BITCQ

DEF CON 24 presentations

Size: 945.7 MB
Magnet link

Name Size
DEF CON 24 presentations/DEFCON-24-Ang-Cui-and-Jatin-Kataria-A-Monitor-Darkly-UPDATED.pdf 136.1 MB
DEF CON 24 presentations/DEFCON-24-Demay-CANSPY-a-Platorm-For-Auditing-CAN-Devices-WP-UPDATED.pdf 819 KB
DEF CON 24 presentations/DEFCON-24-Tom-Kopchak-Sentient-Storage.pdf 1.5 MB
DEF CON 24 presentations/DEFCON-24-Aaron-Luo-Drones-Hijacking-Multi-Dimensional-Attack-Vectors-And-Countermeasures-UPDATED.pdf 4.6 MB
DEF CON 24 presentations/DEFCON-24-Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays.pdf 1.6 MB
DEF CON 24 presentations/DEFCON-24-Chris-Rock-How-to-overthrow-a-Government-Kuwait-Coup-WP.pdf 231 KB
DEF CON 24 presentations/DEFCON-24-Demay-CANSPY-a-Platorm-For-Auditing-CAN-Devices-UPDATED.pdf 1.8 MB
DEF CON 24 presentations/DEFCON-24-Shane-Steiger-Maelstrom-Are-You-Playing-With-A-Full-Deck-UPDATED.pdf 8.3 MB
DEF CON 24 presentations/DEFCON-24-Maldonado-Mcguffin-Sticky-Keys-To-The-Kingdom.pdf 831 KB
DEF CON 24 presentations/DEFCON-24-Wesley-McGrew-Secure-Penetration-Testing-Operations-WP.pdf 126 KB
DEF CON 24 presentations/DEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Jmaxxz-Backdooring-the-Frontdoor-UPDATED.pdf 1.7 MB
DEF CON 24 presentations/DEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them-WP.pdf 1.2 MB
DEF CON 24 presentations/DEFCON-24-Thomas-Wilhelm-Hacking-Network-Protocols-Using-Kali.pdf 585 KB
DEF CON 24 presentations/DEFCON-24-Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection-Writeup.pdf 3.1 MB
DEF CON 24 presentations/DEFCON-24-Regilero-Hiding-Wookiees-In-Http.pdf 410 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/LICENSE 2 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/credentials.py 283 B
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/cluster.py 9 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/Readme.md 2 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/auto-phish.py 8 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/post_tweet.py 2 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/requirements.txt 1 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/sample.sh 109 B
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/cluster.pkl 30 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/stopwords.txt 2 KB
DEF CON 24 presentations/DEFCON-24-Fasel-Jacobs-I-fight-for-the-users-UPDATED.pdf 121.9 MB
DEF CON 24 presentations/DEFCON-24-Huber-Rasthofer-Smartphone-Antivirus-And-Security-Applications-Under-Fire.pdf 2.1 MB
DEF CON 24 presentations/DEFCON-24-Lucas-Lundgren-Extras/client.py 2 KB
DEF CON 24 presentations/DEFCON-24-Lucas-Lundgren-Extras/hodor.rb 452 B
DEF CON 24 presentations/DEFCON-24-Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines.pdf 1.2 MB
DEF CON 24 presentations/DEFCON-24-Przemek-Jaroszewski-How-To-Get-Good-Seats-In-The-Security-Theater-UPDATED.pdf 2.1 MB
DEF CON 24 presentations/DEFCON-24-Hecker-Hacking-Hotel-Keys-and-PoS-Systems-UPDATED.pdf 2.2 MB
DEF CON 24 presentations/DEFCON-24-Forgety-Kreilein-Ng9-1-1-The-Next-Gene-Of-Emergency-Ph0Nage.pdf 3.2 MB
DEF CON 24 presentations/DEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them.pdf 1.6 MB
DEF CON 24 presentations/DEFCON-24-Arnaud-Soullie-Workshop-Pentesting-ICS-101.pdf 4.1 MB
DEF CON 24 presentations/DEFCON-24-Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs-UPDATED.pdf 2.4 MB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-The-Remote-Metamorphic-Engine.pdf 2.4 MB
DEF CON 24 presentations/DEFCON-24-Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations.pdf 1.6 MB
