FileMood

Download DEF CON 22 presentations

DEF CON 22 presentations

Name

DEF CON 22 presentations

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

1.2 GB

Total Files

180

Hash

2B9E6FC9BB172FD1B044B57DC5D5787A2519329E

/Gene Bransfeild - Updated/

DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets-UPDATED.pdf

65.2 MB

DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets.pdf

2.5 MB

/Celine and Elie Bursztein - Updated/

DEFCON-22-Celine-and-Elie-Bursztein-I-am-a-legend-UPDATED.pdf

51.7 MB

/Will Schroeder/

DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf

51.2 MB

/Dominic White and Ian de Villiers - Updated/

DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-onscreen-Updated.pdf

51.0 MB

DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf

31.6 MB

Dominic White and Ian de Villiers - Extras.zip

2.3 MB

DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven.pdf

1.7 MB

/Dhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/

DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf

46.9 MB

DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style.pdf

2.8 MB

DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-WP.pdf

1.1 MB

/Ladar Levison and Stephen Watt - Updated/

DEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf

39.3 MB

/Joe Fitzpatrick and Miles Crabill - Updated/

DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe-UPDATED.pdf

38.3 MB

DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe.pdf

6.9 MB

/Heres, Etemadieh, Baker and Nielsen - Updated/

DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things-UPDATED.pdf

37.4 MB

DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things.pdf

302.2 KB

/Jesse Michael and Mickey Shkatov - Updated/

Jesse Michael and Mickey Shkatov - Extras.zip

36.3 MB

DEFCON-22-Jesse-Michael-Mickey-Shkatov-USB-for-All!!-UPDATED.pdf

2.9 MB

DEFCON-22-Jesse-Michael-Mickey-Shkatov-USB-for-All!!.pdf

722.7 KB

/Fatih Ozavci - Updated/

DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf

35.4 MB

DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones.pdf

844.2 KB

Fatih Ozavci - Extras.zip

74.1 KB

/Colby Moore and Patrick Wardle - Updated/

DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf

31.6 MB

DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam.pdf

8.2 MB

/Kenneth White and Matthew Green - Updated/

DEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf

31.5 MB

/Andrew Hunt - Updated/

DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf

27.6 MB

DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise.pdf

18.1 MB

DEFCON-22-Andrew-Hunt-MoCA-Overview-and-Security-Posture-WP.pdf

758.4 KB

Andrew Hunt - Extras.zip

485.5 KB

DEFCON-22-Andrew-Hunt-Raspberry-MoCA-an-Automated-Penetration-Platform-WP.pdf

453.4 KB

/Brian Gorenc and Matt Molinyawe -Updated/

Brian Gorenc and Matt Molinyawe - Extras.zip

27.4 MB

DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf

20.8 MB

DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly.pdf

480.9 KB

/Glenn Wilkinson - Updated/

DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance-UPDATED.pdf

27.2 MB

DEFCON-22-Glenn-Wilkinson-GRW-WP.pdf

1.3 MB

DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance.pdf

972.0 KB

/Rmellendick and DaKahuna - Updated/

DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks-UPDATED.pdf

26.3 MB

DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks.pdf

6.5 MB

/Phil Polstra - Updated/

DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On-Updated.pdf

23.3 MB

DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction-Updated.pdf

6.0 MB

DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On.pdf

352.4 KB

DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction.pdf

274.1 KB

.DS_Store

6.1 KB

/Zoz - Updated/

DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf

20.1 MB

DEFCON-22-Zoz-Dont-Fuck-It-Up.pdf

17.5 MB

/Deviant Ollam and Howard Payne/

DEFCON-22-Deviant-Ollam-and-Howard-Payne-Elevator Hacking-From-the-Pit-to-the-Penthouse.pdf

