MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

DEF CON 25 audio

磁力链接/BT种子名称

DEF CON 25 audio

磁力链接/BT种子简介

种子哈希:8db8e2feee069380f6be32be08a0837bac550ac6
文件大小: 43.2G
已经下载:58次
下载速度:极快
收录时间:2018-09-14
最近下载:2021-05-19

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:8DB8E2FEEE069380F6BE32BE08A0837BAC550AC6
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 暗网Xvideo TikTok成人版 PornHub 听泉鉴鲍 少女日记 草榴社区 哆哔涩漫 呦乐园 萝莉岛 悠悠禁区 拔萝卜 疯马秀

最近搜索

小姐 藤 征服 细腿 爱与情 小紫 세라 小飞 美女空姐 高清原版 护 萝莉秀 博主 全身 小胸 狂舞 英剧 看屁股 贤惠 大唐 鞋 东哥 高清偷拍 掉掉 萝视频 家长 裸 潜入 大叫 小妈

文件列表

  • Album Art - flac.jpg 19.2 kB
  • Album Art - lossy.jpg 684.3 kB
  • flac/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.flac 107.8 MB
  • flac/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc 42.3 kB
  • flac/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.flac 222.3 MB
  • flac/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc 85.0 kB
  • flac/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.flac 122.6 MB
  • flac/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc 52.5 kB
  • flac/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.flac 107.2 MB
  • flac/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc 36.7 kB
  • flac/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.flac 89.4 MB
  • flac/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc 26.5 kB
  • flac/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.flac 120.6 MB
  • flac/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc 55.6 kB
  • flac/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.flac 87.1 MB
  • flac/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc 35.1 kB
  • flac/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.flac 56.1 MB
  • flac/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc 23.7 kB
  • flac/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.flac 43.4 MB
  • flac/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc 8.7 kB
  • flac/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.flac 115.7 MB
  • flac/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc 48.6 kB
  • flac/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.flac 113.4 MB
  • flac/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc 49.9 kB
  • flac/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.flac 110.8 MB
  • flac/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc 56.2 kB
  • flac/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.flac 97.3 MB
  • flac/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc 43.1 kB
  • flac/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.flac 121.9 MB
  • flac/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc 51.2 kB
  • flac/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.flac 103.5 MB
  • flac/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc 31.0 kB
  • flac/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.flac 130.6 MB
  • flac/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc 53.7 kB
  • flac/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.flac 130.1 MB
  • flac/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc 55.7 kB
  • flac/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.flac 104.0 MB
  • flac/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc 37.0 kB
  • flac/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.flac 65.0 MB
  • flac/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc 24.7 kB
  • flac/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.flac 59.3 MB
  • flac/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc 20.7 kB
  • flac/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.flac 53.6 MB
  • flac/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc 22.3 kB
  • flac/DEF CON 25 Conference - Dor Azouri - BITSInject.flac 56.8 MB
  • flac/DEF CON 25 Conference - Dor Azouri - BITSInject.lrc 17.9 kB
  • flac/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.flac 125.6 MB
  • flac/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc 44.7 kB
  • flac/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.flac 77.9 MB
  • flac/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc 44.3 kB
  • flac/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.flac 117.1 MB
  • flac/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc 53.7 kB
  • flac/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.flac 130.2 MB
  • flac/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc 62.9 kB
  • flac/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.flac 145.7 MB
  • flac/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc 49.6 kB
  • flac/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.flac 119.6 MB
  • flac/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc 51.8 kB
  • flac/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.flac 89.1 MB
  • flac/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc 36.2 kB
  • flac/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.flac 110.2 MB
  • flac/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc 42.2 kB
  • flac/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.flac 86.1 MB
  • flac/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc 30.2 kB
  • flac/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.flac 96.5 MB
  • flac/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc 29.0 kB
  • flac/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.flac 304.6 MB
  • flac/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc 114.9 kB
  • flac/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.flac 51.9 MB
  • flac/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc 20.9 kB
  • flac/DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.flac 147.1 MB
  • flac/DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc 55.9 kB
  • flac/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.flac 132.3 MB
  • flac/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc 51.2 kB
  • flac/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.flac 123.7 MB
  • flac/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc 36.6 kB
  • flac/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.flac 99.1 MB
  • flac/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc 49.5 kB
  • flac/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.flac 77.2 MB
  • flac/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc 34.1 kB
  • flac/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.flac 108.1 MB
  • flac/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc 45.1 kB
  • flac/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.flac 156.8 MB
  • flac/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc 59.4 kB
  • flac/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.flac 123.2 MB
  • flac/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc 44.8 kB
  • flac/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.flac 92.7 MB
  • flac/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc 31.7 kB
  • flac/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.flac 119.8 MB
  • flac/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc 46.7 kB
  • flac/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.flac 132.2 MB
  • flac/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc 52.4 kB
  • flac/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.flac 112.8 MB
  • flac/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc 45.8 kB
  • flac/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.flac 61.5 MB
  • flac/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc 22.3 kB
  • flac/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.flac 103.9 MB
  • flac/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc 43.4 kB
  • flac/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.flac 59.2 MB
  • flac/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc 30.8 kB
  • flac/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.flac 125.8 MB
  • flac/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc 54.6 kB
  • flac/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.flac 38.9 MB
  • flac/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc 15.6 kB
  • flac/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.flac 145.7 MB
  • flac/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc 46.8 kB
  • flac/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.flac 67.6 MB
  • flac/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc 24.7 kB
  • flac/DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.flac 114.3 MB
  • flac/DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc 45.1 kB
  • flac/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.flac 136.6 MB
  • flac/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc 39.9 kB
  • flac/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.flac 121.9 MB
  • flac/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc 52.7 kB
  • flac/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.flac 124.4 MB
  • flac/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc 43.2 kB
  • flac/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.flac 85.2 MB
  • flac/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc 32.2 kB
  • flac/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.flac 123.3 MB
  • flac/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc 56.0 kB
  • flac/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.flac 83.7 MB
  • flac/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc 44.3 kB
  • flac/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.flac 95.9 MB
  • flac/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc 35.4 kB
  • flac/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.flac 132.1 MB
  • flac/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc 44.9 kB
  • flac/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.flac 103.3 MB
  • flac/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc 36.0 kB
  • flac/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.flac 107.5 MB
  • flac/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc 37.1 kB
  • flac/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.flac 60.3 MB
  • flac/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc 21.6 kB
  • flac/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.flac 72.8 MB
  • flac/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc 23.3 kB
  • flac/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.flac 91.8 MB
  • flac/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc 34.0 kB
  • flac/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.flac 119.6 MB
  • flac/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc 49.9 kB
  • flac/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.flac 82.5 MB
  • flac/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc 29.6 kB
  • flac/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.flac 106.2 MB
  • flac/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc 44.6 kB
  • flac/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.flac 57.7 MB
  • flac/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc 23.7 kB
  • flac/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.flac 88.3 MB
  • flac/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc 37.2 kB
  • flac/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.flac 137.6 MB
  • flac/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc 29.7 kB
  • flac/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.flac 86.2 MB
  • flac/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc 34.1 kB
  • flac/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.flac 139.5 MB
  • flac/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc 54.3 kB
  • flac/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.flac 53.4 MB
  • flac/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc 25.7 kB
  • flac/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.flac 54.4 MB
  • flac/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc 24.1 kB
  • flac/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.flac 127.2 MB
  • flac/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc 54.7 kB
  • flac/DEF CON 25 Conference - Plore - Popping a Smart Gun.flac 101.8 MB
  • flac/DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc 45.7 kB
  • flac/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.flac 88.1 MB
  • flac/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc 40.7 kB
  • flac/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.flac 65.4 MB
  • flac/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc 23.8 kB
  • flac/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.flac 129.3 MB
  • flac/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc 52.1 kB
  • flac/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.flac 117.5 MB
  • flac/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc 52.9 kB
  • flac/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.flac 51.9 MB
  • flac/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc 15.6 kB
  • flac/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.flac 52.4 MB
  • flac/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc 25.8 kB
  • flac/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.flac 108.7 MB
  • flac/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc 47.2 kB
  • flac/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.flac 43.1 MB
  • flac/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc 15.2 kB
  • flac/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.flac 95.9 MB
  • flac/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc 38.6 kB
  • flac/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.flac 110.5 MB
  • flac/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc 51.5 kB
  • flac/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.flac 123.6 MB
