FileMood

Download defcon25

Defcon25

Name

defcon25

 DOWNLOAD Copy Link

Total Size

69.2 GB

Total Files

581

Hash

C7E180576CCFE193F3AF25AE3E74A506D3F4190B

/.../DEF CON 25 music cd flac/

01 - Skittish and Bus - DEF CON Is Canceled.flac

29.4 MB

02 - Laughing Mantis - Machines of Loving Disgrace.flac

43.4 MB

03 - Information Society - The Prize (Kain & Arvy House Radio Remix).flac

33.6 MB

04 - Zebbler Encanti Experience - Infinite Absence VIP (featuring Ganavya).flac

31.1 MB

05 - JG And The Robots - I Am One.flac

29.9 MB

06 - Bioassay - The Signal.flac

27.6 MB

07 - Moderns - Order.flac

31.2 MB

08 - Left-Right - Sunspot.flac

35.8 MB

09 - Ninjula - Livewire.flac

38.0 MB

10 - Richard Cheese and Lounge Against The Machine - The Friday Song.flac

20.1 MB

11 - The TroubleShooters - shutdown -h now.flac

21.2 MB

12 - MC Frontalot - Zero Day.flac

33.5 MB

13 - Lavos - I Am The Storm (Swat Me) (featuring YTCracker).flac

26.4 MB

14 - Dual Core - Regular Expressions.flac

29.0 MB

DEF CON 25 Music CD README.txt

1.0 KB

/.../DEF CON 25 music cd opus/

01 - Skittish and Bus - DEF CON Is Canceled.opus

15.1 MB

02 - Laughing Mantis - Machines of Loving Disgrace.opus

22.5 MB

03 - Information Society - The Prize (Kain & Arvy House Radio Remix).opus

13.1 MB

04 - Zebbler Encanti Experience - Infinite Absence VIP (featuring Ganavya).opus

17.8 MB

05 - JG And The Robots - I Am One.opus

14.0 MB

06 - Bioassay - The Signal.opus

15.5 MB

07 - Moderns - Order.opus

14.1 MB

08 - Left-Right - Sunspot.opus

18.4 MB

09 - Ninjula - Livewire.opus

18.5 MB

10 - Richard Cheese and Lounge Against The Machine - The Friday Song.opus

10.4 MB

11 - The TroubleShooters - shutdown -h now.opus

10.5 MB

12 - MC Frontalot - Zero Day.opus

15.6 MB

13 - Lavos - I Am The Storm (Swat Me) (featuring YTCracker).opus

11.4 MB

14 - Dual Core - Regular Expressions.opus

14.1 MB

DEF CON 25 Music CD README.txt

1.0 KB

/.../DEF CON 25 music cd/

DEF CON 25 Music CD README.txt

1.0 KB

/5A1F/

DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects-WP.pdf

6.5 MB

DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects.pdf

11.2 MB

/.../Alvaro Munoz and Oleksandr Mirosh - UPDATED/

DEFCON-25-Alvaro-Munoz-and-Oleksandr-Mirosh-JSON-Attacks-UPDATED.pdf

19.7 MB

DEFCON-25-Alvaro-Munoz-JSON-attacks-WP-UPDATED.pdf

680.9 KB

/Cheng Lei/

DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus-WP.pdf

1.3 MB

DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus.pdf

1.7 MB

/.../Cooper Quintin and Kashmir Hill - UPDATED/

DEFCON-25-Cooper-Quintin-and-Kashmir-Hill-The-Internet-Already-Knows-Im-Pregnant-UPDATED.pdf

