DEF CON 23 slides/DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Slides.mp4 |
605.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - 1057 - RICKASTLEY - Slides.srt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - 1057 - RICKASTLEY.txt |
22 KB |
DEF CON 23 slides/DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - Slides.mp4 |
32.7 MB |
DEF CON 23 slides/DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - Slides.srt |
50 KB |
DEF CON 23 slides/DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy.txt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Slides.mp4 |
29.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Slides.srt |
44 KB |
DEF CON 23 slides/DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns.txt |
29 KB |
DEF CON 23 slides/DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure - Slides.srt |
37 KB |
DEF CON 23 slides/DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure.txt |
25 KB |
DEF CON 23 slides/DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Slides.mp4 |
32.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Slides.srt |
23 KB |
DEF CON 23 slides/DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track.txt |
15 KB |
DEF CON 23 slides/DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - Slides.mp4 |
29.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - Slides.srt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention.txt |
21 KB |
DEF CON 23 slides/DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Slides.mp4 |
30.7 MB |
DEF CON 23 slides/DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Slides.srt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring.txt |
23 KB |
DEF CON 23 slides/DEF CON 23 Conference - atlas - Fun with Symboliks - Slides.mp4 |
38.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - atlas - Fun with Symboliks - Slides.srt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - atlas - Fun with Symboliks.txt |
22 KB |
DEF CON 23 slides/DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Slides.mp4 |
45.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Slides.srt |
23 KB |
DEF CON 23 slides/DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed.txt |
15 KB |
DEF CON 23 slides/DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - Slides.mp4 |
38.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - Slides.srt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth.txt |
20 KB |
DEF CON 23 slides/DEF CON 23 Conference - Brent White - Hacking Web Apps - Slides.mp4 |
31.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - Brent White - Hacking Web Apps - Slides.srt |
41 KB |
DEF CON 23 slides/DEF CON 23 Conference - Brent White - Hacking Web Apps.txt |
27 KB |
DEF CON 23 slides/DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - Slides.mp4 |
47.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - Slides.srt |
44 KB |
DEF CON 23 slides/DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk.txt |
56 KB |
DEF CON 23 slides/DEF CON 23 Conference - Bruce Schneier - Questions and Answers - Slides.srt |
48 KB |
DEF CON 23 slides/DEF CON 23 Conference - Bruce Schneier - Questions and Answers.txt |
32 KB |
DEF CON 23 slides/DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Slides.mp4 |
53.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Slides.srt |
35 KB |
DEF CON 23 slides/DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle.txt |
23 KB |
DEF CON 23 slides/DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Slides.mp4 |
48.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Slides.srt |
29 KB |
DEF CON 23 slides/DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warfare in Reverse Engineering.txt |
20 KB |
DEF CON 23 slides/DEF CON 23 Conference - Chris Rock - I Will Kill You - Slides.mp4 |
39.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Chris Rock - I Will Kill You - Slides.srt |
20 KB |
DEF CON 23 slides/DEF CON 23 Conference - Chris Rock - I Will Kill You.txt |
13 KB |
DEF CON 23 slides/DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - Slides.mp4 |
34.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - Slides.srt |
37 KB |
DEF CON 23 slides/DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS.txt |
25 KB |
DEF CON 23 slides/DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Slides.mp4 |
51.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Slides.srt |
32 KB |
DEF CON 23 slides/DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF.txt |
22 KB |
DEF CON 23 slides/DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Slides.mp4 |
35.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Slides.srt |
55 KB |
DEF CON 23 slides/DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service.txt |
37 KB |
DEF CON 23 slides/DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Slides.mp4 |
49.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Slides.srt |
53 KB |
DEF CON 23 slides/DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit.txt |
35 KB |
DEF CON 23 slides/DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers - Slides.srt |
70 KB |
DEF CON 23 slides/DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers.txt |
47 KB |
DEF CON 23 slides/DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - Slides.mp4 |
30 MB |
DEF CON 23 slides/DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - Slides.srt |
39 KB |
DEF CON 23 slides/DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools.txt |
27 KB |
DEF CON 23 slides/DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Slides.mp4 |
45.7 MB |
DEF CON 23 slides/DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Slides.srt |
49 KB |
DEF CON 23 slides/DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research.txt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Slides.mp4 |
34.7 MB |
DEF CON 23 slides/DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Slides.srt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village.txt |
20 KB |
DEF CON 23 slides/DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Slides.mp4 |
40.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Slides.srt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment.txt |
22 KB |
DEF CON 23 slides/DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - Slides.mp4 |
46.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - Slides.srt |
40 KB |
DEF CON 23 slides/DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet.txt |
27 KB |
DEF CON 23 slides/DEF CON 23 Conference - 1057 - RICKASTLEY - Slides.mp4 |
32.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Slides.srt |
