Parent directory/ | - | - |
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc | 41.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.opus | 29.5 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc | 83.0 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.opus | 59.0 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc | 51.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.opus | 31.0 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc | 35.9 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.opus | 31.9 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc | 25.9 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.opus | 23.9 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc | 54.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.opus | 33.5 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc | 34.2 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.opus | 26.7 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc | 23.1 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.opus | 14.5 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc | 8.5 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.opus | 11.4 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc | 47.5 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.opus | 37.7 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc | 48.7 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.opus | 38.3 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc | 54.9 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.opus | 28.2 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc | 42.1 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.opus | 30.0 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc | 50.0 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.opus | 32.4 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc | 30.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.opus | 26.1 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc | 52.5 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.opus | 29.8 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc | 54.4 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.opus | 34.1 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc | 36.1 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.opus | 27.7 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc | 24.1 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.opus | 15.1 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc | 20.2 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.opus | 14.3 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc | 21.8 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.opus | 18.3 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Dor Azouri - BITSInject.lrc | 17.4 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Dor Azouri - BITSInject.opus | 14.8 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc | 43.6 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.opus | 30.3 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc | 43.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.opus | 28.8 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc | 52.5 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.opus | 31.7 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc | 61.4 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.opus | 36.5 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc | 48.4 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.opus | 33.7 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc | 50.6 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.opus | 32.1 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc | 35.3 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.opus | 29.6 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc | 41.2 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.opus | 28.8 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc | 29.5 KiB | 2017-Oct-03 19:16 |
DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.opus | 21.8 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc | 28.3 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.opus | 25.5 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc | 112.2 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.opus | 82.7 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc | 20.4 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.opus | 14.6 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc | 54.6 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.opus | 35.0 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc | 50.0 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.opus | 34.4 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc | 35.8 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.opus | 29.9 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc | 48.3 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.opus | 37.3 MiB | 2018-Feb-01 07:52 |
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc | 33.3 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.opus | 21.1 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc | 44.0 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.opus | 28.8 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc | 58.0 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.opus | 36.3 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc | 43.8 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.opus | 30.2 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc | 30.9 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.opus | 23.0 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc | 45.6 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.opus | 35.2 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc | 51.2 KiB | 2017-Dec-30 02:23 |
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.opus | 37.6 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc | 44.7 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.opus | 29.3 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc | 21.8 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.opus | 14.1 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc | 42.4 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.opus | 26.8 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc | 30.1 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.opus | 19.2 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc | 53.3 KiB | 2018-Jan-17 06:28 |
DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.opus | 34.5 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc | 15.3 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.opus | 11.9 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc | 45.7 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.opus | 33.6 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc | 24.1 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.opus | 16.4 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.opus | 32.2 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc | 44.1 KiB | 2017-Oct-03 19:17 |
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc | 38.9 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.opus | 31.1 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc | 51.4 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.opus | 29.1 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc | 42.2 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.opus | 31.6 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc | 31.5 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.opus | 22.7 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc | 54.7 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.opus | 36.1 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc | 43.2 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.opus | 26.0 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc | 34.6 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.opus | 32.1 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc | 43.9 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.opus | 30.4 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc | 35.1 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.opus | 27.1 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc | 36.2 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.opus | 28.5 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc | 21.1 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.opus | 14.4 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc | 22.8 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.opus | 21.5 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc | 33.2 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.opus | 22.5 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc | 48.7 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.opus | 34.3 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc | 29.0 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.opus | 20.4 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc | 43.5 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.opus | 30.3 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc | 23.1 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.opus | 14.3 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc | 36.3 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.opus | 28.0 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc | 29.0 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.opus | 31.0 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc | 33.3 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.opus | 26.5 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc | 53.0 KiB | 2017-Oct-03 19:18 |
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.opus | 34.6 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc | 25.1 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.opus | 18.0 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc | 23.5 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.opus | 14.1 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc | 53.5 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.opus | 34.5 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc | 44.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Plore - Popping a Smart Gun.opus | 30.0 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc | 39.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.opus | 26.1 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc | 23.2 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.opus | 15.3 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc | 50.9 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.opus | 32.3 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc | 51.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.opus | 33.7 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc | 15.2 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.opus | 13.3 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc | 25.2 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.opus | 17.2 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc | 46.1 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.opus | 32.8 MiB | 2018-Feb-01 07:53 |
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc | 14.8 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.opus | 12.2 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc | 37.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.opus | 31.5 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc | 50.3 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.opus | 27.8 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc | 44.8 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.opus | 32.8 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc | 38.8 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.opus | 27.7 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc | 36.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.opus | 24.2 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc | 40.3 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.opus | 30.7 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc | 35.6 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.opus | 27.7 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc | 40.8 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.opus | 28.4 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc | 16.3 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.opus | 11.9 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc | 78.0 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.opus | 59.1 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc | 49.4 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.opus | 33.7 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc | 28.0 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.opus | 25.6 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc | 48.9 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.opus | 29.9 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc | 36.2 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.opus | 26.1 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc | 139.6 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.opus | 79.8 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc | 47.5 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.opus | 27.4 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc | 48.5 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.opus | 32.7 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc | 21.4 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.opus | 14.0 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc | 54.1 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.opus | 33.4 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc | 48.2 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.opus | 34.9 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc | 27.4 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.opus | 29.3 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc | 60.4 KiB | 2017-Oct-03 19:21 |
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.opus | 44.9 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc | 45.7 KiB | 2017-Oct-03 19:19 |
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.opus | 29.2 MiB | 2018-Feb-01 07:54 |
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc | 43.7 KiB | 2017-Oct-03 19:20 |
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.opus | 28.8 MiB | 2018-Feb-01 07:54 |