  • flac/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc 45.9 kB
  • flac/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.flac 107.1 MB
  • flac/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc 39.7 kB
  • flac/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.flac 98.1 MB
  • flac/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc 37.6 kB
  • flac/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.flac 131.8 MB
  • flac/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc 41.3 kB
  • flac/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.flac 104.3 MB
  • flac/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc 36.4 kB
  • flac/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.flac 114.2 MB
  • flac/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc 41.8 kB
  • flac/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.flac 42.3 MB
  • flac/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc 16.7 kB
  • flac/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.flac 262.0 MB
  • flac/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc 79.8 kB
  • flac/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.flac 126.5 MB
  • flac/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc 50.6 kB
  • flac/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.flac 80.1 MB
  • flac/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc 28.6 kB
  • flac/DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.flac 111.8 MB
  • flac/DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc 50.1 kB
  • flac/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.flac 107.7 MB
  • flac/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc 37.1 kB
  • flac/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.flac 313.5 MB
  • flac/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc 143.0 kB
  • flac/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.flac 100.1 MB
  • flac/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc 48.6 kB
  • flac/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.flac 133.0 MB
  • flac/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc 49.7 kB
  • flac/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.flac 43.5 MB
  • flac/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc 21.9 kB
  • flac/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.flac 128.9 MB
  • flac/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc 55.4 kB
  • flac/DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.flac 133.0 MB
  • flac/DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc 49.3 kB
  • flac/DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.flac 113.3 MB
  • flac/DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc 28.1 kB
  • flac/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.flac 152.7 MB
  • flac/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc 61.9 kB
  • flac/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.flac 120.9 MB
  • flac/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc 46.8 kB
  • flac/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.flac 114.5 MB
  • flac/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc 44.8 kB
  • m4a/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc 42.3 kB
  • m4a/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.m4a 57.2 MB
  • m4a/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc 85.0 kB
  • m4a/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel- Meet The Feds.m4a 119.9 MB
  • m4a/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc 52.5 kB
  • m4a/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.m4a 62.9 MB
  • m4a/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc 36.7 kB
  • m4a/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.m4a 59.8 MB
  • m4a/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc 26.5 kB
  • m4a/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.m4a 45.7 MB
  • m4a/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc 55.6 kB
  • m4a/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on z_OS.m4a 64.3 MB
  • m4a/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc 35.1 kB
  • m4a/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.m4a 48.9 MB
  • m4a/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.m4a 29.1 MB
  • m4a/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc 23.7 kB
  • m4a/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc 8.7 kB
  • m4a/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.m4a 22.5 MB
  • m4a/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc 48.6 kB
  • m4a/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.m4a 70.3 MB
  • m4a/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc 49.9 kB
  • m4a/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.m4a 67.6 MB
  • m4a/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc 56.2 kB
  • m4a/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.m4a 55.5 MB
  • m4a/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc 43.1 kB
  • m4a/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.m4a 53.2 MB
  • m4a/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc 51.2 kB
  • m4a/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.m4a 62.6 MB
  • m4a/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc 31.0 kB
  • m4a/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.m4a 51.7 MB
  • m4a/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc 53.7 kB
  • m4a/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.m4a 66.4 MB
  • m4a/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc 55.7 kB
  • m4a/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.m4a 68.9 MB
  • m4a/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc 37.0 kB
  • m4a/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.m4a 57.8 MB
  • m4a/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc 24.7 kB
  • m4a/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.m4a 32.2 MB
  • m4a/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc 20.7 kB
  • m4a/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.m4a 29.6 MB
  • m4a/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc 22.3 kB
  • m4a/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.m4a 31.9 MB
  • m4a/DEF CON 25 Conference - Dor Azouri - BITSInject.lrc 17.9 kB
  • m4a/DEF CON 25 Conference - Dor Azouri - BITSInject.m4a 29.6 MB
  • m4a/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc 44.7 kB
  • m4a/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.m4a 63.7 MB
  • m4a/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc 44.3 kB
  • m4a/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.m4a 47.2 MB
  • m4a/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc 53.7 kB
  • m4a/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.m4a 61.5 MB
  • m4a/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc 62.9 kB
  • m4a/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.m4a 72.8 MB
  • m4a/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc 49.6 kB
  • m4a/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.m4a 72.6 MB
  • m4a/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc 51.8 kB
  • m4a/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.m4a 61.6 MB
  • m4a/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc 36.2 kB
  • m4a/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.m4a 52.2 MB
  • m4a/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc 42.2 kB
  • m4a/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.m4a 56.6 MB
  • m4a/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc 30.2 kB
  • m4a/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.m4a 44.0 MB
  • m4a/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc 29.0 kB
  • m4a/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.m4a 51.2 MB
  • m4a/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc 114.9 kB
  • m4a/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.m4a 169.3 MB
  • m4a/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc 20.9 kB
  • m4a/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.m4a 28.2 MB
  • m4a/DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc 55.9 kB
  • m4a/DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.m4a 74.9 MB
  • m4a/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc 51.2 kB
  • m4a/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.m4a 67.7 MB
  • m4a/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc 36.6 kB
  • m4a/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.m4a 63.3 MB
  • m4a/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc 49.5 kB
  • m4a/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.m4a 63.5 MB
  • m4a/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc 34.1 kB
  • m4a/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.m4a 41.1 MB
  • m4a/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc 45.1 kB
  • m4a/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.m4a 57.0 MB
  • m4a/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc 59.4 kB
  • m4a/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.m4a 80.3 MB
  • m4a/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc 44.8 kB
  • m4a/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.m4a 63.6 MB
  • m4a/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc 31.7 kB
  • m4a/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.m4a 46.9 MB
  • m4a/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc 46.7 kB
  • m4a/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.m4a 62.8 MB
  • m4a/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc 52.4 kB
  • m4a/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.m4a 73.1 MB
  • m4a/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc 45.8 kB
  • m4a/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks_.m4a 57.3 MB
  • m4a/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc 22.3 kB
  • m4a/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.m4a 30.8 MB
  • m4a/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc 43.4 kB
  • m4a/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.m4a 54.1 MB
  • m4a/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc 30.8 kB
  • m4a/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.m4a 34.3 MB
  • m4a/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc 54.6 kB
  • m4a/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.m4a 66.3 MB
  • m4a/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc 15.6 kB
  • m4a/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.m4a 22.2 MB
  • m4a/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc 46.8 kB
  • m4a/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.m4a 72.6 MB
  • m4a/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc 24.7 kB
  • m4a/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.m4a 34.6 MB
  • m4a/DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.m4a 60.1 MB
  • m4a/DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc 45.1 kB
  • m4a/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc 39.9 kB
  • m4a/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.m4a 68.8 MB
  • m4a/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc 52.7 kB
  • m4a/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.m4a 61.9 MB
  • m4a/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc 43.2 kB
  • m4a/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.m4a 64.7 MB
  • m4a/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc 32.2 kB
  • m4a/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.m4a 44.8 MB
  • m4a/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc 56.0 kB
  • m4a/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.m4a 67.4 MB
  • m4a/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc 44.3 kB
  • m4a/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.m4a 46.2 MB
  • m4a/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc 35.4 kB
  • m4a/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.m4a 58.8 MB
  • m4a/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc 44.9 kB
  • m4a/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.m4a 65.1 MB
  • m4a/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc 36.0 kB
  • m4a/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.m4a 53.9 MB
  • m4a/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc 37.1 kB
  • m4a/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.m4a 57.1 MB
  • m4a/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc 21.6 kB
  • m4a/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.m4a 30.1 MB
  • m4a/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc 23.3 kB
  • m4a/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS_iOS Kernel Debugging and Heap Feng Shui.m4a 39.3 MB
  • m4a/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc 34.0 kB
  • m4a/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.m4a 46.4 MB
  • m4a/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc 49.9 kB
  • m4a/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.m4a 64.9 MB
  • m4a/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc 29.6 kB
  • m4a/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.m4a 42.2 MB
  • m4a/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc 44.6 kB
  • m4a/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.m4a 59.2 MB
  • m4a/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc 23.7 kB
  • m4a/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.m4a 30.1 MB
  • m4a/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc 37.2 kB
  • m4a/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.m4a 50.5 MB
  • m4a/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc 29.7 kB
  • m4a/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.m4a 67.6 MB
