DEF CON 22 presentations/Gene Bransfeild - Updated/DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets-UPDATED.pdf |
62.2 MB |
DEF CON 22 presentations/Celine and Elie Bursztein - Updated/DEFCON-22-Celine-and-Elie-Bursztein-I-am-a-legend-UPDATED.pdf |
49.3 MB |
DEF CON 22 presentations/Will Schroeder/DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf |
48.8 MB |
DEF CON 22 presentations/Dominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-onscreen-Updated.pdf |
48.6 MB |
DEF CON 22 presentations/Dhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf |
44.7 MB |
DEF CON 22 presentations/Ladar Levison and Stephen Watt - Updated/DEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf |
37.5 MB |
DEF CON 22 presentations/Joe Fitzpatrick and Miles Crabill - Updated/DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe-UPDATED.pdf |
36.6 MB |
DEF CON 22 presentations/Heres, Etemadieh, Baker and Nielsen - Updated/DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things-UPDATED.pdf |
35.6 MB |
DEF CON 22 presentations/Jesse Michael and Mickey Shkatov - Updated/Jesse Michael and Mickey Shkatov - Extras.zip |
34.6 MB |
DEF CON 22 presentations/Fatih Ozavci - Updated/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf |
33.8 MB |
DEF CON 22 presentations/Colby Moore and Patrick Wardle - Updated/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf |
30.2 MB |
DEF CON 22 presentations/Dominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf |
30.2 MB |
DEF CON 22 presentations/Kenneth White and Matthew Green - Updated/DEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf |
30.1 MB |
DEF CON 22 presentations/Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf |
26.3 MB |
DEF CON 22 presentations/Brian Gorenc and Matt Molinyawe -Updated/Brian Gorenc and Matt Molinyawe - Extras.zip |
26.1 MB |
DEF CON 22 presentations/Glenn Wilkinson - Updated/DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance-UPDATED.pdf |
26 MB |
DEF CON 22 presentations/Rmellendick and DaKahuna - Updated/DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks-UPDATED.pdf |
25.1 MB |
DEF CON 22 presentations/Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On-Updated.pdf |
22.2 MB |
DEF CON 22 presentations/Brian Gorenc and Matt Molinyawe -Updated/DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf |
19.8 MB |
DEF CON 22 presentations/Zoz - Updated/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf |
19.2 MB |
DEF CON 22 presentations/Deviant Ollam and Howard Payne/DEFCON-22-Deviant-Ollam-and-Howard-Payne-Elevator Hacking-From-the-Pit-to-the-Penthouse.pdf |
18.5 MB |
DEF CON 22 presentations/Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise.pdf |
17.2 MB |
DEF CON 22 presentations/Jim Denaro and Tod Beardsley - Updated/DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit-UPDATED.pdf |
17 MB |
DEF CON 22 presentations/Zoz - Updated/DEFCON-22-Zoz-Dont-Fuck-It-Up.pdf |
16.7 MB |
DEF CON 22 presentations/Sarah Edwards/DEFCON-22-Sarah-Edwards-Reverse-Engineering-Mac-Malware.pdf |
15.1 MB |
DEF CON 22 presentations/Alijohn Ghassemlouei - Updated/DEFCON-22-Alijohn-Ghassemlouei-Anatomy-of-a-Pentest-Updated.pdf |
14.7 MB |
DEF CON 22 presentations/Grant Bugher - Updated/DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems-Updated.pdf |
14 MB |
DEF CON 22 presentations/Kyle Kelley and Greg Anderson - Updated/DEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe.-Updated.pdf |
11.7 MB |
DEF CON 22 presentations/Bathurst, Rogers, Carey, and Clarke/DEFCON-22-Bathurst-Rogers-Carey-Clarke-PROPLANE.pdf |
11 MB |
