BITCQ

DEF CON 23 slides

Size: 5.8 GB
Magnet link

Name Size
DEF CON 23 slides/DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Slides.mp4 605.9 MB
DEF CON 23 slides/DEF CON 23 Conference - 1057 - RICKASTLEY - Slides.srt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - 1057 - RICKASTLEY.txt 22 KB
DEF CON 23 slides/DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - Slides.mp4 32.7 MB
DEF CON 23 slides/DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - Slides.srt 50 KB
DEF CON 23 slides/DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy.txt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Slides.mp4 29.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - Slides.srt 44 KB
DEF CON 23 slides/DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns.txt 29 KB
DEF CON 23 slides/DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure - Slides.srt 37 KB
DEF CON 23 slides/DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure.txt 25 KB
DEF CON 23 slides/DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Slides.mp4 32.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - Slides.srt 23 KB
DEF CON 23 slides/DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track.txt 15 KB
DEF CON 23 slides/DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - Slides.mp4 29.2 MB
DEF CON 23 slides/DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - Slides.srt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention.txt 21 KB
DEF CON 23 slides/DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Slides.mp4 30.7 MB
DEF CON 23 slides/DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - Slides.srt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring.txt 23 KB
DEF CON 23 slides/DEF CON 23 Conference - atlas - Fun with Symboliks - Slides.mp4 38.1 MB
DEF CON 23 slides/DEF CON 23 Conference - atlas - Fun with Symboliks - Slides.srt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - atlas - Fun with Symboliks.txt 22 KB
DEF CON 23 slides/DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Slides.mp4 45.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - Slides.srt 23 KB
DEF CON 23 slides/DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed.txt 15 KB
DEF CON 23 slides/DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - Slides.mp4 38.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - Slides.srt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth.txt 20 KB
DEF CON 23 slides/DEF CON 23 Conference - Brent White - Hacking Web Apps - Slides.mp4 31.1 MB
DEF CON 23 slides/DEF CON 23 Conference - Brent White - Hacking Web Apps - Slides.srt 41 KB
DEF CON 23 slides/DEF CON 23 Conference - Brent White - Hacking Web Apps.txt 27 KB
DEF CON 23 slides/DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - Slides.mp4 47.6 MB
DEF CON 23 slides/DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - Slides.srt 44 KB
DEF CON 23 slides/DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk.txt 56 KB
DEF CON 23 slides/DEF CON 23 Conference - Bruce Schneier - Questions and Answers - Slides.srt 48 KB
DEF CON 23 slides/DEF CON 23 Conference - Bruce Schneier - Questions and Answers.txt 32 KB
DEF CON 23 slides/DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Slides.mp4 53.6 MB
DEF CON 23 slides/DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - Slides.srt 35 KB
DEF CON 23 slides/DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle.txt 23 KB
DEF CON 23 slides/DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Slides.mp4 48.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warefare in Referse engineering - Slides.srt 29 KB
DEF CON 23 slides/DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warfare in Reverse Engineering.txt 20 KB
DEF CON 23 slides/DEF CON 23 Conference - Chris Rock - I Will Kill You - Slides.mp4 39.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Chris Rock - I Will Kill You - Slides.srt 20 KB
DEF CON 23 slides/DEF CON 23 Conference - Chris Rock - I Will Kill You.txt 13 KB
DEF CON 23 slides/DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - Slides.mp4 34.9 MB
DEF CON 23 slides/DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - Slides.srt 37 KB
DEF CON 23 slides/DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS.txt 25 KB
DEF CON 23 slides/DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Slides.mp4 51.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - Slides.srt 32 KB
DEF CON 23 slides/DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF.txt 22 KB
DEF CON 23 slides/DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Slides.mp4 35.1 MB
DEF CON 23 slides/DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - Slides.srt 55 KB
DEF CON 23 slides/DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service.txt 37 KB
DEF CON 23 slides/DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Slides.mp4 49.1 MB
DEF CON 23 slides/DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - Slides.srt 53 KB
DEF CON 23 slides/DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit.txt 35 KB
DEF CON 23 slides/DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers - Slides.srt 70 KB
DEF CON 23 slides/DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers.txt 47 KB
DEF CON 23 slides/DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - Slides.mp4 30 MB
DEF CON 23 slides/DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - Slides.srt 39 KB
DEF CON 23 slides/DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools.txt 27 KB
DEF CON 23 slides/DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Slides.mp4 45.7 MB
