搜索
DEF CON 25 audio
磁力链接/BT种子名称
DEF CON 25 audio
磁力链接/BT种子简介
种子哈希:
8db8e2feee069380f6be32be08a0837bac550ac6
文件大小:
43.2G
已经下载:
58
次
下载速度:
极快
收录时间:
2018-09-14
最近下载:
2021-05-19
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:8DB8E2FEEE069380F6BE32BE08A0837BAC550AC6
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
暗网Xvideo
TikTok成人版
PornHub
听泉鉴鲍
少女日记
草榴社区
哆哔涩漫
呦乐园
萝莉岛
悠悠禁区
拔萝卜
疯马秀
最近搜索
小姐
藤
征服
细腿
爱与情
小紫
세라
小飞
美女空姐
高清原版
护
萝莉秀
博主
全身
小胸
狂舞
英剧
看屁股
贤惠
大唐
鞋
东哥
高清偷拍
掉掉
萝视频
家长
裸
潜入
大叫
小妈
文件列表
Album Art - flac.jpg
19.2 kB
Album Art - lossy.jpg
684.3 kB
flac/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.flac
107.8 MB
flac/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc
42.3 kB
flac/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.flac
222.3 MB
flac/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc
85.0 kB
flac/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.flac
122.6 MB
flac/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc
52.5 kB
flac/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.flac
107.2 MB
flac/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc
36.7 kB
flac/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.flac
89.4 MB
flac/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc
26.5 kB
flac/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.flac
120.6 MB
flac/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc
55.6 kB
flac/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.flac
87.1 MB
flac/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc
35.1 kB
flac/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.flac
56.1 MB
flac/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc
23.7 kB
flac/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.flac
43.4 MB
flac/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc
8.7 kB
flac/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.flac
115.7 MB
flac/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc
48.6 kB
flac/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.flac
113.4 MB
flac/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc
49.9 kB
flac/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.flac
110.8 MB
flac/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc
56.2 kB
flac/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.flac
97.3 MB
flac/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc
43.1 kB
flac/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.flac
121.9 MB
flac/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc
51.2 kB
flac/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.flac
103.5 MB
flac/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc
31.0 kB
flac/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.flac
130.6 MB
flac/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc
53.7 kB
flac/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.flac
130.1 MB
flac/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc
55.7 kB
flac/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.flac
104.0 MB
flac/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc
37.0 kB
flac/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.flac
65.0 MB
flac/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc
24.7 kB
flac/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.flac
59.3 MB
flac/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc
20.7 kB
flac/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.flac
53.6 MB
flac/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc
22.3 kB
flac/DEF CON 25 Conference - Dor Azouri - BITSInject.flac
56.8 MB
flac/DEF CON 25 Conference - Dor Azouri - BITSInject.lrc
17.9 kB
flac/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.flac
125.6 MB
flac/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc
44.7 kB
flac/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.flac
77.9 MB
flac/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc
44.3 kB
flac/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.flac
117.1 MB
flac/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc
53.7 kB
flac/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.flac
130.2 MB
flac/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc
62.9 kB
flac/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.flac
145.7 MB
flac/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc
49.6 kB
flac/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.flac
119.6 MB
flac/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc
51.8 kB
flac/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.flac
89.1 MB
flac/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc
36.2 kB
flac/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.flac
110.2 MB
flac/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc
42.2 kB
flac/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.flac
86.1 MB
flac/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc
30.2 kB
flac/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.flac
96.5 MB
flac/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc
29.0 kB
flac/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.flac
304.6 MB
flac/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc
114.9 kB
flac/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.flac
51.9 MB
flac/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc
20.9 kB
flac/DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.flac
147.1 MB
flac/DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc
55.9 kB
flac/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.flac
132.3 MB
flac/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc
51.2 kB
flac/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.flac
123.7 MB
flac/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc
36.6 kB
flac/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.flac
99.1 MB
flac/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc
49.5 kB
flac/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.flac
77.2 MB
flac/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc
34.1 kB
flac/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.flac
108.1 MB
flac/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc
45.1 kB
flac/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.flac
156.8 MB
flac/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc
59.4 kB
flac/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.flac
123.2 MB
flac/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc
44.8 kB
flac/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.flac
92.7 MB
flac/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc
31.7 kB
flac/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.flac
119.8 MB
flac/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc
46.7 kB
flac/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.flac
132.2 MB
flac/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc
52.4 kB
flac/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.flac
112.8 MB
flac/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc
45.8 kB
flac/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.flac
61.5 MB
flac/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc
22.3 kB
flac/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.flac
103.9 MB
flac/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc
43.4 kB
flac/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.flac
59.2 MB
flac/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc
30.8 kB
flac/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.flac
125.8 MB
flac/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc
54.6 kB
flac/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.flac
38.9 MB
flac/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc
15.6 kB
flac/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.flac
145.7 MB
flac/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc
46.8 kB
flac/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.flac
67.6 MB
flac/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc
24.7 kB
flac/DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.flac
114.3 MB
flac/DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc
45.1 kB
flac/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.flac
136.6 MB
flac/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc
39.9 kB
flac/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.flac
121.9 MB
flac/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc
52.7 kB
flac/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.flac
124.4 MB
flac/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc
43.2 kB
flac/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.flac
85.2 MB
flac/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc
32.2 kB
flac/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.flac
123.3 MB
flac/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc
56.0 kB
flac/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.flac
83.7 MB
flac/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc
44.3 kB
flac/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.flac
95.9 MB
flac/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc
35.4 kB
flac/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.flac
132.1 MB
flac/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc
44.9 kB
flac/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.flac
103.3 MB
flac/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc
36.0 kB
flac/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.flac
107.5 MB
flac/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc
37.1 kB
flac/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.flac
60.3 MB
flac/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc
21.6 kB
flac/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.flac
72.8 MB
flac/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc
23.3 kB
flac/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.flac
91.8 MB
flac/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc
34.0 kB
flac/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.flac
119.6 MB
flac/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc
49.9 kB
flac/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.flac
82.5 MB
flac/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc
29.6 kB
flac/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.flac
106.2 MB
flac/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc
44.6 kB
flac/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.flac
57.7 MB
flac/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc
23.7 kB
flac/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.flac
88.3 MB
flac/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc
37.2 kB
flac/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.flac
137.6 MB
flac/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc
29.7 kB
flac/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.flac
86.2 MB
flac/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc
34.1 kB
flac/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.flac
139.5 MB
flac/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc
54.3 kB
flac/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.flac
53.4 MB
flac/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc
25.7 kB
flac/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.flac
54.4 MB
flac/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc
24.1 kB
flac/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.flac
127.2 MB
flac/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc
54.7 kB
flac/DEF CON 25 Conference - Plore - Popping a Smart Gun.flac
101.8 MB
flac/DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc
45.7 kB
flac/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.flac
88.1 MB
flac/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc
40.7 kB
flac/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.flac
65.4 MB
flac/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc
23.8 kB
flac/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.flac
129.3 MB
flac/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc
52.1 kB
flac/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.flac
117.5 MB
flac/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc
52.9 kB
flac/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.flac
51.9 MB
flac/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc
15.6 kB
flac/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.flac
52.4 MB
flac/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc
25.8 kB
flac/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.flac
108.7 MB
flac/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc
47.2 kB
flac/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.flac
43.1 MB
flac/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc
15.2 kB
flac/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.flac
95.9 MB
flac/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc
38.6 kB
flac/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.flac
110.5 MB
flac/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc
51.5 kB
flac/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.flac
123.6 MB
flac/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc
45.9 kB
flac/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.flac
107.1 MB
flac/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc
39.7 kB
flac/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.flac
98.1 MB
flac/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc
37.6 kB
flac/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.flac
131.8 MB
flac/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc
41.3 kB
flac/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.flac
104.3 MB
flac/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc
36.4 kB
flac/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.flac
114.2 MB
flac/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc
41.8 kB
flac/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.flac
42.3 MB
flac/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc
16.7 kB
flac/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.flac
262.0 MB
flac/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc
79.8 kB
flac/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.flac
126.5 MB
flac/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc
50.6 kB
flac/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.flac
80.1 MB
flac/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc
28.6 kB
flac/DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.flac
111.8 MB
flac/DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc
50.1 kB
flac/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.flac
107.7 MB
flac/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc
37.1 kB
flac/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.flac
313.5 MB
flac/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc
143.0 kB
flac/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.flac
100.1 MB
flac/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc
48.6 kB
flac/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.flac
133.0 MB
flac/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc
49.7 kB
flac/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.flac
43.5 MB
flac/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc
21.9 kB
flac/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.flac
128.9 MB
flac/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc
55.4 kB
flac/DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.flac
133.0 MB
flac/DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc
49.3 kB
flac/DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.flac
113.3 MB
flac/DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc
28.1 kB
flac/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.flac
152.7 MB
flac/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc
61.9 kB
flac/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.flac
120.9 MB
flac/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc
46.8 kB
flac/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.flac
114.5 MB
flac/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc
44.8 kB
m4a/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc
42.3 kB
m4a/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.m4a
57.2 MB
m4a/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc
85.0 kB
m4a/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel- Meet The Feds.m4a
119.9 MB
m4a/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc
52.5 kB
m4a/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.m4a
62.9 MB
m4a/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc
36.7 kB
m4a/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.m4a
59.8 MB
m4a/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc
26.5 kB
m4a/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.m4a
45.7 MB
m4a/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc
55.6 kB
m4a/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on z_OS.m4a
64.3 MB
m4a/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc
35.1 kB
m4a/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.m4a
48.9 MB
m4a/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.m4a
29.1 MB
m4a/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc
23.7 kB
m4a/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc
8.7 kB
m4a/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.m4a
22.5 MB
m4a/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc
48.6 kB
m4a/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.m4a
70.3 MB
m4a/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc
49.9 kB
m4a/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.m4a
67.6 MB
m4a/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc
56.2 kB
m4a/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.m4a
55.5 MB
m4a/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc
43.1 kB
m4a/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.m4a
53.2 MB
m4a/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc
51.2 kB
m4a/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.m4a
62.6 MB
m4a/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc
31.0 kB
m4a/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.m4a
51.7 MB
m4a/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc
53.7 kB
m4a/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.m4a
66.4 MB
m4a/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc
55.7 kB
m4a/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.m4a
68.9 MB
m4a/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc
37.0 kB
m4a/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.m4a
57.8 MB
m4a/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc
24.7 kB
m4a/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.m4a
32.2 MB
m4a/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc
20.7 kB
m4a/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.m4a
29.6 MB
m4a/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc
22.3 kB
m4a/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.m4a
31.9 MB
m4a/DEF CON 25 Conference - Dor Azouri - BITSInject.lrc
17.9 kB
m4a/DEF CON 25 Conference - Dor Azouri - BITSInject.m4a
29.6 MB
m4a/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc
44.7 kB
m4a/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.m4a
63.7 MB
m4a/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc
44.3 kB
m4a/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.m4a
47.2 MB
m4a/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc
53.7 kB
m4a/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.m4a
61.5 MB
m4a/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc
62.9 kB
m4a/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.m4a
72.8 MB
m4a/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc
49.6 kB
m4a/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.m4a
72.6 MB
m4a/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc
51.8 kB
m4a/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.m4a
61.6 MB
m4a/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc
36.2 kB
m4a/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.m4a
52.2 MB
m4a/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc
42.2 kB
m4a/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.m4a
56.6 MB
m4a/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc
30.2 kB
m4a/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.m4a
44.0 MB
m4a/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc
29.0 kB
m4a/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.m4a
51.2 MB
m4a/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc
114.9 kB
m4a/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.m4a
169.3 MB
m4a/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc
20.9 kB
m4a/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.m4a
28.2 MB
m4a/DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc
55.9 kB
m4a/DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.m4a
74.9 MB
m4a/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc
51.2 kB
m4a/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.m4a
67.7 MB
m4a/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc
36.6 kB
m4a/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.m4a
63.3 MB
m4a/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc
49.5 kB
m4a/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.m4a
63.5 MB
m4a/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc
34.1 kB
m4a/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.m4a
41.1 MB
m4a/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc
45.1 kB
m4a/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.m4a
57.0 MB
m4a/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc
59.4 kB
m4a/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.m4a
80.3 MB
m4a/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc
44.8 kB
m4a/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.m4a
63.6 MB
m4a/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc
31.7 kB
m4a/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.m4a
46.9 MB
m4a/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc
46.7 kB
m4a/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.m4a
62.8 MB
m4a/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc
52.4 kB
m4a/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.m4a
73.1 MB
m4a/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc
45.8 kB
m4a/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks_.m4a
57.3 MB
m4a/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc
22.3 kB
m4a/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.m4a
30.8 MB
m4a/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc
43.4 kB
m4a/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.m4a
54.1 MB
m4a/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc
30.8 kB
m4a/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.m4a
34.3 MB
m4a/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc
54.6 kB
m4a/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.m4a
66.3 MB
m4a/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc
15.6 kB
m4a/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.m4a
22.2 MB
m4a/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc
46.8 kB
m4a/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.m4a
72.6 MB
m4a/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc
24.7 kB
m4a/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.m4a
34.6 MB
m4a/DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.m4a
60.1 MB
m4a/DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc
45.1 kB
m4a/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc
39.9 kB
m4a/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.m4a
68.8 MB
m4a/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc
52.7 kB
m4a/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.m4a
61.9 MB
m4a/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc
43.2 kB
m4a/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.m4a
64.7 MB
m4a/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc
32.2 kB
m4a/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.m4a
44.8 MB
m4a/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc
56.0 kB
m4a/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.m4a
67.4 MB
m4a/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc
44.3 kB
m4a/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.m4a
46.2 MB
m4a/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc
35.4 kB
m4a/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.m4a
58.8 MB
m4a/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc
44.9 kB
m4a/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.m4a
65.1 MB
m4a/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc
36.0 kB
m4a/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.m4a
53.9 MB
m4a/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc
37.1 kB
m4a/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.m4a
57.1 MB
m4a/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc
21.6 kB
m4a/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.m4a
30.1 MB
m4a/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc
23.3 kB
m4a/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS_iOS Kernel Debugging and Heap Feng Shui.m4a
39.3 MB
m4a/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc
34.0 kB
m4a/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.m4a
46.4 MB
m4a/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc
49.9 kB
m4a/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.m4a
64.9 MB
m4a/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc
29.6 kB
m4a/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.m4a
42.2 MB
m4a/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc
44.6 kB
m4a/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.m4a
59.2 MB
m4a/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc
23.7 kB
m4a/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.m4a
30.1 MB
m4a/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc
37.2 kB
m4a/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.m4a
50.5 MB
m4a/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc
29.7 kB
m4a/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.m4a
67.6 MB
m4a/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc
34.1 kB
m4a/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.m4a
46.3 MB
m4a/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc
54.3 kB
m4a/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.m4a
71.2 MB
m4a/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc
25.7 kB
m4a/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.m4a
31.6 MB
m4a/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc
24.1 kB
m4a/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.m4a
28.0 MB
m4a/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc
54.7 kB
m4a/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.m4a
