Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
_hyp3ri0n aka Alejandro Caceres Jason Hopper - PunkSPIDER and IOStation- Making a Mess All Over the Internet.pptx |
4.07Мб |
01 - Skittish & Bus - The Signal (featuring The Dark Tangent).flac |
62.21Мб |
01 - Skittish & Bus - The Signal (featuring The Dark Tangent).opus |
11.59Мб |
02 - Archwisp - Throw It Back (featuring Jotunvillur).flac |
47.59Мб |
02 - Archwisp - Throw It Back (featuring Jotunvillur).opus |
10.27Мб |
03 - RBM - The Incident.flac |
111.04Мб |
03 - RBM - The Incident.opus |
20.51Мб |
04 - Seeker - Modulations.flac |
94.02Мб |
04 - Seeker - Modulations.opus |
17.36Мб |
05 - Mystery Club - Starlight (GOASTS Human In The Loop Remix).flac |
58.11Мб |
05 - Mystery Club - Starlight (GOASTS Human In The Loop Remix).opus |
13.00Мб |
06 - Mateusz Drozd - Station X1 Galaxy Citron.flac |
32.36Мб |
06 - Mateusz Drozd - Station X1 Galaxy Citron.opus |
7.21Мб |
07 - bash explode - serial.flac |
39.27Мб |
07 - bash explode - serial.opus |
9.59Мб |
08 - Synd - Close Your Eyes.flac |
68.45Мб |
08 - Synd - Close Your Eyes.opus |
12.39Мб |
09 - DJ Spin & Tonic - Val's Dragon.flac |
38.15Мб |
09 - DJ Spin & Tonic - Val's Dragon.opus |
7.84Мб |
10 - 1336 - Synapticity.flac |
31.51Мб |
10 - 1336 - Synapticity.opus |
6.70Мб |
11 - pbarry25 - We're All Alike (Original Mix).flac |
32.81Мб |
11 - pbarry25 - We're All Alike (Original Mix).opus |
9.23Мб |
12 - c64 - Sunsetting.flac |
47.68Мб |
12 - c64 - Sunsetting.opus |
12.09Мб |
13 - Autocorrect - Outside.flac |
20.34Мб |
13 - Autocorrect - Outside.opus |
4.51Мб |
14 - Yung Innanet - Unbound (Max James Remix).flac |
32.81Мб |
14 - Yung Innanet - Unbound (Max James Remix).opus |
6.24Мб |
15 - int eighty - No Answer.flac |
28.47Мб |
15 - int eighty - No Answer.opus |
6.10Мб |
16 - Damn The Data - Can't Stop The Signal.flac |
56.59Мб |
16 - Damn The Data - Can't Stop The Signal.opus |
9.97Мб |
17 - Mikal kHill - Spent Our Lives On Fire (featuring Tribe One).flac |
33.12Мб |
17 - Mikal kHill - Spent Our Lives On Fire (featuring Tribe One).opus |
5.85Мб |
18 - Ohm-I - Domain (featuring Yung Innanet) (Remix).flac |
50.96Мб |
18 - Ohm-I - Domain (featuring Yung Innanet) (Remix).opus |
10.78Мб |
19 - KEN BAE BG - Barking For Broccoli (featuring Marni Doll & Boppy Stitch) (DEF CON 29 Edit).flac |
46.72Мб |
19 - KEN BAE BG - Barking For Broccoli (featuring Marni Doll & Boppy Stitch) (DEF CON 29 Edit).opus |
9.00Мб |
20 - Rushfell - Bad Wisdom.flac |
63.93Мб |
20 - Rushfell - Bad Wisdom.opus |
13.10Мб |
21 - Dual Core - The Same Time.flac |
35.18Мб |
21 - Dual Core - The Same Time.opus |
7.19Мб |
Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.pdf |
4.67Мб |
Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.pptx |
4.95Мб |
Agent X - TBA.pptx |
7.97Мб |
Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.pdf |
440.42Кб |
Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.pptx |
843.15Кб |
Babak Javadi Nick Draffen Eric Bettse Anze Jensterle - The PACS-man Comes For Us All.pdf |
68.10Мб |
Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.pdf |
1.96Мб |
Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.pptx |
45.17Мб |
Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.key |
12.49Мб |
Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.pdf |
14.63Мб |
Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.pptx |
10.23Мб |
Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.pdf |
9.15Мб |
Brian Hong - Sleight of ARM - Demystifying Intel Houdini.pdf |
3.14Мб |
Brian Hong - Sleight of ARM - Demystifying Intel Houdini-Slides.pdf |
4.61Мб |
Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.pdf |
22.88Мб |
Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.pptx |
298.77Мб |
Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.pdf |
2.04Мб |
Christopher Wade - Breaking Secure Bootloaders.pdf |
1.53Мб |
Claire Vacherot - Sneak into buildings with KNXnetIP.pdf |
2.81Мб |
cover.png |
370.42Кб |
cover.png |
370.42Кб |
Dan Petro - Youre Doing IoT RNG.pdf |
794.36Кб |
David Dworken - Worming through IDEs.pdf |
1.94Мб |
DC29 logo - 3d swril.mp4 |
39.04Мб |
DC29 logo - blob.mp4 |
31.34Мб |
DC29 logo - Flowing purple blob wave.mp4 |
16.42Мб |
DC29 logo - fly over wavy grid.mp4 |
38.90Мб |
DC29 logo - green fast sweep.mp4 |
17.63Мб |
DC29 logo - green glitchy.mp4 |
19.69Мб |
DC29 logo - origami.mp4 |
39.05Мб |
DC29 logo - wavy crystal.mp4 |
39.04Мб |
DC29 logo - wire tunnel fast.mp4 |
38.88Мб |
DC29 logo - Xwing targeting computer.mp4 |