  • m4a/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc 34.1 kB
  • m4a/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.m4a 46.3 MB
  • m4a/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc 54.3 kB
  • m4a/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.m4a 71.2 MB
  • m4a/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc 25.7 kB
  • m4a/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.m4a 31.6 MB
  • m4a/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc 24.1 kB
  • m4a/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.m4a 28.0 MB
  • m4a/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc 54.7 kB
  • m4a/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.m4a 68.6 MB
  • m4a/DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc 45.7 kB
  • m4a/DEF CON 25 Conference - Plore - Popping a Smart Gun.m4a 58.1 MB
  • m4a/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc 40.7 kB
  • m4a/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.m4a 48.8 MB
  • m4a/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc 23.8 kB
  • m4a/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.m4a 34.4 MB
  • m4a/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc 52.1 kB
  • m4a/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.m4a 64.8 MB
  • m4a/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc 52.9 kB
  • m4a/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.m4a 65.3 MB
  • m4a/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc 15.6 kB
  • m4a/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.m4a 26.9 MB
  • m4a/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc 25.8 kB
  • m4a/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.m4a 29.8 MB
  • m4a/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc 47.2 kB
  • m4a/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.m4a 59.5 MB
  • m4a/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc 15.2 kB
  • m4a/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.m4a 22.5 MB
  • m4a/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc 38.6 kB
  • m4a/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.m4a 57.0 MB
  • m4a/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc 51.5 kB
  • m4a/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.m4a 55.5 MB
  • m4a/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc 45.9 kB
  • m4a/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.m4a 67.3 MB
  • m4a/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc 39.7 kB
  • m4a/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.m4a 55.2 MB
  • m4a/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc 37.6 kB
  • m4a/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.m4a 48.6 MB
  • m4a/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc 41.3 kB
  • m4a/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.m4a 66.3 MB
  • m4a/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc 36.4 kB
  • m4a/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.m4a 52.9 MB
  • m4a/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc 41.8 kB
  • m4a/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.m4a 58.5 MB
  • m4a/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc 16.7 kB
  • m4a/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.m4a 22.4 MB
  • m4a/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc 79.8 kB
  • m4a/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.m4a 130.5 MB
  • m4a/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc 50.6 kB
  • m4a/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.m4a 67.9 MB
  • m4a/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc 28.6 kB
  • m4a/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.m4a 48.2 MB
  • m4a/DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc 50.1 kB
  • m4a/DEF CON 25 Conference - Trey Forgety - Inside the _Meet Desai_ Attack - Defending Distributed Targets from Distributed Attacks.m4a 59.1 MB
  • m4a/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc 37.1 kB
  • m4a/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.m4a 53.5 MB
  • m4a/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc 143.0 kB
  • m4a/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You'll Ever Need - AMA with 20 years of DEF CON CTF.m4a 163.7 MB
  • m4a/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc 48.6 kB
  • m4a/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.m4a 52.5 MB
  • m4a/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc 49.7 kB
  • m4a/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.m4a 67.0 MB
  • m4a/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc 21.9 kB
  • m4a/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.m4a 24.4 MB
  • m4a/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc 55.4 kB
  • m4a/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.m4a 69.1 MB
  • m4a/DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc 49.3 kB
  • m4a/DEF CON 25 Conference - Yan Shoshitaishvili -  25 Years of Program Analysis.m4a 67.3 MB
  • m4a/DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc 28.1 kB
  • m4a/DEF CON 25 Conference - Yuwue Zheng and Lin Huang -  Ghost Telephonist Impersonates You Through LTE CSFB.m4a 58.0 MB
  • m4a/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc 61.9 kB
  • m4a/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.m4a 85.4 MB
  • m4a/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc 46.8 kB
  • m4a/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.m4a 61.5 MB
  • m4a/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc 44.8 kB
  • m4a/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.m4a 59.8 MB
  • opus/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc 42.3 kB
  • opus/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.opus 30.9 MB
  • opus/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc 85.0 kB
  • opus/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.opus 61.9 MB
  • opus/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc 52.5 kB
  • opus/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.opus 32.5 MB
  • opus/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc 36.7 kB
  • opus/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.opus 33.4 MB
  • opus/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc 26.5 kB
  • opus/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.opus 25.0 MB
  • opus/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc 55.6 kB
  • opus/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.opus 35.1 MB
  • opus/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc 35.1 kB
  • opus/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.opus 28.0 MB
  • opus/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc 23.7 kB
  • opus/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.opus 15.2 MB
  • opus/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc 8.7 kB
  • opus/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.opus 11.9 MB
  • opus/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc 48.6 kB
  • opus/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.opus 39.5 MB
  • opus/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc 49.9 kB
  • opus/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.opus 40.2 MB
  • opus/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc 56.2 kB
  • opus/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.opus 29.5 MB
  • opus/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc 43.1 kB
  • opus/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.opus 31.4 MB
  • opus/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc 51.2 kB
  • opus/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.opus 34.0 MB
  • opus/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc 31.0 kB
  • opus/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.opus 27.4 MB
  • opus/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc 53.7 kB
  • opus/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.opus 31.2 MB
  • opus/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc 55.7 kB
  • opus/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.opus 35.8 MB
  • opus/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc 37.0 kB
  • opus/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.opus 29.1 MB
  • opus/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc 24.7 kB
  • opus/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.opus 15.8 MB
  • opus/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc 20.7 kB
  • opus/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.opus 15.0 MB
  • opus/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc 22.3 kB
  • opus/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.opus 19.2 MB
  • opus/DEF CON 25 Conference - Dor Azouri - BITSInject.lrc 17.9 kB
  • opus/DEF CON 25 Conference - Dor Azouri - BITSInject.opus 15.5 MB
  • opus/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc 44.7 kB
  • opus/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.opus 31.7 MB
  • opus/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc 44.3 kB
  • opus/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.opus 30.2 MB
  • opus/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc 53.7 kB
  • opus/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.opus 33.2 MB
  • opus/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc 62.9 kB
  • opus/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.opus 38.3 MB
  • opus/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc 49.6 kB
  • opus/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.opus 35.3 MB
  • opus/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc 51.8 kB
  • opus/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.opus 33.7 MB
  • opus/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc 36.2 kB
  • opus/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.opus 31.0 MB
  • opus/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc 42.2 kB
  • opus/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.opus 30.2 MB
  • opus/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc 30.2 kB
  • opus/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.opus 22.9 MB
  • opus/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc 29.0 kB
  • opus/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.opus 26.7 MB
  • opus/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc 114.9 kB
  • opus/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.opus 86.7 MB
  • opus/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc 20.9 kB
  • opus/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.opus 15.3 MB
  • opus/DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc 55.9 kB
  • opus/DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.opus 36.7 MB
  • opus/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc 51.2 kB
  • opus/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.opus 36.1 MB
  • opus/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc 36.6 kB
  • opus/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.opus 31.4 MB
  • opus/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc 49.5 kB
  • opus/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.opus 39.1 MB
  • opus/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc 34.1 kB
  • opus/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.opus 22.2 MB
  • opus/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc 45.1 kB
  • opus/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.opus 30.2 MB
  • opus/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc 59.4 kB
  • opus/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.opus 38.0 MB
  • opus/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc 44.8 kB
  • opus/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.opus 31.7 MB
  • opus/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc 31.7 kB
  • opus/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.opus 24.1 MB
  • opus/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc 46.7 kB
  • opus/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.opus 36.9 MB
  • opus/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc 52.4 kB
  • opus/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.opus 39.4 MB
  • opus/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc 45.8 kB
  • opus/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.opus 30.7 MB
  • opus/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc 22.3 kB
  • opus/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.opus 14.8 MB
  • opus/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc 43.4 kB
  • opus/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.opus 28.1 MB
  • opus/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc 30.8 kB
  • opus/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.opus 20.2 MB
  • opus/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc 54.6 kB
  • opus/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.opus 36.2 MB
  • opus/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc 15.6 kB
  • opus/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.opus 12.4 MB
  • opus/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc 46.8 kB
  • opus/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.opus 35.3 MB
  • opus/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc 24.7 kB
  • opus/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.opus 17.2 MB
  • opus/DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.opus 33.8 MB
  • opus/DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc 45.1 kB
  • opus/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc 39.9 kB
  • opus/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.opus 32.7 MB
  • opus/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc 52.7 kB