68.6 MB
m4a/DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc
45.7 kB
m4a/DEF CON 25 Conference - Plore - Popping a Smart Gun.m4a
58.1 MB
m4a/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc
40.7 kB
m4a/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.m4a
48.8 MB
m4a/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc
23.8 kB
m4a/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.m4a
34.4 MB
m4a/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc
52.1 kB
m4a/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.m4a
64.8 MB
m4a/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc
52.9 kB
m4a/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.m4a
65.3 MB
m4a/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc
15.6 kB
m4a/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.m4a
26.9 MB
m4a/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc
25.8 kB
m4a/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.m4a
29.8 MB
m4a/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc
47.2 kB
m4a/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.m4a
59.5 MB
m4a/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc
15.2 kB
m4a/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.m4a
22.5 MB
m4a/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc
38.6 kB
m4a/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.m4a
57.0 MB
m4a/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc
51.5 kB
m4a/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.m4a
55.5 MB
m4a/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc
45.9 kB
m4a/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.m4a
67.3 MB
m4a/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc
39.7 kB
m4a/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.m4a
55.2 MB
m4a/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc
37.6 kB
m4a/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.m4a
48.6 MB
m4a/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc
41.3 kB
m4a/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.m4a
66.3 MB
m4a/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc
36.4 kB
m4a/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.m4a
52.9 MB
m4a/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc
41.8 kB
m4a/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.m4a
58.5 MB
m4a/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc
16.7 kB
m4a/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.m4a
22.4 MB
m4a/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc
79.8 kB
m4a/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.m4a
130.5 MB
m4a/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc
50.6 kB
m4a/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.m4a
67.9 MB
m4a/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc
28.6 kB
m4a/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.m4a
48.2 MB
m4a/DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc
50.1 kB
m4a/DEF CON 25 Conference - Trey Forgety - Inside the _Meet Desai_ Attack - Defending Distributed Targets from Distributed Attacks.m4a
59.1 MB
m4a/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc
37.1 kB
m4a/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.m4a
53.5 MB
m4a/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc
143.0 kB
m4a/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You'll Ever Need - AMA with 20 years of DEF CON CTF.m4a
163.7 MB
m4a/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc
48.6 kB
m4a/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.m4a
52.5 MB
m4a/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc
49.7 kB
m4a/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.m4a
67.0 MB
m4a/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc
21.9 kB
m4a/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.m4a
24.4 MB
m4a/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc
55.4 kB
m4a/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.m4a
69.1 MB
m4a/DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc
49.3 kB
m4a/DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.m4a
67.3 MB
m4a/DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc
28.1 kB
m4a/DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.m4a
58.0 MB
m4a/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc
61.9 kB
m4a/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.m4a
85.4 MB
m4a/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc
46.8 kB
m4a/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.m4a
61.5 MB
m4a/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc
44.8 kB
m4a/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.m4a
59.8 MB
opus/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.lrc
42.3 kB
opus/DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.opus
30.9 MB
opus/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.lrc
85.0 kB
opus/DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel - Meet The Feds.opus
61.9 MB
opus/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.lrc
52.5 kB
opus/DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.opus
32.5 MB
opus/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.lrc
36.7 kB
opus/DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.opus
33.4 MB
opus/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.lrc
26.5 kB
opus/DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.opus
25.0 MB
opus/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.lrc
55.6 kB
opus/DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.opus
35.1 MB
opus/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.lrc
35.1 kB
opus/DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.opus
28.0 MB
opus/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.lrc
23.7 kB
opus/DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.opus
15.2 MB
opus/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.lrc
8.7 kB
opus/DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.opus
11.9 MB
opus/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.lrc
48.6 kB
opus/DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.opus
39.5 MB
opus/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.lrc
49.9 kB
opus/DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.opus
40.2 MB
opus/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.lrc
56.2 kB
opus/DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set.opus
29.5 MB
opus/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.lrc
43.1 kB
opus/DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.opus
31.4 MB
opus/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.lrc
51.2 kB
opus/DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.opus
34.0 MB
opus/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.lrc
31.0 kB
opus/DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.opus
27.4 MB
opus/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.lrc
53.7 kB
opus/DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.opus
31.2 MB
opus/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.lrc
55.7 kB
opus/DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.opus
35.8 MB
opus/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.lrc
37.0 kB
opus/DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time.opus
29.1 MB
opus/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.lrc
24.7 kB
opus/DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.opus
15.8 MB
opus/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.lrc
20.7 kB
opus/DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.opus
15.0 MB
opus/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.lrc
22.3 kB
opus/DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.opus
19.2 MB
opus/DEF CON 25 Conference - Dor Azouri - BITSInject.lrc
17.9 kB
opus/DEF CON 25 Conference - Dor Azouri - BITSInject.opus
15.5 MB
opus/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.lrc
44.7 kB
opus/DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.opus
31.7 MB
opus/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.lrc
44.3 kB
opus/DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.opus
30.2 MB
opus/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.lrc
53.7 kB
opus/DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.opus
33.2 MB
opus/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.lrc
62.9 kB
opus/DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.opus
38.3 MB
opus/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.lrc
49.6 kB
opus/DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.opus
35.3 MB
opus/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.lrc
51.8 kB
opus/DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.opus
33.7 MB
opus/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.lrc
36.2 kB
opus/DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.opus
31.0 MB
opus/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.lrc
42.2 kB
opus/DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.opus
30.2 MB
opus/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.lrc
30.2 kB
opus/DEF CON 25 Conference - Hanno Bõck - Abusing Certificate Transparency Logs.opus
22.9 MB
opus/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.lrc
29.0 kB
opus/DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.opus
26.7 MB
opus/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.lrc
114.9 kB
opus/DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.opus
86.7 MB
opus/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.lrc
20.9 kB
opus/DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.opus
15.3 MB
opus/DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.lrc
55.9 kB
opus/DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.opus
36.7 MB
opus/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.lrc
51.2 kB
opus/DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.opus
36.1 MB
opus/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.lrc
36.6 kB
opus/DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.opus
31.4 MB
opus/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.lrc
49.5 kB
opus/DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.opus
39.1 MB
opus/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.lrc
34.1 kB
opus/DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.opus
22.2 MB
opus/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.lrc
45.1 kB
opus/DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.opus
30.2 MB
opus/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.lrc
59.4 kB
opus/DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.opus
38.0 MB
opus/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.lrc
44.8 kB
opus/DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.opus
31.7 MB
opus/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.lrc
31.7 kB
opus/DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.opus
24.1 MB
opus/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.lrc
46.7 kB
opus/DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.opus
36.9 MB
opus/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.lrc
52.4 kB
opus/DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.opus
39.4 MB
opus/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.lrc
45.8 kB
opus/DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks.opus
30.7 MB
opus/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.lrc
22.3 kB
opus/DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.opus
14.8 MB
opus/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.lrc
43.4 kB
opus/DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.opus
28.1 MB
opus/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.lrc
30.8 kB
opus/DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.opus
20.2 MB
opus/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.lrc
54.6 kB
opus/DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.opus
36.2 MB
opus/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.lrc
15.6 kB
opus/DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.opus
12.4 MB
opus/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.lrc
46.8 kB
opus/DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.opus
35.3 MB
opus/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.lrc
24.7 kB
opus/DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.opus
17.2 MB
opus/DEF CON 25 Conference - Luke Young - There_s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.opus
33.8 MB
opus/DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.lrc
45.1 kB
opus/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.lrc
39.9 kB
opus/DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.opus
32.7 MB
opus/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.lrc
52.7 kB
opus/DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.opus
30.6 MB
opus/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.lrc
43.2 kB
opus/DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.opus
33.2 MB
opus/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.lrc
32.2 kB
opus/DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.opus
23.8 MB
opus/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.lrc
56.0 kB
opus/DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.opus
37.8 MB
opus/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.lrc
44.3 kB
opus/DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.opus
27.3 MB
opus/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.lrc