DEF CON 22 presentations/Grant Bugher - Updated/DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems.pdf |
10.9 MB |
DEF CON 22 presentations/Adrian Crenshaw - Updated/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf |
10.8 MB |
DEF CON 22 presentations/Josh Datko and Teddy Reed - Updated/DEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c-UPDATED.pdf |
10.3 MB |
DEF CON 22 presentations/Aaron Bayles (AlxRogan) - Updated/DEFCON-22-Aaron-Bayles-Alxrogan-Protecting-SCADA-DC101.pdf |
9.4 MB |
DEF CON 22 presentations/Alex Pinto and Kyle Maxwell - Updated/DEFCON-22-Pinto-Maxwell-Secure-Because-Math-Updated.pdf |
9.4 MB |
DEF CON 22 presentations/Tim Strazzere and Jon Sawyer - Updated/DEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf |
8.9 MB |
DEF CON 22 presentations/John Menerick - Updated/DEFCON-22-John-Menerick-Open-Source-Fairy-Dust-UPDATED.pdf |
8.7 MB |
DEF CON 22 presentations/Jake Kouns & Carsten Eiram - Updated/DEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter-U{DATED.pdf |
8.7 MB |
DEF CON 22 presentations/Alex Pinto and Kyle Maxwell - Updated/DEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf |
8.6 MB |
DEF CON 22 presentations/Bulygin, Bazhaniul, Furtak, and Loucaides - Updated/DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS.pdf |
8.6 MB |
DEF CON 22 presentations/Gregory Pickett - Updated/DEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks-UPDATED.pdf |
8.3 MB |
DEF CON 22 presentations/Robert Rowley/DEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf |
8.1 MB |
DEF CON 22 presentations/Nir Valtman - Updated/DEFCON-22-Nir-Valtman-Bug-Bounty-Programs-Evolution.pdf |
8.1 MB |
DEF CON 22 presentations/Phillip Young - Updated/DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf |
7.9 MB |
DEF CON 22 presentations/Colby Moore and Patrick Wardle - Updated/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam.pdf |
7.9 MB |
DEF CON 22 presentations/Blake Self - Updated/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf |
7.2 MB |
DEF CON 22 presentations/Eric (XlogicX) Davisson and Ruben Alejandro (chap0)/DEFCON-22-Eric-Davisson-Ruben-Alejandro-Abuse-of-Blind-Automation-in-Security-Tools.pdf |
6.8 MB |
DEF CON 22 presentations/Ivan Petrov and Svetlana Gaivoronski - Updated/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM.pdf |
6.7 MB |
DEF CON 22 presentations/Joe Fitzpatrick and Miles Crabill - Updated/DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe.pdf |
6.6 MB |
DEF CON 22 presentations/Ivan Petrov and Svetlana Gaivoronski - Updated/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf |
6.3 MB |
DEF CON 22 presentations/Ryan Kazanciyan and Matt Hastings - Updated/DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks-UPDATED.pdf |
6.3 MB |
DEF CON 22 presentations/Wesley McGrew/Wesley McGrew - Extras.zip |
6.2 MB |
DEF CON 22 presentations/Rmellendick and DaKahuna - Updated/DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks.pdf |
6.2 MB |
DEF CON 22 presentations/Jake Kouns & Carsten Eiram - Updated/DEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter.pdf |
5.9 MB |
DEF CON 22 presentations/Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction-Updated.pdf |
5.7 MB |
DEF CON 22 presentations/Joe Grand/DEFCON-22-Joe-Grand-Deconstructing-the-Circuit-Board-Sandwich.pdf |
5.4 MB |
DEF CON 22 presentations/Paul Drapeau and Brent Dukes - Updated/DEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols-UPDATED.pdf |
5.3 MB |
DEF CON 22 presentations/Keren Elazari - Updated/DEFCON-22-Keren-Elazari-Empowering-Hackers-UPDATED.pdf |
4.9 MB |