DEF CON 23 slides/DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - Slides.srt 49 KB
DEF CON 23 slides/DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research.txt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Slides.mp4 34.7 MB
DEF CON 23 slides/DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - Slides.srt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village.txt 20 KB
DEF CON 23 slides/DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Slides.mp4 40.9 MB
DEF CON 23 slides/DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - Slides.srt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment.txt 22 KB
DEF CON 23 slides/DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - Slides.mp4 46.1 MB
DEF CON 23 slides/DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - Slides.srt 40 KB
DEF CON 23 slides/DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet.txt 27 KB
DEF CON 23 slides/DEF CON 23 Conference - 1057 - RICKASTLEY - Slides.mp4 32.1 MB
DEF CON 23 slides/DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - Slides.srt 53 KB
DEF CON 23 slides/DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You.txt 35 KB
DEF CON 23 slides/DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Slides.mp4 37.9 MB
DEF CON 23 slides/DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - Slides.srt 38 KB
DEF CON 23 slides/DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns.txt 25 KB
DEF CON 23 slides/DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - Slides.mp4 18.6 MB
DEF CON 23 slides/DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - Slides.srt 27 KB
DEF CON 23 slides/DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us.txt 18 KB
DEF CON 23 slides/DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused - Slides.mp4 45.2 MB
DEF CON 23 slides/DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused.txt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Slides.mp4 27.3 MB
DEF CON 23 slides/DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - Slides.srt 49 KB
DEF CON 23 slides/DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You.txt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Slides.mp4 45 MB
DEF CON 23 slides/DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - Slides.srt 38 KB
DEF CON 23 slides/DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems.txt 26 KB
DEF CON 23 slides/DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - Slides.mp4 37.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - Slides.srt 37 KB
DEF CON 23 slides/DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs.txt 25 KB
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - Slides.mp4 43.6 MB
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - Slides.srt 37 KB
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires.txt 25 KB
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - Slides.mp4 36.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - Slides.srt 35 KB
DEF CON 23 slides/DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All.txt 24 KB
DEF CON 23 slides/DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - Slides.mp4 32.2 MB
DEF CON 23 slides/DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - Slides.srt 61 KB
DEF CON 23 slides/DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON.txt 24 KB
DEF CON 23 slides/DEF CON 23 Conference - Eijah - Crypto for Hackers - Slides.mp4 42.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Eijah - Crypto for Hackers - Slides.srt 59 KB
DEF CON 23 slides/DEF CON 23 Conference - Eijah - Crypto for Hackers.txt 40 KB
DEF CON 23 slides/DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Slides.mp4 16.9 MB
DEF CON 23 slides/DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - Slides.srt 18 KB
DEF CON 23 slides/DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers.txt 12 KB
DEF CON 23 slides/DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - Slides.mp4 55.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - Slides.srt 52 KB
DEF CON 23 slides/DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS.txt 35 KB
DEF CON 23 slides/DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Slides.mp4 38.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - Slides.srt 43 KB
DEF CON 23 slides/DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core.txt 29 KB
DEF CON 23 slides/DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - Slides.mp4 28.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - Slides.srt 41 KB
DEF CON 23 slides/DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks.txt 27 KB
DEF CON 23 slides/DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Slides.mp4 51.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - Slides.srt 50 KB
DEF CON 23 slides/DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID.txt 34 KB
DEF CON 23 slides/DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Slides.mp4 48.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - Slides.srt 58 KB
DEF CON 23 slides/DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter.txt 39 KB
DEF CON 23 slides/DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Slides.mp4 33 MB
DEF CON 23 slides/DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - Slides.srt 49 KB
DEF CON 23 slides/DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack.txt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - Slides.mp4 26.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - Slides.srt 31 KB
DEF CON 23 slides/DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio.txt 21 KB
DEF CON 23 slides/DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Slides.mp4 46.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - Slides.srt 62 KB
