/.../DEF CON 25 music cd flac/
|
01 - Skittish and Bus - DEF CON Is Canceled.flac
|
29.4 MB
|
02 - Laughing Mantis - Machines of Loving Disgrace.flac
|
43.4 MB
|
03 - Information Society - The Prize (Kain & Arvy House Radio Remix).flac
|
33.6 MB
|
04 - Zebbler Encanti Experience - Infinite Absence VIP (featuring Ganavya).flac
|
31.1 MB
|
05 - JG And The Robots - I Am One.flac
|
29.9 MB
|
06 - Bioassay - The Signal.flac
|
27.6 MB
|
07 - Moderns - Order.flac
|
31.2 MB
|
08 - Left-Right - Sunspot.flac
|
35.8 MB
|
09 - Ninjula - Livewire.flac
|
38.0 MB
|
10 - Richard Cheese and Lounge Against The Machine - The Friday Song.flac
|
20.1 MB
|
11 - The TroubleShooters - shutdown -h now.flac
|
21.2 MB
|
12 - MC Frontalot - Zero Day.flac
|
33.5 MB
|
13 - Lavos - I Am The Storm (Swat Me) (featuring YTCracker).flac
|
26.4 MB
|
14 - Dual Core - Regular Expressions.flac
|
29.0 MB
|
DEF CON 25 Music CD README.txt
|
1.0 KB
|
/.../DEF CON 25 music cd opus/
|
01 - Skittish and Bus - DEF CON Is Canceled.opus
|
15.1 MB
|
02 - Laughing Mantis - Machines of Loving Disgrace.opus
|
22.5 MB
|
03 - Information Society - The Prize (Kain & Arvy House Radio Remix).opus
|
13.1 MB
|
04 - Zebbler Encanti Experience - Infinite Absence VIP (featuring Ganavya).opus
|
17.8 MB
|
05 - JG And The Robots - I Am One.opus
|
14.0 MB
|
06 - Bioassay - The Signal.opus
|
15.5 MB
|
07 - Moderns - Order.opus
|
14.1 MB
|
08 - Left-Right - Sunspot.opus
|
18.4 MB
|
09 - Ninjula - Livewire.opus
|
18.5 MB
|
10 - Richard Cheese and Lounge Against The Machine - The Friday Song.opus
|
10.4 MB
|
11 - The TroubleShooters - shutdown -h now.opus
|
10.5 MB
|
12 - MC Frontalot - Zero Day.opus
|
15.6 MB
|
13 - Lavos - I Am The Storm (Swat Me) (featuring YTCracker).opus
|
11.4 MB
|
14 - Dual Core - Regular Expressions.opus
|
14.1 MB
|
DEF CON 25 Music CD README.txt
|
1.0 KB
|
/.../DEF CON 25 music cd/
|
DEF CON 25 Music CD README.txt
|
1.0 KB
|
/5A1F/
|
DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects-WP.pdf
|
6.5 MB
|
DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects.pdf
|
11.2 MB
|
/.../Alvaro Munoz and Oleksandr Mirosh - UPDATED/
|
DEFCON-25-Alvaro-Munoz-and-Oleksandr-Mirosh-JSON-Attacks-UPDATED.pdf
|
19.7 MB
|
DEFCON-25-Alvaro-Munoz-JSON-attacks-WP-UPDATED.pdf
|
680.9 KB
|
/Cheng Lei/
|
DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus-WP.pdf
|
1.3 MB
|
DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus.pdf
|
1.7 MB
|
/.../Cooper Quintin and Kashmir Hill - UPDATED/
|
DEFCON-25-Cooper-Quintin-and-Kashmir-Hill-The-Internet-Already-Knows-Im-Pregnant-UPDATED.pdf
|
4.1 MB
|
DEFCON-25-Cooper-Quintin-The-Pregnancy-Panopticon-WP-UPDATED.pdf
|
646.4 KB
|
/Denton Gentry/
|
DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-WP.pdf
|
525.3 KB
|
DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi.pdf
|
475.3 KB
|
/.../Dimitry Snezhkov - Extras/octohook-master/config/
|
client.yml
|
1.9 KB
|
server.yml
|
1.9 KB
|
/.../Dimitry Snezhkov - Extras/octohook-master/doc/
|
requirements.txt
|
0.5 KB
|
/.../Dimitry Snezhkov - Extras/octohook-master/kcmd/
|
__init__.py
|
0.0 KB
|
__init__.pyc
|
0.1 KB
|
cmdlook.py
|
1.4 KB
|
cmdservice.py
|
12.2 KB
|
/.../Dimitry Snezhkov - Extras/octohook-master/keys/
|
server.pem
|
3.1 KB
|
/.../Dimitry Snezhkov - Extras/octohook-master/klib/
|
__init__.py
|
0.0 KB
|
__init__.pyc
|
0.1 KB
|
configuration.py
|
1.3 KB
|
ghlib.py
|
3.7 KB
|
ghlib.pyc
|
4.0 KB
|
/.../Dimitry Snezhkov - Extras/octohook-master/ktasks/
|
__init__.py
|
0.0 KB
|
gtasks.py
|
2.4 KB
|
/.../Dimitry Snezhkov - Extras/octohook-master/kweb/
|
__init__.py
|
0.0 KB
|
__init__.pyc
|
0.1 KB
|
gitcommander.py
|
8.0 KB
|
webrouter.py
|
1.1 KB
|
webservice.py
|
3.8 KB
|
webservice.pyc
|
3.9 KB
|
/.../Dimitry Snezhkov - Extras/octohook-master/logs/
|
octohook_client.log
|
40.8 KB
|
octohook_server.log
|
9.1 KB
|
/.../Dimitry Snezhkov - Extras/octohook-master/templates/
|
execlocal.tmpl
|
0.2 KB
|
putlocal.tmpl
|
0.2 KB
|
/.../Dimitry Snezhkov - Extras/octohook-master/utils/
|
cr_cert.sh
|
0.1 KB
|
/.../Dimitry Snezhkov - Extras/octohook-master/
|
octohook.py
|
4.2 KB
|
README.md
|
0.2 KB
|
/Dimitry Snezhkov/
|
DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf
|
74.5 MB
|
/Dor Azouri/
|
DEFCON-25-Dor-Azouri-BITSInject-WP.pdf
|
1.5 MB
|
DEFCON-25-Dor-Azouri-BITSInject.pdf
|
847.8 KB
|
/.../Duncan Woodbury and Nicholas Haltmeyer/
|
DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-WP.pdf
|
600.4 KB
|
DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles.pdf
|
4.7 MB
|
/.../Itzik Kotler and Amit Klein/
|
DEFCON-25-Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox-WP.pdf
|
1.4 MB
|
DEFCON-25-Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox.pdf
|
7.4 MB
|
/.../Josh Pitts - Extras/parser-output/win10/
|
output.json
|
18.3 MB
|
/.../Josh Pitts - Extras/parser-output/win7/
|
output.json
|
6.5 MB
|
/.../Josh Pitts - Extras/parser-output/win8/
|
output.json
|
9.6 MB
|
/.../Josh Pitts - Extras/parser-output/winVista/
|
output.json
|
4.6 MB
|
/.../Josh Pitts - Extras/parser-output/winXP/
