/Gene Bransfeild - Updated/
|
DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets-UPDATED.pdf
|
65.2 MB
|
DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets.pdf
|
2.5 MB
|
/Celine and Elie Bursztein - Updated/
|
DEFCON-22-Celine-and-Elie-Bursztein-I-am-a-legend-UPDATED.pdf
|
51.7 MB
|
/Will Schroeder/
|
DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf
|
51.2 MB
|
/Dominic White and Ian de Villiers - Updated/
|
DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-onscreen-Updated.pdf
|
51.0 MB
|
DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf
|
31.6 MB
|
Dominic White and Ian de Villiers - Extras.zip
|
2.3 MB
|
DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven.pdf
|
1.7 MB
|
/Dhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/
|
DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf
|
46.9 MB
|
DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style.pdf
|
2.8 MB
|
DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-WP.pdf
|
1.1 MB
|
/Ladar Levison and Stephen Watt - Updated/
|
DEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf
|
39.3 MB
|
/Joe Fitzpatrick and Miles Crabill - Updated/
|
DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe-UPDATED.pdf
|
38.3 MB
|
DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe.pdf
|
6.9 MB
|
/Heres, Etemadieh, Baker and Nielsen - Updated/
|
DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things-UPDATED.pdf
|
37.4 MB
|
DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things.pdf
|
302.2 KB
|
/Jesse Michael and Mickey Shkatov - Updated/
|
Jesse Michael and Mickey Shkatov - Extras.zip
|
36.3 MB
|
DEFCON-22-Jesse-Michael-Mickey-Shkatov-USB-for-All!!-UPDATED.pdf
|
2.9 MB
|
DEFCON-22-Jesse-Michael-Mickey-Shkatov-USB-for-All!!.pdf
|
722.7 KB
|
/Fatih Ozavci - Updated/
|
DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf
|
35.4 MB
|
DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones.pdf
|
844.2 KB
|
Fatih Ozavci - Extras.zip
|
74.1 KB
|
/Colby Moore and Patrick Wardle - Updated/
|
DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf
|
31.6 MB
|
DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam.pdf
|
8.2 MB
|
/Kenneth White and Matthew Green - Updated/
|
DEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf
|
31.5 MB
|
/Andrew Hunt - Updated/
|
DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf
|
27.6 MB
|
DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise.pdf
|
18.1 MB
|
DEFCON-22-Andrew-Hunt-MoCA-Overview-and-Security-Posture-WP.pdf
|
758.4 KB
|
Andrew Hunt - Extras.zip
|
485.5 KB
|
DEFCON-22-Andrew-Hunt-Raspberry-MoCA-an-Automated-Penetration-Platform-WP.pdf
|
453.4 KB
|
/Brian Gorenc and Matt Molinyawe -Updated/
|
Brian Gorenc and Matt Molinyawe - Extras.zip
|
27.4 MB
|
DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf
|
20.8 MB
|
DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly.pdf
|
480.9 KB
|
/Glenn Wilkinson - Updated/
|
DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance-UPDATED.pdf
|
27.2 MB
|
DEFCON-22-Glenn-Wilkinson-GRW-WP.pdf
|
1.3 MB
|
DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance.pdf
|
972.0 KB
|
/Rmellendick and DaKahuna - Updated/
|
DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks-UPDATED.pdf
|
26.3 MB
|
DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks.pdf
|
6.5 MB
|
/Phil Polstra - Updated/
|
DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On-Updated.pdf
|
23.3 MB
|
DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction-Updated.pdf
|
6.0 MB
|
DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On.pdf
|
352.4 KB
|
DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction.pdf
|
274.1 KB
|
.DS_Store
|
6.1 KB
|
/Zoz - Updated/
|
DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf
|
20.1 MB
|
DEFCON-22-Zoz-Dont-Fuck-It-Up.pdf
|
17.5 MB
|
/Deviant Ollam and Howard Payne/
|
