/DEF CON 22/DEF CON 22 slides x265/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 22 Hacking Conference Presentation By Adrian Crenshaw - Dropping Docs on Darknets - How People Got Caught - Slides.mp448.9 MiB2015-Mar-29 16:15
DEF CON 22 Hacking Conference Presentation By Adrian Crenshaw - Dropping Docs on Darknets - How People Got Caught - Slides.srt50.2 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Adrian Crenshaw - Dropping Docs on Darknets - How People Got Caught.txt36.6 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Alex Pinto & Kyle Maxwell - Measuring the IQ of your Threat Intelligence feeds - Slides.mp431.6 MiB2015-Mar-29 17:30
DEF CON 22 Hacking Conference Presentation By Alex Pinto & Kyle Maxwell - Measuring the IQ of your Threat Intelligence feeds - Slides.srt49.2 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Alex Pinto & Kyle Maxwell - Measuring the IQ of your Threat Intelligence feeds.txt36.4 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Alex Pinto - Secure Because Math - A Deep Dive On Machine Learning - Based Monitoring - Slides.mp434.8 MiB2015-Mar-29 16:53
DEF CON 22 Hacking Conference Presentation By Alex Pinto - Secure Because Math - A Deep Dive On Machine Learning - Based Monitoring - Slides.srt47.9 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Alex Pinto - Secure Because Math - A Deep Dive On Machine Learning - Based Monitoring.txt35.2 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Alex Zacharis & Tsagkarakis Nikolaos - PoS Attacking the Traveling Salesman - Slides.mp428.3 MiB2015-Mar-29 18:03
DEF CON 22 Hacking Conference Presentation By Alex Zacharis & Tsagkarakis Nikolaos - PoS Attacking the Traveling Salesman - Slides.srt31.0 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Alex Zacharis & Tsagkarakis Nikolaos - PoS Attacking the Traveling Salesman.txt22.6 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Alexandre Moneger - Generating ROP payloads from numbers - Slides.mp432.9 MiB2015-Mar-29 18:46
DEF CON 22 Hacking Conference Presentation By Alexandre Moneger - Generating ROP payloads from numbers - Slides.srt46.1 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Alexandre Moneger - Generating ROP payloads from numbers.txt33.8 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Anch - The Monkey in the Middle - A pentesters guide to playing in traffic - Slides.mp438.5 MiB2015-Mar-29 19:36
DEF CON 22 Hacking Conference Presentation By Anch - The Monkey in the Middle - A pentesters guide to playing in traffic - Slides.srt52.7 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Anch - The Monkey in the Middle - A pentesters guide to playing in traffic.txt38.7 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Andrew Hunt - Raspberry MoCA - A recipe for compromise - Slides.mp420.0 MiB2015-Mar-29 20:01
DEF CON 22 Hacking Conference Presentation By Andrew Hunt - Raspberry MoCA - A recipe for compromise - Slides.srt23.9 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Andrew Hunt - Raspberry MoCA - A recipe for compromise.txt17.6 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Anton Sapozhnikov - Acquire current user hashes without admin privileges - Slides.mp424.2 MiB2015-Mar-29 20:38
DEF CON 22 Hacking Conference Presentation By Anton Sapozhnikov - Acquire current user hashes without admin privileges - Slides.srt20.2 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Anton Sapozhnikov - Acquire current user hashes without admin privileges.txt14.8 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Blake Self & Shawn (cisc0ninja) Burrell - Don't DDoS Me Bro - Practical DDoS Defense - Slides.mp432.1 MiB2015-Mar-29 21:15
DEF CON 22 Hacking Conference Presentation By Blake Self & Shawn (cisc0ninja) Burrell - Don't DDoS Me Bro - Practical DDoS Defense - Slides.srt52.5 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Blake Self & Shawn (cisc0ninja) Burrell - Don't DDoS Me Bro - Practical DDoS Defense.txt38.8 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Brady Bloxham - Getting Windows to Play with Itself - A Hacker's Guide to Windows API Abuse - Slides.mp429.7 MiB2015-Mar-29 21:52
DEF CON 22 Hacking Conference Presentation By Brady Bloxham - Getting Windows to Play with Itself - A Hacker's Guide to Windows API Abuse - Slides.srt38.3 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Brady Bloxham - Getting Windows to Play with Itself - A Hacker's Guide to Windows API Abuse.txt27.8 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Brent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations - Slides.mp429.5 MiB2015-Mar-29 22:26
DEF CON 22 Hacking Conference Presentation By Brian Gorenc & Matt Molinyawe - Blowing up the Celly - Building Your Own SMS_MMS Fuzzer - Slides.mp418.7 MiB2015-Mar-29 22:47
DEF CON 22 Hacking Conference Presentation By Brian Gorenc & Matt Molinyawe - Blowing up the Celly - Building Your Own SMS_MMS Fuzzer - Slides.srt21.5 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Brian Gorenc & Matt Molinyawe - Blowing up the Celly - Building Your Own SMS_MMS Fuzzer.txt16.0 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By CJ Heres & Amir Etemadieh & Mike Baker & Hans Nielsen - Hack All The Things - 20 Devices in 45 Minutes - Slides.mp446.7 MiB2015-Mar-30 07:20
DEF CON 22 Hacking Conference Presentation By CJ Heres & Amir Etemadieh & Mike Baker & Hans Nielsen - Hack All The Things - 20 Devices in 45 Minutes - Slides.srt43.7 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By CJ Heres & Amir Etemadieh & Mike Baker & Hans Nielsen - Hack All The Things - 20 Devices in 45 Minutes.txt32.2 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Cesar Cerrudo - Hacking US (and UK & Australia & France etc.) traffic control systems - Slides.mp492.3 MiB2015-Mar-30 00:37
DEF CON 22 Hacking Conference Presentation By Cesar Cerrudo - Hacking US (and UK & Australia & France etc.) traffic control systems - Slides.srt37.9 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Cesar Cerrudo - Hacking US (and UK & Australia & France etc.) traffic control systems.txt27.6 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces - Slides.mp459.4 MiB2015-Mar-30 01:44
DEF CON 22 Hacking Conference Presentation By Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces - Slides.srt42.3 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces.txt31.3 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Charlie Vedaa & Mike Larsen - Impostor - Polluting Tor Metadata - Slides.mp415.9 MiB2015-Mar-30 02:02
DEF CON 22 Hacking Conference Presentation By Charlie Vedaa & Mike Larsen - Impostor - Polluting Tor Metadata - Slides.srt20.0 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Charlie Vedaa & Mike Larsen - Impostor - Polluting Tor Metadata.txt14.3 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Chris Hadnagy - What Your Body Tells Me - Body Language for the SE - Slides.mp480.3 MiB2015-Mar-30 03:42
DEF CON 22 Hacking Conference Presentation By Chris Littlebury - Home Alone with localhost - Automating Home Defense - Slides.mp435.8 MiB2015-Mar-30 04:25
