Общая информация
Название DEF CON 29
Тип
Размер 12.96Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
_hyp3ri0n aka Alejandro Caceres Jason Hopper - PunkSPIDER and IOStation- Making a Mess All Over the Internet.pptx 4.07Мб
01 - Skittish & Bus - The Signal (featuring The Dark Tangent).flac 62.21Мб
01 - Skittish & Bus - The Signal (featuring The Dark Tangent).opus 11.59Мб
02 - Archwisp - Throw It Back (featuring Jotunvillur).flac 47.59Мб
02 - Archwisp - Throw It Back (featuring Jotunvillur).opus 10.27Мб
03 - RBM - The Incident.flac 111.04Мб
03 - RBM - The Incident.opus 20.51Мб
04 - Seeker - Modulations.flac 94.02Мб
04 - Seeker - Modulations.opus 17.36Мб
05 - Mystery Club - Starlight (GOASTS Human In The Loop Remix).flac 58.11Мб
05 - Mystery Club - Starlight (GOASTS Human In The Loop Remix).opus 13.00Мб
06 - Mateusz Drozd - Station X1 Galaxy Citron.flac 32.36Мб
06 - Mateusz Drozd - Station X1 Galaxy Citron.opus 7.21Мб
07 - bash explode - serial.flac 39.27Мб
07 - bash explode - serial.opus 9.59Мб
08 - Synd - Close Your Eyes.flac 68.45Мб
08 - Synd - Close Your Eyes.opus 12.39Мб
09 - DJ Spin & Tonic - Val's Dragon.flac 38.15Мб
09 - DJ Spin & Tonic - Val's Dragon.opus 7.84Мб
10 - 1336 - Synapticity.flac 31.51Мб
10 - 1336 - Synapticity.opus 6.70Мб
11 - pbarry25 - We're All Alike (Original Mix).flac 32.81Мб
11 - pbarry25 - We're All Alike (Original Mix).opus 9.23Мб
12 - c64 - Sunsetting.flac 47.68Мб
12 - c64 - Sunsetting.opus 12.09Мб
13 - Autocorrect - Outside.flac 20.34Мб
13 - Autocorrect - Outside.opus 4.51Мб
14 - Yung Innanet - Unbound (Max James Remix).flac 32.81Мб
14 - Yung Innanet - Unbound (Max James Remix).opus 6.24Мб
15 - int eighty - No Answer.flac 28.47Мб
15 - int eighty - No Answer.opus 6.10Мб
16 - Damn The Data - Can't Stop The Signal.flac 56.59Мб
16 - Damn The Data - Can't Stop The Signal.opus 9.97Мб
17 - Mikal kHill - Spent Our Lives On Fire (featuring Tribe One).flac 33.12Мб
17 - Mikal kHill - Spent Our Lives On Fire (featuring Tribe One).opus 5.85Мб
18 - Ohm-I - Domain (featuring Yung Innanet) (Remix).flac 50.96Мб
18 - Ohm-I - Domain (featuring Yung Innanet) (Remix).opus 10.78Мб
19 - KEN BAE BG - Barking For Broccoli (featuring Marni Doll & Boppy Stitch) (DEF CON 29 Edit).flac 46.72Мб
19 - KEN BAE BG - Barking For Broccoli (featuring Marni Doll & Boppy Stitch) (DEF CON 29 Edit).opus 9.00Мб
20 - Rushfell - Bad Wisdom.flac 63.93Мб
20 - Rushfell - Bad Wisdom.opus 13.10Мб
21 - Dual Core - The Same Time.flac 35.18Мб
21 - Dual Core - The Same Time.opus 7.19Мб
Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.pdf 4.67Мб
Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.pptx 4.95Мб
Agent X - TBA.pptx 7.97Мб
Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.pdf 440.42Кб
Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.pptx 843.15Кб
Babak Javadi Nick Draffen Eric Bettse Anze Jensterle - The PACS-man Comes For Us All.pdf 68.10Мб
Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.pdf 1.96Мб
Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.pptx 45.17Мб
Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.key 12.49Мб
Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.pdf 14.63Мб
Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.pptx 10.23Мб
Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.pdf 9.15Мб
Brian Hong - Sleight of ARM - Demystifying Intel Houdini.pdf 3.14Мб
Brian Hong - Sleight of ARM - Demystifying Intel Houdini-Slides.pdf 4.61Мб
Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.pdf 22.88Мб
Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.pptx 298.77Мб
Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.pdf 2.04Мб
Christopher Wade - Breaking Secure Bootloaders.pdf 1.53Мб
Claire Vacherot - Sneak into buildings with KNXnetIP.pdf 2.81Мб
cover.png 370.42Кб
cover.png 370.42Кб
Dan Petro - Youre Doing IoT RNG.pdf 794.36Кб
David Dworken - Worming through IDEs.pdf 1.94Мб
DC29 logo - 3d swril.mp4 39.04Мб
DC29 logo - blob.mp4 31.34Мб
DC29 logo - Flowing purple blob wave.mp4 16.42Мб
DC29 logo - fly over wavy grid.mp4 38.90Мб
DC29 logo - green fast sweep.mp4 17.63Мб
DC29 logo - green glitchy.mp4 19.69Мб
DC29 logo - origami.mp4 39.05Мб
DC29 logo - wavy crystal.mp4 39.04Мб
DC29 logo - wire tunnel fast.mp4 38.88Мб
DC29 logo - Xwing targeting computer.mp4 25.94Мб