4.1 MB

DEFCON-25-Cooper-Quintin-The-Pregnancy-Panopticon-WP-UPDATED.pdf

646.4 KB

/Denton Gentry/

DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-WP.pdf

525.3 KB

DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi.pdf

475.3 KB

/.../Dimitry Snezhkov - Extras/octohook-master/config/

client.yml

1.9 KB

server.yml

1.9 KB

/.../Dimitry Snezhkov - Extras/octohook-master/doc/

requirements.txt

0.5 KB

/.../Dimitry Snezhkov - Extras/octohook-master/kcmd/

__init__.py

0.0 KB

__init__.pyc

0.1 KB

cmdlook.py

1.4 KB

cmdservice.py

12.2 KB

/.../Dimitry Snezhkov - Extras/octohook-master/keys/

server.pem

3.1 KB

/.../Dimitry Snezhkov - Extras/octohook-master/klib/

__init__.py

0.0 KB

__init__.pyc

0.1 KB

configuration.py

1.3 KB

ghlib.py

3.7 KB

ghlib.pyc

4.0 KB

/.../Dimitry Snezhkov - Extras/octohook-master/ktasks/

__init__.py

0.0 KB

gtasks.py

2.4 KB

/.../Dimitry Snezhkov - Extras/octohook-master/kweb/

__init__.py

0.0 KB

__init__.pyc

0.1 KB

gitcommander.py

8.0 KB

webrouter.py

1.1 KB

webservice.py

3.8 KB

webservice.pyc

3.9 KB

/.../Dimitry Snezhkov - Extras/octohook-master/logs/

octohook_client.log

40.8 KB

octohook_server.log

9.1 KB

/.../Dimitry Snezhkov - Extras/octohook-master/templates/

execlocal.tmpl

0.2 KB

putlocal.tmpl

0.2 KB

/.../Dimitry Snezhkov - Extras/octohook-master/utils/

cr_cert.sh

0.1 KB

/.../Dimitry Snezhkov - Extras/octohook-master/

octohook.py

4.2 KB

README.md

0.2 KB

/Dimitry Snezhkov/

DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf

74.5 MB

/Dor Azouri/

DEFCON-25-Dor-Azouri-BITSInject-WP.pdf

1.5 MB

DEFCON-25-Dor-Azouri-BITSInject.pdf

847.8 KB

/.../Duncan Woodbury and Nicholas Haltmeyer/

DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-WP.pdf

600.4 KB

DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles.pdf

4.7 MB

/.../Itzik Kotler and Amit Klein/

DEFCON-25-Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox-WP.pdf

1.4 MB

DEFCON-25-Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox.pdf

7.4 MB

/.../Josh Pitts - Extras/parser-output/win10/

output.json

18.3 MB

/.../Josh Pitts - Extras/parser-output/win7/

output.json

6.5 MB

/.../Josh Pitts - Extras/parser-output/win8/

output.json

9.6 MB

/.../Josh Pitts - Extras/parser-output/winVista/

output.json

4.6 MB

/.../Josh Pitts - Extras/parser-output/winXP/

output.json

886.7 KB

/.../Josh Pitts - Extras/

fido.py

173.6 KB

README.txt

0.1 KB

/Josh Pitts/

DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks.pdf

5.7 MB

/.../Mark Newlin Logan Lamb and Christopher Grayson/

DEFCON-25-Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf

3.9 MB

/.../Matt Knight and Marc Newlin/

DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP.pdf

127.7 KB

DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation.pdf

26.3 MB

/.../Matt Knight and Marc Newlin - UPDATED/

DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-UPDATED.pdf

26.8 MB

DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP-UPDATED.pdf

128.0 KB

/Matt Suiche/

DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf

317.7 KB

DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts.pdf

6.4 MB

/Morten Schenk/

DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf

1.2 MB

DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf

2.1 MB

/.../Phillip Tully and Michael Raggo/

DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-WP.pdf

395.7 KB

DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally.pdf

3.8 MB

/.../Romain Coltel and Yves Le Provost/

DEFCON-25-Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients-WP.pdf

1.1 MB

DEFCON-25-Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients.pdf

2.3 MB

/.../Steinthor Bjarnason and Jason Jones/

DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-WP.pdf

168.7 KB

DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House.pdf

6.6 MB

/Tomer Cohen/

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf

2.1 MB

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf

21.7 MB

/DEF CON 25 presentations/

DEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf

6.4 MB

DEFCON-25-0ctane-Untrustworthy-Hardware.pdf

2.7 MB

DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf

1.9 MB

DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf

3.1 MB

DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf

7.3 MB

DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf

2.7 MB

DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf

3.3 MB

DEFCON-25-Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf

31.4 MB

DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf

4.5 MB

DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf

44.7 MB

DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf

5.3 MB

DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf

7.0 MB

DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf

2.5 MB

DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA-UPDATED.pdf

17.5 MB

DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf

5.3 MB

DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf

1.9 MB

DEFCON-25-Closing-Slides.pdf

9.2 MB

DEFCON-25-Cory-Doctorow-Steps-Forward-Steps-Back-How-Can-We-Tell-If-We-Are-Winning-UPDATED.pdf

10.1 MB

DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit-UPDATED.pdf

3.0 MB

DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf

2.3 MB

DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf

7.2 MB

DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf

818.5 KB

DEFCON-25-DEFCON-101-The-Panel-UPDATED.pdf

6.6 MB

DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-UPDATED.pdf

519.6 KB

DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf

631.3 KB

DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks-UPDATED.pdf

9.9 MB

DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf

70.9 KB

DEFCON-25-FuzzyNop-and-Ceyx-MEATPISTOL-A-Modular-Malware-Implant-Framework-UPDATED.pdf

