BITCQ

DEF CON 24 presentations

Size: 945.7 MB
Magnet link

Name Size
DEF CON 24 presentations/DEFCON-24-Ang-Cui-and-Jatin-Kataria-A-Monitor-Darkly-UPDATED.pdf 136.1 MB
DEF CON 24 presentations/DEFCON-24-Demay-CANSPY-a-Platorm-For-Auditing-CAN-Devices-WP-UPDATED.pdf 819 KB
DEF CON 24 presentations/DEFCON-24-Tom-Kopchak-Sentient-Storage.pdf 1.5 MB
DEF CON 24 presentations/DEFCON-24-Aaron-Luo-Drones-Hijacking-Multi-Dimensional-Attack-Vectors-And-Countermeasures-UPDATED.pdf 4.6 MB
DEF CON 24 presentations/DEFCON-24-Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays.pdf 1.6 MB
DEF CON 24 presentations/DEFCON-24-Chris-Rock-How-to-overthrow-a-Government-Kuwait-Coup-WP.pdf 231 KB
DEF CON 24 presentations/DEFCON-24-Demay-CANSPY-a-Platorm-For-Auditing-CAN-Devices-UPDATED.pdf 1.8 MB
DEF CON 24 presentations/DEFCON-24-Shane-Steiger-Maelstrom-Are-You-Playing-With-A-Full-Deck-UPDATED.pdf 8.3 MB
DEF CON 24 presentations/DEFCON-24-Maldonado-Mcguffin-Sticky-Keys-To-The-Kingdom.pdf 831 KB
DEF CON 24 presentations/DEFCON-24-Wesley-McGrew-Secure-Penetration-Testing-Operations-WP.pdf 126 KB
DEF CON 24 presentations/DEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Jmaxxz-Backdooring-the-Frontdoor-UPDATED.pdf 1.7 MB
DEF CON 24 presentations/DEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them-WP.pdf 1.2 MB
DEF CON 24 presentations/DEFCON-24-Thomas-Wilhelm-Hacking-Network-Protocols-Using-Kali.pdf 585 KB
DEF CON 24 presentations/DEFCON-24-Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection-Writeup.pdf 3.1 MB
DEF CON 24 presentations/DEFCON-24-Regilero-Hiding-Wookiees-In-Http.pdf 410 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/LICENSE 2 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/credentials.py 283 B
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/cluster.py 9 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/Readme.md 2 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/auto-phish.py 8 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/post_tweet.py 2 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/requirements.txt 1 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/sample.sh 109 B
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/cluster.pkl 30 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Extras/auto-phish/stopwords.txt 2 KB
DEF CON 24 presentations/DEFCON-24-Fasel-Jacobs-I-fight-for-the-users-UPDATED.pdf 121.9 MB
DEF CON 24 presentations/DEFCON-24-Huber-Rasthofer-Smartphone-Antivirus-And-Security-Applications-Under-Fire.pdf 2.1 MB
DEF CON 24 presentations/DEFCON-24-Lucas-Lundgren-Extras/client.py 2 KB
DEF CON 24 presentations/DEFCON-24-Lucas-Lundgren-Extras/hodor.rb 452 B
DEF CON 24 presentations/DEFCON-24-Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines.pdf 1.2 MB
DEF CON 24 presentations/DEFCON-24-Przemek-Jaroszewski-How-To-Get-Good-Seats-In-The-Security-Theater-UPDATED.pdf 2.1 MB
DEF CON 24 presentations/DEFCON-24-Hecker-Hacking-Hotel-Keys-and-PoS-Systems-UPDATED.pdf 2.2 MB
DEF CON 24 presentations/DEFCON-24-Forgety-Kreilein-Ng9-1-1-The-Next-Gene-Of-Emergency-Ph0Nage.pdf 3.2 MB
DEF CON 24 presentations/DEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them.pdf 1.6 MB
DEF CON 24 presentations/DEFCON-24-Arnaud-Soullie-Workshop-Pentesting-ICS-101.pdf 4.1 MB
DEF CON 24 presentations/DEFCON-24-Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs-UPDATED.pdf 2.4 MB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-The-Remote-Metamorphic-Engine.pdf 2.4 MB
DEF CON 24 presentations/DEFCON-24-Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations.pdf 1.6 MB