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.mp4 118.90Мб
DEF CON 29 Adversary Village - Abhijith B R - Village kick-off.mp4 20.90Мб
DEF CON 29 Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.mp4 52.50Мб
DEF CON 29 Adversary Village - Carlos Polop - New generation of PEAS.mp4 69.87Мб
DEF CON 29 Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.mp4 90.44Мб
DEF CON 29 Adversary Village - Daniel Duggan - Designing a C2 Framework.mp4 90.74Мб
DEF CON 29 Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.mp4 65.25Мб
DEF CON 29 Adversary Village - David Hunt - Prelude Operator.mp4 70.36Мб
DEF CON 29 Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.mp4 283.99Мб
DEF CON 29 Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.mp4 66.64Мб
DEF CON 29 Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.mp4 51.39Мб
DEF CON 29 Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.mp4 110.00Мб
DEF CON 29 Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.mp4 33.84Мб
DEF CON 29 Adversary Village - Keynote - David Kennedy.mp4 87.05Мб
DEF CON 29 Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.mp4 108.78Мб
DEF CON 29 Adversary Village - Mark Loveless - A Short History and An Example Attack.mp4 67.20Мб
DEF CON 29 Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.mp4 80.39Мб
DEF CON 29 Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.mp4 67.89Мб
DEF CON 29 Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.mp4 58.64Мб
DEF CON 29 Adversary Village - Phillip Wylie - The Way of The Adversary.mp4 39.50Мб
DEF CON 29 Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.mp4 64.48Мб
DEF CON 29 Adversary Village - Sanne Maasakkers - Phish Like An APT.mp4 59.56Мб
DEF CON 29 Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.mp4 61.86Мб
DEF CON 29 Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).mp4 56.71Мб
DEF CON 29 Adversary Village - Stephan Wampouille - Autonomous lateral movement.mp4 21.21Мб
DEF CON 29 - Agent X - A look inside security at the New York Times.mp4 88.58Мб
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.mp4 38.30Мб
DEF CON 29 AutoDriving CTF - Junjie Shen - adcprog_env.rar 89.85Мб
DEF CON 29 AutoDriving CTF - Junjie Shen - advnpc_env.rar 161.88Мб
DEF CON 29 AutoDriving CTF - Junjie Shen - gpsspoof_env.rar 156.56Мб
DEF CON 29 AutoDriving CTF - Junjie Shen - lanedet_env.rar 169.77Мб
DEF CON 29 AutoDrivingCTF - Zhisheng - DemoChallenges.mp4 8.08Мб
DEF CON 29 AutoDrivingCTF - Zhisheng - Intro.txt 879б
DEF CON 29 AutoDrivingCTF - Zhisheng - logo.png 327.97Кб
DEF CON 29 - Babak Javadi Nick Draffen Eric Bettse Anze Jensterle - The PACS-man Comes For Us All.mp4 101.74Мб
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.mp4 95.57Мб
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.mp4 114.06Мб
DEF CON 29 BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.mp4 40.20Мб
DEF CON 29 BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.mp4 24.16Мб
DEF CON 29 BIC Village - Nico Smith - 40 Cores and A CPU.mp4 50.54Мб
DEF CON 29 BIC Village - Ochaun Marshall - The OPSEC of Protesting.mp4 46.67Мб
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.mp4 100.31Мб
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.mp4 84.51Мб
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.mp4 119.53Мб
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.mp4 80.88Мб
DEF CON 29 - Christian quaddi Dameff MD Jeff r3plicant Tully MD Jessica Wilkerson Josh Corman - Do No harm- Health Panel.mp4 130.07Мб
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.mp4 84.32Мб
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.mp4 83.78Мб
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.mp4 82.55Мб
DEF CON 29 - Dan Petro - You're Doing IoT RNG.mp4 103.67Мб
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.mp4 4.81Мб
DEF CON 29 - David Dworken - Worming through IDEs.mp4 35.09Мб
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.mp4 58.59Мб
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.mp4 46.69Мб
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.mp4 44.26Мб
DEF CON 29 - Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.mp4 63.55Мб
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.mp4 168.53Мб
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.mp4 78.02Мб
