BITCQ

DEF CON 25 presentations

Size: 1.1 GB
Magnet link

Name Size
DEF CON 25 presentations/Dimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 71 MB
DEF CON 25 presentations/5A1F/DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects.pdf 10.7 MB
DEF CON 25 presentations/Alvaro Munoz and Oleksandr Mirosh - UPDATED/DEFCON-25-Alvaro-Munoz-and-Oleksandr-Mirosh-JSON-Attacks-UPDATED.pdf 18.8 MB
DEF CON 25 presentations/Alvaro Munoz and Oleksandr Mirosh - UPDATED/DEFCON-25-Alvaro-Munoz-JSON-attacks-WP-UPDATED.pdf 665 KB
DEF CON 25 presentations/Cheng Lei/DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus-WP.pdf 1.2 MB
DEF CON 25 presentations/Cheng Lei/DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus.pdf 1.7 MB
DEF CON 25 presentations/Cooper Quintin and Kashmir Hill - UPDATED/DEFCON-25-Cooper-Quintin-and-Kashmir-Hill-The-Internet-Already-Knows-Im-Pregnant-UPDATED.pdf 3.9 MB
DEF CON 25 presentations/Cooper Quintin and Kashmir Hill - UPDATED/DEFCON-25-Cooper-Quintin-The-Pregnancy-Panopticon-WP-UPDATED.pdf 631 KB
DEF CON 25 presentations/DEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf 5.7 MB
DEF CON 25 presentations/DEFCON-25-0ctane-Untrustworthy-Hardware.pdf 2.4 MB
DEF CON 25 presentations/DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf 1.8 MB
DEF CON 25 presentations/DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf 3 MB
DEF CON 25 presentations/DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf 6.9 MB
DEF CON 25 presentations/DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.5 MB
DEF CON 25 presentations/DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf 3.2 MB
DEF CON 25 presentations/DEFCON-25-Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf 29.9 MB
DEF CON 25 presentations/DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf 4.3 MB
DEF CON 25 presentations/DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf 42.6 MB
DEF CON 25 presentations/DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf 5.1 MB
DEF CON 25 presentations/DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf 6.7 MB
DEF CON 25 presentations/DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf 2.4 MB
DEF CON 25 presentations/DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA-UPDATED.pdf 16.7 MB
DEF CON 25 presentations/DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf 5 MB
DEF CON 25 presentations/DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf 1.8 MB
DEF CON 25 presentations/DEFCON-25-Closing-Slides.pdf 8.8 MB
DEF CON 25 presentations/DEFCON-25-Cory-Doctorow-Steps-Forward-Steps-Back-How-Can-We-Tell-If-We-Are-Winning-UPDATED.pdf 9.6 MB
DEF CON 25 presentations/DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit-UPDATED.pdf 2.8 MB
DEF CON 25 presentations/DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf 2.2 MB
DEF CON 25 presentations/DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf 6.9 MB
DEF CON 25 presentations/DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf 799 KB
DEF CON 25 presentations/DEFCON-25-DEFCON-101-The-Panel-UPDATED.pdf 6.3 MB
DEF CON 25 presentations/DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-UPDATED.pdf 507 KB
DEF CON 25 presentations/DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf 617 KB
DEF CON 25 presentations/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks-UPDATED.pdf 9.4 MB
DEF CON 25 presentations/DEFCON-25-Eckert-and-Dewes-Dark-Data-UPDATED.pdf 7.5 MB
DEF CON 25 presentations/DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf 69 KB
DEF CON 25 presentations/DEFCON-25-FuzzyNop-and-Ceyx-MEATPISTOL-A-Modular-Malware-Implant-Framework-UPDATED.pdf 4.6 MB
DEF CON 25 presentations/DEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf 5.5 MB
DEF CON 25 presentations/DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud-UPDATED.pdf 2.4 MB
DEF CON 25 presentations/DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf 2.4 MB
DEF CON 25 presentations/DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe-UPDATED.pdf 4.1 MB
DEF CON 25 presentations/DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf 4 MB
DEF CON 25 presentations/DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery-UPDATED.pdf 2.8 MB
DEF CON 25 presentations/DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf 2.7 MB
DEF CON 25 presentations/DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs-UPDATED.pdf 851 KB
DEF CON 25 presentations/DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf 250 KB
DEF CON 25 presentations/DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf 2.3 MB
DEF CON 25 presentations/DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies-UPDATED.pdf 9.5 MB
DEF CON 25 presentations/DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf 6 MB
DEF CON 25 presentations/DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI-UPDATED.pdf 4.9 MB
DEF CON 25 presentations/DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf 4.6 MB
