/DEF CON 25/DEF CON 25 audio/m4a/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc41.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.m4a54.6 MiB2018-Jan-17 05:36
DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc83.0 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel- Meet The Feds.m4a114.4 MiB2018-Jan-17 05:42
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc51.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.m4a60.0 MiB2018-Jan-17 06:23
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc35.9 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.m4a57.0 MiB2018-Jan-17 06:15
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc25.9 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.m4a43.6 MiB2018-Jan-17 06:10
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc54.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on z_OS.m4a61.3 MiB2018-Jan-17 06:11
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc34.2 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.m4a46.6 MiB2018-Jan-17 06:10
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.m4a27.8 MiB2018-Jan-17 06:09
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc23.1 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc8.5 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.m4a21.5 MiB2018-Jan-17 06:11
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc47.5 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.m4a67.1 MiB2018-Jan-17 06:11
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc48.7 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.m4a64.4 MiB2018-Jan-17 06:12
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc54.9 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.m4a53.0 MiB2018-Jan-17 06:12
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc42.1 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.m4a50.7 MiB2018-Jan-17 06:12
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc50.0 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.m4a59.7 MiB2018-Jan-17 07:00
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc30.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.m4a49.3 MiB2018-Jan-17 06:12
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc52.5 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.m4a63.3 MiB2018-Jan-17 06:16
DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc54.4 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.m4a65.7 MiB2018-Jan-17 06:16
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc36.1 KiB2017-Oct-03 19:16
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.m4a55.1 MiB2018-Jan-17 06:16
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc24.1 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.m4a30.7 MiB2018-Jan-17 06:16
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc20.2 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.m4a28.2 MiB2018-Jan-17 05:36
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc21.8 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.m4a30.4 MiB2018-Jan-17 05:37
DEF CON 25 Conference - Dor Azouri - BITSInject.lrc17.4 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Dor Azouri - BITSInject.m4a28.2 MiB2018-Jan-17 05:37
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc43.6 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.m4a60.8 MiB2018-Jan-17 06:55
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc43.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.m4a45.1 MiB2018-Jan-17 06:17
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc52.5 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.m4a58.6 MiB2018-Jan-17 06:17
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc61.4 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.m4a69.4 MiB2018-Jan-17 06:25
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc48.4 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.m4a69.2 MiB2018-Jan-17 06:18
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc50.6 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.m4a58.7 MiB2018-Jan-17 06:18
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc35.3 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.m4a49.8 MiB2018-Jan-17 06:18
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc41.2 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.m4a53.9 MiB2018-Jan-17 06:19
DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc29.5 KiB2017-Oct-03 19:16
DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.m4a42.0 MiB2018-Jan-17 06:19
DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc28.3 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.m4a48.8 MiB2018-Jan-17 06:18
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc112.2 KiB2017-Oct-03 19:17
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.m4a161.5 MiB2018-Jan-17 06:19
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc20.4 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.m4a26.9 MiB2018-Jan-17 06:19
DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc54.6 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.m4a71.4 MiB2018-Jan-17 06:19
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc50.0 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.m4a64.6 MiB2018-Jan-17 06:20
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc35.8 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.m4a60.4 MiB2018-Jan-17 06:20
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc48.3 KiB2017-Oct-03 19:17
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.m4a60.6 MiB2018-Jan-17 06:25
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc33.3 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.m4a39.2 MiB2018-Jan-17 06:20
DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc44.0 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.m4a54.3 MiB2018-Jan-17 06:25
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc58.0 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.m4a76.6 MiB2018-Jan-17 06:26
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc43.8 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.m4a60.6 MiB2018-Jan-17 06:26
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc30.9 KiB2017-Oct-03 19:17
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.m4a44.7 MiB2018-Jan-17 06:27
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc45.6 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.m4a59.9 MiB2018-Jan-17 06:26
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc51.2 KiB2017-Dec-30 02:23
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.m4a69.7 MiB2018-Jan-17 06:26
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc44.7 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks_.m4a54.6 MiB2018-Jan-17 06:27
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc21.8 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.m4a29.4 MiB2018-Jan-17 06:27
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc42.4 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.m4a51.6 MiB2018-Jan-17 06:27
DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc30.1 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.m4a32.7 MiB2018-Jan-17 06:27
DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc53.3 KiB2018-Jan-17 06:28
DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.m4a63.2 MiB2018-Jan-17 06:28
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc15.3 KiB2017-Oct-03 19:17
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.m4a21.2 MiB2018-Jan-17 06:28
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc45.7 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.m4a69.2 MiB2018-Jan-17 06:29
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc24.1 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.m4a33.0 MiB2018-Jan-17 06:28
DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.m4a57.3 MiB2018-Jan-17 06:29
DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc44.1 KiB2017-Oct-03 19:17
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc38.9 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.m4a65.6 MiB2018-Jan-17 06:29
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc51.4 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.m4a59.0 MiB2018-Jan-17 06:29