DEF CON 22 Hacking Conference Presentation By Chris Littlebury - Home Alone with localhost - Automating Home Defense - Slides.srt39.6 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Chris Littlebury - Home Alone with localhost - Automating Home Defense.txt29.4 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Christian (quaddi) Dameff & Jeff (r3plicant) Tully & Peter Hefley - Hacking 911 - Adventures in Disruption Destruction and Death - Slides.mp431.3 MiB2015-Mar-30 05:02
DEF CON 22 Hacking Conference Presentation By Christian (quaddi) Dameff & Jeff (r3plicant) Tully & Peter Hefley - Hacking 911 - Adventures in Disruption Destruction and Death - Slides.srt58.2 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Christian (quaddi) Dameff & Jeff (r3plicant) Tully & Peter Hefley - Hacking 911 - Adventures in Disruption Destruction and Death.txt42.3 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Christopher Campbell - The $env - PATH less Traveled is Full of Easy Privilege Escalation Vulns - Slides.mp415.8 MiB2015-Mar-30 05:23
DEF CON 22 Hacking Conference Presentation By Christopher Campbell - The $env - PATH less Traveled is Full of Easy Privilege Escalation Vulns - Slides.srt18.3 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Christopher Campbell - The $env - PATH less Traveled is Full of Easy Privilege Escalation Vulns.txt13.5 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Christopher Campbell - The Secret Life of Krbtgt - Slides.mp415.0 MiB2015-Mar-30 05:42
DEF CON 22 Hacking Conference Presentation By Christopher Campbell - The Secret Life of Krbtgt - Slides.srt15.8 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Christopher Campbell - The Secret Life of Krbtgt.txt11.6 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Christopher Soghoian - Blinding The Surveillance State - Slides.mp429.1 MiB2015-Mar-30 06:16
DEF CON 22 Hacking Conference Presentation By Christopher Soghoian - Blinding The Surveillance State - Slides.srt44.4 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Christopher Soghoian - Blinding The Surveillance State.txt32.7 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Corey Kallenberg & Xeno Kovah - Extreme Privilege Escalation On Windows 8 UEFI Systems - Slides.mp440.6 MiB2015-Mar-30 08:07
DEF CON 22 Hacking Conference Presentation By Corey Kallenberg & Xeno Kovah - Extreme Privilege Escalation On Windows 8 UEFI Systems - Slides.srt49.4 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Corey Kallenberg & Xeno Kovah - Extreme Privilege Escalation On Windows 8 UEFI Systems.txt36.2 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Dan Kaminsky - Secure Random by Default - Slides.mp474.9 MiB2015-Mar-30 09:32
DEF CON 22 Hacking Conference Presentation By Dan Kaminsky - Secure Random by Default - Slides.srt103.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Dan Kaminsky - Secure Random by Default.txt75.1 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Dark Tangent & LosT - Welcome & Making of the DEF CON Badge.txt30.3 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By David Dorsey - Why Dont You Just Tell Me Where The ROP Isnt Suppose To Go - Slides.mp410.5 MiB2015-Mar-30 09:45
DEF CON 22 Hacking Conference Presentation By David Dorsey - Why Dont You Just Tell Me Where The ROP Isnt Suppose To Go - Slides.srt14.3 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By David Dorsey - Why Dont You Just Tell Me Where The ROP Isnt Suppose To Go.txt10.5 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By David Kennedy - Destroying Education and Awareness Programs - Slides.mp446.3 MiB2015-Mar-30 10:39
DEF CON 22 Hacking Conference Presentation By David Litchfield - Oracle Data Redaction is Broken - Slides.mp431.9 MiB2015-Mar-30 11:17
DEF CON 22 Hacking Conference Presentation By David Litchfield - Oracle Data Redaction is Broken - Slides.srt38.7 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By David Litchfield - Oracle Data Redaction is Broken.txt28.0 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By David Wyde - Client - Side HTTP Cookie Security - Attack and Defense - Slides.mp425.0 MiB2015-Mar-30 11:47
DEF CON 22 Hacking Conference Presentation By David Wyde - Client - Side HTTP Cookie Security - Attack and Defense - Slides.srt37.4 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By David Wyde - Client - Side HTTP Cookie Security - Attack and Defense.txt27.5 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse - Slides.mp463.4 MiB2015-Mar-30 13:08
DEF CON 22 Hacking Conference Presentation By Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse - Slides.srt67.2 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse.txt50.3 KiB2014-Dec-04 22:47
DEF CON 22 Hacking Conference Presentation By Dhia Mahjoub & Thibault Reuille & Andree Toonk - Catching Malware En Masse - DNS and IP Style - Slides.mp448.8 MiB2015-Mar-30 14:03
DEF CON 22 Hacking Conference Presentation By Dhia Mahjoub & Thibault Reuille & Andree Toonk - Catching Malware En Masse - DNS and IP Style - Slides.srt58.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Dhia Mahjoub & Thibault Reuille & Andree Toonk - Catching Malware En Masse - DNS and IP Style.txt42.3 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Dominic White & Ian de Villiers - Manna from Heaven - Improving the state of wireless rogue AP attacks - Slides.mp437.6 MiB2015-Mar-30 14:55
DEF CON 22 Hacking Conference Presentation By Dominic White & Ian de Villiers - Manna from Heaven - Improving the state of wireless rogue AP attacks - Slides.srt55.9 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Dominic White & Ian de Villiers - Manna from Heaven - Improving the state of wireless rogue AP attacks.txt40.7 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Dr. Phil Polstra & Captain Polly - Cyberhijacking Airplanes - Truth or Fiction - Slides.mp438.8 MiB2015-Mar-30 16:45
DEF CON 22 Hacking Conference Presentation By Dr. Phil Polstra & Captain Polly - Cyberhijacking Airplanes - Truth or Fiction - Slides.srt44.8 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Dr. Phil Polstra & Captain Polly - Cyberhijacking Airplanes - Truth or Fiction.txt32.8 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Dr. Phil Polstra - Am I Being Spied On.. Low-tech Ways Of Detecting High-tech Surveillance - Slides.mp439.6 MiB2015-Mar-30 15:52
DEF CON 22 Hacking Conference Presentation By Dr. Phil Polstra - Am I Being Spied On.. Low-tech Ways Of Detecting High-tech Surveillance - Slides.srt39.1 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Dr. Phil Polstra - Am I Being Spied On.. Low-tech Ways Of Detecting High-tech Surveillance.txt28.8 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Dr. Thomas Holt & Olga Smirnova & Yi-Ting Chua - Stolen Data Markets An Economic and Organizational Assessment - Slides.mp434.0 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Dr. Thomas Holt & Olga Smirnova & Yi-Ting Chua - Stolen Data Markets An Economic and Organizational Assessment - Slides.srt54.9 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Dr. Thomas Holt & Olga Smirnova & Yi-Ting Chua - Stolen Data Markets An Economic and Organizational Assessment - Video.mp4100.3 MiB2015-Mar-31 00:05