DEF CON 24 presentations/DEFCON-24-Max-Bazaliy-A-Journey-Through-Exploit-Mitigation-Techniques-On-Ios-UPDATED.pdf 671 KB
DEF CON 24 presentations/DEFCON-24-Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime-Extras-UPDATED.txt 306 B
DEF CON 24 presentations/DEFCON-24-Drake-Christey-Vulnerabilities-101-UPDATED.pdf 1 MB
DEF CON 24 presentations/DEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle-UPDATED.pdf 4.4 MB
DEF CON 24 presentations/DEFCON-24-Granolocks-Zero-Chaos-Bluehydra-Realtime-Blutetooth-Detection.pdf 101 KB
DEF CON 24 presentations/DEFCON-24-Rogan-Dawes-Dominic-White-Universal-Serial-aBUSe-Remote-Attacks.pdf 6.2 MB
DEF CON 24 presentations/DEFCON-24-Anto-Joseph-Fuzzing-Android-Devices.pdf 30.2 MB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Bill of Materials.pdf 45 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Render.png 435 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Schematics.pdf 372 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gbs 2 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gts 36 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gbl 57 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gko 2 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gto 34 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.drl 1 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gbo 3 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gtl 86 KB
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Writing-Your-First-Exploit.pdf 455 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-The-Remote-Metamorphic-Engine-UPDATED.pdf 3.4 MB
DEF CON 24 presentations/DEFCON-24-Drake-Christey-Vulnerabilities-101.pdf 184 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-WP.pdf 469 KB
DEF CON 24 presentations/DEFCON-24-Przemek-Jaroszewski-How-To-Get-Good-Seats-In-The-Security-Theater.pdf 1.5 MB
DEF CON 24 presentations/DEFCON-24-Joe-Grand-Zoz-BSODomizerHD-UPDATED.pdf 27.7 MB
DEF CON 24 presentations/DEFCON-24-Fred-Bret-Mounet-All-Your-Solar-Panels-Are-Belong-To-Me.pdf 799 KB
DEF CON 24 presentations/DEFCON-24-Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks.pdf 7.4 MB
DEF CON 24 presentations/DEFCON-24-Javier-Vazquez-You-CAN-haz-car-Secretz-UPDATED.pdf 3.2 MB
DEF CON 24 presentations/DEFCON-24-Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays-WP.pdf 504 KB
DEF CON 24 presentations/DEFCON-24-Hecker-Hacking-Next-Gen-ATMS-UPDATED.pdf 3.3 MB
DEF CON 24 presentations/DEFCON-24-Granolocks-Zero-Chaos-Bluehydra-Realtime-Blutetooth-Detection-UPDATED.pdf 1.7 MB
DEF CON 24 presentations/DEFCON-24-Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations-UPDATED.pdf 1.9 MB
DEF CON 24 presentations/DEFCON-24-Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel-WP.pdf 1.8 MB
DEF CON 24 presentations/DEFCON-24-Brad-Woodberg-Malware-Command-And-Control-Channels-A-Journey-Into-Darkness.pdf 1.7 MB
DEF CON 24 presentations/DEFCON-24-Tamas-Szakaly-Help-I-got-ANTS.pdf 5.7 MB
DEF CON 24 presentations/DEFCON-24-Grant-Bugher-Captive-Portals.pdf 12 MB
DEF CON 24 presentations/DEFCON-24-Chris-Rock-How-to-overthrow-a-Government.pdf 6.1 MB
DEF CON 24 presentations/DEFCON-24-Radia-Perlman-Resilience-Despite-Malicious-Pariticpants.pdf 745 KB
DEF CON 24 presentations/DEFCON-24-Zhong-Lee-411-A-Framework-For-Managing-Security-Alerts.pdf 49 KB
DEF CON 24 presentations/DEFCON-24-Jmaxxz-Backdooring-the-Frontdoor-Extracting-Secrets-From-Log.pdf 203 KB