DEF CON 24 presentations/DEFCON-24-Max-Bazaliy-A-Journey-Through-Exploit-Mitigation-Techniques-On-Ios-UPDATED.pdf 671 KB
DEF CON 24 presentations/DEFCON-24-Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime-Extras-UPDATED.txt 306 B
DEF CON 24 presentations/DEFCON-24-Drake-Christey-Vulnerabilities-101-UPDATED.pdf 1 MB
DEF CON 24 presentations/DEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle-UPDATED.pdf 4.4 MB
DEF CON 24 presentations/DEFCON-24-Granolocks-Zero-Chaos-Bluehydra-Realtime-Blutetooth-Detection.pdf 101 KB
DEF CON 24 presentations/DEFCON-24-Rogan-Dawes-Dominic-White-Universal-Serial-aBUSe-Remote-Attacks.pdf 6.2 MB
DEF CON 24 presentations/DEFCON-24-Anto-Joseph-Fuzzing-Android-Devices.pdf 30.2 MB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Bill of Materials.pdf 45 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Render.png 435 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Schematics.pdf 372 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gbs 2 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gts 36 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gbl 57 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gko 2 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gto 34 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.drl 1 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gbo 3 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Extras/Truck Duck Gerbers/truck-duck.gtl 86 KB
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Writing-Your-First-Exploit.pdf 455 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-The-Remote-Metamorphic-Engine-UPDATED.pdf 3.4 MB
DEF CON 24 presentations/DEFCON-24-Drake-Christey-Vulnerabilities-101.pdf 184 KB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-WP.pdf 469 KB
DEF CON 24 presentations/DEFCON-24-Przemek-Jaroszewski-How-To-Get-Good-Seats-In-The-Security-Theater.pdf 1.5 MB
DEF CON 24 presentations/DEFCON-24-Joe-Grand-Zoz-BSODomizerHD-UPDATED.pdf 27.7 MB
DEF CON 24 presentations/DEFCON-24-Fred-Bret-Mounet-All-Your-Solar-Panels-Are-Belong-To-Me.pdf 799 KB
DEF CON 24 presentations/DEFCON-24-Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks.pdf 7.4 MB
DEF CON 24 presentations/DEFCON-24-Javier-Vazquez-You-CAN-haz-car-Secretz-UPDATED.pdf 3.2 MB
DEF CON 24 presentations/DEFCON-24-Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays-WP.pdf 504 KB
DEF CON 24 presentations/DEFCON-24-Hecker-Hacking-Next-Gen-ATMS-UPDATED.pdf 3.3 MB
DEF CON 24 presentations/DEFCON-24-Granolocks-Zero-Chaos-Bluehydra-Realtime-Blutetooth-Detection-UPDATED.pdf 1.7 MB
DEF CON 24 presentations/DEFCON-24-Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations-UPDATED.pdf 1.9 MB
DEF CON 24 presentations/DEFCON-24-Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel-WP.pdf 1.8 MB
DEF CON 24 presentations/DEFCON-24-Brad-Woodberg-Malware-Command-And-Control-Channels-A-Journey-Into-Darkness.pdf 1.7 MB
DEF CON 24 presentations/DEFCON-24-Tamas-Szakaly-Help-I-got-ANTS.pdf 5.7 MB
DEF CON 24 presentations/DEFCON-24-Grant-Bugher-Captive-Portals.pdf 12 MB
DEF CON 24 presentations/DEFCON-24-Chris-Rock-How-to-overthrow-a-Government.pdf 6.1 MB
DEF CON 24 presentations/DEFCON-24-Radia-Perlman-Resilience-Despite-Malicious-Pariticpants.pdf 745 KB
DEF CON 24 presentations/DEFCON-24-Zhong-Lee-411-A-Framework-For-Managing-Security-Alerts.pdf 49 KB
DEF CON 24 presentations/DEFCON-24-Jmaxxz-Backdooring-the-Frontdoor-Extracting-Secrets-From-Log.pdf 203 KB