  • opus/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.opus 30.6 MB
  • opus/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc 43.2 kB
  • opus/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.opus 33.2 MB
  • opus/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc 32.2 kB
  • opus/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.opus 23.8 MB
  • opus/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc 56.0 kB
  • opus/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.opus 37.8 MB
  • opus/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc 44.3 kB
  • opus/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.opus 27.3 MB
  • opus/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc 35.4 kB
  • opus/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.opus 33.7 MB
  • opus/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc 44.9 kB
  • opus/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.opus 31.8 MB
  • opus/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc 36.0 kB
  • opus/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.opus 28.4 MB
  • opus/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc 37.1 kB
  • opus/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.opus 29.9 MB
  • opus/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc 21.6 kB
  • opus/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.opus 15.0 MB
  • opus/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc 23.3 kB
  • opus/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.opus 22.5 MB
  • opus/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc 34.0 kB
  • opus/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.opus 23.6 MB
  • opus/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc 49.9 kB
  • opus/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.opus 35.9 MB
  • opus/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc 29.6 kB
  • opus/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.opus 21.3 MB
  • opus/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc 44.6 kB
  • opus/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.opus 31.8 MB
  • opus/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc 23.7 kB
  • opus/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.opus 14.9 MB
  • opus/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc 37.2 kB
  • opus/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.opus 29.4 MB
  • opus/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc 29.7 kB
  • opus/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.opus 32.5 MB
  • opus/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc 34.1 kB
  • opus/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.opus 27.8 MB
  • opus/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc 54.3 kB
  • opus/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.opus 36.3 MB
  • opus/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc 25.7 kB
  • opus/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.opus 18.8 MB
  • opus/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc 24.1 kB
  • opus/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.opus 14.8 MB
  • opus/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc 54.7 kB
  • opus/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.opus 36.2 MB
  • opus/DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc 45.7 kB
  • opus/DEF CON 25 Conference - Plore - Popping a Smart Gun.opus 31.5 MB
  • opus/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc 40.7 kB
  • opus/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.opus 27.4 MB
  • opus/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc 23.8 kB
  • opus/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.opus 16.0 MB
  • opus/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc 52.1 kB
  • opus/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.opus 33.9 MB
  • opus/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc 52.9 kB
  • opus/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.opus 35.4 MB
  • opus/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc 15.6 kB
  • opus/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.opus 13.9 MB
  • opus/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc 25.8 kB
  • opus/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.opus 18.1 MB
  • opus/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc 47.2 kB
  • opus/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.opus 34.4 MB
  • opus/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc 15.2 kB
  • opus/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.opus 12.8 MB
  • opus/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc 38.6 kB
  • opus/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.opus 33.1 MB
  • opus/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc 51.5 kB
  • opus/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.opus 29.1 MB
  • opus/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc 45.9 kB
  • opus/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.opus 34.4 MB
  • opus/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc 39.7 kB
  • opus/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.opus 29.0 MB
  • opus/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc 37.6 kB
  • opus/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.opus 25.4 MB
  • opus/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc 41.3 kB
  • opus/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.opus 32.2 MB
  • opus/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc 36.4 kB
  • opus/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.opus 29.1 MB
  • opus/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc 41.8 kB
  • opus/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.opus 29.8 MB
  • opus/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc 16.7 kB
  • opus/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.opus 12.4 MB
  • opus/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc 79.8 kB
  • opus/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.opus 62.0 MB
  • opus/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc 50.6 kB
  • opus/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.opus 35.3 MB
  • opus/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc 28.6 kB
  • opus/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.opus 26.9 MB
  • opus/DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc 50.1 kB
  • opus/DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.opus 31.4 MB
  • opus/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc 37.1 kB
  • opus/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.opus 27.4 MB
  • opus/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc 143.0 kB
  • opus/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.opus 83.7 MB
  • opus/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc 48.6 kB
  • opus/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.opus 28.8 MB
  • opus/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc 49.7 kB
  • opus/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.opus 34.3 MB
  • opus/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc 21.9 kB
  • opus/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.opus 14.7 MB
  • opus/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc 55.4 kB
  • opus/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.opus 35.0 MB
  • opus/DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc 49.3 kB
  • opus/DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.opus 36.6 MB
  • opus/DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc 28.1 kB
  • opus/DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.opus 30.7 MB
  • opus/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc 61.9 kB
  • opus/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.opus 47.1 MB
  • opus/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc 46.8 kB
  • opus/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.opus 30.6 MB
  • opus/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc 44.8 kB
  • opus/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.opus 30.2 MB
  • village flac/DEF CON 25 BioHacking Village - Amanda Plimpton and Evan Anderson - Psychoactive Chemicals in Combat.flac 75.8 MB
  • village flac/DEF CON 25 BioHacking Village - Amirs Panel - Ethics in BioHacking.flac 141.5 MB
  • village flac/DEF CON 25 BioHacking Village - C00p3r - Dangerous Minds Podcast - Celebrating 100th Episode.flac 128.9 MB
  • village flac/DEF CON 25 BioHacking Village - C00p3r and Cur50r - Implantable Technology Show and Tell.flac 52.8 MB
  • village flac/DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing The Secure Deployment Of Medical Devices.flac 64.0 MB
  • village flac/DEF CON 25 BioHacking Village - Dr Stanislav Naydin and Vlad Gostomelsky - Medical Device Ethics and Security.flac 66.1 MB
  • village flac/DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Path Badly.flac 66.8 MB
  • village flac/DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides - Smart Drugs 4-Minute Mile.flac 67.4 MB
  • village flac/DEF CON 25 BioHacking Village - Jay Radcliffe - How to use the Scientific Method in Security Research.flac 113.8 MB
  • village flac/DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Die.flac 69.4 MB
  • village flac/DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt - Blockchain and The Hope for Healthcare.flac 63.3 MB
  • village flac/DEF CON 25 BioHacking Village - Jun Axup - The Brave New Worl of Bio-Entrepreneurship.flac 51.7 MB
  • village flac/DEF CON 25 BioHacking Village - Kevin Sacco - Tales of A Healthcare Hacker.flac 83.4 MB
  • village flac/DEF CON 25 BioHacking Village - Louis Auguste Jr - Microscopes Are Stupid.flac 52.4 MB
  • village flac/DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and Regulation.flac 67.2 MB
  • village flac/DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities.flac 82.3 MB
  • village flac/DEF CON 25 BioHacking Village - RenderMan and Murdoch Monkey - Hacking The Internet of Dongs.flac 69.8 MB
  • village flac/DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO.flac 49.9 MB
  • village flac/DEF CON 25 BioHacking Village - Ryan Schmoll and Peter Hefley - Trigraph- An Ethereum-based Teleradiology Application.flac 57.0 MB
  • village flac/DEF CON 25 BioHacking Village - Tess Scrodinger - Total Recall- Implicit Learning As A Cryptographic Primitive.flac 66.3 MB
  • village flac/DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of Biohacking.flac 44.4 MB
  • village flac/DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic Code Using Information Theory.flac 44.2 MB
  • village flac/DEF CON 25 BioHacking Village - Trevor Goodman - Hack Your Senses - Sensory Augementation and Brain Plasticity.flac 62.6 MB
  • village flac/DEF CON 25 BioHacking Village -Szkatulski and Lawless- How Your Doctor Might Be Trying To Kill You-How Personal Genomics Can Save Your Life.flac 62.9 MB
  • village flac/DEF CON 25 Car Hacking Village - Badge Life - DEFCON Unofficial Badges Panel.flac 126.1 MB
  • village flac/DEF CON 25 Car Hacking Village - Corey Theun - Heavy Truck and Electronic Logging Devices- What Could Go Wrong.flac 90.3 MB
  • village flac/DEF CON 25 Car Hacking Village - Duncan Woodbury - Nocholas Haltmeyer - Linux-Stack Based V2X Framework.flac 81.9 MB
  • village flac/DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - Don -An Introduction to AUTOSAR Secure Onbaord Communication.flac 110.8 MB
  • village flac/DEF CON 25 Car Hacking Village - Justin Montalbano - Bryan Gillispie - David Connett- Attacking Wireless Interfaces in Vehicles.flac 81.9 MB
  • village flac/DEF CON 25 Car Hacking Village - Sameer Dixit - Vlad Gostomelsky - Abusing Smart Cars with QR Codes.flac 58.8 MB
  • village flac/DEF CON 25 Car Hacking Village - Sheila Ayelen Berta - Claudio Caracciolo - The Bicho- An Advanced Car Backdoor Maker.flac 91.0 MB
  • village flac/DEF CON 25 Car Hacking Village - Tim b1tbane - Mitch Johnson ehntoo - That's No Car- Its a Network.flac 94.0 MB
  • village flac/DEF CON 25 Car Hacking Village - Vlad Gostomelsky - GPS System Integrity.flac 63.0 MB
  • village flac/DEF CON 25 Car Hacking Village - Weston Hecker - Grand Theft Radio- Stopping SDR Relay Attacks on PKES.flac 64.7 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Alisha Kloc - Privacy is Not An Add-On- Designing for Privacy from the Ground Up.flac 87.7 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Andrew Brandt - SSL Visibility Revisted- A Year In Privacy Improvements For Encrypted Communications.flac 118.2 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - David Huerta - Alice and Bob are Slightly Less Confused.flac 74.3 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - David Wong - SHA-3 vs The World.flac 132.1 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Evgeny Sidorov - Yet Another Password Hashing Talk.flac 75.7 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - J0n J4rv1s - The Surveillance Capitalism Will Continue Until Morale Improves.flac 155.0 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Jake Williams -The Symantec SSL Debacle Lessons Learned and Future Steps.flac 131.4 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Joel Wallenstrom - Robby Mook - Time to Start Wearing Tin-Foil Hats Following the 2016 Electrions.flac 127.5 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Joseph Birr-Pixton - Rustls - Modern Fast Safer TLS.flac 81.5 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace.flac 64.0 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has My Snoopy Boyfriend Privacy Within A Relationship.flac 113.1 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Lee Brotherston - Blue Team TLS Hugs.flac 65.1 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Mark Mager - Cryptanalysis in the Time of Ransomware.flac 111.3 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty Computation.flac 59.3 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Punky Duero - The Key Management Facility of The Root DNSSEC Key Signing Key.flac 62.8 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Ryan Lackey - Cypherpunks History.flac 66.1 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Scott Arciszewski - The How and Why for Secure Automatic Patch Management.flac 56.7 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Shea Nangle - Operational Security Lessons From The Dark Web.flac 73.5 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Tomas Susanka - Security Analysis of the Telegram IM.flac 52.9 MB