DEF CON 24 presentations/DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools-UPDATED.pdf 1.4 MB
DEF CON 24 presentations/DEFCON-24-Wesley-McGrew-Secure-Penetration-Testing-Operations.pdf 296 KB
DEF CON 24 presentations/DEFCON-24-Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice.pdf 2 MB
DEF CON 24 presentations/DEFCON-24-Thomas-Wilhelm-Intrusion-Prevention-System-Evasion-Techniques.pdf 795 KB
DEF CON 24 presentations/DEFCON-24-Jake-Kouns-Lee-Johnstone-Cyber-who-done-it-UPDATED.pdf 49.6 MB
DEF CON 24 presentations/DEFCON-24-Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice-UPDATED.pd.pdf 5.1 MB
DEF CON 24 presentations/DEFCON-24-Evan-Booth-Jjittery-Macgyver.pdf 4.4 MB
DEF CON 24 presentations/DEFCON-24-Bertin-Bervis-James-Jara-Exploiting-And-Attacking-Seismological-Networks-Remotely.pdf 5.3 MB
DEF CON 24 presentations/DEFCON-24-Bursztein-Picod-Cheating-at-Poker-James-Bond-Style-UPDATED.pdf 69 MB
DEF CON 24 presentations/DEFCON-24-Liu-Yan-Xu-Can-You-Trust-Autonomous-Vehicles.pdf 2.2 MB
DEF CON 24 presentations/DEFCON-24-Eagle-Sk3Wldbg-Emulating-with-Ida.pdf 370 KB
DEF CON 24 presentations/DEFCON-24-Fasel-Jacobs-I-fight-for-the-users.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Plore-Side-Channel-Attacks-On-High-Security-Electronic-Safe-Locks.pdf 16.4 MB
DEF CON 24 presentations/DEFCON-24-Bull-Matthews-Trumbull-VLAN-Hopping-ARP-MITM-in-Virtualized-WP-UPDATED.pdf 294 KB
DEF CON 24 presentations/DEFCON-24-Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel.pdf 1.5 MB
DEF CON 24 presentations/DEFCON-24-Plore-Side-Channell-Attacks-High-Security-Locks-UPDATED.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Fitzpatrick-and-Grand-101-Ways-To-Brick-Your-Hardware.pdf 6.1 MB
DEF CON 24 presentations/DEFCON-24-Karyn-Benson-Examining-The-Internets-Pollution.pdf 2.3 MB
DEF CON 24 presentations/DEFCON-24-Salvador-Mendoza-Samsung-Pay-Tokenized-Numbers.pdf 607 KB
DEF CON 24 presentations/DEFCON-24-Patrick-Wardle-99-Problems-Little-Snitch-UPDATED.pdf 14 MB
DEF CON 24 presentations/DEFCON-24-Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel-UPDATED.pdf 6.7 MB
DEF CON 24 presentations/DEFCON-24-Max-Bazaliy-A-Journey-Through-Exploit-Mitigation-Techniques-On-Ios.pdf 561 KB
DEF CON 24 presentations/DEFCON-24-Mcsweeny-Cranor-Research-On-The-Machines.pdf 2.6 MB
DEF CON 24 presentations/DEFCON-24-Ulf-Frisk-Direct-Memory-Attack-the-Kernel.pdf 1.1 MB
DEF CON 24 presentations/DEFCON-24-Clarence-Chio-Machine-Duping-101.pdf 5.9 MB
DEF CON 24 presentations/DEFCON-24-Nick-Rosario-Weaponize-Your-Feature-Codes.pdf 916 KB
DEF CON 24 presentations/DEFCON-24-Liu-Yan-Xu-Can-You-Trust-Autonomous-Vehicles-WP.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Demay-Lebrun-Canspy-A-Platorm-For-Auditing-Can-Devices.pdf 1.5 MB
DEF CON 24 presentations/DEFCON-24-Dr-Phil-Polstra-Mouse-Jigglers.pdf 347 KB
DEF CON 24 presentations/DEFCON-24-Shellphish-Cyber Grand Shellphish-UPDATED.pdf 8.5 MB
DEF CON 24 presentations/DEFCON-24-Eric-Escobar-Rogue-Cell-Towers-UPDATED.pdf 2.2 MB
DEF CON 24 presentations/DEFCON-24-Shane-Steiger-Maelstrom-Are-You-Playing-With-A-Full-Deck-V14-Back.pdf 2.3 MB
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/setup.txt 394 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/custom-payload-add-user.py 1 KB
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/exploit.py 3 KB
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/banner-grabber.py 527 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/references.txt 657 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/simpleoverflow.c 520 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/outline.txt 724 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/custom-payload-calc.py 1 KB