53 KB |
DEF CON 23 slides/DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You.txt |
35 KB |
DEF CON 23 slides/DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Slides.mp4 |
37.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Slides.srt |
38 KB |
DEF CON 23 slides/DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns.txt |
25 KB |
DEF CON 23 slides/DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - Slides.mp4 |
18.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - Slides.srt |
27 KB |
DEF CON 23 slides/DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us.txt |
18 KB |
DEF CON 23 slides/DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused - Slides.mp4 |
45.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused.txt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Slides.mp4 |
27.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Slides.srt |
49 KB |
DEF CON 23 slides/DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You.txt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Slides.mp4 |
45 MB |
DEF CON 23 slides/DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Slides.srt |
38 KB |
DEF CON 23 slides/DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems.txt |
26 KB |
DEF CON 23 slides/DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - Slides.mp4 |
37.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - Slides.srt |
37 KB |
DEF CON 23 slides/DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs.txt |
25 KB |
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - Slides.mp4 |
43.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - Slides.srt |
37 KB |
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires.txt |
25 KB |
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - Slides.mp4 |
36.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - Slides.srt |
35 KB |
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All.txt |
24 KB |
DEF CON 23 slides/DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - Slides.mp4 |
32.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - Slides.srt |
61 KB |
DEF CON 23 slides/DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON.txt |
24 KB |
DEF CON 23 slides/DEF CON 23 Conference - Eijah - Crypto for Hackers - Slides.mp4 |
42.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Eijah - Crypto for Hackers - Slides.srt |
59 KB |
DEF CON 23 slides/DEF CON 23 Conference - Eijah - Crypto for Hackers.txt |
40 KB |
DEF CON 23 slides/DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Slides.mp4 |
16.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Slides.srt |
18 KB |
DEF CON 23 slides/DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers.txt |
12 KB |
DEF CON 23 slides/DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - Slides.mp4 |
55.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - Slides.srt |
52 KB |
DEF CON 23 slides/DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS.txt |
35 KB |
DEF CON 23 slides/DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Slides.mp4 |
38.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Slides.srt |
43 KB |
DEF CON 23 slides/DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core.txt |
29 KB |
DEF CON 23 slides/DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - Slides.mp4 |
28.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - Slides.srt |
41 KB |
DEF CON 23 slides/DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks.txt |
27 KB |
DEF CON 23 slides/DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Slides.mp4 |
51.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Slides.srt |
50 KB |
DEF CON 23 slides/DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID.txt |
34 KB |
DEF CON 23 slides/DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Slides.mp4 |
48.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Slides.srt |
58 KB |
DEF CON 23 slides/DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter.txt |
39 KB |
DEF CON 23 slides/DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Slides.mp4 |
33 MB |
DEF CON 23 slides/DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Slides.srt |
49 KB |
DEF CON 23 slides/DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack.txt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - Slides.mp4 |
26.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - Slides.srt |
31 KB |
DEF CON 23 slides/DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio.txt |
21 KB |
DEF CON 23 slides/DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Slides.mp4 |
46.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Slides.srt |
62 KB |
DEF CON 23 slides/DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence.txt |
41 KB |
DEF CON 23 slides/DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - Slides.mp4 |
41.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - Slides.srt |
49 KB |
DEF CON 23 slides/DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks.txt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - Slides.mp4 |
9.7 MB |
DEF CON 23 slides/DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - Slides.srt |
14 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR.txt |
9 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ian Latter - Remote Access - the APT - Slides.mp4 |
49.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Ian Latter - Remote Access - the APT - Slides.srt |
48 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ian Latter - Remote Access - the APT.txt |
32 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Slides.mp4 |
47.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Slides.srt |
29 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers.txt |
20 KB |
DEF CON 23 slides/DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Slides.mp4 |
42.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Slides.srt |
52 KB |
DEF CON 23 slides/DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015.txt |
35 KB |
DEF CON 23 slides/DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Slides.mp4 |
27.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Slides.srt |
22 KB |
DEF CON 23 slides/DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security.txt |
15 KB |
DEF CON 23 slides/DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Slides.mp4 |
36.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Slides.srt |
46 KB |
DEF CON 23 slides/DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications.txt |
31 KB |
DEF CON 23 slides/DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Slides.mp4 |