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc42.2 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.m4a61.7 MiB2018-Jan-17 06:29
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc31.5 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.m4a42.7 MiB2018-Jan-17 06:30
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc54.7 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.m4a64.3 MiB2018-Jan-17 06:30
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc43.2 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.m4a44.1 MiB2018-Jan-17 06:30
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc34.6 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.m4a56.1 MiB2018-Jan-17 06:30
DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc43.9 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.m4a62.0 MiB2018-Jan-17 06:31
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc35.1 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.m4a51.4 MiB2018-Jan-17 06:31
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc36.2 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.m4a54.5 MiB2018-Jan-17 06:31
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc21.1 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.m4a28.7 MiB2018-Jan-17 06:31
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc22.8 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS_iOS Kernel Debugging and Heap Feng Shui.m4a37.5 MiB2018-Jan-17 06:31
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc33.2 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.m4a44.3 MiB2018-Jan-17 06:32
DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc48.7 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.m4a61.9 MiB2018-Jan-17 06:32
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc29.0 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.m4a40.2 MiB2018-Jan-17 06:32
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc43.5 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.m4a56.4 MiB2018-Jan-17 06:32
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc23.1 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.m4a28.8 MiB2018-Jan-17 06:32
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc36.3 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.m4a48.1 MiB2018-Jan-17 06:33
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc29.0 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.m4a64.5 MiB2018-Jan-17 06:33
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc33.3 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.m4a44.2 MiB2018-Jan-17 06:33
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc53.0 KiB2017-Oct-03 19:18
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.m4a67.9 MiB2018-Jan-17 06:33
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc25.1 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.m4a30.1 MiB2018-Jan-17 06:33
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc23.5 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.m4a26.7 MiB2018-Jan-17 06:33
DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc53.5 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.m4a65.4 MiB2018-Jan-17 06:34
DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc44.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Plore - Popping a Smart Gun.m4a55.4 MiB2018-Jan-17 06:45
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc39.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.m4a46.6 MiB2018-Jan-17 06:34
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc23.2 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.m4a32.8 MiB2018-Jan-17 06:34
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc50.9 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.m4a61.8 MiB2018-Jan-17 06:37
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc51.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.m4a62.3 MiB2018-Jan-17 06:37
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc15.2 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.m4a25.6 MiB2018-Jan-17 06:37
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc25.2 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.m4a28.4 MiB2018-Jan-17 06:37
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc46.1 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.m4a56.8 MiB2018-Jan-17 06:38
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc14.8 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.m4a21.5 MiB2018-Jan-17 06:38
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc37.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.m4a54.4 MiB2018-Jan-17 06:38
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc50.3 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.m4a53.0 MiB2018-Jan-17 06:38
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc44.8 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.m4a64.2 MiB2018-Jan-17 06:39
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc38.8 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.m4a52.6 MiB2018-Jan-17 06:45
DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc36.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.m4a46.3 MiB2018-Jan-17 06:40
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc40.3 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.m4a63.2 MiB2018-Jan-17 06:39
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc35.6 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.m4a50.5 MiB2018-Jan-17 06:39
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc40.8 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.m4a55.8 MiB2018-Jan-17 06:40
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc16.3 KiB2017-Oct-03 19:20
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.m4a21.4 MiB2018-Jan-17 06:40
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc78.0 KiB2017-Oct-03 19:20
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.m4a124.5 MiB2018-Jan-17 06:46
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc49.4 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.m4a64.8 MiB2018-Jan-17 06:43
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc28.0 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.m4a46.0 MiB2018-Jan-17 05:34
DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc48.9 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Trey Forgety - Inside the _Meet Desai_ Attack - Defending Distributed Targets from Distributed Attacks.m4a56.4 MiB2018-Jan-17 05:33
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc36.2 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.m4a51.0 MiB2018-Jan-17 05:32
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc139.6 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You'll Ever Need - AMA with 20 years of DEF CON CTF.m4a156.1 MiB2018-Jan-17 05:32
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc47.5 KiB2017-Oct-03 19:20
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.m4a50.1 MiB2018-Jan-17 05:32
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc48.5 KiB2017-Oct-03 19:21
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.m4a63.9 MiB2018-Jan-17 05:30
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc21.4 KiB2017-Oct-03 19:21
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.m4a23.3 MiB2018-Jan-17 05:30
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc54.1 KiB2017-Oct-03 19:21
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.m4a65.9 MiB2018-Jan-17 05:30
DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc48.2 KiB2017-Oct-03 19:21
DEF CON 25 Conference - Yan Shoshitaishvili -  25 Years of Program Analysis.m4a64.2 MiB2018-Jan-17 05:30
DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc27.4 KiB2017-Oct-03 19:21
DEF CON 25 Conference - Yuwue Zheng and Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB.m4a55.4 MiB2018-Jan-17 05:29
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc60.4 KiB2017-Oct-03 19:21
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.m4a81.5 MiB2018-Jan-17 05:29
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc45.7 KiB2017-Oct-03 19:19
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.m4a58.7 MiB2018-Jan-17 06:39
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc43.7 KiB2017-Oct-03 19:20
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.m4a57.0 MiB2018-Jan-17 05:32