35.4 kB
opus/DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.opus
33.7 MB
opus/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.lrc
44.9 kB
opus/DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.opus
31.8 MB
opus/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.lrc
36.0 kB
opus/DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.opus
28.4 MB
opus/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.lrc
37.1 kB
opus/DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.opus
29.9 MB
opus/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.lrc
21.6 kB
opus/DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.opus
15.0 MB
opus/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.lrc
23.3 kB
opus/DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.opus
22.5 MB
opus/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.lrc
34.0 kB
opus/DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.opus
23.6 MB
opus/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.lrc
49.9 kB
opus/DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy - A Socratic Dialogue.opus
35.9 MB
opus/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.lrc
29.6 kB
opus/DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.opus
21.3 MB
opus/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.lrc
44.6 kB
opus/DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.opus
31.8 MB
opus/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.lrc
23.7 kB
opus/DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.opus
14.9 MB
opus/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.lrc
37.2 kB
opus/DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.opus
29.4 MB
opus/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.lrc
29.7 kB
opus/DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.opus
32.5 MB
opus/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.lrc
34.1 kB
opus/DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.opus
27.8 MB
opus/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.lrc
54.3 kB
opus/DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS and it's all broken!.opus
36.3 MB
opus/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.lrc
25.7 kB
opus/DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.opus
18.8 MB
opus/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.lrc
24.1 kB
opus/DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.opus
14.8 MB
opus/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.lrc
54.7 kB
opus/DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words and Literally.opus
36.2 MB
opus/DEF CON 25 Conference - Plore - Popping a Smart Gun.lrc
45.7 kB
opus/DEF CON 25 Conference - Plore - Popping a Smart Gun.opus
31.5 MB
opus/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.lrc
40.7 kB
opus/DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.opus
27.4 MB
opus/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.lrc
23.8 kB
opus/DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.opus
16.0 MB
opus/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.lrc
52.1 kB
opus/DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.opus
33.9 MB
opus/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.lrc
52.9 kB
opus/DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.opus
35.4 MB
opus/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.lrc
15.6 kB
opus/DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.opus
13.9 MB
opus/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.lrc
25.8 kB
opus/DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.opus
18.1 MB
opus/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.lrc
47.2 kB
opus/DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.opus
34.4 MB
opus/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.lrc
15.2 kB
opus/DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.opus
12.8 MB
opus/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.lrc
38.6 kB
opus/DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.opus
33.1 MB
opus/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.lrc
51.5 kB
opus/DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.opus
29.1 MB
opus/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.lrc
45.9 kB
opus/DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.opus
34.4 MB
opus/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.lrc
39.7 kB
opus/DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.opus
29.0 MB
opus/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.lrc
37.6 kB
opus/DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.opus
25.4 MB
opus/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.lrc
41.3 kB
opus/DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.opus
32.2 MB
opus/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.lrc
36.4 kB
opus/DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.opus
29.1 MB
opus/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.lrc
41.8 kB
opus/DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.opus
29.8 MB
opus/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.lrc
16.7 kB
opus/DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.opus
12.4 MB
opus/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.lrc
79.8 kB
opus/DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.opus
62.0 MB
opus/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.lrc
50.6 kB
opus/DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.opus
35.3 MB
opus/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.lrc
28.6 kB
opus/DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.opus
26.9 MB
opus/DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.lrc
50.1 kB
opus/DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.opus
31.4 MB
opus/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.lrc
37.1 kB
opus/DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.opus
27.4 MB
opus/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.lrc
143.0 kB
opus/DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You Will Ever Need - AMA 20 years of DEF CON CTF.opus
83.7 MB
opus/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.lrc
48.6 kB
opus/DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.opus
28.8 MB
opus/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.lrc
49.7 kB
opus/DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.opus
34.3 MB
opus/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.lrc
21.9 kB
opus/DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.opus
14.7 MB
opus/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.lrc
55.4 kB
opus/DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.opus
35.0 MB
opus/DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.lrc
49.3 kB
opus/DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.opus
36.6 MB
opus/DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.lrc
28.1 kB
opus/DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.opus
30.7 MB
opus/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.lrc
61.9 kB
opus/DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.opus
47.1 MB
opus/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.lrc
46.8 kB
opus/DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.opus
30.6 MB
opus/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.lrc
44.8 kB
opus/DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.opus
30.2 MB
village flac/DEF CON 25 BioHacking Village - Amanda Plimpton and Evan Anderson - Psychoactive Chemicals in Combat.flac
75.8 MB
village flac/DEF CON 25 BioHacking Village - Amirs Panel - Ethics in BioHacking.flac
141.5 MB
village flac/DEF CON 25 BioHacking Village - C00p3r - Dangerous Minds Podcast - Celebrating 100th Episode.flac
128.9 MB
village flac/DEF CON 25 BioHacking Village - C00p3r and Cur50r - Implantable Technology Show and Tell.flac
52.8 MB
village flac/DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing The Secure Deployment Of Medical Devices.flac
64.0 MB
village flac/DEF CON 25 BioHacking Village - Dr Stanislav Naydin and Vlad Gostomelsky - Medical Device Ethics and Security.flac
66.1 MB
village flac/DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Path Badly.flac
66.8 MB
village flac/DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides - Smart Drugs 4-Minute Mile.flac
67.4 MB
village flac/DEF CON 25 BioHacking Village - Jay Radcliffe - How to use the Scientific Method in Security Research.flac
113.8 MB
village flac/DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Die.flac
69.4 MB
village flac/DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt - Blockchain and The Hope for Healthcare.flac
63.3 MB
village flac/DEF CON 25 BioHacking Village - Jun Axup - The Brave New Worl of Bio-Entrepreneurship.flac
51.7 MB
village flac/DEF CON 25 BioHacking Village - Kevin Sacco - Tales of A Healthcare Hacker.flac
83.4 MB
village flac/DEF CON 25 BioHacking Village - Louis Auguste Jr - Microscopes Are Stupid.flac
52.4 MB
village flac/DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and Regulation.flac
67.2 MB
village flac/DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities.flac
82.3 MB
village flac/DEF CON 25 BioHacking Village - RenderMan and Murdoch Monkey - Hacking The Internet of Dongs.flac
69.8 MB
village flac/DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO.flac
49.9 MB
village flac/DEF CON 25 BioHacking Village - Ryan Schmoll and Peter Hefley - Trigraph- An Ethereum-based Teleradiology Application.flac
57.0 MB
village flac/DEF CON 25 BioHacking Village - Tess Scrodinger - Total Recall- Implicit Learning As A Cryptographic Primitive.flac
66.3 MB
village flac/DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of Biohacking.flac
44.4 MB
village flac/DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic Code Using Information Theory.flac
44.2 MB
village flac/DEF CON 25 BioHacking Village - Trevor Goodman - Hack Your Senses - Sensory Augementation and Brain Plasticity.flac
62.6 MB
village flac/DEF CON 25 BioHacking Village -Szkatulski and Lawless- How Your Doctor Might Be Trying To Kill You-How Personal Genomics Can Save Your Life.flac
62.9 MB
village flac/DEF CON 25 Car Hacking Village - Badge Life - DEFCON Unofficial Badges Panel.flac
126.1 MB
village flac/DEF CON 25 Car Hacking Village - Corey Theun - Heavy Truck and Electronic Logging Devices- What Could Go Wrong.flac
90.3 MB
village flac/DEF CON 25 Car Hacking Village - Duncan Woodbury - Nocholas Haltmeyer - Linux-Stack Based V2X Framework.flac
81.9 MB
village flac/DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - Don -An Introduction to AUTOSAR Secure Onbaord Communication.flac
110.8 MB
village flac/DEF CON 25 Car Hacking Village - Justin Montalbano - Bryan Gillispie - David Connett- Attacking Wireless Interfaces in Vehicles.flac
81.9 MB
village flac/DEF CON 25 Car Hacking Village - Sameer Dixit - Vlad Gostomelsky - Abusing Smart Cars with QR Codes.flac
58.8 MB
village flac/DEF CON 25 Car Hacking Village - Sheila Ayelen Berta - Claudio Caracciolo - The Bicho- An Advanced Car Backdoor Maker.flac
91.0 MB
village flac/DEF CON 25 Car Hacking Village - Tim b1tbane - Mitch Johnson ehntoo - That's No Car- Its a Network.flac
94.0 MB
village flac/DEF CON 25 Car Hacking Village - Vlad Gostomelsky - GPS System Integrity.flac
63.0 MB
village flac/DEF CON 25 Car Hacking Village - Weston Hecker - Grand Theft Radio- Stopping SDR Relay Attacks on PKES.flac
64.7 MB
village flac/DEF CON 25 Crypto and Privacy Village - Alisha Kloc - Privacy is Not An Add-On- Designing for Privacy from the Ground Up.flac
87.7 MB
village flac/DEF CON 25 Crypto and Privacy Village - Andrew Brandt - SSL Visibility Revisted- A Year In Privacy Improvements For Encrypted Communications.flac
118.2 MB
village flac/DEF CON 25 Crypto and Privacy Village - David Huerta - Alice and Bob are Slightly Less Confused.flac
74.3 MB
village flac/DEF CON 25 Crypto and Privacy Village - David Wong - SHA-3 vs The World.flac
132.1 MB
village flac/DEF CON 25 Crypto and Privacy Village - Evgeny Sidorov - Yet Another Password Hashing Talk.flac
75.7 MB
village flac/DEF CON 25 Crypto and Privacy Village - J0n J4rv1s - The Surveillance Capitalism Will Continue Until Morale Improves.flac
155.0 MB
village flac/DEF CON 25 Crypto and Privacy Village - Jake Williams -The Symantec SSL Debacle Lessons Learned and Future Steps.flac
131.4 MB
village flac/DEF CON 25 Crypto and Privacy Village - Joel Wallenstrom - Robby Mook - Time to Start Wearing Tin-Foil Hats Following the 2016 Electrions.flac
127.5 MB
village flac/DEF CON 25 Crypto and Privacy Village - Joseph Birr-Pixton - Rustls - Modern Fast Safer TLS.flac
81.5 MB
village flac/DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace.flac
64.0 MB
village flac/DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has My Snoopy Boyfriend Privacy Within A Relationship.flac
113.1 MB
village flac/DEF CON 25 Crypto and Privacy Village - Lee Brotherston - Blue Team TLS Hugs.flac
65.1 MB
village flac/DEF CON 25 Crypto and Privacy Village - Mark Mager - Cryptanalysis in the Time of Ransomware.flac
111.3 MB
village flac/DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty Computation.flac
59.3 MB
village flac/DEF CON 25 Crypto and Privacy Village - Punky Duero - The Key Management Facility of The Root DNSSEC Key Signing Key.flac
62.8 MB
village flac/DEF CON 25 Crypto and Privacy Village - Ryan Lackey - Cypherpunks History.flac
66.1 MB
