FileMood

Download DEF CON 24 Original Hacking Conference CD

DEF CON 24 Original Hacking Conference CD

Name

DEF CON 24 Original Hacking Conference CD

 DOWNLOAD Copy Link

Total Size

505.7 MB

Total Files

323

Hash

D626AB9805BAA6EBE72EC07BFE5CA082014356F8

/Workshop Materials/

DEFCON-24-Workshop-Craig-Young-Brainwashing-Embedded-Systems.pdf

59.1 MB

DEFCON-24-Workshop-Boonen-Mifsud-Windows-Breakout-PrivEsc.pdf

3.5 MB

DEFCON-24-Workshop-Calderon-Sellers-Nmap-NSE-Dev-for-Offense-and-Defense-guide.pdf

204.4 KB

DEFCON-24-Workshop-Calderon-Sellers-Nmap-NSE-Dev-for-Offense-and-Defense.pdf

368.9 KB

DEFCON-24-Workshop-Chuck-Easttom-Steganography.pdf

1.9 MB

DEFCON-24-Workshop-David-Caissy-Advanced-Blind-SQL-Injection.pdf

1.4 MB

DEFCON-24-Workshop-Dazzlecat-duo-intro-to-x86-disassembly.pdf

2.7 MB

DEFCON-24-Workshop-Dinesh-Shetty-Practical-Android-Application-Exploitation.pdf

28.2 MB

DEFCON-24-Workshop-Fatih-Ozavci-Voip-Wars.pdf

1.6 MB

DEFCON-24-Workshop-Georgia-Weidman-Pentesting-with-Metasploit.pdf

14.0 MB

DEFCON-24-Workshop-Madhu-Akula-and-Riyaz-Walikar-Ninjalevel-Infrastructure-Monitoring.pdf

750.1 KB

DEFCON-24-Workshop-Miguel-Guirao-Intro-To-Memory-Forensics-With-Volatility.pdf

2.0 MB

DEFCON-24-Workshop-Rich-Mogull-Pragmatic-Cloud-Security.pdf

10.6 MB

DEFCON-24-Workshop-Robert-Olson-Writing-Your-First-Exploit.pdf

466.4 KB

DEFCON-24-Workshop-Rodrigo-Almeida-Embedded-System-Design-WP.pdf

1.0 MB

DEFCON-24-Workshop-Rodrigo-Almeida-Embedded-System-Design.pdf

3.6 MB

DEFCON-24-Workshop-Steve-Weingart-Physical-Security-Systems-for-Computing-Systems.pdf