DEF CON 22 Hacking Conference Presentation By Dr. Thomas Holt & Olga Smirnova & Yi-Ting Chua - Stolen Data Markets An Economic and Organizational Assessment.txt39.9 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Dustin Hoffman & Thomas (TK) Kinsey - What the Watchers See - Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil) - Slides.mp436.6 MiB2015-Jun-03 07:38
DEF CON 22 Hacking Conference Presentation By Dustin Hoffman & Thomas (TK) Kinsey - What the Watchers See - Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil) - Slides.srt41.5 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Dustin Hoffman & Thomas (TK) Kinsey - What the Watchers See - Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil) - Video.mp4103.5 MiB2015-Mar-31 03:37
DEF CON 22 Hacking Conference Presentation By Dustin Hoffman & Thomas (TK) Kinsey - What the Watchers See - Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil).txt30.5 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Eijah - Saving Cyberspace by Reinventing File Sharing - Slides.mp434.6 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Eijah - Saving Cyberspace by Reinventing File Sharing - Slides.srt54.1 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Eijah - Saving Cyberspace by Reinventing File Sharing - Video.mp4120.4 MiB2015-Mar-31 07:45
DEF CON 22 Hacking Conference Presentation By Eijah - Saving Cyberspace by Reinventing File Sharing.txt39.6 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Elie Bursztein & Celine Bursztein - I am a legend - Hacking Hearthstone with machine learning - Slides.mp436.0 MiB2015-Jun-03 07:37
DEF CON 22 Hacking Conference Presentation By Elie Bursztein & Celine Bursztein - I am a legend - Hacking Hearthstone with machine learning - Slides.srt42.7 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Elie Bursztein & Celine Bursztein - I am a legend - Hacking Hearthstone with machine learning - Video.mp4135.1 MiB2015-Mar-31 11:08
DEF CON 22 Hacking Conference Presentation By Elie Bursztein & Celine Bursztein - I am a legend - Hacking Hearthstone with machine learning.txt31.5 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Eric (XlogicX) Davisson & Ruben Alejandro (chap0) - Abuse of Blind Automation in Security Tools - Slides.mp452.4 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Eric (XlogicX) Davisson & Ruben Alejandro (chap0) - Abuse of Blind Automation in Security Tools - Slides.srt43.2 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Eric (XlogicX) Davisson & Ruben Alejandro (chap0) - Abuse of Blind Automation in Security Tools - Video.mp460.7 MiB2015-Mar-31 12:54
DEF CON 22 Hacking Conference Presentation By Eric (XlogicX) Davisson & Ruben Alejandro (chap0) - Abuse of Blind Automation in Security Tools.txt32.0 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Eric Smith & Josh Perrymon - Advanced Red Teaming - All Your Badges Are Belong To Us - Slides.mp437.4 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Eric Smith & Josh Perrymon - Advanced Red Teaming - All Your Badges Are Belong To Us - Slides.srt63.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Eric Smith & Josh Perrymon - Advanced Red Teaming - All Your Badges Are Belong To Us - Video.mp4181.9 MiB2015-Mar-31 16:37
DEF CON 22 Hacking Conference Presentation By Eric Smith & Josh Perrymon - Advanced Red Teaming - All Your Badges Are Belong To Us.txt46.5 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Fatih Ozavci - VoIP Wars - Attack of the Cisco Phones - Slides.mp447.2 MiB2015-Jun-03 07:38
DEF CON 22 Hacking Conference Presentation By Fatih Ozavci - VoIP Wars - Attack of the Cisco Phones - Slides.srt43.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Fatih Ozavci - VoIP Wars - Attack of the Cisco Phones - Video.mp4104.1 MiB2015-Mar-31 19:21
DEF CON 22 Hacking Conference Presentation By Fatih Ozavci - VoIP Wars - Attack of the Cisco Phones.txt31.5 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Felix Leder - NinjaTV - Increasing Your Smart TVs IQ Without Bricking It - Slides.mp438.0 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Felix Leder - NinjaTV - Increasing Your Smart TVs IQ Without Bricking It - Slides.srt38.6 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Felix Leder - NinjaTV - Increasing Your Smart TVs IQ Without Bricking It - Video.mp498.6 MiB2015-Mar-31 22:05
DEF CON 22 Hacking Conference Presentation By Felix Leder - NinjaTV - Increasing Your Smart TVs IQ Without Bricking It.txt28.4 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Gene Bransfield - Weaponizing Your Pets - The War Kitteh and the Denial of Service Dog - Slides.mp434.3 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Gene Bransfield - Weaponizing Your Pets - The War Kitteh and the Denial of Service Dog - Slides.srt35.2 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Gene Bransfield - Weaponizing Your Pets - The War Kitteh and the Denial of Service Dog - Video.mp487.2 MiB2015-Apr-01 00:25
DEF CON 22 Hacking Conference Presentation By Gene Bransfield - Weaponizing Your Pets - The War Kitteh and the Denial of Service Dog.txt26.2 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Geoff McDonald - Meddle - Framework for piggy - back fuzzing and tool development - Slides.mp459.6 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Geoff McDonald - Meddle - Framework for piggy - back fuzzing and tool development - Slides.srt46.5 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Geoff McDonald - Meddle - Framework for piggy - back fuzzing and tool development - Video.mp493.5 MiB2015-Apr-01 03:04
DEF CON 22 Hacking Conference Presentation By Geoff McDonald - Meddle - Framework for piggy - back fuzzing and tool development.txt34.1 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Glenn Wilkinson - Practical Aerial Hacking & Surveillance - Slides.mp437.8 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Glenn Wilkinson - Practical Aerial Hacking & Surveillance - Slides.srt48.5 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Glenn Wilkinson - Practical Aerial Hacking & Surveillance - Video.mp497.9 MiB2015-Apr-01 05:42
DEF CON 22 Hacking Conference Presentation By Glenn Wilkinson - Practical Aerial Hacking & Surveillance.txt35.7 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Grant Bugher - Detecting Bluetooth Surveillance Systems - Slides.mp435.5 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Grant Bugher - Detecting Bluetooth Surveillance Systems - Slides.srt55.7 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Grant Bugher - Detecting Bluetooth Surveillance Systems - Video.mp4100.7 MiB2015-Apr-01 08:27
DEF CON 22 Hacking Conference Presentation By Grant Bugher - Detecting Bluetooth Surveillance Systems.txt41.7 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Gregory Pickett - Abusing Software Defined Networks - Slides.mp434.6 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Gregory Pickett - Abusing Software Defined Networks - Slides.srt51.6 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Gregory Pickett - Abusing Software Defined Networks - Video.mp489.8 MiB2015-Apr-01 10:56