village flac/DEF CON 25 Crypto and Privacy Village - Scott Arciszewski - The How and Why for Secure Automatic Patch Management.flac
56.7 MB
village flac/DEF CON 25 Crypto and Privacy Village - Shea Nangle - Operational Security Lessons From The Dark Web.flac
73.5 MB
village flac/DEF CON 25 Crypto and Privacy Village - Tomas Susanka - Security Analysis of the Telegram IM.flac
52.9 MB
village flac/DEF CON 25 Crypto and Privacy Village - Trey Forgety - Protecting Users' Privacy in a Location-Critical Enterprise- The Challenges of 9-1-1 Location.flac
129.2 MB
village flac/DEF CON 25 Hardware Hacking Village - Cesare Pizzi - Ardusploit - Proof of concept for Arduino code injection.flac
103.7 MB
village flac/DEF CON 25 Hardware Hacking Village - Gigs Taggart - What is Ground- Baby don't hurt me.flac
60.3 MB
village flac/DEF CON 25 Hardware Hacking Village - Joe hwhxr - Hardware Hacking- Old Sk00l and New Sk00l.flac
93.5 MB
village flac/DEF CON 25 Hardware Hacking Village - John Dunlap - A tangle of Plastic Spaghetti-A Look Into the Security of 3D Printers.flac
129.6 MB
village flac/DEF CON 25 ICS Village - Arnaud Soullié - Fun with Modbus 0x5a - Nothing New. Still Relevant_.flac
62.1 MB
village flac/DEF CON 25 ICS Village - Blake Johnson - Dissecting Industrial Wireless Implementations.flac
76.5 MB
village flac/DEF CON 25 ICS Village - Bryson Bort - Atlas - Grid Insecurity - and How to Really Fix This Shit.flac
76.8 MB
village flac/DEF CON 25 ICS Village - Chris Sistrunk - What's the DFIRence for ICS.flac
80.4 MB
village flac/DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices.flac
93.4 MB
village flac/DEF CON 25 ICS Village - Thomas Brandsetter - In Security in Building Automation - How to Create Dark Buildings with Light Speed.flac
78.0 MB
village flac/DEF CON 25 Internet of Things Village - Aaron Alva - Mark Eichorn - IoT Updates to Help Protect Consumers.flac
51.0 MB
village flac/DEF CON 25 Internet of Things Village - Aaron Guzman - Hide Yo Keys- Hide Yo Car.flac
88.0 MB
village flac/DEF CON 25 Internet of Things Village - Alex Jay Balan - IoT - The Gift That Keeps on Giving.flac
109.4 MB
village flac/DEF CON 25 Internet of Things Village - Andrew Tierney - Ken Munro - IoT- From DVRs to Dildos.flac
98.4 MB
village flac/DEF CON 25 Internet of Things Village - Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard.flac
113.1 MB
village flac/DEF CON 25 Internet of Things Village - Dan Regalado - Inside the Alaris Infusion Pump and not too much medication por favor.flac
86.1 MB
village flac/DEF CON 25 Internet of Things Village - Deral Heiland - The Internet of Vulnerabilities.flac
91.1 MB
village flac/DEF CON 25 Internet of Things Village - Rick Ramgattie - IoT Village Keynote - Friends and Not Foes- Rethinking the Researcher-Vendor Relationship.flac
59.9 MB
village flac/DEF CON 25 Internet of Things Village - Vivek Ramachandran and Nishant Sharma - Ashish Bhangale - IIDS- An IoT Intrusion Detection System.flac
94.8 MB
village flac/DEF CON 25 Internet of Things Village - Vladimir Dashchenko and Sergey Temnikov - Pwning the Industrial IoT- RCEs and backdoors are around.flac
57.8 MB
village flac/DEF CON 25 Lockpick Village - TOOOL STAFF MEMBER and Dr. Tran - TOOOL Lockpicking Talk Number 1.flac
62.8 MB
village flac/DEF CON 25 Packet Hacking Village - Ankur Tyagi - Visual Network and File Forensics.flac
72.0 MB
village flac/DEF CON 25 Packet Hacking Village - Catherine Ullman and Chris Roberts - When the Current Ransomware and Payload of the Day CRAP of the day Hits the Fan.flac
91.0 MB
village flac/DEF CON 25 Packet Hacking Village - Chris Wysopal - Opening Ceremony - How Hackers Changed The Security Industry.flac
115.8 MB
village flac/DEF CON 25 Packet Hacking Village - Damon Small - Layer 8 and Why People are the Most Important Security Tool.flac
102.3 MB
village flac/DEF CON 25 Packet Hacking Village - Daniel Adinolfi - Anthony Singleton - CVE IDs and How to Get Them.flac
92.3 MB
village flac/DEF CON 25 Packet Hacking Village - Eric Capuano - Fortune 100 InfoSec on a State Government Budget.flac
102.3 MB
village flac/DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop Scenarios By Building An Incident Response Simulation Platform.flac
149.4 MB
village flac/DEF CON 25 Packet Hacking Village - Gabriel Ryan - The Black Art of Wireless Post-Exploitation.flac
142.0 MB
village flac/DEF CON 25 Packet Hacking Village - Gilberto Bertin - Past and Present and Future of High Speed Packet Filtering on Linux.flac
48.2 MB
village flac/DEF CON 25 Packet Hacking Village - Gita Ziabari - Yalda and Automated Bulk Intelligence.flac
52.2 MB
village flac/DEF CON 25 Packet Hacking Village - Leah Figueroa - Iron Sights for Your Data.flac
45.4 MB
village flac/DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing- What Is It and How It Allows Largest Attacks and How to Fix It.flac
121.9 MB
village flac/DEF CON 25 Packet Hacking Village - Megan Roddy- Strenthen Your Secops Team By Leveraging Neurodiversity.flac
39.1 MB
village flac/DEF CON 25 Packet Hacking Village - Michael Gianarakis and Keith Lee and Portia - Finding Your Way to Domain Access.flac
70.2 MB
village flac/DEF CON 25 Packet Hacking Village - Mike Raggo - Chet Hosmer - Covert TCP with a Twist.flac
147.0 MB
village flac/DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Change of Persistence- AWS Post Compromise Primer.flac
87.3 MB
village flac/DEF CON 25 Packet Hacking Village - Rodolfo Assis - XSS For the win.flac
28.3 MB
village flac/DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach and WTF Really Happened.flac
135.9 MB
village flac/DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain Name.flac
53.5 MB
village flac/DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot- Mum and Tons of WannaCry and Evils Attacked Our Home.flac
93.8 MB
village flac/DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound- Deceiving Doman Admin Hunters.flac
85.9 MB
village flac/DEF CON 25 Packet Hacking Village - Vivek Ramachandran - Thomas d'Otreppe - Make Your Own 80211 ac Monitoring Hacker Gadget.flac
148.3 MB
village flac/DEF CON 25 Recon Village - Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story.flac
74.4 MB
village flac/DEF CON 25 Recon Village - Andrew Hay - An Introduction to Graph Theory for OSINT.flac
97.5 MB
village flac/DEF CON 25 Recon Village - Anthony Russell - Building Google For Criminal Enterprises.flac
85.6 MB
village flac/DEF CON 25 Recon Village - Dakota Nelson - Total Recoll.flac
30.4 MB
village flac/DEF CON 25 Recon Village - Guillermo Buendia and Yael Basurto Esquivel - How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches.flac
41.9 MB
village flac/DEF CON 25 Recon Village - Inbar Raz - Do Tinder Bots Dream of Electric Toys- How Tinder Bots are Breaking Hearts All Over The World.flac
77.8 MB
village flac/DEF CON 25 Recon Village - Jason Haddix - Domain Discovery - Expanding Your Scope Like A Boss.flac
100.5 MB
village flac/DEF CON 25 Recon Village - Jonathan Cran - Attack Surface Discovery With Intrigue.flac
63.1 MB
village flac/DEF CON 25 Recon Village - Kunal Aggarwal - DataSploit Open Source Assistant for OSINT.flac
51.4 MB
village flac/DEF CON 25 Recon Village - Leah Figueroa - FERPA- Only Your Grades Are Safe; OSINT In Higher Education.flac
85.3 MB
village flac/DEF CON 25 Recon Village - Mikhail Sasonkin - Up Close and Personal - Keeping an Eye On Mobile Applications.flac
45.3 MB
village flac/DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and Profit- How To Hide From The FBI.flac
110.4 MB
village flac/DEF CON 25 Recon Village - Shane MacDougal - Keynote - Seeing is Believing - The Future of Recon- You Won't Believe What Happens Next.flac
120.8 MB
village flac/DEF CON 25 Recon Village - Simon Roses - OSINT Tactics on Source Code and Developers.flac
98.7 MB
village flac/DEF CON 25 Recon Village - TBD - Winner Announcement Prize Distribution.flac
45.0 MB
village flac/DEF CON 25 Recon Village - Tracy Z. Maleeff - Into the Bird's Nest- A Comprehensive Look at Twitter as a Research Tool.flac
102.8 MB
village flac/DEF CON 25 Recon Village - Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon - Collecting Evidence Like a Robot.flac
46.3 MB
village flac/DEF CON 25 Rootz Asylum - Alex Stamos- CSO- Facebook.flac
38.0 MB
village flac/DEF CON 25 Rootz Asylum - Aron Rosenberg - Aaron Standridge - Hacking an Insecure WiFi Camera.flac
17.0 MB
village flac/DEF CON 25 Rootz Asylum - Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer.flac
12.6 MB
village flac/DEF CON 25 Rootz Asylum - Cory Doctorow - You are not a Digital Native and that's OK.flac
34.2 MB
village flac/DEF CON 25 Rootz Asylum - Crash - Nerfherder - A Brief Message From Security.flac
15.1 MB
village flac/DEF CON 25 Rootz Asylum - David Weinman - Introduction To Cheat Engine.flac
49.7 MB
village flac/DEF CON 25 Rootz Asylum - Deviant - Home Depot and A Plan of Attack for Hackers.flac
35.9 MB
village flac/DEF CON 25 Rootz Asylum - EFF - Nic0 - Opening Ceremonies- A Place Where Kids Learn White-Hat Hacking to Better The World.flac
13.8 MB
village flac/DEF CON 25 Rootz Asylum - Erin Owens - Hacking & Robotics v2 point 0.flac
23.1 MB
village flac/DEF CON 25 Rootz Asylum - Erin Owens - Sujeet Bambale - Justin Whitehead - Chris Kiggins - Abby - Duncan - Drone Wars.flac
55.3 MB
village flac/DEF CON 25 Rootz Asylum - Leonard Bailey - Everything You Need To Know About The U.S. Department of Justice.flac
37.4 MB
village flac/DEF CON 25 Rootz Asylum - Patrick McCanna - Tips for Internet Privacy at College.flac
25.4 MB
village flac/DEF CON 25 Rootz Asylum - Rsnake - Robert Hansen - Searching The Invisible Internet.flac
14.1 MB
village flac/DEF CON 25 Rootz Asylum - Tarah - Mansion Apartment Shack House- How To Explain Crypto To Practically Anyone.flac
24.8 MB
village flac/DEF CON 25 Social Engineering Village - Billy Boatright - Nor Lose The Common Touch.flac
86.4 MB
village flac/DEF CON 25 Social Engineering Village - Brent White - Tim Roberts - Skills For A Red-Teamer.flac
126.2 MB
village flac/DEF CON 25 Social Engineering Village - Chris Hadnagy - SE vs Predator- Using Social Engineering In Ways I Never Thought.flac
138.3 MB
village flac/DEF CON 25 Social Engineering Village - Fahey Owens - Beyond Phishing - Building and Sustaining a Corporate SE Program.flac
79.8 MB
village flac/DEF CON 25 Social Engineering Village - Helen Thackray - Hackers Gonna Hack - But Do They Know Why.flac
141.2 MB
village flac/DEF CON 25 Social Engineering Village - Jayson Street - Strategies on Securing Your Banks and Enterprises-From Someone Who Robs Banks and Enterprises.flac
141.4 MB
village flac/DEF CON 25 Social Engineering Village - John Nye - The Human Factor- Why Are We So Bad at Security and Risk Assessment.flac
124.1 MB
village flac/DEF CON 25 Social Engineering Village - Keith Conway - Cameron Craig - Change Agents- How to Effectively Influence Intractable Corporate Cultures.flac
119.7 MB
village flac/DEF CON 25 Social Engineering Village - Michele Fincher - Are You Killing Your Security Program Mostly Dead is Slightly Alive.flac
76.2 MB
village flac/DEF CON 25 Social Engineering Village - Robert Wood - Thematic Social Engineering- Making SE Work at Scale.flac
107.7 MB
village flac/DEF CON 25 Social Engineering Village - Tyler Rosonke - Social Engineering With Web Analytics.flac
87.9 MB
village flac/DEF CON 25 Social Engineering Village - Yaiza Rubio - Félix Brezo - Heavy Diving For Credentials- Towards An Anonymous Phishing.flac
70.9 MB
village flac/DEF CON 25 Voting Village - Panel - Jake Braun - Securing the Election Office- A Local Response to a Global Threat.flac
73.8 MB
village flac/DEF CON 25 Voting Village - Barbara Simons - David Jefferson - An Election System is Much More Than the Voting Machine or The Booth.flac
120.6 MB
village flac/DEF CON 25 Voting Village - General Douglas Lute - What are the national security implications of cyber attacks on our voting systems.flac
101.6 MB
village flac/DEF CON 25 Voting Village - Harri Hursti - Brief history of election machine hacking and lessons learned.flac
120.1 MB
village flac/DEF CON 25 Voting Village - Joseph Hall - Election Hacking- Legal Considerations from the Civil Side.flac
119.3 MB
village flac/DEF CON 25 Voting Village - Mary Brady and Josh Franklin - The State of US Voting System Security.flac
137.8 MB
village flac/DEF CON 25 Voting Village - Matt Blaze - How did we get here- A history of voting technology and hanging chads and and the Help America Vote Act.flac
111.0 MB
village flac/DEF CON 25 Voting Village -Joseph Hall and David Jefferson - Common Misconceptions and False Parallels about Voting Technology.flac
128.3 MB
village flac/DEF CON 25 Wifi Village - Aardvark and Darkmatter - WIGLE Like You Mean It- Maximizing Your Wardriving Experience.flac
118.0 MB
village flac/DEF CON 25 Wifi Village - Alexander Zakarov - Large Scale Wireless Monitoring - KISMET Packet Sniffer On A Multi-Radio Array.flac
93.1 MB
village flac/DEF CON 25 Wifi Village - Andrew Strutt - POCSAG Amateur Pager Network.flac
54.1 MB
village flac/DEF CON 25 Wifi Village - Andrew Strutt - Suitcase Repeater Build for UHF - 70cm.flac
56.1 MB
village flac/DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World- Software Defined Radio Exploits.flac
184.0 MB
village flac/DEF CON 25 Wifi Village - Eric Escobar - SecureWorks- SDR Replay Attacks- Against Home Security Systems.flac
51.8 MB