40.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Slides.srt |
41 KB |
DEF CON 23 slides/DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants.txt |
27 KB |
DEF CON 23 slides/DEF CON 23 Conference - John Menerick - Backdooring Git - Slides.mp4 |
45.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - John Menerick - Backdooring Git - Slides.srt |
40 KB |
DEF CON 23 slides/DEF CON 23 Conference - John Menerick - Backdooring Git.txt |
27 KB |
DEF CON 23 slides/DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - Slides.mp4 |
21.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - Slides.srt |
38 KB |
DEF CON 23 slides/DEF CON 23 Conference - John Seymour - Quantum Classification of Malware.txt |
25 KB |
DEF CON 23 slides/DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.mp4 |
61.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.srt |
35 KB |
DEF CON 23 slides/DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.txt |
23 KB |
DEF CON 23 slides/DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Slides.mp4 |
50.7 MB |
DEF CON 23 slides/DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Slides.srt |
44 KB |
DEF CON 23 slides/DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android.txt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Slides.mp4 |
39.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Slides.srt |
54 KB |
DEF CON 23 slides/DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC.txt |
37 KB |
DEF CON 23 slides/DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - Slides.mp4 |
44.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - Slides.srt |
65 KB |
DEF CON 23 slides/DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People.txt |
43 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - Slides.mp4 |
38.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - Slides.srt |
56 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker.txt |
37 KB |
DEF CON 23 slides/DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Slides.mp4 |
45.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Slides.srt |
50 KB |
DEF CON 23 slides/DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion.txt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Slides.mp4 |
45.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Slides.srt |
20 KB |
DEF CON 23 slides/DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR.txt |
14 KB |
DEF CON 23 slides/DEF CON 23 Conference - Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors with DNS - Slides.mp4 |
66.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors with DNS - Slides.srt |
40 KB |
DEF CON 23 slides/DEF CON 23 Conference - Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors with DNS.txt |
28 KB |
DEF CON 23 slides/DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - Slides.mp4 |
16.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - Slides.srt |
19 KB |
DEF CON 23 slides/DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings.txt |
13 KB |
DEF CON 23 slides/DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Slides.mp4 |
49.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Slides.srt |
41 KB |
DEF CON 23 slides/DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S.txt |
28 KB |
DEF CON 23 slides/DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Slides.mp4 |
35 MB |
DEF CON 23 slides/DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Slides.srt |
44 KB |
DEF CON 23 slides/DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic.txt |
29 KB |
DEF CON 23 slides/DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Slides.mp4 |
61.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Slides.srt |
38 KB |
DEF CON 23 slides/DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb.txt |
26 KB |
DEF CON 23 slides/DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Slides.mp4 |
12.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Slides.srt |
12 KB |
DEF CON 23 slides/DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern.txt |
8 KB |
DEF CON 23 slides/DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Slides.mp4 |
48.7 MB |
DEF CON 23 slides/DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Slides.srt |
60 KB |
DEF CON 23 slides/DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars.txt |
40 KB |
DEF CON 23 slides/DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Slides.mp4 |
46.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Slides.srt |
58 KB |
DEF CON 23 slides/DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System.txt |
39 KB |
DEF CON 23 slides/DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Slides.mp4 |
44.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Slides.srt |
58 KB |
DEF CON 23 slides/DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers.txt |
39 KB |
DEF CON 23 slides/DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - Slides.mp4 |
14.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - Slides.srt |
12 KB |
DEF CON 23 slides/DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type.txt |
8 KB |
DEF CON 23 slides/DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Slides.mp4 |
34.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Slides.srt |
47 KB |
DEF CON 23 slides/DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There.txt |
32 KB |
DEF CON 23 slides/DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Slides.mp4 |
51.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Slides.srt |
38 KB |
DEF CON 23 slides/DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF.txt |
26 KB |
DEF CON 23 slides/DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Slides.mp4 |
48.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Slides.srt |
28 KB |
DEF CON 23 slides/DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop.txt |
19 KB |
DEF CON 23 slides/DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Slides.mp4 |
45.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Slides.srt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards.txt |
22 KB |
DEF CON 23 slides/DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - Slides.mp4 |
40.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - Slides.srt |
46 KB |
DEF CON 23 slides/DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You.txt |
31 KB |
DEF CON 23 slides/DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Slides.mp4 |
28.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Slides.srt |
26 KB |
DEF CON 23 slides/DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Slides.mp4 |
