/DEF CON 25/DEF CON 25 video and slides/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.mp4127.5 MiB2018-Feb-01 02:01
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.srt44.7 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel- Meet The Feds.srt94.4 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.mp4181.2 MiB2018-Feb-01 02:18
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.srt57.6 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.mp4168.9 MiB2018-Feb-01 02:41
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.srt37.4 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.mp4117.0 MiB2018-Feb-01 05:02
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.srt29.0 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on z OS.srt62.1 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.mp4186.4 MiB2018-Feb-01 03:41
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.mp4137.1 MiB2018-Feb-01 01:53
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.srt37.4 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.mp463.4 MiB2018-Feb-01 02:36
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.srt25.7 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.mp461.2 MiB2018-Feb-01 05:20
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.srt8.4 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.mp4183.9 MiB2018-Feb-01 04:23
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.srt52.3 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.mp4199.9 MiB2018-Feb-01 05:53
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.srt53.2 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set .mp4169.2 MiB2018-Feb-01 02:11
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set .srt62.0 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.mp4136.4 MiB2018-Feb-01 03:27
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.srt46.4 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.mp4187.3 MiB2018-Feb-01 05:32
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward, TRUMPNUM steps back how can we tell if we're winning.srt55.5 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.mp4142.1 MiB2018-Feb-01 05:44
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.srt34.2 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.mp4151.8 MiB2018-Feb-01 03:03
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.srt59.6 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.mp4169.2 MiB2018-Feb-01 03:25
DEF CON 25 Conference - Daniel Bohannon, Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.srt61.2 KiB2017-Dec-24 04:34
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time .mp4149.1 MiB2018-Feb-01 03:05
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time .srt39.0 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.mp486.0 MiB2018-Feb-01 04:43
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.srt26.6 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.mp465.5 MiB2018-Feb-01 03:01
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.srt22.2 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.mp485.8 MiB2018-Feb-01 01:55
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.srt23.5 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Dor Azouri - BITSInject.mp481.1 MiB2018-Feb-01 02:35
DEF CON 25 Conference - Dor Azouri - BITSInject.srt19.5 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.mp4182.6 MiB2018-Feb-01 04:39
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.srt48.9 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.mp4115.8 MiB2018-Feb-01 03:16
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.srt48.4 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.mp4162.1 MiB2018-Feb-01 03:12
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.srt58.5 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.mp4185.7 MiB2018-Feb-01 04:16
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.srt68.6 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.mp4200.3 MiB2018-Feb-01 03:57
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.srt55.2 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.mp4154.9 MiB2018-Feb-01 02:47
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.srt56.3 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.srt38.1 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your named pipe.mp4158.8 MiB2018-Feb-01 03:22
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.mp4144.6 MiB2018-Feb-01 02:25
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.srt46.2 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Hanno Bock - Abusing Certificate Transparency Logs.mp490.2 MiB2018-Feb-01 05:16
DEF CON 25 Conference - Hanno Bock - Abusing Certificate Transparency Logs.srt31.7 KiB2017-Dec-24 04:34
DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.mp4141.3 MiB2018-Feb-01 04:18
DEF CON 25 Conference - Haoqi Shan, Jian Yuan - Man in the NFC.srt32.2 KiB2017-Dec-24 04:52
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.mp4474.4 MiB2018-Feb-01 03:50
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.srt123.8 KiB2017-Dec-24 04:54
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.mp453.6 MiB2018-Feb-01 02:38
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.srt22.4 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.mp4203.9 MiB2018-Feb-01 04:54
DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.srt61.3 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.mp4122.6 MiB2018-Feb-01 03:54
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.srt54.5 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.mp4147.2 MiB2018-Feb-01 03:08
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.srt40.5 KiB2017-Dec-24 04:55
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.mp4163.1 MiB2018-Feb-01 05:28
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.srt52.8 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.mp4100.2 MiB2018-Feb-01 01:50