  • village flac/DEF CON 25 Crypto and Privacy Village - Trey Forgety - Protecting Users' Privacy in a Location-Critical Enterprise- The Challenges of 9-1-1 Location.flac 129.2 MB
  • village flac/DEF CON 25 Hardware Hacking Village - Cesare Pizzi - Ardusploit - Proof of concept for Arduino code injection.flac 103.7 MB
  • village flac/DEF CON 25 Hardware Hacking Village - Gigs Taggart - What is Ground- Baby don't hurt me.flac 60.3 MB
  • village flac/DEF CON 25 Hardware Hacking Village - Joe hwhxr - Hardware Hacking- Old Sk00l and New Sk00l.flac 93.5 MB
  • village flac/DEF CON 25 Hardware Hacking Village - John Dunlap - A tangle of Plastic Spaghetti-A Look Into the Security of 3D Printers.flac 129.6 MB
  • village flac/DEF CON 25 ICS Village - Arnaud Soullié - Fun with Modbus 0x5a - Nothing New. Still Relevant_.flac 62.1 MB
  • village flac/DEF CON 25 ICS Village - Blake Johnson - Dissecting Industrial Wireless Implementations.flac 76.5 MB
  • village flac/DEF CON 25 ICS Village - Bryson Bort - Atlas - Grid Insecurity - and How to Really Fix This Shit.flac 76.8 MB
  • village flac/DEF CON 25 ICS Village - Chris Sistrunk - What's the DFIRence for ICS.flac 80.4 MB
  • village flac/DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices.flac 93.4 MB
  • village flac/DEF CON 25 ICS Village - Thomas Brandsetter - In Security in Building Automation - How to Create Dark Buildings with Light Speed.flac 78.0 MB
  • village flac/DEF CON 25 Internet of Things Village - Aaron Alva - Mark Eichorn - IoT Updates to Help Protect Consumers.flac 51.0 MB
  • village flac/DEF CON 25 Internet of Things Village - Aaron Guzman - Hide Yo Keys- Hide Yo Car.flac 88.0 MB
  • village flac/DEF CON 25 Internet of Things Village - Alex Jay Balan - IoT - The Gift That Keeps on Giving.flac 109.4 MB
  • village flac/DEF CON 25 Internet of Things Village - Andrew Tierney - Ken Munro - IoT- From DVRs to Dildos.flac 98.4 MB
  • village flac/DEF CON 25 Internet of Things Village - Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard.flac 113.1 MB
  • village flac/DEF CON 25 Internet of Things Village - Dan Regalado - Inside the Alaris Infusion Pump and not too much medication por favor.flac 86.1 MB
  • village flac/DEF CON 25 Internet of Things Village - Deral Heiland - The Internet of Vulnerabilities.flac 91.1 MB
  • village flac/DEF CON 25 Internet of Things Village - Rick Ramgattie - IoT Village Keynote - Friends and Not Foes- Rethinking the Researcher-Vendor Relationship.flac 59.9 MB
  • village flac/DEF CON 25 Internet of Things Village - Vivek Ramachandran and Nishant Sharma - Ashish Bhangale - IIDS- An IoT Intrusion Detection System.flac 94.8 MB
  • village flac/DEF CON 25 Internet of Things Village - Vladimir Dashchenko and Sergey Temnikov - Pwning the Industrial IoT- RCEs and backdoors are around.flac 57.8 MB
  • village flac/DEF CON 25 Lockpick Village - TOOOL STAFF MEMBER and Dr. Tran - TOOOL Lockpicking Talk Number 1.flac 62.8 MB
  • village flac/DEF CON 25 Packet Hacking Village - Ankur Tyagi - Visual Network and File Forensics.flac 72.0 MB
  • village flac/DEF CON 25 Packet Hacking Village - Catherine Ullman and Chris Roberts - When the Current Ransomware and Payload of the Day CRAP of the day Hits the Fan.flac 91.0 MB
  • village flac/DEF CON 25 Packet Hacking Village - Chris Wysopal - Opening Ceremony - How Hackers Changed The Security Industry.flac 115.8 MB
  • village flac/DEF CON 25 Packet Hacking Village - Damon Small - Layer 8 and Why People are the Most Important Security Tool.flac 102.3 MB
  • village flac/DEF CON 25 Packet Hacking Village - Daniel Adinolfi - Anthony Singleton - CVE IDs and How to Get Them.flac 92.3 MB
  • village flac/DEF CON 25 Packet Hacking Village - Eric Capuano - Fortune 100 InfoSec on a State Government Budget.flac 102.3 MB
  • village flac/DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop Scenarios By Building An Incident Response Simulation Platform.flac 149.4 MB
  • village flac/DEF CON 25 Packet Hacking Village - Gabriel Ryan - The Black Art of Wireless Post-Exploitation.flac 142.0 MB
  • village flac/DEF CON 25 Packet Hacking Village - Gilberto Bertin - Past and Present and Future of High Speed Packet Filtering on Linux.flac 48.2 MB
  • village flac/DEF CON 25 Packet Hacking Village - Gita Ziabari - Yalda and Automated Bulk Intelligence.flac 52.2 MB
  • village flac/DEF CON 25 Packet Hacking Village - Leah Figueroa - Iron Sights for Your Data.flac 45.4 MB
  • village flac/DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing- What Is It and How It Allows Largest Attacks and How to Fix It.flac 121.9 MB
  • village flac/DEF CON 25 Packet Hacking Village - Megan Roddy- Strenthen Your Secops Team By Leveraging Neurodiversity.flac 39.1 MB
  • village flac/DEF CON 25 Packet Hacking Village - Michael Gianarakis and Keith Lee and Portia - Finding Your Way to Domain Access.flac 70.2 MB
  • village flac/DEF CON 25 Packet Hacking Village - Mike Raggo - Chet Hosmer - Covert TCP with a Twist.flac 147.0 MB
  • village flac/DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Change of Persistence- AWS Post Compromise Primer.flac 87.3 MB
  • village flac/DEF CON 25 Packet Hacking Village - Rodolfo Assis - XSS For the win.flac 28.3 MB
  • village flac/DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach and WTF Really Happened.flac 135.9 MB
  • village flac/DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain Name.flac 53.5 MB
  • village flac/DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot- Mum and Tons of WannaCry and Evils Attacked Our Home.flac 93.8 MB
  • village flac/DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound- Deceiving Doman Admin Hunters.flac 85.9 MB
  • village flac/DEF CON 25 Packet Hacking Village - Vivek Ramachandran - Thomas d'Otreppe - Make Your Own 80211 ac Monitoring Hacker Gadget.flac 148.3 MB
  • village flac/DEF CON 25 Recon Village - Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story.flac 74.4 MB
  • village flac/DEF CON 25 Recon Village - Andrew Hay - An Introduction to Graph Theory for OSINT.flac 97.5 MB
  • village flac/DEF CON 25 Recon Village - Anthony Russell - Building Google For Criminal Enterprises.flac 85.6 MB
  • village flac/DEF CON 25 Recon Village - Dakota Nelson - Total Recoll.flac 30.4 MB
  • village flac/DEF CON 25 Recon Village - Guillermo Buendia and Yael Basurto Esquivel - How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches.flac 41.9 MB
  • village flac/DEF CON 25 Recon Village - Inbar Raz - Do Tinder Bots Dream of Electric Toys- How Tinder Bots are Breaking Hearts All Over The World.flac 77.8 MB
  • village flac/DEF CON 25 Recon Village - Jason Haddix - Domain Discovery - Expanding Your Scope Like A Boss.flac 100.5 MB
  • village flac/DEF CON 25 Recon Village - Jonathan Cran - Attack Surface Discovery With Intrigue.flac 63.1 MB
  • village flac/DEF CON 25 Recon Village - Kunal Aggarwal - DataSploit Open Source Assistant for OSINT.flac 51.4 MB
  • village flac/DEF CON 25 Recon Village - Leah Figueroa - FERPA- Only Your Grades Are Safe; OSINT In Higher Education.flac 85.3 MB
  • village flac/DEF CON 25 Recon Village - Mikhail Sasonkin - Up Close and Personal - Keeping an Eye On Mobile Applications.flac 45.3 MB
  • village flac/DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and Profit- How To Hide From The FBI.flac 110.4 MB
  • village flac/DEF CON 25 Recon Village - Shane MacDougal - Keynote - Seeing is Believing - The Future of Recon- You Won't Believe What Happens Next.flac 120.8 MB
  • village flac/DEF CON 25 Recon Village - Simon Roses - OSINT Tactics on Source Code and Developers.flac 98.7 MB
  • village flac/DEF CON 25 Recon Village - TBD - Winner Announcement Prize Distribution.flac 45.0 MB
  • village flac/DEF CON 25 Recon Village - Tracy Z. Maleeff - Into the Bird's Nest- A Comprehensive Look at Twitter as a Research Tool.flac 102.8 MB
  • village flac/DEF CON 25 Recon Village - Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon - Collecting Evidence Like a Robot.flac 46.3 MB
  • village flac/DEF CON 25 Rootz Asylum - Alex Stamos- CSO- Facebook.flac 38.0 MB
  • village flac/DEF CON 25 Rootz Asylum - Aron Rosenberg - Aaron Standridge - Hacking an Insecure WiFi Camera.flac 17.0 MB
  • village flac/DEF CON 25 Rootz Asylum - Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer.flac 12.6 MB
  • village flac/DEF CON 25 Rootz Asylum - Cory Doctorow - You are not a Digital Native and that's OK.flac 34.2 MB
  • village flac/DEF CON 25 Rootz Asylum - Crash - Nerfherder - A Brief Message From Security.flac 15.1 MB
  • village flac/DEF CON 25 Rootz Asylum - David Weinman - Introduction To Cheat Engine.flac 49.7 MB
  • village flac/DEF CON 25 Rootz Asylum - Deviant - Home Depot and A Plan of Attack for Hackers.flac 35.9 MB
  • village flac/DEF CON 25 Rootz Asylum - EFF - Nic0 - Opening Ceremonies- A Place Where Kids Learn White-Hat Hacking to Better The World.flac 13.8 MB
  • village flac/DEF CON 25 Rootz Asylum - Erin Owens - Hacking & Robotics v2 point 0.flac 23.1 MB
  • village flac/DEF CON 25 Rootz Asylum - Erin Owens - Sujeet Bambale - Justin Whitehead - Chris Kiggins - Abby - Duncan -  Drone Wars.flac 55.3 MB
  • village flac/DEF CON 25 Rootz Asylum - Leonard Bailey - Everything You Need To Know About The U.S. Department of Justice.flac 37.4 MB
  • village flac/DEF CON 25 Rootz Asylum - Patrick McCanna - Tips for Internet Privacy at College.flac 25.4 MB
  • village flac/DEF CON 25 Rootz Asylum - Rsnake - Robert Hansen - Searching The Invisible Internet.flac 14.1 MB
  • village flac/DEF CON 25 Rootz Asylum - Tarah - Mansion Apartment Shack House- How To Explain Crypto To Practically Anyone.flac 24.8 MB
  • village flac/DEF CON 25 Social Engineering Village - Billy Boatright - Nor Lose The Common Touch.flac 86.4 MB
  • village flac/DEF CON 25 Social Engineering Village - Brent White - Tim Roberts - Skills For A Red-Teamer.flac 126.2 MB
  • village flac/DEF CON 25 Social Engineering Village - Chris Hadnagy - SE vs Predator- Using Social Engineering In Ways I Never Thought.flac 138.3 MB
  • village flac/DEF CON 25 Social Engineering Village - Fahey Owens - Beyond Phishing - Building and Sustaining a Corporate SE Program.flac 79.8 MB
  • village flac/DEF CON 25 Social Engineering Village - Helen Thackray - Hackers Gonna Hack - But Do They Know Why.flac 141.2 MB
  • village flac/DEF CON 25 Social Engineering Village - Jayson Street - Strategies on Securing Your Banks and Enterprises-From Someone Who Robs Banks and Enterprises.flac 141.4 MB
  • village flac/DEF CON 25 Social Engineering Village - John Nye - The Human Factor- Why Are We So Bad at Security and Risk Assessment.flac 124.1 MB
  • village flac/DEF CON 25 Social Engineering Village - Keith Conway - Cameron Craig - Change Agents- How to Effectively Influence Intractable Corporate Cultures.flac 119.7 MB
  • village flac/DEF CON 25 Social Engineering Village - Michele Fincher - Are You Killing Your Security Program Mostly Dead is Slightly Alive.flac 76.2 MB
  • village flac/DEF CON 25 Social Engineering Village - Robert Wood - Thematic Social Engineering- Making SE Work at Scale.flac 107.7 MB
  • village flac/DEF CON 25 Social Engineering Village - Tyler Rosonke - Social Engineering With Web Analytics.flac 87.9 MB
  • village flac/DEF CON 25 Social Engineering Village - Yaiza Rubio - Félix Brezo - Heavy Diving For Credentials- Towards An Anonymous Phishing.flac 70.9 MB
  • village flac/DEF CON 25 Voting Village - Panel - Jake Braun - Securing the Election Office- A Local Response to a Global Threat.flac 73.8 MB
  • village flac/DEF CON 25 Voting Village - Barbara Simons - David Jefferson - An Election System is Much More Than the Voting Machine or The Booth.flac 120.6 MB
  • village flac/DEF CON 25 Voting Village - General Douglas Lute - What are the national security implications of cyber attacks on our voting systems.flac 101.6 MB
  • village flac/DEF CON 25 Voting Village - Harri Hursti - Brief history of election machine hacking and lessons learned.flac 120.1 MB
  • village flac/DEF CON 25 Voting Village - Joseph Hall - Election Hacking- Legal Considerations from the Civil Side.flac 119.3 MB
  • village flac/DEF CON 25 Voting Village - Mary Brady and Josh Franklin - The State of US Voting System Security.flac 137.8 MB
  • village flac/DEF CON 25 Voting Village - Matt Blaze - How did we get here- A history of voting technology and hanging chads and and the Help America Vote Act.flac 111.0 MB
  • village flac/DEF CON 25 Voting Village -Joseph Hall and David Jefferson - Common Misconceptions and False Parallels about Voting Technology.flac 128.3 MB
  • village flac/DEF CON 25 Wifi Village - Aardvark and Darkmatter - WIGLE Like You Mean It- Maximizing Your Wardriving Experience.flac 118.0 MB
  • village flac/DEF CON 25 Wifi Village - Alexander Zakarov - Large Scale Wireless Monitoring - KISMET Packet Sniffer On A Multi-Radio Array.flac 93.1 MB
  • village flac/DEF CON 25 Wifi Village - Andrew Strutt - POCSAG Amateur Pager Network.flac 54.1 MB