3.4 MB

/

DEFCON-24-Program.pdf

20.3 MB

DEFCON-24-Receipt.pdf

13.1 MB

DEFCON-24-How-To-Connect-Network-DCTV-Media-Server.txt

2.5 KB

/Extras/1o57/

1o57.rar

2.7 MB

Origin-Story.txt

22.6 KB

/Extras/DARPA CGC/

DEFCON-24-DARPA-CGC.nfo

0.8 KB

/.../DEF CON 24 Short Story Contest/

DEFCON-24-Anna-L-Davis-Childs-Play.txt

11.4 KB

DEFCON-24-Avi-Zajac-Alice.txt

33.7 KB

DEFCON-24-Chad-Walker-The-Father-Of-Space-And-Time.txt

16.4 KB

DEFCON-24-Chris-Austin-Techgirlmn-A-Letter-From-Mom.txt

7.5 KB

DEFCON-24-Elkentaro-Thedarkreboot.txt

51.1 KB

DEFCON-24-Gtwgn-Untitled.txt

9.0 KB

DEFCON-24-J4Ckh4Mmer-DEFCON-Z.txt

26.7 KB

DEFCON-24-John-Mcnabb-Turings-Wager.txt

26.3 KB

DEFCON-24-Leah-Thompson-Thebackup.txt

22.5 KB

DEFCON-24-Liz-Farrel-Lelands-Angels.txt

19.4 KB

DEFCON-24-Matthew-Yeager-Origami.txt

11.4 KB

DEFCON-24-Rob-Pait-The-Great-Debate.txt

14.8 KB

DEFCON-24-Samantha-C-Noticed.txt

50.9 KB

DEFCON-24-Synshop-Magicdave-Cohort.txt

45.3 KB

DEFCON-24-Thegalaxyninja-Hackers-Heartbeat.txt

16.7 KB

DEFCON-24-Tom-Ruff-A-Rise-To-The-Day-Of-Reckoning.txt

13.0 KB

DEFCON-24-Tyler-Rosonke-Consumed.txt

32.3 KB

/Speaker Materials/

DEFCON-24-3alarmlampscoot-DIY-Nukeproofing.pdf

3.7 MB

DEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset.pdf

2.8 MB

DEFCON-24-Allan-Cecil-dwangoAC-Tasbot-The-Perfectionist.pdf

7.5 MB

DEFCON-24-Amro-Abdelgawad-The-Remote-Metamorphic-Engine.pdf

2.5 MB

DEFCON-24-Anch-So-you-want-to-be-a-pentester-DC101.pdf

586.6 KB

DEFCON-24-Anto-Joseph-Fuzzing-Android-Devices.pdf

31.7 MB

DEFCON-24-Arnaud-Soullie-Workshop-Pentesting-ICS-101.pdf

4.3 MB

DEFCON-24-Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection-Writeup.pdf

3.2 MB

DEFCON-24-Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection.pdf

2.5 MB

DEFCON-24-Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime.pdf

722.0 KB

DEFCON-24-Bertin-Bervis-James-Jara-Exploiting-And-Attacking-Seismological-Networks-Remotely.pdf

5.6 MB

DEFCON-24-Bigezy-Saci-Pinworm-MITM-for-Metadata.pdf

1.3 MB

DEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle.pdf

1.3 MB

DEFCON-24-Brad-Woodberg-Malware-Command-And-Control-Channels-A-Journey-Into-Darkness.pdf

1.8 MB

DEFCON-24-Bryant-Zadegan-Ryan-Lester-Abusing-Bleeding-Edge-Web-Standards-For-Appsec-Glory.pdf

2.6 MB

DEFCON-24-Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs.pdf

2.0 MB

DEFCON-24-Chris-Rock-How-to-overthrow-a-Government-Kuwait-Coup-WP.pdf

236.9 KB

DEFCON-24-Chris-Rock-How-to-overthrow-a-Government.pdf

6.4 MB

DEFCON-24-Clarence-Chio-Machine-Duping-101.pdf

6.2 MB

DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools-WP.pdf

788.0 KB

DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools.pdf

647.3 KB

DEFCON-24-Demay-Lebrun-Canspy-A-Platorm-For-Auditing-Can-Devices.pdf

1.6 MB

DEFCON-24-Dr-Phil-Polstra-Mouse-Jigglers.pdf

355.3 KB

DEFCON-24-Drake-Christey-Vulnerabilities-101.pdf

188.1 KB

DEFCON-24-Eagle-Sk3Wldbg-Emulating-with-Ida.pdf

379.2 KB

DEFCON-24-Eric-Escobar-Rogue-Cell-Towers.pdf

2.4 MB

DEFCON-24-Evan-Booth-Jjittery-Macgyver.pdf

4.6 MB

DEFCON-24-Fasel-Jacobs-I-fight-for-the-users.pdf

2.8 MB

DEFCON-24-Fitzpatrick-and-Grand-101-Ways-To-Brick-Your-Hardware.pdf

6.4 MB

DEFCON-24-Forgety-Kreilein-Ng9-1-1-The-Next-Gene-Of-Emergency-Ph0Nage.pdf

3.4 MB

DEFCON-24-Fred-Bret-Mounet-All-Your-Solar-Panels-Are-Belong-To-Me.pdf

818.4 KB

DEFCON-24-Gorenc-Sands-Hacker-Machine-Interface.pdf

7.4 MB

DEFCON-24-Granolocks-Zero-Chaos-Bluehydra-Realtime-Blutetooth-Detection.pdf

103.6 KB

DEFCON-24-Grant-Bugher-Captive-Portals.pdf

12.6 MB

DEFCON-24-Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays-WP.pdf

516.0 KB

DEFCON-24-Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays.pdf

1.7 MB

DEFCON-24-Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations.pdf

1.6 MB

DEFCON-24-Huber-Rasthofer-Smartphone-Antivirus-And-Security-Applications-Under-Fire.pdf