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.srt37.3 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.mp4150.9 MiB2018-Feb-01 02:15
DEF CON 25 Conference - Jason Hernandez and Sam Richards, Jerod MacDonald-Evoy - Tracking Spies in the Skies.srt48.4 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Jason Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.mp497.9 MiB2018-Feb-01 05:11
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.mp4215.7 MiB2018-Feb-01 04:21
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.srt66.1 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.mp4166.2 MiB2018-Feb-01 03:19
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.srt48.2 KiB2017-Dec-24 04:55
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.mp494.2 MiB2018-Feb-01 05:05
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.srt33.6 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Joe Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.mp4173.3 MiB2018-Feb-01 05:37
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.mp4179.7 MiB2018-Feb-01 02:20
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.srt52.0 KiB2017-Dec-24 04:55
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.mp4173.0 MiB2018-Feb-01 04:47
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.srt56.0 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks-.mp4168.3 MiB2018-Feb-01 05:34
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks-.srt49.5 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.mp474.7 MiB2018-Feb-01 05:14
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.srt24.1 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.mp4154.6 MiB2018-Feb-01 02:13
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL, A Modular Malware Implant Framework.srt48.0 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.srt33.7 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.srt59.3 KiB2017-Dec-24 04:55
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.mp454.1 MiB2018-Feb-01 02:58
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.srt16.8 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.mp4162.6 MiB2018-Feb-01 04:35
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.srt50.9 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.mp491.0 MiB2018-Feb-01 03:20
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.srt26.4 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.mp4173.8 MiB2018-Feb-01 03:10
DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.srt48.7 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.mp4152.0 MiB2018-Feb-01 04:28
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics, Same Exploits.srt44.2 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.mp4172.8 MiB2018-Feb-01 02:49
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.srt57.3 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.mp4164.7 MiB2018-Feb-01 05:25
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.srt47.8 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.mp4118.5 MiB2018-Feb-01 05:48
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.srt34.8 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.mp4174.0 MiB2018-Feb-01 04:33
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.srt61.3 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.mp4137.0 MiB2018-Feb-01 05:07
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.srt48.5 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.mp4136.4 MiB2018-Feb-01 03:43
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.srt38.8 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.mp4183.3 MiB2018-Feb-01 01:57
DEF CON 25 Conference - Matt Wixey - See no evil, hear no evil - Hacking invisibly and silently with light and sound.srt49.8 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.mp4154.9 MiB2018-Feb-01 05:09
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.srt37.8 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.mp4126.4 MiB2018-Feb-01 02:23
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.srt38.5 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.mp481.9 MiB2018-Feb-01 04:51
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.srt23.3 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.srt23.1 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS-iOS Kernel Debugging and Heap Feng Shui.mp4109.3 MiB2018-Feb-01 01:51
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.mp4125.6 MiB2018-Feb-01 04:37
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.srt36.3 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.srt53.4 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.mp4118.1 MiB2018-Feb-01 02:05
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.srt31.6 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.mp4138.7 MiB2018-Feb-01 04:42
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.srt48.3 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.mp457.9 MiB2018-Feb-01 02:45
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.srt25.8 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.mp4156.5 MiB2018-Feb-01 04:26
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.srt39.3 KiB2017-Dec-24 04:55
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4157.5 MiB2018-Feb-01 05:13
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.srt32.7 KiB2017-Dec-24 05:01
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.mp4123.9 MiB2018-Feb-01 04:04
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.srt37.2 KiB2017-Dec-24 05:01
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS, it's all broken!.srt59.5 KiB2017-Dec-24 05:01
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers_ on macOS and it's all broken!.mp4163.5 MiB2018-Feb-01 04:00
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.mp485.9 MiB2018-Feb-01 05:29
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.srt28.2 KiB2017-Dec-24 05:01
