/DEF CON 25/DEF CON 25 audio/flac/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.flac102.8 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc41.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.flac212.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc83.0 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.flac116.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc51.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.flac102.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc35.9 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.flac85.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc25.9 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.flac115.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc54.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.flac83.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc34.2 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.flac53.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc23.1 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.flac41.4 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc8.5 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.flac110.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc47.5 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.flac108.2 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc48.7 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.flac105.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc54.9 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.flac92.8 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc42.1 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.flac116.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc50.0 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.flac98.7 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc30.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.flac124.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc52.5 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.flac124.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc54.4 KiB2017-Oct-03 19:16
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.flac99.2 MiB2018-Jan-18 04:50
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc36.1 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.flac61.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc24.1 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.flac56.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc20.2 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.flac51.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc21.8 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Dor Azouri - BITSInject.flac54.2 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Dor Azouri - BITSInject.lrc17.4 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.flac119.8 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc43.6 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.flac74.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc43.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.flac111.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc52.5 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.flac124.2 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc61.4 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.flac139.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc48.4 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.flac114.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc50.6 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.flac84.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc35.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.flac105.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc41.2 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.flac82.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc29.5 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.flac92.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc28.3 KiB2017-Oct-03 19:17
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.flac290.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc112.2 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.flac49.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc20.4 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.flac140.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc54.6 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.flac126.2 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc50.0 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.flac118.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc35.8 KiB2017-Oct-03 19:17
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.flac94.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc48.3 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.flac73.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc33.3 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.flac103.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc44.0 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.flac149.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc58.0 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.flac117.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc43.8 KiB2017-Oct-03 19:17
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.flac88.4 MiB2018-Jan-18 04:50
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc30.9 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.flac114.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc45.6 KiB2017-Oct-03 19:17
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.flac126.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc51.2 KiB2017-Dec-30 02:23
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.flac107.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc44.7 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.flac58.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc21.8 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.flac99.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc42.4 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.flac56.4 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc30.1 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.flac119.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc53.3 KiB2018-Jan-17 06:28
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.flac37.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc15.3 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.flac138.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc45.7 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.flac64.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc24.1 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.flac109.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc44.1 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.flac130.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc38.9 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.flac116.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc51.4 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.flac118.7 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc42.2 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.flac81.2 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc31.5 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.flac117.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc54.7 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.flac79.8 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc43.2 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.flac91.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc34.6 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.flac126.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc43.9 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.flac98.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc35.1 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.flac102.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc36.2 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.flac57.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc21.1 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.flac69.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc22.8 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.flac87.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc33.2 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.flac114.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc48.7 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.flac78.7 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc29.0 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.flac101.2 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc43.5 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.flac55.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc23.1 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.flac84.2 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc36.3 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.flac131.2 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc29.0 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.flac82.2 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc33.3 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.flac133.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc53.0 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.flac50.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc25.1 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.flac51.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc23.5 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.flac121.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc53.5 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Plore - Popping a Smart Gun.flac97.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc44.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.flac84.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc39.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.flac62.4 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc23.2 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.flac123.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc50.9 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.flac112.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc51.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.flac49.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc15.2 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.flac50.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc25.2 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.flac103.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc46.1 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.flac41.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc14.8 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.flac91.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc37.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.flac105.4 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc50.3 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.flac117.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc44.8 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.flac102.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc38.8 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.flac93.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc36.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.flac125.7 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc40.3 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.flac99.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc35.6 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.flac108.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc40.8 KiB2017-Oct-03 19:20
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.flac40.4 MiB2018-Jan-18 04:50
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc16.3 KiB2017-Oct-03 19:20
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.flac249.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc78.0 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.flac120.7 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc49.4 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.flac76.4 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc28.0 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.flac106.6 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc48.9 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.flac102.7 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc36.2 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.flac299.0 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc139.6 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.flac95.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc47.5 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.flac126.8 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc48.5 KiB2017-Oct-03 19:21
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.flac41.5 MiB2018-Jan-18 04:50
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc21.4 KiB2017-Oct-03 19:21
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.flac122.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc54.1 KiB2017-Oct-03 19:21
DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.flac126.9 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc48.2 KiB2017-Oct-03 19:21
DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.flac108.1 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc27.4 KiB2017-Oct-03 19:21
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.flac145.7 MiB2018-Jan-18 04:50
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc60.4 KiB2017-Oct-03 19:21
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.flac115.3 MiB2018-Jan-18 04:50
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc45.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.flac109.2 MiB2018-Jan-18 04:50
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc43.7 KiB2017-Oct-03 19:20