  • village flac/DEF CON 25 Wifi Village - Andrew Strutt - Suitcase Repeater Build for UHF - 70cm.flac 56.1 MB
  • village flac/DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World- Software Defined Radio Exploits.flac 184.0 MB
  • village flac/DEF CON 25 Wifi Village - Eric Escobar - SecureWorks- SDR Replay Attacks- Against Home Security Systems.flac 51.8 MB
  • village flac/DEF CON 25 Wifi Village - Matt Blaze - Sandy Clark - Travis Goodspeed - Perry Metzger - Zach Wasserman - Kevin Xu - DYI NSA On The Cheap.flac 115.6 MB
  • village flac/DEF CON 25 Wifi Village - Nick Delewski - Failsafe- Yet Another SimpliSafe Attack Vector.flac 94.5 MB
  • village flac/DEF CON 25 Wifi Village - Robert Ghilduta - Designing An Automatic Gain Control.flac 93.5 MB
  • village flac/DEF CON 25 Wifi Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale -Deceptacon Wi-Fi Deception Under 5 Dollars.flac 64.1 MB
  • village flac/DEF CON 25 Wifi Village - Woody - Tim Kuester - GODUMPiNG packet sniffing the Gotenaa.flac 137.3 MB
  • village m4a/DEF CON 25 BioHacking Village - Amanda Plimpton and Evan Anderson - Psychoactive Chemicals in Combat.m4a 39.1 MB
  • village m4a/DEF CON 25 BioHacking Village - Amirs Panel - Ethics in BioHacking.m4a 74.8 MB
  • village m4a/DEF CON 25 BioHacking Village - C00p3r - Cur50r - Implantable Technology Show and Tell.m4a 28.8 MB
  • village m4a/DEF CON 25 BioHacking Village - C00p3r - Dangerous Minds Podcast - Celebrating 100th Episode.m4a 70.4 MB
  • village m4a/DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing The Secure Deployment Of Medical Devices.m4a 33.1 MB
  • village m4a/DEF CON 25 BioHacking Village - Dr Stanislav Naydin - Vlad Gostomelsky - Medical Device Ethics and Security.m4a 37.2 MB
  • village m4a/DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Path Badly.m4a 37.4 MB
  • village m4a/DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides- Smart Drugs 4-Minute Mile.m4a 35.7 MB
  • village m4a/DEF CON 25 BioHacking Village - Jay Radcliffe - How to use the Scientific Method in Security Research.m4a 66.6 MB
  • village m4a/DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Die.m4a 35.1 MB
  • village m4a/DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt - Blockchain and The Hope for Healthcare.m4a 32.4 MB
  • village m4a/DEF CON 25 BioHacking Village - Jun Axup - The Brave New Worl of Bio-Entrepreneurship.m4a 28.6 MB
  • village m4a/DEF CON 25 BioHacking Village - Kevin Sacco - Tales of A Healthcare Hacker.m4a 42.9 MB
  • village m4a/DEF CON 25 BioHacking Village - Louis Auguste Jr - Microscopes Are Stupid.m4a 27.3 MB
  • village m4a/DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and Regulation.m4a 35.1 MB
  • village m4a/DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities.m4a 42.8 MB
  • village m4a/DEF CON 25 BioHacking Village - RenderMan and Murdoch Monkey - Hacking The Internet of Dongs.m4a 38.6 MB
  • village m4a/DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO.m4a 25.3 MB
  • village m4a/DEF CON 25 BioHacking Village - Ryan Schmoll and Peter Hefley - Trigraph- An Ethereum-based Teleradiology Application.m4a 31.9 MB
  • village m4a/DEF CON 25 BioHacking Village - Szkatulski and Lawless- How Your Doctor Might Be Trying To Kill You-How Personal Genomics Can Save Your Life.m4a 35.9 MB
  • village m4a/DEF CON 25 BioHacking Village - Tess Scrodinger - Total Recall- Implicit Learning As A Cryptographic Primitive.m4a 34.7 MB
  • village m4a/DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of Biohacking.m4a 23.9 MB
  • village m4a/DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic Code Using Information Theory.m4a 24.2 MB
  • village m4a/DEF CON 25 BioHacking Village - Trevor Goodman - Hack Your Senses - Sensory Augementation and Brain Plasticity.m4a 34.6 MB
  • village m4a/DEF CON 25 Car Hacking Village - Badge Life - DEFCON Unofficial Badges Panel.m4a 73.1 MB
  • village m4a/DEF CON 25 Car Hacking Village - Corey Theun - Heavy Truck and Electronic Logging Devices- What Could Go Wrong.m4a 48.4 MB
  • village m4a/DEF CON 25 Car Hacking Village - Duncan Woodbury and Nocholas Haltmeyer - Linux-Stack Based V2X Framework.m4a 43.4 MB
  • village m4a/DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - Don -An Introduction to AUTOSAR Secure Onbaord Communication.m4a 62.6 MB
  • village m4a/DEF CON 25 Car Hacking Village - Justin Montalbano and Bryan Gillispie and David Connett- Attacking Wireless Interfaces in Vehicles.m4a 49.4 MB
  • village m4a/DEF CON 25 Car Hacking Village - Sameer Dixit - Vlad Gostomelsky - Abusing Smart Cars with QR Codes.m4a 33.6 MB
  • village m4a/DEF CON 25 Car Hacking Village - Sheila Ayelen Berta and Claudio Caracciolo - The Bicho- An Advanced Car Backdoor Maker.m4a 47.4 MB
  • village m4a/DEF CON 25 Car Hacking Village - Tim b1tbane and Mitch Johnson ehntoo - That's No Car- Its a Network.m4a 50.3 MB
  • village m4a/DEF CON 25 Car Hacking Village - Vlad Gostomelsky - GPS System Integrity.m4a 33.6 MB
  • village m4a/DEF CON 25 Car Hacking Village - Weston Hecker - Grand Theft Radio- Stopping SDR Relay Attacks on PKES.m4a 36.8 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Alisha Kloc - Privacy is Not An Add-On- Designing for Privacy from the Ground Up.m4a 42.9 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Andrew Brandt - SSL Visibility Revisted- A Year In Privacy Improvements For Encrypted Communications.m4a 71.3 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - David Huerta - Alice and Bob are Slightly Less Confused.m4a 44.5 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - David Wong - SHA-3 vs The World.m4a 76.5 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Evgeny Sidorov - Yet Another Password Hashing Talk.m4a 39.0 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - J0n J4rv1s - The Surveillance Capitalism Will Continue Until Morale Improves.m4a 84.9 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Jake Williams -The Symantec SSL Debacle Lessons Learned and Future Steps.m4a 74.6 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Joel Wallenstrom - Robby Mook - Time to Start Wearing Tin-Foil Hats Following the 2016 Electrions.m4a 75.0 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Joseph Birr-Pixton - Rustls - Modern Fast Safer TLS.m4a 42.7 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace.m4a 34.4 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has My Snoopy Boyfriend Privacy Within A Relationship.m4a 61.6 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Lee Brotherston - Blue Team TLS Hugs.m4a 36.2 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Mark Mager - Cryptanalysis in the Time of Ransomware.m4a 59.9 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty Computation.m4a 35.5 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Punky Duero - The Key Management Facility of The Root DNSSEC Key Signing Key.m4a 34.1 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Ryan Lackey - Cypherpunks History.m4a 37.3 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Scott Arciszewski - The How and Why for Secure Automatic Patch Management.m4a 32.7 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Shea Nangle - Operational Security Lessons From The Dark Web.m4a 38.5 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Tomas Susanka - Security Analysis of the Telegram IM.m4a 29.4 MB
  • village m4a/DEF CON 25 Crypto and Privacy Village - Trey Forgety - Protecting Users' Privacy in a Location-Critical Enterprise- The Challenges of 9-1-1 Location.m4a 71.7 MB
  • village m4a/DEF CON 25 Hardware Hacking Village - Cesare Pizzi - Ardusploit - Proof of concept for Arduino code injection.m4a 56.6 MB
  • village m4a/DEF CON 25 Hardware Hacking Village - Gigs Taggart - What is Ground- Baby don't hurt me.m4a 35.1 MB
  • village m4a/DEF CON 25 Hardware Hacking Village - Joe hwhxr - Hardware Hacking- Old Sk00l and New Sk00l.m4a 55.7 MB
  • village m4a/DEF CON 25 Hardware Hacking Village - John Dunlap - A tangle of Plastic Spaghetti-A Look Into the Security of 3D Printers.m4a 72.3 MB
  • village m4a/DEF CON 25 ICS Village - Arnaud Soullié - Fun with Modbus 0x5a - Nothing New. Still Relevant_.m4a 35.2 MB
  • village m4a/DEF CON 25 ICS Village - Blake Johnson - Dissecting Industrial Wireless Implementations.m4a 43.4 MB
  • village m4a/DEF CON 25 ICS Village - Bryson Bort and Atlas - Grid Insecurity - and How to Really Fix This Shit.m4a 43.9 MB
  • village m4a/DEF CON 25 ICS Village - Chris Sistrunk - What's the DFIRence for ICS.m4a 45.0 MB
  • village m4a/DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices.m4a 50.2 MB
  • village m4a/DEF CON 25 ICS Village - Thomas Brandsetter - In Security in Building Automation - How to Create Dark Buildings with Light Speed.m4a 45.3 MB
  • village m4a/DEF CON 25 Internet of Things Village - Aaron Alva - Mark Eichorn - IoT Updates to Help Protect Consumers.m4a 33.6 MB
  • village m4a/DEF CON 25 Internet of Things Village - Aaron Guzman - Hide Yo Keys- Hide Yo Car.m4a 46.0 MB
  • village m4a/DEF CON 25 Internet of Things Village - Alex Jay Balan - IoT - The Gift That Keeps on Giving.m4a 58.1 MB
  • village m4a/DEF CON 25 Internet of Things Village - Andrew Tierney - Ken Munro - IoT- From DVRs to Dildos.m4a 53.5 MB
  • village m4a/DEF CON 25 Internet of Things Village - Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard.m4a 61.3 MB
  • village m4a/DEF CON 25 Internet of Things Village - Dan Regalado - Inside the Alaris Infusion Pump and not too much medication por favor.m4a 42.8 MB
  • village m4a/DEF CON 25 Internet of Things Village - Deral Heiland - The Internet of Vulnerabilities.m4a 59.8 MB
  • village m4a/DEF CON 25 Internet of Things Village - Rick Ramgattie - IoT Village Keynote - Friends and Not Foes- Rethinking the Researcher-Vendor Relationship.m4a 31.2 MB
  • village m4a/DEF CON 25 Internet of Things Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale - IIDS- An IoT Intrusion Detection System.m4a 53.3 MB
  • village m4a/DEF CON 25 Internet of Things Village - Vladimir Dashchenko and Sergey Temnikov - Pwning the Industrial IoT- RCEs and backdoors are around.m4a 30.1 MB
  • village m4a/DEF CON 25 Lockpick Village - TOOOL STAFF MEMBER Dr. Tran - TOOOL Lockpicking Talk Number 1.m4a 36.3 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Ankur Tyagi - Visual Network and File Forensics.m4a 36.5 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Catherine Ullman and Chris Roberts - When the Current Ransomware and Payload of the Day CRAP of the day Hits the Fan.m4a 55.9 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Chris Wysopal - Opening Ceremony - How Hackers Changed The Security Industry.m4a 64.4 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Damon Small - Layer 8 and Why People are the Most Important Security Tool.m4a 54.6 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Daniel Adinolfi - Anthony Singleton - CVE IDs and How to Get Them.m4a 58.3 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Eric Capuano - Fortune 100 InfoSec on a State Government Budget.m4a 67.3 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop Scenarios By Building An Incident Response Simulation Platform.m4a 81.1 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Gabriel Ryan - The Black Art of Wireless Post-Exploitation.m4a 73.6 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Gilberto Bertin - Past and Present and Future of High Speed Packet Filtering on Linux.m4a 27.8 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Gita Ziabari - Yalda and Automated Bulk Intelligence.m4a 34.9 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Leah Figueroa - Iron Sights for Your Data.m4a 27.7 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing- What Is It and How It Allows Largest Attacks and How to Fix It.m4a 69.0 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Megan Roddy- Strenthen Your Secops Team By Leveraging Neurodiversity.m4a 22.5 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Michael Gianarakis and Keith Lee - Portia - Finding Your Way to Domain Access.m4a 42.2 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Mike Raggo - Chet Hosmer - Covert TCP with a Twist.m4a 76.8 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Change of Persistence- AWS Post Compromise Primer.m4a 45.5 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Rodolfo Assis - XSS For the win.m4a 19.8 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach and WTF Really Happened.m4a 72.8 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain Name.m4a 31.7 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot- Mum and Tons of WannaCry and Evils Attacked Our Home.m4a 54.2 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound- Deceiving Doman Admin Hunters.m4a 46.2 MB
  • village m4a/DEF CON 25 Packet Hacking Village - Vivek Ramachandran and Thomas d'Otreppe - Make Your Own 80211 ac Monitoring Hacker Gadget.m4a 82.9 MB
  • village m4a/DEF CON 25 Recon Village - Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story.m4a 41.1 MB
  • village m4a/DEF CON 25 Recon Village - Andrew Hay - An Introduction to Graph Theory for OSINT.m4a 50.6 MB
  • village m4a/DEF CON 25 Recon Village - Anthony Russell - Building Google For Criminal Enterprises.m4a 58.5 MB
  • village m4a/DEF CON 25 Recon Village - Dakota Nelson - Total Recoll.m4a 17.0 MB
  • village m4a/DEF CON 25 Recon Village - Guillermo Buendia - Yael Basurto Esquivel - How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches.m4a 27.3 MB
  • village m4a/DEF CON 25 Recon Village - Inbar Raz - Do Tinder Bots Dream of Electric Toys- How Tinder Bots are Breaking Hearts All Over The World.m4a 42.2 MB
  • village m4a/DEF CON 25 Recon Village - Jason Haddix - Domain Discovery - Expanding Your Scope Like A Boss.m4a 59.1 MB