|
output.json
|
886.7 KB
|
/.../Josh Pitts - Extras/
|
fido.py
|
173.6 KB
|
README.txt
|
0.1 KB
|
/Josh Pitts/
|
DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks.pdf
|
5.7 MB
|
/.../Mark Newlin Logan Lamb and Christopher Grayson/
|
DEFCON-25-Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf
|
3.9 MB
|
/.../Matt Knight and Marc Newlin/
|
DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP.pdf
|
127.7 KB
|
DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation.pdf
|
26.3 MB
|
/.../Matt Knight and Marc Newlin - UPDATED/
|
DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-UPDATED.pdf
|
26.8 MB
|
DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP-UPDATED.pdf
|
128.0 KB
|
/Matt Suiche/
|
DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf
|
317.7 KB
|
DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts.pdf
|
6.4 MB
|
/Morten Schenk/
|
DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf
|
1.2 MB
|
DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf
|
2.1 MB
|
/.../Phillip Tully and Michael Raggo/
|
DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-WP.pdf
|
395.7 KB
|
DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally.pdf
|
3.8 MB
|
/.../Romain Coltel and Yves Le Provost/
|
DEFCON-25-Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients-WP.pdf
|
1.1 MB
|
DEFCON-25-Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients.pdf
|
2.3 MB
|
/.../Steinthor Bjarnason and Jason Jones/
|
DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-WP.pdf
|
168.7 KB
|
DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House.pdf
|
6.6 MB
|
/Tomer Cohen/
|
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf
|
2.1 MB
|
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf
|
21.7 MB
|
/DEF CON 25 presentations/
|
DEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf
|
6.4 MB
|
DEFCON-25-0ctane-Untrustworthy-Hardware.pdf
|
2.7 MB
|
DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf
|
1.9 MB
|
DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf
|
3.1 MB
|
DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf
|
7.3 MB
|
DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf
|
2.7 MB
|
DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf
|
3.3 MB
|
DEFCON-25-Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf
|
31.4 MB
|
DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf
|
4.5 MB
|
DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf
|
44.7 MB
|
DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf
|
5.3 MB
|
DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf
|
7.0 MB
|
DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf
|
2.5 MB
|
DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA-UPDATED.pdf
|
17.5 MB
|
DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf
|
5.3 MB
|
DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf
|
1.9 MB
|
DEFCON-25-Closing-Slides.pdf
|
9.2 MB
|
DEFCON-25-Cory-Doctorow-Steps-Forward-Steps-Back-How-Can-We-Tell-If-We-Are-Winning-UPDATED.pdf
|
10.1 MB
|
DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit-UPDATED.pdf
|
3.0 MB
|
DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf
|
2.3 MB
|
DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf
|
7.2 MB
|
DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf
|
818.5 KB
|
DEFCON-25-DEFCON-101-The-Panel-UPDATED.pdf
|
6.6 MB
|
DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-UPDATED.pdf
|
519.6 KB
|
DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf
|
631.3 KB
|
DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks-UPDATED.pdf
|
9.9 MB
|
DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf
|
70.9 KB
|
DEFCON-25-FuzzyNop-and-Ceyx-MEATPISTOL-A-Modular-Malware-Implant-Framework-UPDATED.pdf
|
4.8 MB
|
DEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf
|
5.8 MB
|
DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud-UPDATED.pdf
|
2.5 MB
|
DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf
|
2.5 MB
|
DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe-UPDATED.pdf
|
4.3 MB
|
DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf
|
4.2 MB
|
DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery-UPDATED.pdf
|
2.9 MB
|
DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf
|
2.9 MB
|
DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs-UPDATED.pdf
|
871.6 KB
|
DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf
|
256.0 KB
|
DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf
|
2.4 MB
|
DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies-UPDATED.pdf
|
9.9 MB
|
DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf
|
6.3 MB
|
DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI-UPDATED.pdf
|
5.1 MB
|
DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf
|
4.8 MB
|
DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns-UPDATED.pdf
|
2.3 MB
|
DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf
|
2.1 MB
|
DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community-UPDATED.pdf
|
28.1 MB
|
DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf
|
4.4 MB
|
DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks-UPDATED.pdf
|
3.5 MB
|
DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf
|
4.4 MB
|
DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf
|
11.1 MB
|
DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf
|
4.4 MB
|
DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent-UPDATED.pdf
|
2.6 MB
|
DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf
|
2.3 MB
|
DEFCON-25-Joe-Rozner-Wiping-Out-CSRF-UPDATED.pdf
|
133.4 KB
|
DEFCON-25-Joe-Rozner-Wiping-Out-CSRF.pdf
|
134.6 KB
|
DEFCON-25-Jon-Medina-Where-are-all-the-SDN-Talks-UPDATED.pdf
|
4.9 MB
|
DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks-UPDATED.pdf
|
3.6 MB
|
DEFCON-25-K2-Un-Fucking-Forensics-UPDATED.pdf
|
1.8 MB
|
DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time-UPDATED.pdf
|
4.8 MB
|
DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf
|
4.7 MB
|
DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts-UPDATED.pdf
|
1.7 MB
|
DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf
|
1.5 MB
|
DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf
|
297.1 KB
|
DEFCON-25-Macpherson-and-Temmingh-Finding-Useful-info-with-Maltego-UPDATED.pdf
|
40.8 MB
|
DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms-UPDATED.pdf
|
3.1 MB
|
DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf
|
3.1 MB
|
DEFCON-25-Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf
|
60.0 MB
|
DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-UPDATED.pdf
|
7.0 MB
|
DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil-UPDATED.pdf
|
6.2 MB
|
DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf
|
6.3 MB
|
DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch-UPDATED.pdf
|
5.0 MB
|
DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf
|
1.3 MB
|
DEFCON-25-Mickey-Jesse-and-Oleksander-Driving-Down-the-Rabbit-Hole-UPDATED.pdf
|
12.9 MB
|
DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999-UPDATED.pdf
|
4.6 MB
|
DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf
|
6.8 MB
|
DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf
|
5.6 MB
|
DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf
|
5.8 MB
|
DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-UPDATED.pdf
|
2.0 MB
|
DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots-UPDATED.pdf
|
7.0 MB
|
DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf
|
5.0 MB
|
DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks-UPDATED.pdf
|
2.7 MB
|
DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf
|
2.5 MB
|
DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf
|
6.2 MB
|
DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf
|
2.0 MB
|
DEFCON-25-Panel-Corman-and-Congressmen-DC-to-DEFCON-UPDATED.pdf
|
6.3 MB
|
DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools-UPDATED.pdf
|
13.0 MB
|
DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf
|
4.7 MB
|
DEFCON-25-Patrick-Wardle-Death-by-1000-Installers-on-MacOS-UPDATED.pdf
|
30.7 MB
|
DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly-UPDATED..pdf
|
16.1 MB
|
DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf
|
8.8 MB
|
DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-UPDATED.pdf
|
6.3 MB
|
DEFCON-25-Plore-Popping-a-Smart-Gun-UPDATED.pdf
|
4.4 MB
|
DEFCON-25-Plore-Popping-a-Smart-Gun.pdf
|
4.3 MB
|
DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf
|
7.0 MB
|
DEFCON-25-Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf
|
7.2 MB
|
DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf
|
3.4 MB
|
DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services-UPDATED.pdf
|
2.5 MB
|
DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf
|
2.3 MB
|
DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf
|
1.4 MB
|
DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf
|
2.6 MB
|
DEFCON-25-Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf
|
5.5 MB
|
DEFCON-25-Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf
|
2.1 MB
|
DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip-UPDATED.pdf
|
6.1 MB
|
DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf
|
6.1 MB
|
DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android-UPDATED.pdf
|
921.3 KB
|
DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf
|
933.5 KB
|
DEFCON-25-spaceB0x-Exploiting-Continuous-Integration-UPDATED.pdf
|
2.8 MB
|
DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf
|
2.1 MB
|
DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-UPDATED.pdf
|
10.5 MB
|
DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation-UPDATED.pdf
|
3.8 MB
|
DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf
|
6.3 MB
|
DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf
|
7.1 MB
|
DEFCON-25-Svea-Eckert-Andreas-Dewes-Dark-Data.pdf
|
6.5 MB
|
DEFCON-25-Tess-Schrodinger-Total-Recall.pdf
|
5.2 MB
|
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-UPDATED.pdf
|
15.5 MB
|
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf
|
2.1 MB
|
