搜索
DEF CON 26 video and slides
磁力链接/BT种子名称
DEF CON 26 video and slides
磁力链接/BT种子简介
种子哈希:
eeb73e7f4473d8558dbecf7257e6cbdc5f495311
文件大小:
7.67G
已经下载:
2050
次
下载速度:
极快
收录时间:
2018-11-27
最近下载:
2025-09-18
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:EEB73E7F4473D8558DBECF7257E6CBDC5F495311
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
暗网Xvideo
TikTok成人版
PornHub
听泉鉴鲍
少女日记
草榴社区
哆哔涩漫
呦乐园
萝莉岛
悠悠禁区
拔萝卜
疯马秀
最近搜索
扭着
新剧情片
绿 奴
eve依然
穿着
jess west
三力
私密
兼职外围
极品奶子
出高一
小花
狠
露脸内射
るか
全年
温柔
哼哼
国一
甜妹子
泡良
もなもな
抱着
天眼
blackedraw.25.09.19
清纯萝莉
一姐
发发发
コミケ
抖音舞
文件列表
DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.mp4
33.0 MB
DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.srt
29.2 kB
DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.mp4
42.7 MB
DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.srt
23.3 kB
DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.mp4
84.2 MB
DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.srt
70.5 kB
DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.mp4
52.5 MB
DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.srt
34.1 kB
DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.mp4
25.9 MB
DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.srt
20.9 kB
DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.mp4
30.1 MB
DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.srt
21.2 kB
DEF CON 26 Conference - Balmas and Itkin - What the Fax.srt
51.2 kB
DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.mp4
68.6 MB
DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.srt
32.3 kB
DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.mp4
42.4 MB
DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.srt
40.6 kB
DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.mp4
64.3 MB
DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.srt
36.0 kB
DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.mp4
118.3 MB
DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.srt
67.2 kB
DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.mp4
55.5 MB
DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.srt
31.5 kB
DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.mp4
109.0 MB
DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.srt
41.1 kB
DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.mp4
58.2 MB
DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.srt
36.9 kB
DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.mp4
155.8 MB
DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.srt
65.2 kB
DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.mp4
58.7 MB
DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.srt
26.4 kB
DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.mp4
103.9 MB
DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.srt
39.8 kB
DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.mp4
52.0 MB
DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.srt
57.8 kB
DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.mp4
132.7 MB
DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.srt
67.6 kB
DEF CON 26 Conference - Dr Cindy Poppins AKA Svea Eckert and Panel - Inside the Fake Science Factory.srt
88.5 kB
DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.mp4
84.5 MB
DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.srt
45.1 kB
DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.mp4
71.3 MB
DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.srt
48.1 kB
DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.mp4
73.0 MB
DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.srt
57.5 kB
DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.mp4
62.3 MB
DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.srt
44.7 kB
DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.mp4
261.3 MB
DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.srt
96.1 kB
DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.mp4
62.8 MB
DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.srt
21.4 kB
DEF CON 26 Conference - Eyal Itkin, Yaniv Balmas - What the Fax-!.mp4
70.5 MB
DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.mp4
46.9 MB
DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.srt
31.4 kB
DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.mp4
112.4 MB
DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.srt
52.6 kB
DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.mp4
117.6 MB
DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.srt
65.1 kB
DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4
95.1 MB
DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.srt
51.2 kB
DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.mp4
43.6 MB
DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.srt
21.8 kB
DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.mp4
70.2 MB
DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.srt
52.5 kB
DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.mp4
23.1 MB
DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.srt
16.9 kB
DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.mp4
73.3 MB
DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.srt
37.7 kB
DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.mp4
61.1 MB
DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.srt
60.7 kB
DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.mp4
25.4 MB
DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.srt
20.2 kB
DEF CON 26 Conference - Jeanette Manfra - Securing our Nations Election Infrastructure.mp4
47.3 MB
DEF CON 26 Conference - Jeanette Manfra - Securing our Nations Election Infrastructure.srt
26.2 kB
DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.mp4
112.6 MB
DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.srt
70.3 kB
DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.mp4
125.6 MB
DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.srt
50.5 kB
DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.mp4
100.7 MB
DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.srt
47.0 kB
DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.mp4
55.9 MB
DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.srt
48.7 kB
DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.mp4
66.6 MB
DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.srt
46.6 kB
DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.mp4
51.5 MB
DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.srt
33.2 kB
DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.mp4
62.9 MB
DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.srt
56.3 kB
DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.mp4
72.4 MB
DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.srt
70.7 kB
DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.mp4
49.9 MB
DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.srt
55.7 kB
DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.mp4
93.4 MB
DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.srt
63.8 kB
DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.mp4
146.6 MB
DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.srt
49.2 kB
DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.mp4
38.5 MB
DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.srt
25.3 kB
DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.mp4
71.1 MB
DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.srt
38.1 kB
DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.mp4
43.6 MB
DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.srt
27.5 kB
DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.mp4