4.8 MB

DEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf

5.8 MB

DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud-UPDATED.pdf

2.5 MB

DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf

2.5 MB

DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe-UPDATED.pdf

4.3 MB

DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf

4.2 MB

DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery-UPDATED.pdf

2.9 MB

DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf

2.9 MB

DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs-UPDATED.pdf

871.6 KB

DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf

256.0 KB

DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf

2.4 MB

DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies-UPDATED.pdf

9.9 MB

DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf

6.3 MB

DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI-UPDATED.pdf

5.1 MB

DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf

4.8 MB

DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns-UPDATED.pdf

2.3 MB

DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf

2.1 MB

DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community-UPDATED.pdf

28.1 MB

DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf

4.4 MB

DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks-UPDATED.pdf

3.5 MB

DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf

4.4 MB

DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf

11.1 MB

DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf

4.4 MB

DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent-UPDATED.pdf

2.6 MB

DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf

2.3 MB

DEFCON-25-Joe-Rozner-Wiping-Out-CSRF-UPDATED.pdf

133.4 KB

DEFCON-25-Joe-Rozner-Wiping-Out-CSRF.pdf

134.6 KB

DEFCON-25-Jon-Medina-Where-are-all-the-SDN-Talks-UPDATED.pdf

4.9 MB

DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks-UPDATED.pdf

3.6 MB

DEFCON-25-K2-Un-Fucking-Forensics-UPDATED.pdf

1.8 MB

DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time-UPDATED.pdf

4.8 MB

DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf

4.7 MB

DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts-UPDATED.pdf

1.7 MB

DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf

1.5 MB

DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf

297.1 KB

DEFCON-25-Macpherson-and-Temmingh-Finding-Useful-info-with-Maltego-UPDATED.pdf

40.8 MB

DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms-UPDATED.pdf

3.1 MB

DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf

3.1 MB

DEFCON-25-Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf

60.0 MB

DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-UPDATED.pdf

7.0 MB

DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil-UPDATED.pdf

6.2 MB

DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf

6.3 MB

DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch-UPDATED.pdf

5.0 MB

DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf

1.3 MB

DEFCON-25-Mickey-Jesse-and-Oleksander-Driving-Down-the-Rabbit-Hole-UPDATED.pdf

12.9 MB

DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999-UPDATED.pdf

4.6 MB

DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf

6.8 MB

DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf

5.6 MB

DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf

5.8 MB

DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-UPDATED.pdf

2.0 MB

DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots-UPDATED.pdf

7.0 MB

DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf

5.0 MB

DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks-UPDATED.pdf

2.7 MB

DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf

2.5 MB

DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf

6.2 MB

DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf

2.0 MB

DEFCON-25-Panel-Corman-and-Congressmen-DC-to-DEFCON-UPDATED.pdf

6.3 MB

DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools-UPDATED.pdf

13.0 MB

DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf

4.7 MB

DEFCON-25-Patrick-Wardle-Death-by-1000-Installers-on-MacOS-UPDATED.pdf

30.7 MB

DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly-UPDATED..pdf

16.1 MB

DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf

8.8 MB

DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-UPDATED.pdf

6.3 MB

DEFCON-25-Plore-Popping-a-Smart-Gun-UPDATED.pdf

4.4 MB

DEFCON-25-Plore-Popping-a-Smart-Gun.pdf

4.3 MB

DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf

7.0 MB

DEFCON-25-Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf

7.2 MB

DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf

3.4 MB

DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services-UPDATED.pdf

2.5 MB

DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf

2.3 MB

DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf

1.4 MB

DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf

2.6 MB

DEFCON-25-Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf

5.5 MB

DEFCON-25-Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf

2.1 MB

DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip-UPDATED.pdf

6.1 MB

DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf

6.1 MB

DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android-UPDATED.pdf

921.3 KB

DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf

933.5 KB

DEFCON-25-spaceB0x-Exploiting-Continuous-Integration-UPDATED.pdf

2.8 MB

DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf

2.1 MB

DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-UPDATED.pdf

10.5 MB

DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation-UPDATED.pdf

3.8 MB

DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf

6.3 MB

DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf

7.1 MB

DEFCON-25-Svea-Eckert-Andreas-Dewes-Dark-Data.pdf

6.5 MB

DEFCON-25-Tess-Schrodinger-Total-Recall.pdf

5.2 MB

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-UPDATED.pdf

15.5 MB

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf

2.1 MB

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf

21.7 MB

DEFCON-25-trixr4skids-DOOMed-Point-of-Sale-Systems-UPDATED.pdf

22.7 MB

DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf

3.5 MB

DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf

2.0 MB

DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf

2.3 MB

DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf

5.1 MB

DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf

2.9 MB

DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-UPDATED.pdf

3.1 MB

DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf

7.9 MB

DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf

5.8 MB

DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf

1.7 MB

DEFCON-25-Zardus-25-Years-of-Program-Analysis-UPDATED.pdf

3.9 MB

DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf

2.0 MB

/.../Carlos Perez - Principals on Leveraging PowerShell for Red Teams-UPDATED/Extras-UPDATED/Source Files/

adsecurity.ps1

0.8 KB

basics_commands.ps1

0.6 KB

basics_help.ps1

0.5 KB

basics_objects.ps1

0.5 KB

basics_pipeline.ps1

3.0 KB

basics_pssnapin_modules.ps1

0.0 KB

basics_variables.ps1

1.2 KB

COM Objects.ps1

0.4 KB

cradles.ps1

1.5 KB

Macro.vba

0.7 KB

MOF_Example_InstalledSoftware.ps1

1.9 KB

WMI Event Types.ps1

2.2 KB

WMI_Associations.ps1

0.9 KB

WMI_Event_Examples.ps1

10.0 KB

WMI_Helper_Functions.psq.ps1

3.4 KB

/.../Carlos Perez - Principals on Leveraging PowerShell for Red Teams-UPDATED/Extras-UPDATED/

LICENSE

1.5 KB

README.md

0.1 KB

/.../Carlos Perez - Principals on Leveraging PowerShell for Red Teams-UPDATED/

DEFCON-25-Workshop-Carlos-Perez-Leveraging-PowerShell-Basics-UPDATED.pdf

4.8 MB

/.../Jack Mott and Jason Williams - Extras/

BSLV-DC-SIGDEV.ova

4.8 GB

/.../Jack Mott and Jason Williams - Practical Network Signature Development For Open Source IDS/

DEFCON-25-Workshop-Jack-Mott-Jason-Williams-Practical-Network-Signature-Development-For-Open-Source-IDS.pdf

10.5 MB

DEFCON-25-Workshop-Mott-Williams-Practical-Network-Signature-Development-For-Open-Source-IDS-Workbook.pdf

190.1 KB

/.../Scapy-DC25-Master/OOBackdoor/

clientmacs

24.6 KB

LICENSE

1.1 KB

nmap-mac-prefixes

565.3 KB

OOBackdoorClient.py

16.6 KB

OOBackdoorServer.py

13.7 KB

README.md

0.9 KB

servermacs

31.0 KB

/.../Scapy-DC25-Master/OOBackdoor-Detection/

detect_lvl0.py

0.5 KB

detect_lvl0_live.py

0.6 KB

detect_lvl1.py

0.6 KB

/.../Repositories of Code that are useful/

pbkdf2-1.3.tar.gz

6.4 KB

pycryptodomex-3.4.5.tar.gz

6.5 MB

rc4-0.1.tar.gz

1.1 KB

scapy-2.3.3.tgz

1.4 MB

scapy_2.2.0.orig.tar.gz

973.0 KB

/.../Scapy-DC25-Master/Utils/port-knocking/

knocker.py

0.4 KB

port-knocking-backdoor.py

2.4 KB

/.../Scapy-DC25-Master/Utils/

geolocate-pcap.py

1.4 KB

/.../Scapy-DC25-Master/

demo-1.py

7.3 KB

demo-2.py

1.9 KB

demo-2_bonus.py

0.8 KB

PASSWORDs

0.1 KB

README.md

0.9 KB

/.../Scapy-Video-Demos-DC25-Media/

demo-1.mp4

180.7 MB

demo-1_addendum.mp4

11.0 MB

README.md

0.1 KB

/.../Stryngs Jack64 and zero x - Build your Stack with Scapy/

DEFCON-25-Workshop-Stryngs-Jack64-and-zero-x-Build-your-stack-with-Scapy-Readme.txt

0.9 KB

DEFCON-25-Workshop-Stryngs-Jack64-and-zero-x-Build-your-stack-with-Scapy-UPDATED.pdf

33.0 MB

/DEF CON 25 workshops/

DEFCON-25-Carlos-Perez-Leveraging-PowerShell-Basics.pdf

1.1 MB

DEFCON-25-Carlos-Perez-Leveraging-Powershell-Lab-Manual-Basics.pdf

890.2 KB

DEFCON-25-Carlos-Perez-Leveraging-Powershell-Lab-Manual.pdf

469.5 KB

DEFCON-25-Carlos-Perez-Leveraging-PowerShell.pdf

4.8 MB

DEFCON-25-Workshop-Abhay-Bhargav-Building-AppSec-Automation-With-Python.pdf

1.1 MB

DEFCON-25-Workshop-Adam-Steed-Attacking-Active-Directory-and-Advanced-Methods-of-Defense.pdf