DEF CON 22 Hacking Conference Presentation By Gregory Pickett - Abusing Software Defined Networks.txt37.8 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Jake Kouns & Carsten Eiram - Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter! - Slides.mp439.5 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Jake Kouns & Carsten Eiram - Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter! - Slides.srt62.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Jake Kouns & Carsten Eiram - Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter! - Video.mp4107.4 MiB2015-Apr-01 14:01
DEF CON 22 Hacking Conference Presentation By Jake Kouns & Carsten Eiram - Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter!.txt45.2 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Jay Healey - Saving the Internet (for the Future) - Slides.mp427.2 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Jay Healey - Saving the Internet (for the Future) - Slides.srt44.2 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Jay Healey - Saving the Internet (for the Future) - Video.mp481.7 MiB2015-Apr-01 16:37
DEF CON 22 Hacking Conference Presentation By Jay Healey - Saving the Internet (for the Future).txt32.4 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Jayson E. Street - Around the world in 80 cons - A Perspective - Slides.mp449.3 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Jayson E. Street - Around the world in 80 cons - A Perspective - Slides.srt64.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Jayson E. Street - Around the world in 80 cons - A Perspective - Video.mp4179.8 MiB2015-Apr-01 21:09
DEF CON 22 Hacking Conference Presentation By Jayson E. Street - Around the world in 80 cons - A Perspective.txt47.3 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Jayson Street - The Incredible Likeness of being Adorable - Video.mp4210.1 MiB2015-Apr-02 02:58
DEF CON 22 Hacking Conference Presentation By Jesse Michael & Mickey Shkatov - USB for all! - Slides.mp438.7 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Jesse Michael & Mickey Shkatov - USB for all! - Slides.srt42.9 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Jesse Michael & Mickey Shkatov - USB for all! - Video.mp4111.2 MiB2015-Apr-02 05:36
DEF CON 22 Hacking Conference Presentation By Jesse Michael & Mickey Shkatov - USB for all!.txt31.6 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Jesus Molina - Learn how to control every room at a luxury hotel remotely - the dangers of insecure home automation deployment - Slides.mp416.6 MiB2015-Jun-03 07:28
DEF CON 22 Hacking Conference Presentation By Jesus Molina - Learn how to control every room at a luxury hotel remotely - the dangers of insecure home automation deployment - Slides.srt23.6 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Jesus Molina - Learn how to control every room at a luxury hotel remotely - the dangers of insecure home automation deployment - Video.mp460.2 MiB2015-Apr-02 07:04
DEF CON 22 Hacking Conference Presentation By Jesus Molina - Learn how to control every room at a luxury hotel remotely - the dangers of insecure home automation deployment.txt17.3 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Jim Denaro & Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble - Slides.mp431.6 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Jim Denaro & Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble - Slides.srt52.2 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Jim Denaro & Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble - Video.mp4100.1 MiB2015-Apr-02 09:52
DEF CON 22 Hacking Conference Presentation By Jim Denaro & Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble.txt38.2 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Joe (Kingpin) Grand - Deconstructing the Circuit Board Sandwich - Effective Techniques for PCB Reverse Engineering - Slides.mp442.1 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Joe (Kingpin) Grand - Deconstructing the Circuit Board Sandwich - Effective Techniques for PCB Reverse Engineering - Slides.srt50.1 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Joe (Kingpin) Grand - Deconstructing the Circuit Board Sandwich - Effective Techniques for PCB Reverse Engineering - Video.mp4133.0 MiB2015-Apr-02 13:08
DEF CON 22 Hacking Conference Presentation By Joe (Kingpin) Grand - Deconstructing the Circuit Board Sandwich - Effective Techniques for PCB Reverse Engineering.txt37.1 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Joe FitzPatrick & Miles Crabill - NSA Playset - PCIe - Slides.mp449.5 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Joe FitzPatrick & Miles Crabill - NSA Playset - PCIe - Slides.srt48.4 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Joe FitzPatrick & Miles Crabill - NSA Playset - PCIe - Video.mp4158.8 MiB2015-Apr-02 16:40
DEF CON 22 Hacking Conference Presentation By Joe FitzPatrick & Miles Crabill - NSA Playset - PCIe.txt36.0 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By John Menerick - Open Source Fairy Dust - Slides.mp432.8 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By John Menerick - Open Source Fairy Dust - Slides.srt37.8 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By John Menerick - Open Source Fairy Dust - Video.mp493.3 MiB2015-Apr-02 19:02
DEF CON 22 Hacking Conference Presentation By John Menerick - Open Source Fairy Dust.txt27.9 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Josh Datko & Teddy Reed - NSA Playset - DIY WAGONBED Hardware Implant over I2C - Video.mp4112.6 MiB2015-Apr-02 21:49
DEF CON 22 Hacking Conference Presentation By Josh Datko & Teddy Reed - NSA Playset - DIY WAGONBED Hardware Implant over I2C.txt35.9 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Joshua Corman & Nicholas J Percoco - The Cavalry Year(0) & a Path Forward for Public Safety - Slides.mp4270.1 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Joshua Corman & Nicholas J Percoco - The Cavalry Year(0) & a Path Forward for Public Safety - Slides.srt61.2 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Joshua Corman & Nicholas J Percoco - The Cavalry Year(0) & a Path Forward for Public Safety - Video.mp4129.8 MiB2015-Apr-03 00:29
DEF CON 22 Hacking Conference Presentation By Joshua Corman & Nicholas J Percoco - The Cavalry Year(0) & a Path Forward for Public Safety.txt44.5 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Kenneth White & Matthew Green - The Open Crypto Audit Project - Slides.mp438.0 MiB2015-Jun-03 07:37
DEF CON 22 Hacking Conference Presentation By Kenneth White & Matthew Green - The Open Crypto Audit Project - Slides.srt50.7 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Kenneth White & Matthew Green - The Open Crypto Audit Project - Video.mp4107.9 MiB2015-Apr-03 03:08
