FileMood

Download DEF CON 25

DEF CON 25

Name

DEF CON 25

  DOWNLOAD Copy Link

Total Size

153.5 GB

Total Files

2910

Hash

BAE87624DE4CEC9EE64AD741D7527F7D5F75FFBC

/.../DEF CON 25 speakers audio - m4a/

DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc

42.3 KB

DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.m4a

57.2 MB

DEF CON 25 Conference - Alvaro Muñoz, Alexandr Mirosh - Friday the 13th- JSON attacks - Transcript.txt

35.4 KB

DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc

85.0 KB

DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel- Meet The Feds - Transcript.txt

73.4 KB

DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel- Meet The Feds.m4a

119.9 MB

DEF CON 25 Conference - Andy Robbins Will Schroeder - Designing Active Directory DACL Backdoors - Transcript.txt

45.0 KB

DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc

52.5 KB

DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.m4a

62.9 MB

DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation - Transcript.txt

29.2 KB

DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc

36.7 KB

DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.m4a

59.8 MB

DEF CON 25 Conference - Avi Bashan Slava Makkaveev - Unboxing Android- Everything you wanted to know about Android packers - Transcript.txt

22.8 KB

DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc

26.5 KB

DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.m4a

45.7 MB

DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS - Transcript.txt

48.8 KB

DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc

55.6 KB

DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on z_OS.m4a

64.3 MB

DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals - Transcript.txt

29.7 KB

DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc

35.1 KB

DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.m4a

48.9 MB

DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre - Transcript.txt

20.4 KB

DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.m4a

29.1 MB

DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc

23.7 KB

DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus - Transcript.txt

6.5 KB

DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc

8.7 KB

DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.m4a

22.5 MB

DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine - Transcript.txt

41.2 KB

DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc

48.6 KB

DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.m4a

70.3 MB

DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes - Transcript.txt

41.3 KB

DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc

49.9 KB

DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.m4a

67.6 MB

DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set - Transcript.txt

48.2 KB

DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc

56.2 KB

DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.m4a

55.5 MB

DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc

43.1 KB

DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.m4a

53.2 MB

DEF CON 25 Conference - Cooper Quintin, Kashmir Hill - The Internet Already Knows I'm Pregnant - Transcript.txt

36.6 KB

DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward TRUMPNUM steps back- how can we tell if were winning - Transcript.txt

43.4 KB

DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc

51.2 KB

DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.m4a

62.6 MB

DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit - Transcript.txt

26.6 KB

DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc

31.0 KB

DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.m4a

51.7 MB

DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc

53.7 KB

DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.m4a

66.4 MB

DEF CON 25 Conference - Dan Petro, Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway - Transcript.txt

46.5 KB

DEF CON 25 Conference - Daniel Bohannon Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science - Transcript.txt

47.7 KB

DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc

55.7 KB

DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.m4a

68.9 MB

DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time - Transcript.txt

30.8 KB

DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc

37.0 KB

DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.m4a

57.8 MB

DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field - Transcript.txt

21.4 KB

DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc

24.7 KB

DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.m4a

32.2 MB

DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi - Transcript.txt

17.3 KB

DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc

20.7 KB

DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.m4a

29.6 MB

DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control - Transcript.txt

18.5 KB

DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc

22.3 KB

DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.m4a

31.9 MB

DEF CON 25 Conference - Dor Azouri - BITSInject - Transcript.txt

15.2 KB

DEF CON 25 Conference - Dor Azouri - BITSInject.lrc

17.9 KB

DEF CON 25 Conference - Dor Azouri - BITSInject.m4a

29.6 MB

DEF CON 25 Conference - Duncan Woodbury Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles - Transcript.txt

38.0 KB

DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc

44.7 KB

DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.m4a

63.7 MB

DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security - Transcript.txt

37.9 KB

DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc

44.3 KB

DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.m4a

47.2 MB

DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc

53.7 KB

DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.m4a

61.5 MB

DEF CON 25 Conference - Francis Brown, David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test - Transcript.txt

45.7 KB

DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation - Transcript.txt

54.2 KB

DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc

62.9 KB

DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.m4a

72.8 MB

DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc

49.6 KB

DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.m4a

72.6 MB

DEF CON 25 Conference - Garry Kasparov - The Brains Last Stand - Transcript.txt

43.0 KB

DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud - Transcript.txt

89.0 KB

DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc

51.8 KB

DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.m4a

61.6 MB

DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe - Transcript.txt

29.8 KB

DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc

36.2 KB

DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.m4a

52.2 MB

DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc

42.2 KB

DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.m4a

56.6 MB

DEF CON 25 Conference - Gus Fritschie, Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming - Transcript.txt

36.3 KB

DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs - Transcript.txt

24.8 KB

DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc

30.2 KB

DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.m4a

44.0 MB

DEF CON 25 Conference - Haoqi Shan Jian Yuan - Man in the NFC - Transcript.txt

25.2 KB

DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc

29.0 KB

DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.m4a

51.2 MB

DEF CON 25 Conference - HighWiz Malware Unicorn Niki7a Roamer Wiseacre Shaggy - DEF CON 101 Panel - Transcript.txt

96.7 KB

DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc

114.9 KB

DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.m4a

169.3 MB

DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence - Transcript.txt

17.6 KB

DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc

20.9 KB

DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.m4a

28.2 MB

DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally- A survey of BSD kernel vulnerabilities - Transcript.txt

48.0 KB

DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc

55.9 KB

DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.m4a

74.9 MB

DEF CON 25 Conference - Inbar Raz - Eden Schochat - From One Country - One Floppy to Startup Nation - Transcript.txt

42.7 KB

DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc

51.2 KB

DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.m4a

67.7 MB

DEF CON 25 Conference - Itzik Kotler Amit Klein - The Adventures of AV and the Leaky Sandbox - Transcript.txt

31.6 KB

DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc

36.6 KB

DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.m4a

63.3 MB

DEF CON 25 Conference - James Langevin Will Hurd - DC to DEF CON QA with Congressmen - Transcript.txt

41.3 KB

DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc

49.5 KB

DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.m4a

63.5 MB

DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking Manual Testing - Transcript.txt

29.3 KB

DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc

34.1 KB

DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.m4a

41.1 MB

DEF CON 25 Conference - Jason Hernandez Sam Richards Jerod MacDonald-Evoy - Tracking Spies in the Skies - Transcript.txt

38.2 KB

DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc

45.1 KB

DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.m4a

57.0 MB

DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups - Transcript.txt

52.2 KB

DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc

59.4 KB

DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.m4a

80.3 MB

DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc

44.8 KB

DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.m4a

63.6 MB

DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy and Anonymity Without Your Consent - Transcript.txt

38.2 KB

DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc

31.7 KB

DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.m4a

46.9 MB

DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks - Transcript.txt

26.7 KB

DEF CON 25 Conference - Joe Rozner - Wiping out CSRF - Transcript.txt

40.7 KB

DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc

46.7 KB

DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.m4a

62.8 MB

DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome - Transcript.txt

43.8 KB

DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc

52.4 KB

DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.m4a

73.1 MB

DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks - Transcript.txt

39.0 KB

DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc

45.8 KB

DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks_.m4a

57.3 MB

DEF CON 25 Conference - Josh Datko Chris Quartier - Breaking Bitcoin Hardware Wallets - Transcript.txt

18.9 KB

DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc

22.3 KB

DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.m4a

30.8 MB

DEF CON 25 Conference - Josh Schwartz John Cramb - MEATPISTOL A Modular Malware Implant Framework - Transcript.txt

37.7 KB

DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc

43.4 KB

DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.m4a

54.1 MB

DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks - Transcript.txt

26.1 KB

DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc

30.8 KB

DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.m4a

34.3 MB

DEF CON 25 Conference - Jow Fitzpatrick Michael Leibowitz - How to roll your own counterfeit hardware security devices - Transcript.txt

46.5 KB

DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc

54.6 KB

DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.m4a

66.3 MB

DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc

15.6 KB

DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.m4a

22.2 MB

DEF CON 25 Conference - K2 - UnFucking Forensics – Active Passive i.e. Offensive Defensive memory hacking debugging - Transcript.txt

13.1 KB

DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts - Transcript.txt

40.2 KB

DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc

46.8 KB

DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.m4a

72.6 MB

DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc

24.7 KB

DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.m4a

34.6 MB

DEF CON 25 Conference - Lee Holmes - Get-pwnd- Attacking Battle-Hardened Windows Server - Transcript.txt

20.9 KB

DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.m4a

60.1 MB

DEF CON 25 Conference - Luke Young - There’s no place like 127.0.0.1 - Achieving reliable DNS rebinding in modern browsers - Transcript.txt

38.3 KB

DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc

45.1 KB

DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics Same Exploits - Transcript.txt

34.4 KB

DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc

39.9 KB

DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.m4a

68.8 MB

DEF CON 25 Conference - Marc Newlin Logan Lamb Chris Grayson - CableTap- Wirelessly Tapping Your Home Network - Transcript.txt

45.0 KB

DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc

52.7 KB

DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.m4a

61.9 MB

DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc

43.2 KB

DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.m4a

64.7 MB

DEF CON 25 Conference - Marina Simakov, Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms - Transcript.txt

37.2 KB

DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc

32.2 KB

DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.m4a

44.8 MB

DEF CON 25 Conference - Mark Williams, Rob Stanley - If You Give a Mouse a Microchip - Transcript.txt

27.4 KB

DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology - Transcript.txt

48.4 KB

DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc

56.0 KB

DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.m4a

67.4 MB

DEF CON 25 Conference - Matt Knight - Radio Exploitation 101 - Transcript.txt

38.1 KB

DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc

44.3 KB

DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.m4a

46.2 MB

DEF CON 25 Conference - Matt Suiche - Porosity - A decompiler for blockchain smart contracts bytecode - Transcript.txt

30.3 KB

DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc

35.4 KB

DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.m4a

58.8 MB

DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc

44.9 KB

DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.m4a

65.1 MB

DEF CON 25 Conference - Matt Wixey - See no evil hear no evil - Hacking invisibly and silently with light and sound - Transcript.txt

39.1 KB

DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch - Transcript.txt

29.4 KB

DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc

36.0 KB

DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.m4a

53.9 MB

DEF CON 25 Conference - Mickey Shkatov Jesse Michael Oleksandr Bazhaniuk - Driving down the rabbit hole - Transcript.txt

29.9 KB

DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc

37.1 KB

DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.m4a

57.1 MB

DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc

21.6 KB

DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.m4a

30.1 MB

DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like its 1999 - Transcript.txt

18.1 KB

DEF CON 25 Conference - Min Zheng Xiangyu Liu - macOSiOS Kernel Debugging and Heap Feng Shui - 108 - Transcript.txt

18.0 KB

DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc

23.3 KB

DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS_iOS Kernel Debugging and Heap Feng Shui.m4a

39.3 MB

DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level - Transcript.txt

28.5 KB

DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc

34.0 KB

DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.m4a

46.4 MB

DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc

49.9 KB

DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.m4a

64.9 MB

DEF CON 25 Conference - Mr. Sean Kanuck -Hacking Democracy- A Socratic Dialogue - Transcript.txt

41.9 KB

DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour - Transcript.txt

25.0 KB

DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc

29.6 KB

DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.m4a

42.2 MB

DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss - Transcription.txt

38.3 KB

DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc

44.6 KB

DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.m4a

59.2 MB

DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It - Transcript.txt

20.0 KB

DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc

23.7 KB

DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.m4a

30.1 MB

DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks - Transcript.txt

30.8 KB

DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc

37.2 KB

DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.m4a

50.5 MB

DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages - Transcript.txt

25.4 KB

DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc

29.7 KB

DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.m4a

67.6 MB

DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor - Transcript.txt

29.4 KB

DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc

34.1 KB

DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.m4a

46.3 MB

DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers on macOS its all broken - Transcript.txt

46.6 KB

DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc

54.3 KB

DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.m4a

71.2 MB

DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly - Transcript.txt

21.9 KB

DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc

25.7 KB

DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.m4a

31.6 MB

DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc

24.1 KB

DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.m4a

28.0 MB

DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Cant Ever See - Transcript.txt

20.7 KB

DEF CON 25 Conference - Philip Tully Michael T. Raggo - A Picture is Worth a Thousand Words Literally - Transcript.txt

46.8 KB

DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc

54.7 KB

DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.m4a

68.6 MB

DEF CON 25 Conference - Plore - Popping a Smart Gun - Transcript.txt

38.6 KB

DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc

45.7 KB

DEF CON 25 Conference - Plore - Popping a Smart Gun.m4a

58.1 MB

DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C and C Toolkits - Transcript.txt

35.1 KB

DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc

40.7 KB

DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.m4a

48.8 MB

DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks - Transcript.txt

20.3 KB

DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc

23.8 KB

DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.m4a

34.4 MB

DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof Why Its Gone and Never Coming Back - Transcript.txt

44.4 KB

DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc

52.1 KB

DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.m4a

64.8 MB

DEF CON 25 Conference - Roger Dingledine - Next Generation Tor Onion Services - Transcript.txt

45.9 KB

DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc

52.9 KB

DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.m4a

65.3 MB

DEF CON 25 Conference - Romain Coltel Yves Le Provost - WSUSpendu- How to hang WSUS clients - Transcript.txt

13.0 KB

DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc

15.6 KB

DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.m4a

26.9 MB

DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security - Transcript.txt

21.6 KB

DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc

25.8 KB

DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.m4a

29.8 MB

DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects - Transcript.txt

39.5 KB

DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc

47.2 KB

DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.m4a

59.5 MB

DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology - Transcript.txt

12.3 KB

DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc

15.2 KB

DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.m4a

22.5 MB

DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later - Transcript.txt

32.6 KB

DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc

38.6 KB

DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.m4a

57.0 MB

DEF CON 25 Conference - Scott Behrens Jeremy Heffner - Starting the Avalanche- Application DoS In Microservice Architectures - Transcript.txt

44.2 KB

DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc

51.5 KB

DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.m4a

55.5 MB

DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc

45.9 KB

DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.m4a

67.3 MB

DEF CON 25 Conference - Sean Dillon, Zach Harding - Koadic C3 - Windows COM Command & Control Framework - Transcript.txt

38.2 KB

DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks - Transcript.txt

34.7 KB

DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc

39.7 KB

DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.m4a

55.2 MB

DEF CON 25 Conference - Steinthor Bjarnason Jason Jones - The call is coming from inside the house - Transcript.txt

31.3 KB

DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc

37.6 KB

DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.m4a

48.6 MB

DEF CON 25 Conference - Stephan Huber Siegfried Rasthofer - Bypassing Android Password Manager Without Root - Transcript.txt

35.4 KB

DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc

41.3 KB

DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.m4a

66.3 MB

DEF CON 25 Conference - Svea Owen - Andreas Dewes - Dark Data - Transcript.txt

31.3 KB

DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc

36.4 KB

DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.m4a

52.9 MB

DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory - 128 - Transcript.txt

34.8 KB

DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc

41.8 KB

DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.m4a

58.5 MB

DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25 - Transcript.txt

14.1 KB

DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc

16.7 KB

DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.m4a

22.4 MB

DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc

79.8 KB

DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.m4a

130.5 MB

DEF CON 25 Conference - The Dark Tangent, Def Con Goons - DEF CON Closing Ceremonies.txt

66.2 KB

DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc

50.6 KB

DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.m4a

67.9 MB

DEF CON 25 Conference - Thomas Mathew, Dhia Mahjoub - Malicious CDNs - Transcript.txt

43.5 KB

DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions - Transcript.txt

23.0 KB

DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc

28.6 KB

DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.m4a

48.2 MB

DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc

50.1 KB

DEF CON 25 Conference - Trey Forgety - Inside the _Meet Desai_ Attack - Defending Distributed Targets from Distributed Attacks.m4a

59.1 MB

DEF CON 25 Conference - Trey Forgety - Inside the “Meet Desai” Attack - Defending Distributed Targets from Distributed Attacks - Transcript.txt

42.5 KB

DEF CON 25 Conference - Vasilios Mavroudis Dan Cvrcek - Trojan-tolerant Hardware Supply Chain Security in Practice - Transcript.txt

31.6 KB

DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc

37.1 KB

DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.m4a

53.5 MB

DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc

143.0 KB

DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You'll Ever Need - AMA with 20 years of DEF CON CTF.m4a

163.7 MB

DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need AMA with 20 years of DEF CON CTF - Transcript.txt

126.8 KB

DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc

48.6 KB

DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.m4a

52.5 MB

DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying - Anti-Tracking Bots Radios and Keystroke Injection - Transcript.txt

41.7 KB

DEF CON 25 Conference - Whitney Merrill Terrell McSweeny - Tick Tick Tick.Boom Youre Dead - Tech and the FTC - Transcript.txt

42.0 KB

DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc

49.7 KB

DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.m4a

67.0 MB

DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options - Transcript.txt

18.5 KB

DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc

21.9 KB

DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.m4a

24.4 MB

DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level - Transcript.txt

47.3 KB

DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc

55.4 KB

DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.m4a

69.1 MB

DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc

49.3 KB

DEF CON 25 Conference - Yan Shoshitaishvili -  25 Years of Program Analysis - Transcript.txt

41.8 KB

DEF CON 25 Conference - Yan Shoshitaishvili -  25 Years of Program Analysis.m4a

67.3 MB

DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc

28.1 KB

DEF CON 25 Conference - Yuwue Zheng and Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB.m4a

58.0 MB

DEF CON 25 Conference - Yuwue Zheng, Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB - Transcript.txt

21.3 KB

DEF CON 25 Conference - Zenofex 0x00string CJ_000 Maximus64 - All Your Things Are Belong To Us - Transcript.txt

53.3 KB

DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc

61.9 KB

DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.m4a

85.4 MB

DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system - Transcript.txt

39.3 KB

DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc

46.8 KB

DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.m4a

61.5 MB

DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc

44.8 KB

DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.m4a

59.8 MB

DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems - Transcript.txt

38.8 KB

/.../DEF CON 25 speakers audio - opus/

DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc

42.3 KB

DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.opus

30.9 MB

DEF CON 25 Conference - Alvaro Muñoz, Alexandr Mirosh - Friday the 13th- JSON attacks - Transcript.txt

35.4 KB

DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc

85.0 KB

DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.opus

61.9 MB

DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel- Meet The Feds - Transcript.txt

73.4 KB

DEF CON 25 Conference - Andy Robbins Will Schroeder - Designing Active Directory DACL Backdoors - Transcript.txt

45.0 KB

DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc

52.5 KB

DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.opus

32.5 MB

DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation - Transcript.txt

29.2 KB

DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc

36.7 KB

DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.opus

33.4 MB

DEF CON 25 Conference - Avi Bashan Slava Makkaveev - Unboxing Android- Everything you wanted to know about Android packers - Transcript.txt

22.8 KB

DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc

26.5 KB

DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.opus

25.0 MB

DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS - Transcript.txt

48.8 KB

DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc

55.6 KB

DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.opus

35.1 MB

DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals - Transcript.txt

29.7 KB

DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc

35.1 KB

DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.opus

28.0 MB

DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre - Transcript.txt

20.4 KB

DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc

23.7 KB

DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.opus

15.2 MB

DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus - Transcript.txt

6.5 KB

DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc

8.7 KB

DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.opus

11.9 MB

DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine - Transcript.txt

41.2 KB

DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc

48.6 KB

DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.opus

39.5 MB

DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes - Transcript.txt

41.3 KB

DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc

49.9 KB

DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.opus

40.2 MB

DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set - Transcript.txt

48.2 KB

DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc

56.2 KB

DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.opus

29.5 MB

DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc

43.1 KB

DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.opus

31.4 MB

DEF CON 25 Conference - Cooper Quintin, Kashmir Hill - The Internet Already Knows I'm Pregnant - Transcript.txt

36.6 KB

DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward TRUMPNUM steps back- how can we tell if were winning - Transcript.txt

43.4 KB

DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc

51.2 KB

DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.opus

34.0 MB

DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit - Transcript.txt

26.6 KB

DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc

31.0 KB

DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.opus

27.4 MB

DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc

53.7 KB

DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.opus

31.2 MB

DEF CON 25 Conference - Dan Petro, Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway - Transcript.txt

46.5 KB

DEF CON 25 Conference - Daniel Bohannon Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science - Transcript.txt

47.7 KB

DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc

55.7 KB

DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.opus

35.8 MB

DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time - Transcript.txt

30.8 KB

DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc

37.0 KB

DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.opus

29.1 MB

DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field - Transcript.txt

21.4 KB

DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc

24.7 KB

DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.opus

15.8 MB

DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi - Transcript.txt

17.3 KB

DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc

20.7 KB

DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.opus

15.0 MB

DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control - Transcript.txt

18.5 KB

DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc

22.3 KB

DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.opus

19.2 MB

DEF CON 25 Conference - Dor Azouri - BITSInject - Transcript.txt

15.2 KB

DEF CON 25 Conference - Dor Azouri - BITSInject.lrc

17.9 KB

DEF CON 25 Conference - Dor Azouri - BITSInject.opus

15.5 MB

DEF CON 25 Conference - Duncan Woodbury Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles - Transcript.txt

38.0 KB

DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc

44.7 KB

DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.opus

31.7 MB

DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security - Transcript.txt

37.9 KB

DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc

44.3 KB

DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.opus

30.2 MB

DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc

53.7 KB

DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.opus

33.2 MB

DEF CON 25 Conference - Francis Brown, David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test - Transcript.txt

45.7 KB

DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation - Transcript.txt

54.2 KB

DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc

62.9 KB

DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.opus

38.3 MB

DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc

49.6 KB

DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.opus

35.3 MB

DEF CON 25 Conference - Garry Kasparov - The Brains Last Stand - Transcript.txt

43.0 KB

DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud - Transcript.txt

89.0 KB

DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc

51.8 KB

DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.opus

33.7 MB

DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe - Transcript.txt

29.8 KB

DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc

36.2 KB

DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.opus

31.0 MB

DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc

42.2 KB

DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.opus

30.2 MB

DEF CON 25 Conference - Gus Fritschie, Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming - Transcript.txt

36.3 KB

DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs - Transcript.txt

24.8 KB

DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc

30.2 KB

DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.opus

22.9 MB

DEF CON 25 Conference - Haoqi Shan Jian Yuan - Man in the NFC - Transcript.txt

25.2 KB

DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc

29.0 KB

DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.opus

26.7 MB

DEF CON 25 Conference - HighWiz Malware Unicorn Niki7a Roamer Wiseacre Shaggy - DEF CON 101 Panel - Transcript.txt

96.7 KB

DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc

114.9 KB

DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.opus

86.7 MB

DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence - Transcript.txt

17.6 KB

DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc

20.9 KB

DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.opus

15.3 MB

DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally- A survey of BSD kernel vulnerabilities - Transcript.txt

48.0 KB

DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc

55.9 KB

DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.opus

36.7 MB

DEF CON 25 Conference - Inbar Raz - Eden Schochat - From One Country - One Floppy to Startup Nation - Transcript.txt

42.7 KB

DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc

51.2 KB

DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.opus

36.1 MB

DEF CON 25 Conference - Itzik Kotler Amit Klein - The Adventures of AV and the Leaky Sandbox - Transcript.txt

31.6 KB

DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc

36.6 KB

DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.opus

31.4 MB

DEF CON 25 Conference - James Langevin Will Hurd - DC to DEF CON QA with Congressmen - Transcript.txt

41.3 KB

DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc

49.5 KB

DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.opus

39.1 MB

DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking Manual Testing - Transcript.txt

29.3 KB

DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc

34.1 KB

DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.opus

22.2 MB

DEF CON 25 Conference - Jason Hernandez Sam Richards Jerod MacDonald-Evoy - Tracking Spies in the Skies - Transcript.txt

38.2 KB

DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc

45.1 KB

DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.opus

30.2 MB

DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups - Transcript.txt

52.2 KB

DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc

59.4 KB

DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.opus

38.0 MB

DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc

44.8 KB

DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.opus

31.7 MB

DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy and Anonymity Without Your Consent - Transcript.txt

38.2 KB

DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc

31.7 KB

DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.opus

24.1 MB

DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks - Transcript.txt

26.7 KB

DEF CON 25 Conference - Joe Rozner - Wiping out CSRF - Transcript.txt

40.7 KB

DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc

46.7 KB

DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.opus

36.9 MB

DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome - Transcript.txt

43.8 KB

DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc

52.4 KB

DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.opus

39.4 MB

DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks - Transcript.txt

39.0 KB

DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc

45.8 KB

DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.opus

30.7 MB

DEF CON 25 Conference - Josh Datko Chris Quartier - Breaking Bitcoin Hardware Wallets - Transcript.txt

18.9 KB

DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc

22.3 KB

DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.opus

14.8 MB

DEF CON 25 Conference - Josh Schwartz John Cramb - MEATPISTOL A Modular Malware Implant Framework - Transcript.txt

37.7 KB

DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc

43.4 KB

DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.opus

28.1 MB

DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks - Transcript.txt

26.1 KB

DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc

30.8 KB

DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.opus

20.2 MB

DEF CON 25 Conference - Jow Fitzpatrick Michael Leibowitz - How to roll your own counterfeit hardware security devices - Transcript.txt

46.5 KB

DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc

54.6 KB

DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.opus

36.2 MB

DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc

15.6 KB

DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.opus

12.4 MB

DEF CON 25 Conference - K2 - UnFucking Forensics – Active Passive i.e. Offensive Defensive memory hacking debugging - Transcript.txt

13.1 KB

DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts - Transcript.txt

40.2 KB

DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc

46.8 KB

DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.opus

35.3 MB

DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc

24.7 KB

DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.opus

17.2 MB

DEF CON 25 Conference - Lee Holmes - Get-pwnd- Attacking Battle-Hardened Windows Server - Transcript.txt

20.9 KB

DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.opus

33.8 MB

DEF CON 25 Conference - Luke Young - There’s no place like 127.0.0.1 - Achieving reliable DNS rebinding in modern browsers - Transcript.txt

38.3 KB

DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc

45.1 KB

DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics Same Exploits - Transcript.txt

34.4 KB

DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc

39.9 KB

DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.opus

32.7 MB

DEF CON 25 Conference - Marc Newlin Logan Lamb Chris Grayson - CableTap- Wirelessly Tapping Your Home Network - Transcript.txt

45.0 KB

DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc

52.7 KB

DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.opus

30.6 MB

DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc

43.2 KB

DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.opus

33.2 MB

DEF CON 25 Conference - Marina Simakov, Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms - Transcript.txt

37.2 KB

DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc

32.2 KB

DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.opus

23.8 MB

DEF CON 25 Conference - Mark Williams, Rob Stanley - If You Give a Mouse a Microchip - Transcript.txt