DEFCON-22-Deviant-Ollam-and-Howard-Payne-Elevator Hacking-From-the-Pit-to-the-Penthouse.pdf
|
19.4 MB
|
/Jim Denaro and Tod Beardsley - Updated/
|
DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit-UPDATED.pdf
|
17.9 MB
|
DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit.pdf
|
283.1 KB
|
/Sarah Edwards/
|
DEFCON-22-Sarah-Edwards-Reverse-Engineering-Mac-Malware.pdf
|
15.9 MB
|
/Alijohn Ghassemlouei - Updated/
|
DEFCON-22-Alijohn-Ghassemlouei-Anatomy-of-a-Pentest-Updated.pdf
|
15.5 MB
|
/Grant Bugher - Updated/
|
DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems-Updated.pdf
|
14.7 MB
|
DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems.pdf
|
11.5 MB
|
/Kyle Kelley and Greg Anderson - Updated/
|
DEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe.-Updated.pdf
|
12.3 MB
|
DEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe.pdf
|
427.8 KB
|
/Bathurst, Rogers, Carey, and Clarke/
|
DEFCON-22-Bathurst-Rogers-Carey-Clarke-PROPLANE.pdf
|
11.5 MB
|
/Adrian Crenshaw - Updated/
|
DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf
|
11.3 MB
|
DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught.pdf
|
3.4 MB
|
/Josh Datko and Teddy Reed - Updated/
|
DEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c-UPDATED.pdf
|
10.8 MB
|
DEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c.pdf
|
819.5 KB
|
/Aaron Bayles (AlxRogan) - Updated/
|
DEFCON-22-Aaron-Bayles-Alxrogan-Protecting-SCADA-DC101.pdf
|
9.8 MB
|
DEFCON-22-Aaron-Bayles-Alxrogan-Protecting-SCADA-DC101-Updated.pdf
|
3.0 MB
|
/Alex Pinto and Kyle Maxwell - Updated/
|
DEFCON-22-Pinto-Maxwell-Secure-Because-Math-Updated.pdf
|
9.8 MB
|
DEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf
|
9.0 MB
|
/Tim Strazzere and Jon Sawyer - Updated/
|
DEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf
|
9.3 MB
|
/John Menerick - Updated/
|
DEFCON-22-John-Menerick-Open-Source-Fairy-Dust-UPDATED.pdf
|
9.2 MB
|
DEFCON-22-John-Menerick-Open-Source-Fairy-Dust.pdf
|
1.9 MB
|
/Jake Kouns & Carsten Eiram - Updated/
|
DEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter-U{DATED.pdf
|
9.1 MB
|
DEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter.pdf
|
6.2 MB
|
/Bulygin, Bazhaniul, Furtak, and Loucaides - Updated/
|
DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS.pdf
|
9.0 MB
|
DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS-UPDATED.pdf
|
2.8 MB
|
/Gregory Pickett - Updated/
|
DEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks-UPDATED.pdf
|
8.7 MB
|
DEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks.pdf
|
1.5 MB
|
Gregory Pickett - Extras.zip
|
15.2 KB
|
/Robert Rowley/
|
DEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf
|
8.5 MB
|
/Nir Valtman - Updated/
|
DEFCON-22-Nir-Valtman-Bug-Bounty-Programs-Evolution.pdf
|
8.5 MB
|
DEFCON-22-Nir-Valtman-A-Journey-To-Protect-POS-UPDATED.pdf
|
5.0 MB
|
DEFCON22-Nir-Valtman-Extras-A-Journey-To-Protect-POS.zip
|
383.0 KB
|
Nir Valtman - Extras.zip
|
333.4 KB
|
DEFCON-22-Nir-Valtman-Extras-Bug-Bounty-Programs-Evolution.zip
|
1.8 KB
|
/Phillip Young - Updated/
|
DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf
|
8.3 MB
|
DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes.pdf
|
2.0 MB
|
Phillip Young - Extras.zip
|
38.9 KB
|
/Blake Self - Updated/
|
DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf
|
7.5 MB
|
DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro.pdf
|
519.8 KB
|
Blake Self - Extras.zip
|
24.3 KB
|
/Eric (XlogicX) Davisson and Ruben Alejandro (chap0)/
|
DEFCON-22-Eric-Davisson-Ruben-Alejandro-Abuse-of-Blind-Automation-in-Security-Tools.pdf
|
7.2 MB
|
/Ivan Petrov and Svetlana Gaivoronski - Updated/
|
DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM.pdf
|
7.0 MB
|
DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf
|
6.6 MB
|
DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM.avi
|
990.5 KB
|
/Ryan Kazanciyan and Matt Hastings - Updated/
|
DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks-UPDATED.pdf
|
6.6 MB
|
DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf
|
1.9 MB
|
/Wesley McGrew/
|
Wesley McGrew - Extras.zip
|
6.6 MB
|
DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware-WP.pdf
|
570.8 KB
|
DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf
|
466.1 KB
|
/Joe Grand/
|
DEFCON-22-Joe-Grand-Deconstructing-the-Circuit-Board-Sandwich.pdf
|
5.6 MB
|
/Paul Drapeau and Brent Dukes - Updated/
|
DEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols-UPDATED.pdf
|
5.6 MB
|
DEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols.pdf
|
3.9 MB
|
Paul Drapeau and Brent Dukes - Extras.zip
|
147.4 KB
|
/Keren Elazari - Updated/
|
DEFCON-22-Keren-Elazari-Empowering-Hackers-UPDATED.pdf
|
5.2 MB
|
DEFCON-22-Keren-Elazari-Empowering-Hackers.pdf
|
3.5 MB
|
/Quaddi, R3plicant, and Hefley - Updated/
|
DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf
|
5.1 MB
|
DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911.pdf
|
1.8 MB
|
/Dustin Hoffman and Thomas Kinsey - Updated/
|
DEFCON-22-Dustin-Hoffman-and-Thomas-Kinsey-What-the-Watchers-See-UPDATED.pdf
|
5.1 MB
|
/Maggie Jauregui - Updated/
|
DEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted-Updated.pdf
|
4.9 MB
|
DEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted.pdf
|
834.1 KB
|
/Zoltán Balázs - Updated/
|
DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdf
|
4.2 MB
|
DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds.pdf
|
1.5 MB
|
/Felix Leder/
|
DEFCON-22-Felix-Leder-NinjaTV.pdf
|
4.0 MB
|
/Weston Hecker - Updated/
|
DEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf
|
4.0 MB
|
DEFCON-22-Weston-Hecker-Burner-Phone-DDOS.pdf
|
1.5 MB
|
/Elijah - Updated/
|
DEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing-Updated.pdf
|
3.9 MB
|
DEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing.pdf
|
1.4 MB
|
/Brady Bloxham - Updated/
|
DEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf
|
3.9 MB
|
/Paul Such (0x222)/
|
DEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf
|
3.8 MB
|
/Cesar Cerrudo - Updated/
|
DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf
|
3.6 MB
|
DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems.pdf
|
1.1 MB
|
/Shahar Tal - Updated/
|
DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdf
|
3.4 MB
|
DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins.pdf
|
1.7 MB
|
/Eric Smith and Joshua Perrymon - Updated/
|
DEFCON-22-Smith-Perrymon-All-Your-Badges-Are-Belong-To-Us-UPDATED.pdf
|
2.8 MB
|
/Michael Ossman/
|
DEFCON-22-Michael-Ossmann-Pierce-Toorcamp.pdf
|
2.6 MB
|
DEFCON-22-Michael-Ossmann-CONGAFLOCK-schematic.pdf
|
28.5 KB
|
/Alexandre Moneger - Updated/
|
DEFCON-22-Alex-Moneger-Stitching-numbers-Generating-ROP-payloads-from-in-memory-numbers-UPDATED.pdf
|
2.3 MB
|
DEFCON-22-Alex-Moneger-Stitching-numbers-Generating-ROP-payloads-from-in-memory-numbers.pdf
|
2.2 MB
|
Alexandre Moneger - Extras.zip
|
35.2 KB
|
/Geoff Mcdonald - Updated/
|
DEFCON-22-Geoff-Mcdonald-Meddle-Framework-UPDATED.pdf
|
2.2 MB
|
DEFCON-22-Geoff-Mcdonald-Meddle-Framework.pdf
|
605.3 KB
|
/Richard Theime - Updated/
|
DEFCON-22-Theime-Truth-Through-Fiction-Updated.pdf
|
2.1 MB
|
Extras.zip
|
524.0 KB
|
.DS_Store
|
6.1 KB
|
/Mike Schrenk - Updated/
|
DEFCON-22-Mike-Schrenk-Youre-Leaking-Trade-Secrets-UPDATED.pdf
|
2.1 MB
|
/Adam Wirth (SimonJ) - Updated/
|
DEFCON-22-Adam-Wirth-SimonJ-Practical-Foxhunting-101-UPDATED.pdf
|
2.0 MB
|
DEFCON-22-Adam-Wirth-SimonJ-Practical-Foxhunting-101.pdf
|
333.6 KB
|
/Logan Lamb/
|
DEFCON-22-Logan-Lamb-HOME-INSECURITY-NO-ALARMS-FALSE-ALARMS-AND-SIGINT.pdf
|
1.9 MB
|
DEFCON-22-Logan-Lamb-HOME-INSECURITY-NO-ALARMS-FALSE-ALARMS-AND-SIGINT-WP.pdf
|
242.3 KB
|
/Lance Buttars (Nemus) - Updated/
|
DEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS-UPDATED.pdf
|
1.8 MB
|
DEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS.pdf
|
710.4 KB
|
/Jay Healey - Updated/
|
DEFCON-22-Jay-Healey-Saving-the-Internet-UPDATED.pdf
|
1.8 MB
|
DEFCON-22-Jay-Healey-Saving-the-Internet.pdf
|
986.1 KB
|
/Luca Bruno and Mariano Graziano - Updated/
|
DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-Updated.pdf
|
1.7 MB
|
DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass.pdf
|
985.9 KB
|
DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-WP-UPDATED.pdf
|
397.4 KB
|
/Corey Kallenberg - Updated/
|
DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation-WP-UPDATED.pdf
|
1.7 MB
|
DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf
|
1.5 MB
|
DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation-WP.pdf
|
1.0 MB
|
/Scott Erven and Shawn Merdinger - Updated/
|
DEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdf
|
1.4 MB
|
/Tess Schrodinger/
|
DEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdf
|
1.4 MB
|
/Alex Zacharis and Nikolaos Tsagkarakis/
|
DEFCON-22-Alex Zacharis-Nikolaos-Tsagkarakis-PoS-Attacking-the-Traveling-Salesman.pdf
|
1.2 MB
|
Alex Zacharis and Nikolaos Tsagkarakis - Extras.zip
|
1.0 MB
|
/Holt, Smirnova, and Chua - Updated/
|
DEFCON-22-Holt-Smirnova-Chua-Stolen-Data-Markets-Updated.pdf
|
1.2 MB
|
/Josh Corman and Nicholas Percoco - Updated/
|
DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0-UPDATED.pdf
|
1.1 MB
|
DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0.pdf
|
163.5 KB
|
/Shane Macaulay - Updated/
|
DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdf
|
1.0 MB
|
DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode.pdf
|
672.7 KB
|
Shane Macaulay - Extras.zip
|
69.4 KB
|
/Chris Littlebury/
|
DEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf
|
984.9 KB
|
/Metacortex and Grifter/
|
DEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf
|
779.6 KB
|
/Anton Sapozhnikov/
|
DEFCON-22-Anton-Sapozhnikov-Acquire-Current-User-Hashes-Without-Admin-Privileges.pdf
|
612.2 KB
|
/Christopher Campbell/
|
DEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf
|
601.0 KB
|
DEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf
|
349.8 KB
|
/Jesus Molina/
|
DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf
|
573.0 KB
|
DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room-WP.pdf
|
229.6 KB
|
/Graham, McMillan, and Tentler/
|
DEFCON-22-Graham-McMillan-Tentler-Masscaning-the-Internet.pdf
|
504.8 KB
|
/Anch/
|
DEFCON-22-Anch-The-Monkey-In-the-Middle.pdf
|
457.5 KB
|
/David Dorsey - Updated/
|
DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf
|
454.4 KB
|
DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP.pdf
|
277.9 KB
|
/David Wyde/
|
DEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf
|
351.8 KB
|
David Wyde - Extras.zip
|
37.3 KB
|
/Mike Larsen and Charlie Vedaa/
|
DEFCON-22-Mike-Larsen-Charlie-Vedaa-Impostor-Polluting-Tor-Metadata.pdf
|
318.7 KB
|
/Lucas Morris and Michael McAtee/
|
DEFCON-22-Lucas-Morris-Michael-McAtee-ShareEnum-We-Wrapped-Samba.pdf
|
244.9 KB
|
/Peter Teoh - Updated/
|
DEFCON-22-Peter-Teoh-Data-Protection-101-Updated.pdf
|
236.2 KB
|
DEFCON-22-Peter-Teoh-Data-Protection-101.pdf
|
134.7 KB
|
/Paul Mcmillan/
|
DEFCON-22-Paul-Mcmillan-Attacking-the-IOT-Using-timing-attacks.pdf
|
209.5 KB
|
/Richard Klafter and Eric Swanson/
|
DEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf
|
202.9 KB
|
/Tim Mcguffin/
|
DEFCON-22-Tim-Mcguffin-One-Man-Shop.pdf
|
190.7 KB
|
/David Litchfeild/
|
DEFCON-22-David-Litchfeild-Oracle-Data-Redaction-is-Broken.pdf
|
137.2 KB
|
/Pierce and Loki/
|
DEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf
|
107.3 KB
|
/Paul Vixie/
|
DEFCON-22-Paul-Vixie-WP.pdf
|
102.8 KB
|
DEFCON-22-Paul-Vixie-2014-07-15-botnets.pdf
|
102.4 KB
|
/
|
Viproy - Updated Extras.zip
|
76.2 KB
|
/David Mortman and The Fail Panel/
|
DEFCON-22-Fail-Panel-Defcon-Comedy-Jam-VII.pdf
|
51.0 KB
|
Total files 180
|