41.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Slides.srt |
39 KB |
DEF CON 23 slides/DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack.txt |
26 KB |
DEF CON 23 slides/DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Slides.mp4 |
39.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Slides.srt |
53 KB |
DEF CON 23 slides/DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS.txt |
35 KB |
DEF CON 23 slides/DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - Slides.mp4 |
49.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - Slides.srt |
31 KB |
DEF CON 23 slides/DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks.txt |
21 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - Slides.mp4 |
31.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - Slides.srt |
44 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs.txt |
29 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties - Slides.srt |
73 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties.txt |
48 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Closing Ceremonies - Slides.mp4 |
178 MB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Closing Ceremonies - Slides.srt |
78 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Closing Ceremonies.txt |
53 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Contests Closing Ceremonies - Slides.mp4 |
21.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Contests Closing Ceremonies - Slides.srt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Contests Closing Ceremonies.txt |
20 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON 101 The Panel - Slides.mp4 |
55.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON 101 The Panel - Slides.srt |
87 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON 101 The Panel.txt |
58 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON Comedy Inception - Slides.mp4 |
104.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON Comedy Inception - Slides.srt |
86 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON Comedy Inception.txt |
60 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Slides.mp4 |
30.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Slides.srt |
27 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques.txt |
18 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Slides.mp4 |
41.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Slides.srt |
44 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web.txt |
29 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Slides.mp4 |
83.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Slides.srt |
111 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research.txt |
74 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Switches Get Stitches - Slides.mp4 |
42.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Switches Get Stitches - Slides.srt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - Switches Get Stitches.txt |
21 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - Slides.mp4 |
40.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - Slides.srt |
38 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike.txt |
26 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Slides.mp4 |
81 MB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Slides.srt |
103 KB |
DEF CON 23 slides/DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis.txt |
70 KB |
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - Slides.mp4 |
48 MB |
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - Slides.srt |
47 KB |
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X.txt |
32 KB |
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Slides.mp4 |
42.7 MB |
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Slides.srt |
50 KB |
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It.txt |
34 KB |
DEF CON 23 slides/DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Slides.mp4 |
19.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Slides.srt |
23 KB |
DEF CON 23 slides/DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain.txt |
15 KB |
DEF CON 23 slides/DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - Slides.mp4 |
44.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - Slides.srt |
24 KB |
DEF CON 23 slides/DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation.txt |
17 KB |
DEF CON 23 slides/DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Slides.mp4 |
37.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Slides.srt |
62 KB |
DEF CON 23 slides/DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery.txt |
42 KB |
DEF CON 23 slides/DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Slides.mp4 |
16.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Slides.srt |
17 KB |
DEF CON 23 slides/DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee.txt |
11 KB |
DEF CON 23 slides/DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - Slides.mp4 |
20.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - Slides.srt |
16 KB |
DEF CON 23 slides/DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy.txt |
11 KB |
DEF CON 23 slides/DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - Slides.mp4 |
36.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - Slides.srt |
45 KB |
DEF CON 23 slides/DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain.txt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Slides.mp4 |
50.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Slides.srt |
40 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP.txt |
27 KB |
DEF CON 23 slides/DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Slides.mp4 |
38.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Slides.srt |
54 KB |
DEF CON 23 slides/DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer.txt |
36 KB |
DEF CON 23 slides/DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Slides.mp4 |
37.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Slides.srt |
60 KB |
DEF CON 23 slides/DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline.txt |
40 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Slides.mp4 |
44.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Slides.srt |
62 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments.txt |
41 KB |
DEF CON 23 slides/DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle - Slides.srt |
54 KB |
DEF CON 23 slides/DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle.txt |
36 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.mp4 |
38.7 MB |