27.4 KB

DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology - Transcript.txt

48.4 KB

DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc

56.0 KB

DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.opus

37.8 MB

DEF CON 25 Conference - Matt Knight - Radio Exploitation 101 - Transcript.txt

38.1 KB

DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc

44.3 KB

DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.opus

27.3 MB

DEF CON 25 Conference - Matt Suiche - Porosity - A decompiler for blockchain smart contracts bytecode - Transcript.txt

30.3 KB

DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc

35.4 KB

DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.opus

33.7 MB

DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc

44.9 KB

DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.opus

31.8 MB

DEF CON 25 Conference - Matt Wixey - See no evil hear no evil - Hacking invisibly and silently with light and sound - Transcript.txt

39.1 KB

DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch - Transcript.txt

29.4 KB

DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc

36.0 KB

DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.opus

28.4 MB

DEF CON 25 Conference - Mickey Shkatov Jesse Michael Oleksandr Bazhaniuk - Driving down the rabbit hole - Transcript.txt

29.9 KB

DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc

37.1 KB

DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.opus

29.9 MB

DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc

21.6 KB

DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.opus

15.0 MB

DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like its 1999 - Transcript.txt

18.1 KB

DEF CON 25 Conference - Min Zheng Xiangyu Liu - macOSiOS Kernel Debugging and Heap Feng Shui - 108 - Transcript.txt

18.0 KB

DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc

23.3 KB

DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.opus

22.5 MB

DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level - Transcript.txt

28.5 KB

DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc

34.0 KB

DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.opus

23.6 MB

DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc

49.9 KB

DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.opus

35.9 MB

DEF CON 25 Conference - Mr. Sean Kanuck -Hacking Democracy- A Socratic Dialogue - Transcript.txt

41.9 KB

DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour - Transcript.txt

25.0 KB

DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc

29.6 KB

DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.opus

21.3 MB

DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss - Transcription.txt

38.3 KB

DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc

44.6 KB

DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.opus

31.8 MB

DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It - Transcript.txt

20.0 KB

DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc

23.7 KB

DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.opus

14.9 MB

DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks - Transcript.txt

30.8 KB

DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc

37.2 KB

DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.opus

29.4 MB

DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages - Transcript.txt

25.4 KB

DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc

29.7 KB

DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.opus

32.5 MB

DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor - Transcript.txt

29.4 KB

DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc

34.1 KB

DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.opus

27.8 MB

DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers on macOS its all broken - Transcript.txt

46.6 KB

DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc

54.3 KB

DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.opus

36.3 MB

DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly - Transcript.txt

21.9 KB

DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc

25.7 KB

DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.opus

18.8 MB

DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc

24.1 KB

DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.opus

14.8 MB

DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Cant Ever See - Transcript.txt

20.7 KB

DEF CON 25 Conference - Philip Tully Michael T. Raggo - A Picture is Worth a Thousand Words Literally - Transcript.txt

46.8 KB

DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc

54.7 KB

DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.opus

36.2 MB

DEF CON 25 Conference - Plore - Popping a Smart Gun - Transcript.txt

38.6 KB

DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc

45.7 KB

DEF CON 25 Conference - Plore - Popping a Smart Gun.opus

31.5 MB

DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C and C Toolkits - Transcript.txt

35.1 KB

DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc

40.7 KB

DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.opus

27.4 MB

DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks - Transcript.txt

20.3 KB

DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc

23.8 KB

DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.opus

16.0 MB

DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof Why Its Gone and Never Coming Back - Transcript.txt

44.4 KB

DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc

52.1 KB

DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.opus

33.9 MB

DEF CON 25 Conference - Roger Dingledine - Next Generation Tor Onion Services - Transcript.txt

45.9 KB

DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc

52.9 KB

DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.opus

35.4 MB

DEF CON 25 Conference - Romain Coltel Yves Le Provost - WSUSpendu- How to hang WSUS clients - Transcript.txt

13.0 KB

DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc

15.6 KB

DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.opus

13.9 MB

DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security - Transcript.txt

21.6 KB

DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc

25.8 KB

DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.opus

18.1 MB

DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects - Transcript.txt

39.5 KB

DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc

47.2 KB

DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.opus

34.4 MB

DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology - Transcript.txt

12.3 KB

DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc

15.2 KB

DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.opus

12.8 MB

DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later - Transcript.txt

32.6 KB

DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc

38.6 KB

DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.opus

33.1 MB

DEF CON 25 Conference - Scott Behrens Jeremy Heffner - Starting the Avalanche- Application DoS In Microservice Architectures - Transcript.txt

44.2 KB

DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc

51.5 KB

DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.opus

29.1 MB

DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc

45.9 KB

DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.opus

34.4 MB

DEF CON 25 Conference - Sean Dillon, Zach Harding - Koadic C3 - Windows COM Command & Control Framework - Transcript.txt

38.2 KB

DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks - Transcript.txt

34.7 KB

DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc

39.7 KB

DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.opus

29.0 MB

DEF CON 25 Conference - Steinthor Bjarnason Jason Jones - The call is coming from inside the house - Transcript.txt

31.3 KB

DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc

37.6 KB

DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.opus

25.4 MB

DEF CON 25 Conference - Stephan Huber Siegfried Rasthofer - Bypassing Android Password Manager Without Root - Transcript.txt

35.4 KB

DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc

41.3 KB

DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.opus

32.2 MB

DEF CON 25 Conference - Svea Owen - Andreas Dewes - Dark Data - Transcript.txt

31.3 KB

DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc

36.4 KB

DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.opus

29.1 MB

DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory - 128 - Transcript.txt

34.8 KB

DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc

41.8 KB

DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.opus

29.8 MB

DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25 - Transcript.txt

14.1 KB

DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc

16.7 KB

DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.opus

12.4 MB

DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc

79.8 KB

DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.opus

62.0 MB

DEF CON 25 Conference - The Dark Tangent, Def Con Goons - DEF CON Closing Ceremonies.txt

66.2 KB

DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc

50.6 KB

DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.opus

35.3 MB

DEF CON 25 Conference - Thomas Mathew, Dhia Mahjoub - Malicious CDNs - Transcript.txt

43.5 KB

DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions - Transcript.txt

23.0 KB

DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc

28.6 KB

DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.opus

26.9 MB

DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc

50.1 KB

DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.opus

31.4 MB

DEF CON 25 Conference - Trey Forgety - Inside the “Meet Desai” Attack - Defending Distributed Targets from Distributed Attacks - Transcript.txt

42.5 KB

DEF CON 25 Conference - Vasilios Mavroudis Dan Cvrcek - Trojan-tolerant Hardware Supply Chain Security in Practice - Transcript.txt

31.6 KB

DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc

37.1 KB

DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.opus

27.4 MB

DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc

143.0 KB

DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.opus

83.7 MB

DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need AMA with 20 years of DEF CON CTF - Transcript.txt

126.8 KB

DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc

48.6 KB

DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.opus

28.8 MB

DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying - Anti-Tracking Bots Radios and Keystroke Injection - Transcript.txt

41.7 KB

DEF CON 25 Conference - Whitney Merrill Terrell McSweeny - Tick Tick Tick.Boom Youre Dead - Tech and the FTC - Transcript.txt

42.0 KB

DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc

49.7 KB

DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.opus

34.3 MB

DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options - Transcript.txt

18.5 KB

DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc

21.9 KB

DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.opus

14.7 MB

DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level - Transcript.txt

47.3 KB

DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc

55.4 KB

DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.opus

35.0 MB

DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc

49.3 KB

DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.opus

36.6 MB

DEF CON 25 Conference - Yan Shoshitaishvili -  25 Years of Program Analysis - Transcript.txt

41.8 KB

DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc

28.1 KB

DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.opus

30.7 MB

DEF CON 25 Conference - Yuwue Zheng, Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB - Transcript.txt

21.3 KB

DEF CON 25 Conference - Zenofex 0x00string CJ_000 Maximus64 - All Your Things Are Belong To Us - Transcript.txt

53.3 KB

DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc

61.9 KB

DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.opus

47.1 MB

DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system - Transcript.txt

39.3 KB

DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc

46.8 KB

DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.opus

30.6 MB

DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc

44.8 KB

DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.opus

30.2 MB

DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems - Transcript.txt

38.8 KB

/.../DEF CON 25 village audio - m4a/

DEF CON 25 BioHacking Village - Amanda Plimpton and Evan Anderson - Psychoactive Chemicals in Combat.m4a

39.1 MB

DEF CON 25 BioHacking Village - Amirs Panel - Ethics in BioHacking.m4a

74.8 MB

DEF CON 25 BioHacking Village - C00p3r - Cur50r - Implantable Technology Show and Tell.m4a

28.8 MB

DEF CON 25 BioHacking Village - C00p3r - Dangerous Minds Podcast - Celebrating 100th Episode.m4a

70.4 MB

DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing The Secure Deployment Of Medical Devices.m4a

33.1 MB

DEF CON 25 BioHacking Village - Dr Stanislav Naydin - Vlad Gostomelsky - Medical Device Ethics and Security.m4a

37.2 MB

DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Path Badly.m4a

37.4 MB

DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides- Smart Drugs 4-Minute Mile.m4a

35.7 MB

DEF CON 25 BioHacking Village - Jay Radcliffe - How to use the Scientific Method in Security Research.m4a

66.6 MB

DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Die.m4a

35.1 MB

DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt - Blockchain and The Hope for Healthcare.m4a

32.4 MB

DEF CON 25 BioHacking Village - Jun Axup - The Brave New Worl of Bio-Entrepreneurship.m4a

28.6 MB

DEF CON 25 BioHacking Village - Kevin Sacco - Tales of A Healthcare Hacker.m4a

42.9 MB

DEF CON 25 BioHacking Village - Louis Auguste Jr - Microscopes Are Stupid.m4a

27.3 MB

DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and Regulation.m4a

35.1 MB

DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities.m4a

42.8 MB

DEF CON 25 BioHacking Village - RenderMan and Murdoch Monkey - Hacking The Internet of Dongs.m4a

38.6 MB

DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO.m4a

25.3 MB

DEF CON 25 BioHacking Village - Ryan Schmoll and Peter Hefley - Trigraph- An Ethereum-based Teleradiology Application.m4a

31.9 MB

DEF CON 25 BioHacking Village - Szkatulski and Lawless- How Your Doctor Might Be Trying To Kill You-How Personal Genomics Can Save Your Life.m4a

35.9 MB

DEF CON 25 BioHacking Village - Tess Scrodinger - Total Recall- Implicit Learning As A Cryptographic Primitive.m4a

34.7 MB

DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of Biohacking.m4a

23.9 MB

DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic Code Using Information Theory.m4a

24.2 MB

DEF CON 25 BioHacking Village - Trevor Goodman - Hack Your Senses - Sensory Augementation and Brain Plasticity.m4a

34.6 MB

DEF CON 25 Car Hacking Village - Badge Life - DEFCON Unofficial Badges Panel.m4a

73.1 MB

DEF CON 25 Car Hacking Village - Corey Theun - Heavy Truck and Electronic Logging Devices- What Could Go Wrong.m4a

48.4 MB

DEF CON 25 Car Hacking Village - Duncan Woodbury and Nocholas Haltmeyer - Linux-Stack Based V2X Framework.m4a

43.4 MB

DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - Don -An Introduction to AUTOSAR Secure Onbaord Communication.m4a

62.6 MB

DEF CON 25 Car Hacking Village - Justin Montalbano and Bryan Gillispie and David Connett- Attacking Wireless Interfaces in Vehicles.m4a

49.4 MB

DEF CON 25 Car Hacking Village - Sameer Dixit - Vlad Gostomelsky - Abusing Smart Cars with QR Codes.m4a

33.6 MB

DEF CON 25 Car Hacking Village - Sheila Ayelen Berta and Claudio Caracciolo - The Bicho- An Advanced Car Backdoor Maker.m4a

47.4 MB

DEF CON 25 Car Hacking Village - Tim b1tbane and Mitch Johnson ehntoo - That's No Car- Its a Network.m4a

50.3 MB

DEF CON 25 Car Hacking Village - Vlad Gostomelsky - GPS System Integrity.m4a

33.6 MB

DEF CON 25 Car Hacking Village - Weston Hecker - Grand Theft Radio- Stopping SDR Relay Attacks on PKES.m4a

36.8 MB

DEF CON 25 Crypto and Privacy Village - Alisha Kloc - Privacy is Not An Add-On- Designing for Privacy from the Ground Up.m4a

42.9 MB

DEF CON 25 Crypto and Privacy Village - Andrew Brandt - SSL Visibility Revisted- A Year In Privacy Improvements For Encrypted Communications.m4a

71.3 MB

DEF CON 25 Crypto and Privacy Village - David Huerta - Alice and Bob are Slightly Less Confused.m4a

44.5 MB

DEF CON 25 Crypto and Privacy Village - David Wong - SHA-3 vs The World.m4a

76.5 MB

DEF CON 25 Crypto and Privacy Village - Evgeny Sidorov - Yet Another Password Hashing Talk.m4a

39.0 MB

DEF CON 25 Crypto and Privacy Village - J0n J4rv1s - The Surveillance Capitalism Will Continue Until Morale Improves.m4a

84.9 MB

DEF CON 25 Crypto and Privacy Village - Jake Williams -The Symantec SSL Debacle Lessons Learned and Future Steps.m4a

74.6 MB

DEF CON 25 Crypto and Privacy Village - Joel Wallenstrom - Robby Mook - Time to Start Wearing Tin-Foil Hats Following the 2016 Electrions.m4a

75.0 MB

DEF CON 25 Crypto and Privacy Village - Joseph Birr-Pixton - Rustls - Modern Fast Safer TLS.m4a

42.7 MB

DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace.m4a

34.4 MB

DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has My Snoopy Boyfriend Privacy Within A Relationship.m4a

61.6 MB

DEF CON 25 Crypto and Privacy Village - Lee Brotherston - Blue Team TLS Hugs.m4a

36.2 MB

DEF CON 25 Crypto and Privacy Village - Mark Mager - Cryptanalysis in the Time of Ransomware.m4a

59.9 MB

DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty Computation.m4a

35.5 MB

DEF CON 25 Crypto and Privacy Village - Punky Duero - The Key Management Facility of The Root DNSSEC Key Signing Key.m4a

34.1 MB

DEF CON 25 Crypto and Privacy Village - Ryan Lackey - Cypherpunks History.m4a

37.3 MB

DEF CON 25 Crypto and Privacy Village - Scott Arciszewski - The How and Why for Secure Automatic Patch Management.m4a

32.7 MB

DEF CON 25 Crypto and Privacy Village - Shea Nangle - Operational Security Lessons From The Dark Web.m4a

38.5 MB

DEF CON 25 Crypto and Privacy Village - Tomas Susanka - Security Analysis of the Telegram IM.m4a

29.4 MB

DEF CON 25 Crypto and Privacy Village - Trey Forgety - Protecting Users' Privacy in a Location-Critical Enterprise- The Challenges of 9-1-1 Location.m4a

71.7 MB

DEF CON 25 Hardware Hacking Village - Cesare Pizzi - Ardusploit - Proof of concept for Arduino code injection.m4a

56.6 MB

DEF CON 25 Hardware Hacking Village - Gigs Taggart - What is Ground- Baby don't hurt me.m4a

35.1 MB

DEF CON 25 Hardware Hacking Village - Joe hwhxr - Hardware Hacking- Old Sk00l and New Sk00l.m4a

55.7 MB

DEF CON 25 Hardware Hacking Village - John Dunlap - A tangle of Plastic Spaghetti-A Look Into the Security of 3D Printers.m4a

72.3 MB

DEF CON 25 ICS Village - Arnaud Soullié - Fun with Modbus 0x5a - Nothing New. Still Relevant_.m4a

35.2 MB

DEF CON 25 ICS Village - Blake Johnson - Dissecting Industrial Wireless Implementations.m4a

43.4 MB

DEF CON 25 ICS Village - Bryson Bort and Atlas - Grid Insecurity - and How to Really Fix This Shit.m4a

43.9 MB

DEF CON 25 ICS Village - Chris Sistrunk - What's the DFIRence for ICS.m4a

45.0 MB

DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices.m4a

50.2 MB

DEF CON 25 ICS Village - Thomas Brandsetter - In Security in Building Automation - How to Create Dark Buildings with Light Speed.m4a

45.3 MB

DEF CON 25 Internet of Things Village - Aaron Alva - Mark Eichorn - IoT Updates to Help Protect Consumers.m4a

33.6 MB

DEF CON 25 Internet of Things Village - Aaron Guzman - Hide Yo Keys- Hide Yo Car.m4a

46.0 MB

DEF CON 25 Internet of Things Village - Alex Jay Balan - IoT - The Gift That Keeps on Giving.m4a

58.1 MB

DEF CON 25 Internet of Things Village - Andrew Tierney - Ken Munro - IoT- From DVRs to Dildos.m4a

53.5 MB

DEF CON 25 Internet of Things Village - Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard.m4a

61.3 MB

DEF CON 25 Internet of Things Village - Dan Regalado - Inside the Alaris Infusion Pump and not too much medication por favor.m4a

42.8 MB

DEF CON 25 Internet of Things Village - Deral Heiland - The Internet of Vulnerabilities.m4a

59.8 MB

DEF CON 25 Internet of Things Village - Rick Ramgattie - IoT Village Keynote - Friends and Not Foes- Rethinking the Researcher-Vendor Relationship.m4a

31.2 MB

DEF CON 25 Internet of Things Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale - IIDS- An IoT Intrusion Detection System.m4a

53.3 MB

DEF CON 25 Internet of Things Village - Vladimir Dashchenko and Sergey Temnikov - Pwning the Industrial IoT- RCEs and backdoors are around.m4a

30.1 MB

DEF CON 25 Lockpick Village - TOOOL STAFF MEMBER Dr. Tran - TOOOL Lockpicking Talk Number 1.m4a

36.3 MB

DEF CON 25 Packet Hacking Village - Ankur Tyagi - Visual Network and File Forensics.m4a

36.5 MB

DEF CON 25 Packet Hacking Village - Catherine Ullman and Chris Roberts - When the Current Ransomware and Payload of the Day CRAP of the day Hits the Fan.m4a

55.9 MB

DEF CON 25 Packet Hacking Village - Chris Wysopal - Opening Ceremony - How Hackers Changed The Security Industry.m4a

64.4 MB

DEF CON 25 Packet Hacking Village - Damon Small - Layer 8 and Why People are the Most Important Security Tool.m4a

54.6 MB

DEF CON 25 Packet Hacking Village - Daniel Adinolfi - Anthony Singleton - CVE IDs and How to Get Them.m4a

58.3 MB

DEF CON 25 Packet Hacking Village - Eric Capuano - Fortune 100 InfoSec on a State Government Budget.m4a

67.3 MB

DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop Scenarios By Building An Incident Response Simulation Platform.m4a

81.1 MB

DEF CON 25 Packet Hacking Village - Gabriel Ryan - The Black Art of Wireless Post-Exploitation.m4a

73.6 MB

DEF CON 25 Packet Hacking Village - Gilberto Bertin - Past and Present and Future of High Speed Packet Filtering on Linux.m4a

27.8 MB

DEF CON 25 Packet Hacking Village - Gita Ziabari - Yalda and Automated Bulk Intelligence.m4a

34.9 MB

DEF CON 25 Packet Hacking Village - Leah Figueroa - Iron Sights for Your Data.m4a

27.7 MB

DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing- What Is It and How It Allows Largest Attacks and How to Fix It.m4a

69.0 MB

DEF CON 25 Packet Hacking Village - Megan Roddy- Strenthen Your Secops Team By Leveraging Neurodiversity.m4a

22.5 MB

DEF CON 25 Packet Hacking Village - Michael Gianarakis and Keith Lee - Portia - Finding Your Way to Domain Access.m4a

42.2 MB

DEF CON 25 Packet Hacking Village - Mike Raggo - Chet Hosmer - Covert TCP with a Twist.m4a

76.8 MB

DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Change of Persistence- AWS Post Compromise Primer.m4a

45.5 MB

DEF CON 25 Packet Hacking Village - Rodolfo Assis - XSS For the win.m4a

19.8 MB

DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach and WTF Really Happened.m4a

72.8 MB

DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain Name.m4a

31.7 MB

DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot- Mum and Tons of WannaCry and Evils Attacked Our Home.m4a

54.2 MB

DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound- Deceiving Doman Admin Hunters.m4a

46.2 MB

DEF CON 25 Packet Hacking Village - Vivek Ramachandran and Thomas d'Otreppe - Make Your Own 80211 ac Monitoring Hacker Gadget.m4a

82.9 MB

DEF CON 25 Recon Village - Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story.m4a

41.1 MB

DEF CON 25 Recon Village - Andrew Hay - An Introduction to Graph Theory for OSINT.m4a

50.6 MB

DEF CON 25 Recon Village - Anthony Russell - Building Google For Criminal Enterprises.m4a

58.5 MB

DEF CON 25 Recon Village - Dakota Nelson - Total Recoll.m4a

17.0 MB

DEF CON 25 Recon Village - Guillermo Buendia - Yael Basurto Esquivel - How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches.m4a

27.3 MB

DEF CON 25 Recon Village - Inbar Raz - Do Tinder Bots Dream of Electric Toys- How Tinder Bots are Breaking Hearts All Over The World.m4a

42.2 MB

DEF CON 25 Recon Village - Jason Haddix - Domain Discovery - Expanding Your Scope Like A Boss.m4a

59.1 MB

DEF CON 25 Recon Village - Jonathan Cran - Attack Surface Discovery With Intrigue.m4a

41.1 MB

DEF CON 25 Recon Village - Kunal Aggarwal - DataSploit Open Source Assistant for OSINT.m4a

26.3 MB

DEF CON 25 Recon Village - Leah Figueroa - FERPA- Only Your Grades Are Safe; OSINT In Higher Education.m4a

49.4 MB

DEF CON 25 Recon Village - Mikhail Sasonkin - Up Close and Personal - Keeping an Eye On Mobile Applications.m4a

23.3 MB

DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and Profit- How To Hide From The FBI.m4a

60.0 MB

DEF CON 25 Recon Village - Shane MacDougal - Keynote - Seeing is Believing - The Future of Recon- You Won't Believe What Happens Next.m4a

61.4 MB

DEF CON 25 Recon Village - Simon Roses - OSINT Tactics on Source Code and Developers.m4a

58.8 MB

DEF CON 25 Recon Village - TBD - Winner Announcement Prize Distribution.m4a

24.2 MB

DEF CON 25 Recon Village - Tracy Z. Maleeff - Into the Bird's Nest- A Comprehensive Look at Twitter as a Research Tool.m4a

52.3 MB

DEF CON 25 Recon Village - Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon - Collecting Evidence Like a Robot.m4a

26.9 MB

DEF CON 25 Rootz Asylum - Alex Stamos- CSO- Facebook.m4a

20.6 MB

DEF CON 25 Rootz Asylum - Aron Rosenberg - Aaron Standridge - Hacking an Insecure WiFi Camera.m4a

14.2 MB

DEF CON 25 Rootz Asylum - Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer.m4a

8.8 MB

DEF CON 25 Rootz Asylum - Cory Doctorow - You are not a Digital Native and that's OK.m4a

24.7 MB

DEF CON 25 Rootz Asylum - Crash and Nerfherder - A Brief Message From Security.m4a

9.1 MB

DEF CON 25 Rootz Asylum - David Weinman - Introduction To Cheat Engine.m4a

28.8 MB

DEF CON 25 Rootz Asylum - Deviant - Home Depot and A Plan of Attack for Hackers.m4a

20.1 MB

DEF CON 25 Rootz Asylum - EFF - Nic0 - Opening Ceremonies- A Place Where Kids Learn White-Hat Hacking to Better The World.m4a

11.5 MB

DEF CON 25 Rootz Asylum - Erin Owens - Hacking & Robotics v2 point 0.m4a

16.8 MB

DEF CON 25 Rootz Asylum - Erin Owens - Sujeet Bambale and Justin Whitehead - Chris Kiggins - Abby - Duncan -  Drone Wars.m4a

30.9 MB

DEF CON 25 Rootz Asylum - Leonard Bailey - Everything You Need To Know About The U.S. Department of Justice.m4a

21.0 MB

DEF CON 25 Rootz Asylum - Patrick McCanna - Tips for Internet Privacy at College.m4a

18.7 MB

DEF CON 25 Rootz Asylum - Rsnake and Robert Hansen - Searching The Invisible Internet.m4a

9.9 MB

DEF CON 25 Rootz Asylum - Tarah - Mansion Apartment Shack House- How To Explain Crypto To Practically Anyone.m4a

14.3 MB

DEF CON 25 Social Engineering Village - Billy Boatright - Nor Lose The Common Touch.m4a

44.9 MB

DEF CON 25 Social Engineering Village - Brent White - Tim Roberts - Skills For A Red-Teamer.m4a

69.9 MB

DEF CON 25 Social Engineering Village - Chris Hadnagy - SE vs Predator- Using Social Engineering In Ways I Never Thought.m4a

74.4 MB

DEF CON 25 Social Engineering Village - Fahey Owens - Beyond Phishing - Building and Sustaining a Corporate SE Program.m4a

43.7 MB

DEF CON 25 Social Engineering Village - Helen Thackray - Hackers Gonna Hack - But Do They Know Why.m4a

73.2 MB

DEF CON 25 Social Engineering Village - Jayson Street - Strategies on Securing Your Banks and Enterprises-From Someone Who Robs Banks and Enterprises.m4a

77.4 MB

DEF CON 25 Social Engineering Village - John Nye - The Human Factor- Why Are We So Bad at Security and Risk Assessment.m4a

67.4 MB

DEF CON 25 Social Engineering Village - Keith Conway and Cameron Craig - Change Agents- How to Effectively Influence Intractable Corporate Cultures.m4a

65.1 MB

DEF CON 25 Social Engineering Village - Michele Fincher - Are You Killing Your Security Program Mostly Dead is Slightly Alive.m4a

42.1 MB

DEF CON 25 Social Engineering Village - Robert Wood - Thematic Social Engineering- Making SE Work at Scale.m4a

57.7 MB

DEF CON 25 Social Engineering Village - Tyler Rosonke - Social Engineering With Web Analytics.m4a

47.0 MB

DEF CON 25 Social Engineering Village - Yaiza Rubio and Félix Brezo - Heavy Diving For Credentials- Towards An Anonymous Phishing.m4a

40.4 MB

DEF CON 25 Voting Village - Panel - Jake Braun - Securing the Election Office- A Local Response to a Global Threat.m4a

