Parent directory/ | - | - |
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc | 41.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.m4a | 54.6 MiB | 2018-Jan-17 05:36 |
DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc | 83.0 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel- Meet The Feds.m4a | 114.4 MiB | 2018-Jan-17 05:42 |
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc | 51.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.m4a | 60.0 MiB | 2018-Jan-17 06:23 |
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc | 35.9 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.m4a | 57.0 MiB | 2018-Jan-17 06:15 |
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc | 25.9 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.m4a | 43.6 MiB | 2018-Jan-17 06:10 |
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc | 54.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on z_OS.m4a | 61.3 MiB | 2018-Jan-17 06:11 |
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc | 34.2 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.m4a | 46.6 MiB | 2018-Jan-17 06:10 |
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.m4a | 27.8 MiB | 2018-Jan-17 06:09 |
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc | 23.1 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc | 8.5 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.m4a | 21.5 MiB | 2018-Jan-17 06:11 |
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc | 47.5 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.m4a | 67.1 MiB | 2018-Jan-17 06:11 |
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc | 48.7 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.m4a | 64.4 MiB | 2018-Jan-17 06:12 |
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc | 54.9 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.m4a | 53.0 MiB | 2018-Jan-17 06:12 |
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc | 42.1 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.m4a | 50.7 MiB | 2018-Jan-17 06:12 |
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc | 50.0 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.m4a | 59.7 MiB | 2018-Jan-17 07:00 |
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc | 30.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.m4a | 49.3 MiB | 2018-Jan-17 06:12 |
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc | 52.5 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.m4a | 63.3 MiB | 2018-Jan-17 06:16 |
DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc | 54.4 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.m4a | 65.7 MiB | 2018-Jan-17 06:16 |
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc | 36.1 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.m4a | 55.1 MiB | 2018-Jan-17 06:16 |
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc | 24.1 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.m4a | 30.7 MiB | 2018-Jan-17 06:16 |
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc | 20.2 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.m4a | 28.2 MiB | 2018-Jan-17 05:36 |
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc | 21.8 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.m4a | 30.4 MiB | 2018-Jan-17 05:37 |
DEF CON 25 Conference - Dor Azouri - BITSInject.lrc | 17.4 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Dor Azouri - BITSInject.m4a | 28.2 MiB | 2018-Jan-17 05:37 |
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc | 43.6 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.m4a | 60.8 MiB | 2018-Jan-17 06:55 |
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc | 43.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.m4a | 45.1 MiB | 2018-Jan-17 06:17 |
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc | 52.5 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.m4a | 58.6 MiB | 2018-Jan-17 06:17 |
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc | 61.4 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.m4a | 69.4 MiB | 2018-Jan-17 06:25 |
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc | 48.4 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.m4a | 69.2 MiB | 2018-Jan-17 06:18 |
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc | 50.6 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.m4a | 58.7 MiB | 2018-Jan-17 06:18 |
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc | 35.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.m4a | 49.8 MiB | 2018-Jan-17 06:18 |
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc | 41.2 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.m4a | 53.9 MiB | 2018-Jan-17 06:19 |
DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc | 29.5 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.m4a | 42.0 MiB | 2018-Jan-17 06:19 |
DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc | 28.3 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.m4a | 48.8 MiB | 2018-Jan-17 06:18 |
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc | 112.2 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.m4a | 161.5 MiB | 2018-Jan-17 06:19 |
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc | 20.4 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.m4a | 26.9 MiB | 2018-Jan-17 06:19 |
DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc | 54.6 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.m4a | 71.4 MiB | 2018-Jan-17 06:19 |
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc | 50.0 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.m4a | 64.6 MiB | 2018-Jan-17 06:20 |
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc | 35.8 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.m4a | 60.4 MiB | 2018-Jan-17 06:20 |
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc | 48.3 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.m4a | 60.6 MiB | 2018-Jan-17 06:25 |
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc | 33.3 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.m4a | 39.2 MiB | 2018-Jan-17 06:20 |
DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc | 44.0 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.m4a | 54.3 MiB | 2018-Jan-17 06:25 |
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc | 58.0 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.m4a | 76.6 MiB | 2018-Jan-17 06:26 |
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc | 43.8 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.m4a | 60.6 MiB | 2018-Jan-17 06:26 |
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc | 30.9 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.m4a | 44.7 MiB | 2018-Jan-17 06:27 |
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc | 45.6 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.m4a | 59.9 MiB | 2018-Jan-17 06:26 |
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc | 51.2 KiB | 2017-Dec-30 02:23 |
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.m4a | 69.7 MiB | 2018-Jan-17 06:26 |
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc | 44.7 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks_.m4a | 54.6 MiB | 2018-Jan-17 06:27 |
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc | 21.8 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.m4a | 29.4 MiB | 2018-Jan-17 06:27 |
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc | 42.4 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.m4a | 51.6 MiB | 2018-Jan-17 06:27 |
DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc | 30.1 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.m4a | 32.7 MiB | 2018-Jan-17 06:27 |
DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc | 53.3 KiB | 2018-Jan-17 06:28 |
DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.m4a | 63.2 MiB | 2018-Jan-17 06:28 |
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc | 15.3 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.m4a | 21.2 MiB | 2018-Jan-17 06:28 |
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc | 45.7 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.m4a | 69.2 MiB | 2018-Jan-17 06:29 |
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc | 24.1 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.m4a | 33.0 MiB | 2018-Jan-17 06:28 |
DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.m4a | 57.3 MiB | 2018-Jan-17 06:29 |
DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc | 44.1 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc | 38.9 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.m4a | 65.6 MiB | 2018-Jan-17 06:29 |
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc | 51.4 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.m4a | 59.0 MiB | 2018-Jan-17 06:29 |