25.94Мб |
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.mp4 |
118.90Мб |
DEF CON 29 Adversary Village - Abhijith B R - Village kick-off.mp4 |
20.90Мб |
DEF CON 29 Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.mp4 |
52.50Мб |
DEF CON 29 Adversary Village - Carlos Polop - New generation of PEAS.mp4 |
69.87Мб |
DEF CON 29 Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.mp4 |
90.44Мб |
DEF CON 29 Adversary Village - Daniel Duggan - Designing a C2 Framework.mp4 |
90.74Мб |
DEF CON 29 Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.mp4 |
65.25Мб |
DEF CON 29 Adversary Village - David Hunt - Prelude Operator.mp4 |
70.36Мб |
DEF CON 29 Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.mp4 |
283.99Мб |
DEF CON 29 Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.mp4 |
66.64Мб |
DEF CON 29 Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.mp4 |
51.39Мб |
DEF CON 29 Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.mp4 |
110.00Мб |
DEF CON 29 Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.mp4 |
33.84Мб |
DEF CON 29 Adversary Village - Keynote - David Kennedy.mp4 |
87.05Мб |
DEF CON 29 Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.mp4 |
108.78Мб |
DEF CON 29 Adversary Village - Mark Loveless - A Short History and An Example Attack.mp4 |
67.20Мб |
DEF CON 29 Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.mp4 |
80.39Мб |
DEF CON 29 Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.mp4 |
67.89Мб |
DEF CON 29 Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.mp4 |
58.64Мб |
DEF CON 29 Adversary Village - Phillip Wylie - The Way of The Adversary.mp4 |
39.50Мб |
DEF CON 29 Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.mp4 |
64.48Мб |
DEF CON 29 Adversary Village - Sanne Maasakkers - Phish Like An APT.mp4 |
59.56Мб |
DEF CON 29 Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.mp4 |
61.86Мб |
DEF CON 29 Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).mp4 |
56.71Мб |
DEF CON 29 Adversary Village - Stephan Wampouille - Autonomous lateral movement.mp4 |
21.21Мб |
DEF CON 29 - Agent X - A look inside security at the New York Times.mp4 |
88.58Мб |
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.mp4 |
38.30Мб |
DEF CON 29 AutoDriving CTF - Junjie Shen - adcprog_env.rar |
89.85Мб |
DEF CON 29 AutoDriving CTF - Junjie Shen - advnpc_env.rar |
161.88Мб |
DEF CON 29 AutoDriving CTF - Junjie Shen - gpsspoof_env.rar |
156.56Мб |
DEF CON 29 AutoDriving CTF - Junjie Shen - lanedet_env.rar |
169.77Мб |
DEF CON 29 AutoDrivingCTF - Zhisheng - DemoChallenges.mp4 |
8.08Мб |
DEF CON 29 AutoDrivingCTF - Zhisheng - Intro.txt |
879б |
DEF CON 29 AutoDrivingCTF - Zhisheng - logo.png |
327.97Кб |
DEF CON 29 - Babak Javadi Nick Draffen Eric Bettse Anze Jensterle - The PACS-man Comes For Us All.mp4 |
101.74Мб |
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.mp4 |
95.57Мб |
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.mp4 |
114.06Мб |
DEF CON 29 BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.mp4 |
40.20Мб |
DEF CON 29 BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.mp4 |
24.16Мб |
DEF CON 29 BIC Village - Nico Smith - 40 Cores and A CPU.mp4 |
50.54Мб |
DEF CON 29 BIC Village - Ochaun Marshall - The OPSEC of Protesting.mp4 |
46.67Мб |
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.mp4 |
100.31Мб |
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.mp4 |
84.51Мб |
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.mp4 |
119.53Мб |
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.mp4 |
80.88Мб |
DEF CON 29 - Christian quaddi Dameff MD Jeff r3plicant Tully MD Jessica Wilkerson Josh Corman - Do No harm- Health Panel.mp4 |
130.07Мб |
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.mp4 |
84.32Мб |
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.mp4 |
83.78Мб |
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.mp4 |
82.55Мб |
DEF CON 29 - Dan Petro - You're Doing IoT RNG.mp4 |
103.67Мб |
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.mp4 |
4.81Мб |
DEF CON 29 - David Dworken - Worming through IDEs.mp4 |
35.09Мб |
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.mp4 |
58.59Мб |
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.mp4 |
46.69Мб |
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.mp4 |
44.26Мб |
DEF CON 29 - Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.mp4 |
63.55Мб |
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.mp4 |
168.53Мб |
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.mp4 |