42.6 MB

DEF CON 25 Voting Village - Barbara Simons and David Jefferson - An Election System is Much More Than the Voting Machine or The Booth.m4a

65.5 MB

DEF CON 25 Voting Village - General Douglas Lute - What are the national security implications of cyber attacks on our voting systems.m4a

51.5 MB

DEF CON 25 Voting Village - Harri Hursti - Brief history of election machine hacking and lessons learned.m4a

62.1 MB

DEF CON 25 Voting Village - Joseph Hall - Election Hacking- Legal Considerations from the Civil Side.m4a

64.6 MB

DEF CON 25 Voting Village - Mary Brady and Josh Franklin - The State of US Voting System Security.m4a

71.3 MB

DEF CON 25 Voting Village - Matt Blaze - How did we get here- A history of voting technology and hanging chads and and the Help America Vote Act.m4a

68.7 MB

DEF CON 25 Voting Village -Joseph Hall and David Jefferson - Common Misconceptions and False Parallels about Voting Technology.m4a

66.1 MB

DEF CON 25 Wifi Village - Aardvark - Darkmatter - WIGLE Like You Mean It- Maximizing Your Wardriving Experience.m4a

65.4 MB

DEF CON 25 Wifi Village - Alexander Zakarov - Large Scale Wireless Monitoring - KISMET Packet Sniffer On A Multi-Radio Array.m4a

52.7 MB

DEF CON 25 Wifi Village - Andrew Strutt - POCSAG Amateur Pager Network.m4a

36.8 MB

DEF CON 25 Wifi Village - Andrew Strutt - Suitcase Repeater Build for UHF - 70cm.m4a

39.6 MB

DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World- Software Defined Radio Exploits.m4a

131.9 MB

DEF CON 25 Wifi Village - Eric Escobar - SecureWorks- SDR Replay Attacks- Against Home Security Systems.m4a

28.4 MB

DEF CON 25 Wifi Village - Matt Blaze - Sandy Clark - Travis Goodspeed - Perry Metzger - Zach Wasserman - Kevin Xu - DYI NSA On The Cheap.m4a

81.1 MB

DEF CON 25 Wifi Village - Nick Delewski - Failsafe- Yet Another SimpliSafe Attack Vector.m4a

65.9 MB

DEF CON 25 Wifi Village - Robert Ghilduta - Designing An Automatic Gain Control.m4a

64.2 MB

DEF CON 25 Wifi Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale -Deceptacon Wi-Fi Deception Under 5 Dollars.m4a

43.9 MB

DEF CON 25 Wifi Village - Woody and Tim Kuester - GODUMPiNG packet sniffing the Gotenaa.m4a

77.9 MB

/.../DEF CON 25 village audio - opus/

DEF CON 25 BioHacking Village - Amanda Plimpton and Evan Anderson - Psychoactive Chemicals in Combat.opus

20.9 MB

DEF CON 25 BioHacking Village - Amirs Panel - Ethics in BioHacking.opus

40.1 MB

DEF CON 25 BioHacking Village - C00p3r - Dangerous Minds Podcast - Celebrating 100th Episode.opus

39.9 MB

DEF CON 25 BioHacking Village - C00p3r and Cur50r - Implantable Technology Show and Tell.opus

16.2 MB

DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing The Secure Deployment Of Medical Devices.opus

18.0 MB

DEF CON 25 BioHacking Village - Dr Stanislav Naydin and Vlad Gostomelsky - Medical Device Ethics and Security.opus

21.1 MB

DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Path Badly.opus

21.5 MB

DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides - Smart Drugs 4-Minute Mile.opus

19.5 MB

DEF CON 25 BioHacking Village - Jay Radcliffe - How to use the Scientific Method in Security Research.opus

37.8 MB

DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Die.opus

19.0 MB

DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt - Blockchain and The Hope for Healthcare.opus

18.3 MB

DEF CON 25 BioHacking Village - Jun Axup - The Brave New Worl of Bio-Entrepreneurship.opus

16.7 MB

DEF CON 25 BioHacking Village - Kevin Sacco - Tales of A Healthcare Hacker.opus

22.2 MB

DEF CON 25 BioHacking Village - Louis Auguste Jr - Microscopes Are Stupid.opus

15.7 MB

DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and Regulation.opus

18.8 MB

DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities.opus

24.0 MB

DEF CON 25 BioHacking Village - RenderMan and Murdoch Monkey - Hacking The Internet of Dongs.opus

22.0 MB

DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO.opus

15.2 MB

DEF CON 25 BioHacking Village - Ryan Schmoll and Peter Hefley - Trigraph- An Ethereum-based Teleradiology Application.opus

18.1 MB

DEF CON 25 BioHacking Village - Tess Scrodinger - Total Recall- Implicit Learning As A Cryptographic Primitive.opus

18.4 MB

DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of Biohacking.opus

13.9 MB

DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic Code Using Information Theory.opus

13.7 MB

DEF CON 25 BioHacking Village - Trevor Goodman - Hack Your Senses - Sensory Augementation and Brain Plasticity.opus

19.9 MB

DEF CON 25 BioHacking Village -Szkatulski and Lawless- How Your Doctor Might Be Trying To Kill You-How Personal Genomics Can Save Your Life.opus

21.0 MB

DEF CON 25 Car Hacking Village - Badge Life - DEFCON Unofficial Badges Panel.opus

41.3 MB

DEF CON 25 Car Hacking Village - Corey Theun - Heavy Truck and Electronic Logging Devices- What Could Go Wrong.opus

25.9 MB

DEF CON 25 Car Hacking Village - Duncan Woodbury - Nocholas Haltmeyer - Linux-Stack Based V2X Framework.opus

23.7 MB

DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - Don -An Introduction to AUTOSAR Secure Onbaord Communication.opus

35.4 MB

DEF CON 25 Car Hacking Village - Justin Montalbano - Bryan Gillispie - David Connett- Attacking Wireless Interfaces in Vehicles.opus

27.8 MB

DEF CON 25 Car Hacking Village - Sameer Dixit - Vlad Gostomelsky - Abusing Smart Cars with QR Codes.opus

19.2 MB

DEF CON 25 Car Hacking Village - Sheila Ayelen Berta - Claudio Caracciolo - The Bicho- An Advanced Car Backdoor Maker.opus

25.0 MB

DEF CON 25 Car Hacking Village - Tim b1tbane - Mitch Johnson ehntoo - That's No Car- Its a Network.opus

27.0 MB

DEF CON 25 Car Hacking Village - Vlad Gostomelsky - GPS System Integrity.opus

19.0 MB

DEF CON 25 Car Hacking Village - Weston Hecker - Grand Theft Radio- Stopping SDR Relay Attacks on PKES.opus

21.9 MB

DEF CON 25 Crypto and Privacy Village - Alisha Kloc - Privacy is Not An Add-On- Designing for Privacy from the Ground Up.opus

23.6 MB

DEF CON 25 Crypto and Privacy Village - Andrew Brandt - SSL Visibility Revisted- A Year In Privacy Improvements For Encrypted Communications.opus

42.1 MB

DEF CON 25 Crypto and Privacy Village - David Huerta - Alice and Bob are Slightly Less Confused.opus

25.5 MB

DEF CON 25 Crypto and Privacy Village - David Wong - SHA-3 vs The World.opus

44.7 MB

DEF CON 25 Crypto and Privacy Village - Evgeny Sidorov - Yet Another Password Hashing Talk.opus

19.4 MB

DEF CON 25 Crypto and Privacy Village - J0n J4rv1s - The Surveillance Capitalism Will Continue Until Morale Improves.opus

47.1 MB

DEF CON 25 Crypto and Privacy Village - Jake Williams -The Symantec SSL Debacle Lessons Learned and Future Steps.opus

40.2 MB

DEF CON 25 Crypto and Privacy Village - Joel Wallenstrom - Robby Mook - Time to Start Wearing Tin-Foil Hats Following the 2016 Electrions.opus

42.8 MB

DEF CON 25 Crypto and Privacy Village - Joseph Birr-Pixton - Rustls - Modern Fast Safer TLS.opus

22.9 MB

DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace.opus

18.8 MB

DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has My Snoopy Boyfriend Privacy Within A Relationship.opus

33.7 MB

DEF CON 25 Crypto and Privacy Village - Lee Brotherston - Blue Team TLS Hugs.opus

20.6 MB

DEF CON 25 Crypto and Privacy Village - Mark Mager - Cryptanalysis in the Time of Ransomware.opus

33.0 MB

DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty Computation.opus

19.6 MB

DEF CON 25 Crypto and Privacy Village - Punky Duero - The Key Management Facility of The Root DNSSEC Key Signing Key.opus

18.9 MB

DEF CON 25 Crypto and Privacy Village - Ryan Lackey - Cypherpunks History.opus

20.5 MB

DEF CON 25 Crypto and Privacy Village - Scott Arciszewski - The How and Why for Secure Automatic Patch Management.opus

18.0 MB

DEF CON 25 Crypto and Privacy Village - Shea Nangle - Operational Security Lessons From The Dark Web.opus

21.1 MB

DEF CON 25 Crypto and Privacy Village - Tomas Susanka - Security Analysis of the Telegram IM.opus

16.4 MB

DEF CON 25 Crypto and Privacy Village - Trey Forgety - Protecting Users' Privacy in a Location-Critical Enterprise- The Challenges of 9-1-1 Location.opus

40.7 MB

DEF CON 25 Hardware Hacking Village - Cesare Pizzi - Ardusploit - Proof of concept for Arduino code injection.opus

32.7 MB

DEF CON 25 Hardware Hacking Village - Gigs Taggart - What is Ground- Baby don't hurt me.opus

20.4 MB

DEF CON 25 Hardware Hacking Village - Joe hwhxr - Hardware Hacking- Old Sk00l and New Sk00l.opus

32.2 MB

DEF CON 25 Hardware Hacking Village - John Dunlap - A tangle of Plastic Spaghetti-A Look Into the Security of 3D Printers.opus

41.1 MB

DEF CON 25 ICS Village - Arnaud Soullié - Fun with Modbus 0x5a - Nothing New. Still Relevant_.opus

20.1 MB

DEF CON 25 ICS Village - Blake Johnson - Dissecting Industrial Wireless Implementations.opus

23.9 MB

DEF CON 25 ICS Village - Bryson Bort - Atlas - Grid Insecurity - and How to Really Fix This Shit.opus

24.8 MB

DEF CON 25 ICS Village - Chris Sistrunk - What's the DFIRence for ICS.opus

25.9 MB

DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices.opus

27.3 MB

DEF CON 25 ICS Village - Thomas Brandsetter - In Security in Building Automation - How to Create Dark Buildings with Light Speed.opus

25.7 MB

DEF CON 25 Internet of Things Village - Aaron Alva - Mark Eichorn - IoT Updates to Help Protect Consumers.opus

22.4 MB

DEF CON 25 Internet of Things Village - Aaron Guzman - Hide Yo Keys- Hide Yo Car.opus

26.6 MB

DEF CON 25 Internet of Things Village - Alex Jay Balan - IoT - The Gift That Keeps on Giving.opus

32.9 MB

DEF CON 25 Internet of Things Village - Andrew Tierney - Ken Munro - IoT- From DVRs to Dildos.opus

29.7 MB

DEF CON 25 Internet of Things Village - Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard.opus

35.0 MB

DEF CON 25 Internet of Things Village - Dan Regalado - Inside the Alaris Infusion Pump and not too much medication por favor.opus

23.6 MB

DEF CON 25 Internet of Things Village - Deral Heiland - The Internet of Vulnerabilities.opus

37.5 MB

DEF CON 25 Internet of Things Village - Rick Ramgattie - IoT Village Keynote - Friends and Not Foes- Rethinking the Researcher-Vendor Relationship.opus

18.2 MB

DEF CON 25 Internet of Things Village - Vivek Ramachandran and Nishant Sharma - Ashish Bhangale - IIDS- An IoT Intrusion Detection System.opus

32.8 MB

DEF CON 25 Internet of Things Village - Vladimir Dashchenko and Sergey Temnikov - Pwning the Industrial IoT- RCEs and backdoors are around.opus

17.5 MB

DEF CON 25 Lockpick Village - TOOOL STAFF MEMBER and Dr. Tran - TOOOL Lockpicking Talk Number 1.opus

20.9 MB

DEF CON 25 Packet Hacking Village - Ankur Tyagi - Visual Network and File Forensics.opus

21.0 MB

DEF CON 25 Packet Hacking Village - Catherine Ullman and Chris Roberts - When the Current Ransomware and Payload of the Day CRAP of the day Hits the Fan.opus

33.1 MB

DEF CON 25 Packet Hacking Village - Chris Wysopal - Opening Ceremony - How Hackers Changed The Security Industry.opus

36.0 MB

DEF CON 25 Packet Hacking Village - Damon Small - Layer 8 and Why People are the Most Important Security Tool.opus

30.5 MB

DEF CON 25 Packet Hacking Village - Daniel Adinolfi - Anthony Singleton - CVE IDs and How to Get Them.opus

33.7 MB

DEF CON 25 Packet Hacking Village - Eric Capuano - Fortune 100 InfoSec on a State Government Budget.opus

39.0 MB

DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop Scenarios By Building An Incident Response Simulation Platform.opus

44.3 MB

DEF CON 25 Packet Hacking Village - Gabriel Ryan - The Black Art of Wireless Post-Exploitation.opus

38.1 MB

DEF CON 25 Packet Hacking Village - Gilberto Bertin - Past and Present and Future of High Speed Packet Filtering on Linux.opus

15.8 MB

DEF CON 25 Packet Hacking Village - Gita Ziabari - Yalda and Automated Bulk Intelligence.opus

23.0 MB

DEF CON 25 Packet Hacking Village - Leah Figueroa - Iron Sights for Your Data.opus

17.6 MB

DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing- What Is It and How It Allows Largest Attacks and How to Fix It.opus

39.0 MB

DEF CON 25 Packet Hacking Village - Megan Roddy- Strenthen Your Secops Team By Leveraging Neurodiversity.opus

15.1 MB

DEF CON 25 Packet Hacking Village - Michael Gianarakis and Keith Lee and Portia - Finding Your Way to Domain Access.opus

24.7 MB

DEF CON 25 Packet Hacking Village - Mike Raggo - Chet Hosmer - Covert TCP with a Twist.opus

40.5 MB

DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Change of Persistence- AWS Post Compromise Primer.opus

25.5 MB

DEF CON 25 Packet Hacking Village - Rodolfo Assis - XSS For the win.opus

11.9 MB

DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach and WTF Really Happened.opus

39.5 MB

DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain Name.opus

18.4 MB

DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot- Mum and Tons of WannaCry and Evils Attacked Our Home.opus

30.5 MB

DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound- Deceiving Doman Admin Hunters.opus

25.1 MB

DEF CON 25 Packet Hacking Village - Vivek Ramachandran - Thomas d'Otreppe - Make Your Own 80211 ac Monitoring Hacker Gadget.opus

46.4 MB

DEF CON 25 Recon Village - Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story.opus

23.1 MB

DEF CON 25 Recon Village - Andrew Hay - An Introduction to Graph Theory for OSINT.opus

26.4 MB

DEF CON 25 Recon Village - Anthony Russell - Building Google For Criminal Enterprises.opus

36.1 MB

DEF CON 25 Recon Village - Dakota Nelson - Total Recoll.opus

9.5 MB

DEF CON 25 Recon Village - Guillermo Buendia and Yael Basurto Esquivel - How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches.opus

16.2 MB

DEF CON 25 Recon Village - Inbar Raz - Do Tinder Bots Dream of Electric Toys- How Tinder Bots are Breaking Hearts All Over The World.opus

23.2 MB

DEF CON 25 Recon Village - Jason Haddix - Domain Discovery - Expanding Your Scope Like A Boss.opus

32.6 MB

DEF CON 25 Recon Village - Jonathan Cran - Attack Surface Discovery With Intrigue.opus

26.0 MB

DEF CON 25 Recon Village - Kunal Aggarwal - DataSploit Open Source Assistant for OSINT.opus

14.8 MB

DEF CON 25 Recon Village - Leah Figueroa - FERPA- Only Your Grades Are Safe; OSINT In Higher Education.opus

29.7 MB

DEF CON 25 Recon Village - Mikhail Sasonkin - Up Close and Personal - Keeping an Eye On Mobile Applications.opus

11.9 MB

DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and Profit- How To Hide From The FBI.opus

33.3 MB

DEF CON 25 Recon Village - Shane MacDougal - Keynote - Seeing is Believing - The Future of Recon- You Won't Believe What Happens Next.opus

32.3 MB

DEF CON 25 Recon Village - Simon Roses - OSINT Tactics on Source Code and Developers.opus

36.5 MB

DEF CON 25 Recon Village - TBD - Winner Announcement Prize Distribution.opus

13.4 MB

DEF CON 25 Recon Village - Tracy Z. Maleeff - Into the Bird's Nest- A Comprehensive Look at Twitter as a Research Tool.opus

27.7 MB

DEF CON 25 Recon Village - Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon - Collecting Evidence Like a Robot.opus

15.4 MB

DEF CON 25 Rootz Asylum - Alex Stamos- CSO- Facebook.opus

11.8 MB

DEF CON 25 Rootz Asylum - Aron Rosenberg - Aaron Standridge - Hacking an Insecure WiFi Camera.opus

10.7 MB

DEF CON 25 Rootz Asylum - Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer.opus

6.5 MB

DEF CON 25 Rootz Asylum - Cory Doctorow - You are not a Digital Native and that's OK.opus

18.7 MB

DEF CON 25 Rootz Asylum - Crash - Nerfherder - A Brief Message From Security.opus

5.9 MB

DEF CON 25 Rootz Asylum - David Weinman - Introduction To Cheat Engine.opus

17.0 MB

DEF CON 25 Rootz Asylum - Deviant - Home Depot and A Plan of Attack for Hackers.opus

11.4 MB

DEF CON 25 Rootz Asylum - EFF - Nic0 - Opening Ceremonies- A Place Where Kids Learn White-Hat Hacking to Better The World.opus

8.6 MB

DEF CON 25 Rootz Asylum - Erin Owens - Hacking & Robotics v2 point 0.opus

11.6 MB

DEF CON 25 Rootz Asylum - Erin Owens - Sujeet Bambale - Justin Whitehead - Chris Kiggins - Abby - Duncan -  Drone Wars.opus

18.0 MB

DEF CON 25 Rootz Asylum - Leonard Bailey - Everything You Need To Know About The U.S. Department of Justice.opus

12.6 MB

DEF CON 25 Rootz Asylum - Patrick McCanna - Tips for Internet Privacy at College.opus

13.7 MB

DEF CON 25 Rootz Asylum - Rsnake - Robert Hansen - Searching The Invisible Internet.opus

7.1 MB

DEF CON 25 Rootz Asylum - Tarah - Mansion Apartment Shack House- How To Explain Crypto To Practically Anyone.opus

9.2 MB

DEF CON 25 Social Engineering Village - Billy Boatright - Nor Lose The Common Touch.opus

23.1 MB

DEF CON 25 Social Engineering Village - Brent White - Tim Roberts - Skills For A Red-Teamer.opus

38.7 MB

DEF CON 25 Social Engineering Village - Chris Hadnagy - SE vs Predator- Using Social Engineering In Ways I Never Thought.opus

40.3 MB

DEF CON 25 Social Engineering Village - Fahey Owens - Beyond Phishing - Building and Sustaining a Corporate SE Program.opus

23.8 MB

DEF CON 25 Social Engineering Village - Helen Thackray - Hackers Gonna Hack - But Do They Know Why.opus

40.2 MB

DEF CON 25 Social Engineering Village - Jayson Street - Strategies on Securing Your Banks and Enterprises-From Someone Who Robs Banks and Enterprises.opus

42.7 MB

DEF CON 25 Social Engineering Village - John Nye - The Human Factor- Why Are We So Bad at Security and Risk Assessment.opus

36.7 MB

DEF CON 25 Social Engineering Village - Keith Conway - Cameron Craig - Change Agents- How to Effectively Influence Intractable Corporate Cultures.opus

36.2 MB

DEF CON 25 Social Engineering Village - Michele Fincher - Are You Killing Your Security Program Mostly Dead is Slightly Alive.opus

24.9 MB

DEF CON 25 Social Engineering Village - Robert Wood - Thematic Social Engineering- Making SE Work at Scale.opus

30.3 MB

DEF CON 25 Social Engineering Village - Tyler Rosonke - Social Engineering With Web Analytics.opus

25.8 MB

DEF CON 25 Social Engineering Village - Yaiza Rubio - Félix Brezo - Heavy Diving For Credentials- Towards An Anonymous Phishing.opus

25.0 MB

DEF CON 25 Voting Village - Panel - Jake Braun - Securing the Election Office- A Local Response to a Global Threat.opus

24.0 MB

DEF CON 25 Voting Village - Barbara Simons - David Jefferson - An Election System is Much More Than the Voting Machine or The Booth.opus

39.1 MB

DEF CON 25 Voting Village - General Douglas Lute - What are the national security implications of cyber attacks on our voting systems.opus

32.6 MB

DEF CON 25 Voting Village - Harri Hursti - Brief history of election machine hacking and lessons learned.opus

33.6 MB

DEF CON 25 Voting Village - Joseph Hall - Election Hacking- Legal Considerations from the Civil Side.opus

38.4 MB

DEF CON 25 Voting Village - Mary Brady and Josh Franklin - The State of US Voting System Security.opus

38.8 MB

DEF CON 25 Voting Village - Matt Blaze - How did we get here- A history of voting technology and hanging chads and and the Help America Vote Act.opus

40.6 MB

DEF CON 25 Voting Village -Joseph Hall and David Jefferson - Common Misconceptions and False Parallels about Voting Technology.opus

36.8 MB

DEF CON 25 Wifi Village - Aardvark and Darkmatter - WIGLE Like You Mean It- Maximizing Your Wardriving Experience.opus

39.0 MB

DEF CON 25 Wifi Village - Alexander Zakarov - Large Scale Wireless Monitoring - KISMET Packet Sniffer On A Multi-Radio Array.opus

29.4 MB

DEF CON 25 Wifi Village - Andrew Strutt - POCSAG Amateur Pager Network.opus

23.2 MB

DEF CON 25 Wifi Village - Andrew Strutt - Suitcase Repeater Build for UHF - 70cm.opus

24.8 MB

DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World- Software Defined Radio Exploits.opus

76.3 MB

DEF CON 25 Wifi Village - Eric Escobar - SecureWorks- SDR Replay Attacks- Against Home Security Systems.opus

16.7 MB

DEF CON 25 Wifi Village - Matt Blaze - Sandy Clark - Travis Goodspeed - Perry Metzger - Zach Wasserman - Kevin Xu - DYI NSA On The Cheap.opus

47.9 MB

DEF CON 25 Wifi Village - Nick Delewski - Failsafe- Yet Another SimpliSafe Attack Vector.opus

40.2 MB

DEF CON 25 Wifi Village - Robert Ghilduta - Designing An Automatic Gain Control.opus

39.9 MB

DEF CON 25 Wifi Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale -Deceptacon Wi-Fi Deception Under 5 Dollars.opus

28.1 MB

DEF CON 25 Wifi Village - Woody - Tim Kuester - GODUMPiNG packet sniffing the Gotenaa.opus