DEF CON 22 presentations/Quaddi, R3plicant, and Hefley - Updated/DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf |
4.9 MB |
DEF CON 22 presentations/Dustin Hoffman and Thomas Kinsey - Updated/DEFCON-22-Dustin-Hoffman-and-Thomas-Kinsey-What-the-Watchers-See-UPDATED.pdf |
4.8 MB |
DEF CON 22 presentations/Nir Valtman - Updated/DEFCON-22-Nir-Valtman-A-Journey-To-Protect-POS-UPDATED.pdf |
4.7 MB |
DEF CON 22 presentations/Maggie Jauregui - Updated/DEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted-Updated.pdf |
4.7 MB |
DEF CON 22 presentations/Zoltán Balázs - Updated/DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdf |
4 MB |
DEF CON 22 presentations/Felix Leder/DEFCON-22-Felix-Leder-NinjaTV.pdf |
3.8 MB |
DEF CON 22 presentations/Weston Hecker - Updated/DEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf |
3.8 MB |
DEF CON 22 presentations/Paul Drapeau and Brent Dukes - Updated/DEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols.pdf |
3.7 MB |
DEF CON 22 presentations/Elijah - Updated/DEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing-Updated.pdf |
3.7 MB |
DEF CON 22 presentations/Brady Bloxham - Updated/DEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf |
3.7 MB |
DEF CON 22 presentations/Paul Such (0x222)/DEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf |
3.6 MB |
DEF CON 22 presentations/Cesar Cerrudo - Updated/DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf |
3.4 MB |
DEF CON 22 presentations/Keren Elazari - Updated/DEFCON-22-Keren-Elazari-Empowering-Hackers.pdf |
3.4 MB |
DEF CON 22 presentations/Adrian Crenshaw - Updated/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught.pdf |
3.3 MB |
DEF CON 22 presentations/Shahar Tal - Updated/DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdf |
3.3 MB |
DEF CON 22 presentations/Aaron Bayles (AlxRogan) - Updated/DEFCON-22-Aaron-Bayles-Alxrogan-Protecting-SCADA-DC101-Updated.pdf |
2.9 MB |
DEF CON 22 presentations/Jesse Michael and Mickey Shkatov - Updated/DEFCON-22-Jesse-Michael-Mickey-Shkatov-USB-for-All!!-UPDATED.pdf |
2.8 MB |
DEF CON 22 presentations/Bulygin, Bazhaniul, Furtak, and Loucaides - Updated/DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS-UPDATED.pdf |
2.7 MB |
DEF CON 22 presentations/Dhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style.pdf |
2.7 MB |
DEF CON 22 presentations/Eric Smith and Joshua Perrymon - Updated/DEFCON-22-Smith-Perrymon-All-Your-Badges-Are-Belong-To-Us-UPDATED.pdf |
2.6 MB |
DEF CON 22 presentations/Michael Ossman/DEFCON-22-Michael-Ossmann-Pierce-Toorcamp.pdf |
2.5 MB |
DEF CON 22 presentations/Gene Bransfeild - Updated/DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets.pdf |
2.4 MB |
DEF CON 22 presentations/Alexandre Moneger - Updated/DEFCON-22-Alex-Moneger-Stitching-numbers-Generating-ROP-payloads-from-in-memory-numbers-UPDATED.pdf |
2.2 MB |
DEF CON 22 presentations/Dominic White and Ian de Villiers - Updated/Dominic White and Ian de Villiers - Extras.zip |
2.2 MB |
DEF CON 22 presentations/Geoff Mcdonald - Updated/DEFCON-22-Geoff-Mcdonald-Meddle-Framework-UPDATED.pdf |
2.1 MB |
DEF CON 22 presentations/Alexandre Moneger - Updated/DEFCON-22-Alex-Moneger-Stitching-numbers-Generating-ROP-payloads-from-in-memory-numbers.pdf |
2.1 MB |
DEF CON 22 presentations/Richard Theime - Updated/DEFCON-22-Theime-Truth-Through-Fiction-Updated.pdf |
2 MB |
DEF CON 22 presentations/Mike Schrenk - Updated/DEFCON-22-Mike-Schrenk-Youre-Leaking-Trade-Secrets-UPDATED.pdf |
2 MB |
DEF CON 22 presentations/Phillip Young - Updated/DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes.pdf |