2.2 MB

DEFCON-24-Hunter-Scott-Rt2Win-The-Luckiest-Guy-On-Twitter.pdf

1.2 MB

DEFCON-24-Int0X80-Anti-Forensics-AF.pdf

423.1 KB

DEFCON-24-Jay-Beale-Larry-Pesce-Phishing-without-Frustration.pdf

6.6 MB

DEFCON-24-Jennifer-Granick-Slouching-Towards-Utopia.pdf

426.9 KB

DEFCON-24-Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel-WP.pdf

1.9 MB

DEFCON-24-Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel.pdf

1.5 MB

DEFCON-24-Jmaxxz-Backdooring-the-Frontdoor-Bypass-Cert-Pinning.pdf

207.1 KB

DEFCON-24-Jmaxxz-Backdooring-the-Frontdoor-Extracting-Secrets-From-Log.pdf

207.5 KB

DEFCON-24-Jmaxxz-Backdooring-the-Frontdoor.pdf

2.0 MB

DEFCON-24-Joe-Grand-Zoz-BSODomizerHD.pdf

748.3 KB

DEFCON-24-Jonathan-Brossard-Intro-to-Witchcraft-Compiler.pdf

2.2 MB

DEFCON-24-Karyn-Benson-Examining-The-Internets-Pollution.pdf

2.4 MB

DEFCON-24-Klijnsma-Tentler-Stargate-Pivoting-Through-VNC.pdf

31.6 MB

DEFCON-24-Ladar-Levison-Compelled-Decryption.pdf

6.1 MB

DEFCON-24-Liu-Yan-Xu-Can-You-Trust-Autonomous-Vehicles-WP.pdf

2.8 MB

DEFCON-24-Liu-Yan-Xu-Can-You-Trust-Autonomous-Vehicles.pdf

2.3 MB

DEFCON-24-Lucas-Lundgren-Light-Weight Protocol-Critical-Implications.pdf

2.6 MB

DEFCON-24-Luke-Young-The-4TbS-Ddos-For-5-bucks.pdf

3.6 MB

DEFCON-24-Maldonado-Mcguffin-Sticky-Keys-To-The-Kingdom.pdf

850.9 KB

DEFCON-24-Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice-WP.pdf

532.5 KB

DEFCON-24-Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice.pdf

2.0 MB

DEFCON-24-Max-Bazaliy-A-Journey-Through-Exploit-Mitigation-Techniques-On-Ios.pdf

574.8 KB

DEFCON-24-Mcsweeny-Cranor-Research-On-The-Machines.pdf

2.7 MB

DEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them-WP.pdf

1.3 MB

DEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them.pdf

1.7 MB

DEFCON-24-Nick-Rosario-Weaponize-Your-Feature-Codes.pdf

938.1 KB

DEFCON-24-Panel-How-To-Make-A-DEFCON-Black-Badge.pdf

2.9 MB

DEFCON-24-Patrick-Wardle-99-Problems-Little-Snitch.pdf

14.9 MB

DEFCON-24-Plore-Side-Channel-Attacks-On-High-Security-Electronic-Safe-Locks.pdf

17.2 MB

DEFCON-24-Przemek-Jaroszewski-How-To-Get-Good-Seats-In-The-Security-Theater.pdf

1.5 MB

DEFCON-24-Radia-Perlman-Resilience-Despite-Malicious-Pariticpants.pdf

763.2 KB

DEFCON-24-Regilero-Hiding-Wookiees-In-Http.pdf

420.0 KB

DEFCON-24-Ricky-Lawshae-Lets-Get-Physical.pdf

192.9 KB

DEFCON-24-Robbins-Vazarkar-Schroeder-Six-Degrees-of-Domain-Admin.pdf

875.6 KB

DEFCON-24-Robert-Olson-Writing-Your-First-Exploit.pdf

466.4 KB

DEFCON-24-Rogan-Dawes-Dominic-White-Universal-Serial-aBUSe-Remote-Attacks.pdf

6.5 MB

DEFCON-24-Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks.pdf

7.7 MB

DEFCON-24-Salvador-Mendoza-Samsung-Pay-Tokenized-Numbers-WP.pdf

470.0 KB

DEFCON-24-Salvador-Mendoza-Samsung-Pay-Tokenized-Numbers.pdf

622.0 KB

DEFCON-24-Sean-Metcalf-Beyond-The-MCSE-Red-Teaming-Active-Directory.pdf

5.0 MB

DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-WP.pdf

480.6 KB

DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering.pdf

3.9 MB

DEFCON-24-Shane-Steiger-Maelstrom-Are-You-Playing-With-A-Full-Deck-V14-Back.pdf

2.4 MB

DEFCON-24-Shane-Steiger-Maelstrom-Rules-V10.pdf

951.1 KB

DEFCON-24-SixVolts-and-Haystack-Cheap-Tools-For-Hacking-Heavy-Trucks.pdf

25.4 MB

DEFCON-24-Tamas-Szakaly-Help-I-got-ANTS.pdf

6.0 MB

DEFCON-24-the-bob-ross-fan-club-Propaganda-and-you.pdf

3.1 MB

DEFCON-24-Thomas-Wilhelm-Hacking-Network-Protocols-Using-Kali.pdf

599.1 KB

DEFCON-24-Thomas-Wilhelm-Intrusion-Prevention-System-Evasion-Techniques.pdf

813.6 KB

DEFCON-24-Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines-Literature-Survey.pdf