DEF CON 24 presentations/DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools-UPDATED.pdf 1.4 MB
DEF CON 24 presentations/DEFCON-24-Wesley-McGrew-Secure-Penetration-Testing-Operations.pdf 296 KB
DEF CON 24 presentations/DEFCON-24-Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice.pdf 2 MB
DEF CON 24 presentations/DEFCON-24-Thomas-Wilhelm-Intrusion-Prevention-System-Evasion-Techniques.pdf 795 KB
DEF CON 24 presentations/DEFCON-24-Jake-Kouns-Lee-Johnstone-Cyber-who-done-it-UPDATED.pdf 49.6 MB
DEF CON 24 presentations/DEFCON-24-Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice-UPDATED.pd.pdf 5.1 MB
DEF CON 24 presentations/DEFCON-24-Evan-Booth-Jjittery-Macgyver.pdf 4.4 MB
DEF CON 24 presentations/DEFCON-24-Bertin-Bervis-James-Jara-Exploiting-And-Attacking-Seismological-Networks-Remotely.pdf 5.3 MB
DEF CON 24 presentations/DEFCON-24-Bursztein-Picod-Cheating-at-Poker-James-Bond-Style-UPDATED.pdf 69 MB
DEF CON 24 presentations/DEFCON-24-Liu-Yan-Xu-Can-You-Trust-Autonomous-Vehicles.pdf 2.2 MB
DEF CON 24 presentations/DEFCON-24-Eagle-Sk3Wldbg-Emulating-with-Ida.pdf 370 KB
DEF CON 24 presentations/DEFCON-24-Fasel-Jacobs-I-fight-for-the-users.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Plore-Side-Channel-Attacks-On-High-Security-Electronic-Safe-Locks.pdf 16.4 MB
DEF CON 24 presentations/DEFCON-24-Bull-Matthews-Trumbull-VLAN-Hopping-ARP-MITM-in-Virtualized-WP-UPDATED.pdf 294 KB
DEF CON 24 presentations/DEFCON-24-Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel.pdf 1.5 MB
DEF CON 24 presentations/DEFCON-24-Plore-Side-Channell-Attacks-High-Security-Locks-UPDATED.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Fitzpatrick-and-Grand-101-Ways-To-Brick-Your-Hardware.pdf 6.1 MB
DEF CON 24 presentations/DEFCON-24-Karyn-Benson-Examining-The-Internets-Pollution.pdf 2.3 MB
DEF CON 24 presentations/DEFCON-24-Salvador-Mendoza-Samsung-Pay-Tokenized-Numbers.pdf 607 KB
DEF CON 24 presentations/DEFCON-24-Patrick-Wardle-99-Problems-Little-Snitch-UPDATED.pdf 14 MB
DEF CON 24 presentations/DEFCON-24-Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel-UPDATED.pdf 6.7 MB
DEF CON 24 presentations/DEFCON-24-Max-Bazaliy-A-Journey-Through-Exploit-Mitigation-Techniques-On-Ios.pdf 561 KB
DEF CON 24 presentations/DEFCON-24-Mcsweeny-Cranor-Research-On-The-Machines.pdf 2.6 MB
DEF CON 24 presentations/DEFCON-24-Ulf-Frisk-Direct-Memory-Attack-the-Kernel.pdf 1.1 MB
DEF CON 24 presentations/DEFCON-24-Clarence-Chio-Machine-Duping-101.pdf 5.9 MB
DEF CON 24 presentations/DEFCON-24-Nick-Rosario-Weaponize-Your-Feature-Codes.pdf 916 KB
DEF CON 24 presentations/DEFCON-24-Liu-Yan-Xu-Can-You-Trust-Autonomous-Vehicles-WP.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Demay-Lebrun-Canspy-A-Platorm-For-Auditing-Can-Devices.pdf 1.5 MB
DEF CON 24 presentations/DEFCON-24-Dr-Phil-Polstra-Mouse-Jigglers.pdf 347 KB
DEF CON 24 presentations/DEFCON-24-Shellphish-Cyber Grand Shellphish-UPDATED.pdf 8.5 MB
DEF CON 24 presentations/DEFCON-24-Eric-Escobar-Rogue-Cell-Towers-UPDATED.pdf 2.2 MB
DEF CON 24 presentations/DEFCON-24-Shane-Steiger-Maelstrom-Are-You-Playing-With-A-Full-Deck-V14-Back.pdf 2.3 MB
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/setup.txt 394 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/custom-payload-add-user.py 1 KB
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/exploit.py 3 KB
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/banner-grabber.py 527 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/references.txt 657 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/simpleoverflow.c 520 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/outline.txt 724 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/custom-payload-calc.py 1 KB