DEF CON 23 slides/DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.srt |
44 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets.txt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - Slides.mp4 |
32.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - Slides.srt |
17 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans.txt |
12 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Slides.mp4 |
42.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Slides.srt |
56 KB |
DEF CON 23 slides/DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS.txt |
37 KB |
DEF CON 23 slides/DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Slides.mp4 |
46.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Slides.srt |
55 KB |
DEF CON 23 slides/DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars.txt |
37 KB |
DEF CON 23 slides/DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Slides.mp4 |
41.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Slides.srt |
45 KB |
DEF CON 23 slides/DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You.txt |
31 KB |
DEF CON 23 slides/DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Slides.mp4 |
31.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Slides.srt |
35 KB |
DEF CON 23 slides/DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots.txt |
23 KB |
DEF CON 23 slides/DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Slides.mp4 |
49.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Slides.srt |
61 KB |
DEF CON 23 slides/DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense.txt |
41 KB |
DEF CON 23 slides/DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - Slides.mp4 |
47.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - Slides.srt |
45 KB |
DEF CON 23 slides/DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation.txt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Slides.mp4 |
43.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Slides.srt |
35 KB |
DEF CON 23 slides/DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis.txt |
23 KB |
DEF CON 23 slides/DEF CON 23 Conference - Spot the FED.srt |
9 KB |
DEF CON 23 slides/DEF CON 23 Conference - Spot the FED.txt |
6 KB |
DEF CON 23 slides/DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - Slides.mp4 |
40.4 MB |
DEF CON 23 slides/DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - Slides.srt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game.txt |
20 KB |
DEF CON 23 slides/DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Slides.mp4 |
28.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Slides.srt |
57 KB |
DEF CON 23 slides/DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5.txt |
38 KB |
DEF CON 23 slides/DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Slides.mp4 |
50.9 MB |
DEF CON 23 slides/DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Slides.srt |
59 KB |
DEF CON 23 slides/DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool.txt |
39 KB |
DEF CON 23 slides/DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Slides.mp4 |
38.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Slides.srt |
43 KB |
DEF CON 23 slides/DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow.txt |
29 KB |
DEF CON 23 slides/DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Slides.mp4 |
41.5 MB |
DEF CON 23 slides/DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Slides.srt |
49 KB |
DEF CON 23 slides/DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers.txt |
33 KB |
DEF CON 23 slides/DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Slides.mp4 |
47.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Slides.srt |
28 KB |
DEF CON 23 slides/DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams.txt |
19 KB |
DEF CON 23 slides/DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Slides.mp4 |
32.2 MB |
DEF CON 23 slides/DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Slides.srt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows.txt |
20 KB |
DEF CON 23 slides/DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Slides.mp4 |
41.1 MB |
DEF CON 23 slides/DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Slides.srt |
38 KB |
DEF CON 23 slides/DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Slides.mp4 |
33.7 MB |
DEF CON 23 slides/DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Slides.srt |
44 KB |
DEF CON 23 slides/DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures.txt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - Slides.mp4 |
34.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - Slides.srt |
46 KB |
DEF CON 23 slides/DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware.txt |
31 KB |
DEF CON 23 slides/DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Slides.mp4 |
42.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Slides.srt |
44 KB |
DEF CON 23 slides/DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster.txt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Slides.mp4 |
52.8 MB |
DEF CON 23 slides/DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Slides.srt |
74 KB |
DEF CON 23 slides/DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking.txt |
50 KB |
DEF CON 23 slides/DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Slides.mp4 |
42.7 MB |
DEF CON 23 slides/DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Slides.srt |
45 KB |
DEF CON 23 slides/DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware.txt |
30 KB |
DEF CON 23 slides/DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Slides.mp4 |
32.3 MB |
DEF CON 23 slides/DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Slides.srt |
43 KB |
DEF CON 23 slides/DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy.txt |
29 KB |
DEF CON 23 slides/DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - Slides.mp4 |
32 MB |
DEF CON 23 slides/DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - Slides.srt |
47 KB |
DEF CON 23 slides/DEF CON 23 Conference - Zack Fasel - Seeing through the Fog.txt |
31 KB |
DEF CON 23 slides/DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Slides.mp4 |
45 MB |
DEF CON 23 slides/DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Slides.srt |
16 KB |
DEF CON 23 slides/DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto.txt |
11 KB |
DEF CON 23 slides/DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Slides.mp4 |
67.6 MB |
DEF CON 23 slides/DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Slides.srt |
37 KB |
DEF CON 23 slides/DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction.txt |
47 KB |