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf
|
21.7 MB
|
DEFCON-25-trixr4skids-DOOMed-Point-of-Sale-Systems-UPDATED.pdf
|
22.7 MB
|
DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf
|
3.5 MB
|
DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf
|
2.0 MB
|
DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf
|
2.3 MB
|
DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf
|
5.1 MB
|
DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf
|
2.9 MB
|
DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-UPDATED.pdf
|
3.1 MB
|
DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf
|
7.9 MB
|
DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf
|
5.8 MB
|
DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf
|
1.7 MB
|
DEFCON-25-Zardus-25-Years-of-Program-Analysis-UPDATED.pdf
|
3.9 MB
|
DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf
|
2.0 MB
|
/.../Carlos Perez - Principals on Leveraging PowerShell for Red Teams-UPDATED/Extras-UPDATED/Source Files/
|
adsecurity.ps1
|
0.8 KB
|
basics_commands.ps1
|
0.6 KB
|
basics_help.ps1
|
0.5 KB
|
basics_objects.ps1
|
0.5 KB
|
basics_pipeline.ps1
|
3.0 KB
|
basics_pssnapin_modules.ps1
|
0.0 KB
|
basics_variables.ps1
|
1.2 KB
|
COM Objects.ps1
|
0.4 KB
|
cradles.ps1
|
1.5 KB
|
Macro.vba
|
0.7 KB
|
MOF_Example_InstalledSoftware.ps1
|
1.9 KB
|
WMI Event Types.ps1
|
2.2 KB
|
WMI_Associations.ps1
|
0.9 KB
|
WMI_Event_Examples.ps1
|
10.0 KB
|
WMI_Helper_Functions.psq.ps1
|
3.4 KB
|
/.../Carlos Perez - Principals on Leveraging PowerShell for Red Teams-UPDATED/Extras-UPDATED/
|
LICENSE
|
1.5 KB
|
README.md
|
0.1 KB
|
/.../Carlos Perez - Principals on Leveraging PowerShell for Red Teams-UPDATED/
|
DEFCON-25-Workshop-Carlos-Perez-Leveraging-PowerShell-Basics-UPDATED.pdf
|
4.8 MB
|
/.../Jack Mott and Jason Williams - Extras/
|
BSLV-DC-SIGDEV.ova
|
4.8 GB
|
/.../Jack Mott and Jason Williams - Practical Network Signature Development For Open Source IDS/
|
DEFCON-25-Workshop-Jack-Mott-Jason-Williams-Practical-Network-Signature-Development-For-Open-Source-IDS.pdf
|
10.5 MB
|
DEFCON-25-Workshop-Mott-Williams-Practical-Network-Signature-Development-For-Open-Source-IDS-Workbook.pdf
|
190.1 KB
|
/.../Scapy-DC25-Master/OOBackdoor/
|
clientmacs
|
24.6 KB
|
LICENSE
|
1.1 KB
|
nmap-mac-prefixes
|
565.3 KB
|
OOBackdoorClient.py
|
16.6 KB
|
OOBackdoorServer.py
|
13.7 KB
|
README.md
|
0.9 KB
|
servermacs
|
31.0 KB
|
/.../Scapy-DC25-Master/OOBackdoor-Detection/
|
detect_lvl0.py
|
0.5 KB
|
detect_lvl0_live.py
|
0.6 KB
|
detect_lvl1.py
|
0.6 KB
|
/.../Repositories of Code that are useful/
|
pbkdf2-1.3.tar.gz
|
6.4 KB
|
pycryptodomex-3.4.5.tar.gz
|
6.5 MB
|
rc4-0.1.tar.gz
|
1.1 KB
|
scapy-2.3.3.tgz
|
1.4 MB
|
scapy_2.2.0.orig.tar.gz
|
973.0 KB
|
/.../Scapy-DC25-Master/Utils/port-knocking/
|
knocker.py
|
0.4 KB
|
port-knocking-backdoor.py
|
2.4 KB
|
/.../Scapy-DC25-Master/Utils/
|
geolocate-pcap.py
|
1.4 KB
|
/.../Scapy-DC25-Master/
|
demo-1.py
|
7.3 KB
|
demo-2.py
|
1.9 KB
|
demo-2_bonus.py
|
0.8 KB
|
PASSWORDs
|
0.1 KB
|
README.md
|
0.9 KB
|
/.../Scapy-Video-Demos-DC25-Media/
|
demo-1.mp4
|
180.7 MB
|
demo-1_addendum.mp4
|
11.0 MB
|
README.md
|
0.1 KB
|
/.../Stryngs Jack64 and zero x - Build your Stack with Scapy/
|
DEFCON-25-Workshop-Stryngs-Jack64-and-zero-x-Build-your-stack-with-Scapy-Readme.txt
|
0.9 KB
|
DEFCON-25-Workshop-Stryngs-Jack64-and-zero-x-Build-your-stack-with-Scapy-UPDATED.pdf
|
33.0 MB
|
/DEF CON 25 workshops/
|
DEFCON-25-Carlos-Perez-Leveraging-PowerShell-Basics.pdf
|
1.1 MB
|
DEFCON-25-Carlos-Perez-Leveraging-Powershell-Lab-Manual-Basics.pdf
|
890.2 KB
|
DEFCON-25-Carlos-Perez-Leveraging-Powershell-Lab-Manual.pdf
|
469.5 KB
|
DEFCON-25-Carlos-Perez-Leveraging-PowerShell.pdf
|
4.8 MB
|
DEFCON-25-Workshop-Abhay-Bhargav-Building-AppSec-Automation-With-Python.pdf
|
1.1 MB
|
DEFCON-25-Workshop-Adam-Steed-Attacking-Active-Directory-and-Advanced-Methods-of-Defense.pdf
|
5.2 MB
|
DEFCON-25-Workshop-Aditya-Gupta-BLE-Exploitation-for-IoT-devices.pdf
|
1.5 MB
|
DEFCON-25-Workshop-Alan-Orlikoski-and-Dan-M-Free-and-Easy-DFIR-Triage-for-Everyone.pdf
|
3.1 MB
|
DEFCON-25-Workshop-Alan-Orlikoski-and-Dan-Moor-Free-and-Easy-DFIR-Triage-for-Everyone-UPDATED.pdf
|
12.8 MB
|
DEFCON-25-Workshop-Anshuman-Bhartiya-Harnessing-the-Power-of-Docker-and-Kubernetes-Handout.pdf
|
174.5 KB
|
DEFCON-25-Workshop-Anshuman-Bhartiya-Harnessing-the-Power-of-Docker-and-Kubernetes.pdf
|
75.5 KB
|
DEFCON-25-Workshop-Bryan-Passifiume-and-Richard-Henderson-Scanning-The-Airwaves.pdf
|
1.6 MB
|
DEFCON-25-Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country-UPDATED.pdf
|
1.5 MB
|
DEFCON-25-Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country.pdf
|
3.4 MB
|
DEFCON-25-Workshop-Clarence-Chio-and-Anto-Joseph-Pwning-Machine-Learning-Systems.pdf
|
1.4 MB
|
DEFCON-25-Workshop-Craig-Young-Brainwashing-Embedded-Systems-UPDATED.pdf
|
60.3 MB
|
DEFCON-25-Workshop-DazzleCat-Duo-Intro-To-Disassembly.pdf
|
2.1 MB
|
DEFCON-25-Workshop-Eijah-Subverting-Privacy-Exploitation-Using-HTTP-UPDATED.PDF
|
1.1 MB
|
DEFCON-25-Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf
|
2.1 MB
|
DEFCON-25-Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf
|
1.8 MB
|
DEFCON-25-Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf
|
7.8 MB
|
DEFCON-25-Workshop-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation.pdf
|
5.8 MB
|
DEFCON-25-Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf
|
452.0 KB
|
DEFCON-25-Workshop-Ruben-Boobeb-UAC-0day-All-Day.pdf
|
7.6 MB
|
DEFCON-25-Workshop-Sean-Dillion-and-Zachary-Harding-Exploitation-Malware-Forward-Engineering.pdf
|
3.8 MB
|
DEFCON-25-Workshop-Sergei-Frankoff-and-Sean-Wilson-Malware-Triage-Workshop-Malscripts-Are-The-New-EK.pdf
|
3.7 MB
|
DEFCON-25-Workshop-stryngs-Jack64-and-zero-x-Build-your-stack-with-Scapy.pdf
|
4.4 MB
|
DEFCON-25-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Client-and-Tester-Security-WP.pdf
|
247.0 KB
|
DEFCON-25-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Client-and-Tester-Security.pdf
|
12.4 MB
|
/DEF CON 25 x-hour film contest/
|
Finalist A.mp4
|
117.4 MB
|
Finalist B.mp4
|
195.4 MB
|
Finalist C.mp4
|
354.6 MB
|
Pacin Heat Alexis Park 1.mp4
|
153.9 MB
|
/
|
$BIGNUM_steps_forward,$TRUMPNUM_steps_back_how_can_we_tell_if_were_winning.mp4
|
272.2 MB
|
25_Years_of_Program_Analysis .mp4
|
159.5 MB
|
_In_Security_in_Building_Automation-How_to_Create_Dark_Buildings_with_Light_Speed.mp4
|
145.1 MB
|
_rustls_modern,fast,safer_TLS_.mp4
|
145.7 MB
|
_Tick,Tick,Tick._Boom_Youre_Dead._--_Tech_and_the_FTC.mp4
|
266.6 MB
|
_Un_Fucking_Forensics_–_ActivePassive_i.e._OffensiveDefensive_memory_hackingdebugging..mp4
|
52.3 MB
|
A_Brief_Message_from_Security.mp4
|
55.3 MB
|
A_Look_Inside_The_Key_Management_Facility_of_The_Root_DNSSEC_KSK.mp4
|
183.0 MB
|
A_New_Era_of_SSRF-Exploiting_URL_Parser_in_Trending_Programming_Languages.mp4
|
136.4 MB
|
A_New_Political_Era_Time_to_start_wearing_tin-foil_hats_following_the_2016_elections.mp4
|
489.5 MB
|
A_Picture_is_Worth_a_Thousand_Words,Literally_Deep_Neural_Networks_for_Social_Stego.mp4
|
231.3 MB
|
A_Tangle_of_Plastic_Spaghetti_A_Look_Into_the_Security_of_3D_Printers.mp4
|
190.2 MB
|
Abusing_Certificate_Transparency_Logs.mp4
|
111.2 MB
|
Abusing_Smart_Cars_with_QR_codes.mp4
|
137.2 MB
|
Abusing_Webhooks_for_Command_and_Control.mp4
|
111.0 MB
|
Alex_Stamos,CSO,Facebook.mp4
|
127.1 MB
|
Alice_and_Bob_are_Slightly_Less_Confused.mp4
|
134.9 MB
|
All_Your_Things_Are_Belong_To_Us .mp4
|
252.1 MB
|
Amateur_Digital_Archeology.mp4
|
264.3 MB
|
An_ACE_Up_the_Sleeve_Designing_Active_Directory_DACL_Backdoors.mp4
|
265.6 MB
|
An_election_system_is_much_more_than_the_voting_machine_or_the_booth..mp4
|
405.7 MB
|
An_Introduction_to_Graph_Theory_for_OSINT.mp4
|
156.4 MB
|
Ardusploit-Proof_of_concept_for_Arduino_code_injection.mp4
|
253.8 MB
|
Are_all_BSDs_are_created_equally_A_survey_of_BSD_kernel_vulnerabilities..mp4
|
171.5 MB
|
Are_you_killing_your_security_program_Mostly_dead_is_slightly_alive….mp4
|
258.8 MB
|
Arm_Mounted_Weaponized_Platform_and_Anime_Viewer.mp4
|
63.1 MB
|
Assembly_Language_is_Too_High_Level.mp4
|
311.4 MB
|
Attack_Surface_Discovery_with_Intrigue.mp4
|
199.7 MB
|
Attacking_Autonomic_Networks.mp4
|
236.2 MB
|
Attacking_Wireless_Interfaces_in_Vehicles.mp4
|
170.8 MB
|
Backdooring_the_Lottery_and_Other_Security_Tales_in_Gaming_over_the_Past_25_Years .mp4
|
169.9 MB
|
Beyond_Phishing_–_Building_and_Sustaining_a_Corporate_SE_Program.mp4
|
191.8 MB
|
Biohackers_Die.mp4
|
210.9 MB
|
Biotechnology_Needs_a_Security_Patch...Badly.mp4
|
225.9 MB
|
BITSInject.mp4
|
74.0 MB
|
Blue_team_TLS_hugs.mp4
|
130.9 MB
|
Breaking_Bitcoin_Hardware_Wallets.mp4
|
209.3 MB
|
Breaking_the_x86_Instruction_Set.mp4
|
161.0 MB
|
Breaking_Wind_Adventures_in_Hacking_Wind_Farm_Control_Networks.mp4
|
127.3 MB
|
Brief_history_of_election_machine_hacking_and_lessons_learned.mp4
|
185.6 MB
|
Building_Google_For_Criminal_Enterprises.mp4
|
180.1 MB
|
Bypassing_Android_Password_Manager_Without_Root.mp4
|
117.1 MB
|
CableTap_Wirelessly_Tapping_Your_Home_Network.mp4
|
228.7 MB
|
Call_the_plumber-you_have_a_leak_in_your_named_pipe.mp4
|
170.1 MB
|
Change_Agents_How_to_Effectively_Influence_Intractable_Corporate_Cultures.mp4
|
331.2 MB
|
Cisco_Catalyst_Exploitation.mp4
|
253.0 MB
|
CITL_and_the_Digital_Standard-A_Year_Later .mp4
|
265.0 MB
|
Cloudy_With_A_Chance_of_Persistance_AWS_Post_Compromise_Primer.mp4
|
161.9 MB
|
Common_misconceptions_and_false_parallels_about_voting_technology._We_can_do_online_banking_and_use_ATMs,why_can_t_we_vote_on_touch_screens_or_online.mp4
|
219.5 MB
|
Controlling_IoT_devices_with_crafted_radio_signals.mp4
|
225.9 MB
|
Cryptanalysis_in_the_Time_of_Ransomware.mp4
|
215.1 MB
|
CVE_IDs_and_How_to_Get_Them.mp4
|
286.4 MB
|
Cyber_Security_Issues_with_Level_0,1_Devices.mp4
|
196.0 MB
|
Cypherpunks_History.mp4
|
88.3 MB
|
Dangerous_Minds_Podcast_Live_at_DCBHV_celebrating_100th_episode.mp4
|
448.3 MB
|
Dark_Data.mp4
|
271.5 MB
|
DataSploit_Open_Source_Assistant_for_OSINT.mp4
|
135.6 MB
|
DC_to_DEF_CON_Q_and_A_with_Congressmen.mp4
|
216.6 MB
|
Dealing_the_perfect_hand-Shuffling_memory_blocks_on_zOS.mp4
|
