/DEF CON 23/DEF CON 23 video and slides/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 23 Conference - 1057 - RICKASTLEY - Video and Slides.mp483.4 MiB2015-Nov-25 02:41
DEF CON 23 Conference - 1057 - RICKASTLEY - Video and Slides.srt32.5 KiB2015-Dec-31 22:50
DEF CON 23 Conference - 1057 - RICKASTLEY.txt21.9 KiB2015-Nov-20 17:05
DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - Video and Slides.mp468.6 MiB2015-Nov-25 02:44
DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - Video and Slides.srt49.6 KiB2015-Dec-31 22:50
DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy.txt33.1 KiB2015-Sep-09 22:46
DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Video and Slides.mp468.6 MiB2015-Nov-25 02:47
DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Video and Slides.srt44.2 KiB2015-Dec-31 22:50
DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns.txt29.4 KiB2015-Nov-18 19:50
DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure - Video and Slides.mp496.8 MiB2015-Nov-25 02:51
DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure - Video and Slides.srt37.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure.txt24.7 KiB2015-Sep-09 21:49
DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Video and Slides.mp455.2 MiB2015-Nov-25 02:53
DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Video and Slides.srt23.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track.txt15.5 KiB2015-Sep-09 22:44
DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - Video and Slides.mp465.2 MiB2015-Nov-25 02:56
DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - Video and Slides.srt30.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention.txt20.9 KiB2015-Sep-09 21:44
DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Video and Slides.mp442.0 MiB2015-Nov-25 02:59
DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Video and Slides.srt33.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring.txt22.6 KiB2015-Nov-19 21:43
DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Video and Slides.mp493.0 MiB2015-Nov-25 03:06
DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Video and Slides.srt22.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed.txt15.2 KiB2015-Sep-10 02:15
DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - Video and Slides.mp467.6 MiB2015-Nov-25 03:09
DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - Video and Slides.srt29.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth.txt20.1 KiB2015-Sep-09 23:07
DEF CON 23 Conference - Brent White - Hacking Web Apps - Video and Slides.mp469.9 MiB2015-Nov-25 03:12
DEF CON 23 Conference - Brent White - Hacking Web Apps - Video and Slides.srt40.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Brent White - Hacking Web Apps.txt27.3 KiB2015-Nov-17 16:32
DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - Video and Slides.mp498.4 MiB2015-Nov-25 03:17
DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - Video and Slides.srt43.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk.txt56.0 KiB2015-Sep-17 13:23
DEF CON 23 Conference - Bruce Schneier - Questions and Answers - Video and Slides.mp497.6 MiB2015-Nov-25 03:20
DEF CON 23 Conference - Bruce Schneier - Questions and Answers - Video and Slides.srt48.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Bruce Schneier - Questions and Answers.txt32.4 KiB2015-Sep-09 21:24
DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Video and Slides.mp492.2 MiB2015-Nov-25 03:24
DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Video and Slides.srt34.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle.txt23.4 KiB2015-Sep-10 01:55
DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Video and Slides.mp458.0 MiB2015-Nov-25 03:27
DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Video and Slides.srt29.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warfare in Reverse Engineering.txt19.8 KiB2015-Nov-21 02:43
DEF CON 23 Conference - Chris Rock - I Will Kill You - Video and Slides.mp434.6 MiB2015-Nov-25 03:29
DEF CON 23 Conference - Chris Rock - I Will Kill You - Video and Slides.srt20.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Chris Rock - I Will Kill You.txt13.5 KiB2015-Sep-09 21:57
DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - Video and Slides.mp466.1 MiB2015-Nov-25 03:32
DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - Video and Slides.srt36.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS.txt24.7 KiB2015-Sep-23 18:31
DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Video and Slides.mp494.5 MiB2015-Nov-25 03:36
DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Video and Slides.srt32.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF.txt21.8 KiB2015-Sep-09 22:22
DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Video and Slides.mp458.4 MiB2015-Nov-25 03:39
DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Video and Slides.srt54.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service.txt36.5 KiB2015-Sep-09 23:06
DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Video and Slides.mp488.1 MiB2015-Nov-25 03:42
DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Video and Slides.srt53.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit.txt35.4 KiB2015-Sep-10 02:09
DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers - Video and Slides.mp4107.1 MiB2015-Nov-25 03:46
DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers - Video and Slides.srt70.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers.txt46.6 KiB2015-Sep-09 22:11
DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - Video and Slides.mp446.2 MiB2015-Nov-25 03:49
DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - Video and Slides.srt39.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools.txt26.6 KiB2015-Sep-09 21:47
DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Video and Slides.mp470.8 MiB2015-Nov-25 03:52
DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Video and Slides.srt48.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research.txt32.9 KiB2015-Sep-10 02:01
DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - Video and Slides.mp463.7 MiB2015-Nov-25 04:55
DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - Video and Slides.srt60.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON.txt24.3 KiB2015-Oct-14 20:02
DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Video and Slides.mp465.6 MiB2015-Nov-25 03:55
DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Video and Slides.srt32.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village.txt19.9 KiB2015-Sep-23 16:41
DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Video and Slides.mp464.3 MiB2015-Nov-25 03:59
DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Video and Slides.srt33.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment.txt22.3 KiB2015-Sep-09 21:19
DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - Video and Slides.mp496.3 MiB2015-Nov-25 04:03
DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - Video and Slides.srt40.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet.txt27.3 KiB2015-Nov-19 22:03
DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Video and Slides.mp4237.7 MiB2015-Aug-27 05:19
DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Video and Slides.srt52.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You.txt35.5 KiB2015-Sep-10 02:07
DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Video and Slides.mp457.0 MiB2015-Nov-25 04:30
DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Video and Slides.srt37.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns.txt25.3 KiB2015-Sep-09 21:58
DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - Video and Slides.mp431.8 MiB2015-Nov-25 04:32
DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - Video and Slides.srt27.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us.txt18.1 KiB2015-Oct-17 01:53
DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused - Video and Slides.mp477.1 MiB2015-Nov-25 04:35
DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused.txt33.4 KiB2015-Nov-23 22:58
DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Video and Slides.mp489.1 MiB2015-Nov-25 04:38
DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Video and Slides.srt49.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You.txt32.9 KiB2015-Sep-10 18:00
DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Video and Slides.mp485.3 MiB2015-Nov-25 04:42
DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Video and Slides.srt38.1 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems.txt25.6 KiB2015-Sep-09 22:20
DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn - Video and Slides.mp445.9 MiB2015-Nov-25 04:46
DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - Video and Slides.srt36.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs.txt24.5 KiB2015-Sep-09 21:29
DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - Video and Slides.mp463.2 MiB2015-Nov-25 04:49
DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - Video and Slides.srt37.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires.txt25.0 KiB2015-Nov-19 21:24
DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - Video and Slides.mp449.6 MiB2015-Nov-25 04:52
DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - Video and Slides.srt34.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All.txt23.6 KiB2015-Sep-09 21:47
DEF CON 23 Conference - Eijah - Crypto for Hackers - Video and Slides.mp499.1 MiB2015-Nov-25 04:59
DEF CON 23 Conference - Eijah - Crypto for Hackers - Video and Slides.srt59.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Eijah - Crypto for Hackers.txt39.9 KiB2015-Sep-10 18:29
DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Video and Slides.mp429.8 MiB2015-Nov-25 05:01
DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Video and Slides.srt17.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers.txt11.9 KiB2015-Sep-09 22:37
DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - Video and Slides.mp448.0 MiB2015-Nov-25 05:04
DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - Video and Slides.srt52.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS.txt35.1 KiB2015-Nov-20 23:28
DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Video and Slides.mp479.5 MiB2015-Nov-25 05:07
DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Video and Slides.srt43.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core.txt28.8 KiB2015-Sep-09 21:39
DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - Video and Slides.mp450.9 MiB2015-Nov-25 05:10
DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - Video and Slides.srt40.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks.txt27.1 KiB2015-Sep-09 22:34
DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Video and Slides.mp4102.8 MiB2015-Nov-25 05:14
DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Video and Slides.srt49.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID.txt33.8 KiB2015-Sep-09 21:24
DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Video and Slides.mp493.8 MiB2015-Nov-25 05:18
DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Video and Slides.srt57.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter.txt38.8 KiB2015-Sep-09 21:51
DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Video and Slides.mp478.3 MiB2015-Nov-25 05:21
DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Video and Slides.srt49.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack.txt33.4 KiB2015-Nov-20 22:16
DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - Video and Slides.mp450.0 MiB2015-Nov-25 05:23
DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - Video and Slides.srt30.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio.txt21.0 KiB2015-Sep-09 21:45
DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Video and Slides.mp464.9 MiB2015-Nov-25 05:27
DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Video and Slides.srt61.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence.txt41.3 KiB2015-Sep-24 14:35
DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - Video and Slides.mp467.4 MiB2015-Nov-25 05:31
DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - Video and Slides.srt49.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks.txt32.8 KiB2015-Oct-20 16:55
DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - Video and Slides.mp422.9 MiB2015-Nov-25 05:32
DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - Video and Slides.srt13.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR.txt9.1 KiB2015-Sep-09 21:32
DEF CON 23 Conference - Ian Latter - Remote Access - the APT - Video and Slides.mp461.6 MiB2015-Nov-25 05:35
DEF CON 23 Conference - Ian Latter - Remote Access - the APT - Video and Slides.srt47.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ian Latter - Remote Access - the APT.txt32.0 KiB2015-Sep-09 22:13
DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Video and Slides.mp444.9 MiB2015-Nov-25 05:38
DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Video and Slides.srt29.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers.txt19.5 KiB2015-Nov-19 21:09
DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Video and Slides.mp494.7 MiB2015-Nov-25 05:42
DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Video and Slides.srt52.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015.txt34.7 KiB2015-Sep-09 22:38
DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Video and Slides.mp462.7 MiB2015-Nov-25 05:44
DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Video and Slides.srt21.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security.txt14.5 KiB2015-Nov-18 02:33
DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Video and Slides.mp472.5 MiB2015-Nov-25 05:47
DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Video and Slides.srt46.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications.txt31.0 KiB2015-Sep-09 22:11
DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Video and Slides.mp483.7 MiB2015-Nov-25 05:51
DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Video and Slides.srt41.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants.txt27.5 KiB2015-Nov-17 02:27
DEF CON 23 Conference - John Menerick - Backdooring Git - Video and Slides.mp480.0 MiB2015-Nov-25 05:54
DEF CON 23 Conference - John Menerick - Backdooring Git - Video and Slides.srt40.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - John Menerick - Backdooring Git.txt26.9 KiB2015-Sep-09 21:56
DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - Video and Slides.mp430.9 MiB2015-Nov-25 05:56
DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - Video and Slides.srt38.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - John Seymour - Quantum Classification of Malware.txt25.3 KiB2015-Nov-20 19:54
DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.mp492.5 MiB2015-Nov-25 06:00
DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.srt34.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.txt22.9 KiB2015-Nov-19 02:14
DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Video and Slides.mp488.1 MiB2015-Nov-25 06:04
DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Video and Slides.srt44.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android.txt30.2 KiB2015-Sep-09 21:38
DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Video and Slides.mp450.5 MiB2015-Nov-25 06:08
DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Video and Slides.srt54.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC.txt36.8 KiB2015-Sep-10 01:25
DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - Video and Slides.mp4103.6 MiB2015-Nov-25 06:12
DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - Video and Slides.srt64.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People.txt43.2 KiB2015-Sep-09 21:57
DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - Video and Slides.mp476.5 MiB2015-Nov-25 06:15
DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - Video and Slides.srt55.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker.txt37.3 KiB2015-Sep-10 02:08
DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Video and Slides.mp4103.4 MiB2015-Nov-25 06:19
DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Video and Slides.srt50.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion.txt33.5 KiB2015-Sep-09 21:34
DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Video and Slides.mp466.4 MiB2015-Nov-25 06:21
DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Video and Slides.srt20.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR.txt13.8 KiB2015-Sep-09 21:55
DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - Video and Slides.mp438.4 MiB2015-Nov-25 06:27
DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - Video and Slides.srt18.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings.txt12.5 KiB2015-Sep-09 21:32
DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Video and Slides.mp493.9 MiB2015-Nov-25 06:31
DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Video and Slides.srt41.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S.txt27.7 KiB2015-Sep-09 21:54
DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Video and Slides.mp468.1 MiB2015-Nov-25 06:35
DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Video and Slides.srt44.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic.txt29.4 KiB2015-Sep-09 22:43
DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Video and Slides.mp4108.2 MiB2015-Nov-25 06:40
DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Video and Slides.srt38.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb.txt25.7 KiB2015-Sep-10 01:53
DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Video and Slides.mp437.7 MiB2015-Nov-25 06:41
DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Video and Slides.srt12.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern.txt8.2 KiB2015-Sep-10 02:12
DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Video and Slides.mp488.5 MiB2015-Nov-25 06:45
DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Video and Slides.srt60.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars.txt40.1 KiB2015-Sep-09 21:30
DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Video and Slides.mp497.6 MiB2015-Nov-25 06:49
DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Video and Slides.srt57.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System.txt39.1 KiB2015-Nov-21 02:35
DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Video and Slides.mp479.0 MiB2015-Nov-25 06:53
DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Video and Slides.srt58.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers.txt38.6 KiB2015-Nov-19 23:46
DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Video and Slides.mp466.8 MiB2015-Nov-25 06:57
DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Video and Slides.srt47.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There.txt31.7 KiB2015-Sep-09 21:29
DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Video and Slides.mp483.2 MiB2015-Nov-25 07:01
DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Video and Slides.srt38.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF.txt25.8 KiB2015-Sep-10 01:52
DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Video and Slides.mp483.3 MiB2015-Nov-25 07:04
DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Video and Slides.srt27.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop.txt18.7 KiB2015-Sep-09 22:56
DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Video and Slides.mp480.8 MiB2015-Nov-25 07:08
DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Video and Slides.srt32.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards.txt21.8 KiB2015-Sep-10 01:56
DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - Video and Slides.mp486.0 MiB2015-Nov-25 07:11
DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - Video and Slides.srt46.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You.txt31.1 KiB2015-Sep-09 21:33
DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Video and Slides.mp449.1 MiB2015-Nov-25 07:14
DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Video and Slides.srt25.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Video and Slides.mp464.0 MiB2015-Nov-25 07:17
DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Video and Slides.srt39.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack.txt25.9 KiB2015-Sep-09 21:30
DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Video and Slides.mp487.8 MiB2015-Nov-25 07:20
DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Video and Slides.srt52.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS.txt35.0 KiB2015-Nov-16 23:38
DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - Video and Slides.mp476.0 MiB2015-Nov-25 07:24
DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - Video and Slides.srt31.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks.txt20.9 KiB2015-Sep-09 21:53
DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - Video and Slides.mp446.2 MiB2015-Nov-25 07:27
DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - Video and Slides.srt43.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs.txt29.2 KiB2015-Sep-09 21:28
DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties - Video and Slides.mp4207.7 MiB2015-Nov-25 07:35
DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties - Video and Slides.srt72.5 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties.txt48.5 KiB2015-Sep-10 02:04
DEF CON 23 Conference - Panel - Closing Ceremonies - Video and Slides.mp4173.2 MiB2015-Nov-25 07:41
DEF CON 23 Conference - Panel - Closing Ceremonies - Video and Slides.srt77.7 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - Closing Ceremonies.txt52.6 KiB2015-Sep-09 22:17
DEF CON 23 Conference - Panel - Contests Closing Ceremonies - Video and Slides.mp453.7 MiB2015-Nov-25 07:44
DEF CON 23 Conference - Panel - Contests Closing Ceremonies - Video and Slides.srt29.8 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - Contests Closing Ceremonies.txt20.1 KiB2015-Nov-23 21:07
DEF CON 23 Conference - Panel - DEF CON 101 The Panel - Video and Slides.mp4102.7 MiB2015-Nov-25 07:50
DEF CON 23 Conference - Panel - DEF CON 101 The Panel - Video and Slides.srt86.5 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - DEF CON 101 The Panel.txt58.5 KiB2015-Sep-09 21:16
DEF CON 23 Conference - Panel - DEF CON Comedy Inception - Video and Slides.mp4139.3 MiB2015-Nov-25 07:57
DEF CON 23 Conference - Panel - DEF CON Comedy Inception - Video and Slides.srt86.2 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - DEF CON Comedy Inception.txt60.0 KiB2015-Nov-18 00:17
DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Video and Slides.mp449.6 MiB2015-Nov-25 08:00
DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Video and Slides.srt26.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques.txt17.9 KiB2015-Sep-09 21:25
DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Video and Slides.mp495.3 MiB2015-Nov-25 08:04
DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Video and Slides.srt43.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web.txt28.9 KiB2015-Sep-09 22:56
DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Video and Slides.mp4175.8 MiB2015-Nov-25 08:12
DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Video and Slides.srt111.4 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research.txt74.1 KiB2015-Sep-09 21:51
DEF CON 23 Conference - Panel - Switches Get Stitches - Video and Slides.mp489.0 MiB2015-Nov-25 08:16