19.4 MB

/Jim Denaro and Tod Beardsley - Updated/

DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit-UPDATED.pdf

17.9 MB

DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit.pdf

283.1 KB

/Sarah Edwards/

DEFCON-22-Sarah-Edwards-Reverse-Engineering-Mac-Malware.pdf

15.9 MB

/Alijohn Ghassemlouei - Updated/

DEFCON-22-Alijohn-Ghassemlouei-Anatomy-of-a-Pentest-Updated.pdf

15.5 MB

/Grant Bugher - Updated/

DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems-Updated.pdf

14.7 MB

DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems.pdf

11.5 MB

/Kyle Kelley and Greg Anderson - Updated/

DEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe.-Updated.pdf

12.3 MB

DEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe.pdf

427.8 KB

/Bathurst, Rogers, Carey, and Clarke/

DEFCON-22-Bathurst-Rogers-Carey-Clarke-PROPLANE.pdf

11.5 MB

/Adrian Crenshaw - Updated/

DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf

11.3 MB

DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught.pdf

3.4 MB

/Josh Datko and Teddy Reed - Updated/

DEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c-UPDATED.pdf

10.8 MB

DEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c.pdf

819.5 KB

/Aaron Bayles (AlxRogan) - Updated/

DEFCON-22-Aaron-Bayles-Alxrogan-Protecting-SCADA-DC101.pdf

9.8 MB

DEFCON-22-Aaron-Bayles-Alxrogan-Protecting-SCADA-DC101-Updated.pdf

3.0 MB

/Alex Pinto and Kyle Maxwell - Updated/

DEFCON-22-Pinto-Maxwell-Secure-Because-Math-Updated.pdf

9.8 MB

DEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf

9.0 MB

/Tim Strazzere and Jon Sawyer - Updated/

DEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf

9.3 MB

/John Menerick - Updated/

DEFCON-22-John-Menerick-Open-Source-Fairy-Dust-UPDATED.pdf

9.2 MB

DEFCON-22-John-Menerick-Open-Source-Fairy-Dust.pdf

1.9 MB

/Jake Kouns & Carsten Eiram - Updated/

DEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter-U{DATED.pdf

9.1 MB

DEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter.pdf

6.2 MB

/Bulygin, Bazhaniul, Furtak, and Loucaides - Updated/

DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS.pdf

9.0 MB

DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS-UPDATED.pdf

2.8 MB

/Gregory Pickett - Updated/

DEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks-UPDATED.pdf

8.7 MB

DEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks.pdf

1.5 MB

Gregory Pickett - Extras.zip

15.2 KB

/Robert Rowley/

DEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf

8.5 MB

/Nir Valtman - Updated/

DEFCON-22-Nir-Valtman-Bug-Bounty-Programs-Evolution.pdf

8.5 MB

DEFCON-22-Nir-Valtman-A-Journey-To-Protect-POS-UPDATED.pdf

5.0 MB

DEFCON22-Nir-Valtman-Extras-A-Journey-To-Protect-POS.zip

383.0 KB

Nir Valtman - Extras.zip

333.4 KB

DEFCON-22-Nir-Valtman-Extras-Bug-Bounty-Programs-Evolution.zip

1.8 KB

/Phillip Young - Updated/

DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf

8.3 MB

DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes.pdf

2.0 MB

Phillip Young - Extras.zip

38.9 KB

/Blake Self - Updated/

DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf

7.5 MB

DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro.pdf

519.8 KB

Blake Self - Extras.zip

24.3 KB

/Eric (XlogicX) Davisson and Ruben Alejandro (chap0)/

DEFCON-22-Eric-Davisson-Ruben-Alejandro-Abuse-of-Blind-Automation-in-Security-Tools.pdf