45.5 MB

/.../DEF CON 25 LegitBS ctf anonymized pcap/

DEF CON 25 LegitBS ctf friday anon.rar

4.1 GB

DEF CON 25 LegitBS ctf saturday anon.rar

15.3 GB

DEF CON 25 LegitBS ctf sunday anon.rar

8.8 GB

/DEF CON 25 ctf/

DEF CON 25 LegitBS ctf cLEMENCy.rar

570.4 KB

DEF CON 25 LegitBS ctf final pgdump.rar

26.4 MB

DEF CON 25 LegitBS ctf scorebot.rar

2.9 MB

DEF CON 25 LegitBS finals and services.rar

37.4 MB

DEF CON 25 LegitBS quals master.rar

20.7 MB

DEF CON 25 LgitBS CTF results.txt

3.2 KB

/.../DEF CON 25 LegitBS ctf raw pcap/

DEF CON 25 LegitBS ctf friday raw.rar

10.9 GB

DEF CON 25 LegitBS ctf saturday raw.rar

22.4 GB

DEF CON 25 LegitBS ctf sunday raw.rar

12.8 GB

/DEF CON 25 images/

DEF CON 25 - 1080x1920.jpg

1.6 MB

DEF CON 25 - 1200x1920.jpg

1.8 MB

DEF CON 25 - 1440x2560.jpg

2.5 MB

DEF CON 25 - 25close.jpg

28.1 KB

DEF CON 25 - 3840x2160.jpg

4.3 MB

DEF CON 25 - arcade.jpg

57.6 KB

DEF CON 25 - badgegirl.jpg

54.8 KB

DEF CON 25 - city.jpg

82.6 KB

DEF CON 25 - closing.jpg

86.8 KB

DEF CON 25 - community.jpg

73.2 KB

DEF CON 25 - dc-ss-feb.jpg

67.5 KB

DEF CON 25 - dc-ss-jan.jpg

65.9 KB

DEF CON 25 - dec-teaser.jpg

215.8 KB

DEF CON 25 - demolabs-live.jpg

25.6 KB

DEF CON 25 - fp-night-sm.png

11.6 KB

DEF CON 25 - fp-night.png

238.0 KB

DEF CON 25 - fp-sm.png

13.6 KB

DEF CON 25 - fp.png

314.2 KB

DEF CON 25 - itunes-logo-audio.png

281.3 KB

DEF CON 25 - itunes-logo-video.png

285.1 KB

DEF CON 25 - logo-sm.png

12.6 KB

DEF CON 25 - logo.jpg

32.2 KB

DEF CON 25 - lope.jpg

57.5 KB

DEF CON 25 - main-playlist.jpg

15.4 KB

DEF CON 25 - music-schedule.jpg

76.4 KB

DEF CON 25 - rbf.jpg

28.3 KB

DEF CON 25 - ripconcd.jpg

23.2 KB

DEF CON 25 - schedule.pdf

447.9 KB

DEF CON 25 - sectf2.jpg

55.3 KB

DEF CON 25 - soundtrack.jpg

33.9 KB

DEF CON 25 - stickerpack.png

39.2 KB

DEF CON 25 - swag-pack-1.jpg

49.0 KB

DEF CON 25 - tdf.jpg

50.5 KB

DEF CON 25 - te-village.jpg

51.2 KB

DEF CON 25 - toxicbbq.jpg

28.5 KB

DEF CON 25 - vmv-playlist.png

21.2 KB

DEF CON 25 - voting-machine.jpg

24.2 KB

DEF CON 25 - voting-plan.jpg

28.6 KB

DEF CON 25 - wallpapers.jpg

104.9 KB

DEF CON 25 - zee.png

33.5 KB

DEF CON 25 voting village report.pdf

1.4 MB

Election Security White Paper_Praetz_12062017.pdf

177.1 KB

ac-voting-forum.jpg

29.1 KB

/DEF CON 25 music/

DEF CON 25 Live Music - PLAYLIST .txt

0.4 KB

DEF CON 25 Music CD - README.txt

1.0 KB

/.../DEF CON 25 Live Music - aac 224k/

01 DEF CON 25 DJ Dead.m4a

78.2 MB

02 DEF CON 25 Skittish and Bus.m4a

108.1 MB

03 DEF CON 25 Acid-T.m4a

89.2 MB

04 DEF CON 25 Reid Speed.m4a

117.7 MB

05 DEF CON 25 Ninjula.m4a

91.3 MB

06 DEF CON 25 Scotch and Bubbles.m4a

132.3 MB

07 DEF CON 25 Richard Cheese.m4a

177.9 MB

08 DEF CON 25 Dual Core.m4a

54.0 MB

09 DEF CON 25 MC Frontalot.m4a

67.5 MB

10 DEF CON 25 YT Cracker.m4a

27.5 MB

11 DEF CON 25 Reel Big Fish.m4a

114.5 MB

12 DEF CON 25 Kriz Klink.m4a

52.3 MB

13 DEF CON 25 Moderns.m4a

95.5 MB

14 DEF CON 25 Miss Jackalope.m4a

101.4 MB

15 DEF CON 25 Zebbler Encanti Experience.m4a

108.2 MB

16 DEF CON 25 Left Right.m4a

104.2 MB

17 DEF CON 25 Kill The Noise.m4a

127.3 MB

18 DEF CON 25 CTRL rsm.m4a

40.3 MB

DEF CON 25 Live Music - PLAYLIST .txt

0.4 KB

/.../DEF CON 25 Live Music - flac/

01 DEF CON 25 DJ Dead.flac

365.8 MB

02 DEF CON 25 Skittish and Bus.flac

464.6 MB

03 DEF CON 25 Acid-T.flac

392.6 MB

04 DEF CON 25 Reid Speed.flac

543.0 MB

05 DEF CON 25 Ninjula.flac

407.1 MB

06 DEF CON 25 Scotch and Bubbles.flac

552.7 MB

07 DEF CON 25 Richard Cheese.flac

511.9 MB

08 DEF CON 25 Dual Core.flac

202.4 MB

09 DEF CON 25 MC Frontalot.flac

278.5 MB

10 DEF CON 25 YT Cracker.flac

152.9 MB

11 DEF CON 25 Reel Big Fish.flac

587.7 MB

12 DEF CON 25 Kriz Klink.flac

211.5 MB

13 DEF CON 25 Moderns.flac

368.0 MB

14 DEF CON 25 Miss Jackalope.flac

505.5 MB

15 DEF CON 25 Zebbler Encanti Experience.flac

387.1 MB

16 DEF CON 25 Left Right.flac

426.5 MB

17 DEF CON 25 Kill The Noise.flac

593.0 MB

18 DEF CON 25 CTRL rsm.flac

186.9 MB

DEF CON 25 Live Music - PLAYLIST .txt

0.4 KB

/.../DEF CON 25 Live Music - opus 256k/

01 DEF CON 25 DJ Dead.opus

97.5 MB

02 DEF CON 25 Skittish and Bus.opus

120.4 MB

03 DEF CON 25 Acid-T.opus

104.6 MB

04 DEF CON 25 Reid Speed.opus

122.5 MB

05 DEF CON 25 Ninjula.opus

96.1 MB

06 DEF CON 25 Scotch and Bubbles.opus

135.4 MB

07 DEF CON 25 Richard Cheese.opus

158.1 MB

08 DEF CON 25 Dual Core.opus

62.3 MB

09 DEF CON 25 MC Frontalot.opus

78.1 MB

10 DEF CON 25 YT Cracker.opus

42.6 MB

11 DEF CON 25 Reel Big Fish.opus

145.5 MB

12 DEF CON 25 Kriz Klink.opus

93.8 MB

13 DEF CON 25 Moderns.opus

100.3 MB

14 DEF CON 25 Miss Jackalope.opus

124.0 MB

15 DEF CON 25 Zebbler Encanti Experience.opus

127.0 MB

16 DEF CON 25 Left Right.opus

115.7 MB

17 DEF CON 25 Kill The Noise.opus

138.0 MB

18 DEF CON 25 CTRL rsm.opus

48.3 MB

DEF CON 25 Live Music - PLAYLIST .txt

0.4 KB

/.../DEF CON 25 Music CD - aac 224k/

01 - Skittish and Bus - DEF CON Is Canceled.m4a

8.2 MB

02 - Laughing Mantis - Machines of Loving Disgrace.m4a

14.4 MB

03 - Information Society - The Prize (Kain & Arvy House Radio Remix).m4a

9.4 MB

04 - Zebbler Encanti Experience - Infinite Absence VIP (featuring Ganavya).m4a

10.1 MB

05 - JG And The Robots - I Am One.m4a

8.7 MB

06 - Bioassay - The Signal.m4a

10.3 MB

07 - Moderns - Order.m4a

8.6 MB

08 - Left-Right - Sunspot.m4a

11.0 MB

09 - Ninjula - Livewire.m4a

11.8 MB

10 - Richard Cheese and Lounge Against The Machine - The Friday Song.m4a

6.9 MB

11 - The TroubleShooters - shutdown -h now.m4a

6.8 MB

12 - MC Frontalot - Zero Day.m4a

9.0 MB

13 - Lavos - I Am The Storm (Swat Me) (featuring YTCracker).m4a

6.6 MB

14 - Dual Core - Regular Expressions.m4a

7.9 MB

DEF CON 25 Music CD - README.txt

1.0 KB

/.../DEF CON 25 Music CD - flac/

01 - Skittish and Bus - DEF CON Is Canceled.flac

29.4 MB

02 - Laughing Mantis - Machines of Loving Disgrace.flac

43.4 MB

03 - Information Society - The Prize (Kain & Arvy House Radio Remix).flac

33.6 MB

04 - Zebbler Encanti Experience - Infinite Absence VIP (featuring Ganavya).flac

31.1 MB

05 - JG And The Robots - I Am One.flac

29.9 MB

06 - Bioassay - The Signal.flac

27.6 MB

07 - Moderns - Order.flac

31.2 MB

08 - Left-Right - Sunspot.flac

35.8 MB

09 - Ninjula - Livewire.flac

38.0 MB

10 - Richard Cheese and Lounge Against The Machine - The Friday Song.flac

20.1 MB

11 - The TroubleShooters - shutdown -h now.flac

21.2 MB

12 - MC Frontalot - Zero Day.flac

33.5 MB

13 - Lavos - I Am The Storm (Swat Me) (featuring YTCracker).flac

26.4 MB

14 - Dual Core - Regular Expressions.flac

29.0 MB

DEF CON 25 Music CD README.txt

1.0 KB

/.../DEF CON 25 Music CD - opus 384k/

01 - Skittish and Bus - DEF CON Is Canceled.opus

15.1 MB

02 - Laughing Mantis - Machines of Loving Disgrace.opus

22.5 MB

03 - Information Society - The Prize (Kain & Arvy House Radio Remix).opus

13.1 MB

04 - Zebbler Encanti Experience - Infinite Absence VIP (featuring Ganavya).opus

17.8 MB

05 - JG And The Robots - I Am One.opus

14.0 MB

06 - Bioassay - The Signal.opus

15.5 MB

07 - Moderns - Order.opus

14.1 MB

08 - Left-Right - Sunspot.opus

18.4 MB

09 - Ninjula - Livewire.opus

18.5 MB

10 - Richard Cheese and Lounge Against The Machine - The Friday Song.opus

10.4 MB

11 - The TroubleShooters - shutdown -h now.opus

10.5 MB

12 - MC Frontalot - Zero Day.opus

15.6 MB

13 - Lavos - I Am The Storm (Swat Me) (featuring YTCracker).opus

11.4 MB

14 - Dual Core - Regular Expressions.opus

14.1 MB

DEF CON 25 Music CD README.txt

1.0 KB

/.../DEF CON 25 Cannibal pictures/

DEF CON 25 cannibal_DSC_0080.JPG

7.3 MB

DEF CON 25 cannibal_DSC_0090.JPG

7.2 MB

DEF CON 25 cannibal_DSC_0103.JPG

7.3 MB

DEF CON 25 cannibal_DSC_0120.JPG

6.7 MB

DEF CON 25 cannibal_DSC_0123.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0131.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0134.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0136.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0138.JPG

6.4 MB

DEF CON 25 cannibal_DSC_0140.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0144.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0145.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0152.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0157.JPG

7.2 MB

DEF CON 25 cannibal_DSC_0163.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0179.JPG

6.5 MB

DEF CON 25 cannibal_DSC_0189.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0201.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0205.JPG

7.2 MB

DEF CON 25 cannibal_DSC_0210.JPG

7.1 MB

DEF CON 25 cannibal_DSC_0213.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0216.JPG

7.1 MB

DEF CON 25 cannibal_DSC_0217.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0220.JPG

7.1 MB

DEF CON 25 cannibal_DSC_0221.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0223.JPG

7.1 MB

DEF CON 25 cannibal_DSC_0227.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0229.JPG

7.2 MB

DEF CON 25 cannibal_DSC_0232.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0236.JPG

6.7 MB

DEF CON 25 cannibal_DSC_0242.JPG

6.4 MB

DEF CON 25 cannibal_DSC_0245.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0246.JPG

7.2 MB

DEF CON 25 cannibal_DSC_0252.JPG

7.3 MB

DEF CON 25 cannibal_DSC_0255.JPG

7.1 MB

DEF CON 25 cannibal_DSC_0261.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0262.JPG

7.7 MB

DEF CON 25 cannibal_DSC_0271.JPG

6.7 MB

DEF CON 25 cannibal_DSC_0274.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0277.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0282.JPG

7.2 MB

DEF CON 25 cannibal_DSC_0284.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0287.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0294.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0298.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0302.JPG

6.3 MB

DEF CON 25 cannibal_DSC_0303.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0307.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0312.JPG

6.7 MB

DEF CON 25 cannibal_DSC_0314.JPG

6.6 MB

DEF CON 25 cannibal_DSC_0318.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0324.JPG

6.5 MB

DEF CON 25 cannibal_DSC_0330.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0331.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0335.JPG

7.1 MB

DEF CON 25 cannibal_DSC_0337.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0339.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0342.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0344.JPG

7.1 MB

DEF CON 25 cannibal_DSC_0353.JPG

6.6 MB

DEF CON 25 cannibal_DSC_0357.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0360.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0362.JPG

7.4 MB

DEF CON 25 cannibal_DSC_0366.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0371.JPG

6.6 MB

DEF CON 25 cannibal_DSC_0376.JPG

6.7 MB

DEF CON 25 cannibal_DSC_0384.JPG

6.6 MB

DEF CON 25 cannibal_DSC_0388.JPG

6.7 MB

DEF CON 25 cannibal_DSC_0391.JPG

6.6 MB

DEF CON 25 cannibal_DSC_0392.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0395.JPG

6.5 MB

DEF CON 25 cannibal_DSC_0397.JPG

6.7 MB

DEF CON 25 cannibal_DSC_0402.JPG

6.6 MB

DEF CON 25 cannibal_DSC_0403.JPG

6.5 MB

DEF CON 25 cannibal_DSC_0406.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0417.JPG

6.3 MB

DEF CON 25 cannibal_DSC_0421.JPG

6.2 MB

DEF CON 25 cannibal_DSC_0427.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0458.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0475.JPG

7.2 MB

DEF CON 25 cannibal_DSC_0481.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0483.JPG

6.3 MB

DEF CON 25 cannibal_DSC_0485.JPG

6.4 MB

DEF CON 25 cannibal_DSC_0505.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0532.JPG

2.8 MB

DEF CON 25 cannibal_DSC_0538.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0547.jpg

2.4 MB

DEF CON 25 cannibal_DSC_0556.JPG

7.3 MB

DEF CON 25 cannibal_DSC_0572.JPG

6.6 MB

DEF CON 25 cannibal_DSC_0583.JPG

6.7 MB

DEF CON 25 cannibal_DSC_0586.JPG

6.3 MB

DEF CON 25 cannibal_DSC_0617.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0622.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0635.JPG

6.9 MB

DEF CON 25 cannibal_DSC_0642.JPG

7.2 MB

DEF CON 25 cannibal_DSC_0665.JPG

6.6 MB

DEF CON 25 cannibal_DSC_0680.JPG

7.2 MB

DEF CON 25 cannibal_DSC_0686.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0689.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0691.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0693.JPG

6.7 MB

DEF CON 25 cannibal_DSC_0700.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0701.JPG

7.2 MB

DEF CON 25 cannibal_DSC_0712.JPG

6.8 MB

DEF CON 25 cannibal_DSC_0735.JPG

7.4 MB

DEF CON 25 cannibal_DSC_0760.JPG

7.0 MB

DEF CON 25 cannibal_DSC_0854.JPG

7.1 MB

DEF CON 25 cannibal_DSC_0908.JPG

6.7 MB

DEF CON 25 cannibal_DSC_0938.JPG

6.6 MB

DEF CON 25 cannibal_DSC_0974.JPG

7.3 MB

DEF CON 25 cannibal_DSC_0993.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1060.JPG

7.2 MB

DEF CON 25 cannibal_DSC_1088.JPG

6.8 MB

DEF CON 25 cannibal_DSC_1155.JPG

6.6 MB

DEF CON 25 cannibal_DSC_1259.JPG

6.8 MB

DEF CON 25 cannibal_DSC_1317.JPG

6.6 MB

DEF CON 25 cannibal_DSC_1357.JPG

7.3 MB

DEF CON 25 cannibal_DSC_1368.JPG

7.3 MB

DEF CON 25 cannibal_DSC_1372.JPG

7.3 MB

DEF CON 25 cannibal_DSC_1373.JPG

6.6 MB

DEF CON 25 cannibal_DSC_1376.JPG

7.2 MB

DEF CON 25 cannibal_DSC_1377.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1379.JPG

7.1 MB

DEF CON 25 cannibal_DSC_1390.JPG

7.1 MB

DEF CON 25 cannibal_DSC_1391.JPG

6.8 MB

DEF CON 25 cannibal_DSC_1393.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1396.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1402.JPG

6.6 MB

DEF CON 25 cannibal_DSC_1407.JPG

6.7 MB

DEF CON 25 cannibal_DSC_1409.JPG

7.2 MB

DEF CON 25 cannibal_DSC_1413.JPG

6.8 MB

DEF CON 25 cannibal_DSC_1424.JPG

6.6 MB

DEF CON 25 cannibal_DSC_1429.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1431.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1432.JPG

7.2 MB

DEF CON 25 cannibal_DSC_1435.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1439.JPG

7.1 MB

DEF CON 25 cannibal_DSC_1450.JPG

6.8 MB

DEF CON 25 cannibal_DSC_1453.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1456.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1457.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1470.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1487.JPG

7.3 MB

DEF CON 25 cannibal_DSC_1489.JPG

7.1 MB

DEF CON 25 cannibal_DSC_1495.JPG

6.7 MB

DEF CON 25 cannibal_DSC_1506.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1515.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1520.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1524.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1527.JPG

7.2 MB

DEF CON 25 cannibal_DSC_1542.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1555.JPG

6.4 MB

DEF CON 25 cannibal_DSC_1557.JPG

6.5 MB

DEF CON 25 cannibal_DSC_1563.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1574.JPG

6.7 MB

DEF CON 25 cannibal_DSC_1591.JPG

6.7 MB

DEF CON 25 cannibal_DSC_1605.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1635.JPG

7.2 MB

DEF CON 25 cannibal_DSC_1640.JPG

7.1 MB

DEF CON 25 cannibal_DSC_1649.JPG

7.1 MB

DEF CON 25 cannibal_DSC_1650.JPG

6.7 MB

DEF CON 25 cannibal_DSC_1652.JPG

7.2 MB

DEF CON 25 cannibal_DSC_1675_edit.JPG

1.9 MB

DEF CON 25 cannibal_DSC_1694.JPG

6.6 MB

DEF CON 25 cannibal_DSC_1695.JPG

6.4 MB

DEF CON 25 cannibal_DSC_1699.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1709.JPG

6.7 MB

DEF CON 25 cannibal_DSC_1718.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1727.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1729.JPG

6.6 MB

DEF CON 25 cannibal_DSC_1734.JPG

6.8 MB

DEF CON 25 cannibal_DSC_1739.JPG

6.8 MB

DEF CON 25 cannibal_DSC_1745.JPG

6.6 MB

DEF CON 25 cannibal_DSC_1753.JPG

7.1 MB

DEF CON 25 cannibal_DSC_1766.JPG

6.8 MB

DEF CON 25 cannibal_DSC_1782.JPG

7.1 MB

DEF CON 25 cannibal_DSC_1783.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1795.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1801.JPG

7.2 MB

DEF CON 25 cannibal_DSC_1805.JPG

6.8 MB

DEF CON 25 cannibal_DSC_1812.JPG

7.2 MB

DEF CON 25 cannibal_DSC_1816.JPG

7.1 MB

DEF CON 25 cannibal_DSC_1817.JPG

6.7 MB

DEF CON 25 cannibal_DSC_1819.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1832.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1843.JPG

6.7 MB

DEF CON 25 cannibal_DSC_1848.JPG

6.8 MB

DEF CON 25 cannibal_DSC_1854.JPG

7.0 MB

DEF CON 25 cannibal_DSC_1861.JPG

6.4 MB

DEF CON 25 cannibal_DSC_1885.JPG

6.6 MB

DEF CON 25 cannibal_DSC_1892.JPG

6.9 MB

DEF CON 25 cannibal_DSC_1896.JPG

6.6 MB

DEF CON 25 cannibal_DSC_1898.JPG

7.3 MB

DEF CON 25 cannibal_DSC_1902.JPG

7.3 MB

DEF CON 25 cannibal_DSC_1939.JPG

6.3 MB

DEF CON 25 cannibal_DSC_1974.JPG

6.3 MB

/.../DEF CON 25 Ultimate Lothar pictures/

DEF CON 25 Ultimate Lothar IMG_1593.JPG

10.2 MB

DEF CON 25 Ultimate Lothar IMG_1594.JPG

9.2 MB

DEF CON 25 Ultimate Lothar IMG_1599.JPG

8.3 MB

DEF CON 25 Ultimate Lothar IMG_1612.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_1616.JPG

8.9 MB

DEF CON 25 Ultimate Lothar IMG_1619.JPG

8.0 MB

DEF CON 25 Ultimate Lothar IMG_1620.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_1621.JPG

7.2 MB

DEF CON 25 Ultimate Lothar IMG_1626.JPG

8.8 MB

DEF CON 25 Ultimate Lothar IMG_1632.JPG

9.3 MB

DEF CON 25 Ultimate Lothar IMG_1636.JPG

7.7 MB

DEF CON 25 Ultimate Lothar IMG_1637.JPG

8.0 MB

DEF CON 25 Ultimate Lothar IMG_1638.JPG

8.0 MB

DEF CON 25 Ultimate Lothar IMG_1641.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_1642.JPG

8.5 MB

DEF CON 25 Ultimate Lothar IMG_1644.JPG

8.9 MB

DEF CON 25 Ultimate Lothar IMG_1647.JPG

8.2 MB

DEF CON 25 Ultimate Lothar IMG_1659.JPG

9.4 MB

DEF CON 25 Ultimate Lothar IMG_1663.JPG

9.5 MB

DEF CON 25 Ultimate Lothar IMG_1665.JPG

7.2 MB

DEF CON 25 Ultimate Lothar IMG_1666.JPG

6.8 MB

DEF CON 25 Ultimate Lothar IMG_1667.JPG

8.1 MB

DEF CON 25 Ultimate Lothar IMG_1668.JPG

8.0 MB

DEF CON 25 Ultimate Lothar IMG_1676.JPG

8.9 MB

DEF CON 25 Ultimate Lothar IMG_1680.JPG

8.2 MB

DEF CON 25 Ultimate Lothar IMG_1681.JPG

9.5 MB

DEF CON 25 Ultimate Lothar IMG_1684.JPG

9.4 MB

DEF CON 25 Ultimate Lothar IMG_1686.JPG

9.0 MB

DEF CON 25 Ultimate Lothar IMG_1688.JPG

7.9 MB

DEF CON 25 Ultimate Lothar IMG_1692.JPG

10.1 MB

DEF CON 25 Ultimate Lothar IMG_1703.JPG

7.2 MB

DEF CON 25 Ultimate Lothar IMG_1705.JPG

8.4 MB

DEF CON 25 Ultimate Lothar IMG_1706.JPG

8.5 MB

DEF CON 25 Ultimate Lothar IMG_1710.JPG

8.4 MB

DEF CON 25 Ultimate Lothar IMG_1714.JPG

7.9 MB

DEF CON 25 Ultimate Lothar IMG_1715.JPG

7.3 MB

DEF CON 25 Ultimate Lothar IMG_1717.JPG

7.4 MB

DEF CON 25 Ultimate Lothar IMG_1723.JPG

7.4 MB

DEF CON 25 Ultimate Lothar IMG_1730.JPG

8.9 MB

DEF CON 25 Ultimate Lothar IMG_1733.JPG

9.6 MB

DEF CON 25 Ultimate Lothar IMG_1737.JPG

9.2 MB

DEF CON 25 Ultimate Lothar IMG_1740.JPG

8.2 MB

DEF CON 25 Ultimate Lothar IMG_1749.JPG

9.3 MB

DEF CON 25 Ultimate Lothar IMG_1752.JPG

9.2 MB

DEF CON 25 Ultimate Lothar IMG_1754.JPG

7.8 MB

DEF CON 25 Ultimate Lothar IMG_1758.JPG

8.2 MB

DEF CON 25 Ultimate Lothar IMG_1760.JPG

7.0 MB

DEF CON 25 Ultimate Lothar IMG_1770.JPG

8.1 MB

DEF CON 25 Ultimate Lothar IMG_1777.JPG

8.5 MB

DEF CON 25 Ultimate Lothar IMG_1782.JPG

7.5 MB

DEF CON 25 Ultimate Lothar IMG_1784.JPG

9.6 MB

DEF CON 25 Ultimate Lothar IMG_1785.JPG

8.4 MB

DEF CON 25 Ultimate Lothar IMG_1786.JPG

9.1 MB

DEF CON 25 Ultimate Lothar IMG_1787.JPG

9.6 MB

DEF CON 25 Ultimate Lothar IMG_1790.JPG

8.4 MB

DEF CON 25 Ultimate Lothar IMG_1791.JPG

8.1 MB

DEF CON 25 Ultimate Lothar IMG_1792.JPG

9.1 MB

DEF CON 25 Ultimate Lothar IMG_1801.JPG

8.4 MB

DEF CON 25 Ultimate Lothar IMG_1804.JPG

8.0 MB

DEF CON 25 Ultimate Lothar IMG_1812.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_1835.JPG

8.6 MB

DEF CON 25 Ultimate Lothar IMG_1842.JPG

8.6 MB

DEF CON 25 Ultimate Lothar IMG_1848.JPG

8.1 MB

DEF CON 25 Ultimate Lothar IMG_1849.JPG

8.3 MB

DEF CON 25 Ultimate Lothar IMG_1850.JPG

8.2 MB

DEF CON 25 Ultimate Lothar IMG_1851.JPG

7.6 MB

DEF CON 25 Ultimate Lothar IMG_1852.JPG

7.6 MB

DEF CON 25 Ultimate Lothar IMG_1858.JPG

9.0 MB

DEF CON 25 Ultimate Lothar IMG_1864.JPG

9.2 MB

DEF CON 25 Ultimate Lothar IMG_1868.JPG

9.3 MB

DEF CON 25 Ultimate Lothar IMG_1873.JPG

9.4 MB

DEF CON 25 Ultimate Lothar IMG_1892.JPG

9.1 MB

DEF CON 25 Ultimate Lothar IMG_1903.JPG

9.4 MB

DEF CON 25 Ultimate Lothar IMG_1926.JPG

9.4 MB

DEF CON 25 Ultimate Lothar IMG_1949.JPG

9.1 MB

DEF CON 25 Ultimate Lothar IMG_1957.JPG

8.4 MB

DEF CON 25 Ultimate Lothar IMG_1960.JPG

10.2 MB

DEF CON 25 Ultimate Lothar IMG_1964.JPG

9.2 MB

DEF CON 25 Ultimate Lothar IMG_1967.JPG

9.7 MB

DEF CON 25 Ultimate Lothar IMG_1969.JPG

10.8 MB

DEF CON 25 Ultimate Lothar IMG_1974.JPG

9.6 MB

DEF CON 25 Ultimate Lothar IMG_1977.JPG

9.6 MB

DEF CON 25 Ultimate Lothar IMG_1982.JPG

9.4 MB

DEF CON 25 Ultimate Lothar IMG_1989.JPG

10.0 MB

DEF CON 25 Ultimate Lothar IMG_2001.JPG

9.5 MB

DEF CON 25 Ultimate Lothar IMG_2010.JPG

9.1 MB

DEF CON 25 Ultimate Lothar IMG_2017.JPG

8.8 MB

DEF CON 25 Ultimate Lothar IMG_2044.JPG

9.8 MB

DEF CON 25 Ultimate Lothar IMG_2049.JPG

9.8 MB

DEF CON 25 Ultimate Lothar IMG_2089.JPG

9.2 MB

DEF CON 25 Ultimate Lothar IMG_2108.JPG

9.7 MB

DEF CON 25 Ultimate Lothar IMG_2109.JPG

10.3 MB

DEF CON 25 Ultimate Lothar IMG_2111.JPG

10.9 MB

DEF CON 25 Ultimate Lothar IMG_2116.JPG

9.0 MB

DEF CON 25 Ultimate Lothar IMG_2127.JPG

9.5 MB

DEF CON 25 Ultimate Lothar IMG_2137.JPG

9.9 MB

DEF CON 25 Ultimate Lothar IMG_2141.JPG

10.0 MB

DEF CON 25 Ultimate Lothar IMG_2145.JPG

10.3 MB

DEF CON 25 Ultimate Lothar IMG_2148.JPG

10.6 MB

DEF CON 25 Ultimate Lothar IMG_2151.JPG

9.4 MB

DEF CON 25 Ultimate Lothar IMG_2154.JPG

9.3 MB

DEF CON 25 Ultimate Lothar IMG_2155.JPG

10.4 MB

DEF CON 25 Ultimate Lothar IMG_2161.JPG

9.2 MB

DEF CON 25 Ultimate Lothar IMG_2167.JPG

8.6 MB

DEF CON 25 Ultimate Lothar IMG_2173.JPG

7.8 MB

DEF CON 25 Ultimate Lothar IMG_2178.JPG

8.8 MB

DEF CON 25 Ultimate Lothar IMG_2179.JPG

9.1 MB

DEF CON 25 Ultimate Lothar IMG_2180.JPG

9.4 MB

DEF CON 25 Ultimate Lothar IMG_2185.JPG

8.5 MB

DEF CON 25 Ultimate Lothar IMG_2188.JPG

9.3 MB

DEF CON 25 Ultimate Lothar IMG_2189.JPG

8.0 MB

DEF CON 25 Ultimate Lothar IMG_2191.JPG

9.1 MB

DEF CON 25 Ultimate Lothar IMG_2199.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_2216.JPG