268.5 MB
|
Death_By_1000_Installers;_on_macOS,its_all_broken.mp4
|
158.5 MB
|
Deceptacon_Wi-Fi_Deceptions_in_under_$5.mp4
|
298.7 MB
|
DEF_CON_101_Panel.mp4
|
1.0 GB
|
DEF_CON_25_welcome_video.mp4
|
153.3 MB
|
DEF_CON_Closing_Ceremonies.mp4
|
787.7 MB
|
DEFCON-25-Program.pdf
|
17.1 MB
|
DEFCON-25-Receipt.pdf
|
6.3 MB
|
DefCon_Unofficial_Badges_Panel.mp4
|
425.0 MB
|
Demystifying_the_OPM_breach,WTF_really_happened.mp4
|
342.7 MB
|
Demystifying_Windows_Kernel_Exploitation_by_Abusing_GDI_Objects..mp4
|
228.5 MB
|
Designing_an_Automatic_Gain_Control.mp4
|
348.0 MB
|
DFIR_Automation_Orchestration_Tools_For_OSINTRecon-Collecting_Evidence_Like_a_Robot.mp4
|
111.9 MB
|
Digital_Vengeance_Exploiting_the_Most_Notorious_C_and_C_Toolkits.mp4
|
144.6 MB
|
Dissecting_Industrial_Wireless_implementations.mp4
|
133.1 MB
|
DIYBioweapons_and_Regulation.mp4
|
180.5 MB
|
DNS-Devious_Name_Services-Destroying_Privacy_and_Anonymity_Without_Your_Consent.mp4
|
228.5 MB
|
Do_Tinder_Bots_Dream_of_Electric_Toys_How_Tinder_Bots_are_breaking_hearts_all_over_the_world,and_trashing_Tinder’s_reputation_while_they’re_at_it..mp4
|
169.3 MB
|
Domain_Discovery_Expanding_your_scope_like_a_boss.mp4
|
222.6 MB
|
DOOMed_Point_of_Sale_Systems .mp4
|
157.2 MB
|
Driving_down_the_rabbit_hole.mp4
|
212.3 MB
|
DYI_NSA_On_The_Cheap_Plus_a_Security_Analysis_of_P25_.mp4
|
577.4 MB
|
Election_Hacking-_Legal_Considerations_from_the_Civil_Not_Criminal_Side.mp4
|
186.6 MB
|
ERPA_Only_Your_Grades_Are_Safe;_OSINT_In_Higher_Education.mp4
|
159.3 MB
|
Ethics_In_BioHacking.mp4
|
468.8 MB
|
Evading_next-gen_AV_using_artificial_intelligence.mp4
|
63.1 MB
|
Everything_you_need_to_know_about_the_U.S._Department_of_Justice,Computer_Crime_and_Intellectual_Property.mp4
|
106.4 MB
|
Exploiting_0ld_Mag-stripe_information_with_New_technology.mp4
|
96.8 MB
|
Exploiting_Continuous_Integration_CI_and_Automated_Build_Systems .mp4
|
140.7 MB
|
Failsafe_Yet_Another_SimpliSafe_Attack_Vector.mp4
|
328.8 MB
|
Fooling_The_Hound_Deceiving_Domain_Admin_Hunters.mp4
|
290.6 MB
|
Fortune_100_InfoSec_on_a_State_Government_Budget.mp4
|
269.9 MB
|
Friday_the_13th_JSON_attacks .mp4
|
175.3 MB
|
From_Box_to_Backdoor_Using_Old_School_Tools_and_Techniques_to_Discover_Backdoors_in_Modern_Devices.mp4
|
206.6 MB
|
From_One_Country-One_Floppy_to_Startup_Nation_-the_story_of_the_early_days_of_the_Israeli_hacking_community,and_the_journey_towards_today_s_vibrant_startup_scene.mp4
|
146.5 MB
|
Fun_with_Modbus_0x5a-Nothing_New._Still_Relevant.mp4
|
101.5 MB
|
Game_of_Chromes_Owning_the_Web_with_Zombie_Chrome_Extensions.mp4
|
101.3 MB
|
Game_of_Drones_Putting_the_Emerging_and_quot;Drone_Defense_and_quot;_Market_to_the_Test.mp4
|
264.1 MB
|
Genetic_Diseases_to_Guide_Digital_Hacks_of_the_Human_Genome_How_the_Cancer_Moonshot_Program_will_Enable_Almost_Anyone_to_Crash_the_Operating_System_that_Runs_You_or_to_End_Civilization... .mp4
|
302.3 MB
|
Get-$pwnd_Attacking_Battle-Hardened_Windows_Server.mp4
|
121.2 MB
|
Ghost_in_the_Droid_Possessing_Android_Applications_with_ParaSpectre.mp4
|
184.3 MB
|
Go_Beyond_Tabletop_Scenarios_by_Building_an_Incident_Response_Simulation_Platform.mp4
|
376.0 MB
|
GODUMP=NG_packet_sniffing_the_Gotenaa.mp4
|
492.3 MB
|
GPS_System_Integrity.mp4
|
96.8 MB
|
Grand_Theft_Radio_Stopping_SDR_Relay_Attacks_on_PKES_.mp4
|
120.0 MB
|
Grid_insecurity-and_how_to_really_fix_this_shit.mp4
|
161.8 MB
|
Hack_Your_Senses_Sensory_Augmentation_and_Brain_Plasticity_.mp4
|
223.2 MB
|
Hackers_gonna_hack_–_But_do_they_know_why.mp4
|
232.3 MB
|
Hacking_an_Insecure_WiFi_Camera.mp4
|
69.5 MB
|
Hacking_and_Robotics_v2.0 .mp4
|
124.5 MB
|
Hacking_Democracy_A_Socratic_Dialogue.mp4
|
400.9 MB
|
Hacking_on_Multiparty_Computation.mp4
|
116.2 MB
|
Hacking_Smart_Contracts.mp4
|
156.4 MB
|
Hacking_Some_More_of_the_Wireless_World_Software_Defined_Radio_Exploits.mp4
|
765.5 MB
|
Hacking_the_Cloud.mp4
|
249.5 MB
|
Hacking_The_Internet_of_Dongs-Hacking_Sex_Toys_For_Fun_And_Absolutely_No_Profit.mp4
|
224.9 MB
|
Hacking_the_Second_Genetic_Code_using_Information_Theory.mp4
|
164.1 MB
|
Hacking_travel_routers_like_its_1999.mp4
|
84.6 MB
|
Hardware_Hacking_Old_Sk00l_and_New_Sk00l.mp4
|
194.1 MB
|
Have_you_seen_my_naked_selfies_Neither_has_my_snoopy_boyfriend._Privacy_within_a_Relationship.mp4
|
374.2 MB
|
Heavy_Diving_for_Credentials_Towards_an_Anonymous_Phishing.mp4
|
190.0 MB
|
Heavy_Truck_and_Electronic_Logging_Devices_What_Could_Go_Wrong.mp4
|
152.0 MB
|
Here_to_stay_Gaining_persistency_by_abusing_advanced_authentication_mechanisms.mp4
|
241.4 MB
|
Hide_Yo_Keys,Hide_Yo_Car-Remotely_Exploiting_Connected_Vehicle_APIs_and_Apps.mp4
|
187.6 MB
|
Home_Depot_and_a_Plan_of_Attack_for_Hackers.mp4
|
91.6 MB
|
How_did_we_get_here_A_history_of_voting_technology,hanging_chads,and_the_Help_America_Vote_Act.mp4
|
264.1 MB
|
How_to_obtain_100_Facebooks_accounts_per_day_through_internet_searches.mp4
|
113.3 MB
|
How_to_Prepare_for_Internet_Privacy_at_College.mp4
|
114.8 MB
|
How_to_use_the_Scientific_Method_in_Security_Research.mp4
|
436.6 MB
|