5.2 MB

DEFCON-25-Workshop-Aditya-Gupta-BLE-Exploitation-for-IoT-devices.pdf

1.5 MB

DEFCON-25-Workshop-Alan-Orlikoski-and-Dan-M-Free-and-Easy-DFIR-Triage-for-Everyone.pdf

3.1 MB

DEFCON-25-Workshop-Alan-Orlikoski-and-Dan-Moor-Free-and-Easy-DFIR-Triage-for-Everyone-UPDATED.pdf

12.8 MB

DEFCON-25-Workshop-Anshuman-Bhartiya-Harnessing-the-Power-of-Docker-and-Kubernetes-Handout.pdf

174.5 KB

DEFCON-25-Workshop-Anshuman-Bhartiya-Harnessing-the-Power-of-Docker-and-Kubernetes.pdf

75.5 KB

DEFCON-25-Workshop-Bryan-Passifiume-and-Richard-Henderson-Scanning-The-Airwaves.pdf

1.6 MB

DEFCON-25-Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country-UPDATED.pdf

1.5 MB

DEFCON-25-Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country.pdf

3.4 MB

DEFCON-25-Workshop-Clarence-Chio-and-Anto-Joseph-Pwning-Machine-Learning-Systems.pdf

1.4 MB

DEFCON-25-Workshop-Craig-Young-Brainwashing-Embedded-Systems-UPDATED.pdf

60.3 MB

DEFCON-25-Workshop-DazzleCat-Duo-Intro-To-Disassembly.pdf

2.1 MB

DEFCON-25-Workshop-Eijah-Subverting-Privacy-Exploitation-Using-HTTP-UPDATED.PDF

1.1 MB

DEFCON-25-Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf

2.1 MB

DEFCON-25-Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf

1.8 MB

DEFCON-25-Workshop-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf

7.8 MB

DEFCON-25-Workshop-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation.pdf

5.8 MB

DEFCON-25-Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf

452.0 KB

DEFCON-25-Workshop-Ruben-Boobeb-UAC-0day-All-Day.pdf

7.6 MB

DEFCON-25-Workshop-Sean-Dillion-and-Zachary-Harding-Exploitation-Malware-Forward-Engineering.pdf

3.8 MB

DEFCON-25-Workshop-Sergei-Frankoff-and-Sean-Wilson-Malware-Triage-Workshop-Malscripts-Are-The-New-EK.pdf

3.7 MB

DEFCON-25-Workshop-stryngs-Jack64-and-zero-x-Build-your-stack-with-Scapy.pdf

4.4 MB

DEFCON-25-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Client-and-Tester-Security-WP.pdf

247.0 KB

DEFCON-25-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Client-and-Tester-Security.pdf

12.4 MB

/DEF CON 25 x-hour film contest/

Finalist A.mp4

117.4 MB

Finalist B.mp4

195.4 MB

Finalist C.mp4

354.6 MB

Pacin Heat Alexis Park 1.mp4

153.9 MB

/

$BIGNUM_steps_forward,$TRUMPNUM_steps_back_how_can_we_tell_if_were_winning.mp4

272.2 MB

25_Years_of_Program_Analysis .mp4

159.5 MB

_In_Security_in_Building_Automation-How_to_Create_Dark_Buildings_with_Light_Speed.mp4

145.1 MB

_rustls_modern,fast,safer_TLS_.mp4

145.7 MB

_Tick,Tick,Tick._Boom_Youre_Dead._--_Tech_and_the_FTC.mp4

266.6 MB

_Un_Fucking_Forensics_–_ActivePassive_i.e._OffensiveDefensive_memory_hackingdebugging..mp4

52.3 MB

A_Brief_Message_from_Security.mp4

55.3 MB

A_Look_Inside_The_Key_Management_Facility_of_The_Root_DNSSEC_KSK.mp4

183.0 MB

A_New_Era_of_SSRF-Exploiting_URL_Parser_in_Trending_Programming_Languages.mp4

136.4 MB

A_New_Political_Era_Time_to_start_wearing_tin-foil_hats_following_the_2016_elections.mp4

489.5 MB

A_Picture_is_Worth_a_Thousand_Words,Literally_Deep_Neural_Networks_for_Social_Stego.mp4

231.3 MB

A_Tangle_of_Plastic_Spaghetti_A_Look_Into_the_Security_of_3D_Printers.mp4

190.2 MB

Abusing_Certificate_Transparency_Logs.mp4

111.2 MB

Abusing_Smart_Cars_with_QR_codes.mp4

137.2 MB

Abusing_Webhooks_for_Command_and_Control.mp4

111.0 MB

Alex_Stamos,CSO,Facebook.mp4

127.1 MB

Alice_and_Bob_are_Slightly_Less_Confused.mp4

134.9 MB

All_Your_Things_Are_Belong_To_Us .mp4

252.1 MB

Amateur_Digital_Archeology.mp4

264.3 MB

An_ACE_Up_the_Sleeve_Designing_Active_Directory_DACL_Backdoors.mp4

265.6 MB

An_election_system_is_much_more_than_the_voting_machine_or_the_booth..mp4

405.7 MB

An_Introduction_to_Graph_Theory_for_OSINT.mp4

156.4 MB

Ardusploit-Proof_of_concept_for_Arduino_code_injection.mp4

253.8 MB

Are_all_BSDs_are_created_equally_A_survey_of_BSD_kernel_vulnerabilities..mp4

171.5 MB

Are_you_killing_your_security_program_Mostly_dead_is_slightly_alive….mp4

258.8 MB

Arm_Mounted_Weaponized_Platform_and_Anime_Viewer.mp4

63.1 MB

Assembly_Language_is_Too_High_Level.mp4

311.4 MB

Attack_Surface_Discovery_with_Intrigue.mp4

199.7 MB

Attacking_Autonomic_Networks.mp4

236.2 MB

Attacking_Wireless_Interfaces_in_Vehicles.mp4

170.8 MB

Backdooring_the_Lottery_and_Other_Security_Tales_in_Gaming_over_the_Past_25_Years .mp4