  • village m4a/DEF CON 25 Recon Village - Jonathan Cran - Attack Surface Discovery With Intrigue.m4a 41.1 MB
  • village m4a/DEF CON 25 Recon Village - Kunal Aggarwal - DataSploit Open Source Assistant for OSINT.m4a 26.3 MB
  • village m4a/DEF CON 25 Recon Village - Leah Figueroa - FERPA- Only Your Grades Are Safe; OSINT In Higher Education.m4a 49.4 MB
  • village m4a/DEF CON 25 Recon Village - Mikhail Sasonkin - Up Close and Personal - Keeping an Eye On Mobile Applications.m4a 23.3 MB
  • village m4a/DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and Profit- How To Hide From The FBI.m4a 60.0 MB
  • village m4a/DEF CON 25 Recon Village - Shane MacDougal - Keynote - Seeing is Believing - The Future of Recon- You Won't Believe What Happens Next.m4a 61.4 MB
  • village m4a/DEF CON 25 Recon Village - Simon Roses - OSINT Tactics on Source Code and Developers.m4a 58.8 MB
  • village m4a/DEF CON 25 Recon Village - TBD - Winner Announcement Prize Distribution.m4a 24.2 MB
  • village m4a/DEF CON 25 Recon Village - Tracy Z. Maleeff - Into the Bird's Nest- A Comprehensive Look at Twitter as a Research Tool.m4a 52.3 MB
  • village m4a/DEF CON 25 Recon Village - Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon - Collecting Evidence Like a Robot.m4a 26.9 MB
  • village m4a/DEF CON 25 Rootz Asylum - Alex Stamos- CSO- Facebook.m4a 20.6 MB
  • village m4a/DEF CON 25 Rootz Asylum - Aron Rosenberg - Aaron Standridge - Hacking an Insecure WiFi Camera.m4a 14.2 MB
  • village m4a/DEF CON 25 Rootz Asylum - Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer.m4a 8.8 MB
  • village m4a/DEF CON 25 Rootz Asylum - Cory Doctorow - You are not a Digital Native and that's OK.m4a 24.7 MB
  • village m4a/DEF CON 25 Rootz Asylum - Crash and Nerfherder - A Brief Message From Security.m4a 9.1 MB
  • village m4a/DEF CON 25 Rootz Asylum - David Weinman - Introduction To Cheat Engine.m4a 28.8 MB
  • village m4a/DEF CON 25 Rootz Asylum - Deviant - Home Depot and A Plan of Attack for Hackers.m4a 20.1 MB
  • village m4a/DEF CON 25 Rootz Asylum - EFF - Nic0 - Opening Ceremonies- A Place Where Kids Learn White-Hat Hacking to Better The World.m4a 11.5 MB
  • village m4a/DEF CON 25 Rootz Asylum - Erin Owens - Hacking & Robotics v2 point 0.m4a 16.8 MB
  • village m4a/DEF CON 25 Rootz Asylum - Erin Owens - Sujeet Bambale and Justin Whitehead - Chris Kiggins - Abby - Duncan -  Drone Wars.m4a 30.9 MB
  • village m4a/DEF CON 25 Rootz Asylum - Leonard Bailey - Everything You Need To Know About The U.S. Department of Justice.m4a 21.0 MB
  • village m4a/DEF CON 25 Rootz Asylum - Patrick McCanna - Tips for Internet Privacy at College.m4a 18.7 MB
  • village m4a/DEF CON 25 Rootz Asylum - Rsnake and Robert Hansen - Searching The Invisible Internet.m4a 9.9 MB
  • village m4a/DEF CON 25 Rootz Asylum - Tarah - Mansion Apartment Shack House- How To Explain Crypto To Practically Anyone.m4a 14.3 MB
  • village m4a/DEF CON 25 Social Engineering Village - Billy Boatright - Nor Lose The Common Touch.m4a 44.9 MB
  • village m4a/DEF CON 25 Social Engineering Village - Brent White - Tim Roberts - Skills For A Red-Teamer.m4a 69.9 MB
  • village m4a/DEF CON 25 Social Engineering Village - Chris Hadnagy - SE vs Predator- Using Social Engineering In Ways I Never Thought.m4a 74.4 MB
  • village m4a/DEF CON 25 Social Engineering Village - Fahey Owens - Beyond Phishing - Building and Sustaining a Corporate SE Program.m4a 43.7 MB
  • village m4a/DEF CON 25 Social Engineering Village - Helen Thackray - Hackers Gonna Hack - But Do They Know Why.m4a 73.2 MB
  • village m4a/DEF CON 25 Social Engineering Village - Jayson Street - Strategies on Securing Your Banks and Enterprises-From Someone Who Robs Banks and Enterprises.m4a 77.4 MB
  • village m4a/DEF CON 25 Social Engineering Village - John Nye - The Human Factor- Why Are We So Bad at Security and Risk Assessment.m4a 67.4 MB
  • village m4a/DEF CON 25 Social Engineering Village - Keith Conway and Cameron Craig - Change Agents- How to Effectively Influence Intractable Corporate Cultures.m4a 65.1 MB
  • village m4a/DEF CON 25 Social Engineering Village - Michele Fincher - Are You Killing Your Security Program Mostly Dead is Slightly Alive.m4a 42.1 MB
  • village m4a/DEF CON 25 Social Engineering Village - Robert Wood - Thematic Social Engineering- Making SE Work at Scale.m4a 57.7 MB
  • village m4a/DEF CON 25 Social Engineering Village - Tyler Rosonke - Social Engineering With Web Analytics.m4a 47.0 MB
  • village m4a/DEF CON 25 Social Engineering Village - Yaiza Rubio and Félix Brezo - Heavy Diving For Credentials- Towards An Anonymous Phishing.m4a 40.4 MB
  • village m4a/DEF CON 25 Voting Village - Panel - Jake Braun - Securing the Election Office- A Local Response to a Global Threat.m4a 42.6 MB
  • village m4a/DEF CON 25 Voting Village - Barbara Simons and David Jefferson - An Election System is Much More Than the Voting Machine or The Booth.m4a 65.5 MB
  • village m4a/DEF CON 25 Voting Village - General Douglas Lute - What are the national security implications of cyber attacks on our voting systems.m4a 51.5 MB
  • village m4a/DEF CON 25 Voting Village - Harri Hursti - Brief history of election machine hacking and lessons learned.m4a 62.1 MB
  • village m4a/DEF CON 25 Voting Village - Joseph Hall - Election Hacking- Legal Considerations from the Civil Side.m4a 64.6 MB
  • village m4a/DEF CON 25 Voting Village - Mary Brady and Josh Franklin - The State of US Voting System Security.m4a 71.3 MB
  • village m4a/DEF CON 25 Voting Village - Matt Blaze - How did we get here- A history of voting technology and hanging chads and and the Help America Vote Act.m4a 68.7 MB
  • village m4a/DEF CON 25 Voting Village -Joseph Hall and David Jefferson - Common Misconceptions and False Parallels about Voting Technology.m4a 66.1 MB
  • village m4a/DEF CON 25 Wifi Village - Aardvark - Darkmatter - WIGLE Like You Mean It- Maximizing Your Wardriving Experience.m4a 65.4 MB
  • village m4a/DEF CON 25 Wifi Village - Alexander Zakarov - Large Scale Wireless Monitoring - KISMET Packet Sniffer On A Multi-Radio Array.m4a 52.7 MB
  • village m4a/DEF CON 25 Wifi Village - Andrew Strutt - POCSAG Amateur Pager Network.m4a 36.8 MB
  • village m4a/DEF CON 25 Wifi Village - Andrew Strutt - Suitcase Repeater Build for UHF - 70cm.m4a 39.6 MB
  • village m4a/DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World- Software Defined Radio Exploits.m4a 131.9 MB
  • village m4a/DEF CON 25 Wifi Village - Eric Escobar - SecureWorks- SDR Replay Attacks- Against Home Security Systems.m4a 28.4 MB
  • village m4a/DEF CON 25 Wifi Village - Matt Blaze - Sandy Clark - Travis Goodspeed - Perry Metzger - Zach Wasserman - Kevin Xu - DYI NSA On The Cheap.m4a 81.1 MB
  • village m4a/DEF CON 25 Wifi Village - Nick Delewski - Failsafe- Yet Another SimpliSafe Attack Vector.m4a 65.9 MB
  • village m4a/DEF CON 25 Wifi Village - Robert Ghilduta - Designing An Automatic Gain Control.m4a 64.2 MB
  • village m4a/DEF CON 25 Wifi Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale -Deceptacon Wi-Fi Deception Under 5 Dollars.m4a 43.9 MB
  • village m4a/DEF CON 25 Wifi Village - Woody and Tim Kuester - GODUMPiNG packet sniffing the Gotenaa.m4a 77.9 MB
  • village opus/DEF CON 25 BioHacking Village - Amanda Plimpton and Evan Anderson - Psychoactive Chemicals in Combat.opus 20.9 MB
  • village opus/DEF CON 25 BioHacking Village - Amirs Panel - Ethics in BioHacking.opus 40.1 MB
  • village opus/DEF CON 25 BioHacking Village - C00p3r - Dangerous Minds Podcast - Celebrating 100th Episode.opus 39.9 MB
  • village opus/DEF CON 25 BioHacking Village - C00p3r and Cur50r - Implantable Technology Show and Tell.opus 16.2 MB
  • village opus/DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing The Secure Deployment Of Medical Devices.opus 18.0 MB
  • village opus/DEF CON 25 BioHacking Village - Dr Stanislav Naydin and Vlad Gostomelsky - Medical Device Ethics and Security.opus 21.1 MB
  • village opus/DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Path Badly.opus 21.5 MB
  • village opus/DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides - Smart Drugs 4-Minute Mile.opus 19.5 MB
  • village opus/DEF CON 25 BioHacking Village - Jay Radcliffe - How to use the Scientific Method in Security Research.opus 37.8 MB
  • village opus/DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Die.opus 19.0 MB
  • village opus/DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt - Blockchain and The Hope for Healthcare.opus 18.3 MB
  • village opus/DEF CON 25 BioHacking Village - Jun Axup - The Brave New Worl of Bio-Entrepreneurship.opus 16.7 MB
  • village opus/DEF CON 25 BioHacking Village - Kevin Sacco - Tales of A Healthcare Hacker.opus 22.2 MB
  • village opus/DEF CON 25 BioHacking Village - Louis Auguste Jr - Microscopes Are Stupid.opus 15.7 MB
  • village opus/DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and Regulation.opus 18.8 MB
  • village opus/DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities.opus 24.0 MB
  • village opus/DEF CON 25 BioHacking Village - RenderMan and Murdoch Monkey - Hacking The Internet of Dongs.opus 22.0 MB
  • village opus/DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO.opus 15.2 MB
  • village opus/DEF CON 25 BioHacking Village - Ryan Schmoll and Peter Hefley - Trigraph- An Ethereum-based Teleradiology Application.opus 18.1 MB
  • village opus/DEF CON 25 BioHacking Village - Tess Scrodinger - Total Recall- Implicit Learning As A Cryptographic Primitive.opus 18.4 MB
  • village opus/DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of Biohacking.opus 13.9 MB
  • village opus/DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic Code Using Information Theory.opus 13.7 MB
  • village opus/DEF CON 25 BioHacking Village - Trevor Goodman - Hack Your Senses - Sensory Augementation and Brain Plasticity.opus 19.9 MB
  • village opus/DEF CON 25 BioHacking Village -Szkatulski and Lawless- How Your Doctor Might Be Trying To Kill You-How Personal Genomics Can Save Your Life.opus 21.0 MB
  • village opus/DEF CON 25 Car Hacking Village - Badge Life - DEFCON Unofficial Badges Panel.opus 41.3 MB
  • village opus/DEF CON 25 Car Hacking Village - Corey Theun - Heavy Truck and Electronic Logging Devices- What Could Go Wrong.opus 25.9 MB
  • village opus/DEF CON 25 Car Hacking Village - Duncan Woodbury - Nocholas Haltmeyer - Linux-Stack Based V2X Framework.opus 23.7 MB
  • village opus/DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - Don -An Introduction to AUTOSAR Secure Onbaord Communication.opus 35.4 MB
  • village opus/DEF CON 25 Car Hacking Village - Justin Montalbano - Bryan Gillispie - David Connett- Attacking Wireless Interfaces in Vehicles.opus 27.8 MB
  • village opus/DEF CON 25 Car Hacking Village - Sameer Dixit - Vlad Gostomelsky - Abusing Smart Cars with QR Codes.opus 19.2 MB
  • village opus/DEF CON 25 Car Hacking Village - Sheila Ayelen Berta - Claudio Caracciolo - The Bicho- An Advanced Car Backdoor Maker.opus 25.0 MB
  • village opus/DEF CON 25 Car Hacking Village - Tim b1tbane - Mitch Johnson ehntoo - That's No Car- Its a Network.opus 27.0 MB
  • village opus/DEF CON 25 Car Hacking Village - Vlad Gostomelsky - GPS System Integrity.opus 19.0 MB
  • village opus/DEF CON 25 Car Hacking Village - Weston Hecker - Grand Theft Radio- Stopping SDR Relay Attacks on PKES.opus 21.9 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Alisha Kloc - Privacy is Not An Add-On- Designing for Privacy from the Ground Up.opus 23.6 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Andrew Brandt - SSL Visibility Revisted- A Year In Privacy Improvements For Encrypted Communications.opus 42.1 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - David Huerta - Alice and Bob are Slightly Less Confused.opus 25.5 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - David Wong - SHA-3 vs The World.opus 44.7 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Evgeny Sidorov - Yet Another Password Hashing Talk.opus 19.4 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - J0n J4rv1s - The Surveillance Capitalism Will Continue Until Morale Improves.opus 47.1 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Jake Williams -The Symantec SSL Debacle Lessons Learned and Future Steps.opus 40.2 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Joel Wallenstrom - Robby Mook - Time to Start Wearing Tin-Foil Hats Following the 2016 Electrions.opus 42.8 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Joseph Birr-Pixton - Rustls - Modern Fast Safer TLS.opus 22.9 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace.opus 18.8 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has My Snoopy Boyfriend Privacy Within A Relationship.opus 33.7 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Lee Brotherston - Blue Team TLS Hugs.opus 20.6 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Mark Mager - Cryptanalysis in the Time of Ransomware.opus 33.0 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty Computation.opus 19.6 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Punky Duero - The Key Management Facility of The Root DNSSEC Key Signing Key.opus 18.9 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Ryan Lackey - Cypherpunks History.opus 20.5 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Scott Arciszewski - The How and Why for Secure Automatic Patch Management.opus 18.0 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Shea Nangle - Operational Security Lessons From The Dark Web.opus 21.1 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Tomas Susanka - Security Analysis of the Telegram IM.opus 16.4 MB
  • village opus/DEF CON 25 Crypto and Privacy Village - Trey Forgety - Protecting Users' Privacy in a Location-Critical Enterprise- The Challenges of 9-1-1 Location.opus 40.7 MB