village flac/DEF CON 25 Wifi Village - Matt Blaze - Sandy Clark - Travis Goodspeed - Perry Metzger - Zach Wasserman - Kevin Xu - DYI NSA On The Cheap.flac
115.6 MB
village flac/DEF CON 25 Wifi Village - Nick Delewski - Failsafe- Yet Another SimpliSafe Attack Vector.flac
94.5 MB
village flac/DEF CON 25 Wifi Village - Robert Ghilduta - Designing An Automatic Gain Control.flac
93.5 MB
village flac/DEF CON 25 Wifi Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale -Deceptacon Wi-Fi Deception Under 5 Dollars.flac
64.1 MB
village flac/DEF CON 25 Wifi Village - Woody - Tim Kuester - GODUMPiNG packet sniffing the Gotenaa.flac
137.3 MB
village m4a/DEF CON 25 BioHacking Village - Amanda Plimpton and Evan Anderson - Psychoactive Chemicals in Combat.m4a
39.1 MB
village m4a/DEF CON 25 BioHacking Village - Amirs Panel - Ethics in BioHacking.m4a
74.8 MB
village m4a/DEF CON 25 BioHacking Village - C00p3r - Cur50r - Implantable Technology Show and Tell.m4a
28.8 MB
village m4a/DEF CON 25 BioHacking Village - C00p3r - Dangerous Minds Podcast - Celebrating 100th Episode.m4a
70.4 MB
village m4a/DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing The Secure Deployment Of Medical Devices.m4a
33.1 MB
village m4a/DEF CON 25 BioHacking Village - Dr Stanislav Naydin - Vlad Gostomelsky - Medical Device Ethics and Security.m4a
37.2 MB
village m4a/DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Path Badly.m4a
37.4 MB
village m4a/DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides- Smart Drugs 4-Minute Mile.m4a
35.7 MB
village m4a/DEF CON 25 BioHacking Village - Jay Radcliffe - How to use the Scientific Method in Security Research.m4a
66.6 MB
village m4a/DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Die.m4a
35.1 MB
village m4a/DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt - Blockchain and The Hope for Healthcare.m4a
32.4 MB
village m4a/DEF CON 25 BioHacking Village - Jun Axup - The Brave New Worl of Bio-Entrepreneurship.m4a
28.6 MB
village m4a/DEF CON 25 BioHacking Village - Kevin Sacco - Tales of A Healthcare Hacker.m4a
42.9 MB
village m4a/DEF CON 25 BioHacking Village - Louis Auguste Jr - Microscopes Are Stupid.m4a
27.3 MB
village m4a/DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and Regulation.m4a
35.1 MB
village m4a/DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities.m4a
42.8 MB
village m4a/DEF CON 25 BioHacking Village - RenderMan and Murdoch Monkey - Hacking The Internet of Dongs.m4a
38.6 MB
village m4a/DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO.m4a
25.3 MB
village m4a/DEF CON 25 BioHacking Village - Ryan Schmoll and Peter Hefley - Trigraph- An Ethereum-based Teleradiology Application.m4a
31.9 MB
village m4a/DEF CON 25 BioHacking Village - Szkatulski and Lawless- How Your Doctor Might Be Trying To Kill You-How Personal Genomics Can Save Your Life.m4a
35.9 MB
village m4a/DEF CON 25 BioHacking Village - Tess Scrodinger - Total Recall- Implicit Learning As A Cryptographic Primitive.m4a
34.7 MB
village m4a/DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of Biohacking.m4a
23.9 MB
village m4a/DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic Code Using Information Theory.m4a
24.2 MB
village m4a/DEF CON 25 BioHacking Village - Trevor Goodman - Hack Your Senses - Sensory Augementation and Brain Plasticity.m4a
34.6 MB
village m4a/DEF CON 25 Car Hacking Village - Badge Life - DEFCON Unofficial Badges Panel.m4a
73.1 MB
village m4a/DEF CON 25 Car Hacking Village - Corey Theun - Heavy Truck and Electronic Logging Devices- What Could Go Wrong.m4a
48.4 MB
village m4a/DEF CON 25 Car Hacking Village - Duncan Woodbury and Nocholas Haltmeyer - Linux-Stack Based V2X Framework.m4a
43.4 MB
village m4a/DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - Don -An Introduction to AUTOSAR Secure Onbaord Communication.m4a
62.6 MB
village m4a/DEF CON 25 Car Hacking Village - Justin Montalbano and Bryan Gillispie and David Connett- Attacking Wireless Interfaces in Vehicles.m4a
49.4 MB
village m4a/DEF CON 25 Car Hacking Village - Sameer Dixit - Vlad Gostomelsky - Abusing Smart Cars with QR Codes.m4a
33.6 MB
village m4a/DEF CON 25 Car Hacking Village - Sheila Ayelen Berta and Claudio Caracciolo - The Bicho- An Advanced Car Backdoor Maker.m4a
47.4 MB
village m4a/DEF CON 25 Car Hacking Village - Tim b1tbane and Mitch Johnson ehntoo - That's No Car- Its a Network.m4a
50.3 MB
village m4a/DEF CON 25 Car Hacking Village - Vlad Gostomelsky - GPS System Integrity.m4a
33.6 MB
village m4a/DEF CON 25 Car Hacking Village - Weston Hecker - Grand Theft Radio- Stopping SDR Relay Attacks on PKES.m4a
36.8 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Alisha Kloc - Privacy is Not An Add-On- Designing for Privacy from the Ground Up.m4a
42.9 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Andrew Brandt - SSL Visibility Revisted- A Year In Privacy Improvements For Encrypted Communications.m4a
71.3 MB
village m4a/DEF CON 25 Crypto and Privacy Village - David Huerta - Alice and Bob are Slightly Less Confused.m4a
44.5 MB
village m4a/DEF CON 25 Crypto and Privacy Village - David Wong - SHA-3 vs The World.m4a
76.5 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Evgeny Sidorov - Yet Another Password Hashing Talk.m4a
39.0 MB
village m4a/DEF CON 25 Crypto and Privacy Village - J0n J4rv1s - The Surveillance Capitalism Will Continue Until Morale Improves.m4a
84.9 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Jake Williams -The Symantec SSL Debacle Lessons Learned and Future Steps.m4a
74.6 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Joel Wallenstrom - Robby Mook - Time to Start Wearing Tin-Foil Hats Following the 2016 Electrions.m4a
75.0 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Joseph Birr-Pixton - Rustls - Modern Fast Safer TLS.m4a
42.7 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace.m4a
34.4 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has My Snoopy Boyfriend Privacy Within A Relationship.m4a
61.6 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Lee Brotherston - Blue Team TLS Hugs.m4a
36.2 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Mark Mager - Cryptanalysis in the Time of Ransomware.m4a
59.9 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty Computation.m4a
35.5 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Punky Duero - The Key Management Facility of The Root DNSSEC Key Signing Key.m4a
34.1 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Ryan Lackey - Cypherpunks History.m4a
37.3 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Scott Arciszewski - The How and Why for Secure Automatic Patch Management.m4a
32.7 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Shea Nangle - Operational Security Lessons From The Dark Web.m4a
38.5 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Tomas Susanka - Security Analysis of the Telegram IM.m4a
29.4 MB
village m4a/DEF CON 25 Crypto and Privacy Village - Trey Forgety - Protecting Users' Privacy in a Location-Critical Enterprise- The Challenges of 9-1-1 Location.m4a
71.7 MB
village m4a/DEF CON 25 Hardware Hacking Village - Cesare Pizzi - Ardusploit - Proof of concept for Arduino code injection.m4a
56.6 MB
village m4a/DEF CON 25 Hardware Hacking Village - Gigs Taggart - What is Ground- Baby don't hurt me.m4a
35.1 MB
village m4a/DEF CON 25 Hardware Hacking Village - Joe hwhxr - Hardware Hacking- Old Sk00l and New Sk00l.m4a
55.7 MB
village m4a/DEF CON 25 Hardware Hacking Village - John Dunlap - A tangle of Plastic Spaghetti-A Look Into the Security of 3D Printers.m4a
72.3 MB
village m4a/DEF CON 25 ICS Village - Arnaud Soullié - Fun with Modbus 0x5a - Nothing New. Still Relevant_.m4a
35.2 MB
village m4a/DEF CON 25 ICS Village - Blake Johnson - Dissecting Industrial Wireless Implementations.m4a
43.4 MB
village m4a/DEF CON 25 ICS Village - Bryson Bort and Atlas - Grid Insecurity - and How to Really Fix This Shit.m4a
43.9 MB
village m4a/DEF CON 25 ICS Village - Chris Sistrunk - What's the DFIRence for ICS.m4a
45.0 MB
village m4a/DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices.m4a
50.2 MB
village m4a/DEF CON 25 ICS Village - Thomas Brandsetter - In Security in Building Automation - How to Create Dark Buildings with Light Speed.m4a
45.3 MB
village m4a/DEF CON 25 Internet of Things Village - Aaron Alva - Mark Eichorn - IoT Updates to Help Protect Consumers.m4a
33.6 MB
village m4a/DEF CON 25 Internet of Things Village - Aaron Guzman - Hide Yo Keys- Hide Yo Car.m4a
46.0 MB
village m4a/DEF CON 25 Internet of Things Village - Alex Jay Balan - IoT - The Gift That Keeps on Giving.m4a
58.1 MB
village m4a/DEF CON 25 Internet of Things Village - Andrew Tierney - Ken Munro - IoT- From DVRs to Dildos.m4a
53.5 MB
village m4a/DEF CON 25 Internet of Things Village - Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard.m4a
61.3 MB
village m4a/DEF CON 25 Internet of Things Village - Dan Regalado - Inside the Alaris Infusion Pump and not too much medication por favor.m4a
42.8 MB
village m4a/DEF CON 25 Internet of Things Village - Deral Heiland - The Internet of Vulnerabilities.m4a
59.8 MB
village m4a/DEF CON 25 Internet of Things Village - Rick Ramgattie - IoT Village Keynote - Friends and Not Foes- Rethinking the Researcher-Vendor Relationship.m4a
31.2 MB
village m4a/DEF CON 25 Internet of Things Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale - IIDS- An IoT Intrusion Detection System.m4a
53.3 MB
village m4a/DEF CON 25 Internet of Things Village - Vladimir Dashchenko and Sergey Temnikov - Pwning the Industrial IoT- RCEs and backdoors are around.m4a
30.1 MB
village m4a/DEF CON 25 Lockpick Village - TOOOL STAFF MEMBER Dr. Tran - TOOOL Lockpicking Talk Number 1.m4a
36.3 MB
village m4a/DEF CON 25 Packet Hacking Village - Ankur Tyagi - Visual Network and File Forensics.m4a
36.5 MB
village m4a/DEF CON 25 Packet Hacking Village - Catherine Ullman and Chris Roberts - When the Current Ransomware and Payload of the Day CRAP of the day Hits the Fan.m4a
55.9 MB
village m4a/DEF CON 25 Packet Hacking Village - Chris Wysopal - Opening Ceremony - How Hackers Changed The Security Industry.m4a
64.4 MB
village m4a/DEF CON 25 Packet Hacking Village - Damon Small - Layer 8 and Why People are the Most Important Security Tool.m4a
54.6 MB
village m4a/DEF CON 25 Packet Hacking Village - Daniel Adinolfi - Anthony Singleton - CVE IDs and How to Get Them.m4a
58.3 MB
village m4a/DEF CON 25 Packet Hacking Village - Eric Capuano - Fortune 100 InfoSec on a State Government Budget.m4a
67.3 MB
village m4a/DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop Scenarios By Building An Incident Response Simulation Platform.m4a
81.1 MB
village m4a/DEF CON 25 Packet Hacking Village - Gabriel Ryan - The Black Art of Wireless Post-Exploitation.m4a
73.6 MB
village m4a/DEF CON 25 Packet Hacking Village - Gilberto Bertin - Past and Present and Future of High Speed Packet Filtering on Linux.m4a
27.8 MB
village m4a/DEF CON 25 Packet Hacking Village - Gita Ziabari - Yalda and Automated Bulk Intelligence.m4a
34.9 MB
village m4a/DEF CON 25 Packet Hacking Village - Leah Figueroa - Iron Sights for Your Data.m4a
27.7 MB
village m4a/DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing- What Is It and How It Allows Largest Attacks and How to Fix It.m4a
69.0 MB
village m4a/DEF CON 25 Packet Hacking Village - Megan Roddy- Strenthen Your Secops Team By Leveraging Neurodiversity.m4a
22.5 MB
village m4a/DEF CON 25 Packet Hacking Village - Michael Gianarakis and Keith Lee - Portia - Finding Your Way to Domain Access.m4a
42.2 MB
village m4a/DEF CON 25 Packet Hacking Village - Mike Raggo - Chet Hosmer - Covert TCP with a Twist.m4a
76.8 MB
village m4a/DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Change of Persistence- AWS Post Compromise Primer.m4a
45.5 MB
village m4a/DEF CON 25 Packet Hacking Village - Rodolfo Assis - XSS For the win.m4a
19.8 MB
village m4a/DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach and WTF Really Happened.m4a
72.8 MB
village m4a/DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain Name.m4a
31.7 MB
village m4a/DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot- Mum and Tons of WannaCry and Evils Attacked Our Home.m4a
54.2 MB
village m4a/DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound- Deceiving Doman Admin Hunters.m4a
46.2 MB
village m4a/DEF CON 25 Packet Hacking Village - Vivek Ramachandran and Thomas d'Otreppe - Make Your Own 80211 ac Monitoring Hacker Gadget.m4a
82.9 MB
village m4a/DEF CON 25 Recon Village - Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story.m4a
41.1 MB
village m4a/DEF CON 25 Recon Village - Andrew Hay - An Introduction to Graph Theory for OSINT.m4a
50.6 MB
village m4a/DEF CON 25 Recon Village - Anthony Russell - Building Google For Criminal Enterprises.m4a
58.5 MB
village m4a/DEF CON 25 Recon Village - Dakota Nelson - Total Recoll.m4a
17.0 MB
village m4a/DEF CON 25 Recon Village - Guillermo Buendia - Yael Basurto Esquivel - How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches.m4a
27.3 MB
village m4a/DEF CON 25 Recon Village - Inbar Raz - Do Tinder Bots Dream of Electric Toys- How Tinder Bots are Breaking Hearts All Over The World.m4a
42.2 MB
village m4a/DEF CON 25 Recon Village - Jason Haddix - Domain Discovery - Expanding Your Scope Like A Boss.m4a
59.1 MB
village m4a/DEF CON 25 Recon Village - Jonathan Cran - Attack Surface Discovery With Intrigue.m4a
41.1 MB
village m4a/DEF CON 25 Recon Village - Kunal Aggarwal - DataSploit Open Source Assistant for OSINT.m4a