8.8 MB

DEF CON 25 Ultimate Lothar IMG_2221.JPG

8.6 MB

DEF CON 25 Ultimate Lothar IMG_2227.JPG

8.8 MB

DEF CON 25 Ultimate Lothar IMG_2228.JPG

7.5 MB

DEF CON 25 Ultimate Lothar IMG_2230.JPG

7.3 MB

DEF CON 25 Ultimate Lothar IMG_2232.JPG

7.0 MB

DEF CON 25 Ultimate Lothar IMG_2238.JPG

8.3 MB

DEF CON 25 Ultimate Lothar IMG_2245.JPG

8.2 MB

DEF CON 25 Ultimate Lothar IMG_2248.JPG

9.3 MB

DEF CON 25 Ultimate Lothar IMG_2267.JPG

7.4 MB

DEF CON 25 Ultimate Lothar IMG_2270.JPG

8.3 MB

DEF CON 25 Ultimate Lothar IMG_2271.JPG

7.4 MB

DEF CON 25 Ultimate Lothar IMG_2272.JPG

8.5 MB

DEF CON 25 Ultimate Lothar IMG_2274.JPG

7.9 MB

DEF CON 25 Ultimate Lothar IMG_2275.JPG

7.9 MB

DEF CON 25 Ultimate Lothar IMG_2279.JPG

8.4 MB

DEF CON 25 Ultimate Lothar IMG_2281.JPG

8.8 MB

DEF CON 25 Ultimate Lothar IMG_2283.JPG

8.5 MB

DEF CON 25 Ultimate Lothar IMG_2284.JPG

9.1 MB

DEF CON 25 Ultimate Lothar IMG_2290.JPG

8.2 MB

DEF CON 25 Ultimate Lothar IMG_2297.JPG

10.0 MB

DEF CON 25 Ultimate Lothar IMG_2301.JPG

9.7 MB

DEF CON 25 Ultimate Lothar IMG_2314.JPG

8.4 MB

DEF CON 25 Ultimate Lothar IMG_2317.JPG

8.3 MB

DEF CON 25 Ultimate Lothar IMG_2318.JPG

9.1 MB

DEF CON 25 Ultimate Lothar IMG_2323.JPG

9.6 MB

DEF CON 25 Ultimate Lothar IMG_2351.JPG

8.5 MB

DEF CON 25 Ultimate Lothar IMG_2371.JPG

9.4 MB

DEF CON 25 Ultimate Lothar IMG_2372.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_2378.JPG

8.5 MB

DEF CON 25 Ultimate Lothar IMG_2387.JPG

8.5 MB

DEF CON 25 Ultimate Lothar IMG_2389.JPG

9.3 MB

DEF CON 25 Ultimate Lothar IMG_2418.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_2428.JPG

8.3 MB

DEF CON 25 Ultimate Lothar IMG_2443.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_2467.JPG

7.7 MB

DEF CON 25 Ultimate Lothar IMG_2483.JPG

8.4 MB

DEF CON 25 Ultimate Lothar IMG_2517.JPG

12.3 MB

DEF CON 25 Ultimate Lothar IMG_2519.JPG

11.4 MB

DEF CON 25 Ultimate Lothar IMG_2520.JPG

11.4 MB

DEF CON 25 Ultimate Lothar IMG_2527.JPG

7.7 MB

DEF CON 25 Ultimate Lothar IMG_2533.JPG

8.2 MB

DEF CON 25 Ultimate Lothar IMG_2554.JPG

8.3 MB

DEF CON 25 Ultimate Lothar IMG_2561.JPG

6.8 MB

DEF CON 25 Ultimate Lothar IMG_2563.JPG

7.8 MB

DEF CON 25 Ultimate Lothar IMG_2564.JPG

8.5 MB

DEF CON 25 Ultimate Lothar IMG_2570.JPG

6.9 MB

DEF CON 25 Ultimate Lothar IMG_2577.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_2579.JPG

7.5 MB

DEF CON 25 Ultimate Lothar IMG_2580.JPG

6.5 MB

DEF CON 25 Ultimate Lothar IMG_2582.JPG

8.8 MB

DEF CON 25 Ultimate Lothar IMG_2584.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_2587.JPG

8.9 MB

DEF CON 25 Ultimate Lothar IMG_2588.JPG

9.5 MB

DEF CON 25 Ultimate Lothar IMG_2589.JPG

9.0 MB

DEF CON 25 Ultimate Lothar IMG_2594.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_2600.JPG

8.7 MB

DEF CON 25 Ultimate Lothar IMG_2618.JPG

9.8 MB

DEF CON 25 Ultimate Lothar IMG_2620.JPG

9.3 MB

DEF CON 25 Ultimate Lothar IMG_2621.JPG

8.9 MB

DEF CON 25 Ultimate Lothar IMG_2625.JPG

9.2 MB

DEF CON 25 Ultimate Lothar IMG_2634.JPG

5.5 MB

DEF CON 25 Ultimate Lothar IMG_2644.JPG

6.0 MB

DEF CON 25 Ultimate Lothar IMG_2646.JPG

6.3 MB

DEF CON 25 Ultimate Lothar IMG_2647.JPG

6.5 MB

DEF CON 25 Ultimate Lothar IMG_2648.JPG

7.4 MB

DEF CON 25 Ultimate Lothar IMG_2649.JPG

6.2 MB

DEF CON 25 Ultimate Lothar IMG_2650.JPG

7.2 MB

DEF CON 25 Ultimate Lothar IMG_2651.JPG

7.3 MB

DEF CON 25 Ultimate Lothar IMG_2653.JPG

6.6 MB

DEF CON 25 Ultimate Lothar IMG_2654.JPG

6.2 MB

DEF CON 25 Ultimate Lothar IMG_2655.JPG

7.3 MB

DEF CON 25 Ultimate Lothar IMG_2658.JPG

7.1 MB

DEF CON 25 Ultimate Lothar IMG_2660.JPG

8.1 MB

DEF CON 25 Ultimate Lothar IMG_2662.JPG

6.8 MB

DEF CON 25 Ultimate Lothar IMG_2663.JPG

6.1 MB

DEF CON 25 Ultimate Lothar IMG_2666.JPG

6.7 MB

DEF CON 25 Ultimate Lothar IMG_2667.JPG

7.0 MB

DEF CON 25 Ultimate Lothar IMG_2672.JPG

6.5 MB

DEF CON 25 Ultimate Lothar IMG_3279.JPG

1.7 MB

DEF CON 25 Ultimate Lothar IMG_3280.JPG

1.5 MB

DEF CON 25 Ultimate Lothar IMG_3284.JPG

1.6 MB

/.../DEF CON 25 Viss pictures/

DEF CON 25 Viss DSC_6675.JPG

6.6 MB

DEF CON 25 Viss DSC_6679.JPG

6.8 MB

DEF CON 25 Viss DSC_6893.JPG

6.8 MB

DEF CON 25 Viss DSC_6896.JPG

6.5 MB

DEF CON 25 Viss DSC_6897.JPG

7.0 MB

DEF CON 25 Viss DSC_6898.JPG

7.2 MB

DEF CON 25 Viss DSC_6899.JPG

6.4 MB

DEF CON 25 Viss DSC_6903.JPG

6.2 MB

DEF CON 25 Viss DSC_6904.JPG

5.9 MB

DEF CON 25 Viss DSC_6907.JPG

6.4 MB

DEF CON 25 Viss DSC_6908.JPG

7.5 MB

DEF CON 25 Viss DSC_6909.JPG

4.9 MB

DEF CON 25 Viss DSC_6910.JPG

6.7 MB

DEF CON 25 Viss DSC_6913.JPG

6.9 MB

DEF CON 25 Viss DSC_6914.JPG

6.0 MB

DEF CON 25 Viss DSC_6916.JPG

6.3 MB

DEF CON 25 Viss DSC_6919.JPG

5.7 MB

DEF CON 25 Viss DSC_6922.JPG

5.7 MB

DEF CON 25 Viss DSC_6925.JPG

5.5 MB

DEF CON 25 Viss DSC_6926.JPG

5.0 MB

DEF CON 25 Viss DSC_6928.JPG

5.1 MB

DEF CON 25 Viss DSC_6930.JPG

4.5 MB

DEF CON 25 Viss DSC_6931.JPG

7.0 MB

DEF CON 25 Viss DSC_6932.JPG

4.6 MB

DEF CON 25 Viss DSC_6934.JPG

5.6 MB

DEF CON 25 Viss DSC_6935.JPG

5.0 MB

DEF CON 25 Viss DSC_6936.JPG

4.8 MB

DEF CON 25 Viss DSC_6937.JPG

4.4 MB

DEF CON 25 Viss DSC_6938.JPG

4.3 MB

DEF CON 25 Viss DSC_6939.JPG

5.5 MB

DEF CON 25 Viss DSC_6940.JPG

6.7 MB

DEF CON 25 Viss DSC_6941.JPG

6.4 MB

DEF CON 25 Viss DSC_6944.JPG

7.2 MB

DEF CON 25 Viss DSC_6945.JPG

5.8 MB

DEF CON 25 Viss DSC_6947.JPG

6.8 MB

DEF CON 25 Viss DSC_6949.JPG

6.4 MB

DEF CON 25 Viss DSC_6951.JPG

5.8 MB

DEF CON 25 Viss DSC_6952.JPG

6.3 MB

DEF CON 25 Viss DSC_6954.JPG

6.5 MB

DEF CON 25 Viss DSC_6955.JPG

6.2 MB

DEF CON 25 Viss DSC_6958.JPG

5.1 MB

DEF CON 25 Viss DSC_6959.JPG

5.1 MB

DEF CON 25 Viss DSC_6960.JPG

5.0 MB

DEF CON 25 Viss DSC_6961.JPG

4.9 MB

DEF CON 25 Viss DSC_6962.JPG

5.4 MB

DEF CON 25 Viss DSC_6967.JPG

5.6 MB

DEF CON 25 Viss DSC_6968.JPG

5.5 MB

DEF CON 25 Viss DSC_6975.JPG

6.5 MB

DEF CON 25 Viss DSC_6977.JPG

5.6 MB

DEF CON 25 Viss DSC_6978.JPG

5.7 MB

DEF CON 25 Viss DSC_6979.JPG

7.0 MB

DEF CON 25 Viss DSC_6984.JPG

7.9 MB

DEF CON 25 Viss DSC_6985.JPG

7.8 MB

DEF CON 25 Viss DSC_6986.JPG

7.8 MB

DEF CON 25 Viss DSC_6987.JPG

7.6 MB

DEF CON 25 Viss DSC_6988.JPG

7.4 MB

DEF CON 25 Viss DSC_6989.JPG

7.2 MB

DEF CON 25 Viss DSC_6990.JPG

7.1 MB

DEF CON 25 Viss DSC_6992.JPG

6.1 MB

DEF CON 25 Viss DSC_6993.JPG

6.8 MB

DEF CON 25 Viss DSC_6994.JPG

6.4 MB

DEF CON 25 Viss DSC_6995.JPG

6.9 MB

DEF CON 25 Viss DSC_7001.JPG

6.1 MB

DEF CON 25 Viss DSC_7002.JPG

6.3 MB

DEF CON 25 Viss DSC_7004.JPG

6.3 MB

DEF CON 25 Viss DSC_7011.JPG

6.2 MB

DEF CON 25 Viss DSC_7012.JPG

6.3 MB

DEF CON 25 Viss DSC_7013.JPG

6.3 MB

DEF CON 25 Viss DSC_7014.JPG

6.4 MB

DEF CON 25 Viss DSC_7016.JPG

6.4 MB

DEF CON 25 Viss DSC_7017.JPG

6.6 MB

DEF CON 25 Viss DSC_7018.JPG

6.8 MB

DEF CON 25 Viss DSC_7019.JPG

6.3 MB

DEF CON 25 Viss DSC_7020.JPG

6.5 MB

DEF CON 25 Viss DSC_7022.JPG

6.1 MB

DEF CON 25 Viss DSC_7023.JPG

5.9 MB

DEF CON 25 Viss DSC_7024.JPG

5.5 MB

DEF CON 25 Viss DSC_7026.JPG

5.9 MB

DEF CON 25 Viss DSC_7029.JPG

6.3 MB

DEF CON 25 Viss DSC_7031.JPG

5.0 MB

DEF CON 25 Viss DSC_7032.JPG

5.6 MB

DEF CON 25 Viss DSC_7033.JPG

5.3 MB

DEF CON 25 Viss DSC_7036.JPG

3.4 MB

DEF CON 25 Viss DSC_7037.JPG

4.0 MB

DEF CON 25 Viss DSC_7038.JPG

4.1 MB

DEF CON 25 Viss DSC_7040.JPG

6.0 MB

DEF CON 25 Viss DSC_7042.JPG

7.8 MB

/.../DEF CON 25 closing ceremony/

DEF CON 25 photo corps AMANDAS IMG_3913.jpg

4.6 MB

DEF CON 25 photo corps AMANDAS IMG_3916.jpg

4.5 MB

DEF CON 25 photo corps AMANDAS IMG_3917.jpg

4.1 MB

DEF CON 25 photo corps AMANDAS IMG_3956.jpg

4.4 MB

DEF CON 25 photo corps AMANDAS IMG_3970.jpg

7.9 MB

DEF CON 25 photo corps AMANDAS IMG_3980.jpg

6.3 MB

DEF CON 25 photo corps AMANDAS IMG_3985.jpg

7.0 MB

DEF CON 25 photo corps AMANDAS IMG_3993.jpg

5.3 MB

DEF CON 25 photo corps AMANDAS IMG_3999.jpg

6.1 MB

DEF CON 25 photo corps AMANDAS IMG_4009.jpg

7.6 MB

DEF CON 25 photo corps AMANDAS IMG_4019.jpg

6.3 MB

DEF CON 25 photo corps AMANDAS IMG_4027.jpg

6.4 MB

DEF CON 25 photo corps AMANDAS IMG_4029.jpg

6.7 MB

DEF CON 25 photo corps AMANDAS IMG_4036.jpg

7.2 MB

DEF CON 25 photo corps AMANDAS IMG_4040.jpg

6.9 MB

DEF CON 25 photo corps AMANDAS IMG_4045.jpg

6.6 MB

DEF CON 25 photo corps AMANDAS IMG_4053.jpg

6.9 MB

DEF CON 25 photo corps AMANDAS IMG_4062.jpg

6.2 MB

DEF CON 25 photo corps AMANDAS IMG_4082.jpg

6.4 MB

DEF CON 25 photo corps AMANDAS IMG_4084.jpg

7.5 MB

DEF CON 25 photo corps AMANDAS IMG_4090.jpg

6.4 MB

DEF CON 25 photo corps AMANDAS IMG_4092.jpg

7.0 MB

DEF CON 25 photo corps AMANDAS IMG_4106.jpg

6.8 MB

DEF CON 25 photo corps AMANDAS IMG_4109.jpg

6.4 MB

DEF CON 25 photo corps AMANDAS IMG_4115.jpg

6.4 MB

DEF CON 25 photo corps AMANDAS IMG_4121.jpg

6.0 MB

DEF CON 25 photo corps AMANDAS IMG_4136.jpg

6.1 MB

DEF CON 25 photo corps AMANDAS IMG_4145.jpg

6.4 MB

DEF CON 25 photo corps AMANDAS IMG_4159.jpg

6.2 MB

DEF CON 25 photo corps AMANDAS IMG_4181.jpg

5.9 MB

DEF CON 25 photo corps AMANDAS IMG_4251.jpg

7.6 MB

DEF CON 25 photo corps AMANDAS IMG_4255.jpg

7.3 MB

DEF CON 25 photo corps AMANDAS IMG_4258.jpg

7.1 MB

DEF CON 25 photo corps AMANDAS IMG_4268.jpg

7.0 MB

DEF CON 25 photo corps AMANDAS IMG_4284.jpg

6.2 MB

DEF CON 25 photo corps AMANDAS IMG_4285.jpg

5.7 MB

DEF CON 25 photo corps AMANDAS IMG_4287.jpg

6.6 MB

DEF CON 25 photo corps AMANDAS IMG_4290.jpg

6.1 MB

DEF CON 25 photo corps AMANDAS IMG_4311.jpg

5.0 MB

DEF CON 25 photo corps AMANDAS IMG_4340.jpg

6.9 MB

DEF CON 25 photo corps AMANDAS IMG_4341.jpg

6.7 MB

DEF CON 25 photo corps AMANDAS IMG_4350.jpg

4.8 MB

DEF CON 25 photo corps AMANDAS IMG_4363.jpg

4.6 MB

DEF CON 25 photo corps AMANDAS IMG_4366.jpg

10.4 MB

DEF CON 25 photo corps AMANDAS IMG_4367.jpg

5.8 MB

DEF CON 25 photo corps AMANDAS IMG_4372.jpg

6.4 MB

DEF CON 25 photo corps AMANDAS IMG_4379.jpg

7.3 MB

DEF CON 25 photo corps ASTcell AST00031.jpg

11.7 MB

DEF CON 25 photo corps ASTcell AST00058.jpg

14.1 MB

DEF CON 25 photo corps ASTcell AST00083.jpg

14.1 MB

DEF CON 25 photo corps ASTcell AST00084.jpg

12.4 MB

DEF CON 25 photo corps ASTcell AST00118.jpg

11.8 MB

DEF CON 25 photo corps ASTcell AST00122.jpg

9.1 MB

DEF CON 25 photo corps ASTcell AST00129.jpg

11.6 MB

DEF CON 25 photo corps ASTcell AST00134.jpg

14.1 MB

DEF CON 25 photo corps ASTcell AST00200.jpg

13.0 MB

DEF CON 25 photo corps ASTcell AST00214.jpg

11.9 MB

DEF CON 25 photo corps ASTcell AST00218.jpg

11.9 MB

DEF CON 25 photo corps ASTcell AST00233.jpg

11.5 MB

DEF CON 25 photo corps ASTcell AST00237.jpg

13.6 MB

DEF CON 25 photo corps ASTcell AST00263.jpg

13.3 MB

DEF CON 25 photo corps ASTcell AST00280.jpg

12.3 MB

DEF CON 25 photo corps ASTcell AST00295.jpg

8.2 MB

DEF CON 25 photo corps ASTcell AST00366.jpg

11.1 MB

DEF CON 25 photo corps ASTcell AST00367.jpg

12.6 MB

DEF CON 25 photo corps ASTcell AST00397.jpg

12.3 MB

DEF CON 25 photo corps ASTcell AST00413.jpg

12.1 MB

DEF CON 25 photo corps ASTcell AST00487.jpg

12.0 MB

DEF CON 25 photo corps ASTcell AST00514.jpg

11.8 MB

DEF CON 25 photo corps ASTcell AST00530.jpg

15.3 MB

DEF CON 25 photo corps ASTcell AST00531.jpg

11.6 MB

DEF CON 25 photo corps ASTcell AST00564.jpg

16.0 MB

DEF CON 25 photo corps ASTcell AST00570.jpg

11.6 MB

DEF CON 25 photo corps ASTcell AST00587.jpg

14.6 MB

DEF CON 25 photo corps ASTcell AST00609.jpg

12.9 MB

DEF CON 25 photo corps ASTcell AST00632.jpg

11.6 MB

DEF CON 25 photo corps ASTcell AST00636.jpg

14.1 MB

DEF CON 25 photo corps ASTcell AST00637.jpg

11.6 MB

DEF CON 25 photo corps ASTcell AST00661.jpg

10.7 MB

DEF CON 25 photo corps ASTcell AST00676.jpg

12.2 MB

DEF CON 25 photo corps ASTcell AST00717.jpg

12.1 MB

DEF CON 25 photo corps ASTcell AST00745.jpg

11.4 MB

DEF CON 25 photo corps ASTcell AST00771.jpg

13.1 MB

DEF CON 25 photo corps ASTcell AST00788.jpg

13.0 MB

DEF CON 25 photo corps ASTcell AST00791.jpg

12.7 MB

DEF CON 25 photo corps ASTcell AST00801.jpg

12.7 MB

DEF CON 25 photo corps ASTcell AST00802.jpg

12.1 MB

DEF CON 25 photo corps ASTcell AST00836.jpg

10.6 MB

DEF CON 25 photo corps ASTcell AST00902.jpg

11.2 MB

DEF CON 25 photo corps ASTcell AST00949.jpg

10.9 MB

DEF CON 25 photo corps ASTcell AST00961.jpg

13.2 MB

DEF CON 25 photo corps ASTcell AST00964.jpg

15.4 MB

DEF CON 25 photo corps ASTcell AST01019.jpg

13.2 MB

DEF CON 25 photo corps ASTcell AST01074.jpg

9.4 MB

DEF CON 25 photo corps ASTcell AST01082.jpg

11.1 MB

DEF CON 25 photo corps ASTcell AST01177.jpg

10.5 MB

DEF CON 25 photo corps ASTcell AST01189.jpg

11.4 MB

DEF CON 25 photo corps ASTcell AST01202.jpg

12.0 MB

DEF CON 25 photo corps ASTcell AST01244.jpg

13.1 MB

DEF CON 25 photo corps ASTcell AST01289.jpg

11.7 MB

DEF CON 25 photo corps ASTcell AST01340.jpg

10.1 MB

DEF CON 25 photo corps ASTcell AST01343.jpg

10.9 MB

DEF CON 25 photo corps ASTcell AST01348.jpg

12.2 MB

DEF CON 25 photo corps ASTcell AST01354.jpg

10.9 MB

DEF CON 25 photo corps ASTcell AST01414.jpg

12.2 MB

DEF CON 25 photo corps ASTcell AST01417.jpg

11.3 MB

DEF CON 25 photo corps ASTcell AST01447.jpg

12.4 MB

DEF CON 25 photo corps ASTcell AST01453.jpg

11.8 MB

DEF CON 25 photo corps ASTcell AST01456.jpg

14.7 MB

DEF CON 25 photo corps ASTcell AST01498.jpg

11.5 MB

DEF CON 25 photo corps ASTcell AST01526.jpg

11.5 MB

DEF CON 25 photo corps ASTcell AST01527.jpg

11.6 MB

DEF CON 25 photo corps ASTcell AST01551.jpg

8.8 MB

DEF CON 25 photo corps ASTcell AST01557.jpg

11.4 MB

DEF CON 25 photo corps ASTcell AST01582.jpg

12.9 MB

DEF CON 25 photo corps ASTcell AST01603.jpg

11.3 MB

DEF CON 25 photo corps ASTcell AST01626.jpg

12.8 MB

DEF CON 25 photo corps ASTcell AST01643.jpg

11.3 MB

DEF CON 25 photo corps ASTcell AST01648.jpg

11.2 MB

DEF CON 25 photo corps ASTcell AST01651.jpg

11.4 MB

DEF CON 25 photo corps ASTcell AST01673.jpg

11.1 MB

DEF CON 25 photo corps ASTcell AST01699.jpg

10.5 MB

DEF CON 25 photo corps ASTcell AST01724.jpg

11.7 MB

DEF CON 25 photo corps ASTcell AST01737.jpg

13.9 MB

DEF CON 25 photo corps ASTcell AST01788.jpg

13.1 MB

DEF CON 25 photo corps ASTcell AST01805.jpg

12.3 MB

DEF CON 25 photo corps ASTcell AST01815.jpg

14.9 MB

DEF CON 25 photo corps ASTcell AST01829.jpg

12.1 MB

DEF CON 25 photo corps ASTcell AST01857.jpg

11.9 MB

DEF CON 25 photo corps ASTcell AST01889.jpg

13.5 MB

DEF CON 25 photo corps ASTcell AST01907.jpg

13.1 MB

DEF CON 25 photo corps ASTcell AST01938.jpg

12.7 MB

DEF CON 25 photo corps ASTcell AST01953.jpg

10.6 MB

DEF CON 25 photo corps ASTcell AST01978.jpg

12.2 MB

DEF CON 25 photo corps ASTcell AST01987.jpg

10.1 MB

DEF CON 25 photo corps ASTcell AST02012.jpg

11.4 MB

DEF CON 25 photo corps ASTcell AST02032.jpg

10.3 MB

DEF CON 25 photo corps ASTcell AST02067.jpg

10.9 MB

DEF CON 25 photo corps ASTcell AST02089.jpg

11.6 MB

DEF CON 25 photo corps ASTcell AST02090.jpg

11.5 MB

DEF CON 25 photo corps ASTcell AST02152.jpg

12.5 MB

DEF CON 25 photo corps ASTcell AST02173.jpg

13.8 MB

DEF CON 25 photo corps ASTcell AST02187.jpg

12.5 MB

DEF CON 25 photo corps ASTcell AST02190.jpg

15.1 MB

DEF CON 25 photo corps ASTcell AST02223.jpg

13.8 MB

DEF CON 25 photo corps ASTcell AST02231.jpg

13.1 MB

DEF CON 25 photo corps ASTcell AST02284.jpg

10.8 MB

DEF CON 25 photo corps ASTcell AST02290.jpg

11.9 MB

DEF CON 25 photo corps ASTcell AST02294.jpg

13.7 MB

DEF CON 25 photo corps ASTcell AST02296.jpg

12.7 MB

DEF CON 25 photo corps ASTcell AST02313.jpg

12.1 MB

DEF CON 25 photo corps ASTcell AST02326.jpg

11.1 MB

DEF CON 25 photo corps ASTcell AST02353.jpg

13.5 MB

DEF CON 25 photo corps ASTcell AST02365.jpg

14.5 MB

DEF CON 25 photo corps ASTcell AST02464.jpg

16.0 MB

DEF CON 25 photo corps ASTcell AST02470.jpg

16.3 MB

DEF CON 25 photo corps ASTcell AST02503.jpg

15.1 MB

DEF CON 25 photo corps ASTcell AST02542.jpg

15.3 MB

DEF CON 25 photo corps ASTcell AST02579.jpg

9.7 MB

DEF CON 25 photo corps ASTcell AST02580.jpg

9.6 MB

DEF CON 25 photo corps ASTcell AST02582.jpg

12.1 MB

DEF CON 25 photo corps ASTcell AST02594.jpg

12.2 MB

DEF CON 25 photo corps ASTcell AST02608.jpg

10.1 MB

DEF CON 25 photo corps ASTcell AST02625.jpg

9.9 MB

DEF CON 25 photo corps ASTcell AST02645.jpg

10.9 MB

DEF CON 25 photo corps ASTcell AST02657.jpg

10.0 MB

DEF CON 25 photo corps ASTcell AST02672.jpg

12.7 MB

DEF CON 25 photo corps ASTcell AST02703.jpg

13.5 MB

DEF CON 25 photo corps ASTcell AST02716.jpg

10.3 MB

DEF CON 25 photo corps ASTcell AST02727.jpg

13.0 MB

DEF CON 25 photo corps ASTcell AST02791.jpg

15.5 MB

DEF CON 25 photo corps ASTcell AST02823.jpg

10.6 MB

DEF CON 25 photo corps ASTcell AST02860.jpg

14.1 MB

DEF CON 25 photo corps ASTcell AST02862.jpg

11.5 MB

DEF CON 25 photo corps ASTcell AST02875.jpg

12.4 MB

DEF CON 25 photo corps ASTcell AST02883.jpg

8.9 MB

DEF CON 25 photo corps ASTcell AST02891.jpg

10.0 MB

DEF CON 25 photo corps ASTcell AST02920.jpg

13.3 MB

DEF CON 25 photo corps ASTcell AST02923.jpg

12.3 MB

DEF CON 25 photo corps ASTcell AST02948.jpg

12.3 MB

DEF CON 25 photo corps ASTcell AST02963.jpg

12.7 MB

DEF CON 25 photo corps ASTcell AST03013.jpg

12.5 MB

DEF CON 25 photo corps ASTcell AST03016.jpg

11.2 MB

DEF CON 25 photo corps ASTcell AST03017.jpg

12.0 MB

DEF CON 25 photo corps Cannibal DSC_0088.jpg

7.3 MB

DEF CON 25 photo corps Cannibal DSC_0090.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_0103.jpg