How_we_created_the_first_SHA-1_collision_and_what_it_means_for_hash_security.mp4
|
142.9 MB
|
How_your_doctor_might_be_trying_to_kill_you_and_how_personal_genomics_can_save_your_life.mp4
|
220.5 MB
|
Hunting_Down_the_Domain_Admin_and_Rob_Your_Network_Portia-_Finding_Your_Way_to_Domain_Access.mp4
|
234.8 MB
|
I_Know_What_You_Are_by_the_Smell_of_Your_Wifi.mp4
|
82.7 MB
|
If_You_Give_a_Mouse_a_Microchip..._It_will_execute_a_payload_and_cheat_at_your_high-stakes_video_game_tournament.mp4
|
128.4 MB
|
IIDS_An_Intrusion_Detection_System_for_IoT.mp4
|
357.9 MB
|
Implantable_Technology_Show_and_Tell.mp4
|
173.7 MB
|
Inside_the_Alaris_Infusion_Pump,not_too_much_medication_por_favor.mp4
|
169.8 MB
|
Inside_the_“Meet_Desai”_Attack_Defending_Distributed_Targets_from_Distributed_Attacks.mp4
|
708.8 MB
|
Into_the_Bird’s_Nest_A_Comprehensive_Look_at_Twitter_as_a_Research_Tool.mp4
|
217.2 MB
|
Introducing_HUNT_Data_Driven_Web_Hacking_and_Manual_Testing.mp4
|
101.3 MB
|
Introduction_To_Cheat_Engine.mp4
|
157.6 MB
|
IoT-the_gift_that_keeps_on_giving.mp4
|
316.5 MB
|
IoT_From_DVRs_to_Dildos.mp4
|
303.7 MB
|
IoT_updates_to_help_protect_consumers.mp4
|
223.6 MB
|
IoT_Village_Keynote-Friends,Not_Foes_Rethinking_the_Researcher-Vendor_Relationship.mp4
|
116.4 MB
|
IP_Spoofing_What_Is_It,How_It_Allows_Largest_Attacks_and_How_to_Fix_It_.mp4
|
263.6 MB
|
Iron_Sights_for_Your_Data_Predictive_Analytics_for_your_Blue_Team.mp4
|
98.0 MB
|
Is_Car_Hacking_Over_An_Introduction_to_AUTOSAR_Secure_Onbaord_Communication.mp4
|
234.7 MB
|
Jailbreaking_Apple_Watch.mp4
|
243.5 MB
|
Keynote-Seeing_is_Believing-The_Future_of_Recon_You_Wont_Believe_What_Happens_Next.mp4
|
245.5 MB
|
Koadic_C3-Windows_COM_Command_and_Control_Framework.mp4
|
615.2 MB
|
Large_Scale_Wireless_Monitoring-KISMET_packet_sniffer_on_a_multi-radio_array.mp4
|
289.4 MB
|
Layer_8_and_Why_People_are_the_Most_Important_Security_Tool.mp4
|
239.1 MB
|
Linux-Stack_Based_V2X_Framework_All_You_Need_to_Hack_Connected_Vehicles.mp4
|
174.1 MB
|
Linux-Stack_Based_V2X_Framework_SocketV2V_All_You_Need_to_Hack_Connected_Vehicles.mp4
|
144.0 MB
|
macOSiOS_Kernel_Debugging_and_Heap_Feng_Shui.mp4
|
182.8 MB
|
Make_Your_Own_802.11ac_Monitoring_Hacker_Gadget.mp4
|
399.5 MB
|
Malicious_CDNs_Identifying_Zbot_Domains_en_Masse_via_SSL_Certificates_and_Bipartite_Graphs.mp4
|
204.9 MB
|
Man_in_the_NFC.mp4
|
138.5 MB
|
Mansion_Apartment_Shack_House_How_To_Explain_Crypto_To_Practically_Anyone.mp4
|
80.3 MB
|
MEATPISTOL,A_Modular_Malware_Implant_Framework.mp4
|
245.9 MB
|
Medical_Device_Ethics_and_Security.mp4
|
233.0 MB
|
Medical_Industry_Disrupt-Blockchain_and_The_Hope_for_Healthcare.mp4
|
173.2 MB
|
Micoscopes_are_Stupid.mp4
|
176.1 MB
|
Microservices_and_FaaS_for_Offensive_Security.mp4
|
168.3 MB
|
Modern_Day_CovertTCP_with_a_Twist.mp4
|
368.2 MB
|
MS_Just_Gave_the_Blue_Team_Tactical_Nukes_And_How_Red_Teams_Need_To_Adapt_.mp4
|
346.6 MB
|
Neurogenic_Peptides_Smart_Drugs_4-Minute_Mile.mp4
|
211.8 MB
|
Next-Generation_Tor_Onion_Services.mp4
|
141.1 MB
|
Nor_lose_the_common_touch.mp4
|
276.6 MB
|
Offensive_Malware_Analysis_Dissecting_OSXFruitFly_via_a_Custom_C_and_C_Server.mp4
|
150.3 MB
|
Open_Source_Safe_Cracking_Robots-Combinations_Under_1_Hour_Is_it_bait_Damn_straight_it_is._ .mp4
|
117.0 MB
|
Opening_Ceremonies_A_Place_Where_Kids_Learn_White-Hat_Hacking_to_Better_The_World.mp4
|
86.2 MB
|
Opening_Ceremony_How_Hackers_Changed_The_Security_Industry.mp4
|
381.8 MB
|
Operational_Security_Lessons_From_The_Dark_Web.mp4
|
112.6 MB
|
Opt_Out_or_Deauth_Trying_-_Anti-Tracking_Bots_Radios_and_Keystroke_Injection.mp4
|
233.1 MB
|
OSINT_Tactics_on_Source_Code_and_Developers.mp4
|
337.0 MB
|
Panel_DEF_CON_Groups.mp4
|
718.3 MB
|
Panel_Meet_The_Feds.mp4
|
781.3 MB
|
Past,Present_and_Future_of_High_Speed_Packet_Filtering_on_Linux.mp4
|
94.5 MB
|
PEIMA_Probability_Engine_to_Identify_Malicious_Activity_Using_Power_Laws_to_address_Denial_of_Service_Attacks .mp4
|
274.6 MB
|
Persisting_with_Microsoft_Office_Abusing_Extensibility_Options.mp4
|
87.3 MB
|
Phone_system_testing_and_other_fun_tricks.mp4
|
116.5 MB
|
POCSAG_Amateur_Pager_Network.mp4
|
225.2 MB
|
Popping_a_Smart_Gun.mp4
|
150.8 MB
|
Porosity_A_Decompiler_For_Blockchain-Based_Smart_Contracts_Bytecode.mp4
|
629.5 MB
|
Privacy_is_Not_An_Add-On_Designing_for_Privacy_from_the_Ground_Up.mp4
|
175.0 MB
|
Protecting_Users_Privacy_in_a_Location-Critical_Enterprise_The_Challenges_of_9-1-1_Location.mp4
|
441.7 MB
|
Psychoactive_Chemicals_in_Combat.mp4
|
229.7 MB
|
Pwning_the_Industrial_IoT_RCEs_and_backdoors_are_around.mp4
|
149.5 MB
|
Radio_Exploitation_101_Characterizing,Contextualizing,and_Applying_Wireless_Attack_Methods.mp4
|
213.7 MB
|
Rage_Against_the_Weaponized_AI_Propaganda_Machine.mp4
|
271.2 MB
|
Real-time_RFID_Cloning_in_the_Field.mp4
|
101.2 MB
|
Recon_and_bug_bounties_what_a_great_love_story.mp4
|
158.0 MB
|
Redesigning_PKI_for_IoT_because_Crypto_is_hard.mp4
|
372.2 MB
|
Revoke-Obfuscation_PowerShell_Obfuscation_Detection_And_Evasion_Using_Science_.mp4
|
686.3 MB
|
Rustls_modern,fast,safer_TLS.mp4
|
145.7 MB
|
