589689.xyz

defcon-talks

  • 收录时间:2025-03-05 15:48:32
  • 文件大小:36GB
  • 下载次数:1
  • 最近下载:2025-03-05 15:48:32
  • 磁力链接:

文件列表

  1. 54816-high_intensity_deconstruction_chronicles_of_a_cryptographic_heist.mp4 913MB
  2. 54817-listen_to_the_whispers_web_timing_attacks_that_actually_work.mp4 778MB
  3. 54853-the_pwnie_awards-partial.mp4 763MB
  4. 54846-exploiting_bluetooth_-_from_your_car_to_the_bank_account.mp4 593MB
  5. 54828-def_con_unplugged_cocktails_and_cyber_with_jeff_and_jen.mp4 581MB
  6. 54871-eradicating_hepatitis_c_with_bioterrorism.mp4 579MB
  7. 54857-the_rise_and_fall_of_binary_exploitation.mp4 574MB
  8. 54844-bricked_and_abandoned_how_to_keep_the_iot_from_becoming_an_internet_of_trash.mp4 573MB
  9. 54843-breaking_secure_web_gateways_swg_for_fun_and_profit.mp4 569MB
  10. 54888-iconv_set_the_charset_to_rce_exploiting_the_glibc_to_hack_the_php_engine-partial.mp4 569MB
  11. 54902-driverjack_turning_ntfs_and_emulated_read-only_filesystems_in_an_infection_and_persistence_vector.mp4 566MB
  12. 54830-the_way_to_android_root_exploiting_your_gpu_on_smartphone.mp4 564MB
  13. 54861-disenshittify_or_die_how_hackers_can_seize_the_means_of_computation_and_build_a_new_good_internet_that_is_hardened_against_our_asshole_bosses_insatiable_horniness_for_enshittification.-partial.mp4 563MB
  14. 54865-fireside_chat_with_jay_healey_and_national_cyber_director_harry_coker_jr..mp4 558MB
  15. 54863-amd_sinkclose_universal_ring_-2_privilege_escalation-partial.mp4 556MB
  16. 54829-optical_espionage_using_lasers_to_hear_keystrokes_through_glass_windows.mp4 554MB
  17. 54909-your_ai_assistant_has_a_big_mouth_a_new_side-channel_attack.mp4 552MB
  18. 54914-abusing_legacy_railroad_signaling_systems-partial.mp4 549MB
  19. 54845-one_for_all_and_all_for_whad_wireless_shenanigans_made_easy.mp4 547MB
  20. 54835-dc101_panel.mp4 545MB
  21. 54889-nano-enigma_uncovering_the_secrets_within_efuse_memories-partial.mp4 542MB
  22. 54884-def_con_academy_cultivating_m4d_sk1llz_in_the_def_con_community.mp4 537MB
  23. 54823-defeating_edr_evading_malware_with_memory_forensics.mp4 529MB
  24. 54885-watchers_being_watched_exploiting_the_surveillance_system_and_its_supply_chain.mp4 528MB
  25. 54825-sshamble_unexpected_exposures_in_the_secure_shell-partial.mp4 526MB
  26. 54874-troll_trapping_through_tas_tools_-_exposing_speedrunning_cheaters.mp4 522MB
  27. 54852-reverse_engineering_micropython_frozen_modules_data_structures_reconstruction_and_reading_bytecode.mp4 522MB
  28. 54896-changing_global_threat_landscape_with_rob_joyce_and_dark_tangent.mp4 517MB
  29. 54819-fireside_chat_with_dnsa_anne_neuberger-partial.mp4 514MB
  30. 54882-secrets_and_shadows_leveraging_big_data_for_vulnerability_discovery_at_scale.mp4 513MB
  31. 54834-android_app_usage_and_cell_tower_location_private._sensitive._available_to_anyone.mp4 510MB
  32. 54833-abusing_windows_hello_without_a_severed_hand.mp4 509MB
  33. 54841-leveraging_private_apns_for_mobile_network_traffic_analysis.mp4 507MB
  34. 54839-sql_injection_isnt_dead_smuggling_queries_at_the_protocol_level-partial.mp4 506MB
  35. 54854-gotta_cache_‘em_all_bending_the_rules_of_web_cache_exploitation-partial.mp4 505MB
  36. 54858-quickshell_sharing_is_caring_about_an_rce_attack_chain_on_quick_share-partial.mp4 504MB
  37. 54876-exploiting_the_unexploitable_insights_from_the_kibana_bug_bounty-partial.mp4 503MB
  38. 54838-outlook_unleashing_rce_chaos_cve-2024-30103_and_cve-2024-38021.mp4 500MB