DEF CON 23 slides/DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence.txt 41 KB
DEF CON 23 slides/DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - Slides.mp4 41.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - Slides.srt 49 KB
DEF CON 23 slides/DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks.txt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - Slides.mp4 9.7 MB
DEF CON 23 slides/DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - Slides.srt 14 KB
DEF CON 23 slides/DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR.txt 9 KB
DEF CON 23 slides/DEF CON 23 Conference - Ian Latter - Remote Access - the APT - Slides.mp4 49.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Ian Latter - Remote Access - the APT - Slides.srt 48 KB
DEF CON 23 slides/DEF CON 23 Conference - Ian Latter - Remote Access - the APT.txt 32 KB
DEF CON 23 slides/DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Slides.mp4 47.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - Slides.srt 29 KB
DEF CON 23 slides/DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers.txt 20 KB
DEF CON 23 slides/DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Slides.mp4 42.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - Slides.srt 52 KB
DEF CON 23 slides/DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015.txt 35 KB
DEF CON 23 slides/DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Slides.mp4 27.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - Slides.srt 22 KB
DEF CON 23 slides/DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security.txt 15 KB
DEF CON 23 slides/DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Slides.mp4 36.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - Slides.srt 46 KB
DEF CON 23 slides/DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications.txt 31 KB
DEF CON 23 slides/DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Slides.mp4 40.1 MB
DEF CON 23 slides/DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - Slides.srt 41 KB
DEF CON 23 slides/DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants.txt 27 KB
DEF CON 23 slides/DEF CON 23 Conference - John Menerick - Backdooring Git - Slides.mp4 45.1 MB
DEF CON 23 slides/DEF CON 23 Conference - John Menerick - Backdooring Git - Slides.srt 40 KB
DEF CON 23 slides/DEF CON 23 Conference - John Menerick - Backdooring Git.txt 27 KB
DEF CON 23 slides/DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - Slides.mp4 21.9 MB
DEF CON 23 slides/DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - Slides.srt 38 KB
DEF CON 23 slides/DEF CON 23 Conference - John Seymour - Quantum Classification of Malware.txt 25 KB
DEF CON 23 slides/DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.mp4 61.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.srt 35 KB
DEF CON 23 slides/DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.txt 23 KB
DEF CON 23 slides/DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Slides.mp4 50.7 MB
DEF CON 23 slides/DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - Slides.srt 44 KB
DEF CON 23 slides/DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android.txt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Slides.mp4 39.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - Slides.srt 54 KB
DEF CON 23 slides/DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC.txt 37 KB
DEF CON 23 slides/DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - Slides.mp4 44.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - Slides.srt 65 KB
DEF CON 23 slides/DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People.txt 43 KB
DEF CON 23 slides/DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - Slides.mp4 38.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - Slides.srt 56 KB
DEF CON 23 slides/DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker.txt 37 KB
DEF CON 23 slides/DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Slides.mp4 45.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - Slides.srt 50 KB
DEF CON 23 slides/DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion.txt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Slides.mp4 45.6 MB
DEF CON 23 slides/DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - Slides.srt 20 KB
DEF CON 23 slides/DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR.txt 14 KB
DEF CON 23 slides/DEF CON 23 Conference - Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors with DNS - Slides.mp4 66.1 MB
DEF CON 23 slides/DEF CON 23 Conference - Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors with DNS - Slides.srt 40 KB
DEF CON 23 slides/DEF CON 23 Conference - Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors with DNS.txt 28 KB
DEF CON 23 slides/DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - Slides.mp4 16.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - Slides.srt 19 KB
DEF CON 23 slides/DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings.txt 13 KB
DEF CON 23 slides/DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Slides.mp4 49.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - Slides.srt 41 KB
DEF CON 23 slides/DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S.txt 28 KB
DEF CON 23 slides/DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Slides.mp4 35 MB
DEF CON 23 slides/DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - Slides.srt 44 KB
DEF CON 23 slides/DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic.txt 29 KB