7.3 MB

DEF CON 25 photo corps Cannibal DSC_0120.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_0123.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0131.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0134.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0136.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0138.jpg

6.4 MB

DEF CON 25 photo corps Cannibal DSC_0140.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0144.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0145.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0152.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0157.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_0163.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0179.jpg

6.5 MB

DEF CON 25 photo corps Cannibal DSC_0189.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0201.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0205.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_0210.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_0213.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0216.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_0217.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0220.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_0221.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0223.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_0227.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0229.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_0232.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0236.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_0242.jpg

6.4 MB

DEF CON 25 photo corps Cannibal DSC_0245.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0246.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_0252.jpg

7.3 MB

DEF CON 25 photo corps Cannibal DSC_0255.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_0261.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0262.jpg

7.7 MB

DEF CON 25 photo corps Cannibal DSC_0271.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_0274.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0277.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0282.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_0284.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0287.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0294.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0298.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0302.jpg

6.3 MB

DEF CON 25 photo corps Cannibal DSC_0303.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0307.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0312.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_0314.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_0318.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0324.jpg

6.5 MB

DEF CON 25 photo corps Cannibal DSC_0330.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0331.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0335.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_0337.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0339.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0342.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0344.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_0353.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_0357.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0360.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0362.jpg

7.4 MB

DEF CON 25 photo corps Cannibal DSC_0366.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0371.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_0376.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_0384.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_0388.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_0391.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_0392.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0395.jpg

6.5 MB

DEF CON 25 photo corps Cannibal DSC_0397.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_0402.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_0403.jpg

6.5 MB

DEF CON 25 photo corps Cannibal DSC_0406.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0417.jpg

6.3 MB

DEF CON 25 photo corps Cannibal DSC_0421.jpg

6.2 MB

DEF CON 25 photo corps Cannibal DSC_0427.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0458.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0475.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_0481.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0483.jpg

6.3 MB

DEF CON 25 photo corps Cannibal DSC_0485.jpg

6.4 MB

DEF CON 25 photo corps Cannibal DSC_0505.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0532.jpg

2.8 MB

DEF CON 25 photo corps Cannibal DSC_0538.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0547-1.tiff

47.8 MB

DEF CON 25 photo corps Cannibal DSC_0556.jpg

7.3 MB

DEF CON 25 photo corps Cannibal DSC_0572.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_0583.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_0586.jpg

6.3 MB

DEF CON 25 photo corps Cannibal DSC_0617.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0622.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0635.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_0642.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_0665.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_0680.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_0686.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0689.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0691.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0693.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_0700.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0701.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_0712.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_0735.jpg

7.4 MB

DEF CON 25 photo corps Cannibal DSC_0760.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_0854.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_0908.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_0938.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_0974.jpg

7.3 MB

DEF CON 25 photo corps Cannibal DSC_0993.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1060.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_1088.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_1155.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_1259.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_1317.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_1357.jpg

7.3 MB

DEF CON 25 photo corps Cannibal DSC_1368.jpg

7.3 MB

DEF CON 25 photo corps Cannibal DSC_1372.jpg

7.3 MB

DEF CON 25 photo corps Cannibal DSC_1373.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_1376.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_1377.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1379.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_1390.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_1391.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_1393.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1396.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1402.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_1407.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_1409.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_1413.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_1424.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_1429.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1431.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1432.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_1435.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1439.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_1450.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_1453.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1456.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1457.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1470.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1487.jpg

7.3 MB

DEF CON 25 photo corps Cannibal DSC_1489.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_1495.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_1506.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1515.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1520.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1524.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1527.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_1542.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1555.jpg

6.4 MB

DEF CON 25 photo corps Cannibal DSC_1557.jpg

6.5 MB

DEF CON 25 photo corps Cannibal DSC_1563.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1574.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_1591.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_1605.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1635.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_1640.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_1649.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_1650.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_1652.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_1675.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1694.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_1695.jpg

6.4 MB

DEF CON 25 photo corps Cannibal DSC_1699.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1709.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_1718.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1727.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1729.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_1734.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_1739.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_1745.jpg

6.6 MB

DEF CON 25 photo corps Cannibal DSC_1753.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_1766.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_1782.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_1783.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1795.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1801.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_1805.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_1812.jpg

7.2 MB

DEF CON 25 photo corps Cannibal DSC_1816.jpg

7.1 MB

DEF CON 25 photo corps Cannibal DSC_1817.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_1819.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1832.jpg

6.9 MB

DEF CON 25 photo corps Cannibal DSC_1843.jpg

6.7 MB

DEF CON 25 photo corps Cannibal DSC_1848.jpg

6.8 MB

DEF CON 25 photo corps Cannibal DSC_1854.jpg

7.0 MB

DEF CON 25 photo corps Cannibal DSC_1861.jpg

6.4 MB

DEF CON 25 photo corps Lothar IMG_1593.jpg

10.2 MB

DEF CON 25 photo corps Lothar IMG_1594.jpg

9.2 MB

DEF CON 25 photo corps Lothar IMG_1599.jpg

8.3 MB

DEF CON 25 photo corps Lothar IMG_1612.jpg

8.7 MB

DEF CON 25 photo corps Lothar IMG_1616.jpg

8.9 MB

DEF CON 25 photo corps Lothar IMG_1619.jpg

8.0 MB

DEF CON 25 photo corps Lothar IMG_1620.jpg

8.7 MB

DEF CON 25 photo corps Lothar IMG_1621.jpg

7.2 MB

DEF CON 25 photo corps Lothar IMG_1626.jpg

8.8 MB

DEF CON 25 photo corps Lothar IMG_1632.jpg

9.3 MB

DEF CON 25 photo corps Lothar IMG_1636.jpg

7.7 MB

DEF CON 25 photo corps Lothar IMG_1637.jpg

8.0 MB

DEF CON 25 photo corps Lothar IMG_1638.jpg

8.0 MB

DEF CON 25 photo corps Lothar IMG_1641.jpg

8.7 MB

DEF CON 25 photo corps Lothar IMG_1642.jpg

8.5 MB

DEF CON 25 photo corps Lothar IMG_1644.jpg

8.9 MB

DEF CON 25 photo corps Lothar IMG_1647.jpg

8.2 MB

DEF CON 25 photo corps Lothar IMG_1659.jpg

9.4 MB

DEF CON 25 photo corps Lothar IMG_1663.jpg

9.5 MB

DEF CON 25 photo corps Lothar IMG_1665.jpg

7.2 MB

DEF CON 25 photo corps Lothar IMG_1666.jpg

6.8 MB

DEF CON 25 photo corps Lothar IMG_1667.jpg

8.1 MB

DEF CON 25 photo corps Lothar IMG_1668.jpg

8.0 MB

DEF CON 25 photo corps Lothar IMG_1676.jpg

8.9 MB

DEF CON 25 photo corps Lothar IMG_1680.jpg

8.2 MB

DEF CON 25 photo corps Lothar IMG_1681.jpg

9.5 MB

DEF CON 25 photo corps Lothar IMG_1684.jpg

9.4 MB

DEF CON 25 photo corps Lothar IMG_1686.jpg

9.0 MB

DEF CON 25 photo corps Lothar IMG_1688.jpg

7.9 MB

DEF CON 25 photo corps Lothar IMG_1692.jpg

10.1 MB

DEF CON 25 photo corps Lothar IMG_1703.jpg

7.2 MB

DEF CON 25 photo corps Lothar IMG_1705.jpg

8.4 MB

DEF CON 25 photo corps Lothar IMG_1706.jpg

8.5 MB

DEF CON 25 photo corps Lothar IMG_1710.jpg

8.4 MB

DEF CON 25 photo corps Lothar IMG_1714.jpg

7.9 MB

DEF CON 25 photo corps Lothar IMG_1715.jpg

7.3 MB

DEF CON 25 photo corps Lothar IMG_1717.jpg

7.4 MB

DEF CON 25 photo corps Lothar IMG_1723.jpg

7.4 MB

DEF CON 25 photo corps Lothar IMG_1730.jpg

8.9 MB

DEF CON 25 photo corps Lothar IMG_1733.jpg

9.6 MB

DEF CON 25 photo corps Lothar IMG_1737.jpg

9.2 MB

DEF CON 25 photo corps Lothar IMG_1740.jpg

8.2 MB

DEF CON 25 photo corps Lothar IMG_1749.jpg

9.3 MB

DEF CON 25 photo corps Lothar IMG_1752.jpg

9.2 MB

DEF CON 25 photo corps Lothar IMG_1754.jpg

7.8 MB

DEF CON 25 photo corps Lothar IMG_1758.jpg

8.2 MB

DEF CON 25 photo corps Lothar IMG_1760.jpg

7.0 MB

DEF CON 25 photo corps Lothar IMG_1770.jpg

8.1 MB

DEF CON 25 photo corps Lothar IMG_1777.jpg

8.5 MB

DEF CON 25 photo corps Lothar IMG_1782.jpg

7.5 MB

DEF CON 25 photo corps Lothar IMG_1784.jpg

9.6 MB

DEF CON 25 photo corps Lothar IMG_1785.jpg

8.4 MB

DEF CON 25 photo corps Lothar IMG_1786.jpg

9.1 MB

DEF CON 25 photo corps Lothar IMG_1787.jpg

9.6 MB

DEF CON 25 photo corps Lothar IMG_1790.jpg

8.4 MB

DEF CON 25 photo corps Lothar IMG_1791.jpg

8.1 MB

DEF CON 25 photo corps Lothar IMG_1792.jpg

9.1 MB

DEF CON 25 photo corps Lothar IMG_1801.jpg

8.4 MB

DEF CON 25 photo corps Lothar IMG_1804.jpg

8.0 MB

DEF CON 25 photo corps Lothar IMG_1812.jpg

8.7 MB

DEF CON 25 photo corps Lothar IMG_1835.jpg

8.6 MB

DEF CON 25 photo corps Lothar IMG_1842.jpg

8.6 MB

DEF CON 25 photo corps Lothar IMG_1848.jpg

8.1 MB

DEF CON 25 photo corps Lothar IMG_1849.jpg

8.3 MB

DEF CON 25 photo corps Lothar IMG_1850.jpg

8.2 MB

DEF CON 25 photo corps Lothar IMG_1851.jpg

7.6 MB

DEF CON 25 photo corps Lothar IMG_1852.jpg

7.6 MB

DEF CON 25 photo corps Lothar IMG_1858.jpg

9.0 MB

DEF CON 25 photo corps Lothar IMG_1864.jpg

9.2 MB

DEF CON 25 photo corps Lothar IMG_1868.jpg

9.3 MB

DEF CON 25 photo corps Lothar IMG_1873.jpg

9.4 MB

DEF CON 25 photo corps Lothar IMG_1892.jpg

9.1 MB

DEF CON 25 photo corps Lothar IMG_1903.jpg

9.4 MB

DEF CON 25 photo corps Lothar IMG_1926.jpg

9.4 MB

DEF CON 25 photo corps Lothar IMG_1949.jpg

9.1 MB

DEF CON 25 photo corps Lothar IMG_1957.jpg

8.4 MB

DEF CON 25 photo corps Lothar IMG_1960.jpg

10.2 MB

DEF CON 25 photo corps Lothar IMG_1964.jpg

9.2 MB

DEF CON 25 photo corps Lothar IMG_1967.jpg

9.7 MB

DEF CON 25 photo corps Lothar IMG_1969.jpg

10.8 MB

DEF CON 25 photo corps Lothar IMG_1974.jpg

9.6 MB

DEF CON 25 photo corps Lothar IMG_1977.jpg

9.6 MB

DEF CON 25 photo corps Lothar IMG_1982.jpg

9.4 MB

DEF CON 25 photo corps Lothar IMG_1989.jpg

10.0 MB

DEF CON 25 photo corps Lothar IMG_2001.jpg

9.5 MB

DEF CON 25 photo corps Lothar IMG_2010.jpg

9.1 MB

DEF CON 25 photo corps Lothar IMG_2017.jpg

8.8 MB

DEF CON 25 photo corps Lothar IMG_2044.jpg

9.8 MB

DEF CON 25 photo corps Lothar IMG_2049.jpg

9.8 MB

DEF CON 25 photo corps Lothar IMG_2089.jpg

9.2 MB

DEF CON 25 photo corps Lothar IMG_2108.jpg

9.7 MB

DEF CON 25 photo corps Lothar IMG_2109.jpg

10.3 MB

DEF CON 25 photo corps Lothar IMG_2111.jpg

10.9 MB

DEF CON 25 photo corps Lothar IMG_2116.jpg

9.0 MB

DEF CON 25 photo corps Lothar IMG_2127.jpg

9.5 MB

DEF CON 25 photo corps Lothar IMG_2137.jpg

9.9 MB

DEF CON 25 photo corps Lothar IMG_2141.jpg

10.0 MB

DEF CON 25 photo corps Lothar IMG_2145.jpg

10.3 MB

DEF CON 25 photo corps Lothar IMG_2148.jpg

10.6 MB

DEF CON 25 photo corps Lothar IMG_2151.jpg

9.4 MB

DEF CON 25 photo corps Lothar IMG_2154.jpg

9.3 MB

DEF CON 25 photo corps Lothar IMG_2155.jpg

10.4 MB

DEF CON 25 photo corps Lothar IMG_2161.jpg

9.2 MB

DEF CON 25 photo corps Lothar IMG_2167.jpg

8.6 MB

DEF CON 25 photo corps Lothar IMG_2173.jpg

7.8 MB

DEF CON 25 photo corps Lothar IMG_2178.jpg

8.8 MB

DEF CON 25 photo corps Lothar IMG_2179.jpg

9.1 MB

DEF CON 25 photo corps Lothar IMG_2180.jpg

9.4 MB

DEF CON 25 photo corps Lothar IMG_2185.jpg

8.5 MB

DEF CON 25 photo corps Lothar IMG_2188.jpg

9.3 MB

DEF CON 25 photo corps Lothar IMG_2189.jpg

8.0 MB

DEF CON 25 photo corps Lothar IMG_2191.jpg

9.1 MB

DEF CON 25 photo corps Lothar IMG_2199.jpg

8.7 MB

DEF CON 25 photo corps Lothar IMG_2216.jpg

8.8 MB

DEF CON 25 photo corps Lothar IMG_2221.jpg

8.6 MB

DEF CON 25 photo corps Lothar IMG_2227.jpg

8.8 MB

DEF CON 25 photo corps Lothar IMG_2228.jpg

7.5 MB

DEF CON 25 photo corps Lothar IMG_2230.jpg

7.3 MB

DEF CON 25 photo corps Lothar IMG_2232.jpg

7.0 MB

DEF CON 25 photo corps Lothar IMG_2238.jpg

8.3 MB

DEF CON 25 photo corps Lothar IMG_2245.jpg

8.2 MB

DEF CON 25 photo corps Lothar IMG_2248.jpg

9.3 MB

DEF CON 25 photo corps Lothar IMG_2267.jpg

7.4 MB

DEF CON 25 photo corps Lothar IMG_2270.jpg

8.3 MB

DEF CON 25 photo corps Lothar IMG_2271.jpg

7.4 MB

DEF CON 25 photo corps Lothar IMG_2272.jpg

8.5 MB

DEF CON 25 photo corps Lothar IMG_2274.jpg

7.9 MB

DEF CON 25 photo corps Lothar IMG_2275.jpg

7.9 MB

DEF CON 25 photo corps Lothar IMG_2279.jpg

8.4 MB

DEF CON 25 photo corps Lothar IMG_2281.jpg

8.8 MB

DEF CON 25 photo corps Lothar IMG_2283.jpg

8.5 MB

DEF CON 25 photo corps Lothar IMG_2284.jpg

9.1 MB

DEF CON 25 photo corps Lothar IMG_2290.jpg

8.2 MB

DEF CON 25 photo corps Lothar IMG_2297.jpg

10.0 MB

DEF CON 25 photo corps Lothar IMG_2301.jpg

9.7 MB

DEF CON 25 photo corps Lothar IMG_2314.jpg

8.4 MB

DEF CON 25 photo corps Lothar IMG_2317.jpg

8.3 MB

DEF CON 25 photo corps Lothar IMG_2318.jpg

9.1 MB

DEF CON 25 photo corps Lothar IMG_2323.jpg

9.6 MB

DEF CON 25 photo corps Lothar IMG_2351.jpg

8.5 MB

DEF CON 25 photo corps Lothar IMG_2371.jpg

9.4 MB

DEF CON 25 photo corps Lothar IMG_2372.jpg

8.7 MB

DEF CON 25 photo corps Lothar IMG_2378.jpg

8.5 MB

DEF CON 25 photo corps Lothar IMG_2387.jpg

8.5 MB

DEF CON 25 photo corps Lothar IMG_2389.jpg

9.3 MB

DEF CON 25 photo corps Lothar IMG_2418.jpg

8.7 MB

DEF CON 25 photo corps Lothar IMG_2428.jpg

8.3 MB

DEF CON 25 photo corps Lothar IMG_2443.jpg

8.7 MB

DEF CON 25 photo corps Lothar IMG_2467.jpg

7.7 MB

DEF CON 25 photo corps Lothar IMG_2483.jpg

8.4 MB

DEF CON 25 photo corps Lothar IMG_2517.jpg

12.3 MB

DEF CON 25 photo corps Lothar IMG_2519.jpg

11.4 MB

DEF CON 25 photo corps Lothar IMG_2520.jpg

11.4 MB

DEF CON 25 photo corps Lothar IMG_2527.jpg

7.7 MB

DEF CON 25 photo corps Lothar IMG_2533.jpg

8.2 MB

DEF CON 25 photo corps Lothar IMG_2554.jpg

8.3 MB

DEF CON 25 photo corps Lothar IMG_2561.jpg

6.8 MB

DEF CON 25 photo corps Lothar IMG_2563.jpg

7.8 MB

DEF CON 25 photo corps Lothar IMG_2564.jpg

8.5 MB

DEF CON 25 photo corps Lothar IMG_2570.jpg

6.9 MB

DEF CON 25 photo corps Lothar IMG_2577.jpg

8.7 MB

DEF CON 25 photo corps Lothar IMG_2579.jpg

7.5 MB

DEF CON 25 photo corps Lothar IMG_2580.jpg

6.5 MB

DEF CON 25 photo corps Lothar IMG_2582.jpg

8.8 MB

DEF CON 25 photo corps Lothar IMG_2584.jpg

8.7 MB

DEF CON 25 photo corps Lothar IMG_2587.jpg

8.9 MB

DEF CON 25 photo corps Lothar IMG_3279.jpg

1.7 MB

DEF CON 25 photo corps Lothar IMG_3280.jpg

1.5 MB

DEF CON 25 photo corps Lothar IMG_3284.jpg

1.6 MB

DEF CON 25 photo corps Viss DSC_6462.jpg

6.7 MB

DEF CON 25 photo corps Viss DSC_6463.jpg

6.7 MB

DEF CON 25 photo corps Viss DSC_6467.jpg

3.8 MB

DEF CON 25 photo corps Viss DSC_6477.jpg

5.1 MB

DEF CON 25 photo corps Viss DSC_6479.jpg

4.3 MB

DEF CON 25 photo corps Viss DSC_6481.jpg

6.6 MB

DEF CON 25 photo corps Viss DSC_6483.jpg

6.5 MB

DEF CON 25 photo corps Viss DSC_6490.jpg

5.1 MB

DEF CON 25 photo corps Viss DSC_6494.jpg

6.2 MB

DEF CON 25 photo corps Viss DSC_6495.jpg

6.0 MB

DEF CON 25 photo corps Viss DSC_6497.jpg

5.9 MB

DEF CON 25 photo corps Viss DSC_6498.jpg

5.9 MB

DEF CON 25 photo corps Viss DSC_6502.jpg

6.8 MB

DEF CON 25 photo corps Viss DSC_6505.jpg

5.8 MB

DEF CON 25 photo corps Viss DSC_6508.jpg

4.2 MB

DEF CON 25 photo corps Viss DSC_6518.jpg

6.7 MB

DEF CON 25 photo corps Viss DSC_6523.jpg

7.4 MB

DEF CON 25 photo corps Viss DSC_6526.jpg

6.4 MB

DEF CON 25 photo corps Viss DSC_6535.jpg

7.2 MB

DEF CON 25 photo corps Viss DSC_6537.jpg

4.7 MB

DEF CON 25 photo corps Viss DSC_6544.jpg

6.3 MB

DEF CON 25 photo corps Viss DSC_6555.jpg

7.4 MB

DEF CON 25 photo corps Viss DSC_6606.jpg

6.5 MB

DEF CON 25 photo corps Viss DSC_6635.jpg

6.6 MB

DEF CON 25 photo corps Viss DSC_6647.jpg

7.2 MB

DEF CON 25 photo corps Viss DSC_6687.jpg

6.2 MB

DEF CON 25 photo corps Viss DSC_6689.jpg

6.4 MB

DEF CON 25 photo corps Viss DSC_6719.jpg

6.1 MB

DEF CON 25 photo corps Viss DSC_6759.jpg

6.2 MB

DEF CON 25 photo corps Viss DSC_6820.jpg

5.9 MB

DEF CON 25 photo corps Viss DSC_6827.jpg

6.7 MB

DEF CON 25 photo corps Viss DSC_6866.jpg

6.5 MB

DEF CON 25 photo corps Viss DSC_6885.jpg

6.1 MB

DEF CON 25 photo corps Viss DSC_6888.jpg

6.0 MB

DEF CON 25 photo corps Viss DSC_6890.jpg

7.3 MB

DEF CON 25 photo corps Viss DSC_6894.jpg

6.8 MB

DEF CON 25 photo corps Viss DSC_6897.jpg

7.0 MB

DEF CON 25 photo corps Viss DSC_6904.jpg

5.9 MB

DEF CON 25 photo corps Viss DSC_6908.jpg

7.5 MB

DEF CON 25 photo corps Viss DSC_6909.jpg

4.9 MB

DEF CON 25 photo corps Viss DSC_6913.jpg

6.9 MB

DEF CON 25 photo corps Viss DSC_6914.jpg

6.1 MB

DEF CON 25 photo corps Viss DSC_6923.jpg

5.0 MB

DEF CON 25 photo corps Viss DSC_6931.jpg

7.0 MB

DEF CON 25 photo corps Viss DSC_6934.jpg

5.7 MB

DEF CON 25 photo corps Viss DSC_6935.jpg

5.1 MB

DEF CON 25 photo corps Viss DSC_6939.jpg

5.5 MB

DEF CON 25 photo corps Viss DSC_6940.jpg

6.7 MB

DEF CON 25 photo corps Viss DSC_6941.jpg

6.4 MB

DEF CON 25 photo corps Viss DSC_6946.jpg

5.8 MB

DEF CON 25 photo corps Viss DSC_6949.jpg

6.5 MB

DEF CON 25 photo corps Viss DSC_6952.jpg

6.3 MB

DEF CON 25 photo corps Viss DSC_6955.jpg

6.2 MB

DEF CON 25 photo corps Viss DSC_6968.jpg

5.5 MB

DEF CON 25 photo corps Viss DSC_6979.jpg

7.0 MB

DEF CON 25 photo corps Viss DSC_6990.jpg

7.1 MB

DEF CON 25 photo corps Viss DSC_6995.jpg

6.9 MB

DEF CON 25 photo corps Viss DSC_7016.jpg

6.4 MB

DEF CON 25 photo corps Viss DSC_7017.jpg

6.6 MB

DEF CON 25 photo corps Viss DSC_7018.jpg

6.8 MB

DEF CON 25 photo corps Viss DSC_7019.jpg

6.3 MB

DEF CON 25 photo corps Viss PICT0009.avi

18.9 MB

DEF CON 25 photo corps Viss dives.mov

24.1 MB

DEF CON 25 photo corps Viss floop.mov

23.3 MB

DEF CON 25 photo corps Viss vendor.mov

19.6 MB

/DEF CON 25 presentations/

DEF CON 25 - 0ctane-Untrustworthy-Hardware-UPDATED.pdf

5.9 MB

DEF CON 25 - 0ctane-Untrustworthy-Hardware.pdf

2.5 MB

DEF CON 25 - 5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects-WP.pdf

6.5 MB

DEF CON 25 - 5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects.pdf

11.2 MB

DEF CON 25 - Alvaro-Munoz-JSON-attacks-WP-UPDATED.pdf

680.9 KB

DEF CON 25 - Alvaro-Munoz-JSON-attacks.pdf

1.9 MB

DEF CON 25 - Alvaro-Munoz-and-Oleksandr-Mirosh-JSON-Attacks-UPDATED.pdf

19.7 MB

DEF CON 25 - Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf

3.1 MB

DEF CON 25 - Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf

7.3 MB

DEF CON 25 - Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf

2.7 MB

DEF CON 25 - Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf

3.3 MB

DEF CON 25 - Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf

31.4 MB

DEF CON 25 - Caleb-Madrigal-IOT-Hacking-With-SDR.pdf

4.5 MB

DEF CON 25 - Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus-WP.pdf

1.3 MB

DEF CON 25 - Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus.pdf

1.7 MB

DEF CON 25 - Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf

7.0 MB

DEF CON 25 - Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf

2.5 MB

DEF CON 25 - Christopher-Domas-Breaking-The-x86-ISA-UPDATED.pdf

17.5 MB

DEF CON 25 - Christopher-Domas-Breaking-The-x86-ISA.pdf

5.3 MB

DEF CON 25 - Cincvolflt-Inside-The-Meet-Desai-Attack.pdf

1.9 MB

DEF CON 25 - Closing-Slides.pdf

9.2 MB

DEF CON 25 - Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients-WP.pdf

1.1 MB

DEF CON 25 - Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients.pdf

2.3 MB

DEF CON 25 - Cooper-Quintin-The-Pregnancy-Panopticon-WP-UPDATED.pdf

646.4 KB

DEF CON 25 - Cooper-Quintin-and-Kashmir-Hill-The-Internet-Already-Knows-Im-Pregnant-UPDATED.pdf