DEF CON 29 HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.mp4 69.23Мб
DEF CON 29 HHV - Bradan Lane - The PortaProg Project.mp4 96.24Мб
DEF CON 29 HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.mp4 28.51Мб
DEF CON 29 - hyp3ri0n aka Alejandro Caceres Jason Hopper - PunkSPIDER and IOStation- Making a Mess All Over the Internet.mp4 93.57Мб
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.mp4 63.46Мб
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.mp4 3.68Мб
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.mp4 5.88Мб
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.mp4 5.54Мб
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.mp4 81.49Мб
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.mp4 47.99Мб
DEFCON 29 IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.mp4 98.79Мб
DEFCON 29 IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.mp4 83.62Мб
DEFCON 29 IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.mp4 91.78Мб
DEFCON 29 IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.mp4 57.85Мб
DEFCON 29 IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.mp4 125.47Мб
DEFCON 29 IoT Village - Hutch - Alexa Have You Been Compromised.mp4 86.94Мб
DEFCON 29 IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.mp4 99.63Мб
DEFCON 29 IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.mp4 41.61Мб
DEFCON 29 IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.mp4 111.05Мб
DEFCON 29 IoT Village - Messdaghi and Eddy - Representation Matters.mp4 75.20Мб
DEFCON 29 IoT Village - Petro and Cecil - You're Doing IoT RNG.mp4 83.81Мб
DEFCON 29 IoT Village - Ria Cheruvu - Ethics at the Edge.mp4 72.89Мб
DEFCON 29 IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.mp4 51.96Мб
DEFCON 29 IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.mp4 80.27Мб
DEFCON 29 IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.mp4 66.70Мб
DEFCON 29 IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.mp4 97.41Мб
DEFCON 29 IoT Village - Victor Hanna - LED Light Lunacy.mp4 56.45Мб
DEFCON 29 IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.mp4 71.43Мб
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.mp4 72.21Мб
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.mp4 83.64Мб
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.mp4 46.75Мб
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.mp4 95.84Мб
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Demo.mp4 7.73Мб
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.mp4 69.17Мб
DEF CON 29 - Joseph Gabay - DoS- Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.mp4 51.95Мб
DEF CON 29 - Joseph Gabay - Dos- Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.mp4 2.11Мб
DEF CON 29 - Joseph Gabay - Dos- Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.mp4 2.20Мб
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.mp4 69.64Мб
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2 - Demo Palo Alto.mp4 3.82Мб
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2 - Demo SonicWall.mp4 3.13Мб
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.mp4 80.25Мб
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.mp4 126.08Мб
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.mp4 146.76Мб
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.mp4 82.99Мб
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.mp4 90.43Мб
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.mp4 81.05Мб
DEF CON 29 - Mickey Shkatov Jesse Michael - High-Stakes Updates - BIOS RCE OMG WTF BBQ.mp4 62.87Мб
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.mp4 102.78Мб
DEF CON 29 OST README.txt 2.18Кб
DEF CON 29 OST README.txt 2.18Кб
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.mp4 87.91Мб
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.mp4 11.75Мб
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.mp4 98.81Мб
DEF CON 29 Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.mp4 52.85Мб
DEF CON 29 Payment Village - Meadow Ellis - Automated Tear Machines.mp4 92.43Мб
DEF CON 29 Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.mp4 25.20Мб
DEF CON 29 Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.mp4 21.64Мб
DEF CON 29 - Paz Hameiri - TEMPEST radio station.mp4 136.23Мб
DEF CON 29 program.pdf 12.56Мб