DEF CON 22 Hacking Conference Presentation By Kenneth White & Matthew Green - The Open Crypto Audit Project.txt37.1 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Keren (k3r3n3) Elazari - Empowering Hackers to Create a Positive Impact - Slides.mp438.0 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Keren (k3r3n3) Elazari - Empowering Hackers to Create a Positive Impact - Slides.srt49.9 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Keren (k3r3n3) Elazari - Empowering Hackers to Create a Positive Impact - Video.mp4111.6 MiB2015-Apr-03 05:56
DEF CON 22 Hacking Conference Presentation By Keren (k3r3n3) Elazari - Empowering Hackers to Create a Positive Impact.txt36.7 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Kurt Opsahl & Nate Cardozo & Mark Jaycox & Yan Zhu & Eva Galperin - Panel - Ask the EFF - The Year in Digital Civil Liberties - Slides.srt125.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Kurt Opsahl & Nate Cardozo & Mark Jaycox & Yan Zhu & Eva Galperin - Panel - Ask the EFF - The Year in Digital Civil Liberties - Video.mp4244.1 MiB2015-Apr-03 11:46
DEF CON 22 Hacking Conference Presentation By Kurt Opsahl & Nate Cardozo & Mark Jaycox & Yan Zhu & Eva Galperin - Panel - Ask the EFF - The Year in Digital Civil Liberties.txt91.4 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Kyle Kelley & Greg Anderson - Is This Your Pipe.. Hijacking the Build Pipeline - Slides.mp421.5 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Kyle Kelley & Greg Anderson - Is This Your Pipe.. Hijacking the Build Pipeline - Slides.srt22.4 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Kyle Kelley & Greg Anderson - Is This Your Pipe.. Hijacking the Build Pipeline - Video.mp447.3 MiB2015-Apr-03 13:13
DEF CON 22 Hacking Conference Presentation By Kyle Kelley & Greg Anderson - Is This Your Pipe.. Hijacking the Build Pipeline.txt16.5 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Ladar Levison & Stephen Watt - Dark Mail - Slides.mp444.0 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Ladar Levison & Stephen Watt - Dark Mail - Slides.srt55.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Ladar Levison & Stephen Watt - Dark Mail - Video.mp4154.3 MiB2015-Apr-03 17:02
DEF CON 22 Hacking Conference Presentation By Ladar Levison & Stephen Watt - Dark Mail.txt40.1 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Luca (kaeso) Bruno & Mariano (emdel) Graziano - Through the Looking - Glass and What Eve Found There.txt33.7 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Luca (kaeso) Bruno & Mariano (emdel) Graziano - Through the Looking-Glass and What Eve Found There - Slides.mp434.8 MiB2015-Jun-03 07:39
DEF CON 22 Hacking Conference Presentation By Luca (kaeso) Bruno & Mariano (emdel) Graziano - Through the Looking-Glass and What Eve Found There - Slides.srt46.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Luca (kaeso) Bruno & Mariano (emdel) Graziano - Through the Looking-Glass and What Eve Found There - Video.mp4144.4 MiB2015-Apr-03 22:00
DEF CON 22 Hacking Conference Presentation By Lucas Morris & Michael McAtee - We Wrapped Samba So You Dont Have To - Slides.mp439.4 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Lucas Morris & Michael McAtee - We Wrapped Samba So You Dont Have To - Slides.srt53.4 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Lucas Morris & Michael McAtee - We Wrapped Samba So You Dont Have To - Video.mp4192.1 MiB2015-Apr-04 01:42
DEF CON 22 Hacking Conference Presentation By Lucas Morris & Michael McAtee - We Wrapped Samba So You Dont Have To.txt39.4 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Maggie Jauregui - Girl Fault Interrupted - Slides.mp435.3 MiB2015-Jun-03 07:38
DEF CON 22 Hacking Conference Presentation By Maggie Jauregui - Girl Fault Interrupted - Slides.srt37.8 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Maggie Jauregui - Girl Fault Interrupted - Video.mp4158.1 MiB2015-Apr-04 05:15
DEF CON 22 Hacking Conference Presentation By Maggie Jauregui - Girl Fault Interrupted.txt28.5 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Major Malfunction - Old Skewl Hacking - Porn Free! - Slides.mp435.6 MiB2015-Jun-03 07:39
DEF CON 22 Hacking Conference Presentation By Major Malfunction - Old Skewl Hacking - Porn Free! - Slides.srt32.7 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Major Malfunction - Old Skewl Hacking - Porn Free! - Video.mp4116.4 MiB2015-Apr-04 08:06
DEF CON 22 Hacking Conference Presentation By Major Malfunction - Old Skewl Hacking - Porn Free!.txt23.9 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Mark Stanislav & Zach Lanier - The Internet of Fails - Where IoT Has Gone Wrong and How We're Making It Right - Slides.mp437.1 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Mark Stanislav & Zach Lanier - The Internet of Fails - Where IoT Has Gone Wrong and How We're Making It Right - Slides.srt61.4 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Mark Stanislav & Zach Lanier - The Internet of Fails - Where IoT Has Gone Wrong and How We're Making It Right - Video.mp492.2 MiB2015-Apr-04 10:47
DEF CON 22 Hacking Conference Presentation By Mark Stanislav & Zach Lanier - The Internet of Fails - Where IoT Has Gone Wrong and How We're Making It Right.txt44.7 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Metacortex & Grifter - Touring the Darkside of the Internet. An Introduction to Tor & Darknets and Bitcoin - Slides.mp445.3 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Metacortex & Grifter - Touring the Darkside of the Internet. An Introduction to Tor & Darknets and Bitcoin - Slides.srt44.5 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Metacortex & Grifter - Touring the Darkside of the Internet. An Introduction to Tor & Darknets and Bitcoin - Video.mp4117.0 MiB2015-Apr-04 13:23
DEF CON 22 Hacking Conference Presentation By Metacortex & Grifter - Touring the Darkside of the Internet. An Introduction to Tor & Darknets and Bitcoin.txt32.6 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Michael Ossmann - The NSA Playset - RF Retroreflectors - Slides.mp436.7 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Michael Ossmann - The NSA Playset - RF Retroreflectors - Slides.srt50.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Michael Ossmann - The NSA Playset - RF Retroreflectors - Video.mp4163.9 MiB2015-Apr-04 16:29
DEF CON 22 Hacking Conference Presentation By Michael Ossmann - The NSA Playset - RF Retroreflectors.txt36.3 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Michael Schrenk - You're Leaking Trade Secrets - Slides.mp431.7 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Michael Schrenk - You're Leaking Trade Secrets - Slides.srt48.2 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Michael Schrenk - You're Leaking Trade Secrets - Video.mp492.9 MiB2015-Apr-04 18:57
DEF CON 22 Hacking Conference Presentation By Michael Schrenk - You're Leaking Trade Secrets.txt35.2 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Michele Fincher - How to you Feel about your Mother.. Psych and The SE - Slides.mp451.8 MiB2015-Jun-03 07:38
DEF CON 22 Hacking Conference Presentation By Michele Fincher - How to you Feel about your Mother.. Psych and The SE - Video.mp4168.9 MiB2015-Apr-04 23:08