26.3 MB
village m4a/DEF CON 25 Recon Village - Leah Figueroa - FERPA- Only Your Grades Are Safe; OSINT In Higher Education.m4a
49.4 MB
village m4a/DEF CON 25 Recon Village - Mikhail Sasonkin - Up Close and Personal - Keeping an Eye On Mobile Applications.m4a
23.3 MB
village m4a/DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and Profit- How To Hide From The FBI.m4a
60.0 MB
village m4a/DEF CON 25 Recon Village - Shane MacDougal - Keynote - Seeing is Believing - The Future of Recon- You Won't Believe What Happens Next.m4a
61.4 MB
village m4a/DEF CON 25 Recon Village - Simon Roses - OSINT Tactics on Source Code and Developers.m4a
58.8 MB
village m4a/DEF CON 25 Recon Village - TBD - Winner Announcement Prize Distribution.m4a
24.2 MB
village m4a/DEF CON 25 Recon Village - Tracy Z. Maleeff - Into the Bird's Nest- A Comprehensive Look at Twitter as a Research Tool.m4a
52.3 MB
village m4a/DEF CON 25 Recon Village - Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon - Collecting Evidence Like a Robot.m4a
26.9 MB
village m4a/DEF CON 25 Rootz Asylum - Alex Stamos- CSO- Facebook.m4a
20.6 MB
village m4a/DEF CON 25 Rootz Asylum - Aron Rosenberg - Aaron Standridge - Hacking an Insecure WiFi Camera.m4a
14.2 MB
village m4a/DEF CON 25 Rootz Asylum - Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer.m4a
8.8 MB
village m4a/DEF CON 25 Rootz Asylum - Cory Doctorow - You are not a Digital Native and that's OK.m4a
24.7 MB
village m4a/DEF CON 25 Rootz Asylum - Crash and Nerfherder - A Brief Message From Security.m4a
9.1 MB
village m4a/DEF CON 25 Rootz Asylum - David Weinman - Introduction To Cheat Engine.m4a
28.8 MB
village m4a/DEF CON 25 Rootz Asylum - Deviant - Home Depot and A Plan of Attack for Hackers.m4a
20.1 MB
village m4a/DEF CON 25 Rootz Asylum - EFF - Nic0 - Opening Ceremonies- A Place Where Kids Learn White-Hat Hacking to Better The World.m4a
11.5 MB
village m4a/DEF CON 25 Rootz Asylum - Erin Owens - Hacking & Robotics v2 point 0.m4a
16.8 MB
village m4a/DEF CON 25 Rootz Asylum - Erin Owens - Sujeet Bambale and Justin Whitehead - Chris Kiggins - Abby - Duncan - Drone Wars.m4a
30.9 MB
village m4a/DEF CON 25 Rootz Asylum - Leonard Bailey - Everything You Need To Know About The U.S. Department of Justice.m4a
21.0 MB
village m4a/DEF CON 25 Rootz Asylum - Patrick McCanna - Tips for Internet Privacy at College.m4a
18.7 MB
village m4a/DEF CON 25 Rootz Asylum - Rsnake and Robert Hansen - Searching The Invisible Internet.m4a
9.9 MB
village m4a/DEF CON 25 Rootz Asylum - Tarah - Mansion Apartment Shack House- How To Explain Crypto To Practically Anyone.m4a
14.3 MB
village m4a/DEF CON 25 Social Engineering Village - Billy Boatright - Nor Lose The Common Touch.m4a
44.9 MB
village m4a/DEF CON 25 Social Engineering Village - Brent White - Tim Roberts - Skills For A Red-Teamer.m4a
69.9 MB
village m4a/DEF CON 25 Social Engineering Village - Chris Hadnagy - SE vs Predator- Using Social Engineering In Ways I Never Thought.m4a
74.4 MB
village m4a/DEF CON 25 Social Engineering Village - Fahey Owens - Beyond Phishing - Building and Sustaining a Corporate SE Program.m4a
43.7 MB
village m4a/DEF CON 25 Social Engineering Village - Helen Thackray - Hackers Gonna Hack - But Do They Know Why.m4a
73.2 MB
village m4a/DEF CON 25 Social Engineering Village - Jayson Street - Strategies on Securing Your Banks and Enterprises-From Someone Who Robs Banks and Enterprises.m4a
77.4 MB
village m4a/DEF CON 25 Social Engineering Village - John Nye - The Human Factor- Why Are We So Bad at Security and Risk Assessment.m4a
67.4 MB
village m4a/DEF CON 25 Social Engineering Village - Keith Conway and Cameron Craig - Change Agents- How to Effectively Influence Intractable Corporate Cultures.m4a
65.1 MB
village m4a/DEF CON 25 Social Engineering Village - Michele Fincher - Are You Killing Your Security Program Mostly Dead is Slightly Alive.m4a
42.1 MB
village m4a/DEF CON 25 Social Engineering Village - Robert Wood - Thematic Social Engineering- Making SE Work at Scale.m4a
57.7 MB
village m4a/DEF CON 25 Social Engineering Village - Tyler Rosonke - Social Engineering With Web Analytics.m4a
47.0 MB
village m4a/DEF CON 25 Social Engineering Village - Yaiza Rubio and Félix Brezo - Heavy Diving For Credentials- Towards An Anonymous Phishing.m4a
40.4 MB
village m4a/DEF CON 25 Voting Village - Panel - Jake Braun - Securing the Election Office- A Local Response to a Global Threat.m4a
42.6 MB
village m4a/DEF CON 25 Voting Village - Barbara Simons and David Jefferson - An Election System is Much More Than the Voting Machine or The Booth.m4a
65.5 MB
village m4a/DEF CON 25 Voting Village - General Douglas Lute - What are the national security implications of cyber attacks on our voting systems.m4a
51.5 MB
village m4a/DEF CON 25 Voting Village - Harri Hursti - Brief history of election machine hacking and lessons learned.m4a
62.1 MB
village m4a/DEF CON 25 Voting Village - Joseph Hall - Election Hacking- Legal Considerations from the Civil Side.m4a
64.6 MB
village m4a/DEF CON 25 Voting Village - Mary Brady and Josh Franklin - The State of US Voting System Security.m4a
71.3 MB
village m4a/DEF CON 25 Voting Village - Matt Blaze - How did we get here- A history of voting technology and hanging chads and and the Help America Vote Act.m4a
68.7 MB
village m4a/DEF CON 25 Voting Village -Joseph Hall and David Jefferson - Common Misconceptions and False Parallels about Voting Technology.m4a
66.1 MB
village m4a/DEF CON 25 Wifi Village - Aardvark - Darkmatter - WIGLE Like You Mean It- Maximizing Your Wardriving Experience.m4a
65.4 MB
village m4a/DEF CON 25 Wifi Village - Alexander Zakarov - Large Scale Wireless Monitoring - KISMET Packet Sniffer On A Multi-Radio Array.m4a
52.7 MB
village m4a/DEF CON 25 Wifi Village - Andrew Strutt - POCSAG Amateur Pager Network.m4a
36.8 MB
village m4a/DEF CON 25 Wifi Village - Andrew Strutt - Suitcase Repeater Build for UHF - 70cm.m4a
39.6 MB
village m4a/DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World- Software Defined Radio Exploits.m4a
131.9 MB
village m4a/DEF CON 25 Wifi Village - Eric Escobar - SecureWorks- SDR Replay Attacks- Against Home Security Systems.m4a
28.4 MB
village m4a/DEF CON 25 Wifi Village - Matt Blaze - Sandy Clark - Travis Goodspeed - Perry Metzger - Zach Wasserman - Kevin Xu - DYI NSA On The Cheap.m4a
81.1 MB
village m4a/DEF CON 25 Wifi Village - Nick Delewski - Failsafe- Yet Another SimpliSafe Attack Vector.m4a
65.9 MB
village m4a/DEF CON 25 Wifi Village - Robert Ghilduta - Designing An Automatic Gain Control.m4a
64.2 MB
village m4a/DEF CON 25 Wifi Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale -Deceptacon Wi-Fi Deception Under 5 Dollars.m4a
43.9 MB
village m4a/DEF CON 25 Wifi Village - Woody and Tim Kuester - GODUMPiNG packet sniffing the Gotenaa.m4a
77.9 MB
village opus/DEF CON 25 BioHacking Village - Amanda Plimpton and Evan Anderson - Psychoactive Chemicals in Combat.opus
20.9 MB
village opus/DEF CON 25 BioHacking Village - Amirs Panel - Ethics in BioHacking.opus
40.1 MB
village opus/DEF CON 25 BioHacking Village - C00p3r - Dangerous Minds Podcast - Celebrating 100th Episode.opus
39.9 MB
village opus/DEF CON 25 BioHacking Village - C00p3r and Cur50r - Implantable Technology Show and Tell.opus
16.2 MB
village opus/DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing The Secure Deployment Of Medical Devices.opus
18.0 MB
village opus/DEF CON 25 BioHacking Village - Dr Stanislav Naydin and Vlad Gostomelsky - Medical Device Ethics and Security.opus
21.1 MB
village opus/DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Path Badly.opus
21.5 MB
village opus/DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides - Smart Drugs 4-Minute Mile.opus
19.5 MB
village opus/DEF CON 25 BioHacking Village - Jay Radcliffe - How to use the Scientific Method in Security Research.opus
37.8 MB
village opus/DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Die.opus
19.0 MB
village opus/DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt - Blockchain and The Hope for Healthcare.opus
18.3 MB
village opus/DEF CON 25 BioHacking Village - Jun Axup - The Brave New Worl of Bio-Entrepreneurship.opus
16.7 MB
village opus/DEF CON 25 BioHacking Village - Kevin Sacco - Tales of A Healthcare Hacker.opus
22.2 MB
village opus/DEF CON 25 BioHacking Village - Louis Auguste Jr - Microscopes Are Stupid.opus
15.7 MB
village opus/DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and Regulation.opus
18.8 MB
village opus/DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities.opus
24.0 MB
village opus/DEF CON 25 BioHacking Village - RenderMan and Murdoch Monkey - Hacking The Internet of Dongs.opus
22.0 MB
village opus/DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO.opus
15.2 MB
village opus/DEF CON 25 BioHacking Village - Ryan Schmoll and Peter Hefley - Trigraph- An Ethereum-based Teleradiology Application.opus
18.1 MB
village opus/DEF CON 25 BioHacking Village - Tess Scrodinger - Total Recall- Implicit Learning As A Cryptographic Primitive.opus
18.4 MB
village opus/DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of Biohacking.opus
13.9 MB
village opus/DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic Code Using Information Theory.opus
13.7 MB
village opus/DEF CON 25 BioHacking Village - Trevor Goodman - Hack Your Senses - Sensory Augementation and Brain Plasticity.opus
19.9 MB
village opus/DEF CON 25 BioHacking Village -Szkatulski and Lawless- How Your Doctor Might Be Trying To Kill You-How Personal Genomics Can Save Your Life.opus
21.0 MB
village opus/DEF CON 25 Car Hacking Village - Badge Life - DEFCON Unofficial Badges Panel.opus
41.3 MB
village opus/DEF CON 25 Car Hacking Village - Corey Theun - Heavy Truck and Electronic Logging Devices- What Could Go Wrong.opus
25.9 MB
village opus/DEF CON 25 Car Hacking Village - Duncan Woodbury - Nocholas Haltmeyer - Linux-Stack Based V2X Framework.opus
23.7 MB
village opus/DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - Don -An Introduction to AUTOSAR Secure Onbaord Communication.opus
35.4 MB
village opus/DEF CON 25 Car Hacking Village - Justin Montalbano - Bryan Gillispie - David Connett- Attacking Wireless Interfaces in Vehicles.opus
27.8 MB
village opus/DEF CON 25 Car Hacking Village - Sameer Dixit - Vlad Gostomelsky - Abusing Smart Cars with QR Codes.opus
19.2 MB
village opus/DEF CON 25 Car Hacking Village - Sheila Ayelen Berta - Claudio Caracciolo - The Bicho- An Advanced Car Backdoor Maker.opus
25.0 MB
village opus/DEF CON 25 Car Hacking Village - Tim b1tbane - Mitch Johnson ehntoo - That's No Car- Its a Network.opus
27.0 MB
village opus/DEF CON 25 Car Hacking Village - Vlad Gostomelsky - GPS System Integrity.opus
19.0 MB
village opus/DEF CON 25 Car Hacking Village - Weston Hecker - Grand Theft Radio- Stopping SDR Relay Attacks on PKES.opus
21.9 MB
village opus/DEF CON 25 Crypto and Privacy Village - Alisha Kloc - Privacy is Not An Add-On- Designing for Privacy from the Ground Up.opus
23.6 MB
village opus/DEF CON 25 Crypto and Privacy Village - Andrew Brandt - SSL Visibility Revisted- A Year In Privacy Improvements For Encrypted Communications.opus
42.1 MB
village opus/DEF CON 25 Crypto and Privacy Village - David Huerta - Alice and Bob are Slightly Less Confused.opus
25.5 MB
village opus/DEF CON 25 Crypto and Privacy Village - David Wong - SHA-3 vs The World.opus
44.7 MB
village opus/DEF CON 25 Crypto and Privacy Village - Evgeny Sidorov - Yet Another Password Hashing Talk.opus
19.4 MB
village opus/DEF CON 25 Crypto and Privacy Village - J0n J4rv1s - The Surveillance Capitalism Will Continue Until Morale Improves.opus
47.1 MB
village opus/DEF CON 25 Crypto and Privacy Village - Jake Williams -The Symantec SSL Debacle Lessons Learned and Future Steps.opus
40.2 MB
village opus/DEF CON 25 Crypto and Privacy Village - Joel Wallenstrom - Robby Mook - Time to Start Wearing Tin-Foil Hats Following the 2016 Electrions.opus
42.8 MB
village opus/DEF CON 25 Crypto and Privacy Village - Joseph Birr-Pixton - Rustls - Modern Fast Safer TLS.opus
22.9 MB
village opus/DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace.opus
18.8 MB
village opus/DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has My Snoopy Boyfriend Privacy Within A Relationship.opus
33.7 MB
village opus/DEF CON 25 Crypto and Privacy Village - Lee Brotherston - Blue Team TLS Hugs.opus
20.6 MB
village opus/DEF CON 25 Crypto and Privacy Village - Mark Mager - Cryptanalysis in the Time of Ransomware.opus
33.0 MB
village opus/DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty Computation.opus
19.6 MB
village opus/DEF CON 25 Crypto and Privacy Village - Punky Duero - The Key Management Facility of The Root DNSSEC Key Signing Key.opus
18.9 MB
village opus/DEF CON 25 Crypto and Privacy Village - Ryan Lackey - Cypherpunks History.opus
20.5 MB
village opus/DEF CON 25 Crypto and Privacy Village - Scott Arciszewski - The How and Why for Secure Automatic Patch Management.opus
18.0 MB
village opus/DEF CON 25 Crypto and Privacy Village - Shea Nangle - Operational Security Lessons From The Dark Web.opus
21.1 MB
village opus/DEF CON 25 Crypto and Privacy Village - Tomas Susanka - Security Analysis of the Telegram IM.opus
16.4 MB
village opus/DEF CON 25 Crypto and Privacy Village - Trey Forgety - Protecting Users' Privacy in a Location-Critical Enterprise- The Challenges of 9-1-1 Location.opus
40.7 MB
village opus/DEF CON 25 Hardware Hacking Village - Cesare Pizzi - Ardusploit - Proof of concept for Arduino code injection.opus
