022 Oct 12 19:44 |
DEF CON 30 - Panel - Global Challenges, Global Approaches in Cyber Policy.mp4 | 82.9 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Panel - Global Challenges, Global Approaches in Cyber Policy.srt | 90.5 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Panel - Imagining a Cyber Policy Crisis.mp4 | 135.4 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Panel - Imagining a Cyber Policy Crisis.srt | 174.7 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Panel - Moving Regulation Upstream - Focus on the Role of Digital Service Providers.srt | 130.9 KiB | 2022 Oct 12 19:44 |
DEF CON 30 - Panel - Return-Oriented Policymaking.mp4 | 111.0 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Panel - Return-Oriented Policymaking.srt | 152.6 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Panel - So Its Your First DEF CON.mp4 | 77.2 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Panel - So Its Your First DEF CON.srt | 76.4 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Patrick Wardle - You Are Muted - Rooted.mp4 | 64.8 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Patrick Wardle - You Are Muted - Rooted.srt | 71.5 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Patrick Wardle, Tom McGuire - Deja Vu - Uncovering Stolen Algorithms in Commercial Products.mp4 | 35.3 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - Patrick Wardle, Tom McGuire - Deja Vu - Uncovering Stolen Algorithms in Commercial Products.srt | 41.3 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Paul Roberts - Brazil Redux - Short-Circuiting Tech Enabled Dystopia with the Right to Repair.mp4 | 146.4 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Paul Roberts - Brazil Redux - Short-Circuiting Tech Enabled Dystopia with the Right to Repair.srt | 154.7 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Pending Abdelmotaleb, Dr Bramwell Brizendine - Weaponizing Windows Syscalls as Modern, 32-bit Shellcode.mp4 | 59.5 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Pending Abdelmotaleb, Dr Bramwell Brizendine - Weaponizing Windows Syscalls as Modern, 32-bit Shellcode.srt | 56.4 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Policy @ DEF CON - The Internet's Role in Sanctions Enforcement - Russia Ukraine and the Future - Bill Woodcock.mp4 | 82.0 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Policy @ DEF CON - The Internet-s Role in Sanctions Enforcement - Russia Ukraine and the Future - Bill Woodcock.srt | 66.8 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Policy @ DEF CON - What is it, and what are we trying to do for hackers in the policy world.mp4 | 95.3 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Policy @ DEF CON - What is it, and what are we trying to do for hackers in the policy world.srt | 102.4 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Rex Guo, Junyuan Zeng - Trace me if you can- Bypassing Linux Syscall Tracing.mp4 | 61.5 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Rex Guo, Junyuan Zeng - Trace me if you can- Bypassing Linux Syscall Tracing.srt | 64.5 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - Richard Thieme - UFOs, Alien Life, and the Least Untruthful Things I Can Say.mp4 | 38.1 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Richard Thieme - UFOs, Alien Life, and the Least Untruthful Things I Can Say.srt | 72.7 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Roger Dingledine - How Russia is trying to Block Tor.mp4 | 77.5 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Roger Dingledine - How Russia is trying to Block Tor.srt | 81.3 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor.mp4 | 82.6 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor.srt | 78.1 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Sam Quinn, Steve Povolny - Perimeter Breached Hacking an Access Control System.mp4 | 65.7 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Sam Quinn, Steve Povolny - Perimeter Breached Hacking an Access Control System.srt | 85.7 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Samuel Erb, Justin Gardner - Crossing the KASM - a Webapp Pentest Story.mp4 | 55.6 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Samuel Erb, Justin Gardner - Crossing the KASM - a Webapp Pentest Story.srt | 60.8 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs.mp4 | 39.4 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs.srt | 36.9 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Sick Codes - Hacking the Farm - Breaking Badly into Agricultural Devices.mp4 | 74.4 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Sick Codes - Hacking the Farm - Breaking Badly into Agricultural Devices.srt | 95.8 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Slava Makkaveev - Digging into Xiaomis TEE to to Get to Chinese Money.mp4 | 38.4 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Slava Makkaveev - Digging into Xiaomis TEE to to Get to Chinese Money.srt | 31.4 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Stephen Eckels - STrace - A DTrace on windows reimplementation.mp4 | 82.5 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Stephen Eckels - STrace - A DTrace on windows reimplementation.srt | 90.6 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Stewart Scott, Trey Herr - Dragon Tails- Supply-Side Security and Intl Vulnerability Disclosure Law.mp4 | 24.8 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Stewart Scott, Trey Herr - Dragon Tails- Supply-Side Security and Intl Vulnerability Disclosure Law.srt | 35.0 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Tarek Abdelmotaleb, Dr Bramwell Brizendine - Weaponizing Windows Syscalls as Modern, 32-bit Shellcode.mp4 | 42.6 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Tarek Abdelmotaleb, Dr Bramwell Brizendine - Weaponizing Windows Syscalls as Modern, 32-bit Shellcode.srt | 39.3 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - The Dark Tangent, MKFactor - Welcome to DEF CON and Making of the Badge.mp4 | 65.9 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - The Dark Tangent, MKFactor - Welcome to DEF CON and Making of the Badge.srt | 64.5 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Thijs Alkemade - Process Injection - Breaking All MacOS Security Layers with a Single Vulnerability.mp4 | 62.1 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Thijs Alkemade - Process Injection - Breaking All MacOS Security Layers with a Single Vulnerability.srt | 61.0 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Thomas Roth - Solana JIT - Lessons from fuzzing a smart-contract compiler.mp4 | 52.0 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Thomas Roth - Solana JIT - Lessons from fuzzing a smart-contract compiler.srt | 56.2 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APTs operations security.mp4 | 79.7 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APTs operations security.srt | 71.8 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Tristan Miller - Reversing the Original Xbox Live Protocols.mp4 | 84.3 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Tristan Miller - Reversing the Original Xbox Live Protocols.srt | 62.4 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Wietze Beukema - Save The Environment Variable - Hijacking Legitimate Applications with a Minimal Footprint.mp4 | 67.5 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Wietze Beukema - Save The Environment Variable - Hijacking Legitimate Applications with a Minimal Footprint.srt | 84.4 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Winn Schwartau - My First Hack Was in 1958 - Then A Career in Rock’n’Roll Taught Me About Security.mp4 | 69.5 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Winn Schwartau - My First Hack Was in 1958 - Then A Career in Rock’n’Roll Taught Me About Security.srt | 55.7 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Yolan Romailler - A Dead Man’s Full-Yet-Responsible-Disclosure System.mp4 | 79.4 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Yolan Romailler - A Dead Man’s Full-Yet-Responsible-Disclosure System.srt | 63.1 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - Zachary Minneker - How To Get MUMPS Thirty Years Later.mp4 | 78.7 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - Zachary Minneker - How To Get MUMPS Thirty Years Later.srt | 68.7 KiB | 2022 Oct 13 02:48 |
DEF CON 30 - atlas - Emulation-driven Reverse Engineering for Finding Vulns.mp4 | 61.9 MiB | 2022 Oct 19 17:53 |
DEF CON 30 - atlas - Emulation-driven Reverse Engineering for Finding Vulns.srt | 80.0 KiB | 2022 Oct 13 02:49 |
DEF CON 30 - stacksmashing - The hitchhacker’s guide to iPhone Lightning and JTAG hacking.mp4 | 27.2 MiB | 2022 Oct 19 17:54 |
DEF CON 30 - stacksmashing - The hitchhacker’s guide to iPhone Lightning and JTAG hacking.srt | 35.6 KiB | 2022 Oct 13 02:48 |