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.mp4 63.86Мб
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.mp4 97.94Мб
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.mp4 7.67Мб
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.mp4 94.35Мб
DEF CON 29 - Richard Thieme AKA neuralcowboy - UFOs - Misinformation, Disinformation, and the Basic Truth.mp4 93.31Мб
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.mp4 97.42Мб
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.mp4 127.25Мб
DEF CON 29 - Roy Davis - No Key-No PIN-No Combo - No Problem P0wning ATMs For Fun and Profit.mp4 103.44Мб
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.mp4 92.82Мб
DEF CON 29 - Salvador Mendoza - PINATA- PIN Automatic Try Attack.mp4 68.25Мб
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.mp4 83.04Мб
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.mp4 97.14Мб
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.mp4 55.53Мб
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.mp4 43.25Мб
DEF CON 29 Sicker Contest - 1.png 412.98Кб
DEF CON 29 Sicker Contest - 10.png 2.88Мб
DEF CON 29 Sicker Contest - 11.png 265.68Кб
DEF CON 29 Sicker Contest - 12.png 2.66Мб
DEF CON 29 Sicker Contest - 2.png 1.13Мб
DEF CON 29 Sicker Contest - 3.png 1.90Мб
DEF CON 29 Sicker Contest - 4.png 9.48Мб
DEF CON 29 Sicker Contest - 5.png 2.19Мб
DEF CON 29 Sicker Contest - 6.png 5.94Мб
DEF CON 29 Sicker Contest - 7.png 2.59Мб
DEF CON 29 Sicker Contest - 8.png 96.47Кб
DEF CON 29 Sicker Contest - 9.png 3.03Мб
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.mp4 48.42Мб
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.mp4 3.05Мб
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.mp4 86.08Мб
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.mp4 74.30Мб
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.mp4 71.16Мб
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.mp4 61.77Мб
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.mp4 200.02Мб
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).mp4 54.19Мб
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.mp4 3.73Мб
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.mp4 4.21Мб
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.mp4 2.47Мб
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.mp4 3.92Мб
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.mp4 6.17Мб
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.mp4 3.36Мб
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.mp4 3.48Мб
DEF CON 29 Workshop Anthony Rose Evading Detection A Beginners Guide to Obfuscation.pdf 3.32Мб
DEF CON 29 Workshop Ash Secure Messaging.pdf 1.90Мб
DEF CON 29 Workshop Ben Kurtz Writing Golang Malwar.pdf 10.86Мб
DEF CON 29 Workshop Ben Kurtz Writing Golang Malware Workshop Source.zip 70.96Мб
DEF CON 29 Workshop Eigentourist Hacking The Metal.pdf 1.07Мб
DEF CON 29 Workshop Kristy Westphal Analysis 101 and 102 For Incident Responders.pdf 3.62Мб
DEF CON 29 Workshop Michael Solomon DFIRADA Slides Student.pdf 1.70Мб
DEF CON 29 Workshop Michael Solomon DFIRADA VM Hashes.txt 201б
DEF CON 29 Workshop Michael Solomon DFIRADA Welcome README.txt 917б
DEF CON 29 Workshop Philippe Delteil Bug Bounty Workshop.pdf 859.31Кб
DEF CON 29 Workshop Romain Zaikin From Zero to Hero in Web Security Research.pdf 5.38Мб
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.mp4 66.02Мб
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.mp4 65.24Мб
Democrasoft by Burninator.txt 17.93Кб
Dennis Giese - Robots with lasers and cameras but no security- Liberating your vacuum from the cloud.pdf 249.45Мб
Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.pptx 2.77Мб
Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.pdf 3.41Мб
Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.pptx 10.69Мб
FIRST PLACE - Networks by Gwisinkoht.txt 20.43Кб
Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.pdf 4.48Мб
Hacker Empress - Pandemic Love (2020) DC29.jpeg 1.60Мб
Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.pdf 14.37Мб
Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.pdf 44.27Мб
Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-goose.txt 686б
Ian Vitek - Central bank digital currency, threats and vulnerabilities.pdf 1.70Мб
Ian Vitek - Central bank digital currency, threats and vulnerabilities.pptx 4.42Мб