78.02Мб |
DEF CON 29 HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.mp4 |
69.23Мб |
DEF CON 29 HHV - Bradan Lane - The PortaProg Project.mp4 |
96.24Мб |
DEF CON 29 HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.mp4 |
28.51Мб |
DEF CON 29 - hyp3ri0n aka Alejandro Caceres Jason Hopper - PunkSPIDER and IOStation- Making a Mess All Over the Internet.mp4 |
93.57Мб |
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.mp4 |
63.46Мб |
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.mp4 |
3.68Мб |
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.mp4 |
5.88Мб |
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.mp4 |
5.54Мб |
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.mp4 |
81.49Мб |
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.mp4 |
47.99Мб |
DEFCON 29 IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.mp4 |
98.79Мб |
DEFCON 29 IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.mp4 |
83.62Мб |
DEFCON 29 IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.mp4 |
91.78Мб |
DEFCON 29 IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.mp4 |
57.85Мб |
DEFCON 29 IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.mp4 |
125.47Мб |
DEFCON 29 IoT Village - Hutch - Alexa Have You Been Compromised.mp4 |
86.94Мб |
DEFCON 29 IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.mp4 |
99.63Мб |
DEFCON 29 IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.mp4 |
41.61Мб |
DEFCON 29 IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.mp4 |
111.05Мб |
DEFCON 29 IoT Village - Messdaghi and Eddy - Representation Matters.mp4 |
75.20Мб |
DEFCON 29 IoT Village - Petro and Cecil - You're Doing IoT RNG.mp4 |
83.81Мб |
DEFCON 29 IoT Village - Ria Cheruvu - Ethics at the Edge.mp4 |
72.89Мб |
DEFCON 29 IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.mp4 |
51.96Мб |
DEFCON 29 IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.mp4 |
80.27Мб |
DEFCON 29 IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.mp4 |
66.70Мб |
DEFCON 29 IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.mp4 |
97.41Мб |
DEFCON 29 IoT Village - Victor Hanna - LED Light Lunacy.mp4 |
56.45Мб |
DEFCON 29 IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.mp4 |
71.43Мб |
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.mp4 |
72.21Мб |
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.mp4 |
83.64Мб |
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.mp4 |
46.75Мб |
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.mp4 |
95.84Мб |
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Demo.mp4 |
7.73Мб |
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.mp4 |
69.17Мб |
DEF CON 29 - Joseph Gabay - DoS- Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.mp4 |
51.95Мб |
DEF CON 29 - Joseph Gabay - Dos- Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.mp4 |
2.11Мб |
DEF CON 29 - Joseph Gabay - Dos- Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.mp4 |
2.20Мб |
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.mp4 |
69.64Мб |
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2 - Demo Palo Alto.mp4 |
3.82Мб |
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2 - Demo SonicWall.mp4 |
3.13Мб |
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.mp4 |
80.25Мб |
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.mp4 |
126.08Мб |
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.mp4 |
146.76Мб |
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.mp4 |
82.99Мб |
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.mp4 |
90.43Мб |
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.mp4 |
81.05Мб |
DEF CON 29 - Mickey Shkatov Jesse Michael - High-Stakes Updates - BIOS RCE OMG WTF BBQ.mp4 |
62.87Мб |
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.mp4 |
102.78Мб |
DEF CON 29 OST README.txt |
2.18Кб |
DEF CON 29 OST README.txt |
2.18Кб |
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.mp4 |
87.91Мб |
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.mp4 |
11.75Мб |
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.mp4 |
98.81Мб |
DEF CON 29 Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.mp4 |
52.85Мб |
DEF CON 29 Payment Village - Meadow Ellis - Automated Tear Machines.mp4 |
92.43Мб |
DEF CON 29 Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.mp4 |
25.20Мб |
DEF CON 29 Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.mp4 |
21.64Мб |
DEF CON 29 - Paz Hameiri - TEMPEST radio station.mp4 |
136.23Мб |