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/fuzzer.py 799 B
DEF CON 24 presentations/DEFCON-24-Robert-Olson-Extras/port-scanner.py 1 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/nginx_vhost_config.conf 276 B
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/nodegoat-Demo-code-added-user-delete.patch 7 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/chewy2.jpg 46 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/attack.png 3 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/demo_downgrade_poisoning2.png 31 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/smuggling_hijacking_varnish_node.png 15 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/reverseproxy.go 486 B
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/varnish-demo.vcl 1 KB
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/apache_vhost_config.conf 1006 B
DEF CON 24 presentations/DEFCON-24-Regilero-Extras/index.html 331 B
DEF CON 24 presentations/DEFCON-24-Zhang-Shan-Forcing-Targeted-Lte-Cellphone-Into-Unsafe-Network.pdf 4.2 MB
DEF CON 24 presentations/DEFCON-24-Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks-UPDATED.pdf 3.8 MB
DEF CON 24 presentations/DEFCON-24-Jason-Healey-Feds-and-0days-Heartbleed-to-Apple-FBI-UPDATED.pdf 1.5 MB
DEF CON 24 presentations/DEFCON-24-Patrick-Wardle-99-Problems-Little-Snitch.pdf 14.2 MB
DEF CON 24 presentations/DEFCON-24-Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs.pdf 1.9 MB
DEF CON 24 presentations/DEFCON-24-Robbins-Vazarkar-Schroeder-Six-Degrees-of-Domain-Admin.pdf 855 KB
DEF CON 24 presentations/DEFCON-24-Tom-Kopchak-SSD-Forensics-Research-WP.pdf 1.4 MB
DEF CON 24 presentations/DEFCON-24-Anch-So-you-want-to-be-a-pentester-DC101.pdf 573 KB
DEF CON 24 presentations/DEFCON-24-Workshop-Simon-Roses-Use-MS-Free-Sec-Tools-as-a-Ninja-UPDATED.pdf 3.9 MB
DEF CON 24 presentations/DEFCON-24-Wesley-McGrew-Extras/DEFCON-24-Wesley-McGrew-Secure-Penetration-Testing-Operations-snagterpreter.py 2 KB
DEF CON 24 presentations/DEFCON-24-Willa-Riggins-Esoteric-Exfiltration-UPDATED.pdf 797 KB
DEF CON 24 presentations/DEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle.pdf 1.3 MB
DEF CON 24 presentations/DEFCON-24-Demay-Auditing-6LoWPAN-Networks-using-Standard-Penetration-Testing-Tools-WP-UPDATED.pdf 666 KB
DEF CON 24 presentations/DEFCON-24-Bryant-Zadegan-Ryan-Lester-Abusing-Bleeding-Edge-Web-Standards-For-Appsec-Glory-UPDATED.pdf 24.6 MB
DEF CON 24 presentations/DEFCON-24-Shellphish-Cyber Grand Shellphish-Tool-Links.txt 118 B
DEF CON 24 presentations/DEFCON-24-Jmaxxz-Backdooring-the-Frontdoor-Bypass-Cert-Pinning.pdf 202 KB
DEF CON 24 presentations/DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools-WP.pdf 770 KB
DEF CON 24 presentations/DEFCON-24-Salvador-Mendoza-Samsung-Pay-Tokenized-Numbers-WP.pdf 459 KB
DEF CON 24 presentations/DEFCON-24-SixVolts-and-Haystack-Cheap-Tools-For-Hacking-Heavy-Trucks.pdf 24.2 MB
DEF CON 24 presentations/DEFCON-24-Mcsweeny-Cranor-Research-On-The-Machines-UPDATED.pdf 4.5 MB
DEF CON 24 presentations/DEFCON-24-3alarmlampscoot-DIY-Nukeproofing.pdf 3.5 MB
DEF CON 24 presentations/DEFCON-24-Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime.pdf 705 KB
DEF CON 24 presentations/DEFCON-24-Panel-How-To-Make-A-DEFCON-Black-Badge.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Shane-Steiger-Maelstrom-Rules-V10.pdf 929 KB