32.7 MB
village opus/DEF CON 25 Hardware Hacking Village - Gigs Taggart - What is Ground- Baby don't hurt me.opus
20.4 MB
village opus/DEF CON 25 Hardware Hacking Village - Joe hwhxr - Hardware Hacking- Old Sk00l and New Sk00l.opus
32.2 MB
village opus/DEF CON 25 Hardware Hacking Village - John Dunlap - A tangle of Plastic Spaghetti-A Look Into the Security of 3D Printers.opus
41.1 MB
village opus/DEF CON 25 ICS Village - Arnaud Soullié - Fun with Modbus 0x5a - Nothing New. Still Relevant_.opus
20.1 MB
village opus/DEF CON 25 ICS Village - Blake Johnson - Dissecting Industrial Wireless Implementations.opus
23.9 MB
village opus/DEF CON 25 ICS Village - Bryson Bort - Atlas - Grid Insecurity - and How to Really Fix This Shit.opus
24.8 MB
village opus/DEF CON 25 ICS Village - Chris Sistrunk - What's the DFIRence for ICS.opus
25.9 MB
village opus/DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices.opus
27.3 MB
village opus/DEF CON 25 ICS Village - Thomas Brandsetter - In Security in Building Automation - How to Create Dark Buildings with Light Speed.opus
25.7 MB
village opus/DEF CON 25 Internet of Things Village - Aaron Alva - Mark Eichorn - IoT Updates to Help Protect Consumers.opus
22.4 MB
village opus/DEF CON 25 Internet of Things Village - Aaron Guzman - Hide Yo Keys- Hide Yo Car.opus
26.6 MB
village opus/DEF CON 25 Internet of Things Village - Alex Jay Balan - IoT - The Gift That Keeps on Giving.opus
32.9 MB
village opus/DEF CON 25 Internet of Things Village - Andrew Tierney - Ken Munro - IoT- From DVRs to Dildos.opus
29.7 MB
village opus/DEF CON 25 Internet of Things Village - Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard.opus
35.0 MB
village opus/DEF CON 25 Internet of Things Village - Dan Regalado - Inside the Alaris Infusion Pump and not too much medication por favor.opus
23.6 MB
village opus/DEF CON 25 Internet of Things Village - Deral Heiland - The Internet of Vulnerabilities.opus
37.5 MB
village opus/DEF CON 25 Internet of Things Village - Rick Ramgattie - IoT Village Keynote - Friends and Not Foes- Rethinking the Researcher-Vendor Relationship.opus
18.2 MB
village opus/DEF CON 25 Internet of Things Village - Vivek Ramachandran and Nishant Sharma - Ashish Bhangale - IIDS- An IoT Intrusion Detection System.opus
32.8 MB
village opus/DEF CON 25 Internet of Things Village - Vladimir Dashchenko and Sergey Temnikov - Pwning the Industrial IoT- RCEs and backdoors are around.opus
17.5 MB
village opus/DEF CON 25 Lockpick Village - TOOOL STAFF MEMBER and Dr. Tran - TOOOL Lockpicking Talk Number 1.opus
20.9 MB
village opus/DEF CON 25 Packet Hacking Village - Ankur Tyagi - Visual Network and File Forensics.opus
21.0 MB
village opus/DEF CON 25 Packet Hacking Village - Catherine Ullman and Chris Roberts - When the Current Ransomware and Payload of the Day CRAP of the day Hits the Fan.opus
33.1 MB
village opus/DEF CON 25 Packet Hacking Village - Chris Wysopal - Opening Ceremony - How Hackers Changed The Security Industry.opus
36.0 MB
village opus/DEF CON 25 Packet Hacking Village - Damon Small - Layer 8 and Why People are the Most Important Security Tool.opus
30.5 MB
village opus/DEF CON 25 Packet Hacking Village - Daniel Adinolfi - Anthony Singleton - CVE IDs and How to Get Them.opus
33.7 MB
village opus/DEF CON 25 Packet Hacking Village - Eric Capuano - Fortune 100 InfoSec on a State Government Budget.opus
39.0 MB
village opus/DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop Scenarios By Building An Incident Response Simulation Platform.opus
44.3 MB
village opus/DEF CON 25 Packet Hacking Village - Gabriel Ryan - The Black Art of Wireless Post-Exploitation.opus
38.1 MB
village opus/DEF CON 25 Packet Hacking Village - Gilberto Bertin - Past and Present and Future of High Speed Packet Filtering on Linux.opus
15.8 MB
village opus/DEF CON 25 Packet Hacking Village - Gita Ziabari - Yalda and Automated Bulk Intelligence.opus
23.0 MB
village opus/DEF CON 25 Packet Hacking Village - Leah Figueroa - Iron Sights for Your Data.opus
17.6 MB
village opus/DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing- What Is It and How It Allows Largest Attacks and How to Fix It.opus
39.0 MB
village opus/DEF CON 25 Packet Hacking Village - Megan Roddy- Strenthen Your Secops Team By Leveraging Neurodiversity.opus
15.1 MB
village opus/DEF CON 25 Packet Hacking Village - Michael Gianarakis and Keith Lee and Portia - Finding Your Way to Domain Access.opus
24.7 MB
village opus/DEF CON 25 Packet Hacking Village - Mike Raggo - Chet Hosmer - Covert TCP with a Twist.opus
40.5 MB
village opus/DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Change of Persistence- AWS Post Compromise Primer.opus
25.5 MB
village opus/DEF CON 25 Packet Hacking Village - Rodolfo Assis - XSS For the win.opus
11.9 MB
village opus/DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach and WTF Really Happened.opus
39.5 MB
village opus/DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain Name.opus
18.4 MB
village opus/DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot- Mum and Tons of WannaCry and Evils Attacked Our Home.opus
30.5 MB
village opus/DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound- Deceiving Doman Admin Hunters.opus
25.1 MB
village opus/DEF CON 25 Packet Hacking Village - Vivek Ramachandran - Thomas d'Otreppe - Make Your Own 80211 ac Monitoring Hacker Gadget.opus
46.4 MB
village opus/DEF CON 25 Recon Village - Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story.opus
23.1 MB
village opus/DEF CON 25 Recon Village - Andrew Hay - An Introduction to Graph Theory for OSINT.opus
26.4 MB
village opus/DEF CON 25 Recon Village - Anthony Russell - Building Google For Criminal Enterprises.opus
36.1 MB
village opus/DEF CON 25 Recon Village - Dakota Nelson - Total Recoll.opus
9.5 MB
village opus/DEF CON 25 Recon Village - Guillermo Buendia and Yael Basurto Esquivel - How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches.opus
16.2 MB
village opus/DEF CON 25 Recon Village - Inbar Raz - Do Tinder Bots Dream of Electric Toys- How Tinder Bots are Breaking Hearts All Over The World.opus
23.2 MB
village opus/DEF CON 25 Recon Village - Jason Haddix - Domain Discovery - Expanding Your Scope Like A Boss.opus
32.6 MB
village opus/DEF CON 25 Recon Village - Jonathan Cran - Attack Surface Discovery With Intrigue.opus
26.0 MB
village opus/DEF CON 25 Recon Village - Kunal Aggarwal - DataSploit Open Source Assistant for OSINT.opus
14.8 MB
village opus/DEF CON 25 Recon Village - Leah Figueroa - FERPA- Only Your Grades Are Safe; OSINT In Higher Education.opus
29.7 MB
village opus/DEF CON 25 Recon Village - Mikhail Sasonkin - Up Close and Personal - Keeping an Eye On Mobile Applications.opus
11.9 MB
village opus/DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and Profit- How To Hide From The FBI.opus
33.3 MB
village opus/DEF CON 25 Recon Village - Shane MacDougal - Keynote - Seeing is Believing - The Future of Recon- You Won't Believe What Happens Next.opus
32.3 MB
village opus/DEF CON 25 Recon Village - Simon Roses - OSINT Tactics on Source Code and Developers.opus
36.5 MB
village opus/DEF CON 25 Recon Village - TBD - Winner Announcement Prize Distribution.opus
13.4 MB
village opus/DEF CON 25 Recon Village - Tracy Z. Maleeff - Into the Bird's Nest- A Comprehensive Look at Twitter as a Research Tool.opus
27.7 MB
village opus/DEF CON 25 Recon Village - Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon - Collecting Evidence Like a Robot.opus
15.4 MB
village opus/DEF CON 25 Rootz Asylum - Alex Stamos- CSO- Facebook.opus
11.8 MB
village opus/DEF CON 25 Rootz Asylum - Aron Rosenberg - Aaron Standridge - Hacking an Insecure WiFi Camera.opus
10.7 MB
village opus/DEF CON 25 Rootz Asylum - Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer.opus
6.5 MB
village opus/DEF CON 25 Rootz Asylum - Cory Doctorow - You are not a Digital Native and that's OK.opus
18.7 MB
village opus/DEF CON 25 Rootz Asylum - Crash - Nerfherder - A Brief Message From Security.opus
5.9 MB
village opus/DEF CON 25 Rootz Asylum - David Weinman - Introduction To Cheat Engine.opus
17.0 MB
village opus/DEF CON 25 Rootz Asylum - Deviant - Home Depot and A Plan of Attack for Hackers.opus
11.4 MB
village opus/DEF CON 25 Rootz Asylum - EFF - Nic0 - Opening Ceremonies- A Place Where Kids Learn White-Hat Hacking to Better The World.opus
8.6 MB
village opus/DEF CON 25 Rootz Asylum - Erin Owens - Hacking & Robotics v2 point 0.opus
11.6 MB
village opus/DEF CON 25 Rootz Asylum - Erin Owens - Sujeet Bambale - Justin Whitehead - Chris Kiggins - Abby - Duncan - Drone Wars.opus
18.0 MB
village opus/DEF CON 25 Rootz Asylum - Leonard Bailey - Everything You Need To Know About The U.S. Department of Justice.opus
12.6 MB
village opus/DEF CON 25 Rootz Asylum - Patrick McCanna - Tips for Internet Privacy at College.opus
13.7 MB
village opus/DEF CON 25 Rootz Asylum - Rsnake - Robert Hansen - Searching The Invisible Internet.opus
7.1 MB
village opus/DEF CON 25 Rootz Asylum - Tarah - Mansion Apartment Shack House- How To Explain Crypto To Practically Anyone.opus
9.2 MB
village opus/DEF CON 25 Social Engineering Village - Billy Boatright - Nor Lose The Common Touch.opus
23.1 MB
village opus/DEF CON 25 Social Engineering Village - Brent White - Tim Roberts - Skills For A Red-Teamer.opus
38.7 MB
village opus/DEF CON 25 Social Engineering Village - Chris Hadnagy - SE vs Predator- Using Social Engineering In Ways I Never Thought.opus
40.3 MB
village opus/DEF CON 25 Social Engineering Village - Fahey Owens - Beyond Phishing - Building and Sustaining a Corporate SE Program.opus
23.8 MB
village opus/DEF CON 25 Social Engineering Village - Helen Thackray - Hackers Gonna Hack - But Do They Know Why.opus
40.2 MB
village opus/DEF CON 25 Social Engineering Village - Jayson Street - Strategies on Securing Your Banks and Enterprises-From Someone Who Robs Banks and Enterprises.opus
42.7 MB
village opus/DEF CON 25 Social Engineering Village - John Nye - The Human Factor- Why Are We So Bad at Security and Risk Assessment.opus
36.7 MB
village opus/DEF CON 25 Social Engineering Village - Keith Conway - Cameron Craig - Change Agents- How to Effectively Influence Intractable Corporate Cultures.opus
36.2 MB
village opus/DEF CON 25 Social Engineering Village - Michele Fincher - Are You Killing Your Security Program Mostly Dead is Slightly Alive.opus
24.9 MB
village opus/DEF CON 25 Social Engineering Village - Robert Wood - Thematic Social Engineering- Making SE Work at Scale.opus
30.3 MB
village opus/DEF CON 25 Social Engineering Village - Tyler Rosonke - Social Engineering With Web Analytics.opus
25.8 MB
village opus/DEF CON 25 Social Engineering Village - Yaiza Rubio - Félix Brezo - Heavy Diving For Credentials- Towards An Anonymous Phishing.opus
25.0 MB
village opus/DEF CON 25 Voting Village - Panel - Jake Braun - Securing the Election Office- A Local Response to a Global Threat.opus
24.0 MB
village opus/DEF CON 25 Voting Village - Barbara Simons - David Jefferson - An Election System is Much More Than the Voting Machine or The Booth.opus
39.1 MB
village opus/DEF CON 25 Voting Village - General Douglas Lute - What are the national security implications of cyber attacks on our voting systems.opus
32.6 MB
village opus/DEF CON 25 Voting Village - Harri Hursti - Brief history of election machine hacking and lessons learned.opus
33.6 MB
village opus/DEF CON 25 Voting Village - Joseph Hall - Election Hacking- Legal Considerations from the Civil Side.opus
38.4 MB
village opus/DEF CON 25 Voting Village - Mary Brady and Josh Franklin - The State of US Voting System Security.opus
38.8 MB
village opus/DEF CON 25 Voting Village - Matt Blaze - How did we get here- A history of voting technology and hanging chads and and the Help America Vote Act.opus
40.6 MB
village opus/DEF CON 25 Voting Village -Joseph Hall and David Jefferson - Common Misconceptions and False Parallels about Voting Technology.opus
36.8 MB
village opus/DEF CON 25 Wifi Village - Aardvark and Darkmatter - WIGLE Like You Mean It- Maximizing Your Wardriving Experience.opus
39.0 MB
village opus/DEF CON 25 Wifi Village - Alexander Zakarov - Large Scale Wireless Monitoring - KISMET Packet Sniffer On A Multi-Radio Array.opus
29.4 MB
village opus/DEF CON 25 Wifi Village - Andrew Strutt - POCSAG Amateur Pager Network.opus
23.2 MB
village opus/DEF CON 25 Wifi Village - Andrew Strutt - Suitcase Repeater Build for UHF - 70cm.opus
24.8 MB
village opus/DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World- Software Defined Radio Exploits.opus
76.3 MB
village opus/DEF CON 25 Wifi Village - Eric Escobar - SecureWorks- SDR Replay Attacks- Against Home Security Systems.opus
16.7 MB
village opus/DEF CON 25 Wifi Village - Matt Blaze - Sandy Clark - Travis Goodspeed - Perry Metzger - Zach Wasserman - Kevin Xu - DYI NSA On The Cheap.opus
47.9 MB
village opus/DEF CON 25 Wifi Village - Nick Delewski - Failsafe- Yet Another SimpliSafe Attack Vector.opus
40.2 MB
village opus/DEF CON 25 Wifi Village - Robert Ghilduta - Designing An Automatic Gain Control.opus
39.9 MB
village opus/DEF CON 25 Wifi Village - Vivek Ramachandran and Nishant Sharma and Ashish Bhangale -Deceptacon Wi-Fi Deception Under 5 Dollars.opus
28.1 MB
village opus/DEF CON 25 Wifi Village - Woody - Tim Kuester - GODUMPiNG packet sniffing the Gotenaa.opus
45.5 MB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!