  39. 54870-discovering_and_exploiting_local_attacks_against_the_1password_macos_desktop_application.mp4 500MB
  40. 54856-shim_me_what_you_got_-_manipulating_shim_and_office_for_code_injection.mp4 496MB
  41. 54862-grand_theft_actions_abusing_self-hosted_github_runners_at_scale-partial.mp4 495MB
  42. 54899-the_hack_the_crash_and_two_smoking_barrels._and_all_the_times_i_almost_killed_an_engineer..mp4 494MB
  43. 54814-open_sesame_-_or_how_vulnerable_is_your_stuff_in_electronic_lockers.mp4 492MB
  44. 54891-aws_cloudquarry_digging_for_secrets_in_public_amis.mp4 491MB
  45. 54822-kicking_in_the_door_to_the_cloud_exploiting_cloud_provider_vulnerabilities_for_initial_access.mp4 486MB
  46. 54898-dragon_slayingguide_bug_hunting_in_vmware_device_virtualization.mp4 486MB
  47. 54879-unsaflok_hacking_millions_of_hotel_locks.mp4 483MB
  48. 54877-measuring_the_tor_network.mp4 483MB
  49. 54883-breaking_the_beam_exploiting_vsat_satellite_modems_from_the_earths_surface.mp4 483MB
  50. 54826-digital_emblems_when_markings_are_required_under_international_law_but_you_dont_have_a_rattle-can_handy.mp4 480MB
  51. 54913-incubated_machine_learning_exploits_backdooring_ml_pipelines_using_input-handling_bugs-partial.mp4 469MB
  52. 54908-redefining_v2g_-_how_to_use_your_vehicle_as_a_game_controller.mp4 469MB
  53. 54818-making_the_def_con_32_badge.mp4 463MB
  54. 54831-breaching_aws_accounts_through_shadow_resources.mp4 462MB
  55. 54878-hookchain_a_new_perspective_for_bypassing_edr_solutions-partial.mp4 448MB
  56. 54895-windows_downdate_downgrade_attacks_using_windows_updates.mp4 447MB
  57. 54892-splitting_the_email_atom_exploiting_parsers_to_bypass_access_controls.mp4 435MB
  58. 54869-ntlm_-_the_last_ride-partial.mp4 429MB
  59. 54873-ace_up_the_sleeve_from_getting_jtag_on_the_iphone_15_to_hacking_into_apples_new_usb-c_controller.mp4 428MB
  60. 54867-oh-my-dc_abusing_oidc_all_the_way_to_your_cloud-partial.mp4 424MB
  61. 54855-smishing_smackdown_unraveling_the_threads_of_usps_smishing_and_fighting_back.mp4 420MB
  62. 54868-behind_enemy_lines_engaging_and_disrupting_ransomware_web_panels-partial.mp4 411MB
  63. 54837-taming_the_beast_inside_the_llama_3_red_team_process.mp4 407MB
  64. 54820-on_your_oceans_11_team_im_the_ai_guy_technically_girl-partial.mp4 406MB
  65. 54859-sudos_and_sudonts_-_peering_inside_sudo_for_windows.mp4 402MB
  66. 54864-the_secret_life_of_a_rogue_device_-_lost_it_assets_on_the_public_marketplace.mp4 381MB
  67. 54851-mutual_authentication_is_optional-partial.mp4 321MB
  68. 54824-if_existing_cyber_vulnerabilities_magically_disappeared_overnight_what_would_be_next.mp4 300MB
  69. 54840-atomic_honeypot_a_mysql_honeypot_that_drops_shells-partial.mp4 300MB
  70. 56208-def_con_franklin_project.mp4 282MB
  71. 54887-techniques_for_creating_process_injection_attacks_with_advanced_return-oriented_programming.mp4 276MB
  72. 54850-laundering_money.mp4 249MB
  73. 54880-compromising_an_electronic_logging_device_and_creating_a_truck2truck_worm.mp4 230MB
  74. 54894-unlocking_the_gates_hacking_a_secure_industrial_remote_access_solution.mp4 224MB
  75. 54813-no_symbols_when_reversing_no_problem_bring_your_own-partial.mp4 163MB
  76. 54525-the_pwnie_awards.mp4 120MB
  77. 54811-defeating_magic_by_magic:using_alpc_security_features_to_compromise_rpc_services-partial.mp4 64MB
  78. 54812-spies_and_bytes_victory_in_the_digital_age-partial.mp4 64MB