169.9 MB

Beyond_Phishing_–_Building_and_Sustaining_a_Corporate_SE_Program.mp4

191.8 MB

Biohackers_Die.mp4

210.9 MB

Biotechnology_Needs_a_Security_Patch...Badly.mp4

225.9 MB

BITSInject.mp4

74.0 MB

Blue_team_TLS_hugs.mp4

130.9 MB

Breaking_Bitcoin_Hardware_Wallets.mp4

209.3 MB

Breaking_the_x86_Instruction_Set.mp4

161.0 MB

Breaking_Wind_Adventures_in_Hacking_Wind_Farm_Control_Networks.mp4

127.3 MB

Brief_history_of_election_machine_hacking_and_lessons_learned.mp4

185.6 MB

Building_Google_For_Criminal_Enterprises.mp4

180.1 MB

Bypassing_Android_Password_Manager_Without_Root.mp4

117.1 MB

CableTap_Wirelessly_Tapping_Your_Home_Network.mp4

228.7 MB

Call_the_plumber-you_have_a_leak_in_your_named_pipe.mp4

170.1 MB

Change_Agents_How_to_Effectively_Influence_Intractable_Corporate_Cultures.mp4

331.2 MB

Cisco_Catalyst_Exploitation.mp4

253.0 MB

CITL_and_the_Digital_Standard-A_Year_Later .mp4

265.0 MB

Cloudy_With_A_Chance_of_Persistance_AWS_Post_Compromise_Primer.mp4

161.9 MB

Common_misconceptions_and_false_parallels_about_voting_technology._We_can_do_online_banking_and_use_ATMs,why_can_t_we_vote_on_touch_screens_or_online.mp4

219.5 MB

Controlling_IoT_devices_with_crafted_radio_signals.mp4

225.9 MB

Cryptanalysis_in_the_Time_of_Ransomware.mp4

215.1 MB

CVE_IDs_and_How_to_Get_Them.mp4

286.4 MB

Cyber_Security_Issues_with_Level_0,1_Devices.mp4

196.0 MB

Cypherpunks_History.mp4

88.3 MB

Dangerous_Minds_Podcast_Live_at_DCBHV_celebrating_100th_episode.mp4

448.3 MB

Dark_Data.mp4

271.5 MB

DataSploit_Open_Source_Assistant_for_OSINT.mp4

135.6 MB

DC_to_DEF_CON_Q_and_A_with_Congressmen.mp4

216.6 MB

Dealing_the_perfect_hand-Shuffling_memory_blocks_on_zOS.mp4

268.5 MB

Death_By_1000_Installers;_on_macOS,its_all_broken.mp4

158.5 MB

Deceptacon_Wi-Fi_Deceptions_in_under_$5.mp4

298.7 MB

DEF_CON_101_Panel.mp4

1.0 GB

DEF_CON_25_welcome_video.mp4

153.3 MB

DEF_CON_Closing_Ceremonies.mp4

787.7 MB

DEFCON-25-Program.pdf

17.1 MB

DEFCON-25-Receipt.pdf

6.3 MB

DefCon_Unofficial_Badges_Panel.mp4

425.0 MB

Demystifying_the_OPM_breach,WTF_really_happened.mp4

342.7 MB

Demystifying_Windows_Kernel_Exploitation_by_Abusing_GDI_Objects..mp4

228.5 MB

Designing_an_Automatic_Gain_Control.mp4

348.0 MB

DFIR_Automation_Orchestration_Tools_For_OSINTRecon-Collecting_Evidence_Like_a_Robot.mp4

111.9 MB

Digital_Vengeance_Exploiting_the_Most_Notorious_C_and_C_Toolkits.mp4

144.6 MB

Dissecting_Industrial_Wireless_implementations.mp4

133.1 MB

DIYBioweapons_and_Regulation.mp4

180.5 MB

DNS-Devious_Name_Services-Destroying_Privacy_and_Anonymity_Without_Your_Consent.mp4

228.5 MB

Do_Tinder_Bots_Dream_of_Electric_Toys_How_Tinder_Bots_are_breaking_hearts_all_over_the_world,and_trashing_Tinder’s_reputation_while_they’re_at_it..mp4

169.3 MB

Domain_Discovery_Expanding_your_scope_like_a_boss.mp4

222.6 MB

DOOMed_Point_of_Sale_Systems .mp4

157.2 MB

Driving_down_the_rabbit_hole.mp4

212.3 MB

DYI_NSA_On_The_Cheap_Plus_a_Security_Analysis_of_P25_.mp4

577.4 MB

Election_Hacking-_Legal_Considerations_from_the_Civil_Not_Criminal_Side.mp4

186.6 MB

ERPA_Only_Your_Grades_Are_Safe;_OSINT_In_Higher_Education.mp4

159.3 MB

Ethics_In_BioHacking.mp4

468.8 MB

Evading_next-gen_AV_using_artificial_intelligence.mp4

63.1 MB

Everything_you_need_to_know_about_the_U.S._Department_of_Justice,Computer_Crime_and_Intellectual_Property.mp4

106.4 MB

Exploiting_0ld_Mag-stripe_information_with_New_technology.mp4

96.8 MB

Exploiting_Continuous_Integration_CI_and_Automated_Build_Systems .mp4

140.7 MB

Failsafe_Yet_Another_SimpliSafe_Attack_Vector.mp4

328.8 MB

Fooling_The_Hound_Deceiving_Domain_Admin_Hunters.mp4

290.6 MB

Fortune_100_InfoSec_on_a_State_Government_Budget.mp4

269.9 MB

Friday_the_13th_JSON_attacks .mp4

175.3 MB

From_Box_to_Backdoor_Using_Old_School_Tools_and_Techniques_to_Discover_Backdoors_in_Modern_Devices.mp4

206.6 MB

From_One_Country-One_Floppy_to_Startup_Nation_-the_story_of_the_early_days_of_the_Israeli_hacking_community,and_the_journey_towards_today_s_vibrant_startup_scene.mp4