360.1 KB

DEFCON-24-Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines.pdf

1.3 MB

DEFCON-24-Tom-Kopchak-Sentient-Storage.pdf

1.6 MB

DEFCON-24-Tom-Kopchak-SSD-Forensics-Research-WP.pdf

1.4 MB

DEFCON-24-Ulf-Frisk-Direct-Memory-Attack-the-Kernel.pdf

1.2 MB

DEFCON-24-Wesley-McGrew-Secure-Penetration-Testing-Operations-WP.pdf

128.6 KB

DEFCON-24-Wesley-McGrew-Secure-Penetration-Testing-Operations.pdf

302.6 KB

DEFCON-24-Willa-Riggins-Esoteric-Exfiltration.pdf

312.6 KB

DEFCON-24-Zhang-Shan-Forcing-Targeted-Lte-Cellphone-Into-Unsafe-Network.pdf

4.5 MB

DEFCON-24-Zhong-Lee-411-A-Framework-For-Managing-Security-Alerts.pdf

50.0 KB

/.../DEFCON-24-Amro-Abdelgawad-Extras/

rmengine_client.py

1.9 KB

rmengine_CPUID.py

16.2 KB

rmengine_isDebugged1.py

16.2 KB

rmengine_isDebugged2.py

16.1 KB

sample1_CPUID.py

15.7 KB

sample2_isDebugged1.py

15.8 KB

sample3_isDebugged2.py

15.7 KB

/.../DEFCON-24-Jonathan-Brossard-Extras/

AUTHORS

0.0 KB

LICENSE

1.1 KB

Makefile

0.1 KB

README

1.0 KB

/.../DEFCON-24-Jonathan-Brossard-Extras/bin/

wcc

321.0 KB

wld

140.6 KB

/.../DEFCON-24-Jonathan-Brossard-Extras/src/include/

config.h

0.1 KB

nametoalign.h

1.7 KB

nametoentsz.h

0.6 KB

nametoinfo.h

0.2 KB

nametolink.h

0.3 KB

nametotype.h

3.2 KB

/.../DEFCON-24-Jonathan-Brossard-Extras/src/

Makefile

0.1 KB

/.../DEFCON-24-Jonathan-Brossard-Extras/src/wcc/

Makefile

0.3 KB

wcc

321.0 KB

wcc.c

37.6 KB

/.../DEFCON-24-Jonathan-Brossard-Extras/src/wld/

Makefile

0.2 KB

wld

140.6 KB

wld.c

2.2 KB

/.../DEFCON-24-Lucas-Lundgren-Extras/

client.py

1.7 KB

hodor.rb

0.5 KB

/.../DEFCON-24-Mike-Rich-Extras/

DEFCON-24-Mike-Rich-newdll.zip

68.1 KB

DEFCON-24-Mike-Rich-Sideload-demo.xlsm

137.9 KB

DEFCON-24-Mike-Rich-Sideload_code.zip

100.5 KB

/.../DEFCON-24-Regilero-Extras/

apache_vhost_config.conf

1.0 KB

attack.png

3.5 KB

chewy2.jpg

46.6 KB

demo_downgrade_poisoning2.png

31.8 KB

index.html

0.3 KB

nginx_vhost_config.conf

0.3 KB

nodegoat-Demo-code-added-user-delete.patch

6.7 KB

reverseproxy.go

0.5 KB

smuggling_hijacking_varnish_node.png

15.2 KB

varnish-demo.vcl

1.5 KB

/.../DEFCON-24-Robert-Olson-Extras/

banner-grabber.py

0.5 KB

custom-payload-add-user.py