DEF CON 22 Hacking Conference Presentation By Nemus - An Introduction to Back Dooring Operating Systems for Fun and Trolling - Slides.mp427.4 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Nemus - An Introduction to Back Dooring Operating Systems for Fun and Trolling - Slides.srt34.6 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Nemus - An Introduction to Back Dooring Operating Systems for Fun and Trolling - Video.mp4101.9 MiB2015-Apr-05 01:42
DEF CON 22 Hacking Conference Presentation By Nemus - An Introduction to Back Dooring Operating Systems for Fun and Trolling.txt25.4 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Nicole Ozer & Kevin Bankston & Timothy Edgar - Panel - Surveillance on the Silver Screen - Fact or Fiction - Slides.mp461.8 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Nicole Ozer & Kevin Bankston & Timothy Edgar - Panel - Surveillance on the Silver Screen - Fact or Fiction - Slides.srt66.5 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Nicole Ozer & Kevin Bankston & Timothy Edgar - Panel - Surveillance on the Silver Screen - Fact or Fiction - Video.mp4150.5 MiB2015-Apr-05 05:03
DEF CON 22 Hacking Conference Presentation By Nicole Ozer & Kevin Bankston & Timothy Edgar - Panel - Surveillance on the Silver Screen - Fact or Fiction.txt48.2 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Nir Valtman - A journey to protect points of sale - Slides.mp438.5 MiB2015-Jun-03 07:38
DEF CON 22 Hacking Conference Presentation By Nir Valtman - A journey to protect points of sale - Slides.srt47.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Nir Valtman - A journey to protect points of sale - Video.mp4103.4 MiB2015-Apr-05 08:02
DEF CON 22 Hacking Conference Presentation By Nir Valtman - A journey to protect points of sale.txt34.7 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Nir Valtman - Bug Bounty Programs Evolution - Slides.mp433.8 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Nir Valtman - Bug Bounty Programs Evolution - Slides.srt48.5 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Nir Valtman - Bug Bounty Programs Evolution - Video.mp4141.1 MiB2015-Apr-05 11:37
DEF CON 22 Hacking Conference Presentation By Nir Valtman - Bug Bounty Programs Evolution.txt35.5 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Panel - Closing Ceremonies - Slides.mp458.0 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Panel - Closing Ceremonies - Slides.srt55.8 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Panel - Closing Ceremonies - Video.mp4265.8 MiB2015-Apr-05 17:09
DEF CON 22 Hacking Conference Presentation By Panel - Closing Ceremonies.txt40.7 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Panel - Contests Awards Ceremony - Slides.mp432.6 MiB2015-Jun-03 07:39
DEF CON 22 Hacking Conference Presentation By Panel - Contests Awards Ceremony - Slides.srt38.9 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Panel - Contests Awards Ceremony - Video.mp4146.1 MiB2015-Apr-05 20:17
DEF CON 22 Hacking Conference Presentation By Panel - Contests Awards Ceremony.txt28.8 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Panel - DEF CON Comedy Jam Part VII - Is This The One With The Whales - Slides.mp486.8 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Panel - DEF CON Comedy Jam Part VII - Is This The One With The Whales - Slides.srt86.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Panel - DEF CON Comedy Jam Part VII - Is This The One With The Whales - Video.mp4275.7 MiB2015-Apr-06 03:40
DEF CON 22 Hacking Conference Presentation By Panel - DEF CON Comedy Jam Part VII - Is This The One With The Whales.txt63.1 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Panel - DEF CON the Mystery and Myth and Legend.txt67.3 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Panel - Diversity in Information Security.txt40.5 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Panel - Ephemeral Communications - Why and How - Slides.mp431.7 MiB2015-Jun-03 07:34
DEF CON 22 Hacking Conference Presentation By Panel - Ephemeral Communications - Why and How - Slides.srt55.6 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Panel - Ephemeral Communications - Why and How - Video.mp487.3 MiB2015-Apr-06 06:10
DEF CON 22 Hacking Conference Presentation By Panel - Ephemeral Communications - Why and How.txt40.6 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Patrick Wardle & Colby Moore - Optical Surgery - Implanting a DropCam - Slides.mp431.9 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Patrick Wardle & Colby Moore - Optical Surgery - Implanting a DropCam - Slides.srt28.3 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Patrick Wardle & Colby Moore - Optical Surgery - Implanting a DropCam - Video.mp466.3 MiB2015-Apr-06 07:54
DEF CON 22 Hacking Conference Presentation By Patrick Wardle & Colby Moore - Optical Surgery - Implanting a DropCam.txt22.1 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Paul Drapeau & Brent Dukes - Steganography in Commonly Used HF Radio Protocols - Slides.mp434.1 MiB2015-Jun-03 07:38
DEF CON 22 Hacking Conference Presentation By Paul Drapeau & Brent Dukes - Steganography in Commonly Used HF Radio Protocols - Slides.srt50.1 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Paul Drapeau & Brent Dukes - Steganography in Commonly Used HF Radio Protocols - Video.mp4135.4 MiB2015-Apr-06 11:28
DEF CON 22 Hacking Conference Presentation By Paul Drapeau & Brent Dukes - Steganography in Commonly Used HF Radio Protocols.txt36.5 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Paul McMillan - Attacking the Internet of Things using Time - Slides.mp436.6 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Paul McMillan - Attacking the Internet of Things using Time - Slides.srt38.6 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Paul McMillan - Attacking the Internet of Things using Time - Video.mp496.0 MiB2015-Apr-06 14:13
DEF CON 22 Hacking Conference Presentation By Paul McMillan - Attacking the Internet of Things using Time.txt28.3 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Paul Such 0x222 & Agix - Playing with Car Firmware or How to Brick your Car - Slides.mp413.9 MiB2015-Jun-03 07:39
DEF CON 22 Hacking Conference Presentation By Paul Such 0x222 & Agix - Playing with Car Firmware or How to Brick your Car - Slides.srt15.2 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Paul Such 0x222 & Agix - Playing with Car Firmware or How to Brick your Car - Video.mp447.7 MiB2015-Apr-06 15:23
DEF CON 22 Hacking Conference Presentation By Paul Such 0x222 & Agix - Playing with Car Firmware or How to Brick your Car.txt11.2 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Paul Vixie - Domain Name Problems and Solutions - Slides.mp432.1 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Paul Vixie - Domain Name Problems and Solutions - Slides.srt46.5 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Paul Vixie - Domain Name Problems and Solutions - Video.mp476.9 MiB2015-Apr-06 17:42
DEF CON 22 Hacking Conference Presentation By Paul Vixie - Domain Name Problems and Solutions.txt34.1 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Phil Zimmermann - How To Get Phone Companies To Just Say No To Wiretapping.txt34.2 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Philip (Soldier of Fortran) Young - From root to SPECIAL - Pwning IBM Mainframes - Slides.mp418.9 MiB2015-Jun-03 07:31
DEF CON 22 Hacking Conference Presentation By Philip (Soldier of Fortran) Young - From root to SPECIAL - Pwning IBM Mainframes - Slides.srt22.7 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Philip (Soldier of Fortran) Young - From root to SPECIAL - Pwning IBM Mainframes - Video.mp445.5 MiB2015-Apr-06 19:01
DEF CON 22 Hacking Conference Presentation By Philip (Soldier of Fortran) Young - From root to SPECIAL - Pwning IBM Mainframes.txt16.6 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Pierce & Loki - NSA Playset - GSM Sniffing - Slides.mp434.9 MiB2015-Jun-03 07:35
DEF CON 22 Hacking Conference Presentation By Pierce & Loki - NSA Playset - GSM Sniffing - Slides.srt38.5 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Pierce & Loki - NSA Playset - GSM Sniffing - Video.mp4102.0 MiB2015-Apr-06 21:47
DEF CON 22 Hacking Conference Presentation By Pierce & Loki - NSA Playset - GSM Sniffing.txt28.5 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Richard Klafter (Free) & Eric Swanson (Lachesis) - Check Your Fingerprints - Cloning the Strong Set - Slides.mp415.3 MiB2015-Jun-03 07:38
DEF CON 22 Hacking Conference Presentation By Richard Klafter (Free) & Eric Swanson (Lachesis) - Check Your Fingerprints - Cloning the Strong Set - Slides.srt21.9 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Richard Klafter (Free) & Eric Swanson (Lachesis) - Check Your Fingerprints - Cloning the Strong Set - Video.mp450.3 MiB2015-Apr-06 22:58
DEF CON 22 Hacking Conference Presentation By Richard Klafter (Free) & Eric Swanson (Lachesis) - Check Your Fingerprints - Cloning the Strong Set.txt16.1 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Richard Thieme - The Only Way to Tell the Truth is in Fiction - The Dynamics of Life in the National Security State - Slides.mp436.6 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Richard Thieme - The Only Way to Tell the Truth is in Fiction - The Dynamics of Life in the National Security State - Slides.srt51.9 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Richard Thieme - The Only Way to Tell the Truth is in Fiction - The Dynamics of Life in the National Security State - Video.mp4108.2 MiB2015-Apr-07 01:45
DEF CON 22 Hacking Conference Presentation By Richard Thieme - The Only Way to Tell the Truth is in Fiction - The Dynamics of Life in the National Security State.txt37.9 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Rob Bathurst & Russ Rogers & Mark Carey & Ryan Clarke - PropLANE - Kind of keeping the NSA from watching you pee - Slides.mp434.8 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Rob Bathurst & Russ Rogers & Mark Carey & Ryan Clarke - PropLANE - Kind of keeping the NSA from watching you pee - Slides.srt61.7 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Rob Bathurst & Russ Rogers & Mark Carey & Ryan Clarke - PropLANE - Kind of keeping the NSA from watching you pee - Video.mp4136.4 MiB2015-Apr-07 05:03
DEF CON 22 Hacking Conference Presentation By Rob Bathurst & Russ Rogers & Mark Carey & Ryan Clarke - PropLANE - Kind of keeping the NSA from watching you pee.txt45.8 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Robert Graham & Paul McMillan & Dan Tentler - Mass Scanning the Internet - Tips & Tricks & Results - Slides.mp439.2 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Robert Graham & Paul McMillan & Dan Tentler - Mass Scanning the Internet - Tips & Tricks & Results - Video.mp4171.0 MiB2015-Apr-07 08:56
DEF CON 22 Hacking Conference Presentation By Robert Graham & Paul McMillan & Dan Tentler - Mass Scanning the Internet - Tips & Tricks & Results - Slides.srt58.3 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Robert Graham & Paul McMillan & Dan Tentler - Mass Scanning the Internet - Tips & Tricks & Results.txt42.4 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Robert Rowley - Detecting and Defending Against a Surveillance State - Slides.mp431.0 MiB2015-Jun-03 07:39
DEF CON 22 Hacking Conference Presentation By Robert Rowley - Detecting and Defending Against a Surveillance State - Slides.srt53.3 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Robert Rowley - Detecting and Defending Against a Surveillance State - Video.mp472.0 MiB2015-Apr-07 11:00
DEF CON 22 Hacking Conference Presentation By Robert Rowley - Detecting and Defending Against a Surveillance State.txt38.8 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Ryan Kazanciyan & Matt Hastings - Investigating PowerShell Attacks - Slides.mp428.1 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Ryan Kazanciyan & Matt Hastings - Investigating PowerShell Attacks - Slides.srt42.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Ryan Kazanciyan & Matt Hastings - Investigating PowerShell Attacks - Video.mp487.1 MiB2015-Apr-07 13:29
DEF CON 22 Hacking Conference Presentation By Ryan Kazanciyan & Matt Hastings - Investigating PowerShell Attacks.txt30.8 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Ryan Lackey & Marc Rogers & theGrugq - Masquerade - How a Helpful Man-in-the-Middle Can Help You Evade Monitoring - Slides.mp432.8 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Ryan Lackey & Marc Rogers & theGrugq - Masquerade - How a Helpful Man-in-the-Middle Can Help You Evade Monitoring - Slides.srt41.4 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Ryan Lackey & Marc Rogers & theGrugq - Masquerade - How a Helpful Man-in-the-Middle Can Help You Evade Monitoring - Video.mp484.3 MiB2015-Apr-07 15:33
DEF CON 22 Hacking Conference Presentation By Ryan Lackey & Marc Rogers & theGrugq - Masquerade - How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.txt30.3 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government Records - Slides.mp433.8 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government Records - Slides.srt64.1 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government Records - Video.mp490.8 MiB2015-Apr-07 18:03
DEF CON 22 Hacking Conference Presentation By Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government Records.txt46.6 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Scott Erven & Shawn Merdinger - Just What The Doctor Ordered - Slides.mp464.9 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Scott Erven & Shawn Merdinger - Just What The Doctor Ordered - Slides.srt120.6 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Scott Erven & Shawn Merdinger - Just What The Doctor Ordered - Video.mp4264.3 MiB2015-Apr-08 00:23
DEF CON 22 Hacking Conference Presentation By Scott Erven & Shawn Merdinger - Just What The Doctor Ordered.txt87.7 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Shahar Tal - I Hunt TR - 069 Admins - Pwning ISPs Like a Boss - Slides.mp424.8 MiB2015-Jun-03 07:37