DEF CON 25 presentations/DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns-UPDATED.pdf 2.2 MB
DEF CON 25 presentations/DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf 2 MB
DEF CON 25 presentations/DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community-UPDATED.pdf 26.8 MB
DEF CON 25 presentations/DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf 4.1 MB
DEF CON 25 presentations/DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks-UPDATED.pdf 3.4 MB
DEF CON 25 presentations/DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf 4.2 MB
DEF CON 25 presentations/DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf 10.6 MB
DEF CON 25 presentations/DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf 4.2 MB
DEF CON 25 presentations/DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent-UPDATED.pdf 2.5 MB
DEF CON 25 presentations/DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf 2.2 MB
DEF CON 25 presentations/DEFCON-25-Joe-Rozner-Wiping-Out-CSRF-UPDATED.pdf 130 KB
DEF CON 25 presentations/DEFCON-25-Joe-Rozner-Wiping-Out-CSRF.pdf 131 KB
DEF CON 25 presentations/DEFCON-25-Jon-Medina-Where-are-all-the-SDN-Talks-UPDATED.pdf 4.7 MB
DEF CON 25 presentations/DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks-UPDATED.pdf 3.5 MB
DEF CON 25 presentations/DEFCON-25-K2-Un-Fucking-Forensics-UPDATED.pdf 1.7 MB
DEF CON 25 presentations/DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time-UPDATED.pdf 4.5 MB
DEF CON 25 presentations/DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf 4.5 MB
DEF CON 25 presentations/DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts-UPDATED.pdf 1.7 MB
DEF CON 25 presentations/DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf 1.5 MB
DEF CON 25 presentations/DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf 290 KB
DEF CON 25 presentations/DEFCON-25-Macpherson-and-Temmingh-Finding-Useful-info-with-Maltego-UPDATED.pdf 38.9 MB
DEF CON 25 presentations/DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms-UPDATED.pdf 3 MB
DEF CON 25 presentations/DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf 3 MB
DEF CON 25 presentations/DEFCON-25-Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf 57.2 MB
DEF CON 25 presentations/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-UPDATED.pdf 6.7 MB
DEF CON 25 presentations/DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil-UPDATED.pdf 5.9 MB
DEF CON 25 presentations/DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf 6 MB
DEF CON 25 presentations/DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch-UPDATED.pdf 4.8 MB
DEF CON 25 presentations/DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf 1.3 MB
DEF CON 25 presentations/DEFCON-25-Mickey-Jesse-and-Oleksander-Driving-Down-the-Rabbit-Hole-UPDATED.pdf 12.3 MB
DEF CON 25 presentations/DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999-UPDATED.pdf 4.4 MB
DEF CON 25 presentations/DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf 6.5 MB
DEF CON 25 presentations/DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf 5.3 MB
DEF CON 25 presentations/DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf 5.5 MB
DEF CON 25 presentations/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-UPDATED.pdf 1.9 MB
DEF CON 25 presentations/DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots-UPDATED.pdf 6.7 MB
DEF CON 25 presentations/DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf 4.8 MB
DEF CON 25 presentations/DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks-UPDATED.pdf 2.6 MB
DEF CON 25 presentations/DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf 2.4 MB
DEF CON 25 presentations/DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser in-Trending-Programming-Languages-UPDATED.pdf 5.1 MB
DEF CON 25 presentations/DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf 5.9 MB
DEF CON 25 presentations/DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf 1.9 MB
DEF CON 25 presentations/DEFCON-25-Panel-Corman-and-Congressmen-DC-to-DEFCON-UPDATED.pdf 6 MB
DEF CON 25 presentations/DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools-UPDATED.pdf 12.4 MB
DEF CON 25 presentations/DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf 4.5 MB
DEF CON 25 presentations/DEFCON-25-Patrick-Wardle-Death-by-1000-Installers-on-MacOS-UPDATED.pdf 29.3 MB
DEF CON 25 presentations/DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly-UPDATED..pdf 15.4 MB
DEF CON 25 presentations/DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf 8.4 MB
DEF CON 25 presentations/DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-UPDATED.pdf 6 MB
DEF CON 25 presentations/DEFCON-25-Plore-Popping-a-Smart-Gun-UPDATED.pdf 4.2 MB
DEF CON 25 presentations/DEFCON-25-Plore-Popping-a-Smart-Gun.pdf 4.1 MB
DEF CON 25 presentations/DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf 6.7 MB
DEF CON 25 presentations/DEFCON-25-Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf 6.9 MB