2 MB |
DEF CON 22 presentations/Adam Wirth (SimonJ) - Updated/DEFCON-22-Adam-Wirth-SimonJ-Practical-Foxhunting-101-UPDATED.pdf |
1.9 MB |
DEF CON 22 presentations/John Menerick - Updated/DEFCON-22-John-Menerick-Open-Source-Fairy-Dust.pdf |
1.8 MB |
DEF CON 22 presentations/Ryan Kazanciyan and Matt Hastings - Updated/DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf |
1.8 MB |
DEF CON 22 presentations/Logan Lamb/DEFCON-22-Logan-Lamb-HOME-INSECURITY-NO-ALARMS-FALSE-ALARMS-AND-SIGINT.pdf |
1.8 MB |
DEF CON 22 presentations/Lance Buttars (Nemus) - Updated/DEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS-UPDATED.pdf |
1.8 MB |
DEF CON 22 presentations/Jay Healey - Updated/DEFCON-22-Jay-Healey-Saving-the-Internet-UPDATED.pdf |
1.7 MB |
DEF CON 22 presentations/Quaddi, R3plicant, and Hefley - Updated/DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911.pdf |
1.7 MB |
DEF CON 22 presentations/Dominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven.pdf |
1.7 MB |
DEF CON 22 presentations/Luca Bruno and Mariano Graziano - Updated/DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-Updated.pdf |
1.6 MB |
DEF CON 22 presentations/Shahar Tal - Updated/DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins.pdf |
1.6 MB |
DEF CON 22 presentations/Corey Kallenberg - Updated/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation-WP-UPDATED.pdf |
1.6 MB |
DEF CON 22 presentations/Corey Kallenberg - Updated/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf |
1.5 MB |
DEF CON 22 presentations/Gregory Pickett - Updated/DEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks.pdf |
1.5 MB |
DEF CON 22 presentations/Weston Hecker - Updated/DEFCON-22-Weston-Hecker-Burner-Phone-DDOS.pdf |
1.4 MB |
DEF CON 22 presentations/Zoltán Balázs - Updated/DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds.pdf |
1.4 MB |
DEF CON 22 presentations/Elijah - Updated/DEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing.pdf |
1.4 MB |
DEF CON 22 presentations/Scott Erven and Shawn Merdinger - Updated/DEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdf |
1.4 MB |
DEF CON 22 presentations/Tess Schrodinger/DEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdf |
1.3 MB |
DEF CON 22 presentations/Glenn Wilkinson - Updated/DEFCON-22-Glenn-Wilkinson-GRW-WP.pdf |
1.3 MB |
DEF CON 22 presentations/Alex Zacharis and Nikolaos Tsagkarakis/DEFCON-22-Alex Zacharis-Nikolaos-Tsagkarakis-PoS-Attacking-the-Traveling-Salesman.pdf |
1.2 MB |
DEF CON 22 presentations/Holt, Smirnova, and Chua - Updated/DEFCON-22-Holt-Smirnova-Chua-Stolen-Data-Markets-Updated.pdf |
1.1 MB |
DEF CON 22 presentations/Cesar Cerrudo - Updated/DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems.pdf |
1.1 MB |
DEF CON 22 presentations/Dhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-WP.pdf |
1 MB |
DEF CON 22 presentations/Josh Corman and Nicholas Percoco - Updated/DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0-UPDATED.pdf |
1 MB |
DEF CON 22 presentations/Corey Kallenberg - Updated/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation-WP.pdf |
1013 KB |
DEF CON 22 presentations/Shane Macaulay - Updated/DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdf |
999 KB |
DEF CON 22 presentations/Alex Zacharis and Nikolaos Tsagkarakis/Alex Zacharis and Nikolaos Tsagkarakis - Extras.zip |
989 KB |
DEF CON 22 presentations/Ivan Petrov and Svetlana Gaivoronski - Updated/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM.avi |
967 KB |
DEF CON 22 presentations/Jay Healey - Updated/DEFCON-22-Jay-Healey-Saving-the-Internet.pdf |