DEF CON 23 slides/DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Slides.mp4 61.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - Slides.srt 38 KB
DEF CON 23 slides/DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb.txt 26 KB
DEF CON 23 slides/DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Slides.mp4 12.9 MB
DEF CON 23 slides/DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - Slides.srt 12 KB
DEF CON 23 slides/DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern.txt 8 KB
DEF CON 23 slides/DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Slides.mp4 48.7 MB
DEF CON 23 slides/DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - Slides.srt 60 KB
DEF CON 23 slides/DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars.txt 40 KB
DEF CON 23 slides/DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Slides.mp4 46.5 MB
DEF CON 23 slides/DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - Slides.srt 58 KB
DEF CON 23 slides/DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System.txt 39 KB
DEF CON 23 slides/DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Slides.mp4 44.9 MB
DEF CON 23 slides/DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - Slides.srt 58 KB
DEF CON 23 slides/DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers.txt 39 KB
DEF CON 23 slides/DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - Slides.mp4 14.5 MB
DEF CON 23 slides/DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - Slides.srt 12 KB
DEF CON 23 slides/DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type.txt 8 KB
DEF CON 23 slides/DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Slides.mp4 34.9 MB
DEF CON 23 slides/DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - Slides.srt 47 KB
DEF CON 23 slides/DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There.txt 32 KB
DEF CON 23 slides/DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Slides.mp4 51.1 MB
DEF CON 23 slides/DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - Slides.srt 38 KB
DEF CON 23 slides/DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF.txt 26 KB
DEF CON 23 slides/DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Slides.mp4 48.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - Slides.srt 28 KB
DEF CON 23 slides/DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop.txt 19 KB
DEF CON 23 slides/DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Slides.mp4 45.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - Slides.srt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards.txt 22 KB
DEF CON 23 slides/DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - Slides.mp4 40.6 MB
DEF CON 23 slides/DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - Slides.srt 46 KB
DEF CON 23 slides/DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You.txt 31 KB
DEF CON 23 slides/DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Slides.mp4 28.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - Slides.srt 26 KB
DEF CON 23 slides/DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Slides.mp4 41.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - Slides.srt 39 KB
DEF CON 23 slides/DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack.txt 26 KB
DEF CON 23 slides/DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Slides.mp4 39.6 MB
DEF CON 23 slides/DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - Slides.srt 53 KB
DEF CON 23 slides/DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS.txt 35 KB
DEF CON 23 slides/DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - Slides.mp4 49.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - Slides.srt 31 KB
DEF CON 23 slides/DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks.txt 21 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - Slides.mp4 31.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - Slides.srt 44 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs.txt 29 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties - Slides.srt 73 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties.txt 48 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Closing Ceremonies - Slides.mp4 178 MB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Closing Ceremonies - Slides.srt 78 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Closing Ceremonies.txt 53 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Contests Closing Ceremonies - Slides.mp4 21.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Contests Closing Ceremonies - Slides.srt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Contests Closing Ceremonies.txt 20 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON 101 The Panel - Slides.mp4 55.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON 101 The Panel - Slides.srt 87 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON 101 The Panel.txt 58 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON Comedy Inception - Slides.mp4 104.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON Comedy Inception - Slides.srt 86 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - DEF CON Comedy Inception.txt 60 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Slides.mp4 30.1 MB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - Slides.srt 27 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques.txt 18 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Slides.mp4 41.1 MB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - Slides.srt 44 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web.txt 29 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Slides.mp4 83.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - Slides.srt 111 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research.txt 74 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Switches Get Stitches - Slides.mp4 42.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Switches Get Stitches - Slides.srt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - Switches Get Stitches.txt 21 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - Slides.mp4 40.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - Slides.srt 38 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike.txt 26 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Slides.mp4 81 MB