DEF CON 24 presentations/DEFCON-24-Zhong-Lee-411-A-Framework-For-Managing-Security-Alerts-UPDATED.pdf 8.2 MB
DEF CON 24 presentations/DEFCON-24-Jmaxxz-Backdooring-the-Frontdoor.pdf 1.9 MB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/rmengine_client.py 2 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/sample2_isDebugged1.py 15 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/rmengine_isDebugged1.py 16 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/rmengine_isDebugged2.py 16 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/sample3_isDebugged2.py 15 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/sample1_CPUID.py 15 KB
DEF CON 24 presentations/DEFCON-24-Amro-Abdelgawad-Extras/rmengine_CPUID.py 16 KB
DEF CON 24 presentations/DEFCON-24-Chris-Eagle-Sk3wlDbg-Emulating-with-Ida-UPDATED.pdf 157 KB
DEF CON 24 presentations/DEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset-WP-UPDATED.pdf 1.1 MB
DEF CON 24 presentations/DEFCON-24-Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice-WP-UPDATED.pdf 534 KB
DEF CON 24 presentations/DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools.pdf 632 KB
DEF CON 24 presentations/DEFCON-24-Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime-UPDATED.pdf 4.9 MB
DEF CON 24 presentations/DEFCON-24-Grant-Bugher-Captive-Portals-UPDATED.pdf 13.9 MB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Intro-to-Witchcraft-Compiler-UPDATED.pdf 4.7 MB
DEF CON 24 presentations/DEFCON-24-Willa-Riggins-Esoteric-Exfiltration.pdf 305 KB
DEF CON 24 presentations/DEFCON-24-Sean-Metcalf-Beyond-The-MCSE-Red-Teaming-Active-Directory-UPDATED.pdf 5.8 MB
DEF CON 24 presentations/DEFCON-24-Joe-Grand-Zoz-BSODomizerHD.pdf 731 KB
DEF CON 24 presentations/DEFCON-24-Jennifer-Granick-Slouching-Towards-Utopia.pdf 417 KB
DEF CON 24 presentations/DEFCON-24-Nate-Cardozo-Crypto-State-Of-The-Law-UPDATED.pdf 2.2 MB
DEF CON 24 presentations/DEFCON-24-Jay-Beale-Larry-Pesce-Phishing-without-Frustration-UPDATED.pdf 6.3 MB
DEF CON 24 presentations/DEFCON-24-Bryant-Zadegan-Ryan-Lester-Abusing-Bleeding-Edge-Web-Standards-For-Appsec-Glory.pdf 2.5 MB
DEF CON 24 presentations/DEFCON-24-Bigezy-Saci-Pinworm-MITM-for-Metadata.pdf 1.2 MB
DEF CON 24 presentations/DEFCON-24-Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection-UPDATED.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-the-bob-ross-fan-club-Propaganda-and-you.pdf 2.9 MB
DEF CON 24 presentations/DEFCON-24-Bull-Matthews-Trumbull-VLAN-Hopping-ARP-MITM-in-Virtualized-UPDATED.pdf 2.8 MB
DEF CON 24 presentations/DEFCON-24-Paul-Vixie-Frontrunning-the-Frontrunners-UPDATED.pdf 9.2 MB
DEF CON 24 presentations/DEFCON-24-Brad-Woodberg-Malware-Command-And-Control-Channels-A-Journey-Into-Darkness-UPDATED.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Allan-Cecil-dwangoAC-Tasbot-The-Perfectionist.pdf 7.1 MB
DEF CON 24 presentations/DEFCON-24-Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection.pdf 2.4 MB
DEF CON 24 presentations/DEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset-UPDATED.pdf 4.2 MB
DEF CON 24 presentations/DEFCON-24-Eric-Escobar-Rogue-Cell-Towers.pdf 2.3 MB
DEF CON 24 presentations/DEFCON-24-Klijnsma-Tentler-Stargate-Pivoting-Through-VNC.pdf 30.1 MB
DEF CON 24 presentations/DEFCON-24-Luke-Young-The-4TbS-Ddos-For-5-bucks.pdf 3.4 MB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Intro-to-Witchcraft-Compiler.pdf 2.1 MB
DEF CON 24 presentations/DEFCON-24-Sean-Metcalf-Beyond-The-MCSE-Red-Teaming-Active-Directory.pdf 4.8 MB
DEF CON 24 presentations/DEFCON-24-Robbins-Vazarkar-Schroeder-Six-Degrees-of-Domain-Admin-UPDATED.pdf 2.7 MB
