Parent directory/ | - | - |
DEF CON 23 Conference - 1057 - RICKASTLEY - Slides.mp4 | 32.1 MiB | 2015-Nov-30 00:15 |
DEF CON 23 Conference - 1057 - RICKASTLEY - Slides.srt | 32.5 KiB | 2015-Dec-31 22:50 |
DEF CON 23 Conference - 1057 - RICKASTLEY.txt | 21.9 KiB | 2015-Nov-20 17:05 |
DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - Slides.mp4 | 32.7 MiB | 2015-Nov-30 00:18 |
DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - Slides.srt | 49.6 KiB | 2015-Dec-31 22:50 |
DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy.txt | 33.1 KiB | 2015-Sep-09 22:46 |
DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Slides.mp4 | 29.5 MiB | 2015-Nov-30 00:21 |
DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Slides.srt | 44.2 KiB | 2015-Dec-31 22:50 |
DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns.txt | 29.4 KiB | 2015-Nov-18 19:50 |
DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure - Slides.srt | 37.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure.txt | 24.7 KiB | 2015-Sep-09 21:49 |
DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Slides.mp4 | 32.3 MiB | 2015-Nov-30 00:24 |
DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Slides.srt | 23.1 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track.txt | 15.5 KiB | 2015-Sep-09 22:44 |
DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - Slides.mp4 | 29.2 MiB | 2015-Nov-30 00:27 |
DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - Slides.srt | 30.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention.txt | 20.9 KiB | 2015-Sep-09 21:44 |
DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Slides.mp4 | 30.7 MiB | 2015-Nov-30 00:30 |
DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Slides.srt | 33.2 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring.txt | 22.6 KiB | 2015-Nov-19 21:43 |
DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Slides.mp4 | 45.4 MiB | 2015-Nov-30 00:37 |
DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Slides.srt | 22.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed.txt | 15.2 KiB | 2015-Sep-10 02:15 |
DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - Slides.mp4 | 38.2 MiB | 2015-Nov-30 00:40 |
DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - Slides.srt | 29.9 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth.txt | 20.1 KiB | 2015-Sep-09 23:07 |
DEF CON 23 Conference - Brent White - Hacking Web Apps - Slides.mp4 | 31.1 MiB | 2015-Nov-30 00:43 |
DEF CON 23 Conference - Brent White - Hacking Web Apps - Slides.srt | 40.7 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Brent White - Hacking Web Apps.txt | 27.3 KiB | 2015-Nov-17 16:32 |
DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - Slides.mp4 | 47.6 MiB | 2015-Nov-30 00:47 |
DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - Slides.srt | 43.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk.txt | 56.0 KiB | 2015-Sep-17 13:23 |
DEF CON 23 Conference - Bruce Schneier - Questions and Answers - Slides.srt | 48.2 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Bruce Schneier - Questions and Answers.txt | 32.4 KiB | 2015-Sep-09 21:24 |
DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Slides.mp4 | 53.6 MiB | 2015-Nov-30 00:51 |
DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Slides.srt | 34.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle.txt | 23.4 KiB | 2015-Sep-10 01:55 |
DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Slides.mp4 | 48.2 MiB | 2015-Nov-30 07:48 |
DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Slides.srt | 29.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warfare in Reverse Engineering.txt | 19.8 KiB | 2015-Nov-21 02:43 |
DEF CON 23 Conference - Chris Rock - I Will Kill You - Slides.mp4 | 39.3 MiB | 2015-Nov-30 00:54 |
DEF CON 23 Conference - Chris Rock - I Will Kill You - Slides.srt | 20.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Chris Rock - I Will Kill You.txt | 13.5 KiB | 2015-Sep-09 21:57 |
DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - Slides.mp4 | 34.9 MiB | 2015-Nov-30 00:57 |
DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - Slides.srt | 36.7 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS.txt | 24.7 KiB | 2015-Sep-23 18:31 |
DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Slides.mp4 | 51.3 MiB | 2015-Nov-30 01:00 |
DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Slides.srt | 32.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF.txt | 21.8 KiB | 2015-Sep-09 22:22 |
DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Slides.mp4 | 35.1 MiB | 2015-Nov-30 01:03 |
DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Slides.srt | 54.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service.txt | 36.5 KiB | 2015-Sep-09 23:06 |
DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Slides.mp4 | 49.1 MiB | 2015-Nov-30 01:07 |
DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Slides.srt | 53.2 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit.txt | 35.4 KiB | 2015-Sep-10 02:09 |
DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers - Slides.srt | 70.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers.txt | 46.6 KiB | 2015-Sep-09 22:11 |
DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - Slides.mp4 | 30.0 MiB | 2015-Nov-30 01:09 |
DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - Slides.srt | 39.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools.txt | 26.6 KiB | 2015-Sep-09 21:47 |
DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Slides.mp4 | 45.7 MiB | 2015-Nov-30 01:13 |
DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Slides.srt | 48.9 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research.txt | 32.9 KiB | 2015-Sep-10 02:01 |
DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - Slides.mp4 | 32.2 MiB | 2015-Nov-30 02:08 |
DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - Slides.srt | 60.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON.txt | 24.3 KiB | 2015-Oct-14 20:02 |
DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Slides.mp4 | 34.7 MiB | 2015-Nov-30 01:16 |
DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Slides.srt | 32.5 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village.txt | 19.9 KiB | 2015-Sep-23 16:41 |
DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Slides.mp4 | 40.9 MiB | 2015-Nov-30 01:20 |
DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Slides.srt | 33.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment.txt | 22.3 KiB | 2015-Sep-09 21:19 |
DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - Slides.mp4 | 46.1 MiB | 2015-Nov-30 01:24 |
DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - Slides.srt | 40.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet.txt | 27.3 KiB | 2015-Nov-19 22:03 |
DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Slides.mp4 | 605.9 MiB | 2015-Oct-17 02:50 |
DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Slides.srt | 52.9 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You.txt | 35.5 KiB | 2015-Sep-10 02:07 |
DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Slides.mp4 | 37.9 MiB | 2015-Nov-30 01:43 |
DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Slides.srt | 37.9 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns.txt | 25.3 KiB | 2015-Sep-09 21:58 |
DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - Slides.mp4 | 18.6 MiB | 2015-Nov-30 01:44 |
DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - Slides.srt | 27.2 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us.txt | 18.1 KiB | 2015-Oct-17 01:53 |
DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused - Slides.mp4 | 45.2 MiB | 2015-Nov-30 01:48 |
DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused.txt | 33.4 KiB | 2015-Nov-23 22:58 |
DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Slides.mp4 | 27.3 MiB | 2015-Nov-30 01:51 |
DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Slides.srt | 49.1 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You.txt | 32.9 KiB | 2015-Sep-10 18:00 |
DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Slides.mp4 | 45.0 MiB | 2015-Nov-30 01:55 |
DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Slides.srt | 38.1 KiB | 2015-Dec-31 22:54 |
DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems.txt | 25.6 KiB | 2015-Sep-09 22:20 |
DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - Slides.mp4 | 37.8 MiB | 2015-Nov-30 01:59 |
DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - Slides.srt | 36.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs.txt | 24.5 KiB | 2015-Sep-09 21:29 |
DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - Slides.mp4 | 43.6 MiB | 2015-Nov-30 02:02 |
DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - Slides.srt | 37.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires.txt | 25.0 KiB | 2015-Nov-19 21:24 |
DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - Slides.mp4 | 36.5 MiB | 2015-Nov-30 02:05 |
DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - Slides.srt | 34.7 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All.txt | 23.6 KiB | 2015-Sep-09 21:47 |
DEF CON 23 Conference - Eijah - Crypto for Hackers - Slides.mp4 | 42.2 MiB | 2015-Nov-30 02:12 |
DEF CON 23 Conference - Eijah - Crypto for Hackers - Slides.srt | 59.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Eijah - Crypto for Hackers.txt | 39.9 KiB | 2015-Sep-10 18:29 |
DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Slides.mp4 | 16.9 MiB | 2015-Nov-30 02:14 |
DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Slides.srt | 17.9 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers.txt | 11.9 KiB | 2015-Sep-09 22:37 |
DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - Slides.mp4 | 55.2 MiB | 2015-Nov-30 02:17 |
DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - Slides.srt | 52.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS.txt | 35.1 KiB | 2015-Nov-20 23:28 |
DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Slides.mp4 | 38.4 MiB | 2015-Nov-30 02:20 |
DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Slides.srt | 43.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core.txt | 28.8 KiB | 2015-Sep-09 21:39 |
DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - Slides.mp4 | 28.5 MiB | 2015-Nov-30 02:23 |
DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - Slides.srt | 40.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks.txt | 27.1 KiB | 2015-Sep-09 22:34 |
DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Slides.mp4 | 51.8 MiB | 2015-Nov-30 02:27 |
DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Slides.srt | 49.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID.txt | 33.8 KiB | 2015-Sep-09 21:24 |
DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Slides.mp4 | 48.5 MiB | 2015-Nov-30 02:31 |
DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Slides.srt | 57.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter.txt | 38.8 KiB | 2015-Sep-09 21:51 |
DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Slides.mp4 | 33.0 MiB | 2015-Nov-30 02:34 |
DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Slides.srt | 49.5 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack.txt | 33.4 KiB | 2015-Nov-20 22:16 |
DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - Slides.mp4 | 26.3 MiB | 2015-Nov-30 02:37 |
DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - Slides.srt | 30.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio.txt | 21.0 KiB | 2015-Sep-09 21:45 |
DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Slides.mp4 | 46.8 MiB | 2015-Nov-30 02:40 |
DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Slides.srt | 61.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence.txt | 41.3 KiB | 2015-Sep-24 14:35 |
DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - Slides.mp4 | 41.2 MiB | 2015-Nov-30 02:44 |
DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - Slides.srt | 49.1 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks.txt | 32.8 KiB | 2015-Oct-20 16:55 |
DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - Slides.mp4 | 9.7 MiB | 2015-Nov-30 02:45 |
DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - Slides.srt | 13.5 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR.txt | 9.1 KiB | 2015-Sep-09 21:32 |
DEF CON 23 Conference - Ian Latter - Remote Access - the APT - Slides.mp4 | 49.8 MiB | 2015-Nov-30 02:48 |
DEF CON 23 Conference - Ian Latter - Remote Access - the APT - Slides.srt | 47.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Ian Latter - Remote Access - the APT.txt | 32.0 KiB | 2015-Sep-09 22:13 |
DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Slides.mp4 | 47.4 MiB | 2015-Nov-30 02:52 |
DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Slides.srt | 29.1 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers.txt | 19.5 KiB | 2015-Nov-19 21:09 |
DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Slides.mp4 | 42.8 MiB | 2015-Nov-30 02:56 |
DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Slides.srt | 52.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015.txt | 34.7 KiB | 2015-Sep-09 22:38 |
DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Slides.mp4 | 27.5 MiB | 2015-Nov-30 02:59 |
DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Slides.srt | 21.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security.txt | 14.5 KiB | 2015-Nov-18 02:33 |
DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Slides.mp4 | 36.5 MiB | 2015-Nov-30 03:03 |
DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Slides.srt | 46.2 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications.txt | 31.0 KiB | 2015-Sep-09 22:11 |
DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Slides.mp4 | 40.1 MiB | 2015-Nov-30 03:07 |
DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Slides.srt | 41.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants.txt | 27.5 KiB | 2015-Nov-17 02:27 |
DEF CON 23 Conference - John Menerick - Backdooring Git - Slides.mp4 | 45.1 MiB | 2015-Nov-30 03:10 |
DEF CON 23 Conference - John Menerick - Backdooring Git - Slides.srt | 40.1 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - John Menerick - Backdooring Git.txt | 26.9 KiB | 2015-Sep-09 21:56 |
DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - Slides.mp4 | 21.9 MiB | 2015-Nov-30 03:13 |
DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - Slides.srt | 38.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - John Seymour - Quantum Classification of Malware.txt | 25.3 KiB | 2015-Nov-20 19:54 |
DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.mp4 | 61.2 MiB | 2015-Nov-30 03:18 |
DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.srt | 34.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.txt | 22.9 KiB | 2015-Nov-19 02:14 |
DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Slides.mp4 | 50.7 MiB | 2015-Nov-30 03:22 |
DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Slides.srt | 44.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android.txt | 30.2 KiB | 2015-Sep-09 21:38 |
DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Slides.mp4 | 39.5 MiB | 2015-Nov-30 03:25 |
DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Slides.srt | 54.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC.txt | 36.8 KiB | 2015-Sep-10 01:25 |
DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - Slides.mp4 | 44.3 MiB | 2015-Nov-30 03:30 |
DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - Slides.srt | 64.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People.txt | 43.2 KiB | 2015-Sep-09 21:57 |
DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - Slides.mp4 | 38.5 MiB | 2015-Nov-30 03:33 |
DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - Slides.srt | 55.9 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker.txt | 37.3 KiB | 2015-Sep-10 02:08 |
DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Slides.mp4 | 45.3 MiB | 2015-Nov-30 03:37 |
DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Slides.srt | 50.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion.txt | 33.5 KiB | 2015-Sep-09 21:34 |
DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Slides.mp4 | 45.6 MiB | 2015-Nov-30 03:40 |
DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Slides.srt | 20.5 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR.txt | 13.8 KiB | 2015-Sep-09 21:55 |
DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - Slides.mp4 | 16.4 MiB | 2015-Nov-30 03:45 |
DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - Slides.srt | 18.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings.txt | 12.5 KiB | 2015-Sep-09 21:32 |
DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Slides.mp4 | 49.5 MiB | 2015-Nov-30 03:49 |
DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Slides.srt | 41.5 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S.txt | 27.7 KiB | 2015-Sep-09 21:54 |
DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Slides.mp4 | 35.0 MiB | 2015-Nov-30 03:52 |
DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Slides.srt | 44.1 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic.txt | 29.4 KiB | 2015-Sep-09 22:43 |
DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Slides.mp4 | 61.2 MiB | 2015-Nov-30 03:57 |
DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Slides.srt | 38.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb.txt | 25.7 KiB | 2015-Sep-10 01:53 |
DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Slides.mp4 | 12.9 MiB | 2015-Nov-30 03:58 |
DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Slides.srt | 12.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern.txt | 8.2 KiB | 2015-Sep-10 02:12 |
DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Slides.mp4 | 48.7 MiB | 2015-Nov-30 04:02 |
DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Slides.srt | 60.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars.txt | 40.1 KiB | 2015-Sep-09 21:30 |
DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Slides.mp4 | 46.5 MiB | 2015-Nov-30 04:06 |
DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Slides.srt | 57.9 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System.txt | 39.1 KiB | 2015-Nov-21 02:35 |
DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Slides.mp4 | 44.9 MiB | 2015-Nov-30 04:10 |
DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Slides.srt | 58.1 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers.txt | 38.6 KiB | 2015-Nov-19 23:46 |
DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Slides.mp4 | 34.9 MiB | 2015-Nov-30 04:15 |
DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Slides.srt | 47.2 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There.txt | 31.7 KiB | 2015-Sep-09 21:29 |
DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Slides.mp4 | 51.1 MiB | 2015-Nov-30 04:18 |
DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Slides.srt | 38.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF.txt | 25.8 KiB | 2015-Sep-10 01:52 |
DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Slides.mp4 | 48.8 MiB | 2015-Nov-30 04:22 |
DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Slides.srt | 27.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop.txt | 18.7 KiB | 2015-Sep-09 22:56 |
DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Slides.mp4 | 45.3 MiB | 2015-Nov-30 04:25 |
DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Slides.srt | 32.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards.txt | 21.8 KiB | 2015-Sep-10 01:56 |
DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - Slides.mp4 | 40.6 MiB | 2015-Nov-30 04:29 |
DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - Slides.srt | 46.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You.txt | 31.1 KiB | 2015-Sep-09 21:33 |
DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Slides.mp4 | 28.8 MiB | 2015-Nov-30 04:31 |
DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Slides.srt | 25.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Slides.mp4 | 41.8 MiB | 2015-Nov-30 04:34 |
DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Slides.srt | 39.2 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack.txt | 25.9 KiB | 2015-Sep-09 21:30 |
DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Slides.mp4 | 39.6 MiB | 2015-Nov-30 04:38 |
DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Slides.srt | 52.5 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS.txt | 35.0 KiB | 2015-Nov-16 23:38 |
DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - Slides.mp4 | 49.4 MiB | 2015-Nov-30 04:42 |
DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - Slides.srt | 31.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks.txt | 20.9 KiB | 2015-Sep-09 21:53 |
DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - Slides.mp4 | 31.2 MiB | 2015-Nov-30 04:45 |
DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - Slides.srt | 43.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs.txt | 29.2 KiB | 2015-Sep-09 21:28 |
DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties - Slides.srt | 72.5 KiB | 2015-Dec-31 22:54 |
DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties.txt | 48.5 KiB | 2015-Sep-10 02:04 |
DEF CON 23 Conference - Panel - Closing Ceremonies - Slides.mp4 | 178.0 MiB | 2015-Nov-30 04:52 |
DEF CON 23 Conference - Panel - Closing Ceremonies - Slides.srt | 77.7 KiB | 2015-Dec-31 22:54 |
DEF CON 23 Conference - Panel - Closing Ceremonies.txt | 52.6 KiB | 2015-Sep-09 22:17 |
DEF CON 23 Conference - Panel - Contests Closing Ceremonies - Slides.mp4 | 21.8 MiB | 2015-Nov-30 04:54 |
DEF CON 23 Conference - Panel - Contests Closing Ceremonies - Slides.srt | 29.8 KiB | 2015-Dec-31 22:54 |
DEF CON 23 Conference - Panel - Contests Closing Ceremonies.txt | 20.1 KiB | 2015-Nov-23 21:07 |
DEF CON 23 Conference - Panel - DEF CON 101 The Panel - Slides.mp4 | 55.2 MiB | 2015-Nov-30 05:00 |
DEF CON 23 Conference - Panel - DEF CON 101 The Panel - Slides.srt | 86.5 KiB | 2015-Dec-31 22:54 |
DEF CON 23 Conference - Panel - DEF CON 101 The Panel.txt | 58.5 KiB | 2015-Sep-09 21:16 |
DEF CON 23 Conference - Panel - DEF CON Comedy Inception - Slides.mp4 | 104.3 MiB | 2015-Nov-30 05:08 |
DEF CON 23 Conference - Panel - DEF CON Comedy Inception - Slides.srt | 86.2 KiB | 2015-Dec-31 22:54 |
DEF CON 23 Conference - Panel - DEF CON Comedy Inception.txt | 60.0 KiB | 2015-Nov-18 00:17 |
DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Slides.mp4 | 30.1 MiB | 2015-Nov-30 05:11 |
DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Slides.srt | 26.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques.txt | 17.9 KiB | 2015-Sep-09 21:25 |
DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Slides.mp4 | 41.1 MiB | 2015-Nov-30 05:15 |
DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Slides.srt | 43.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web.txt | 28.9 KiB | 2015-Sep-09 22:56 |
DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Slides.mp4 | 83.2 MiB | 2015-Nov-30 05:23 |
DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Slides.srt | 111.4 KiB | 2015-Dec-31 22:54 |
DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research.txt | 74.1 KiB | 2015-Sep-09 21:51 |
DEF CON 23 Conference - Panel - Switches Get Stitches - Slides.mp4 | 42.4 MiB | 2015-Nov-30 05:27 |
DEF CON 23 Conference - Panel - Switches Get Stitches - Slides.srt | 30.5 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Panel - Switches Get Stitches.txt | 20.5 KiB | 2015-Sep-10 01:45 |
DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - Slides.mp4 | 40.5 MiB | 2015-Nov-30 05:30 |
DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - Slides.srt | 38.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike.txt | 25.9 KiB | 2015-Sep-10 01:51 |
DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Slides.mp4 | 81.0 MiB | 2015-Nov-30 05:38 |
DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Slides.srt | 103.5 KiB | 2015-Dec-31 22:54 |
DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis.txt | 70.1 KiB | 2015-Sep-10 01:34 |
DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - Slides.mp4 | 48.0 MiB | 2015-Nov-30 05:42 |
DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - Slides.srt | 47.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X.txt | 31.7 KiB | 2015-Sep-10 02:00 |
DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Slides.mp4 | 42.7 MiB | 2015-Nov-30 05:45 |
DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Slides.srt | 50.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It.txt | 33.6 KiB | 2015-Nov-20 22:19 |
DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Slides.mp4 | 19.4 MiB | 2015-Nov-30 05:47 |
DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Slides.srt | 22.7 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain.txt | 15.3 KiB | 2015-Nov-20 23:09 |
DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - Slides.mp4 | 44.4 MiB | 2015-Nov-30 05:50 |
DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - Slides.srt | 24.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation.txt | 16.8 KiB | 2015-Sep-09 21:41 |
DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Slides.mp4 | 37.9 MiB | 2015-Nov-30 05:54 |
DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Slides.srt | 62.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery.txt | 42.4 KiB | 2015-Sep-09 23:05 |
DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Slides.mp4 | 16.6 MiB | 2015-Nov-30 05:55 |
DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Slides.srt | 16.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee.txt | 11.1 KiB | 2015-Nov-17 19:44 |
DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - Slides.mp4 | 20.4 MiB | 2015-Nov-30 05:57 |
DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - Slides.srt | 16.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy.txt | 10.8 KiB | 2015-Sep-09 21:56 |
DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - Slides.mp4 | 36.2 MiB | 2015-Nov-30 06:01 |
DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - Slides.srt | 45.5 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain.txt | 30.0 KiB | 2015-Sep-09 23:03 |
DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Slides.mp4 | 50.8 MiB | 2015-Nov-30 06:04 |
DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Slides.srt | 39.6 KiB | 2015-Dec-31 22:54 |
DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP.txt | 26.6 KiB | 2015-Sep-09 21:56 |
DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Slides.mp4 | 38.3 MiB | 2015-Nov-30 06:08 |
DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Slides.srt | 53.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer.txt | 36.1 KiB | 2015-Sep-09 21:49 |
DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Slides.mp4 | 37.6 MiB | 2015-Nov-30 06:12 |
DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Slides.srt | 59.7 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline.txt | 40.1 KiB | 2015-Sep-09 21:34 |
DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Slides.mp4 | 44.3 MiB | 2015-Nov-30 06:16 |
DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Slides.srt | 62.1 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments.txt | 41.4 KiB | 2015-Oct-19 18:03 |
DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle - Slides.srt | 53.5 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle.txt | 36.5 KiB | 2015-Sep-09 21:46 |
DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.mp4 | 38.7 MiB | 2015-Nov-30 06:19 |
DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.srt | 44.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets.txt | 29.8 KiB | 2015-Nov-20 23:05 |
DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - Slides.mp4 | 32.6 MiB | 2015-Nov-30 06:21 |
DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - Slides.srt | 17.2 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans.txt | 11.5 KiB | 2015-Sep-10 02:13 |
DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Slides.mp4 | 42.5 MiB | 2015-Nov-30 06:25 |
DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Slides.srt | 56.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS.txt | 37.1 KiB | 2015-Nov-20 20:13 |
DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Slides.mp4 | 46.8 MiB | 2015-Nov-30 06:28 |
DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Slides.srt | 54.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars.txt | 36.8 KiB | 2015-Sep-09 21:52 |
DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Slides.mp4 | 41.3 MiB | 2015-Nov-30 06:32 |
DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Slides.srt | 45.4 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You.txt | 30.9 KiB | 2015-Sep-09 21:15 |
DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Slides.mp4 | 31.4 MiB | 2015-Nov-30 06:35 |
DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Slides.srt | 35.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots.txt | 23.5 KiB | 2015-Sep-09 21:30 |
DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Slides.mp4 | 49.4 MiB | 2015-Nov-30 06:39 |
DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Slides.srt | 60.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense.txt | 40.7 KiB | 2015-Sep-10 18:18 |
DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - Slides.mp4 | 47.2 MiB | 2015-Nov-30 06:43 |
DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - Slides.srt | 44.7 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation.txt | 30.4 KiB | 2015-Sep-09 21:08 |
DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Slides.mp4 | 43.8 MiB | 2015-Nov-30 06:47 |
DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Slides.srt | 34.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis.txt | 23.5 KiB | 2015-Sep-10 01:54 |
DEF CON 23 Conference - Spot the FED.srt | 9.2 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Spot the FED.txt | 6.2 KiB | 2015-Sep-10 00:35 |
DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - Slides.mp4 | 40.4 MiB | 2015-Nov-30 06:50 |
DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - Slides.srt | 29.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game.txt | 20.3 KiB | 2015-Sep-09 21:36 |
DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Slides.mp4 | 28.9 MiB | 2015-Nov-30 06:54 |
DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Slides.srt | 56.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5.txt | 38.0 KiB | 2015-Nov-17 16:32 |
DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Slides.mp4 | 50.9 MiB | 2015-Nov-30 06:57 |
DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Slides.srt | 58.9 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool.txt | 39.2 KiB | 2015-Nov-19 21:28 |
DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Slides.mp4 | 38.3 MiB | 2015-Nov-30 07:00 |
DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Slides.srt | 42.7 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow.txt | 28.9 KiB | 2015-Sep-09 21:16 |
DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Slides.mp4 | 41.5 MiB | 2015-Nov-30 07:05 |
DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Slides.srt | 48.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers.txt | 33.2 KiB | 2015-Sep-09 20:51 |
DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Slides.mp4 | 47.3 MiB | 2015-Nov-30 07:08 |
DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Slides.srt | 28.3 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams.txt | 19.1 KiB | 2015-Sep-09 23:13 |
DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Slides.mp4 | 32.2 MiB | 2015-Nov-30 07:10 |
DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Slides.srt | 29.7 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows.txt | 20.0 KiB | 2015-Sep-09 21:31 |
DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Slides.mp4 | 41.1 MiB | 2015-Nov-30 07:14 |
DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Slides.srt | 38.2 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Slides.mp4 | 33.7 MiB | 2015-Nov-30 07:17 |
DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Slides.srt | 43.9 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures.txt | 29.7 KiB | 2015-Sep-10 01:46 |
DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - Slides.mp4 | 34.3 MiB | 2015-Nov-30 07:20 |
DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - Slides.srt | 45.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware.txt | 30.7 KiB | 2015-Sep-10 02:08 |
DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Slides.mp4 | 42.6 MiB | 2015-Nov-30 07:24 |
DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Slides.srt | 44.2 KiB | 2015-Dec-31 23:08 |
DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster.txt | 29.5 KiB | 2015-Sep-09 22:59 |
DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Slides.mp4 | 52.8 MiB | 2015-Nov-30 07:28 |
DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Slides.srt | 74.2 KiB | 2015-Dec-31 22:54 |
DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking.txt | 49.8 KiB | 2015-Oct-15 14:05 |
DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Slides.mp4 | 42.7 MiB | 2015-Nov-30 07:31 |
DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Slides.srt | 45.0 KiB | 2015-Dec-31 22:54 |
DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware.txt | 29.6 KiB | 2015-Sep-09 21:36 |
DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Slides.mp4 | 32.3 MiB | 2015-Nov-30 07:34 |
DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Slides.srt | 43.2 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy.txt | 29.3 KiB | 2015-Sep-09 21:40 |
DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - Slides.mp4 | 32.0 MiB | 2015-Nov-30 07:37 |
DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - Slides.srt | 46.6 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Zack Fasel - Seeing through the Fog.txt | 31.2 KiB | 2015-Nov-17 16:32 |
DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Slides.mp4 | 45.0 MiB | 2015-Nov-30 07:40 |
DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Slides.srt | 16.0 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto.txt | 11.0 KiB | 2015-Sep-09 21:43 |
DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Slides.mp4 | 67.6 MiB | 2015-Nov-30 07:45 |
DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Slides.srt | 36.8 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction.txt | 46.9 KiB | 2015-Nov-19 21:08 |
DEF CON 23 Conference - atlas - Fun with Symboliks - Slides.mp4 | 38.1 MiB | 2015-Nov-30 00:33 |
DEF CON 23 Conference - atlas - Fun with Symboliks - Slides.srt | 32.5 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - atlas - Fun with Symboliks.txt | 21.9 KiB | 2015-Sep-09 21:57 |
DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - Slides.mp4 | 14.5 MiB | 2015-Nov-30 04:11 |
DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - Slides.srt | 11.7 KiB | 2015-Dec-31 22:51 |
DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type.txt | 7.8 KiB | 2015-Sep-09 22:20 |