DEF CON 23 slides/DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - Slides.srt 103 KB
DEF CON 23 slides/DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis.txt 70 KB
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - Slides.mp4 48 MB
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - Slides.srt 47 KB
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X.txt 32 KB
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Slides.mp4 42.7 MB
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - Slides.srt 50 KB
DEF CON 23 slides/DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It.txt 34 KB
DEF CON 23 slides/DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Slides.mp4 19.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - Slides.srt 23 KB
DEF CON 23 slides/DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain.txt 15 KB
DEF CON 23 slides/DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - Slides.mp4 44.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - Slides.srt 24 KB
DEF CON 23 slides/DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation.txt 17 KB
DEF CON 23 slides/DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Slides.mp4 37.9 MB
DEF CON 23 slides/DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - Slides.srt 62 KB
DEF CON 23 slides/DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery.txt 42 KB
DEF CON 23 slides/DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Slides.mp4 16.6 MB
DEF CON 23 slides/DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - Slides.srt 17 KB
DEF CON 23 slides/DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee.txt 11 KB
DEF CON 23 slides/DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - Slides.mp4 20.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - Slides.srt 16 KB
DEF CON 23 slides/DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy.txt 11 KB
DEF CON 23 slides/DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - Slides.mp4 36.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - Slides.srt 45 KB
DEF CON 23 slides/DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain.txt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Slides.mp4 50.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - Slides.srt 40 KB
DEF CON 23 slides/DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP.txt 27 KB
DEF CON 23 slides/DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Slides.mp4 38.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - Slides.srt 54 KB
DEF CON 23 slides/DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer.txt 36 KB
DEF CON 23 slides/DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Slides.mp4 37.6 MB
DEF CON 23 slides/DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - Slides.srt 60 KB
DEF CON 23 slides/DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline.txt 40 KB
DEF CON 23 slides/DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Slides.mp4 44.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - Slides.srt 62 KB
DEF CON 23 slides/DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments.txt 41 KB
DEF CON 23 slides/DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle - Slides.srt 54 KB
DEF CON 23 slides/DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle.txt 36 KB
DEF CON 23 slides/DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.mp4 38.7 MB
DEF CON 23 slides/DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.srt 44 KB
DEF CON 23 slides/DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets.txt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - Slides.mp4 32.6 MB
DEF CON 23 slides/DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - Slides.srt 17 KB
DEF CON 23 slides/DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans.txt 12 KB
DEF CON 23 slides/DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Slides.mp4 42.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - Slides.srt 56 KB
DEF CON 23 slides/DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS.txt 37 KB
DEF CON 23 slides/DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Slides.mp4 46.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - Slides.srt 55 KB
DEF CON 23 slides/DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars.txt 37 KB
DEF CON 23 slides/DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Slides.mp4 41.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - Slides.srt 45 KB
DEF CON 23 slides/DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You.txt 31 KB
DEF CON 23 slides/DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Slides.mp4 31.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - Slides.srt 35 KB
DEF CON 23 slides/DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots.txt 23 KB
DEF CON 23 slides/DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Slides.mp4 49.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - Slides.srt 61 KB
DEF CON 23 slides/DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense.txt 41 KB