146.5 MB

Fun_with_Modbus_0x5a-Nothing_New._Still_Relevant.mp4

101.5 MB

Game_of_Chromes_Owning_the_Web_with_Zombie_Chrome_Extensions.mp4

101.3 MB

Game_of_Drones_Putting_the_Emerging_and_quot;Drone_Defense_and_quot;_Market_to_the_Test.mp4

264.1 MB

Genetic_Diseases_to_Guide_Digital_Hacks_of_the_Human_Genome_How_the_Cancer_Moonshot_Program_will_Enable_Almost_Anyone_to_Crash_the_Operating_System_that_Runs_You_or_to_End_Civilization... .mp4

302.3 MB

Get-$pwnd_Attacking_Battle-Hardened_Windows_Server.mp4

121.2 MB

Ghost_in_the_Droid_Possessing_Android_Applications_with_ParaSpectre.mp4

184.3 MB

Go_Beyond_Tabletop_Scenarios_by_Building_an_Incident_Response_Simulation_Platform.mp4

376.0 MB

GODUMP=NG_packet_sniffing_the_Gotenaa.mp4

492.3 MB

GPS_System_Integrity.mp4

96.8 MB

Grand_Theft_Radio_Stopping_SDR_Relay_Attacks_on_PKES_.mp4

120.0 MB

Grid_insecurity-and_how_to_really_fix_this_shit.mp4

161.8 MB

Hack_Your_Senses_Sensory_Augmentation_and_Brain_Plasticity_.mp4

223.2 MB

Hackers_gonna_hack_–_But_do_they_know_why.mp4

232.3 MB

Hacking_an_Insecure_WiFi_Camera.mp4

69.5 MB

Hacking_and_Robotics_v2.0 .mp4

124.5 MB

Hacking_Democracy_A_Socratic_Dialogue.mp4

400.9 MB

Hacking_on_Multiparty_Computation.mp4

116.2 MB

Hacking_Smart_Contracts.mp4

156.4 MB

Hacking_Some_More_of_the_Wireless_World_Software_Defined_Radio_Exploits.mp4

765.5 MB

Hacking_the_Cloud.mp4

249.5 MB

Hacking_The_Internet_of_Dongs-Hacking_Sex_Toys_For_Fun_And_Absolutely_No_Profit.mp4

224.9 MB

Hacking_the_Second_Genetic_Code_using_Information_Theory.mp4

164.1 MB

Hacking_travel_routers_like_its_1999.mp4

84.6 MB

Hardware_Hacking_Old_Sk00l_and_New_Sk00l.mp4

194.1 MB

Have_you_seen_my_naked_selfies_Neither_has_my_snoopy_boyfriend._Privacy_within_a_Relationship.mp4

374.2 MB

Heavy_Diving_for_Credentials_Towards_an_Anonymous_Phishing.mp4

190.0 MB

Heavy_Truck_and_Electronic_Logging_Devices_What_Could_Go_Wrong.mp4

152.0 MB

Here_to_stay_Gaining_persistency_by_abusing_advanced_authentication_mechanisms.mp4

241.4 MB

Hide_Yo_Keys,Hide_Yo_Car-Remotely_Exploiting_Connected_Vehicle_APIs_and_Apps.mp4

187.6 MB

Home_Depot_and_a_Plan_of_Attack_for_Hackers.mp4

91.6 MB

How_did_we_get_here_A_history_of_voting_technology,hanging_chads,and_the_Help_America_Vote_Act.mp4

264.1 MB

How_to_obtain_100_Facebooks_accounts_per_day_through_internet_searches.mp4

113.3 MB

How_to_Prepare_for_Internet_Privacy_at_College.mp4

114.8 MB

How_to_use_the_Scientific_Method_in_Security_Research.mp4

436.6 MB

How_we_created_the_first_SHA-1_collision_and_what_it_means_for_hash_security.mp4

142.9 MB

How_your_doctor_might_be_trying_to_kill_you_and_how_personal_genomics_can_save_your_life.mp4

220.5 MB

Hunting_Down_the_Domain_Admin_and_Rob_Your_Network_Portia-_Finding_Your_Way_to_Domain_Access.mp4

234.8 MB

I_Know_What_You_Are_by_the_Smell_of_Your_Wifi.mp4

82.7 MB

If_You_Give_a_Mouse_a_Microchip..._It_will_execute_a_payload_and_cheat_at_your_high-stakes_video_game_tournament.mp4

128.4 MB

IIDS_An_Intrusion_Detection_System_for_IoT.mp4

357.9 MB

Implantable_Technology_Show_and_Tell.mp4

173.7 MB

Inside_the_Alaris_Infusion_Pump,not_too_much_medication_por_favor.mp4

169.8 MB

Inside_the_“Meet_Desai”_Attack_Defending_Distributed_Targets_from_Distributed_Attacks.mp4

708.8 MB

Into_the_Bird’s_Nest_A_Comprehensive_Look_at_Twitter_as_a_Research_Tool.mp4

217.2 MB

Introducing_HUNT_Data_Driven_Web_Hacking_and_Manual_Testing.mp4

101.3 MB

Introduction_To_Cheat_Engine.mp4

157.6 MB

IoT-the_gift_that_keeps_on_giving.mp4

316.5 MB

IoT_From_DVRs_to_Dildos.mp4

303.7 MB

IoT_updates_to_help_protect_consumers.mp4

223.6 MB

IoT_Village_Keynote-Friends,Not_Foes_Rethinking_the_Researcher-Vendor_Relationship.mp4

116.4 MB

IP_Spoofing_What_Is_It,How_It_Allows_Largest_Attacks_and_How_to_Fix_It_.mp4

263.6 MB

Iron_Sights_for_Your_Data_Predictive_Analytics_for_your_Blue_Team.mp4

98.0 MB

Is_Car_Hacking_Over_An_Introduction_to_AUTOSAR_Secure_Onbaord_Communication.mp4

234.7 MB

Jailbreaking_Apple_Watch.mp4

243.5 MB

Keynote-Seeing_is_Believing-The_Future_of_Recon_You_Wont_Believe_What_Happens_Next.mp4

245.5 MB

Koadic_C3-Windows_COM_Command_and_Control_Framework.mp4

615.2 MB

Large_Scale_Wireless_Monitoring-KISMET_packet_sniffer_on_a_multi-radio_array.mp4

289.4 MB

Layer_8_and_Why_People_are_the_Most_Important_Security_Tool.mp4

239.1 MB

Linux-Stack_Based_V2X_Framework_All_You_Need_to_Hack_Connected_Vehicles.mp4

174.1 MB

Linux-Stack_Based_V2X_Framework_SocketV2V_All_You_Need_to_Hack_Connected_Vehicles.mp4

144.0 MB

macOSiOS_Kernel_Debugging_and_Heap_Feng_Shui.mp4

182.8 MB

Make_Your_Own_802.11ac_Monitoring_Hacker_Gadget.mp4

399.5 MB

Malicious_CDNs_Identifying_Zbot_Domains_en_Masse_via_SSL_Certificates_and_Bipartite_Graphs.mp4

204.9 MB

Man_in_the_NFC.mp4

138.5 MB

Mansion_Apartment_Shack_House_How_To_Explain_Crypto_To_Practically_Anyone.mp4

80.3 MB

MEATPISTOL,A_Modular_Malware_Implant_Framework.mp4

245.9 MB

Medical_Device_Ethics_and_Security.mp4

233.0 MB

Medical_Industry_Disrupt-Blockchain_and_The_Hope_for_Healthcare.mp4

173.2 MB

Micoscopes_are_Stupid.mp4

176.1 MB

Microservices_and_FaaS_for_Offensive_Security.mp4

168.3 MB

Modern_Day_CovertTCP_with_a_Twist.mp4

368.2 MB

MS_Just_Gave_the_Blue_Team_Tactical_Nukes_And_How_Red_Teams_Need_To_Adapt_.mp4

346.6 MB

Neurogenic_Peptides_Smart_Drugs_4-Minute_Mile.mp4

211.8 MB

Next-Generation_Tor_Onion_Services.mp4

141.1 MB

Nor_lose_the_common_touch.mp4

276.6 MB

Offensive_Malware_Analysis_Dissecting_OSXFruitFly_via_a_Custom_C_and_C_Server.mp4

150.3 MB

Open_Source_Safe_Cracking_Robots-Combinations_Under_1_Hour_Is_it_bait_Damn_straight_it_is._ .mp4

117.0 MB

Opening_Ceremonies_A_Place_Where_Kids_Learn_White-Hat_Hacking_to_Better_The_World.mp4

86.2 MB

Opening_Ceremony_How_Hackers_Changed_The_Security_Industry.mp4

381.8 MB

Operational_Security_Lessons_From_The_Dark_Web.mp4

112.6 MB

Opt_Out_or_Deauth_Trying_-_Anti-Tracking_Bots_Radios_and_Keystroke_Injection.mp4

233.1 MB

OSINT_Tactics_on_Source_Code_and_Developers.mp4

337.0 MB

Panel_DEF_CON_Groups.mp4

718.3 MB

Panel_Meet_The_Feds.mp4

781.3 MB

Past,Present_and_Future_of_High_Speed_Packet_Filtering_on_Linux.mp4

94.5 MB

PEIMA_Probability_Engine_to_Identify_Malicious_Activity_Using_Power_Laws_to_address_Denial_of_Service_Attacks .mp4

274.6 MB

Persisting_with_Microsoft_Office_Abusing_Extensibility_Options.mp4

87.3 MB

Phone_system_testing_and_other_fun_tricks.mp4

116.5 MB

POCSAG_Amateur_Pager_Network.mp4

225.2 MB

Popping_a_Smart_Gun.mp4

150.8 MB

Porosity_A_Decompiler_For_Blockchain-Based_Smart_Contracts_Bytecode.mp4

629.5 MB

Privacy_is_Not_An_Add-On_Designing_for_Privacy_from_the_Ground_Up.mp4

175.0 MB

Protecting_Users_Privacy_in_a_Location-Critical_Enterprise_The_Challenges_of_9-1-1_Location.mp4

441.7 MB

Psychoactive_Chemicals_in_Combat.mp4

229.7 MB

Pwning_the_Industrial_IoT_RCEs_and_backdoors_are_around.mp4

149.5 MB

Radio_Exploitation_101_Characterizing,Contextualizing,and_Applying_Wireless_Attack_Methods.mp4

213.7 MB

Rage_Against_the_Weaponized_AI_Propaganda_Machine.mp4

271.2 MB

Real-time_RFID_Cloning_in_the_Field.mp4

101.2 MB

Recon_and_bug_bounties_what_a_great_love_story.mp4

158.0 MB

Redesigning_PKI_for_IoT_because_Crypto_is_hard.mp4

372.2 MB

Revoke-Obfuscation_PowerShell_Obfuscation_Detection_And_Evasion_Using_Science_.mp4

686.3 MB

Rustls_modern,fast,safer_TLS.mp4

145.7 MB

SE_vs_Predator_Using_Social_Engineering_in_ways_I_never_thought…..mp4

282.0 MB

Searching_the_Invisible_Internet.mp4

60.7 MB

Secret_Tools_Learning_about_Government_Surveillance_Software_You_Cant_Ever_See .mp4

92.9 MB

Secure_Tokin_and_Doobiekeys_How_to_roll_your_own_counterfeit_hardware_security_devices.mp4

201.0 MB

SecureWorks_SDR_Replay_Attacks_against_home_security_systems_.mp4

123.4 MB

Securing_the_Election_Office_A_Local_Response_to_a_Global_Threat.mp4

275.6 MB

Security_Analysis_of_the_Telegram_IM.mp4

108.0 MB

See_no_evil,hear_no_evil_Hacking_invisibly_and_silently_with_light_and_sound.mp4

583.0 MB

SHA-3_vs_the_world.mp4

278.0 MB

Skills_For_A_Red-Teamer.mp4

416.9 MB

Skip_Tracing_For_Fun_and_Profit_How_to_Hide_From_The_FBI.mp4

286.1 MB

Social_Engineering_with_Web_Analytics.mp4

185.3 MB

SSL_Visibility_Revisted_A_Year_In_Privacy_Improvements_For_Encrypted_Communications.mp4