SE_vs_Predator_Using_Social_Engineering_in_ways_I_never_thought…..mp4
|
282.0 MB
|
Searching_the_Invisible_Internet.mp4
|
60.7 MB
|
Secret_Tools_Learning_about_Government_Surveillance_Software_You_Cant_Ever_See .mp4
|
92.9 MB
|
Secure_Tokin_and_Doobiekeys_How_to_roll_your_own_counterfeit_hardware_security_devices.mp4
|
201.0 MB
|
SecureWorks_SDR_Replay_Attacks_against_home_security_systems_.mp4
|
123.4 MB
|
Securing_the_Election_Office_A_Local_Response_to_a_Global_Threat.mp4
|
275.6 MB
|
Security_Analysis_of_the_Telegram_IM.mp4
|
108.0 MB
|
See_no_evil,hear_no_evil_Hacking_invisibly_and_silently_with_light_and_sound.mp4
|
583.0 MB
|
SHA-3_vs_the_world.mp4
|
278.0 MB
|
Skills_For_A_Red-Teamer.mp4
|
416.9 MB
|
Skip_Tracing_For_Fun_and_Profit_How_to_Hide_From_The_FBI.mp4
|
286.1 MB
|
Social_Engineering_with_Web_Analytics.mp4
|
185.3 MB
|
SSL_Visibility_Revisted_A_Year_In_Privacy_Improvements_For_Encrypted_Communications.mp4
|
196.8 MB
|
Standardizing_the_Secure_Deployment_of_Medical_Devices.mp4
|
208.0 MB
|
Starting_the_Avalanche_Application_DoS_In_Microservice_Architectures.mp4
|
170.3 MB
|
Stories_from_a_15_days_SMB_Honeypot_Mum,Tons_of_WannaCry_and_Evils_Attacked_Our_Home.mp4
|
253.7 MB
|
Strategies_on_Securing_Your_Banks_and_Enterprises_From_Someone_Who_Robs_Banks_and_Enterprises_.mp4
|
453.8 MB
|
Strengthen_Your_SPECOPS_Team_by_Leveraging_Neurodiversity.mp4
|
92.8 MB
|
Suitcase_Repeater_Build_for_UHF-70cm.mp4
|
248.1 MB
|
Taking_Windows_10_Kernel_Exploitation_to_the_next_level-Leveraging_write-what-where_vulnerabilities_in_Creators_Update.mp4
|
108.9 MB
|
Tales_from_a_healthcare_hacker.mp4
|
253.9 MB
|
Teaching_Old_Shellcode_New_Tricks .mp4
|
74.6 MB
|
Thats_no_car._Its_a_network.mp4
|
259.5 MB
|
The_Adventures_of_AV_and_the_Leaky_Sandbox.mp4
|
130.1 MB
|
The_Bicho_An_Advanced_Car_Backdoor_Maker.mp4
|
204.4 MB
|
The_Black_Art_of_Wireless_Post-Exploitation_Bypassing_Port-Based_Access_Controls_Using_Indirect_Wireless_Pivots.mp4
|
435.4 MB
|
The_Black_Art_of_Wireless_Post_Exploitation.mp4
|
243.4 MB
|
The_Brains_Last_Stand.mp4
|
221.4 MB
|
The_Brave_New_World_of_Bio-Entrepreneurship.mp4
|
171.1 MB
|
The_call_is_coming_from_inside_the_house_Are_you_ready_for_the_next_evolution_in_DDoS_attacks.mp4
|
170.4 MB
|
The_Future_is_Fake_Identities.mp4
|
262.7 MB
|
The_Human_Factor_Why_Are_We_So_Bad_at_Security_and_Risk_Assessment.mp4
|
359.0 MB
|
The_Internet_Already_Knows_Im_Pregnant .mp4
|
500.7 MB
|
The_Internet_of_Vulnerabilities.mp4
|
225.2 MB
|
The_Last_CTF_Talk_You’ll_Ever_Need_AMA_with_20_years_of_DEF_CON_Capture-the-Flag_organizers .mp4
|
879.7 MB
|
The_Moral_Imperative_of_Biohacking.mp4
|
162.4 MB
|
The_Patient_as_CEO.mp4
|
137.9 MB
|
The_spear_to_break_the_security_wall_of_S7CommPlus.mp4
|
78.7 MB
|
The_State_of_US_Voting_System_Security.mp4
|
235.9 MB
|
The_Surveillance_Capitalism_Will_Continue_Until_Morale_Improves.mp4
|
339.3 MB
|
The_Symantec_SSL_Debacle_Lessons_Learned_and_Future_Steps.mp4
|
278.0 MB
|
The_Why_and_How_for_Secure_Automatic_Patch_Management.mp4
|
107.8 MB
|
Thematic_Social_Engineering_Making_SE_Work_at_Scale.mp4
|
167.6 MB
|
There’s_no_place_like_127.0.0.1-Achieving_reliable_DNS_rebinding_in_modern_browsers.mp4
|
276.1 MB
|
TOOOL_Lockpicking_Talk#1.mp4
|
148.4 MB
|
Total_Recall_Implanting_Passwords_in_Cognitive_Memory.mp4
|
203.2 MB
|
Total_Recall_Implicit_Learning_As_A_Cryptographic_Primitive.mp4
|
213.0 MB
|
Total_Recoll.mp4
|
47.1 MB
|
Tracking_Spies_in_the_Skies.mp4
|
148.6 MB
|
Traffic_Analysis_in_Cybespace.mp4
|
164.2 MB
|
Trigraph_An_Ethereum-based_Teleradiology_Application.mp4
|
190.2 MB
|
Trojan-tolerant_Hardware_and_Supply_Chain_Security_in_Practice.mp4
|
104.0 MB
|
Twenty_Years_of_MMORPG_Hacking_Better_Graphics,Same_Exploits.mp4
|
178.1 MB
|
Unboxing_Android_Everything_you_wanted_to_know_about_Android_packers.mp4
|
94.8 MB
|
Untrustworthy_Hardware_and_How_to_Fix_It.mp4
|
79.5 MB
|
Up_close_and_personal-Keeping_an_eye_on_mobile_applications.mp4
|
81.0 MB
|
Using_GPS_Spoofing_to_control_time.mp4
|
600.5 MB
|
Visual_Network_and_File_Forensics.mp4
|
154.4 MB
|
Weaponizing_Machine_Learning_Humanity_Was_Overrated_Anyway.mp4
|
157.0 MB
|
Weaponizing_the_BBC_Micro_Bit.mp4
|
126.2 MB
|
Welcome_to_DEF_CON_25.mp4
|
131.5 MB
|
What_is_Ground_Baby_dont_hurt_me_.mp4
|
125.5 MB
|
Whats_the_DFIRence_for_ICS.mp4
|
161.6 MB
|
When_Privacy_Goes_Poof_Why_Its_Gone_and_Never_Coming_Back.mp4
|
274.4 MB
|
When_the_Current_Ransomware_and_Payload_of_the_Day_CRAP_Hits_the_Fan_Breaking_the_Bad_News.mp4
|
305.1 MB
|
Where_are_the_SDN_Security_Talks.mp4
|
279.6 MB
|
WIGLE_Like_You_Mean_It_Maximizing_Your_Wardriving_Experience.mp4
|
391.0 MB
|
Winner_Announcement_Prize_Distribution.mp4
|
138.8 MB
|
Wiping_out_CSRF.mp4
|
294.4 MB
|
WSUSpendu_How_to_hang_WSUS_clients .mp4
|
63.1 MB
|
XenoScan_Scanning_Memory_Like_a_Boss.mp4
|
222.2 MB
|
Yalda,Automated_Bulk_Intelligence.mp4
|
199.9 MB
|
Yet_Another_Password_Hashing_Talk.mp4
|
140.6 MB
|
You_are_not_a_Digital_Native_and_thats_OK_.mp4
|
181.5 MB
|
Youre_Going_to_Connect_to_the_Wrong_Domain_Name.mp4
|
98.5 MB
|
Total files 581
|