DEF CON 23 slides/DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - Slides.mp4 47.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - Slides.srt 45 KB
DEF CON 23 slides/DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation.txt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Slides.mp4 43.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - Slides.srt 35 KB
DEF CON 23 slides/DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis.txt 23 KB
DEF CON 23 slides/DEF CON 23 Conference - Spot the FED.srt 9 KB
DEF CON 23 slides/DEF CON 23 Conference - Spot the FED.txt 6 KB
DEF CON 23 slides/DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - Slides.mp4 40.4 MB
DEF CON 23 slides/DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - Slides.srt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game.txt 20 KB
DEF CON 23 slides/DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Slides.mp4 28.9 MB
DEF CON 23 slides/DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - Slides.srt 57 KB
DEF CON 23 slides/DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5.txt 38 KB
DEF CON 23 slides/DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Slides.mp4 50.9 MB
DEF CON 23 slides/DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - Slides.srt 59 KB
DEF CON 23 slides/DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool.txt 39 KB
DEF CON 23 slides/DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Slides.mp4 38.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - Slides.srt 43 KB
DEF CON 23 slides/DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow.txt 29 KB
DEF CON 23 slides/DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Slides.mp4 41.5 MB
DEF CON 23 slides/DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - Slides.srt 49 KB
DEF CON 23 slides/DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers.txt 33 KB
DEF CON 23 slides/DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Slides.mp4 47.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - Slides.srt 28 KB
DEF CON 23 slides/DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams.txt 19 KB
DEF CON 23 slides/DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Slides.mp4 32.2 MB
DEF CON 23 slides/DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - Slides.srt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows.txt 20 KB
DEF CON 23 slides/DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Slides.mp4 41.1 MB
DEF CON 23 slides/DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - Slides.srt 38 KB
DEF CON 23 slides/DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Slides.mp4 33.7 MB
DEF CON 23 slides/DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - Slides.srt 44 KB
DEF CON 23 slides/DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures.txt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - Slides.mp4 34.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - Slides.srt 46 KB
DEF CON 23 slides/DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware.txt 31 KB
DEF CON 23 slides/DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Slides.mp4 42.6 MB
DEF CON 23 slides/DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - Slides.srt 44 KB
DEF CON 23 slides/DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster.txt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Slides.mp4 52.8 MB
DEF CON 23 slides/DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - Slides.srt 74 KB
DEF CON 23 slides/DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking.txt 50 KB
DEF CON 23 slides/DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Slides.mp4 42.7 MB
DEF CON 23 slides/DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - Slides.srt 45 KB
DEF CON 23 slides/DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware.txt 30 KB
DEF CON 23 slides/DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Slides.mp4 32.3 MB
DEF CON 23 slides/DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - Slides.srt 43 KB
DEF CON 23 slides/DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy.txt 29 KB
DEF CON 23 slides/DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - Slides.mp4 32 MB
DEF CON 23 slides/DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - Slides.srt 47 KB
DEF CON 23 slides/DEF CON 23 Conference - Zack Fasel - Seeing through the Fog.txt 31 KB
DEF CON 23 slides/DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Slides.mp4 45 MB
DEF CON 23 slides/DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - Slides.srt 16 KB
DEF CON 23 slides/DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto.txt 11 KB
DEF CON 23 slides/DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Slides.mp4 67.6 MB
DEF CON 23 slides/DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - Slides.srt 37 KB
DEF CON 23 slides/DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction.txt 47 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
DEF CON 16 Video 9.3 GB 8
DEF CON 31 Video 46.1 GB 4
DEF CON 14 Video 10.3 GB 3
DEF CON 21 Application 92.3 GB 0
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly 1080p.mp4 Video 503.3 MB 9
DEF CON 16 video x265 Video 5.1 GB 3
DEF CON Conference Programs Application 830.7 MB 3
DEF CON 7 video Video 3.5 GB 2
DEF CON 11 music Audio 404.3 MB 2
DEF CON 15 7 GB 0
DEF CON 29 Application 376.8 GB 0
DEF CON 28 Application 47.6 GB 106
DEF CON 28 Application 190.4 GB 59
DEF CON 26 Audio 99.4 GB 16
DEF CON 18 ctf Application 3.6 GB 16
DEF CON 14 Video 10.3 GB 16
DEF CON 27 Audio 108.3 GB 15
DEF CON 13 audio 823.4 MB 15
DEF CON 5 242.6 MB 14
DEF CON 27 Audio 119.3 GB 13

Loading...