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/fuzzer.py 799 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/port-scanner.py 1 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/nginx_vhost_config.conf 276 B
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/nodegoat-Demo-code-added-user-delete.patch 7 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/chewy2.jpg 46 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/attack.png 3 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/demo_downgrade_poisoning2.png 31 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/smuggling_hijacking_varnish_node.png 15 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/reverseproxy.go 486 B
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/varnish-demo.vcl 1 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/apache_vhost_config.conf 1006 B
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/index.html 331 B
DEF CON 24 presentations/DEFCON-24-Zhang-Shan-Forcing-Targeted-Lte-Cellphone-Into-Unsafe-Network.pdf 4.2 MB
DEF CON 24 presentations/DEFCON-24-Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks-UPDATED.pdf 3.8 MB
DEF CON 24 presentations/DEFCON-24-Jason-Healey-Feds-and-0days-Heartbleed-to-Apple-FBI-UPDATED.pdf 1.5 MB
DEF CON 24 presentations/DEFCON-24-Patrick-Wardle-99-Problems-Little-Snitch.pdf 14.2 MB
DEF CON 24 presentations/DEFCON-24-Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs.pdf 1.9 MB
DEF CON 24 presentations/DEFCON-24-Robbins-Vazarkar-Schroeder-Six-Degrees-of-Domain-Admin.pdf 855 KB
DEF CON 24 presentations/DEFCON-24-Tom-Kopchak-SSD-Forensics-Research-WP.pdf 1.4 MB
DEF CON 24 presentations/DEFCON-24-Anch-So-you-want-to-be-a-pentester-DC101.pdf 573 KB
DEF CON 24 presentations/DEFCON-24-Workshop-Simon-Roses-Use-MS-Free-Sec-Tools-as-a-Ninja-UPDATED.pdf 3.9 MB
DEF CON 24 presentations/DEFCON-24-Wesley-McGrew-Extras/DEFCON-24-Wesley-McGrew-Secure-Penetration-Testing-Operations-snagterpreter.py 2 KB
DEF CON 24 presentations/DEFCON-24-Willa-Riggins-Esoteric-Exfiltration-UPDATED.pdf 797 KB
DEF CON 24 presentations/DEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle.pdf 1.3 MB
DEF CON 24 presentations/DEFCON-24-Demay-Auditing-6LoWPAN-Networks-using-Standard-Penetration-Testing-Tools-WP-UPDATED.pdf 666 KB
DEF CON 24 presentations/DEFCON-24-Bryant-Zadegan-Ryan-Lester-Abusing-Bleeding-Edge-Web-Standards-For-Appsec-Glory-UPDATED.pdf 24.6 MB
DEF CON 24 presentations/DEFCON-24-Shellphish-Cyber Grand Shellphish-Tool-Links.txt 118 B
DEF CON 24 presentations/DEFCON-24-Jmaxxz-Backdooring-the-Frontdoor-Bypass-Cert-Pinning.pdf 202 KB
DEF CON 24 presentations/DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools-WP.pdf 770 KB
DEF CON 24 presentations/DEFCON-24-Salvador-Mendoza-Samsung-Pay-Tokenized-Numbers-WP.pdf 459 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Cheap-Tools-For-Hacking-Heavy-Trucks.pdf 24.2 MB
DEF CON 24 presentations/DEFCON-24-Mcsweeny-Cranor-Research-On-The-Machines-UPDATED.pdf 4.5 MB
DEF CON 24 presentations/DEFCON-24-3alarmlampscoot-DIY-Nukeproofing.pdf 3.5 MB
DEF CON 24 presentations/DEFCON-24-Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime.pdf 705 KB
DEF CON 24 presentations/DEFCON-24-Panel-How-To-Make-A-DEFCON-Black-Badge.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Shane-Steiger-Maelstrom-Rules-V10.pdf 929 KB