DEF CON 23 Conference - Panel - Switches Get Stitches - Video and Slides.srt30.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Panel - Switches Get Stitches.txt20.5 KiB2015-Sep-10 01:45
DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - Video and Slides.mp480.7 MiB2015-Nov-25 08:19
DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - Video and Slides.srt38.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike.txt25.9 KiB2015-Sep-10 01:51
DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Video and Slides.mp4119.2 MiB2015-Nov-25 08:27
DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Video and Slides.srt103.5 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis.txt70.1 KiB2015-Sep-10 01:34
DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - Video and Slides.mp447.9 MiB2015-Nov-25 08:31
DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - Video and Slides.srt47.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X.txt31.7 KiB2015-Sep-10 02:00
DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Video and Slides.mp456.9 MiB2015-Nov-25 08:34
DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Video and Slides.srt50.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It.txt33.6 KiB2015-Nov-20 22:19
DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Video and Slides.mp434.5 MiB2015-Nov-25 08:36
DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Video and Slides.srt22.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain.txt15.3 KiB2015-Nov-20 23:09
DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - Video and Slides.mp469.8 MiB2015-Nov-25 08:38
DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - Video and Slides.srt24.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation.txt16.8 KiB2015-Sep-09 21:41
DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Video and Slides.mp481.7 MiB2015-Nov-25 08:42
DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Video and Slides.srt62.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery.txt42.4 KiB2015-Sep-09 23:05
DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Video and Slides.mp444.7 MiB2015-Nov-25 08:44
DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Video and Slides.srt16.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee.txt11.1 KiB2015-Nov-17 19:44
DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - Video and Slides.mp431.5 MiB2015-Nov-25 08:45
DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - Video and Slides.srt16.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy.txt10.8 KiB2015-Sep-09 21:56
DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - Video and Slides.mp483.8 MiB2015-Nov-25 08:49
DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - Video and Slides.srt45.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain.txt30.0 KiB2015-Sep-09 23:03
DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Video and Slides.mp472.4 MiB2015-Nov-25 08:53
DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Video and Slides.srt39.6 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP.txt26.6 KiB2015-Sep-09 21:56
DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Video and Slides.mp485.0 MiB2015-Nov-25 08:56
DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Video and Slides.srt53.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer.txt36.1 KiB2015-Sep-09 21:49
DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Video and Slides.mp479.7 MiB2015-Nov-25 09:00
DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Video and Slides.srt59.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline.txt40.1 KiB2015-Sep-09 21:34
DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Video and Slides.mp477.1 MiB2015-Nov-25 09:04
DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Video and Slides.srt62.1 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments.txt41.4 KiB2015-Oct-19 18:03
DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle - Video and Slides.mp470.0 MiB2015-Nov-25 09:07
DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle - Video and Slides.srt53.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle.txt36.5 KiB2015-Sep-09 21:46
DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Video and Slides.mp487.6 MiB2015-Nov-25 09:10
DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Video and Slides.srt44.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets.txt29.8 KiB2015-Nov-20 23:05
DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - Video and Slides.mp446.6 MiB2015-Nov-25 09:12
DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - Video and Slides.srt17.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans.txt11.5 KiB2015-Sep-10 02:13
DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Video and Slides.mp447.9 MiB2015-Nov-25 09:16
DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Video and Slides.srt56.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS.txt37.1 KiB2015-Nov-20 20:13
DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Video and Slides.mp476.1 MiB2015-Nov-25 09:19
DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Video and Slides.srt54.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars.txt36.8 KiB2015-Sep-09 21:52
DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Video and Slides.mp476.1 MiB2015-Nov-25 09:23
DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Video and Slides.srt45.4 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You.txt30.9 KiB2015-Sep-09 21:15
DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Video and Slides.mp445.6 MiB2015-Nov-25 09:26
DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Video and Slides.srt35.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots.txt23.5 KiB2015-Sep-09 21:30
DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Video and Slides.mp496.9 MiB2015-Nov-25 09:30
DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Video and Slides.srt60.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense.txt40.7 KiB2015-Sep-10 18:18
DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - Video and Slides.mp496.9 MiB2015-Nov-25 09:34
DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - Video and Slides.srt44.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation.txt30.4 KiB2015-Sep-09 21:08
DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Video and Slides.mp485.5 MiB2015-Nov-25 09:37
DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Video and Slides.srt34.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis.txt23.5 KiB2015-Sep-10 01:54
DEF CON 23 Conference - Spot the FED.mp430.4 MiB2015-Nov-25 10:36
DEF CON 23 Conference - Spot the FED.srt9.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Spot the FED.txt6.2 KiB2015-Sep-10 00:35
DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - Video and Slides.mp483.8 MiB2015-Nov-25 09:41
DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - Video and Slides.srt29.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game.txt20.3 KiB2015-Sep-09 21:36
DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Video and Slides.mp482.7 MiB2015-Nov-25 09:44
DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Video and Slides.srt56.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5.txt38.0 KiB2015-Nov-17 16:32
DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Video and Slides.mp492.7 MiB2015-Nov-25 09:48
DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Video and Slides.srt58.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool.txt39.2 KiB2015-Nov-19 21:28
DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Video and Slides.mp460.1 MiB2015-Nov-25 09:51
DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Video and Slides.srt42.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow.txt28.9 KiB2015-Sep-09 21:16
DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Video and Slides.mp494.6 MiB2015-Nov-25 09:55
DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Video and Slides.srt48.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers.txt33.2 KiB2015-Sep-09 20:51
DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Video and Slides.mp483.7 MiB2015-Nov-25 09:58
DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Video and Slides.srt28.3 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams.txt19.1 KiB2015-Sep-09 23:13
DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Video and Slides.mp458.3 MiB2015-Nov-25 10:01
DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Video and Slides.srt29.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows.txt20.0 KiB2015-Sep-09 21:31
DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Video and Slides.mp475.4 MiB2015-Nov-25 10:04
DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Video and Slides.srt38.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Video and Slides.mp438.6 MiB2015-Nov-25 10:08
DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Video and Slides.srt43.9 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures.txt29.7 KiB2015-Sep-10 01:46
DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - Video and Slides.mp477.8 MiB2015-Nov-25 10:10
DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - Video and Slides.srt45.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware.txt30.7 KiB2015-Sep-10 02:08
DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Video and Slides.mp476.5 MiB2015-Nov-25 10:14
DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Video and Slides.srt44.2 KiB2015-Dec-31 23:08
DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster.txt29.5 KiB2015-Sep-09 22:59
DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Video and Slides.mp497.8 MiB2015-Nov-25 10:18
DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Video and Slides.srt74.2 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking.txt49.8 KiB2015-Oct-15 14:05
DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Video and Slides.mp479.4 MiB2015-Nov-25 10:21
DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Video and Slides.srt45.0 KiB2015-Dec-31 22:54
DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware.txt29.6 KiB2015-Sep-09 21:36
DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Video and Slides.mp464.9 MiB2015-Nov-25 10:24
DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Video and Slides.srt43.2 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy.txt29.3 KiB2015-Sep-09 21:40
DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - Video and Slides.mp464.3 MiB2015-Nov-25 10:27
DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - Video and Slides.srt46.6 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Zack Fasel - Seeing through the Fog.txt31.2 KiB2015-Nov-17 16:32
DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Video and Slides.mp476.2 MiB2015-Nov-25 10:30
DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Video and Slides.srt16.0 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto.txt11.0 KiB2015-Sep-09 21:43
DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Video and Slides.mp4100.8 MiB2015-Nov-25 10:35
DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Video and Slides.srt36.8 KiB2015-Dec-31 22:51
DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction.txt46.9 KiB2015-Nov-19 21:08
DEF CON 23 Conference - atlas - Fun with Symboliks - Video and Slides.mp486.8 MiB2015-Nov-25 03:03
DEF CON 23 Conference - atlas - Fun with Symboliks - Video and Slides.srt32.5 KiB2015-Dec-31 22:51
DEF CON 23 Conference - atlas - Fun with Symboliks.txt21.9 KiB2015-Sep-09 21:57
DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - Video and Slides.mp422.6 MiB2015-Nov-25 06:54
DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - Video and Slides.srt11.7 KiB2015-Dec-31 22:51
DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type.txt7.8 KiB2015-Sep-09 22:20