963 KB |
DEF CON 22 presentations/Luca Bruno and Mariano Graziano - Updated/DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass.pdf |
963 KB |
DEF CON 22 presentations/Chris Littlebury/DEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf |
962 KB |
DEF CON 22 presentations/Glenn Wilkinson - Updated/DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance.pdf |
949 KB |
DEF CON 22 presentations/Fatih Ozavci - Updated/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones.pdf |
824 KB |
DEF CON 22 presentations/Maggie Jauregui - Updated/DEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted.pdf |
815 KB |
DEF CON 22 presentations/Josh Datko and Teddy Reed - Updated/DEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c.pdf |
800 KB |
DEF CON 22 presentations/Metacortex and Grifter/DEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf |
761 KB |
DEF CON 22 presentations/Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-MoCA-Overview-and-Security-Posture-WP.pdf |
741 KB |
DEF CON 22 presentations/Jesse Michael and Mickey Shkatov - Updated/DEFCON-22-Jesse-Michael-Mickey-Shkatov-USB-for-All!!.pdf |
706 KB |
DEF CON 22 presentations/Lance Buttars (Nemus) - Updated/DEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS.pdf |
694 KB |
DEF CON 22 presentations/Shane Macaulay - Updated/DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode.pdf |
657 KB |
DEF CON 22 presentations/Anton Sapozhnikov/DEFCON-22-Anton-Sapozhnikov-Acquire-Current-User-Hashes-Without-Admin-Privileges.pdf |
598 KB |
DEF CON 22 presentations/Geoff Mcdonald - Updated/DEFCON-22-Geoff-Mcdonald-Meddle-Framework.pdf |
591 KB |
DEF CON 22 presentations/Christopher Campbell/DEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf |
587 KB |
DEF CON 22 presentations/Jesus Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf |
560 KB |
DEF CON 22 presentations/Wesley McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware-WP.pdf |
557 KB |
DEF CON 22 presentations/Richard Theime - Updated/Extras.zip |
512 KB |
DEF CON 22 presentations/Blake Self - Updated/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro.pdf |
508 KB |
DEF CON 22 presentations/Graham, McMillan, and Tentler/DEFCON-22-Graham-McMillan-Tentler-Masscaning-the-Internet.pdf |
493 KB |
DEF CON 22 presentations/Andrew Hunt - Updated/Andrew Hunt - Extras.zip |
474 KB |
DEF CON 22 presentations/Brian Gorenc and Matt Molinyawe -Updated/DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly.pdf |
470 KB |
DEF CON 22 presentations/Wesley McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf |
455 KB |
DEF CON 22 presentations/Anch/DEFCON-22-Anch-The-Monkey-In-the-Middle.pdf |
447 KB |
DEF CON 22 presentations/David Dorsey - Updated/DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf |
444 KB |
DEF CON 22 presentations/Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-an-Automated-Penetration-Platform-WP.pdf |
443 KB |
DEF CON 22 presentations/Kyle Kelley and Greg Anderson - Updated/DEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe.pdf |
418 KB |
DEF CON 22 presentations/Luca Bruno and Mariano Graziano - Updated/DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-WP-UPDATED.pdf |
388 KB |
DEF CON 22 presentations/Nir Valtman - Updated/DEFCON22-Nir-Valtman-Extras-A-Journey-To-Protect-POS.zip |
374 KB |
DEF CON 22 presentations/Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On.pdf |
344 KB |
DEF CON 22 presentations/David Wyde/DEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf |
344 KB |