DEF CON 24 presentations/DEFCON-24-Zhong-Lee-411-A-Framework-For-Managing-Security-Alerts-UPDATED.pdf 8.2 MB
DEF CON 24 presentations/DEFCON-24-Jmaxxz-Backdooring-the-Frontdoor.pdf 1.9 MB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/rmengine_client.py 2 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/sample2_isDebugged1.py 15 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/rmengine_isDebugged1.py 16 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/rmengine_isDebugged2.py 16 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/sample3_isDebugged2.py 15 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/sample1_CPUID.py 15 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/rmengine_CPUID.py 16 KB
DEF CON 24 presentations/DEFCON-24-Chris-Eagle-Sk3wlDbg-Emulating-with-Ida-UPDATED.pdf 157 KB
DEF CON 24 presentations/DEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset-WP-UPDATED.pdf 1.1 MB
DEF CON 24 presentations/DEFCON-24-Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice-WP-UPDATED.pdf 534 KB
DEF CON 24 presentations/DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools.pdf 632 KB
DEF CON 24 presentations/DEFCON-24-Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime-UPDATED.pdf 4.9 MB
DEF CON 24 presentations/DEFCON-24-Grant-Bugher-Captive-Portals-UPDATED.pdf 13.9 MB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Intro-to-Witchcraft-Compiler-UPDATED.pdf 4.7 MB
DEF CON 24 presentations/DEFCON-24-Willa-Riggins-Esoteric-Exfiltration.pdf 305 KB
DEF CON 24 presentations/DEFCON-24-Sean-Metcalf-Beyond-The-MCSE-Red-Teaming-Active-Directory-UPDATED.pdf 5.8 MB
DEF CON 24 presentations/DEFCON-24-Joe-Grand-Zoz-BSODomizerHD.pdf 731 KB
DEF CON 24 presentations/DEFCON-24-Jennifer-Granick-Slouching-Towards-Utopia.pdf 417 KB
DEF CON 24 presentations/DEFCON-24-Nate-Cardozo-Crypto-State-Of-The-Law-UPDATED.pdf 2.2 MB
DEF CON 24 presentations/DEFCON-24-Jay-Beale-Larry-Pesce-Phishing-without-Frustration-UPDATED.pdf 6.3 MB
DEF CON 24 presentations/DEFCON-24-Bryant-Zadegan-Ryan-Lester-Abusing-Bleeding-Edge-Web-Standards-For-Appsec-Glory.pdf 2.5 MB
DEF CON 24 presentations/DEFCON-24-Bigezy-Saci-Pinworm-MITM-for-Metadata.pdf 1.2 MB
DEF CON 24 presentations/DEFCON-24-Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection-UPDATED.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-the-bob-ross-fan-club-Propaganda-and-you.pdf 2.9 MB
DEF CON 24 presentations/DEFCON-24-Bull-Matthews-Trumbull-VLAN-Hopping-ARP-MITM-in-Virtualized-UPDATED.pdf 2.8 MB
DEF CON 24 presentations/DEFCON-24-Paul-Vixie-Frontrunning-the-Frontrunners-UPDATED.pdf 9.2 MB
DEF CON 24 presentations/DEFCON-24-Brad-Woodberg-Malware-Command-And-Control-Channels-A-Journey-Into-Darkness-UPDATED.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Allan-Cecil-dwangoAC-Tasbot-The-Perfectionist.pdf 7.1 MB
DEF CON 24 presentations/DEFCON-24-Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection.pdf 2.4 MB
DEF CON 24 presentations/DEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset-UPDATED.pdf 4.2 MB
DEF CON 24 presentations/DEFCON-24-Eric-Escobar-Rogue-Cell-Towers.pdf 2.3 MB
DEF CON 24 presentations/DEFCON-24-Klijnsma-Tentler-Stargate-Pivoting-Through-VNC.pdf 30.1 MB
DEF CON 24 presentations/DEFCON-24-Luke-Young-The-4TbS-Ddos-For-5-bucks.pdf 3.4 MB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Intro-to-Witchcraft-Compiler.pdf 2.1 MB
DEF CON 24 presentations/DEFCON-24-Sean-Metcalf-Beyond-The-MCSE-Red-Teaming-Active-Directory.pdf 4.8 MB