DEF CON 29 program.pdf |
12.56Мб |
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.mp4 |
63.86Мб |
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.mp4 |
97.94Мб |
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.mp4 |
7.67Мб |
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.mp4 |
94.35Мб |
DEF CON 29 - Richard Thieme AKA neuralcowboy - UFOs - Misinformation, Disinformation, and the Basic Truth.mp4 |
93.31Мб |
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.mp4 |
97.42Мб |
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.mp4 |
127.25Мб |
DEF CON 29 - Roy Davis - No Key-No PIN-No Combo - No Problem P0wning ATMs For Fun and Profit.mp4 |
103.44Мб |
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.mp4 |
92.82Мб |
DEF CON 29 - Salvador Mendoza - PINATA- PIN Automatic Try Attack.mp4 |
68.25Мб |
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.mp4 |
83.04Мб |
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.mp4 |
97.14Мб |
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.mp4 |
55.53Мб |
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.mp4 |
43.25Мб |
DEF CON 29 Sicker Contest - 1.png |
412.98Кб |
DEF CON 29 Sicker Contest - 10.png |
2.88Мб |
DEF CON 29 Sicker Contest - 11.png |
265.68Кб |
DEF CON 29 Sicker Contest - 12.png |
2.66Мб |
DEF CON 29 Sicker Contest - 2.png |
1.13Мб |
DEF CON 29 Sicker Contest - 3.png |
1.90Мб |
DEF CON 29 Sicker Contest - 4.png |
9.48Мб |
DEF CON 29 Sicker Contest - 5.png |
2.19Мб |
DEF CON 29 Sicker Contest - 6.png |
5.94Мб |
DEF CON 29 Sicker Contest - 7.png |
2.59Мб |
DEF CON 29 Sicker Contest - 8.png |
96.47Кб |
DEF CON 29 Sicker Contest - 9.png |
3.03Мб |
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.mp4 |
48.42Мб |
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.mp4 |
3.05Мб |
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.mp4 |
86.08Мб |
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.mp4 |
74.30Мб |
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.mp4 |
71.16Мб |
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.mp4 |
61.77Мб |
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.mp4 |
200.02Мб |
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).mp4 |
54.19Мб |
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.mp4 |
3.73Мб |
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.mp4 |
4.21Мб |
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.mp4 |
2.47Мб |
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.mp4 |
3.92Мб |
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.mp4 |
6.17Мб |
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.mp4 |
3.36Мб |
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.mp4 |
3.48Мб |
DEF CON 29 Workshop Anthony Rose Evading Detection A Beginners Guide to Obfuscation.pdf |
3.32Мб |
DEF CON 29 Workshop Ash Secure Messaging.pdf |
1.90Мб |
DEF CON 29 Workshop Ben Kurtz Writing Golang Malwar.pdf |
10.86Мб |
DEF CON 29 Workshop Ben Kurtz Writing Golang Malware Workshop Source.zip |
70.96Мб |
DEF CON 29 Workshop Eigentourist Hacking The Metal.pdf |
1.07Мб |
DEF CON 29 Workshop Kristy Westphal Analysis 101 and 102 For Incident Responders.pdf |
3.62Мб |
DEF CON 29 Workshop Michael Solomon DFIRADA Slides Student.pdf |
1.70Мб |
DEF CON 29 Workshop Michael Solomon DFIRADA VM Hashes.txt |
201б |
DEF CON 29 Workshop Michael Solomon DFIRADA Welcome README.txt |
917б |
DEF CON 29 Workshop Philippe Delteil Bug Bounty Workshop.pdf |
859.31Кб |
DEF CON 29 Workshop Romain Zaikin From Zero to Hero in Web Security Research.pdf |
5.38Мб |
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.mp4 |
66.02Мб |
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.mp4 |
65.24Мб |
Democrasoft by Burninator.txt |
17.93Кб |
Dennis Giese - Robots with lasers and cameras but no security- Liberating your vacuum from the cloud.pdf |
249.45Мб |
Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.pptx |
2.77Мб |
Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.pdf |
3.41Мб |
Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.pptx |
10.69Мб |
FIRST PLACE - Networks by Gwisinkoht.txt |
20.43Кб |
Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.pdf |
4.48Мб |
Hacker Empress - Pandemic Love (2020) DC29.jpeg |
1.60Мб |
Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.pdf |
14.37Мб |
Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.pdf |
44.27Мб |
Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-goose.txt |
686б |
Ian Vitek - Central bank digital currency, threats and vulnerabilities.pdf |