DEF CON 22 presentations/Christopher Campbell/DEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf |
342 KB |
DEF CON 22 presentations/Adam Wirth (SimonJ) - Updated/DEFCON-22-Adam-Wirth-SimonJ-Practical-Foxhunting-101.pdf |
326 KB |
DEF CON 22 presentations/Nir Valtman - Updated/Nir Valtman - Extras.zip |
326 KB |
DEF CON 22 presentations/Mike Larsen and Charlie Vedaa/DEFCON-22-Mike-Larsen-Charlie-Vedaa-Impostor-Polluting-Tor-Metadata.pdf |
311 KB |
DEF CON 22 presentations/Heres, Etemadieh, Baker and Nielsen - Updated/DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things.pdf |
295 KB |
DEF CON 22 presentations/Jim Denaro and Tod Beardsley - Updated/DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit.pdf |
276 KB |
DEF CON 22 presentations/David Dorsey - Updated/DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP.pdf |
271 KB |
DEF CON 22 presentations/Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction.pdf |
268 KB |
DEF CON 22 presentations/Lucas Morris and Michael McAtee/DEFCON-22-Lucas-Morris-Michael-McAtee-ShareEnum-We-Wrapped-Samba.pdf |
239 KB |
DEF CON 22 presentations/Logan Lamb/DEFCON-22-Logan-Lamb-HOME-INSECURITY-NO-ALARMS-FALSE-ALARMS-AND-SIGINT-WP.pdf |
237 KB |
DEF CON 22 presentations/Peter Teoh - Updated/DEFCON-22-Peter-Teoh-Data-Protection-101-Updated.pdf |
231 KB |
DEF CON 22 presentations/Jesus Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room-WP.pdf |
224 KB |
DEF CON 22 presentations/Paul Mcmillan/DEFCON-22-Paul-Mcmillan-Attacking-the-IOT-Using-timing-attacks.pdf |
205 KB |
DEF CON 22 presentations/Richard Klafter and Eric Swanson/DEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf |
198 KB |
DEF CON 22 presentations/Tim Mcguffin/DEFCON-22-Tim-Mcguffin-One-Man-Shop.pdf |
186 KB |
DEF CON 22 presentations/Josh Corman and Nicholas Percoco - Updated/DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0.pdf |
160 KB |
DEF CON 22 presentations/Paul Drapeau and Brent Dukes - Updated/Paul Drapeau and Brent Dukes - Extras.zip |
144 KB |
DEF CON 22 presentations/David Litchfeild/DEFCON-22-David-Litchfeild-Oracle-Data-Redaction-is-Broken.pdf |
134 KB |
DEF CON 22 presentations/Peter Teoh - Updated/DEFCON-22-Peter-Teoh-Data-Protection-101.pdf |
132 KB |
DEF CON 22 presentations/Pierce and Loki/DEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf |
105 KB |
DEF CON 22 presentations/Paul Vixie/DEFCON-22-Paul-Vixie-WP.pdf |
100 KB |
DEF CON 22 presentations/Paul Vixie/DEFCON-22-Paul-Vixie-2014-07-15-botnets.pdf |
100 KB |
DEF CON 22 presentations/Viproy - Updated Extras.zip |
74 KB |
DEF CON 22 presentations/Fatih Ozavci - Updated/Fatih Ozavci - Extras.zip |
72 KB |
DEF CON 22 presentations/Shane Macaulay - Updated/Shane Macaulay - Extras.zip |
68 KB |
DEF CON 22 presentations/David Mortman and The Fail Panel/DEFCON-22-Fail-Panel-Defcon-Comedy-Jam-VII.pdf |
50 KB |
DEF CON 22 presentations/Phillip Young - Updated/Phillip Young - Extras.zip |
38 KB |
DEF CON 22 presentations/David Wyde/David Wyde - Extras.zip |
36 KB |
DEF CON 22 presentations/Alexandre Moneger - Updated/Alexandre Moneger - Extras.zip |
34 KB |
DEF CON 22 presentations/Michael Ossman/DEFCON-22-Michael-Ossmann-CONGAFLOCK-schematic.pdf |
28 KB |
DEF CON 22 presentations/Blake Self - Updated/Blake Self - Extras.zip |
24 KB |
DEF CON 22 presentations/Gregory Pickett - Updated/Gregory Pickett - Extras.zip |
15 KB |
DEF CON 22 presentations/Phil Polstra - Updated/.DS_Store |
6 KB |
DEF CON 22 presentations/Richard Theime - Updated/.DS_Store |
6 KB |
DEF CON 22 presentations/Nir Valtman - Updated/DEFCON-22-Nir-Valtman-Extras-Bug-Bounty-Programs-Evolution.zip |
2 KB |