DEF CON 25 presentations/DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf 3.2 MB
DEF CON 25 presentations/DEFCON-25-Redezem-PEIMA-Using-Power-Laws-to-Address-DOS-Attacks-UPDATED.pdf 751 KB
DEF CON 25 presentations/DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services-UPDATED.pdf 2.4 MB
DEF CON 25 presentations/DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf 2.2 MB
DEF CON 25 presentations/DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf 1.4 MB
DEF CON 25 presentations/DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf 2.5 MB
DEF CON 25 presentations/DEFCON-25-Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf 5.2 MB
DEF CON 25 presentations/DEFCON-25-Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf 2 MB
DEF CON 25 presentations/DEFCON-25-Sean-Kanuck-Hacking-Democracy-UPDATED.pdf 175 KB
DEF CON 25 presentations/DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip-UPDATED.pdf 5.8 MB
DEF CON 25 presentations/DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf 5.8 MB
DEF CON 25 presentations/DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android-UPDATED.pdf 900 KB
DEF CON 25 presentations/DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf 912 KB
DEF CON 25 presentations/DEFCON-25-spaceB0x-Exploiting-Continuous-Integration-UPDATED.pdf 2.7 MB
DEF CON 25 presentations/DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf 2 MB
DEF CON 25 presentations/DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-UPDATED.pdf 10.1 MB
DEF CON 25 presentations/DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation-UPDATED.pdf 3.6 MB
DEF CON 25 presentations/DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf 6 MB
DEF CON 25 presentations/DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf 6.8 MB
DEF CON 25 presentations/DEFCON-25-Svea-Eckert-Andreas-Dewes-Dark-Data.pdf 6.2 MB
DEF CON 25 presentations/DEFCON-25-Tess-Schrodinger-Total-Recall.pdf 5 MB
DEF CON 25 presentations/DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-UPDATED.pdf 14.8 MB
DEF CON 25 presentations/DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf 2 MB
DEF CON 25 presentations/DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf 20.7 MB
DEF CON 25 presentations/DEFCON-25-trixr4skids-DOOMed-Point-of-Sale-Systems-UPDATED.pdf 21.7 MB
DEF CON 25 presentations/DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf 3.3 MB
DEF CON 25 presentations/DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf 1.9 MB
DEF CON 25 presentations/DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf 2.2 MB
DEF CON 25 presentations/DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf 4.9 MB
DEF CON 25 presentations/DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf 2.8 MB
DEF CON 25 presentations/DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-UPDATED.pdf 2.9 MB
DEF CON 25 presentations/DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf 7.5 MB
DEF CON 25 presentations/DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf 5.5 MB
DEF CON 25 presentations/DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf 1.6 MB
DEF CON 25 presentations/DEFCON-25-Zardus-25-Years-of-Program-Analysis-UPDATED.pdf 3.7 MB
DEF CON 25 presentations/DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf 1.9 MB
DEF CON 25 presentations/Denton Gentry/DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-WP.pdf 513 KB
DEF CON 25 presentations/Denton Gentry/DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi.pdf 464 KB
DEF CON 25 presentations/5A1F/DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects-WP.pdf 6.2 MB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/config/client.yml 2 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/config/server.yml 2 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/doc/requirements.txt 547 B
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kcmd/cmdlook.py 1 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kcmd/cmdservice.py 12 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kcmd/__init__.py 0 B
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kcmd/__init__.pyc 129 B
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/keys/server.pem 3 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/klib/configuration.py 1 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/klib/ghlib.py 4 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/klib/ghlib.pyc 4 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/klib/__init__.py 0 B
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/klib/__init__.pyc 129 B
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/ktasks/gtasks.py 2 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/ktasks/__init__.py 0 B
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/gitcommander.py 8 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/webrouter.py 1 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/webservice.py 4 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/webservice.pyc 4 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/__init__.py 0 B