Inna Vasilye-Pika DC29.jpg 12.92Мб
Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.pdf 567.33Кб
Jacob Baines - Bring Your Own Print Driver Vulnerability.pdf 4.74Мб
James Kettle - HTTP2 - The Sequel is Always Worse - Slides.pdf 975.27Кб
James Kettle - HTTP2 - The Sequel is Always Worse - Whitepaper.pdf 656.04Кб
Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High(-Level) Languages.pdf 1.25Мб
Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.pdf 2.38Мб
Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.pptx 5.19Мб
jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.pdf 3.89Мб
Jorge Amezuca DC29.jpg 6.62Мб
Joseph Gabay - Dos- Denial of Shopping – Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.pdf 11.74Мб
Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.pdf 3.98Мб
Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.odp 6.46Мб
Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.pdf 4.86Мб
Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.pdf 9.39Мб
Lucy Nguyen DC29.png 476.70Кб
Malin Hess DC29.png 4.67Мб
Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.pdf 6.57Мб
Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric - tools.zip 1.74Кб
Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.pdf 980.20Кб
Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections - Slides.pdf 709.42Кб
Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.pdf 4.94Мб
Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.pptx 22.84Мб
Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.pdf 13.33Мб
Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.pdf 2.57Мб
PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.pdf 1.81Мб
Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.pdf 26.48Мб
Paz Hameiri - TEMPEST radio station.pdf 553.98Кб
Paz Hameiri - TEMPEST radio station-Slides.pdf 1.09Мб
PEOPLES CHOICE AWARD - FAICT by Serum.txt 30.92Кб
Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.pdf 776.44Кб
Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.pdf 4.84Мб
Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.pdf 7.33Мб
Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.pptx 28.76Мб
Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.pdf 4.57Мб
Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.pdf 12.37Мб
Rotem Bar - Abusing SAST tools When scanners do more than just scanning.pdf 3.40Мб
Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.pdf 28.75Мб
Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.pdf 2.64Мб
Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.pptx 5.31Мб
Salvador Mendoza - PINATA- PIN Automatic Try Attack.pdf 7.27Мб
Salvador Mendoza - PINATA- PIN Automatic Try Attack - Slides.pdf 74.03Мб
Samarkand - Hacking Viber Messenger with 0day Vulnerabilities- Sniffing and DoS.pdf 13.06Мб
Samarkand - Hacking Viber Messenger with 0day Vulnerabilities- Sniffing and DoS.zip 100.90Мб
SECOND PLACE - Repository Upload by Alfred Rowdy.txt 8.59Кб
Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.pdf 2.59Мб
Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.pdf 13.48Мб
Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.odp 28.13Мб
Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.pdf 13.46Мб
Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Slides.pdf 1023.43Кб
Tamas K Lengyel - Fuzzing Linux with Xen.pdf 10.02Мб
The Indomitable Signal by Panda.txt 12.87Кб
Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.pdf 9.01Мб
Tianze Ding - Vulnerability Exchange- One Domain Account For More Than Exchange Server RCE.pdf 9.01Мб
Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.pdf 17.17Мб
Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.pptx 20.22Мб
Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.pdf 7.17Мб
ToxicBBQ-History-Continuous.pdf 2.76Мб
ToxicBBQ-History-Zine-Printable.pdf 8.20Мб
Untitled by phonebook.txt 11.74Кб
Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).pdf 6.78Мб
Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).pptx 12.99Мб
Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.pdf 6.29Мб
Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.pdf 3.73Мб
Статистика распространения по странам
Россия (RU) 2
Германия (DE) 1
Всего 3
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент