Parent directory/ | - | - |
DEFCON-23-3alarmlampscooter-DIY-Nukeproofing.pdf | 319.0 KiB | 2015-Jul-21 11:36 |
DEFCON-23-Aaron-Grattafiori-Linux-Containers-Future-or-Fantasy-UPDATED.pdf | 1.3 MiB | 2015-Aug-14 13:50 |
DEFCON-23-Alessandro-Di-Federico-Leakless-How-The-ELF-ruined-Christmas.pdf | 329.4 KiB | 2015-Jul-21 11:36 |
DEFCON-23-Amit-Ashbel-Maty-Siman-Game-of-Hacks-Play-Hack-and-Track-UPDATED.pdf | 1.5 MiB | 2015-Aug-14 13:51 |
DEFCON-23-Andres-Blanco-802.11-Massive-Monitoring-UPDATED.pdf | 1.7 MiB | 2015-Aug-14 13:52 |
DEFCON-23-Atlas-Fun-With-Symboliks.pdf | 9.8 MiB | 2015-Jul-21 11:38 |
DEFCON-23-Ballenthin-Graeber-Teodorescu-WMI-Attacks-Defense-Forensics.pdf | 2.7 MiB | 2015-Jul-21 11:39 |
DEFCON-23-Bart-Kulach-Hack-the-Legacy-IBMi-revealed.pdf | 2.0 MiB | 2015-Jul-21 11:39 |
DEFCON-23-Brent-White-Hacking-Web-Apps-WP.pdf | 122.4 KiB | 2015-Jul-21 11:39 |
DEFCON-23-Bruce-Potter-Hackers-Guide-to-Risk.pdf | 526.8 KiB | 2015-Jul-21 11:39 |
DEFCON-23-Cassidy-Leverett-Lee-Switches-Get-Stitches.pdf | 2.2 MiB | 2015-Jul-21 11:40 |
DEFCON-23-Chris-Domas-REpsych.pdf | 3.6 MiB | 2015-Jul-21 11:41 |
DEFCON-23-Chris-Rock-I-Will-Kill-You-How-to-Get-Away-with-Murder.pdf | 2.0 MiB | 2015-Jul-21 11:41 |
DEFCON-23-Chris-Sistrunk-NSM-101-for-ICS.pdf | 3.4 MiB | 2015-Jul-21 11:42 |
DEFCON-23-Colby-Moore-Spread-Spectrum-Satcom-Hacking.pdf | 33.9 KiB | 2015-Jul-21 11:42 |
DEFCON-23-Colin-O'Flynn-Dont-Whisper-My-Chips.pdf | 3.4 MiB | 2015-Jul-21 11:42 |
DEFCON-23-Collin-Anderson-Tom-Cross-Export-Controls-on-Intrusion-Software.pdf | 778.4 KiB | 2015-Jul-21 11:42 |
DEFCON-23-Craig-Young-Extras.rar | 3.2 KiB | 2015-Oct-10 03:15 |
DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-Tools-UPDATED.pdf | 58.6 MiB | 2015-Aug-22 04:21 |
DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-Tools-WP-UPDATED.pdf | 2.5 MiB | 2015-Aug-22 04:28 |
DEFCON-23-DaKahuna-Satanlawz-Introduction-to-SDR-and-Wifi-Village.pdf | 858.8 KiB | 2015-Jul-21 11:43 |
DEFCON-23-Damon-Small-Beyond-the-Scan.pdf | 1.7 MiB | 2015-Jul-21 11:43 |
DEFCON-23-Daniel-Crowley-Damon-Smith-Bugged-Files.pdf | 595.0 KiB | 2015-Jul-21 05:06 |
DEFCON-23-Daniel-Selifonov-Drinking-from-LETHE.pdf | 508.9 KiB | 2015-Jul-21 11:44 |
DEFCON-23-David-An-When-the-Secretary-of-State-says-Stop-Hacking-us.pdf | 1.2 MiB | 2015-Jul-21 11:44 |
DEFCON-23-David-Huerta-Alice-and-Bob-are-Really-Confused.pdf | 4.0 MiB | 2015-Jul-21 11:44 |
DEFCON-23-David-Mortman-Docker-UPDATED.pdf | 285.6 KiB | 2015-Sep-04 03:30 |
DEFCON-23-Dennis-Maldonado-Are-we-really-safe-bypassing-access-control-systems-UPDATED.pdf | 46.8 MiB | 2015-Aug-25 04:13 |
DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins-References.txt | 689 B | 2015-Jul-16 11:01 |
DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins.pdf | 396.6 KiB | 2015-Jul-21 11:45 |
DEFCON-23-Eijah-Crypto-for-Hackers-UPDATED.pdf | 2.3 MiB | 2015-Sep-22 05:56 |
DEFCON-23-Eijah-Crypto-for-Hackers-Workshop.pdf | 628.4 KiB | 2015-Sep-22 05:56 |
DEFCON-23-Eric-Van-Albert-Zack-Banks-Looping-Surveillance-Cameras-like-in-the-Movies.pdf | 1.9 MiB | 2015-Jul-21 11:45 |
DEFCON-23-Eric-XlogicX-Davisson-ReDoS.pdf | 2.1 MiB | 2015-Jul-21 11:46 |
DEFCON-23-Etienne-Martineau-Inter-VM-Data-Exfiltration.pdf | 1.5 MiB | 2015-Jul-21 11:46 |
DEFCON-23-Evilrob-Xaphan-TLS-Canary-Keeping-Your-Dick-Pics-Safer.pdf | 125.4 KiB | 2015-Jul-21 11:47 |
DEFCON-23-Fatih-Ozavci-The-Art-of-VoIP-Workshop-UPDATED.pdf | 4.1 MiB | 2015-Aug-14 13:52 |
DEFCON-23-Fernando-Arnaboldi-Abusing-XSLT-for-Practical-Attacks-UPDATED.pdf | 1.4 MiB | 2015-Aug-14 13:53 |
DEFCON-23-Fernando-Arnaboldi-Abusing-XSLT-for-Practical-Attacks-WP-UPDATED.pdf | 1.0 MiB | 2015-Aug-14 13:54 |
DEFCON-23-Fluxist-Unbootable-Exploiting-Paylock-Smartboot.pdf | 910.0 KiB | 2015-Jul-21 11:48 |
DEFCON-23-Gerard-Laygui-Forensic-Artifacts-Pass-The-Hash-Attack.pdf | 819.6 KiB | 2015-Jul-21 11:49 |
DEFCON-23-Grant-Bugher-Obtaining-and-Detecting-Domain-Persistence.pdf | 5.8 MiB | 2015-Jul-21 11:49 |
DEFCON-23-Gregory-Pickett-Extras.rar | 246.6 KiB | 2015-Oct-10 03:15 |
DEFCON-23-Gregory-Pickett-Staying-Persistant-in-Software-Defined-Networks.pdf | 1.1 MiB | 2015-Jul-21 11:50 |
DEFCON-23-Hariri-Spelman-Gorenc-Abusing-Adobe-Readers-JavaScript-APIs.pdf | 496.7 KiB | 2015-Jul-21 11:50 |
DEFCON-23-Ian-Kline-LTE-Recon-and-Tracking-with-RTLSDR.pdf | 344.2 KiB | 2015-Jul-21 11:50 |
DEFCON-23-Ian-Latter-Remote-Access-the-APT.pdf | 944.9 KiB | 2015-Jul-21 11:51 |
DEFCON-23-Ionut-Popescu-NetRipper-WP.pdf | 451.1 KiB | 2015-Jul-21 11:51 |
DEFCON-23-Ionut-Popescu-NetRipper.pdf | 2.3 MiB | 2015-Jul-21 11:51 |
DEFCON-23-Jason-Haddix-How-Do-I-shot-Web.pdf | 2.3 MiB | 2015-Jul-21 11:52 |
DEFCON-23-Jeremy-Dorrough-USB-Attack-to-Decrypt-Wi-Fi-Communications.pdf | 1.3 MiB | 2015-Jul-21 11:52 |
DEFCON-23-Joe-FitzPatrick-Matt-King-Extras.rar | 3.4 MiB | 2015-Oct-10 03:14 |
DEFCON-23-Joe-FitzPatrick-Matt-King-NSA-Playset-JTAG-Implants-UPDATED.pdf | 3.1 MiB | 2015-Aug-15 13:26 |
DEFCON-23-John-Menerick-Backdooring-Git.pdf | 4.3 MiB | 2015-Jul-21 11:53 |
DEFCON-23-John-Seymour-Quantum-Classification-of-Malware-UPDATED.pdf | 1.8 MiB | 2015-Aug-25 03:14 |
DEFCON-23-John-Seymour-Quantum-Classification-of-Malware-WP-UPDATED.pdf | 344.0 KiB | 2015-Aug-25 03:14 |
DEFCON-23-Jose-Selvi-Breaking-SSL-Using-Time-Synchronisation-Attacks.pdf | 2.2 MiB | 2015-Jul-21 11:53 |
DEFCON-23-Joshua-Drake-Stagefright-Scary-Code-in-the-Heart-of-Android-UPDATED.pdf | 266.9 KiB | 2015-Aug-14 13:54 |
DEFCON-23-Joshua-Smith-High-Def-Fuzzing-Exploitation-Over-HDMI-CEC-UPDATED.pdf | 9.7 MiB | 2015-Aug-22 02:26 |
DEFCON-23-Justin-Engler-Secure-Messaging-For-Normal-People-WP.pdf | 1.7 MiB | 2015-Jul-21 13:41 |
DEFCON-23-Justin-Engler-Secure-Messaging-For-Normal-People.pdf | 380.6 KiB | 2015-Jul-21 13:41 |
DEFCON-23-Ken-Westin-Confessions-of-a-Cyberstalker.pdf | 2.6 MiB | 2015-Jul-20 06:18 |
DEFCON-23-Lance-Buttars-Nemus-Hacking-SQL-Injection-for-Remote-Code-Execution-on-a-LAMP-UPDATED.pdf | 1.1 MiB | 2015-Aug-27 23:48 |
DEFCON-23-Li-Jun-Yang-Qing-I-AM-A-NEWBIE-YET-I-CAN-HACK-ZIGBEE.pdf | 1.9 MiB | 2015-Jul-21 11:53 |
DEFCON-23-Lin-Huang-Qing-Yang-GPS-Spoofing.pdf | 9.3 MiB | 2015-Jul-18 07:05 |
DEFCON-23-Mahdi-Namazifar-Detecting-Random-Strings-Language-Based-Approach.pdf | 363.3 KiB | 2015-Jul-21 11:54 |
DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Pocketbook-Hacking-Chemical-Plants-UPDATED.pdf | 9.8 MiB | 2015-Aug-15 13:25 |
DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Pocketbook-Hacking-Chemical-Plants-WP-UPDATED.pdf | 2.0 MiB | 2015-Aug-14 13:56 |
DEFCON-23-Mark-Ryan-Talabis-The-Bieber-Project.pdf | 7.7 MiB | 2015-Jul-20 09:21 |
DEFCON-23-Marte-L0ge-I-will-Tell-you-your-Lock-Pattern-UPDATED.pdf | 755.1 KiB | 2015-Aug-14 13:57 |
DEFCON-23-Matteo-Becarro-Matteo-Collura-Extracting-The-Painful-Bluetooth.pdf | 779.3 KiB | 2015-Jul-21 11:54 |
DEFCON-23-Miaubiz-Put-on-Your-Tinfo_t-Hat.pdf | 744.7 KiB | 2015-Jul-21 11:54 |
DEFCON-23-Michael-Robinson-Knocking-My-Neighbors-Kids-Drone-Offline-UPDATED.pdf | 13.7 MiB | 2015-Aug-14 10:38 |
DEFCON-23-Michael-Schrenk-Applied-Intelligence-UPDATED.pdf | 920.7 KiB | 2015-Aug-14 13:57 |
DEFCON-23-Mickey-Shkatov-Jesse-Michael-Scared-poopless-LTE-and-your-laptop-UPDATED.pdf | 2.5 MiB | 2015-Aug-14 13:58 |
DEFCON-23-Mike-Sconzo-I-am-packer-and-so-can-you.pdf | 6.8 MiB | 2015-Jul-21 11:55 |
DEFCON-23-Nadeem-Douba-BurpKit.pdf | 1.3 MiB | 2015-Jul-21 11:55 |
DEFCON-23-Nadeem-Douba-Extras.rar | 20.2 MiB | 2015-Oct-10 03:14 |
DEFCON-23-Nir-Valtman-Moshe-Ferber-From-zero-to-secure-in-1-minute-UPDATED.pdf | 6.9 MiB | 2015-Aug-14 10:22 |
DEFCON-23-Omer-Coskun-Why-Nation-State-Malwares-Target-Telco-Networks-UPDATED.pdf | 3.4 MiB | 2015-Aug-14 13:59 |
DEFCON-23-Panel-Comedy-Inception-Amanda-Berlin-Blue-Team-Hell.pdf | 388.1 KiB | 2015-Jul-21 11:55 |
DEFCON-23-Patrick-McNeil-Guidelines-For-Securing-Your-VoIP-PBX.pdf | 268.6 KiB | 2015-Jul-21 11:55 |
DEFCON-23-Patrick-McNeil-Owen-Sorry-Wrong-Number.pdf | 2.4 MiB | 2015-Jul-21 11:56 |
DEFCON-23-Patrick-Wardle-DLL-Hijacking-on-OSX-UPDATED.pdf | 44.4 MiB | 2015-Aug-25 03:15 |
DEFCON-23-Patrick-Wardle-Stick-that-in-your-(Root)Pipe-and-Smoke-it-UPDATED.pdf | 22.9 MiB | 2015-Aug-25 03:14 |
DEFCON-23-Paul-Amicelli-David-Baptiste-How-to-secure-the-keyboard-chain.pdf | 416.5 KiB | 2015-Jul-21 11:57 |
DEFCON-23-Phil-Polstra-Extras.rar | 39.2 KiB | 2015-Oct-10 03:17 |
DEFCON-23-Phil-Polstra-Hacker-in-the-Wires.pdf | 831.7 KiB | 2015-Jul-21 11:57 |
DEFCON-23-Phil-Polstra-One-device-to-Pwn-them-all.pdf | 782.2 KiB | 2015-Jul-21 11:57 |
DEFCON-23-Phil-Young-Chad-Rikansrud-Extras.rar | 80.1 KiB | 2015-Oct-10 03:18 |
DEFCON-23-Phil-Young-Chad-Rikansrud-Security-Necromancy-Further-Adventures-in-Mainframe-Hacking.pdf | 4.3 MiB | 2015-Jul-21 11:57 |
DEFCON-23-Phillip-Aumasson-Quantum-Computers-vs-Computers-Security.pdf | 1.7 MiB | 2015-Jul-21 11:57 |
DEFCON-23-Rich-Kelley-Harness-Powershell-Weaponization-Made-Easy.pdf | 404.7 KiB | 2015-Jul-21 11:57 |
DEFCON-23-Richo-Healey-Mike-Ryan-Hacking-Electric-Skateboards.pdf | 1.1 MiB | 2015-Jul-21 11:57 |
DEFCON-23-Rickey-Lawshae-Extras.rar | 3.5 MiB | 2015-Oct-10 03:19 |
DEFCON-23-Rickey-Lawshae-Lets-Talk-About-SOAP.pdf | 381.7 KiB | 2015-Jul-21 11:57 |
DEFCON-23-Rodringo-Almeida-Embedded-System-Design-From-Electronics-To-Microkernal-Development-WP.pdf | 742.2 KiB | 2015-Jul-21 11:57 |
DEFCON-23-Rodringo-Almeida-Embedded-System-Design-From-Electronics-To-Microkernal-Development.pdf | 3.1 MiB | 2015-Jul-21 11:58 |
DEFCON-23-Rodringo-Almeida-Extras.rar | 55.7 KiB | 2015-Oct-10 03:19 |
DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-UPDATED.pdf | 494.6 KiB | 2015-Aug-14 13:59 |
DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-WP.pdf | 189.2 KiB | 2015-Aug-14 13:59 |
DEFCON-23-Ronny-Bull-Jeanna-Matthews-Extras.rar | 106.3 MiB | 2015-Oct-10 03:19 |
DEFCON-23-Ryan-Castellucci-Cracking-Cryptocurrency-Brainwallets.pdf | 179.6 KiB | 2015-Jul-21 11:58 |
DEFCON-23-Ryan-Mitchell-Separating-Bots-from-Humans.pdf | 125.2 KiB | 2015-Jul-21 11:58 |
DEFCON-23-Ryan-O'Neil-Advances-in-Linux-Forensics-ECFS.pdf | 272.6 KiB | 2015-Jul-21 11:58 |
DEFCON-23-Saif-El-Sherei-Etienne-Stalmans-SensePost-Introducing-Wadi-Fuzzer.pdf | 1.0 MiB | 2015-Jul-21 11:58 |
DEFCON-23-Sam-Bowne-Workshop-Android-Security-Auditing-Mobile-Apps.pdf | 7.5 MiB | 2015-Jul-15 06:41 |
DEFCON-23-Sam-Bowne-Workshop-Violent-Python.pdf | 6.9 MiB | 2015-Jul-15 06:41 |
DEFCON-23-Samy-Kamkar-Extras.rar | 51.3 KiB | 2015-Oct-10 03:20 |
DEFCON-23-Samy-Kamkar-README.txt | 518 B | 2015-Jul-16 14:03 |
DEFCON-23-Sarah-Edwards-Ubiquity-Forensics.pdf | 23.9 MiB | 2015-Jul-16 01:16 |
DEFCON-23-Sean-Metcalf-Red-vs-Blue-AD-Attack-and-Defense.pdf | 2.3 MiB | 2015-Aug-14 14:00 |
DEFCON-23-Shawn-Webb-HardenedBSD-Internals.pdf | 226.3 KiB | 2015-Jul-21 11:58 |
DEFCON-23-Tamas-Szakaly-Shall-We-Play-A-Game-UPDATED.pdf | 1.1 MiB | 2015-Aug-14 10:34 |
DEFCON-23-Tony-Trummer-Tushar-Dalvi-QARK.pdf | 1.9 MiB | 2015-Jul-21 11:58 |
DEFCON-23-Topher-Timzen-Acquiring-NET-Objects-From-The-Managed-Heap.pdf | 117.2 KiB | 2015-Aug-14 14:00 |
DEFCON-23-Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary-NET-Application-Control-Flow-UPDATED.pdf | 1.0 MiB | 2015-Aug-14 14:00 |
DEFCON-23-Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary-NET-Application-Control-Flow-WP.pdf | 109.0 KiB | 2015-Aug-14 14:00 |
DEFCON-23-Tottenkoph-IrishMASMS-Hackers-Hiring-Hacker.pdf | 1.7 MiB | 2015-Jul-21 11:59 |
DEFCON-23-Vivek-Ramachadran-Chellam.pdf | 1.8 MiB | 2015-Jul-21 11:59 |
DEFCON-23-Walker-Wiens-Machine-vs-Machine-DARPA-Fully-Automated-CTF.pdf | 15.5 MiB | 2015-Sep-03 08:31 |
DEFCON-23-Wesley-McGrew-I-Hunt-Penetration-Testers-WP.pdf | 190.0 KiB | 2015-Jul-21 11:59 |
DEFCON-23-Wesley-McGrew-I-Hunt-Penetration-Testers.pdf | 1.8 MiB | 2015-Jul-21 11:59 |
DEFCON-23-Weston-Hecker-Goodbye-Memory-Scraping-Malware.pdf | 1.7 MiB | 2015-Jul-21 11:59 |
DEFCON-23-Yan-Shoshitaishvili-Fish-Wang-Angry-Hacking.pdf | 2.5 MiB | 2015-Jul-21 11:59 |
DEFCON-23-Yaniv-Balmas-Lior-Oppenheim-Key-Logger-Video-Mouse.pdf | 1.9 MiB | 2015-Jul-21 11:59 |
DEFCON-23-Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellular-Traffic-Capture-Tool-with-a-VxWorks-Based-Femto.pdf | 1.6 MiB | 2015-Jul-21 11:59 |
DEFCON-23-Zack-Allen-Rusty-Bower-Malware-In-Gaming.pdf | 1.3 MiB | 2015-Jul-21 12:00 |
DEFCON-23-ammonRA-How-to-hack-your-way-out-of-home-detention-UPDATED.pdf | 1.3 MiB | 2015-Aug-14 13:51 |
DEFCON-23-xntrik-Hooked-Browser-Meshed-Networks-with-webRTC-and-BeEF.pdf | 1.7 MiB | 2015-Jul-21 11:59 |