37.9 MB
DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.srt
20.0 kB
DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.mp4
116.2 MB
DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.srt
52.5 kB
DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.mp4
61.1 MB
DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.srt
43.7 kB
DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.mp4
60.9 MB
DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.srt
46.8 kB
DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.mp4
21.7 MB
DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.srt
14.6 kB
DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.mp4
59.4 MB
DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.srt
39.8 kB
DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.mp4
171.8 MB
DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.srt
57.0 kB
DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.mp4
56.5 MB
DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.srt
39.3 kB
DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.mp4
146.6 MB
DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.srt
56.1 kB
DEF CON 26 Conference - Panel - DC 101 PANEL.mp4
195.7 MB
DEF CON 26 Conference - Panel - DC 101 PANEL.srt
55.3 kB
DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.mp4
113.4 MB
DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.srt
39.0 kB
DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.mp4
25.9 MB
DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.srt
26.5 kB
DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.mp4
59.0 MB
DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.srt
57.2 kB
DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.mp4
180.8 MB
DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.srt
54.3 kB
DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.mp4
104.5 MB
DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.srt
43.4 kB
DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.mp4
83.2 MB
DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.srt
54.2 kB
DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.mp4
76.7 MB
DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.srt
42.0 kB
DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.mp4
132.3 MB
DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.srt
53.3 kB
DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.mp4
51.3 MB
DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.srt
19.1 kB
DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.mp4
33.8 MB
DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.srt
25.0 kB
DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.mp4
46.0 MB
DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.srt
44.7 kB
DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.mp4
46.1 MB
DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.srt
15.2 kB
DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.mp4
23.5 MB
DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.srt
20.5 kB
DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.mp4
56.4 MB
DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.srt
63.7 kB
DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.mp4
139.6 MB
DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.srt
62.4 kB
DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.mp4
40.8 MB
DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.srt
16.3 kB
DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.mp4
77.2 MB
DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.srt
47.9 kB
DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.mp4
91.4 MB
DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.srt
51.5 kB
DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.mp4
43.9 MB
DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.srt
17.4 kB
DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.mp4
61.3 MB
DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.srt
51.9 kB
DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.mp4
374.5 MB
DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.srt
92.9 kB
DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.mp4
165.3 MB
DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.srt
47.4 kB
DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.mp4
181.8 MB
DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.srt
57.6 kB
DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.mp4
147.9 MB
DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.srt
59.9 kB
DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.mp4
58.0 MB
DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.srt
42.4 kB
DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.mp4
37.1 MB
DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.srt
23.4 kB
DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.mp4
41.3 MB
DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.srt
29.0 kB
DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.mp4
50.1 MB
DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.srt
52.6 kB
DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.mp4
38.0 MB
DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.srt
23.6 kB
DEF CON 26 Conference - William Martin - One-Click to OWA.mp4
38.2 MB
DEF CON 26 Conference - William Martin - One-Click to OWA.srt
25.7 kB
DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.mp4
109.7 MB
DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.srt
44.8 kB
DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.mp4
30.2 MB
DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.srt
17.4 kB
DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.mp4
52.5 MB
DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.srt
27.4 kB
DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.mp4
30.8 MB
DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.srt
27.1 kB
DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.mp4
47.8 MB
DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.srt
21.3 kB
DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.mp4
28.4 MB
DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.srt
17.1 kB
DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.mp4
105.9 MB
DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.srt
40.4 kB
DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.mp4
50.1 MB
DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.srt
26.0 kB
DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.mp4
22.0 MB
DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.srt
26.1 kB
DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.mp4
31.4 MB
DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.srt
26.4 kB
DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.mp4
92.9 MB
DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.srt
33.5 kB
DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.mp4
64.6 MB
DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.srt
51.1 kB
DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.mp4
57.2 MB
DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.srt
68.8 kB
DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.mp4
80.1 MB
DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.srt
36.6 kB
DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.mp4
43.3 MB
DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.srt
21.4 kB
DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.mp4
52.5 MB
DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.srt
59.6 kB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!