1.2 KB

custom-payload-calc.py

1.2 KB

exploit.py

2.8 KB

fuzzer.py

0.8 KB

outline.txt

0.7 KB

port-scanner.py

1.2 KB

references.txt

0.7 KB

setup.txt

0.4 KB

simpleoverflow.c

0.5 KB

/.../DEFCON-24-Seymour-Tully-Extras/auto-phish/

auto-phish.py

8.3 KB

cluster.pkl

30.3 KB

cluster.py

9.4 KB

credentials.py

0.3 KB

LICENSE

1.6 KB

post_tweet.py

1.5 KB

Readme.md

1.7 KB

requirements.txt

1.2 KB

sample.sh

0.1 KB

stopwords.txt

2.5 KB

/.../DEFCON-24-SixVolts-and-Haystack-Extras/

Truck Duck Bill of Materials.pdf

46.2 KB

Truck Duck Render.png

445.2 KB

Truck Duck Schematics.pdf

380.8 KB

/.../Truck Duck Gerbers/

truck-duck.drl

1.5 KB

truck-duck.gbl

58.0 KB

truck-duck.gbo

3.5 KB

truck-duck.gbs

2.3 KB

truck-duck.gko

2.5 KB

truck-duck.gtl

88.4 KB

truck-duck.gto

34.3 KB

truck-duck.gts

37.1 KB

/.../DEFCON-24-Wesley-McGrew-Extras/

DEFCON-24-Wesley-McGrew-Secure-Penetration-Testing-Operations-snagterpreter.py

2.2 KB

/.../DEFCON-24-Workshop-Boonen-Mifsud-Extras/

Windows_Breakout_PrivEsc_Setup_v1.2.ps1

33.2 KB

/.../DEFCON-24-Workshop-Dazzlecat-duo-extras/assembly-samples/bin/

desktop.ini

0.1 KB

do_while_O0.o

1.0 KB

do_while_O2.o

1.0 KB

do_while_Os.o

1.1 KB

for2_O0.o

1.0 KB

for2_O2.o

1.1 KB

for2_Os.o

1.1 KB

for3_O0.o

1.0 KB

for3_O2.o

1.0 KB

for3_Os.o

1.1 KB

for_O0.o

1.0 KB

for_O2.o

1.0 KB

for_Os.o

1.1 KB

if_and_O0.o

1.0 KB

if_and_O2.o

1.0 KB

if_and_Os.o

1.1 KB

if_O0.o

0.8 KB

if_O2.o

0.8 KB

if_or_O0.o

1.1 KB

if_or_O2.o

1.2 KB

if_or_Os.o

1.2 KB

if_Os.o

0.8 KB

while_break_O0.o

1.0 KB

while_break_O2.o

1.0 KB

while_break_Os.o

1.1 KB

while_continue_O0.o

1.0 KB

while_continue_O2.o

1.1 KB

while_continue_Os.o

1.1 KB

while_O0.o

1.0 KB

while_O2.o

1.0 KB

while_Os.o

1.1 KB

while_while_O0.o

1.0 KB

while_while_O2.o

1.1 KB

while_while_Os.o

1.1 KB

/.../DEFCON-24-Workshop-Dazzlecat-duo-extras/assembly-samples/

desktop.ini

0.1 KB

/.../DEFCON-24-Workshop-Dazzlecat-duo-extras/assembly-samples/src/

desktop.ini

0.1 KB

do_while.c

0.2 KB

for.c

0.1 KB

for2.c

0.2 KB

for3.c

0.1 KB

if.c

0.1 KB

if_and.c

0.1 KB

if_or.c

0.3 KB

while.c

0.1 KB

while_break.c

0.2 KB

while_continue.c

0.2 KB