DEF CON 24 presentations/DEFCON-24-Robbins-Vazarkar-Schroeder-Six-Degrees-of-Domain-Admin-UPDATED.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Mike-Rich-Extras/DEFCON-24-Mike-Rich-Sideload-demo.xlsm 135 KB
DEF CON 24 presentations/DEFCON-24-Mike-Rich-Extras/DEFCON-24-Mike-Rich-newdll.zip 66 KB
DEF CON 24 presentations/DEFCON-24-Mike-Rich-Extras/DEFCON-24-Mike-Rich-Sideload_code.zip 98 KB
DEF CON 24 presentations/DEFCON-24-Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines-Literature-Survey.pdf 352 KB
DEF CON 24 presentations/DEFCON-24-Ladar-Levison-Compelled-Decryption.pdf 5.8 MB
DEF CON 24 presentations/DEFCON-24-Int0X80-Anti-Forensics-AF.pdf 413 KB
DEF CON 24 presentations/DEFCON-24-Allan-Cecil-dwangoAC-Tasbot-The-Perfectionist-UPDATED.pdf 11.2 MB
DEF CON 24 presentations/DEFCON-24-Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice-WP.pdf 520 KB
DEF CON 24 presentations/DEFCON-24-Gorenc-Sands-Hacker-Machine-Interface-UPDATED.pdf 8.9 MB
DEF CON 24 presentations/DEFCON-24-Clarence-Chio-Machine-Duping-101-UPDATED.pdf 6.5 MB
DEF CON 24 presentations/DEFCON-24-Lucas-Lundgren-Light-Weight Protocol-Critical-Implications.pdf 2.5 MB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering.pdf 3.7 MB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/AUTHORS 41 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wld/Makefile 174 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wld/wld.c 2 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wld/wld 137 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wcc/Makefile 296 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wcc/wcc 313 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wcc/wcc.c 37 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/nametotype.h 3 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/nametolink.h 284 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/nametoalign.h 2 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/nametoentsz.h 617 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/nametoinfo.h 214 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/config.h 136 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/Makefile 130 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/bin/wld 137 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/bin/wcc 313 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/Makefile 67 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/README 999 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/LICENSE 1 KB
DEF CON 24 presentations/DEFCON-24-Gorenc-Sands-Hacker-Machine-Interface.pdf 7 MB
DEF CON 24 presentations/DEFCON-24-Jay-Beale-Larry-Pesce-Phishing-without-Frustration.pdf 6.3 MB
DEF CON 24 presentations/DEFCON-24-Ricky-Lawshae-Lets-Get-Physical.pdf 188 KB
DEF CON 24 presentations/DEFCON-24-Hunter-Scott-Rt2Win-The-Luckiest-Guy-On-Twitter.pdf 1.2 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
DEF CON 29 Application 377.4 GB 4
DEF CON 30 Video 57.6 GB 4
DEF CON 16 Video 9.3 GB 8
DEF CON 20 Application 69.7 GB 8
DEF CON 3 343 MB 7
DEF CON 31 Video 46.1 GB 4
DEF CON 14 Video 10.3 GB 3
DEF CON 32 Image 63.5 GB 0
DEF CON 24 Application 96.1 GB 0
DEF CON 21 Application 92.3 GB 0
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly 1080p.mp4 Video 503.3 MB 9
DEF CON 16 video x265 Video 5.1 GB 3
DEF CON Conference Programs Application 830.7 MB 3
DEF CON 7 video Video 3.5 GB 2
DEF CON 11 music Audio 404.3 MB 2
DEF CON 15 7 GB 0
DEF CON 29 Application 376.8 GB 0
DEF CON 28 Application 47.6 GB 106
DEF CON 28 Application 190.4 GB 59
DEF CON 26 Audio 99.4 GB 16

Loading...