/DEF CON 23/DEF CON 23 slides/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 23 Conference - 1057 - RICKASTLEY - Slides.mp432.1 MiB2015-Nov-30 00:15
DEF CON 23 Conference - 1057 - RICKASTLEY - Slides.srt32.5 KiB2015-Dec-31 22:50
DEF CON 23 Conference - 1057 - RICKASTLEY.txt21.9 KiB2015-Nov-20 17:05
DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - Slides.mp432.7 MiB2015-Nov-30 00:18
DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - Slides.srt49.6 KiB2015-Dec-31 22:50
DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy.txt33.1 KiB2015-Sep-09 22:46
DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Slides.mp429.5 MiB2015-Nov-30 00:21
DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Slides.srt44.2 KiB2015-Dec-31 22:50
DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns.txt29.4 KiB2015-Nov-18 19:50
DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure - Slides.srt37.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure.txt24.7 KiB2015-Sep-09 21:49
DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Slides.mp432.3 MiB2015-Nov-30 00:24
DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Slides.srt23.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track.txt15.5 KiB2015-Sep-09 22:44
DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - Slides.mp429.2 MiB2015-Nov-30 00:27
DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - Slides.srt30.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention.txt20.9 KiB2015-Sep-09 21:44
DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Slides.mp430.7 MiB2015-Nov-30 00:30
DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Slides.srt33.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring.txt22.6 KiB2015-Nov-19 21:43
DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Slides.mp445.4 MiB2015-Nov-30 00:37
DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Slides.srt22.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed.txt15.2 KiB2015-Sep-10 02:15
DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - Slides.mp438.2 MiB2015-Nov-30 00:40
DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - Slides.srt29.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth.txt20.1 KiB2015-Sep-09 23:07
DEF CON 23 Conference - Brent White - Hacking Web Apps - Slides.mp431.1 MiB2015-Nov-30 00:43
DEF CON 23 Conference - Brent White - Hacking Web Apps - Slides.srt40.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Brent White - Hacking Web Apps.txt27.3 KiB2015-Nov-17 16:32
DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - Slides.mp447.6 MiB2015-Nov-30 00:47
DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - Slides.srt43.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk.txt56.0 KiB2015-Sep-17 13:23
DEF CON 23 Conference - Bruce Schneier - Questions and Answers - Slides.srt48.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Bruce Schneier - Questions and Answers.txt32.4 KiB2015-Sep-09 21:24
DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Slides.mp453.6 MiB2015-Nov-30 00:51
DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Slides.srt34.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle.txt23.4 KiB2015-Sep-10 01:55
DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Slides.mp448.2 MiB2015-Nov-30 07:48
DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Slides.srt29.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warfare in Reverse Engineering.txt19.8 KiB2015-Nov-21 02:43
DEF CON 23 Conference - Chris Rock - I Will Kill You - Slides.mp439.3 MiB2015-Nov-30 00:54
DEF CON 23 Conference - Chris Rock - I Will Kill You - Slides.srt20.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Chris Rock - I Will Kill You.txt13.5 KiB2015-Sep-09 21:57
DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - Slides.mp434.9 MiB2015-Nov-30 00:57
DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - Slides.srt36.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS.txt24.7 KiB2015-Sep-23 18:31
DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Slides.mp451.3 MiB2015-Nov-30 01:00
DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Slides.srt32.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF.txt21.8 KiB2015-Sep-09 22:22
DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Slides.mp435.1 MiB2015-Nov-30 01:03
DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Slides.srt54.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service.txt36.5 KiB2015-Sep-09 23:06
DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Slides.mp449.1 MiB2015-Nov-30 01:07
DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Slides.srt53.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit.txt35.4 KiB2015-Sep-10 02:09
DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers - Slides.srt70.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers.txt46.6 KiB2015-Sep-09 22:11
DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - Slides.mp430.0 MiB2015-Nov-30 01:09
DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - Slides.srt39.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools.txt26.6 KiB2015-Sep-09 21:47
DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Slides.mp445.7 MiB2015-Nov-30 01:13
DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Slides.srt48.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research.txt32.9 KiB2015-Sep-10 02:01
DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - Slides.mp432.2 MiB2015-Nov-30 02:08
DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - Slides.srt60.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON.txt24.3 KiB2015-Oct-14 20:02
DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Slides.mp434.7 MiB2015-Nov-30 01:16
DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Slides.srt32.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village.txt19.9 KiB2015-Sep-23 16:41
DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Slides.mp440.9 MiB2015-Nov-30 01:20
DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Slides.srt33.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment.txt22.3 KiB2015-Sep-09 21:19
DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - Slides.mp446.1 MiB2015-Nov-30 01:24
DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - Slides.srt40.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet.txt27.3 KiB2015-Nov-19 22:03
DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Slides.mp4605.9 MiB2015-Oct-17 02:50
DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Slides.srt52.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You.txt35.5 KiB2015-Sep-10 02:07
DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Slides.mp437.9 MiB2015-Nov-30 01:43
DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Slides.srt37.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns.txt25.3 KiB2015-Sep-09 21:58
DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - Slides.mp418.6 MiB2015-Nov-30 01:44
DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - Slides.srt27.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us.txt18.1 KiB2015-Oct-17 01:53
DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused - Slides.mp445.2 MiB2015-Nov-30 01:48
DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused.txt33.4 KiB2015-Nov-23 22:58
DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Slides.mp427.3 MiB2015-Nov-30 01:51
DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Slides.srt49.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You.txt32.9 KiB2015-Sep-10 18:00
DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Slides.mp445.0 MiB2015-Nov-30 01:55
DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Slides.srt38.1 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems.txt25.6 KiB2015-Sep-09 22:20
DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - Slides.mp437.8 MiB2015-Nov-30 01:59
DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - Slides.srt36.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs.txt24.5 KiB2015-Sep-09 21:29
DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - Slides.mp443.6 MiB2015-Nov-30 02:02
DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - Slides.srt37.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires.txt25.0 KiB2015-Nov-19 21:24
DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - Slides.mp436.5 MiB2015-Nov-30 02:05
DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - Slides.srt34.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All.txt23.6 KiB2015-Sep-09 21:47
DEF CON 23 Conference - Eijah - Crypto for Hackers - Slides.mp442.2 MiB2015-Nov-30 02:12
DEF CON 23 Conference - Eijah - Crypto for Hackers - Slides.srt59.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Eijah - Crypto for Hackers.txt39.9 KiB2015-Sep-10 18:29
DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Slides.mp416.9 MiB2015-Nov-30 02:14
DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Slides.srt17.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers.txt11.9 KiB2015-Sep-09 22:37
DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - Slides.mp455.2 MiB2015-Nov-30 02:17
DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - Slides.srt52.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS.txt35.1 KiB2015-Nov-20 23:28
DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Slides.mp438.4 MiB2015-Nov-30 02:20
DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Slides.srt43.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core.txt28.8 KiB2015-Sep-09 21:39
DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - Slides.mp428.5 MiB2015-Nov-30 02:23
DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - Slides.srt40.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks.txt27.1 KiB2015-Sep-09 22:34
DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Slides.mp451.8 MiB2015-Nov-30 02:27
DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Slides.srt49.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID.txt33.8 KiB2015-Sep-09 21:24
DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Slides.mp448.5 MiB2015-Nov-30 02:31
DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Slides.srt57.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter.txt38.8 KiB2015-Sep-09 21:51
DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Slides.mp433.0 MiB2015-Nov-30 02:34
DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Slides.srt49.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack.txt33.4 KiB2015-Nov-20 22:16
DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - Slides.mp426.3 MiB2015-Nov-30 02:37
DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - Slides.srt30.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio.txt21.0 KiB2015-Sep-09 21:45
DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Slides.mp446.8 MiB2015-Nov-30 02:40
DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Slides.srt61.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence.txt41.3 KiB2015-Sep-24 14:35
DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - Slides.mp441.2 MiB2015-Nov-30 02:44
DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - Slides.srt49.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks.txt32.8 KiB2015-Oct-20 16:55
DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - Slides.mp49.7 MiB2015-Nov-30 02:45
DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - Slides.srt13.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR.txt9.1 KiB2015-Sep-09 21:32
DEF CON 23 Conference - Ian Latter - Remote Access - the APT - Slides.mp449.8 MiB2015-Nov-30 02:48
DEF CON 23 Conference - Ian Latter - Remote Access - the APT - Slides.srt47.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ian Latter - Remote Access - the APT.txt32.0 KiB2015-Sep-09 22:13
DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Slides.mp447.4 MiB2015-Nov-30 02:52
DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Slides.srt29.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers.txt19.5 KiB2015-Nov-19 21:09
DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Slides.mp442.8 MiB2015-Nov-30 02:56
DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Slides.srt52.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015.txt34.7 KiB2015-Sep-09 22:38
DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Slides.mp427.5 MiB2015-Nov-30 02:59
DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Slides.srt21.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security.txt14.5 KiB2015-Nov-18 02:33
DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Slides.mp436.5 MiB2015-Nov-30 03:03
DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Slides.srt46.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications.txt31.0 KiB2015-Sep-09 22:11
DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Slides.mp440.1 MiB2015-Nov-30 03:07
DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Slides.srt41.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants.txt27.5 KiB2015-Nov-17 02:27