7.2 MB

/Ivan Petrov and Svetlana Gaivoronski - Updated/

DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM.pdf

7.0 MB

DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf

6.6 MB

DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM.avi

990.5 KB

/Ryan Kazanciyan and Matt Hastings - Updated/

DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks-UPDATED.pdf

6.6 MB

DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf

1.9 MB

/Wesley McGrew/

Wesley McGrew - Extras.zip

6.6 MB

DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware-WP.pdf

570.8 KB

DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf

466.1 KB

/Joe Grand/

DEFCON-22-Joe-Grand-Deconstructing-the-Circuit-Board-Sandwich.pdf

5.6 MB

/Paul Drapeau and Brent Dukes - Updated/

DEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols-UPDATED.pdf

5.6 MB

DEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols.pdf

3.9 MB

Paul Drapeau and Brent Dukes - Extras.zip

147.4 KB

/Keren Elazari - Updated/

DEFCON-22-Keren-Elazari-Empowering-Hackers-UPDATED.pdf

5.2 MB

DEFCON-22-Keren-Elazari-Empowering-Hackers.pdf

3.5 MB

/Quaddi, R3plicant, and Hefley - Updated/

DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf

5.1 MB

DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911.pdf

1.8 MB

/Dustin Hoffman and Thomas Kinsey - Updated/

DEFCON-22-Dustin-Hoffman-and-Thomas-Kinsey-What-the-Watchers-See-UPDATED.pdf

5.1 MB

/Maggie Jauregui - Updated/

DEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted-Updated.pdf

4.9 MB

DEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted.pdf

834.1 KB

/Zoltán Balázs - Updated/

DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdf

4.2 MB

DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds.pdf

1.5 MB

/Felix Leder/

DEFCON-22-Felix-Leder-NinjaTV.pdf

4.0 MB

/Weston Hecker - Updated/

DEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf

4.0 MB

DEFCON-22-Weston-Hecker-Burner-Phone-DDOS.pdf

1.5 MB

/Elijah - Updated/

DEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing-Updated.pdf

3.9 MB

DEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing.pdf

1.4 MB

/Brady Bloxham - Updated/

DEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf

3.9 MB

/Paul Such (0x222)/

DEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf

3.8 MB

/Cesar Cerrudo - Updated/

DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf

3.6 MB

DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems.pdf

1.1 MB

/Shahar Tal - Updated/

DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdf

3.4 MB

DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins.pdf

1.7 MB

/Eric Smith and Joshua Perrymon - Updated/

DEFCON-22-Smith-Perrymon-All-Your-Badges-Are-Belong-To-Us-UPDATED.pdf

2.8 MB

/Michael Ossman/

DEFCON-22-Michael-Ossmann-Pierce-Toorcamp.pdf

2.6 MB

DEFCON-22-Michael-Ossmann-CONGAFLOCK-schematic.pdf

28.5 KB

/Alexandre Moneger - Updated/

DEFCON-22-Alex-Moneger-Stitching-numbers-Generating-ROP-payloads-from-in-memory-numbers-UPDATED.pdf

2.3 MB

DEFCON-22-Alex-Moneger-Stitching-numbers-Generating-ROP-payloads-from-in-memory-numbers.pdf