196.8 MB

Standardizing_the_Secure_Deployment_of_Medical_Devices.mp4

208.0 MB

Starting_the_Avalanche_Application_DoS_In_Microservice_Architectures.mp4

170.3 MB

Stories_from_a_15_days_SMB_Honeypot_Mum,Tons_of_WannaCry_and_Evils_Attacked_Our_Home.mp4

253.7 MB

Strategies_on_Securing_Your_Banks_and_Enterprises_From_Someone_Who_Robs_Banks_and_Enterprises_.mp4

453.8 MB

Strengthen_Your_SPECOPS_Team_by_Leveraging_Neurodiversity.mp4

92.8 MB

Suitcase_Repeater_Build_for_UHF-70cm.mp4

248.1 MB

Taking_Windows_10_Kernel_Exploitation_to_the_next_level-Leveraging_write-what-where_vulnerabilities_in_Creators_Update.mp4

108.9 MB

Tales_from_a_healthcare_hacker.mp4

253.9 MB

Teaching_Old_Shellcode_New_Tricks .mp4

74.6 MB

Thats_no_car._Its_a_network.mp4

259.5 MB

The_Adventures_of_AV_and_the_Leaky_Sandbox.mp4

130.1 MB

The_Bicho_An_Advanced_Car_Backdoor_Maker.mp4

204.4 MB

The_Black_Art_of_Wireless_Post-Exploitation_Bypassing_Port-Based_Access_Controls_Using_Indirect_Wireless_Pivots.mp4

435.4 MB

The_Black_Art_of_Wireless_Post_Exploitation.mp4

243.4 MB

The_Brains_Last_Stand.mp4

221.4 MB

The_Brave_New_World_of_Bio-Entrepreneurship.mp4

171.1 MB

The_call_is_coming_from_inside_the_house_Are_you_ready_for_the_next_evolution_in_DDoS_attacks.mp4

170.4 MB

The_Future_is_Fake_Identities.mp4

262.7 MB

The_Human_Factor_Why_Are_We_So_Bad_at_Security_and_Risk_Assessment.mp4

359.0 MB

The_Internet_Already_Knows_Im_Pregnant .mp4

500.7 MB

The_Internet_of_Vulnerabilities.mp4

225.2 MB

The_Last_CTF_Talk_You’ll_Ever_Need_AMA_with_20_years_of_DEF_CON_Capture-the-Flag_organizers .mp4

879.7 MB

The_Moral_Imperative_of_Biohacking.mp4

162.4 MB

The_Patient_as_CEO.mp4

137.9 MB

The_spear_to_break_the_security_wall_of_S7CommPlus.mp4

78.7 MB

The_State_of_US_Voting_System_Security.mp4

235.9 MB

The_Surveillance_Capitalism_Will_Continue_Until_Morale_Improves.mp4

339.3 MB

The_Symantec_SSL_Debacle_Lessons_Learned_and_Future_Steps.mp4

278.0 MB

The_Why_and_How_for_Secure_Automatic_Patch_Management.mp4

107.8 MB

Thematic_Social_Engineering_Making_SE_Work_at_Scale.mp4

167.6 MB

There’s_no_place_like_127.0.0.1-Achieving_reliable_DNS_rebinding_in_modern_browsers.mp4

276.1 MB

TOOOL_Lockpicking_Talk#1.mp4

148.4 MB

Total_Recall_Implanting_Passwords_in_Cognitive_Memory.mp4

203.2 MB

Total_Recall_Implicit_Learning_As_A_Cryptographic_Primitive.mp4

213.0 MB

Total_Recoll.mp4

47.1 MB

Tracking_Spies_in_the_Skies.mp4

148.6 MB

Traffic_Analysis_in_Cybespace.mp4

164.2 MB

Trigraph_An_Ethereum-based_Teleradiology_Application.mp4

190.2 MB

Trojan-tolerant_Hardware_and_Supply_Chain_Security_in_Practice.mp4

104.0 MB

Twenty_Years_of_MMORPG_Hacking_Better_Graphics,Same_Exploits.mp4

178.1 MB

Unboxing_Android_Everything_you_wanted_to_know_about_Android_packers.mp4

94.8 MB

Untrustworthy_Hardware_and_How_to_Fix_It.mp4

79.5 MB

Up_close_and_personal-Keeping_an_eye_on_mobile_applications.mp4

81.0 MB

Using_GPS_Spoofing_to_control_time.mp4

600.5 MB

Visual_Network_and_File_Forensics.mp4

154.4 MB

Weaponizing_Machine_Learning_Humanity_Was_Overrated_Anyway.mp4

157.0 MB

Weaponizing_the_BBC_Micro_Bit.mp4

126.2 MB

Welcome_to_DEF_CON_25.mp4

131.5 MB

What_is_Ground_Baby_dont_hurt_me_.mp4

125.5 MB

Whats_the_DFIRence_for_ICS.mp4

161.6 MB

When_Privacy_Goes_Poof_Why_Its_Gone_and_Never_Coming_Back.mp4

274.4 MB

When_the_Current_Ransomware_and_Payload_of_the_Day_CRAP_Hits_the_Fan_Breaking_the_Bad_News.mp4

305.1 MB

Where_are_the_SDN_Security_Talks.mp4

279.6 MB

WIGLE_Like_You_Mean_It_Maximizing_Your_Wardriving_Experience.mp4

391.0 MB

Winner_Announcement_Prize_Distribution.mp4

138.8 MB

Wiping_out_CSRF.mp4

294.4 MB

WSUSpendu_How_to_hang_WSUS_clients .mp4

63.1 MB

XenoScan_Scanning_Memory_Like_a_Boss.mp4

222.2 MB

Yalda,Automated_Bulk_Intelligence.mp4

199.9 MB

Yet_Another_Password_Hashing_Talk.mp4

140.6 MB

You_are_not_a_Digital_Native_and_thats_OK_.mp4

181.5 MB

Youre_Going_to_Connect_to_the_Wrong_Domain_Name.mp4

98.5 MB

 

Total files 581


Copyright © 2024 FileMood.com