4.1 MB

DEF CON 25 - Cory-Doctorow-Steps-Forward-Steps-Back-How-Can-We-Tell-If-We-Are-Winning-UPDATED.pdf

10.1 MB

DEF CON 25 - DEFCON-101-The-Panel-UPDATED.pdf

6.6 MB

DEF CON 25 - Damien-Cauquil-Weaponizing-the-BBC-MicroBit-UPDATED.pdf

3.0 MB

DEF CON 25 - Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf

2.3 MB

DEF CON 25 - Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf

7.2 MB

DEF CON 25 - Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf

818.5 KB

DEF CON 25 - Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-UPDATED.pdf

519.6 KB

DEF CON 25 - Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-WP.pdf

525.3 KB

DEF CON 25 - Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi.pdf

475.3 KB

DEF CON 25 - Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf

631.3 KB

DEF CON 25 - Dimitry-Snezhkov-Abusing-Web-Hooks-UPDATED.pdf

9.9 MB

DEF CON 25 - Dimitry-Snezhkov-Abusing-Web-Hooks.pdf

74.5 MB

DEF CON 25 - Dor-Azouri-BITSInject-WP.pdf

1.5 MB

DEF CON 25 - Dor-Azouri-BITSInject.pdf

847.8 KB

DEF CON 25 - Eckert-and-Dewes-Dark-Data-UPDATED.pdf

7.9 MB

DEF CON 25 - Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf

70.9 KB

DEF CON 25 - FuzzyNop-and-Ceyx-MEATPISTOL-A-Modular-Malware-Implant-Framework-UPDATED.pdf

4.8 MB

DEF CON 25 - Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf

2.1 MB

DEF CON 25 - Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf

1.8 MB

DEF CON 25 - Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf

7.8 MB

DEF CON 25 - Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf

5.8 MB

DEF CON 25 - Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud-UPDATED.pdf

2.5 MB

DEF CON 25 - Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf

2.5 MB

DEF CON 25 - Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe-UPDATED.pdf

4.3 MB

DEF CON 25 - Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf

4.2 MB

DEF CON 25 - Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery-UPDATED.pdf

2.9 MB

DEF CON 25 - Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf

2.9 MB

DEF CON 25 - Hanno-Boeck-Abusing-Certificate-Transparency-Logs-UPDATED.pdf

871.6 KB

DEF CON 25 - Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf

256.0 KB

DEF CON 25 - Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf

2.4 MB

DEF CON 25 - Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies-UPDATED.pdf

9.9 MB

DEF CON 25 - Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf

6.3 MB

DEF CON 25 - Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI-UPDATED.pdf

5.1 MB

DEF CON 25 - Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf

4.8 MB

DEF CON 25 - Ilja-van-Sprundel-BSD-Kern-Vulns-UPDATED.pdf

2.3 MB

DEF CON 25 - Ilja-van-Sprundel-BSD-Kern-Vulns.pdf

2.1 MB

DEF CON 25 - Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community-UPDATED.pdf

28.1 MB

DEF CON 25 - Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf

4.4 MB

DEF CON 25 - Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox-WP.pdf

1.4 MB

DEF CON 25 - Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox.pdf

7.4 MB

DEF CON 25 - Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks-UPDATED.pdf

3.5 MB

DEF CON 25 - Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf

4.4 MB

DEF CON 25 - Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf

11.1 MB

DEF CON 25 - Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf

4.4 MB

DEF CON 25 - Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent-UPDATED.pdf

2.6 MB

DEF CON 25 - Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf

2.3 MB

DEF CON 25 - Joe-Rozner-Wiping-Out-CSRF-UPDATED.pdf

133.4 KB

DEF CON 25 - Joe-Rozner-Wiping-Out-CSRF.pdf

134.6 KB

DEF CON 25 - Jon-Medina-Where-are-all-the-SDN-Talks-UPDATED.pdf

4.9 MB

DEF CON 25 - Josh-Pitts-Teaching-Old-Shellcode-New-Tricks-UPDATED.pdf

3.6 MB

DEF CON 25 - Josh-Pitts-Teaching-Old-Shellcode-New-Tricks.pdf

5.7 MB

DEF CON 25 - K2-Un-Fucking-Forensics-UPDATED.pdf

1.8 MB

DEF CON 25 - Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time-UPDATED.pdf

4.8 MB

DEF CON 25 - Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf

4.7 MB

DEF CON 25 - Konstantinos-Karagiannis-Hacking-Smart-Contracts-UPDATED.pdf

1.7 MB

DEF CON 25 - Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf

1.5 MB

DEF CON 25 - Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf

297.1 KB

DEF CON 25 - Macpherson-and-Temmingh-Finding-Useful-info-with-Maltego-UPDATED.pdf

40.8 MB

DEF CON 25 - Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms-UPDATED.pdf

3.1 MB

DEF CON 25 - Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf

3.1 MB

DEF CON 25 - Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf

60.0 MB

DEF CON 25 - Matt-Knight-and-Marc-Newlin-Radio-Exploitation-UPDATED.pdf

26.8 MB

DEF CON 25 - Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP-UPDATED.pdf

128.0 KB

DEF CON 25 - Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP.pdf

127.7 KB

DEF CON 25 - Matt-Knight-and-Marc-Newlin-Radio-Exploitation.pdf

26.3 MB

DEF CON 25 - Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-UPDATED.pdf

7.0 MB

DEF CON 25 - Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf

317.7 KB

DEF CON 25 - Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts.pdf

6.4 MB

DEF CON 25 - Matt-Wixey-See-No-Evil-Hear-No-Evil-UPDATED.pdf

6.2 MB

DEF CON 25 - Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf

6.3 MB

DEF CON 25 - Max-Bazaliy-Jailbreaking-Apple-Watch-UPDATED.pdf

5.0 MB

DEF CON 25 - Max-Bazaliy-Jailbreaking-Apple-Watch.pdf

1.3 MB

DEF CON 25 - Mickey-Jesse-and-Oleksander-Driving-Down-the-Rabbit-Hole-UPDATED.pdf

12.9 MB

DEF CON 25 - Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999-UPDATED.pdf

4.6 MB

DEF CON 25 - Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf

6.8 MB

DEF CON 25 - Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf

5.6 MB

DEF CON 25 - Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf

5.8 MB

DEF CON 25 - Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf

1.2 MB

DEF CON 25 - Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf

2.1 MB

DEF CON 25 - Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-UPDATED.pdf

2.0 MB

DEF CON 25 - Nathan-Seidle-Open-Source-Safe-Cracking-Robots-UPDATED.pdf

7.0 MB

DEF CON 25 - Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf

5.0 MB

DEF CON 25 - Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf

3.9 MB

DEF CON 25 - Omar-Eissa-Attacking-Autonomic-Networks-UPDATED.pdf

2.7 MB

DEF CON 25 - Omar-Eissa-Attacking-Autonomic-Networks.pdf

2.5 MB

DEF CON 25 - Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser in-Trending-Programming-Languages-UPDATED.pdf

5.4 MB

DEF CON 25 - Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf

6.2 MB

DEF CON 25 - Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf

2.0 MB

DEF CON 25 - Panel-Corman-and-Congressmen-DC-to-DEFCON-UPDATED.pdf

6.3 MB

DEF CON 25 - Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools-UPDATED.pdf

13.0 MB

DEF CON 25 - Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf

4.7 MB

DEF CON 25 - Patrick-Wardle-Death-by-1000-Installers-on-MacOS-UPDATED.pdf

30.7 MB

DEF CON 25 - Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly-UPDATED..pdf

16.1 MB

DEF CON 25 - Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf

8.8 MB

DEF CON 25 - Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-UPDATED.pdf

6.3 MB

DEF CON 25 - Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-WP.pdf

395.7 KB

DEF CON 25 - Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally.pdf

3.8 MB

DEF CON 25 - Plore-Popping-a-Smart-Gun-UPDATED.pdf

4.4 MB

DEF CON 25 - Plore-Popping-a-Smart-Gun.pdf

4.3 MB

DEF CON 25 - Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf

7.0 MB

DEF CON 25 - Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf

7.2 MB

DEF CON 25 - Redezem-PEIMA-Using-Power-Laws-to-Address-DOS-Attacks-UPDATED.pdf

768.8 KB

DEF CON 25 - Roger-Dingledine-Next-Generation-Tor-Onion-Services-UPDATED.pdf

2.5 MB

DEF CON 25 - Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf

2.3 MB

DEF CON 25 - Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf

1.4 MB

DEF CON 25 - Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf

2.6 MB

DEF CON 25 - Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf

5.5 MB

DEF CON 25 - Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf

2.1 MB

DEF CON 25 - Sean-Kanuck-Hacking-Democracy-UPDATED.pdf

178.8 KB

DEF CON 25 - Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android-UPDATED.pdf

921.3 KB

DEF CON 25 - Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf

933.5 KB

DEF CON 25 - Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-UPDATED.pdf

10.5 MB

DEF CON 25 - Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-WP.pdf

168.7 KB

DEF CON 25 - Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House.pdf

6.6 MB

DEF CON 25 - Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation-UPDATED.pdf

3.8 MB

DEF CON 25 - Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf

6.3 MB

DEF CON 25 - Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf

7.1 MB

DEF CON 25 - Svea-Eckert-Andreas-Dewes-Dark-Data.pdf

6.5 MB

DEF CON 25 - Tess-Schrodinger-Total-Recall.pdf

5.2 MB

DEF CON 25 - Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-UPDATED.pdf

15.5 MB

DEF CON 25 - Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf

2.1 MB

DEF CON 25 - Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf

21.7 MB

DEF CON 25 - Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf

3.5 MB

DEF CON 25 - Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf

2.0 MB

DEF CON 25 - Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf

2.3 MB

DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf

5.1 MB

DEF CON 25 - William-Knowles-Persisting-With-Microsoft-Office.pdf

2.9 MB

DEF CON 25 - Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-UPDATED.pdf

3.1 MB

DEF CON 25 - Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-WP.pdf

600.4 KB

DEF CON 25 - Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles.pdf

4.7 MB

DEF CON 25 - XlogicX-Assembly-Language-Is-Too-High-Level.pdf

7.9 MB

DEF CON 25 - Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf

5.8 MB

DEF CON 25 - Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf

1.7 MB

DEF CON 25 - Zardus-25-Years-of-Program-Analysis-UPDATED.pdf

3.9 MB

DEF CON 25 - chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf

44.7 MB

DEF CON 25 - chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf

5.3 MB

DEF CON 25 - r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf

3.4 MB

DEF CON 25 - skud-and-Sky-If-You-Give-A-Mouse-A-Microchip-UPDATED.pdf

6.1 MB

DEF CON 25 - skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf

6.1 MB

DEF CON 25 - spaceB0x-Exploiting-Continuous-Integration-UPDATED.pdf

2.8 MB

DEF CON 25 - spaceB0x-Exploiting-Continuous-Integration.pdf

2.1 MB

DEF CON 25 - trixr4skids-DOOMed-Point-of-Sale-Systems-UPDATED.pdf

22.7 MB

DEF CON 25 - zerosum0x0-alephnaught-Koadic-C3.pdf

2.0 MB

/Dimitry Snezhkov/octohook-master/

README.md

0.2 KB

octohook.py

4.2 KB

/Dimitry Snezhkov/octohook-master/config/

client.yml

1.9 KB

server.yml

1.9 KB

/Dimitry Snezhkov/octohook-master/doc/

requirements.txt

0.5 KB

/Dimitry Snezhkov/octohook-master/kcmd/

__init__.pyc

0.1 KB

cmdlook.py

1.4 KB

cmdservice.py

12.2 KB

/Dimitry Snezhkov/octohook-master/keys/

server.pem

3.1 KB

/Dimitry Snezhkov/octohook-master/klib/

__init__.py

0.0 KB

__init__.pyc

0.1 KB

configuration.py

1.3 KB

ghlib.py

3.7 KB

ghlib.pyc

4.0 KB

/Dimitry Snezhkov/octohook-master/ktasks/

__init__.py

0.0 KB

gtasks.py

2.4 KB

/Dimitry Snezhkov/octohook-master/kweb/

__init__.py

0.0 KB

__init__.pyc

0.1 KB

gitcommander.py

8.0 KB

webrouter.py

1.1 KB

webservice.py

3.8 KB

webservice.pyc

3.9 KB

/Dimitry Snezhkov/octohook-master/logs/

octohook_client.log

40.8 KB

octohook_server.log

9.1 KB

/Dimitry Snezhkov/octohook-master/templates/

execlocal.tmpl

0.2 KB

putlocal.tmpl

0.2 KB

/Dimitry Snezhkov/octohook-master/utils/

cr_cert.sh

0.1 KB

/Josh Pitts/

README.txt

0.1 KB

fido.py

173.6 KB

/Josh Pitts/parser-output/win10/

output.json

18.3 MB

/Josh Pitts/parser-output/win7/

output.json

6.5 MB

/Josh Pitts/parser-output/win8/

output.json

9.6 MB

/Josh Pitts/parser-output/winVista/

output.json

4.6 MB

/Josh Pitts/parser-output/winXP/

output.json

886.7 KB

/

DEF CON 25 program.pdf

17.1 MB

DEF CON 25 receipt.pdf

6.3 MB

DEF CON 25 welcome video.mp4

153.3 MB

/DEF CON 25 short story contest/

DEF CON 25 - 0tt3r-The-Denizens.txt

70.7 KB

DEF CON 25 - David-Cross-Ascension.txt

11.6 KB

DEF CON 25 - Don-Franke-Bricks.txt

23.0 KB

DEF CON 25 - Final-Phoenix-Chat-Witches.txt

28.9 KB

DEF CON 25 - InfosecDaemon-Just-The-Beginning.txt

16.3 KB

DEF CON 25 - Joe-Do-Clones-Dream-Of-Dolly.txt

48.7 KB

DEF CON 25 - Kellebrew-Polymorph.txt

55.2 KB

DEF CON 25 - Kelsi-Cornwell-Foxglove.txt

53.7 KB

DEF CON 25 - Lucaster-Players-Start.txt

5.3 KB

DEF CON 25 - MaxKennedy-Future-recruiter.txt

50.2 KB

DEF CON 25 - NRDavis-Resist-and-Disobey.txt

55.5 KB

DEF CON 25 - Nic-Lemon-Walk-With-Me.txt

22.1 KB

DEF CON 25 - n0ty3p-The-WWW.txt

19.1 KB

DEF CON 25 - technogizmo-Piggy-backing.txt

13.0 KB

DEF CON 25 - the-Wild-Altitude-Belonging.txt

38.0 KB

/DEF CON 25 video and slides/

DEF CON 25 - Conference - Macpherson and Temmingh - Uncovering useful and embarrassing info with Maltego.mp4

195.4 MB

DEF CON 25 - Conference - Macpherson and Temmingh - Uncovering useful and embarrassing info with Maltego.srt

63.6 KB

DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.mp4

133.7 MB

DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.srt

45.7 KB

DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel- Meet The Feds.srt

96.6 KB

DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.mp4

190.0 MB

DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.srt

59.0 KB

DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.mp4

177.1 MB

DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.srt

38.3 KB

DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.mp4

122.7 MB

DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.srt

29.7 KB

DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.mp4

143.7 MB

DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.srt

38.3 KB

DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.mp4

66.4 MB

DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.srt

26.3 KB

DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.mp4

64.2 MB

DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.srt

8.6 KB

DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.mp4

192.9 MB

DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.srt

53.6 KB

DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.mp4

209.6 MB

DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.srt

54.5 KB

DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set .mp4

177.4 MB

DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set .srt

63.4 KB

DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.mp4

143.0 MB

DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.srt

47.5 KB

DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.mp4

196.4 MB

DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward, TRUMPNUM steps back how can we tell if we're winning.srt

56.9 KB

DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.mp4

149.0 MB

DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.srt

35.0 KB

DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.mp4

159.2 MB

DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.srt

61.0 KB

DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.mp4

177.4 MB

DEF CON 25 Conference - Daniel Bohannon, Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.srt

62.6 KB

DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time .mp4

156.3 MB

DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time .srt

40.0 KB

DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.mp4

90.2 MB

DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.srt

27.3 KB

DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.mp4

68.7 MB

DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.srt

22.7 KB

DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.mp4

90.0 MB

DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.srt

24.1 KB

DEF CON 25 Conference - Dor Azouri - BITSInject.mp4

85.0 MB

DEF CON 25 Conference - Dor Azouri - BITSInject.srt

20.0 KB

DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.mp4

191.4 MB

DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.srt

50.1 KB

DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.mp4

121.5 MB

DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.srt

49.5 KB

DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.mp4

169.9 MB

DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.srt

59.9 KB

DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.mp4

194.7 MB

DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.srt

70.2 KB

DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.mp4

210.0 MB

DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.srt

56.5 KB

DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.mp4

162.5 MB

DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.srt

57.6 KB

DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.srt

39.0 KB

DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your named pipe.mp4

166.5 MB

DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.mp4

151.6 MB

DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.srt

47.3 KB

DEF CON 25 Conference - Hanno Bock - Abusing Certificate Transparency Logs.mp4

94.6 MB

DEF CON 25 Conference - Hanno Bock - Abusing Certificate Transparency Logs.srt

32.4 KB

DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.mp4

148.1 MB

DEF CON 25 Conference - Haoqi Shan, Jian Yuan - Man in the NFC.srt

33.0 KB

DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.mp4

497.5 MB

DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.srt

126.8 KB

DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.mp4

56.2 MB

DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.srt

22.9 KB

DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.mp4

213.8 MB

DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.srt

62.8 KB

DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.mp4

128.6 MB

DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.srt

55.8 KB

DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.mp4

154.3 MB

DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.srt

41.5 KB

DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.mp4

171.0 MB

DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.srt

54.1 KB

DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.mp4

105.1 MB

DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.srt

38.2 KB

DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.mp4

158.2 MB

DEF CON 25 Conference - Jason Hernandez and Sam Richards, Jerod MacDonald-Evoy - Tracking Spies in the Skies.srt

49.6 KB

DEF CON 25 Conference - Jason Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.mp4

102.6 MB

DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.mp4

226.2 MB

DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.srt

67.7 KB

DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.mp4

174.3 MB

DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.srt

49.4 KB

DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.mp4

98.8 MB

DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.srt

34.4 KB

DEF CON 25 Conference - Joe Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.mp4

181.8 MB

DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.mp4

188.4 MB

DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.srt

53.3 KB

DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.mp4

181.5 MB

DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.srt

57.4 KB

DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks-.mp4

176.4 MB

DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks-.srt

50.7 KB

DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.mp4

78.3 MB

DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.srt

24.7 KB

DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.mp4

162.1 MB

DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL, A Modular Malware Implant Framework.srt

49.1 KB

DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.srt

34.5 KB

DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.srt

60.8 KB

DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.mp4

56.7 MB

DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.srt

17.2 KB

DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.mp4

170.5 MB

DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.srt

52.1 KB

DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.mp4

95.4 MB

DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.srt

27.0 KB

DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.mp4

182.2 MB

DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.srt

49.9 KB

DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.mp4

159.4 MB

DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics, Same Exploits.srt

45.3 KB

DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.mp4

181.2 MB

DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.srt

58.7 KB

DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.mp4

172.7 MB

DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.srt

48.9 KB

DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.mp4

124.3 MB

DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.srt

35.6 KB

DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.mp4

182.5 MB

DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.srt

62.7 KB

DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.mp4

143.6 MB

DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.srt

49.7 KB

DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.mp4

143.0 MB

DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.srt

39.7 KB

DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.mp4

192.3 MB

DEF CON 25 Conference - Matt Wixey - See no evil, hear no evil - Hacking invisibly and silently with light and sound.srt

51.0 KB

DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.mp4

162.5 MB

DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.srt

38.7 KB

DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.mp4

132.6 MB

DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.srt

39.4 KB

DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.mp4

85.9 MB

DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.srt

23.8 KB

DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.srt

23.7 KB

DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS-iOS Kernel Debugging and Heap Feng Shui.mp4

114.6 MB

DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.mp4

131.7 MB

DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.srt

37.2 KB

DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.srt

54.7 KB

DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.mp4

123.9 MB

DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.srt

32.4 KB

DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.mp4

145.4 MB

DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.srt

49.4 KB

DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.mp4

60.7 MB

DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.srt

26.4 KB

DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.mp4

164.1 MB

DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.srt

40.2 KB

DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4

165.1 MB

DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.srt

33.5 KB

DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.mp4

129.9 MB

DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.srt

38.1 KB

DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS, it's all broken!.srt

60.9 KB

DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers_ on macOS and it's all broken!.mp4

171.5 MB

DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.mp4

90.1 MB

DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.srt

28.9 KB

DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.mp4

79.0 MB

DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.srt

26.8 KB

DEF CON 25 Conference - Philip Tully and Michael T Raggo - A Picture is Worth a Thousand Words and Literally.mp4

163.7 MB

DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words, Literally.srt

61.0 KB

DEF CON 25 Conference - Plore - Popping a Smart Gun.mp4

116.0 MB

DEF CON 25 Conference - Plore - Popping a Smart Gun.srt

50.3 KB

DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.mp4

112.0 MB

DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.srt

45.3 KB

DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.mp4

84.7 MB

DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.srt

26.5 KB

DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back - 212.srt

58.4 KB

DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.mp4

171.6 MB

DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.mp4

164.8 MB

DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.srt

59.3 KB

DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.mp4

71.8 MB

DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.srt

17.0 KB

DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.mp4

103.4 MB

DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.srt

28.5 KB

DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.mp4

194.8 MB

DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.srt

51.8 KB

DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.mp4

70.1 MB

DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.srt

16.1 KB

DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.mp4

167.3 MB

DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.srt

42.0 KB

DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.mp4

168.2 MB

DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.srt

57.5 KB

DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.mp4

139.1 MB

DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.srt

50.2 KB

DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.mp4

164.9 MB

DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.srt

45.5 KB

DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.mp4

130.6 MB

DEF CON 25 Conference - Steinthor Bjarnason, Jason Jones - The call is coming from inside the house.srt

40.8 KB

DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.mp4

119.6 MB

DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.srt

46.6 KB

DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.mp4

172.2 MB

DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.srt

41.2 KB

DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.mp4

170.5 MB

DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.srt

45.8 KB

DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.mp4

67.2 MB

DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.srt

18.2 KB

DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.mp4

366.4 MB

DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.srt

85.7 KB

DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.mp4

186.7 MB

DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.srt

57.1 KB

DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.mp4

137.7 MB

DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.srt

30.1 KB

DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.mp4

161.4 MB

DEF CON 25 Conference - Trey Forgety - Inside the “Meet Desai” Attack - Defending Distributed Targets from Distributed Attacks.srt

56.0 KB

DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.mp4

89.2 MB

DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.srt

41.6 KB

DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.mp4

497.6 MB

DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.srt

163.4 KB

DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.mp4

163.6 MB

DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.srt

54.8 KB

DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.mp4

184.6 MB

DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick, Tick, Tick.Boom You're Dead - Tech and the FTC.srt

54.7 KB

DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.mp4

78.9 MB

DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.srt

24.4 KB

DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.mp4

197.9 MB

DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.srt

62.0 KB

DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.mp4

203.3 MB

DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.srt

55.1 KB

DEF CON 25 Conference - Yuwue Zheng and Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB.mp4

158.1 MB

DEF CON 25 Conference - Yuwue Zheng and Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB.srt

28.0 KB

DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.mp4

179.3 MB

DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.srt

70.0 KB

DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.mp4

155.8 MB

DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.srt

51.8 KB

DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.mp4

143.6 MB

DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.srt

51.0 KB

/DEF CON 25 villages/

DEF CON 25 BioHacking Village - Amanda Plimpton and Evan Anderson - Psychoactive Chemicals in Combat.mp4

119.2 MB

DEF CON 25 BioHacking Village - Amirs Panel - Ethics in BioHacking.mp4

262.5 MB

DEF CON 25 BioHacking Village - C00p3r - Dangerous Minds Podcast - Celebrating 100th Episode.mp4

163.6 MB

DEF CON 25 BioHacking Village - C00p3r and Cur50r - Implantable Technology Show and Tell.mp4

81.3 MB

DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing The Secure Deployment Of Medical Devices.mp4

88.6 MB

DEF CON 25 BioHacking Village - Dr Stanislav Naydin - Vlad Gostomelsky - Medical Device Ethics and Security.mp4

113.2 MB

DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Path Badly.mp4

92.2 MB

DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides - Smart Drugs 4-Minute Mile.mp4

93.3 MB

DEF CON 25 BioHacking Village - Jay Radcliffe - How to use the Scientific Method in Security Research.mp4

236.3 MB

DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Die.mp4

76.7 MB

DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt - Blockchain and The Hope for Healthcare.mp4

40.4 MB

DEF CON 25 BioHacking Village - Jun Axup - The Brave New Worl of Bio-Entrepreneurship.mp4

73.8 MB

DEF CON 25 BioHacking Village - Kevin Sacco - Tales of A Healthcare Hacker.mp4

112.9 MB

DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and Regulation.mp4

49.5 MB

DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities.mp4

106.5 MB

DEF CON 25 BioHacking Village - RenderMan - Murdoch Monkey - Hacking The Internet of Dongs.mp4

85.3 MB

DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO.mp4

45.6 MB

DEF CON 25 BioHacking Village - Ryan Schmoll and Peter Hefley - Trigraph- An Ethereum-based Teleradiology Application.mp4