  • village opus/DEF CON 25 Hardware Hacking Village - Cesare Pizzi - Ardusploit - Proof of concept for Arduino code injection.opus 32.7 MB
  • village opus/DEF CON 25 Hardware Hacking Village - Gigs Taggart - What is Ground- Baby don't hurt me.opus 20.4 MB
  • village opus/DEF CON 25 Hardware Hacking Village - Joe hwhxr - Hardware Hacking- Old Sk00l and New Sk00l.opus 32.2 MB
  • village opus/DEF CON 25 Hardware Hacking Village - John Dunlap - A tangle of Plastic Spaghetti-A Look Into the Security of 3D Printers.opus 41.1 MB
  • village opus/DEF CON 25 ICS Village - Arnaud Soullié - Fun with Modbus 0x5a - Nothing New. Still Relevant_.opus 20.1 MB
  • village opus/DEF CON 25 ICS Village - Blake Johnson - Dissecting Industrial Wireless Implementations.opus 23.9 MB
  • village opus/DEF CON 25 ICS Village - Bryson Bort - Atlas - Grid Insecurity - and How to Really Fix This Shit.opus 24.8 MB
  • village opus/DEF CON 25 ICS Village - Chris Sistrunk - What's the DFIRence for ICS.opus 25.9 MB
  • village opus/DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices.opus 27.3 MB
  • village opus/DEF CON 25 ICS Village - Thomas Brandsetter - In Security in Building Automation - How to Create Dark Buildings with Light Speed.opus 25.7 MB
  • village opus/DEF CON 25 Internet of Things Village - Aaron Alva - Mark Eichorn - IoT Updates to Help Protect Consumers.opus 22.4 MB
  • village opus/DEF CON 25 Internet of Things Village - Aaron Guzman - Hide Yo Keys- Hide Yo Car.opus 26.6 MB
  • village opus/DEF CON 25 Internet of Things Village - Alex Jay Balan - IoT - The Gift That Keeps on Giving.opus 32.9 MB
  • village opus/DEF CON 25 Internet of Things Village - Andrew Tierney - Ken Munro - IoT- From DVRs to Dildos.opus 29.7 MB
  • village opus/DEF CON 25 Internet of Things Village - Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard.opus 35.0 MB
  • village opus/DEF CON 25 Internet of Things Village - Dan Regalado - Inside the Alaris Infusion Pump and not too much medication por favor.opus 23.6 MB
  • village opus/DEF CON 25 Internet of Things Village - Deral Heiland - The Internet of Vulnerabilities.opus 37.5 MB
  • village opus/DEF CON 25 Internet of Things Village - Rick Ramgattie - IoT Village Keynote - Friends and Not Foes- Rethinking the Researcher-Vendor Relationship.opus 18.2 MB
  • village opus/DEF CON 25 Internet of Things Village - Vivek Ramachandran and Nishant Sharma - Ashish Bhangale - IIDS- An IoT Intrusion Detection System.opus 32.8 MB
  • village opus/DEF CON 25 Internet of Things Village - Vladimir Dashchenko and Sergey Temnikov - Pwning the Industrial IoT- RCEs and backdoors are around.opus 17.5 MB
  • village opus/DEF CON 25 Lockpick Village - TOOOL STAFF MEMBER and Dr. Tran - TOOOL Lockpicking Talk Number 1.opus 20.9 MB
  • village opus/DEF CON 25 Packet Hacking Village - Ankur Tyagi - Visual Network and File Forensics.opus 21.0 MB
  • village opus/DEF CON 25 Packet Hacking Village - Catherine Ullman and Chris Roberts - When the Current Ransomware and Payload of the Day CRAP of the day Hits the Fan.opus 33.1 MB
  • village opus/DEF CON 25 Packet Hacking Village - Chris Wysopal - Opening Ceremony - How Hackers Changed The Security Industry.opus 36.0 MB
  • village opus/DEF CON 25 Packet Hacking Village - Damon Small - Layer 8 and Why People are the Most Important Security Tool.opus 30.5 MB
  • village opus/DEF CON 25 Packet Hacking Village - Daniel Adinolfi - Anthony Singleton - CVE IDs and How to Get Them.opus 33.7 MB
  • village opus/DEF CON 25 Packet Hacking Village - Eric Capuano - Fortune 100 InfoSec on a State Government Budget.opus 39.0 MB
  • village opus/DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop Scenarios By Building An Incident Response Simulation Platform.opus 44.3 MB
  • village opus/DEF CON 25 Packet Hacking Village - Gabriel Ryan - The Black Art of Wireless Post-Exploitation.opus 38.1 MB
  • village opus/DEF CON 25 Packet Hacking Village - Gilberto Bertin - Past and Present and Future of High Speed Packet Filtering on Linux.opus 15.8 MB
  • village opus/DEF CON 25 Packet Hacking Village - Gita Ziabari - Yalda and Automated Bulk Intelligence.opus 23.0 MB
  • village opus/DEF CON 25 Packet Hacking Village - Leah Figueroa - Iron Sights for Your Data.opus 17.6 MB
  • village opus/DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing- What Is It and How It Allows Largest Attacks and How to Fix It.opus 39.0 MB
  • village opus/DEF CON 25 Packet Hacking Village - Megan Roddy- Strenthen Your Secops Team By Leveraging Neurodiversity.opus 15.1 MB
  • village opus/DEF CON 25 Packet Hacking Village - Michael Gianarakis and Keith Lee and Portia - Finding Your Way to Domain Access.opus 24.7 MB
  • village opus/DEF CON 25 Packet Hacking Village - Mike Raggo - Chet Hosmer - Covert TCP with a Twist.opus 40.5 MB
  • village opus/DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Change of Persistence- AWS Post Compromise Primer.opus 25.5 MB
  • village opus/DEF CON 25 Packet Hacking Village - Rodolfo Assis - XSS For the win.opus 11.9 MB
  • village opus/DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach and WTF Really Happened.opus 39.5 MB
  • village opus/DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain Name.opus 18.4 MB
  • village opus/DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot- Mum and Tons of WannaCry and Evils Attacked Our Home.opus 30.5 MB
  • village opus/DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound- Deceiving Doman Admin Hunters.opus 25.1 MB
  • village opus/DEF CON 25 Packet Hacking Village - Vivek Ramachandran - Thomas d'Otreppe - Make Your Own 80211 ac Monitoring Hacker Gadget.opus 46.4 MB
  • village opus/DEF CON 25 Recon Village - Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story.opus 23.1 MB
  • village opus/DEF CON 25 Recon Village - Andrew Hay - An Introduction to Graph Theory for OSINT.opus 26.4 MB
  • village opus/DEF CON 25 Recon Village - Anthony Russell - Building Google For Criminal Enterprises.opus 36.1 MB
  • village opus/DEF CON 25 Recon Village - Dakota Nelson - Total Recoll.opus 9.5 MB
  • village opus/DEF CON 25 Recon Village - Guillermo Buendia and Yael Basurto Esquivel - How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches.opus 16.2 MB
  • village opus/DEF CON 25 Recon Village - Inbar Raz - Do Tinder Bots Dream of Electric Toys- How Tinder Bots are Breaking Hearts All Over The World.opus 23.2 MB
  • village opus/DEF CON 25 Recon Village - Jason Haddix - Domain Discovery - Expanding Your Scope Like A Boss.opus 32.6 MB
  • village opus/DEF CON 25 Recon Village - Jonathan Cran - Attack Surface Discovery With Intrigue.opus 26.0 MB
  • village opus/DEF CON 25 Recon Village - Kunal Aggarwal - DataSploit Open Source Assistant for OSINT.opus 14.8 MB
  • village opus/DEF CON 25 Recon Village - Leah Figueroa - FERPA- Only Your Grades Are Safe; OSINT In Higher Education.opus 29.7 MB
  • village opus/DEF CON 25 Recon Village - Mikhail Sasonkin - Up Close and Personal - Keeping an Eye On Mobile Applications.opus 11.9 MB
  • village opus/DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and Profit- How To Hide From The FBI.opus 33.3 MB
  • village opus/DEF CON 25 Recon Village - Shane MacDougal - Keynote - Seeing is Believing - The Future of Recon- You Won't Believe What Happens Next.opus 32.3 MB
  • village opus/DEF CON 25 Recon Village - Simon Roses - OSINT Tactics on Source Code and Developers.opus 36.5 MB
  • village opus/DEF CON 25 Recon Village - TBD - Winner Announcement Prize Distribution.opus 13.4 MB
  • village opus/DEF CON 25 Recon Village - Tracy Z. Maleeff - Into the Bird's Nest- A Comprehensive Look at Twitter as a Research Tool.opus 27.7 MB
  • village opus/DEF CON 25 Recon Village - Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon - Collecting Evidence Like a Robot.opus 15.4 MB
  • village opus/DEF CON 25 Rootz Asylum - Alex Stamos- CSO- Facebook.opus 11.8 MB
  • village opus/DEF CON 25 Rootz Asylum - Aron Rosenberg - Aaron Standridge - Hacking an Insecure WiFi Camera.opus 10.7 MB
  • village opus/DEF CON 25 Rootz Asylum - Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer.opus 6.5 MB
  • village opus/DEF CON 25 Rootz Asylum - Cory Doctorow - You are not a Digital Native and that's OK.opus 18.7 MB
  • village opus/DEF CON 25 Rootz Asylum - Crash - Nerfherder - A Brief Message From Security.opus 5.9 MB
  • village opus/DEF CON 25 Rootz Asylum - David Weinman - Introduction To Cheat Engine.opus 17.0 MB
  • village opus/DEF CON 25 Rootz Asylum - Deviant - Home Depot and A Plan of Attack for Hackers.opus 11.4 MB
  • village opus/DEF CON 25 Rootz Asylum - EFF - Nic0 - Opening Ceremonies- A Place Where Kids Learn White-Hat Hacking to Better The World.opus 8.6 MB
  • village opus/DEF CON 25 Rootz Asylum - Erin Owens - Hacking & Robotics v2 point 0.opus 11.6 MB
  • village opus/DEF CON 25 Rootz Asylum - Erin Owens - Sujeet Bambale - Justin Whitehead - Chris Kiggins - Abby - Duncan -  Drone Wars.opus 18.0 MB
  • village opus/DEF CON 25 Rootz Asylum - Leonard Bailey - Everything You Need To Know About The U.S. Department of Justice.opus 12.6 MB
  • village opus/DEF CON 25 Rootz Asylum - Patrick McCanna - Tips for Internet Privacy at College.opus 13.7 MB
  • village opus/DEF CON 25 Rootz Asylum - Rsnake - Robert Hansen - Searching The Invisible Internet.opus 7.1 MB
  • village opus/DEF CON 25 Rootz Asylum - Tarah - Mansion Apartment Shack House- How To Explain Crypto To Practically Anyone.opus 9.2 MB
  • village opus/DEF CON 25 Social Engineering Village - Billy Boatright - Nor Lose The Common Touch.opus 23.1 MB
  • village opus/DEF CON 25 Social Engineering Village - Brent White - Tim Roberts - Skills For A Red-Teamer.opus 38.7 MB
  • village opus/DEF CON 25 Social Engineering Village - Chris Hadnagy - SE vs Predator- Using Social Engineering In Ways I Never Thought.opus 40.3 MB
  • village opus/DEF CON 25 Social Engineering Village - Fahey Owens - Beyond Phishing - Building and Sustaining a Corporate SE Program.opus 23.8 MB
  • village opus/DEF CON 25 Social Engineering Village - Helen Thackray - Hackers Gonna Hack - But Do They Know Why.opus 40.2 MB
  • village opus/DEF CON 25 Social Engineering Village - Jayson Street - Strategies on Securing Your Banks and Enterprises-From Someone Who Robs Banks and Enterprises.opus 42.7 MB
  • village opus/DEF CON 25 Social Engineering Village - John Nye - The Human Factor- Why Are We So Bad at Security and Risk Assessment.opus 36.7 MB
  • village opus/DEF CON 25 Social Engineering Village - Keith Conway - Cameron Craig - Change Agents- How to Effectively Influence Intractable Corporate Cultures.opus 36.2 MB
  • village opus/DEF CON 25 Social Engineering Village - Michele Fincher - Are You Killing Your Security Program Mostly Dead is Slightly Alive.opus 24.9 MB
  • village opus/DEF CON 25 Social Engineering Village - Robert Wood - Thematic Social Engineering- Making SE Work at Scale.opus 30.3 MB
  • village opus/DEF CON 25 Social Engineering Village - Tyler Rosonke - Social Engineering With Web Analytics.opus 25.8 MB
  • village opus/DEF CON 25 Social Engineering Village - Yaiza Rubio - Félix Brezo - Heavy Diving For Credentials- Towards An Anonymous Phishing.opus 25.0 MB
  • village opus/DEF CON 25 Voting Village - Panel - Jake Braun - Securing the Election Office- A Local Response to a Global Threat.opus 24.0 MB
  • village opus/DEF CON 25 Voting Village - Barbara Simons - David Jefferson - An Election System is Much More Than the Voting Machine or The Booth.opus 39.1 MB
  • village opus/DEF CON 25 Voting Village - General Douglas Lute - What are the national security implications of cyber attacks on our voting systems.opus 32.6 MB
  • village opus/DEF CON 25 Voting Village - Harri Hursti - Brief history of election machine hacking and lessons learned.opus 33.6 MB
  • village opus/DEF CON 25 Voting Village - Joseph Hall - Election Hacking- Legal Considerations from the Civil Side.opus 38.4 MB
  • village opus/DEF CON 25 Voting Village - Mary Brady and Josh Franklin - The State of US Voting System Security.opus 38.8 MB
  • village opus/DEF CON 25 Voting Village - Matt Blaze - How did we get here- A history of voting technology and hanging chads and and the Help America Vote Act.opus 40.6 MB
  • village opus/DEF CON 25 Voting Village -Joseph Hall and David Jefferson - Common Misconceptions and False Parallels about Voting Technology.opus 36.8 MB
  • village opus/DEF CON 25 Wifi Village - Aardvark and Darkmatter - WIGLE Like You Mean It- Maximizing Your Wardriving Experience.opus 39.0 MB
  • village opus/DEF CON 25 Wifi Village - Alexander Zakarov - Large Scale Wireless Monitoring - KISMET Packet Sniffer On A Multi-Radio Array.opus 29.4 MB
  • village opus/DEF CON 25 Wifi Village - Andrew Strutt - POCSAG Amateur Pager Network.opus 23.2 MB
  • village opus/DEF CON 25 Wifi Village - Andrew Strutt - Suitcase Repeater Build for UHF - 70cm.opus 24.8 MB
  • village opus/DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World- Software Defined Radio Exploits.opus 76.3 MB
  • village opus/DEF CON 25 Wifi Village - Eric Escobar - SecureWorks- SDR Replay Attacks- Against Home Security Systems.opus 16.7 MB
  • village opus/DEF CON 25 Wifi Village - Matt Blaze - Sandy Clark - Travis Goodspeed - Perry Metzger - Zach Wasserman - Kevin Xu - DYI NSA On The Cheap.opus 47.9 MB
  • village opus/DEF CON 25 Wifi Village - Nick Delewski - Failsafe- Yet Another SimpliSafe Attack Vector.opus 40.2 MB
  • village opus/DEF CON 25 Wifi Village - Robert Ghilduta - Designing An Automatic Gain Control.opus 39.9 MB
  • village opus/DEF CON 25 Wifi Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale -Deceptacon Wi-Fi Deception Under 5 Dollars.opus 28.1 MB
  • village opus/DEF CON 25 Wifi Village - Woody - Tim Kuester - GODUMPiNG packet sniffing the Gotenaa.opus 45.5 MB

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!