DEF CON 23 Conference - John Menerick - Backdooring Git - Slides.mp445.1 MiB2015-Nov-30 03:10
DEF CON 23 Conference - John Menerick - Backdooring Git - Slides.srt40.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - John Menerick - Backdooring Git.txt26.9 KiB2015-Sep-09 21:56
DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - Slides.mp421.9 MiB2015-Nov-30 03:13
DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - Slides.srt38.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - John Seymour - Quantum Classification of Malware.txt25.3 KiB2015-Nov-20 19:54
DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.mp461.2 MiB2015-Nov-30 03:18
DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.srt34.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.txt22.9 KiB2015-Nov-19 02:14
DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Slides.mp450.7 MiB2015-Nov-30 03:22
DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Slides.srt44.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android.txt30.2 KiB2015-Sep-09 21:38
DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Slides.mp439.5 MiB2015-Nov-30 03:25
DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Slides.srt54.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC.txt36.8 KiB2015-Sep-10 01:25
DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - Slides.mp444.3 MiB2015-Nov-30 03:30
DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - Slides.srt64.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People.txt43.2 KiB2015-Sep-09 21:57
DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - Slides.mp438.5 MiB2015-Nov-30 03:33
DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - Slides.srt55.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker.txt37.3 KiB2015-Sep-10 02:08
DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Slides.mp445.3 MiB2015-Nov-30 03:37
DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Slides.srt50.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion.txt33.5 KiB2015-Sep-09 21:34
DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Slides.mp445.6 MiB2015-Nov-30 03:40
DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Slides.srt20.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR.txt13.8 KiB2015-Sep-09 21:55
DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - Slides.mp416.4 MiB2015-Nov-30 03:45
DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - Slides.srt18.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings.txt12.5 KiB2015-Sep-09 21:32
DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Slides.mp449.5 MiB2015-Nov-30 03:49
DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Slides.srt41.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S.txt27.7 KiB2015-Sep-09 21:54
DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Slides.mp435.0 MiB2015-Nov-30 03:52
DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Slides.srt44.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic.txt29.4 KiB2015-Sep-09 22:43
DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Slides.mp461.2 MiB2015-Nov-30 03:57
DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Slides.srt38.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb.txt25.7 KiB2015-Sep-10 01:53
DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Slides.mp412.9 MiB2015-Nov-30 03:58
DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Slides.srt12.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern.txt8.2 KiB2015-Sep-10 02:12
DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Slides.mp448.7 MiB2015-Nov-30 04:02
DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Slides.srt60.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars.txt40.1 KiB2015-Sep-09 21:30
DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Slides.mp446.5 MiB2015-Nov-30 04:06
DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Slides.srt57.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System.txt39.1 KiB2015-Nov-21 02:35
DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Slides.mp444.9 MiB2015-Nov-30 04:10
DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Slides.srt58.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers.txt38.6 KiB2015-Nov-19 23:46
DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Slides.mp434.9 MiB2015-Nov-30 04:15
DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Slides.srt47.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There.txt31.7 KiB2015-Sep-09 21:29
DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Slides.mp451.1 MiB2015-Nov-30 04:18
DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Slides.srt38.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF.txt25.8 KiB2015-Sep-10 01:52
DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Slides.mp448.8 MiB2015-Nov-30 04:22
DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Slides.srt27.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop.txt18.7 KiB2015-Sep-09 22:56
DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Slides.mp445.3 MiB2015-Nov-30 04:25
DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Slides.srt32.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards.txt21.8 KiB2015-Sep-10 01:56
DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - Slides.mp440.6 MiB2015-Nov-30 04:29
DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - Slides.srt46.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You.txt31.1 KiB2015-Sep-09 21:33
DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Slides.mp428.8 MiB2015-Nov-30 04:31
DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Slides.srt25.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Slides.mp441.8 MiB2015-Nov-30 04:34
DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Slides.srt39.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack.txt25.9 KiB2015-Sep-09 21:30
DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Slides.mp439.6 MiB2015-Nov-30 04:38
DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Slides.srt52.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS.txt35.0 KiB2015-Nov-16 23:38
DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - Slides.mp449.4 MiB2015-Nov-30 04:42
DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - Slides.srt31.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks.txt20.9 KiB2015-Sep-09 21:53
DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - Slides.mp431.2 MiB2015-Nov-30 04:45
DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - Slides.srt43.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs.txt29.2 KiB2015-Sep-09 21:28
DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties - Slides.srt72.5 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties.txt48.5 KiB2015-Sep-10 02:04
DEF CON 23 Conference - Panel - Closing Ceremonies - Slides.mp4178.0 MiB2015-Nov-30 04:52
DEF CON 23 Conference - Panel - Closing Ceremonies - Slides.srt77.7 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - Closing Ceremonies.txt52.6 KiB2015-Sep-09 22:17
DEF CON 23 Conference - Panel - Contests Closing Ceremonies - Slides.mp421.8 MiB2015-Nov-30 04:54
DEF CON 23 Conference - Panel - Contests Closing Ceremonies - Slides.srt29.8 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - Contests Closing Ceremonies.txt20.1 KiB2015-Nov-23 21:07
DEF CON 23 Conference - Panel - DEF CON 101 The Panel - Slides.mp455.2 MiB2015-Nov-30 05:00
DEF CON 23 Conference - Panel - DEF CON 101 The Panel - Slides.srt86.5 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - DEF CON 101 The Panel.txt58.5 KiB2015-Sep-09 21:16
DEF CON 23 Conference - Panel - DEF CON Comedy Inception - Slides.mp4104.3 MiB2015-Nov-30 05:08
DEF CON 23 Conference - Panel - DEF CON Comedy Inception - Slides.srt86.2 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - DEF CON Comedy Inception.txt60.0 KiB2015-Nov-18 00:17
DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Slides.mp430.1 MiB2015-Nov-30 05:11
DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Slides.srt26.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques.txt17.9 KiB2015-Sep-09 21:25
DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Slides.mp441.1 MiB2015-Nov-30 05:15
DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Slides.srt43.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web.txt28.9 KiB2015-Sep-09 22:56
DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Slides.mp483.2 MiB2015-Nov-30 05:23
DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Slides.srt111.4 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research.txt74.1 KiB2015-Sep-09 21:51
DEF CON 23 Conference - Panel - Switches Get Stitches - Slides.mp442.4 MiB2015-Nov-30 05:27
DEF CON 23 Conference - Panel - Switches Get Stitches - Slides.srt30.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Panel - Switches Get Stitches.txt20.5 KiB2015-Sep-10 01:45
DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - Slides.mp440.5 MiB2015-Nov-30 05:30
DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - Slides.srt38.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike.txt25.9 KiB2015-Sep-10 01:51
DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Slides.mp481.0 MiB2015-Nov-30 05:38
DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Slides.srt103.5 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis.txt70.1 KiB2015-Sep-10 01:34
DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - Slides.mp448.0 MiB2015-Nov-30 05:42
DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - Slides.srt47.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X.txt31.7 KiB2015-Sep-10 02:00
DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Slides.mp442.7 MiB2015-Nov-30 05:45
DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Slides.srt50.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It.txt33.6 KiB2015-Nov-20 22:19
DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Slides.mp419.4 MiB2015-Nov-30 05:47
DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Slides.srt22.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain.txt15.3 KiB2015-Nov-20 23:09
DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - Slides.mp444.4 MiB2015-Nov-30 05:50
DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - Slides.srt24.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation.txt16.8 KiB2015-Sep-09 21:41
DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Slides.mp437.9 MiB2015-Nov-30 05:54
DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Slides.srt62.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery.txt42.4 KiB2015-Sep-09 23:05
DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Slides.mp416.6 MiB2015-Nov-30 05:55
DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Slides.srt16.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee.txt11.1 KiB2015-Nov-17 19:44
DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - Slides.mp420.4 MiB2015-Nov-30 05:57
DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - Slides.srt16.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy.txt10.8 KiB2015-Sep-09 21:56
DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - Slides.mp436.2 MiB2015-Nov-30 06:01
DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - Slides.srt45.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain.txt30.0 KiB2015-Sep-09 23:03
DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Slides.mp450.8 MiB2015-Nov-30 06:04
DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Slides.srt39.6 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP.txt26.6 KiB2015-Sep-09 21:56
DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Slides.mp438.3 MiB2015-Nov-30 06:08
DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Slides.srt53.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer.txt36.1 KiB2015-Sep-09 21:49
DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Slides.mp437.6 MiB2015-Nov-30 06:12
DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Slides.srt59.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline.txt40.1 KiB2015-Sep-09 21:34
DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Slides.mp444.3 MiB2015-Nov-30 06:16
DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Slides.srt62.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments.txt41.4 KiB2015-Oct-19 18:03
DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle - Slides.srt53.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle.txt36.5 KiB2015-Sep-09 21:46
DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.mp438.7 MiB2015-Nov-30 06:19
DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.srt44.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets.txt29.8 KiB2015-Nov-20 23:05
DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - Slides.mp432.6 MiB2015-Nov-30 06:21
DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - Slides.srt17.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans.txt11.5 KiB2015-Sep-10 02:13
DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Slides.mp442.5 MiB2015-Nov-30 06:25
DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Slides.srt56.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS.txt37.1 KiB2015-Nov-20 20:13
DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Slides.mp446.8 MiB2015-Nov-30 06:28
DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Slides.srt54.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars.txt36.8 KiB2015-Sep-09 21:52
DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Slides.mp441.3 MiB2015-Nov-30 06:32
DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Slides.srt45.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You.txt30.9 KiB2015-Sep-09 21:15
DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Slides.mp431.4 MiB2015-Nov-30 06:35
DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Slides.srt35.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots.txt23.5 KiB2015-Sep-09 21:30
DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Slides.mp449.4 MiB2015-Nov-30 06:39
DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Slides.srt60.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense.txt40.7 KiB2015-Sep-10 18:18
DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - Slides.mp447.2 MiB2015-Nov-30 06:43
DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - Slides.srt44.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation.txt30.4 KiB2015-Sep-09 21:08
DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Slides.mp443.8 MiB2015-Nov-30 06:47
DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Slides.srt34.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis.txt23.5 KiB2015-Sep-10 01:54
DEF CON 23 Conference - Spot the FED.srt9.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Spot the FED.txt6.2 KiB2015-Sep-10 00:35
DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - Slides.mp440.4 MiB2015-Nov-30 06:50
DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - Slides.srt29.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game.txt20.3 KiB2015-Sep-09 21:36
DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Slides.mp428.9 MiB2015-Nov-30 06:54
DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Slides.srt56.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5.txt38.0 KiB2015-Nov-17 16:32
DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Slides.mp450.9 MiB2015-Nov-30 06:57
DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Slides.srt58.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool.txt39.2 KiB2015-Nov-19 21:28
DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Slides.mp438.3 MiB2015-Nov-30 07:00
DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Slides.srt42.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow.txt28.9 KiB2015-Sep-09 21:16
DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Slides.mp441.5 MiB2015-Nov-30 07:05
DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Slides.srt48.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers.txt33.2 KiB2015-Sep-09 20:51
DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Slides.mp447.3 MiB2015-Nov-30 07:08
DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Slides.srt28.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams.txt19.1 KiB2015-Sep-09 23:13
DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Slides.mp432.2 MiB2015-Nov-30 07:10
DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Slides.srt29.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows.txt20.0 KiB2015-Sep-09 21:31
DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Slides.mp441.1 MiB2015-Nov-30 07:14
DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Slides.srt38.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Slides.mp433.7 MiB2015-Nov-30 07:17
DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Slides.srt43.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures.txt29.7 KiB2015-Sep-10 01:46
DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - Slides.mp434.3 MiB2015-Nov-30 07:20
DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - Slides.srt45.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware.txt30.7 KiB2015-Sep-10 02:08
DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Slides.mp442.6 MiB2015-Nov-30 07:24
DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Slides.srt44.2 KiB2015-Dec-31 23:08
DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster.txt29.5 KiB2015-Sep-09 22:59
DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Slides.mp452.8 MiB2015-Nov-30 07:28
DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Slides.srt74.2 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking.txt49.8 KiB2015-Oct-15 14:05
DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Slides.mp442.7 MiB2015-Nov-30 07:31
DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Slides.srt45.0 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware.txt29.6 KiB2015-Sep-09 21:36
DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Slides.mp432.3 MiB2015-Nov-30 07:34
DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Slides.srt43.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy.txt29.3 KiB2015-Sep-09 21:40
DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - Slides.mp432.0 MiB2015-Nov-30 07:37
DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - Slides.srt46.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Zack Fasel - Seeing through the Fog.txt31.2 KiB2015-Nov-17 16:32
DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Slides.mp445.0 MiB2015-Nov-30 07:40
DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Slides.srt16.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto.txt11.0 KiB2015-Sep-09 21:43
DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Slides.mp467.6 MiB2015-Nov-30 07:45
DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Slides.srt36.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction.txt46.9 KiB2015-Nov-19 21:08
DEF CON 23 Conference - atlas - Fun with Symboliks - Slides.mp438.1 MiB2015-Nov-30 00:33
DEF CON 23 Conference - atlas - Fun with Symboliks - Slides.srt32.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - atlas - Fun with Symboliks.txt21.9 KiB2015-Sep-09 21:57
DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - Slides.mp414.5 MiB2015-Nov-30 04:11
DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - Slides.srt11.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type.txt7.8 KiB2015-Sep-09 22:20