95.8 MB

DEF CON 25 BioHacking Village - Tess Scrodinger - Total Recall- Implicit Learning As A Cryptographic Primitive.mp4

86.5 MB

DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of Biohacking.mp4

79.0 MB

DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic Code Using Information Theory.mp4

75.5 MB

DEF CON 25 BioHacking Village - Trevor Goodman - Hack Your Senses - Sensory Augementation and Brain Plasticity.mp4

100.7 MB

DEF CON 25 BioHacking Village -Szkatulski and Lawless- How Your Doctor Might Be Trying To Kill You-How Personal Genomics Can Save Your Life.mp4

106.5 MB

DEF CON 25 Car Hacking Village - Badge Life - DEFCON Unofficial Badges Panel.mp4

217.6 MB

DEF CON 25 Car Hacking Village - Corey Theun - Heavy Truck and Electronic Logging Devices- What Could Go Wrong.mp4

42.0 MB

DEF CON 25 Car Hacking Village - Duncan Woodbury - Nocholas Haltmeyer - Linux-Stack Based V2X Framework.mp4

39.0 MB

DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - Don - An Introduction to AUTOSAR Secure Onbaord Communication.mp4

66.5 MB

DEF CON 25 Car Hacking Village - Justin Montalbano and Bryan Gillispie and David Connett- Attacking Wireless Interfaces in Vehicles.mp4

88.2 MB

DEF CON 25 Car Hacking Village - Sameer Dixit - Vlad Gostomelsky - Abusing Smart Cars with QR Codes.mp4

36.8 MB

DEF CON 25 Car Hacking Village - Sheila Ayelen Berta - Claudio Caracciolo - The Bicho- An Advanced Car Backdoor Maker.mp4

78.4 MB

DEF CON 25 Car Hacking Village - Tim b1tbane - Mitch Johnson ehntoo - That's No Car- Its a Network.mp4

101.3 MB

DEF CON 25 Car Hacking Village - Vlad Gostomelsky - GPS System Integrity.mp4

19.8 MB

DEF CON 25 Car Hacking Village - Weston Hecker - Grand Theft Radio- Stopping SDR Relay Attacks on PKES.mp4

32.4 MB

DEF CON 25 Crypto and Privacy Village - Alisha Kloc - Privacy is Not An Add-On- Designing for Privacy from the Ground Up.mp4

36.8 MB

DEF CON 25 Crypto and Privacy Village - Andrew Brandt - SSL Visibility Revisted- A Year In Privacy Improvements For Encrypted Communications.mp4

42.1 MB

DEF CON 25 Crypto and Privacy Village - David Huerta - Alice and Bob are Slightly Less Confused.mp4

27.3 MB

DEF CON 25 Crypto and Privacy Village - David Wong - SHA-3 vs The World.mp4

62.1 MB

DEF CON 25 Crypto and Privacy Village - Evgeny Sidorov - Yet Another Password Hashing Talk.mp4

37.3 MB

DEF CON 25 Crypto and Privacy Village - J0n J4rv1s - The Surveillance Capitalism Will Continue Until Morale Improves.mp4

72.0 MB

DEF CON 25 Crypto and Privacy Village - Jake Williams -The Symantec SSL Debacle Lessons Learned and Future Steps.mp4

70.7 MB

DEF CON 25 Crypto and Privacy Village - Joel Wallenstrom - Robby Mook - Time to Start Wearing Tin-Foil Hats Following the 2016 Electrions.mp4

271.9 MB

DEF CON 25 Crypto and Privacy Village - Joseph Birr-Pixton - Rustls - Modern Fast Safer TLS.mp4

38.5 MB

DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace.mp4

56.2 MB

DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has My Snoopy Boyfriend Privacy Within A Relationship.mp4

208.7 MB

DEF CON 25 Crypto and Privacy Village - Lee Brotherston - Blue Team TLS Hugs.mp4

32.2 MB

DEF CON 25 Crypto and Privacy Village - Mark Mager - Cryptanalysis in the Time of Ransomware.mp4

45.4 MB

DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty Computation.mp4

25.4 MB

DEF CON 25 Crypto and Privacy Village - Punky Duero - The Key Management Facility of The Root DNSSEC Key Signing Key.mp4

60.8 MB

DEF CON 25 Crypto and Privacy Village - Ryan Lackey - Cypherpunks History.mp4

19.0 MB

DEF CON 25 Crypto and Privacy Village - Scott Arciszewski - The How and Why for Secure Automatic Patch Management.mp4

27.3 MB

DEF CON 25 Crypto and Privacy Village - Shea Nangle - Operational Security Lessons From The Dark Web.mp4

27.0 MB

DEF CON 25 Crypto and Privacy Village - Tomas Susanka - Security Analysis of the Telegram IM.mp4

24.4 MB

DEF CON 25 Crypto and Privacy Village - Trey Forgety - Protecting User Privacy in a Location-Critical Enterprise- The Challenges of 9-1-1 Location.mp4

247.1 MB

DEF CON 25 Hardware Hacking Village - Cesare Pizzi - Ardusploit - Proof of concept for Arduino code injection.mp4

70.2 MB

DEF CON 25 Hardware Hacking Village - Gigs Taggart - What is Ground- Baby don't hurt me.mp4

39.3 MB

DEF CON 25 Hardware Hacking Village - Joe hwhxr - Hardware Hacking- Old Sk00l and New Sk00l.mp4

57.6 MB

DEF CON 25 Hardware Hacking Village - John Dunlap - A tangle of Plastic Spaghetti-A Look Into the Security of 3D Printers.mp4

41.4 MB

DEF CON 25 ICS Village - Arnaud Soullie - Fun with Modbus 0x5a - Nothing New Still Relevant.mp4

21.6 MB

DEF CON 25 ICS Village - Blake Johnson - Dissecting Industrial Wireless Implementations.mp4

27.5 MB

DEF CON 25 ICS Village - Bryson Bort and Atlas - Grid Insecurity - and How to Really Fix This Shit.mp4

87.1 MB

DEF CON 25 ICS Village - Chris Sistrunk - What's the DFIRence for ICS.mp4

43.1 MB

DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices.mp4

56.8 MB

DEF CON 25 ICS Village - Thomas Brandsetter - In Security in Building Automation - How to Create Dark Buildings with Light Speed.mp4

42.3 MB

DEF CON 25 Internet of Things Village - Aaron Alva - Mark Eichorn - IoT Updates to Help Protect Consumers.mp4

123.5 MB

DEF CON 25 Internet of Things Village - Aaron Guzman - Hide Yo Keys- Hide Yo Car.mp4

73.0 MB

DEF CON 25 Internet of Things Village - Alex Jay Balan - IoT - The Gift That Keeps on Giving.mp4

150.0 MB

DEF CON 25 Internet of Things Village - Andrew Tierney - Ken Munro - IoT- From DVRs to Dildos.mp4

147.6 MB

DEF CON 25 Internet of Things Village - Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard.mp4

177.4 MB

DEF CON 25 Internet of Things Village - Dan Regalado - Inside the Alaris Infusion Pump, not too much medication por favor.mp4

45.5 MB

DEF CON 25 Internet of Things Village - Deral Heiland - The Internet of Vulnerabilities.mp4

120.9 MB

DEF CON 25 Internet of Things Village - Rick Ramgattie - IoT Village Keynote - Friends Not Foes- Rethinking the Researcher-Vendor Relationship.mp4

30.2 MB

DEF CON 25 Internet of Things Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale - IIDS- An IoT Intrusion Detection System.mp4

199.6 MB

DEF CON 25 Internet of Things Village - Vladimir Dashchenko and Sergey Temnikov - Pwning the Industrial IoT- RCEs and backdoors are around.mp4

47.0 MB

DEF CON 25 Lockpick Village - TOOOL STAFF MEMBER Dr. Tran - TOOOL Lockpicking Talk Number 1.mp4

41.4 MB

DEF CON 25 Packet Hacking Village - Ankur Tyagi - Visual Network and File Forensics.mp4

54.4 MB

DEF CON 25 Packet Hacking Village - Catherine Ullman - Chris Roberts - When the Current Ransomware and Payload of the Day CRAP of the day Hits the Fan.mp4

105.8 MB

DEF CON 25 Packet Hacking Village - Chris Wysopal - Opening Ceremony - How Hackers Changed The Security Industry.mp4

114.5 MB

DEF CON 25 Packet Hacking Village - Damon Small - Layer 8 and Why People are the Most Important Security Tool.mp4

55.3 MB

DEF CON 25 Packet Hacking Village - Daniel Adinolfi - Anthony Singleton - CVE IDs and How to Get Them.mp4

70.9 MB

DEF CON 25 Packet Hacking Village - Eric Capuano - Fortune 100 InfoSec on a State Government Budget.mp4

101.4 MB

DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop Scenarios By Building An Incident Response Simulation Platform.mp4

146.1 MB

DEF CON 25 Packet Hacking Village - Gabriel Ryan - The Black Art of Wireless Post-Exploitation.mp4

213.4 MB

DEF CON 25 Packet Hacking Village - Gilberto Bertin - Past Present and Future of High Speed Packet Filtering on Linux.mp4

27.1 MB

DEF CON 25 Packet Hacking Village - Gita Ziabari - Yalda Automated Bulk Intelligence.mp4

99.7 MB

DEF CON 25 Packet Hacking Village - Leah Figueroa - Iron Sights for Your Data.mp4

18.2 MB

DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing- What Is It How It Allows Largest Attacks and How to Fix It.mp4

71.0 MB

DEF CON 25 Packet Hacking Village - Megan Roddy - Strenthen Your Secops Team By Leveraging Neurodiversity.mp4

34.9 MB

DEF CON 25 Packet Hacking Village - Michael Gianarakis and Keith Lee - Portia - Finding Your Way to Domain Access.mp4

117.4 MB

DEF CON 25 Packet Hacking Village - Mike Raggo and Chet Hosmer - Covert TCP with a Twist.mp4

125.9 MB

DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Change of Persistence- AWS Post Compromise Primer.mp4

41.9 MB

DEF CON 25 Packet Hacking Village - Rodolfo Assis - XSS For the win.mp4

20.9 MB

DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach, WTF Really Happened.mp4

126.8 MB

DEF CON 25 Packet Hacking Village - Sam Erb - Youre Going to Connect to the Wrong Domain Name.mp4

19.0 MB

DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot- Mum Tons of WannaCry and Evils Attacked Our Home.mp4

90.8 MB

DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound- Deceiving Doman Admin Hunters.mp4

133.6 MB

DEF CON 25 Packet Hacking Village - Vivek Ramachandran - Thomas dOtreppe - Make Your Own 80211 ac Monitoring Hacker Gadget.mp4

147.2 MB

DEF CON 25 Recon Village - Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story.mp4

57.9 MB

DEF CON 25 Recon Village - Andrew Hay - An Introduction to Graph Theory for OSINT.mp4

43.9 MB

DEF CON 25 Recon Village - Anthony Russell - Building Google For Criminal Enterprises.mp4

52.2 MB

DEF CON 25 Recon Village - Dakota Nelson - Total Recoll.mp4

13.6 MB

DEF CON 25 Recon Village - Guillermo Buendia and Yael Basurto Esquivel - How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches.mp4

31.5 MB

DEF CON 25 Recon Village - Inbar Raz - Do Tinder Bots Dream of Electric Toys- How Tinder Bots are Breaking Hearts All Over The World.mp4

46.3 MB

DEF CON 25 Recon Village - Jason Haddix - Domain Discovery - Expanding Your Scope Like A Boss.mp4

58.0 MB

DEF CON 25 Recon Village - Jonathan Cran - Attack Surface Discovery With Intrigue.mp4

72.1 MB

DEF CON 25 Recon Village - Kunal Aggarwal - DataSploit Open Source Assistant for OSINT.mp4

52.4 MB

DEF CON 25 Recon Village - Leah Figueroa - FERPA- Only Your Grades Are Safe - OSINT In Higher Education.mp4

30.2 MB

DEF CON 25 Recon Village - Mikhail Sasonkin - Up Close and Personal - Keeping an Eye On Mobile Applications.mp4

22.7 MB

DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and Profit - How To Hide From The FBI.mp4

102.4 MB

DEF CON 25 Recon Village - Shane MacDougal - Keynote - Seeing is Believing - The Future of Recon- You Won't Believe What Happens Next.mp4

68.6 MB

DEF CON 25 Recon Village - Simon Roses - OSINT Tactics on Source Code and Developers.mp4

168.7 MB

DEF CON 25 Recon Village - TBD - Winner Announcement Prize Distribution.mp4

66.9 MB

DEF CON 25 Recon Village - Tracy Z. Maleeff - Into the Bird's Nest- A Comprehensive Look at Twitter as a Research Tool.mp4

59.6 MB

DEF CON 25 Recon Village - Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon - Collecting Evidence Like a Robot.mp4

41.5 MB

DEF CON 25 Rootz Asylum - Alex Stamos- CSO- Facebook.mp4

71.3 MB

DEF CON 25 Rootz Asylum - Aron Rosenberg and Aaron Standridge - Hacking an Insecure WiFi Camera.mp4

45.1 MB

DEF CON 25 Rootz Asylum - Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer.mp4

34.8 MB

DEF CON 25 Rootz Asylum - Cory Doctorow - You are not a Digital Native and thats OK.mp4

99.8 MB

DEF CON 25 Rootz Asylum - Crash - Nerfherder - A Brief Message From Security.mp4

31.2 MB

DEF CON 25 Rootz Asylum - David Weinman - Introduction To Cheat Engine.mp4

83.5 MB

DEF CON 25 Rootz Asylum - Deviant - Home Depot and A Plan of Attack for Hackers.mp4

34.4 MB

DEF CON 25 Rootz Asylum - EFF - Nic0 - Opening Ceremonies- A Place Where Kids Learn White-Hat Hacking to Better The World.mp4

47.8 MB

DEF CON 25 Rootz Asylum - Erin Owens - Hacking & Robotics v2 point 0.mp4

69.5 MB

DEF CON 25 Rootz Asylum - Erin Owens - Sujeet Bambale - Justin Whitehead - Chris Kiggins - Abby - Duncan -  Drone Wars.mp4

106.9 MB

DEF CON 25 Rootz Asylum - Leonard Bailey - Everything You Need To Know About The U.S. Department of Justice.mp4

57.6 MB

DEF CON 25 Rootz Asylum - Patrick McCanna - Tips for Internet Privacy at College.mp4

61.6 MB

DEF CON 25 Rootz Asylum - Rsnake - Robert Hansen - Searching The Invisible Internet.mp4

32.0 MB

DEF CON 25 Rootz Asylum - Tarah - Mansion Apartment Shack House- How To Explain Crypto To Practically Anyone.mp4

42.0 MB

DEF CON 25 Social Engineering Village - Billy Boatright - Nor Lose The Common Touch.mp4

152.2 MB

DEF CON 25 Social Engineering Village - Brent White and Tim Roberts - Skills For A Red-Teamer.mp4

205.3 MB

DEF CON 25 Social Engineering Village - Chris Hadnagy - SE vs Predator- Using Social Engineering In Ways I Never Thought.mp4

103.5 MB

DEF CON 25 Social Engineering Village - Fahey Owens - Beyond Phishing - Building and Sustaining a Corporate SE Program.mp4

65.8 MB

DEF CON 25 Social Engineering Village - Helen Thackray - Hackers Gonna Hack - But Do They Know Why.mp4

62.5 MB

DEF CON 25 Social Engineering Village - Jayson Street - Strategies on Securing Your Banks and Enterprises-From Someone Who Robs Banks and Enterprises.mp4

224.5 MB

DEF CON 25 Social Engineering Village - John Nye - The Human Factor - Why Are We So Bad at Security and Risk Assessment.mp4

178.1 MB

DEF CON 25 Social Engineering Village - Keith Conway - Cameron Craig - Change Agents- How to Effectively Influence Intractable Corporate Cultures.mp4

157.6 MB

DEF CON 25 Social Engineering Village - Michele Fincher - Are You Killing Your Security Program Mostly Dead is Slightly Alive.mp4

142.9 MB

DEF CON 25 Social Engineering Village - Robert Wood - Thematic Social Engineering- Making SE Work at Scale.mp4

46.8 MB

DEF CON 25 Social Engineering Village - Tyler Rosonke - Social Engineering With Web Analytics.mp4

62.1 MB

DEF CON 25 Social Engineering Village - Yaiza Rubio and Félix Brezo - Heavy Diving For Credentials- Towards An Anonymous Phishing.mp4

68.3 MB

DEF CON 25 Voting Village - Panel - Jake Braun - Securing the Election Office- A Local Response to a Global Threat.mp4

146.1 MB

DEF CON 25 Voting Village - Barbara Simons - David Jefferson - An Election System is Much More Than the Voting Machine or The Booth.mp4

145.8 MB

DEF CON 25 Voting Village - General Douglas Lute - What are the national security implications of cyber attacks on our voting systems.mp4

167.7 MB

DEF CON 25 Voting Village - Harri Hursti - Brief history of election machine hacking and lessons learned.mp4

36.4 MB

DEF CON 25 Voting Village - Joseph Hall - Election Hacking- Legal Considerations from the Civil Side.mp4

38.9 MB

DEF CON 25 Voting Village - Mary Brady and Josh Franklin - The State of US Voting System Security.mp4

68.1 MB

DEF CON 25 Voting Village - Matt Blaze - How did we get here- A history of voting technology, hanging chads, and the Help America Vote Act.mp4

73.8 MB

DEF CON 25 Voting Village -Joseph Hall and David Jefferson - Common Misconceptions and False Parallels about Voting Technology.mp4

59.3 MB

DEF CON 25 Wifi Village - Aardvark - Darkmatter - WIGLE Like You Mean It- Maximizing Your Wardriving Experience.mp4

191.6 MB

DEF CON 25 Wifi Village - Alexander Zakarov - Large Scale Wireless Monitoring - KISMET Packet Sniffer On A Multi-Radio Array.mp4

73.3 MB

DEF CON 25 Wifi Village - Andrew Strutt - POCSAG Amateur Pager Network.mp4

59.9 MB

DEF CON 25 Wifi Village - Andrew Strutt - Suitcase Repeater Build for UHF - 70cm.mp4

65.1 MB

DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World- Software Defined Radio Exploits.mp4

285.7 MB

DEF CON 25 Wifi Village - Eric Escobar - SecureWorks- SDR Replay Attacks- Against Home Security Systems.mp4

27.8 MB

DEF CON 25 Wifi Village - Matt Blaze - Sandy Clark - Travis Goodspeed - Perry Metzger - Zach Wasserman - Kevin Xu - DYI NSA On The Cheap.mp4

253.3 MB

DEF CON 25 Wifi Village - Nick Delewski - Failsafe- Yet Another SimpliSafe Attack Vector.mp4

66.8 MB

DEF CON 25 Wifi Village - Robert Ghilduta - Designing An Automatic Gain Control.mp4

92.0 MB

DEF CON 25 Wifi Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale - Deceptacon Wi-Fi Deception Under 5 Dollars.mp4

90.0 MB

DEF CON 25 Wifi Village - Woody - Tim Kuester - GODUMPiNG packet sniffing the Gotenaa.mp4

218.7 MB

/.../Carlos Perez - Principals on Leveraging PowerShell for Red Teams-UPDATED/

DEF CON 25 - Workshop-Carlos-Perez-Leveraging-PowerShell-Basics-UPDATED.pdf

4.8 MB

/.../Carlos Perez - Principals on Leveraging PowerShell for Red Teams-UPDATED/Extras-UPDATED/

LICENSE

1.5 KB

README.md

0.1 KB

/.../Carlos Perez - Principals on Leveraging PowerShell for Red Teams-UPDATED/Extras-UPDATED/Source Files/

COM Objects.ps1

0.4 KB

MOF_Example_InstalledSoftware.ps1

1.9 KB

Macro.vba

0.7 KB

WMI Event Types.ps1

2.2 KB

WMI_Associations.ps1

0.9 KB

WMI_Event_Examples.ps1

10.0 KB

WMI_Helper_Functions.psq.ps1

3.4 KB

adsecurity.ps1

0.8 KB

basics_commands.ps1

0.6 KB

basics_help.ps1

0.5 KB

basics_objects.ps1

0.5 KB

basics_pipeline.ps1

3.0 KB

basics_pssnapin_modules.ps1

0.0 KB

basics_variables.ps1

1.2 KB

cradles.ps1

1.5 KB

/DEF CON 25 workshops/

DEF CON 25 - Carlos-Perez-Leveraging-PowerShell-Basics.pdf

1.1 MB

DEF CON 25 - Carlos-Perez-Leveraging-PowerShell.pdf

4.8 MB

DEF CON 25 - Carlos-Perez-Leveraging-Powershell-Lab-Manual-Basics.pdf

890.2 KB

DEF CON 25 - Carlos-Perez-Leveraging-Powershell-Lab-Manual.pdf

469.5 KB

DEF CON 25 - Workshop-Abhay-Bhargav-Building-AppSec-Automation-With-Python.pdf

1.1 MB

DEF CON 25 - Workshop-Adam-Steed-Attacking-Active-Directory-and-Advanced-Methods-of-Defense.pdf

5.2 MB

DEF CON 25 - Workshop-Aditya-Gupta-BLE-Exploitation-for-IoT-devices.pdf

1.5 MB

DEF CON 25 - Workshop-Alan-Orlikoski-and-Dan-M-Free-and-Easy-DFIR-Triage-for-Everyone.pdf

3.1 MB

DEF CON 25 - Workshop-Alan-Orlikoski-and-Dan-Moor-Free-and-Easy-DFIR-Triage-for-Everyone-UPDATED.pdf

12.8 MB

DEF CON 25 - Workshop-Anshuman-Bhartiya-Harnessing-the-Power-of-Docker-and-Kubernetes-Handout.pdf

174.5 KB

DEF CON 25 - Workshop-Anshuman-Bhartiya-Harnessing-the-Power-of-Docker-and-Kubernetes.pdf

75.5 KB

DEF CON 25 - Workshop-Bryan-Passifiume-and-Richard-Henderson-Scanning-The-Airwaves.pdf

1.6 MB

DEF CON 25 - Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country-UPDATED.pdf

1.5 MB

DEF CON 25 - Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country.pdf

3.4 MB

DEF CON 25 - Workshop-Clarence-Chio-and-Anto-Joseph-Pwning-Machine-Learning-Systems.pdf

1.4 MB

DEF CON 25 - Workshop-Craig-Young-Brainwashing-Embedded-Systems-UPDATED.pdf

60.3 MB

DEF CON 25 - Workshop-DazzleCat-Duo-Intro-To-Disassembly.pdf

2.1 MB

DEF CON 25 - Workshop-Eijah-Subverting-Privacy-Exploitation-Using-HTTP-UPDATED.PDF

1.1 MB

DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf

2.1 MB

DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf

1.8 MB

DEF CON 25 - Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf

7.8 MB

DEF CON 25 - Workshop-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation.pdf

5.8 MB

DEF CON 25 - Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf

452.0 KB

DEF CON 25 - Workshop-Ruben-Boobeb-UAC-0day-All-Day.pdf

7.6 MB

DEF CON 25 - Workshop-Sean-Dillion-and-Zachary-Harding-Exploitation-Malware-Forward-Engineering.pdf

3.8 MB

DEF CON 25 - Workshop-Sergei-Frankoff-and-Sean-Wilson-Malware-Triage-Workshop-Malscripts-Are-The-New-EK.pdf

3.7 MB

DEF CON 25 - Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Client-and-Tester-Security-WP.pdf

247.0 KB

DEF CON 25 - Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Client-and-Tester-Security.pdf

12.4 MB

DEF CON 25 - Workshop-stryngs-Jack64-and-zero-x-Build-your-stack-with-Scapy.pdf

4.4 MB

/.../Jack Mott and Jason Williams - Practical Network Signature Development For Open Source IDS/

DEF CON 25 - Workshop-Mott-Williams-Practical-Network-Signature-Development-For-Open-Source-IDS-Workbook.pdf

190.1 KB

DEFCON-25-Workshop-Jack-Mott-Jason-Williams-Practical-Network-Signature-Development-For-Open-Source-IDS.pdf

10.5 MB

DEFCON-25-Workshop-Jack-Mott-Jason-Williams-Practical-Network-Signature-Development-For-Open-Source-IDS.pdf.gz.filepart

9.7 MB

DEFCON-25-Workshop-Mott-Williams-Practical-Network-Signature-Development-For-Open-Source-IDS-Workbook.pdf.gz.filepart

173.6 KB

/.../Jack Mott and Jason Williams - Extras/

BSLV-DC-SIGDEV.ova

4.8 GB

/.../Stryngs Jack64 and zero x - Build your Stack with Scapy/

DEF CON 25 - Workshop-Stryngs-Jack64-and-zero-x-Build-your-stack-with-Scapy-Readme.txt

0.9 KB

DEF CON 25 - Workshop-Stryngs-Jack64-and-zero-x-Build-your-stack-with-Scapy-UPDATED.pdf

33.0 MB

/.../Scapy-DC25-Master/OOBackdoor-Detection/

detect_lvl0.py

0.5 KB

detect_lvl0_live.py

0.6 KB

detect_lvl1.py

0.6 KB

/.../Scapy-DC25-Master/OOBackdoor/

LICENSE

1.1 KB

OOBackdoorClient.py

16.6 KB

OOBackdoorServer.py

13.7 KB

README.md

0.9 KB

clientmacs

24.6 KB

nmap-mac-prefixes

565.3 KB

servermacs

31.0 KB

/.../Scapy-DC25-Master/

PASSWORDs

0.1 KB

README.md

0.9 KB

demo-1.py

7.3 KB

demo-2.py

1.9 KB

demo-2_bonus.py

0.8 KB

/.../Repositories of Code that are useful/

pbkdf2-1.3.tar.gz

6.4 KB

pycryptodomex-3.4.5.tar.gz

6.5 MB

rc4-0.1.tar.gz

1.1 KB

scapy-2.3.3.tgz

1.4 MB

scapy_2.2.0.orig.tar.gz

973.0 KB

/.../Scapy-DC25-Master/Utils/

geolocate-pcap.py

1.4 KB

/.../Scapy-DC25-Master/Utils/port-knocking/

knocker.py

0.4 KB

port-knocking-backdoor.py

2.4 KB

/.../Scapy-Video-Demos-DC25-Media/

README.md

0.1 KB

demo-1.mp4

180.7 MB

demo-1_addendum.mp4

11.0 MB

/DEF CON 25 x-hour film contest/

Finalist A.mp4

117.4 MB

Finalist B.mp4

195.4 MB

Finalist C.mp4

354.6 MB

Pacin Heat Alexis Park 1.mp4

153.9 MB

 

Total files 2910


Copyright © 2025 FileMood.com