while_while.c

0.3 KB

/.../DEFCON-24-Workshop-Dazzlecat-duo-extras/

desktop.ini

0.1 KB

/.../DEFCON-24-Workshop-Robert-Olson-Extras/

banner-grabber.py

0.5 KB

custom-payload-add-user.py

1.2 KB

custom-payload-calc.py

1.2 KB

exploit.py

2.8 KB

fuzzer.py

0.8 KB

outline.txt

0.7 KB

port-scanner.py

1.2 KB

references.txt

0.7 KB

setup.txt

0.4 KB

simpleoverflow.c

0.5 KB

/.../DEFCON-24-Workshop-Rodrigo-Almeida-Extras/Source-Code/baseFirmware.X/

Makefile

3.4 KB

newmain.c

6.5 KB

/.../DEFCON-24-Workshop-Rodrigo-Almeida-Extras/Source-Code/baseFirmware.X/nbproject/

configurations.xml

6.1 KB

Makefile-default.mk

4.1 KB

Makefile-genesis.properties

0.4 KB

Makefile-impl.mk

1.9 KB

Makefile-local-default.mk

1.9 KB

Makefile-variables.mk

0.4 KB

Package-default.bash

1.4 KB

project.xml

0.7 KB

/.../DEFCON-24-Workshop-Rodrigo-Almeida-Extras/Source-Code/baseFirmware.X/nbproject/private/

configurations.xml

1.0 KB

private.xml

0.5 KB

SuppressibleMessageMemo.properties

0.1 KB

/.../DEFCON-24-Workshop-Rodrigo-Almeida-Extras/Source-Code/kernelDefcon.X/

basico.h

3.6 KB

config.h

1.3 KB

ddCtr.c

0.8 KB

ddCtr.h

0.3 KB

ddCtr_prm.h

0.7 KB

ddCtr_types.h

0.4 KB

disp7seg.c

1.4 KB

disp7seg.h

0.1 KB

drvAdc.c

1.5 KB

drvAdc.h

0.2 KB

drvGenerico.c

0.8 KB

drvGenerico.h

0.3 KB

drvInterrupt.c

2.5 KB

drvInterrupt.h

1.0 KB

drvLcd.c

4.5 KB

drvLcd.h

1.0 KB

drvTimer.c

2.4 KB

drvTimer.h

1.0 KB

kernel.c

3.2 KB

kernel.h

1.0 KB

kernel_prm.h

0.3 KB

kernel_types.h

0.3 KB

main.c

2.3 KB

Makefile

3.4 KB

pwm.c

2.2 KB

pwm.h

1.0 KB

serial.c

0.8 KB

serial.h

0.2 KB

teclado.c

1.2 KB

teclado.h

0.1 KB

/.../DEFCON-24-Workshop-Rodrigo-Almeida-Extras/Source-Code/kernelDefcon.X/nbproject/

configurations.xml

7.1 KB

Makefile-default.mk

7.6 KB

Makefile-genesis.properties

0.4 KB

Makefile-impl.mk

1.9 KB

Makefile-local-default.mk

1.9 KB

Makefile-variables.mk

0.4 KB

Package-default.bash

1.4 KB

project.xml

0.7 KB

/.../DEFCON-24-Workshop-Rodrigo-Almeida-Extras/Source-Code/kernelDefcon.X/nbproject/private/

configurations.xml

1.0 KB

private.xml

0.3 KB

SuppressibleMessageMemo.properties

0.1 KB

 

Total files 323


Copyright © 2024 FileMood.com