DEF CON 24 presentations/DEFCON-24-Mike-Rich-Extras/DEFCON-24-Mike-Rich-Sideload-demo.xlsm 135 KB
DEF CON 24 presentations/DEFCON-24-Mike-Rich-Extras/DEFCON-24-Mike-Rich-newdll.zip 66 KB
DEF CON 24 presentations/DEFCON-24-Mike-Rich-Extras/DEFCON-24-Mike-Rich-Sideload_code.zip 98 KB
DEF CON 24 presentations/DEFCON-24-Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines-Literature-Survey.pdf 352 KB
DEF CON 24 presentations/DEFCON-24-Ladar-Levison-Compelled-Decryption.pdf 5.8 MB
DEF CON 24 presentations/DEFCON-24-Int0X80-Anti-Forensics-AF.pdf 413 KB
DEF CON 24 presentations/DEFCON-24-Allan-Cecil-dwangoAC-Tasbot-The-Perfectionist-UPDATED.pdf 11.2 MB
DEF CON 24 presentations/DEFCON-24-Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice-WP.pdf 520 KB
DEF CON 24 presentations/DEFCON-24-Gorenc-Sands-Hacker-Machine-Interface-UPDATED.pdf 8.9 MB
DEF CON 24 presentations/DEFCON-24-Clarence-Chio-Machine-Duping-101-UPDATED.pdf 6.5 MB
DEF CON 24 presentations/DEFCON-24-Lucas-Lundgren-Light-Weight Protocol-Critical-Implications.pdf 2.5 MB
DEF CON 24 presentations/DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering.pdf 3.7 MB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/AUTHORS 41 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wld/Makefile 174 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wld/wld.c 2 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wld/wld 137 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wcc/Makefile 296 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wcc/wcc 313 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/wcc/wcc.c 37 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/nametotype.h 3 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/nametolink.h 284 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/nametoalign.h 2 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/nametoentsz.h 617 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/nametoinfo.h 214 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/include/config.h 136 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/src/Makefile 130 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/bin/wld 137 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/bin/wcc 313 KB
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/Makefile 67 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/README 999 B
DEF CON 24 presentations/DEFCON-24-Jonathan-Brossard-Extras/LICENSE 1 KB
DEF CON 24 presentations/DEFCON-24-Gorenc-Sands-Hacker-Machine-Interface.pdf 7 MB
DEF CON 24 presentations/DEFCON-24-Jay-Beale-Larry-Pesce-Phishing-without-Frustration.pdf 6.3 MB
DEF CON 24 presentations/DEFCON-24-Ricky-Lawshae-Lets-Get-Physical.pdf 188 KB
DEF CON 24 presentations/DEFCON-24-Hunter-Scott-Rt2Win-The-Luckiest-Guy-On-Twitter.pdf 1.2 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
DEF CON 16 Video 9.3 GB 8
DEF CON 31 Video 46.1 GB 4
DEF CON 14 Video 10.3 GB 3
DEF CON 21 Application 92.3 GB 0
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly 1080p.mp4 Video 503.3 MB 9
DEF CON 16 video x265 Video 5.1 GB 3
DEF CON Conference Programs Application 830.7 MB 3
DEF CON 7 video Video 3.5 GB 2
DEF CON 11 music Audio 404.3 MB 2
DEF CON 15 7 GB 0
DEF CON 29 Application 376.8 GB 0
DEF CON 28 Application 47.6 GB 106
DEF CON 28 Application 190.4 GB 59
DEF CON 26 Audio 99.4 GB 16
DEF CON 18 ctf Application 3.6 GB 16
DEF CON 14 Video 10.3 GB 16
DEF CON 27 Audio 108.3 GB 15
DEF CON 13 audio 823.4 MB 15
DEF CON 5 242.6 MB 14
DEF CON 27 Audio 119.3 GB 13

Loading...