DEF CON 22 Hacking Conference Presentation By Shahar Tal - I Hunt TR - 069 Admins - Pwning ISPs Like a Boss - Slides.srt30.2 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Shahar Tal - I Hunt TR - 069 Admins - Pwning ISPs Like a Boss - Video.mp4145.9 MiB2015-Apr-08 02:57
DEF CON 22 Hacking Conference Presentation By Shahar Tal - I Hunt TR - 069 Admins - Pwning ISPs Like a Boss.txt22.1 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Shane Macaulay - Weird - Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System - Slides.mp436.4 MiB2015-Jun-03 07:36
DEF CON 22 Hacking Conference Presentation By Shane Macaulay - Weird - Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System - Slides.srt37.3 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Shane Macaulay - Weird - Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System - Video.mp4136.1 MiB2015-Apr-08 05:43
DEF CON 22 Hacking Conference Presentation By Shane Macaulay - Weird - Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System.txt27.4 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Svetlana Gaivoronski & Ivan Petrov - Shellcodes for ARM - Your Pills Don't Work on Me x86 - Slides.mp428.9 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Svetlana Gaivoronski & Ivan Petrov - Shellcodes for ARM - Your Pills Don't Work on Me x86 - Slides.srt32.9 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Svetlana Gaivoronski & Ivan Petrov - Shellcodes for ARM - Your Pills Don't Work on Me x86 - Video.mp4100.0 MiB2015-Apr-08 08:01
DEF CON 22 Hacking Conference Presentation By Svetlana Gaivoronski & Ivan Petrov - Shellcodes for ARM - Your Pills Don't Work on Me x86.txt24.0 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Tess Schrodinger - From Raxacoricofallapatorius With Love - Case Studies In Insider Threats - Slides.mp436.8 MiB2015-Jun-03 07:39
DEF CON 22 Hacking Conference Presentation By Tess Schrodinger - From Raxacoricofallapatorius With Love - Case Studies In Insider Threats - Slides.srt50.7 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Tess Schrodinger - From Raxacoricofallapatorius With Love - Case Studies In Insider Threats - Video.mp4136.5 MiB2015-Apr-08 11:37
DEF CON 22 Hacking Conference Presentation By Tess Schrodinger - From Raxacoricofallapatorius With Love - Case Studies In Insider Threats.txt37.5 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Tim Strazzere & Jon Sawyer - Android Hacker Protection Level 0 - Slides.mp435.3 MiB2015-Jun-03 07:39
DEF CON 22 Hacking Conference Presentation By Tim Strazzere & Jon Sawyer - Android Hacker Protection Level 0 - Slides.srt52.4 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Tim Strazzere & Jon Sawyer - Android Hacker Protection Level 0 - Video.mp494.6 MiB2015-Apr-08 14:24
DEF CON 22 Hacking Conference Presentation By Tim Strazzere & Jon Sawyer - Android Hacker Protection Level 0.txt38.1 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Wesley McGrew - Instrumenting Point - of - Sale Malware - A Case Study in Communicating Malware Analysis More Effectively - Slides.mp447.7 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Wesley McGrew - Instrumenting Point - of - Sale Malware - A Case Study in Communicating Malware Analysis More Effectively - Slides.srt54.5 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Wesley McGrew - Instrumenting Point - of - Sale Malware - A Case Study in Communicating Malware Analysis More Effectively - Video.mp487.5 MiB2015-Apr-08 17:02
DEF CON 22 Hacking Conference Presentation By Wesley McGrew - Instrumenting Point - of - Sale Malware - A Case Study in Communicating Malware Analysis More Effectively.txt39.9 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Weston Hecker - Burner Phone DDOS 2 dollars a day - 70 Calls a Minute - Slides.mp433.6 MiB2015-Jun-03 07:39
DEF CON 22 Hacking Conference Presentation By Weston Hecker - Burner Phone DDOS 2 dollars a day - 70 Calls a Minute - Slides.srt46.6 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Weston Hecker - Burner Phone DDOS 2 dollars a day - 70 Calls a Minute - Video.mp4131.3 MiB2015-Apr-08 20:05
DEF CON 22 Hacking Conference Presentation By Weston Hecker - Burner Phone DDOS 2 dollars a day - 70 Calls a Minute.txt34.6 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Will Schroeder (@harmj0y) - Veil - Pillage Post exploitation 2.0 - Slides.mp453.9 MiB2015-Jun-03 07:39
DEF CON 22 Hacking Conference Presentation By Will Schroeder (@harmj0y) - Veil - Pillage Post exploitation 2.0 - Slides.srt42.4 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Will Schroeder (@harmj0y) - Veil - Pillage Post exploitation 2.0 - Video.mp496.0 MiB2015-Apr-08 22:34
DEF CON 22 Hacking Conference Presentation By Will Schroeder (@harmj0y) - Veil - Pillage Post exploitation 2.0.txt31.3 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Yuriy Bulygin & Oleksandr Bazhaniuk & Andrew Furtak & John Loucaides - Summary of Attacks Against BIOS and Secure Boot - Slides.mp441.1 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Yuriy Bulygin & Oleksandr Bazhaniuk & Andrew Furtak & John Loucaides - Summary of Attacks Against BIOS and Secure Boot - Slides.srt47.5 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Yuriy Bulygin & Oleksandr Bazhaniuk & Andrew Furtak & John Loucaides - Summary of Attacks Against BIOS and Secure Boot - Video.mp4152.4 MiB2015-Apr-09 01:35
DEF CON 22 Hacking Conference Presentation By Yuriy Bulygin & Oleksandr Bazhaniuk & Andrew Furtak & John Loucaides - Summary of Attacks Against BIOS and Secure Boot.txt34.8 KiB2014-Dec-04 22:49
DEF CON 22 Hacking Conference Presentation By Zack Fasel - Logging ALL THE THINGS - Slides.mp430.9 MiB2015-Jun-03 07:40
DEF CON 22 Hacking Conference Presentation By Zack Fasel - Logging ALL THE THINGS - Slides.srt47.0 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Zack Fasel - Logging ALL THE THINGS - Video.mp467.9 MiB2015-Apr-03 18:58
DEF CON 22 Hacking Conference Presentation By Zack Fasel - Logging ALL THE THINGS.txt34.7 KiB2014-Dec-04 22:48
DEF CON 22 Hacking Conference Presentation By Zoltan Balazs - Bypass firewalls & application white lists & secure remote desktops under 20 seconds - Slides.mp435.2 MiB2015-Jun-03 07:39
DEF CON 22 Hacking Conference Presentation By Zoltan Balazs - Bypass firewalls & application white lists & secure remote desktops under 20 seconds - Slides.srt29.1 KiB2015-Jan-18 21:02
DEF CON 22 Hacking Conference Presentation By Zoltan Balazs - Bypass firewalls & application white lists & secure remote desktops under 20 seconds - Video.mp472.3 MiB2015-Apr-09 03:45
DEF CON 22 Hacking Conference Presentation By Zoltan Balazs - Bypass firewalls & application white lists & secure remote desktops under 20 seconds.txt21.2 KiB2014-Dec-04 17:00
DEF CON 22 Hacking Conference Presentation By Zoz - Don't Fuck it Up! - Slides.mp440.7 MiB2015-Jun-03 07:41
DEF CON 22 Hacking Conference Presentation By Zoz - Don't Fuck it Up! - Slides.srt72.2 KiB2015-Jan-18 21:03
DEF CON 22 Hacking Conference Presentation By Zoz - Don't Fuck it Up! - Video.mp4175.5 MiB2015-Apr-09 07:28
DEF CON 22 Hacking Conference Presentation By Zoz - Don't Fuck it Up!.txt53.1 KiB2014-Dec-04 22:49
DEF CON 22 slide transcripts.rar1.9 MiB2015-Jun-03 06:49