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc | 42.2 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.m4a | 61.7 MiB | 2018-Jan-17 06:29 |
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc | 31.5 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.m4a | 42.7 MiB | 2018-Jan-17 06:30 |
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc | 54.7 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.m4a | 64.3 MiB | 2018-Jan-17 06:30 |
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc | 43.2 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.m4a | 44.1 MiB | 2018-Jan-17 06:30 |
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc | 34.6 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.m4a | 56.1 MiB | 2018-Jan-17 06:30 |
DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc | 43.9 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.m4a | 62.0 MiB | 2018-Jan-17 06:31 |
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc | 35.1 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.m4a | 51.4 MiB | 2018-Jan-17 06:31 |
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc | 36.2 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.m4a | 54.5 MiB | 2018-Jan-17 06:31 |
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc | 21.1 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.m4a | 28.7 MiB | 2018-Jan-17 06:31 |
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc | 22.8 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS_iOS Kernel Debugging and Heap Feng Shui.m4a | 37.5 MiB | 2018-Jan-17 06:31 |
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc | 33.2 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.m4a | 44.3 MiB | 2018-Jan-17 06:32 |
DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc | 48.7 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.m4a | 61.9 MiB | 2018-Jan-17 06:32 |
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc | 29.0 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.m4a | 40.2 MiB | 2018-Jan-17 06:32 |
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc | 43.5 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.m4a | 56.4 MiB | 2018-Jan-17 06:32 |
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc | 23.1 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.m4a | 28.8 MiB | 2018-Jan-17 06:32 |
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc | 36.3 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.m4a | 48.1 MiB | 2018-Jan-17 06:33 |
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc | 29.0 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.m4a | 64.5 MiB | 2018-Jan-17 06:33 |
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc | 33.3 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.m4a | 44.2 MiB | 2018-Jan-17 06:33 |
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc | 53.0 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.m4a | 67.9 MiB | 2018-Jan-17 06:33 |
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc | 25.1 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.m4a | 30.1 MiB | 2018-Jan-17 06:33 |
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc | 23.5 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.m4a | 26.7 MiB | 2018-Jan-17 06:33 |
DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc | 53.5 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.m4a | 65.4 MiB | 2018-Jan-17 06:34 |
DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc | 44.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Plore - Popping a Smart Gun.m4a | 55.4 MiB | 2018-Jan-17 06:45 |
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc | 39.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.m4a | 46.6 MiB | 2018-Jan-17 06:34 |
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc | 23.2 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.m4a | 32.8 MiB | 2018-Jan-17 06:34 |
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc | 50.9 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.m4a | 61.8 MiB | 2018-Jan-17 06:37 |
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc | 51.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.m4a | 62.3 MiB | 2018-Jan-17 06:37 |
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc | 15.2 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.m4a | 25.6 MiB | 2018-Jan-17 06:37 |
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc | 25.2 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.m4a | 28.4 MiB | 2018-Jan-17 06:37 |
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc | 46.1 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.m4a | 56.8 MiB | 2018-Jan-17 06:38 |
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc | 14.8 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.m4a | 21.5 MiB | 2018-Jan-17 06:38 |
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc | 37.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.m4a | 54.4 MiB | 2018-Jan-17 06:38 |
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc | 50.3 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.m4a | 53.0 MiB | 2018-Jan-17 06:38 |
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc | 44.8 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.m4a | 64.2 MiB | 2018-Jan-17 06:39 |
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc | 38.8 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.m4a | 52.6 MiB | 2018-Jan-17 06:45 |
DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc | 36.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.m4a | 46.3 MiB | 2018-Jan-17 06:40 |
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc | 40.3 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.m4a | 63.2 MiB | 2018-Jan-17 06:39 |
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc | 35.6 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.m4a | 50.5 MiB | 2018-Jan-17 06:39 |
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc | 40.8 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.m4a | 55.8 MiB | 2018-Jan-17 06:40 |
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc | 16.3 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.m4a | 21.4 MiB | 2018-Jan-17 06:40 |
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc | 78.0 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.m4a | 124.5 MiB | 2018-Jan-17 06:46 |
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc | 49.4 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.m4a | 64.8 MiB | 2018-Jan-17 06:43 |
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc | 28.0 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.m4a | 46.0 MiB | 2018-Jan-17 05:34 |
DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc | 48.9 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Trey Forgety - Inside the _Meet Desai_ Attack - Defending Distributed Targets from Distributed Attacks.m4a | 56.4 MiB | 2018-Jan-17 05:33 |
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc | 36.2 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.m4a | 51.0 MiB | 2018-Jan-17 05:32 |
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc | 139.6 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You'll Ever Need - AMA with 20 years of DEF CON CTF.m4a | 156.1 MiB | 2018-Jan-17 05:32 |
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc | 47.5 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.m4a | 50.1 MiB | 2018-Jan-17 05:32 |
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc | 48.5 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.m4a | 63.9 MiB | 2018-Jan-17 05:30 |
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc | 21.4 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.m4a | 23.3 MiB | 2018-Jan-17 05:30 |
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc | 54.1 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.m4a | 65.9 MiB | 2018-Jan-17 05:30 |
DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc | 48.2 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.m4a | 64.2 MiB | 2018-Jan-17 05:30 |
DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc | 27.4 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.m4a | 55.4 MiB | 2018-Jan-17 05:29 |
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc | 60.4 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.m4a | 81.5 MiB | 2018-Jan-17 05:29 |
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc | 45.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.m4a | 58.7 MiB | 2018-Jan-17 06:39 |
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc | 43.7 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.m4a | 57.0 MiB | 2018-Jan-17 05:32 |