2.2 MB

Alexandre Moneger - Extras.zip

35.2 KB

/Geoff Mcdonald - Updated/

DEFCON-22-Geoff-Mcdonald-Meddle-Framework-UPDATED.pdf

2.2 MB

DEFCON-22-Geoff-Mcdonald-Meddle-Framework.pdf

605.3 KB

/Richard Theime - Updated/

DEFCON-22-Theime-Truth-Through-Fiction-Updated.pdf

2.1 MB

Extras.zip

524.0 KB

.DS_Store

6.1 KB

/Mike Schrenk - Updated/

DEFCON-22-Mike-Schrenk-Youre-Leaking-Trade-Secrets-UPDATED.pdf

2.1 MB

/Adam Wirth (SimonJ) - Updated/

DEFCON-22-Adam-Wirth-SimonJ-Practical-Foxhunting-101-UPDATED.pdf

2.0 MB

DEFCON-22-Adam-Wirth-SimonJ-Practical-Foxhunting-101.pdf

333.6 KB

/Logan Lamb/

DEFCON-22-Logan-Lamb-HOME-INSECURITY-NO-ALARMS-FALSE-ALARMS-AND-SIGINT.pdf

1.9 MB

DEFCON-22-Logan-Lamb-HOME-INSECURITY-NO-ALARMS-FALSE-ALARMS-AND-SIGINT-WP.pdf

242.3 KB

/Lance Buttars (Nemus) - Updated/

DEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS-UPDATED.pdf

1.8 MB

DEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS.pdf

710.4 KB

/Jay Healey - Updated/

DEFCON-22-Jay-Healey-Saving-the-Internet-UPDATED.pdf

1.8 MB

DEFCON-22-Jay-Healey-Saving-the-Internet.pdf

986.1 KB

/Luca Bruno and Mariano Graziano - Updated/

DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-Updated.pdf

1.7 MB

DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass.pdf

985.9 KB

DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-WP-UPDATED.pdf

397.4 KB

/Corey Kallenberg - Updated/

DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation-WP-UPDATED.pdf

1.7 MB

DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf

1.5 MB

DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation-WP.pdf

1.0 MB

/Scott Erven and Shawn Merdinger - Updated/

DEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdf

1.4 MB

/Tess Schrodinger/

DEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdf

1.4 MB

/Alex Zacharis and Nikolaos Tsagkarakis/

DEFCON-22-Alex Zacharis-Nikolaos-Tsagkarakis-PoS-Attacking-the-Traveling-Salesman.pdf

1.2 MB

Alex Zacharis and Nikolaos Tsagkarakis - Extras.zip

1.0 MB

/Holt, Smirnova, and Chua - Updated/

DEFCON-22-Holt-Smirnova-Chua-Stolen-Data-Markets-Updated.pdf

1.2 MB

/Josh Corman and Nicholas Percoco - Updated/

DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0-UPDATED.pdf

1.1 MB

DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0.pdf

163.5 KB

/Shane Macaulay - Updated/

DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdf

1.0 MB

DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode.pdf

672.7 KB

Shane Macaulay - Extras.zip

69.4 KB

/Chris Littlebury/

DEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf

984.9 KB

/Metacortex and Grifter/

DEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf

779.6 KB

/Anton Sapozhnikov/

DEFCON-22-Anton-Sapozhnikov-Acquire-Current-User-Hashes-Without-Admin-Privileges.pdf

612.2 KB

/Christopher Campbell/

DEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf

601.0 KB

DEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf

349.8 KB

/Jesus Molina/

DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf

573.0 KB

DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room-WP.pdf

229.6 KB

/Graham, McMillan, and Tentler/

DEFCON-22-Graham-McMillan-Tentler-Masscaning-the-Internet.pdf

504.8 KB

/Anch/

DEFCON-22-Anch-The-Monkey-In-the-Middle.pdf

457.5 KB

/David Dorsey - Updated/

DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf

454.4 KB

DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP.pdf

277.9 KB

/David Wyde/

DEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf

351.8 KB

David Wyde - Extras.zip

37.3 KB

/Mike Larsen and Charlie Vedaa/

DEFCON-22-Mike-Larsen-Charlie-Vedaa-Impostor-Polluting-Tor-Metadata.pdf

318.7 KB

/Lucas Morris and Michael McAtee/

DEFCON-22-Lucas-Morris-Michael-McAtee-ShareEnum-We-Wrapped-Samba.pdf

244.9 KB

/Peter Teoh - Updated/

DEFCON-22-Peter-Teoh-Data-Protection-101-Updated.pdf

236.2 KB

DEFCON-22-Peter-Teoh-Data-Protection-101.pdf

134.7 KB

/Paul Mcmillan/

DEFCON-22-Paul-Mcmillan-Attacking-the-IOT-Using-timing-attacks.pdf

209.5 KB

/Richard Klafter and Eric Swanson/

DEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf

202.9 KB

/Tim Mcguffin/

DEFCON-22-Tim-Mcguffin-One-Man-Shop.pdf

190.7 KB

/David Litchfeild/

DEFCON-22-David-Litchfeild-Oracle-Data-Redaction-is-Broken.pdf

137.2 KB

/Pierce and Loki/

DEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf

107.3 KB

/Paul Vixie/

DEFCON-22-Paul-Vixie-WP.pdf

102.8 KB

DEFCON-22-Paul-Vixie-2014-07-15-botnets.pdf

102.4 KB

/

Viproy - Updated Extras.zip

76.2 KB

/David Mortman and The Fail Panel/

DEFCON-22-Fail-Panel-Defcon-Comedy-Jam-VII.pdf

51.0 KB

 

Total files 180


Copyright © 2025 FileMood.com