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/__init__.pyc 129 B
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/logs/octohook_client.log 40 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/logs/octohook_server.log 9 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/octohook.py 4 KB
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/README.md 155 B
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/templates/execlocal.tmpl 152 B
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/templates/putlocal.tmpl 151 B
DEF CON 25 presentations/Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/utils/cr_cert.sh 95 B
DEF CON 25 presentations/Dor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf 1.5 MB
DEF CON 25 presentations/Dor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf 828 KB
DEF CON 25 presentations/Duncan Woodbury and Nicholas Haltmeyer/DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-WP.pdf 586 KB
DEF CON 25 presentations/Duncan Woodbury and Nicholas Haltmeyer/DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles.pdf 4.5 MB
DEF CON 25 presentations/Itzik Kotler and Amit Klein/DEFCON-25-Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox-WP.pdf 1.3 MB
DEF CON 25 presentations/Itzik Kotler and Amit Klein/DEFCON-25-Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox.pdf 7.1 MB
DEF CON 25 presentations/Josh Pitts/DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks.pdf 5.4 MB
DEF CON 25 presentations/Josh Pitts/Josh Pitts - Extras/fido.py 170 KB
DEF CON 25 presentations/Josh Pitts/Josh Pitts - Extras/parser-output/win10/output.json 17.5 MB
DEF CON 25 presentations/Josh Pitts/Josh Pitts - Extras/parser-output/win7/output.json 6.2 MB
DEF CON 25 presentations/Josh Pitts/Josh Pitts - Extras/parser-output/win8/output.json 9.2 MB
DEF CON 25 presentations/Josh Pitts/Josh Pitts - Extras/parser-output/winVista/output.json 4.4 MB
DEF CON 25 presentations/Josh Pitts/Josh Pitts - Extras/parser-output/winXP/output.json 866 KB
DEF CON 25 presentations/Josh Pitts/Josh Pitts - Extras/README.txt 71 B
DEF CON 25 presentations/Mark Newlin Logan Lamb and Christopher Grayson/DEFCON-25-Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf 3.7 MB
DEF CON 25 presentations/Matt Knight and Marc Newlin/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP.pdf 125 KB
DEF CON 25 presentations/Matt Knight and Marc Newlin/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation.pdf 25.1 MB
DEF CON 25 presentations/Matt Knight and Marc Newlin - UPDATED/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-UPDATED.pdf 25.6 MB
DEF CON 25 presentations/Matt Knight and Marc Newlin - UPDATED/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP-UPDATED.pdf 125 KB
DEF CON 25 presentations/Matt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf 310 KB
DEF CON 25 presentations/Matt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts.pdf 6.1 MB
DEF CON 25 presentations/Morten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf 1.1 MB
DEF CON 25 presentations/Morten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf 2 MB
DEF CON 25 presentations/Phillip Tully and Michael Raggo/DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-WP.pdf 386 KB
DEF CON 25 presentations/Phillip Tully and Michael Raggo/DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally.pdf 3.6 MB
DEF CON 25 presentations/Romain Coltel and Yves Le Provost/DEFCON-25-Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients-WP.pdf 1 MB
DEF CON 25 presentations/Romain Coltel and Yves Le Provost/DEFCON-25-Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients.pdf 2.2 MB
DEF CON 25 presentations/Steinthor Bjarnason and Jason Jones/DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-WP.pdf 165 KB
DEF CON 25 presentations/Steinthor Bjarnason and Jason Jones/DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House.pdf 6.3 MB
DEF CON 25 presentations/Tomer Cohen/DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf 2 MB
DEF CON 25 presentations/Tomer Cohen/DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf 20.7 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
DEF CON 16 Video 9.3 GB 8
DEF CON 31 Video 46.1 GB 4
DEF CON 14 Video 10.3 GB 3
DEF CON 21 Application 92.3 GB 0
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly 1080p.mp4 Video 503.3 MB 9
DEF CON 16 video x265 Video 5.1 GB 3
DEF CON Conference Programs Application 830.7 MB 3
DEF CON 7 video Video 3.5 GB 2
DEF CON 11 music Audio 404.3 MB 2
DEF CON 15 7 GB 0
DEF CON 29 Application 376.8 GB 0
DEF CON 28 Application 47.6 GB 106
DEF CON 28 Application 190.4 GB 59
DEF CON 26 Audio 99.4 GB 16
DEF CON 18 ctf Application 3.6 GB 16
DEF CON 14 Video 10.3 GB 16
DEF CON 27 Audio 108.3 GB 15
DEF CON 13 audio 823.4 MB 15
DEF CON 5 242.6 MB 14
DEF CON 27 Audio 119.3 GB 13

Loading...