1.70Мб |
Ian Vitek - Central bank digital currency, threats and vulnerabilities.pptx |
4.42Мб |
Inna Vasilye-Pika DC29.jpg |
12.92Мб |
Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.pdf |
567.33Кб |
Jacob Baines - Bring Your Own Print Driver Vulnerability.pdf |
4.74Мб |
James Kettle - HTTP2 - The Sequel is Always Worse - Slides.pdf |
975.27Кб |
James Kettle - HTTP2 - The Sequel is Always Worse - Whitepaper.pdf |
656.04Кб |
Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High(-Level) Languages.pdf |
1.25Мб |
Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.pdf |
2.38Мб |
Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.pptx |
5.19Мб |
jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.pdf |
3.89Мб |
Jorge Amezuca DC29.jpg |
6.62Мб |
Joseph Gabay - Dos- Denial of Shopping – Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.pdf |
11.74Мб |
Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.pdf |
3.98Мб |
Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.odp |
6.46Мб |
Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.pdf |
4.86Мб |
Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.pdf |
9.39Мб |
Lucy Nguyen DC29.png |
476.70Кб |
Malin Hess DC29.png |
4.67Мб |
Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.pdf |
6.57Мб |
Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric - tools.zip |
1.74Кб |
Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.pdf |
980.20Кб |
Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections - Slides.pdf |
709.42Кб |
Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.pdf |
4.94Мб |
Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.pptx |
22.84Мб |
Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.pdf |
13.33Мб |
Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.pdf |
2.57Мб |
PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.pdf |
1.81Мб |
Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.pdf |
26.48Мб |
Paz Hameiri - TEMPEST radio station.pdf |
553.98Кб |
Paz Hameiri - TEMPEST radio station-Slides.pdf |
1.09Мб |
PEOPLES CHOICE AWARD - FAICT by Serum.txt |
30.92Кб |
Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.pdf |
776.44Кб |
Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.pdf |
4.84Мб |
Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.pdf |
7.33Мб |
Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.pptx |
28.76Мб |
Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.pdf |
4.57Мб |
Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.pdf |
12.37Мб |
Rotem Bar - Abusing SAST tools When scanners do more than just scanning.pdf |
3.40Мб |
Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.pdf |
28.75Мб |
Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.pdf |
2.64Мб |
Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.pptx |
5.31Мб |
Salvador Mendoza - PINATA- PIN Automatic Try Attack.pdf |
7.27Мб |
Salvador Mendoza - PINATA- PIN Automatic Try Attack - Slides.pdf |
74.03Мб |
Samarkand - Hacking Viber Messenger with 0day Vulnerabilities- Sniffing and DoS.pdf |
13.06Мб |
Samarkand - Hacking Viber Messenger with 0day Vulnerabilities- Sniffing and DoS.zip |
100.90Мб |
SECOND PLACE - Repository Upload by Alfred Rowdy.txt |
8.59Кб |
Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.pdf |
2.59Мб |
Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.pdf |
13.48Мб |
Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.odp |
28.13Мб |
Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.pdf |
13.46Мб |
Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Slides.pdf |
1023.43Кб |
Tamas K Lengyel - Fuzzing Linux with Xen.pdf |
10.02Мб |
The Indomitable Signal by Panda.txt |
12.87Кб |
Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.pdf |
9.01Мб |
Tianze Ding - Vulnerability Exchange- One Domain Account For More Than Exchange Server RCE.pdf |
9.01Мб |
Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.pdf |
17.17Мб |
Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.pptx |
20.22Мб |
Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.pdf |
7.17Мб |
ToxicBBQ-History-Continuous.pdf |
2.76Мб |
ToxicBBQ-History-Zine-Printable.pdf |
8.20Мб |
Untitled by phonebook.txt |
11.74Кб |
Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).pdf |
6.78Мб |
Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).pptx |
12.99Мб |
Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.pdf |
6.29Мб |
Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.pdf |
3.73Мб |