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.mp475.3 MiB2018-Feb-01 01:59
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.srt26.1 KiB2017-Dec-24 05:01
DEF CON 25 Conference - Philip Tully and Michael T Raggo - A Picture is Worth a Thousand Words and Literally.mp4156.1 MiB2018-Feb-01 02:31
DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words, Literally.srt59.6 KiB2017-Dec-24 05:01
DEF CON 25 Conference - Plore - Popping a Smart Gun.mp4110.6 MiB2018-Feb-01 04:07
DEF CON 25 Conference - Plore - Popping a Smart Gun.srt49.1 KiB2017-Dec-24 05:01
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.mp4106.8 MiB2018-Feb-01 03:14
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.srt44.2 KiB2017-Dec-24 05:01
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.mp480.8 MiB2018-Feb-01 05:04
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.srt25.9 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back - 212.srt57.0 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.mp4163.7 MiB2018-Feb-01 02:28
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.mp4157.2 MiB2018-Feb-01 03:31
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.srt57.9 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.mp468.5 MiB2018-Feb-01 02:37
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.srt16.6 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.mp498.6 MiB2018-Feb-01 02:39
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.srt27.8 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.mp4185.8 MiB2018-Feb-01 05:19
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.srt50.6 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.mp466.9 MiB2018-Feb-01 04:05
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.srt15.7 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.mp4159.6 MiB2018-Feb-01 04:30
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.srt41.0 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.mp4160.4 MiB2018-Feb-01 05:39
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.srt56.1 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.mp4132.7 MiB2018-Feb-01 02:03
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.srt49.0 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.mp4157.3 MiB2018-Feb-01 03:29
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.srt44.4 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.mp4124.5 MiB2018-Feb-01 02:43
DEF CON 25 Conference - Steinthor Bjarnason, Jason Jones - The call is coming from inside the house.srt39.8 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.mp4114.1 MiB2018-Feb-01 05:01
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.srt45.5 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.mp4164.3 MiB2018-Feb-01 03:52
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.srt40.2 KiB2017-Dec-24 05:02
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.mp4162.6 MiB2018-Feb-01 03:36
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.srt44.7 KiB2017-Dec-24 05:02
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.mp464.1 MiB2018-Feb-01 02:50
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.srt17.8 KiB2017-Dec-24 05:03
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.mp4349.5 MiB2018-Feb-01 04:58
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.srt83.7 KiB2017-Dec-24 05:03
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.mp4178.1 MiB2018-Feb-01 05:42
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.srt55.8 KiB2017-Dec-24 05:03
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.mp4131.3 MiB2018-Feb-01 04:45
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.srt29.4 KiB2017-Dec-24 05:03
DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.mp4154.0 MiB2018-Feb-01 05:46
DEF CON 25 Conference - Trey Forgety - Inside the “Meet Desai” Attack - Defending Distributed Targets from Distributed Attacks.srt54.7 KiB2017-Dec-24 05:03
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.mp485.1 MiB2018-Feb-01 04:02
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.srt40.7 KiB2017-Dec-24 05:03
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.mp4474.5 MiB2018-Feb-01 02:57
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.srt159.5 KiB2017-Dec-24 05:03
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.mp4156.0 MiB2018-Feb-01 03:33
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.srt53.5 KiB2017-Dec-24 05:03
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.mp4176.0 MiB2018-Feb-01 02:33
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick, Tick, Tick.Boom You're Dead - Tech and the FTC.srt53.4 KiB2017-Dec-24 05:03
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.mp475.2 MiB2018-Feb-01 02:08
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.srt23.9 KiB2017-Dec-24 05:03
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.mp4188.7 MiB2018-Feb-01 05:22
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.srt60.6 KiB2017-Dec-24 05:03
DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.mp4193.9 MiB2018-Feb-01 05:50
DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.srt53.8 KiB2017-Dec-24 05:03
DEF CON 25 Conference - Yuwue Zheng and Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB.mp4150.7 MiB2018-Feb-01 02:07
DEF CON 25 Conference - Yuwue Zheng and Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB.srt27.3 KiB2017-Dec-24 05:03
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.mp4171.0 MiB2018-Feb-01 03:39
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.srt68.4 KiB2017-Dec-24 05:04
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.mp4148.6 MiB2018-Feb-01 03:00
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.srt50.6 KiB2017-Dec-24 05:02
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.mp4137.0 MiB2018-Feb-01 04:50
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.srt49.8 KiB2017-Dec-24 05:03